Fusion Centers Affirmative - JDI 2015
Fusion Centers Affirmative - JDI 2015
Fusion Centers Affirmative - JDI 2015
Notes
There are two different versions of the affirmative.
The first version of the affirmative says that fusion centers are targeting the
#BlackLivesMatter movement; we think thats bad.
The second version of the affirmative says that fusion centers over-saturate
law enforcement with information that trades off with counter-terrorism
efforts and stops cloud computing.
If you are reading the terrorism advantage, a lot of the terrorism mechanics
are in the Terror DA toolbox.
government quickly realized the significance of the fusion center as a keystone in its national effort to share information
needed to guard against terrorism and respond to national crises. The National Network of Fusion Centers was erected to
bolster this much-needed capability.6 While the identification of the network itself may have stemmed from an informal
designation given to the collaboration among federal interagency partners with state, local, tribal, and territorial partners,
today it is used to formally recognize this national partnership. Moreover, it is this formal recognition that underpins a
programmatic effort by the Department of Homeland Security Office of Intelligence and Analysis (DHS I&A) to follow
guidance derived from the Information Sharing Environment (ISE) established by the United States Intelligence Reform
and Terrorism Prevention Act of 2004. Under that authority, DHS I&A in cooperation with the Department of Justices (DOJ)
Federal Bureau of Investigation (FBI) provides coordinated support to recognized fusion centers in a given area across the
nation. DOJ has recognized the usefulness of fusion centers for identifying terrorist and criminal trends and processing
suspicious activity reports in state and local jurisdictions. It is the recognition of these two federal departments that has
fueled the growth of fusion centers since the concept first came to the fore early in the millennium. The National
Network of Fusion Centers has been embraced by the Departments of Homeland Security and Justice as a focal point of
the 2010
National Security Strategy of the United States specifically cites fusion
centers as a central element in preventing future acts of terrorism . Simply put,
this decentralized and organically developed network is a national asset, and
sustainment of that asset is a shared responsibility across all levels of
government. In the absence of fusion centers, there is no other nationwide
mechanism for leveraging the breadth and depth of more than two million
public safety practitioners in every corner of the country for homeland
security purposes. Notably, as seasoned intelligence experts and information analysts from all levels of
collaboration in support of federal counterterrorism efforts and other homeland security priorities. In fact,
government will concede, some of the most important information and actionable intelligence that we depend on to
protect the country flows up, not down the knowledge is collected at a granular State or local level and then fused to
permit all levels of government to act decisively in the protection of Americans. That is a central purpose for the fusion
centers, and one that has been well-served by their existence. 7 Despite the fact that state and local law enforcement
and homeland security professionals mainly staff fusion centers, these centers are also comprised of personnel and
systems from the federal government. The DHS and FBI footprints within fusion centers serve as gateways to the
intelligence community for state, local, and private sector entities. State and local fusion center analysts conduct
assessments and produce intelligence products related to state and local level threats and risks that otherwise would not
be addressed by federal authorities. This information is shared nationally, and provided to the federal government and the
intelligence community to answer standing information needs related to homeland security. While each fusion center
enterprise may differ on how they refer to their respective intelligence product frameworks ,
the key
assumption is that finished intelligence informs state and local decisionmakers about the threat environment in a manner that supports planning,
operations, resource allocation, and trainin g. Achieving this dynamic requires
fusion centers to answer four very important questions for their consumers:
What has happened? What is happening? What is about to happen? What
could happen?8 In answering the above four questions, fusion centers across
the network likely arrange their intelligence products in four distinct
categories: investigative support/research products, situational awareness
reports, analyses, and forecasts.9 Investigative support/research products focus on past and current
events and issues that require additional information for decision makers and investigators to better understand or to
assist with the describing evidence of a crime. Situational awareness reports aim specifically at answering the question of
what is happening in a particular environment or what is about to happen. Analytical products go a step further and
determine the impact of an event, threat, or issue on a particular environment or constituency. Finally, forecasting
products seek to answer the question of what may happen in the future that will require a policy decision, operations
response, or resource allocation. Each fusion center is responsible for determining who within their area of responsibility
(AOR) requires information and intelligence products that address threat and risk related to crime, counter terrorism, and
homeland security. These constituencies include law enforcement, public safety, emergency management, government,
and private sector personnel and organizations. While the intelligence and information products created are based on the
needs of the requestor, the decision maker individual fusion centers aim to inform runs the gamut from line level police,
investigators, fire, and EMS personnel to mayors and governor; from attorney generals and homeland security advisors to
state police superintendents to municipal police chief; from private sector security managers to emergency management
and risk mitigation planners.10 Each of these decision makers requires a different type of product or service from the
fusion center to inform them about threat, risk, and problems within the environment.
PLAN TEXT
Plan: The United States Federal Government should defund fusion centers.
Solvency
1AC
" that
--
It is a devastating document.
traffickers."
were not even circulated after they were written, sometimes because they
(One analyst, for example, felt the need to note that a Muslim community group's list of recommended readings
included four items whose authors were in the TIDE database.) Interestingly, while the DHS usually refused to publish these problematic reports, the department also retained them for an "apparantly indefinite"
period. Why did the centers churn out so much useless and illegal material? A former employee says officers were judged "by the number [of reports] they produced, not by quality or evaluations they received."
Senate investigators were "able to identify only one case in which an official with a history of serious reporting issues faced any consequences for his mistakes." Specifically, he had to attend an extra week of
. Other issues identified in the Senate report: Some of the fusion centers
touted by the Department of Homeland Security do not, in fact, exist.
Centers have reported threats that do not exist either. An alleged Russian
"cyberattack" turned out to be an American network technician accessing a
work computer remotely while on vacation. DHS "was unable to provide an
accurate tally of how much it had granted to states and cities to support
fusion centers efforts." Instead it offered "broad estimates of the total amount
of federal dollars spent on fusion center activities from 2003 to 2011,
estimates which ranged from $289 million to $1.4 billion."
A center in San Diego "spent
nearly $75,000 on 55 flat-screen televisions," according to the Senate report
officials said they displayed calendars, and were used for
training
spending, it becomes hard to keep track of what that money is being spent on. All sorts of dubious expenses slipped by.
"
" And then there's the matter of mission creep. Many centers have adopted an "all-crime, all-hazards" approach that shifts their focus from stopping terrorism and onto
a broader spectrum of threats. You could make a reasonable case that this is a wiser use of public resources -- terrorism is rare, after all, and the DHS-driven movement away from the all-hazards approach in the
RootsAction to petition Congress to take action to close Fusion Centers. Please add your voice, and share!
The documents, many of which are partially redacted, reveal a surprising degree of coordination between
local authorities and fusion centers. For example, the Southern Nevada Counter Terrorism Center, acting on
a request from police chiefs to identify, research and document trends or activities that may threaten
public safety, produced a bulletin detailing the tactics and strategies employed by Occupy activists
nationwide. Included in this bulletin were reports about Las Vegas activists staging sit-ins and free
speech protesters in Long Beach, California being arrested for staying in a park past its 10pm closing time.
The report also notes that Occupy activists had momentarily interrupted a speech by President Obama in
November of 2011. According to the New York Times, among the most active centers tracking Occupy
activities was a Boston-area fusion center which issued scores of bulletins listing hundreds of events
including a protest of irresponsible lending practices, a food drive and multiple yoga, faith & spirituality
classes. Law enforcement in Atlanta, Dallas, Denver, Detroit, El Paso, Houston, Los Angeles, New York,
Oakland, Portland, San Diego, Seattle, and Washington, D.C., participated in similar monitoring activities.
more bizarre examples of mission creep revealed by these documents, the Defense Threat Reduction
Agency (DTRA), whose official mission is to address the entire spectrum of chemical, biological,
radiological, nuclear and high yield explosive threats, was tracking and sharing intelligence on Occupy
activities. According to PCJF: This Pentagon agency that exists to counter threats from weapons of mass
destruction circulated material on Occupy including, for example, one document with the subject line: FW:
Alert Update! Chicago What Police Should Be Learning From The Occupy Protests. This document shows
in an email chain that this article was initially circulated through the subscription website activistmap.com,
which is billed as the Domestic Terrorism Tracking System. The keywords associated with this Domestic
Terrorism Tracking System include: anarchist(s), animal rights, environmentalist, protesters, socialist(s),
communist(s), civil disobedience, social justice and global justice, among others. (emphasis added)
[T]he Fusion Centers are a threat to civil liberties, democratic dissent and the social and political fabric of
this country, said Carl Messineo, PCJF Legal Director. The
centers to be defunded.
Extensions
newly
released documents show that the Department of Homeland Securitys representations
were far from true, that the conduct of the Fusion Centers continued unabated. The American
people can now see for themselves how the U.S. government and the Department of
Homeland Security are spending hundreds of millions of dollars of their money
in Fusion Center operations. These documents, along with materials previously
documents that the Partnership for Civil Justice Fund has obtained and made public. The
released by the PCJF that exposed the FBI and other domestic intelligence and law enforcement agencies
and letter-writing effort to President Obama and all members of Congress calling on them to defund and
end the Fusion Centers. As part of the End the Fusion Centers campaign and to broaden awareness of the
dangers posed by the Fusion Centers, the PCJF has also made the new documents fully available to the
public and to the media in searchable format at BigBrotherAmerica.org. Although the Fusion Centers
existence is justified by the DHS as a necessary component in stopping terrorism and violent crime, the
documents show that the Fusion Centers in the Fall of 2011 and Winter of 2012 were
devoted to unconstrained targeting of a grassroots movement for social
change that was acknowledged to be peaceful in character.
much you're spending, it becomes hard to keep track of what that money is being spent on. All sorts of
dubious expenses slipped by.
"When asked
what the televisions were being used for, officials said they displayed calendars, and were used for 'opensource monitoring.' Asked to define 'open-source monitoring,' SD-LECC officials said they meant 'watching
A "2010 assessment of
state and local fusion centers conducted at the request of DHS found
widespread deficiencies in the centers' basic counterterrorism
information-sharing capabilities," for example. "DHS did not share that report with
the news.'" The report is also filled with signs of stonewalling.
Congress or discuss its findings publicly. When the Subcommittee requested the assessment as part of its
investigation, DHS at first denied it existed, then disputed whether it could be shared with Congress,
before ultimately providing a copy." And
actions and presidential executive orders, fusion centers (and the "counter terrorism" entities that they are comprised of)
work-- in ever closer proximity.
over time and with the escalating involvement of federal officials, fusion
centers have increasingly gravitated toward an all-crimes and even broader
all-hazards approach.[4] The expansion of fusion center goals and increasing
interaction with federal and private sector entities leads to a massive
accumulation of data, raising questions of possible misuse or abuse . The
counterterrorism, but,
Department of Homeland Security (DHS) seeks to create a national network of local and state fusion
centers, tied into DHSs day-to-day activities . This national network combined with the
Department of Homeland Securitys plan to condition grant funding based on fusion center compliance
centers had begun operations before September 11, 2001, but afterward, the number of centers grew
rapidly.
While some interstate efforts have existed from the start, lately there has been a push to formalize these
ties. This is most visible in the 2014-2017 National Strategy for the National Network of Fusion Centers,
Department of Homeland Security 2013 Fusion Center Success Stories: The Immigration and Customs
Enforcement office in Fort Lauderdale, Fla., brought in the Central Florida Intelligence Exchange on a case
involving an individual wanted for production of child pornography. The exchange notified the Tennessee
Fusion Center and Georgia Information Sharing and Analysis Center, and the suspect was arrested by the
Georgia State Patrol.
here's a tiny portion of what the federal money (your tax dollars at work)
purchased. According to the Senate investigative report, fusion center funds were spent: In
Arizona: Chevrolet Tahoes which were later given away to other agencies
in Arizona; a surveillance monitoring wiretap room; 42" flat-screen TVs In Cleveland, Ohio, the
fusion center spent $15,848 to buy the medical examiner "ruggedized
Toughbook laptop computers." When asked why, the fusion center
"responded that the laptops were for processing human remains in
the aftermath of a mass casualty event in the Cleveland area." In San
at you,
Diego, fusion center funds bought: a covert, wireless audio/video recorder with a "shirt-button camera"; an
ultra-low-light "pinhole" VGA camera; an ultra-low-light shirt-button camera "with interchangeable tops."
But because that surveillance equipment was "simply too complicated for our customers to use," the San
Diego "fusion center received other undercover surveillance devices," including: "A camera hidden in a hat
Security grants to upgrade: an electronic records management system; data mining software; and an
Automated License Plate Recognition system (LPR system). But wait, it was not for the fusion center; it was
purchased for the local cops. The LPR system was later dropped, in favor of buying: more "analytic
software;" "sophisticated cell phone tracking devices;" and "handheld citation issuance units and
accessories" all to enhance the capabilities of the D.C. police department. That doesn't count the money
spent on computers, laptops, LCD Status Boards, CCTVs or paying cellular provider fees. Regarding
"troubling" reports that some fusion centers may have violated the privacy and civil liberties of U.S.
citizens: DHS personnel "are prohibited from collecting or maintaining information on U.S. persons solely
for the purpose of monitoring activities protected by the U.S. Constitution, such as the First Amendment
protected freedoms of religion, speech, press, and peaceful assembly and protest. The Privacy Act
prohibits agencies from storing information on U.S. persons' First Amendment-protected activities if they
have no valid reason to do so. Yet of all those SARs because you might be a domestic terroist if, the Senate
panel wrote, "The apparent indefinite retention of cancelled intelligence reports that
were determined to have raised privacy or civil liberties concerns appears contrary to DHS's own policies
with a Homeland
Security official who said "the department has made improvements to the fusion centers and that
the skills of officials working in them are 'evolving and maturing'." Not
matured, after nine years and hundreds of millions, if not billions of
dollars later? This was only a fraction of the 141-page Senate investigation
report which basically concluded that fusion centers are filled with 'crap'
suspicious activity reports that are not helping the counterterrorism mission
one little bit, but that are violating Americans' civil liberties and privacy.
and the Privacy Act." After promising the condition of anonymity, NBC News spoke
1AC
The second root of such organizing both on the streets and on the internet
is black youth-led social movement organizations and networks such as Black Lives
Matter, We Charge Genocide and Black Youth Project 100 (BYP100), to name a few. All of them have emerged in
recent years around the question of racialized police violence as well as other issues
facing black people. In so doing, they have not only mobilized and raised visibility
around these issues, but have also produced important written analyses of the
situation. They have insisted that we understand these murders as systemic rather
than episodic, as endemic rather than aberrations to an otherwise post-racial society
and state apparatus. These organizations have also been emphatic about
contextualizing these horrific events along a spectrum of state violence that black
people, and particularly poor black people experience every day in the form of
surveillance, hyper criminalization and mass incarceration.We Charge Genocide a grassroots
coordinated.
Chicago-based organization that emerged in the wake of the killing of Dominique Damo Franklin and that works to equip
individuals and communities to police the police took its name from a 1951 Petition with the same name. Originally submitted to
the UN General Assembly submitted by the Civil Rights Congress, the petition documented 153 racial killings and was signed by
W.E.B. Dubois and Paul Robeson, among many others. Its authors held that the oppressed Negro citizens of the United States,
segregated, discriminated against and long the target of violence, suffer from genocide as the result of the consistent, conscious,
unified policies of every branch of government. In a similar vein, the youth organizing with We Charge Genocide, along with the
parents of Mike Brown made similar statements on state violence against black communities in front of the UN Committee on Torture
in Geneva in November of this year. The parallels between these two moments of black resistance in both domestic and international
space are many. These similarities caution us to resist the temptation to demarcate the current moment as constituting a new kind of
racial violence.The third aspect of this movement that is important to underscore is that it is not a white movement. If you have
participated in recent protests, or even seen footage of them, you have likely noticed that many of those organizing for racial justice
and against anti-black racism are not black. In fact, a great deal of the images circulating in the newspapers in cities like New York
and in the Bay Area show a great deal of white, likely middle class liberal whites marching and dying in. On the one hand, it is
significant moment when whites chant black lives matter. This is especially the case when we consider that much of the racialized
violence perpetuated against black people (though not all) has happened at the hands of white police officers who refuse to see black
people as fully human. Having participated in some of the protests myself, I have to admit that watching black people being joined by
other people of color and white people yell black lives matter gave me a little bit of renewed hope about the possibilities of breaking
through the ideological force of post-racial America.
On the other hand, the participation and visibility of white protestors has been highly problematic. Social Justice Blogger Tam
highlighted this best in a recent post entitled Dear White Protesters: As a Black person in this country, I am well aware that the
streets belong to white people. I am not empowered or made more safe by hundreds of white people chanting that the streets belong to
them. The street in Ferguson where Mike Brown was murdered and lay dead for 4.5 hours should have belonged to him, but it didnt.
Hes dead. Hes not coming back. Thats because the streets belong to white people. Indeed, the impulse of many white protestors
throughout the United States has not been to simply stand in solidarity with black communities and others affected directly by
racialized state violence, but to appropriate that suffering, to give voice to black people, to be at the center of the movement.These
tensions were accentuated in a recent protest organized by black students at the University of Chicago where students called on
everyone to march, but only allowed black students to die in. This was a strategic decision that was an important one because it
reaffirmed the fact that it is blackness itself that made Eric Garner and Mike Brown susceptible to what Achille Mbembe calls
necropolitics or the contemporary forms of subjugation of life to the power of death that profoundly reconfigure the relations
among resistance, sacrifice, and terror. Yet
protests in California.
between the California Highway Patrol and its Terrorism Liaison Officers.
the note read in part. Other emails show that counter-terrorism officials were at times embedded with protesters in
visit by Michael Brown Sr., father of the late Ferguson, Mo. teenager, with a
be stated. If you publish something on social media that is publicly viewable, then people will view it and take it into account, including officers of the law. The assassination of two police officers in Brooklyn last
December was announced over social media before it occurred, and authorities took notice. If you see something on social media that is a threat against a police officer, call 911 immediately, New York Mayor Bill
de Blasio said after the incident. We cannot take this lightly, he said. Oakland protest in December, after a grand jury did not indict police for the death of Eric Garner in NYC. Photo: Getty Images Oakland protest
in December, after a grand jury did not indict police for the death of Eric Garner in NYC. Photo: Getty Images But many things remain unclear about social media monitoring programs like the one in California. We
dont know as much about the [California] program as we should, Nadia Kayyali, an activist with the Electronic Frontier Foundation, told the East Bay Express. We dont know what their standards are, their policies
some of the activists it found counter-terrorism officials were tracking, like Twitter user @DomainAwareness, a digital privacy activist who asked not to be identified.
the Twitter user said.
though operations are often left in control of local officials. Several of the emails released from East Bay Express originated inside of the Northern California Regional Intelligence Center, a fusion center which the
paper says connects police agencies from Monterey County to the Oregon border.
tremendous resources,
Black Lives Matter protests
. Unfortunately, at least one alleged terrorist plot has been planned in the midst of the Black Lives Matter protests. In November, two
members of the St. Louis chapter of the New Black Panthers were busted by the FBI when they allegedly bought pipe bombs from undercover agents, which they planned to use against people, buildings, vehicles
and property during the unrest that was sweeping the region at the time. The duo was formally indicted for the alleged plot in early April. They have both pleaded not guilty. Three days after they were arrested, a
grand jury made its announcement not to press charges against former Ferguson police officer Darren Wilson for the shooting death of Michael Brown. Riots and violence spread through St. Louis
and the city of Ferguson after the announcement. Richard Callahan, the U.S. Attorney for the Eastern District of Missouri, said that the disruption of the plot saved some lives of both protesters and law
enforcement.
Bondgraha 15
with individual officers last night. In the posts, protesters are stating that we (CHP) were claiming to follow
them on social media. Please have your personnel refrain from such comments; we want to continue
In
recent years, police agencies throughout the United States have
scoured social media as part of criminal investigations. But the
police are also watching social media to spy on political protesters,
especially those they suspect will engage in acts of civil
disobedience. During the recent Black Lives Matter protests, local
and state police agents monitored protesters on social media and
activist websites. Several hundred CHP emails obtained by the Express show that
social media is now a key source of intel for the police when
monitoring political protests. But the emails raise serious questions,
say civil libertarians and some of the activists whose posts were
harvested as intel. How do police monitor social media? Do they store data
tracking the protesters as much as possible. If they believe we are tracking them, they will go silent."
or track particular people? Are agencies over-reacting and wasting resources? And why are counter-
terrorism police involved? The TLOs tasked by the CHP with monitoring Black Lives Matter protesters on
social media are employed by different local agencies and serve as points of contact for matters regarding
terrorism. The role was created after 9/11, and the officers communicate through networks coordinated by
fusion centers, such as the Northern California Regional Intelligence Center, or NCRIC, which connects
police agencies from Monterey County to the Oregon border. "We don't know as much about the TLO
program as we should," said Nadia Kayyali, an activist with the Electronic Frontier Foundation. "We don't
know what their standards are, their policies with respect to limits and privacy." The Twitter user
@domainawareness, whose tweets were collected by the police and used as intel, reviewed some of the
CHP emails that we obtained. "It's the coordination that's disturbing," said @domainawareness, whom the
Express has agreed to not identify. "Everything's totally fusion center-oriented and the information is going
very high up." An email sent on December 12 illustrates how counter-terrorism officials working out of
fusion centers helped CHP monitor protesters. At 12:12 p.m. that day, Elijah Owen, a senior intelligence
advisor with the California State Threat Assessment Center (Cal STAC) sent CHP officer Michael Berndl a
copy of a protest flier calling for a speak-out and march against the CHP the next day. "Just so it's on your
folks' radar," wrote Owen. Cal STAC officers appear in other CHP emails as sources of information, or
recipients of intel gathered by the Oakland Police Department, Alameda County Sheriff's Office, and other
"There
are CHP officers in the center, but it's a task force environment. We
assess threats. Transnational crime. Terrorism." Hopkins said Cal STAC is
a fusion center like NCRIC, except that its main focus is assessing
strategic threats to the state of California. Hopkins said he could not
comment on any emails sent by his subordinate because he hasn't
seen them. "They've built this big network and they have
tremendous resources," said @domainawareness about the involvement of fusion centers in
monitoring the Black Lives Matter protests. "But they don't have enough to do, so
they're using this to watch political protesters. It's mission creep ."
agencies. "We are not the CHP," Matthew Hopkins the deputy commander of Cal STAC told me.
Kayyali added: "There's this mystique around doing surveillance and intel-gathering, and they're not really
thinking about the usefulness of what they're doing, and why they're doing it." Another email circulated
among CHP commanders on December 11 included a two-page brief on the department's undercover
operations in Oakland and Berkeley in which at least four CHP officers were "[e]mbedded with protesters."
According to the brief, these were Terrorism Liaison Officers from CHP's Investigative Services Unit (ISU).
"The unsaid thing was, 'warning there's going to be a lot of police there, so if you're planning anything out
of line, watch out.'" Other police agencies flagged Dominguez's event as a threat. In an email with the
subject line "RE: Social Media Update," CHP Investigator Timothy Randall emailed half a dozen other
officers on December 10, including CHP Chief Avery Browne, and included a screenshot of Dominguez's
event posting from Indybay. "Supposed to be just a 'vigil' but it is occurring in Oakland," wrote Randall. I
asked Dominguez why law enforcement might single out her event. "Maybe
said Dominguez. "My name is Maria Dominguez. I'm a Latina, and the Ella
Baker Center, it's racialized it's named after a Black woman." The Oakland Police Department also
monitored the Twitter accounts and Facebook postings of Black Lives Matter protesters in December. One
"situational awareness" update that OPD sent to the CHP listed a candlelight vigil by Lake Merritt, a
Berkeley City Council meeting, and a visit by Mike Brown, Sr. to a San Francisco church as events to
monitor. I called Sergeant Randal Bandino, one of the OPD officers sharing these emails, to ask about how
OPD monitors social media. Bandino said he personally isn't involved and can't speak to OPD's practices
and policies. But he added, "It's nothing special. What we're looking at is what's open to the public."
Deputy Alameda County Sheriff David Darrin also said he couldn't speak about how his agency monitors
social media, referring me instead to the sheriff's official spokesperson. Darrin is also an intelligence officer
with the NCRIC fusion center. On December 7, Darrin shared Facebook events advertising upcoming
marches "to protest the police riot in Berkeley" with his NCRIC colleague Nicholas Silva. Silva, a CHP
officer, forwarded the information on to CHP investigators. CHP spokesperson Brandie Dressel wrote in an
email to me that the CHP has no policies governing the monitoring of social media, but that officers
"search for any and all 'open source,' or publicly available, information related our public safety
assessments." According to Dressel, the CHP doesn't keep any of this data. As to why Terrorism Liaison
Officers were leading the CHP's effort to monitor Black Lives Matter protesters, Dressel wrote, "CHP TLOs
can at times be assigned to gather intelligence and provide logistical support for a reasonable and clearly
articulated law enforcement purpose." The emails obtained by the Express from CHP were originally part
of a Public Records Act request made by San Francisco resident Michael Petrelis. Petrelis said he asked for
the records because he was concerned about CHP's use of less-than-lethal weapons and armed undercover
agents. Petrelis also said he is not surprised to see the extensive monitoring of social media by the police.
"I come out of Act Up in NYC," said Petrelis. "The cops came to our meetings and they picked up all the lit.
person to come under the watchful eye of American law enforcement for perceived and actual dissidence. Nor is dissidence always a requirement for being subject to spying.
, J. Edger
. They
. As I write this,
surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mothers visit from the FBI reminds me that, from the slave pass system to
. Its
time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance.
has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and
Targeted surveillance
is an obvious answerit may be discriminatory, but it helps protect the
privacy perceived as an earned privilege of the inherently innocent. The
trouble is, targeted surveillance frequently includes the indiscriminate
collection of the private data of people targeted by race but not involved in
any crime
we are watched, either
as criminals or as consumers
policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal.
. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead,
. We do not expect policies to protect us. Instead, weve birthed a complex and coded culturefrom jazz to spoken dialectsin order
to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. In a recent
address, New York City Police Commissioner Bill Bratton made it clear: 2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally will give
to every member of this department technology that wouldve been unheard of even a few years ago. Predictive policing, also known as Total Information Awareness, is described as using advanced technological
tools and data analysis to preempt crime. It utilizes trends, patterns, sequences, and affinities found in data to make determinations about when and where crimes will occur. This model is deceptive, however,
Alexander calls the New Jim Crowa de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and conditions of confinement that operate more as a
This approach to
policing places an undue focus on quality of life crimeslike selling loose
cigarettes, the kind of offense for which Eric Garner was choked to death
predictive policing is just high-tech racial profiling
indiscriminate data collection that drives discriminatory policing practices
system of social control by racial hierarchy than as crime prevention or punishment. In New York City, the predictive policing approach in use is Broken Windows.
. Without
. As local
law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on specific conversations on and offline; to observe daily movements of individuals and
groups; and to observe data trends. Police departments like Brattons aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic Frontier
Foundation found to be disproportionately used in communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI has now rolled
out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step toward
accountability based on the results of one study, yet storage and archiving procedures, among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray
technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used to
track a suspects cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is true of domestic drones, which are in increasing use by U.S. law
enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and
tear gas.
instead
these have
currently seventy-eight on record. They are the clearinghouse for increasingly used suspicious activity reportsdescribed as official documentation of observed behavior reasonably indicative of pre-operational
. As anybody whos ever dealt with gang databases knows, its almost impossible to get off a
federal or state database, even when the data collected is incorrect or no longer true. Predictive policing doesnt just lead to racial and religious profilingit relies on it.
, suspicious activities
. Unfortunately, it probably doesnt, because my life is at far greater risk than the lives of white Americans,
especially those reporting on the issue in the media or advocating in the halls of power. One of
engaged local law enforcement agencies and electronic surveillance technologies to spy on Muslims living in the United States. According to FBI training materials uncovered by Wired in 2011, the bureau taught
agents to treat mainstream Muslims as supporters of terrorism, to view charitable donations by Muslims as a funding mechanism for combat, and to view Islam itself as a Death Star that must be destroyed if
terrorism is to be contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded unlawful and covert racial and religious profiling against Muslims not suspected of any crime.
There is no national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the United States, including survivors of torture, asylum seekers, families
with small children, and the elderly. Undocumented migrant communities enjoy few legal protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According to the
Sentencing Project, of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and ethnic minorities. But by far, the widest net is cast over black communities. Black people
alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater
criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime. This is not a broken system, it is a system working perfectly as intended,
to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants. As surveillance technologies are increasingly adopted and
integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the context of structural racism. Reporters love to
tell the technology story. For some, its a sexier read. To me, freedom from repression and racism is far sexier than the newest gadget used to reinforce racial hierarchy. As civil rights protections catch up with the
technological terrain, reporting needs to catch up, too. Many journalists still focus their reporting on the technological trends and not the racial hierarchies that these trends are enforcing. Martin Luther King Jr. once
said, Everything we see is a shadow cast by that which we do not see. Journalists have an obligation to tell the stories that are hidden from view. We are living in an incredible time, when migrant activists have
blocked deportation buses, and a movement for black lives has emerged, and when women, queer, and trans experiences have been placed right at the center. The decentralized power of the Internet makes that
. We can counter inequality by ensuring that both the technology and the police departments that use it are
democratized.
. There are no voiceless people, only those that aint been heard yet. Lets birth a new norm in which the technological tools of the twenty-first century
create equity and justice for allso all bodies enjoy full and equal protection, and the Jim Crow surveillance state exists no more.
special prosecutor was assigned to the case to meet the calls for justice. Angela Corey would become the
face for an area of the law that is both ubiquitous and unthought. It seems she understood this for her
statement, before officially giving the charge, set up a context for evaluating prosecutors, The Supreme
Court has defined our role as Proscutors [as] not only ministers of justice but seekers of the truth.
Every single day our prosecutors across this great country handle difficult cases and they adhere to that
same standard: a never ending search for the truth and a quest to always do the right thing for the right
reason. There is a reason cases are tried in a court of law and not in the court of public opinion or the
media. Because details have to come out in excruciating and minute fashion. Detail by detail, bit of
evidence by bit of evidence. And it is only then, when the Trier of fact whether judge or jury, gets all the
details that then a decision can be rendered. Corey is laboring to legitimize a system that took weeks to
actually arrest George Zimmerman, yet this labor represses her own case history, for example the case of
where black matter no longer matters and where what matters, the
happenings of the human and the quest for civil justice, can only be produced
through the quotidian grinding and destruction of black flesh . This paper will seek
to shine a light, or better yet a shadow, on the white knights of the justice system. While one would think
they know the job of a Prosecutor given its ubiquity on television crime dramas and movies, the
mundaneness of their actual day-to-day activities are mystified by television's fascination with the drama
of the trial, whether fictional or "real." In fact, it is rare that you will find a prosecutor who takes even 10
percent of their cases to trial. Over 90 percent of cases are settled through a plea bargain where the
defendant will agree to plead guilty usually for the guarantee of less time, parole, or a lighter charge. As
one law professor put it, the plea bargain is not an addendum to the criminal justice system, it is the
criminal justice system (Scott and Stuntz, 1912). In spite of its centrality, there is little literature on the
inner-workings of the plea bargain outside of schematic analysis in criminology. Instead of focusing on the
theatrics of the trial, this paper will analyze the day-to-day grind of the plea bargain in order to explicate
the quotidian terror that lies at the heart of prosecutorial discretion. From day-to-day a Prosecutor can be
working on anywhere between 20 to 100 cases at a time (Heumann, 98). While a Prosecutor is given wide
discretion to charge a case the way they want, there are hierarchies that determine the norms and
procedures of each office. There are the district attorneys that the general population votes into office and
the deputy attorneys that answer directly to him or her. Underneath them are the line prosecutors who
work on the majority of the cases but whose decisions generally follow the established protocols of the
veteran prosecutors and deputies. New prosecutors often come straight from law school with lofty dreams
of becoming courtroom heroes only to learn that their job is much more akin to assembly-line justice. Legal
scholar Abraham Blumberg describes this as the, emergence of bureaucratic due process, consist[ing]
of secret bargaining sessions [and] employing subtle, bureaucratically ordained modes of coercion and
influence to dispose of large case loads (Blumberg, 69). While each office is different from the next,
there is a stunning amount of unity at the procedural level. Deputy district attorneys will reject thirty to
forty percent of cases the police send to them on face. The remaining 60 percent are considered suspects
that are, according to the evidence provided, conclusively guilty. For the Prosecutor, these cases would be
slam-dunk wins in front of a jury (Lewis, 51). This begs the question: What is the dividing line between
cases that are charged and cases that get dropped by Prosecutors? Some statistics on the racial
The first argument of the defense was that the majority of crack cocaine users in California are actually
whites, not black people. The second argument of the defense used testimonies from government lawyers
to prove that of all 841 cases the state brought against people possessing crack cocaine, all of them were
black. Using these two claims, the defense said there was adequate proof to show that prosecutors were
using unconstitutional means, racial markers, to select who would be charged and who wouldnt be
charged. According to past rulings by the Supreme Court, if selective prosecution can be proven then that
is adequate grounds to vacate the sentence, even if the defendants were caught red-handed. Against
this defense, the prosecution counter-argued that it does not selectively prosecute based on race, but
instead on fact and circumstance. The district court that initially heard the appeal ruled that the state
should turn over records of the 841 cases in question to prove who was right in the dispute. The state
refused to reveal its documents and instead appealed the decision all the way up to the Supreme Court.
that such a prosecution strategy is legitimate because it can be verified through statistics that black
the Supreme
Court ruled that it was in the states interest to terrorize black communities
because we are the most heinous drug users in the country. To be black is to
be marked as a danger that must be controlled, seized, and incarcerated .
Prosecutors act within and perpetuate this matrix of violence that precedes
discourse. When a Prosecutor sees a case with a black body, he knows the
same statistic the Supreme Court quoted and he knows, if not consciously
then unconsciously, that this case is already done, already guilty, already
born dead.
people are the major users and distributors of crack cocaine. To word it differently,
narrative actually privileges a monocultural perspective (Geher, 1993) that makes itself visible (i.e. Anglo-European culture) and all other
social studies field has exhibited a dearth of research into how race permeates how the national story is told in the curriculum and classroom
(Chandler, 2007). In effect, mainstream social studies research perceives race in terms of a series of cause and effect events rather than as a
persistent subtext of the whole narrative that has to a large degree defined US society and perpetuated a condition of being white as a form of
Social studies
tends to approach race in US history as a problem dealt with and
solved during the past, such as the Civil War (white man as the great
liberator) and again in the Civil Rights era (with the curriculum privileging the peaceful, or sanitized,
version of the African-American voice, such as civil rights leader Martin Luther King, instead of the more
property that provides special privileges (Harris, 1993; McIntosh, 1990; Solomon, Portelli, Daniel, & Campbell, 2005).
as a discipline
enabling students to develop a discourse of contemporary race and ethnic relations that addresses institutional racism, structural inequality,
interactions
between groups of people are hidden in plain sight, removed from the
narrative and from analysis (Wills, 2001). In an effort to address these issues, this article will explore the lack of
and power (Wills, 2001, p. 43). In constructing the social studies and the story of the US in this way, the important
research on the issue of race in social studies research and textbooks in relation to the US. We do not attempt to draw conclusions beyond the
US because of our focus on national narratives and how those narratives play out in a racialized context, hence, precluding any claims beyond
that particular context. We will interrogate the possible reasons why race, which should be an emphasized area of US social studies research
and curriculum in both schools and in teacher preparation, is subsumed within a colour-blind framework rather than from a critical race theory
(Harris, 1993) or critical multiculturalism (McCarthy, 1994) perspective that interrogates the racial component in Since its inception as a
Social
studies, in the broadest sense, is the preparation of young people so that they posses
the knowledge, skills, and values necessary for active participation in society
formal field of study, the expressed goal of the social studies has been that of citizenship education (Shaver, 1981).
(Ross, 2001, p. 21). This preparation involves the creation of narratives within social studies that carry certain moral goals of directing
The
success of the monocultural ideal was closely tied to the emerging role of the
United States as a hegemonic power. This is expressed ideologically in the common pronouncement that the
students to a model of what their relationship to the greater society should look like (Morrissett, 1981). As Geher identifies:
United States unified the West, completed the course of Western development, and set global standards of civilization in fierce rivalry with the
Soviet Union (1993, p. 509). In essence, the national narrative has always embodied some form of progress toward some great end or
The archetype of US exceptionality brings forth the following ideas social studies teachers
pedagogy: (1) God is on our side, (2) civilization has been created from the wilderness, (3) Europeans have created order where
perfection.
disorder existed before, and (4) hard work, merit, and virtuous character pay off (Loewen, 1995). For these unexcelled blessings, the pupil is
urged to follow in the footsteps of his forbears, to offer unquestioning obedience to the law of the land, and to carry on the work begun
errand into the wilderness and a city upon the hill (Bercovitch, 1975); for the next era it was Enlightenment Progress; then Manifest
The theme of US
exceptionalism, and its subsequent protection of all the material rewards that
its people feel they deserve, undergirds all of the mainstream stories as told
through the social studies. However, conflict arises over the responsibility of social studies educators beyond that point:
Destiny; to the more recent belief in the US as the moral arbiter and protector of the world.
whether such narratives need to be merely recited, as in a history teachers lecture pulled directly from a textbook or from pre-packaged
curricula resources; or to tell the story, analyze it historically and interpret to what degree it has and continues to match concrete reality.
Shaver (1981) defines the basic dilemma in this way: How can the school contribute to the continuity of the society by preserving and
passing on its traditions and values the telling of the national narrative. while also contributing to appropriate social change by helping youth
to question current social forms and solutions (p. 125)? Given Shavers (1981) acknowledgement of such foundational concerns, it is difficult
to explain why social studies research has largely ignored race as a major persistent theme within the national story (Marri, 2001; Marshall,
2001; Pang, Rivera, & Gillette, 1998; Tyson, 2001). In fact an excellent recent work that appears to be an exception to the problem of race in
relation to education in general in the US, Ross & Pangs (2006) edition of Race, Ethnicity and Education, actually confirms the problem. Those
involved in the social studies scholarship in these important volumes have removed themselves from the mainstream of NCSS -- given its
complete resistance to any such discussion of race -- and are now situated on the periphery so as to find any space to inquire into such
controversial issues. Mainstream social studies research has failed to confront directly the issue of race in any meaningful way. Telling is a
review of the social studies literature from 1973 to the present in the premier US social studies research journal, Theory and Research in Social
Education (TRSE), subsidized by NCSS, reveals a lack of scholarly inquiry into the different issues of race. Noticeably absent are the issues of
race as a subject matter in the social studies curriculum, as well as how race shapes the classroom as a cultural space in which whiteness is
privileged. In Ehmans (1998) extensive review of TRSE from 1973-1997, only 6% dealt with social problems and controversial issues, of
which race would be a part. An analysis of the years after 1997 to the present found the same persistent lack of research in general
confronting controversial issues in TRSE, and in specific lack of racial analysis (Chandler, 2007). Nelson & Fernekes (1996) found that NCSS
has a long history of not taking stands on significant social conflicts between those privileged within the dominant culture and those oppressed
by it: The National Council for the Social Studies record on civil rights can only be characterized as negligent at best and indifferent at worst.
NCSS largely ignored the civil rights movement and in the process demonstrated indifference toward a social crisis of immense significance,
one that challenged the very basis of democratic institutions and posed difficult questions for educators who daily had to confront the gap
between the stated ideals and social experience. (p. 98) Two recent volumes of social education research are instructive in how race is either
situated on the margins or is sanitized and hidden within the large framework of colour-blind multiculturalism and diversity (further examined
below). Critical Issues in Social Studies Teacher Education (Adler, 2004) and Critical Issues in Social Studies Research for the 21st Century
(Stanley, 2001) present race as a topic on the periphery of social studies thought and research. Of the 33 chapters that constitute these two
volumes, written by the foremost scholars in the field of social studies research, five address the issue of race mostly as a subset of either
urban and/or global education or as just one piece of multicultural education. The one chapter that examines race as an unavoidable thematic
socially
constructed notions of race and whiteness define what the dominant culture
believes is normality, which in turn perpetuates the privileging of
whiteness within education. Santoras analysis complements Nelson and Pangs (2001) findings of how within the
within the national narrative is Santoras (2001) work on cross-cultural dialogue. From this perspective, she addresses how
social studies curriculum the national narrative fails to match the material reality of social studies classrooms. They identified that while the
root ideas of liberty, justice, and equality (Nelson & Pang, 2001, p. 144) were spoken the actions of teacher and student betrayed the
sentiment by failing to interrogate the contradictions that existed between words and deeds. This is a sobering and disquieting scenario, one
that illustrates
matter the credo (Nelson & Pang, 2001, p. 144). While the mainstream social studies is quick to transmit the story of colonial
resistance, the virtues of republicanism, superiority of American culture and Manifest Destiny, race and its central role in the creation of the
and self-righteousness. This is even more problematic given the broad and powerful critique by Critical Race Theory (CRT), revealing how
discipline that could provide students with a language to develop a discourse of contemporary race and ethnic relations that addresses
institutional racism, structural inequality, and power (Wills, 2001, p. 43). Instead, the social studies mentions certain groups of people (i.e.
women, Native Americans, African Americans) without any reference to the superstructure of oppression that causes their situation and/or
This gives the impression that either oppression does not exist or
that nothing can be done about it because history is perceived as predetermined and progressive. In fact, case studies with white high school social studies teachers found that these
respective actions.
teachers tended to mention certain facts involving those of non-Anglo European backgrounds (e.g. Civil Rights, Slavery, battles with Native
American tribes). However, no context was ever provided concerning the tension of how race and racial attitudes generated a condition in
which those groups claiming to celebrate and represent the best of US identity (e.g. equality, individual freedom, liberty, democracy) could in
the same moment engage in acts of oppressing others who, while non- Anglo, wanted to embody the same national identity (Chandler, 2007).
oneself morally is the condition for the establishment of a human order for
which racism is the very negation. This is almost a redundancy. One cannot
found a moral order, let alone a legislative order, on racism because racism
signifies the exclusion of the other and his or her subjection to violence and
domination. From an ethical point of view, if one can deploy a little religious
language, racism is the truly capital sin.fn22 It is not an accident that
almost all of humanitys spiritual traditions counsel respect for the weak, for
orphans, widows, or strangers. It is not just a question of theoretical counsel
respect for the weak, for orphans, widows or strangers. It is not just a
question of theoretical morality and disinterested commandments. Such
unanimity in the safeguarding of the other suggests the real utility of such
sentiments. All things considered, we have an interest in banishing injustice,
because injustice engenders violence and death. Of course, this is debatable.
There are those who think that if one is strong enough, the assault on and
oppression of others is permissible. But no one is ever sure of remaining the
strongest. One day, perhaps, the roles will be reversed. All unjust society
contains within itself the seeds of its own death. It is probably smarter to
treat others with respect so that they treat you with respect. Recall, says
the bible, that you were once a stranger in Egypt, which means both that
you ought to respect the stranger because you were a stranger yourself and
that you risk becoming once again someday. It is an ethical and a practical
appeal indeed, it is a contract, however implicit it might be. In short, the
refusal of racism is the condition for all theoretical and practical morality.
Because, in the end, the ethical choice commands the political choice. A just
society must be a society accepted by all. If this contractual principle is not
accepted, then only conflict, violence, and destruction will be our lot. If it is
accepted, we can hope someday to live in peace. True, it is a wager, but the
stakes are irresistible.
December at the Mall of America in Bloomington, Minnesota, email obtained by The Intercept shows.
last
Joint Terrorism Task Force, informs a fellow task force member from the Bloomington police that CHS just confirmed the MOA protest I was taking to you about today, for the 20th of DEC @ 1400 hours. CHS is a law
The FBIs Joint Terrorism Task Forces are based in 104 U.S. cities and are made up of
Activists had planned the protest at the mall to call attention to police brutality against African Americans.
at the Mall of America protest. Upon receiving the email, Bloomington police officer and task-force member Benjamin Mansur forwarded it to Bloomingtons then-Deputy Police Chief
Rick Hart, adding Looks like its going to be the 20th It was then forwarded to all Bloomington police command staff.
protest. The FBI spokesman emphasized that As for any FBI interest in the Black Lives Matter campaign, the FBI had (has) none, and makes certain its operational mandates do not interfere with activities
protected by the First Amendment to the U.S. Constitution. The spokesman acknowledged that vandalism does not fall under the Memorandum of Understanding establishing the parameters under which local
Asked why
, the
Joint Terrorism Task Force supervisor, was CCd on Langfellows email, the
spokesman responded I dont know
The
fact that theyre spending resources in this manner reflects poor leadership
and is something that they should really take a hard look at.
FBI
connected
organizations such as Greenpeace and the Catholic Worker movement
as domestic terrorism cases
Joint Terrorism Task Force,
was in charge of a 2008 raid on the home of St. Paul activists ahead of that
years Republican Party Convention that led to a lawsuit that the city settled
for $50,000.
FBI engaged in well-known, ugly mistreatment of African
American activists in particular
FBI and law enforcement generally
of law enforcement agents seeing challenges to the status quo as threats to
security
FBI field office in 1971 showed the Bureau was
keeping literally every black student at Swarthmore College in Pennsylvania
police officers are detailed to Joint Terrorism Task Forces and the task force mission of prevention, preemption, deference and investigation of terrorist acts.
VanNest
but speculated it was as a matter of courtesy. Clearly its inappropriate to be using the Joint Terrorist Task
Force to monitor activists [and] the use of a CHS seems extremely inappropriate, said Michael German, a fellow at New York Universitys Brennan Center for Justice and former special agent with the FBI.
for its actions regarding domestic advocacy groups. A 2010 report by the Department of Justice Inspector General found the
opened investigations
to
that classified
. The report also found the FBIs National Press Office made false and misleading statements when
questioned by the media about documents obtained by public records requests. Langfellow himself, while working as a member of a
under surveillance.
After the December 20 Mall of America protest, the city of Bloomington charged 11 protestors with six separate criminal misdemeanors, including unlawful
assembly, and is seeking thousands of dollars in restitution. Jordan Kushner, one of the activists defense attorneys, says the city has alleged $25,000 in police costs and that he also received a letter from the Mall of
America seeking $40,000 for mall security costs, raising overall restitution to $65,000. As reported by the Star Tribune, emails released earlier this week reveal apparent coordination between Sandra Johnson, the
Bloomington city attorney, and Kathleen Allen, the Mall of Americas corporate counsel. Its the prosecutions job to be the enforcer and MOA needs to continue to put on a positive, safe face, Johnson wrote to
Allen two days after the protest, encouraging the mall company to wait for a criminal charge from the city before pursuing its own lawsuit. Agree we would defer any civil action depending on how the criminal
charges play out, Allen wrote back. Thats pretty unprecedented to use a criminal proceeding for a corporation to collect their costs, costs for policing and protest, said Kushner. Its not like people stole from
them or damaged belongings. Nekima Levy-Pounds, a professor of law at the University of St. Thomas in St. Paul and one of the Black Lives Matter defendants, said she found parallels between the conduct of law
enforcement in Minnesota and the tactics used against civil rights protesters a generation ago. I think its relevant, she said, adding that in both instances, officers attempted to curb nonviolent peaceful protests
and to violate peoples rights to free speech.
Routledge named Giroux as one of the top fifty educational thinkers of the
modern period, The Fire This Time: Black Youth and the Spectacle of
Postracial Violence, May 26, 2015]
Pervasive police abuse and violence have become the foci of a number of
emerging social movements, from Black Lives Matter to a growing number of
rap groups and young Black militants. (20) And rightly so. As more and more
unarmed Black adults and youth are shot by White police officers, the cries
for an indictment of perpetrators and broad-based reform have been
superseded by a more general cry for justice. (21) Lawlessness functions both
to abuse the innocent and protect the guilty. And too many local police
departments have bought into this dreadful logic, indulging with impunity the
notion that war and policing have merged. Andrew Kolin argues that as the
police become more aggressive, they begin to "look increasingly like a civilian
branch of the military." (22) One indication of the emerging police state is not
only evident in the transition of the police into a civilian branch of the
military, but also in the transformation of the police into paramilitarized SWAT
teams, which are used disproportionately against people of color. The report
"War Comes Home" states that "50% of the people impacted by SWAT
deployments from 2011 to 2012 are black or Latino [whereas] Whites account
for 20%." (23) Inexplicably, although SWAT teams are used overwhelmingly to
investigate incidents in which people are "suspected of committing
nonviolent consensual crimes," too many encounters prove deadly.
is the actual or potential fostering of social sorting as a specific form of discrimination. Oscar
H. Gandy (1993) has in this context coined the notion of the panoptic sort. It is a system of
power and disciplinary surveillance that identifies, classifies, and assesses (Gandy, 1993, p.
15). David Lyon (2003b) considers Gandys notion of the panoptic sort in relation to computers
and the internet as social sorting. In newer works, Gandy (2009) has pointed out the
connection of social sorting and cumulative disadvantages: Cumulative disadvantage refers
to the ways in which historical disadvantages cumulate over time, and across categories of
experience (Gandy, 2009, p. 12). Thus, membership in a targeted group as well as other kinds
of disadvantage become a dominant factor in determining future negative social outcomes:
People
who have bad luck in one area, are likely to suffer from bad luck in
other areas as well (Gandy, 2009, p. 116). 128 This means that if you have dark
skin, are poor, live in a deprived neighborhood , have become unemployed or
ill, etc., you are more likely to be discriminated against and flagged as a risk
group by data mining and other social sorting technologies. The arbitrary
disadvantages an individual has suffered then cumulate and result in further disadvantages
that are enforced by predictive algorithms which calculate based on certain previous behavior
that an individual is part of a risk group and should therefore be discriminated against (by not
being offered a service, being offered a lower quality service at a higher price e.g., in the
Once
they have been identified as criminals, or even as potential criminals, poor
people, and black people in particular, are systematically barred from the
opportunities they might otherwise use to improve their status in life (Gandy, 2009, p.
case of a loan or mortgage , by being considered as a criminal or terrorist, etc.).
141). Social media profiles are a historical accumulation and storage of online behavior and
interests. Social media tend to never forget what users are doing online, but tend to keep
profiles of personal data and thereby provide a foundation for the algorithmic or human
analysis of who belongs to a so-called risk group and should be treated in a special way.
Commercial social media surveillance uses specific data from social media profiles for
targeting advertising and providing special offers. As a result, privileged groups tend to be
treated differently than the poor and outcast. Another effect of commercial social media
surveillance is that consumer culture and the fostering of a world that is based on the logic of
commodities has become almost ubiquitous on the internet. If state intelligence agencies
obtain access to social media profile data and combine such data with state-administered
records (such as databases covering crime, welfare and unemployment benefits, health
records, etc.), then discrimination based on cumulative disadvantages can be advanced. The
quality of social media to cover and store data about various social roles and social activities
that converge in social media profiles allows commercial and state surveillance to use social
media data for advancing discrimination that is based on algorithmic profiling and predictions
project included so-called Building Communities of Trust (BCOT) meetings which focused "on developing
trust among law enforcement, fusion centers, and the communities they serve to address the challenges of
crime and terrorism prevention." BCOT "community" events involved representatives from local fusion
centers, DHS, and FBI traveling to different areas and speaking to selected community representatives and
civil rights advocates about NSI. These were invite only events with the clear purpose of attempting to
engender community participation and garner support from potential opponents such as the ACLU. So
the government must satisfy reasonable suspicion or probable cause standards when searching a person
or place or detaining someone. While SARs themselves are not a search or seizure, they are used by law
enforcement to initiate investigations, or even more intrusive actions such as detentions, on the basis of
evidence that does not necessarily rise to the level of probable cause or reasonable suspicion. In other
while the standard for SAR sounds like it was written to comport
with the constitutional standards for investigation already in place, it does not. In
fact, the specific set of behaviors listed in the National SAR standards include
innocuous activities such as: taking pictures or video of facilities, buildings, or
infrastructure in a manner that would arouse suspicion in a reasonable
person, and demonstrating unusual interest in facilities, buildings, or
infrastructure beyond mere casual or professional (e.g. engineers) interest such that a reasonable
words,
person would consider the activity suspicious. Examples include observation through binoculars, taking
well as law enforcement, and as one woman pointed out at a BCOT event people who might already be a
little racist who are 'observing' a white man photographing a bridge are going to view it a little differently
than people observing me, a woman with a hijab, photographing a bridge. The bottom line is that bias is
Unsurprisingly, like most tools of law enforcement, public records act requests have shown that people of
color often end up being the target of SARs: One review of SARs collected through Public Records Act
requests in Los Angeles showed that 78% of SARs were filed on non-whites.
An audit by the Los Angeles Police Department's Inspector General puts that number at 74%, still a
Sheriffs Deputy contacted 3 adult Asian males who were taking photos of Folsom Dam. They were evasive
when the deputy asked them for identification and said their passports were in their vehicle." Both of these
SARs were entered into FBI's eGuardian database. Not only that,
Fusion centers have been used to record and share information about First
Amendment protected activities in a way that aids repressive police
activity and chills freedom of association. A series of public records act requests in Massachusetts
showed: "Officers monitor demonstrations, track the beliefs and internal dynamics of activist groups,
and document this information with misleading criminal labels in searchable
and possibly widely-shared electronic reports." The documents included intelligence reports addressing
issues such internal group discussions and protest planning, and showed evidence of police contact. For
example, one report indicated that "Activists arrested for trespassing at a consulate were interviewed by
three surveillance officers 'in the hopes that these activists may reach out to the officers in the future.'
They were asked about their organizing efforts and for the names of other organizers."
particularly regarding bulletins and intelligence reports circulated by fusion centers. These are a few
examples: The February 2009 Prevention Awareness Bulletin, circulated by a Texas fusion center,
described Muslim lobbying groups as providing an environment for terrorist organizations to flourish and
warned that the threats to Texas are significant.... ...A Missouri-based fusion center issued a February
2009 report describing support for the presidential campaigns of Ron Paul or third party candidates,
possession of the iconic Dont Tread on Me flag and anti-abortion activism as signs of membership in
domestic terrorist groups. The Tennessee Fusion Center listed a letter from the American Civil Liberties
Union (ACLU) to public schools on its online map of Terrorism Events and Other Suspicious Activity. The
letter had advised schools that holiday celebrations focused exclusively on Christmas were an
unconstitutional government endorsement of religion. The Virginia Fusion Centers 2009 Terrorism Risk
Assessment Report described student groups at Virginias historically black colleges as potential breeding
grounds for terrorism and characterized the diversity surrounding a military base as a possible threat."
in fusion centers do not have uniform guidelines, making it extraordinarily difficult, if not impossible, to
ensure that the constitutionally offensive practices of one department do not infect the investigations of
the others, tainting the whole. This near total lake of oversight leads to threat assessments, which direct
local law enforcement priorities, like this one, uncovered by the Texas Observer: A portion of the threat
assessmentstamped Law Enforcement Sensitive and part of a PowerPoint presentationwas
inadvertently sent to the Observer as part of a broader open-records request. Although the North Central
Texas Fusion System analysis has found no specific intelligence to indicate any threats to the Bell
Helicopter Armed Forces Bowl game, the assessment states, law enforcement officers should be on the
lookout for suspicious individuals, especially those of Middle Eastern appearance. Beyond racial profiling,
fusion centers are also used to target and profile political activists. A fusion center in Washington State was
the base of operations for a long-term domestic spying operation focused on peace groups. The operation
saw unprecedented cooperation between the U.S. Army, the FBI and law enforcement from every level
within the state. This targeting yielded no arrests, uncovered no plot and conclusively demonstrated that
law enforcements combined priorities focused on suppressing constitutionally protected First Amendment
that the
. The
Washington Post reported in 2006: A database managed by a secretive Pentagon intelligence agency called Counterintelligence Field Activity, or
s,
University of New York and campuses of the University of California at Berkeley and at Santa Cruz.
Pentagon
in the United States. CIFA, an agency created just under four years ago that now includes nine directorates and more than 1,000 employees, is charged with working to
. The great sage of late 20th Century conservative philosophy, Ann Coulter, said it best: We
need to execute people like John Walker [Lindh] in order to physically intimidate liberals, by making them realize that they can be killed, too. Otherwise, they will turn out to be outright traitors. She later clarified
that statement by saying, When I said we should execute John Walker Lindh, I mis-spoke. What I meant to say was, We should burn John Walker Lindh alive and televise it on prime-time network TV. My apologies
its hard
to know exactly what any of the agencies charged with keeping the terrorist
threat at bay are really doing because they are secret
NSA said outright that
the mission was to collect it all.
FBI Joint Terrorism Task Force tracked the time and location
of a Black Lives Matter protest
for any misunderstanding that might have occurred. Yes, she said we should burn him alive on television. The Pentagon ended the appropriately dystopian sounding program Talon, although
sophisticated of high tech government surveillance activities. It was shocking because of the sweeping nature of the programs and the fact that the
But perhaps the more prosaic forms of domestic surveillance activity should concern us as well. For instance, Lee Fang
last December at the Mall of America in Bloomington, Minnesota, email obtained by The Intercept shows. The email from David S.
Langfellow, a St. Paul police officer and member of an FBI Joint Terrorism Task Force, informs a fellow task force member from the Bloomington police that CHS just confirmed the MOA protest I was taking to you
about today, for the 20th of DEC @ 1400 hours. CHS is a law enforcement acronym for confidential human source. Jeffrey VanNest, an FBI special agent and Joint Terrorism Task Force supervisor at the FBIs
Minneapolis office, was CCd on the email. The FBIs Joint Terrorism Task Forces are based in 104 U.S. cities and are made up of approximately 4,000 federal, state and local law enforcement officials. The FBI
characterizes them as our nations front line on terrorism. It should be noted that this so-called threat happened months before the al-Shabab video vaguely implying a threat to the Mall was released in late
February. In this earlier incident, a confidential informant told the police that someone was preparing to vandalize the mall as part of the Black Lives Matter protest. An FBI spokesman told The Intercept they have
absolutely no interest in that campaign and that they make certain not to interfere with people exercising their rights under the First Amendment. They also noted that vandalism is not a crime that the Joint
is no prohibition against using information of other potential crimes gleaned during terrorism related investigations to pursue non-terrorism investigations. So perhaps its also useful to recall this expos from a
while back in which it was revealed that the DEA routinely lies about where it got information: A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps,
from prosecutors and judges One of the ways they do that is by re-creating
the investigative trail to hide how they got the information
.
from being revealed in open court but the government has evidently decided that its secret surveillance activities now qualify for that designation as well. There is no evidence that anything like this happened in
Whether their information comes from secret wiretaps or secret informants its
wrong. All that is part of an old story in American life and one which requires that civil libertarians be constantly vigilant in keeping an eye on them and pushing back wherever possible. But Fang reports that we
have gone to a new level of Big Brotherism with the Mall of America: As reported by the Star Tribune, emails released earlier this week reveal apparent coordination between Sandra Johnson, the Bloomington city
attorney, and Kathleen Allen, the Mall of Americas corporate counsel. Its the prosecutions job to be the enforcer and MOA needs to continue to put on a positive, safe face, Johnson wrote to Allen two days after
the protest, encouraging the mall company to wait for a criminal charge from the city before pursuing its own lawsuit. Agree we would defer any civil action depending on how the criminal charges play out,
Allen wrote back. This means that the city was working hand in hand with a private corporation, using the criminal justice system as the enforcer to help the corporation collect money in a civil action. Evidently
they felt it would look better in civil court if the protesters who were being asked to pay the costs of policing the mall during the protest had been charged. 11 of them were hit with misdemeanors, none of them
having to do with property damage or theft. But thats not the most chilling part. In a follow-up article, Fang revealed something even more insidious: Documents obtained by The Intercept indicate that security staff
at the Mall of America in Bloomington, Minnesota used a fake Facebook account to monitor local Black Lives Matter organizers, befriend them, and obtain their personal information and photographs without their
knowledge. Evidence of the fake Facebook account was found in a cache of files provided by the Mall of America to Bloomington officials after a large Black Lives Matter event at the mall on December 20 protesting
police brutality. The files included briefs on individual organizers, with screenshots that suggest that much of the information was captured using a Facebook account for a person named Nikki Larson. Metadata
from some of the documents lists the software that created them as belonging to Sam Root at the Mall of America. A Facebook account for a Sam Root lists his profession as Intelligence Analyst at Mall of
America. The Mall of America corporation had been privately collecting dossiers on protesters of many kinds for months. In fact, one of the Facebook accounts used to stalk them online was created all the way
for its aggressive behavior toward patrons, especially those who look as though they just might be terrorists (whatever those patrons look like.)
We know that much of our national security surveillance work has been outsourced to private companies. But thats Eisenhowers military industrial complex
doing what its been doing for 50 years. Perhaps the domestic police agencies have come up with a more modern public/private partnership where the private corporation does the dirty work of stalking peaceful
protesters and then confidentially informs the police agencies who, as part of a Joint Task Force will keep the federal agencies in the loop. After all, it would be an infringement of the corporations individual
freedom to suggest they dont have a right to spy on anyone they choose, especially citizens protesting the police? Theyre just trying to keep a positive, safe face on the USAs single greatest achievement, the
shopping mall. What could be more patriotic than that?
Parton 15
Its not
difficult to see how easy it is that members of the joint terrorist task
force, whether local or federal or both, might be doing what these
agencies have always done monitor the peaceful activities of
American citizens protesting their government under the guise of
keeping us safe from foreign threats. Whether their information comes
from secret wiretaps or secret informants its wrong. All that is part of an old
story in American life and one which requires that civil libertarians be constantly vigilant in keeping an eye
on them and pushing back wherever possible. But Fang reports that we have gone to a new level of Big
Brotherism with the Mall of America: As reported by the Star Tribune, emails released earlier this week
reveal apparent coordination between Sandra Johnson, the Bloomington city attorney, and Kathleen Allen,
the Mall of Americas corporate counsel. Its the prosecutions job to be the enforcer and MOA needs to
continue to put on a positive, safe face, Johnson wrote to Allen two days after the protest, encouraging
the mall company to wait for a criminal charge from the city before pursuing its own lawsuit. Agree we
would defer any civil action depending on how the criminal charges play out, Allen wrote back. This
files provided by the Mall of America to Bloomington officials after a large Black Lives Matter event at the
mall on December 20 protesting police brutality. The files included briefs on individual organizers, with
screenshots that suggest that much of the information was captured using a Facebook account for a
person named Nikki Larson. Metadata
individual freedom to suggest they dont have a right to spy on anyone they choose, especially citizens
protesting the police? Theyre just trying to keep a positive, safe face on the USAs single greatest
achievement, the shopping mall. What could be more patriotic than that?
Moore 15
The home of activist Patrisse Cullors was raided twice last year by
law enforcement in Los Angeles. During one raid, officers told Cullors
they were looking for a suspect who had allegedly fled in the
direction of her house. But neither time did Cullors believe the officers had
a strong rationale for invading her home. Instead, Cullors told Mic, she
believed the raids were devised by police in response to the public
campaigning of Dignity and Power Now, a grassroots organization
Cullors founded that advocates on behalf of incarcerated people in
Los Angeles. She also believes similar surveillance methods are used to
monitor many black activists today. "Surveillance is a huge part of
the state's role. Surveillance has been used for a very long time, but some of the means, like
social media account monitoring, are new," Cullors, who is also a cofounder of Black Lives Matter, told Mic.
other collected data are often stored in massive databases like e-Verify and Prism. As anybody whos ever
dealt with gang databases knows, its almost impossible to get off a federal or state database, even when
the data collected is incorrect or no longer true. Predictive
Lazare 15
Benjamin Mansur forwarded it to Bloomingtons then-deputy police chief Rick Hart, adding "Looks like its
going to be the 20th..." It was then forwarded to all Bloomington police command staff. There is no
mention of potential vandalism anywhere in the email chain, and no vandalism occurred at the Mall of
America protest. The
Twenty-five demonstrators
were arrested. Just days after the demonstration, Bloomington City
Attorney Sandra Johnson vowed to aggressively build a criminal case
against alleged organizers, in a bid to win restitution for money
allegedly lost by the mall during the partial shutdown, as well as by
the police and city. Eleven protesters have been charged with six misdemeanors, and the city is
protest by shutting down several areas of the mall for hours.
seeking thousands of dollars. Emails obtained by Black Lives Matter-Minneapolis through a public records
request, and reported by the Star Tribune earlier this week, reveal that Bloomington attorneys colluded
with mall officialswho pressed for stiff charges against the demonstrators. The revelations that
protesters were targeted on numerous fronts have not crushed organizing, but rather, have fueled ongoing
resistance. According to Black Lives Matter-Minneapolis, over 4,000 people have joined the chapter's call to
boycott the MOA, more than 40,000 have called for charges against the protesters to be dropped, and
community membersfrom clergy to professors to local politicianshave vigorously defended the
demonstrators.
used their vast anti-terrorism and anti-crime authority and funds to conduct a
nationwide and hour-by-hour surveillance effort that targeted even the
smallest activity of peaceful protestors in the Occupy Movement in the Fall and Winter
of 2011. It is being released in conjunction with a major story in the New York Times that is based on
Centers
sprawling,
the 4,000 pages of government documents uncovered by the Partnership for Civil Justice Fund (PCJF)
a two-year long investigation. The newly published documents reveal the actual
workings of the Fusion Centers created ostensibly to coordinate antiterrorism efforts following the September 11, 2001, attacks in collecting and
providing surveillance information on peaceful protestors. The new documents roll back
the curtain on the Fusion Centers and show the communications, interactions and emails
of a massive national web of federal agents, officials, police, and private
security contractors to accumulate and share information, reporting on all
manner of peaceful and lawful political activity that took place during the Occupy
Movement from protests and rallies to meetings and educational lectures . This enormous spying and
monitoring apparatus included the Pentagon, FBI, DHS, police departments
and chiefs, private contractors and commercial business interests. There is
now, with the release of these documents, incontrovertible evidence of systematic and not
incidental conduct and practices of the Fusion Centers and their personnel to direct their
sights against a peaceful movement that advocated social and economic
justice in the United States. It bears noting also that while these 4,000 pages offer
during
the most significant and largest window into the U.S. intelligence and law enforcements coordinated
"The U.S. Fusion Centers are using their vast counter-terrorism resources to
target the domestic social justice movement as a criminal or terrorist
enterprise," PCJF Executive Director Mara Verheyden-Hilliard stated. "This is an abuse of
power and corruption of democracy ." "Although the Fusion Centers existence is justified by
documents show
that the Fusion Centers in the Fall of 2011 and Winter of 2012 were devoted
to unconstrained targeting of a grassroots movement for social change that
was acknowledged to be peaceful in character ," the report states. Police chiefs of major
the DHS as a necessary component in stopping terrorism and violent crime, the
metropolitan areas used the Southern Nevada Counter Terrorism Center to produce regular reports on the
occupy movement. Furthermore, "The
Fusion Center. Virtually every state now has one in operation or formation
after more than $1.4 billion dollars of Homeland Security money was spent to
create 77 of them nationwide to assist in the overstated war on terror. Their purpose is
to enlist local police and first responders (known as Terrorism Liaison Officers or TLOs) to
spy on fellow citizens and report back to interconnected government
agencies such as the FBI, CIA, NSA and multi-state police forces on
"suspicious activity" or movements, which we old timers used to consider normal everyday
activity. The local spies then report back to the "fusion centers" where the information goes
out to all the government computers now active nationwide in tracking our
movements, emails, phone calls, letters, Facebook posts, etc. to see if any
person is worth tracking down. Robert O'Harrow, an investigative journalist for The Washington
Post, concluded they are little more than "pools of ineptitude , waste and civil
liberties intrusions." In 2012 the Senate Permanent Subcommittee on Investigations in a
bipartisan report concluded that these Homeland Security Department fusion centers achieve very little to
fight terrorism and suffer from a lack of oversight and wasteful spending of "hundreds of millions of
dollars," such as flat-screen TVs, $6,000 laptops and even SUVs used for commuting. DELAWAREONLINE
more than someone accessing his work computer remotely. Commentator John W. Whitehead has
seen purchasing liquid chlorine bleach and ammonia on consecutive days. Up the fusion center chain of
command this suspicious activity went, but the subsequent investigation revealed that the man only was
to illegal unreasonable searches, lacks transparency, and often just flouts the
Bill of Rights altogether. Last, it has been reported that officials at fusion centers lack
basic training in intelligence gathering, let alone protecting citizen civil rights
and liberties.
Like so many post-9/11 surveillance laws passed under the vague guise of
national security, these fusion centers violate the civil liberties of ordinary
Americans that should be guaranteed by the Bill of Rights and other laws. An entire section of the
Senate report is dedicated to Privacy Act violations and the collection of information completely unrelated
Now we
sometimes talk in code, more cryptic, share less information. We're all a bit more
reserved in terms of our speech . An activist explains I don't like even talking about
politics with them because I don't want to get either of us confused in each others business. If
someone is being watched for something i'm not being watched for, I don't
want to talk about politics with those people. Another activist the impact of
surveillance on the exercise of assembly rights. 9.17.07 . 17 says People are scared of
about the extent of surveillance they were under we used to be a lot closer.
Now ...you cant help them out , you cant tell them stories of things youve done
before. Because if they were a snitch youd be in a really bad situation . A
second aspect of reduced discourse is secretive planning. As mentioned above,
organizations are communicating much less and across fewer media. There isnt that
constant discussion, which can be really beneficial. Then you get everybodys
opinion if you can talk to everyone. This interviewee went on to explain how discourse is
intentionally reduced as a protective measure : Here, we can only talk about whats
going on here. Next week we cant talk about this any more. And we cant talk about
something else until its sure whos going to be part of it.... Another interviewee summed it
up: secretive planning is a disaster in community building, we couldnt think
creatively. If actions cannot be discussed later on, then the strategy of the movement no
longer moves forward. The third aspect of reduced discourse is the lack of debriefing.
Secretive planning is just one of many dimensions of what activists call security culture.
interviewees
were very conscious of the effects of the cultural shift . People perceived us as not
inclusive because we were so scared. An activist described their group as showing paranoia,
freakiness, and unwelcomingness that results from the fear... Another admitted Theres not
as many people involved, theres not as many voices in the decision making, theres not as
many people from different walks of life. An activist explained, with alarm, that security was
the first thing we talked about, even before our name or what we're going to do. Another
what actions need to be clandestine and what doesn't. We noticed in implementing security
in this project that it took a lot of energy simply to distinguish when we needed to be secure
and when we didnt. Security culture also involves speaking in code, which, interviewees
joked, made communication nearly impossible in some circumstances, particularly when
organizers try to communicate with more peripheral people. Interviewees also described the
effect it has on themselves as organizers: I had to learn not to welcome people and not give
out information... Im interested in community building, and then youre taught to be
suspicious and not welcome people its antithetical to your theory of change. Another explains
when I see people I dont know I get excited. when I saw the undercovers I was amazed that
we had attracted folks that dont fit in, and I was sad when I found out they were the impact of
surveillance on the exercise of assembly rights. 9.17.07 . 18 undercovers. Another
interviewee described how people who fit too well are suspicious as well as people who dont
fit in. S/he described someone who has been softly excluded from the group: It makes me
suspicious of people who are potential friends and allies, in ways that don't make me
comfortable. Prior research has documented that inducing paranoia is in fact one of the goals
of surveillance [Churchill and Vander Wall 2002; Marx 197]. Its just constantWhen someone
new shows up, the whole meeting changes.
rights.
eras. Current surveillance is both qualitatively and quantitatively comparable, with the enhancements of technology and
Congressional leniency apparent. In only one qualitative dimension does our data diverge from previous findings, which is
that we did not find the customary dualism in which hardcore activists become more militant while others become more
moderate. [Lichbach 1987, White 1989, Tarrow 1998, Zwerman & Steinhoff 2005]. Instead
we found signs of
pervasive pacification. In lieu of going underground to continue their actions [Davenport 2006;
Johnston 2005], activists are evading the surveillance net by dropping out
of social connections entirely while organizations are abandoning
grey area activities like civil disobedience and moving toward doing educational and permitted
activities. Nevertheless, many activists have in fact redoubled their efforts to promote social change through nonviolent
grey area methods, a sentiment reflected by Father Roy Bourgeois of the School of the Americas Watch: The spying is
an abuse of power and a clear attempt to stifle political opposition, to instill fear. But we arent going away (Cooper &
Hodge). In Arizona, a group of nonviolent activists who had been under surveillance by terrorism agencies went to the FBI
headquarters and turned themselves in as a symbolic act of defiance and as a demonstration of their unwillingness to
abandon their efforts (World Prout Assembly). Thus, while there may be a sense of fear among many activists, there is
also is a demonstrable spirit of rededication to the myriad causes that social movements undertake. We are interested in
the persistent attempt to rationalize surveillance and repression. Scholars of social movements should take note of the
implications for consciousness of the state and forms of repression. We observed age and class distinctions here. While
some organizations edit and re-edit their press releases, younger activists know you dont have to do anything at all to be
targeted. The lack of understanding from the elder progressive community has led to a rationalization of repression,
taking the form of blaming young people for their own repression (particularly for provoking police actions at protests);
limiting support for Green Scare defendants; and providing little collective concern for defending people from illegal
investigations, and absurd indictments, bonds, and sentences. Rationalization collaborates in the creeping criminalization
of dissent and political activity. However, conservative decisions on the part of activists and organizations are highly
understandable in light of the costs of surveillance to membership, fundraising, family life, and organizational resources.
explained that strategic and ideological dialogue is greatly reduced. Not wanting to be implicated or to implicate others,
political actions are now planned and undertaken in a bubble of time never to be referred to again, with colleagues who
will scatter immediately, never referring to one another or what they learned from the action. In addition, people are
reluctant to discuss their political ideas, reducing the quantity and quality of political discourse and ideological
development. Surveillance of educational events also makes it more difficult to spread analysis and theory.
demonstrates the positive social effects that certain radical political groups have caused despite
move forward it needs free ideology and radical movements to challenge the system and force social
change.
Protests Good
#BlackLivesMatter Key
The Black Lives Matter Movement is key to countering
racialized violence
Nasir14 (Nailah Suad, Associate Professor of African American Studies, Killing Us
Slowly: Slow Death by Educational Neglect in Insurgency: The Black Matter(s) Issue Dept. of
African American Studies | University of California, Berkeley
http://www.thediasporablackmattersissue.com/ December 23, 2014
This is an unprecedented moment in our nations history. 2014
marks an apex of unpunished, statesanctioned violence against Black people, and an historical moment where Black
communities all over the country, in the face of the murders of Michael Brown, Eric
Garner, Tamir Rice, and countless others, have stood up together in protests and
die-ins and boycotts to express our collective anguish. These deaths at the hands of
police violence have touched a nerve, in part because every Black person I know, rich or poor, young or old, men
and women, in all parts of the country have a personal story of police abuse and violence (whether it be symbolic
violence or physical violence). Being harassed and unfairly treated by police is an experience
that unites Black people domestically and globally, and the heart-breaking deaths
we have seen recently make dramatically salient the way that Black lives are
undervalued. The hashtag, #BlackLivesMatter, is a rallying call to notice and resist
the multiple ways our society has undervalued Black lives.While the recent deaths
certainly underscore the unacceptable levels of implicit and explicit racism against
Black people globally, they are but one aspect of how our society communicates and
reinforces the message that Black lives do not matter. As a scholar of education, I find also appalling
the way our educational system dampens the spirits and potential of Black kids in daily mundane interactions in far too many schools
and classrooms.I was talking recently about this with a teacher at one of my childrens schools. My children attend Berkeley Public
Schools, which have a long history of being progressive with respect to school desegregation, and which are quite (purposefully)
racially and socio-economically diverse. However, like school districts across the country, opportunities to learn are not evenly
distributed across racial groups in the schools. At the school one of my children attends, the achievement levels (as measured by
standardized test scores) of Black and Latino students are lower than that of white and Asian students, as is the case in every school in
Berkeley and most in the Bay Area and the nation. This teacher made the point that if the achievement patterns were reversed, with
white students underachieving the school and the district would not stand for it. We reflected together on how schools have a
collective level of acceptance for the underachievement of Black students, but if white students were to underachieve at the same
levels, the system itself would certainly be declared broken. In other words, not doing well in school is only normalized for students of
colorwhen it happens to white students the very system itself is viewed as not doing what it is designed to do. This is a form of
acceptable death, the death of intellectual potential, which our society does not question and continues to perpetuate. It is active
educational neglect.One of the key processes that support systems of schooling that do not allow Black students to reach their full
potential are the overtly racist systems of discipline and punishment in schools. This is where the core concerns of the
BlackLivesMatter movement and my focus on schools align. Many have written about the multiple ways that Black students, boys and
girls, are more harshly disciplined, and are more likely to be kicked out of class, suspended, and expelled, most often for infractions
like disrespect or other ambiguous offenses. The
that the call for acknowledging the humanity of Black people is far too important to
rest with one charismatic leader. And it is a movement that rests on more than a set
of action items. It is a massive effort to stir the consciousness of our nation, to wake
up to the brutality that continues in mundane and dramatic ways every single day.
they risk pushing the U.S. government into full-blown, fascist police state in reaction to them. In all
Movements Explode? reviews the tactics of disrupting business as usual and need for personal sacrifice.
Will enough folks sacrifice some time they normally spend watching television, exercising, reading, etc? Its
Revolution must
become part of many more peoples lives until the American corporate-state
is returned to We the People.
worth taking the time to read as a companion piece to this call for civil participation.
the radical imagination can be liberated from the machinery of social and
political death produced by casino capitalism. What was once considered
impossible becomes possible through the development of worldwide youth
protests that speak to a future that is being imagined, but waiting to be
brought to fruition.
#BringBackOurGirls started in
by desperate parents and activists who didnt believe their
president when he said he was taking action to recover the kidnapped girls. They wanted to
put pressure on the government to do more . They tried everything they could think
ultimately serious answer seems to be: a hashtag campaign.
Nigeria on April 23rd
of to raise awareness of the kidnappings within and beyond Nigeria. One of those things was
#BringBackOurGirls. It worked, likely beyond anything theyd imagined or hoped for.
Encapsulating both a story and a cause in just four words, the hashtag at first began to take
hold on Twitter only within Nigeria. Activists wrote it on signs to bring to street protests. Then
it began to spread within Africa. April 30th, two weeks after the kidnapping, was a turning
point. News broke that the terrorist group that took the girls, Boko Haram, planned to sell
#BringBackOurGirls
went from 10,000 mentions a day to 100,000 or 200,000 . It jumped oceans, and
thousands of non-Africans began using it. As often happens, celebrities got involved ,
them into forced marriages for $12 apiece. Over the next few days,
But #BringBackOurGirls has felt like one of the first Twitter causes
that has a chance of actually changing outcomes , especially since former and
their parents.
current Secretaries of State Hillary Clinton and John Kerry got involved and Michelle Obama
tweeted a photo of herself holding a sign with #BringBackOurGirls written on it in big block
letters. Secretary Kerry followed up his tweet with an announcement that the State
Department would send military and law enforcement personnel to help advise Nigerian
officials in the search for the girls. The First Ladys photo led to another, even more
widespread round of media coverage: the New York Post, for example, ran the tweet as the full
cover of their front page with the headline, YES, MICHELLE! But beyond that, the First
Ladys participation felt like a public rebuke of President Jonathan and his wife Patience, who
has faced criticism for reportedly ordering the arrest of activists protesting the governments
response to the kidnappings and even accusing protesters of making up the abductions.
Ignore millions of regular people participating in a hashtag campaign? Sure. Ignore Michelle
started the hashtag have gotten out of it exactly what theyd hoped for. In the space of a
week, they made it impossible for President Jonathan to continue chalking up their daughters
abduction as the latest Boko Haram atrocity to be grimly accepted and eventually forgotten.
Its not everything, but its a start . And the world is now talking about 276 stolen girls
in Nigeria when before it wasnt talking about them at all.
profiteers distorting climate science or Wall Street banks undermining efforts to regulate the financial
industry,
status quo, even when so doing threatens to upend the whole system just like
the people of Rancho Santa Fe. The corrosive elitism in Rancho Santa Fe is the stuff popular
revolts are based on. These Dickensian vultures want to hoard until nothing
remains; theyre blind to those beyond their gated communities. Disconnectedness is a close cousin of
privilege, so its not surprising that they live in a bubble. But their persecution mania, their belief in their
privileged status, is insufferable and a public hazard. They cant imagine what its like to live without, so
theyll risk anything to ensure that they dont. California may survive the selfish stupidity of a few citizens
in Rancho Santa Fe, but its not clear how long the country can survive the excesses and greed of Wall
others, is quite another thing and its all too common these days.
Impacts
Social Death
Anti-Blackness is the Controlling Impact for how we
should interpret all forms of violence
Crockett 14 ( JNasah , writer, performer, and cultural worker who focuses on
Black cultural production and Black radical traditions. Raving Amazons: Antiblackness and Misogynoir in Social Media June
30,2014https://modelviewculture.com/pieces/raving-amazons-antiblackness-andmisogynoir-in-social-media.
Antiblackness,inaroughhewnnutshell,isthestructuringlogicofthemodernityandthe
foundationofthecontemporaryworldwelivein.Itistheglueandthestringrunningthrough
ourconceptionsofwhatitmeanstobefree,whatitmeanstobeacitizen,whatitmeanstobea
legitimateandproductivememberofsociety,whatitmeanstobeHuman,andwhatitmeansto
betheantiHuman.AntiblacknessisthestructuralpositioningoftheBlack(theBlackhere
beingamarkerforacertaintypeofsubjectivitycomparabletoMarxstheworkershoutoutFrank
Wilderson)asanobjectthatisfungibleandabletobeaccumulatedlikeanyotherwicket
churnedoutbytheprocessofcapitalism;itisthefactofBlackfolksbeingopentoperpetualand
gratuitousviolencethatneedsnodefinitivepriorprovocationorreason;thereasonisthe
factofBlackness(see:gettingshotforwalkinghomewithsomeSkittles,gettingshotwhilebeing
handcuffedinthebackseatofacar,gettingshotforcalling911,beingbeatenforstaringat
someoneinadehumanizingway,andonandon).Itis,toechoHartman,theafterlifeofslavery:a
logicthatcollapsesthepastandthepresentandplacesviolencetowardstheBlackwithinarangeof
acceptabledailypractices.Certainlyantiblacknessisattitudinalseethelibidinaleconomy,i.e.thesystemsof
desireandinstinctsandfantasiesandrepulsionaroundskintone,hairtypes,bodiesthatmakesitselfapparentinEurocentricbeauty
standardsorthefactthatlighterskinnedAfricanAmericanwomenreceiveshorterprisonsentencesthantheirdarkerskinned
counterparts.Butthatshowlogicandstructuresoperate,theyimbueeverythingthatspringsforth
fromthem.Ourlivesandsocieties(becausewhenwespeakoftheafterlifeofracebasedchattelslavery,Arabandtrans
Atlantic,wearespeakingoftheentireworld)arefundamentallyshapedbyit,notonlyinstitutionally,but
alsoattheleveloftheeveryday,includingcrossingthestreet.Soofcourseitmakesitselfapparentinthe
supposedlybravenewworld(sodifferentfromanyworldthatcamebefore!)ofsocialmedia.ImyselfjoinedbothTwitterandTumblr
backin2009,afterexperiencesstretchingbacktohighschoolwithBlackPlanet.com,Myspace,Livejournal,andofcourseFacebook.
WithTwitterandTumblr,however,Ijoinedafterspendingayearortwolurkingontheedgesofaparticulargroupof(mostly)women
ofcolor,andmovingontosocialmediaaroundthesametimetheydidallowedmetoconnectwiththeminwaysIwasntabletowhen
themainplatformwas,say,WordPress.Forus,andforthemanyBlackwomenIhavesinceconnectedandbuiltwithsince2009,
socialmediaoffersusyetanotherwaytobuildourbelovedcommunities,toextendthenetworksoflove,camaraderie,andjoyous
supportthathavelongexistedinourmeatspacecommunitieshairsalons,churches,Blackstudentunions,kitchentables,etc.Social
mediaalsobecomesacentralsiteformuchofouractivism,fromthemultinational#BringBackOurGirlshashtagtoholdingmedia
outletsaccountableforpublishingblatantracism.Wearealsotheoryhouses,circulatingandchallengingdiscoursesandpracticesthat
negativelyimpactourlivesasBlackwomen,andmakingcriticalconnectionsthatareoftenmissingfromthemediathatsurroundsus.
Icanthelpbutseehistoricalparallelsto,say,early20thcenturyPullmanPorterssecretlydistributingcopiesofThe Chicago
DefendertotheBlackfolkstheycameacross.Whatweredoingisnothingnew,butbeingonsocialmediameansthatthis
networkingishappeninginthepubliceye.Ialsocanthelpbutseehistoricalparallelsinthemultipleformsofantiblackbacklash
Blackwomenhavereceivedonsocialmediaoverthepastfewyears.Thetopicofsurveillanceinsocialmediahasbeen
ahotonelately,butmanydiscussionsonitstopandendattheEdwardSnowden/NSAtype
revelationsoverpost9/11,postWaronTerrorinvasionsofprivacyatthehandsofan
overzealousgovernment.However,ifweweretoextendtheideaofpolicingandsurveillance
furtherbackintime,andexpanditbeyondthetropeofitbeingprimarilycarriedoutby
governmentemployees,itbecomesapparentthatsurveillancehasalreadybeenacentralpartof
theexperienceofBlackwomenonTwitter.RecallthatintheU.S.,thepolicehavetheirrootsin
slavepatrols;policingandmanagementofthepotentiallyunrulyBlackbodiesunderliesthecall
forlawandorderandtheconstituentneedforpolice.ToquoteWildersonagain,insocietythereis
afundamentalanxietyoverwhere is the Black and what is he or she
doing,andinanantiblackworld,everynonBlackisdeputizedtopatrolandmanagethe
Blacks.
Social Psychology. Among the relevant findings: Historical representations explicitly depicting Blacks as
mentally associate Blacks and apes, Study 4 demonstrated that this implicit association is not due to
In Study 5, we
demonstrated that, even controlling for implicit anti-Black prejudice, the
implicit association between Blacks and apes can lead to greater
endorsement of violence against a Black suspect than against a White
personalized, implicit attitudes and can operate beneath conscious awareness.
study suggests that derogatory racial stereotypes are so powerful that merely
being unemployed makes people more likely to be viewed by others -- and
even themselves -- as black. In a long-term survey of 12,686 people, changes in social
circumstances such as falling below the poverty line or being sent to jail
made people more likely to be perceived by interviewers as black and less
likely to be seen as white. Altogether, the perceived race of 20% of the people in the study
changed at least once over a 19-year period, according to the study published today in the Proceedings of
the National Academy of Sciences. "After [junk bond financier] Michael Milken goes to prison, he'll be no
more likely to say he's a black person or any less likely to say he's a white person," said Amon Emeka, a
social demographer at USC who was not involved in the study. "[U.S. Supreme Court Justice] Clarence
Thomas might say he's transcended race, but he wouldn't say that he's a white person, and certainly no
the federal Bureau of Labor Statistics' National Longitudinal Survey of Youth. Though the ongoing survey is
primarily focused on the work history of Americans born in the 1950s and 1960s, participants have also
provided interviewers with information on a variety of topics, including health, marital status, insurance
coverage and race. On 18 occasions between 1979 and 1998, interviewers wrote down whether the
people previously described as white were reclassified as belonging to another race if they became
The
effect has staying power. People who were perceived as white and then
became incarcerated were more likely to be perceived as black even after
they were released from prison, Penner said. The racial assumptions affected
self-identity as well. Survey participants were asked to state their own race when the study began
incarcerated. But if they stayed out of jail, 4% were reclassified as something other than white.
in 1979 and again in 2002, when the government streamlined its categories for race and ethnicity. Of the
people who said they were white in 1979 and stayed out of jail, 95% said they were white in 2002. Among
The
results underscore "the pervasiveness of racial stratification in society ," said
Emeka. "The fact that both beholders and the observers of blackness
attach negative associations to blackness speaks volumes to the
continuing impact of racial stratification in U.S. society." But Robert T.
those who were incarcerated at some point, however, only 81% still said they were white in 2002.
Carter, a professor of psychology and education at Columbia Teachers College in New York who studies
race, culture and racial identity, said he wasn't convinced that stereotypes had the power to change the
perception of race. "It's not social status that shapes race, it's race that shapes social status," he said.
"Stratification on the basis of racial group membership has been an integral part of our society since prior
to the inception of the United States. It's been true for hundreds of years." To see if the changes were the
result of simple recording errors made when interviewers filled out their surveys, the researchers checked
how often a participant's gender changed from one year to the next. They found changes in 0.27% of
cases, suggesting that interviewers weren't being sloppy. They also looked for subjects who were
interviewed by the same person two years in a row. Even in those cases, the results were the same. The
researchers are examining whether other social stereotypes have a similar effect on perceived race. People
who have less education, live in the inner city instead of the suburbs and are on welfare are more likely to
be seen as black, Saperstein said. "The data is really interesting, but it doesn't allow us to say what was
going on in these people's heads," she said. "Our story is consistent with the story that there's implicit
prejudice."
Racism Bad
Racism is the lynchpin of the modern biopolitical state,
spawning the worst excesses of biopower. The aff is the
path to eugenic control and genocide to legitimate state
action
Mendieta 02 [Eduardo Mendieta, SUNY at Stony Brook, To make live and to let die Foucault on Racism;
Meeting of the Foucault Circle APA Central Division Meeting, Chicago, April 25, 2002]
I have thus far discussed Foucaults triangulation between the discourses of the production of truth, the power that these discourse
enact and make available to social agents, and the constitution of a political rationality that is linked to the invention and creation
of its horizon of activity and surveillance. I want now to focus on the main theme of this courses last lecture. This theme discloses
in a unique way the power and perspicacity of Foucaults method. The theme concerns the kind of power that biopower renders
available, or rather, how biopolitics produces certain power effects by thinking of the living in a novel way. We will approach the
perpetual threat of death, then life was abandoned to its devices. Power was exhibited only on the scaffold, or the guillotine its
terror was the shimmer of the unsheathed sword. Power was ritualistic, ceremonial, theatrical, and to that extent partial, molecular,
and calendrical. It was also a power that by its own juridical logic had to submit to the jostling of rights and claims. In the very
performance of its might, the power of the sovereign revealed its limitation. It is a power that is localized and circumscribed to the
die, how does it kill? This is a similar question to the one that theologians asked about the Christian God. If God is a god of life, the
giver of life, how can he put to death, how can he allow death to descend upon his gift of life why is death a possibility if god is the
factories, living quarters, brothels, red-districts, planning and planting of gardens and recreation centers, and the gerrymandering
Biopolitics is the
result of the development and maintenance of the hothouse of the political
body, of the body-politic. Society has become the vivarium of the political
rationality, and biopolitics acts on the teeming biomass contained within the
parameters of that structure built up by the institutions of health, education, and production. This is
where racism intervenes, not from without, exogenously, but from within,
constitutively. For the emergence of biopower as the form of a new form of
political rationality, entails the inscription within the very logic of the modern
state the logic of racism. For racism grants, and here I am quoting: the conditions for
the acceptability of putting to death in a society of normalization. Where
there is a society of normalization, where there is a power that is, in all of its
surface and in first instance, and first line, a bio-power, racism is
indispensable as a condition to be able to put to death someone, in order to
be able to put to death others. The homicidal [meurtrire] function of the
state, to the degree that the state functions on the modality of bio-power,
can only be assured by racism (Foucault 1997, 227) To use the formulations from his 1982 lecture The
of populations by means of roads, access to public transformations, placement of schools, and so on.
Political Technology of Individuals which incidentally, echo his 1979 Tanner Lectures the power of the state after the 18th
century, a power which is enacted through the police, and is enacted over the population, is a power over living beings, and as such
invaders, imperials colonizers, which turned into a war of races, to then turn
into a war of classes, has now turned into the war of a race, a biological unit,
against its polluters and threats. Racism is the means by which bourgeois
political power, biopower, re-kindles the fires of war within civil society.
Racism normalizes and medicalizes war. Racism makes war the permanent
condition of society, while at the same time masking its weapons of death
and torture. As I wrote somewhere else, racism banalizes genocide by making
quotidian the lynching of suspect threats to the health of the social body.
Racism makes the killing of the other, of others, an everyday occurrence by
internalizing and normalizing the war of society against its enemies. To
protect society entails we be ready to kill its threats, its foes, and if we
understand society as a unity of life, as a continuum of the living, then these
threat and foes are biological in nature.
Labeling Advantage
1AC
Fusion Centers surveil activists under the guise of
terrorism
Royden 15 Occupy.com. June 19. Protest Is the New Terror: How U.S.
Law Enforcement Is Working to Criminalize Dissent Derek Royden is a writer
at occupy.com and nation of change. http://www.occupy.com/article/protestnew-terror-how-us-law-enforcement-working-criminalize-dissent
the FBI surveilled civil rights and other activists from Martin Luther King Jr. to leaders of the
as part of its wide ranging COINTELPRO (counter intelligence program)
during the 1960s and early 70s. The use of planted news stories, faked communications to create dissension
Its well established that
National Lawyers Guild
within activist groups, informants to make dubious cases and even assassinations was revealed by a group of activists called the Citizens
Commission to Investigate the FBI, who broke into a bureau office in Media, Pennsylvania, in 1971 and found ample evidence of the agencys
misdeeds. This is generally seen as an era of terrible government overreach in the name of fighting communism. The problem is that
the
use of similar tactics has been discovered again and again in the
years since. Following the anti-globalization protests of 1999, the 9/11 attacks, and the Occupy protests of 2011, similar
strategies, enhanced by modern technology, have been ratcheted up and deployed against an ever-increasing number of activists and political
the most recent instances, it was revealed that the FBI has been coordinating with local law enforcement to target the Black Lives Matter
movement. Another story, unrelated to current anti-racist organizing, is a bizarre case out of Minneapolis in the lead up to the Republican
national convention in 2008. According to the City Pages, a Univ. of Minnesota police officer who was the departments only officer on the local
Joint Counter Terrorism Task Force worked with an FBI Special Agent to recruit college students who acted as paid informants at vegan
Joint
Terrorism Task Forces (JTTFs), of which there are currently 104 located in cities and towns across the United States, were
potlucks hoping theyd discover activist plans to disrupt the city's upcoming convention. Extending the Long Arm of the Law
created in the 1980s and greatly expanded in the aftermath of 9/11. They were set up to coordinate between diverse federal agencies and
Linsker, who police tried to arrest for allegedly trying to throw a trash can over the side of a walkway on the Brooklyn Bridge during the large,
mostly peaceful protests that erupted in New York City following the failure to indict the officer whose choke-hold led to the death of Eric
Garner. Other protesters intervened to stop the arrest but Linkser left his bag behind which, according to authorities, contained his passport,
three hammers, and a small amount of marijuana. While police may have been well within their rights to track down Linsker and charge him if
the vandalism allegations were true, it's who did the arresting that is problematic: rather than the NYPD, it was the New York JTTF that brought
Linkser in, perhaps believing that the hammers were potential instruments of terror. This should be a cause for worry, since it means either
Unfortunately, like most 21st century technology, the use of smart phones by activists has
become a double-edged sword, exposing them to surveillance risks that were unimaginable in
previous eras. One such technology is Stingray, produced by Harris Technology, which mimics a cell phone tower and allows law enforcement
to pull GPS and other data from phones within their range. In an interesting case reported by Wired magazine, police in Erie County, NY, used
the technology 47 times in the last five years and only received the required permission from a court once. Even in that case, they asked for a
court order rather than a warrant, which carries a higher burden of proof... (and) mischaracterized the true nature of the tool. The same story
notes that the New York Civil Liberties Union posted documents online that showed the FBI and local police departments had made binding
agreements to keep their use of the technology secret, even going so far as to ask courts to dismiss criminal cases in which the use of
Stingray might be revealed. The unique moment created by anti-police brutality protests throughout the U.S. last year and coming on the
heels of a federally coordinated effort to dismantle Occupy encampments in 2011 revealed that federal police agencies, especially the FBI,
working with local police have directed their resources as much against protesters, dissenters and those practicing and civil disobedience as
they have against the threat represented by terrorists, whether homegrown lone wolves" or organized outside groups. While the recent NSA
while
the right to dissent remains a fundamental American freedom, the
fear of terrorism being openly exploited by law enforcement has
allowed police to resurrect COINTELPRO in all but name.
reform bill passed in Congress represents a victory for civil liberties and privacy advocates, there's still a ways to go. Because
government
leaders must rhetorically construct their enemies with
dehumanizing language so as to exploit the ways in which the
general masses perceive others rhetorical construction of ones
enemies is fundamental to a nations public support for war
Dehumanizing others renders the requisite horrors of war
tolerable
engage in aggressive acts of war against other states face the ideological encumbrance of rallying public support for their cause. In these cases
. Such
, (Elliot 2004, 99) and ensures that no moral relationship with the (enemy) inhibits the victimizers violent behaviour (Haslam 2006, 254). Through carefully
crafted narratives, government leaders are able to sculpt and shape socially constructed realities in such a way so as to allow or even demand (its) citizens to undertake acts that
would be universally rejected if they were directed towards true human beings (Anderson 2006, 739). How, then, does one go about orchestrating such a sophisticated fabrication of
(Boudreau and Polkinghorn 2008, 176). This is usually established in relation to ethnicity and race, with the enemy cast as being savages or
barbarians lacking in culture, cognitive and rational capacities, morality, and self-restraint; the ideal portrayal is of a savage [that] has brutish appetites for violence and sex, is
implicating a lack of development and autonomy. Put simply, if rhetoric is crafted in such a way so as to cast ones enemies as lacking what distinguishes humans from animals, they
, as well as the groups individual members, as anything but human (Elliot 2004). No intense scrutiny or analysis is needed to find these basic founding
the conflict
(Elliot 2004, 100). However, such a fixation upon evil is far from a modern development for the Americans, and long precedes both the War on Terror and the tragedy of
9/11; whether it be government leaders of the Cold War era associating the Soviet Union with the idea of an empire of evil, or Adolf Hitlers immortalization as the personification of
the presidents
rhetoric of evil was highly effective in that it immediately
eradicated any space within the public perception for critical
thought
evil (Ivie 2007), George Bushs immediate invocation of evil imagery is hardly unprecedented. Though not an inherently unique approach,
regarding terrorism, and those proposed enemies of the United States. From the very beginning of the War on Terror, absolutely every consideration
became a matter of national security as viewed through the lens of an evil threat (Ivie 2007, 226). By resorting to a means of rhetorical definition of enemies founded in previous
(Maggio
2007, 822). Bush explicitly highlighted this very association within his address to a joint session of congress on September 20th, 2001, stating: [those responsible for the attacks on
9/11] are the heirs of all murderous ideologies of the 20th Century. By sacrificing human life to serve their radical visions by abandoning every value except the will to power they
who have long been accepted as lacking in human characteristics. This idea, along with the
association to evil, is frequently re-emphasized in subsequent public addresses regarding the War on Terror that Bush gave over the next five years. Despite the strength of these
. Though not
as inherently diabolical a concept as evil, the rhetoric of murder is perhaps more effective as it draws a direct link between those Bush wishes to dehumanize, and an understanding of
the moral capacity to commit heinous criminal acts upon innocent individuals. Whether it be his continual reference to the attacks on 9/11 as acts of murder (for example, Bush
2001a, Bush 2001b, Bush 2002), or the statement that The United States of America is an enemy of those who aid terrorists and of the barbaric criminals who profane a great religion
by committing murder in its name, (Bush 2001c) Bush is able to further deny membership to the human species to those enemies of the U.S by constructing for them a reality in
W. Bush elaborates upon this by detailing explicit examples of the evil demonstrated by those enemies. Within his 2002 State of the Union Address Bush tells of the enemys use of
poison gas to murder thousands of its own citizens leaving the bodies of mothers huddled over their dead children. This imagery is taken further within the 2003 State of the Union
Address, within which Bush details the forced confessions obtained by the enemy by torturing children while their parents are made to watch. As if this were not enough to seal the
dehumanized fate of those enemies of the U.S, Bush details the torture methodologies preferred by his enemies to be electric shock, burning with hot irons, dripping of acid on the
skin, mutilation with electric drills, cutting out tongues and rape. Barbaric? Savage, brutish appetites for violence and sex? Morally culpable of great crimes? All of these key
elements of dehumanization are evident within this one statement. By presenting the American people with such a graphic list outlining gruesome crimes, Bush not only suggests that
his enemies are less than human, he demands that their identity be acknowledged as innately evil, monstrous, and horrific. Though conventional means of dehumanization are not
, George W. Bush
, who is without culture or morality, and who has a voracious appetite for gruesome crimes against humanity. One need
only skim Bushs rhetoric of evil to see his desired picture of an enemy who opposes freedom and democracy in all of its forms; of ruthless barbaric criminals who profane religion in
order to justify their sacrificing of human life. The evil, deluded men of whom he spins tales are heartless, thrive in chaos and have absolutely no regard for human dignity. In this,
Bush takes the practice of dehumanization to a whole new level not only does he succeed as depicting those with whom he aims to engage in aggressive acts of war as less than
human, he manages to craft a narrative in which those whom he wishes to conquer are the embodiment of evil, and everything which threatens the American way of life.
without forethought, provocation, or reason," in the words of Stephen John Hartnett and Laura Ann Stengrim,
sign of evil cannot be banished entirely if for no other reason than, as John Angus Campbell attests,
.23 Yet James Arnt Aune rightly insists that the incantation of
24 The rhetoric of religion informs political culture in just this corrosive way, as we have learned so well from
Kenneth Burke. The ritual of "victimage" in secular affairs, he explains, is the "logological" equivalent of a theology of redemption through sacrifice and thus an "insight into the
whose Covenant with God implies the possibility of a Fall from grace and entails, as a
condition of redemption, some punishment or payment for wrongdoing. This logic of atonement allows redemption through vicarious sacrifice, which is the principle of mortification by
25 As a
basic principle of symbolic action, then, the idea of "redemptive sacrifice" follows from the repression of conscience-laden guilt and in response to the condition of sociopolitical order.
Victimage, or "redemption by vicarious atonement," is "intrinsic in the idea of guilt" just as "guilt is intrinsic to the idea of a Covenant." Moreover, terms for order, fall, and redemption
imply one another in a cyclical logic that can be reversed so that, for example, "the terms in which we conceive of redemption can help shape the terms in which we conceive of the
guilt that is to be redeemed." Accordingly, the name by which we designate a "curative victim" to cleanse our guilt not only reflects but also reflects back upon our sense of order and
It may well be that simply naming the enemy is, per se, sufficient cause for war, or as James Hillman writes, "
27
Labeling Bad
Terror labels create a binary of us versus them
Berger et. al 14 [Berger, Ronit. Say Terrorist, Think Insurgent: Labeling
and Analyzing Contemporary Terrorist Actors.
http://www.terrorismanalysts.com/pt/index.php/pot/article /view/374/html]
The widespread use of the "terrorist group" label is likely due to a
combination of psychological and instrumental factors. Psychologically, the
use of this label provides a certain degree of emotional satisfaction to
societies targeted by terrorism. Terrorism evokes repugnance and fear,
thereby stoking an unequivocal rejection of terrorism's means and agents
alike.[29] Populations have been trained to reject compromise with terrorists,
and want to believe that terrorists are unique in their evilness, therefore
deserving a category of their own. This explains not only why governments
and societies targeted by political violence cling to the terrorism label, but
also why they often fail to view "terrorism" as part of a broader violent
conflict. Instrumentally, a strong case can be made that "naming and
shaming" groups that rely on the most brutal acts of violence can serve a
number of goals designed to weaken these actors. Such labels can assist
efforts of building an international coalition designed to oppose these groups
through legal, political, economic, or militarily efforts. Moreover, repeated
emphasis of the most unacceptably violent behavior of such groups can
arguably serve the goal of curtailing public support for these groups among
their potential constituents. For the purpose of policy pronouncements,
therefore, the terrorism label has certain advantages. Despite this value, we
argue that policy analysisincluding those that directly affect policy
formulation and strategic messagingmust adopt a more complex view that
better accounts for the evolving nature of terrorist groups and their complex
interaction with other tactics and modes of warfare, as well as their
interaction with broader conflicts such as insurgency and civil wars.
the same time, the use of this label must not obscure a far more nuanced reality that acknowledges a
number of important caveats: First, terrorist groups use, almost without exception, terrorism in conjunction
with other tactics, notably guerrilla warfare. Second, terrorist groups are becoming more sophisticated
political actors, with some attempting to provide basic services to the population in an attempt to win over
hearts and minds. Third, terrorism is rarely a self-standing phenomenon . Instead, most
terrorism occurs in the context of broader armed conflict, typically an insurgency and/or a civil war. We
dangerous potential pitfall is for governments to fall victim to their own rhetoric. At worst, such a rhetorical
entrapment can lead governments to focus on policies designed to address only the specific threat of
terrorism posed by these groups. As the above discussion has shown, however, the dangers emanating
policy analysts also examine these actors through the narrow lens of terrorist groups
way in which these militant actors are referred to in official statements from the way in which they are
examined by specialists and analysts - including those directly informing the government. Official policy
statements, we believe, should continue to label actors involved in terrorism as terrorist groups. At the
same time, policy analysis informing the governments policy pronouncements and decisions should adopt
that in most
cases, these groups are best understood as insurgent groups , and hence
propose this label for analytical purposes as the most nuanced framework. The
analytical employment of the "insurgent group" concept can contribute to a deeper theoretical
greater nuance when examining and conceptualizing these militant groups. We believe
understanding of the power distribution challenge that insurgent groups pose to governments by using
violent actors that use terrorism as a tactic, governments, and other relevant actors. Finally, in terms of
policy, the use of the suggested framework will provide a broader perspective of the insurgents' political
development, a better grasp of its network of contacts and supporters, and it may also grant considerable
flexibility to policy decision-making.
there is actually no
commonly agreed definition of what terrorism is. Many scholars have come up with
their own definitions of the term but it has been impossible to reach a consensus to define
terrorism internationally. Because of the lack of common understanding of what terrorism is,
there is no possibility to objectively identify the phenomenon and question some actors use of
This has given governments and political actors in general the ability
to use the word terrorism very freely, even promiscuously (Jenkins 1980: 1). As
the term.
explained by Staun, terrorism is not objective in the sense that nothing can be terrorism in
itself (2010: 411). Actions and groups become terrorists when it has been seen judicious to
label them as such, out of all of the other alternative terms that were available. As stated by
Valentina Bartolucci, framing
discourse is very
important as language plays a predominant role in shaping reality and in
influencing the way people perceive it (Kegley 2009, 39-42). Consequently,
labelling (or naming) in itself, as written by Jackson, is always a highly charged
process that can have serious political and social consequences (2005: 23). As
about reality have a strong impact on world politics. In that sense,
added by Michael Bhatia: Once assigned, the power of a name is such that the process by
which the name was selected generally disappears and a series of normative associations,
motives and characteristics are attached to the named subject (2005: 8).
in this case domestic Christian right-wing groups that are Bush's preferred recipients of his discourse.
(18) But
his
Bush and
superhuman status,
cosmological
and
perspective,
In this
cannot be just attacked one piece at a time, through incremental steps, but
, eradicated
engage in similar simplistic binary discourse and projection of evil onto the Other which they use to legitimate acts of terrorism.
between U.S. policies, leaders, institutions, or people, while advocating a Jihad, or holy war, against the American monolithic evil. The terrorist crimes of September 11 appeared to be
part of this Jihad and the monstrousness of the actions of killing innocent civilians shows the horrific consequences of totally dehumanizing an "enemy" deemed so evil that even
innocent members of the group in question deserve to be exterminated. Underlying the Bush-Cheney administration rhetoric were fundamental American political mythologies. The
civilization discourse built on Ronald Reagan's favorite rhetoric of "the city on the hill," whereby the destiny of the United States was to establish a site of freedom and civilization in
whereby the sheriff defends the good citizens against evil outlaws and savages. (19) As Ivie and Giner (2007) put it, "After 9/11
Bush's "savages" were the "evil doers" associated with Islamic terrorism,
The legitimation of violence against evildoers is also grounded in the political mythology of what Jewett and Lawrence (1988) describe as the "American monomyth," a
dominant trope of the genres of popular culture in the United States from Indian captivity narratives through the Hollywood western and superhero films. On this model, a community
is threatened by barbaric forces, and redemptive violence is used to protect the community. In the post-9/11 context, the barbaric forces threatening the community were global
terrorism and Bush's Terror War policies were redemptive violence.
Royden 15 Occupy.com. June 19. Protest Is the New Terror: How U.S.
Law Enforcement Is Working to Criminalize Dissent Derek Royden is a writer
at occupy.com and nation of change. http://www.occupy.com/article/protestnew-terror-how-us-law-enforcement-working-criminalize-dissent
the FBI surveilled civil rights and other activists from Martin Luther King Jr. to leaders of the
National Lawyers Guild as part of its wide ranging COINTELPRO (counter intelligence program)
during the 1960s and early 70s. The use of planted news stories, faked communications to create dissension
Its well established that
within activist groups, informants to make dubious cases and even assassinations was revealed by a group of activists called the Citizens
Commission to Investigate the FBI, who broke into a bureau office in Media, Pennsylvania, in 1971 and found ample evidence of the agencys
misdeeds. This is generally seen as an era of terrible government overreach in the name of fighting communism. The problem is that
the
use of similar tactics has been discovered again and again in the
years since. Following the anti-globalization protests of 1999, the 9/11 attacks, and the Occupy protests of 2011, similar
strategies, enhanced by modern technology, have been ratcheted up and deployed against an ever-increasing number of activists and political
the most recent instances, it was revealed that the FBI has been coordinating with local law enforcement to target the Black Lives Matter
movement. Another story, unrelated to current anti-racist organizing, is a bizarre case out of Minneapolis in the lead up to the Republican
national convention in 2008. According to the City Pages, a Univ. of Minnesota police officer who was the departments only officer on the local
Joint Counter Terrorism Task Force worked with an FBI Special Agent to recruit college students who acted as paid informants at vegan
Joint
Terrorism Task Forces (JTTFs), of which there are currently 104 located in cities and towns across the United States, were
potlucks hoping theyd discover activist plans to disrupt the city's upcoming convention. Extending the Long Arm of the Law
created in the 1980s and greatly expanded in the aftermath of 9/11. They were set up to coordinate between diverse federal agencies and
local law enforcement, and often work
analyze data related to potential terrorism. To see how these task forces
, take the case of Eric
Linsker, who police tried to arrest for allegedly trying to throw a trash can over the side of a walkway on the Brooklyn Bridge during the large,
mostly peaceful protests that erupted in New York City following the failure to indict the officer whose choke-hold led to the death of Eric
Garner. Other protesters intervened to stop the arrest but Linkser left his bag behind which, according to authorities, contained his passport,
three hammers, and a small amount of marijuana. While police may have been well within their rights to track down Linsker and charge him if
the vandalism allegations were true, it's who did the arresting that is problematic: rather than the NYPD, it was the New York JTTF that brought
Linkser in, perhaps believing that the hammers were potential instruments of terror. This should be a cause for worry, since it means either
Unfortunately, like most 21st century technology, the use of smart phones by activists has
become a double-edged sword, exposing them to surveillance risks that were unimaginable in
previous eras. One such technology is Stingray, produced by Harris Technology, which mimics a cell phone tower and allows law enforcement
to pull GPS and other data from phones within their range. In an interesting case reported by Wired magazine, police in Erie County, NY, used
the technology 47 times in the last five years and only received the required permission from a court once. Even in that case, they asked for a
court order rather than a warrant, which carries a higher burden of proof... (and) mischaracterized the true nature of the tool. The same story
notes that the New York Civil Liberties Union posted documents online that showed the FBI and local police departments had made binding
agreements to keep their use of the technology secret, even going so far as to ask courts to dismiss criminal cases in which the use of
Stingray might be revealed. The unique moment created by anti-police brutality protests throughout the U.S. last year and coming on the
heels of a federally coordinated effort to dismantle Occupy encampments in 2011 revealed that federal police agencies, especially the FBI,
working with local police have directed their resources as much against protesters, dissenters and those practicing and civil disobedience as
they have against the threat represented by terrorists, whether homegrown lone wolves" or organized outside groups. While the recent NSA
while
the right to dissent remains a fundamental American freedom, the
fear of terrorism being openly exploited by law enforcement has
allowed police to resurrect COINTELPRO in all but name.
reform bill passed in Congress represents a victory for civil liberties and privacy advocates, there's still a ways to go. Because
Fund; http://www.globalresearch.ca/the-hidden-role-of-the-fusion-centers-inthe-nationwide-spying-operation-against-the-occupy-movement-andpeaceful-protest-in-america/5383571]
documents obtained by the Partnership for Civil Justice
Fund, provides highlights and analysis of how the Department of Homeland Security (DHS)-funded Fusion Centers used their
vast anti-terrorism and anti-crime authority and funds to conduct a sprawling, nationwide
and hour-by-hour surveillance effort that targeted even the smallest activity of
peaceful protestors in the Occupy Movement in the Fall and Winter of 2011. It is
This report, based on
being released in conjunction with a major story in the New York Times that is based on the 4,000 pages of government documents uncovered
resources has been shrouded in secrecy. In 2012, the Senate issued an investigative report on the Fusion Centers that The Washington Post
described as revealing pools of ineptitude, waste and civil liberties intrusions.
Labels = Islamophobia
These Fusion Centers engage in islamophobic profiling
that use racial categories to categorize individuals
Reports of training sessions provided to fusion center personnel and local law
enforcement officers by so-called counterterrorism experts also raise serious
questions about compliance with constitutional protections against profiling
on religious grounds. According to recent press accounts, the flood of federal money
flowing to local enforcement for homeland security efforts has produced a
cottage industry of counterterrorism trainers of dubious provenance.50 As
outlined in the reports, some of these trainers engage in fear-mongering that displays
dramatic ignorance of both the subject they purport to teach and the
constitutional rights of Americans. According to an article in The Washington Post, one
instructor told fusion center personnel to monitor Muslim student groups and
mosques and, if possible, to tap their phones.51 The same instructor told an
interviewer that to prevent Muslims from seeking to impose sharia law in the United
States, police officers have to look at the entire pool of Muslims in a
community.52 Another instructor warns local law enforcement officials that
Muslims want the Islamic flag [to] fly over the White House. 53 One selfproclaimed expert on Islamic terrorism, who regularly teaches courses to law
enforcement personnel across the country, told Florida law enforcement officers to
assume that all Muslims lie to disguise the true, violent nature of Islam . He also
claimed as fact that a Muslim wearing a headband means that he is willing to be a martyr, and that a
Muslim using a long Arabic name that is spelled differently on different forms of ID provides probable
security experts warn that it also compromises police effectiveness by distracting law enforcement
officers from actual threats and by poisoning relationships between police and the communities that can
be their best sources of information.55
vast majority of individuals on the FISA recap spreadsheet are not named. Instead, only their email
Under the
heading Nationality, the list designates 202 email addresses as belonging
to U.S. persons, 1,782 as belonging to non-U.S. persons, and 5,501 as
unknown or simply blank. The Intercept identified the five Americans placed under
addresses are listed, making it impossible in most cases to ascertain their identities.
surveillance from their email addresses. It is unclear whether the government obtained any legal
permission to monitor the Americans on the list. The FBI and the Justice Department declined to comment
for this story. During the course of multiple conversations with The Intercept, the NSA and the Office of the
Director of National Intelligence urged against publication of any surveillance targets. Except in
exceptional circumstances, they argued, surveillance directly targeting Americans is conducted only with
Impact Ext.
Hate for the other creates a fundamental clash of civilizations which
imposes violence on everyone outside the body politic
Kellner 7 (Douglas, Chair of Philosophy @ UCLA, Presidential Studies
Quarterly. Vol. 37 (4), 2007, pg. 622+) JPG
the Terror War became a "clash of fundamentalisms" in
which both sides deployed Manichean discourses used to whip up
hatred of the Other and to incite violence and war. The media were the instruments of both, creating
As Tariq Ali (2002) notes,
hysteria while circulating militarist and Manichean discourses. Media commentators on U.S. television, for example, offered one-sided and
ideological accounts of the cause of the September 11 events, blaming their favorite opponents in the current U.S. political spectrum as the
source of the terror assaults. For fundamentalist Christian ideologue Jerry Falwell, and with the verbal agreement of Christian Broadcast Network
abortionists, and the feminists, and the gays and the lesbians who are actively trying to make that an alternative lifestyle, the ACLU, People for
argument is similar to a right-wing Islamic claim that the United States is fundamentally corrupt and evil and thus deserves God's wrath, an
argument made by Falwell critics that forced the fundamentalist fanatic to apologize. On the issue of "what to do," right-wing columnist Ann
Pentagon was organizing Operation Infinite Justice, Bush administration Deputy Defense Secretary Paul Wolfowitz (U.S. Department of State 2001)
said the administration's retaliation would be "sustained and broad and effective" and that the United States "will use all our resources. It's not
just simply a matter of capturing people and holding them accountable, but removing the sanctuaries, removing the support systems, ending
states who sponsor terrorism."
D.C., three days after 9/11 and vowing to "rid the world of evil." On October 7, just over two weeks after announcing his strategy of preemption,
president insisted that America could not afford to trust in the "sanity and restraint" of, nor could it wait any longer to disarm, a "dictator" with
access to "the world's most dangerous weapons" and a history of using them to kill and disfigure thousands of his own people. This was an "evil"
man who tortured children and adults alike with electric shocks, hot irons, acid drips, power drills, amputations, and rape. "If this is not evil," Bush
redemption. A war to bring down the demonic Saddam Hussein was a war of atonement and salvation-a war, Christian Spielvogel argues, that
Bush represented throughout his 2004 reelection campaign "as a test of national moral resolve in the face of evil."32 Bush's born-again
articulation of Christian moral orthodoxy and its daunting expectation of strict fidelity to God's law required the nation to go it alone in Iraq as an
fear of
evildoers provides the impetus to sustain one's moral fortitude." 33
affirmation of faith. Thus the moral logic of this pivotal symbolic form perpetuated war, as Spielvogel explains, because "
America's public faith ultimately was justified by a special covenant with God, and it was to Him that the nation ultimately was accountable in
point of view, or your historical positioning (yesterdays terrorist is todays hero of the
the destruction of the World Trade Center, in which the de- struction of a globally recognizable
interest. Or they are holy sacrifices, whose innocence is precisely the point. From the
standpoint of the terrorist, their innocence makes them appropriate sac- rificial victims. From
the standpoint of counter-terror, their innocence confirms the absolute, unspeakable evil and
injustice of the terrorist cause. (There is, of course, the intermediate, compromise position
known as collateral damage, which expresses regret for the loss of innocent life, but claims
nevertheless a statistical kind of justice in unverifiable claims about the number of guilty
spectacle. Shock and awe are the tactics that unite non-state with state terror- ism, and
in both cases the traumatic spectacle can be rationalized as a humane act of restraint.
Framing Contention
1AC
Framing Contention
Independent of the success of our advocacy, the
education from our debate is a reason to vote for the
affirmative team itll trigger critical engagement with
the society that will create politics for social change
Giroux 12 [Henry, Global TV Network Chair Professorship at McMaster University in the English and
Cultural Studies Department, Beyond the Politics of the Big Lie: The Education Deficit and the New
Authoritarianism June 6, 2012 http://truth-out.org/opinion/item/9865-beyond-the-politics-of-the-big-lie-theeducation-deficit-and-the-new-authoritarianism]
contributes to a vast reserve of manipulation and self-inflicted ignorance. Our education deficit is neither reducible to the failure of particular types of
teaching nor the decent into madness by the spokespersons for the new authoritarianism. Rather, it is about how matters of knowledge, values and ideology
Close attention to the little violences produced in the structures, habituses, and
mentalites of everyday life shifts our attention to pathologies of class, race, and
gender inequalities. More important, it interrupts the voyeuristic tendencies of violence studies that risk publicly humiliating the powerless who
wartime and peacetime violence.
are often forced into complicity with social and individual pathologies of power because suffering is often a solvent of human integrity and dignity. Thus, in this anthology
we are positing a violence continuum comprised of a multitude of small wars and invisible genocides (see also Scheper- Hughes 1996; 1997; 2000b) conducted in the
normative social spaces of public schools, clinics, emergency rooms, hospital wards, nursing homes, courtrooms, public registry offices, prisons, detention centers, and
murder. We realize that in referring to a violence and a genocide continuum we are flying in the face of a tradition of genocide studies that argues for the absolute
uniqueness of the Jewish Holocaust and for vigilance with respect to restricted purist use of the term genocide itself (see Kuper 1985; Chaulk 1999; Fein 1990; Chorbajian
1999). But we hold an opposing and alternative view that, to the contrary, it is absolutely necessary to make just such existential leaps in purposefully linking violent acts
in normal times to those of abnormal times. Hence the title of our volume: Violence in War and in Peace. If (as we concede) there is a moral risk in overextending the
normative behavior by ordinary good-enough citizens. Peacetime crimes, such as prison construction sold as economic development to impoverished communities in the
mountains and deserts of California, or the evolution of the criminal industrial complex into the latest peculiar institution for managing race relations in the United States
(Waquant, Chapter 39), constitute the small wars and invisible genocides to which we refer. This applies to African American and Latino youth mortality statistics in
Oakland, California, Baltimore, Washington DC, and New York City.
These are invisible genocides not because they are secreted away or
hidden from view, but quite the opposite. As Wittgenstein observed, the things that are hardest to perceive are those which are right before our eyes and therefore taken
for granted. In this regard, Bourdieus partial and unfinished theory of violence (see Chapters 32 and 42) as well as his concept of misrecognition is crucial to our task. By
including the normative everyday forms of violence hidden in the minutiae of normal social practices - in the architecture of homes, in gender relations, in communal
work, in the exchange of gifts, and so forth - Bourdieu forces us to reconsider the broader meanings and status of violence, especially the links between the violence of
everyday life and explicit political terror and state repression, Similarly, Basaglias notion of peacetime crimes - crimini di pace - imagines a direct relationship between
naturalization border raids on illegal aliens versus the US government- engineered genocide in 1938, known as the Cherokee Trail of Tears. Peacetime crimes suggests
that everyday forms of state violence make a certain kind of domestic peace possible. Internal stability is purchased with the currency of peacetime crimes, many of
which take the form of professionally applied strangle-holds. Everyday forms of state violence during peacetime make a certain kind of domestic peace possible. It is
an easy-to-identify peacetime crime that is usually maintained as a public secret by the government and by a scared or apathetic populace. Most subtly, but no less
politically or structurally, the phenomenal growth in the United States of a new military, postindustrial prison industrial complex has taken place in the absence of broadbased opposition, let alone collective acts of civil disobedience. The public consensus is based primarily on a new mobilization of an old fear of the mob, the mugger, the
rapist, the Black man, the undeserving poor. How many public executions of mentally deficient prisoners in the United States are needed to make life feel more secure for
the affluent? What can it possibly mean when incarceration becomes the normative socializing experience for ethnic minority youth in a society, i.e., over 33 percent of
therefore, all expressions of radical social exclusion, dehumanization, depersonalization, pseudo-speciation, and reification which normalize atrocious behavior and
violence toward others. A constant self-mobilization for alarm, a state of constant hyperarousal is, perhaps, a reasonable response to Benjamins view of late modern
history as a chronic state of emergency (Taussig, Chapter 31). We are trying to recover here the classic anagogic thinking that enabled Erving Goffman, Jules Henry, C.
Wright Mills, and Franco Basaglia among other mid-twentieth-century radically critical thinkers, to perceive the symbolic and structural relations, i.e., between inmates and
patients, between concentration camps, prisons, mental hospitals, nursing homes, and other total institutions. Making that decisive move to recognize the continuum of
violence allows us to see the capacity and the willingness - if not enthusiasm - of ordinary people, the practical technicians of the social consensus, to enforce genocidal-
vulnerable have often fallen into this category of the unworthy living, as have the very old and infirm, the sick-poor, and, of course, the despised racial, religious, sexual,
and ethnic groups of the moment. Erik Erikson referred to pseudo- speciation as the human tendency to classify some individuals or social groups as less than fully
human - a prerequisite to genocide and one that is carefully honed during the unremark- able peacetimes that precede the sudden, seemingly unintelligible outbreaks of
Collective denial and misrecognition are prerequisites for mass violence and
genocide. But so are formal bureaucratic structures and professional roles. The practical technicians of everyday violence in the backlands of Northeast Brazil
mass violence.
(Scheper-Hughes, Chapter 33), for example, include the clinic doctors who prescribe powerful tranquilizers to fretful and frightfully hungry babies, the Catholic priests who
celebrate the death of angel-babies, and the municipal bureaucrats who dispense free baby coffins but no food to hungry families. Everyday violence encompasses the
implicit, legitimate, and routinized forms of violence inherent in particular social, economic, and political formations. It is close to what Bourdieu (1977, 1996) means by
symbolic violence, the violence that is often nus-recognized for something else, usually something good. Everyday violence is similar to what Taussig (1989) calls
terror as usual. All these terms are meant to reveal a public secret - the hidden links between violence in war and violence in peace, and between war crimes and
peace-time crimes. Bourdieu (1977) finds domination and violence in the least likely places - in courtship and marriage, in the exchange of gifts, in systems of
classification, in style, art, and culinary taste- the various uses of culture. Violence, Bourdieu insists, is everywhere in social practice. It is misrecognized because its very
everydayness and its familiarity render it invisible. Lacan identifies rneconnaissance as the prerequisite of the social. The exploitation of bachelor sons, robbing them of
autonomy, independence, and progeny, within the structures of family farming in the European countryside that Bourdieu escaped is a case in point (Bourdieu, Chapter 42;
see also Scheper-Hughes, 2000b; Favret-Saada, 1989). Following Gramsci, Foucault, Sartre, Arendt, and other modern theorists of power-vio- lence, Bourdieu treats direct
aggression and physical violence as a crude, uneconomical mode of domination; it is less efficient and, according to Arendt (1969), it is certainly less legitimate. While
power and symbolic domination are not to be equated with violence - and Arendt argues persuasively that violence is to be understood as a failure of power - violence, as
we are presenting it here, is more than simply the expression of illegitimate physical force against a person or group of persons. Rather, we need to understand violence as
encompassing all forms of controlling processes (Nader 1997b) that assault basic human freedoms and individual or collective survival. Our task is to recognize these
gray zones of violence which are, by definition, not obvious. Once again, the point of bringing into the discourses on genocide everyday, normative experiences of
reification, depersonalization, institutional confinement, and acceptable death is to help answer the question: What makes mass violence and genocide possible? In this
volume we are suggesting that mass violence is part of a continuum, and that it is socially incremental and often experienced by perpetrators, collaborators, bystanders and even by victims themselves - as expected, routine, even justified. The preparations for mass killing can be found in social sentiments and institutions from the family,
They harbor the early warning signs (Charney 1991), the priming (as Hinton, ed., 2002
calls it), or the genocidal continuum (as we call it) that push social consensus toward devaluing certain forms of
human life and lifeways from the refusal of social support and humane care to vulnerable social parasites (the nursing home elderly, welfare queens,
to schools, churches, hospitals, and the military.
undocumented immigrants, drug addicts) to the militarization of everyday life (super-maximum-security prisons, capital punishment; the technologies of heightened
personal security, including the house gun and gated communities; and reversed feelings of victimization).
possible.1 [
probabilities . . . .2 On Sept. 11, Americans entered a new and frightening geography, where the continents of safety and danger seemed forever shifted. Is
it safe to fly? Will terrorists wage germ warfare? Where is the line between reasonable precaution and
panic? Jittery, uncertain and assuming the worst, many people have answered these questions by forswearing air travel, purchasing gas masks and radiation
detectors, placing frantic calls to pediatricians demanding vaccinations against exotic diseases or rushing out to fill prescriptions for Cipro, an antibiotic most experts
consider an unnecessary defense against anthrax.3 I. RISKS, NUMBERS, AND REGULATION Consider the following problems: People live in a community near an
abandoned hazardous waste site. The community appears to suffer from an unusually high number of deaths and illnesses. Many members of the community fear that the
hazardous waste site is responsible for the problem. Administrative officials attempt to offer reassurance that the likelihood of adverse health effects, as a result of the site,
is extremely low.4 The reassurance is met with skepticism and distrust. An airplane, carrying people from New York to California, has recently crashed. Although the
source of the problem is unknown, many people suspect terrorism. In the following weeks, many people who would otherwise fly are taking trains or staying home. Some
of those same people acknowledge that the statistical risk is exceedingly small. Nonetheless, they refuse to fly, in part because they do not want to experience the anxiety
that would come from flying. An administrative agency is deciding whether to require labels on genetically modified food. According to experts within the agency,
genetically modified food, as such, poses insignificant risks to the environment and to human health. But many consumers disagree. Knowledge of genetic modification
triggers strong emotions, and the labeling requirement is thought likely to have large effects on consumer choice, notwithstanding expert claims that the danger is trivial.
people
tend to focus on the adverse outcome, not on its likelihood. That is, they are not closely attuned to the probability
that harm will occur. At the individual level , this phenomenon, which I shall call probability
neglect, produces serious difficulties of various sorts, including excessive worry and unjustified behavioral
changes. When people neglect probability, they may also treat some risks as if they were nonexistent, even though the
How should we understand human behavior in cases of this sort? My principal answer, the thesis of this Essay, is that when intense emotions are engaged,
likelihood of harm, over a lifetime, is far from trivial. Probability neglect can produce significant problems for law and regulation. As we shall see, regulatory agencies, no
less than individuals, may neglect the issue of probability, in a way that can lead to either indifference to real risks or costly expenditures for little or no gain. If agencies
are falling victim to probability neglect, they might well be violating relevant law.5 Indeed, we shall see that the idea of probability neglect helps illuminate a number of
judicial decisions, which seem implicitly attuned to that idea, and which reveal an implicit behavioral rationality in important pockets of federal administrative law. As we
shall also see, an understanding of probability neglect helps show how government can heighten, or dampen, public concern about hazards. Public-spirited
political actors, no less than self-interested ones, can exploit probability neglect so as to promote attention to problems
that may or may not deserve public concern. It will be helpful to begin, however, with some general background on individual and social judgments about risks. A.
Cognition On the conventional view of rationality, probabilities matter a great deal to reactions to risks. But emotions, as such, are not assessed independently; they are
not taken to play a distinctive role.6 Of course, people might be risk-averse or risk-inclined. For example, it is possible that people will be willing to pay $100 to eliminate a
1/1000 risk of losing $900. But analysts usually believe that variations in probability should matter, so that there would be a serious problem if people were willing to pay
both $100 to eliminate a 1/1000 risk of losing $900 and $100 to eliminate a 1/100,000 risk of losing $900. Analysts do not generally ask, or care, whether risk-related
dispositions are a product of emotions or something else. Of course, it is now generally agreed that in thinking about risks, people rely on certain heuristics and show
identifiable biases.7 Those who emphasize heuristics and biases are often seen as attacking the conventional view of rationality.8 In a way they are doing just that, but the
heuristicsand- biases literature has a highly cognitive focus, designed to establish how people proceed under conditions of uncertainty. The central question is this: When
people do not know about the probability associated with some risk, how do they think? It is clear that when people lack statistical information, they rely on certain
heuristics, or rules of thumb, which serve to simplify their inquiry.9 Of these rules of thumb, the availability heuristic is probably the most important for purposes of
understanding risk-related law.10 Thus, for example, a class whose instances are easily retrieved will appear more numerous than a class of equal frequency whose
instances are less retrievable.11 The point very much bears on private and public responses to risks, suggesting, for example, that people will be especially responsive to
the dangers of AIDS, crime, earthquakes, and nuclear power plant accidents if examples of these risks are easy to recall.12 This is a point about how familiarity can affect
the availability of instances. But salience is important as well. The impact of seeing a house burning on the subjective probability of such accidents is probably greater
than the impact of reading about a fire in the local paper.13 So, too, recent events will have a greater impact than earlier ones. The point helps explain much risk-related
behavior. For example, whether people will buy insurance for natural disasters is greatly affected by recent experiences.14 If floods have not occurred in the immediate
past, people who live on flood plains are far less likely to purchase insurance.15 In the aftermath of an earthquake, the proportion of people carrying earthquake insurance
rises sharplybut it declines steadily from that point, as vivid memories recede.16 For purposes of law and regulation, the problem is that the availability heuristic can
lead to serious errors of fact, in terms of both excessive controls on small risks that are cognitively available and insufficient controls on large risks that are not.17 The
cognitive emphasis of the heuristics-and-biases literature can be found as well in prospect theory, a departure from expected utility theory that explains decision under
risk.18 For present purposes, what is most important is that prospect theory offers an explanation for simultaneous gambling and insurance.19 When given the choice,
most people will reject a certain gain of X in favor of a gamble with an expected value below X, if the gamble involves a small probability of riches. At the same time, most
people prefer a certain loss of X to a gamble with an expected value less than X, if the gamble involves a small probability of catastrophe.20 If expected utility theory is
taken as normative, then people depart from the normative theory of rationality in giving excessive weight to lowprobability outcomes when the stakes are high. Indeed,
we might easily see prospect theory as emphasizing a form of probability neglect. But in making these descriptive claims, prospect theory does not specify a special role
for emotions. This is not a puzzling oversight, if it counts as an oversight at all. For many purposes, what matters is what people choose, and it is unimportant to know
whether their choices depend on cognition or emotion, whatever may be the difference between these two terms. B. Emotion No one doubts, however, that in many
domains, people do not think much about variations in probability and that emotions have a large effect on judgment and decisionmaking.21 Would a group of randomly
selected people pay more to reduce a 1/100,000 risk of getting a gruesome form of cancer than a similar group would pay to reduce a 1/200,000 risk of getting that form
of cancer? Would the former group pay twice as much? With some low-probability events, anticipated and actual emotions, triggered by the best-case or worst-case
outcome, help to determine choice. Those who buy lottery tickets, for example, often fantasize about the goods associated with a lucky outcome.22 With respect to risks of
harm, many of our ordinary ways of speaking suggest strong emotions: panic, hysteria, terror. People might refuse to fly, for example, not because they are currently
frightened, but because they anticipate their own anxiety, and they want to avoid it. It has been suggested that people often decide as they do because they anticipate
their own regret.23 The same is true for fear. Knowing that they will be afraid, people may refuse to travel to Israel or South Africa, even if they would much enjoy seeing
those nations and even if they believe, on reflection, that their fear is not entirely rational. Recent evidence is quite specific.24 It suggests that people greatly neglect
significant differences in probability when the outcome is affect richwhen it involves not simply a serious loss, but one that produces strong emotions, including fear.25
To be sure, the distinction between cognition and emotion is complex and contested.26 In the domain of risks, and most other places, emotional reactions are usually
based on thinking; they are hardly cognition-free. When a negative emotion is associated with a certain riskpesticides or nuclear power, for examplecognition plays a
central role.27 For purposes of the analysis here, it is not necessary to say anything especially controversial about the nature of the emotion of fear. The only suggestion is
that when emotions are intense, calculation is less likely to occur, or at least that form of calculation that involves assessment of risks in terms of not only the magnitude
but also the probability of the outcome. Drawing on and expanding the relevant evidence, I will emphasize a general phenomenon here: In political and market domains,
people often focus on the desirability of the outcome in question and pay (too) little attention to the probability that a good or bad outcome will, in fact, occur. It is in such
cases that people fall prey to
is especially large when people focus on the worst possible case or otherwise are subject to strong emotions. When such emotions are at work, people do not give
it is not fully
rational to treat a 1% chance of X as equivalent , or nearly equivalent, to a 99% chance of
X, or even a 10% chance of X. Because people suffer from probability neglect, and because neglecting probability is not fully rational, the phenomenon I identify raises
sufficient consideration to the likelihood that the worst case will actually occur. This is quasi-rational because, from the normative point of view,
new questions about the widespread idea that ordinary people have a kind of rival rationality superior to that of experts.29 Most of the time, experts are concerned
principally with the number of lives at stake,30 and for that reason they will be closely attuned, as ordinary people are not, to the issue of probability. By drawing attention
to probability neglect, I do not mean to suggest that most people, most of the time, are indifferent to large variations in the probability that a risk will come to fruition.
Large variations can, and often do, make a differencebut when emotions are engaged, the difference is far less than the standard theory predicts. Nor do I suggest that
probability neglect is impervious to circumstances. If the costs of neglecting probability are placed on screen, then people will be more likely to attend to the question of
probability.31 In this light it is both mildly counterintuitive and reasonable, for example, to predict that people would be willing to pay less, in terms of dollars and waiting
time, to reduce lowprobability risks of an airplane disaster if they are frequent travelers. An intriguing study finds exactly that effect.32 For similar reasons, market
pressures are likely to dampen the impact of probability neglect, ensuring that, say, risks of 1/10,000 are treated differently from risks of 1/1,000,000, even if individuals,
in surveys, show relative insensitivity to such differences. Acknowledging all this, I emphasize three central points. First, differences in probability will often affect behavior
far less than they should or than conventional theory would predict. Second, private behavior, even when real dollars are involved,33 can display insensitivity to the issue
of probability, especially when emotions are intensely engaged. Third, and most important, the demand for legal intervention can be greatly affected by probability
neglect, so that government may end up engaging in extensive regulation precisely because intense emotional reactions are making people relatively insensitive to the
(low) probability that the relevant dangers will ever come to fruition. C. Law It is not at all clear how the law should respond to probability neglect. But at a minimum, the
phenomenon raises serious legal issues in administrative law, at least under statutes banning agencies from acting unless they can show a significant risk34 or can
establish that the benefits of regulation outweigh the costs.35 If agencies are neglecting the issue of probability (perhaps because the public is doing so as well), they may
well be acting unlawfully. Indeed, the law of judicial review shows an inchoate understanding of probability neglect, treating it as a problem for which judicial invalidation is
a solution.36 The only qualification is that the relevant law remains in an embryonic state. There is much to be done, especially at the agency level, to ensure that
government is alert to the probability that harm will actually occur. Outside of the context of administrative law, an understanding of probability neglect will help us to
make better predictions about the public demand for law. When a bad outcome is highly salient and triggers strong emotions, government will be asked to do something
about it, even if the probability that the bad outcome will occur is low. Political participants of various stripes, focusing on the worst case, are entirely willing to exploit
probability neglect. Those who encourage people to purchase lottery tickets, focusing on the best case, do the same. An understanding of probability neglect
simultaneously helps show why jurors, and ordinary officials, are not likely to be moved much by a showing that before the fact, the harm was not likely to occur. For many
people, what matters is that the harm did occur, not that it was unlikely to do so before the fact. For law, many of the most difficult questions are normative in character:
Should government take account of variations in the probability that harms will occur? Should government respond to intense fears that involve statistically remote risks?
When people suffer from probability neglect, should law and policy do the same thing? At first glance, we might think that even if people are neglecting probability,
government and law at least should notthat the tort system and administrators should pay a great deal of attention to probability in designing institutions. If government
wants to insulate itself from probability neglect, it will create institutions designed to ensure that genuine risks, rather than tiny ones, receive the most concern. Such
institutions will not necessarily require agencies to discuss the worst-case scenario.37 And if government is attempting to increase public concern about a genuine danger,
it should not emphasize statistics and probabilities, but should instead draw attention to the worst-case scenario. If government is attempting to decrease public concern
with a risk that has a tiny probability of coming to fruition, it may be ineffective if it emphasizes the issue of probability; indeed, it may do better if it changes the subject or
stresses instead the affirmative social values associated with running the risk.38 On the other hand, public fear, however unwarranted, may be intractable, in the sense
that it may be impervious to efforts at reassurance. And if public fear is intractable, it will cause serious problems, partly because fear is itself extremely unpleasant and
partly because fear is likely to influence conduct, possibly producing wasteful and excessive private precautions. If so, a governmental response, via regulatory safeguards,
a
key question is whether people can imagine or visualize the worst-case outcome.39 When the
worst case produces intense fear, surprisingly little role is played by the stated probability that that outcome will occur.40 An important function of strong
emotions is thus to drive out quantitative judgments, including judgments about probability, by
making the best case or the worst case seem highly salient.41 But it is important to note that probability neglect can occur even
would appear to be justified if the benefits, in terms of fear reduction, justify the costs. II. PROBABILITY NEGLECT: THE BASIC PHENOMENON When it comes to risk,
when emotions are not involved. A great deal of evidence shows that whether or not emotions are involved, people are relatively insensitive to differences in probabilities,
at least when the relevant probabilities are low. A. Insensitivity to Variations Among Low Probabilities Do people care about probability at all? Of course they do; a risk of
1/100,000 is significantly less troublesome than a risk of 1/1000. But many people, much of the time, show a remarkable unwillingness to attend to the question of
probability. Several studies show that when people are seeking relevant information, they often do not try to learn about probability at all. One study, for example, finds
that in deciding whether to purchase warranties for consumer products, people do not spontaneously point to the probability of needing repair as a reason for the
purchase.42 Another study finds that those making hypothetical, risky managerial decisions rarely ask for data on probabilities.43 Or consider a study involving children
and adolescents,44 in which the following question was asked: Susan and Jennifer are arguing about whether they should wear seat belts when they ride in a car. Susan
says that you should. Jennifer says you shouldnt . . . . Jennifer says that she heard of an accident where a car fell into a lake and a woman was kept from getting out in
time because of wearing her seat belt . . . . What do you think about this?45 In answering that question, many subjects did not think about probability at all.46 One
exchange took the following form: A: Well, in that case I dont think you should wear a seat belt. Q (interviewer): How do you know when thats gonna happen? A: Like, just
hope it doesnt! Q: So, should you or shouldnt you wear seat belts? A: Well, tell-you-the-truth we should wear seat belts. Q: How come? A: Just in case of an accident. You
wont get hurt as much as you will if you didnt wear a seat belt. Q: Ok, well what about these kinds of things, when people get trapped? A: I dont think you should, in that
case.47 These answers might seem odd and idiosyncratic, but we might reasonably suppose that some of the time, both children and adults focus primarily on bad
scenarios, without thinking a great deal about the question of probability. Many studies find that significant differences in low probabilities have little impact on decisions.
This finding is in sharp conflict with the standard view of rationality, which suggests that peoples willingness to pay for small risk reductions ought to be nearly
proportional to the size of the reduction.48 Perhaps these findings reflect peoples implicit understanding that in these settings, the relevant probability is low, but not
zero, and that finer distinctions are unhelpful. (What does a risk of 1/100,000 really mean? How different is it, for an individual, from a risk of 1/20,000 or 1/600,000?) In
an especially striking study, Kunreuther and his coauthors found that mean willingness to pay insurance premiums did not vary among risks of 1/100,000, 1/1,000,000, and
1/10,000,000.49 They also found basically the same willingness to pay for insurance premiums for risks ranging from 1/650, to 1/6300, to 1/68,000.50 The study just
described involved a between subjects design; subjects considered only one risk, and the same people were not asked to consider the various risks at the same time.
Low probabilities are not likely to be terribly meaningful to most people, but most educated people would know that a 1/100,000 risk is worse than 1/1,000,000 risk. When
low-probability risks are seen in isolation and are not assessed together, we have an example of the problem of evaluability.51 For most people, most of the time, it is
very difficult to evaluate a low probability, and hence isolated decisions will pick up small or no variations between peoples assessments of very different risks. But several
studies have a within subjects design, exposing people simultaneously to risks of different probabilities, and even here, the differences in probabilities have little effect
on decisions. An early study examined peoples willingness to pay (WTP) to reduce various fatality risks. The central finding was that the mean WTP to reduce such risks
was, for over 40% of the respondents, unaffected by a large variation in the probability of harm, even though expected utility theory would predict significant effects from
such variations.52 A later study found that for serious injuries, WTP to reduce the risk by 12/100,000 was only 20% higher than WTP to reduce the same risk by 4/100,000,
even though standard theory would predict a WTP three times as high.53 These results are not unusual. Lin and Milon attempted to elicit peoples willingness to pay to
reduce the risk of illness from eating oysters.54 There was little sensitivity to variations in probability of illness.55 Another study found little change in WTP across
probability variations involving exposure to pesticide residues on fresh produce.56 A similar anomaly was found in a study involving hazardous wastes, where WTP actually
decreased as the stated fatality risk reduction increased.57 There is much to say about the general insensitivity to significant variations within the category of lowprobability events. It would be difficult to produce a rational explanation for this insensitivity; recall the standard suggestion that WTP for small risk reductions should be
roughly proportional to the size of the reduction.58 Why dont people think in this way? An imaginable explanation is that in the abstract, most people simply do not know
how to evaluate low probabilities. A risk of 7/100,000 seems small; a risk of 4/100,000 also seems small.59 Most people would prefer a risk of 4/100,000 to a risk of
7/100,000, and I have noted that joint evaluation improves evaluability, which would otherwise be extremely difficult.60 But even when the preference is clear, both risks
seem small, and hence it is not at all clear that a proportional increase in WTP will follow. As suggested by the findings of Kunreuther and his coauthors, it is likely that in
a between-subjects design, WTP to eliminate a risk of 4/100,000 would be about the same as WTP to eliminate a risk of 7/100,000, simply because the small difference
would not matter when each risk is taken in isolation.
the
threat of World War III has almost faded into nothingness . That is, the probability
of a world war is the lowest it has been in decades, and perhaps the lowest it has ever been
since the dawn of modernity. This is certainly a view that current data supports. Steven
Pinker's studies into the decline of violence reveal that deaths from war have
in the shadow of a flare up which some are calling a new Cold War between Russia and the U.S. I believe
fallen and fallen since World War II. But we should not just assume that the past is an accurate guide
to the future. Instead, we must look at the factors which have led to the reduction in war and try to conclude whether the
what's changed? Well, the first big change after the last world war
was the arrival of mutually assured destruction. It's no coincidence that the
end of the last global war coincided with the invention of atomic weapons.
The possibility of complete annihilation provided a huge disincentive to
launching and expanding total wars. Instead, the great powers now fight
proxy wars like Vietnam and Afghanistan (the 1980 version, that is), rather than letting
their rivalries expand into full-on, globe-spanning struggles against each
other. Sure, accidents could happen, but the possibility is incredibly remote. More importantly, nobody in
power wants to be the cause of Armageddon . But what about a non-nuclear
global war? Other changes economic and social in nature have made
that highly unlikely too. The world has become much more economically
interconnected since the last global war. Economic cooperation treaties and
free trade agreements have intertwined the economies of countries around
the world. This has meant there has been a huge rise in the volume of global trade since World War II, and especially
since the 1980s. Today consumer goods like smartphones, laptops, cars, jewelery, food, cosmetics, and medicine are
produced on a global level, with supply-chains criss-crossing the planet . An
decrease in war is sustainable. So
example: The laptop I am typing this on is the cumulative culmination of thousands of hours of work, as well as resources
and manufacturing processes across the globe. It incorporates metals like tellurium, indium, cobalt, gallium, and
manganese mined in Africa. Neodymium mined in China. Plastics forged out of oil, perhaps from Saudi Arabia, or Russia,
or Venezuela. Aluminum from bauxite, perhaps mined in Brazil. Iron, perhaps mined in Australia. These raw materials are
turned into components memory manufactured in Korea, semiconductors forged in Germany, glass made in the United
States. And it takes gallons and gallons of oil to ship all the resources and components back and forth around the world,
In a global
war, global trade becomes a nightmare. Shipping becomes more expensive
due to higher insurance costs, and riskier because it's subject to seizures,
blockades, ship sinkings. Many goods, intermediate components or resources including energy supplies
until they are finally assembled in China, and shipped once again around the world to the consumer.
like coal and oil, components for military hardware, etc, may become temporarily unavailable in certain areas. Sometimes
such as occurred in the Siege of Leningrad during World War II the supply of food can be cut off. This is why countries
These kinds of
breakdowns were troublesome enough in the economic landscape of the
early and mid-20th century, when the last global wars occurred. But in
today's ultra-globalized and ultra-specialized economy? The level of economic
adaptation even for large countries like Russia and the United States with lots of land and natural resources
required to adapt to a world war would be crushing, and huge numbers of business and
livelihoods would be wiped out. In other words, global trade interdependency has become , to
borrow a phrase from finance, too big to fail.
hold strategic reserves of things like helium, pork, rare earth metals and oil, coal, and gas.
Donald Kennedy. Today he edits Science , the nation's major arbiter of climate science--and policy. Below, a case illustrating the mid-range of the ~.7 to ~1.6
degree C maximum cooling the 2006 studies suggest is superimposed in color on the Blackly Apocalyptic predictions published in Science Vol. 222, 1983 .
They're worth comparing, because the range of soot concentrations in the new models overlaps with cases assumed to have dire climatic consequences in the
firm - Porter Novelli Inc. Yet Sagan predicted "the extinction of the human species " as temperatures plummeted 35 degrees C and the world froze in the
aftermath of a nuclear holocaust. Last year, Sagan's cohort tried to reanimate the ghost in a machine anti-nuclear activists invoked in the depths of the Cold
War, by re-running equally arbitrary scenarios on a modern interactive Global Circulation Model. But the Cold War is history in more ways than one. It is a
simulations
that they
once taken by policy analysts who ought to have known better. Many were taken aback by the sheer force of Sagan's rhetoric Remarkably, Science's news
coverage of the new results fails to graphically compare them with the old ones Editor Kennedy and other recent executives of the American Association for
easy to ignore. Their past mastery of semantic agression cannot spare the authors of "Nuclear Winter Lite " direct comparison of their new results and their
Dark smoke clouds in the lower atmosphere don't last long enough to spread across the globe.
Cloud droplets and rainfall remove them. rapidly washing them out of the sky in a matter of days to
old.
weeks- not long enough to sustain a global pall. Real world weather brings down particles much as soot is scrubbed out of power plant smoke by the water
sprays in smoke stack scrubbers Robock acknowledges this- not even a single degree of cooling results when soot is released at lower elevations in he
models . The workaround is to inject the imaginary aerosol at truly Himalayan elevations - pressure altitudes of 300 millibar and higher , where the computer
The
new studies like the old suffer from the disconnect between a desire to paint the sky
black and the vicissitudes of natural history. As with many exercise in worst case models both at invoke rare phenomena
as commonplace, claiming it prudent to assume the worst . But the real world is subject to Murphy's lesser known second lawif everything must go wrong, don't bet on it. In 2006 as in 1983 firestorms and forest fires that send smoke into the
stratosphere rise to alien prominence in the modelers re-imagined world , but i the real one remains a
very different place, where though every month sees forest fires burning areas the size of cities - 2,500
hectares or larger , stratospheric smoke injections arise but once in a blue moon . So how come these neomodel's vertical transport function modules pass it off to their even higher neighbors in the stratosphere , where it does not rain and particles linger..
nuclear winter models feature so much smoke so far aloft for so long?
Extensions
. But
Actually,
: the pressure to grow cash crops of sugar, tobacco and so on would be reduced, and we would no longer witness fresh fish being airfreighted from Bangladesh to
Europe.
In political terms,
[9] -
strategy and practice with other movements such as the feminist movement, the workers' control movement and the environmental movement. A focus on nuclear extinction also encourages a focus on appealing
to elites as the means to stop nuclear war, since there seems no other means for quickly overcoming the danger. For example, Carl Sagan, at the end of an article about nuclear winter in a popular magazine,
. This has been amply illustrated by the continual failure of disarmament negotiations and
Utilitarianism is Bad
Utilitarianism is a flawed system. It is impossible to
measure and to predict the benefits and/or harms
resulting from a course of action or a moral rule.
McCarthy and Lysaught 7
utilitarianism,
has no way to
objectively determine the nature, importance, and value of consequences. To
put it another way: How do we know what are good and bad consequences? What consequences
count most? Whose opinion of what are good consequences and what are
bad consequences counts most? Failure to give coherent and rational
criterion for answering such questions spells decisive defeat for the whole
theory of exclusive utilitarianism. It seems to need something else to help it out. That is why I
articulation and creative names. They run as follows: The Inevitability of Arbitrariness It
personally think that the utilitarian factor is legitimate when considered as part of the picture, but exclusive utilitarianism
Contrary IntuitionIt
often undermines our common sense and moral intuitions, often demanding
certain actions that rub our conscience the wrong way. For example, what if I knew I could
always leads to arbitrary judgment of consequences, and therefore arbitrary ethics. The
cheat on my wife with my female boss without her ever finding out in order to get a raise, which would have good
consequences for my family (less financial stress, my wife could cut back to part time to spend more time with the kids,
the kids could benefit from more parental care, I could save more money for the kids for college, etc.)? My gut tells me:
out to be a blessing in disguise? We get fired only to later realize that the new job we attain as a
consequence pays better and is more enjoyable. On the flip side ,
sometimes we think
something is going to turn out great, but in the end is a big letdown . If these
small scale experiences in the lives of ordinary people demonstrate how difficult it is to know the
consequences of certain actionshow much more difficult must it be for people whose decisions effect an
entire nation (e.g. the President) to judge the full weight of the consequences of their decisions?
Among the
justifications that have been put forward for President Harry Trumans
decision to use the bomb, only one is worth taking seriously -- that it saved lives. The
alternative, the reasoning goes, was to launch an invasion. Truman claimed in his
memoirs that this would have cost another half a million American lives . Winston
soldiers, the great majority were noncombatants -- women, children, the aged.
Churchill put the figure at a million. Revisionist historians have cast doubt on such numbers. Wartime
documents suggest that military planners expected around 50,000 American combat deaths in an
invasion. Still, when Japanese casualties, military and civilian, are taken into account, the overall invasion
death toll on both sides would surely have ended up surpassing that from Hiroshima and Nagasaki.
Scholars will continue to argue over whether there were other, less catastrophic ways to force Tokyo to
surrender. But given the fierce obstinacy of the Japanese militarists, Truman and his advisers had some
grounds for believing that nothing short of a full-scale invasion or the annihilation of a big city with an
tradition, one rooted in Judeo-Christian theology, that takes a quite different view. The gist of it is
expressed by St. Pauls condemnation of those who say, Let us do evil, that good may come. Some
actions, this tradition holds, can never be justified by their consequences; they are absolutely forbidden. It
is always wrong to boil a baby even if lives are saved thereby. Applying this absolutist morality to war can
be tricky. When enemy soldiers are trying to enslave or kill us, the principle of self-defense permits us to
kill them (though not to slaughter them once they are taken prisoner). But what of those who back them?
During World War II, propagandists made much of the indivisibility of modern warfare: the idea was that
since the enemy nations entire economic and social strength was deployed behind its military forces, the
whole population was a legitimate target for obliteration. There are no civilians in Japan, declared an
intelligence officer of the Fifth Air Force shortly before the Hiroshima bombing, a time when the Japanese
were popularly depicted as vermin worthy of extermination. The boundary between combatant and
noncombatant can be fuzzy, but the distinction is not meaningless, as the case of small children makes
clear. Yet is wartime killing of those who are not trying to harm us always tantamount to murder? When
naval dockyards, munitions factories and supply lines are bombed, civilian carnage is inevitable. The
absolutist moral tradition acknowledges this by a principle known as double effect: although it is always
wrong to kill innocents deliberately, it is sometimes permissible to attack a military target knowing some
noncombatants will die as a side effect. The doctrine of double effect might even justify bombing a hospital
where Hitler is lying ill. It does not, however, apply to Hiroshima and Nagasaki. Transformed into hostages
by the technology of aerial bombardment, the people of those cities were intentionally executed en masse
to send a message of terror to the rulers of Japan. The practice of ordering the massacre of civilians to
bring the enemy to heel scarcely began with Truman. Nor did the bomb result in casualties of a new order
of magnitude. The earlier bombing of Tokyo by incendiary weapons killed some 100,000 people.
What
Hiroshima and Nagasaki did mark, by the unprecedented need for rationalization they
presented, was the triumph of utilitarian thinking in the conduct of war. The
conventional code of noncombatant immunity -- a product of several centuries of ethical progress among
nations, which had been formalized by an international commission in the 1920s in the Hague -- was
swept away. A simpler axiom took its place: since war is hell, any means necessary may be used to end, in
Churchills words, the vast indefinite butchery. It is a moral calculus that, for all its logical consistency,
offends our deep-seated intuitions about the sanctity of life -- our conviction that a person is always to be
utilitarian calculations
are susceptible to bad-faith reasoning: tinker with the numbers enough and
virtually any atrocity can be excused in the national interest . In January, the world
treated as an end, never as a means. Left up to the warmakers, moreover,
commemorated the 50th anniversary of the liberation of Auschwitz, where mass slaughter was committed
as an end in itself -- the ultimate evil. The moral nature of Hiroshima is ambiguous by contrast. Yet in the
postwar era, when governments do not hesitate to treat the massacre of civilians as just another strategic
No Risk of Wars
No Risk of Great Power Wars
Goldstein, 9/10- 11 (Joshua- professor emeritus of international
relations at American University and author of the forthcoming book
winning the war on war, Think Again: War, Foreign Affairs)
the last decade has seen fewer war
deaths than any decade in the past 100 years, based on data
compiled by researchers Bethany Lacina and Nils Petter Gleditsch
of the Peace Research Institute Oslo. Worldwide, deaths caused
directly by war-related violence in the new century have averaged
about 55,000 per year, just over half of what they were in the
1990s (100,000 a year), a third of what they were during the Cold War
(180,000 a year from 1950 to 1989), and a hundredth of what they were in
World War II. If you factor in the growing global population, which
has nearly quadrupled in the last century, the decrease is even sharper. Far
from being an age of killer anarchy, the 20 years since the Cold War ended
have been an era of rapid progress toward peace.Armed conflict has
declined in large part because armed conflict has fundamentally
changed. Wars between big national armies all but disappeared
along with the Cold War, taking with them the most horrific kinds
of mass destruction. Today's asymmetrical guerrilla wars may be
intractable and nasty, but they will never produce anything like
the siege of Leningrad. The last conflict between two great
powers, the Korean War, effectively ended nearly 60 years ago. The last sustained
territorial war between two regular armies, Ethiopia and Eritrea,
ended a decade ago. Even civil wars, though a persistent evil, are less
common than in the past; there were about a quarter fewer in
2007 than in 1990. If the world feels like a more violent place than
it actually is, that's because there's more information about wars
-- not more wars themselves. Once-remote battles and war crimes
now regularly make it onto our TV and computer screens, and in
more or less real time. Cell-phone cameras have turned citizens
into reporters in many war zones. Societal norms about what to
make of this information have also changed. As Harvard University
psychologist Steven Pinker has noted, "The decline of violent
behavior has been paralleled by a decline in attitudes that
tolerate or glorify violence," so that we see today's atrocities -though mild by historical standards -- as "signs of how low our
behavior can sink, not of how high our standards have risen."
So far they haven't even been close. In fact,
weapons, complex economic interdependence, the spread of democracy, or , as many scholars believe,
then maybe we should be, too. Overall, as the table below shows, international and internal conflicts
has steadily declined since the end of the cold war. Despite perceptions that the current wars on
terror and in Iraq may have created, the world is a much safer place that it was in prior generations.
every continent. At the beginning of 2008, the only conflict raging in the entire western
hemisphere was the ongoing civil war in Colombia, but even that was far less sever than it was a
threat of interstate conflict. The situations in Bosnia and Kosovo were not settled, but they were at
1990s they had to be shamed into intervention, and were on the same side when they did. The entire
Pacific Rim was currently experiencing no armed conflict. Even in the Middle East, where Iraq continued
to burn, a tenuous peace was holding between Arabs and Israelis, terrorism not withstanding, and no
other wars seemed imminent. This trend was even visible in Africa where , despite
a variety of ongoing serious challenges, levels of conflict were the lowest they have ever been in the
centuries of written history we have about the continent. Darfur and the Congo were the only real
extended tragedies still underway; the intensity of the internal conflicts simmering in Algeria, Somalia,
Senegal, and a couple of other places is in all cases lower than a decade ago. This can all change quite
rapidly Ethiopia and Eritrea might soon decide to renew their pointless fighting over uninhabitable
land, for instance, or Kenya could melt down into chaos but right now, the continent seems more
stable than it has ever been. West Africa is quiet, at least for the moment, as is all of
Southern Africa, despite the criminally negligent governance of Robert Mugabe in Zimbabwe. None of
this is to suggest that these places are without problems, of course. But given the rapid increase in the
world population and number of countries (the League of Nations had 63 members at its peak between
the wars, while the United Nations currently has 192), one might expect a great deal more warfare than
occasional peaceful periods (and it would be by far the most remarkable such period ever), or
that are often not even on the map." (8) Among other things, what this
sovereigntist abstraction accomplishes is simple: the loss of lives during
encounters between states and nonsovereign entities is of no consequence. It
needs to be mentioned that the overwhelming number of these casualties
were either brown or black, while sovereignty remained lily-white. The
overwhelming discursive logic of the discipline is oriented toward securing
the state against any other forms of belonging. (9)
Counter Terrorism
Advantage
1AC
ISIS attack by July 4th and We Arent Ready
By Sandy Fitzgerald | Sunday, 21 Jun 2015 Newsmax.com
http://www.newsmax.com/Newsfront/Devin-Nunes-terrorist-threathigh/2015/06/21/id/651553/#ixzz3eI9aS0Ho Rep. Nunes: US Facing the
'Highest Threat Level We Have Ever Faced'
The United States is facing the "highest threat level we have ever faced"
because of the growing number of foreign fighters entering and leaving Iraq and
Syria and online radicalization of young people , House Intelligence Committee Devin Nunes
said Sunday, pointing out that federal officials do not know how many have traveled to the Middle East to
fight with the Islamic State. "They're
it's something we are not only unprepared [for], we are also not
used to it in this country." FBI Director James Comey has already said there are cases open all
radicalized,
over the country concerning ISIS, and Nunes said Sunday the warnings are especially vital with the July 4
investigation has already led to the arrest of New York college student Munther Omar Saleh, who is being
accused of being an alleged fervent supporter of ISIS, and that he had offered to translate the group's
propaganda into English. Nunes said Sunday he is concerned that it will not be easy to protect Americans
Hersh that a walk-in informant tipped the United States off to the location of Osama bin Laden before the
American military killed him. "I can't tell you that somebody didn't walk into a station somewhere and say
'I know where Osama bin Laden is.'" Morell said. "But I can guarantee you that no one walk in ever
provided information that actually led us to Osama bin Laden."
eliminated funding for a Justice Department program that provides anti-terrorism training and resources to
thousands of law enforcement officers. The FBI acknowledges the agency turned its attention to foreign
terrorists after 9/11. Our efforts today remain very heavily focused in the area of the international
terrorism threat, but we have an active domestic terrorism program as well, said spokesman Paul
Bresson. Over the course of time, it has been critical for the FBI to be agile to respond to all emerging
threats, regardless of where they originate. And that is what we have done extremely well over our 107-
nation from all threats, whether foreign or homegrown, and regardless of the ideology that motivates its
violence, S.Y. Lee said in an email last month. The agency does not concentrate on any particular group
Yet all the while, those who monitor domestic terrorism say
the threat continues to mount. We are five years into the largest
resurgence of right-wing extremism that weve had since the 1990s, said
Mark Pitcavage, director of investigative research for the Anti-Defamation
League, which trains more than 10,000 law enforcement officers a year about
domestic terrorism, extremism and hate crimes. From 2009 through July 2014, Pitcavage said,
authorities were involved in 46 shootouts with domestic extremists. Wh en it comes to domestic
extremism, what tends to happen is that a lot of it goes under the radar, and a
or ideology, Lee said.
lot including murders and what you would think would be major incidents only gets reported locally
and regionally, Pitcavage said. So unless it happens in your backyard, the average American doesnt
quite realize how much of this is happening.
Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences have been
held on this threat with participation of Russian organizations, including IMEMO and the Institute of U.S. and Canadian
Studies. Recommendations on how to combat the threat have been issued by the International Luxembourg Forum on
Preventing Nuclear Catastrophe, Pugwash Conferences on Science and World Affairs, Russian-American Elbe Group, and
other organizations. The UN General Assembly adopted the International Convention for the Suppression of Acts of
Nuclear Terrorism in 2005 and cooperation among intelligence services of leading states in this sphere is developing. At
the same time, these
efforts fall short for a number of reasons, partly because various acts of
nuclear terrorism are possible. Dispersal of radioactive material by detonation of
conventional explosives (dirty bombs) is a method that is most accessible for terrorists.
With the wide spread of radioactive sources, raw materials for such attacks have become
much more accessible than weapons-useable nuclear material or nuclear weapons. The use
of dirty bombs will not cause many immediate casualties, but it will result into long-term
radioactive contamination, contributing to the spread of panic and socio-economic
destabilization . Severe consequences can be caused by sabotaging nuclear power
plants, research reactors, and radioactive materials storage facilities. Large cities are
especially vulnerable to such attacks. A large city may host dozens of research reactors
with a nuclear power plant or a couple of spent nuclear fuel storage facilities and dozens
of large radioactive materials storage facilities located nearby. The past few years have seen
significant efforts made to enhance organizational and physical aspects of security at facilities, especially at nuclear power
plants. Efforts
have also been made to improve security culture. But these efforts do not
preclude the possibility that well-trained terrorists may be able to penetrate
nuclear facilities . Some estimates show that sabotage of a research reactor in a
metropolis may expose hundreds of thousands to high doses of radiation. A formidable
part of the city would become uninhabitable for a long time . Of all the scenarios, it is building
an improvised nuclear device by terrorists that poses the maximum risk. There are no
engineering problems that cannot be solved if terrorists decide to build a
simple gun-type nuclear device. Information on the design of such devices, as
well as implosion-type devices, is available in the public domain. It is the acquisition of weaponsgrade uranium that presents the sole serious obstacle. Despite numerous preventive measures taken, we cannot rule out
the possibility that such
nuclear terrorist attack will make the public accept further measures meant to enhance
control even if these measures significantly restrict the democratic liberties they are
accustomed to. Authoritarian states could be expected to adopt even more restrictive
measures. If a nuclear terrorist act occurs, nations will delegate tens of thousands of their secret
services best personnel to investigate and attribute the attack. Radical Islamist groups
are among those capable of such an act. We can imagine what would happen if they do so, given the
anti-Muslim sentiments and resentment that conventional terrorist attacks by Islamists
have generated in developed democratic countries. Mass deportation of the nonindigenous population and severe sanctions would follow such an attack in what will
cause violent protests in the Muslim world. Series of armed clashing terrorist
attacks may follow. The prediction that Samuel Huntington has made in his book
The Clash of Civilizations and the Remaking of World Order may come true. Huntingtons
book clearly demonstrates that it is not Islamic extremists that are the cause of the Western worlds problems. Rather
This is
especially dangerous for Russia because these fault lines run across its territory. To sum it
there is a deep, intractable conflict that is rooted in the fault lines that run between Islam and Christianity.
up, the political leadership of Russia has every reason to revise its list of factors that could undermine strategic stability.
BMD does not deserve to be even last on that list because its effectiveness in repelling massive missile strikes will be
extremely low. BMD systems can prove useful only if deployed to defend against launches of individual ballistic missiles or
groups of such missiles. Prioritization of other destabilizing factorsthat could affect global and regional stabilitymerits
a separate study or studies. But even without them I can conclude that nuclear terrorism should be placed on top of the
list.
attack would lead to a radical transformation of the global order . All of the threats
on the revised list must become a subject of thorough studies by experts. States need to work hard to forge a common
understanding of these threats and develop a strategy to combat them.
some sort of terrorist attack , and especially an act of nuclear terrorism, could
precipitate a chain of events leading to a massive exchange of nuclear weapons between
two or more of the states that possess them. In this context, todays and tomorrows terrorist groups might assume the place
allotted during the early Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks of a
catalytic nuclear war between the superpowers started by third parties. These risks were
separable. It is just possible that
considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 problem. It may require a
considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a
massive inter-state nuclear war. For example, in the event of a terrorist nuclear attack on the United States, it might well be wondered just
how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most
obvious state sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of
terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example,
how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from
Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear
material to a particular country might not be a case of science fiction given the observation by Michael May et al. that while the debris
resulting from a nuclear explosion would be spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and
collectable, and a wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials used and, most
important some indication of where the nuclear material came from.41 Alternatively, if the act of nuclear terrorism came as a complete
surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift
immediately to state possessors. Ruling out Western ally countries like the United Kingdom and France, and probably Israel and India as
well, authorities in Washington would be left with a very short list consisting of North Korea, perhaps Iran if its program continues, and
possibly Pakistan. But at
what stage would Russia and China be definitely ruled out in this high stakes game of
nuclear Cluedo? In particular , if the act of nuclear terrorism occurred against a backdrop of existing
tension in Washingtons relations with Russia and/or China, and at a time when threats had already been traded
between these major powers, would officials and political leaders not be tempted to assume the
worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of
limited armed conflict with Russia and/or China, or if they were confronting each other from a distance in a proxy war, as unlikely as these
developments may seem at the present time. The reverse might well apply too: should a nuclear terrorist attack occur in Russia or China
during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that
might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? Washingtons
early
response to a terrorist nuclear attack on its own soil might also raise the possibility of an unwanted (and
nuclear aided) confrontation with Russia and/or China. For example, in the noise and confusion during the
immediate aftermath of the terrorist nuclear attack, the U.S. president might be expected to place
the countrys armed forces, including its nuclear arsenal, on a higher stage of alert. In such a tense
environment, when careful planning runs up against the friction of reality, it is just possible that Moscow and/or
China might mistakenly read this as a sign of U.S. intention s to use force (and possibly nuclear
force) against them. In that situation, the temptations to preempt such actions might grow, although it must be admitted
that any preemption would probably still meet with a devastating response. As part of its initial response to the act of nuclear terrorism (as
discussed earlier) Washington might decide to order a significant conventional (or nuclear) retaliatory or disarming attack against the
leadership of the terrorist group and/or states seen to support that group. Depending on the identity and especially the location of these
targets, Russia and/or China might interpret such action as being far too close for their comfort, and potentially as an infringement on their
spheres of influence and even on their sovereignty. One far-fetched but perhaps not impossible scenario might stem from a judgment in
Washington that some of the main aiders and abetters of the terrorist action resided somewhere such as Chechnya, perhaps in connection
with what Allison claims is the Chechen insurgents long-standing interest in all things nuclear.42 American pressure on that part of the
world would almost certainly raise alarms in Moscow that might require a degree of advanced consultation from Washington that the latter
found itself unable or unwilling to provide. There is also the question of how other nuclear-armed states respond to the act of nuclear
terrorism on another member of that special club. It could reasonably be expected that following a nuclear terrorist attack on the United
States, bothRussia and China would extend immediate sympathy and support to Washington and would work alongside the United States in
the Security Council. But there is just a chance, albeit a slim one, where the support of Russia and/or China is less automatic in some cases
than in others. For example, what would happen if the United States wished to discuss its right to retaliate against groups based in their
territory? If, for some reason, Washington found the responses of Russia and China deeply underwhelming, (neither for us or against us)
might it also suspect that they secretly were in cahoots with the group, increasing (again perhaps ever so slightly) the chances of a major
exchange. If the terrorist group had some connections to groups in Russia and China, or existed in areas of the world over which Russia and
China held sway, and if Washington felt that Moscow or Beijing were placing a curiously modest level of pressure on them, what conclusions
might it then draw about their culpability.
design an organism de novo that never existed before. While there is no known articulated threat, this is something that
we feel is a technology or science that potentially can be misused, either accidentally or on purpose."
on either side of the Atlantic, cited in the report of the Legal Affairs and Human Rights Committee,
. Jim Sensenbrenner, a veteran Republican member of Congress, pointed out that the
bigger haystack makes it harder to find the needle. And Thomas Drake, a former NSA executive turned critic, said that
An analysis of the Boston marathon bombing in April 2013 showed that alarm signals pointing to the future perpetrator were lost in a mass of alerts generated by tactics that threw the
. In both the Boston and Paris cases, the perpetrators had been on the
radar of the authorities for some time, but the relevant intelligence was not followed up properly because it was drowned in a mass of data
improve its intelligence capabilities, hire more linguists and elevate the stature of its analysts to counter the rapidly evolving threats to the United States, according to a
urgently to be addressed to meet growing and increasingly complex national security threats, from adaptive and increasingly tech-savvy terrorists, more brazen computer
hackers and more technically capable, global cyber syndicates, the report said. The 2004 report of the national Sept. 11 Commission and subsequent reviews called for
report said the F.B.I. needed more translators, it was much less critical of the bureaus foreign language ability than previous reports were. Many of the reports
recommendations related to issues that the F.B.I.s director, James B. Comey, has raised since he took over the bureau in September 2013. For instance, Mr. Comey has
the F.B.I.s transformation from a law enforcement agency to an intelligence operation. Last year, he
created a high-level executive position to oversee a branch division
meant to expand the use of intelligence across all investigations. He has
also said that raising the profile of analysts, and strengthening their
relationships with agents, are among his chief priorities. I think this is a moment of pride
for the F.B.I., Mr. Comey said Wednesday at a news conference in Washington. An outside group of some of our nations most important leaders and
thinkers has stared hard at us and said, You have done a great job at transforming yourself.
said that one of his biggest priorities is continuing
Theyve also said what Ive said around the country: Its not good enough. He added, There are a lot of ways you can be even better. The review commission was
created by Congress in 2014 to assess the bureaus progress since the attacks. In particular, the panel examined the extent to which the F.B.I. had put into effect the
principal authors of the report were Bruce Hoffman, a professor of security studies at Georgetown University; Edwin Meese III, the former attorney general; and Timothy J.
Roemer, a former House member from Indiana and former ambassador to India. The panel was particularly critical of how the F.B.I. treats its analysts. It said that despite
its stated intentions to address concerns from its analysts, the bureau did not regard them as a professional work force that needed to be continually trained and
Looking ahead, the F.B.I. will be increasingly dependent upon all domestic and
foreign partnerships to succeed in its critical and growing national security missions including against the rapidly evolving cyber and terrorist threats, the report said.
fusion
centers often produced irrelevant, useless or inappropriate intelligence
reporting to DHS and many produced no intelligence reporting whatsoever
fusion centers were not meaningfpully contributing to
counterterrorism measures and may have even been harming efforts
the fusion centers serve
cities or regions already covered by 104 FBI Joint Terrorism Task Forces (JTTFs)
and 56 Field Intelligence Groups (FIGs), which play a similar role to that of
fusion centers. This broad duplication of efforts results in an inefficient and
counterproductive use of counterterrorism funds.
in this direction, DHSs role in the intelligence and information-sharing arenas remain limited. In 2012, the Senate Homeland Security and Government Affairs Committee found that
. It also
also show fusion centers to have mixed results.[2] Meant to serve as hubs of sharing between federal, state, and local officials,
78
often
[3]
In 2013, the DHS Inspector General (IG) reported that DHSs Homeland
Security Information Network (HSIN)designed to share sensitive but not classified information with federal, state, local government, and private-sector partnerswas only being used by a small percentage of all
potential partners. State and local officials stated that one reason for not using HSIN was that the system content was not useful.[4] Since the IG report came out, however, HSIN has successfully migrated to an
updated system and is seeking to add desired content from DHS components.[5] At around 40,000 active users at the end of 2013, HSIN is far short of its 2015 objective of 130,000.[6] Furthermore, a RAND report
sponsored by DHS found that HSIN was only a somewhat useful source of information.[7]
fusion centers are alike, it is difficult to make generalized statements about them. Clearly not all fusion
centers are engaging in improper intelligence activities and not all fusion center operations raise civil
explains what fusion centers are, and how and why they were created. It details potential problems fusion
centers present to the privacy and civil liberties of ordinary Americans, including: Ambiguous Lines of
http://www.networkworld.com/article/2223243/microsoft-subnet/fusioncenters-don-t-find-terrorists--filled-with--crap--that-violates-privacy.html]
Another chapter on how-it-hindered counterterrorism cited an example of the
"Russian 'cyberattack' in Illinois" where the hacker allegedly cracked into the
utility control system. According to the red-alert fusion center report, the
hacker "sent commands which caused a water pump to burn out." The
Department of Defense said such cyberattacks would be treated as "acts of
war" and the FBI launched an investigation. However, according to the report:
"In truth, there was no intrusion, and DHS investigators eventually concluded
as much. The so-called "intrusion" from Russia was actually an incident of
legitimate remote computer access by a U.S. network technician who was
working while on a family vacation. Almost no part of the initial reports of the
incident had been accurate - not the fusion center report, or DHS's own
intelligence report, or its intelligence briefing. The only fact they got right
was that a water pump in a small Illinois water district had burned
out. That is just one of several examples. The Senate investigation found
that: claims made by DHS did not always fit the facts, and in no case did a
fusion center make a clear and unique intelligence contribution that helped
apprehend a terrorist or disrupt a plot. Worse, three other incidents examined
by the Subcommittee investigation raised significant concerns about the
utility of the fusion centers, and raised the possibility that some centers have
actually hindered or sidetracked federal counterterrorism efforts.
the reports were not even circulated after they were written, sometimes because they contained no useful
information, sometimes because they "overstepped legal boundaries" in disturbing ways: "Reporting on
First Amendment-protected activities lacking a nexus to violence or criminality; reporting on or improperly
characterizing political, religious or ideological speech that is not explicitly violent or criminal; and
attributing to an entire group the violent or criminal acts of one or a limited number of the group's
members." (One analyst, for example, felt the need to note that a Muslim community group's list of
recommended readings included four items whose authors were in the TIDE database .)
much you're spending, it becomes hard to keep track of what that money is being spent on. All sorts of
what the televisions were being used for, officials said they displayed calendars, and were used for 'opensource monitoring.' Asked to define 'open-source monitoring,' SD-LECC officials said they meant 'watching
A "2010 assessment of
state and local fusion centers conducted at the request of DHS found
widespread deficiencies in the centers' basic counterterrorism
information-sharing capabilities," for example. "DHS did not share that report with
the news.'" The report is also filled with signs of stonewalling.
Congress or discuss its findings publicly. When the Subcommittee requested the assessment as part of its
investigation, DHS at first denied it existed, then disputed whether it could be shared with Congress,
before ultimately providing a copy." And
past decade uncovered little information that could be useful in defending the
nation against terrorism. It also created numerous reports on the legal,
everyday of activities of ordinary Americans, according to a Senate report released
Tuesday. In Federal Support for And Involvement in State and Local Fusion Centers, the Senate Permanent
Subcommittee on Investigations wasted no time in panning the work of the centers, which the panel found
to be of little to no value in guarding the nation against the threat of domestic terrorism. Instead,
the
centers themselves pose a threat to our constitutional liberties, as the report noted
early in its executive summary: The Subcommittee investigation found that DHSassigned detailees to the fusion centers forwarded "intelligence" of uneven
quality oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy
Act protections, occasionally taken from already-published public sources, and more often than not
unrelated to terrorism. The centers, established to "fuse' the efforts of state
and law enforcement agencies with those of federal investigators in uncovering security
threats, has produced an undetermined number of reports like the following: "Ten
Book Recommendations for Every Muslim," a list of reading suggestions offered by a Muslim community
group, included books by four authors whose names were listed in a terrorism database. In Santa Cruz,
California, a speaker gave a daylong motivational talk and a lecture on "positive parenting" at a Muslim
center. "Possible Drug Smuggling Activity" was reported by a pair of state wildlife officials who spotted
two men in a fishing boat "operating suspiciously" in water near the U.S.-Mexico border. The report noted
that the fishermen "avoided eye contact" and that their boat appeared to be low in the water, "as if it were
laden with cargo." Fusion centers have created headlines and generated outrage and ridicule in recent
years by sending out alerts about Ron Paul bumper stickers, the American Civil Liberties Union, activists for
and against legalized abortion, and gun-rights advocates. After reviewing more than 600 unclassified
of Oklahoma the ranking Republican. There is no telling how much taxpayer money was spent in preparing
the fusion reports, since Congress has created such a complicated, multi-sourced grant process that
even Department of Homeland Security officials don't know how much money
they have received and spent on the centers. The fusion centers are UNDER
the authority of the DHS, but are funded mainly by grants to local governments from the Federal
Emergency Management Agency. The Senate panel estimated that somewhere between $289 million and
$1.4 billion in federal appropriations were spent on the fusion centers between 2003 and 2011. Federal
spending accounts for 20 to 30 percent of the costs of operating the fusion centers, the report said, with
the remaining 70 to 80 percent funded by state and local governments. Whatever the total dollar amount
the fusion centers have had enough money to spend heavily on datamining software, flat-screen televisions and , in Arizona, two fully equipped
Chevrolet Tahoes that are used for commuting, investigators found. Though the millions,
is,
or possibly billions, spent on the fusion centers has produced little of value, according to the report,
Congress is unlikely to cut off or even reduce funding for the program. Its effectiveness, or lack thereof, in
uncovering terrorist threats might be less important to members than the politically rewarding effects of
It may also be
difficult to make a convincing case about the inefficiency of the centers in
fulfilling their mission when the Department of Homeland Security can't tell
us what the mission is. Testifying before Congress last year, Secretary of Homeland Security Janet
sending all that money home to state and local law enforcement agencies. And
Napolitano pointed to the FBI's Joint Terrorism Task Force as the federal, state and local effort dealing
directly with the domestic terrorist threat.
"A JTTF is really focused on terrorism and terrorism-related investigations ," the
Secretary said. "Fusion centers are almost everything else." Given the difficulty of
evaluating in any definitive way "almost everything else," Congress will likely go on funding
it. Aside from the cost, There are issues of civil liberties involved in the practice of
spying and reporting on the reading and fishing activities or the parenting advice given by people
here in the "Homeland." Indeed the problem has been recognized by officials in the Department of
Homeland Security, who rejected many of the reports cited by the Senate panel. "We cannot report on
books and other writings" just because the authors are named in a terrorism database, a DHS reviewer in
Washington wrote in response to the report on the reading list put out by the Muslim community group.
"The writings themselves are protected by the First Amendment unless you can establish that something in
the writing indicates planning or advocates violent or other criminal activity." "The number of things that
scare me about this report are almost too many to write into this (form)," a Homeland Security reviewer
wrote after analyzing the report on the motivational talk and lecture on "positive parenting" at the Muslim
center in Santa Cruz. The reviewer noted that "the nature of this event is constitutionally protected activity
(public speaking, freedom of assembly, freedom of religion.)" Another reviewer was obviously frustrated
over the report on the men in the fishing boat by officials who suspected drug smuggling. "The fact that
some guys were hanging out in a boat where people normally do not fish MIGHT be an indicator of
something abnormal, but does not reach the threshold of something we should be reporting," the
Homeland Security official wrote, adding that the report "should never have been nominated for
production, nor passed through three reviews." That the report was ultimately nixed should be mildly
encouraging, though the fact that it had earlier passed three reviews says something about the size and
once a determination is made that a document should not be maintained, "the U.S person identifying
information is to be destroyed immediately." "It was not clear why, if DHS had determined that the reports
were improper to disseminate, the reports were proper to store indefinitely," the Senate report said. DHS
replied that the canceled reports could still be retained "for administrative purposes such as audit and
described the problem in stark terms: You would have some guys, the information you'd see from them,
you'd scratch your head and say, "What planet are you from?"
nationwide,
and two in Massachusetts. The Commonwealth Fusion Center in Maynard is run by the Massachusetts State Police.
The Boston Regional Intelligence Center, also known as the BRIC, is located at Boston Police Department headquarters in Roxbury and run by
their federally-funded counterterrorism infrastructure to monitor peaceful protesters including Veterans for Peace and CODEPINK, labeling
them as domestic extremists and homeland security threats. The Boston fusion center even kept track of the political activities of Marty Walsh,
called fusion centers getting caught red handed monitoring protest movements and dissidents, conflating First Amendment protected speech
Center should be monitoring the tweets and Facebook posts of Black Lives Matter activists, if those activists intend to shut down highways.
We can agree to disagree about that, but please dont say these fusion centers are primarily dedicated to stopping terrorism when they are
doing things like this. Stopping traffic for a few hours is civil disobedience, not terrorism. A supposed anti-terrorism center has no business
monitoring public social media accounts looking for intelligence about civic protest movements.
The Department
of Homeland Security immediately dismissed and condemned the
report and defended the fusion centers, saying the Senate
investigators relied on out-of-date data, from 2009 and 2010, and
prior years of materials. The public was not privy to the records underlying that investigation,
described as revealing pools of ineptitude, waste and civil liberties intrusions.
however, the documents that the Senate reviewed predated the documents that the Partnership for Civil
Justice Fund has obtained and made public. The newly released documents show that the Department of
Homeland Securitys representations were far from true, that the conduct of the Fusion Centers continued
The American people can now see for themselves how the
U.S. government and the Department of Homeland Security are
spending hundreds of millions of dollars of their money in Fusion
Center operations. These documents, along with materials previously released by the
unabated.
PCJF that exposed the FBI and other domestic intelligence and law enforcement agencies targeting of
Occupy,
This
gross misuse of U.S. taxpayers money also demonstrates that the Fusion Centers are a colossal rat hole of
waste. The Fusion Centers should be defunded and ended immediately. Coinciding with the publication of
these new documents and this report, the Partnership for Civil Justice Fund has initiated a nationwide
campaign to End the Fusion Centers! The campaign includes a mass email and letter-writing effort to
President Obama and all members of Congress calling on them to defund and end the Fusion Centers. As
part of the End the Fusion Centers campaign and to broaden awareness of the dangers posed by the
Fusion Centers, the PCJF has also made the new documents fully available to the public and to the media in
searchable format at BigBrotherAmerica.org.
law-enforcement agencies to identify and defuse terrorist threats. But the center in Massachusetts, an
early adopter of the intelligence-gathering program,
the Boston
Regional Intelligence Center. Despite the bureaucratic overlap or because
of it Davis testified that neither the city nor his department was told that
Massachusetts fusion center, the Boston Police Department ran a companion operation,
and accurate intelligence more than ever, but the agencies that comprise the United States
Intelligence Community ("USIC") can cause harm to the fabric of civic society because of their informationgathering capabilities
among types of criminal activity, including illegal drug operations, money laundering, fraud,
identity theft and terrorism. It is well known that some of the Sept. 11 terrorists were cited for traffic
violations prior to the attacks while others obtained and used fraudulent drivers licenses.8 Many experts
believe there to be a high probability to identify terrorists through their involvement in precursor or lower
level criminal activity, as was possible with the Sept. 11 terrorists. Proponents of this model argue that
This strategy
ensures that possible precursor crimes are screened and analyzed for
linkages to larger-scale terrorist activities. Furthermore, experts believe that terrorists will
an all crimes approach to terrorism prevention should be embraced by the states.
behave like fugitives if pressured by law enforcement from many different levels and angles. Thus,
terrorists will become vulnerable by resorting to criminal activity to support terrorist-related operations.
Emergency management professionals use a similar approach, known as all hazards, for emergency
More concrete evidence would help law enforcement home in on those crimes that have the greatest
chance for supporting terrorist-related activities.
A top Texas law enforcement agency says border security organizations have
apprehended several members of known Islamist terrorist organizations
crossing the southern border in recent years, and while a surge of officers to
the border has slowed the flow of drugs and undocumented immigrants, its
costing the state tens of millions of dollars. In a report to Texas elected officials, the state
Department of Public Safety says border security agencies have arrested several Somali immigrants
crossing the southern border who are known members of al-Shabab, the
terrorist group that launched a deadly attack on the Westgate shopping mall
in Nairobi, Kenya, and Al-Itihaad al-Islamiya, another Somalia-based group once funded by Osama bin Laden.
Another undocumented immigrant arrested crossing the border was on
multiple U.S. terrorism watch lists, the report says . According to the report, one
member of al-Shabab, apprehended in June 2014, told authorities he had
been trained for an April 2014 suicide attack in Mogadishu . He said he escaped and
reported the planned attack to African Union troops, who were able to stop the attack. The FBI believed another
undocumented immigrant was an al-Shabab member who helped smuggle several potentially dangerous terrorists into
Chronicle, was not meant for public distribution. [T]hat report was inappropriately obtained and [the Chronicle was] not
authorized to possess or post the law enforcement sensitive document, department press secretary Tom Vinger said in an
department says there is no known intelligence that specifically links undocumented immigrants to terrorism plots, but
undocumented immigrants are kept locked in small, confined spaces where they go days without food or water. Law
enforcement officials found one stash house in the Houston area crammed with 115 illegal immigrants. The report says
the Gulf, Zeta, Juarez and Sinaloa cartels have the most prominent footprints in Texas. O fficials
are also
worried about the growing influence of MS-13, the Salvadoran gang that
originated in Los Angeles. The cartels have been effective in corrupting U.S.
law enforcement officials at all levels, the DPS report says. But the surge of Texas DPS officers,
National Guard troops and other law enforcement officials, ordered by then-Gov. Rick Perry (R) last June, has worked to
stem last years flood of undocumented immigrants crossing into the Rio Grande Valley. [Gov. Perry to send National
Guard troops to Mexican border amid migrant crisis]
In
recent months, that number has diminished significantly. The report said the number of arrests per week had fallen from a
high of about 6,000 to around 2,000. The surge has also led to the seizure of more than $1.8 billion worth of cartel drugs,
or about 150 tons of marijuana, 588 pounds of cocaine and 320 pounds of methamphetamines. Cartels have shifted
marijuana trafficking west, from McAllen to the small towns of Escobares and Roma. The cartels are sending scouts to
watch U.S. border patrol officers, and they believe the Texas border surge will end soon, once the money runs out,
surveillance cameras along the border, and another 4,000 cameras will be installed in the coming months. Fully securing
the border would require the constant presence of an incredible number of troops as many as 76,000, the report found.
This summer, the surge sent about 1,000 National Guard soldiers to the border.
September and October documents reviewed by The Washington Times, also seems to contrast with what
Mr. Johnson told Congress in September, when he assured lawmakers that the four men were not
considered terrorist threats to the U.S., even as behind the scenes his department proposed the four be
put on terrorist watch lists. Homeland Security spokeswoman Marsha Catron said the individuals werent
associated with the Islamic State, which is also known by the acronyms ISIL and ISIS. The suggestion that
individuals who have ties to ISIL have been apprehended at the southwest border is categorically false,
and not supported by any credible intelligence or the facts on the ground, Ms. Catron said. DHS
continues to have no credible intelligence to suggest terrorist organizations are actively plotting to cross
the southwest border. She did not reply to questions about the status of the four men or why her
department proposed they be put on terrorist watch lists. As of a month ago they were being held at the
DHKP/C. The group is a Marxist insurgency that claimed credit for a 2013
suicide bomb attack on the U.S. embassy in Ankara, Turkeys capital, last
year. But U.S. counterterrorism officials said the men were more likely members of the PKK, or Kurdistan
Workers Party, which has been battling for Kurdish rights within Turkey for decades, though recently PKK
and Turkish leaders have tried to broker a political agreement.
The
men form part of a sophisticated narco-terror ring, exposed by JW in October,
with connections running from El Paso to Chicago to New York City . It includes an
driving intoxicated, is in the El Paso County Jail and is scheduled to be sentenced later this month.
all-star lineup of logistics and transportation operatives for militant Islamists in the United State, drug and
weapons smugglers for the Juarez drug cartel in Mexico, an FBI confidential informant gone rogue and two
the most wanted terrorist piloted a private aircraft from Mexico into the airfield at Cielo Dorado in Anthony
New Mexico, according to JWs high-level government sources.
The Islamic State group claims it could purchase a nuclear device from
Pakistan and transport it to the United States through drug-smuggling
channels. The group, also known as ISIS and ISIL, would transfer the nuclear weapon
from Pakistan to Nigeria or Mexico, where it could be brought to South
America and then up to the U.S., according to an op-ed allegedly written by
kidnapped British photojournalist John Cantlie and published in Dabiq, the
group's propaganda magazine. The op-ed said that Boko Haram, the Nigerian jihadist
group that announced its formal allegiance to ISIS in March, would make their
efforts to transport a weapon to the U.S. much easier, reported Nigerian
newspaper Premium Times. ISIS claims the Nigerian army is in a "virtual state of collapse" because of its
according to Premium Times. After transporting the device through the "porous borders of South America"
to Mexico, it would be "just
A man dressed as an ISIS terrorist entered the U.S. from Canada across Lake
Erie without getting caught. This border crossing stunt is portrayed in the latest video
from muckraking journalist James OKeefe and the Project Veritas group to demonstrate border
insecurity in this instance in Cleveland, Ohios, backyard. See embed below. According to the video, the Border
Patrol seldom monitors Lake Erie, while the Coast Guard shows up only
occasionally. The porous U.S.-Mexican border has received a lot of publicity given
the recent illegal immigration surge, but apparently the Canadian border over
water is also undefended assuming this video is accurate. Operators of small pleasure vessels are supposed to check in with immigration
officials via the honor system when they leave U.S. waters. Whether that occurs in practice is another matter. Moreover, hiring a small boat
from Canada to the middle of Lake Erie could not be easier, and no one
seemed to notice the terrorist on board, OKeefe claimed. On the eve of the
9/11 anniversary, OKeefe pointed out that U.K. intelligence officials have
revealed that hundreds of jihadis (including the individual that allegedly
murdered American journalist James Foley) hold British passports, enabling
them to fly to Canada without a visa. America is just a short boat ride away from Ontario. In the OKeefe video, the makebelieve ISIS terrorist walks into Clevelands Rock and Roll Hall of Fame carrying a suspicious duffel bag without being stopped. In a previous video, OKeefe and company
showed how someone dressed up like Osama bin Laden could cross the Rio Grande from Mexico to the U.S. undetected. Although OKeefe has his share of detractors for
his particular brand of journalism, the Project Veritas team has exposed primarily through undercover videos possible election law violations by the Wendy Davis for
governor campaign, the corrupt ACORN organization, other instances of voter fraud, apparent chicanery in the Obamacare navigator program, and revealed that some
outspoken anti-gun journalists declined to post gun-free zone signs outside their own homes. His group also exposed potential abuses in the so-called Obamaphone
targeted the Fort Bliss U.S. military base in El Paso for a possible attack.
The U.S. Customs and Border Protection agency has apprehended more
suspected terrorists on the nations northern border than along its southern
counterpart, CBP Commissioner Alan Bersin said Tuesday. In terms of the terrorist threat,
its commonly accepted that the more significant threat comes from the
U.S.-Canada border, Bersin told a hearing of the Senate Judiciary subcommittee on Immigration,
Refugees, and Border Security. Bersin attributed the situation, in part, to the fact that
the U.S. and Canada do not share information about people placed on their
respective no-fly lists. As a result, individuals deemed a threat who fly into
one country may then cross the land border into the other . Because of the fact that
we do not share no-fly [list] information and the Canadians will not, we are more than we would like
confronted with the fact where a [person designated as a] no-fly has entered Canada and then is arrested
coming across one of our bridges into the United States, he said. As it screens air travelers, the
Department of Homeland Securitys Transportation Security Administration places individuals who are
considered a threat to aviation on a no-fly list, which is a subset of the terrorist watchlist. Bersins
comments came after the subcommittees ranking Republican, Sen. John Cornyn of Texas, asked him about
the relative numbers of people apprehended along the northern and southern borders. He responded
that the detentions and arrests along the border with Canada were a small, small fraction when
compared to the number apprehended in the south. "That doesnt mean that we dont face significant
threats along the northern border, he added. CBP figures for fiscal year 2010 indicate that 447,731
illegal crossers were apprehended along the southwest border and 7,431 along the U.S.-Canada border.
Cornyn noted during the hearing that the FY2010 arrests along the southwest border included 59,000
individuals from countries other than Mexico. Last March, the senator told a conference on border security
that of those 59,000 people, 663 came from special-interest countries like Afghanistan, Libya, Pakistan,
Somalia, and Yemen and from countries that have been designated by the U.S. Department of State as
state-sponsors of terror Cuba, Iran, Syria, and Sudan. Speaking to reporters after Tuesdays hearing,
Bersin said his agency has recorded more cases of people with suspected
terrorist backgrounds or links to terror organizations entering the U.S. from
Canada than from Mexico. That doesnt mean that were not looking for it
on both borders, south and north, he said . Bersin said people who are on the no-fly list
for a variety of reasons may enter Canada, because theyre entitled under Canadian
laws to do so, and then they attempt to cross into the United States by way of
bridge or tunnel border crossings. CBP officers have stopped that, he said, but without quantifying the
number of suspected terrorist arrests by CBP.
Nearly a million people use one of the 300 official border crossings
every day, leaving open the possibility of passport fraud and human
smuggling. But if terrorists already inside the U.S. or Canada are determined
to move undetected between the two nations, there are many undefended
passages along the 5,500-mile border. Crossings near the densely-populated areas of
Montreal and Toronto to the east and Vancouver in the west are closely guarded, but the vast area in between is not. And
to the north, the Alaska border alone covers more than 1,500 miles, much of it unguarded. "To stop somebody who has
been radicalized in Canada from coming across that border requires that you know about them, that the Canadians know
about them and tell us, and that they try to cross that border illegally," Morell said in a CBS interview. "There are many,
that cross between the countries with nothing but an occasional sign notifying travelers of the border. Canada has
divided the responsibility of protecting the border between the Canadian Border Services Agency at the official ports of
entry, and the RCMP in between those points. The RCMP has a specific unit called Integrated Border Enforcement Team
Protection mission statement In the U.S., Customs and Border Patrol under the Department of Homeland Security, is
divided into three difference factions, each in charge of a different aspect of border security. The Office of Field Operations
coordinates and facilitates entry of goods and people at the official ports of entry, while the U.S. Border Patrol secures the
border between the ports of entry. Lastly, the Office of Air and Marine patrols the border from the air and sea. For the
Border Patrol, the main objective is stopping terrorists from coming into the U.S., as evidenced by the agency's own
mission statement. "Since the terrorist attacks of Sept. 11, 2001, the focus of the Border Patrol has changed to detection,
The overt
call from Islamic State, beckoning its sympathizers to attack inside the U.S.
and Canada, both of which are taking part in airstrikes aimed at ISIS in Iraq
and Syria, has lawmakers worried about the border. "There is a great concern
that our southern border and our northern border is porous and that they will
be coming across," Sen. John McCain, R-Ariz, said in September. Canadian officials say that under Prime
apprehension and/or deterrence of terrorists and terrorist weapons," reads the first line of the statement.
Minister Stephen Harper, who took office in 2006, the nation has increased its own border patrols by more than 25
percent. Canada also has recently undertaken tough new counter-terrorism measures and moved to revoke citizenship
from dual nationals shown to have fought with terror groups overseas. The U.S.-Canada border is approximately 5,500
miles long, including the Alaskan boundary. (CBP) The number of apprehensions of people illegally crossing in from
Canada fell to 3,230 last year, down nearly 1,000 from 2012 and marking at least a 20-year low. By contrast, the Border
Patrol apprehended 414,397 people crossing in illegally from Mexico in 2013. Royal Canadian Mounted Police Cpl. Sharon
Franks, Milnes counterpart north of the border, agreed that cooperation something often missing between officials on
either side of the Mexican border is key to security. A sign notifies drivers they are about to enter the U.S. on one of the
rural roads outside of Sweetgrass, Mont. (FoxNews.com) (Gavin John/Crystal Schick) We have a great level of
cooperation from the CBP, Franks said. Both the RCMP and the U.S. Border Patrol also say they depend on citizens living
along the border to report suspicious activity. These people are patriots and good citizens and they dont want to see
smugglers or terrorists entering their country," Milne said. "Theyre the eyes and ears. Its very important to coordinate in
remote areas where there are limited resources. A U.S. Customs and Border Protection vehicle sits just outside the
Fortuna port of entry on the border of North Dakota and Saskatchewan earlier this month. (FoxNews.com) (Gavin
John/Crystal Schick) The RCMP plans to implement new measures along remote parts of the eastern border on the
Canadian side, including video cameras, radar, ground sensors, and thermal radiation detectors. Similar measures are
unique trusting relationship with the Canadians, said Milne. We share a mission, which is the protection of each
respective nation.
foiled because of almost frenetic White House meetings that month, keeping the bureaucracy on its toes.
On April 13, 2004, 9/11 commission member Timothy Roemer said, The Clinton administration has a great
deal of success during this time period. My theory is, because of this small group that is meeting at the top
Was
the bomb plot foiled by an alert White House or by an alert agent on the front
lines? His story didnt make sense to me, said customs inspector Diana
Dean. Now retired, Dean was working the border that night. On a hunch
something wasnt quite right, she questioned Ressam and asked him to pop
his trunk. Inside were big bags of white powder that were first thought to be drugs. But that night, drug
levels of government. NBC News decided to take a close look at what happened four years ago.
tests came back negative. When investigators looked further, they found timers and realized the powder
any specific threats," she added. "I dont recall anybody saying watch for terrorists. Customs officials
confirm that no alert had gone out to the field. The Clinton administration was at battle stations during this
period, and that extraordinary effort helped foil al-Qaida plots against Americans in Jordan. But theres
In fact,
senior counterterror officials attribute catching Ressam to good training and
sheer luck. As for Dean, she received an award and today shrugs off revisionist history in Washington,
simply no evidence that meetings in Washington stopped the planned attack on American soil.
States illegally in June 1997, the Canadian government refused to take him back. The INS then paroled him
into the United States and started deportation proceedings against him. If we improve our visa processing
system but fail to strengthen our land borders, we can expect more cases like these.
operatives had been infiltrat ing Boston by coming in on liquid natural gas
tankers from Algeria." In March, FBI officials publicly denied Clarke's assertions, although they
acknowledged that at least one Algerian who secretly entered aboard an LNG tanker is under federal
indictment for allegedly planning to blow up Los Angeles airport as part of al-Qaida's "Millennium Bombing
of illegal migrants may have had indirect associations with those indicted for the Millennium Bombing
Plot," the letter said. It also said that federal agents had recovered "substantial amounts of U.S. currency
and illegal drugs" from an LNG tanker. Markey said Wednesday in a written statement, "This information
would seem to confirm statements made in former counter-terrorism Czar Richard Clarke's recent book
the airliners used in the terror attacks at Boston's Logan International Airport. Markey, a senior member of
the House terrorism committee, whose district is home to Boston Harbor's LNG import terminal, has
demanded to know why federal security officials told him repeatedly that there were no known terror
threats related to the LNG tankers that had been arriving in Boston. There is no evidence, according to FBI
statements in March, that Abdelghani Meskini, the Algerian stowaway who has been indicted in the airport
plot, had terrorist ties when he arrived in this country. It was unclear from FBI statements whether officials
believed Meskini became involved with terrorists after arriving in the United States.
One of the thorniest security problems involves determining just whats inside
each of the 40-foot steel containers that arrive every day on cargo ships
carrying as many as 4,000 containers each. Air travelers at security checkpoints have
become accustomed to delays as passengers spend a few moments unpacking laptops, removing shoes
say it takes five agents roughly three hours to fully inspect the contents of just one of those containers.
accidental explosion of a container on the dock of the Port of Los Angeles on April 28 underscored the
problem. Gasoline fumes from a pickup truck inside the container were apparently ignited by a spark from
a battery, blowing the locked steel doors open and spilling the contents, which included 900 bottles of LPG
butane gas, according to Michael Mitre, Coast Port Security director at the International Longshore and
Warehouse Union. There was virtually no response, Mitre told a House panel on maritime security last
week. There was no evacuation. There was no shutdown of work It could have been something that
was a biological or chemical release; it could be a radioactive release. No one knew. But at the time, the
terminal was absolutely not prepared. Mitre said the explosion also highlights a major deficiency in
container inspection. Export
as stevedores, according to Bob Graham, chair of the Senate select committee on intelligence. He said he
had seen reports indicating that some extremists might have been wearing safety jackets and protective
helmets to give the appearance of dockworkers. US Coast Guard officials have refused to divulge any
said
25 extremists "entered in a foreign country, hid out in a container and then
entered the United States." In some of the stowaway containers, US counterterror authorities were dismayed to find uniforms of American dockworkers
and even US Coast Guards, along with the appropriate tags and ID for free access to port
information about the reports, but Graham stressed: "The American people have a right to know." He
facilities, including off-limits sections. Groups of 5 to 7 of these men dressed as port workers have been
sighted hurrying over to waiting vans and driving off at speed.
Englund 15
Over the past six months, terrorist violence has occurred almost
simultaneously in many regions of the world. The casual observer
may be overwhelmed by these threats and demand that something
be done to punish those responsible and stop future acts of
violence. A counter-terror doctrine must simultaneously make people feel more secure and take effective actions to ensure the physical security of potential
targets of terrorist violence. Sometimes things done to achieve the former can make the latter more difficult. While doing something in response to violence is required,
success depends on a nuanced, focused strategy that both punishes perpetrators of violence and addresses political and economic stability in regions affected with
terrorist violence. This article will explore this paradox by first examining the nature of the just do something response. It will then consider stability as an element of
address potential economic and political root causes of terrorist violence. Do something to stop this now A short recital of recent events is shocking: Somalia-based
al-Shabab kills 148 students at Garrissa University in Kenya. Boko Haram gunmen, dressed as preachers, kill two dozen in Nigeria. In Yemen, Houthi rebels storm the
presidential palace, and terrorists belonging to al Qaida in the Arabian Peninsula free hundreds of their former colleagues from prisons there. The so-called Islamic State
fights for control of Anbar and Salladin provinces in Iraq. Armed groups attack resorts and military checkpoints on the Sinai Peninsula. The Taliban in Pakistan killed over
240 children in December. This surge of terror becomes even more sinister when violence spreads to Europe and North America, as was recently realized in Paris, London,
Ottawa, and as far away as Sydney, Australia. Such a litany of violence against innocents demands justice, most often called for in its retributive form; the perpetrators of
violence, their enablers and those who inspire violence need to be punished. However, a hasty, kinetic response can be counter-productive for two reasons: quick reactions
risk misperceiving the origins of the violence and result in inappropriate target selections; second, since collateral damage is almost always associated with the application
. Democratic
societies are especially susceptible to this rational reaction to
terrorist violence. Governments of these societies, under pressure
from their people, do highly visible, literally explosive things in
response. Witness the recent violence in Kenya and the response to
that violence. In the early morning hours of April 2, at least four armed men entered the campus of Garissa University College, initially took hostages,
then began to murder studentsreportedly focusing their violence against professed Christiansultimately killing 148. In response Kenyan
President Uhuru Kenyatta vowed that his country would respond to
the violence in the severest way possible. On April 6th, Kenyan Air
Force planes bombed sites in Somalia described as al-Shabab
training camps. A Kenyan military spokesman reported that, the
bombings are part of the continued process and engagement against
al-Shabab, which will go on. This is part of continuing operations,
not just in response to Garissa. Eyewitnesses told BBC reporters
that the attacks killed at least three civilians and destroyed
livestock and wells in an area without al-Shabab presence.[1] Unfortunately,
this is not Kenyas first experience with mass-casualty terrorist violence. On September 21, 2013 , al-Shabab gunmen attacked
a shopping mall in the Kenyan capital, Nairobi, killing sixty-seven
and wounding scores more. This attack by al-Shabab was
immediately linked to Kenyas participation in the African Union
Mission in Somalia (AMISOM) and by extension AMISOMs close
relationship with the Untied States. Ben Rhodes, the Deputy National Security Adviser for Strategic Communications,
of force, even the most carefully planned attack can provide terror groups with ammunition for their own propaganda efforts
admitted, the fact of the matter is, weve actually had a very aggressive effort to go after al-Shabab in Somalia, and, frankly, I think it was that pressure on al-Shabab
that, in terms of their own professed motivation, led them to pursue an attack against Kenya.[2] Translating as the youth, al-Shabab was born as a youth arm of the
Union of Islamic Courts that once dominated in the political vacuum of Somalia. The AMISOM mission itself was a response to al-Shabab successes in its insurgency against
Ethiopian forces that invaded Somalia in 2006 and then withdrew in 2007. By 2011, African Union forces swept al-Shabab from the Somali capital, Mogadishu.[3] The rise
an operation that
was intended to crush Islamic extremists, stabilize Somalia, and
install more tractable leadershipbut accomplished the exact
opposite.[4] The implication is that the heavy-handed intervention in Somalia, in which thousands of civilians were killed or displaced, encouraged a radical
of al-Shabab in Somalia has been directly linked to the United States- backed 2006 invasion by Ethiopia, described as
response. The intervention and subsequent withdrawal created the vacuum which al-Shabab filled. Since the Ethiopians unilaterally declared victory over the Islamic
Courts and began to withdraw from Somalia in 2007, intense fighting, piracy, and war-enabled famines grind on, meanwhile, in a more radicalized Somalia.[5]
The
Uganda, and Kenya join the United States in its war on terrorism,
more lives are disrupted by enforcement actions and the greater the
opportunity for radical groups like al-Shabab to gain traction. In
other words, the way in which terrorism is fought can itself give rise
to terrorism. We know that the way in which we fight is connected to peoples perception of the fight. There have been
several recent studies that demonstrate statistically that, for
example, the United States use of remotely piloted aircraft (RPAs,
or drones) has both increased negative perceptions of the United
States in the areas most affected by drone activity and changed the
way terror groups advertise their positions and try to gather
support.[6] The utility of negative perceptions to propaganda efforts
can be considered separately from the actual effectiveness of
attacks by countries fighting a war on terrorism. In terms of
effectiveness, the evidence is mixed: senior terror group leaders
who are killed are quickly replaced, but those who replace them may
be less capable and experienced. Also, people who are continually in fear of being killed are less effective because they
are then more cautious in how and how often they move. This is the crux of the paradox. Actions that address security threats, and strategies that can make people feel
more secure, can also encourage new, different threats. The same paradox occurs in urban combat. I receive rocket fire from a densely populated neighborhood. I can
reduce your security in the short-term can gain trust and cooperation in the long-term. Dismounted patrols (out of armored vehicles, interacting with locals) have been
proven to be important in counter-insurgency operations. These optionsnot returning fire if fired upon, lowering your guard, reducing security in the short termseem
counter-intuitive and are frustrating positions to be in, but these can be effective security strategies in the long-term. Clearly the application of force is necessary to
remove some threats, but force cannot be the dominant strategy. As more Arab states take action against targets on the Arabian Peninsula, in Libya, and in Iraq and
Syria, these Arab coalition allies will be increasingly described as dupes and lackeys of the West or worse, as apostate regimes, lacking all legitimacy. The core function
of military force is to kill and destroy; collateral damage is inevitable. Arab states taking action against terror groups must steel themselves against the inevitable use of
this collateral damage against them, engaging strategic communication to present effective, convincing counter-messages.
Englund 15
strategy. How practical is Harfs root causes suggestion? Can such root causes be discovered and addressed? The decision to support or join extremely violent groups
to express your political will is a highly complex one. If experts agree on one thing, it is that the factors contributing to this decision or radicalization are varied. Studying
the decision is fraught with problems. However, a consensus has developed around a cluster of root causes that can either create permissive environments for terrorist
violence, or directly contribute to the radicalization of a segment of a population. These are, generally: high unemployment, economic inequality and social exclusion
among heterogeneous groups; rapid population growth (with a bulge of young people) accompanied by rapid urbanization; and a clash of values.[8] No single factor can
be identified as causing terrorism and the mix of contributing factors can vary in different contexts. However, sufficient evidence exists to recommend studying root
causes in conjunction with other contributing factors such as political stability. Political stability and the ability of a government to actually govern and resolve political
crises are cited as belonging to its own category of attending causes.[9] Thinking about root causes is therefore helpful in considering long-term counter-terror
strategies. As is often said: easier said than done. Even if Harfs jobs comment was in fact sensible in the long-term, effecting such a strategy is highly complicated,
involving the difficult task of identifying specific contributing or permissive factors, and then actually doing something to address those factors. Struggling economies
with governments whose legitimacy is sometimes challenged present a combination of factors that require attention when creating a comprehensive, coherent, and
effective counter-terror strategy. Conclusion Effective counter-terrorism requires making people more secure from terrorist violence while also making them feel more
secure. These two distinct, but clearly related, goals can sometimes put a government in a bind. Sometimes the things that make people feel more secure
misperception, miscalculation and above all ignorance of the ruling elite about
security puzzles are perilous for the national security of a state . Indeed, in an
age of transnational terrorism and unprecedented dissemination of dualuse
nuclear technology, ignoring nuclear terrorism threat is an imprudent policy
choice. The incapability of terrorist organizations to engineer fissile material does not
eliminate completely the possibility of nuclear terrorism. At the same time, the
absence of an example or precedent of a nuclear/ radiological terrorism does
not qualify the assertion that the nuclear/radiological terrorism ought to be
remained a myth. Farsighted rationality obligates that one should not
miscalculate transnational terrorist groups whose behavior suggests that
they have a death wish of acquiring nuclear, radiological, chemical and biological
material producing capabilities. In addition, one could be sensible about the published
information that huge amount of nuclear material is spread around the globe .
According to estimate it is enough to build more than 120,000 Hiroshima-sized
nuclear bombs (Fissile Material Working Group, 2010, April 1). The alarming fact is that a few
storage sites of nuclear/radiological materials are inadequately secured and continue
to be accumulated in unstable regions (Sambaiew, 2010, February). Attempts at stealing
fissile material had already been discovered (Din & Zhiwei, 2003: 18). Numerous evidences
confirm that terrorist groups had aspired to acquire fissile material for their
terrorist acts. Late Osama bin Laden, the founder of al Qaeda stated that acquiring
nuclear weapons was areligious duty (Yusufzai, 1999, January 11). The IAEA also reported
The
that al-Qaeda was actively seeking an atomic bomb. Jamal Ahmad al-Fadl, a dissenter of Al Qaeda, in his
trial testimony had revealed his extensive but unsuccessful efforts to acquire enriched uranium for alQaeda (Allison, 2010, January: 11). On November 9, 2001, Osama bin Laden claimed that we have
chemical and nuclear weapons as a deterrent and if America used them against us we reserve the right to
use them (Mir, 2001, November 10). On May 28, 2010, Sultan Bashiruddin Mahmood, a Pakistani nuclear
scientist confessed that he met Osama bin Laden. He claimed that I met Osama bin Laden before 9/11 not
to give him nuclear know-how, but to seek funds for establishing a technical college in Kabul (Syed, 2010,
May 29). He was arrested in 2003 and after extensive interrogation by American and Pakistani intelligence
agencies he was released (Syed, 2010, May 29). Agreed, Mr. Mahmood did not share nuclear know-how
Al Qaeda, but his meeting with Osama establishes the fact that the terrorist organization was in
contact with nuclear scientists. Second, the terrorist group has sympathizers in
the nuclear scientific bureaucracies . It also authenticates bin Ladens Deputy Ayman
with
Zawahiris claim which he made in December 2001: If you have $30 million, go to the black market in the
central Asia, contact any disgruntled Soviet scientist and a lot of dozens of smart briefcase bombs are
threat of nuclear/radiological terrorism is real. The 33Defense Secretary Robert Gates admitted in 2008
that what keeps every senior government leader awake at night is the thought of a terrorist ending up
the nuclear
deterrence strategy cannot deter the transnational terrorist syndicate from
nuclear/radiological terrorist attacks. Daniel Whiteneck pointed out: Evidence suggests, for
with a weapon of mass destruction, especially nuclear (Mueller, 2011, August 2). Indeed,
that al Qaeda might not only use WMD simply to demonstrate the
magnitude of its capability but that it might actually welcome the escalation
of a strong U.S. response, especially if it included catalytic effects on
governments and societies in the Muslim world. An adversary that prefers
escalation regardless of the consequences cannot be deterred ( Whiteneck, 2005,
example,
Summer: 187) Since taking office, President Obama has been reiterating that nuclear weapons represent
the gravest threat to United States and international security. While realizing that the US could not
prevent nuclear/radiological terrorist attacks singlehandedly, he launched 47an international campaign to
convince the international community about the increasing threat of nuclear/ radiological terrorism. He
stated on April 5, 2009: Black
terrorism and proliferation are far greater threats to the United States and
international stability. (Security of Defence, 2010, April 6: i). The United States declared
that it reserved the right tohold fully accountable any state or group that
supports or enables terrorist efforts to obtain or use weapons of mass
destruction, whether by facilitating, financing, or providing expertise or safe haven for such efforts
(Nuclear Posture Review Report, 2010, April: 12). This declaration underscores the possibility that
terrorist groups could acquire fissile material from the rogue states
statement released on September 11, three days ahead of the attack. Usama Mahmood, AQISs
spokesperson, issued a separate statement in Urdu following the attack in which he declares: The Naval
officers who were martyred on Saturday in the attack in Karachi were al-Qaeda members. They were trying
to attack American marines and their cronies. The statement confirms that AQIS has not abandoned Al
Qaedas core strategy of attacking the Western governments that the group perceives as supporting unjust
and corrupt regimes in the Middle East (contrast this with ISIS,which concentrates its fight on the close
enemy instead of the far enemy). The statement after the attack detailed the attack (at least from
AQISs perspective): [The attackers] had taken over control of the ship and were proceeding to attack the
American carrier when they were intercepted by the Pakistan military These men thus became martyrs.
The Pakistani military men who died defending enemies of the Muslim nation, on the other hand, are
cursed with hell. The Pakistan Navy noted that four attackers were arrested, and Pakistani news outlets
Pakistans
defense ministry, the defense minister acknowledged that insiders were
culpable in enabling this attack: Without assistance from inside,
these people could not have breached security, Defense Minister Khawaja Asif
noted in parliament. This attack is concerning for several reasons. First, and most
obviously, it is further evidence of a long-time concern shared by U.S. and Indian officials alike
that Pakistans military apparatus is not immune to infiltration by Al
Qaeda and related groups. The attack will shake the United States (admittedly already
reported that among the arrested were two naval officers. In what is very likely a first for
shaky) faith in Rawalpindis ability to keep its house in order. According to an anonymous Western
counterterrorism official cited by the Wall Street Journal, If we are to work with the Pakistan Navy, we
have to be able to trust them. This attack raises a lot of questions. This helps explain why Al Qaeda hasnt
shied away from taking responsibility for and publicizing such a profound failure of an attack.
Even if
(admittedly, the
the attack
took place on the same day that PNS Zulfiqar was slated to set sail for the
Indian Ocean to join an international flotilla. This suggests that Al Qaedas
infiltration went beyond having a naval officer unlock the gate for its
operatives ahead of an attack the group was clearly being fed information about
Pakistani military operations. It appears the officers on board were to be
joined by other militants who were to arrive by boat from the sea and then stow away on
Pakistani military does a good job of doing this on its own most of the time). Interestingly,
board, noted one Pakistani security official, adding that the plan was to get close to the U.S. ships on the
high seas, and then turn the shipboard weapon systems on the Americans. Had the attack succeeded,
U.S. navy ships in the Arabian Sea faced the prospect of a serious naval engagement the Zulfiqar is
the PNS Mehran naval air base took place after failed talks between the Pakistan navy and Al Qaeda over
officers who had been arrested over suspected links to the group. As one report back then noted, the
deeper underlying motive for that attack was a massive internal crackdowns on al-Qaeda affiliates
within the navy. In the aftermath of the PNS Mehran attack, it became clear that Pakistani naval
intelligence had some competence in tracing Al Qaeda sympathizers within its own ranks. While its
methods may not have been fool-proof, it was apparently successful to the degree that it arrested Al
Qaeda operatives within the navy, prompting the sequence of events that led to the 15-hour siege on the
PNS Mehran base. As the Asia Times Online notes, citing one senior navy official, Pakistans naval
intelligence was spurred into action by the potential negative impact that this infiltration could have on the
some light on the role of Al Qaedas new wing in the Indian subcontinent. While Ayman al-Zawahiri may
have declared India, Bangladesh, and Myanmar its battlefield, logistical factors make it highly likely that
Pakistan will continue to be Al Qaedas primary area of focus in South Asia. While Al Qaedas continued
operation in Pakistan was all but a certainty before this attack, what remains uncertain is the degree to
which the group has successfully infiltrated the Pakistani military.
"Hundreds of people at (CIA headquarters) Langley" were working to establish whether Islamabad had
already supplied the Gulf nation with nuclear technology or weaponry, a U.S intelligence officials told the
Sunday Times for a weekend story, adding that "We
Pakistan
typically denies any such transaction, but given its history of lying about
everything from nuclear proliferation to terrorism, it has no credibility in the international
community including in the "Muslim ummah." Saudi Arabia practically owns Pakistan, many of whose
leading political lights seek refuge with their Saudi patrons when the going gets tough at home. When they
are not ordering around their Pakistani vassals, the Saudis arbitrate political disputes in Islamabad,
keeping it solvent and alive with free supply of oil and liquidity. The Pakistani military, whose air force has
trained Saudi pilots and operates Saudi jets, is beholden to the House of Saud for resolving political
tensions and functions as a rentier army for Saudis and its Gulf allies. The Pakistani military, which
manages the country's nuclear arsenal, allows Saudis to access to it but not its own prime ministers,
presidents and other civilians leaders. All this has happened under the benevolent gaze of Washington,
which has long been a patron of Saudi Arabia and Pakistan, both artificially created Sunni majority states
that are fearful of and have a complex about Shia-majority Iran rooted in the Persian civilization. Despite
Pakistan's efforts to maintain a semblance of balance given its large Shia population, Saudi radicalization
and oil money had made it a Sunni satellite state with large scale killing of Shias and other minorities in
recent months. The nuclear tie-up with Saudis therefore comes as no surprise to anyone. "Given their close
relations and close military links, it's long been assumed that if the Saudis wanted, they would call in a
commitment, moral or otherwise, for Pakistan to supply them immediately with nuclear warheads,"" former
the Taliban and alQaeda are not the only shadows on the Pakistani landscape. There is also the
Lashkar-e-Taiba militant group, which is accused of carrying out the Mumbai attack in November
The possibility of a Taliban takeover is, he admits, a "worst-case scenario". But
2008, and like the Pakistani officer corps, recruits mostly in the Punjab. "As one senior Pakistani general
once told me," wrote Bruce Riedel of the Brookings Institution last week, "the relationship between the
army and the Lashkar-e-Taiba is a family affair". He went on: "Pakistan has taken serious measures to
protect the crown jewels of its national security, but it lives in a perilous time. If there is a nightmare
nuclear security scenario in Pakistan today it is probably an inside-the-family-job that ends up in a
nuclear armageddon in India." The point is echoed by Ian Kearns of the British American Security
every indication that the Pakistani military is in total control of the country's nuclear facilities. Though
henow works in academia, Rolf Mowatt-Larssen led US efforts to determine whether
possessed a nuclear bomb, in the wake of 9/11.
al-Qaeda
they would need either a quantity of plutonium or 25kg-50kg of highly enriched uranium (HEU), the size of
one or two grapefruits. HEU is held in hundreds of buildings in dozens of countries. "Security measures for
many of these stocks are excellent, but security for others is appalling," according to a report published in
merely calls for "appropriate and effective" measures, without defining this in detail. "It is a stark and
about Iran and terrorism. Teaparty.org reports: (Free Beacon) Iran has
increased its efforts to finance and carry out terrorist activities
across the world and remains a top nuclear proliferation threat,
according to a new State Department assessment. Iran is funding
and arming leading terrorist groups in the Middle East and
elsewhere,according to the State Departments 2014 Country
Reports on Terrorism, which thoroughly documents how Tehran
continues to act as a leading sponsor terror groups that pose a
direct threat to the United States. The report comes as Western powers
work to finalize a nuclear deal with Iran ahead of a self-imposed June 30
deadline, though it is unclear whether the new findings will come up in
negotiations. In 2014, Irans state sponsorship of terrorism worldwide
remained undiminished through the Islamic Revolutionary Guard Corps-Qods
Force (IRGC-QF), its Ministry of Intelligence and Security, and Tehrans ally
Hizballah, which remained a significant threat to the stability of Lebanon and
the broader region, the report states. In addition to al Qaeda and the
Islamic State (IS, also known as ISIS or ISIL), Iran leads the list of
dangerous state actors. ISIL and AQ were far from the only serious threat
that confronted the United States and its allies, according to the report. Iran
continued to sponsor terrorist groups around the world, principally through its
Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF). So, lets get this
straight. We know Iran is the leading sponsor of terror organizations worldwide. They have made countless threats to destroy America. And, in the
midst of all this, the Obama Administration is currently negotiating a deal to
allow them to develop nuclear weapons which will most likely be used against
Israel, western Europe, and the U.S. iran nukes Ads by Adblade 15 Famous
Celebs Who Have Committed Horrible Crimes! You'll Understand Why
Australia Is A Scary Place After You See These Photos...Yikes 15 Famous
Celebs Who Have Committed Horrible Crimes! What is wrong with this
picture? And, thats not all Iran is up to, according to teaparty.org: > Iran also
is failing to comply with international restrictions on its contested nuclear
program and has not lived up to obligations to come clean about past military
work on nuclear weapons, according to the report. Iran remains a state of
proliferation concern, it states. Despite multiple [United Nations Security
Council resolutions] requiring Iran to suspend its sensitive nuclear
proliferation activities, Iran continued to be in noncompliance with its
international obligations regarding its nuclear program. The State Dept.
report also names names with regard to Irans proxy terror organizations.
Teaparty.org provides a list: The Islamic Republics support for terrorism
spans across the Middle East and even into the Western hemisphere,
which remains a particular concern to U.S. officials. Irans terror
affiliations include Lebanese Hizballah, several Iraqi Shia militant groups,
Hamas, and Palestine Islamic Jihad, the report states. Iran, Hizballah, and
other Shia militia continued to provide support to the Assad regime [in Syria],
dramatically bolstering its capabilities, prolonging the civil war in Syria, and
worsening the human rights and refugee crisis there. Irans support for the
embattled Syrian president includes sending arms shipments through Iraqi
airspace, which violates U.N. Security Council resolutions barring such action.
This support is meant to belittle coalition airstrikes and U.S. contributions to
the Government of Iraqs ongoing fight against ISIL, according to the report.
Why anyone in their right mind would coddle such a monstrous regime and
even think of negotiating with them on something so important as nuclear
weapons is well beyond reason. To an outside observer, this seems like a
death wish for any government. How can the Obama Administration take
America down this path to destruction? Somehow, it must be more of
Obamas fundamental transformation of America.
past decade. Indicators of this increasing threat include the 9/11 attacks, the 2001 Amerithrax letters, the
possession of WMD-related materials by Aafia Siddiqui when she was captured in 2008, and multiple
attempts by terrorists at home and abroad to use explosives improvised from basic chemical precursors.
The challenge presented by these threats is compounded by the large volume of hoax threats that distract
and divert law enforcement agencies from addressing real threats. In its 2008 report World at Risk, the
determined that the most probable WMD scenarios involve the use of toxic industrial chemicals, biological
necessary materials, technologies, and expertise. In addition to efforts by terrorists to use WMD, multiple
countries seek to expand their WMD capabilities. For some of these countries, U.S. technologies represent
the key to moving their WMD programs forward. The U.S. faces constant attempts by foreign nations to
obtain technology, knowledge, and materials for the development and production of chemical, biological,
and nuclear weapons. As new technologies emerge and mature and as scientific expertise and
technological equipment become more readily available, the challenge of safeguarding these from those
that would use them for nefarious purposes is increasing exponentially. Accordingly, the U.S. government
must regularly reassess its counterproliferation methods to meet the ever-changing challenge.
There is
a consensus among international leaders that the threat of nuclear terrorism
is real, not a Hollywood confection . President Obama, the leaders of 46 other nations, the
heads of the International Atomic Energy Agency and the United Nations, and numerous experts
have called nuclear terrorism one of the most serious threats to global
security and stability. It is also preventable with more aggressive action. At least four
terrorist groups, including Al Qaeda, have demonstrated interest in using a
nuclear device. These groups operate in or near states with histories of questionable nuclear security
practices. Terrorists do not need to steal a nuclear weapon. It is quite possible to
make an improvised nuclear device from highly enriched uranium or
plutonium being used for civilian purposes. And there is a black market in
such material. There have been 18 confirmed thefts or loss of weapons-usable nuclear material. In
seize the opportunity to start developing an accountable regime to prevent nuclear terrorism.
2011, the Moldovan police broke up part of a smuggling ring attempting to sell highly enriched uranium;
one member is thought to remain at large with a kilogram of this material.
be expected to feature a weapon less devastating than a nuclear bomb due to the difficulty in preparing
and transferring such as device. While the net probability [of a terrorist nuclear strike] is incredibly low, a
10 kiloton device would be of enormous consequence, Majidi said. So even with those enormously low
probabilities, we still have to have a very effective and integrated approach trying to fight the possibility.
of international extremists acquiring weapons of mass destruction, Majidi said. While such reports are
consistently found not to be credible, Majidi's office yearly probes more than 12 cases in which there was a
goal of launching an unconventional weapons strike.
The amount of loose nuclear material from the former Soviet Union is
unknown, according to Majidi. I know there is a hobby of guessing, and
different folks give you a different number, he said. All I can tell you is that
from the interdictions that we have had in the past decade, the quantities
have been sufficient of highly enriched uranium that I clearly worry about this
material on a global scale. How much is there? Any amount is too much. A
terrorist who stole a nuclear weapon from a country that has one would have
an easier time than if he tried to make one. One of the things you have to
understand is that nuclear markets are very ambiguous markets, Majidi
added. There are as many bad guys trying to sell material as there are good
guys trying to make sure that that doesnt happen"
most likely source of these terror weapons was just eliminated. The Obama administration struck a deal
with Syrian President Bashar Assad that has now destroyed the 1,300 tons of chemical bombs Assad built.
Without this deal, ISIS would likely already have these weapons.
ISIS will become the first true terrorist state and will use
chemical, biological, and nuclear weapons to kill
indiscriminately
Morris 14 [Nigel, Deputy political director at The Independent, Isis could
become 'worlds first truly terrorist state' and bomb UK with nuclear and
chemical weapons, Theresa May warns, September 30, 2014]
Isis could acquire nuclear and biological weapons to launch attacks on Britain, the
Home Secretary warned today as she set out new measures to clamp down on extremist groups. In a
speech to the Tory party conference that concentrated almost entirely on the threat from terrorism at
us. We must not flinch. We must not shy away from our responsibility. We must not drift towards danger
and insecurity. While we still have the chance, we must act to destroy them.
. For instance, during the Cold War, the Soviets reportedly employed approximately 55, 000 scientists and technicians at 6 biological weapons research labs and 5 production facilities37. Among
other things, smallpox was weaponized into ballistic missiles and bombs38. In 1997, the United States conducted a visit to one of these
, and that most of the scientists had left39. It is, therefore, possible that the biological agents, the equipment, and the human
knowledge and expertise have since fallen into the hands of rogue states or terrorist organizations. Additionally,
36. They may also support more effective weaponization, by making agents more resistant to environmental hazards or by
making agents targetable against specific biochemical pathways36. As these capabilities spread across the globe, there will be a greater potential for terrorists to harness and use these techniques. While the
capabilities of terrorists to engineer biological weapons may have been overstated in the past, this can no longer be said to be the case. It has been argued that two of the preconditions for assessing the threat of
bioterrorism, vulnerability to an attack and terrorist capability, are in place; the only remaining consideration is intent40. It is important to determine whether the intent to acquire and use such weapons is present
among terrorist groups. While terrorist groups have not often used biological weapons, it is unclear whether this is due to insufficient capabilities or lack of intent1. There are a variety of reasons why they may not
be interested in the use of biological weapons, including viewing such weapons as illegitimate in military combat, risks of tactical failure, perceptions of high technical difficulty, and concerns about the
s; one estimate suggests that the cost to cause civilian casualties is only one dollar per square kilometer for
biological weapons, compared to 800 and 2000 dollars per square kilometer for nuclear and conventional weapons, respectively42. In a similar vein, the recent war on terror has created an increasingly
28. In short, while the intent to use biological weapons has been documented in terrorist groups
in the past,
agents difficult to use as conventional weapons. A nation that starts an epidemic may see it spread to the wrong countryor even to its own people. Indeed, one cannot target a small, well-defined population with a
contagious pathogen; by its nature, such a pathogen may infect the entire human race. Despite this rather severe drawback, both the Soviet Union and the United States, as well as Imperial Japan, investigated and
produced contagious bioweapons. The logic was that their use in a military conflict would be limited to last-ditch, scorched earth campaigns, perhaps with a vaccine available only to one side. Smallpox is the most
famous example. It is highly contagious and spreads through casual contact. Smallpox was eradicated in the wild in 1977, but it still exists in both U.S. and Russian laboratories, according to official statements.7
Unofficial holdings are harder to track, but a number of countries, including North Korea, are believed to possess covert smallpox cultures. Biological weapons were strictly regulated by international treaty in 1972.
The United States and the Soviet Union agreed not to develop such weapons and to destroy existing stocks. The United States stopped its bioweapons work, but the Russians cheated and kept a huge program going
into the 1990s, thereby producing thousands of tons of weaponized anthrax, smallpox, and far more exotic biological weapons based on genetically engineered viruses. No one can be certain how far either the
germs or the knowledge has spread since the collapse of the Soviet Union. Experts estimate that a large-scale, coordinated smallpox attack on the United States might kill 55,000 to 110,000 people, assuming that
sufficient vaccine is available to contain the epidemic and that the vaccine works.8, 9 The death toll may be far higher if the smallpox strain has been engineered to be vaccine-resistant or to have enhanced
a
attack on the United States could easily broaden into a
global pandemic,
All it would take is for one
infected person to leave the country and travel elsewhere
infections would most likely appear on every continent,
within two weeks. Once these beachheads were established, the
epidemic would spread almost without check because the vaccine in
world stockpiles and the infrastructure to distribute it would be
insufficient. That is particularly true in the developing world
virulence. Moreover,
smallpox
smallpox,
except perhaps
Antarctica,
their current disease burden to say nothing of a return of smallpox. Even if only 50,000 people were killed in the United States, a million or more would probably die worldwide before the disease could be
contained, and containment would probably require many years of effort. As horrible as this would be,
, for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972
treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, were
. The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era.
Tomorrows
will
development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the
virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any
existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Bullers variation on mousepox was 100%
lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that
the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications
Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a
100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? Ive asked this question of experts many times, and no one has yet replied that such a manipulation couldnt be done. This case
is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of WisconsinMadison in
which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14
Biotechnology is
Delaying the onset of serious symptoms allows each new case to spread to more people and
thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then,
the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots
of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and approximately 34 million people are now living with this virus and facing a highly uncertain
A virus
genetically engineered to
say, only after weeks or monthsand to spread easily through the air or by casual contact would be vastly more devastating than HIV . It
technologically
sophisticated
such a virus
. Indeed,
. Given the rate at which biologists are making discoveries about viruses
and the immune system, at some point in the near future, someone may create artificial
that
. Indeed,
. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria
mosquito, but similar techniques could be directed toward humans.16 When Ive talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought
Modern biotechnology
will soon be capable, if it is not already, of bringing about the demise
of the human race or at least of killing a sufficient number of people
to end high-tech civilization and set humanity back 1,000 years or
more.
but keep in mind that it takes
only a handful of individuals to accomplish these tasks. Never has
lethal power of this potency been accessible to so few, so easily
modern biological science has frighteningly undermined
the correlation between the lethality of a weapon and its cost
Access to extremely lethal agentslethal enough to
exterminate Homo sapienswill be available to anybody with a solid
background in biology, terrorists included.
with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas.
That terrorist groups could achieve this level of technological sophistication may seem far-fetched,
. Even more
, a fundamentally stabilizing
The 9/11 attacks involved at least four pilots, each of whom had sufficient education to
enroll in flight schools and complete several years of training. Bin Laden had a degree in civil engineering. Mohammed Atta attended a German university, where he earned a masters degree in urban planningnot
misanthropic individual,
that sometime
a small band of
, or even a single
kill
millions or even
billions of people
. Indeed, the creation of such weapons within the next 20 years seems to be a virtual certainty. The repercussions of their use are hard to
estimate. One approach is to look at how the scale of destruction they may cause compares with that of other calamities that the human race has faced.
Yes Bioterror
Risk of Bioterror is High
Saunders-Hastings 14
(Patrick, Securitization Theory and Biological Weapons, E-IR, Jan 8, 2014, Accessed May 20,
2015, http://www.e-ir.info...l-weapons/)//AD
essay
, which critically evaluates the process through which an issue comes to be viewed through a security framework. In addition, the essay will also use the
precautionary principle, described by the 1998 Wingspread Statement as the notion that when an activity raises threats of harm to human health or the environment, precautionary measures should be taken even
if some cause and effect relationships are not fully established scientifically5. Though more often applied to considerations of environmental risk, in the case of biological weapons, the principle could be used
and that
U.S.
how
potential
of an attack
and
preparative
, and how
The focus will be on the United States government because it has taken such a prominent role in bioweapon securitization and biodefense funding. A single country, the US, was
chosen as a point of focus to avoid confusion due to differing levels of threat and response across countries. Additionally, any
or the public portray and view the biological weapons threat will be ignored; though this could be related to the governments decision to securitize bioweapons, this
how
intelligence officials are warning that terror groups are looking to use the
Ebola outbreak in Africa as a chance to weaponize the virus and use it as a
bio-weapon. FBI Director James Cornet told CBS on Sunday, that militants were
planning an attack on the United States or our allies, and looking to do it very, very
soon. After watching how easily an infected person could gain access to the
United States, followed by the almost criminal neglect shown by our federal
government in their handling of the crisis, intelligence officials are worried
that groups like ISIS and al-Qaida may intentionally infect themselves in West
Africa in an attempt to wreak havoc across the globe . A few infected
individuals could then easily spread the virus via the worlds
transportation systems.
Extinction
Romm 9 (Joseph- Physicist and Climate Expert, Global Warming, California, and
Wildfires, September 1, http://www.grist.org/article/2009-09-01-globalwarming-california-and-wildfires)
The scientific literature paints a hellish future if we dont quickly
reverse greenhouse gas emissions trends (see Climate change expected to
sharply increase Western wildfire burn area as much as 175% by the 2050s). Even the watered
down, consensus-based 2007 IPCC report acknowledged the danger: A warming climate encourages
wildfires through a longer summer period that dries fuels, promoting easier ignition and faster spread.
have increased from 7.5 to 37.1 days, in response to a spring-summer warming of 0.87C. Earlier
spring snowmelt has led to longer growing seasons and drought, especially at higher elevations, where
the increase in wildfire activity has been greatest. In the south-western U.S., fire activity is correlated
with ENSO positive phases, and higher Palmer Drought Severity Indices. Insects and diseases are a
natural part of ecosystems. In forests, periodic insect epidemics kill trees over large regions, providing
Heat fuelling California wildfire). We cant expect much from the status quo media (see CNN, ABC,
WashPost, and AP blow Australian wildfire, drought, heat-wave story). So here is CAPs Tom Kenworthy
explaining What a 1-Degree Temperature Increase Means for Wildfiresand Ill end with some
comments on this positive or amplifying carbon-cycle feedback: To the average person a 1-degree rise
in average spring and summer temperatures may not seem like much. But for residents of the western
United Statesincluding California, which is fighting at least eight fires right nowit
could mean
a staggering increase in the extent and cost of fires according to a recent study. In their
report, researchers at Headwaters Economics, an independent nonprofit research group in Bozeman,
they conclude, will increase the area burned by seasonal fires in Montana by more than 300 percent
and more than double the cost of protecting homes threatened by fire. Though the Headwaters paper
focuses on Montana, using data from 18 large fires in the state during 2006 and 2007, it has
implications for fire-prone areas throughout the Rocky Mountain West. And it builds on a growing body
of evidence that inaction on climate change will cost the western United States dearly. Earlier this
summer, for example, Harvard University scientists published a study in the Journal of Geophysical
Research predicting that areas burned by wildfires in the West could increase by 50 percent by 2050,
with even larger increases of 75 percent to 175 percent in the Pacific Northwest and Rocky Mountain
Federal and state agencies responsible for fighting western wildfires, particularly the United States
Forest Service, are already struggling to cope with the rapidly increasing costs of protecting lives and
property. Since 2000, wildland fires in the United States have burned an average of more than 7 million
acres a year, about double the average acreage for the previous four decades. Federal firefighting
costs have also risen dramatically, according to the Government Accountability Office, averaging $2.9
billion per year from fiscal 2001-2005 compared to $1.1 billion in the previous five-year period. The
Headwaters study predicts that state wildland firefighting costs in Montana will double to quadruple by
2025. The increasing popularity of building homes in or near forested areas, known as the wildlandurban interface, or WUI, is a major factor in the escalating costs of fire suppression. A 2006 report by
the Department of Agricultures Office of Inspector General found that the majority of [Forest Service]
large fire suppression costs are directly linked to protecting private property in the WUI, with Forest
Service managers estimating between 50 and 95 percent of large fire costs spent on that purpose
alone. Though federal agencies shoulder the major financial burden for protecting those homes,
development decisions in wild areas are made by local and state officials. While fire-prone lands are
being developed, the climate is warming, leading to more large fires, write the authors of the
Headwaters Economics report, which notes that with just 14 percent of the wildland urban interface
developed in the West, the cost of protecting those areas will increase significantly. More development
in these sensitive areas would lead to more wildfire suppression costs, even in the absence of climate
change. Climate change will only exacerbate this effect. Climate change and its impacts on
temperature, drought, and snowpack runoff will affect fires as well as many other aspects of life in the
West. Climate models predict that global warming will significantly reduce snow runoff in the West, the
regions major source of water. A study published in April by the Scripps Institution of Oceanography
estimated that the Colorado River, the lifeline for 27 million people in the Southwest, will not be able to
produce its allocated water supply 60 percent to 90 percent of the time by mid-century.
That
dioxide that accelerates global warming. As the 2006 Science article, Warming
and Earlier Spring Increase Western U.S. Forest Wildfire Activity (subs. reqd), concludes soberly:
virtually all climate-model projections indicate that warmer springs and summers will occur over the
region in coming decades. These trends will reinforce the tendency toward early spring snowmelt and
longer fire seasons. This will accentuate conditions favorable to the occurrence of large wildfires,
amplifying the vulnerability the region has experienced since the mid-1980s. The Intergovernmental
Panel on Climate Changes consensus range of 1.5 to 5.8C projected global surface temperature
warming by the end of the 21st century is considerably larger than the recent warming of less than
0.9C observed in spring and summer during recent decades over the western region. If the average
length and intensity of summer drought increases in the Northern Rockies and mountains elsewhere in
the western United States, an increased frequency of large wildfires will lead to changes in forest
composition and reduced tree densities, thus affecting carbon pools. Current estimates indicate that
If wildfire
trends continue, at least initially, this biomass burning will result in
carbon release, suggesting that the forests of the western United States may become a source
western U.S. forests are responsible for 20 to 40% of total U.S. carbon sequestration.
of increased atmospheric carbon dioxide rather than a sink, even under a relatively modest
temperature-increase scenario. Moreover, a recent study has shown that warmer, longer growing
seasons lead to reduced CO2 uptake in high-elevation forests, particularly during droughts. Hence,
the Christian Broadcasting Network reported alQaida was advising would-be terrorists how best to burn America. The terror
groups magazine included pictures, diagrams and explanations on how to
start fires to obtain the most damage. CBN analyst Erick Stakelbeck said the extreme
detail provides reason for concern. The information , he said, is all designed to
cause the maximum amount of carnage and death. CBN noted that in the U.S., more
balloons across the Pacific. However,
houses are built in the countryside than in the cities and cited a Montana fire chief who said the prospect
an Arabic-language jihadi website also posted a message purporting to be al-Qaidas plan of economic
attack on the U.S. that including proposals to turn the nations forests into raging infernos. The National
Terror Alert Response Center report said: We are NOT implying that the California fires are an act of
terrorism; however, the threat of pyro-terrorist attacks pose a significant risk to the U.S. and the fires in
California and Greece earlier this year should be a wake-up call. Even in 2003, an FBI memo warned that
national forests in the West could be the next target for terror by Osama bin Ladens al-Qaida network.
The memo, obtained by the Arizona Republic, warned law enforcement that a senior al-Qaida detainee told
interrogators he planned to spark multiple, catastrophic wildfires simultaneously in Colorado, Montana,
Utah and Wyoming to strike a blow to the U.S. economy. WND also reported documents
recovered
from a remote area along the Pakistan border revealed that bin Laden wanted
al-Qaida to launch a global fireball by lighting forest fires in Europe, the
United States, Australia and South America. The documents, uncovered during an
operation led by the British intelligence service MI6, were described by
experts in that agency as the most worrying [plot] that the world is facing.
not have been a surprise to the US government as people like William Scott of the American Center for Democracy warned about terrorists setting forest fires ten years
earlier. In an address this month to an Economic Warfare SuperPanel ACD/EWI, Scott divulged some details about the forest fires this year that have ravaged so many
parts of the US and drove him and his family away from their home in the Colorado Springs area. Not all of the fires you hear about and see on the news were caused by
Dozens of wildfires have been caused by arson and are still under investigation.
Scott contends that some of these arson set fires may in fact be the
results of al Qaedas fire war on America. Some of the fires that were
ignited in California in 2012 were set by al Qaeda operatives. Al
Qaeda articles have detailed instructions of how to plant timed
explosives in forests and grasslands, mainly in the western US. They
also laid out plans for the use of remote-controlled ember bombs
with which to start fires. Listen to Scott lay out his case that we are currently under al Qaedas
economic warfare plan to destroy Americas economy and way of life
by setting fires in strategic areas. At the time Scott spoke, a week ago, he points out that
there were 52 large fires burning in the US. Just since the beginning
of July, fire crews have been battling fires in Alabama, Alaska,
Arizona, Arkansas, California, Colorado, Florida, Georgia, Idaho,
Kentucky, Minnesota, Missouri, Montana, Nebraska, Nevada, New
Mexico, North Carolina, North Dakota, South Dakota, Tennessee,
Utah, and Wyoming. He also notes that these are just the fires on
federal land and not any of those on state or private lands including
6 fires, 4 of which were started in one night in wheat stubble fields
in Kansas earlier this month. Twenty-five fires set in El Paso and Tell Counties in Colorado. All of these fires were within a few
miles of each other and were all caused by arson. The arsonist who set them is still at large. Scott asks the question if the Waldo Canyon
fire was set by terrorists and could it have been set by the person
that set the other 25 fires, all of which were quickly extinguished.
Could the Waldo Canyon fire have been their lucky #26 that
destroyed homes, killed several people and will cost millions of
dollars in many ways. The impacts of fighting these fires will cost
billions of dollars in the long run. There are the immediate costs of
fighting the fires plus they have also the cost of hundreds of homes
and businesses. Some of these arson set fires have hit in heavy
tourist areas, causing many people to abort their vacation plans.
Hotels suffered huge numbers of cancellations. The loss of tourism
has forced many businesses to lay off workers. Until the forests have a chance to regrow, any
lightning.
substantial rains will cause massive flooding which will in turn cause the erosion of the fragile topsoil on hundreds of thousands of acres. Once the topsoil is gone, many of
lands and swifter in reaching fires as they start. He lays out ways this could happen, but somehow I doubt if our inept Congress will take the threat seriously, continue to
chock up the fires as lightning and domestic arsonists and continue to fight fires as cheaply as possible. If you do nothing else, at least forward this video of William Scott
to your Senator and Congressman/woman and urge them to take the threat seriously and to act upon it. If as Scott says that some of these fires are being deliberately set
by al Qaeda terrorists, then it is an act of war being waged on American soil. That means that we need to use our military resources to fight the terrorist fires and save the
lives and properties of Americans, and this should come before getting involved with Syrias civil war. America needs to defend America on American soil first!
learned in 2001, and again as recently as 2012 in Benghazi and 2013 with the Boston Marathon bombing,
terrorist threats are not something to take lightly. This years wildfire in Yosemite started Aug. 17 in the
Stanislaus National Forest, but authorities believe it was not an act off terror. They say a hunters illegal
fire swept out of control, torching 394 square miles of timber, meadows and sensitive wildlife habitat. The
Associated Press reports it has cost more than $89 million to fight, and officials say it will cost tens of
millions of dollars more to repair the environmental damage alone.
has been decimated by fire in the summer of 2013. As WND reported in June, an expert on
Islamic terrorism believes a wildfire that ravaged the outskirts of Colorado Springs, Colo., killing two people
and destroying more than 500 homes, should be examined by terror investigators. One thing that my
investigators have given me the authority to state is that they have all but
ruled out natural causes as the cause of this fire , said Sheriff Terry Maketa at the time.
I cant really go any further on that, but I can say we are pretty confident it was not, for instance, a
That single blaze in Colorado caused more than $85 million in
damage, but that figure is expected to rise to possibly $120 million.
lightning strike.
what matters is
Any of the counted carbonsequestering wood that burns, or rots, or oxidizes in some other
way, undermines the equivalence. So does any forestry practice that releases
carbon from existing sinks. In reality, storing carbon in forest sinks is inherently
vulnerable, if only because of the dynamic nature of ecosystems.
Some analysts have called this the ''carbon time-bomb effect,''
referring to sudden releases of carbon from systems previously
acting as sinks, and have judged that ''increasing the amount of carbon
stored in biospheric systems in order to compensate for carbon
emanating from the burning of fossil fuels constitutes a high-risk
strategy.''(f.#8)
will have a radiative effect on the atmosphere).(f.#7)
Extinction
Avery, Director of & Senior Fellow at Center for Global Food Issues, former
agriculture analyst for the State Department, and former staff member of the
President's National Advisory Commission on Food and Fiber, 95 (Dennis,
SAVING THE PLANET WITH NO-TILL, HIGH-YIELD FARMING, before the
Manitoba/North Dakota Zero Tillage Farmer's Association, January 24,
http://www.mandakzerotill.org/books/proceedings/Proceedings
%201995/highyield.html)
The true
Nor do the herbicides present any significant threat to wildlife or people from runoff or residues.
(Atrazine, the most widely-used "suspicious" herbicide in the world has just had its safety rating raised
seven-fold by the U.S. Environmental Protection Agency.) In addition, high-yield farmers are in the
midst of developing "no-leach" farming. Tractors and applicator trucks for farm chemicals now can be
guided by global positioning satellites and radar within inches of their true positions across the field,
while microprocessors vary the application rates of chemicals and seed seven times a second based on
intensive soil sampling, soil hydrology, slope, plant population and nearness to waterways. It is now
practical to manage our farms by the square yard, rather than in chunks of 10 or 100 hectares. Highyield farming must now claim environmental credit for both the acres not plowed. and for the soil
erosion not suffered.
in 1971, to its reduced engagement with Islamabad following the Soviet withdrawal from Afghanistan in
States is coy about the status and activities of its security personnel inside Pakistan, the latter is
ambiguous about the extent of its military's ties to extremists. Washington badly wants Pakistan to take
definitive steps to root out militants in North Waziristan, who use this tribal area as a staging ground for
attacks on U.S. forces in Afghanistan. Islamabad has thus far refused. Publicly, it argues that its army is
overstretched, referring explicitly to ongoing flood relief activities and counter militancy operations in
Pakistan's other tribal areas, and implicitly to troops massed along its eastern border with India. Yet behind
such explanations lurk the powerful strategic calculations that harden Islamabad's position and that
Washington can do little about: These anti-Afghan government extremists do not target the Pakistani
government, some maintain links with the Pakistani military, and they offer a hedge against Indian
influence in Afghanistan after U.S. forces have departed. Pakistan's wish list is also unlikely to be fulfilled. A
deal to provide civilian nuclear energy? Virtually unfathomable, given Pakistan's poor proliferation record.
Better access to U.S. markets for Pakistani textile exports? This proposal has considerable support around
Washington, but not from the powerful U.S. textile lobby. Also, proponents conveniently forget how
Pakistan's textile products are of decidedly lower value than those of Bangladesh and China. Efforts to get
India talking about Kashmir? Given its keen interest in furthering its rapidly developing strategic rapport
A deteriorating
relationship, even one marked by mutual mistrust and divergent interests,
can be salvaged in an environment of civility. Unfortunately, U.S .-Pakistan
relations unfold in a climate of acrimony. Washington berates Islamabad -publicly and incessantly -- for not taking sufficient action against militancy within its borders. Such
hectoring rankles Pakistanis to no end, and hardens a perception at the heart
of their mistrust of the United States - the perception that for Washington, security interests reign
with New Delhi, Washington will likely continue to treat this issue very delicately.
supreme and Pakistani lives are cheap. Constantly needling Pakistan to "do more" about domestic
militancy, Pakistanis believe, demonstrates callous disregard for the Pakistani soldiers killed in operations
against extremists in recent years. To be sure, however, Washington's language, while harsh, is rooted in a
very real fact: Islamabad has thus far to take action against key militant groups directly impacting
theories-such as that Washington deploys security forces in Pakistan-have been proven accurate, otherssuch as that Washington somehow triggered last year's horrific flooding-are patently absurd.
The United States routinely issues threats as well, some of which bring into question
the very viability of the relationship. U.S. Secretary of State Hillary Clinton declared
last year that an attack against the United States "traced to be Pakistani" would
have "a very devastating impact on our relationship." Given the increasingly
global reach of Pakistani militant organizations such as Lashkar e-Taiba and the
Pakistani Taliban, and their demonstrated ability to cultivate ties with U.S.-based Pakistanis (consider
the case of Mumbai attack plotter David Coleman Headley, or the links the FBI has alleged between
several westerners and Pakistani militants),
from remote.
Clinton asked the ISI to facilitate talks between Washington and reconcilable Haqqanis, and yet warned of
"dire consequences" for Islamabad if the Pakistani military did not take action against the Haqqanis who
are unwilling to negotiate. The Pakistani response was "yes" to talks, but "no" to military operations. Today,
thousands of American troops are in the Haqqani Network's crosshairs in eastern Afghanistan during efforts
to root out Haqqani militants, such as Operation Steel Rain in Khowst. Unless Pakistani generals act against
the Haqqani Network's sanctuary in North Waziristan, which they have refused to do so far, American
casualties will increase. In that case, there will be tremendous pressure on Congress and the White House
if helicopters
carrying American Seals are shot down in North Waziristan ? How will America
to act unilaterally, quite possibly by putting boots on the ground. What will happen
respond to a major attack that kills 100 troops in Afghanistan, like the September attack that wounded 77
What if
American boots trigger a mutiny in the Pakistani army, leading to civil war ?
How will Washington secure Pakistani nuclear weapons? Unfortunately, many of these dangerous
scenarios are increasingly likely. A Pakistani official has told me that
American-supplied Pakistani F-16 fighters are on high alert against a probable
US raid. In March, Pakistani Air Force had orders to shoot down US predator and
reaper drones. Last year, Islamabad shut down NATO's largest supply line for
soldiers in east Kabul? What if the perpetrators escape to Karachi, beyond the range of drones?
days, and three years ago, General Ashfaq Kayani, head of the Pakistani military, ordered fire on a US
helicopter carrying U.S. Special Forces that had crossed into North Waziristan. The Pakistani parliament,
political parties and the media are supportive of the army's sentiments against the United States, but not
the heads of top al-Qaeda leaders, the elimination of critical safe havens (Swat valley and South
Waziristan), but not the Quetta Shura in Balochistan or the Haqqanis in North Waziristan. At the same time,
since 9/11 more than 30,000 Pakistanis have been victims of terrorism, of which 6,000 were soldiers and
policemen. The city of Karachi, which contributes half of Pakistan's national income, is home to a brutal
based Haqqanis are killing American soldiers and disrupting the Afghan peace process, with what the
troops and political parties against expected U.S. raids into North Waziristan. He is pressing Washington's
weakest point: threatening to close crucial supply routes to Afghanistan, without which there would be
massive NATO fuel and ammunition shortages. It would take months, and improbable negotiations with the
Russians, to get a viable alternative to the "Northern Supply Network." It just a matter of Pakistani will, but
also Pakistani capabilities. There is great need for American helicopters and intelligence, surveillance and
reconnaissance (ISR), and yes, some American boots on the ground in the form of trainers and advisers.
Even if Pakistani generals decide to attack the Haqqanis, they no longer have resources to clear and hold
North Waziristan, and contain the blowback that could come in the form of a national suicide bombing
wave. In 2009, suicide attacks increased by 220 percent from the previous year (from ten to 32), targeting
major cities: Peshawar, Islamabad, Rawalpindi, Lahore and Karachi. This placed massive strains on poorly
equipped national police forces. The same year, riding on an anti-insurgent public opinion wave, Pakistani
commandoes, Frontier Scouts and 11th Corps infantry men - many trained and equipped by the United
States - broke the insurgents' back in the Swat Valley and South Waziristan. Today the Pakistani Army has
no public support for a military operation against the Haqqanis. Furthermore, the population's opposition to
the Pakistani Taliban - public enemy no. 1 in 2009 - is fading. That was not always the case. In the summer
of 2010, Pakistan's Commanding General for counterterrorism and counterinsurgency operations, told me,
"like Swat and South Waziristan [in 2009] with the help of the Pakistani public we will clean out North
Waziristan this winter [2010]." However, Pakistani intransigence regarding the Haqqanis, devastating
floods, the U.S. raid that killed Osama bin Laden, and the killing of two Pakistanis in Lahore by an American
spy made the operation in North Waziristan impossible. To renew ties we must start by replicating the 2009
conditions. American development dollars, weapons and trainers were flying in and al-Qaeda members
were flying out or shot dead. U.S. Admiral Mike Mullen, who rightly chides Pakistan today, said referring to
the Pakistani surge against Pakistani Taliban that he "couldn't give the Pakistani Army anything but an 'A'."
Scheuer had to say in an interview with Keith Olbermann on Feb. 20. He should
know. Hes the former head of the CIA bin Laden unit . We won the cities, but the Taliban and
from what Michael
al Qaeda escaped basically intact, and theyve been rebuilding and reequipping over the past five
years. the central place in terms of an attack inside the United States is Afghanistan and Pakistan.
When the next attack occurs in America, it will be planned and orchestrated
out of Afghanistan and Pakistan. the people who will plan the next attack in the United
States are those who are in Afghanistan and Pakistan, sir. The threat to the United States, inside the United
States, comes from al Qaeda. Al Qaeda is in Afghanistan and Pakistan. If you want to address the threat to
America, thats where it is. We dont treat thethis Islamist enemy as seriously
as we should. We think somehow were going to arrest them, one man at a time. These people are
going to detonate a nuclear device inside the United States, and were going to have absolutely
nothing to respond against. LINK Al Qaeda isnt like North Korea or Iran against whom we could and
probably would launch a massive nuclear strike should they be so foolhardy to attack us or our allies with
nuclear weapons. Our defense against them is the assurance that we would obliterate their countries. I
have little doubt that al Qaeda leaders from Osama on down would gladly meet their maker if they could
do so knowing they had killed a million Americans in one glorious strike against the infidel. They would
launch such a strike in the belief that, should they die, those jihadists left alive would reconstitute
Americans, there would be no al Qaeda country to bomb into the stone age. We would have to go after
them there and kill them. We would have to thwart the plan the martyr leaders had for a bigger and better
al Qaeda. I see only two ways to do this. Heres the first. The first is to mobilize a huge army of highly
trained mountain troops. By huge I envision 100,000 to 200,000 as the terrain, pockmarked with caves and
tunnels, is a guerilla armys dream. George Bush calls the area wilder than the Wild West, but which al
Qaeda calls home. It will make fighting an enemy in the jungles of Vietnam look like a walk in the park. Our
current forces in Iraq, and those who have been cycled through, have been trained in desert and urban
warfare. In order to get the military up to strength for an effective mountain campaign against the forces
wed face there, we would need a draft. It would take at least six months to get the first contingent of
mountain trained and equipped troops there. Without massive numbers and the best logistics they would
with Gen. Pervez Musharraf. He is being portrayed as giving him a dose of the stern Cheney stuff, although
he seemed to be less than his usual belligerent self when he said that if aid to Pakistan is cut it will be due
to the feckless Domcratic Congress. I hope in private he really laid out the true dire consequenses to
Pakistan if theres an al Qaeda attack against the United States My hunch is that our atrophying testicular
should
the U.S. get attacked, retaliation will be swift and brutal. It will be nuclear strikes
against suspected al Qaeda strongholds along the Afghanistan Pakistan
border. He might have even hammered him with a power point presentation based on a the fact sheet,
veep warned him that unless he gets serious about going after al Qaeda bases (and Osama),
Nuclear Weapons Effects, from the American Federation of Scientists. LINK Whether we choose option one
or option two, we would still have to contend with the Talban and al-Qaeda who are already spread through
the non-mountainous parts of the country. To do this we would need to greatly augment the 40,000 forces
we already have there. These troops would have to come from Iraq, and they would have to come as
quickly as possible no matter the consequences for whoever is worth saving in Iraq. The news, I mean the
real news sans Anna Nicoles remains and Britney Spears bald head, is full of stories about the latest you
aint seen nothing yet proof that Iran is supplying really nasty weapons being used to kill our troops in
Iraq. All the pundits are speculating as to whether Bush plans an attack against Iran. Meanwhile, in a
matter of seconds, we could be deciding whether to retaliate against al Qaeda with nuclear bombs, and no
one wants to talk about this.
particularly India. Following talks Thursday with France's foreign minister in New Delhi, Krishna told
reporters that Washington and Islamabad should sort out their recent differences through a dialogue. The
Indian minister's comments came as U.S. Secretary of State Hillary Clinton visited Islamabad and urged
Afghanistan. Islamabad denies providing support to the militant network. Bharat Karnad at New Delhis
Center for Policy Research says India could be adversely impacted if relations between the Washington and
Extinction
Ghulam Nabi Fai, Kashmiri American Council, July 8, 2001, Washington
Times
The foreign policy of the United States in South Asia should move from the lackadaisical and distant
The
most dangerous place on the planet is Kashmir, a disputed territory
(with India crowned with a unilateral veto power) to aggressive involvement at the vortex.
convulsed and illegally occupied for more than 53 years and sandwiched between nuclear-capable
widespread misery amongst their populations. Neither country has initialed the Nuclear NonProliferation Treaty, the Comprehensive Test Ban Treaty, or indicated an inclination to ratify an
impending Fissile Material/Cut-off Convention.
1AC
when the U.S. government asserts that it can exploit electronic data abroad for intelligence purposes, it creates an international reaction with profound economic consequences. For example, Europes
Commissioner for digital affairs, Neelie Kroes, predicts the fallout from Snowdens leaks will have multi-billion Euro consequences for US businesses. The EU Commissions Vice President, Viviane Reding, is pushing
for Europe to adopt more expansive privacy laws that will help build market share for regional companiesthereby shutting American companies out.
The economic
. Studies by leading Internet researchers at ITIF, Gartner, and Forrester examining the NSA surveillance revelations
impact project potential lost revenue for U.S. cloud computing companies ranging from $35 billion to $180 billion over the next three years. More than half of the overseas members of a cloud industry group, the
Cloud Security Alliance, said they were less likely to use U.S. cloud providers in the future. Ten percent of such members said they had cancelled a U.S. cloud services project as a result of the Snowden Incident.
While the true costs of the loss of trust are hard to quantify, and will be reported in future quarters, the potential losses are enormous. Second, what will this mean for the future of Internet governance? Since its
earliest days, the U.S.-based Internet Corporation for Assigned Names and Numbers (ICANN) has governed the web. As the Internet has expanded, several nations, especially China, have been pressing to end
American dominance and transfer control of Internet governance to the International Telecommunication Union (ITU), a specialized agency within the United Nations. Worse still for prospects of continued American
dominance, the NSA revelations have prompted calls for extensive regional control of the Internet. For example, Brazil, which has long called for such regional control, will host an important Internet governance
to Internet governance
undermine or
Recommendations for change are coming from many corners. President Obamas advisory group on NSA reform is
calling for an end to bulk collection of Americans metadata and other steps to restore protections abroad. Major Internet companies have called for greater restrictions on surveillance activities, saying the balance
has tipped too far from the individual. The government should heed these calls for reflection and reform.
implications
our economy could pay the price.
of our security policies and taking reasonable steps to restore trust in Americas surveillance efforts,
. Though they developed independently and remain quite different from one another, for many
- with the support and encouragement of the federal government - to cover "all crimes and all hazards."
also
over time
, and participation in these centers has grown to include not just law enforcement, but other government entities, the
new
at a time when new technology, government powers and zeal in the "war on terrorism" are combining to
.
(Natasha, NSA Spying Risks Undermining Trust In U.S. Cloud Computing Businesses, Warns Kroes, Tech
Crunch, July 4, 2013, Accessed April 8, 2015, http://techcrunch.com/2013/07/04/spying-bad-forbusiness/)//AD
Commissions vice-president, Neelie Kroes, has warned in a speech today. Kroes also reiterated
individuals and businesses living and conducting business in Europe in order to avoid a knock-on effect on cloud businesses. Loss of
Europeans trust could result in multi-billion euro consequences for U.S. cloud providers, she added. Kroes was speaking during a press
conference held in Estonia, following a meeting of the ECs European Cloud Partnership Steering Board, which was held to agree on EU-wide
cloud computing
businesses are at particular risk of fallout from a wide-reaching U.S.
government surveillance program because they rely on their customers trust
to function trust that the data entrusted to them is stored securely. Kroes said: If
businesses or governments think they might be spied on, they will have less
reason to trust the cloud, and it will be cloud providers who ultimately miss
out. Why would you pay someone else to hold your commercial or other
secrets, if you suspect or know they are being shared against your wishes?
Front or back door it doesnt matter any smart person doesnt want the
information shared at all. Customers will act rationally, and providers will miss out on a great opportunity.
specifications for cloud procurement. In her speech, part of which follows below, she argued that
processing power. Modeling protein folding is another example of how compute resources will be used. Protein folding is
linked to many diseases including Alzheimers and cancer, and analyzing the folding process can lead to new treatments
and cures, but it requires enormous compute power. Projects like Folding@home are using distributed computing to tackle
[ Vicky Pope is the head of climate science advice at the Met Office Hadley
Centre, How science will shape climate adaptation plans, 16 September
2010, http://www.guardian.co.uk/environment/cif-green/2010/sep/16/scienceclimate-change-adaptation]
the demand for information on how climate change will affect
our future outstrips the current capability of the science and climate
models. My view is that as scientists, we can provide useful information, but we need to be clear about its
limitations and strive to improve information for the future. We need to be clear about the uncertainties
Some would argue that
in our projections while still extracting useful information for practical decision-making. I have been involved in developing climate models for
the last 15 years and despite their limitations we are now able to assess the probability of different outcomes for the first time. That means
we can quantify the risk of these outcomes happening. These projections the UK climate
projections published in 2009 - are already forming the backbone of adaptation decisions being made in the UK for 50 to 100 years ahead. A
project commissioned by the Environment Agency to investigate the impact of climate change on the Thames estuary over the next 100 years
concluded that current government predictions for sea level rise are realistic. A major outcome from the scientific analysis was that the worstcase scenarios for high water levels can be significantly reduced - from 4.2m to 2.7m because we are able to rule out the more extreme sea
level rise. As a result, massive investment in a tide-excluding estuary barrage is unlikely to be needed this century. This will be reviewed as
more information becomes available, taking a flexible approach to adaptation. The energy industry, working with the Met Office, looked at the
likely impact of climate change on its infrastructure. The project found that very few changes in design standards are required, although it did
highlight a number of issues. For instance, transformers could suffer higher failure rates and efficiency of some types of thermal power station
could be markedly reduced because of increasing temperatures. A particular concern highlighted by this report and reiterated in today's report
from the Climate Change Committee - the independent body that advises government on its climate targets - is that little is known about how
winds will change in the future - important because of the increasing role of wind power in the UK energy mix. Fortunately many people, from
Demand
for climate information is increasing, particularly relating to changes in the
short to medium term. More still needs to be done to refine the climate
projections and make them more usable and accessible. This is especially
true if we are to provide reliable projections for the next 10 to 30 years.
The necessary science and modelling tools are being developed, and the first
private industry to government, recognise the value of even incomplete information to help make decisions about the future.
tentative results are being produced. We need particularly to look at how we communicate complex and often conflicting results. In order to
explain complex science to a lay audience, scientists and journalists are prone to progressively downplay the complexity. Conversely, in
striving to adopt a more scientific approach and include the full range of uncertainty, we often give sceptics an easy route to undermine the
science. All too often uncertainty in science offers a convenient excuse for delaying important decisions. However, in the case of climate
change there is overwhelming evidence that the climate is changing in part due to human activities and that changes will accelerate if
emissions continue unabated. In examining the uncertainty in the science we must take care to not throw away what we do know. Science has
increasing number and intensity of devastating typhoons --most recently cyclone Nargis in
Myanmar, which killed more than 100,000 people--as evidence that the world's climatic and weather
conditions are turning deadly because of climate change. They also reminded the audience
that deadly typhoons have also hit the Philippines recently, particularly Milenyo and Reming, which left hundreds of thousands of Filipino
effects of climate change are felt, our children will be the ones to suffer. How will Filipinos survive climate change? Well, first of all, they have
to be made aware that climate change is a problem that threatens their lives. The easiest way to do this as former Consultant for the
Secretariats of the UN Convention on Climate Change Dr. Pak Sum Low told abs-cbnews.com/Newsbreak is to particularize the disasters that
it could cause. Talking in the language of destruction, Pak and other experts paint this portrait of a Philippines hit by climate change: increased
typhoons in Visayas, drought in Mindanao, destroyed agricultural areas in Pampanga, and higher incidence rates of dengue and malaria.
Saom said that as polar ice caps melt due to global warming, sea levels will rise, endangering coastal and low-lying areas like Manila. He said
Manila Bay would experience a sea level increase of 72 meters over 20 years. This means that from Pampanga to Nueva Ecija, farms and
fishponds would be in danger of being would be inundated in saltwater. Saom added that Albay, which has been marked as a vulnerable area
to typhoons, would be the top province at risk. Saom also pointed out that extreme weather conditions arising from climate change, including
typhoons and severe droughts, would have social, economic and political consequences: Ruined farmlands and fishponds would hamper crop
growth and reduce food sources, typhoons would displace people, cause diseases, and limit actions in education and employment. Thus, Sao
said, while environmental protection should remain at the top of the agenda in fighting climate change, solutions to the phenomenon "must
also be economic, social, moral and political." Mitigation Joyceline Goco, Climate Change Coordinator of the Environment Management Bureau
of the Department of Environment and Natural Resources, focused her lecture on the programs Philippine government is implementing in
order to mitigate the effects of climate change. Goco said that the Philippines is already a signatory to global agreements calling for a
reduction in the "greenhouse gasses"--mostly carbon dioxide, chloroflourocarbons and methane--that are responsible for trapping heat inside
the planet and raising global temperatures. Goco said the DENR, which is tasked to oversee and activate the Clean Development Mechanism,
has registered projects which would reduce methane and carbon dioxide. These projects include landfill and electricity generation initiatives.
She also said that the government is also looking at alternative fuel sources in order do reduce the country's dependence on the burning of
fossil fuels--oil--which are known culprits behind global warming. Bracke however said that mitigation is not enough. "The ongoing debate
about mitigation of climate change effects is highly technical. It involves making fundamental changes in the policies of governments, making
costly changes in how industry operates. All of this takes time and, frankly, we're not even sure if such mitigation efforts will be successful. In
A few nations
and communities have already begun adapting their lifestyles to cope with
the effects of climate change. In Bangladesh, farmers have switched to
raising ducks instead of chickens because the latter easily succumb to weather disturbances and immediate effects, such as
floods. In Norway, houses with elevated foundations have been constructed to
the meantime, while the debate goes on, the effects of climate change are already happening to us." Adaptation
decrease displacement due to typhoons. In the Philippines main body for fighting climate change, the Presidential Task Force on Climate
Change, (PTFCC) headed by Department on Energy Sec. Angelo Reyes, has identified emission reduction measures and has looked into what
fuel mix could be both environment and economic friendly. The Department of Health has started work with the World Health Organization in
climate change. He pointed out that since the Red Cross was founded in 1919, it has already been helping people beset by natural disasters.
"The problems resulting from climate change are not new to the Red Cross. The Red Cross has been facing those challenges for a long time.
However, the frequency and magnitude of those problems are unprecedented. This is why the Red Cross can no longer face these problems
alone," he said. Using a medieval analogy, Bracke said that the Red Cross can no longer be a "knight in shining armor rescuing a damsel in
distress" whenever disaster strikes. He said that disaster preparedness in the face of climate change has to involve people at the grassroots
level. "The role of the Red Cross in the era of climate change will be less as a direct actor and increase as a trainor and guide to other partners
who will help us adapt to climate change and respond to disasters," said Bracke. PNRC chairman and Senator Richard Gordon gave a picture of
how the PNRC plans to take climate change response to the grassroots level, through its project, dubbed "Red Cross 143". Gordon explained
how Red Cross 143 will train forty-four volunteers from each community at a barangay level. These volunteers will have training in leading
communities in disaster response. Red Cross 143 volunteers will rely on information technology like cellular phones to alert the PNRC about
disasters in their localities, mobilize people for evacuation, and lead efforts to get health care, emergency supplies, rescue efforts, etc.
progress they will have serious implications for U.S. national security interests as well as global stabilityextending from the sustainability of
coastal military installations to the stability of nations that lack the resources, good governance, and resiliency needed to respond to the many
to start thinking about new and comprehensive answers to multifaceted crisis scenarios brought on or worsened by global climate change. As
Achim Steiner, executive director of the U.N. Environment Program, argues, The question we must continuously ask ourselves in the face of
scientific complexity and uncertainty, but also growing evidence of climate change, is at what point precaution, common sense or prudent risk
globes least developed countries. Climate change will pose challenging social, political, and strategic questions for the many different
multinational, regional, national, and nonprofit organizations dedicated to improving the human condition worldwide. Organizations as
different as Amnesty International, the U.S. Agency for International Development, the World Bank, the International Rescue Committee, and
the World Health Organization will all have to tackle directly the myriad effects of climate change. Climate change also poses distinct
foundation and overview for a series of papers focusing on the particular challenges posed by the cumulative effects of climate change,
migration, and conflict in some of our worlds most complex environments. In the papers following this report, we plan to outline the effects of
this nexus in northwest Africa, in India and Bangladesh, in the Andean region of South America, and in China. In this paper we detail that nexus
across our planet and offer wide ranging recommendations about how the United States, its allies in the global community, and the community
at large can deal with the coming climate-driven crises with comprehensive sustainable security solutions encompassing national security,
diplomacy, and economic, social, and environmental development. Here, we briefly summarize our arguments and our conclusions. The nexus
The Arab Spring can be at least partly credited to climate change. Rising food prices and efforts by authoritarian regimes to crush political
protests were linked first to food and then to political repressiontwo important motivators in the Arab makeover this past year. To be sure,
longstanding economic and social distress and lack of opportunity for so many Arab youth in the Middle East and across North Africa only
needed a spark to ignite revolutions across the region. But environmental degradation and the movement of people from rural areas to already
overcrowded cities alongside rising food prices enabled the cumulative effects of long-term economic and political failures to sweep across
borders with remarkable agility. It does not require much foresight to acknowledge that other effects of climate change will add to the pressure
in the decades to come. In particular the cumulative overlays of climate change with human migration driven by environmental crises, political
conflict caused by this migration, and competition for more scarce resources will add new dimensions of complexity to existing and future
crisis scenarios. It is thus critical to understand how governments plan to answer and prioritize these new threats from climate change,
will experience some of the effects of this transformational challenge. Heres just one case in point: African states are likely to be the most
vulnerable to multiple stresses, with up to 250 million people projected to suffer from water and food insecurity and, in low-lying areas, a rising
sea level.3 As little as 1 percent of Africas land is located in low-lying coastal zones but this land supports 12 percent of its urban population.4
Furthermore, a majority of people in Africa live in lower altitudesincluding the Sahel, the area just south of the Saharawhere the worst
effects of water scarcity, hotter temperatures, and longer dry seasons are expected to occur.5 These developments may well be exacerbated
by the lack of state and regional capacity to manage the effects of climate change. These same dynamics haunt many nations in Asia and the
Americas, too, and the implications for developed countries such as the United States and much of Europe will be profound. Migration
of climate change. The United Nations recent Human Development Report stated that, worldwide, there are already an estimated 700 million
internal migrantsthose leaving their homes within their own countriesa number that includes people whose migration isrelated to climate
change and environmental factors. Overall migration across national borders is already at approximately 214 million people worldwide,6 with
estimates of up to 20 million displaced in 2008 alone because of a rising sea level, desertification, and flooding.7 One expert, Oli Brown of the
International Institute for Sustainable Development, predicts a tenfold increase in the current number of internally displaced persons and
international refugees by 2050.8 It is important to acknowledge that there is no consensus on this estimate. In fact there is major
disagreement among experts about how to identify climate as a causal factor in internal and international migration. But even though the root
causes of human mobility are not always easy to decipher, the policy challenges posed by that movement are real. A 2009 report by
the
International Organization for Migration produced in cooperation with the United Nations University and the Climate Change, Environment
and Migration Alliance cites numbers that range from 200 million to 1 billion migrants
from climate change alone, by 2050,9 arguing that environmental drivers of migration are often coupled with
economic, social and developmental factors that can accelerate and to a certain extent mask the impact of climate change. The report also
notes that migration can result from different environmental factors, among them gradual environmental degradation (including
desertification, soil and coastal erosion) and natural disasters (such as earthquakes, floods or tropical storms).10 (See box on page 15 for a
more detailed definition of climate migrants.) Clearly, then,
existing migratory pressures around the world. Indeed associated extreme weather events
resulting in drought, floods, and disease are projected to increase the number
of sudden humanitarian crises and disasters in areas least able to cope , such as
those already mired in poverty or prone to conflict.11 Conflict This final layer is the most unpredictable, both within nations and
transnationally, and will force the United States and the international community to confront climate and migration challenges within an
increasingly unstructured local or regional security environment. In contrast to the great power conflicts and the associated proxy wars that
marked most of the 20th century, the immediate post- Cold War decades witnessed a diffusion of national security interests and threats. U.S.
national security policy is increasingly integrating thinking about nonstate actors and nontraditional sources of conflict and instability, for
example in the fight against Al Qaeda and its affiliated groups. Climate change is among these newly visible issues sparking conflict. But
because the direct link between conflict and climate change is unclear, awareness of the indirect links has yet to lead to substantial and
nexus was highlighted with particular effect by the current U.S. administrations security-planning reviews over the past two years, as well as
Center for Naval Analysis, which termed climate change a threat multiplier , indicating that it can
. The Pentagons latest Quadrennial Defense Review also recognized
climate change as an accelerant of instability or conflict, highlighting the operational challenges that
the
will confront U.S. and partner militaries amid a rising sea level, growing extreme weather events, and other anticipated effects of climate
change.13 The U.S. Department of Defense has even voiced concern for American military installations that may be threatened by a rising sea
level.14 There is also well-developed international analysis on these points. The United Kingdoms 2010 Defense Review, for example,
referenced the security aspects of climate change as an evolving challenge for militaries and policymakers. Additionally, in 2010, the Nigerian
government referred to climate change as the greatest environmental and humanitarian challenge facing the country this century,
demonstrating that climate change is no longer seen as solely scientific or environmental, but increasingly as a social and political issue
cutting across all aspects of human development.15 As these three threadsclimate change, migration, and conflictinteract more intensely,
the consequences will be far-reaching and occasionally counterintuitive. It is impossible to predict the outcome of the Arab Spring movement,
for example, but the blossoming of democracy in some countries and the demand for it in others is partly an unexpected result of the
consequences of climate change on global food prices. On the other hand, the interplay of these factors will drive complex crisis situations in
Several
regional hotspots frequently come up in the international debate on climate change , migration,
and conflict. Climate migrants in northwest Africa, for example, are causing communities across the region to
respond in different ways, often to the detriment of regional and international security concerns. Political and social
instability in the region plays into the hands of organizations such as Al Qaeda in the
Islamic Maghreb. And recent developments in Libya, especially the large number of weapons looted from depots after strongman
which domestic policy, international policy, humanitarian assistance, and security converge in new ways. Areas of concern
Moammar Qaddafis regime fell which still remain unaccounted forare a threat to stability across North Africa. Effective solutions need not
address all of these issues simultaneously but must recognize the layers of relationships among them. And these solutions must also recognize
that these variables will not always intersect in predictable ways. While some migrants may flee floodplains, for example, others may migrate
climate migrants. The country will contribute 22 percent of global population growth and have close to 1.6 billion inhabitants by 2050, causing
demographic developments that are sure to spark waves of internal migration across the country. Then theres the
Andean
and snowcaps will drive climate, migration, and security concerns. The
average rate of glacial melting has doubled over the past few years, according to the World Glacier Monitoring Service.17 Besides Peru, which
faces the gravest consequences in Latin America, a number of other Andean countries will be massively affected, including Bolivia, Ecuador,
Finally, China is now in its fourth decade of ever-growing internal migration, some of it driven in recent years by environmental change. Today,
WGS has become an essential tool for drug development by enabling the
rapid identification of resistance mechanisms , particularly in the context of tuberculosis (TB), which
remains a global public health emergency [15,16]. In 2005 the first published use of 454
pyrosequencing (the first second-generation WGS technology) was to identify the F0 subunit ofthe ATP synthase as the
target of bedaquiline, which subsequently became the first representative of a novel class of anti-TB agents
to be approved in 40 years [16,17]. This has enabled researchers to sequence this gene in
phylogenetically diverse reference collections to ensure thatitis conserved across Mycobacterium canettii as well as the various lineages and
This represents an
important step because drug candidates are usually only tested against a
small number of isolates during the early phases of drug development. Similarly, only a limited number of MTBC
genotypes are sampled in clinical trials, depending on where these are conducted [19]. As a result, intrinsically
resistant strains might be missed, ashas been the case forPA-824, ananti-TB agent in Phase III trials [1921].
The early elucidation of resistance mechanisms using WGS also has
implications for the design of clinical trials. If resistance mechanisms are
species that comprise the Mycobacterium tuberculosis complex (MTBC), the causative agents ofTB[18].
discovered that only result in marginally increased minimal inhibitory concentrations (MICs) compared with the wild type MIC
distributions, more frequent dosing or higher doses could be employed in clinical
trials to overcome this level of resistance. Moreover, the discovery of cross-resistance
between agents using WGS can influence the choice of antibiotics that are
included in novel regimens. TB is always treated with multiple antibiotics to minimise the chance of treatment failure as
a result of the emergence of resistance during treatment [22]. Regimens that contain agents to which a single mutation confers crossresistance should be avoided if these mutations arise frequently in vivo. WGS has recently highlighted that this may be the case with three
Phase II trial regimens that contain bedaquiline and clofazimine because the mutational upregulation of an efflux pump confers crossresistance to both drugs [23]. In addition to being a tool to design clinical trials, WGS has become an increasingly important tool during clinical
it is increasingly being used to distinguish exogenous reinfection from relapse of the primary
which is crucial in assessing the efficacy of the drug
trials. Specifically,
infection,
or regimens under investigation
[24,25]. Traditional epidemiological tools do not always provide the necessary resolution for this purpose. This is due to the fact that they only
interrogate minute parts of the genome {e.g., multilocus sequence typing (MLST) of Pseudomonas aeruginosa analyses only 0.18% of the
to reduce the growing threat of multi-resistant pathogens: there are too many parties involved. Furthermore, the problem
has not yet really arrived on the radar screen of many physicians and clinicians, as antimicrobials still work most of the
timeapart from the occasional news headline that yet another nasty superbug has emerged in the local hospital.
Legislating the use of antibiotics for non-therapeutic applications and curtailing general public access to them is
conceivable, but legislating the medical profession is an entirely different matter. In order to meet the growing problem of
CASE Extensions
information officers
data centres
are now
things. That's the picture Jim Thompson, chief engineer and vice-president for engineering and supply chain at technology vendor Unisys, brought to last week's ninth annual CIO Summit. He talked on the rise of the
"The fridges are getting smaller. They're more like wine cellars now," he says from his home base in Philadelphia. But while servers have got smaller, the
average enterprise has added more of them to host applications that talk to the web and mobile technology.
the early part of the industrial revolution, when factories would have their own power plants. "As the infrastructure matured, big factories got out of the power generation business
. "Business and IT have wrestled with how to deliver technology to the enterprise.
even more pressure on IT departments to reduce costs. "Our friends at [analysis firm] Gartner say something like 25 per cent of IT costs have to come out by 2017, so a CIO looks at how to deliver value to the
enterprise, but also help innovate and grow and differentiate while taking costs out. "Most of these guys are also saying they are overwhelmed in one way or another, they have way more work than they can deal
with." Budgets are fixed or declining, expectations are rising, and new consumer technologies like phones and watches are demanding more of their time. "My car just told my phone I need an iWatch," jokes
Thompson, but the new technology will be no joke for IT departments. Thompson says as a rule of thumb two-thirds of spending on the data centre goes to run the operation at a steady state, 20 per cent goes
towards growth and what's left must pay for any innovation in the business. The bulk of costs are in labour and software licensing. Jim Thompson. Jim Thompson. "CIOs should look to minimise the number of
vendors, maximise the licence coverage, optimise cost and as much as possible optimise staff, and use co-lo services or any kind of cloud you can. "They need to recognise where the business differentials are,
what exactly is the secret sauce for business? Everything can go in the
cloud
It's not just applications but storage and
computing power that can be bought
the
else
." It's a bit like payroll, which most organisations outsourced decades ago.
when needed from disruptors like Amazon or Rackspace. It can be a solution or just raw assets to do testing
and development. "You can't push everything into the cloud so you have to be disciplined about what you do and where," Thompson says. "You need to recognise your differentiators, the places you want to
innovate and grow. "How does IT shift its position in the enterprise from a passive supplier to a business enabler? I think there is a mindset shift that CIOs have to take in the way they operate their IT component. It
shouldn't be viewed as just a boiler in the basement that keeps the lights on. It should be used as it can be used to create differentiated business value. It's about recognising the rise of digitalisation in business."
Every bit of new consumer technology influences the way businesses have to respond. "Every business has an app now, things you never expected to produce an application for a phone now do and some are pretty
worthwhile. That's what the customer expects whenever they make a transaction. "That is a stress on IT and they need to shift the pedestrian stuff that is now consuming two-thirds of their assets. They need to
take that the way of payroll. Get rid of that stuff and focus on what differentiates me and my business in the marketplace. How do I get in front of what customers want and need?" Thompson, who has almost three
decades with Unisys and holds technology patents in operating systems, storage and banking, looks back to the days when IBM and Unisys mainframes got eaten from the bottom because Intel produced an
inexpensive chip that ended up on the desktop. The days of needing big expensive computers on site doing a lot of processing are never coming back. As one of the longest surviving mainframe providers, Unisys
stopped producing its own chips and now uses Intel's X86 chip architecture. Thompson says having an enterprise standardise on an architecture like X86 makes sense. "You get agility by standardisation because as
things ebb and flow, you have interchangeable parts.
cloud.
" " Provisioning with cloud resource means it can be throttled down when needed. Unisys' main hunting ground in New Zealand is banks, the health sector and government agencies.
Ive seen put the percentage between 5% and 10% of the slightly
. Yet
, and there is
. A recent roundup of projections in Forbes paints the picture. Cloud-IT The Global Picture From our studies at the Tau Institute
There are bright spots in every region, with countries such as Jordan, Latvia, Morocco, and the Philippines joining better-
known places where IT is playing an increasing role in economic development. Research weve been conducting for the past several years has produced a picture of how more than 100 nations throughout the world
are progressing with their overall IT infrastructure, on a relative basis. We seek to find the nations that are doing the most with the economic resources they have, and we issue several specific groups of rankings.
Given robust underlying infrastructure, and reasonable socio-economic conditions, a
nation
should be set to
. Training & Education Are Key education-cloud An emphasis on operating expenses instead of capital expenditure, the ability to scale (and
single organizations
cloud computing
that can
. There are significant issues of data sovereignty and security entangled in distributed cloud infrastructures that cross international borders, to be sure. But
inter-governmental organizations from the European Union (EU) to the Association of Southeast Asian Nations (ASEAN) to the East African Community (EAC) and many more are stocked with serious-minded people
working to address and solve the political issues so that the technology may flow and improve the lives of their people. There will be no flow without proper, specific education and training. Although SaaS and PaaS
can insulate end-users as well as developers from the tricky particulars of dealing with the underlying infrastructure, there is tremendous complexityand opportunityinvolved in designing, deploying, and
provisioning that infrastructure. The opportunity lies in training the people of the world in the languages, frameworks, platforms, and architectures that form cloud computing in the whole.
Link
Large scale surveillance activities by the United States
harms the trust in cloud computing industries
Nerijus Adomaitis, 11-7-2013, "U.S. spying harms cloud computing, Internet
freedom: Wikipedia founder," Reuters,
http://www.reuters.com/article/2013/11/07/net-us-wikipedia-spyingidUSBRE9A613A20131107
The United States'
large-scale surveillance
harm the U.S.
cloud computing industry
U.S.
eavesdropping
poses a threat to Internet
freedoms
have a big impact on the cloud
computing industry as people are afraid to put data in the U.S.
alleged
, the founder of Wikipedia said on Thursday. Jimmy Wales, who launched the online encyclopaedia service 12 year ago, said the
, revealed by leaks from former U.S. intelligence contractor Edward Snowden, also
work I do," Wales told reporters after speaking at an IT event in Norway. "If you are BMW, a car maker in Germany,... you probably are not that comfortable putting your data into the U.S. any more," said the former
Cloud computing
is being adopted by big companies
costs and give flexibility to their IT departments
futures trader who is still a key player at Wikipedia, one of the most popular websites in the world.
business software that is run remotely via the Internet instead of on-site. It
to cut
. Snowden's leaks revealing the reach and methods of U.S. surveillance have
prompted angry calls for explanations from France to Brazil. Germany has been particularly annoyed by revelations that the U.S. National Security Agency (NSA) monitored Chancellor Angela Merkel.
"EMBARRASSING" Wales said the revelations made it more difficult to convince oppressive regimes to respect basic freedoms and privacy as Wikipedia seeks to limit censorship of its content. "They (spying
revelations) give the Chinese every excuse to be as bad as they have been... It's really embarrassing," he said. "It's an enormous problem, an enormous danger." China and countries in the Middle East have been
most active in filtering Wikipedia content to restrict access to certain information, Wales said. He said Wikipedia had no plan to introduce advertising. "If we need to do that to survive, we will do what's needed to
survive, but we are not discussing that," he said. "Some places have to remain free of commerce... Wikipedia is a temple for the mind," Wales said. Wikipedia has been financed through a non-profit foundation
Wikimedia, which reported revenues of $38.4 million for the fiscal year 2011-2012, including $35.1 million in donations and contributions.
reform effort and make things right. Mark Zuckerberg, Facebook Source: Reformgovernmentsurveillance.com Bits More Tech Coverage News from the technology
industry, including start-ups, the Internet, enterprise and gadgets. On Twitter: @nytimesbits. Enlarge This Image Justin Sullivan/Getty Images Larry Page, chief of
Google, called for reform of security laws worldwide, saying , We urge the U.S.
government to lead the way. On Monday the companies, led by Google and Microsoft,
presented a plan to regulate online spying and urged the United States to
lead a worldwide effort to restrict it. They accompanied it with an open letter, in the form of full-page ads in national
newspapers, including The New York Times, and a website detailing their concerns. It is the broadest and strongest effort by the companies, often archrivals, to speak with
one voice to pressure the government. The tech industry, whose billionaire founders and executives are highly sought as political donors, forms a powerful interest group
that is increasingly flexing its muscle in Washington. Its now in their business and economic interest to protect their users privacy and to aggressively push for changes,
said Trevor Timm, an activist at the Electronic Frontier Foundation. The N.S.A. mass-surveillance programs exist for a simple reason: cooperation with the tech and
telecom companies. If the tech companies no longer want to cooperate, they have a lot of leverage to force significant reform. The political push by the technology
use technology they dont trust, Brad Smith, Microsofts general counsel, said in a statement. Governments
have put this trust at risk, and governments need to help restore it. Apple, Yahoo, Facebook, Twitter, AOL and LinkedIn joined Google and
Microsoft in saying that they believed in governments right to protect their citizens. But, they said, the spying revelations that began last summer with leaks of National
Security Agency materials by Edward J. Snowden showed that the balance in many countries has tipped too far in favor of the state and away from the rights of the
individual. The Obama administration has already begun a review of N.S.A. procedures in reaction to public outrage. The results of that review could be presented to the
White House as soon as this week. Having done an independent review and brought in a whole bunch of folks civil libertarians and lawyers and others to examine
whats being done, Ill be proposing some self-restraint on the N.S.A., and you know, to initiate some reforms that can give people more confidence, Mr. Obama said
cooperated with the government to some extent by handing over data in response to legal requests. The new principles outlined by the companies contain little
information and few promises about their own practices, which privacy advocates say contribute to the governments desire to tap into the companies data systems. The
companies are placing their users at risk by collecting and retaining so much information, said Marc Rotenberg, president and executive director of the Electronic Privacy
Information Center, a nonprofit research and advocacy organization. As long as this much personal data is collected and kept by these companies, they are always going
to be the target of government collection efforts. For instance, Internet companies store email messages, search queries, payment details and other personal information
Each disclosure
risks alienating users, and foreign governments are considering laws that
would discourage their citizens from using services from American Internet
companies. The cloud computing industry could lose $180 billion , or a quarter of its revenue,
by 2016, according to Forrester Research. Telecom companies, which were not included in the proposal to Congress, have had a closer working relationship with
to provide online services and show personalized ads. They are trying to blunt the spying revelations effects on their businesses.
the government than the Internet companies, such as longstanding partnerships to hand over customer information. While the Internet companies have published socalled transparency reports about government requests, for example, the telecoms have not. For the phone companies, said Tim Wu, a professor at Columbia studying
the Internet and the law, help with federal spying is a longstanding tradition with roots in the Cold War. Its another area where theres a split between old tech and new
tech the latter taking a much more libertarian position. The new surveillance principles, the Internet companies said, should include limiting governments authority to
collect users information, setting up a legal system of oversight and accountability for that authority, allowing the companies to publish the number and nature of the
demands for data, ensuring that users online data can be stored in different countries and establishing a framework to govern data requests between countries. In a
statement, Larry Page, Googles co-founder and chief executive, criticized governments for the apparent wholesale collection of data, in secret and without independent
oversight. He added, Its time for reform and we urge the U.S. government to lead the way. In their open letter, the companies maintain they are fighting for their
customers privacy. We are focused on keeping users data secure, the letter said, deploying the latest encryption technology to prevent unauthorized surveillance on
our networks, and by pushing back on government requests to ensure that they are legal and reasonable in scope. The global principles outlined by the companies make
no specific mention of any country and call on the worlds governments to address the practices and laws regulating government surveillance of individuals and access to
their information. But the open letter to American officials specifically cites the United States Constitution as the guidepost for new restrictions on government
surveillance. Chief among the companies proposals is a demand to write sensible limitations on the ability of government agencies to compel Internet companies to
disclose user data, forbidding the wholesale vacuuming of user information. Governments should limit surveillance to specific known users for lawful purposes, and should
not undertake bulk data collection of Internet communications, the companies said.
The
combined result is a set of policies both at home and abroad that sacrifices
robust competitiveness of the U.S. tech sector for vague and unconvincing
promises of improved national security, the group wrote.
implementing protectionist policies specifically targeting information technology, using anger over U.S. government surveillance as a cover, ITIF contends.
analytical
software
provide
intelligence management and acquisition services to
fusion centers
Memex products are described as being
software and hardware products utilized in the collection and management of
intelligence data
private businesses
system provides automated
intelligence collection and collation services
this system in ACTIC in July of 2012.
firm SAS Institute, Inc., which purchased United Kingdom-based "intelligence management solutions" software developer Memex in June of 2010. SAS/Memex purports to
more than one dozen
According to U.S. Patent and Trademark Office records associated with SAS/Memex technologies,
of the SAS Memex Intelligence Center (or "SAS Fusion Center Solution") is vague at best, it is clear that the
to intelligence analysts by combining (or "fusing") data gleaned from both "open source"
intelligence streams and traditional intelligence sources (such as confidential informants), along with information contained in state databases (such as criminal and motor vehicle licensing/registration records), into
"actionable intelligence."
(and the "counter terrorism" entities that they are comprised of)
closer proximity--
-- in ever
Public-Private Intelligence Sharing Partnerships On December 17, 2003, then-President W. Bush issued
(HSPD-7),
(as called for through a section of the "U.S.A. Patriot Act of 2001" entitled "Critical Infrastructure Act of 2001"), and
the assessment and protection of "key resources" by U.S. DHS (as called for through the "Homeland Security Act of 2002"). As defined by the "U.S.A. Patriot Act of 2001," items of "critical infrastructure" are defined
as: "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic
security, national public health or safety, or any combination of those matters." As defined by the "Homeland Security Act of 2002," "key resources" are defined as: "publicly or privately controlled resources
essential to the minimal operations of the economy and government." As stated in HSPD-7, it is a matter of national policy to protect the nation's critical infrastructure and key resources from "terrorist acts" that
could-- in addition to causing general disruption of services, national governmental/economic collapse and loss of life-- "undermine the public's morale and confidence in our national economic and political
institutions." As such, Bush mandated that U.S. DHS, and other federal agencies, would work closely with members of the private sector, along with state and local governments, in an array of initiatives intended to
identify and prioritize the protection of "critical infrastructure and key resources." An example of such prioritization resultant from HSPD-7 is the National Infrastructure Protection Plan (NIPP), a plan issued by U.S.
DHS that relies heavily on public-private intelligence sharing partnerships. NIPP is also used as a metric in determining amounts of U.S. DHS funding to certain public-private intelligence sharing partnerships active
in fusion centers nationwide.
will likely
warn in a new report. The Information Technology and Innovation Foundation, funded by Intel, Microsoft, and others,
that even a
modest drop in the expected foreign market share caused by concerns about U.S. surveillance could
it concluded. The report faults U.S. lawmakers for fanning the flames of
discontent by championing weak information security practices. Other countries are now implementing protectionist policies specifically targeting information technology, using anger over U.S. government
surveillance as a cover, ITIF contends. The combined result is a set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of
improved national security, the group wrote. According to The Wall Street Journal, Snowdens revelations have led to a marketing bonanza for European software and service providers looking to compete with
hard-charging U.S. rivals such as Amazon and Microsoft. Weve opened floodgates to huge loss because we havent changed anything about U.S. surveillance policy, Daniel Castro, vice president of ITIF, told the
WSJ. ITIF recommends, among other things, that U.S. policymakers increase transparency about U.S. surveillance activities both at home and abroad, strengthen information security by opposing any government
efforts to weaken encryption, and work to establish international legal standards for government access to data. When historians write about this period in U.S. history it could very well be that one of the themes
will be how the United States lost its global technology leadership to other nations, the report warns.
Warming Ext.
Impacts
Even 1% risk of our impact means you vote affirmative
the impacts are already accelerating
Strom 7, Prof. Emeritus Planetary Sciences @ U. Arizona and Former Dir.
Space Imagery Center of NASA (Robert, , Hot House: Global Climate Change
and the Human Condition, Online: SpringerLink, p. 246)
Keep in mind that the current consequences of global warming discussed in previous chapters are
the result of a global average temperature increase of only 0.5 'C above the 1951-1980 average, and these
consequences are beginning to accelerate. Think about what is in store for us when
the average global temperature is 1 C higher than today. That is already in the pipeline, and there is
nothing we can do to prevent it. We can only plan strategies for dealing with the expected consequences,
and reduce our greenhouse gas emissions by about 60% as soon as possible to ensure that we don't
to more clearly define what awaits us. The time for action is now.
Solvency
Growth will radically increase adaptive capacity - their
studies discount it - produces huge over-estimates of
warming impacts
Goklany 11 [Indur M. , science and technology policy analyst and Assistant Director of PROGRAMS
, Science and Technology Policy for the United States Department of the Interior; was associated with the
Intergovernmental Panel on Climate Change off and on for 20 years as an author, expert reviewer and U.S.
delegate, December 2011, "Misled on Climate Change: How the UN IPCC (and others) Exaggerate the
Impacts of Global Warming,"
online:http://goklany.org/library/Reason20CC20and20Development202011.pdf]
the countries that are today poorer will be extremely wealthy (by
todays standards) and their adaptive capacity should be correspondingly higher.
Indeed, their adaptive capacity should on average far exceed the U.S.s today . So, although
claims that poorer countries will be unable to cope with future climate change
may have been true for the world of 1990 (the base year), they are simply
inconsistent with the assumptions built into the IPCC scenarios and the Stern
Reviews own (exaggerated) analysis. If the world of 2100 is as richand warmas the
more extreme scenarios suppose, the problems of poverty that warming
would exacerbate (i.e. low agricultural productivity, hunger, malnutrition, malaria and other vectorborne diseases) ought to be reduced, if not eliminated, by 2100. Research shows that deaths
In other words,
from malaria and other vector-borne diseases is cut down to insignificant numbers when a societys
annual per capita income reaches about $3,100. 23 Therefore, even under the poorest scenario (A2),
developing countries should be free of malaria well before 2100, even assuming no technological change
in the interim. Similarly, if the average net GDP per capita in 2100 for developing countries is between
$10,000 and $62,000, and technologies become more cost-effective as they have been doing over the
The second major reason why future adaptive capacity has been underestimated
(and the impacts of global warming systematically overestimated) is that few
impact studies consider secular technological change . 25 Most assume that no
new technologies will come on line, although some do assume greater adoption of existing
technologies with higher GDP per capita and, much less frequently, a modest generic improvement in
productivity. 26 Such an assumption may have been appropriate during the Medieval Warm Period, when
governments have already done for genetically modified crops and various pesticides.28
for five or so years into the future, ignoring changes in adaptive capacity between now and then probably
would not be fatal because neither economic development nor technological change would likely advance
a base year of 1990 to estimate impacts for 2025, 2055 and 2085. 39 The Stern Reviews time horizon
It is often argued that unless greenhouse gases are reduced forthwith, the resulting
GW could have severe, if not catastrophic, consequences for people in poor
countries because they lack the economic and human resources to cope with GWs
consequences. But there are two major problems with this argument. First, although poor
countries adaptive capacity is low today, it does not follow that their ability to
cope will be low forever. In fact, under the IPCCs warmest scenario, which would increase
globally averaged temperature by 4C relative to 1990, net GDP per capita in poor countries
(that is, after accounting for losses due to climate change per the Stern Reviews exaggerated estimates)
will be double the U.S.s 2006 level in 2100 , and triple that in 2200. Thus developing
countries should in the future be able to cope with climate change substantially
better than the U.S. does today. But these advances in adaptive capacity , which are
virtually ignored by most assessments of the impacts and damages from global
warming, are the inevitable consequence of the assumptions built into the
IPCCs emissions scenarios. Hence the notion that countries that are currently
poor will be unable to cope with GW does not square with the basic assumptions
that underpin the magnitude of emissions, global warming and its projected
impacts under the IPCC scenarios.
Disease Ext.
Impacts
We are entering an era of global diseases that will kill
humans and destroy biodiversity
Kock 13 R. A. Kock of the Department of Pathology and Pathobiology,
Royal Veterinary College, Hawkshead Lane Hatfield, UK (23 October 2013,
"Will the damage be done before we feel the heat? Infectious disease
emergence, Cambridge University Press 2013 Animal Health Research
Reviews 14(2); 127132, ISSN 1466-2523, doi:10.1017/S1466252313000108,
ADL)
This initial progress in resolving age-old infectious disease problems might well turn out to be a false dawn. If we take a broader view on disease at the ecosystem level,
spread to all 48 States of the continental USA, caused mortalities and sickness in a wide range of domestic animals, wild birds and people (Kilpatrick, 2011). Although the
shortly after by another epidemic disease coined white nose syndrome affecting bats (Blehert et al., 2009). This is caused by a fungus Geomyces destructans, most
probably introduced by travelers and cavers (Warnecke et al., 2012), which, to date, has killed an estimated 6.5 million bats. The consequences are a conservation crisis
and a multi-billion dollar cost to the agricultural industry from lost predation on agricultural pests, a significant ecosystem service provided by bats (Boyles et al., 2011).
2010). Over a third of amphibian species are expected to disappear in the coming years but these extinctions are not only a result of this disease (Heard et al., 2011).
opportunity for pathogen evolution (Arzt et al., 2010; Jones et al., 2013). These larger epidemiological
units of plants and animals, with considerable homogeneity, when densely packed (ironically for reasons of biosecurity and production
efficiency) are perfect pathogen factories. The recent bird flu panzootic is an example of this. The emergence of the atypical, highly
pathogenic influenza virus H5N1 was coincident with a massive expansion of the duck and poultry industry in South East Asia. Water birds are natural hosts of avian
influenza viruses and are highly tolerant of infection (Alexander, 2007). However, the growth in domestic duck farms including exploitation of semidomestic ducks in close
proximity to both wild bird populations and densely packed chicken farms, created an opportunity for the rapid evolution of this highly virulent strain of avian influenza, its
amplification and spread. H5N1 was first isolated in 1997 (Xu et al., 1999) with epidemics recorded in Hong Kong in 1998 and with a significant wild bird epidemic between
2005 and 2007 (Chen et al., 2006). The infection spread rapidly across Eurasia between poultry systems and as far as Egypt (Abdelwhab and Hafez, 2011) and Nigeria
(Newman et al., 2008). Wild bird cases reported appear to be mostly during epidemics or spillover cases from poultry epidemics (Feare and Yasue, 2006; Lebarbenchon et
al., 2010; Soliman et al., 2012), and wild bird epidemics appear to have been largely independent of domestic bird disease. The infections burned out in wildlife with no
evidence of a long-term reservoir and only rare cases based on circumstantial evidence of spillover from wild birds to poultry (Hars et al., 2008), predators (Desvaux et al.,
with apparent resilience in the wild bird populations to H5N1 increasing (Siembieda et al., 2010) and with mass vaccination and slaughter of poultry providing temporary
relief, endemic foci in domestic birds still persist. This strain of virus has been recently joined by a new, more sinister low pathogenic strain (in poultry) of H7N9, which is
lethal in humans and can be transmitted more readily between humans than was the case with H5N1. The main reason for failure to stop the emergence of these diseases
is the continued expansion of agroecological systems and industry, which cause the problem in the first place. It is not always necessary to have a farm for these spillover
events, other concentrations of mixed animal species in e.g. food markets has led to emergence, exemplified by the SARS epidemic. Here a bat virus was involved, most
probably spilling into a market and replicating in (probably) a number of species, adapting and amplifying until it was established in humans and an epidemic ensued.
Globally, the virus infected approximately 8000 people and caused several hundred deaths. The remarkable fact is that this pathogen jump probably only took a period of
23 years (Wang et al., 2005; Zhao, 2007; Tang et al., 2009). Another important driver of disease at the interface has been changing landscapes, with increasing incursion
into and modification of diverse habitats for settlement and exploitation of resources. An example is the creation of new vector niche habitats, mostly through urban
development (Globig et al., 2009) enabling persistence and emergence of significant problems e.g. dengue fever virus; once only found in primates (Mackenzie et al.,
2004). HIV is the most famous example, where frequent spillover of SIV to humans through their exploitation of chimpanzee and gorilla for food, resulted in the
establishment of human infection and adaptation of the virus (Gao et al., 1999). However, it was not until road networks were put into the Congo basin that the epidemic
really took hold. There were probably a series of stuttering epidemics until the virus entered the urban environment and then the world. It is sobering to note that the
African mortality statistics (WHO, 2012) indicate that, far from following the pattern in the Western world, the life expectancy from birth in two of the richest nations, South
Africa and Botswana, has significantly decreased between 1990 and 2010; and this was from the impact of only one emerging disease, HIVAIDS.
What if
of what happens when we get these great collapses in social development, every time we see the same five forces involved: Mass migrations that the societies of the day
get
d.
lead to
long-distance
people die. And then, always there in the mix in some way, although it varies in every case, is climate change. It always plays into this. Now, I'm sure you don't need me to tell you these are forces that plenty of
people are talking about as threats we are facing in the early 21st century. It seems to me perfectly possible that the 21st century is going to see another collapse of the kind we have seen so many times in the
ancient people didn't have. The Romans would have loved nuclear weapons. Luckily, they didn't have them. I think
I'm talking about here,
seriously
there is a possibility of
, which
do
that
earlier.
(Kenneth, Corey, and Randy, Does infectious disease cause global variation
in the frequency of intrastate armed conflict and civil war?, Biological
Reviews, p. 669)
Geographic and cross-national variation in
the frequency of
intrastate
of great
We
a subject
interest
present the parasite-stress model of intrastate conflict
by linking frequency of
civil war to the intensity of infectious
disease across countries
High intensity of infectious disease leads to the
emergence of xenophobic and ethnocentric cultural norms These cultures
suffer greater poverty and deprivation
Resource competition among xenophobic and ethnocentric groups
within a nation leads to increased frequency of civil war
with regression analyses We find
a direct effect of infectious disease on
intrastate armed conflict and
the incidence of civil war
. Previous theory on this variation has focused on the influence on human behaviour of climate, resource competition, national wealth, and cultural characteristics.
conflict
of the world.
due to the morbidity and mortality caused by disease, and as a result of decreased investment in public
support for
via its
negative effect on national wealth. We consider the entanglements of feedback of conflict into further reduced wealth and increased incidence of disease, and discuss implications for international warfare and
global patterns of wealth and imperialism.
Those go nuclear
Shehadi, Research Associate at the International Institute for Strategic
Studies, 1993
(Kamal, Ethnic Self Determination And the Break Up of States, Dec 1993, p.
81)
self-determination conflicts have direct adverse consequences on
international security As they
tear nuclear states apart the likelihood of
nuclear weapons falling into hands
willing to use them or trade
them to others will reach frightening levels This likelihood increases if a
conflict over self-determination escalates into a war between two nuclear
states
Ethnic conflicts
spread within a state and from one state to the next
The conflict may also spread by contagion from
one country to another
This paper has argued that
begin to
the
of individuals or groups
to
. The Russian Federation and Ukraine may fight over the Crimea and the Donbass area; and India and Pakistan may fight over Kashmir.
both
may also
. This can happen in countries where more than one ethnic self-
if the state is weak politically and militarily and cannot contain the conflict on its doorstep. Lastly, there is a real danger that regional conflicts will
The findings in this paper are based on two of the scenarios modeled by RAND Europe and
KPMG. Further details of the two studies are set out in the box on the following page and the
full papers are available on our website. The two teams modeled an increase in AMR rates
from where they are today, each using their own methodology, to understand the impact this
would have on the world population and its economic output. Both studies were hampered by
a lack of reliable data, in particular regarding bacterial infections, and as a consequence they
most likely underestimate the true cost of AMR. The studies estimate that, under
studies also show a different economic impact for each of the drug resistant infections they
considered. E. coli, malaria and TB are the biggest drivers of the studies results.
Malaria resistance leads to the greatest numbers of fatalities, while E. coli is the largest
detractor from GDP accounting for almost half the total economic impact in RANDs results.
Because malaria and TB vary far more by region than E. coli in the studies, they are the largest
drivers of differences between countries and regions.
according to the Centers for Disease Control and Prevention (CDC). Dr Tom Frieden, director of the CDC,
in US hospitals have become infected with CRE, which kills up to half of patients who get bloodstream
being treated for serious conditions in hospitals, long-term acute-care facilities and nursing homes. Many
of these people will use catheters or ventilators as part of their treatment - which are thought to be used
by bacteria to enter deep into the patient's body.
Epidemiology (the journal of the Society for Healthcare Epidemiology of America). (1) Lead author of the
variations in hospital surveillance practices." The study also found that an astonishing 94 percent of CRE
infections were caused by healthcare activities or hospital procedures. CRE superbugs explained
CRE
(carbapenem-resistant Enterobacteriaceae)
worse, there are virtually no new antibiotics drugs in the research pipelines, either. Drug companies have
discovered that it's far more profitable to sell "lifestyle management" drugs like statin drugs and blood
pressure drugs than to sell antibiotics which treat acute infections. Antibiotics simply aren't very profitable
because relatively few people acquire such infections. Meanwhile, everyone can be convinced they might
have high cholesterol and therefore need to take a statin drug for life. Drug companies, in other words,
have all but abandoned the industry of treating infections. Instead, they now primarily engage in the
promotion of disease symptoms while selling drugs that attempt to alter measurable markers of those
symptoms such as cholesterol numbers. Even though drug companies caused the superbug pandemic
that's now upon us, in other words, they have deliberately abandoned humanity in defending against those
superbugs because it's simply not profitable to do so. The end of antibiotics has arrived:
Humanity
faces a new plague caused by modern medicine The CDC has admitted that we are now living in a
"post-antibiotics era." As Infection Control Today states, " Antibiotic resistance is no longer a
prediction for the future. It is happening right now in every region of the
world and has the potential to affect anyone ." (2) Dr. Arjun Srinivasan, associate director
at the Centers for Disease Control and Prevention, went even further in a PBS interview, stating: (3) We've
reached the end of antibiotics, period... We're here. We're in the post-antibiotic era. There are patients for
whom we have no therapy, and we are literally in a position of having a patient in a bed who has an
infection, something that five years ago even we could have treated, but now we can't. Keep in mind that
doctors refuse to use natural substances to treat infections, which is why they believe no defenses against
superbugs exist. Their indoctrination into the world of pharmaceuticals is so deeply embedded in their
minds, in other words, that they cannot even conceive of the idea that an herb, a food or something from
Mother Nature might provide the answer to superbugs. See this Natural News article on natural antibiotics
that kill superbugs. The list includes honey. Hospitals are the perfect breeding grounds for superbugs By
their very design, hospitals are prefect breeding grounds for superbugs for six very important reasons: 1)
They put all the infected people under one roof, creating a high density infectious environment. 2) They
allow doctors and medical staff to quickly and easily carry and transmit infectious diseases to new
patients. Previous studies have documented how superbugs easily ride on doctors' ties, for example, or
their mobile phones. 3) Medical staff still don't wash their hands as frequently as they should. The intense
time demands placed on them discourage careful hand washing, causing many to skip this crucial step
between patient visits. 4) Hospitals almost universally refuse to use broad-spectrum antibacterial remedies
which are not drugs. Natural substances like honey and garlic show extraordinary multi-faceted
antibacterial properties, as do certain metals such as silver and copper. Yet because these substances are
not developed by pharmaceutical companies which dominate the field of medical practice, they are simply
ignored even though they could save many lives. (And a doctor who prescribes "honey" doesn't sound as
amazing and all-knowing as a doctor who prescribes "the latest, greatest laboratory breakthrough
patented chemical medication.") 5) Hospital practices suppress human immune function to the point of
systemic failure. Rather than boosting immune function, conventional medical treatments such as
antibiotics and chemotherapy cause immune system failure. Hospitals lack sunlight and hospital food lacks
key immune-boosting minerals such as zinc and selenium. On top of that, most of the drugs prescribed to
patients by hospitals deplete key nutrients required for healthy immune function, leaving patients even
more susceptible to superbug infections. 6) Hospital staff spread infectious diseases to their private
homes. After acquiring an infection at work (at the hospital), staffers easily spread those infections to their
in a world that's now far more dangerous than the one that existed before the invention of antibiotics.
Antibiotics have indeed saved millions of lives, and they forever have an important place in any medical
practice. Yet their careless use -- combined with medicine's willful and foolish abandonment of natural
antibiotics that work far better -- has led humanity down the path of its own destruction. Today,
simple scrape of your arm or leg might now be fatal. Infections that occur during
routine medical procedures which would have once been considered minor issues are now deadly. And the
drugresistant TB from person to person in the former Soviet Union is of critical concern, along with
Medical charity Medecins Sans Frontieres TB expert, Grania Brigden, said the "alarming spread of
the growth in MDR-TB and XDR-TB cases". "Access to proper treatment is drastically low: only one in five
people with multidrug-resistant TB receives treatment; the rest are left to die, increasing the risk to their
families and communities and fuelling the epidemic," she said in a statement. Once known as the "white
plague" for its ability to render its victims skinny, pale and feverish, TB causes night sweats, persistent
coughing, weight loss and blood in the phlegm or spit. It is spread through close contact with infected
people.
products of several sub-Saharan African countries by 20 percent or more, bringing these nations to the brink of economic
collapse as they lose the most productive segment of their populations. If current trends continue, a decade from now
some 41.6 million children in 27 countries will have lost one or both parents to AIDS, creating a "lost generation" of
orphans with little hope of education or employment. These young people may become marginalized or easily exploited
for political ends, as in the increasingly pervasive phenomenon of the child-soldier, putting AIDS-stricken countries at risk
restore order. The Bush administration, which unlike its predecessor has shown little interest in nontraditional threats,
would do well to heed this warning.
given the
postulate presented here of a deteriorating domestic situation due to an
increasingly sclerotic economic-political formation, we could well encounter a situation where a
revolutionary situation inside Russia due to the blockage of progress intersects with a massive
security crisis that could, as in 1991, involve a coup and the danger of seizure
of nuclear weapons and potential wars across Eurasia . Or, we could see a
diversionary war as the Russo-Japanese war was launched in part in order to busy giddy minds with foreign wars. Arguably, we are
witnessing the first signs in todays Russia of the advent of a long-term crisis
culminating in such a domestic and then international crisis. This crisis would combine mounting
disaffection, if not protest, and continuing subpar economic performance is a situation that
zero nuclear weapons trajectory, and inhibit a genuine military and political partnership with Russia. Furthermore,
approximates Vladimir Lenins 1915 definition of a revolutionary situation. According to Lenins oft-quoted definition: What, generally speaking,
are the symptoms of a revolutionary situation? We shall certainly not be mistaken if we indicate the following three major symptoms: (1) when
it is impossible for the ruling classes to maintain their rule without any change; when there is a crisis, in one form or another, among the
upper classes, a crisis in the policy of the ruling class, leading to a fissure through which the discontent and indignation of the oppressed
classes burst forth. For a revolution to take place, it is usually insufficient for the lower classes not to want to live in the old way; it is also
necessary that the upper classes should be unable to live in the old way; (2) when the suffering and want of the oppressed classes have
grown more acute than usual; (3) when, as a consequence of the above causes, there is a considerable increase in the activity of the masses,
who uncomplainingly allow themselves to be robbed in peace time, but, in turbulent times, are drawn both by all the circumstances of the
none of this
suggests the imminence of a revolution. Rather, it suggests the imminence
of a structural crisis leading to the situation defined here by Lenin and which evermore
characterized Tsarist Russia after the great reforms of the 1860s and the Soviet state after Leonid
Brezhnev. Neither we, nor any other reputable observer , expect an
imminent collapse of the Putin system. But Russia already appears to be visibly bearing the seeds of
crisis and by the upper classes themselves into independent historical action.13 (italics in original) To be sure,
its own entropy and ultimate collapse. Distinguished Russian scholars like Lilia Shevtsova and Olga Kryshtanovskaya openly state that Russia
has slipped into a revolutionary situation.14 That process took some 50 years in Tsarist Russia and a generation in Soviet Russia, suggesting
the acceleration of large-scale socio-political change and its growing department, even if we are talking about a long-gestating process. But if
this assessment has merit, then we are only at its inception, not its conclusion, and many more negative phenomena and Russian behaviors
can be expected before the advent of a crisis that could occur, if this acceleration of protest trends and institutional entropy occur by 2030.
Potential contingencies could even possibly entail the use of force either at
home (and not just in a counterinsurgency mode against jihadi rebels as in the North Caucasus) or beyond Russias
borders as in the Russo-Georgian war of 2008. Indeed, as the regime moves
further along its current trajectory, such belligerent behavior
increasingly appears to be the norm. As Andrei Illarionov, a former economic
advisor to Putin, has observed: Since its outset, the Siloviki regime has been aggressive.
At first it focused on actively destroying centers of independent political, civil, and economic life within Russia. Upon achieving those goals, the
regimes aggressive behavior turned outward beyond Russias borders. At least since the assassination of the former Chechen President
(most of them involving propaganda, intelligence operations, and economic coercion rather than open military force) against neighbors and
economic social and political crisessuch as those that now haunt Russia amid recession and falling oil prices is likely to be pondering
of social and information technologies, as well as Russias partial integration into the global economy, suggests that any repeat performance
will take even less time than this, so it is not inconceivable that within 10-20 years, we could see a Russia openly enmeshed in a structural
monograph on the subject of U.S.-Russian relations, it would take a long report to work through all those issues. But here, we must content
ourselves with recommendations for the U.S. Army in its activities. To do that, we must view the Army in its current strategic context.
AT: Off-Case
AT: Politics
fusion centers were established with funds from the Department of Homeland Security, and
rely heavily on federal counterterrorism grants. Fusion centers have long
come under fire from congressional leaders and democracy advocates as being
largely wasteful, duplicative of other local/federal counterterrorism efforts, and violative of
civil rights and civil liberties. In Boston, the ACLU disclosed internal intelligence files showing that
BRIC officials used their federally-funded counterterrorism infrastructure to monitor
peaceful protesters including Veterans for Peace and CODEPINK, labeling
them as domestic extremists and homeland security threats. The Boston
fusion center even kept track of the political activities of Marty Walsh, currently the
citys mayor. Fusion center officials in Pennsylvania got caught spying on anti-fracking activists,
Both
apparently in league with natural gas companies. An Arkansas fusion center director told the press his spy
office doesnt monitor US citizens, just anti-government groupshowever thats defined. Washington state
fusion centers have insinuated that activism is terrorism. There are many, many other examples
nationwide of these so-called fusion centers getting caught red handed monitoring protest movements and
fusion centers,
meanwhile, have never once stopped a terrorist attack. Its not clear what
beyond monitoring dissidents and black people through so-called gang databases
these fusion centers actually do. We here in Boston know one thing for sure:
they dont stop terrorism.
dissidents, conflating First Amendment protected speech with crime or terrorism. The
that senior DHS officials were aware of the problems hampering effective counterterrorism work with the
fusion centers, but did not always inform Congress of the issues, nor ensure the problems were fixed in a
requested documents that would help it identify these issues, the Department initially resisted turning
them over, arguing that they were protected by privilege, too sensitive to share, were protected by
confidentiality agreements, or did not exist at all. The American people deserve better. I hope this report
will help generate the reforms that will help keep our country safe, Dr. Coburn said. Fusion centers may
provide valuable services in fields other than terrorism, such as contributions to traditional criminal
investigations, public safety, or disaster response and recovery efforts, said Senator Carl Levin (D),
Subcommittee chairman. This investigation focused on the federal return from investing in state and local
fusion centers, using the counterterrorism objectives established by law and DHS. The report recommends
The
Department of Homeland Security estimates that it has spent somewhere
between $289 million and $1.4 billion in public funds to support state and
local fusion centers since 2003, broad estimates that differ by over $1 billion.
The investigation raises questions about the value this amount of funding and
the nations more than 70 fusion centers are providing to federal
counterterrorism efforts.
that Congress clarify the purpose of fusion centers and link their funding to their performance.
AT: Terror DA
nationwide,
and two in Massachusetts. The Commonwealth Fusion Center in Maynard is run by the Massachusetts State Police.
The Boston Regional Intelligence Center, also known as the BRIC, is located at Boston Police Department headquarters in Roxbury and run by
their federally-funded counterterrorism infrastructure to monitor peaceful protesters including Veterans for Peace and CODEPINK, labeling
them as domestic extremists and homeland security threats. The Boston fusion center even kept track of the political activities of Marty Walsh,
called fusion centers getting caught red handed monitoring protest movements and dissidents, conflating First Amendment protected speech
Center should be monitoring the tweets and Facebook posts of Black Lives Matter activists, if those activists intend to shut down highways.
We can agree to disagree about that, but please dont say these fusion centers are primarily dedicated to stopping terrorism when they are
doing things like this. Stopping traffic for a few hours is civil disobedience, not terrorism. A supposed anti-terrorism center has no business
monitoring public social media accounts looking for intelligence about civic protest movements.
AT: Neoliberalism
Plan Solves It
Fusion centers embrace neoliberal rational
Monahan & Palmer 09, Torin Monahan (Associate Professor of Human & Organizational
Development and an Associate Professor of Medicine at Vanderbilt University. His main theoreti- cal
interests are in social control and institutional transformations with new technolo- gies), Neal A. Palmer
(doctoral student in the Department of Human & Organizational Development at Vanderbilt University),
Security Dialoguevol.40 ,no.6, December 2009, The Emerging Politics of DHS Fusion Centers,
http://publicsurveillance.com/papers/FC-SD.pdf. PE
will continue to
advocate for sustained funding for the fusion centers as the linchpin of the
evolving homeland security enterprise. While I&As support to state, local and tribal partners is
steadily improving, there is still work to be done in how best to support the private
sector. We intend to explore ways to extend our efforts in this area beyond the established relationships with the
Subcommittee on Homeland Security: I&A [DHSs Office of Intelligence and Analysis]
Case Args
hall meeting protests against the controversial health care bill made them
more sympathetic to the protestors' views.
to promote greater collaboration and information sharing in an effort to prevent future acts of terrorism.
The number of fusion centers grew dramatically, from nine in 2003 to 78 by 2014. Most states have one,
and a number have more than that. Massachusetts, for instance, has a statewide fusion center in Maynard
and an urban center in Boston. California similarly has a statewide center, and it also has regional centers
in Los Angeles, San Francisco, Orange County, Sacramento, and San Diego. At their core, the purpose of
all fusion centers is largely similar: they receive, analyze, gather, and share information about threats.
Department of Homeland Security, working with the Department of Justice, has developed guidelines for
the centers that address performance, privacy, governance, and other areas. Fusion centers can receive
funding through grant programs that FEMA administers, but the funding must be used to improve
shortcomings in meeting these standards. The federal government also provides training and deploys
personnel to the centers to play a variety of supporting roles. In fact, the Government Accountability Office
(GAO) found nearly 300 representatives from agenciessuch as the Department of Homeland Security's
Office of Intelligence and Analysis, TSA, the FBI, and the DEA, among othersat fusion centers around the
Investigations, which issued a scathing report in 2012. (Note: While I didn't work for the subcommittee that
produced this report, I did work for the full committee when the report was issued and advised the
it awarded. There was truth to some of these claims. FEMA has long had problems with grant monitoring,
for example, although this is an issue that extends beyond fusion centers. But in evaluating their
the report limited its analysis to the information fusion centers sent
up to the federal government and neglected to examine what they sent out
to other state and local agencies. Moreover, federal officials challenged the
idea that the centers were not contributing to counterterrorism
efforts and pointed to cases that showed otherwisesuch as the
"Raleigh Jihad" case in 2009 and the 2011 disruption of a plot to
attack a Seattle military recruiting center. In recent years, we've
seen progress on some of these problems, although not all . In 2013,
effectiveness,
Michael McCaul (R-TX), chairman of the House Committee on Homeland Security, and Representative Peter
Department of Homeland Security has helped centers improve their capabilities and address performance
problems. But this is not to suggest that all is perfect. There are still problems that need to be addressed.
FEMA continues to struggle to track the amount of federal funding going to fusion centers. In its review,
GAO found that FEMA had improved its process for keeping tabs on the funding but that it was still
unreliable. This problem needs to be corrected. Without knowing how much federal funding goes to fusion
centers, it's difficult to evaluate whether it's well spent. Moreover, the federal government needs to
prioritize the support it provides. As the House Committee on Homeland Security pointed out in its report,
when trying to find the balance between state and local priorities and national ones, fusion centers tend to
lean on the former. Fusion centers are free to do this, but federal support needs to focus on the latter.
and mortar location where all stakeholders are represented, and can communicate face-to-face and build
personal relationships while accessing some of the dozens of high-security law enforcement databases.
The intelligence agencies have come together at the National Counterterrorism Center in Northern Virginia
to keep track of multi-national threats. A pilot program, Project SeaHawk in Charleston, S.C., keeps tab on
seaport security with representatives of Customs and Border Protection, the Coast Guard, and state and
local officials. The concept, so far,
some growing pains.
Without
fusion centers, we would not be able to connect the dots. Fusion
centers have been essential to breaking down the information silos
and communications barriers that kept the government from
detecting the most horrific terrorist attack on this country - even though federal,
fusion centers provide to the intelligence community. Fusion centers have stepped up to meet an urgent need in the last decade, Lieberman said.
state, and local officials each held valuable pieces of the puzzle.
intelligence analysis at all levels of government will greatly contribute to the terrorism and general crime
analysts help translate raw data into intelligence to better inform decision making in the field.
the efforts, 2006 saw a steady stream of criticism from state and local law enforcement officers who stated
said if
there is pertinent information, the department will find a way to quickly push
it down to the appropriate officials, regardless of whether they have a fusion
center. As far as sharing threat warning information we find ways to share
it, and share it immediately, Allen told National Defense.
that critical information is not flowing in their direction. Charles Allen, DHS intelligence officer,
$17.2 billion in
classified funds a year fighting terrorism through the intelligence community,
and the Department of Homeland Security spent another $47.4 billion last
year. And we have very little idea whether any of it is preventing terrorist
attacks. Someofthisisjustthatit'shardertocollectgoodevidencethanitisinotherpolicyareas.Youcan'trandomlyselect
someairportstohavesecurityscreeningsandsometonotandmeasurehowmanyhijackingoccurattheoneswithorwithoutthem
or,atleast,youcan'tdothatandconformtoanythingremotelyresemblingresearchethics.Butmerelybecausetrueexperimentsare
oftenimpossibledoesn'tmeanthatyoucan'tevaluatepolicyinterventionsusingothermeans.
Data
mining works best when there's a well-defined profile you're searching for, a
liberties, etc. -- then the system is a good one. If not, then you'd be better off spending that cost elsewhere.
reasonable number of attacks per year, and a low cost of false alarms. Credit card fraud is one of data mining's success
stories: all credit card companies data mine their transaction databases, looking for spending patterns that indicate a
stolen card. Many credit card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be
easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In
addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The
cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of
operator time. Terrorist plots are different. There is no well-defined profile ,
and attacks are very rare. Taken together, these facts mean that data mining systems won't uncover any terrorist plots
until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be
useless. All data mining systems fail in two different ways: false positives and false negatives. A false positive is when the
system identifies a terrorist plot that really isn't one. A false negative is when the system misses an actual terrorist plot.
Depending on how you "tune" your detection algorithms, you can err on one side or the other: you can increase the
number of false positives to ensure that you are less likely to miss an actual terrorist plot, or you can reduce the number
of false positives at the expense of missing terrorist plots. To reduce both those numbers, you need a well-defined profile.
And that's a problem when it comes to terrorism. In hindsight, it was really easy to connect the 9/11 dots and point to the
warning signs, but it's much harder before the fact. Certainly, there are common warning signs that many terrorist plots
share, but each is unique, as well. The better you can define what you're looking for, the better your results will be. Data
mining for terrorist plots is going to be sloppy, and it's going to be hard to find anything useful. Data mining is like
searching for a needle in a haystack. There are 900 million credit cards in circulation in the United States. According to the
FTC September 2003 Identity Theft Survey Report, about 1% (10 million) cards are stolen and fraudulently used each year.
Terrorism is different. There are trillions of connections between people and events -- things that the data mining system
will have to "look at" -- and very few plots. This rarity makes even accurate identification systems useless. Let's look at
and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if
the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any "test" is going to result in
instead of doing things that might actually make us safer, but also the cost in civil liberties. The fundamental freedoms
that make our country the envy of the world are valuable, and not something that we should throw away lightly. Data
mining can work. It helps Visa keep the costs of fraud down, just as it helps Amazon.com show me books that I might want
to buy, and Google show me advertising I'm more likely to be interested in. But these are all instances where the cost of
false positives is low -- a phone call from a Visa operator, or an uninteresting ad -- and in systems that have value even if
there is a high number of false negatives. Finding terrorism plots is not a problem that lends itself to data mining. It's a
needle-in-a-haystack problem, and throwing more hay on the pile doesn't make that problem any easier. We'd be far
better off putting people in charge of investigating potential plots and letting them direct the computers, instead of
putting the computers in charge and letting them decide who should be investigated.
apply to some terrorists somewhere, including at least a few of those involved in the September 11
their subjects with such words as incompetent, ineffective, unintelligent, idiotic, ignorant, inadequate,
unorganized, misguided, muddled, amateurish, dopey, unrealistic, moronic, irrational, and foolish.9 And in
nearly all of the cases where an operative from the police or from the Federal Bureau of Investigation was
at work (almost half of the total), the most appropriate descriptor would be gullible. In all, as Shikha
This limited capacity is impressive because, at one time, small-scale terrorists in the United States were
quite successful in setting off bombs. Noting that the scale of the September 11 attacks has tended to
obliterate Americas memory of pre-9/11 terrorism, Brian Jenkins reminds us (and we clearly do need
reminding) that the 1970s witnessed sixty to seventy terrorist incidents, mostly bombings, on U.S. soil
intelligence agents and analyzed court documents, has found that, in sharp contrast with the boilerplate
Islamist militants in
those locations are operationally unsophisticated, short on know-how,
prone to making mistakes, poor at planning, and limited in their
capacity to learn.13 Another study documents the difficulties of network
coordination that continually threaten the terrorists operational unity, trust,
cohesion, and ability to act collectively.14 In addition, although some of the plotters in
the cases targeting the United States harbored visions of toppling large buildings, destroying
characterizations favored by the DHS and with the imperatives listed by Dalmia,
airports, setting off dirty bombs, or bringing down the Brooklyn Bridge (cases 2, 8, 12, 19, 23, 30, 42), all
were nothing more than wild fantasies, far beyond the plotters
capacities however much they may have been encouraged in some instances
by FBI operatives. Indeed, in many of the cases, target selection is effectively a
random process, lacking guile and careful planning . Often, it seems, targets
have been chosen almost capriciously and simply for their convenience . For
example, a would-be bomber targeted a mall in Rockford, Illinois, because it was nearby (case 21). Terrorist
plotters in Los Angeles in 2005 drew up a list of targets that were all within a 20-mile radius of their shared
apartment, some of which did not even exist (case 15). In Norway, a neo-Nazi terrorist on his way to bomb
a synagogue took a tram going the wrong way and dynamited a mosque instead.15
together regional officials involved in countering money laundering and terrorism. Conducted with the help
of officials from the Treasury and other U.S. agencies,
intelligence official, who spoke on the condition of anonymity because intelligence issues are classified.
Money Gripes Al-Qaedas depleted core in Pakistan has been forced to economize, said a second U.S.
intelligence official, who also spoke on the condition of anonymity for the same reasons. The anti-financing
efforts have forced terrorist groups to reduce spending on training, recruiting and payments to terrorists
say that al-Qaeda was in its weakest financial condition since 2001, said David Cohen, the Treasurys
undersecretary for terrorism and financial intelligence.
Improvised Nuclear Device (IND). For years, the US government has explored the possibility of a clandestine group
fabricating a nuclear weapon. The so-called Nth Country Experiment examined the technical problems facing a nation that
endeavored to build a small stockpile of nuclear weapons. Launched in 1964, the experiment sought to determine
whether a minimal team in this case, two young American physicists with PhDs and without nuclear-weapons design
knowledge could design a workable nuclear weapon with a militarily significant yield. After three man-years of effort, the
two novices succeeded in a hypothetical test of their device. 80 In 1977, the US Office of Technology Assessment
concluded that a small terrorist group could develop and detonate a crude nuclear device without access to classified
material and without access to a great deal of technological equipment. Modest machine shop facilities could be
contracted for purposes of constructing the device. 81 Numerous experts have weighed in on the workability of
Disarmament Agency, and Jeffrey G. Lewis, the former executive director of the Managing the Atom Project at Harvard
Universitys Belfer Center for Science and International Affairs, concluded that a team of 19 persons could build a nuclear
reaction. 84 It would be virtually impossible for a terrorist group to create its own fissile material. Enriching uranium,
or producing plutonium in a nuclear reactor, is far beyond the scope of any terrorist organization. 85 However, the
International Atomic Energy Agency (IAEA), which maintains a database, confirmed 1,562 incidents of smuggling
encompassing trade in nuclear materials or radioactive sources. Fifteen incidents involved HEU or plutonium. 86 Be that
procure from one source or in one transaction. However, terrorists could settle on less demanding standards. According to
an article in Scientific American, a nuclear device could be fabricated with as little as 60 kilograms of HEU (defined as
concentrated to levels of 20 percent for more of the uranium 235 isotope). 88 Although enriching uranium is well nigh
impossible for terrorist groups, approximately 1,800 tons of HEU was created during the Cold War, mostly by the United
States and the Soviet Union. 89 Collective efforts, such as the Cooperative Threat Reduction program, the G-8 Partnership
against the Spread of Weapons of Mass Destruction, and the Nuclear Suppliers Group, have done much to secure nuclear
weapons and fissile materials, but the job is far from complete. 90 And other problems are on the horizon. For instance,
the number of nuclear reactors is projected to double by the end of the century, though many, if not most, will be fueled
with low-enriched uranium (LEU). With this development, comes the risk of diversion as HEU and plutonium stockpiles will
be plentiful in civilian sectors. 91 Plutonium is more available around the world than HEU and smuggling plutonium would
Constructing an
IND from plutonium, though, would be much more challenging insofar as it would
require the more sophisticated implosion-style design that would require
highly trained engineers working in well-equipped labs . 93 But, if an implosion device does
be relatively easy insofar as it commonly comes in two-pound bars or gravel-like pellets. 92
not detonate precisely as intended, then it would probably be more akin to a radiological dispersion device, rather than a
mushroom. Theoretically, plutonium could be used in a gun-assembly weapon, but the detonation would probably result in
an unimpressive fizzle, rather than a substantial explosion with a yield no greater than 10 to 20 tons of TNT, which would
experts believe that constructing a gun-assembly weapon would pose no significant technological barriers. 95 Luis Alvarez
once asserted that a fairly high-level nuclear explosion could be occasioned just by dropping one piece of weapons-grade
uranium onto another. He may, however, have exaggerated the ease with which terrorists could fabricate a nuclear
difficulty of developing a viable nuclear weapon is illustrated by the case of Saddam Husseins Iraq, which after 20 years
of effort and over ten billion dollars spent, failed to produce a functional bomb by the time the country was defeated in
the 1991 Gulf War. 97 Nevertheless, the quality of a nuclear device for a non-state entity would presumably be much
lower as it would not be necessary to meet the same quality standards of states when fabricating their nuclear weapons.
In order to be successful,
terrorists must succeed at each stage of the plot. With clandestine activities,
the probability of security leaks increases with the number of persons
involved. 98 The plot would require not only highly competent technicians, but also unflinching loyalty and discipline
from the participants. A strong central authority would be necessary to coordinate the
numerous operatives involved in the acquisition and delivery of the weapon.
Substantial funding to procure the materials with which to build a bomb
would be necessary, unless a weapon was conveyed to the group by a state or some criminal entity. 99 Finally,
Nor would the device have to be weaponized and mated with a delivery system.
a network of competent and dedicated operatives would be required to arrange the transport of the weapon across
national borders without detection, which could be challenging considering heightened security measures, including
gamma ray detectors. 100 Such a combination of steps spread throughout each stage of the plot would be daunting. 101
cruel in the sense that while it is not easy to make a nuclear bomb, it is not as difficult as believed once the essential
ingredients are in hand. 102 Furthermore, as more and more countries undergo industrialization concomitant with the
diffusion of technology and expertise, the hurdles for acquiring these ingredients are now more likely to be surmounted,
though HEU is still hard to procure illicitly. In a global economy, dual-use technologies circulate around the world along
with the scientific personnel who design and use them. 103 And although both the US and Russian governments have
substantially reduced their arsenals since the end of the Cold War, many warheads remain. 104 Consequently, there are
still many nuclear weapons that could fall into the wrong hands.
is exceptionally difficult to
machine while plutonium is one of the most complex metals ever
discovered, a material whose basic properties are sensitive to exactly how
it is processed, and both require specialmachining technology. Stressing
the daunting problems associated with material purity, machining, and a
host of other issues, Younger concludes, to think that a terrorist group,
working in isolation with an unreliable supply of electricity and little access
to tools and supplies could fabricate a bomb or IND is far-fetched at
best.30
who apparently mused at one point about creating a dirty bomba device that would disperse radiation
or even possibly an atomic one. His idea about isotope separation was to put uranium into a pail and then
to make himself into a human centrifuge by swinging the pail around in great arcs.51 [End Page 98]
Even if a weapon were made abroad and then brought into the United States,
its detonation would require individuals in-country with the capacity to
receive and handle the complicated weapons and then to set them off. Thus far,
the talent pool appears, to put mildly, very thin
information that comes in to determine whether they've advanced their efforts in any way whatsoever,"
said the official. "Developing
put the pieces together; that is, components are located in different places. The official said Pakistan has
put the appropriate safeguards in place.
government-to-government exchange of sensitive information to ensure that safeguards are in place to protect civil
initiative under way in one fusion center aimed at analyzing shooting incidents. By inviting health professionals and
trauma experts to combine their own data about shooting victims, the fusion center can capture the full promise of
collaboration. For instance, trauma experts can assign a dollar value, for the cost of emergency care, for the shooting
incidents the police investigate. The comparison of shooting data from disparate communities fuels the public policy
providing platforms needed to advance not just collaboration but also information assurance. By employing Web 2.0 and
enterprise technologies, fusion centers can harness disparate information feeds, analyze them, and channel the results to
customers who occupy trusted virtual communities.
, shocked the world and the scientific community when he claimed that
. We understand
that Coleman wrote an open letter to organizers of the Hammer Forum at UCLA that is aimed at the Intergovernmental Panel on Climate Change (IPCC). The Oct. 23 forum topic was "Tackling Climate Change Nationally and Globally," and
Coleman urged fourm organizers to re-examine their plan to present two speakers who believe scientific evidence supports climate change. Coleman claims that reports of ice sheets melting away are lies, and that heat waves are not
Coleman went on to add that he based most of his views on the findings of the Nongovernmental International Panel on Climate Change (NIPCC), an international body that
says "because it is not a government agency, and because its members are not predisposed to believe climate change is caused by human greenhouse gas emissions, NIPCC is able to offer an independent 'second opinion' of the evidence
From the statements he's making, it is clear that Coleman believes wholeheartedly that he's
correct, and is willing to put his neck on the line to bring this to the attention of the world. If the man is indeed telling the truth, then
. We await anything the global warming community has to say about Coleman's statement, along with responses from scientists and politicians alike. It would be
very interesting to see what they have to say to what Coleman is claiming, and if they can come up with the proof to shut him down.
and technology in the 21st century and what each would mean for the climate, given a certain assumption about the atmospheres sensitivity to carbon dioxide. Three of the models show a moderate, slow and
This is known as RCP8.5, and it produces 3.5 degrees of warming in 2081-2100. Curious to know what assumptions lay behind this model, I
decided to look up the original papers describing the creation of this scenario.
producing 50% of
its primary energy from coal, compared with about 30% today. Indeed, because oil is assumed to have become scarce, a lot of liquid fuel would then be derived from coal. Nuclear and renewable technologies
contribute little, because of a slow pace of innovation and hence fossil fuel technologies continue to dominate the primary energy portfolio over the entire time horizon of the RCP8.5 scenario. Energy efficiency
has improved very little.
With abundant natural gas displacing coal on a huge scale in the United States
today, with the price of solar power plummeting, with nuclear power experiencing a revival, with gigantic methane-hydrate gas resources being discovered on the seabed, with energy efficiency rocketing upwards,
Notice, however,
that even so, it is not a world of catastrophic pain. The per capita income of
the average human being in 2100 is three times what it is now. Poverty would
be history. So its hardly Armageddon.
and with population growth rates continuing to fall fast in virtually every country in the world, the one thing we can say about RCP8.5 is that it is very, very implausible.
But theres an even more startling fact. We now have many different studies of climate sensitivity based on
observational data and they all converge on the conclusion that it is much lower than assumed by the IPCC in these models. It has to be, otherwise global temperatures would have risen much faster than they have
over the past 50 years. As Ross McKitrick noted on this page earlier this week, temperatures have not risen at all now for more than 17 years. With these much more realistic estimates of sensitivity (known as
transient climate response), even RCP8.5 cannot produce dangerous warming. It manages just 2.1C of warming by 2081-2100. That is to say, even if you pile crazy assumption upon crazy assumption till you have
an edifice of vanishingly small probability, you cannot even manage to make climate change cause minor damage in the time of our grandchildren, let alone catastrophe. Thats not me saying this its the IPCC
itself. But what strikes me as truly fascinating about these scenarios is that they tell us that globalization, innovation and economic growth are unambiguously good for the environment. At the other end of the scale
from RCP8.5 is a much more cheerful scenario called RCP2.6. In this happy world, climate change is not a problem at all in 2100, because carbon dioxide emissions have plummeted thanks to the rapid development
of cheap nuclear and solar, plus a surge in energy efficiency. The RCP2.6 world is much, much richer. The average person has an income about 15 times todays in real terms, so that most people are far richer than
Americans are today. And it achieves this by free trade, massive globalization, and lots of investment in new technology. All the things the green movement keeps saying it opposes because they will wreck the
planet. The answer to climate change is, and always has been, innovation. To
century? As for how to deal with that small risk, well there are several possible options. You could encourage innovation and trade. You could put a modest but growing tax on carbon to nudge innovators in the right
direction. You could offer prizes for low-carbon technologies. All of these might make a little sense. But the one thing you should not do is pour public subsidy into supporting old-fashioned existing technologies that
produce more carbon dioxide per unit of energy even than coal (bio-energy), or into ones that produce expensive energy (existing solar), or that have very low energy density and so require huge areas of land
(wind). The IPCC produced two reports last year. One said that the cost of climate change is likely to be less than 2% of GDP by the end of this century. The other said that the cost of decarbonizing the world
economy with renewable energy is likely to be 4% of GDP. Why do something that you know will do more harm than good?
. The Pause is transformed into The Slowdown and alarmists rejoice because global warming hasnt stopped after all. (If the logic sounds backwards, it does to us as well,
if you were worried about catastrophic global warming, wouldnt you rejoice at findings that indicate that future climate change was going to be only modest, more so than results to the contrary?) The science
And since the Arctic (more so than the Antarctic) is warming faster than the global average, the lack of data there may mean that the global average
temperature trend may be underestimated. Cowtan and Way developed a methodology which relied on other limited sources of temperature information from the Arctic (such as floating buoys and satellite
observations) to try to make an estimate of how the surface temperature was behaving in regions lacking more traditional temperature observations (the authors released an informative video explaining their
research which may better help you understand what they did). They found that the warming in the data-sparse regions was progressing faster than the global average (especially during the past couple of years)
and that when they included the data that they derived for these regions in the computation of the global average temperature, they found the global trend was higher than previously reportedjust how much
higher depended on the period over which the trend was calculated. As we showed, the trend more than doubled over the period from 1997-2012, but barely increased at all over the longer period 1979-2012. Figure
1 shows the impact on the global average temperature trend for all trend lengths between 10 and 35 years (incorporating our educated guess as to what the 2013 temperature anomaly will be), and compares that
to the distribution of climate model simulations of the same period. Statistically speaking, instead of there being a clear inconsistency (i.e., the observed trend value falls outside of the range which encompasses
95% of all modeled trends) between the observations and the climate mode simulations for lengths ranging generally from 11 to 28 years and a marginal inconsistency (i.e., the observed trend value falls outside of
the range which encompasses 90% of all modeled trends) for most of the other lengths, now the observations track closely the marginal inconsistency line, although trends of length 17, 19, 20, 21 remain clearly
extracting information from records that have already told their stories, to fill in the missing data in the Arctic.
You can run this experiment yourself by filling a glass with a mix of ice and
water and then making sure it is well mixed. The water surface temperature must hover around 33F until all the ice melts. Given that the near-surface temperature is close to the water temperature, the limitations
of land data become obvious. Considering all of the above, we advise caution with regard to Cowtan and Ways findings. While adding high arctic data should increase the observed trend, the nature of the data
means that the amount of additional rise is subject to further revision. As they themselves note, theres quite a bit more work to be done this area. In the meantime, their results have tentatively breathed a small
hint of life back into the climate models, basically buying them a bit more timetime for either the observed temperatures to start rising rapidly as current models expect, or, time for the modelers to try to
Weve also
taken a look at how sensitive the results are to the length of the ongoing
pause/slowdown. Our educated guess is that the bit of time that the
Cowtan and Way findings bought the models is only a few years long, and it is
fix/improve cloud processes, oceanic processes, and other process of variability (both natural and anthropogenic) that lie behind what would be the clearly overheated projections.
a fact, not a guess, that each additional year at the current rate of
lukewarming increases the disconnection between the models and reality.
Decades-long empirical trends of climate-sensitive measures of human wellbeing, including the percent of developing world population suffering from chronic hunger, poverty rates,
and deaths due to extreme weather events, reveal dramatic improvement during the twentieth
century, notwithstanding the historic increase in atmospheric CO2 concentrations. The
magnitude of the impacts of climate change on human well-being depends on society's
adaptability (adaptive capacity), which is determined by, among other things, the wealth
and human resources society can access in order to obtain, install, operate, and maintain
technologies necessary to cope with or take advantage of climate change impacts. The
IPCC systematically underestimates adaptive capacity by failing to take
into account the greater wealth and technological advances that will be
present at the time for which impacts are to be estimated . Even accepting the
IPCC's and Stern Review's worst-case scenarios, and assuming a compounded annual growth rate
of per-capita GDP of only 0.7 percent, reveals that net GDP per capita in developing
countries in 2100 would be double the 2006 level of the U.S. and triple
that level in 2200. Thus, even developing countries' future ability to cope
with climate change would be much better than that of the U.S. today.
The IPCC's embrace of biofuels as a way to reduce greenhouse gas emissions was premature, as many
researchers have found "even the best biofuels have the potential to damage the poor, the climate, and
biodiversity" (Delucchi, 2010). Biofuel production consumes nearly as much energy as it generates,
competes with food crops and wildlife for land, and is unlikely to ever meet more than a small fraction of
. Natural variability is now widely accepted as making a significant contribution and our argument
for a lowered climate sensitivitywhich would indicate that existing climate models are not reliable tools for projecting future climate trendsis buoyed by accumulating evidence and is gaining support in the
broader climate research community. Yet is largely rejected by federal regulators and their scientific supporters. These folks prefer rather more exotic explanations that seek to deflect the blame away from the
So in other words,
rather than acting to slow global warming during the past decade and a half as proposed by Kaufmann et al. (2011), changes in anthropogenic aerosol emissions (including declining emissions trends in North
Until we understand what this sizeable mechanism is and how it works, our ability to reliably look into the future and
foresee what climate lies ahead is a mirage. Yet, somehow, the Obama Administration is progressing full speed ahead with regulations about the kinds of cars and trucks we can drive, the appliances we use, and the
The world's leading climate scientists, who have been meeting in all-night
said there was no longer room for doubt
that climate change was occurring, and the dominant cause has
been human actions in pouring greenhouse gases into the atmosphere. In their starkest warning
yet, following nearly seven years of new research on the climate, the
Intergovernmental Panel on Climate Change (IPCC) said it was "unequivocal" and
that even if the world begins to moderate greenhouse gas emissions, warming is likely to
cross the critical threshold of 2C by the end of this century. That would have serious
act."
consequences, including sea level rises, heatwaves and changes to rainfall meaning dry regions get less
and already wet areas receive more. In response to the report, the US secretary of state, John Kerry, said in
a statement: "This is yet another wakeup call: those who deny the science or choose excuses over action
those stakes, the response must be all hands on deck. It's not about one country making a demand of
another. It's the science itself, demanding action from all of us. The United States is deeply committed to
leading on climate change." In a crucial reinforcement of their message included starkly in this report for
about 530 gigatonnes had already been emitted by 2011. That has a clear implication for our fossil fuel
consumption, meaning that humans cannot burn all of the coal, oil and gas reserves that countries and
companies possess. As the former UN commissioner Mary Robinson told the Guardian last week, that will
have "huge implications for social and economic development." It will also be difficult for business interests
to accept. The central estimate is that warming is likely to exceed 2C, the threshold beyond which
scientists think global warming will start to wreak serious changes to the planet. That threshold is likely to
be reached even if we begin to cut global greenhouse gas emissions, which so far has not happened,
according to the report. Other key points from the report are: Atmospheric concentrations of carbon
dioxide, methane and nitrous oxide are now at levels "unprecedented in at least the last 800,000 years."
Since the 1950's it's "extremely likely" that human activities have been the dominant cause of the
temperature rise. Concentrations of CO2 and other greenhouse gases in the atmosphere have increased
to levels that are unprecedented in at least 800,000 years. The burning of fossil fuels is the main reason
behind a 40% increase in C02 concentrations since the industrial revolution. Global temperatures are
likely to rise by 0.3C to 4.8C, by the end of the century depending on how much governments control
carbon emissions. Sea levels are expected to rise a further 26-82cm by the end of the century. The
oceans have acidified as they have absorbed about a third of the carbon dioxide emitted. Thomas Stocker,
co-chair of the working group on physical science, said
gases must be reduced was clear. "We give very relevant guidance on the total amount
of carbon that can't be emitted to stay to 1.5 or 2C. We are not on the path that would lead us to respect
that warming target [which has been agreed by world governments]." He said: " Continued
the longer term trends were clear: "Each of the last three
decades has been successively warmer at the Earth's surface than
any preceding decade since 1850 in the northern hemisphere [the earliest date for reliable
But the IPCC said
temperature records for the whole hemisphere]." The past 15 years were not such an unusual case, said
Stocker. "People always pick 1998 but [that was] a very special year, because a strong El Nio made it
unusually hot, and since then there have been some medium-sized volcanic eruptions that have cooled the
climate." But he said that further research was needed on the role of the oceans, which are thought to
fund the IPCC. It was 1988 when scientists were first convened for this task, and in the five landmark
to see currently wet regions receiving more rainfall, and dry regions receiving less, although there will be
exceptions," Stocker said. Qin Dahe, also co-chair of the working group, said: " As
the ocean
warm, and glaciers and ice sheets reduce, global mean sea level will
continue to rise, but at a faster rate than we have experienced over
the past 40 years." Prof David Mackay, chief scientific adviser to the Department of Energy and
Climate Change, said: "The far-reaching consequences of this warming are becoming understood, although
diseases don't drive species extinct. There are several reasons for that. For one, the most
dangerous diseases are those that spread from one individual to another . If the
disease is highly lethal, then the population drops , and it becomes less likely that individuals will
contact each other during the infectious phase . Highly contagious diseases
tend to burn themselves out that way. Probably the main reason is variation. Within the host and the
pathogen population there will be a wide range of variants . Some hosts may be
naturally resistant. Some pathogens will be less virulent. And either alone or in combination, you end
up with infected individuals who survive . We see this in HIV, for example. There is a small fraction of humans who are
But mostly
naturally resistant or altogether immune to HIV, either because of their CCR5 allele or their MHC Class I type. And there are a handful of people who were infected with
defective versions of HIV that didn't progress to disease. We can see indications of this sort of thing happening in the past, because our genomes contain many instances
of pathogen resistance genes that have spread through the whole population. Those all started off as rare mutations that conferred a strong selection advantage to the
carriers, meaning that the specific infectious diseases were serious threats to the species.
there is no compelling reason to think any future virus mutations will trigger our total demise.
Disease
infection to death
quick
in
from
. Milder strains of the virus spread by people out and about, touching things, and shaking hands have an evolutionary
advantage over more debilitating strains. You cant spread a cold very easily if youre incapable of rolling out of bed.
: Plasmodium falciparum succeeds in part because bedridden victims of the disease are more vulnerable to
mosquitoes that carry and transmit the parasite. To mitigate malaria, the secret is to improve housing conditions. If people put screens on doors and windows, and use bed nets, it creates an evolutionary incentive
for Plasmodium falciparum to become milder and self-limiting. Immobilized people protected by nets and screens cant easily spread the parasite, so evolution would favor forms that let infected people walk around
and get bitten by mosquitoes. There are also a few high-tech tricks for nudging microbes in the right evolutionary direction. One company, called MedImmune, has created a flu vaccine using a modified influenza
virus that thrives at 77 degrees Fahrenheit instead of 98.6 degrees Fahrenheit, the normal human body temperature. The vaccine can be sprayed in a persons nose, where the virus survives in the cool nasal
someday
well barely notice when we get colonized by disease
Theyll be
tolerable If a friend sees us sniffling, well just say, Oh, its
nothing just a touch of the plague.
passages but not in the hot lungs or elsewhere in the body. The immune system produces antibodies that make the person better prepared for most normal, nasty influenza bugs. Maybe
organisms. Well have co-opted them.
Ebola Proves It
Morse, 4 (Stephen Morse, director of the Center for Public Helth Preparedness, at
the Mailman School of Public Health of Columbia University, 04 ActionBioscience.org,
Emerging and Reemerging Infectious Diseases: A Global Problem", 2004,
http://www.actionbioscience.org/newfrontiers/morse.html)
. In some cases, we may inadvertently create pathways to allow transmission of infections that may be poorly transmissible, for example, spreading HIV through needle sharing,
the blood supply, and, of course, initially through the commercial sex trade. The disease is not easily transmitted, but we provided, without realizing it, means for it to spread. It is now pandemic in spite of its
relatively inefficient transmission. We also get complacent and do not take steps to prevent its spread.
strategy for
Zhang and Buckling predicted that the combination treatment might be more effective than either antibiotics or phage alone because the
combination treatments should better reduce bacterial population sizes and limit their response to selection (Alisky et al. 1998, Chanishvili 2001, Comeau 2007). Additionally,
, so evolution of resistance to the combination treatments would likely require at least two mutations, and thus require more time to evolve resistance than the
(in addition to a control in which they allowed the bacterial populations to grow under normal conditions) for 24 days. A total
of 24 replicate populations were exposed to each treatment. After 24 days of bacterial evolution none of the replicate populations exposed to control conditions or phage went extinct (Figure 1). In contrast, 12 of the
replicate populations exposed to only the antibiotic were extinct
(Figure 1). Therefore, the combination treatment was the most effective treatment for killing the bacteria. However, that single population that
survived the combination treatment could mean trouble. Intense natural selection, like that imposed by the combination treatment, could have produced a super-strain of the bacteria. Creation of a super-strain, in
this case a strain resistant to both the antibiotic and phage with little cost of maintaining such resistance, would be troubling because the antibiotic-phage combination treatment strategy would have only
. These
fitness costs are thought to stop the spread of some antibiotic resistant strains simply because the strains cannot successful compete with strains in nature when the antibiotic is not present.
population that represents the starting point for evolution in this experiment.
(Figure 2).
. The ability of the surviving bacterial populations to grow under normal conditions was assessed relative to their ancestral bacterial population.
Here, any deviation from 0 is indicative of evolutionary change (a change from the ancestor population). Control populations increased in fitness under normal growth conditions, while populations exposed to either
phage or antibiotic exhibited reduced fitness. Most importantly, the population that survived the combined treatment of antibiotic and phage evolved greatly reduced fitness under normal conditions (Zhang and
Buckling 2012).
For the first time in sixty years, new TB vaccines are in clinical
trials. [n5]
Hebrew by Matar. (One hopes that the Hebrew edition will expunge the original endorsement that appears on the English version from Lance Armstrong, the disgraced
seven-time Tour de France winner.) Agus, who comes from a prominent Jewish family his grandfather, Rabbi Jacob Agus, was a theologian and the author of books on
medicine and engineering at the University of Southern Californias Keck School of Medicine. The 335-pageThe End of Illness, his first book, was on The New York Times
theres little
hope for survival in many cases, and the cure is as evasive today as it ever
was. Im infuriated by the statistics, disappointed in the progress that the
medical profession has made and exasperated by the backward thinking that
science continues to espouse, which no doubt cripples our hunt for the magic
bullet. He continues: The war on cancer might be ugly and destructive on
many levels. But on a positive note there are many lessons learned in the
experience of this war that can then be used to prevent future wars and
maximize peace. After all, the goal should be to avoid ever having to go to war rather than to win a war. And in the health realm, this is especially true.
HIS IDEAL end of life is to live robustly to a ripe old age of 100 or more. Then, as if your
master switch clicked off, your body just goes kaput. You die peacefully in
your sleep after your last dance that evening. You dont die of any particular
illness, and you havent gradually been wasting away under the spell of some
awful, enfeebling disease that began years or decades earlier. The end of
illness, he writes, is closer than you might think.
bestseller list. At the outset, Agus notes that colleagues were surprised he went to treating and researching cancer because, with exceptions,
preys on the hospitalized patient. Called carbapenem-resistant Enterobacteriaceae, or CRE, to denote the class of antibiotics (carbapenems) to which it is
resistant, and the group of bacterial organismsEnterobacteriaceae, bacteria that reside in the gutto which it belongs, CRE is being seen increasingly in
hospitals across the U.S. Unheard of before 2001, CRE now is in 181 (4.6 percent) U.S. acute-care hospitals, affecting hundreds of patients. In August 2012, the
resistance can and must occur according to the most basic principle of evolution: survival of the fittest. If a billion bacteria are exposed to an antibiotic and
just one bacterium, because of a chance mutation, is resistant to the antibiotic while the other near-billion are not, that single organism will survive while the
others will die off. The resistant organism will then have the run of the place with enough nutrition to support the billion now-absented brethren, allowing the
. We have been here before of course: methicillinresistant Staphylococcus aureus (MRSA) played through the hospitals and the headlines
(and even the National Football League) last decade, alarming the public and spurring
new regulations to contain it as well as the application of money, sort of, to develop
new weapons. Perhaps because of all the hubbub, MRSA now seems almost quaint and
surely not a headline-screaming scourge: mostly contained, a nuisance, a problem, but
being dealt with at the right place by the right people. In other words, it has assumed
its proper proportion in the world of threats and dangers. The same likely will happen with CRE. More cases will
resistant clone to take root and get in position to spread
occur, hospitals will make the necessary adjustments suggested by the CDC, specialists will learn their way around the diseases, and eventually the threat and
The
problem though is this: the mix of steady CDC concern about a real issue that requires
attention, a world with infinite capacity for both news and news, and a perverse
public enjoyment of being frightened has succeeded in little other than scaring the
crap out of people who might need medical care. Indeed, hospitals seem to occupy the
same imagined place as the Overlook Hotel, the cavernous inn Jack Nicholson prowled
in The Shiningthe last place on earth a sane person would go. Health care in general
and hospitals specifically are viewed these days by just about everyone as a veritable
the excitement around it will flatten out. And then the next red-hot development on some other front will emerge rendering the acronym to oblivion.
killing field, the place where the two inevitabilitiesdeath and taxesmeet daily as
people are fleeced then killed. Such is not the case. Honest. Yes, I know I am tainted goods because of my
conflict of interest: I work in a hospital and I believe in medical care. But please remember that people in ICUs, where CRE and so many other deadly
infections lurk, are not denizens of executive suites. They are already quite ill, usually with multiorgan failure from the heart attack or stroke or high-speed
automobile crash that brought them to emergency medical care. They then are exposed to the high-tech ballet of life-sustaining futuristic machines, venous
and urinary catheters, potent and often toxic medications, and all the rest. They also are exposed to the bacteria in their own intestines, mouth, and skin, as
well those in the environment, much less the imperfectly cleaned hands of hospital staff. Horrible, heartbreaking, and fully preventable things happen in ICUs,
as a mild skin condition, MRSA infections appear as reddened skin rashes that may develop into boils or pimples, causing fevers and pain. Pospisil said that at this stage,
the infection is not serious as long as it is taken care of. She said, I think for community-associated MRSA cases, the important thing for people to know is if they have a
skin infection, they should have a doctor look at it. The sooner they identify it, the better. Although the MRSA strain is resistant to methicillin, an antibiotic in the same
family as penicillin, infection is treatable. According to Christine Pearson, spokesperson for the Centers for Disease Control and Prevention, these cases can easily be taken
Blaming a misinterpretation
of a recent CDC report that found 19,000 people died in 2005 from the
antibiotic-resistant bacteria, Pearson said the nation has become overly
concerned with MRSA. The study indicated that invasive MRSA cases are a
serious problem in hospitals and healthcare clinics, but did not indicate
heightened risks for most of the general population. There are two different
things here, she said. According to the CDC, invasive MRSA cases often
cause serious complications by infecting bloodstreams and spreading
throughout the body, but the more common MRSA skin infections usually do
not become this serious. Different people are susceptible to different stages of MRSA infection. Healthy individuals with infections can
care of and are no cause for alarm. Most MRSA skin infections are mild and dont cause death, she said.
typically isolate the problem and easily treat it. On the other hand, people with weak immune systems run a higher risk of developing a case of the potentially deadly
While health officials across the country are making attempts to calm
down frantic parents and students, many welcome the opportunity to educate
people on how to avoid MRSA infections, issuing guidelines and fact sheets
about the bacteria. Pearson said, It never hurts to remind people about how
to stay safe. Finding a positive side to the recent nationwide media
attention, Dittman said that at least those who do run the risk of developing a
life-threatening infection from MRSA will now be aware of the condition.
Crediting the CDC report, she said she thinks people will be more likely to
understand just how deadly MRSA can be under certain conditions and take
the necessary precautions.
invasive MRSA.
Boston University in Massachusetts show that training cleaners not to overlook surfaces and to allow detergents to remain on surfaces for at least three minutes, rather than just giving a quick spray and wipe, can
curb the spread of germs from patient to patient. Can hospitals afford screening and cleaning? They cannot afford not to do it. The evidence is compelling that these steps actually make hospitals more profitable,
Approximately 85 such infections per 100 long-term care beds occur each year. These organisms show increasing resistance to even potent antibiotics. Dr. Gottlieb also does not mention the
dangers of biofilm and nosacomial (hospital acquired) infections. Biofilm is a slime like matrix produced by micro-organisms as a defense mechanism against their environment. Biofilm is particularly dangerous to
hospital patients whose first line defense against infection (their skin) has been breached by injury, surgery (particularly involving implants) and various types of catheters. This is the main cause of nosacomial
A
group that includes UCLA, the Veterans Administration of Greater Los Angeles
and GeneFluidics Inc. of Santa Monica, Calif., and which is funded by the
National Institutes of Health, published a promising new technique in the
Journal of Clinical Microbiology last year. The diagnostic technique can rapidly
(under 30 minutes) identify uropathogens in clinical urine by using an
electrochemical DNA biosensor. The biosensor turns the genetic information
of the bacteria into an electrical signal. This is analogous to a telephone,
which turns voice into an electrical signal. Other new methods for rapidly
testing antibiotic susceptibility are also currently being evaluated. Dr. Gottlieb
outlines the limitations of current antibiotics and problems of bringing new
antibiotics to the market. Antibiotics are substances produced or derived from
one micro-organism which destroys or inhibits the growth of other microorganisms. New antibiotics will be developed. However progress in
antimicrobials will also be made
infection, which involves two million patients and 90,000 deaths per year in the U.S. Antibiotics are ineffective in preventing and treating biofilm infections. The good news is that help may be on the way.
. A new group of hopeful antimicrobial compounds called Aganocides (developed by Nova Bay Pharmaceuticals) are based on
small molecules generated by our own white cells that defend against invading pathogens. In the body these compounds are produced "on demand" and are transient. Important safety features include long shelf
life, stability and very high therapeutic index (kills pathogens at concentrations significantly lower than concentration where it begins to harm human cells). Aganocides also unlikely to be rejected by the immune
system and are unlikely to provoke bacterial resistance. They are also likely to kill bacteria in minutes, kill most, if not all species of bacteria, and kill certain viruses, yeast and fungi. And Aganocides may even kill
resistant bacteria and destroy bacteria protected by biofilm. Current evidence indicates that a normal adult human has more bacteria in his body than his own DNA. In optimal condition, bacteria are divided every
20 to 30 minutes producing billions of pathogens in a single day.
always present problems for medical science. But new diagnostic and
therapeutic developments will continue to allow us to be masters of our
bodies.
Disadvantage Links
Politics Links
security, he said. Many Republicans acknowledge that they will get most of
the blame, just as they did in October 2013 and, for that matter, in 1995
during the shutdown in the Clinton administration. House members return
Tuesday, leaving only three days to find a solution. Top House Republicans
insist that it is up to the Senate to find a way out. But Mr. McConnell is in a
procedural box where it is difficult for him to move either forward or
backward, and his proposal on Monday was an effort to gain some
maneuvering room. The current thinking is that the funding deadline needs to
be imminent before House Republicans can relent and consider a bill that
strips out the immigration provisions for a later fight. Or a short-term bill,
which was emerging as a distinct possibility, may be the answer. But as in the
past, events can slip out of the leaderships control and end up with no
settlement and furlough notices going to thousands of agency employees
while many others in jobs deemed critical will have to work without pay and
only the expectation that they will ultimately get a check. Some
conservatives say they are willing to allow the Homeland Security funding to
lapse since most employees would have to report to work anyway.
Representative Thomas Massie, Republican of Kentucky, said, Its not clear
what the impact is because there are a lot of things that are supposedly
funded anyway, so the impact may be smaller than we think. Jeh Johnson,
the Homeland Security secretary, said in an interview that it was indulging in
a fantasy to believe you can shut down the Department of Homeland Security
and there be no impact to homeland security itself. This is not the time to
be shutting down the Department of Homeland Security by failure to act, Mr.
Johnson added. He cited new challenges from global terrorism, cybersecurity
threats, an exceptionally harsh winter in the Northeast and the South, and
the possibility of another spike in illegal immigration on the Southwest border.
The funding fight has stifled momentum that Republicans carried into the
new Congress. They posted a few quick victories, including approval of a
lapsed terrorism insurance program and a veterans suicide prevention
measure that had been blocked in December. They also pushed through a
measure to expedite construction of the Keystone XL oil pipeline and allowed
a robust fight on the floor in line with Mr. McConnells pledge to restore
regular order in the Senate. But the funding fight has tied the Senate in
knots for weeks, preventing Republicans from moving ahead on other
legislation they had hoped to advance. As they brace for a possible
shutdown, leading Republicans say their colleagues need to embrace the
reality that their new congressional majorities simply do not give them the
power to force through provisions that Mr. Obama and Senate Democrats are
dead set against. People demanding what cant be done are making a
political mistake, Mr. Cole said.
1NC
Fusion Centers Are Key to Data Collection
David Cole, Professor of Law, Georgetown University Law Center et al.
2012
Recommendations For Fusion Centers Members of The Constitution
Projects Liberty and Security Committee Endorsing the Recommendations for
Fusion Centers, ACLU
[additional authors: David A. Keene, former Chairman, American Conservative
Union, Azizah al-Hibri, Professor Emerita, The T.C. Williams School of Law,
University of Richmond, Bob Barr, former Member of Congress (R-Ga), David
E. Birenbaum, Of Counsel, Fried, Frank, Harris, Shriver & Jacobson LLP; Senior
Scholar, Woodrow Wilson International Center for Scholars, Phillip J. Cooper,
Professor, Mark O. Hatfield School of
Government, Portland State University, Mickey Edwards, Vice President,
Aspen Institute;
Eugene R. Fidell, Of Counsel, Feldesman Tucker Leifer Fidell, LLP; Senior
Research Scholar in Law and Florence Rogatz, Visiting Lecturer in Law, Yale
Law School, Michael German, Senior Policy Counsel, American Civil Liberties
Union, former Adjunct Professor, National Defense University School for
National Security Executive Education]
While fusion centers are not federal entities and have no federal legal status,
they are a central element of homeland security policy and receive
substantial federal support and guidance.19 As Secretary of Homeland Security
Janet Napolitano put it, Fusion Centers will be the centerpiece of state, local [and]
federal intelligence-sharing for the future.20 Federal funding matches this
rhetoric: between 2004 and 2007, DHS provided $254 million to state and
local governments to support fusion centers .21 Federal funding accounts for 20 to 30
percent of state fusion center budgets.22 In addition to financial support, the federal
government supports fusion centers by providing guidance, training,
technological and logistical assistance and personnel.23 The Office of Intelligence
and Analysis at DHS takes lead responsibility for coordinating with fusion centers, but both DHS and
DOJ provide assistance.24 Together, the two agencies have established guidelines (the Fusion Center
Guidelines) and basic operational standards (the Baseline Capabilities) for fusion centers.25 They also
DHS 15. "Fusion Center Success Stories." Fusion Center Success Stories.
N.p., 24 July 2014. Web. 26 June 2015. <http://www.dhs.gov/fusion-centersuccess-stories>.
fusion centers to improve information
sharing and analysis within their local jurisdiction on a range of
threats. These centers, which are state and locally owned and operated, were built upon existing
criminal intelligence efforts resident in state and major city police
departments. By building upon their experience and expertise in
addressing criminal threats, fusion centers were uniquely positioned to identify
and detect crimes or threats that may have a national security or
homeland security implication. Fusion centers have since evolved to
play a unique role in protecting their communities, informing
decision making, and enhancing information sharing activities
among law enforcement and homeland security partners. The DHS Office of
Following 9/11, some state and local entities established
Intelligence and Analysis (I&A) helps the National Network of Fusion Centers to develop and implement their capabilities by leading federal interagency efforts to share
information and products, conduct training, deploy personnel, and provide connectivity to classified and unclassified systems. After 10 years of supporting the
Without
fusion centers, we would not be able to connect the dots. Fusion
centers have been essential to breaking down the information silos
and communications barriers that kept the government from
detecting the most horrific terrorist attack on this country - even though federal,
fusion centers provide to the intelligence community. Fusion centers have stepped up to meet an urgent need in the last decade, Lieberman said.
state, and local officials each held valuable pieces of the puzzle.
White Nationalism DA
1NC
White extremist radicalism is on the rise and it is getting
harder to track
By Judy L. Thomas 2015 Only a matter of time? Kansas City Star
http://projects.kansascity.com/2015/domestic-terrorism/#/story/19374360
Larry Steven McQuilliams wouldnt hurt a fly and was a loyal volunteer, his friends and others say. He
performed at Renaissance festivals, dog-sat for neighbors. But in November, McQuilliams, 49, fired more
than 100 rounds at several buildings in Austin, Texas, where he had moved from Wichita. The targets
included a police headquarters, federal courthouse and Mexican consulate. After police shot and killed him,
they found his map pinpointing nearly three dozen targets, two of them churches. Authorities said
McQuilliams who had the words Let Me Die written on his chest held racist and anti-Semitic beliefs.
Police Chief Art Acevedo called McQuilliams a homegrown American extremist. Hate was in his heart,
call of the Oklahoma City bombing, authorities began cracking down on a subculture of extremist groups,
many arming themselves in preparation for a showdown with what they saw as an oppressive federal
author who for two decades has been tracking anti-government extremists, referring to the Oklahoma City
thing, said Leonard Zeskind, president of the Kansas City-based Institute for Research and Education on
Human Rights, who has monitored extremist groups for decades. Without
leaders, theyre
to fund their hate-filled activities. Over the years, the federal government has successfully charged white
supremacy extremists using a number of federal statutes, including civil rights violations, racketeering,
solicitation to commit crimes of violence, firearms violations, explosives violations, counterfeiting and
If you put the FAIR-inspired Washington Times article into context, the white
supremacists in the Radical Rightincluding John Tantons networkare
preparing for revolution and secession which are code words for a racial civil
war to create a white Christian theocracy. The context of Minutemen bearing
arms to intimidate immigrant workers and children; of bringing weapons to
town hall meetings; threatening to kill union workers who come to the same
health care town hall meetings; threatening to come armed at the next Tea
Party march on Washington, D.C.; threatening a million man, armed militia
march on D.C.; threatening to kill federal law makers who do not vote to
make English the official language; Chuck Norris call to fly a revolutionary
flag for a revolutionary movement; and, the right-wing smear of liberal
treachery all lead to the conclusion that comprehensive immigration reform
that includes a path to citizenship for millions of undocumented immigrants
could be the last straw for the white supremacist movement.
will be as crazily complex as it will be violent, cruel, and heinous. We now see
the skinheads and Ku Klux Klansmen emboldened in their campaigns against
blacks, Jews, Catholics. We see the Muslims at war not only against Jews, but
against the Italian mayor of New York, Rudolph Giuliani, and against America
as a whole, as reflected in terrorist bombings. We hear black students talk
about "the basis of truth" in a speech full of anti-Semitic invective by Nation
of Islam minister Khalid Muhammad at Kean College in New Jersey. We see
blacks in political struggle with Hispanics. And from Los Angeles to Detroit to
New York, we see a growing underclass at war against "the establishment."
This dreadful upsurge in hurting and hatred in America, the increase in
murders that are both random and born of rage, flows in part from the denied
but obvious racism and contempt for the poor that were so venomous during
the Reagan years, and before that from the spineless neglect and indifference
of the Nixon and Ford years. But that is history. A race war of destructive
proportions that will shock the world is probable because of these facts.
society's silence
about [such] crimesdespite enormous amounts of attention to 'racially tinged' acts by whites
only increase the anger of people like Dylann Roof," the Council of Conservative
Citizens writes, according to Mother Jones. "This double standard only makes acts of murderous frustration
more likely [emphasis theirs]. In his manifesto, Roof outlines other grievances felt by many whites. Again,
we utterly condemn Roofs despicable killings, but they do not detract in the slightest from the legitimacy
Hungary and the neo-fascist Golden Dawn in Greece are prime examples. In Germany, there has been a
series of murders by neo-Nazis. Britain, too, is experiencing an upswing of nationalist, anti-immigrant
politics. "The
The number of hate groups operating in the United States continued to rise
2008 and has grown by 54 percent since 2000 an increase fueled last year by immigration fears, a
in
failing economy, and the successful campaign of Barack Obama, according to the Southern Poverty Law
Center (SPLC).
percent from the 888 groups in 2007 and far above the 602 groups documented in 2000.15 " Barack
Obama's election has inflamed racist extremists who see it as another sign
that their country is under siege by nonwhites," said Mark Potok, editor of the
Intelligence Report, a SPLC quarterly investigative journal that monitors the radical right. "The idea of a
black man in the White House, combined with the deepening economic crisis and continuing high levels of
Latino immigration, has given white supremacists a real platform on which to recruit."16 The DHS
assessment on right-wing extremism, which was provided to federal, state, and local law enforcement,
Daniel Cowart, 20, of Bells, Tennessee and Paul Schlesselman, 18, of West Helena, Arkansas
end of the alleged spree, the men intended to try to kill Obama. "88," an important number in skinhead
numerology, means "Heil Hitler" as "H" is the eighth letter of the alphabet. "14" likely refers to the "14
Words," a white supremacist slogan that originated with the late David Lane. Lane died last year in prison
while serving a sentence for his role in an assassination plot carried out by The Order, a white supremacist
terrorist group that was destroyed in 1984. One of the suspects, Cowart, is a known member of a new
skinhead hate group, the Supreme White Alliance (SWA), formed at the beginning of 2008, according to the
Southern Poverty Law Center. He attended a birthday party for Adolf Hitler held last April by the group.
SWA is headed by Steven Edwards, son of Ron Edwards, who leads the Imperial Klans of America.17
Authorities and watchdog groups are seeing a new surge in violent incidents.
Anti-government groups have accounted for an uptick in domestic terrorism
a recent Department of Homeland Security assessment links 24 violent
incidents to sovereign citizens since 2010.
were charged in Florida with plotting to murder a black man. Two online forums see hundreds of posts a
day bashing minorities and the government. The cumulative effect of so much venomous rhetoric has
inspired some to commit violence, even murder, experts say. An effort is underway in Montana to
establish whites-only communities whose residents will run everything from the mayors office to the
schools. A similar effort failed in North Dakota when the neo-Nazi organizing it was charged with terrorizing
a resurgence, said Jeff Schoep of Detroit, commander of the National Socialist Movement. As
bad as things are with the economy, in times like that theres always going to be
resurgences because people are looking for answers . Metzger, however, said the
organizations are in flux. Its individuals all over the place, with all kinds of ideas, and sometimes theyre able to work
The worst act of domestic terrorism on U.S. soil brought intense scrutiny upon
the militia movement. Authorities infiltrated several groups and thwarted
some violent plots. By 2000, the numbers had sharply dwindled. In recent years, though, the
militias and their sister group, the sovereign citizen movement, have been making a
comeback. In 2007, we were tracking about 50 active militia groups , the ADLs
Pitcavage said. Now its over 260. Militia leaders say the movement has gone
through a transformation. The militia movement has grown, but its changed,
said Mike Vanderboegh, former leader of the 1st Alabama Cavalry Regiment Constitutional Militia and a
There are currently 784 hate groups operating across the country,
They include white nationalists, Klansmen,
neo-Nazis, skinheads, border vigilantes and even black separatists. The
number is down from 939 groups in 2013, but that doesnt tell the real
story, said Mark Potok, senior fellow at the law center. It appears that extremists are leaving
these groups for the anonymity of the Internet, which allows their message to
reach a huge audience, he said in the report. Moreover, he said, the drop in the number
of extremist groups hasnt been accompanied by any real reduction in
extremist violence. Some white nationalist groups have Missouri connections, such as the
Nazi.
Vanguard News Network, a racist online site run by Alex Linder of Kirksville, and the St. Louis-based
Council of Conservative Citizens, which promotes preservation of the white race. (Former U.S. Senate
majority leader Trent Lott of Mississippi and numerous other politicians got in hot water for speaking at
some of that groups events.)
the same factors, said Zeskind, author of Blood and Politics: The History of the White Nationalist
Movement from the Margins to the Mainstream. The U.S. is undergoing a tremendous
demographic transformation in which white people will become a minority , he
said. That is the turning point for these people . When you lose majority status,
you lose the ability to democratically control.
of our houses, how much more lenient should we be in our treatment of jews, who destroy the foundations
of our society? Miller posted regularly on the Vanguard News Network forum. Using the name Rounder,
Miller authored 12,683 posts on the site over 10 years. Online, Miller found a community among whom he
could share his ideas. He corresponded with, among others, Kevin Harpham, who pleaded guilty to planting
a bomb in 2011 along the route of the Martin Luther King Jr. parade in Spokane, Wash. Millers last post
was the day before the Overland Park shootings. He wrote that he had talked to a neo-Nazi friend, who had
updated him on his charge of terrorizing a North Dakota town. A study released last year by the Southern
Poverty Law Center found that more than a dozen people in the past five years had been murdered on
American soil by registered members on the Stormfront forum. For example, in 2009, Richard Poplawski
ambushed and killed three Pittsburgh police officers with an AK-47 just hours after logging on to his
forums like Stormfront and (Vanguard) exist, said Jason 916 on the Vanguard forum a year ago, referring
to the Overland Park shootings. If people are able to talk about it, theyre less likely to snap and go on a
rampage. When they take away free speech, theres really nothing left but violence. Who knows how many
there
has been an identifiable racial order since the colonial period which has
linked political rule to the racial classification of individuals and groups. n90
They claim that the racial order of white supremacy has structured major
institutions and social relationships. n91 A dialectical trajectory has reflected
an historical change in this racial order, i.e., a "pattern of conflict and
accommodation which takes shape over time between racially based social
movements and the policies and programs of the state." n92 The present
environment offers an opportune time to consider the political conflict over
race. The national political correspondents for the Washington Post and the Los Angeles Times, have observed: "As the
summer of 1995 turned toward fall, almost everything in American politics appeared up for grabs at once." n93 Indeed, in
their assessment, "turmoil is the defining characteristic of American politics in the 1990s." n94 This tumultuous period
stems, in part, from "social and political upheaval that has alienated Americans from their political leadership." n95
American Dream, to which most aspire, requires an assurance that successive generations will fare better economically
than their parents. Although most Americans today do have a higher stan- [*43] dard of living than their parents, they
this anxiety is
an ideal climate for the Republican Party to continue to advance its dominant
racial projects. Hence, in this contextual setting, the political conflict over race is more significant now than it has
increasingly doubt that their children will be able to live better than they did. n97 In many ways
been for years, largely because so much is at stake, and because the paradigm shift from left to right is profoundly in
some times than others). For instance, prior to modern civil rights and antidiscrimination legislation, there was a period of
states issued their "Southern Manifesto," which declared that the Brown decision was "unwarranted" and "a clear abuse of
judicial power" [*44] that reflected the substitution of the Justices' "personal political and social ideas for the established
After Brown, but prior to the Civil Rights Act of 1964, the Voting
Rights Act of 1965 and the urban disorders from 1965 on, national seeds of
backlash were planted. n103 "As early as 1963, political commentators began to speak presciently of
"thunder on the right' in American politics." n104 In terms of broadly politicizing racial
backlash, the first significant manifestation was probably George Wallace's
law of the land." n102
campaign in the 1968 presidential election . Shocking the nation, the Alabama governor segregation now, segregation forever - won thirty-five percent of the vote in the Wisconsin Democratic primary. n105
Capitalizing on strong support among working-class white ethnic voters, Wallace went on to capture thirty percent of the
In the 1968
election, Richard Nixon's adoption of Wallace's appeal to white backlash
became known as his "Southern strategy," although he directed and applied
the strategy nationally on behalf of a so-called "silent majority." n107 [*45]
vote in the Indiana primary and forty-three percent of the vote in the Maryland primary. n106
Although Reaganism represented the paradigm of conservative egalitarianism, I think is insightful to view conservative
egalitarianism as a continuum that runs from Wallace to Nixon to Reagan to Bush to Newt Gingrich, who is "Reaganism at
warp speed." n108 We must understand, then, that Ronald Reagan was not only an extension of Richard Nixon, but also
George Wallace. Reagan looked back to them, more than forward. "In many respects, Ronald Reagan in his quest for the
presidency consolidated, updated, and refined the right-populist, race-coded strategies of Wallace and Nixon." n109
The
most powerful elements of today's right-wing Republicans have, in turn, taken
the baton from Reagan, not Bush. According to Balz and Brownstein, "Conservative Republicans
revolution." n119 Reagan, in a sense, received this baton from Wallace and Nixon and brought it home in 1980.
routinely say they have reached for inspiration back beyond Bush to Ronald Reagan." n120 If that thought is not scary
enough for the left, consider that "in fact, their ambitions now dwarf Reagan's." n121 These ambitions are supported
through an interlocking institutional arrangement that has been aptly described as the "conservative iron triangle." n122
The three points of this triangle are (1) the Republican majority in Congress; (2) the increasing power in state politics,
where Republicans control thirty one of the fifty governor seats and nineteen state legislatures; and (3) the United States
Supreme Court's dominance by five Republican-appointed justices, including the Chief Justice. n123 B. The Continuing
formidable voting bloc of white males voted for Reagan in unprecedented numbers: seventy-four percent in the South,
sixty-eight percent in the West and sixty-six percent in the [*48] nation overall. n125 In contrast, only twelve percent of
black men and seven percent of black women voted for Reagan. n126 By 1986, fifty-six percent of blacks viewed him as a
racist. n127 This trend continued in 1988 when sixty-three percent of white men and fifty-six percent of white women
political commentators continue to place Reagan within the converged racial projects of the new right and the
neoconservatives, n131 he is more properly associated with the far right as well. Although this association is facially
tenuous,
The far right has explicitly attempted to reestablish and legitimate white identity and naked white supremacy which the
civil rights movement successfully challenged. n134 As indicated in Table 1,
that identity viewed race in strictly biological terms and associated racial
purity and racial superiority as inherently the preserve of white people. In
other words, the far right sought to revive white supremacist notions of race
and adopted an explicitly racist project. According to the far right, the civil rights movement not
racial project in close association with the far right.
only subverted the natural order of things, but it did so by eliminating the rights of white people: rights that the nation
had legitimately accorded whites to undergird their proper positions of privilege and domination over people of color. n135
World
War III would mean the end of civilization, no one would dare start it. Each side is deterred
from attacking the other by the prospect of certain destruction. That's why our current strategy is called nuclear
deterrence or mutually assured destruction (MAD). But again, it's important to read the fine print. It is true that
no
one in his right mind would start a nuclear war, but when people are highly
stressed they often behave irrationally and even seemingly rational decisions can lead to places that
no one wants to visit. Neither US president John F Kennedy nor Russian premier Nikita Khrushchev
wanted to teeter on the edge of the nuclear abyss during the 1962 Cuban missile crisis, but
that is exactly what they did. Less well known nuclear near misses occurred
during
Able Archer exercise of 1983. In each of those episodes, the law of unintended consequences combined with the danger
of irrational decision-making under stress created an extremely hazardous situation. Because the last date for a nuclear
near miss listed above was 1983, it might be hoped that the end of the Cold War removed the nuclear sword hanging over
humanity's head. Aside from the fact that other potential crises such as Taiwan were unaffected, a closer look shows that
the Cold War, rather than ending, merely went into hibernation. In the West,
specter is
It is partly
for that reason that a number of former Soviet republics and client states
have been brought into NATO and that President George W Bush is pressing for Georgia and the Ukraine
charter, which states that an attack on any NATO member shall be regarded as an attack on them all.
to be admitted. Once these nations are in NATO, the thinking goes, Russia would not dare try to subjugate them again since that would invite
nuclear devastation by the United States, which would be treaty bound to come to the victim's aid. But, just as the laws of physics depended
on a model that was not always applicable during a glider's low pass, the law of deterrence which seems to guarantee peace and stability is
model-dependent. In the simplified model, an attack by Russia would be unprovoked. But what if Russia should feel provoked into an attack
and a different perspective caused the West to see the attack as unprovoked? Just such a situation sparked World War I. The assassination of
Austria's Archduke Ferdinand by a Serbian nationalist led Austria to demand that it be allowed to enter Serbian territory to deal with terrorist
organizations. This demand was not unreasonable since interrogation of the captured assassins had shown complicity by the Serbian military
and it was later determined that the head of Serbian military intelligence was a leader of the secret Black Hand terrorist society. Serbia saw
things differently and rejected the demand. War between Austria and Serbia resulted, and alliance obligations similar to NATO's Article 5 then
produced a global conflict. When this article was first written in May 2008, little noticed coverage of a dispute between Russia and Georgia
reported that "both sides warned they were coming close to war". As it was being revised, in August, the conflict had escalated to front page
news of a low-intensity, undeclared war. If Bush is successful in his efforts to bring Georgia into NATO, we would face the unpleasant choice of
reneging on our treaty obligations or threatening actions which risk the destruction of civilization. A similar risk exists between Russia and
Estonia, which is already a NATO member. Returning temporarily to soaring, although I will not do low passes, I do not judge my fellow glider
pilots who choose to do them. Rather, I encourage them to be keenly aware of the risk. The pilot in the photo has over 16,000 flight hours, has
been doing low passes at air shows for over 30 years, will not do them in turbulent conditions, ensures that he has radio contact with a trusted
spotter on the ground who is watching for traffic, and usually does them downwind so that he only has to do a "tear drop" turn to land. The
fact that such an experienced pilot exercises that much caution says something about the risk of the maneuver. The danger isn't so much in
doing low passes as in becoming complacent if we've done them 100 times without incident. In the same way, I am not arguing against
admitting Georgia to NATO or suggesting that Estonia should be kicked out. Rather, I encourage us to be keenly aware of the risk. If we do
that, there is a much greater chance that we will find ways to lessen the true sources of the risk, including patching the rapidly fraying fabric
of Russian-American relations. The danger isn't so much in admitting former Soviet republics into NATO as in becoming complacent with our
ability to militarily deter Russia from taking actions we do not favor Substates Part of society's difficulty in envisioning the threat of nuclear
war can be understood by considering Figure 2. The circle on the left represents the current state of the world, while the one on the right
people.
How could we possibly transit from the current, relatively peaceful state of the world to
answer lies in recognizing that what is depicted as a single, current state of the world is much more
complex. Because that single state encompasses all conditions short of World War III, as depicted below, it is really
composed of a number of substates - world situations short of World War III, with varying degrees of risk: Society is partly
correct in thinking that a transition from our current state to full-scale war is impossible because, most of the time, we
occupy one of the substates far removed from World War III and which has little or no chance of transiting to that state of