Professional Documents
Culture Documents
Surveillance Af
Plans
Plan Policy
The United States Federal Judiciary should rule that
domestic surveillance on the basis of race, religion, and
ethnicity are unconstitional.
Plan solves.
Unegbu, Howard University JD candidate, 2013
[Cindy, 57 How. L.J. 433, NOTE AND COMMENT: National Security
Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional
Misstep Lexis, accessed 7-6-15, TAP]
The grant of surveillance power to monitor individuals without
suspicion of criminal or terrorist activity and the ability to collect
personal information from various sources on the basis of race or
ethnicity has resulted in the discrimination of domestic individuals
who belong to a particular racial or ethnic group. This discrimination
is generated through a disparate impact that the new government
surveillance authority has on various ethnic and religious groups,
specifically those that are Arab, South Asian, or practitioners of the Islamic
religion. Through a balancing test of five factors established through Supreme
Court jurisprudence, it is apparent that there is sufficient indirect
evidence of the government's intent to discriminate. Because there is
an established intent to discriminate, the new government surveillance
authority and procedures can only be constitutionally upheld if the
acts are narrowly tailored to a compelling government interest. The
compelling state interest is satisfied through the goal of nationally security;
however, the narrowly tailored prong fails because of the monitoring
system's over-inclusiveness. Therefore, the government national
security surveillance authority and procedures, via the NCTC
amendments and DIOG guidelines, are in violation of the Fourteenth
Amendment's Equal Protection Clause.
Plan K
The United States Federal Government should end
domestic surveillance on the basis of race, religion, and
ethnicity.
Plan solves.
Unegbu, Howard University JD candidate, 2013
[Cindy, 57 How. L.J. 433, NOTE AND COMMENT: National Security
Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional
Misstep Lexis, accessed 7-6-15, TAP]
The grant of surveillance power to monitor individuals without
suspicion of criminal or terrorist activity and the ability to collect
personal information from various sources on the basis of race or
ethnicity has resulted in the discrimination of domestic individuals
who belong to a particular racial or ethnic group. This discrimination
is generated through a disparate impact that the new government
surveillance authority has on various ethnic and religious groups,
specifically those that are Arab, South Asian, or practitioners of the Islamic
religion. Through a balancing test of five factors established through Supreme
Court jurisprudence, it is apparent that there is sufficient indirect
evidence of the government's intent to discriminate. Because there is
an established intent to discriminate, the new government surveillance
authority and procedures can only be constitutionally upheld if the
acts are narrowly tailored to a compelling government interest. The
compelling state interest is satisfied through the goal of nationally security;
however, the narrowly tailored prong fails because of the monitoring
system's over-inclusiveness. Therefore, the government national
security surveillance authority and procedures, via the NCTC
amendments and DIOG guidelines, are in violation of the Fourteenth
Amendment's Equal Protection Clause.
Policy 1ac
Terror Adv
Voluntary informants wont come forward now FBI
surveillance of Muslim communities undermines
involvement. Reversing that is critical to stop terrorism.
Stabile, University of California Berkeley School of Law JD,
2014
[Emily, 102 Calif. L. Rev. 235, COMMENT: Recruiting Terrorism Informants:
The Problems with Immigration Incentives and the S-6 Visa Lexis, accessed
7-12-15, TAP]
Moreover, Professor David A. Harris claims that "the unregulated use
of informants in mosques and other religious and cultural settings
can also do great damage because it poses the risk of cutting of our
best possible source of intelligence : the voluntary, cooperative
relationships that have developed between law enforcement and
Muslim communities." 102Link to the text of the note Having community
members report suspicious information to the FBI may be a more
efective way of obtaining reliable terrorism intelligence from these
communities. 103Link to the text of the note For example, in the few
domestic terrorist prosecutions where a terrorist attack plan
actually existed prior to informant involvement, community
members who had noticed something amiss were the first to alert
the FBI and identify the subjects. 104Link to the text of the note In fact,
since 9/11, community members have assisted law enforcement in
stopping potential terrorism plots in a number of cases. 105Link to the
text of the note A [252] recent example, the case of Umar Farouk
Abdulmutallab, the "Underwear Bomber," shows that the attempted
bombing could have been prevented had law enforcement heeded
the warnings that Abdulmutallab's father gave the CIA at the U.S.
embassy in Nigeria. 106Link to the text of the note As the president of
the San Francisco Board of Supervisors and former criminal
prosecutor, David Chiu testified regarding the Arab, Middle Eastern,
Muslim, and South Asian communities in San Francisco: "Without
that level of cooperation, that level of trust, everything falls apart
. Surveillance only serves to continue to drive wedges when
cooperation is what is needed most ." 107Link to the text of the note
strengthened by requiring agents in charge of the field operations to approve surveillance. 73Link to the
numerous
instances of mosque surveillance have already eroded Muslim
communities' trust of law enforcement. 74Link to the text of the note By placing
informants in places of worship and cultural spaces, the FBI has
chilled free speech and damaged the most reliable way of obtaining
accurate terrorism intelligence from these communities . In a wellpublicized and egregious case, an FBI informant named Craig
Monteilh was assigned to surveil a mosque in Irvine, California . 75Link
text of the note Nevertheless, this change may not really improve matters, as
to the text of the note The FBI instructed Monteilh, a convicted felon working as a paid informant, 76Link to
the text of the note to [248] indiscriminately surveil worshippers at the mosque, without concentrating on
a particular target or activity. 77Link to the text of the note After congregants noticed Monteilh's
inflammatory rhetoric and repeated talks about instigating terrorism, they reported him to the FBI. 78Link
to the text of the note The FBI failed to investigate further, and after the arrest of another suspected
terrorist, Monteilh revealed his identity as an FBI informant. 79Link to the text of the note This incensed
the Islamic community, in part because an FBI Assistant Director had promised a year earlier that the
note Although Monteilh was neither an immigrant nor was offered immigration incentives in return for
Shari'ah law in judicial decisions 92Link to the text of the note and Islamophobia 93Link to the text of the
note rising in the United States 94Link to the text of the note and abroad. 95Link to the text of the note
[250] By sending immigrant informants into mosques and religious and ethnic communities with little more
In fact, many, if not most, terrorism cases never reach the jury
because the chances of successfully defending against terrorism
charges after 9/11 are almost nonexistent. 99Link to the text of the note Popular
note
stereotypes concerning Muslims and Middle Easterners play a role in this. Although the use of immigration
law in recruiting informants is only one of many factors contributing to this harmful cycle, the use of
coercive tactics like immigration law to recruit informants creates a [251] higher risk of unfounded
Consequently, this
fuels the public perception that a stereotypical terrorist is a Middle
Easterner or Muslim.
terrorism prosecutions against innocent individuals who do not pose a risk.
American and allied forces overran al Qaeda sanctuaries in the caves of eastern Afghanistan in 2002,
Killing
livestock and plants or contaminating food can help terrorists cause
economic crises in the agriculture and food industries . Secondary goals
stability.3 It represents a tactic to attack the economic stability of the United States.
include social unrest and loss of confidence in government. Serious Concern Agroterrorism is not new.
The Assyrians poisoned enemy wells with rye ergot during the 6th century B.C. During World War I,
German agents in the United States infected horses and cattle in transit across the Atlantic to France. In
1994, in The Dalles, Oregon, a religious cult intentionally contaminated 10 restaurant salad bars with
salmonella, sickening more than 750 people in an attempt to influence the outcome of a local election.
Since 1912, 12 documented cases have involved the substate use of pathogenic agents to infect livestock
or contaminate food.4 Terrorist leaders realize that America’s strength stems largely from its
The
foremost threat is posed by transnational groups, like al Qaedawidely
believed to present the most probable threat of inflicting economic harm on the
economic vitality. The agroterrorism threat emanates from four categories of perpetrators.
United States. The second group is comprised of economic opportunists tempted to manipulate markets.
They understand that a foot and mouth disease (FMD) outbreak, for example, would have a dramatic
impact on markets. By introducing the virus, they could exploit the markets for personal economic gain.
The third category includes domestic terrorists who may view the introduction of FMD as a blow against
the federal government. As an outlier of this category, the unbalanced individual or disgruntled employee
may perpetrate an attack for a variety of idiosyncratic or narcissistic motivations. Finally, militant animal
rights or environmental activists pose a threat because they consider immoral the use of animals for food.
Groups, such as the Animal Liberation Front and its sister organization, the Earth Liberation Front, could
view an attack on the animal food industry a positive event.5 Threat Environment Because it lacks the
drama and spectacle of more common terrorist violence, such as bombings and murders, agroterrorism
has remained a secondary consideration, and no documented attacks in the homeland have occurred since
environment it now must operate in has prevented it from mounting catastrophic terrorist attacks on the
scale of 9/11. Now, al Qaeda places its emphasis on smaller, independent attacks following a death by a
thousand cuts strategy to exhaust, overwhelm, and distract U.S. Department of Homeland Security
forces. The group seeks to flood Americas already information overloaded intelligence systems with
myriad threats and background noise.6 Agroterrorism also may serve as a way to magnify the social
upheaval caused by smaller, independent attacks, like bombings. Second, Usama Bin Ladin consistently
had argued that attacking the U.S. economy represented the best way to destroy Americas ability to
project military power abroad. Underpinning this view is al Qaedas historical narrative that jihad against
the Soviets following the invasion of Afghanistan led not only to the defeat of the Red Army but, ultimately,
to the demise of the U.S.S.R.7 As divorced from reality as this view seems, economic harm remains one of
the pillars of al Qaedas terror strategy against the United States. In a video broadcast before the 2004
U.S. presidential elections, Usama Bin Ladin bragged that his organization bled Russia for 10 years until
it went bankrupt and was forced to withdraw in defeat. We are continuing in the same policy to make
America bleed profusely to the point of bankruptcy. He boasted that the 9/11 attacks had cost al Qaeda
$500,000 while inflicting a staggering $500 billion in economic losses to America.8 According to Bin Ladin,
every dollar of al Qaeda defeated a million dollars [of America]...besides the loss of a huge number of
Terrorist leaders realize that Americas strength stems largely from its economic vitality. They pursue an
overarching strategy that all attacks should focus on weakening Americas economic strength, especially
through protracted guerilla warfare. In their view, as the United States loses its standing in the Middle East,
groups, like al Qaeda, can gain ground and remove from power regimes they view as corrupt and
economic disruption would occur on three levels. The first involves direct losses due to containment
measures, such as stop-movement orders (SMOs) or quarantines of suspected stock. Additional costs
would arise from the culling and destruction of disease-ridden livestock.11 Second, indirect multiplier
effects, such as compensation to farmers for destruction of agricultural commodities and losses suffered
by directly and indirectly related industries, would arise.12 And, third, international costs would result from
protective trade embargoes. Less measurable consequences would include the undermining of confidence
in and support of government, creation of social panic, and threat to public health on the national and
inexpensive but highly disruptive attacks in lieu of monumental ones. Agroterrorism could exacerbate the
social upheaval caused by random bombings. The ability to employ cheap and unsophisticated means to
undermine Americas economic base, combined with the added payoff to potentially overwhelm its
counterterrorism resources, makes livestock- and food-related attacks increasingly attractive.13 Foot and
States in 1929, FMD remains endemic in South America, Africa, and Asia.15 An especially contagious virus
20 times more infectious than smallpox, FMD causes painful blisters on the tongues, hooves, and teats of
cloven-hoofed animals, including cattle, hogs, sheep, goats, and deer, rendering them unable to walk, give
milk, eat, or drink. Although people generally cannot contract the disease, they can carry the virus in their
lungs for up to 48 hours and transmit it to animals. The animal-to-animal airborne transmission range is 50
miles.16 An infected animal can shred the virus in large quantities from its upper respiratory tract via
drooling, coughing, and discharging mucus. Extremely stable, FMD can survive in straw or clothing for 1
and international sale of meat and meat products for years. In this regard, in 2001, FMD in the United
Kingdom affected 9,000 farms and required the destruction of more than 4,000,000 animals. Researchers
believe that a similar outbreak in the United States would cost taxpayers up to $60 billion.22 An FMD
attack could result in massive herd culling, the need to destroy processed goods, and extensive
decontamination efforts of production and livestock-containment facilities. Most Americans have not
witnessed the intense media coverage of high-volume culling operations involving the destruction and
disposal of tens of thousands of animals. Large-scale eradication and disposal of livestock likely would be
especially controversial as it affects farmers and ranchers and offends the sensibilities of animal rights
activists and environmental organizations. Food Production and Distribution If terrorists strive for human
deaths, the food production and distribution chain offers a low-tech but effective mechanism for
disseminating toxins and bacteria, such as botulism, E. coli, and salmonella. Developments in the farm-totable continuum greatly have increased the number of entry points for these agents. Many food processing
and packing plants employ large, unscreened seasonal workforces. They commonly operate uneven
standards of internal quality and inadequate biosurveillance control to detect adulteration.23 These
vulnerabilities, combined with the lack of security at many processing and packing plants, contribute to the
ease of perpetrating a food-borne attack. Beyond the economic and political impact, low-tech bioterrorist
assaults against the food chain have the potential to create social panic as people lose confidence in the
safety of the food supply. A large-scale attack potentially could undermine the publics confidence in its
government. Because most processed food travels to distribution centers within a matter of hours, a single
case of chemical or biological adulteration could have significant latent ongoing effects, particularly if the
source of the contamination is not immediately apparent and there are acute ailments or deaths.24
Supermarkets in major American cities stock only a 7-day supply of food; therefore, any significant and
front-end barrier against pathogens, in food processing. Also, because they deal in already-prepared
produce that does not require cookinga good back-end defense against microbial introductionthey
Farms, ranches,
and feedlots in America are dispersed, open, and generally
unprotected. The majority of state and local law enforcement agencies face financial and strategic
provide a viable portal to introduce pathogens. Law Enforcement Preparedness
challenges when responding to agroterrorism, yet the laws of many states treat agroterrorism as a crime
investigation, giving local law enforcement agencies primary responsibility. An outbreak of FMD would
exhaust law enforcement resources quickly. After recognition of the disease by state agriculture
authorities, subsequent steps in the emergency response involve containment and eradication, often
involving multiple herds and a large quarantine area that may encompass multiple counties. State
agriculture authorities working with the U.S. Department of Agricultures Animal and Plant Health
Inspection Service have responsibility and authority for animal disease.25 Specially trained animal health
officials make decisions on disease control, such as livestock quarantine and the timing and method of
livestock depopulationculling, destroying, and disposing of diseased animals from infected herds by
burning or burial. Following strict biosecurity measures can prevent the spread of disease. Local and state
law enforcement would play a pivotal role in this effort by adhering to three primary responsibilities. First,
police officials would enforce quarantine orders given by state agriculture authorities. This involves
isolating and containing infected stock to prevent the spread of disease. A quarantine area would comprise
a 6-mile radius, approximately 113 square miles, surrounding the point of origin; numerous roadblocks
would prevent vehicles, equipment, or persons from entering or leaving without detailed decontamination
measures and authorization.26 Inside the quarantine area, officials would establish an exposed zone in
which all cloven-hoofed animals would be destroyed. For effectiveness, quarantine of infected premises
and SMOs would have to remain in effect for a minimum of 30 days.27 The second responsibility occurs in
conjunction with quarantine. Officers would enforce SMOs issued by the state governor to prevent the
spread of the disease.28 Initial biosecurity efforts could require placement of all animals under an SMO.
Law enforcement may be empowered to restrict human and animal movement in and out of the quarantine
zone. This authority would include all animals in transit within a wide geographic area until the
investigation clarified the extent of the infection and determined which animals can move safely. Although
FMD affects only cloven-hoofed animals, humans, horses, and other animals may carry the virus.
Enforcing an SMO would require care and shelter for animals in transit that must be temporarily unloaded
and housed at local sites providing feed and water.29 During the SMO, law enforcement would interview
drivers to determine points of origin and destinations of animals. Research indicates that officers would
stop and evaluate an average of nearly 50 vehicles per hour in the first day of an SMO. Third, the criminal
investigation of the outbreak further would tax already strained law enforcement resources. The
investigation would focus on identifying the source of the virus and the mechanism used to infect
susceptible animals. The danger of additional infections by the perpetrators would make the criminal
dispersed checkpoints around the clock for the duration of the emergency. When combined with the need
also to deliver routine law enforcement services, most agencies would struggle to meet these demands,
especially during the protracted nature of an FMD outbreak. Conclusion Agriculture may not represent
terrorists first choice of targets because it lacks the shock factor of more traditional attacks; however, it
comprises the largest single sector in the U.S. economy, making agroterrorism a viable primary aspiration.
Such terrorist groups as al Qaeda have made economic and trade disruption key goals. They believe that
by imposing economic hardship on America, its citizens will tire of the struggle and force their elected
develop a plan to prevent agroterrorism and minimize the results of an attack. Officers must investigate
from an agroterrorism perspective thefts of livestock; a criminal organization may steal animals with the
intent of infecting them and placing them back into the population. Thefts of vaccines, medicines, and
livestock-related equipment should be of concern and carefully investigated. It also is vital that law
enforcement officials forward reports of such incidents to their states intelligence-fusion centers, threatintegration centers, or law enforcement intelligence units or networks.
Beginning with Bismarcks Germany, many countries also adopted social reforms like government pensions and health
insurance. These reforms were often favored by the nationalist right, as a way of luring the working class away from the
II, the U.S. sought to avert a repetition of that pattern, by creating a global market secured by a global great-power concert in the form of the
Security Council. But the project of economic disarmament and security cooperation broke down almost immediately after 1945 and the split
between the Soviets and the Anglo-Americans produced the Cold War. The second attempt at a global market that began after the Cold War
may be breaking down now, as the most important economic powers pursue their conflicting national interests. A functioning global market
system can work only if its members abandon mercantilism -- the policy of trying to enjoy perpetual trade surpluses, by fair means or foul.
However, the nations with the three largest economies after the U.S. -- China, Japan and Germany -- all want to enjoy never-ending
merchandise trade surpluses. All three have used "currency mercantilism" to help their export industries, to the detriment of the global
economic system. China and Japan, by different methods, have deliberately undervalued their currencies, to help their exports and keep
imports out of their markets. Germany accomplished something similar, by persuading its trade partners to give up independent currencies
that they were able to revalue for the crippling straitjacket of the euro. The system worked only as long as Americans borrowed to pay for
imports from Japan and China, while southern Europeans borrowed to pay for imports from Germany. But the consumers are tapped out and
neither Americans nor southern Europeans are in a mood for austerity measures in the middle of a near-depression. Unless the Chinese,
Japanese and Germans turn into credit-happy consumer societies the global economy may be in for prolonged stagnation. Instead of changing
their ways, however, the surplus countries are denouncing their own customers for their profligacy in buying their goods and insisting that the
In a world confronted by global terrorism, turmoil in the Middle East, burgeoning nuclear
threats and other crises, it is easy to lose sight of the long-range
challenges. But we do so at our peril. One of the most daunting of
them is meeting the worlds need for food and energy in this
century. At stake is not only preventing starvation and saving the
environment, but also world peace and security. History tells us that states may
go to war over access to resources, and that poverty and famine
have often bred fanaticism and terrorism. Working to feed the world
will minimize factors that contribute to global instability and the proliferation of
[WMDs] weapons of mass destruction. With the world population expected to grow from 6 billion people
today to 9 billion by mid-century, the demand for afordable food will increase
well beyond current international production levels. People in rapidly
developing nations will have the means greatly to improve their standard of living and caloric intake.
Inevitably, that means eating more meat. This will raise demand for feed grain at the same time that the
growing world population will need vastly more basic food to eat. Complicating a solution to this problem is
a dynamic that must be better understood in the West: developing countries often use limited arable land
to expand cities to house their growing populations. As good land disappears, people destroy timber
United States will have to grow roughly three times more food on the land we have. Thats a tall order. My
farm in Marion County, Indiana, for example, yields on average 8.3 to 8.6 tonnes of corn per hectare
typical for a farm in central Indiana. To triple our production by 2050, we will have to produce an annual
average of 25 tonnes per hectare. Can we possibly boost output that much? Well, its been done before.
Advances in the use of fertilizer and water, improved machinery and better tilling techniques combined to
generate a threefold increase in yields since 1935 on our farm back then, my dad produced 2.8 to 3
projects that promise to have significant national and global impact. For the United States, that will mean a
major shift in the way we conduct and fund agricultural science. Fundamental research will generate the
innovations that will be necessary to feed the world. The United States can take a leading position in a
productivity revolution. And our success at increasing food production may play a decisive humanitarian
role in the survival of billions of people and the health of our planet.
it away from public scrutiny. The Foreign Intelligence Surveillance Amendments Act (FISAA)
gave retroactive immunity from prosecution to AT&T, Verizon/MCI, BellSouth, Sprint and Cingular, all of
say the least. In Canada, lawful access legislation designed to give law enforcement, security agencies
(such as the Communications Security Establishment Canada (CSEC), and Canadian Security Intelligence
Service (CSIS)) and other branches of government similarly broad surveillance powers has been introduced
into Parliament on four occasions since 2005. Each time it died on the order paper without parliamentary
debate, until February 2012 when the Conservative government introduced it as Bill C-30 and began
actively promoting it. Anticipating this re-introduction a broad coalition of civil liberties and on-line
advocacy organizations, academics and privacy commissioners mounted the oppositional Stop Online
Spying campaign that included videos, public service announcements, posters, letter writing, screenings,
and an on-line petition that eventually garnered over 125,000 signatories. The major concerns highlighted
in the campaign included allowing authorities access to internet subscriber information without a warrant,
no substantial justification for the additional surveillance and policing powers, a requirement that
telecommunications service providers install equipment to enable interception of subscriber
communication and no effective reporting or accountability. Evidently to boost its appeal, the government
changed the name of the bill on the day of the announcement to Protecting Children from Internet
Predators Act, but this backfired when the Public Safety Minister, Vic Toews, declared that one could either
stand with the government or with the child pornographers prowling online. This provoked an immediate
storm of protest with a large social media component. Public opinion polls showed a significant drop in
public support, from a majority (56% Ipsos-Reid) shortly after re-introduction to just 23% (Postmedia News)
a year later. Though with a parliamentary majority the government could have forced this bill through, they
deemed the political price too high and on February 11, 2013 declared that they were dropping the
legislation. While much of the surveillance covered by the lawful access bill continues quietly under the
current privacy legislation and some of the key proposed measures are being re-introduced piecemeal as
parts of other legislation, this declaration constituted a surprising victory for civil liberties advocates. This
outcome echoes similar campaigns in the US a year earlier around the Stop Online Piracy Act (SOPA) and
PROTECT IP Act (PIPA), both of which contained new surveillance measures and appeared set to pass the
legislative branch until massive popular opposition forced a dramatic reversal. It remains to be seen
whether the Cyber Intelligence Sharing and Protection Act (CISPA), now before Congress with similar
surveillance provisions as the Canadian lawful access legislation, will also be turned back by popular
of public involvement at every stage. The familiar invocation of security and protection
as taking such precedence over other considerations that it doesnt merit discussion is wearing thin after
the US and
governments appear to ofer as little information as possible
about proposed surveillance measures, provide bogus or at best
flimsy justifications, avoid opportunities to examine or debate
issues, dismiss or close down public discussion when it occurs, and
actively resist critical inquiry. In stark contrast to the lack of public consultation, but well in
more than a decade of exaggerated fears and little evidence of positive results. Both
Canadian
keeping with neo-liberal norms, the leading private sector actors have in each case been heavily involved
behind the scene, and at least with the intellectual property legislation, they have been prime movers
apply to other cyberspace actors, in proportion to their power and influence. In particular the large private
sector enterprises, notably the telecommunication carriers and equipment vendors, that have so closely
colluded with state security agencies across democratic as well as authoritarian regimes, would do well to
be more transparent. The Transparency Reports that several major internet enterprises, such as Google
If all
parties to multi-stakeholder forums insisted on greater transparency
and led by example, it would contribute significantly to building the
necessary trust and confidence while mitigating the fortress
approach that is so hampering the internet governance discussion.
Growing transparency, especially in the area of internet surveillance,
is an essential pre-condition for developing global cyberspace
governance as a welcoming oasis where everyone has a part to play, thereby
and Twitter, have begun producing represent a small but promising step in this direction.
enriching us all.
K 1ac
Anti-Blackness Contention
The FBI has surveillance authority to commit prejudicial
monitoring on the basis of race, religion, and ethnicity.
Unegbu, Howard University JD candidate, 2013
[Cindy, 57 How. L.J. 433, NOTE AND COMMENT: National Security
Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional
Misstep Lexis, accessed 7-6-15, TAP]
the FBI has
been given express surveillance procedural authority through the
DIOG . 93Link to the text of the note The new rules were enacted to give agents
more latitude as they search for indications of criminal and terrorist
activity. 94Link to the text of the note The various FBI surveillance procedures
that have been outlined include the ability to observe and collect
any form of protected speech by citizens and those residing within
the country's jurisdiction. 95Link to the text of the note Furthermore, the FBI
has the authority to use religion as a factor when determining
whether an individual or group deserves greater scrutiny and
monitoring. 96Link to the text of the note Race and ethnicity may be considered
as a factor in its national security assessment, as long as it is not
the dominant factor for focusing on a particular person. 97Link to the text of
the note Another power that has been granted is the authority to retain
personal information that has been collected on an individual, even
if an assessment does not suggest that an individual is engaged in
any wrongdoing. 98Link to the text of the note Perhaps the most daunting new
permission that has been granted to the FBI is the ability to monitor
domestic individuals and citizens without there being any
presupposed suspicion of terrorist or criminal activity . 99Link to the text of
the note The manual prohibits "racial profiling" in the national security
assessments; however, it allows an assessor to monitor [449]
"religious practitioners or religious facilities," 100Link to the text of the note
and to identify locations of concentrated ethnic communities. 101Link to
the text of the note The FBI, in essence, has the authority to infiltrate
lawful and peaceful places of worship, communities and businesses,
and take race, religion and ethnicity into account when developing
its threat analysis. 102Link to the text of the note The guidelines permitting the
use of race, religion, or ethnicity to assess national security threats
or criminal activity could result in the unconstitutional and
prejudicial monitoring of individuals . 103Link to the text of the note
In addition to the procedural power given to the NCTC through its amended guidelines,
and order rhetoric that was used to mobilize support for this project
of securitization was racially coded, associating Black protest and
rebellion with fears of street crime. The possibilities of such an approach had been
demonstrated in the 1968 election, when both the Republican candidate Richard Nixon and the
independent segregationist George Wallace had made law and order a central theme of their campaigns. It
became apparent that Republicans could cleave Southern whites away from the Democratic Party through
tough-on-crime rhetoric that played on racial fears. The Southern Strategy, as it would be called, tapped
into anxieties among working-class whites that the civil rights reforms of the 1960s would lead to them
committed crimes were to be helped to return to society. While the actual implementation of this policy
made good on his promise to crack down on the racially defined othersthe undeserving.52
Of course, this is debatable. There are those who think that if one is strong enough, the assault on and oppression
of others is permissible. But no one is ever sure of remaining the strongest. One day, perhaps, the roles will be
taking such precedence over other considerations that it doesnt merit discussion is wearing thin after
the US and
Canadian governments appear to ofer as little information as possible
about proposed surveillance measures, provide bogus or at best
flimsy justifications, avoid opportunities to examine or debate
issues, dismiss or close down public discussion when it occurs, and
actively resist critical inquiry . In stark contrast to the lack of public consultation, but well
more than a decade of exaggerated fears and little evidence of positive results. Both
in keeping with neo-liberal norms, the leading private sector actors have in each case been heavily
involved behind the scene, and at least with the intellectual property legislation, they have been prime
gain significantly in the forms of trust that are so vital for efective
governance. For a start, transparent governments would earn more
domestic support for the surveillance they actually do need. In addition,
they would gain credibility in the international fora , such as the recent
conferences Roger Hurwitz mentions in his blog post, whether making claims for national sovereignty or
advancing openness and freedom . The principle of transparency of course needs to
apply to other cyberspace actors, in proportion to their power and influence. In particular the large private
sector enterprises, notably the telecommunication carriers and equipment vendors, that have so closely
colluded with state security agencies across democratic as well as authoritarian regimes, would do well to
be more transparent. The Transparency Reports that several major internet enterprises, such as Google
If all
parties to multi-stakeholder forums insisted on greater transparency
and led by example, it would contribute significantly to building the
necessary trust and confidence while mitigating the fortress
approach that is so hampering the internet governance discussion.
Growing transparency, especially in the area of internet surveillance,
is an essential pre-condition for developing global cyberspace
governance as a welcoming oasis where everyone has a part to play, thereby
and Twitter, have begun producing represent a small but promising step in this direction.
enriching us all.
Americans said they were very concerned or somewhat concerned about losing privacy because of federal
the text of the note He asserted that the public deserved to be aware of the government's intrusive
intelligence gathering practices. 70Link to the text of the note In an interview with The Guardian, Snowden
stated "'I, sitting at my desk,' could 'wiretap anyone, from you or your accountant, to a federal judge or
even the president, if I had a personal email.'" 71Link to the text of the note This country's well-founded
focus of national security has led to a development of policy and laws that create a very fine line between
Because of responses
to Freedom of Information Act requests, the government's
surveillance practices are now exposed and shed some light on the
inappropriate measures that are being taken in the post-9/11
national security era. 72Link to the text of the note
national security and the unrestrained infringement upon civil liberties.
examining speeches made by U.S. state agents, publications regarding U.S. citizenship, and the ways the
United States is presented in popular culture, common trends emerge: The United States is presented as
exceptional, as a land of shared values-- liberty, freedom, and prosperitywhich were created by the
nations founding fathers. David Campbell (1998: 131) suggests that America is an imagined community
par excellence. America, like all other states, is dependent upon practices that make up its ontological
being. However, as Campbell (1998) argues: Defined, therefore, more by absence than presence,
the United
States self-identity is quite fleeting, and, thus, hinges on
representational, symbolic, and iconic imagery in order to ascribe to
itself some form of identity (Campbell 1998: 132). The U.S. State Narrative
In a speech made prior to Snowdens disclosures, President Obama
spoke of the necessity to secure cyber infrastructure while
maintaining the internet as a free and open space: Our pursuit of cybersecurity
consistent self-identity and self-image. Void of a people as a foundational element,
will notI repeat, will not includemonitoring private sector networks or Internet traffic. We will preserve
and protect the personal privacy and civil liberties that we cherish as Americans. Indeed, I remain firmly
committed to net neutrality so we can keep the Internet as it should beopen and free. In light of the
President Obama sends two distinct and seemingly irreconcilable messages regarding cyberspace: First,
the United States, as a centralized power, recognizes the tensions that it must mediate between security
and 41 liberty; Second, the United States has a vision for cyberspace, one focused on being open and
free. But free for whom? U.S. security policy is decentralized insofar as it attempts to do too much while
still trying to keep a constant self-image (See Campbell 1998 and Gould and Steele 2014). Cyberspace is
not an American thing, but from cyberspace comes a multitude of images that only exacerbate the
imagined nature of American identity. Thus, what cyberspace is and what cyberspace means, from an
American perspective, is inherently American. Addressing the noise surrounding the practices of the
National Security Administration, President Obama first noted the history of intelligence gathering by the
United States: At the dawn of our Republic, a small, secret surveillance committee, born out of the Sons of
Liberty, was established in Boston. And the groups members included Paul Revere. At night, they would
patrol the streets, reporting back any signs that the British were preparing raids against Americas early
patriots. In order to find footing and precedent in the face of ontological insecurity in cyberspace two
rhetorical moves are deployed. First, history is resurfaced and reworked to create a seemingly appropriate
metaphor for the present. This history is doused in a patriotic whitewash, whereby particular events are
chosen but not others that are perhaps more indicative and relevant to the current situation. Further, the
parallels put forward by Obama are not parallels at all; the nature of surveillance, global politics,
globalization, and technology are not the same as they were 200 or so years ago. This history serves to
maintain the states self-image over time. Campbell (1998: 130) notes that the American quasi-war with
France demonstrated how previously established discursive strategies of otherness could be invoked in
novel circumstances to provide powerful modes of understanding. Much in the same way, President
Obamas return to history serves not only to ground justifications for NSA activities in seemingly consistent
practices of state surveillance, but also in actions against threats from an other, in this case, the British
during the Revolutionary War. Threats in cyberspace come from a plethora of sources, including: other
states, non-state actors, rogue Americans, or even cyberspace itself. Obamas second rhetorical move is to
argue for American exceptionalism. He goes on to note, But Americas capabilities are unique, and the
power of new technologies means that there are fewer and fewer technical constraints on what we can do.
That places a special obligation on us to ask tough questions about what we should do. The justification for
(at least toned down) policies of NSA surveillance centers on the notion that someone has to do it, and
we can do it better than anyone else. Americas status as the worlds only superpower, as President
Obama declares, opens itself up for interrogation. At the end of his speech on NSA reforms, President
Obama demonstrates, perhaps unintentionally, that ontological insecurity is a powerful motivator for the
recognizes its ontological insecurity in its relationship to cyberspace. However, the examples that are
raised concerning the dangers of cyberspacefrom cyberspace as a mechanism for terrorist mobilization
to cyber wars of the futuredo not paint an entirely clear picture of what makes cyberspace something
truly different in global politics. This shift is not universal, or at least to the same degree, for every state.
assumes the structural realities of power in international relations regarding the internet, and seeks to
elaborate upon how states, beyond concern for their physical security, come to justify surveillance
practices on the internet. In this sense, the Milton Wolf Seminar proved invaluable as practitioners and
scholars sought to elaborate upon the role of the internet, censorship, privacy, and surveillance in diverse
contexts including the national policies and practices of Russia, South Africa, the United States, China, and
Britain. Further, the seminar participants elaborated upon shifting or different physical as well as contentlayer considerations that need to be taken into account, such as changing modes of internet use, types of
surveillance practices, and statecraft in the digital age. The discussion held over the course of the two-day
seminar invoked more questions than answers; analysis of such issues has thus far moved, as one seminar
participant described, glacially alongside the need for internet governance. Thus, the seminar was both
timely and a necessary given the salience of internet security, privacy, and surveillance in international
politics, along with the perhaps shifting role of the state, and traditional concepts of international politics:
state power, sovereignty, and global governance
It has
resulted in migrants being increasingly likely to be profiled,
arrested, and imprisoned by local police officers, before being
passed to the federal authorities for deportation. Undocumented migrants can
databases. Secure Communities was introduced in 2008 and stepped up under Obama.
no longer have any contact with police officers without risking such outcomes. There is an irony in the way
Reformism Contention
Radical critiques of the criminal justice system mislocate
the proximate cause of racism reforms are necessary
and good from within institutions.
-
reflective, and resignedreminded us that many African-Americans feel as though the criminal justice
system does not work for them. Washington Post columnist Eugene Robinson argued, Our society
considers young black men to be dangerous, interchangeable, expendable, guilty until proven
John McWhorter
argued that, for African-Americans, the poisonous relationship
between young black men and law enforcement is the prime
manifestation of racism in modern America.363 And President Obama noted that
innocent.362 Manhattan Institute scholar and New Republic contributor
the African American community is looking at this issue through a set of experiences and history that
doesnt go away, one wrapped up in a history of racial disparities in the application of our criminal
law.364
But eforts such as these wont solve our problems altogether. This
is because the story is more complicated than simply a criminal
justice system that has failed to win the trust and confidence of
many in the African-American community. The problem of racial
equality and criminal justice is one of painful complexity.368 We
can acknowledge that we have not yet reached our goal of race
neutrality in the dispensation of justice while acknowledging also
that this alone does not account for the racial makeup of our prisons
and halfway houses. ThenNew York Mayor Michael Bloomberg stated, Ninety percent of all
people killed in our cityand 90 percent of all those who commit the murders and other violent crimes
are black and Hispanic.369 That is the great double-edged sword. It understandably leads to more stops
and more arrests in high-crime areas. It understandably leads to more convictions of those of whatever
race who commit the crimes. But it also leads to understandable anger and resentment on the part of
disadvantaged young black males who want to make a decent go of American life, only to find themselves
the object of recurrent false suspicion and repeated frisks.
The solution to the problem of race and criminal justice is not a total
overhaul of the system. That just renders the criminal justice system
the scapegoat for a much larger set of social problems. The criminal
justice system feels the efects of those problems; it does not cause
them. Drug and gun crimes are not any less a blight upon society because of the racial makeup of the
offenders; indeed, as Robinson noted, [N]owhere will you find citizens more supportive of tough law-and-
We should not
grow complacent in the face of particular problems, both for the sake of
disagree passionately about the contours of our criminal law. That is all to the good.
individual defendants and for the rule of law itself.
terrorists may lack. This is no place to explore the complicated question of whether alleged terrorism is
more aptly regarded as a criminal offense or as an act of war. Separation of powers concerns and the need
for action to prevent mass casualties make the question an exceptionally complicated one. I note only the
irony that many who reject the considerable virtues of the American criminal justice system are at least
prepared to look upon it as a preferred solution when the values of liberty and security are in epochal
tension.
To be sure, there is plenty of room for reform, and all parts of the legal profession
should head for the front lines. But let us not forget our systems virtues as we
seek to correct its vices. Otherwise, any legitimate concerns will be
lost in the din of diatribe. We have gone too long without a degree of
balance or moderation in our assessment of the American criminal
justice system. It is time we gave our institutions a fair trial .
3. CLS idealism
scholars idealism transforms social
reality into a mental construct.46 Facts become intelligible only through the categories of
The CLS program is also idealistic.45 CLS
thought that we bring to experience. Crits argue that the principle impediments to achieving an ideal
society are intellectual. People are imprisoned by a destructive system of mental categories that blocks
any vision of a better world.47 Liberal-capitalist ideology so shackles individuals that they willingly accept
chains and clear the way for the creation of a new and better world, Crits practice trashing a process
by which law and social structures are shown to be contingent, inconsistent and irrationally supportive of
the status quo without good reason.49
continually exposed.50
the dictionary as a figure of speech that combines contradictory terms. If they mean the USA is a
contradictory and incomplete democracy in respect to race and racism issues, we agree. If they mean that
Second World War to the present) with respect to race and racism?
Over the past decades there has been a steady drumbeat of eforts
to contain and neutralize civil rights, to restrict racial democracy,
and to maintain or even increase racial inequality. Racial disparities
in different institutional sites employment, health, education persist and in many cases have
increased. Indeed, the post-2008 period has seen a dramatic increase in
racial inequality. The subprime home mortgage crisis, for example,
was a major racial event. Black and brown people were disproportionately affected by
predatory lending practices; many lost their homes as a result; race-based wealth disparities widened
Feagin and Elias claim that we overly inflate the significance of the
changes wrought by the civil rights movement, and that we
(and possibly apocryphal) lament upon signing the Civil Rights Act on 2 July 1964 We have lost the South
for a generation count as convergence?
leads to racial lumping and essentialisms of various kinds. This imprecision is heightened in polemic. In
the Feagin and Elias essay the term whites at times refers to all whites, white elites, dominant white
actors and very exceptionally, anti-racist whites, a category in which we presume they would place
themselves. Although the terms black, African American and Latino appear, the term people of colour
is emphasized, often in direct substitution for black reference points.
In the USA today it is important not to frame race in a bipolar manner. The black/white paradigm made
more sense in the past than it does in the twenty-first century. The racial make-up of the nation has now
changed dramatically. Since the passage of the Immigration Reform Act of 1965, the USA has become
more coloured. A majorityminority national demographic shift is well underway. Predicted to arrive by
the mid-twenty-first century, the numerical eclipse of the white population is already in evidence locally
and regionally. In California, for example, non-Hispanic whites constitute only 39.7 per cent of the state's
population. While the decline in the white population cannot be correlated with any decline of white racial
dominance, the dawning and deepening of racial multipolarity calls into question a sometimes implicit and
Shifting
racial demographics and identities also raise general questions of
race and racism in new ways that the systemic racism approach is
not prepared to explain.3
sometimes explicit black/white racial framework that is evident in Feagin and Elias's essay.
Speaking of electoral shifts and the formal political arena, how should President Barack Obama be
politically situated in this discussion? How do Feagin and Elias explain Obama? Quite amazingly, his name
does not appear in their essay. Is he a mere token, an oreo, a shill for Wall Street? Or does Obama
represent a new development in US politics, a black leader of a mass, multiracial party that for sheer
demographic reasons alone might eventually triumph over the white people's party, the Republicans? If
we are in the
world of politics: neither the near-total white despotism depicted by Feagin
and Elias, nor a racially inclusive democracy.
the President is neither the white man's token nor Neo, the One,5 then once again
President Obama continues to enjoy widespread black support, although it is clear that he has not
protected blacks against their greatest cumulative loss of wealth in history. He has not explicitly criticized
the glaring racial bias in the US carceral system. He has not intervened in conflicts over
workers rights particularly in the public sector where many blacks and other people of colour are
concentrated. He has not intervened to halt or slow foreclosures, except in ways that were largely
symbolic. Workers and lower-middle-class people were the hardest hit by the great recession and the
subprime home mortgage crisis, with black families faring worst, and Latinos close behind (Rugh and
Massey 2010); Obama has not defended them. Many writers have explained Obama's centrism and
unwillingness to raise the issue of race as functions of white racism (Sugrue 2010).
While
black folk have taken the hardest blows from the reactionary and
racist regime that has mostly dominated US politics since Reagan (if
not since Nixon), no united black movement has succeeded the
deaths of Malcolm and Martin. Although there is always important political activity
underway, a relatively large and fairly conservative black middle class, a
black bourgeoisie in Frazier's (1957) terms, has generally maintained its
position since the end of the civil rights era. Largely based in the public sector,
The black community and other communities of colour as well remains politically divided.
and including a generally centrist business class as well, this stratum has continued to play the role that
Frazier and before him, Charles S. Johnson. William Lloyd Warner, Alison Davis and other scholars
identified: vacillation between the white elite and the black masses. Roughly similar patterns operate in
Latino communities as well, where the working towards whiteness framework coexists with a substantial
amount of exclusion and super-exploitation.
Alongside class issues in communities of colour, there are significant gender issues. The disappearance of
blue-collar work, combined with the assault by the criminal justice system chiefly profiling by the police
(stop and frisk) and imprisonment, have both unduly targeted and victimized black and brown men,
Here again we are in the realm of racial politics. Debate proceeds in the black
community on Obama's credibilty, with Cornel West and Tavis Smiley leading the critics. But it seems safe
to say that in North Philly, Inglewood or Atlanta's Lakewood section, the president remains highly popular.
Latino support for Obama remains high as well. Feagin and Elias need to clarify their views on black and
brown political judgement. Is it attuned to political realities or has it been captured by the white racial
frame? Is Obama's election of no importance?
brown folk (yellow and red people, and also others unclassifiable under the always- absurd colour
categories) utterly supine, duped, abject, unable to exert any political pressure? Is such a view of race and
racism even recognizable in the USA of 2012? And is that a responsible political position to be advocating?
Is this what we want to teach our students of colour? Or our white students for that matter?
racial conflict,
both within (and against) the state and in everyday life, is a
fundamentally political process. We think that they would also accept our claim that the
ongoing political realities of race provide extensive evidence that
people of colour in the USA are not so powerless , and that whites
are not so omnipotent, as Feagin and Elias's analysis suggests them to be.
We suspect that if pressed, Feagin and Elias would concur with our judgement that
of colour, anti-racist movements also incorporate whites such as Feagin and Elias themselves.
an antidote to these
defeatist critiques by acknowledging that the administration of criminal
law has changed substantially for the better over the past half
century and that there is reason to believe that, properly guided, it
can be improved even more. Today there are more formal and
informal protections against racial bias than ever before , both in terms of
The second impression that I want to leave with readers should serve as
overwrought,
the protections accorded to blacks against criminality and the treatment accorded to black suspects,
Neglecting
these achievements robs them of support . Recent sharp attacks upon basic
guarantees bequeathed by the New Deal ought to put everyone on notice of the perils of permitting social
onedimensional condemnations of the racial situation in America
renders attractive certain subversive proposals that are, given
actual conditions, foolish, counterproductive , and immoral. I think here in
accomplishments to lose their rightful stature in the public's estimation. Moreover,
particular of the call for racially selective jury nullification. Such proposals should be openly challenged on
the grounds that they fundamentally misperceive the racial realities of American life.
The Critical emphasis on deconstruction as the vehicle for liberation leads to the conclusion that engaging
in legal discourse should be avoided because it reinforces not only the discourse itself but also the society
and the world that it embodies. Yet Critics offer little beyond this observation. Their focus on
logic of the institutions that they are challenging. 138 Demands for
change that do not reflect the institutional logic -- that is, demands
that do not engage and subsequently reinforce the dominant
ideology -- will probably be inefective . 139
The possibility for ideological change is created through the very process of legitimation, which is triggered
This approach to understanding legitimation and change is applicable to the civil rights movement.
Because Blacks were challenging their exclusion from political society, the only claims that were likely to
achieve recognition were those that reflected American society's institutional logic: legal rights ideology.
Articulating their formal demands through legal rights ideology, civil rights protestors exposed a series of
contradictions -- the most important being the promised privileges of American citizenship and the practice
need to maintain legitimacy that presents powerless groups with the opportunity to wrest concessions
from the dominant order, it is the very accomplishment of legitimacy that forecloses greater possibilities .
been the rise of conservative public interest lawyer[ing].220 Although public interest law was originally
associated exclusively with liberal projects, in the past three decades conservative advocacy groups have
rapidly grown both in number and in their vigorous use of traditional legal strategies to promote their
causes.221 This growth in conservative ad-vocacy is particularly salient in juxtaposition to the decline of
traditional progressive advocacy. Most recently, some thinkers have even suggested that there may be
something inherent in the lefts conception of social change focused as it is on participation and
empowerment that produces a unique distrust of legal expertise.222
Once again, this conclusion reveals flaws parallel to the original disenchantment with legal reform.
model; the proliferation of informal, soft norms and norm-generating actors; and the celebrated, separate
humanities, Professor Carol Greenhouse poses a comparable challenge to ethnographic studies from the
1990s, which utilized the genres of narrative and community studies, the latter including works on
American cities and neighborhoods in trouble.226 The aspiration of these genres was that each individual
story could translate into a time of the nation body of knowledge and motivation.227 In contemporary
legal thought, a corresponding gap opens between the local scale and the larger, translocal one. In reality,
although there has been a recent proliferation of associations and grassroots groups, few new local-statenational federations have emerged in the United States since the 1960s and 1970s, and many of the
There is,
therefore, an absence of links between the local and the national, an
absent intermediate public sphere, which has been termed the
missing middle by Professor Theda Skocpol.229 New social movements have for the most part
existing voluntary federations that flourished in the mid-twentieth century are in decline.228
failed in sustaining coalitions or producing significant institutional change through grassroots activism.
Af
Solvency
Solvency General
Plan solves.
Unegbu, Howard University JD candidate, 2013
[Cindy, 57 How. L.J. 433, NOTE AND COMMENT: National Security
Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional
Misstep Lexis, accessed 7-6-15, TAP]
The grant of surveillance power to monitor individuals without
suspicion of criminal or terrorist activity and the ability to collect
personal information from various sources on the basis of race or
ethnicity has resulted in the discrimination of domestic individuals
who belong to a particular racial or ethnic group. This discrimination
is generated through a disparate impact that the new government
surveillance authority has on various ethnic and religious groups,
specifically those that are Arab, South Asian, or practitioners of the Islamic
religion. Through a balancing test of five factors established through Supreme
Court jurisprudence, it is apparent that there is sufficient indirect
evidence of the government's intent to discriminate. Because there is
an established intent to discriminate, the new government surveillance
authority and procedures can only be constitutionally upheld if the
acts are narrowly tailored to a compelling government interest. The
compelling state interest is satisfied through the goal of nationally security;
however, the narrowly tailored prong fails because of the monitoring
system's over-inclusiveness. Therefore, the government national
security surveillance authority and procedures, via the NCTC
amendments and DIOG guidelines, are in violation of the Fourteenth
Amendment's Equal Protection Clause.
inefficiency of storing citizens' random personal information for extended periods of time, 6Link to the text
of the note the broad unprecedented authority granted to this body of government without proper
approval from Congress, 7Link to the text of the note and the constitutional violations due to the
K Advs Solvency
Orwell isnt who you should be reading to understand the dangers inherent to the NSAs dragnet. Youd be
better off turning to famous French social theorist Michel Foucault.
The Senate this week passed the USA Freedom Act, which aims to end the NSA's
mass collection of domestic phone records, and President Barack Obama signed the bill hours later.
After that action, expect Republican leaders in both the Senate and the
House of Representatives to resist further calls for surveillance reform. That
resistance is at odds with many rank-and-file lawmakers, including many House Republicans, who want to
further limit NSA programs brought to light by former agency contractor Edward Snowden .
Civil
liberties groups and privacy advocates also promise to push for more
changes. It may be difficult to get "broad, sweeping reform" through
Congress, but many lawmakers seem ready to push for more changes, said Adam Eisgrau, managing
director of the office of government relations for the American Library Association.
---
to keep their lives away from the eyes and ears of government
monitors, but that those over 40 are far more likely to trade their
privacy for security. The fact that younger people are more apt to be
anti-surveillance state may not contradict the conventional wisdom
of the Internet as much as it (apparently) does that of political scientists. But whether or not its
catalyst is 9/11, the generational divide does seem to suggest that the way our politicians balance privacy
and security will shift as the under-40s take control. The arc of history is long, but it bends toward the
youngs.
---
Steven Renderos, national organizer for the Center for Media Justice, who
helped put together the panel, told Truthout that examining the legacy of
surveillance in communities of color could help lead to solutions.
"It's critical to understand the history so we can learn how to
dismantle it," Renderos said. "Those of us from marginalized
communities grew up in environments very much shaped by
surveillance, which has been utilized to ramp up the criminal justice
system and increase deportations," Renderos said. "It's having real
consequences in our communities where children are growing up without
parents in the home and families are being torn apart through raids and
deportations, a lot of which is facilitated through the use of
surveillance. "Panelist Fahd Ahmed, legal and policy director for the South
Asian-led social justice organization Desis Rising Up and Moving, argued that
mass surveillance is the predictable outgrowth of programs that
have targeted marginalized communities for decades. "Just by the very
nature of [the United States] being a settler-colonialist and capitalist
nation, race and social control are central to its project," Ahmed said.
"Anytime we see any levels of policing - whether it's day-to-day policing in
the streets, surveillance by the police or internet surveillance - social
control, particularly of those that resist the existing system,
becomes an inherent part of that system. "But, he warned, "These
policies are not going to be limited to one particular community. They're
going to continue to expand further and further" because "the surveillance
has a purpose, which is to exert the power of the state and control the
potential for dissent."Seema Sadanandan, program director for ACLU DC,
acknowledged the collective resentment felt by people of color who are
understandably frustrated that privacy violations are only now eliciting mass
public outrage when communities of color have been under aggressive
surveillance for decades. "The Snowden revelations represent a terrifying
moment for white, middle-class and upper-middle-class people in this
country, who on some level believe that the Bill of Rights and Constitution
were protecting their everyday lives," Sadanandan said. "For people of color
from communities with a history of discrimination and economic oppression
that prevents one from realizing any of those rights on a day-to-day basis, it
wasn't a huge surprise. "But Sadanandan argued that NSA surveillance still
"has particular concerns for communities of color because of their
unique relationship to the criminal justice or social control system, a
billion-dollar industry with regard to, for example, border patrol or data
mining as it's applied to racially profile." Sadanandan warned that NSA
surveillance more than likely would strengthen that system of
control.
Cyril, Malkia A.- Malkia Amala Cyril is founder and executive director of the Center for Media
Justice (CMJ) and co-founder of the Media Action Grassroots Network, a national network of 175
organizations working to ensure media access, rights, and representation for marginalized communities.
April
15
2015
Black
Americas
State
of
Surveillance
http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance. July 7, 2015
to tell a new story that does not start the clock when privileged
classes learn they are targets of surveillance. We need to understand
that data has historically been overused to repress dissidence,
journalists
the basis upon which white life can subjectivise itself, socially and materially
through the negation of the black body. White life recognises itself as a
positive counterpart to the non-subjecthood of blacks. However, Afropessimists claim that this relation between black death and white life is
not merely asymmetrical. The distinction between the two is
qualitatively diferent, and potential for reconciliation between
whites and blacks is impossible. This particular distinction instead
procures an antagonism in relation to the social totality. The
inordinate amount of violence perpetuated against blacks
naturalised and thus ontological means that such a situation is
untranslatable to any representable terms of experience or
identity. Such a structural feature of blackness mired in violence
cannot be related to contingent experiences of social, political or
economic violence, such as the struggles of workers or immigrants. Black
existence forms the bottom line, the condition of possibility, of general social
and material integration. It is not necessarily ones whiteness that
matters inasmuch as one is not black enabling entrance and
participation in civil society. Barred from the immanent capacities of
living, anti-blackness is the necessary ground for the definition and
propagation of life in general.13 In this way, Afro-pessimism also enacts a
political intervention onto the terrain of identity politics and multiracial
coalitions. Perhaps more generally, Afro-pessimism can be seen as a critique
of the Left and all forms of activism that participate in representational
politics. In the US, the past decades have seen the proliferation of identitybased politics predicated on a politics of recognition. It is this position that
was made possible by the legacies of the black struggles of the 1950s to
1970s, epitomised in black liberation and the civil rights movement. However,
contemporary anti-racist formations obfuscate and implicitly disavow such a
legacy, while simultaneously utilising their impact to promote reform and
integration. The basis of such perspectives is a wider acceptance and
visibility of marginalised identities within the stronghold of civil
society. Calls for unity by multiracial coalitions mask complicity with the
structures of anti-blackness. They proffer an analysis that seeks to go beyond
the framework of black and white racial dynamics. Yet in this gesture to go
beyond black and white, the specificity of anti-blackness is obscured. In such
instances, these analyses aim to discover common ground through the
particularity of non-black racial identities or other oppressed categories. But
this common ground is predicated on an underlying humanness, from which
black existence is fundamentally barred. Such a perspective presents an
atomised individual traversed by a variety of oppressions, yet these
oppressions are representable and conditional to a historic instance of
violence (as opposed to the ontological unconditionality of violence
perpetuated against blacks), and could potentially be recognised and
addressed. For it is on the basis of ( human) recognition and selfrepresentation from which minoritarian identities can wage their struggle.
Black existence is barred from such a possibility due to the fact that such
recognition is based upon not being black. As long as one can distance
onself enough from blackness, then one has the possibility of integrating into
civil society generally:
Whereas redress for grievances can be sought and gained through these
minoritarian struggles, ultimately they rely upon the further subjection of
blacks in order to achieve such goals. Violence deployed against nonblack minoritarian positions is contingent and efectively
communicable through shared experiences, and therefore could be
formulated into coherent demands that might be met or not. If these
demands are recognised and met, they necessitate anti-blackness as a sine
qua non for further integration. It is inside this ambiguous nature of empirical
demands that black existence introduces a categorical antagonism reaching
far beyond any empirical enunciation for socio-political recognition. For Afropessimists, there is no possible empirical redress for its structural position in
relation to civil society, for it is the very condition that enables civil society to
cohere in the first place. And this condition is that of an inordinate suffering
that is not commensurate to mere experience. For this reason, black
existence figures as an antagonism that transcends any empirical injustice,
an antagonism that splits the world between black or human. Consequently
this antagonism entails a total disorganisation of what it would mean to exist
in the world at all. Black existence is essentially a structural position that
positions itself as demandless, an antagonsim which is irreconcilable, and
without any possible future of organic synthesis of black existence and
humanity. For the form of freedom that would enable the abolition of black
existence is not empirical but ontological in nature. To overcome antiblackness, there would have to be what Fanon had called a program of
complete disorder, an expropriation and affirmation of the very violence
perpetuated against black existence and a fundamental reorientation of the
social coordinates of the Human relation. It would entail a war against the
concept of humanity and a war that splits civil society to its core, a civil war
that would elaborate itself to the death.
The alternative is to reject the affirmative and reorient ourselves towards the
world through an unflinching paradigmatic analysis
Wilderson 10 [Frank B. III, Ph.D., Associate Professor at UC Irvine, former ANC member,
on some guerilla shit, Red, White & Black: Cinema and the Structure of U.S. Antagonisms,
pages ix-x, OG]
STRANGE AS it might seem, this book project began in South Africa. During the last years of
apartheid I worked for revolutionary change in both an underground and above-ground
capacity, for the Charterist Movement in general and the ANC in particular . During this
period, I began to see how essential an unflinching paradigmatic analysis is to a movement
dedicated to the complete overthrow of an existing order. The neoliberal compromises that
the radical elements of the Chartist Movement made with the moderate elements were due,
in large part, to our inability or unwillingness to hold the moderates' feet to the fire of a
political agenda predicated on an unflinching paradigmatic analysis. Instead, we allowed our
energies and points of attention to be displaced by and onto pragmatic considerations. Simply put,
we abdicated the power to pose the questionand the power to pose the question is the
greatest power of all. Elsewhere, I have written about this unfortunate turn of events
(Incognegro: A Memoir of Exile and Apartheid), so I'll not rehearse the details here. Suffice it to
say, this book germinated in the many political and academic discussions and debates that I was
fortunate enough to be a part of at a historic moment and in a place where the word revolution
was spoken in earnest, free of qualifiers and irony. For their past and ongoing ideas and
interventions, I extend solidarity and appreciation to comrades Amanda Alexander, Franco
Barchiesi, Teresa Barnes, Patrick Bond, Ashwin Desai, Nigel Gibson, Steven Greenberg, Allan
Horowitz, Bushy Kelebonye (deceased), Tefu Kelebonye, Ulrike Kistner, Kamogelo Lekubu,
Andile Mngxitama, Prishani Naidoo, John Shai, and S'bu Zulu
It makes no difference that in the U.S. the "casbah" and the "European" zone are laid one
on top of the other. What is being asserted here is an isomorphic schematic relation the schematic interchangeability - between Fanon' s settler society and Martinot and
Sexton's policing paradigm. For Fanon, it is the policeman and soldier (not the
discursive, or hegemonic, agents) of colonialism that make one town white and the
other Black. For Martinot and Sexton, this Manichean delirium manifests itself by
way of the U.S. paradigm of policing that (re)produces, repetitively, the
inside/outside, the civil society/Black world, by virtue of the difference between
those bodies that do not magnetize bullets and those that do. "Police impunity serves
to distinguish between the racial itself and the elsewhere that mandates it...the distinction
between those whose human being is put permanently in question and those for whom it
goes without saying" (Ibid.: 8). In such a paradigm, white people are, ipso facto,
deputized in the face of Black people, whether they know it (consciously) or not.
Whiteness, then, and by extension civil society, cannot be solely "represented" as
Counter Surveillance
Snowden material provided a detailed account of the massive extent of NSAs warrantless data collection.
material. Less
apparent was how this data was actually used by the NSA and other
national security agencies. Part of the answer came in July 2014 when Glenn
Greenwald and Murtaza Hussain published an article that identified specific
targets of NSA surveillance and showed how individuals were being
placed under surveillance despite there being no reasonable
suspicion of their involvement in criminal activity .1 All of those
named as targets were prominent Muslim Americans. The following month,
What became clear was that the NSA was involved in the mass collection of online
Jeremy Scahill and Ryan Devereaux published another story for The Intercept, which revealed that under
the Obama administration the number of people on the National Counterterrorism Centers no-fly list had
increased tenfold to 47,000. Leaked classified documents showed that the NCC maintains a database of
terrorism suspects worldwidethe Terrorist Identities Datamart Environmentwhich contained a million
This
database includes 20,800 persons within the United States who are
disproportionately concentrated in Dearborn, Michigan, with its
significant Arab American population.2 By any objective standard, these were major
news stories that ought to have attracted as much attention as the earlier revelations. Yet the stories
barely registered in the corporate media landscape. The tech
community, which had earlier expressed outrage at the NSAs mass digital surveillance,
seemed to be indiferent when details emerged of the targeted
surveillance of Muslims. The explanation for this reaction is not hard to find. While
many object to the US government collecting private data on
ordinary people, Muslims tend to be seen as reasonable targets of
suspicion. A July 2014 poll for the Arab American Institute found that
42 percent of Americans think it is justifiable for law enforcement
agencies to profile Arab Americans or American Muslims.3 In what follows,
we argue that the debate on national security surveillance that has
emerged in the United States since the summer of 2013 is woefully
inadequate, due to its failure to place questions of race and empire
at the center of its analysis . It is racist ideas that form the basis for
the ways national security surveillance is organized and deployed,
racist fears that are whipped up to legitimize this surveillance to the
American public, and the disproportionately targeted racialized
groups that have been most efective in making sense of it and
organizing opposition. This is as true today as it has been historically:
names by 2013, double the number four years earlier, and increasingly includes biometric data.
focus
here is on how race as a sociopolitical category is produced and
reproduced historically in the United States through systems of
surveillance. We show how throughout the history of the United States the systematic collection of
information has been interwoven with mechanisms of racial oppression. From Anglo settlercolonialism, the establishment of the plantation system, the post
Civil War reconstruction era, the US conquest of the Philippines, and
the emergence of the national security state in the post-World War II
era, to neoliberalism in the post-Civil Rights era, racialized
surveillance has enabled the consolidation of capital and empire . It is,
however, important to note that the production of the racial other at these
various moments is conjunctural and heterogenous. That is, the racialization
of Native Americans, for instance, during the settler-colonial period took different forms from the
and for how long. In the second part, we turn our attention to the current conjuncture in which the politics
The intensive
surveillance of Muslim Americans has been carried out by a vast
security apparatus that has also been used against dissident
movements such as Occupy Wall Street and environmental rights
activists, who represent a threat to the neoliberal order. This is not new; the process of
targeting dissenters has been a constant feature of American
history. For instance, the Alien and Sedition Acts of the late 1790s
were passed by the Federalist government against the Jeffersonian sympathizers of
of the War on Terror shape national security surveillance practices.
the French Revolution. The British hanged Nathan Hale because he spied for Washingtons army in the
drug dealer and user, and the immigrant who threatens to steal jobs.
We conclude that security has become one of the primary means through
which racism is ideologically reproduced in the post-racial, neoliberal
era. Drawing on W. E. B. Duboiss notion of the psychological wage, we argue that neoliberalism has
been legitimized in part through racialized notions of security that offer a new psychological wage as
compensation for the decline of the social wage and its reallocation to homeland security. Se ttler-
Quebec was accompanied by the missionary project. Jesuit Paul Le Jeune worked extensively with the
Montagnais-Naskapi and maintained a detailed record of the people he hoped to convert and civilize.12
By studying and documenting where and how the savages lived, the nature of their relationships, their
child-rearing habits, and the like, Le Juene derived a four-point program to change the behaviors of the
Naskapi in order to bring them into line with French Jesuit morality. In addition to sedentarization, the
establishment of chiefly authority, and the training and punishment of children, Le Juene sought to curtail
the independence of Naskapi women and to impose a European family structure based on male authority
and female subservience.13 The net result of such missionary work was to pave the way for the racial
projects of colonization and/or integration into a colonial settler nation. By the nineteenth century, such
informal techniques of surveillance began to be absorbed into government bureaucracy. In 1824, Secretary
of War John C. Calhoun established the Office of Indian Affairs (later Bureau), which had as one of its
Jackson began to drive Indians to the west of the Mississippi River. Systematic surveillance became even
more important after 1848, when Indian Affairs responsibility transferred from the Department of War to
professional bureaucracy as through war.14 The assimilation of Indians became a comprehensive policy
through the Code of Indian Offenses, which included bans on Indigenous cultural practices that had earlier
been catalogued by ethnographic surveillance. Tim Rowse writes that For the U.S. government to
extinguish Indian sovereignty, it had to be confident in its own. There is no doubting the strength of the
as the new
nation conquered and purchased, and filled the new territories with
colonists, it had also to develop its administrative capacity to govern
the added territories and peoples. U.S. sovereign power was not just a legal doctrine and a
sense of manifest destiny in the United States during the nineteenth-century, but
popular conviction; it was an administrative challenge and achievement that included acquiring, by the
The use of
surveillance to produce a census of a colonized population was the
first step to controlling it. Mahmood Mamdani refers to this as define and rule, a process
1870s, the ability to conceive and measure an object called the Indian population.15
in which, before managing a heterogeneous population, a colonial power must first set about defining it; to
do so, the colonial state wielded the census not only as a way of acknowledging difference but also as a
way of shaping, sometimes even creating, difference.16 The ethnic mapping and demographics unit
To win them to
the side of the plantation bourgeoisie, poor white men were given
privilegesthey had access to land and enjoyed common law protections such as trial by jury and
habeas corpus that were denied to Black enslaved people.18 In practice this meant that
white men, for instance, could rape Black women and not be charged
with a crime (because Blacks were property and so only damages were to be paid to the slave
owner). Further, property rights and the legal notion of settled land not only denied Native
American property claims but even erased the existence of Indigenous people
on the basis that, because white settlers had transformed the pristine North American wilderness
time) into slavesproperty with no rights whatsoever and no hope of freedom.
into productive land, they were the real natives.19 Once the legal and ideological work had been done to
naturalize race as a visible marker of inherent difference and to separate us from them, it could be
Moreover, the plantation system was stabilized by enabling non-elite whites to see security as a racial
privilege and shared responsibility. W. E. B. Du Bois argued in Black Reconstruction that, in the slave
plantations of the South, poor whites were brought into an identification with the planter elite by being
given positions of authority over Blacks as overseers, slave drivers, and members of slave patrols. With the
associated feeling of superiority, their hatred for the wider plantation economy that impoverished them
was displaced onto Black enslaved people: class antagonism was racialized and turned into a pillar of
stability for the system. Meanwhile, in the North, labor leaders had little appetite for abolition, fearing
competition from a newly freed Black workforce.21 After abolition, the same racial anxieties were
mobilized to disenfranchise the Black laborer in the South. Du Bois used the term psychological wage to
describe this sense of superiority granted to non-elite whites in the South: It must be remembered that the
white group of laborers, while they received a low wage, were compensated by a sort of public and
psychological wage. They were given public deference and titles of courtesy because they were white.
They were admitted freely with all classes of white people to public functions, public parks, and the best
schools. The police were drawn from their ranks, and the courts, dependent under their votes, treated
them with such leniency as to encourage lawlessness. On the other hand, in the same way, the Negro
was subject to public insult; was afraid of mobs; was liable to the jibes of children and the unreasoning
fears of white women; and was compelled almost continuously to submit to various badges of inferiority.
The result of this was that the wages of both classes could be kept low, the whites fearing to be supplanted
by Negro labor, the Negroes always being threatened by the substitution of white labor.22 We suggest
Black men were positioned as threats to white women in the postCivil War era. Unlike during slavery,
when Black men were not indiscriminately labeled as rapists and lynching was rare, the period between
1865 and 1895 saw the lynching of over ten thousand African Americans. Fredrick Douglass argued that,
when all the other methods of demonizing Black people failed, the myth of the Black rapist was developed
to justify lynchings and white terror.23 Vigilante groups like the Ku Klux Klan justified their brutality by
claiming to keep white women safe from the Black rapist, as visualized, for instance, in D. W. Griffiths Birth
of a Nation. Such constructions of white women in need of protection from predatory Black men were
reminiscent of the captivity scenarios of the seventeenth century, in which Native Americans were
accused of kidnapping white women, a charge that then justified genocide.24 Thus, from the early settlercolonial period onwards, security and protection were defined by elites in gendered and racial terms. In
particular, the white, heterosexual family was positioned as the subject of a security narrative that cast
racialized others as threats to the homeland. The homeland so defined also needed to be secured from
racialized immigrant threats, but which immigrants counted as white in this homeland was somewhat
unstable. When Irish immigrants began to arrive in the United States in large numbers from the 1850s
onwards, they were considered nonwhite because they were perceived to be of Celtic rather than Anglo
Saxon background. More importantly, Irish Catholics faced the same exclusionary practices that Catholics
did in previous centuries. Even though by the mid-eighteenth century, the need for English colonies to be
economically sustainable and militarily secure from indigenous threat, opened up non-English immigration
to North America, Catholics (along with Indian tribes) were denied basic rights on the grounds that they
were religiously and culturally different from the WASP population.25 Over time, however, Irish and Italian
sought to police borders as part of a strategy of regulating labor in 1882, when it excluded Chinese
Department to monitor all mail moving between India and the Berkeley and San Francisco post offices.26
they must exercise for the greater glory of the race and to advance civilization in general. Unlike other
races, they liberated the peoples they conquered; indeed, their expressions of conquest as freedom
proliferated as the terrors they unleashed became more visible.31 The resistance that Filipinos mounted to
American benevolence could then only be seen as an atavistic barbarism to be countered through modern
techniques of surveillance and repression. While local police departments within the United States had
begun to develop techniques of political surveillance, it was under the US colonial regime in the Philippines
that systematic and widespread surveillance of political opponents and the manipulation of personal
information as a form of political control was first institutionalized. A unit within the police called the
Constabulary Information Section was established in Manila in 1901, founded by Henry Allen, a former
military attach to Tsarist Russia.32 The Constabulary Information Section cultivated hundreds of paid
Filipino agents across the country, making it scarcely possible for seditionary measures of importance to
be hatched without our knowledge, as Allen wrote to President Theodore Roosevelt.33 The techniques of
compiling dossiers on dissidents private lives, spreading disinformation in the media, and planting agents
provocateurs among militants were applied to combating radical nationalist groupings in Manila. Control
over information proved as effective a tool of colonial power as physical force. As historian Alfred W. McCoy
notes, during World War I police methods that had been tested and perfected in the colonial Philippines
migrated homeward to provide both precedents and personnel for the establishment of a US internal
security apparatus. After years of pacifying an overseas empire where race was the frame for perception
and action, colonial veterans came home to turn the same lens on America, seeing its ethnic
communities . . . as internal colonies requiring coercive controls.34 On this basis, a domestic national
security apparatus emerged, with notions of race and empire at its core. From 1917, the FBI and police
department red squads in US cities increasingly busied themselves with fears of subversion from
communists, pacifists, anarchists, and the ten million German Americans who were suspected of harboring
disloyalties. During World War I, thirty million letters were physically examined and 350,000 badgecarrying vigilantes snooped on immigrants, unions, and socialists.35 Concerns over privacy set limits to
such surveillance after the war, but with increasing left-wing and right-wing radicalization in the 1930s,
President Roosevelt decided to issue a secret executive order that authorized a shift in the FBIs role from a
narrowly conceived law enforcement agency focused on gathering evidence for criminal prosecutions into
an intelligence agency. Thereafter ,
systematically identifying subversives based on ideological and associational criteria.36 It also opened
the door to the burgeoning counter-subversion practices that the bureau would launch over the following
War, the United States emerged as one of two superpowers on the world stage. Pushing back against the
isolationists, Cold War liberals made the case for the establishment of a permanent national security state.
According to historian Paul Hogan, the national security mindset that emerged involved a conviction that a
the output of citizen soldiers in farms and factories behind the battle line. In total war all of the nations
resources and all of its energy and talent had to be mobilized on behalf of the war effort, thereby
obliterating the old distinction between civilian and military, between citizen and soldier, between home
front and the front line. When American leaders talked about total war they did so in these terms and also
in terms that recognized that modern weapons could bring massive destruction from great distances with
Destiny being explicitly drawn on in making the case for an exceptional American empire. The notion of the
citizen-soldier was built upon earlier settler-colonial racialized security narratives. However ,
itself to be one of two hegemons on the global stage . In this context, the
existence of Jim Crow segregation was an embarrassment for the ruling class. In 1947, the National
Security Act was passed which entrenched security as a key element of the postwar order. Every aspect
of lifethe social, political, intellectual, and economicwas conceived as playing a role in national
defense, and a massive security establishment was built up. The 1947 act created the Office of the
Secretary of Defense, the Joint Chiefs of Staff, the National Security Council (NSC), and the Central
Intelligence Agency (CIA). The National Security Agency (NSA) was formed in 1952, conceived as an
organization to carry out the gathering of signals intelligence. During this period, there was also the
integration of corporate America, of universities, of research institutions, and of the media into the
machinery of the national security state. The earlier distinctions between the citizen and soldier and
between the home front and the battle front were blurred to shore up an imperial system at home and
abroad. Surveillance was central to sustaining and reproducing this system. From the 1940s to the early
1970s, FBI wiretapping and bugging operations focused on a wide range of movements, activists, and
public figures. The following list of targets compiled by historian Athan Theoharis gives a flavor of the
surveillance and is worth quoting in full: Radical activists (David Dallin, Charles Malamuth, C. B. Baldwin,
Frank Oppenheimer, Bertolt Brecht, Thomas Mann, Heinrich Mann, Helene Weigel, Berthold Viertel, Anna
Seghers, Bodo Uhse, Richard Criley, Frank Wilkinson), prominent liberal and radical attorneys (Bartley
Crum, Martin Popper, Thomas Corcoran, David Wahl, Benjamin Margolis, Carol King, Robert Silberstein,
National Lawyers Guild, Fred Black), Radical labor leaders and unions (Harry Bridges; United Auto Workers;
National Maritime Union; National Union of Marine Cooks and Stewards; United Public Workers; United
Electrical Radio and Machine Workers; Food, Tobacco, Agricultural and Allied Workers; International
Longshoremens and Warehousemens Union; CIO Maritime Committee; Congress of Industrial
Organizations Council), Journalists (I. F. Stone, Philip Jaffe, Kate Mitchell, Mark Gayn, Leonard Lyons, William
Beecher, Marvin Kalb, Henry Brandon, Hedrick Smith, Lloyd Norman, Hanson Baldwin, Inga Arvad), Civilrights activists and organizations (Martin Luther King, Jr.; Malcolm X; Southern Christian Leadership
Conference; National Association for the Advancement of Colored People; March on Washington Movement;
Gandhi Society for Human Rights; Elijah Muhammad; Nation of Islam; Stokely Carmichael; H. Rap Brown;
Student Non-Violent Coordinating Committee; Alabama Peoples Education Association; Committee to Aid
the Monroe Defendants; Southern Conference for Human Welfare; Black Panther Party; Universal Negro
Improvement Association; African Liberation Day Committee), The Students for a Democratic Society, Ku
Klux Klan, National Committee to Abolish HUAC, Socialist Workers Party, Washington Bookstore Association,
Northern California Association of Scientists, Federation of American Scientists, American Association of
Scientific Workers, preWorld War II isolationists (Henry Grunewald, Ethel Brigham, John OBrien, Lillian
Moorehead, Laura Ingalls, America First, Jehovahs Witnesses, Los Angeles Chamber of Commerce), and
even prominent personalities (Joe Namath, Harlow Shapley, Edward Condon, Edward Prichard, Muhammad
Ali, Benjamin Spock).40 In a bid to shape public opinion, the FBI also launched a mass media campaign in
1946 that released educational materials to cooperative journalists and legislators. In the late 1950s, the
FBI launched its secret counterintelligence program (COINTELPRO), which used provocateurs and
informants to infiltrate communist groups initially, but later widened to include Puerto Rican nationalists,
the student movement, the civil rights movement, and Black liberation movements. About 1,500 of the
8,500 American Communist Party members were likely FBI informants in the early 1960s. By the end of the
decade, agents who had previously worked in US foreign intelligence were transferring to the burgeoning
field of domestic intelligence to spy on radical movements, whether employed by the bureau, military
intelligence, or the expanding red squads in local police departments.41 A key part of the FBIs
countersubversion strategy was the manipulation of political activists into committing criminal acts so that
they could be arrested and prosecuted. Agents provocateurs working for the FBI initiated disruptions of
meetings and demonstrations, fights between rival groups, attacks on police, and bombings. FBI agents
also secretly distributed derogatory and scurrilous material to police, Congress, elected officials, other
federal agencies, and the mass media.42 In an attempt to neutralize Martin Luther King, Jr., who, the FBI
worried, might abandon his obedience to white liberal doctrines (as indeed he did), he was placed under
intense surveillance, and attempts were made to destroy his marriage and induce his suicide. In various
cities, the FBI and local police used fake letters and informants to stir up violence between rival factions
and gangs to disrupt the Black Panther Party.43 In a number of cases, police departments or federal agents
carried out the direct assassination of Black Panthers.44 Since 1945, the government had been running a
mass spying program known as Project Shamrock, which the NSA took over in 1952. The
telecommunications companies at the time handed over to the NSA all telegrams sent out of and into the
United States. By the early 1970s, NSA analysts were collecting and analyzing approximately 150,000
telegrams a month. In 1967, the FBI and CIA submitted lists of names to the National Security Agency of
key activists in the civil rights and anti-Vietnam War movements, hoping that the NSA would be able to find
evidence of the communist conspiracy that President Lyndon Johnson thought must be causing the new
militancy of the 1960s. The list included politically active public figures such as actress Jane Fonda and
singer Joan Baez, as well as Martin Luther King, Jr., Eldridge Cleaver, and Abbie Hoffman. NSA officers
began surveillance of these activists communications, using special records procedures to prevent
discovery of what they knew to be an illegal program. This watch list program was expanded under
President Nixon and named Operation Minaret; in all, the international communications of more than a
thousand US citizens and organizations and more than two thousand foreign citizens were intercepted.45
Such was the proliferation of government spying in the 1960s that even such a minor law enforcement
agency as the Ohio Highway Patrol ran an intelligence unit claiming to have student informers on every
campus in the state.46 The vast expansion of state surveillance in the 1960s was a response to the new
militancy of the movements against the imperialist war in Vietnam and for civil rights and Black liberation.
Initially, security officials assumed the Civil Rights movement in the South, the campus protests, and the
Black insurrections in northern cities were the result of a communist conspiracy; informants and electronic
monitoring were deployed to try to identify the hidden agitators thought to be manipulating events behind
the scenes. But it soon became apparent that these movements were manifestations of a new kind of
politics that could not be understood according to the conspiratorial calculus of front groups and fellow
travelers; surveillance therefore had to be widened to monitor ordinary participants, particularly in Black
communities, in what was increasingly seen as a popular insurgency. Even then, the hope was that new
electronic technologies would be the answer. National security advisor Zbigniew Brzezinski commented in
1970 that technology would make it possible to assert almost continuous surveillance over every citizen
and maintain up-to-date files, containing even personal information about the . . . behavior of the citizen,
in addition to the more customary data.47 Neoliberalism and racial security The expansion of the
surveillance state in the twentieth century was one aspect of a wider penetration of the state into the lives
of Americans. Working class struggle had somewhat unexpectedly driven this expansion: the state
responded by taking on a mediating role between labor and capital, offering a measure of protection from
the ravages of a market economy through Keynesian economics and the creation of a welfare state after
the New Dealalbeit one that was underdeveloped compared to Western Europe. State managers sought
to stabilize capitalism by imposing a degree of rationality on the system through regulating the economy
and providing social services, all of which required a greater penetration of the state into civil society.48 In
the new era of neoliberal capitalism that began in the 1970s, ruling elites sought to break this social
contract, which rested on the premise that, if the working class played by the rules, it could see
increases in wages and living conditions. From the 1970s onwards, this arrangement was undone.
Alongside, there were also the beginnings of a contraction of the social wage of welfare provisions, public
housing, education, and healthcare. The end result was growing inequality and a new regime of the one
percent. The state responded to the permanent joblessness, ghettoization, and stigmatization that
neoliberalism produced among the poor by turning to policies of mass criminalization and incarceration.
Thus, the neoliberal onslaught went hand in hand with securitization. As Loc Wacquant writes, since the
civil rights era America has launched into a social and political experiment without precedent or equivalent
in the societies of the postwar West: the gradual replacement of a (semi-) welfare state by a police and
penal state for which the criminalization of marginality and the punitive containment of dispossessed
categories serve as social policy at the lower end of the class and ethnic order.49 The law and order
rhetoric that was used to mobilize support for this project of securitization was racially coded, associating
Black protest and rebellion with fears of street crime. The possibilities of such an approach had been
demonstrated in the 1968 election, when both the Republican candidate Richard Nixon and the
independent segregationist George Wallace had made law and order a central theme of their campaigns. It
became apparent that Republicans could cleave Southern whites away from the Democratic Party through
tough-on-crime rhetoric that played on racial fears. The Southern Strategy, as it would be called, tapped
into anxieties among working-class whites that the civil rights reforms of the 1960s would lead to them
competing with Blacks for jobs, housing, and schools. With the transformation of the welfare state into a
security state, its embedding in everyday life was not undone but diverted to different purposes. Social
services were reorganized into instruments of surveillance. Public aid became increasingly conditional on
upholding certain behavioral norms that were to be measured and supervised by the state, implying its
increasing intrusion into the lives of the poorculminating in the workfare regimes of the Clinton
administration.50 In this context, a new model of crime control came into being. In earlier decades,
criminologists had focused on the process of rehabilitation; those who committed crimes were to be helped
to return to society. While the actual implementation of this policy was uneven, by the 1970s, this model
went out of fashion. In its place, a new preventive model of crime control became the norm, which was
based on gathering information about groups to assess the risk they posed. Rather than wait for the
perpetrator to commit a crime, risk assessment methods called for new forms of preventive surveillance,
in which whole groups of people seen as dangerous were subject to observation, identification, and
classification.51 The War on Drugslaunched by President Reagan in 1982dramatically accelerated the
process of racial securitization. Michelle Alexander notes that At the time he declared this new war, less
than 2 percent of the American public viewed drugs as the most important issue facing the nation. This
fact was no deterrent to Reagan, for the drug war from the outset had little to do with public concern about
drugs and much to do with public concern about race. By waging a war on drug users and dealers, Reagan
made good on his promise to crack down on the racially defined othersthe undeserving.52 Operation
Hammer, carried out by the Los Angeles Police Department in 1988, illustrates how racialized surveillance
was central to the War on Drugs. It involved hundreds of officers in combat gear sweeping through the
South Central area of the city over a period of several weeks, making 1,453 arrests, mostly for teenage
curfew violations, disorderly conduct, and minor traffic offenses. Ninety percent were released without
charge but the thousands of young Black people who were stopped and processed in mobile booking
centers had their names entered onto the gang register database, which soon contained the details of
half of the Black youths of Los Angeles. Entry to the database rested on such supposed indicators of gang
membership as high-five handshakes and wearing red shoelaces. Officials compared the Black gangs they
were supposedly targeting to the National Liberation Front in Vietnam and the murderous militias of
Beirut, signaling the blurring of boundaries between civilian policing and military force, and between
domestic racism and overseas imperialism.53 In the twelve years leading up to 1993, the rate of
incarceration of Black Americans tripled,54 establishing the system of mass incarceration that Michelle
Alexander refers to as the new Jim Crow.55 And yet those in prison were only a quarter of those subject to
supervision by the criminal justice system, with its attendant mechanisms of routine surveillance and
intermediate sanctions, such as house arrests, boot camps, intensive supervision, day reporting,
community service, and electronic tagging. Criminal records databases, which are easily accessible to
potential employers, now hold files on around one-third of the adult male population.56 Alice Goffman has
written of the ways that mass incarceration is not just a matter of imprisonment itself but also the systems
of policing and surveillance that track young Black men and label them as would-be criminals before and
after their time in prison. From stops on the street to probation meetings, these systems, she says, have
transformed poor Black neighborhoods into communities of suspects and fugitives. A climate of fear and
suspicion pervades everyday life, and many residents live with the daily concern that the authorities will
seize them and take them away.57 A predictable outcome of such systems of classification and
criminalization is the routine racist violence carried out by police forces and the regular occurrences of
police killings of Black people, such as Michael Brown in Ferguson, Missouri, on August 9, 2014. The mass
surveillance of Muslim Americans Discussions of the surveillance of Muslim Americans usually begin with
9/11 and make little attempt to locate them in the longer history of racial surveillance in the United States.
Yet the continuities are striking, particularly for Black Muslims, who have been seen as extremists and
subject to national security monitoring since the 1940s. Already in the late 1960s, Arab American student
groups involved in supporting the Palestinian national movement had come under surveillance and, in
1972, the Nixon administration issued a set of directives known as Operation Boulder that enabled the CIA
and FBI to coordinate with the pro-Israel lobby in monitoring Arab activists. By the 1980s, but especially
after 9/11, a process was under way in which Muslimness was racialized through surveillanceanother
scene of the states production of racial subjects. Since all racisms are socially and politically constructed
rather than resting on the reality of any biological race, it is perfectly possible for cultural markers
associated with Muslimness (forms of dress, rituals, languages, etc.) to be turned into racial signifiers.58
This signification then serves to indicate a people supposedly prone to violence and terrorism, which,
under the War on Terror, justifies a whole panoply of surveillance and criminalization, from arbitrary
arrests, to indefinite detention, deportation, torture, solitary confinement, the use of secret evidence, and
sentencing for crimes that we would not be jailed for, such as speech, donations to charitable
organizations, and other such acts considered material support for terrorism. Significantly, the racial
underpinnings of the War on Terror sustain not just domestic repression but foreign abusesthe wars vast
death toll in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and elsewhere could not be sustained without the
dehumanization of its Muslim victims. As before, racism at home goes hand in hand with empire abroad.
Counterinsurgency thinking that informed the strategies used in Iraq and Afghanistan in the face of
popular insurrection are also brought home to be deployed in relation to Muslim American populations.
Winning hearts and minds, the counterinsurgency slogan first introduced by British colonialists in
Malaya, and then adopted by the US military in Vietnam, reappears as the phrase that state planners
invoke to prevent extremism among young Muslims in the United States. Counterinsurgency in this
context means total surveillance of Muslim populations, and building law enforcement agency partnerships
with good Muslims, those who are willing to praise US policy and become sources of information on
dissenters, making life very difficult for bad Muslims or those who refuse (in ways reminiscent of the
good and bad Indians). It is a way of ensuring that the knowledge Muslims tend to have of how US
foreign policy harms the Middle East, Africa, and Asia is not shared with others. The real fear of the
national security state is not the stereotypical Muslim fanatic but the possibility that other groups within
US society might build alliances with Muslims in opposition to empire. The various measures that the US
national security system has adopted in recent years flow from an analysis of Muslim radicalization,
which assumes that certain law-abiding activities associated with religious ideology are indicators of
extremism and potential violence. Following the preventive logic discussed above, the radicalization model
claims to be able to predict which individuals are not terrorists now but might be at some later date.
Behavioral, cultural, and ideological signals are assumed to reveal who is at risk of turning into a terrorist
at some point in the future.59 For example, in the FBIs radicalization model, such things as growing a
beard, starting to wear traditional Islamic clothing, and becoming alienated from ones former life are
listed as indicators, as is increased activity in a pro-Muslim social group or political cause.60 Thus,
signifiers of Muslimness such as facial hair, dress, and so on are turned into markers of suspicion for a
surveillance gaze that is also a racial (and gendered) gaze; it is through such routine bureaucratic
mechanisms that counterterrorism practices involve the social construction of racial others. Official
acceptance of the model of radicalization implies a need for mass surveillance of Muslim populations and
collection of as much data as possible on every aspect of their lives in order to try to spot the supposed
warning signs that the models list. And this is exactly the approach that law enforcement agencies
introduced. At the New York Police Department, for instance, the instrumentalizing of radicalization models
led to the mass, warrantless surveillance of every aspect of Muslim life. Dozens of mosques in New York
and New Jersey and hundreds more hot spots, such as restaurants, cafs, bookshops, community
organizations, and student associations were listed as potential security risks. Undercover officers and
informants eavesdropped at these locations of interest to listen for radical political and religious
opinions. A NYPD Moroccan Initiative compiled a list of every known Moroccan taxi driver. Muslims who
changed their names to sound more traditionally American or who adopted Arabic names were
investigated and catalogued in secret NYPD intelligence files. It is clear that none of this activity was based
on investigating reasonable suspicions of criminal activity. This surveillance produced no criminal leads
between 2006 and 2012, and probably did not before or after.61 As of 2008, the FBI had a roster of 15,000
paid informants62 and, according to Senator Dianne Feinstein of the Senate Intelligence Committee, the
bureau had 10,000 counterterrorism intelligence analysts in 2013.63 The proportion of these informants
and analysts who are assigned to Muslim populations in the United States is unknown but is likely to be
substantial. The kinds of infiltration and provocation tactics that had been practiced against Black radicals
in the 1960s are being repeated today. What has changed are the rationales used to justify them: it is no
longer the threat of Black nationalist subversion, but the threat of Muslim radicalization that is invoked.
With new provisions in the Clinton administrations 1996 Antiterrorism and Effective Death Penalty Act, the
FBI can launch investigations of a suspected individual or organization simply for providing material
support to terrorisma vague term that could include ideological activity unrelated to any actual plot to
carry out violence. While COINTELPRO violated federal laws, today similar kinds of investigation and
criminalization of political dissent can be carried out legitimately in the name of countering terrorism. For
Muslim populations on the receiving end of state surveillance programs designed to prevent
radicalization, everyday life increasingly resembles the patterns described in classic accounts of
authoritarianism. There is the same sense of not knowing whom to trust and choosing ones words with
special care when discussing politics, and of the arbitrariness and unpredictability of state power.64 With
the 2011 leaking of some NYPD intelligence files, individual Muslims have had the disturbing experience of
seeing their names mentioned in government files, along with details of their private lives. Numerous
businesses, cafs, restaurants, and mosques in New York are aware that the NYPD considers them hotspots
and deploys informants to monitor them. And the recent outing of a small number of NYPD informants has
meant some Muslims in New York have found that relationships they thought of as genuine friendships
were actually covert attempts to gather intelligence.65 Racial security in the post-racial era The election
of Barack Obama as president in 2008 was said to have ushered in a new post-racial era, in which racial
inequalities were meant to be a thing of the past. African Americans and Muslim Americans placed their
hopes in Obama, voting for him in large numbers. But in the so-called post-racial era, the security narrative
of hard-working families (coded white) under threat from dangerous racial others has been as powerful as
ever. The unprecedented mass deportation of more than two million people during the Obama presidency
is one form taken by this post-racial racialized securitization. Over the last two decades, the progressive
criminalization of undocumented immigrants has been achieved through the building of a militarized wall
between Mexico and the United States, hugely expanding the US border patrol, and programs such as
Secure Communities, which enables local police departments to access immigration databases. Secure
Communities was introduced in 2008 and stepped up under Obama. It has resulted in migrants being
increasingly likely to be profiled, arrested, and imprisoned by local police officers, before being passed to
the federal authorities for deportation. Undocumented migrants can no longer have any contact with police
officers without risking such outcomes. There is an irony in the way that fears of illegal immigration
threatening jobs and the public purse have become stand-ins for real anxieties about the neoliberal
collapse of the old social contract: the measures that such fears lead toracialization and criminalization
of migrantsthemselves serve to strengthen the neoliberal status quo by encouraging a precarious labor
market. Capital, after all, does not want to end immigration but to profit from a vast exploitable labor pool
that exists under precarious conditions, that does not enjoy the civil, political and labor rights of citizens
and that is disposable through deportation.66 What brings together these different systems of racial
oppressionmass incarceration, mass surveillance, and mass deportationis a security logic that holds
the imperial state as necessary to keeping American families (coded white) safe from threats abroad and
at home. The ideological work of the last few decades has cultivated not only racial security fears but also
an assumption that the security state is necessary to keep us safe. In this sense, security has become
the new psychological wage to aid the reallocation of the welfare states social wage toward homeland
security and to win support for empire in the age of neoliberalism. Through the notion of security, social
and economic anxieties generated by the unraveling of the Keynesian social compact have been
channeled toward the Black or Brown street criminal, welfare recipient, or terrorist. In addition, as Susan
Faludi has argued, since 9/11, this homeland in need of security has been symbolized, above all, by the
white domestic hearth of the prefeminist fifties, once again threatened by mythical frontier enemies,
hidden subversives, and racial aggressors. That this idea of the homeland coincides culturally with the
denigration of capable women, the magnification of manly men, the heightened call for domesticity, the
search for and sanctification of helpless girls points to the ways it is gendered as well as racialized.67 The
post-Snowden debate The mechanisms of surveillance outlined in this essay were responses to political
struggles of various kindsfrom anticolonial insurgencies to slave rebellions, labor militancy to antiimperialist agitation. Surveillance practices themselves have also often been the target of organized
opposition. In the 1920s and 1970s, the surveillance state was pressured to contract in the face of public
disapproval. The antiwar activists who broke into an FBI field office in Media, Pennsylvania, in 1971 and
stole classified documents managed to expose COINTELPRO, for instance, leading to its shut down. (But
those responsible for this FBI program were never brought to justice for their activities and similar
techniques continued to be used later against, for example in the 1980s, the American Indian Movement,
and the Committee in Solidarity with the People of El Salvador.68) Public concern about state surveillance
in the 1970s led to the Church committee report on government spying and the Handschu guidelines that
regulated the New York Police Departments spying on political activities. Those concerns began to be
swept aside in the 1980s with the War on Drugs and, especially, later with the War on Terror. While
significant sections of the public may have consented to the security state, those who have been among
its greatest victimsthe radical Left, antiwar activists, racial justice and Black liberation campaigners, and
opponents of US foreign policy in Latin America and the Middle Eastunderstand its workings. Today, we
are once again in a period of revelation, concern, and debate on national security surveillance. Yet if real
change is to be brought about, the racial history of surveillance will need to be fully confrontedor
opposition to surveillance will once again be easily defeated by racial security narratives. The significance
of the Snowden leaks is that they have laid out the depth of the NSAs mass surveillance with the kind of
proof that only an insider can have. The result has been a generalized level of alarm as people have
become aware of how intrusive surveillance is in our society, but that alarm remains constrained within a
public debate that is highly abstract, legalistic, and centered on the privacy rights of the white middle
problem of government surveillance can be fixed simply by using better encryption tools. While encryption
tools are useful in increasing the resources that a government agency would need to monitor an individual,
they do nothing to unravel the larger surveillance apparatus. Meanwhile, executives of US tech
corporations express concerns about loss of sales to foreign customers concerned about the privacy of
data. In Washington and Silicon Valley, what should be a debate about basic political freedoms is simply a
question of corporate profits.69 Another and perhaps deeper problem is the use of images of state
surveillance that do not adequately fit the current situationsuch as George Orwells discussion of
totalitarian surveillance. Edward Snowden himself remarked that Orwell warned us of the dangers of the
type of government surveillance we face today.70 Reference to Orwells 1984 has been widespread in the
current debate; indeed, sales of the book were said to have soared following Snowdens revelations.71 The
argument that digital surveillance is a new form of Big Brother is, on one level, supported by the evidence.
For those in certain targeted groupsMuslims, left-wing campaigners, radical journalistsstate
surveillance certainly looks Orwellian. But this level of scrutiny is not faced by the general public. The
picture of surveillance today is therefore quite different from the classic images of surveillance that we find
in Orwells 1984, which assumes an undifferentiated mass population subject to government control. What
we have instead today in the United States is total surveillance, not on everyone, but on very specific
groups of people, defined by their race, religion, or political ideology: people that NSA officials refer to as
the bad guys. In March 2014, Rick Ledgett, deputy director of the NSA, told an audience: Contrary to
some of the stuff thats been printed, we dont sit there and grind out metadata profiles of average people.
If youre not connected to one of those valid intelligence targets, you are not of interest to us.72 In the
national security world, connected to can be the basis for targeting a whole racial or political community
so, even assuming the accuracy of this comment, it points to the ways that national security surveillance
can draw entire communities into its web, while reassuring average people (code for the normative white
middle class) that they are not to be troubled. In the eyes of the national security state, this average
person must also express no political views critical of the status quo. Better oversight of the sprawling
national security apparatus and greater use of encryption in digital communication should be welcomed.
But by themselves these are likely to do little more than reassure technologists, while racialized
populations and political dissenters continue to experience massive surveillance. This is why the most
effective challenges to the national security state have come not from legal reformers or technologists but
from grassroots campaigning by the racialized groups most affected. In New York, the campaign against
the NYPDs surveillance of Muslims has drawn its strength from building alliances with other groups
affected by racial profiling: Latinos and Blacks who suffer from hugely disproportionate rates of stop and
frisk. In Californias Bay Area, a campaign against a Department of Homeland Security-funded Domain
Awareness Center was successful because various constituencies were able to unite on the issue, including
homeless people, the poor, Muslims, and Blacks. Similarly, a demographics unit planned by the Los
Angeles Police Department, which would have profiled communities on the basis of race and religion, was
shut down after a campaign that united various groups defined by race and class. The lesson here is that,
while the national security state aims to create fear and to divide people, activists can organize and build
alliances across race lines to overcome that fear. To the extent that the national security state has targeted
Occupy, the antiwar movement, environmental rights activists, radical journalists and campaigners, and
But
understanding the centrality of race and empire to national security
surveillance means finding a basis for unity across diferent groups
who experience similar kinds of policing: Muslim, Latino/a, Asian,
Black, and white dissidents and radicals. It is on such a basis that we
can see the beginnings of an efective multiracial opposition to the
surveillance state and empire.
whistleblowers, these groups have gravitated towards opposition to the national security state.
Anti-Blackness Adv
know that the state and its gatekeepers exert their control over all aspects of
our lives. So when we mention that the NSA surveillance regime isnt new to
us, the appropriate response is not to mock, ridicule, belittle and berate. No.
The response that conveys solidarity and a desire to partner is to
say: Yes thats true and while I may have been personally
concerned about these issues, I am sorry that more of my peers
havent been outraged for years. How can we work together to
dismantle the surveillance state that harms us all? Check your
privilege, please.
Colorblindness
around me chose to be colorblind. It was my freshman year of high school, and I was the only Black person
on our cheerleading team. One of our away games took place in a very conservative town in North
Georgia. There were approximately fifteen people of color in the entire gym, including the members of our
basketball team and their families. At some point, the game got heated; racial slurs and threats were
exchanged to the Black basketball players and myself. Yes I was upset in that moment, but I remember
feeling more disappointed that the other cheerleaders chose it act like it didnt happen. My race was never
discussed during practices or at games. The only reference to my color would arise while trying to explain
to my coaches that my hair does not curl while in box braids. My teammates and coaches chose to
overlook the difference in my hair, just like they did during the Georgia situation. I wanted them to
I dont have details about the situation, I believe her skin color played a role is ones decision to mistake
We have to
start creating spaces where we can have these difficult
conversations. As Hobson stated if we dont begin this conversation about
race and discrimination it threatens to rob another generation of all
the opportunities wanted for them regardless of the color of their
skin.
her as kitchen help. Concluding her Ted Talk Hobson challenged us to be Colorbrave.
Plessy v. Fergusson, 163 U.S. 537 (1896), p. 559. 4 INTRODUCTION: THE CONTEXT OF RACE
two parts of Americas racial dilemma together to provide a color blind argument in favor of color
colorblind racial
ideology is a harmful way of viewing the world. By ignoring both the
material disadvantages faced by people of color and the implicit
racial biases that influence decision-making, subscribing to
colorblind racial ideology leads people to ignore the realities of
racism in modern America and thus oppose policies that would
address racial inequalities. In a recent class, we discussed how some white
people who subscribe to such an ideology will go to any length to avoid
mentioning a person of colors race. This avoidance occurs despite the fact that, in all
likelihood, this person is thinking about the person of colors race. Research has shown that people
who practice this kind of avoidance are perceived by many people of
color as more racially biased. The solution to colorblindness, then, is
color-consciousness, which involves the active acknowledgment of race. One should
not actively ignore the race of a person of color; one should feel free
to discuss it. It is this recognition that can lead to an overcoming of
system and implicit racial bias. All of this sounds good, but there is one issue I want to
raise. It occurred to me that subscribing to a color-conscious ideology might be
problematic if one only recognizes the races of people of color and ignores
the race of white people. This reinforces white normativity, the idea that
white is the default or normal identity in America. Any other race is different and even
The recent literature in social psychology and other disciplines is clear:
less American. How would this play out in the real world? Interpersonally, it could mean not just refusing to
avoid using the race of people of color as a descriptor (granted, it should never be the only descriptor) but
also actively using the race of white people as a descriptor. It could mean that one could discuss the effect
race has not only on black politicians but also on white politicians. Do you think this is a good idea? Would
such a strategy be able to gradually chip away at the dominance of white normativity? My reasoning is
Helen Neville Professor, Department of Psychology B.A., University of British Columbia M.A., Simon Fraser
University Ph.D., Cornell University. August 17 2011. Color-Blind Racial Ideology
http://studysites.sagepub.com/healeyregc6e/study/chapter/encycarticles/ch11/NEVILL~1.PDF. July 9, 2015
Over the past 2 decades scholars and popular authors have written about racial color-blindness as a way to
characterize racial beliefs in the postcivil rights era. At its core ,
racial color-blindness
refers to the belief that racism is a thing of the past and that race no
longer plays a role in understanding peoples lived experience.
Conceptually, racial color-blindness has its roots in the law field and
traditionally has been applied mainly to the Constitution. More recently,
scholars have redefined the term to better capture the new social relations within the current racial
climate.
color-blind perspective
dismisses potential diferences based on racial group membership
and downplays how these diferences may shape human
experiences. This limited awareness of the manifestation of race and
racism in society is the foundation for most conceptualizations of
racial color-blindness. Regardless of the definition, racial colorblindness is also thought to help justify existing racial practices or
policies that ultimately create and support existing racial
inequalities. Consistent with these articulations, researchers argue that racial color-blindness
a great deal of commonality across cultures; however, the
reflects a broader ideological stance. Racial ideology is complex, but essentially it can be conceptualized
as a global term referring to the dominant views about race within a hierarchical society .
Ideology in
this regard consists of a shared worldview about race that helps to
justify and legitimize the current racial status quo; it accounts for
individual beliefs and dominant societal racial beliefs or ideas that
are commonly understood and transmitted through a variety of civil
society and structural mechanisms. From this perspective racial
resulting from an enlightened (albeit well-meaning) position, color blindness comes from a lack of
awareness of racial privilege conferred by Whiteness (Tarca, 2005). White people can guiltlessly subscribe
to colorblindness because they are usually unaware of how race affects people of color and American
society as a whole. How might colorblindness cause harm? Here's an example close to home for those of
in psychotherapy a client's
racial and ethnic remarks were viewed as a defensive shift away
from important issues, and the therapist tended to interpret this as
resistance (Comas-Diaz & Jacobsen, 1991). However, such an approach hinders the exploration of
you who are psychologically-minded. In the not-so-distant past,
conflicts related to race, ethnicity, and culture. The therapist doesn't see the whole picture, and the client
is left frustrated.
therapist I need to be able to hear and "see" everything my client is communicating on many different
levels. I can't afford to be blind to anything. Would you want to see a surgeon who operated blindfolded?
Of course not. Likewise, a therapist should not be blinded either, especially to something as critical as a
person's culture or racial identity. By encouraging the exploration of racial and cultural concepts, the
therapist can provide a more authentic opportunity to understand and resolve the client's problems
(Comas-Diaz & Jacobsen, 1991). Nonetheless, I have encountered many fellow therapists who ascribe to a
colorblind philosophy. They ignore race or pretend its personal, social, and historical effects don't exist.
This approach ignores the incredibly salient experience of being stigmatized by society and represents an
empathetic failure on the part of the therapist. Colorblindness does not foster equality or respect; it merely
relieves the therapist of his or her obligation to address important racial differences and difficulties.
American writer, I am reminded of this each time I finish a reading, when without fail a white person
overzealously praises my speaking ability. The most recent version of this was a 15-year-old high school
student who was amazed that I had actually attended college. Also telling is Obama's initial lack of support
in the black community, which may have been a result of an African American unwillingness to see him as
The majority of
Americans are comfortable accepting successful blacks in
stereotypically prescribed fields such as entertainment or sports,
where blacks are expected to be physically and emotionally strong
and yet largely politically mute. When a black person becomes
successful in another field, he or she becomes a "surprise" to the
majority and is subsequently stripped of color. How many times have you heard a
representative of traditional (very different from stereotypical) black America.
white person say that he or she thinks of Obama not as a black man but as a man, or of Oprah not as a
black woman but as just, well, Oprah? I have lost count. This well-meaning, praise-expectant affirmation of
colorblindness may seem like progress, but it's really indicative of having avoided the central issue:
Someone who looks different (read black) could be just as qualified, just as deserving as a "normal" person
(read white). The in-your-face, un-stereotypical blackness of Obama therefore forces all of us to question
our ideas of race and racial progress in a way that makes us work. This type of work is difficult and scary,
and it's understandable why some would rather delay the discussion or label it unnecessary and
Obama's
presence forces us to ask whether it is reasonable to call a biracial
man black; whether definitions of race designed to benefit slaveowners are still necessary and valid in 2008. His openness about
past drug use could put front and center the debate about the
patently racist sentencing guidelines our "post-racial" society
employs to punish narcotics-related ofenses. In general, Barack Hussein
Obama brings us face to face with the discomfort our society feels
with this idea of diference. Indeed, fascination with Obama's name recalls studies that
unproductive. But having this discussion will allow us to grow stronger as a country.
show how hard it is for those with unique African American names to find employment. And it is interesting
that no one has mentioned an obvious reason for the Obama campaign's initial reluctance to attack Hillary
Rodham Clinton -- that it might conjure up the age-old assumption that aggressive young black men are a
menace to older white women. (If that statement offends you, I'm sure plenty of young black men like
myself can tell you about older white women crossing the street to avoid us in our "post-racial" society.)
Islamophobia Adv
far outside its borders and targets ethnic communities in ways that would run
afoul of civil liberties rules if practiced by the federal government. And it does
so with unprecedented help from the CIA in a partnership that has blurred the
bright line between foreign and domestic spying. Neither the city council,
which finances the department, nor the federal government, which
contributes hundreds of millions of dollars each year, is told exactly what's
going on. The department has dispatched teams of undercover officers,
known as "rakers," into minority neighborhoods as part of a human mapping
program, according to officials directly involved in the program. They've
monitored daily life in bookstores, bars, cafes and nightclubs. Police have also
used informants, known as "mosque crawlers," to monitor sermons, even
when there's no evidence of wrongdoing. NYPD officials have scrutinized
imams and gathered intelligence on cab drivers and food cart vendors, jobs
often done by Muslims. Many of these operations were built with help from
the CIA, which is prohibited from spying on Americans but was instrumental
in transforming the NYPD's intelligence unit. A veteran CIA officer, while still
on the agency's payroll, was the architect of the NYPD's intelligence
programs. The CIA trained a police detective at the Farm, the agency's spy
school in Virginia, then returned him to New York, where he put his new
espionage skills to work inside the United States. And just last month, the CIA
sent a senior officer to work as a clandestine operative inside police
headquarters. While the expansion of the NYPD's intelligence unit has been
well known, many details about its clandestine operations, including the
depth of its CIA ties, have not previously been reported. The NYPD denied
that it trolls ethnic neighborhoods and said it only follows leads. In a city that
has repeatedly been targeted by terrorists, police make no apologies for
pushing the envelope. NYPD intelligence operations have disrupted terrorist
plots and put several would-be killers in prison. "The New York Police
Department is doing everything it can to make sure there's not another 9/11
here and that more innocent New Yorkers are not killed by terrorists," NYPD
spokesman Paul Browne said. "And we have nothing to apologize for in that
regard." But officials said they've also been careful to keep information about
some programs out of court, where a judge might take a different view. The
NYPD considers even basic details, such as the intelligence division's
organization chart, to be too sensitive to reveal in court. One of the enduring
questions of the past decade is whether being safe requires giving up some
liberty and privacy. The focus of that debate has primarily been federal
programs like wiretapping and indefinite detention. The question has received
less attention in New York, where residents do not know for sure what, if
anything, they have given up. The story of how the NYPD Intelligence Division
developed such aggressive programs was pieced together by the AP in
interviews with more than 40 current and former New York Police Department
and federal officials. Many were directly involved in planning and carrying out
these secret operations for the department. Though most said the tactics
were appropriate and made the city safer, many insisted on anonymity,
because they were not authorized to speak with reporters about security
matters. The story begins with one man. David Cohen arrived at the New York
Police Department in January 2002, just weeks after the last fires had been
extinguished at the debris field that had been the twin towers. A retired 35year veteran of the CIA, Cohen became the police department's first civilian
intelligence chief. Cohen had an exceptional career at the CIA, rising to lead
both the agency's analytical and operational divisions. He also was an
extraordinarily divisive figure, a man whose sharp tongue and supreme
confidence in his own abilities gave him a reputation as arrogant. Cohen's
tenure as head of CIA operations, the nation's top spy, was so contentious
that in 1997, The New York Times editorial page took the unusual step of
calling for his ouster. He had no police experience. He had never defended a
city from an attack. But New York wasn't looking for a cop. "Post-9/11, we
needed someone in there who knew how to really gather intelligence," said
John Cutter, a retired NYPD official who served as one of Cohen's top
uniformed officers. At the time, the intelligence division was best known for
driving dignitaries around the city. Cohen envisioned a unit that would
analyze intelligence, run undercover operations and cultivate a network of
informants. In short, he wanted New York to have its own version of the CIA.
Cohen shared Commissioner Ray Kelly's belief that 9/11 had proved that the
police department could not simply rely on the federal government to prevent
terrorism in New York. "If anything goes on in New York," one former officer
recalls Cohen telling his staff in the early days, "it's your fault." Among
Cohen's earliest moves at the NYPD was making a request of his old
colleagues at CIA headquarters in Langley, Va. He needed someone to help
build this new operation, someone with experience and clout and, most
important, someone who had access to the latest intelligence so the NYPD
wouldn't have to rely on the FBI to dole out information. CIA Director George
Tenet responded by tapping Larry Sanchez, a respected veteran who had
served as a CIA official inside the United Nations. Often, when the CIA places
someone on temporary assignment, the other agency picks up the tab. In this
case, three former intelligence officials said, Tenet kept Sanchez on the CIA
payroll. When he arrived in New York in March 2002, Sanchez had offices at
both the NYPD and the CIA's station in New York, one former official said.
Sanchez interviewed police officers for newly defined intelligence jobs. He
guided and mentored officers, schooling them in the art of gathering
information. He also directed their efforts, another said. There had never
been an arrangement like it, and some senior CIA officials soon began
questioning whether Tenet was allowing Sanchez to operate on both sides of
the wall that's supposed to keep the CIA out of the domestic intelligence
business. "It should not be a surprise to anyone that, after 9/11, the Central
Intelligence Agency stepped up its cooperation with law enforcement on
counterterrorism issues or that some of that increased cooperation was in
New York, the site of ground zero," CIA spokeswoman Jennifer Youngblood
said. Just as at the CIA, Cohen and Sanchez knew that informants would have
to become the backbone of their operation. But with threats coming in from
around the globe, they couldn't wait months for the perfect plan. They came
up with a makeshift solution. They dispatched more officers to Pakistani
neighborhoods and, according to one former police official directly involved in
the effort, instructed them to look for reasons to stop cars: speeding, broken
tail lights, running stop signs, whatever. The traffic stop gave police an
opportunity to search for outstanding warrants or look for suspicious
behavior. An arrest could be the leverage the police needed to persuade
someone to become an informant. For Cohen, the transition from spying to
policing didn't come naturally, former colleagues said. When faced with a
decision, especially early in his tenure, he'd fall back on his CIA background.
Cutter said he and other uniformed officers had to tell Cohen, no, we can't
just slip into someone's apartment without a warrant. No, we can't just
conduct a search. The rules for policing are different. While Cohen was being
shaped by the police department, his CIA background was remaking the
department. But one significant barrier stood in the way of Cohen's vision.
Since 1985, the NYPD had operated under a federal court order limiting the
tactics it could use to gather intelligence. During the 1960s and 1970s, the
department had used informants and undercover officers to infiltrate anti-war
protest groups and other activists without any reason to suspect criminal
behavior. To settle a lawsuit, the department agreed to follow guidelines that
required "specific information" of criminal activity before police could monitor
political activity. In September 2002, Cohen told a federal judge that those
guidelines made it "virtually impossible" to detect terrorist plots. The FBI was
changing its rules to respond to 9/11, and Cohen argued that the NYPD must
do so, too. "In the case of terrorism, to wait for an indication of crime before
investigating is to wait far too long," Cohen wrote. U.S. District Judge Charles
S. Haight Jr. agreed, saying the old guidelines "addressed different perils in a
different time." He scrapped the old rules and replaced them with more
lenient ones. It was a turning point for the NYPD.With his newfound authority,
Cohen created a secret squad that would soon infiltrate Muslim
neighborhoods, according to several current and former officials directly
involved in the program.The NYPD carved up the city into more than a dozen
zones and assigned undercover officers to monitor them, looking for potential
trouble. At the CIA, one of the biggest obstacles has always been that U.S.
intelligence officials are overwhelmingly white, their mannerisms clearly
American. The NYPD didn't have that problem, thanks to its diverse pool of
officers. Using census data, the department matched undercover officers to
ethnic communities and instructed them to blend in, the officials said.
Pakistani-American officers infiltrated Pakistani neighborhoods, Palestinians
focused on Palestinian neighborhoods. They hung out in hookah bars and
cafes, quietly observing the community around them. The unit, which has
been undisclosed until now, became known inside the department as the
Demographic Unit, former police officials said. "It's not a question of profiling.
It's a question of going where the problem could arise," said Mordecai
Dzikansky, a retired NYPD intelligence officer who said he was aware of the
Demographic Unit. "And thank God we have the capability. We have the
language capability and the ethnic officers. That's our hidden weapon." The
officers did not work out of headquarters, officials said. Instead, they passed
their intelligence to police handlers who knew their identities. Cohen said he
wanted the squad to "rake the coals, looking for hot spots," former officials
recalled. The undercover officers soon became known inside the department
as rakers. A hot spot might be a beauty supply store selling chemicals used
for making bombs. Or it might be a hawala, a broker that transfers money
around the world with little documentation. Undercover officers might visit an
Internet cafe and look at the browsing history on a computer, a former police
official involved in the program said. If it revealed visits to radical websites,
the cafe might be deemed a hot spot. Ethnic bookstores, too, were on the list.
If a raker noticed a customer looking at radical literature, he might chat up
the store owner and see what he could learn. The bookstore, or even the
and Kelly have said their agencies have strong working relationships and said
reports of rivalry and disagreements are overblown. And the NYPD's out-ofstate operations have had success. A young Egyptian NYPD officer living
undercover in New Jersey, for example, was key to building a case against
Mohamed Mahmood Alessa and Carlos Eduardo Almonte. The pair was
arrested last year at John F. Kennedy Airport en route to Somalia to join the
terrorist group al-Shabab. Both pleaded guilty to conspiracy. Cohen has also
sent officers abroad, stationing them in 11 foreign cities. If a bomber blows
himself up in Jerusalem, the NYPD rushes to the scene, said Dzikansky, who
served in Israel and is the co-author of the forthcoming book "Terrorist
Suicide Bombings: Attack Interdiction, Mitigation, and Response." "I was there
to ask the New York question," Dzikansky said. "Why this location? Was there
something unique that the bomber had done? Was there any pre-notification.
Was there a security lapse?" All of this intelligence _ from the rakers, the
undercovers, the overseas liaisons and the informants _ is passed to a team
of analysts hired from some of the nation's most prestigious universities.
Analysts have spotted emerging trends and summarized topics such as
Hezbollah's activities in New York and the threat of South Asian terrorist
groups. They also have tackled more contentious topics, including drafting an
analytical report on every mosque within 100 miles of New York, one former
police official said. The report drew on information from mosque crawlers,
undercover officers and public information. It mapped hundreds of mosques
and discussed the likelihood of them being infiltrated by al-Qaida, Hezbollah
and other terrorist groups. For Cohen, there was only one way to measure
success: "They haven't attacked us," he said in a 2005 deposition. He said
anything that was bad for terrorists was good for NYPD. Though the CIA is
prohibited from collecting intelligence domestically, the wall between
domestic and foreign operations became more porous. Intelligence gathered
by the NYPD, with CIA officer Sanchez overseeing collection, was often
passed to the CIA in informal conversations and through unofficial channels, a
former official involved in that process said. By design, the NYPD was looking
more and more like a domestic CIA. "It's like starting the CIA over in the post9/11 world," Cohen said in "Protecting the City," a laudatory 2009 book about
the NYPD. "What would you do if you could begin it all over again? Hah. This
is what you would do." Sanchez's assignment in New York ended in 2004, but
he received permission to take a leave of absence from the agency and
become Cohen's deputy, former officials said. Though Sanchez's assignments
were blessed by CIA management, some in the agency's New York station
saw the presence of such a senior officer in the city as a turf encroachment.
Finally, the New York station chief, Tom Higgins, called headquarters, one
former senior intelligence official said. Higgins complained, the official said,
that Sanchez was wearing both hats, sometimes acting as a CIA officer,
sometimes as an NYPD official. The CIA finally forced him to choose: Stay with
the agency or stay with the NYPD. Sanchez declined to comment to the AP
about the arrangement, but he picked the NYPD. He retired last year and is
now a consultant in the Middle East. Last month, the CIA deepened its NYPD
ties even further. It sent one of its most experienced operatives, a former
station chief in two Middle Eastern countries, to work out of police
headquarters as Cohen's special assistant while on the CIA payroll. Current
and former U.S. officials acknowledge it's unusual but said it's the kind of
collaboration Americans expect after 9/11. Officials said revealing the CIA
officer's name would jeopardize national security. The arrangement was
described as a sabbatical. He is a member of the agency's senior
management, but officials said he was sent to the municipal police
department to get management experience. At the NYPD, he works
undercover in the senior ranks of the intelligence division. Officials are
adamant that he is not involved in actual intelligence-gathering. The NYPD
has faced little scrutiny over the past decade as it has taken on broad new
intelligence missions, targeted ethnic neighborhoods and partnered with the
CIA in extraordinary ways. The department's primary watchdog, the New York
City Council, has not held hearings on the intelligence division's operations
and former NYPD officials said council members typically do not ask for
details. "Ray Kelly briefs me privately on certain subjects that should not be
discussed in public," said City Councilman Peter Vallone. "We've discussed in
person how they investigate certain groups they suspect have terrorist
sympathizers or have terrorist suspects." The city comptroller's office has
audited several NYPD components since 9/11 but not the intelligence unit,
which had a $62 million budget last year. The federal government, too, has
done little to scrutinize the nation's largest police force, despite the massive
federal aid. Homeland Security officials review NYPD grants but not its
underlying programs. A report in January by the Homeland Security inspector
general, for instance, found that the NYPD violated state and federal
contracting rules between 2006 and 2008 by buying more than $4 million in
equipment through a no-bid process. NYPD said public bidding would have
revealed sensitive information to terrorists, but police never got approval
from state or federal officials to adopt their own rules, the inspector general
said. On Capitol Hill, where FBI tactics have frequently been criticized for their
effect on civil liberties, the NYPD faces no such opposition. In 2007, Sanchez
testified before the Senate Homeland Security Committee and was asked how
the NYPD spots signs of radicalization. He said the key was viewing innocuous
activity, including behavior that might be protected by the First Amendment,
as a potential precursor to terrorism. That triggered no questions from the
committee, which Sanchez said had been "briefed in the past on how we do
business." The Justice Department has the authority to investigate civil rights
violations. It issued detailed rules in 2003 against racial profiling, including
prohibiting agencies from considering race when making traffic stops or
assigning patrols. But those rules apply only to the federal government and
contain a murky exemption for terrorism investigations. The Justice
Department has not investigated a police department for civil rights
violations during a national security investigation. "One of the hallmarks of
the intelligence division over the last 10 years is that, not only has it gotten
extremely aggressive and sophisticated, but it's operating completely on its
own," said Dunn, the civil liberties lawyer. "There are no checks. There is no
oversight." The NYPD has been mentioned as a model for policing in the post9/11 era. But it's a model that seems custom-made for New York. No other
city has the Big Apple's combination of a low crime rate, a $4.5 billion police
budget and a diverse 34,000-person police force. Certainly no other police
department has such deep CIA ties. Perhaps most important, nobody else had
9/11 the way New York did. No other city lost nearly 3,000 people in a single
morning. A decade later, police say New Yorkers still expect the department
to do whatever it can to prevent another attack. The NYPD has embraced that
expectation. As Sanchez testified on Capitol Hill: "We've been given the
public tolerance and the luxury to be very aggressive on this topic."
The FBI encouraged and sometimes even paid Muslims to commit terrorist
acts during numerous sting operations after the 9/11 attacks, a human rights
group said in a report published Monday. "Far from protecting Americans,
including American Muslims, from the threat of terrorism, the policies
documented in this report have diverted law enforcement from pursuing real
threats," said the report by Human Rights Watch. Aided by Columbia
University Law School's Human Rights Institute, Human Rights Watch
examined 27 cases from investigation through trial, interviewing 215 people,
including those charged or convicted in terrorism cases, their relatives,
defense lawyers, prosecutors and judges. "In some cases the FBI may have
created terrorists out of law-abiding individuals by suggesting the idea of
taking terrorist action or encouraging the target to act, " the report said. In
the cases reviewed, half the convictions resulted from a sting operation, and
in 30 percent of those cases the undercover agent played an active role in
the plot. "Americans have been told that their government is keeping them
safe by preventing and prosecuting terrorism inside the US," said Andrea
Prasow, the rights group's deputy Washington director. "But take a closer look
and you realise that many of these people would never have committed a
crime if not for law enforcement encouraging, pressuring and sometimes
paying them to commit terrorist acts." The report cites the case of four
Muslim converts from Newburgh, New York who were accused of planning to
blow up synagogues and attack a US military base. A judge in that case "said
the government 'came up with the crime, provided the means, and removed
all relevant obstacles,' and had, in the process, made a terrorist out of a man
'whose buffoonery is positively Shakespearean in scope,'" the report said. The
rights group charged that the FBI often targets vulnerable people, with
mental problems or low intelligence. It pointed to the case of Rezwan
Ferdaus, who was sentenced to 17 years in prison at age 27 for wanting to
attack the Pentagon and Congress with mini-drones loaded with explosives.
An FBI agent told Ferdaus' father that his son "obviously" had mental health
problems, the report said. But that didn't stop an undercover agent from
conceiving the plot in its entirety, it said. "The US government should stop
treating American Muslims as terrorists-in-waiting ," the report concluded.
Insert Tag
Phelps 13
(Paulina, Author at the Seattle Globalist, Georgetown media group, Africa.redux media,
and Saratoga wire, Arab and Muslim communities react to NSA surveillance leak, June/25, Seattle
Globalist, http://seattleglobalist.com/2013/06/25/arab-and-muslim-nsa-surveillance-leak/14225,LS)
So the governments been spying on us? Arab and Muslim activists in Seattle say they arent surprised.
news broke earlier this month of the NSAs vast, intrusive surveillance
programs, U.S. citizens had the uncomfortable experience of suddenly feeling like suspects. Even for
When
the majority of Americans who say they approve of the program, it was hard not to rack your brain for
things you had said in a phone call or email that might have caught the governments attention. But that
was nothing new for Arabs, Muslims, South Asians and other groups who
have been subject to surveillance and prejudice since 9/11. President
Obama responded to the leak with assurances that nobody is listening to your
telephone calls. Instead, he said, the surveillance only takes place when they
may identify potential leads with respect to people that might engage in terrorism.
Devon Abdallah, secretary of the Arab American Community Coalition (AACC), based here in
Seattle, says that the kind of reasonable suspicion used to justify NSA surveillance often
amounts to little more than racial profiling. The reality is, in our society there is so
much institutional racism and subconscious stereotyping that people
naturally are going to just pay more attention to someone with an Arab name, Abdallah
feeling
said. Ive seen the people theyve deported that theyve seen as terrorists and I can guarantee you that
they arent. Damon Shadid, a Lebanese-American attorney who also works with the AACC believes that if
people knew the extent of the personal information that has been collected, they wouldnt be as
supportive of the program. The thing that disturbs me mostis this poll that is being cited all over the
Internet that is saying 60% of Americans are okay with [the surveillance system] the poll does not ask
the right questions. Shadid said. If they asked the question are you okay with your text messages being
read, or are you okay with the subject line of your email being read by the government the public would
have a completely different response. As a Lebanese-American who deals with international clients, all
the sudden my metadata may be looked at closer. [That]
is what is happening in
Egypt its not a good sign you can see this country going down that path
and its a concern because one of the greatest gifts people have here is to be free and the ability to
challenge authority. Ultimately all of these voices on the issue, including the person behind the leak, echo
feelings of betrayal by the government. And they seem to agree that the existing system is
Insert Tag
Kayyali 06
Since the terrorist acts of September 11, 2001, Arab Americans have regularly
been featured in the press as a group "of interest" to many federal agencies,
particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited
them for their language skills the FBI has hired 195 Arabic linguists since 9/11 although other agencies,
such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite
demand,
Arab Americans are the immigrants (and their descendents) from the
Arabic-speaking countries of the Middle East and North Africa. Under this classification,
Arabic-speaking countries include the members of the Arab League and range from
Morocco in the west to Iraq in the east (see sidebar). Individuals from Iran and
Definitions
Turkey, where the predominant languages are Farsi and Turkish, respectively, are not considered to be of
Arab origin even though these countries are part of the Middle East. According to the U.S. Census Bureau,
Arab Americans are those who responded to the 2000 census question about ancestry by listing a
predominantly Arabic-speaking country or part of the world as their place of origin. The main Arabspeaking countries cited in the 2000 census included Egypt, Iraq, Jordan, Lebanon, Morocco, Palestine, and
government and the average American, adding further weight to the term. Because some choose a
national identity, such as Lebanese or Egyptian, over the term Arab, the diversity of the community must
be recognized at the outset of any discussion about Arab Americans. In truth, there are hot debates about
whether there is one or many communities of Arab Americans because of the distance, both physical and
emotional, between various groups. In regards to religious affiliation among Arab Americans, surprisingly
few studies have been done. However, the Arab American Institute, based on a 2002 Zogby International
Among the Christians, 35 percent are Catholics (Maronites, Melkites, and Eastern Rite Catholics), 18
percent are Eastern Orthodox (Antiochian, Syrian, Greek, and Coptic Christians), and 10 percent are
Protestant. The high proportion of Christians among Arab Americans is partially due to the descendants of
Arab immigrants who arrived in the late 19th and early 20th centuries; they mostly came from Mount
Lebanon, an area inhabited by Maronite Christians and Druze that is now in Lebanon. Also, minority groups
Maronites and Orthodox Christians from Lebanon, Coptic Christians from Egypt, Shia' Muslims and
Chaldeans from Iraq, and Orthodox Christians from Palestine are immigrating to the United States today
in larger numbers than the majority Sunni Muslim population of the Middle East.
Europe, the Middle East, or North Africa." This distinction dates back to court decisions from 1913 to 1917
on the "whiteness" of Syrian and Palestinian immigrants. Arab Americans who received only the short form
of the 2000 census, which is sent to all U.S. households, could check the "white" box for race;
if they
self-identified as "other" and then identified themselves on the long form as a person from
the Middle East or North Africa, the Census Bureau reassigned them to the "white"
category. This classification system is in line with other federal guidelines on race and ethnic standards, as
set out by Directive 15 by the Office of Management and Budget, and therefore is present in many
administrative forms. Since the 2000 census, the Census Bureau has published two reports on Arab
Americans, both of which are based on the long form that asks about ancestry and is sent to only one-sixth
of all U.S. households. The first report, issued in 2003, reported that about 1.2 million people in the United
States reported Arab ancestry alone or in combination with another ancestry. The second report, issued in
2005, focused on the 850,000 people who reported at least one Arab ancestry and no non-Arab ancestries
(see Table 1 and Figure 1). Therefore, a person of British-Egyptian heritage would have been included in
the first report and excluded from the second. In both reports, the Census Bureau differs from the
Arab League membership definition in that it excludes those from Mauritania, Somalia, Djibouti, Sudan,
and the Comoros countries that are members of the Arab League and include large Arabic-speaking
the number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5 million
estimate of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage, unlike the
2005 Census report. Another way to examine the Arab-American population is to look at the foreign-born
population from Arab countries. Although the media portray the Arab-American population as wholly
foreign born, the 2005 census report found that only about 50 percent of Arabs in the United States were
foreign born; of these, about half were naturalized U.S. citizens and the other half were not citizens.
Therefore, half of the Arab Americans in 2005 report were either born in the United States or born abroad
to U.S.-citizen parents. Of the foreign born, 46 percent arrived between 1990 and 2000, compared to 42
percent of the total foreign-born population.
Immigrant and Nonimmigrant Flows Since 9/11 Many assume that the immigration of Arabs to the United
nationals admitted as immigrants to the United States, even though there was a drop in 2003. In 2005,
over 4,000 nationals from Egypt, Iraq, Lebanon, Morocco, Somalia, and Sudan, in addition to an unknown
to the United States as tourists, students, or temporary workers. The largest numerical drop between 2000
and 2004 (70 percent) has been in the number of tourist and business visas issued to individuals from Gulf
countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although
the
number of student visas issued to individuals from Arabic-speaking
countries dropped substantially. The greatest numerical drop, from 19,696 student visas
there was a decrease in the number of all incoming foreign students between 2001 and 2004,
in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf countries. The number of Egyptians who
One of the
first reasons cited for the decrease in the number of foreign students was increased
security measures, particularly the Patriot Act and its provision that required the
implementation of the Student and Exchange Visitor Information System ( SEVIS). SEVIS is an online
database that monitors international student compliance with immigration
laws by requiring all schools to be certified and to regularly update information on each foreign student,
entered on student visas dropped 52.7 percent between 2000 and 2004 (see Table 3).
including their visa type, status as a student (full-time enrollment is required), biographical information,
class registration, and current address. Recent reports by the Government Accountability Office (GAO) and
the Institute of International Education (IIE) found that the decline in the number of international students
is not due to SEVIS but, according to IIE, to "real and perceived difficulties in obtaining students visas
(especially in scientific and technical fields), rising U.S. tuition costs, vigorous recruitment activities by
other English-speaking nations, and perceptions abroad that it is more difficult for international students to
come to the United States." Increasing global competition for the best students has added to the drop in
the numbers of international students. While these reasons may be the most significant deterrents for all
international students, such observations do not adequately answer why the number of Arab students has
84,778 in 2000 to 25,005 in 2004, a 70.5 percent decrease. The number of Egyptian visitors dropped 51.5
percent, from 48,904 in 2000 to 23,742 in 2004. The decrease in the number of both visitors and students
from Morocco, Jordan, and Lebanon was also significant but lower than that of Egypt and the Gulf states.
The causes for these declines have not been investigated although
Institute of Justice and funded by the National Institute of Justice, a research agency of the U.S.
terrorism under the act is unclear. In June 2005, President Bush stated that over 400 charges were made as
Under the Patriot Act, anyone asked for information about an individual or group of people by the FBI has a
gag order placed on them, regardless of whether the identity of the individual becomes public knowledge.
persons abroad. Despite the former NSA directors reassurances that the program was targeted and
organizations filed lawsuits challenging the legality of warrantless domestic spying as well as the release of
thousands of customer phone records by BellSouth, AT&T, and Verizon, citing violation of privacy. In
addition, in 2003, the Department of Homeland Security implemented the National Security Entry/Exit
some countries Iraq, Iran, Libya, Sudan, and Syria are still bound by the
NSEERS requirements. As a result of NSEERS and other initiatives, the number of
deportations from the Arab countries on the NSEERS list and an additional five
predominantly Muslim countries also on the list increased 31.4 percent in the
two-year period following 9/11. The percentile rise in deportation orders for
nationals of other countries was 3.4 percent in comparison . Human rights,
civil liberties, and Arab-American organizations believe these facts point to a trend of
profiling and patterns of selective enforcement of immigration laws .
Together, these security and immigration measures have given the impression
that the U.S. government believes Arabs and Muslims to be a
suspicious and dangerous group to whom constitutional rights and
liberties do not apply.
One of the long-term consequences of 9/11 was a questioning of
identity and the outward expression of ethnicity and religion. In the last
Looking Ahead
five years, many Arab Americans have asked themselves, How do I present myself when the mention of
German Americans after World War I and Japanese Americans after World War II others have channeled
this dilemma into artistic expression. As a result, Arab-American arts have blossomed. Fiction and poetry
particularly by Arab-American women art exhibits, and comedy acts have found their way into the public
finding the warrantless searches or the release of phone records to be unconstitutional and a violation of
due process or privacy. While the flow of immigrants has remained slow but steady, the number of
students and visitors has slowed down substantially. Although these decreases are unlikely to isolate Arab
Americans from their friends and family in the Middle East and North Africa, it may indicate a decrease in
the interactions between people who are Arab and live in the Middle East and Americans who live in the
United States. In the current political climate, it seems there is
Since the terrorist acts of September 11, 2001, Arab Americans have regularly
been featured in the press as a group "of interest" to many federal agencies,
particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited
them for their language skills the FBI has hired 195 Arabic linguists since 9/11 although other agencies,
such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite
Americans Muslim? Has the immigration rate of Arab Americans decreased as a result of 9/11?
What has been the net fall-out effect of 9/11 on this group? This article will provide definitions, look at flow
data from recent years, and examine the trend of immigration and security policies affecting Arab
sidebar). Individuals from Iran and Turkey, where the predominant languages are Farsi and Turkish,
respectively, are not considered to be of Arab origin even though these countries are part of the Middle
East. According to the U.S. Census Bureau, Arab Americans are those who responded to the 2000 census
question about ancestry by listing a predominantly Arabic-speaking country or part of the world as their
place of origin. The main Arab-speaking countries cited in the 2000 census included Egypt, Iraq, Jordan,
Lebanese or Egyptian, over the term Arab, the diversity of the community must be recognized at the
outset of any discussion about Arab Americans. In truth, there are hot debates about whether there is one
or many communities of Arab Americans because of the distance, both physical and emotional, between
various groups. In regards to religious affiliation among Arab Americans, surprisingly few studies have
been done. However, the Arab American Institute, based on a 2002 Zogby International poll, estimates
Muslim Arab-American population includes Sunni, Shi'a, and Druze. Among the Christians, 35 percent are
Catholics (Maronites, Melkites, and Eastern Rite Catholics), 18 percent are Eastern Orthodox (Antiochian,
Syrian, Greek, and Coptic Christians), and 10 percent are Protestant. The high proportion of Christians
among Arab Americans is partially due to the descendants of Arab immigrants who arrived in the late 19th
and early 20th centuries; they mostly came from Mount Lebanon, an area inhabited by Maronite Christians
and Druze that is now in Lebanon. Also, minority groups Maronites and Orthodox Christians from
Lebanon, Coptic Christians from Egypt, Shia' Muslims and Chaldeans from Iraq, and Orthodox Christians
from Palestine are immigrating to the United States today in larger numbers than the majority Sunni
Muslim population of the Middle East. How Arab Americans Are Counted Unlike Asian, white, or black,
"Arab" is not a racial category for the Census Bureau. Rather, Arab
Americans are considered white, defined by the Census Bureau as "a person having
origins in any of the original peoples of Europe, the Middle East, or North Africa." This distinction
dates back to court decisions from 1913 to 1917 on the "whiteness"
of Syrian and Palestinian immigrants. Arab Americans who received only the short
form of the 2000 census, which is sent to all U.S. households, could check the "white" box for race; if
they self-identified as "other" and then identified themselves on the long form as a person
from the Middle East or North Africa, the Census Bureau reassigned them to the
"white" category. This classification system is in line with other federal guidelines on race
and ethnic standards, as set out by Directive 15 by the Office of Management and Budget, and therefore
In both reports,
the Census Bureau differs from the Arab League membership definition in that it excludes
those from Mauritania, Somalia, Djibouti, Sudan, and the Comoros
heritage would have been included in the first report and excluded from the second.
countries that are members of the Arab League and include large Arabic-speaking populations. Arab-
number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5 million estimate
of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage, unlike the 2005
Census report. Another way to examine the Arab-American population is to look at the foreign-born
population from Arab countries. Although the media portray the Arab-American population as wholly
naturalized U.S. citizens and the other half were not citizens. Therefore, half of the Arab Americans in 2005
report were either born in the United States or born abroad to U.S.-citizen parents. Of the foreign born, 46
percent arrived between 1990 and 2000, compared to 42 percent of the total foreign-born population.
Immigrant and Nonimmigrant Flows Since 9/11 Many assume that the immigration of Arabs to the United
States decreased after 9/11. However, the numbers of those admitted as immigrants or those who became
legal permanent residents from Arabic-speaking countries has remained level at around four percent of the
total number of foreign nationals admitted as immigrants to the United States, even though there was a
drop in 2003. In 2005, over 4,000 nationals from Egypt, Iraq, Lebanon, Morocco, Somalia, and Sudan, in
addition to an unknown number of Palestinians, became permanent residents (see Table 2). What has
dropped drastically post-9/11 is the number of nonimmigrants who are issued visas and admitted to the
United States as tourists, students, or temporary workers. The largest numerical drop between 2000 and
2004 (70 percent) has been in the number of tourist and business visas issued to individuals from Gulf
countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although
there was a decrease in the number of all incoming foreign students between 2001 and 2004, the number
of student visas issued to individuals from Arabic-speaking countries dropped substantially. The greatest
numerical drop, from 19,696 student visas in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf
countries. The number of Egyptians who entered on student visas dropped 52.7 percent between 2000 and
2004 (see Table 3). One of the first reasons cited for the decrease in the number of foreign students was
increased security measures, particularly the Patriot Act and its provision that required the implementation
of the Student and Exchange Visitor Information System (SEVIS). SEVIS is an online database that monitors
international student compliance with immigration laws by requiring all schools to be certified and to
regularly update information on each foreign student, including their visa type, status as a student (fulltime enrollment is required), biographical information, class registration, and current address. Recent
reports by the Government Accountability Office (GAO) and the Institute of International Education (IIE)
found that the decline in the number of international students is not due to SEVIS but, according to IIE, to
"real and perceived difficulties in obtaining students visas (especially in scientific and technical fields),
rising U.S. tuition costs, vigorous recruitment activities by other English-speaking nations, and perceptions
abroad that it is more difficult for international students to come to the United States." Increasing global
competition for the best students has added to the drop in the numbers of international students. While
these reasons may be the most significant deterrents for all international students, such observations do
not adequately answer why the number of Arab students has been disproportionately reduced. The
numbers of visitors for business and pleasure has similarly decreased. Businessmen and tourists from the
Gulf went from 84,778 in 2000 to 25,005 in 2004, a 70.5 percent decrease. The number of Egyptian
visitors dropped 51.5 percent, from 48,904 in 2000 to 23,742 in 2004. The decrease in the number of both
visitors and students from Morocco, Jordan, and Lebanon was also significant but lower than that of Egypt
and the Gulf states. The causes for these declines have not been investigated although some researchers
cite visa delays and fears of discrimination. Security-Related Policy and Arab Americans Another
consequence of 9/11 has been the increased monitoring of Arab and Muslim Americans for security
reasons. Although most FBI interviews of Arab and/or Muslim Americans have been conducted voluntarily,
the increased attention has caused tension, nervousness, and concern to many individuals, as well as
community leaders and organizations. A two-year study conducted by the Vera Institute of Justice and
funded by the National Institute of Justice, a research agency of the U.S. Department of Justice, confirmed
that 9/11 had a substantial impact on Arab Americans and their perceptions of federal agencies,
particularly the FBI. The report states, "Although community members also reported increases in hate
victimization, they expressed greater concern about being victimized by federal policies and practices than
by individual acts of harassment or violence." A major issue of concern remains the 2001 Patriot Act and its
provisions that allow increased surveillance without approved court orders. The number of people who
have been charged or convicted for terrorism under the act is unclear. In June 2005, President Bush stated
that over 400 charges were made as a result of terrorism investigations, but in almost all of these cases,
the federal prosecutors chose to charge the plaintiffs with nonterror charges, such as immigration
violations. Under the Patriot Act, anyone asked for information about an individual or group of people by
the FBI has a gag order placed on them, regardless of whether the identity of the individual becomes
public knowledge. In December 2005, President Bush confirmed that he authorized warrantless searches in
which the National Security Agency (NSA) monitored phone calls and emails from possibly thousands of
citizens and others in the United States who contacted persons abroad. Despite the former NSA directors
reassurances that the program was targeted and focused on persons associated with Al Qaeda, Arab
Americans are concerned about the legality of warrantless searches, and the program has increased
feelings of being targeted and put under surveillance due to their ethnic background and contact with
friends and family in the Middle East. In 2006, several organizations filed lawsuits challenging the legality
of warrantless domestic spying as well as the release of thousands of customer phone records by
BellSouth, AT&T, and Verizon, citing violation of privacy. In addition, in 2003, the Department of Homeland
Security implemented the National Security Entry/Exit Registration System (NSEERS), which required males
over the age of 16 from certain countries who had entered the United States since October 2002 to report
to immigration offices to be photographed and fingerprinted on an annual basis. Shortly after NSEERS was
implemented, immigration authorities fingerprinted, photographed, and questioned 80,000 men. It is not
known how many individuals were Arab, but 19 out of the 25 countries on the NSEERS list were Arabicspeaking. Although the main features of this program were suspended in December 2003, nationals of
some countries Iraq, Iran, Libya, Sudan, and Syria are still bound by the NSEERS requirements. As a
result of NSEERS and other initiatives, the number of deportations from the Arab countries on the NSEERS
list and an additional five predominantly Muslim countries also on the list increased 31.4 percent in the
two-year period following 9/11. The percentile rise in deportation orders for nationals of other countries
was 3.4 percent in comparison. Human rights, civil liberties, and Arab-American organizations believe
these facts point to a trend of profiling and patterns of selective enforcement of immigration laws.
Together, these security and immigration measures have given the impression that the U.S. government
believes Arabs and Muslims to be a suspicious and dangerous group to whom constitutional rights and
liberties do not apply.
Since the terrorist acts of September 11, 2001, Arab Americans have regularly
been featured in the press as a group "of interest" to many federal agencies,
particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited
them for their language skills the FBI has hired 195 Arabic linguists since 9/11 although other agencies,
such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite
used, it remains misunderstood. Who exactly is an Arab American? Are all Arab Americans Muslim? Has the
immigration rate of Arab Americans decreased as a result of 9/11? What has been the net fall-out effect of
9/11 on this group? This article will provide definitions, look at flow data from recent years, and examine
the trend of immigration and security policies affecting Arab Americans. Definitions Arab Americans are
the immigrants (and their descendents) from the Arabic-speaking countries of the Middle East and North
Africa. Under this classification, Arabic-speaking countries include the members of the Arab League and
range from Morocco in the west to Iraq in the east (see sidebar). Individuals from Iran and Turkey, where
the predominant languages are Farsi and Turkish, respectively, are not considered to be of Arab origin even
though these countries are part of the Middle East. According to the U.S. Census Bureau, Arab Americans
are those who responded to the 2000 census question about ancestry by listing a predominantly Arabicspeaking country or part of the world as their place of origin. The main Arab-speaking countries cited in the
2000 census included Egypt, Iraq, Jordan, Lebanon, Morocco, Palestine, and Syria. Although some people
from Arabic-speaking countries identify themselves as Arab, many do not but are regularly defined as such
in the United States by the government and the average American, adding further weight to the term.
Because some choose a national identity, such as Lebanese or Egyptian, over the term Arab, the diversity
of the community must be recognized at the outset of any discussion about Arab Americans. In truth, there
are hot debates about whether there is one or many communities of Arab Americans because of the
distance, both physical and emotional, between various groups. In regards to religious affiliation among
Arab Americans, surprisingly few studies have been done. However, the Arab American Institute, based on
a 2002 Zogby International poll, estimates that 63 percent of Arab Americans are Christian, 24 percent are
Muslim, and 13 percent belong to another religion or have no religious affiliation. The Muslim ArabAmerican population includes Sunni, Shi'a, and Druze. Among the Christians, 35 percent are Catholics
(Maronites, Melkites, and Eastern Rite Catholics), 18 percent are Eastern Orthodox (Antiochian, Syrian,
Greek, and Coptic Christians), and 10 percent are Protestant. The high proportion of Christians among Arab
Americans is partially due to the descendants of Arab immigrants who arrived in the late 19th and early
20th centuries; they mostly came from Mount Lebanon, an area inhabited by Maronite Christians and
Druze that is now in Lebanon. Also, minority groups Maronites and Orthodox Christians from Lebanon,
Coptic Christians from Egypt, Shia' Muslims and Chaldeans from Iraq, and Orthodox Christians from
Palestine are immigrating to the United States today in larger numbers than the majority Sunni Muslim
population of the Middle East. How Arab Americans Are Counted Unlike Asian, white, or black, "Arab" is not
a racial category for the Census Bureau. Rather, Arab Americans are considered white, defined by the
Census Bureau as "a person having origins in any of the original peoples of Europe, the Middle East, or
North Africa." This distinction dates back to court decisions from 1913 to 1917 on the "whiteness" of Syrian
and Palestinian immigrants. Arab Americans who received only the short form of the 2000 census, which is
sent to all U.S. households, could check the "white" box for race; if they self-identified as "other" and then
identified themselves on the long form as a person from the Middle East or North Africa, the Census Bureau
reassigned them to the "white" category. This classification system is in line with other federal guidelines
on race and ethnic standards, as set out by Directive 15 by the Office of Management and Budget, and
therefore is present in many administrative forms. Since the 2000 census, the Census Bureau has
published two reports on Arab Americans, both of which are based on the long form that asks about
ancestry and is sent to only one-sixth of all U.S. households. The first report, issued in 2003, reported that
about 1.2 million people in the United States reported Arab ancestry alone or in combination with another
ancestry. The second report, issued in 2005, focused on the 850,000 people who reported at least one Arab
ancestry and no non-Arab ancestries (see Table 1 and Figure 1). Therefore, a person of British-Egyptian
heritage would have been included in the first report and excluded from the second. In both reports, the
Census Bureau differs from the Arab League membership definition in that it excludes those from
Mauritania, Somalia, Djibouti, Sudan, and the Comoros countries that are members of the Arab League
and include large Arabic-speaking populations. Arab-American organizations estimate that the Census
Bureau counted only one of every three Arab Americans in 2000, and therefore these organizations
estimate the number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5
million estimate of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage,
unlike the 2005 Census report. Another way to examine the Arab-American population is to look at the
foreign-born population from Arab countries. Although the media portray the Arab-American population as
wholly foreign born, the 2005 census report found that only about 50 percent of Arabs in the United States
were foreign born; of these, about half were naturalized U.S. citizens and the other half were not citizens.
Therefore, half of the Arab Americans in 2005 report were either born in the United States or born abroad
to U.S.-citizen parents. Of the foreign born, 46 percent arrived between 1990 and 2000, compared to 42
percent of the total foreign-born population. Immigrant and Nonimmigrant Flows Since 9/11 Many assume
that the immigration of Arabs to the United States decreased after 9/11. However, the numbers of those
admitted as immigrants or those who became legal permanent residents from Arabic-speaking countries
has remained level at around four percent of the total number of foreign nationals admitted as immigrants
to the United States, even though there was a drop in 2003. In 2005, over 4,000 nationals from Egypt, Iraq,
Lebanon, Morocco, Somalia, and Sudan, in addition to an unknown number of Palestinians, became
and 2004 (70 percent) has been in the number of tourist and business visas issued to individuals from Gulf
countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although
the
number of student visas issued to individuals from Arabic-speaking
countries dropped substantially. The greatest numerical drop, from 19,696 student visas
there was a decrease in the number of all incoming foreign students between 2001 and 2004,
in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf countries. The number of Egyptians who
the first
reasons cited for the decrease in the number of foreign students was increased
security measures, particularly the Patriot Act and its provision that required the
implementation of the Student and Exchange Visitor Information System ( SEVIS). SEVIS is an online
database that monitors international student compliance with
immigration laws by requiring all schools to be certified and to regularly update information on
entered on student visas dropped 52.7 percent between 2000 and 2004 (see Table 3). One of
each foreign student, including their visa type, status as a student (full-time enrollment is required),
biographical information, class registration, and current address. Recent reports by the Government
Accountability Office (GAO) and the Institute of International Education (IIE) found that the decline in the
number of international students is not due to SEVIS but, according to IIE, to "real and perceived difficulties
in obtaining students visas (especially in scientific and technical fields), rising U.S. tuition costs, vigorous
recruitment activities by other English-speaking nations, and perceptions abroad that it is more difficult for
international students to come to the United States." Increasing global competition for the best students
has added to the drop in the numbers of international students. While these reasons may be the most
significant deterrents for all international students, such observations do not adequately answer why the
decrease in the number of both visitors and students from Morocco, Jordan, and Lebanon was also
significant but lower than that of Egypt and the Gulf states. The causes for these declines have not been
concern about being victimized by federal policies and practices than by individual acts of harassment or
issue of concern remains the 2001 Patriot Act and its provisions that allow
increased surveillance without approved court orders. The number of people
violence." A major
who have been charged or convicted for terrorism under the act is unclear. In June 2005, President Bush
stated that over 400 charges were made as a result of terrorism investigations, but in almost all of these
cases, the federal prosecutors chose to charge the plaintiffs with nonterror charges, such as immigration
violations. Under the Patriot Act, anyone asked for information about an individual or group of people by
the FBI has a gag order placed on them, regardless of whether the identity of the individual becomes
contacted persons abroad. Despite the former NSA directors reassurances that the program was targeted
and focused on persons associated with Al Qaeda,
immigration laws. Together, these security and immigration measures have given
the impression that the U.S. government believes Arabs and Muslims
to be a suspicious and dangerous group to whom constitutional
rights and liberties do not apply. Looking Ahead One of the long-term
consequences of 9/11 was a questioning of identity and the outward
expression of ethnicity and religion. In the last five years, many Arab Americans
have asked themselves, How do I present myself when the mention
of my ethnicity and/or religion is enough to make others
uncomfortable? While some have decided to hide their heritage or
privilege another ethnic background also the reaction of some German Americans after World War I
and Japanese Americans after World War II others have channeled this dilemma into artistic expression.
As a result, Arab-American arts have blossomed. Fiction and poetry particularly by Arab-American
women art exhibits, and comedy acts have found their way into the public domain, giving Arab
surveillance that dominates many local and national-level discussions between Arab Americans
and these agencies is not likely to decrease unless pending lawsuits result in the courts
finding the warrantless searches or the release of phone records to be unconstitutional and a violation of
due process or privacy.
government's surveillance programs, has argued that the surveillance programs are necessary if terrorist attacks are to
be stopped. 58Link to the text of the note Other major political figures, like Robert Mueller, the current director of the FBI,
assert that the loss of privacy for everyday Americans is justified because the eavesdropping has thwarted terrorist plots.
59Link to the text of the note In an address to Congress in 2013, Mueller stated that the "challenge in a position such as I
have held in the last 11 years is to [444] balance on the one hand the security of the nation and on the other hand the
the American people. Over the years, the FBI's actions have had a
dramatic chilling efect on the ability of Muslims to express their
political views. Motivated by such pressures from the government, many
community leaders around the country have since attempted to suppress
political expression in mosques and community centres. But absent such
healthy community spaces through which to channel passions for
humanitarian concerns around the globe, it actually becomes more likely that
young Muslims could channel their frustrations through alternative modes of
oppositional politics. This type of quietist, disaffected atmosphere sanitised of
all political expression is precisely the environment in which agent
provocateurs thrive. Exploiting poverty In some cases, there is not even any
"talk" to motivate the FBI into infiltrating communities. The Liberty City case
with which Al Jazeera's investigative film begins concerns a group of
impoverished black men in Florida with no history of political activism or
inflammatory speech. Nevertheless, the FBI sent in "The Closer" a fast-talking
informant named Elie Assaad who operated as the ringleader for an alleged
plot to blow up the Sears Tower in Chicago. Swaying the impressionable and
impoverished young men with promises of everything from shoes to wear to
large sums of cash, Assaad enlists Rothschild Augustine and six others in his
conspiracy. The use of informants to target communities is one of the
most alarming trends to have developed since 9/11, as it threatens
to undo the fabric of a free society. In relaying this story to Al Jazeera's
investigators, Assaad and Augustine reveal a number of disturbing practices
in the concocted plot. The FBI specifically selected its own south Florida
offices as a surveillance target, attempting to position itself as the victim of
the conspiracy rather than the originator of it, despite the fact that there is
no indication that the men even knew where or what it was. The ceremonial
oath of allegiance to al-Qaeda that Assaad administered to the seven men
displayed what can only be described as a symbol of the cartoonish imagery
with which many in the US government associate Islam and Muslims. Perhaps
most worrisome in the case of the Liberty City 7, and an eerily similar case in
New York, is the ways in which the FBI has exploited the endemic poverty and
social problems from drug use to lack of education that are prevalent within
some black communities across the US in order to construct the perception of
a terrorist threat. In the latter case, the Newburgh Four were promised a
payment of $250,000 by a government informant who they hoped to
manipulate in turn. The Newburgh Sting is an HBO documentary, also
premiering soon, which chronicles the government's excesses in carrying out
this plot and the devastation it has caused to an impoverished community. A
startling report utilising the Department of Justice's internal statistics recently
stated that in the decade after 9/11, 94.2 percent of federal terrorism
convictions were obtained, at least in part, on the basis of preemptive
prosecutions. Given how pervasive this practice has been, it is noteworthy
that American Muslim civil rights groups have not developed a coordinated
response to what has plainly become a widespread use of informants
nationwide. In some instances, they have even attempted to downplay the
problem of preemptive prosecutions, as in one report by a prominent
American Muslim organisation that states that "while the numbers clearly
show informants are frequently used by federal law enforcement, a majority
of these cases do not involve them at all." The use of informants to target
communities is one of the most alarming trends to have developed since
9/11, as it threatens to undo the fabric of a free society. That these recent
investigative films have laid bare this troubling phenomenon and
displayed its consequences for all to see, is a critical first step in
confronting its damaging efect not only on the vulnerable American
Muslim community but on American society as a whole.
the NSA documents do not prove that the government has been
systematically monitoring the communications of political dissidents, Jaffer
notes that some of the most abusive surveillance practices carried out by the
FBI during the 1960s were arguably legal at a time when many Americans
believed that the groups targeted by Hoovers FBIincluding antigovernment activists on the left and rightposed a threat to the country.
Some of the governments surveillance practices today are
reminiscent of those earlier abusive practices, Jafer says. Todays
American-Muslim activists occupy the same position that civil-rights
and anti-war activists occupied during the 1960s. Current and former
law enforcement officials reject that analogy, and say that the FISA process is
too rigorous to permit any abuse. Still, several acknowledge that political
speech is sometimes viewed as a sufficient reason to launch an investigation
that can culminate in full-blown surveillance. If you are a political activist
calling for violent jihadyes, that could trigger an investigation, says Marion
Spike Bowman, the top FBI lawyer whose office handled all law
enforcement requests for FISA surveillance under the Clinton and Bush
administrations. Bowman stresses that such investigations are launched only
when the bureau believes that speech has crossed the line into incitement.
When Edward Snowden turned over a trove of NSA documents last year, he
explained that he included the spreadsheet of monitored emails because he
wanted to give people subjected to electronic surveillance the opportunity to
challenge the spying as unconstitutional. For years, the government has
succeeded in having such challenges dismissed on the ground that the
various plaintiffs lack standing to sue because they could not prove that they
were personally targeted. Thanks to Snowdens disclosures, those seeking to
obtain such a ruling now have specific cases of surveillance against American
citizens to examine. So do those charged with reforming the FISA process.
Richard Clarke, a former counterterrorism official in the Clinton and Bush
administrations, served on the recent White House intelligence review panel
convened to address concerns raised by the Snowden revelations. If he had
seen the NSA spreadsheet, Clarke says, he would have asked more questions
about the process, and reviewed individual FISA warrants. Knowing that, I
would specifically ask the Justice Department: How many American citizens
are there active FISAs on now? he says. And without naming names, tell me
what categories they fall intohow many are counterterrorism,
counterintelligence, espionage cases? Wed want to go through [some
applications], and frankly, we didnt. Its not something that five part-time
guys can dorummage through thousands of FISA warrants. The FISA
recap spreadsheet offers a revealing if incomplete glimpse into the murky
world of government surveillance. Each email address is accompanied by a
date that appears to denote the beginning of surveillance, and another that
indicates when it was set to expire. A column called Collection Status
indicates whether the surveillance was terminated, sustained, or
pending as of a particular date. In some cases, the spreadsheet also names
the federal agency that requested the surveillance, and a terrorist group,
target, or foreign power affiliated with the email address. In addition, each
address has a corresponding Case Notation code beginning with the prefix
XX.SQFa designation that, according to other documents in the Snowden
archive, is assigned to all FISA accounts as a unique identifier. The five
Americans whose email accounts were placed on the list come from
diferent backgrounds, and hold diferent religious and political
views. None was designated on the list as connected to a foreign
power. Some have come under sharp public scrutiny for their
activities on behalf of Muslim-Americans, and several have been
investigated by the government. But despite being subjected to
what appears to be long periods of government surveillance, none
has been charged with a crime, let alone convincingly linked to
terrorism or espionage on behalf of a foreign power. Taken together,
their personal stories raise disturbing questions about who the
government chooses to monitor, and why.
AT: Islamaphobia K
Domestic surveillance of Muslim populations is rooted in
racialized fear of the other that underpins BOTH a
massive authoritarian police state as well as the broader
War on Terror.
Anti-blackness is not the root cause of this aff either. BUT the aff understands
the history of surveillance against the black body and the way that it is now
being operationalized against Muslim populations.
these informants and analysts who are assigned to Muslim populations in the United States is unknown but
disturbing experience of seeing their names mentioned in government files, along with details of their
private lives. Numerous businesses, cafs, restaurants, and mosques in New York are aware that the NYPD
considers them hotspots and deploys informants to monitor them. And the recent outing of a small number
of NYPD informants has meant some Muslims in New York have found that relationships they thought of as
genuine friendships were actually covert attempts to gather intelligence.65
There is a wide
consensus among the international community that democratic
values, including the rule of law, should be universal furthered in
all nationsbecause these values preserve and protect human
dignity, facilitate accountability in government, and allow access to
the political process.10 Reflecting its own growing commitment to fostering democracy abroad,
the United States has formally incorporated rule-of-law promotion in
its foreign assistance eforts in conjunction with traditional
monetary aid .11 The rule of law is increasingly considered one of the
most valuable American exports to developing and transitioning
nations .12 Effective administration of the rule of law requires an independent, transparent, and
accountable judiciary.13 Because of the experience and expertise our federal
judges gain in their domestic role, they are well positioned to
promote the rule of law abroad. 14 And indeed, federal judges have
played a significant role in the efort to advance the rule of law and
the democratic values essential to it in other parts of the world. Each
year, dozens of federal judges assist in presenting seminars abroad
that educate and train judges in other countries on a host of topics
including how to oversee a case, how to write an opinion, and the
importance of impartiality. I have had the privilege of participating in at least a dozen such
good.8 It stands alone in terms of its extensive international endorsement.9
programs. Beyond the exhilarating human experiences these programs have provided me, I have gained
some background in their structure, objectives, and efficacy. My experience has also given me reason to
pause and consider some of the tensions created by the participation of the federal judiciary in efforts to
promote the rule of law abroad. One of the more sensitive concerns relates to the federal judiciarys
involvement in matters that touch upon foreign policy, a province conferred by the Constitution to the
politically accountable branches of government.15 Judicial participation in these efforts may also raise
questions concerning government funding and compliance with judicial ethical obligations. That said ,
JI Adv Rwanda
Judicial Independence in Rwanda is good reform in 2003
prove
Rugege 07 (Sam Rugege, Chief Justice in Rwanda who was
educated at Makerere University and Yale Law school and Oxford
University in England, Judicial Independence in Rwanda,
http://www.mcgeorge.edu/Documents/Conferences/JUDIND_RUGE
GE_MASTER.pdf, Published in 2007, Accessed July 13 2015, CMT)
Before the 2003-2004 judicial reform in Rwanda, there was
substantial corruption among judges, court clerks, and other judicial
officers. As a result of these reforms, a number of measures were
taken and institutional mechanisms were put in place to combat
corruption in the judiciary. First, there was a vetting exercise. The
employment of all judges and other court personnel was terminated,
and a recruitment exercise took place based on certain criteria. First,
all potential judges have to be legally qualifiedthey must have a
minimum of a Bachelor of Laws degree. Part of the problem causing
corruption was that judges were not legally qualified, and the temptation to
make judicial decisions based on considerations other than law was much
higher. Second, they have to be persons of integrity. Those who had a
record of corruption or misconduct were excluded. Finally, in addition
to the rigorous selection process, there is now a Code of Ethics30 for
judges that, among other things, requires impartiality, integrity, and
diligence. Article 7 states that [i]n particular a judge shall refrain from acts
of corruption and other related offences and fight against it in an exemplary
manner. Judges and court personnel with a record of corruption are
dismissed. The Superior Council of the Judiciary has a committee on
discipline which investigates allegations of corruption and other forms of
misconduct against judges and other court personnel. Before a final decision
is taken by the Council, the accused official is given an opportunity to be
heard.31
AT: JI US Inevitable
Separation of powers guarantees judicial Independence in
the United States
Ragsdale 15 (Bruce Ragsdale, served as director of the Federal
Judicial History Office at the Federal Judicial Center and as
associate historian of the U.S. House of Representatives, Judicial
Independence and the Federal Courts, fjc.gov,
http://www.fjc.gov/public/pdf.nsf/lookup/JudicialIndependence.pdf/
$file/JudicialIndependence.pdf, Published in 2006, Accessed on
July 13 2015, CMT)
A central principle of the United States system of government holds that
judges should be able to reach decisions free from political pressure.
The framers of the Constitution shared a commitment to judicial
independence, and they organized the new government to ensure that
federal judges would have a proper measure of independence from the
executive and legislative branches. The Constitution guaranteed that
judges would serve during good behavior and would be protected
from any reduction in their salaries, thus preventing removal by a
President who opposed their judicial philosophy and congressional
retaliation against unpopular decisions. These twin foundations of
judicial independence were well established in the British judicial system of
the eighteenth century and had been enacted by many of the new state
constitutions following independence from Great Britain. But the
constitutional outline for the judiciary also ensured that the court system
would always be subject to the political process and thus to popular
expectations. The Constitutions provision for such inferior courts as the
Congress may from time to time ordain and establish, granted the legislative
branch the most powerful voice in deciding the structure and jurisdiction of
the nations court system. The appointment of judges by the President, with
the advice and consent of the Senate, further ensured that important aspects
of the judiciary would be part of the political process. The inherent tension
between provisions for judicial independence and the Judicial Independence
and the Federal Judiciary ~ Federal Judicial Center 2 elected branches
authority to define the court system has led to recurring debates on judicial
tenure and the federal courts jurisdiction. Throughout United States
history, unpopular court decisions and the general authority of the
federal judiciary have prompted calls to limit judges terms of office,
to define more narrowly the jurisdiction of the federal courts, or to
limit judicial reviewthe courts authority to determine the
constitutionality of laws. Underlying the debates on judicial independence
have been basic questions about the proper balance of Congresss authority
to define the court system and the need to protect a judges ability to reach
decisions independent of political pressure. The debates have also addressed
the extent to which the judiciary should be independent of popular opinion in
especially direct case interference, both by local and central political actors. This low degree of judicial
independence is explained by the regime-related theory and is therefore an expected finding. Political
authorities interfere in order to sideline political opponents. In ordinary criminal cases, there also appears
to be a quite low degree of judicial independence. This is unexpected and in contrast to previous theory
stating that political actors lack incentives to interfere in non-political matters, such as ordinary criminal
political authorities are concerned with social and political stability. In turn, the police have been politically
empowered by the central authorities. All this has affected the independence of the judiciary in ordinary
vital element in economic and political stability. Economic and political actors shall have faith in an
independent and neutral arbitrator to deal with their disputes.
investigation with the examination and clarification of the existing rules and regulations. The judges
who use the existing rules, judicial process and unbiased application of the rule to support their decisions
regarding any dispute grant a predictable feature to their decisions . Predictability
enables the economic and political actors to set their behavior accordingly and this way, they would
Secondly, the
existence of independent courts is necessary to support the
individual freedom and right. Individual right might be respected by the constitutions or
other rules of the governments, it is however necessary for an independent and
unbiased authority to deal with the individual complaints and verdict the
noticeably help their communitys political stability and economic welloff2.
realization of their rights. The effective way of doing this issue by the judges is bound to ensure that there
is no threat including dismissal, downgrading or even lowering monthly wages or benefits facing them3.
Thirdly, the existence of independent courts is the inevitable means to obligate the government to follow
powers would obviously provide the setting for disputes. Some disputes can be settled using political
arrangements and strategies. However, it doesnt seem logical to settle all disputes through political
ultimately puts the rule of law at first and its absence means the lack of priority for the rule of law in due
society. It is clear that the absence of rule of law in a society would put the law under question. As Aristotle
states: where there is no rule of law, there is no constitution4.
although donors and incumbent governments may disagree over the motives
that drive the promotion of judicial independence whether they originate in
theories of democratic change or economic growth we posit that donor and
incubment goals largely align in favor of judicial independence. We expect
this alignment between donors and incumbents to hold across democracies
and autocracies6 but we expect it to weaken during election times, when
independent courts can directly influence election outcomes.7 The
conditional nature of our argument suggests that foreign aid should increase
judicial independence unless judicial review becomes politically costly. As
costs of judicial independence increase, which we argue occurs when
incumbents stand for re-election, we expect incumbents to withdraw
their support from externally funded judicial reform activities, or
increase control over the judiciary branch to maintain their position
of power. This incentive should sharpen when elections are more closely
contested. This study contributes to our understanding of democracy
promotion in two ways. First, it presents a new framework that accounts for
heterogeneity among donor governments democracy promotion stratgies
and electoral dynamics in aid-receving countries. Second, it establishes that
judicial independence is not only an important area through which donors can
influence the democratic process abroad. It also posits that the electoral
cycle shapes incumbent governments incentives to use aid resources to
implement judicial review. The results directly reinforce a line of work that
focuses on the testing of the various causal mechanisms through which
donors promote democracy abroad.
The alternative is a descent into chaos. Hon. Nasira Iqbal is a retired justice
who served on the Lahore High Court in Lahore, Pakistan. A View from Kenya
by Hon. Mary A. Angawa The lack of confidence in the Kenyan judiciary has a
long history. This was recently borne out by the elections of December 2007.
When the results were announced, the losers felt cheated and were angry.
When they were told, If you are not satisfied with the election results, go to
court and challenge them, they responded, We have no confidence in the
judiciary; we refuse to go to court. As a judicial officer of twenty-seven years
at that time, fourteen on the High Court of Kenya, this remark cut me to the
core. Instead of organized and rational legal intervention, violence broke out
and the country burned. It was a crushing blow to be unable to arbitrate,
comment, or intervene in the events because a matter cannot be judicially
reviewed unless it is brought before a court by any party. I attempted to join
independent groups established to foster peace among the communities, but
this severely limited my ability to ascertain whether there might be potential
litigants among them. Some constitutional background. The Kenyan judiciary
is based on the British system, with the major difference being that no jury
system exists. The judiciary is comprised of three tiers, including (1) the
subordinate courts, presided over by magistrates; (2) the superior courts,
presided over by puisne judges of the High Court; and (3) the Court of
Appeal, presided over by the judges of appeal. The judges have security of
tenure, whereas the magistrates do not. Like most Commonwealth countries,
Kenya adapted a constitution that was used by most of the former British
colonies when they gained their independence. Nearly all of these
constitutions contained the Declaration of Human Rights. In the current
Kenyan Constitution, the executive powers are vested in the president as
head of the executive branch, and the legislative power is vested in
Parliament, but no similar enactment was made concerning the judicial
authority being vested in the judiciary. This created an imbalance between
the judiciary and the legislature and executive, with the outcome that the
judiciary was constructed on the weakest foundation. Attempts at reform.
This shortcoming, and others, of the current constitution were patently
evident to many Kenyans. The chapter in the constitution on the judiciary was
clearly one where the public wanted reform. The Constitution of Kenya
Review Commission was established in 2002, and it was intended to be
driven by the people rather than by the government. The Review Commission
mandated an advisory panel of eminent Commonwealth judicial experts to
reconsider the chapter on the Kenyan judiciary and to give its input on the
proposed new constitution. Surprisingly, the Court of Appeal resisted this
panels investigations and fielded two separate court cases to stop the review
process. Similarly, a committee established for the judiciary by the chief
justice ended its meetings with the commission. In protest, members of the
Law Society wore yellow ribbons on their robes and took to the streets. The
few judges who openly supported the review process found themselves
transferred to stations far distant from the capitol, which is what happened to
me. In the end, the dispute boiled down to one issue: Should there be a
separate court, known as a Supreme Court, that would address constitutional
issues and that would not be presided over by the current judges of the Court
of Appeal? Some interested parties suggested that all the judges should
resign simultaneously and reapply for their jobs afresh. This time their actual
qualifications would be taken into account, such as the extent of their work
experience and whether they had obtained additional academic law degrees.
In May 2002, the panel of experts released a report finding a crisis of
confidence in the judiciary. The panel suggested this was caused by the
politicization of appointments of judicial officers, and it pointed to the need
for a guarantee of security of tenure and for judicial remuneration to be
delineated in the constitution, so that judicial officers would be protected
from job uncertainty and salary cuts. They also concluded that reforms were
urgently required to restore public confidence in the judiciary and that
enhanced transparency, independence, and accountability were necessary.
Further, they opined that widespread corruption had crippled and
compromised the judiciary, regardless of the constitutional issues. Yet 2002
was an election year, and Parliament was dissolved earlier than scheduled,
forcing the work of the commission to come to a halt. After the 2002
elections, a new government assumed power, ending twenty-four years of
rule by the previous government. When the review process began again, a
new draft that had been reworked by the government under the auspices of
the attorney general was substituted for the original draft, the effect of which
was to compromise it considerably. The stakeholders on the reforms of the
judiciary nonetheless were of the opinion that the legal reforms contained in
the new proposed draft should emphasize making the judiciary independent,
accountable, and effective. The drafters opposed making reforms piecemeal.
They declared that financial and budgeting autonomy for the judiciary was
essential. They felt that the process for judicial appointment should be clearly
outlined, as should the provisions for discipline and removal of judges from
office. They similarly felt that access to justice issues and the backlog of
cases needed to be made part of the reform agenda. If such reforms were
enacted, they said, this would restore public confidence in the judiciary. The
newly proposed constitution, which advocated land reform and many other
provisions not related directly to the judiciary, was voted down in a national
referendum in late 2005, and as such the 2007 general elections were held
under the old rules. Further, the judicial reforms that had been instituted
piecemeal in the interim, while substantial, nonetheless did not inspire
confidence in the independence of the judiciary to resolve the disputes that
arose after those elections. To understand this, we need to look at what
comprises independence of the judiciary. To quote Wikipedia, Judicial
independence is the doctrine that decisions of the judiciary should be
impartial and not subject to influence from the other branches of government
or from private or political interests. In most cases, judicial independence is
secured by giving judges long tenure, and making them not easily removable.
Some definitions of judicial independence distinguish only decisional
independence and institutional independence. I am nevertheless persuaded
that judicial independence may be divided into four categories that I
have discussed in greater depth elsewhere. These are (1) judicial
It is only a matter of time before the Supreme Court will face calls
for new measures of accountability to act as a counterweight to the
new judicial independence. The trigger may be a high profile and
politically-sensitive human rights case. In order to defend the new
judicial independence, the Supreme Court must cultivate a public
commitment to its lawmaking role by demonstrating governance
improvements resulting from the new institutional arrangements. In
Canada, the principal justification for the Supreme Court's role in
fundamental rights cases is the dialogue theory'. First popularised
in a 1997 law review article by Peter W. Hogg and Allison A. Bushell,
dialogue theory posits that while judges exercise discretion, they
are engaged in an interactive dialogue with the other branches of
government about rights issues.72 The theory places limits on the
judicial role by emphasising that Parliament has the final word in the dialogue
as a result of the structure of the Charter of Rights and Freedoms. 73
Dialogue theory has been expressly endorsed by the Supreme Court of
Canada.74 Yet observers have pointed out that the Canadian dialogue is
sometimes more like a judicial monologue given political reluctance to
challenge judicial decisions that hold rhetorical advantages, particularly in
human rights cases.75 In the result, legislative responses' include the
repeal of ofending statutory provisions or the taking of other action
in direct compliance with judicial directives, such as the Reference
re Manitoba Language Rights case, where the legislature hastily
translated its entire repertoire of statutory legislation into the
French language before the Supreme Court of Canada's declaration
of invalidity took efect (which would have resulted in a legal
vacuum with consequent legal chaos given that all statutory
instruments exclusively in English were held to be unconstitutional
and thus invalid ).76 Dialogue theory might provide some answers to the
legitimacy concerns of judicial lawmaking but it is a descriptive theory in that
it does not immediately justify why courts should be part of a dialogue in the
first place, particularly if there is no such thing as a correct' policy answer:
what makes judicial values superior to the values of the executive or
Terror Adv
allegations of the
FBI's aggressive use of past [238] violations of immigration laws to
pressure individuals whom the agency believes may have terrorism
knowledge have repeatedly surfaced. 10Link to the text of the note The
Informants, a yearlong investigation into the FBI's use of informants,
led by Trevor Aaronson and the University of California at Berkeley's
Reporting Program in conjunction with Mother Jones, details the
FBI's expanded use of informants in terrorism investigations. 11Link to
the text of the note Of the approximately five hundred federal terrorism
prosecutions conducted since 9/11, about half used an informant ,
12Link to the text of the note and forty-nine of them were the result of work
done by agent provocateurs. 13Link to the text of the note Aaronson's
investigation also shed light on the FBI's use of immigration law and
the threat of deportation to incentivize informants to cooperate . 14Link
to the text of the note Aaronson explains, A typical scenario will play out like this:
An FBI agent trying to get someone to cooperate will look for
evidence that the person has immigration troubles. If they do, he
can ask [Immigration and Customs Enforcement (ICE)] to begin or expedite
deportation proceedings. If the immigrant then chooses to
cooperate, the FBI will tell the court that he is a valuable asset,
averting deportation. 15Link to the text of the note [239] Using the threat of immigration
Farahi's have been reported since 9/11. 9Link to the text of the note In fact,
consequences like deportation to produce terrorism intelligence presents novel problems for the
the text of the note Furthermore, the Sixth Amendment's guarantee of counsel 26Link to the text of the
note does not apply to immigration violations. 27Link to the text of the note Finally, according to some
reported cases, the government has failed to reward informants with the promised immigration benefits
after receiving their cooperation. 28Link to the text of the note With fewer bargaining options, less
protection, and potentially more to lose 29Link to the text of the note than informants recruited through
monetary incentives or promises of sentence reductions, there is greater incentive for informants "flipped"
30Link to the text of the note via [241] immigration violations to provide unreliable information.
there is
a darker veil of secrecy shrouding measures for recruiting terrorism
informants than for other types of informants. 31Link to the text of the note
Immigration status ofers a valuable way for the FBI to elicit
cooperation and collect intelligence from individuals who otherwise
would not be forthcoming. However, this method for collecting
intelligence can prove counterproductive when indiscriminately
applied to situations where the informants lack useful connections
to terrorist groups. Decreased intelligence benefits, lack of
protection for informants, and increased ethnic and religious
profiling suggest that changes to how the FBI recruits terrorism
informants with immigration threats and rewards are needed .
Furthermore, due to the latitude afforded to the executive branch in national security matters,
, solicited outside their subway stops or interrogated at their workplaces in front of their colleagues and
customers. GET THE LATEST NEWS AND ANALYSIS DELIVERED TO YOUR INBOX EVERY MORNING. SIGN UP
.
, accused him of lying and then turned around and asked him to work for them as an informant.
, our experience suggests they are omnipresent. When CLEAR members facilitate Know-Your-Rights workshops at
. In many
. Being pressed about their religious and political affiliations or their community activities inevitably makes our clients hesitate before being active in their mosque or
community.
http://www.hstoday.us/columns/guest-commentaries/blog/suspicious-mindsthe-american-consciousness-domestic-security-and-the-radicalization-ofmuslim-americans/3ede05589b6d0296ab8dc8edb5c12ca9.html)
Immediately following the September 11, 2001 terrorist attacks, the
priorities, energies and resources of the FBI concentrated on the
proactive objective of preventing future terrorist incidents. In
pursuit of this new strategy, the FBI understood that the success of
this highly complex mission depended on cooperation from the
Muslim-American community specifically the need to understand
its culture, history, religion and language. These early cooperation
efforts were successful in part because many Muslims had sought to define
themselves as Americans. And like most Americans, they, too, play an
important role in ensuring domestic security, if by no other means than
providing pertinent information to include identifying questionable behavior
and activities. Taken at face value, these early partnerships developed into
successful examples of intelligence-led policing. But if one is to seriously
bisect this relationship, one would reasonably conclude that as
potential terrorist suspects and targets become numerous and
branches, and as deception operations become more sophisticated,
domestic security and counterterrorism eforts will expand, reaching
deep into the Muslim-American community, oftentimes crossing
sensitivity lines, as was evidenced by the New York City Police
Departments surveillance of the regions Muslim community. As a result of
this cultural infiltration, the Muslim-American community has
become, by and large, suspicious of government counterterrorism
programs. The Muslim-American community has justified its suspicions on
what it perceives to be American predispositions of both Islam in general, and
Muslims in particular. As the American mainstream consciousness overtly
claim that not all Muslims are violent, anti-American or prone to engage in
terrorism while subconsciously believing the opposite and privately
expressing such, the latter mindset will inevitably influence domestic
counterintelligence/counterterrorism prerogatives. In the most subtle
forms, these prerogatives will include identifying specific racial and
ethnic groups/individuals as the sources, financiers and
http://www.hstoday.us/columns/guest-commentaries/blog/suspicious-mindsthe-american-consciousness-domestic-security-and-the-radicalization-ofmuslim-americans/3ede05589b6d0296ab8dc8edb5c12ca9.html)
Racial and ethnic categorization is a default mindset of the American
psyche. It is deeply and skillfully woven into our national fabric, as is the
ardent defense of the principles of the First Amendment. To deny this strain
of our cultural DNA is to remain disadvantaged when pursuing any
real eforts to understand the undercurrents of Muslim-American
radicalization. Important to note is that the American public
consciousness has become hyper-sensitive to the discussion of race
and aloof to experiences from history. With each generation,
American perceptions on race and the racial order are refined,
resulting from the inherent push-pull relationship between the racial
majority (Us) and the racial minority (Them). As these perceptions
further root themselves into the American mainstream consciousness, the
management thereof is, in truth, dominated by the racial majority. Since
perceptions management is controlled by the racial majority, it stands to
reason that the terms afecting the political and cultural narrative are
too controlled by this majority. But in the face of bold demographic
shifts, greater racial and ethnic diversity (especially without any
desire to fully assimilate), and the real possibility of the racial
majority becoming the numerical minority, control of the narrative
becomes a strategic objective. Here, the starting point of the
narrative revolves around two ideas: 1) How is American defined;
and 2) What groups constitute Americans? Understand that these
are two distinctly separate and important concepts that form the
undercurrents of Muslim-American radicalization. During the early
years of the republic, the mainstream view was that America was to be a
place where distinct groups could retain their individual identity while
simultaneously assimilating and submitting to the idea that is America:
Acknowledging that the protection of the Constitution and the principles
enshrined therein is the only obligation of an American citizen. However, the
unique irony is that the American mainstream has always maintained a
working level of cultural ignorance of its ethnic minority groups, and
whereby the racial majority categorized and separated us from
them. Recognize that throughout most of American history, an
American was categorized as only those people of English origin,
or those who were Protestant, or white or hailed from northern
Europe. But at this juncture in our history, we must recognize that
the American mainstream is being pushed and pulled by a variety of
factors such as immigrant populations (in this country legally or
otherwise) who refuse to culturally assimilate and agitate ethnonationalist sentiment. This psycho-cultural conflict has forced the
American public consciousness into default mode. As mainstream
America continues to become suspicious of Muslim-Americans and
vice versa, the Us versus Them construct, based on existing racial
paradigms, will be categorized in two ways: 1) White/AfricanAmericans (Us) versus Muslim-Americans (Them); and 2) White
Americans (Us) versus African-Americans (Us) versus MuslimAmericans (Us). What is absolute of the Us versus Them
construct is that it results in alienation that breeds resentment
which, in turn, manifests into political radicalization.
Last May, after getting a ride to school with his dad, 18-year-old Abdullahi
Yusuf absconded to the Minneapolis-St. Paul airport to board a flight
to Turkey. There, FBI agents stopped Yusuf and later charged him
with conspiracy to provide material support to a foreign terrorist
organizationhe was allegedly associated with another Minnesota
man believed to have gone to fight for the Islamic State in Syria. To
keep other youth from following Yusufs path, U.S. Attorney Andrew
Luger recently said that the federal government would be launching
a new initiative to work with Islamic community groups and promote
after-school programs and job trainingto address the root causes
of extremist groups appeal. This is not about gathering
intelligence, its not about expanding surveillance or any of the
things that some people want to claim it is, Luger said. Lugers
comments spoke to the concerns of civil liberties advocates, who believe that
blurring the line between engagement and intelligence gathering could end
up with the monitoring of innocent individuals. If past programs in this area
are any guide, those concerns are well founded. Documents obtained by
attorneys at the Brennan Center for Justice at New York University
School of Law, and shared with the Intercept, show that previous
community outreach eforts in Minnesotalaunched in 2009 in
response to the threat of young Americans joining the al-Qaedalinked militia al-Shabab, in Somaliawere, in fact, conceived to
gather intelligence. A grant proposal from the St. Paul Police Department to
the Justice Department, which the Brennan Center obtained through a
Freedom of Information Act request to the FBI, lays out a plan in which
Somali-speaking advocates would hold outreach meetings with community
groups and direct people toward the Police Athletic League and programs at
the YWCA. The proposal says that the team will also identify radicalized
individuals, gang members, and violent offenders who refuse to cooperate
with our efforts. Its startling how explicit it was You dont want to join the
Police Athletic League? You sound like you might join al-Shabab! said
Michael Price, an attorney with the Brennan Center. *** The Islamic State
may be the new face of religious extremism, but for a number of
years, law enforcement in St. Paul and Minneapolis have had to
contend with the appeal of al-Shabab to members of the countrys
largest Somali populationmore than 20 young men have reportedly
left Minnesota to fight with the group since 2007. Dennis Jensen, St.
program still raises questions for me, Price added. What led them to at
first propose intelligence gathering, and then do an about face? *** Around
the same time that St. Paul developed its program, the FBI was leading a
parallel push to leverage community outreach for intelligence. In
2009, it launched Specialized Community Outreach Teams, which
would strategically expand outreach to the Somali community to
address counterterrorism-related issues in Minneapolis and
several other cities around the country. Then-FBI director Robert
Mueller described the teams as part of an efort to develop trust,
address concerns, and dispel myths about the FBI. In an internal
memo obtained by the Brennan Center, however, the teams were
called a paradigm shift, allowing FBI outreach to support
operational programs. The co-mingling of intelligence and outreach
missions would appear to run afoul of the FBIs own guidelines for
community engagement, the 2013 version of which state that
officers must maintain appropriate separation of operational and
outreach eforts. The FBI would not say if the Specialized
Community Outreach Teams (which have ended) would be allowed
under the new guidance, though in a statement, the FBI said the
guidance does not restrict coordination with operational divisions
to obtain a better understanding of the various violations (i.e.
terrorism, drugs, human trafficking, white collar crime, etc.) which may be
impacting communities. If the guidance would allow this program
to continue, then it just confirms that its full of loopholes, said Price,
of the Brennan Center . This isnt the first FBI outreach program to
raise these concerns. The American Civil Liberties Union has
documented cases in recent years in San Francisco and San Jose
where federal agents visited mosques and attended Ramadan
dinners in the name of outreach, all the while keeping records on
the participants . Some of the programs were well-meaning attempts
at educating Islamic leaders about the threat of hate crimes, but
nonetheless ended up collecting private information , according to
Mike German, a former FBI agent who worked on this issue for the ACLU (he is
now also with the Brennan Center). In other cases, FBI agents were going
out with outreach officers or mimicking community outreach to
exploit it for intelligence purposes , he said. Lori Saroya, until recently
executive director of the Council on American-Islamic Relations Minnesota,
said that people werent always aware of their rights when faced with
outreach visits. We had cases of people inviting FBI agents in for tea or to
have dinner, not knowing they didnt have to let them in, she said. Its this
precedent that gives pause to critics of a new White House initiative to
counter violent extremism. Though it is ostensibly aimed at extremists of
all stripes, the outreach push has largely framed the involvement of Islamic
The flood of reports about the New York City Police Department's
surveillance of American Muslims - in mosques, restaurants, bookstores
and even elementary schools in New York, New Jersey, New Orleans and
beyond - has triggered a range of responses around the country.
Mayor Michael Bloomberg and Police Commissioner Ray Kelly have defended
the programme, suggesting that such wholesale surveillance of Muslims is
necessary to keep the City safe. The NYPD certainly has a formidable task
and has protected New Yorkers through times of high alert. But the
reactions of public officials in cities such as Los Angeles and
Chicago, which have also faced serious terrorist threats, suggest
that efective counterterrorism does not require such a stark choice
between our liberty and our safety . Honest efforts to build partnerships
with American Muslim communities present an alternative approach to
terrorism that has proven to be both successful and respectful of our
Constitutional values. New York City is understandably sensitive to terrorism
Since the September 11th, 2001 attacks, the FBI has placed an
emphasis on preventing further terrorist attacks on U.S. soil. To do
so, they have focused their energy on preemptive measures, seeking
to discover terrorists before their dreams of destruction can be
realized. However, this efort has not been without controversy, as
many of the terrorists claim foul play and entrapment. These
accusations refer to the FBIs strategy of placing informants within specific
communities, in particular the American Muslim community, and having them
seek out radical elements for further assessment. Recently, the FBI
appears to have conducted blanket surveillance of broad sections of
the American Muslim community, leading to a number of foiled
terrorist plots. However, a closer look into some of these foiled
terrorist attempts reveals that the planning, materials, funding, and
even transportation for these attacks have almost all been provided
to these disgruntled young men by the FBI themselves . This raises a
very serious question: Would these young men still pose a terrorist
threat to the U.S. had the FBI not engaged them, and even provided
them with all the resources necessary to commit these acts of
violence? Though the legal definition of entrapment makes it hard to clearly
define these cases as such, the methods used by the FBI in recent years
for their cooperation. Considering that one of the four, David Williams, was having trouble
raising the money to pay for a much needed liver transplant for his sick brother, these men
look more like paid thugs than terrorist masterminds. Susanne Brody, an attorney representing
one of the four, claimed that We have as close to a legal entrapment case as I have ever
seen. Unfortunately, the list of cases nearly identical to these goes on, from the Liberty City
Six, whose plans never surpassed the discussion stage, to the Fort Dix Five, where one FBI
informants past included attempted murder and another admitted in court that two of the
men convicted were never aware of any terrorist plot (both were sentenced to life in prison).
According to Mike German, a former FBI agent now working for the ACLU, Most of these
terrorist suspects had no access to weapons unless the government provided them. I would
say that showed they were not the biggest threat to the U.S. According to German, the FBI
has been expanding its tools for carrying out such investigations, something he considers a
terrible prospect. But are the tools used in these cases legitimate, even by the FBIs own
standards? According to the Domestic Investigations and Operations Guide (DIOG FBI, 2008),
these tactics are questionable at best. Section four of the DIOG, entitled [O]n Privacy and Civil
Liberties, and Least Intrusive Methods, it states that each investigation must have a clearly
defined and approved purpose and that this purpose is prohibited from being based solely on
race, ethnicity, national origin or religion. Whats more telling is, in section 4.2 B, on the
exercise of religion, the DIOG states that, solely because prior subjects of an investigation of
a particular group were members of a certain religion and they claimed a religious motivation
for their acts of crime or terrorism, other members mere affiliation with that religion, by itself,
is not a basis to assess or investigate absent a known and direct connection to the threat
under assessment or investigation. However, the blanket surveillance of Muslim communities
in California described by Monteilh, and the recently uncovered case of NYPD eavesdropping
on the entire New York Muslim community, seem to clearly violate these regulations. It has
recently become ever clearer that many of these investigations have been initiated solely
because these communities happen to be Muslim, with no prior evidence of suspicious
behavior whatsoever. Assistant Chief Thomas Galati, head of NYPDs secret Demographics Unit
charged with this task, admitted that after nearly six years of monitoring the Muslim
community in New York they were unable to come up with a single investigation. But it doesnt
stop there. The DIOG (Domestic Investigations and Operations Guide) places a heavy emphasis
on the protection of First Amendment rights, stating that no investigations can be initiated
based solely in response to ones expression of these rights, or solely to monitor their
expression of them. Of course, however, freedom of speech in the United States does not
protect all language. The DIOG refers to a U.S. Supreme Court ruling, Brandenburg v. Ohio
(1969), where the court ruled that the government may not prohibit the advocacy of force or
violence except when such activity is intended to provoke imminent (emphasis added by DIOG)
lawless activity, and is likely to do so. However, according to the testimony given by Monteilh,
using the word jihad (which has two meanings, the main meaning having nothing to do with
holy war) was enough to initiate an investigation. But simply using the word jihad does not
provoke imminent lawless behavior; therefore, being protected under the First Amendment
rights that the FBI is prohibited from using as their sole justification for initiating an
investigation. The blanket recording of conversations with members of the Muslim community,
all of whom had said absolutely nothing to provoke imminent lawless behavior, is a clear
violation of both DIOG regulations and the Brandenburg (1969) ruling. Lastly, the DIOG also
mandates the use of the least intrusive methods possible for conducting intelligence gathering
operations and lists the use of wiretaps, electronic surveillance, and informants as very
intrusive. The fact that the FBI has chosen to use such methods, especially on populations
and individuals that have presented no prior evidence of wrongdoing, suggests that this
regulation means little to the Bureau. Though the FBI has played a significant role in keeping
America safe from further terrorist attacks, it also seems clear that some of their efforts have
been severely misguided, even jeopardizing their ability to do the best job possible. The fact
that Monteilh was reported to the FBI by the very community he was trying to infiltrate,
suggests that these investigations are an unwarranted waste of valuable resources; and one of
the most valuable resources in the counter terrorism efforts of the FBI, according to the DIOG,
is the trust and confidence of the American public. Ironically, the very next statement in the
DIOG is, and because that trust and confidence can be significantly shaken by our failure to
respect the limits of our power, special care must be taken by all employees to comply with
these limitations. However, many experts agree that the FBIs recent conduct regarding such
cases has created an atmosphere of distrust within the American Muslim community .
Islamic charitable giving is a "funding mechanism for combat" and that the
prophet Muhammad was a "violent cult leader." Wired also found a 2010
presentation by an analyst working for the U.S. attorney's office in
Pennsylvania that warns of a " 'Civilizational Jihad' stretching back from the
dawn of Islam and waged today in the U.S. by 'civilians, juries, lawyers,
media, academia and charities' who threaten 'our values.' The goal of that
war: 'Replacement of American Judeo-Christian and Western liberal social,
political and religious foundations by Islam.'" Such baseless and
inflammatory claims shall best be left to those few who share Al
Qaeda's agenda of keeping America in a perpetual state of war with
Islam. In other words, the rhetoric of Al Qaeda and these law
enforcement trainers are opposite sides of the same coin of hate. If
our law enforcement and intelligence agencies continue to use
incorrect and divisive training literature, the crucial partnership
between the Muslim American community and law enforcement will
slowly disintegrate . According to the Muslim Public Afairs Council's
Post-9/11 Terrorism Incident Database, these partnerships have
proved efective in keeping our nation safe. Nearly 40% of Al Qaedarelated plots threatening the American homeland since 9/11 have
been foiled thanks to tips from Muslims . One example of this is the socalled Virginia 5 case in 2009, in which information from the Muslim
community in Virginia led to the arrest in Pakistan of five Muslims from
Virginia who were trying to join an Al Qaeda group. Last year, in another case,
members of a Maryland community warned law enforcement about Antonio
Martinez, who had recently converted to Islam. He was subsequently arrested
after he allegedly tried to blow up a military recruitment center. More
important, Muslim leaders, not FBI agents, can more efectively battle
Al Qaeda's destructive ideas. I have worked for more than 20 years with
law enforcement and Muslim American communities, and one of the
biggest consequences of these training sessions and use of this
material is the setback of a vital relationship that required years to
build. I know justifiable criticism can be levied against some Muslim leaders
in America for not aggressively promoting civic engagement, for not being
self-critical enough and for not distancing themselves from rabble-rousers.
But how can we persuade Muslim American communities to stay at
the table when the food on the table is filled with poison? These
training manuals are making it more difficult for Muslim Americans
to foster any trust with law enforcement agencies . Biased and faulty
training leads to biased and faulty policing. The real challenge now is
getting the partnership back on track, and for the FBI and the
Justice Department to take the following steps: issue a clear and
unequivocal apology to the Muslim American community; establish a
thorough and transparent vetting process in selecting its trainers
Congregants pray at a mosque in Paterson, New Jersey. The NSA and FBI
reportedly spied on prominent Muslim Americans following the 9/11 attacks,
according to a leaked government document. The National Security Agency
and the FBI have reportedly been overzealous trying to prevent
terrorist attacks to the point that anti-Islamic racism in those
agencies led to the surveillance of prominent Muslim-Americans,
revealing a culture of racial profiling and broad latitude for spying
on U.S. citizens. An NSA document leaked by former agency contractor
Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted
among the approximately 7,485 email addresses monitored between 2002
and 2008, Greenwalds news service The Intercept reports. [READ: Glenn
Greenwald Suggests There's a Second NSA Leaker] To monitor Americans,
government agencies must first make the case to the Foreign Intelligence
Surveillance Court that there is probable cause that the targets are terrorist
agents, foreign spies or are or may be abetting sabotage, espionage or
terrorism. Despite this filter The Intercept identified five Muslim-Americans
with high public profile including civil rights leaders, academics, lawyers and
a political candidate. NSA Spied On U.S. Muslims Like Hoover Did On MLK
Daily Caller Racial profiling of Muslims by security officers has been a
controversy since the terrorist attacks of 2001 spiked fears about alQaida trainees preparing more attacks . The New York Police Department
has disbanded its unit that mapped New Yorks Muslim communities that
designated surveillance of mosques as terrorism enterprise investigations
after pressure from the Justice Department about aggressive monitoring by
police. A 2005 FBI memo about surveillance procedures featured in
The Intercept story uses a fake name Mohammed Raghead for the
agency staf exercise . This latest report about email surveillance of
successful Muslim-Americans is akin to McCarthyism that fed paranoia
about communist spies during the Cold War, says Reza Aslan, a professor at
the University of California, Riverside. The notion that these five upstanding
American citizens, all of them prominent public individuals, represent a threat
to the U.S. for no other reason than their religion is an embarrassment to the
%22+&ots=0eodK81fLB&sig=Udz6i4kLUHb3hE66PGweV9zgBSg#v=onepage
&q=%22plausible%20deniability%22&f=false 7/8/2015 ZEC)
Over seventy years has passed since the dawn of the nuclear age without a
nuclear shot fired in anger. In that time, the world's nuclear powers have built
enough atomic bombs to destroy the planet many times over. It is no
exaggeration to describe this arms race as humankind approaching the edge
of a nuclear abyss, staring down at Armageddon and slowly stepping back.
Today the historical record makes clear that a minor miscalculation during the
1962 Cuban Missile Crisis would have sparked a war with casualties in the
hundreds of millions.' Not only was atomic warfare avoided during those
fourteen days in October 1962 and during the subsequent decades of the
Cold War, but today an apocalyptic scenario involving the exchange of
multikiloton warheads is extremely unlikely. This accomplishment is a
testament to the wisdom of world leaders and the effectiveness of the
modern state, though surely some credit is due to divine providence, fate, or
extraordinary good luck. Yet just as this nuclear threat was receding another
gradually emerged. Today, the risk of a single atomic bomb detonating
in a city like Dubai, New York, Singapore, or Washington, DC, is
higher than at any point in history. Why? Because the difusion of
nuclear weapons designs, materials, and know-how mean that it is
or soon will be plausible for malign actors to conduct a clandestine
nuclear attack with limited or no attribution. In 2004, Graham Allison
warned that the chance of this type of attack taking place would be
somewhere between "inevitable" and "highly likely" unless three
conditions, which he referred to as the "Three No's," were met: (1)
"no loose nukes." meaning vulnerable nuclear weapons and/or fissile
material; (2) "no new nascent nukes," which means no new national
capabilities to enrich uranium or reprocess plutonium; and (3) "no
new nuclear weapons states." Unfortunately, ten years have passed
and in that time each of the three conditions has been violated.
secured stockpiles around the world. or that nations could divert nuclear
material intended for peaceful purposes to the development of nuclear
weapons.' Of great concern is that terrorists could fashion a crude
nuclear bomb made from either highly enriched uranium (HEU) or
plutonium into an improvised nuclear device. Such a device would
create an explosion producing extreme heat. powerful shockwaves and
intense radiation that would be immediately lethal to individuals within miles
of the explosion. as well as radioactive fallout over thousands of square
miles. Nonproliferation experts estimate that a successful improvised
nuclear device could devastate the heart of a medium- sized U.S.
city and could cause hundreds of thousands of deaths and injuries.
as well as pose long-term cancer risks to those exposed to the
radioactive fallout. Radiological material also poses a significant security
threat to the United States and the international community. Radiological
material-such as cobalt-60. cesium- I37, and iridium-l92-is
encapsulated or sealed in metal to prevent its dispersal and is
commonly called a sealed radiological source. Sealed radiological
sources are used worldwide for many legitimate purposes. such as medical.
industrial. and agricultural applications. The total number of these sources in
use worldwide is unknown because many countries do not systematically
account for them. If certain types of these sources were obtained by
terrorists. they could be used to produce a simple and crude but
potentially dangerous weapon-known as a radiological dispersion
device, or dirty bomb. Although experts believe that a dirty bomb
would result in a limited number of deaths. it could have severe
economic consequences. Depending on the type. amount. and form.
the dispersed radiological material could cause radiation sickness
for people nearby and produce serious economic and psychological
disruption associated with the evacuation and subsequent cleanup
of the contaminated area.
Nuclear terrorism is both likely and dangerousramification of an attack have both devastating and
global ramifications
Pitts-Kiefer 14 (Samantha Pitts-Kiefer, Senior Project Ofcer, Nuclear
Threat Initiative (NTI) completed a masters degree in public administration at
the Harvard Kennedy School where she focused on foreign policy and national
security. At the Kennedy School, Pitts-Kiefer studied under Graham Allison
and Matthew Bunn and was Graham Allisons course assistant, 2014,
NUCLEAR NIGHTMARES
http://www.nti.org/media/pdfs/Nuclear_Nightmares.pdf?_=1417020879 7/8/15
ZEC)
During the Cold War, the United States and the Soviet Union built up vast
amounts of nuclear weapons and materials. The Cuban Missile Crisis
heightened fears that the nuclear arms race could result in destruction on a
massive scale, whether as a result of an intentional or accidental launch and
sell for $31 million. A serious buyer, reportedly of North African origin,
appears to have been involved and remains at large. Research reactors
are considered vulnerable to thefts of nuclear and radiological
materials because theyre often located on university campuses or in
larger scientific research centres, which are relatively open to the
public or have many users and visitors. Moreover, other than the
amended Convention on the Physical Protection of Nuclear Material, which
has yet to enter into force, theres no internationally binding requirement for
securing these facilities. Since 2003, however, the US and the IAEA have
been working with various countries to reduce the risks associated with
research reactors. Many countries with HEU-fuelled research reactors,
including some in Australias near neighbourhood, have taken part in
securing HEU and converting the reactors to use low-enriched uranium (LEU).
In particular, HEU has been removed and secured from Indonesia, the
Philippines, Thailand and, most recently, Vietnam. Of course, LEU-fuelled
research reactors remain a target for terrorists who wish to spread ionising
radiation or damage a symbolic facility representing technological progress,
and most research reactors have substantial quantities of sealed sources that
are potentially vulnerable to theft.
20,000 new weapons like the one that destroyed Hiroshima and almost
80,000 like the one that destroyed Nagasaki. In the wrong hands, it
wouldnt take much plutonium or highly enriched uranium to fashion
a nuclear device. You could fit a bombs-worth of this material into a lunch
box. Al-Qaeda and other terrorist groups around the globe have
expressed intent to acquire weapons-usable materials. If they
succeed there is little doubt they would use such a device . Thus the
spread of these materials is a grave threatnot only to the United States but
to any country that relies upon the global economy, which would be
severely disrupted if an attack ever succeeded. Robert Gates, former
U.S. Secretary of Defense, noted that, Every senior leader, when youre
asked what keeps you awake at night, its the thought of a terrorist
ending up with a weapon of mass destruction, especially nuclear.
States and Russia, the risk of East-West nuclear war was significantly
reduced. 6 However, it also has been argued that inadvertent nuclear
war between the United States and Russia has continued to present a
substantial risk . 7 While the United States and Russia are not actively
threatening each other with war, they have remained ready to launch
nuclear missiles in response to indications of attack. 8 False indicators
of nuclear attack could be caused in several ways. First, a wide range of
events have already been mistakenly interpreted as indicators of attack,
including weather phenomena, a faulty computer chip, wild animal activity,
and control-room training tapes loaded at the wrong time. 9 Second,
terrorist groups or other actors might cause attacks on either the
United States or Russia that resemble some kind of nuclear attack by
the other nation by actions such as exploding a stolen or improvised
nuclear bomb, 10 especially if such an event occurs during a crisis
between the United States and Russia. 11 A variety of nuclear
terrorism scenarios are possible . 12 Al Qaeda has sought to obtain
or construct nuclear weapons and to use them against the United
States. 13 Other methods could involve attempts to circumvent nuclear
weapon launch control safeguards or exploit holes in their security. 14 It has
long been argued that the probability of inadvertent nuclear war is
significantly higher during U.S.Russian crisis conditions, 15 with the
Cuban Missile Crisis being a prime historical example. It is possible that U.S.
Russian relations will significantly deteriorate in the future, increasing nuclear
tensions. There are a variety of ways for a third party to raise
tensions between the United States and Russia, making one or both
nations more likely to misinterpret events as attacks. 16
Yet the environmental threat of nuclear war has not gone away. The
world faces the prospect of a smaller, but still catastrophic, nuclear
conflict. There are now nine nuclear-weapons states. Use of a
fraction of the global nuclear arsenal by anyone, from the
superpowers to India versus Pakistan, still presents the largest
potential environmental danger to the planet by humans. That
threat is being ignored. One reason for this denial is that the prospect of a
nuclear war is so horrific on so many levels that most people simply look
away. Two further reasons are myths that persist among the general public:
that the nuclear winter theory has been disproved, and that nuclear
winter is no longer a threat. These myths need to be debunked. The
term 'nuclear winter', coined by Carl Sagan and his colleagues in a 1983
paper1 in Science, describes the dramatic effects on the climate caused by
smoke from fires ignited by nuclear attacks on cities and industrial areas. In
the 1980s my colleagues and I calculated, using the best climate models
available at the time, that if one-third of the existing arsenal was used, there
would be so much smoke that surface temperatures would plummet below
freezing around the world for months, killing virtually all plants and producing
worldwide famine. More people could die in China from starvation than in the
nations actively bombing each other. As many countries around the world
realized that a superpower nuclear war would be a disaster for them, they
pressured the superpowers to end their arms race. Sagan did a good job of
summarizing the policy impacts2 in 1984: although weapons were continuing
to be built, it would be suicide to use them. The idea of climatic catastrophe
was fought against by those who wanted to keep the nuclear-weapon
industry alive, or who supported the growth of nuclear arsenals politically3.
Scientifically, there was no real debate about the concept, only
about the details. In 1986, atmospheric researchers Starley Thompson and
Stephen Schneider wrote a piece in Foreign Affairs appraising the theory4
and highlighting what they saw as the patchiness of the effect. They coined
the term 'nuclear autumn', noting that it wouldn't be 'winter' everywhere in
the aftermath of a nuclear attack. They didn't mean for people to think that it
would be all raking leaves and football games, but many members of the
public, and some pro-nuclear advocates, preferred to take it that way. The
fight over the details of the modelling caused a rift between Sagan and
Schneider that never healed. When I bring up the topic of nuclear winter,
people invariably tell me that they think the theory has been disproved. But
research continues to support the original concept. By 2007, models
had began to approximate a realistic atmosphere up to 80
kilometres above Earth's surface, including the stratosphere and
mesosphere. This enabled me, and my coauthors, to calculate for the
first time that smoke particles would be heated by the Sun and lifted
into the upper stratosphere, where they would stay for many years5,
6. So the cooling would last for much longer than we originally
thought. Dark days Many of those who do accept the nuclear-winter
concept think that the scenario applies only to a mass conflict, on a scale no
longer conceivable in the modern world. This is also false. A 'small' nuclear
war between India and Pakistan, with each using 50 Hiroshima-size bombs
(far less than 1% of the current arsenal), if dropped on megacity targets in
each country would produce climate change unprecedented in
recorded human history5. Five million tonnes of black carbon smoke
would be emitted into the upper troposphere from the burning
cities, and then be lofted into the stratosphere by the heat of the
Sun. Temperatures would be lower than during the 'Little Ice Age'
(14001850), during which famine killed millions. For several years, growing
outsider and insider threats they may face. As incidents like the intrusion at
Y-12 in the United
States in 2012 make clear, many nuclear facilities and transporters still
grapple with serious
problems of security culture. It is fair to say that every country where
nuclear weapons, weaponsusable
nuclear materials, major nuclear facilities, or dangerous radiological sources
exist has
more to do to ensure that these items are sustainably secured and
accounted for.
At least three lines of evidence confirm that important nuclear security
weaknesses continue to
exist. First, seizures of stolen HEU and separated plutonium continue
to occur, including, mostly
recently HEU seizures in 2003, 2006, 2010, and 2011.5 These seizures may
result from material
stolen long ago, but, at a minimum, they make clear that stocks of HEU
and plutonium remain
outside of regulatory control. Second, in cases where countries do
realistic tests to probe whether
security systems can protect against teams of clever adversaries determined
to find a weak point,
the adversaries sometimes succeedeven when their capabilities are
within the set of threats the
security system is designed to protect against. This happens with
some regularity in the United
States (though less often than before the 9/11 attacks); if more countries
carried out comparable
performance tests, one would likely see similar results. Third, in real nonnuclear thefts and terrorist
attacks around the world, adversaries sometimes demonstrate capabilities
and tactics well
beyond what many nuclear security systems would likely be able to handle
(see the discussion of
the recent Vstberga incident in Sweden).
being caught.6 And terrorists are unlikely to have enough money to make a
substantial difference
in either the odds of regime survival or the wealth of a regimes elites, even
in North Korea, one
of the poorest countries on earth. On the other hand, serious risks would
arise in North Korea, or
other nuclear-armed states, in the event of state collapseand as
North Koreas stockpile grows, one could imagine a general
managing some of that stockpile concluding he could sell a piece of it
and provide a golden parachute for himself and his family without getting
caught.
No one knows the real likelihood of nuclear terrorism. But the consequences
of a terrorist nuclear blast would be so catastrophic that even a small
chance is enough to justify urgent action
to reduce the risk. The heart of a major city could be reduced to a smoldering
radioactive ruin,
leaving tens to hundreds of thousands of people dead. The perpetrators or
others might claim
to have more weapons already hidden in other major cities and threaten to
set them off if their
demands were not metpotentially provoking uncontrolled evacuation of
many urban centers.
Devastating economic consequences would reverberate worldwide. Kofi
Annan, while serving
as Secretary-General of the United Nations, warned that the global economic
effects of a nuclear
terrorist attack in a major city would push tens of millions of people into dire
poverty, creating
a second death toll throughout the developing world.7
Harvard Universitys Belfer Center for Science and International Affairs. Vice
Admiral Valentin Kuznetsov (retired Russian Navy). Senior research fellow at
the Institute for U.S. and Canadian Studies of the Russian Academy of
Sciences, Senior Military Representative of the Russian Ministry of Defense to
NATO from 2002 to 2008. Martin Malin. Executive Director of the Project on
Managing the Atom at the Belfer Center for Science and International Affairs.
Colonel Yuri Morozov (retired Russian Armed Forces). Professor of the
Russian Academy of Military Sciences and senior research fellow at the
Institute for U.S. and Canadian Studies of the Russian Academy of Sciences,
chief of department at the Center for Military-Strategic Studies at the General
Staff of the Russian Armed Forces from 1995 to 2000. Simon Saradzhyan.
Fellow at Harvard Universitys Belfer Center for Science and International
Affairs, Moscow-based defense and security expert and writer from 1993 to
2008. William Tobey. Senior fellow at Harvard Universitys Belfer Center for
Science and International Affairs and director of the U.S.-Russia Initiative to
Prevent Nuclear Terrorism, deputy administrator for Defense Nuclear
Nonproliferation at the U.S. National Nuclear Security Administration from
2006 to 2009. Colonel General Viktor Yesin (retired Russian Armed Forces).
Leading research fellow at the Institute for U.S. and Canadian Studies of the
Russian Academy of Sciences and advisor to commander of the Strategic
Missile Forces of Russia, chief of staff of the Strategic Missile Forces from
1994 to 1996. Major General Pavel Zolotarev (retired Russian Armed
Forces). Deputy director of the Institute for U.S. and Canadian Studies of the
Russian Academy of Sciences, head of the Information and Analysis Center of
the Russian Ministry of Defense from1993 to 1997, section head - deputy
chief of staff of the Defense Council of Russia from 1997 to 1998, "Steps to
Prevent Nuclear Terrorism," http://belfercenter.ksg.harvard.edu/files/JTA
%20eng%20web2.pdf]
In 2011, Harvards Belfer Center for Science and International Affairs and
the Russian Academy of Sciences Institute for U.S. and Canadian Studies
published The U.S. Russia Joint Threat Assessment on Nuclear Terrorism.
The assessment analyzed the means, motives, and access of would-be
nuclear terrorists, and concluded that the threat of nuclear terrorism
is urgent and real. The Washington and Seoul Nuclear Security Summits
in 2010 and 2012 established and demonstrated a consensus among
political leaders from around the world that nuclear terrorism poses a
serious threat to the peace, security, and prosperity of our planet.
For any country, a terrorist attack with a nuclear device would be an
immediate and catastrophic disaster, and the negative effects would
reverberate around the world far beyond the location and moment of the
detonation. Preventing a nuclear terrorist attack requires international
cooperation to secure nuclear materials, especially among those states
producing nuclear materials and weapons. As the worlds two greatest
nuclear powers, the United States and Russia have the greatest experience
and capabilities in securing nuclear materials and plants and, therefore,
The main worry about the theft and trafficking of nuclear and radiological
materials is that they will end up in the hands of terrorist groups, who will
use them in INDs or RDDs. Even in the case of an RDD, which is a more likely
scenario but would be much less lethal than an IND, radioactive
contamination in a densely populated area could have serious economic and
social consequences. Although a successful RDD attack has never been
perpetrated, theres evidence that terrorists have invested in such
devices: Chechen separatists were involved in two incidents
involving radioactive materials in November 1995 and December 1998,
and more recently intelligence agencies in mainland Europe, Thailand, the UK
and the US have managed to foil RDD plots before they reached fruition.
In 2012, the International Atomic Energy Agency (IAEA) Incident and
Trafficking Database reported 160 incidents involving the illegal trade
and movement of nuclear or other radioactive material across national
borders. Of those, 17 involved possession and related criminal activities, 24
involved theft or loss and 119 involved other unauthorised activities. Two
incidents involved highly enriched uranium (HEU) in unauthorised
activities. There were also three incidents involving dangerous Category 13
radioactive sources, two of which were thefts. Information reported to the
database demonstrates that: the availability of unsecured nuclear
and other radioactive material persists although effective border
control measures help to detect illicit trafficking, efective controls arent
uniformly implemented at all international border points
individuals and groups are prepared to engage in trafficking this
material.
The possibility of RDD or, worse, IND detonation is real and, while the
risks need to be kept in perspective, they need to be taken seriously.
One of the most worrying recent cases of illicit trafficking involving HEU
occurred in June 2011 in Moldova, where officials arrested six people with a
quantity of weapon-grade material. The group claimed to have access to
plutonium and up to 9 kilograms of HEU, which they were willing to sell for
$31 million. A serious buyer, reportedly of North African origin, appears to
have been involved and remains at large.
Research reactors are considered vulnerable to thefts of nuclear and
radiological materials because theyre often located on university
campuses or in larger scientific research centres, which are relatively
open to the public or have many users and visitors. Moreover, other than the
amended Convention on the Physical Protection of Nuclear Material, which
has yet to enter into force, theres no internationally binding requirement for
securing these facilities. Since 2003, however, the US and the IAEA have
been working with various countries to reduce the risks associated with
research reactors. Many countries with HEU-fuelled research reactors,
including some in Australias near neighbourhood, have taken part in
securing HEU and converting the reactors to use low-enriched uranium (LEU).
In particular, HEU has been removed and secured from Indonesia, the
Yes a threat.
Chibarirwe, Trumpet, 7-7-13
[Anthony, IAEA Chief Warns of Threat of Nuclear Terrorism
http://www.thetrumpet.com/article/10787.19.0.0/world/terrorism/iaea-chiefwarns-of-threat-of-nuclear-terrorism]
including, thank god, Ukraine (you really dont want HEU hanging around in a
country on the verge of war). For these and other reasons, the summits have
made the world a safer place. Nonetheless, every country that still has
nuclear weapons, plutonium or HEU has more to do to ensure these
items are efectively and lastingly secured including the United
States. Some facilities still require physical enhancements, such as
more armed guards, physical barriers, and so on. Others have only
minimal protections against insiders stealing nuclear material or
sabotaging facilities. In most cases, the biggest obstacle remains
security culture. All the bells, whistles and hair-trigger seismic
detectors in the world wont make a diference if security personnel
are not vigilant. The Harvard report quotes Eugene Habiger, former
security czar at the U.S. Department of Energy: good security is
20% hardware and 80% culture. In the U.S. in 2012, an 82-year old
nun and two other peace protestors broke into Y-12, a facility in
Tennessee that contains the worlds largest repository of highly
enriched uranium (HEU) in metal form and until the incident was
colloquially known as the Fort Knox of HEU for its state-of-the-art
security equipment. The nun bypassed multiple intrusion-detection
systems because faulty cameras had not been replaced and guards
at the central alarm station had grown weary of manually validating
sensors that produced frequent false alarms. When the protestors
started hammering on the side of a building that contains enough HEU for
hundreds of weapons, the guards inside assumed the noise was coming from
construction workers that they had not been told were coming. She and her
fellow protestors were eventually challenged by a single guard.
the UK from international terrorism is becoming harder and more expensive. The Home Office has
published an annual report on its Contest counter-terrorism strategy, which warned that Islamic terrorist
threats are now spread more widely across the world, requiring very significant resources to combat. The
report showed that security officials and intelligence agencies believe that a priority for Britain is
improving its ability to detect biological attacks, treat victims and decontaminate attack sites.
Biological will get easier from a terrorist point of view , Mr Farr said.
Related Articles Republican terrorists claim car bomb was meant for G8 summit 25 Mar 2013 MI5 chief to
step down, Theresa May says 25 Mar 2013 Car bomb found near Lough Erne G8 venue 23 Mar 2013 Major
terror attack on scale of 7/7 foiled every year in UK, police reveal 21 Mar 2013 Syria opposition demands
protection from Patriot shield 26 Mar 2013 Factors facilitating such attacks include the availability of
formulae and other information on the internet; increasing teaching of biological sciences at universities,
and greater availability of technology, he said. Mr Farr, a former MI6 officer, declined to give further
details of the threat, but the Home Office report hints at a range of new precautions. Last year, the Home
Office began enforcing a new list of controlled biological agents to ensure that dangerous pathogens and
toxins that are required in important medical and scientific research are used and held securely. Lessons
learned from the security operations for the London Olympic Games have informed the wider programme
of planning for high impact biological attacks, the report said. The Home Office report also said that
British authorities continue to plan for a Mumbai-style attack by terrorist gunmen. In particular, the
emergency services have been working on plans to treat and extract casualties from an attack scene even
while violence continues. Details are secret, but it is believed that special teams of armed police officers
and volunteer paramedics have been trained to operate under fire. Mr Farr also revealed that even as
officials prepare for such attacks,
terrorist threats we
face are now more diverse than before, dispersed across a wider
geographical areas, and often in countries without efective
governance, it said. This poses significant challenges to our national security and to the security
and intelligence agencies and departments working on counter-terrorism: operating in these areas is
difficult and dangerous, requires very significant resources and is complicated and at times made
impossible by the breakdown of governance and law and order. Mr Farr said that the changing nature of
the threat puts new financial pressure on the Home Office and other agencies. It takes more to do the
same amount of counter-terrorism work, he said. We have to find savings. He added: Across the whole
of the CT budget, which is in the region of 1 billion, you would expect to find some efficiency savings.
Technology means that in some areas, you can do the same with fewer people. The Home Office report
also warned that British Muslims fighting in Syrias civil war could return home to carry out terrorist
attacks.
2ac Answers
AT: T Geography
Domestic surveillance means surveillance of US citizens.
Unegbu, Howard University JD candidate, 2013
[Cindy, 57 How. L.J. 433, NOTE AND COMMENT: National Security
Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional
Misstep Lexis, accessed 7-6-15, TAP]
Recently, the government has been granted a broad authority to
monitor domestic individuals for purposes of national security
without requiring any suspicion of criminal or terrorist activity.
73Link to the text of the note Many counterterrorism authorities have
addressed monitoring procedures; 74Link to the text of the note however,
two specific laws are gaining much criticism--the NCTC and [446]
the FBI Domestic Investigations and Operations Guide (DIOG). These
authorities are discussed and analyzed below.
focus on Muslim terrorists is both bad for national security and civil
society . Numerous studies and experts have stated that there is
no reliable [255] "terrorist profile.'" 129Link to the text of the note
When compared to the actual threat posed by members of Muslim
and Middle Eastern communities, then, the FBI's explicit target of
Muslim and Middle Eastern communities is excessive.
population will often shape and affect the degree of implicit bias individuals
exhibit. The studies suggest that the others present in an individuals
environment can significantly reduce the degree of implicit bias as
measured by the Implicit Association Test (IAT) described above. At a
broader level, both these studies and the evidence discussed later in this Part
demonstrate the way in which the environment in which individuals find
themselves structures and affects the degree of implicit bias such individuals
exhibit on the IAT and similar measures. One notable study of the efects
of population make-up on implicit bias showed that individuals who
were administered an inperson IAT by an African-American
experimenter exhibited substantially less implicit racial bias than
individuals who were 58 See supra notes 32-37 and accompanying text. 59
Diversity is used throughout this paper to refer to an increase in the
representation of a traditionally underrepresented group. Theoretically such
an increase could make a particular population less diverse if this specific
population was not initially characterized by the general pattern of
underrepresentation; but the usage here, which accords with popular usage,
seems workable for purposes of this paper. 20 administered an in-person IAT
by a white experimenter.60 In other words, subjects speed in
categorizing black-unpleasant and whitepleasant (stereotypeconsistent) pairs was closer to their speed in categorizing blackpleasant and white-unpleasant (stereotypeinconsistent) pairs when an
African-American experimenter was standing in front of the room
than when a white experimenter was standing in front of the room.
AT: Topicality
The af is topical it meets its, domestic surveillance,
curtail, and substantial.
Stabile, University of California Berkeley School of Law JD,
2014
[Emily, 102 Calif. L. Rev. 235, COMMENT: Recruiting Terrorism Informants:
The Problems with Immigration Incentives and the S-6 Visa Lexis, accessed
7-12-15, TAP]
the FBI lacks
substantial restraints on how it recruits and uses informants.
Currently, there are four restrictions on how the FBI recruits
informants: (1) internal FBI limitations, (2) constitutional limitations,
(3) the entrapment defense and the outrageous government conduct
doctrine, and (4) enforcement of nondeportation agreements in plea
bargains. Because these limitations have neither curtailed the FBI's
mismanagement of informants nor ensured a high degree of
accuracy in information obtained, these restrictions have failed to
protect both the public from terrorism and informants from abuse .
III. Limitations on the FBI's Use of Informants Cromitie demonstrates that
156Link to the text of the note A. Attorney General Guidelines The Attorney General's Guidelines on FBI
Confidential Human Sources 157Link to the text of the note ("Guidelines"), issued in 2006 by the
Department of Justice, 158Link to the text of the note are agency guidelines, not regulations, and as such
have no binding legal effect. 159Link to the text of the note [259] Much of the problem of FBI informant
misuse stems from this fact. The Guidelines outline the rules the FBI should follow in undercover
investigations involving informants, which include documenting new informants and recording agreements
made. 160Link to the text of the note The Guidelines are also subject to review and modification by the
Attorney General in accordance with federal laws, and are afforded great deference by the courts. 161Link
to the text of the note The major problems with the Guidelines, however, are that they lack consequences,
are not subject to judicial review, and are not followed by agents. 162Link to the text of the note While the
Guidelines may have internal consequences 163Link to the text of the note for FBI agents who violate
them, they have no meaningful effect beyond internal regulation and cannot be enforced by the public via
judicial review. 164Link to the text of the note Judicial review for violations only occurs when criminal
prosecutions reveal the FBI's activities in the investigation. 165Link to the text of the note However, the
informants in these cases typically remain confidential, and any inquiry into their actions does not extend
beyond the handling agent's conduct and the recruitment methods used. 166Link to the text of the note
Evidence shows that in many cases, FBI agents fail to follow the Guidelines when recruiting and handling
informants. A 2005 study conducted by the Department of Justice Office of the Inspector General found
that the FBI did not provide enough support to agents to properly follow the pre-2006 Attorney General
Guidelines Regarding the Use of Confidential Informants. 167Link to the text of the note In fact,
noncompliance with the guidelines was a problem in 87 percent of the cases the Inspector General
reviewed. In particular, agents failed to properly review the suitability of potential informants, properly
document informants' illegal activities, and notify informants of their limitations. 168Link to the text of the
note Given the high levels of noncompliance and agents' nearly unlimited discretion in extending
immigration rewards, agent abuse is likely also high. [260] Immigration rewards appear only once in the
Guidelines, yet this single reference exemplifies the impunity with which law enforcement procures
informants. The Guidelines state that "no promises or commitments can be made, except by the United
States Department of Homeland Security, regarding the alien status of any person or the right of any
person to enter or remain in the United States." 169Link to the text of the note The Guidelines also note
that informants should receive this information if and when they have any issues regarding immigration
status. 170Link to the text of the note While acknowledging that FBI agents may only offer immigration
benefits to informants pursuant to DHS's agreement, the Guidelines do not answer the questions raised by
this arrangement. Unlike monetary rewards, for which the Guidelines establish a number of rules regarding
proper payment procedures and conditions, 171Link to the text of the note it is not clear under what
circumstances immigration rewards must be documented and whether they are subject to conditions
similar to those of monetary rewards. Their brief appearance in the Guidelines shows the FBI's recognition
of immigration benefits as a method to elicit informant cooperation, but details on their use are
nonexistent. This absence of information indicates that agents may possess vast discretion when using
immigration rewards to recruit informants. It also indicates that executing these rewards is ultimately in
the hands of DHS. B. Constitutional Limitations In theory, both the Fourth Amendment and the Due Process
Clause of the Fifth Amendment restrict the FBI's use of informants in terrorism investigations. However,
neither Amendment has actually limited the Agency's recruitment tactics when dealing with subjects
facing immigration-related pressures to serve as informants. The Fourth Amendment's prohibition against
unreasonable searches and seizures 172Link to the text of the note does not offer any substantive
restrictions on the FBI's use of informants in terrorist investigations. In criminal investigations where the
Fourth Amendment does apply, it places few restrictions on the use of information gathered by informants.
173Link to the text of the note To obtain a warrant based on intelligence gathered by an informant, the
information must be reliable in establishing the requisite probable cause. 174Link to the text of the note In
matters of national security however, the search standard is less stringent than the probable cause
standard [261] used in criminal investigations. 175Link to the text of the note In fact, the United States
Supreme Court has never held that the Fourth Amendment applies to national security investigations.
176Link to the text of the note In particular, the Foreign Intelligence Surveillance Act of 1978 (FISA)
177Link to the text of the note shields federal agents from standard criminal warrant requirements when
carrying out electronic surveillance and searches. The Foreign Intelligence Surveillance Court, a secret
court 178Link to the text of the note created by FISA to issue warrants in national security investigations,
179Link to the text of the note only requires probable cause that "the target of the electronic surveillance
is a foreign power or an agent of a foreign power." 180Link to the text of the note Hence, because agents
do not have to produce evidence of criminal activity before initiating electronic or physical surveillance,
they are able to use informants more freely. 181Link to the text of the note Under FISA, the Attorney
General can also authorize surveillance for up to a year without court order. 182Link to the text of the note
Furthermore, in 1982, President Reagan's Executive Order No. 12,333 identified the FBI as the primary
gatherer of domestic intelligence and held that the Attorney General holds the power to carry out
Executive
Order No. 12,333 essentially paved the way for the FBI's use of
informants to conduct domestic surveillance of foreign agents,
including members of foreign terrorist organizations, without [262]
adhering to the restrictions inherent in the use of informants in
domestic criminal investigations. In domestic criminal
investigations, agents are required by law to corroborate
informants' intelligence and credibility before a warrant is issued .
184Link to the text of the note However, under Executive Order No. 12,333, this
corroboration is not required in terrorism investigations . 185Link to the text
warrantless searches and surveil agents of foreign powers. 183Link to the text of the note
of the note For informants facing deportation and immense pressure to cooperate, these lax warrant
requirements remove an important check on the validity of their intelligence. The requirements also give
the FBI more opportunities to abuse its power. Although no court has explicitly found Executive Order No.
12,333 constitutional, no court has found it unconstitutional and thus it remains good law. Indeed, the
Northern District of Illinois found that FBI reliance on the Order in conducting physical searches for foreign
intelligence gathering was reasonable. 186Link to the text of the note
It has
resulted in migrants being increasingly likely to be profiled,
arrested, and imprisoned by local police officers, before being
passed to the federal authorities for deportation. Undocumented migrants can
databases. Secure Communities was introduced in 2008 and stepped up under Obama.
no longer have any contact with police officers without risking such outcomes. There is an irony in the way
the premise that the United States was not only unique among other
nations and therefore destined to play a leading global role, but also
a nation built upon liberal principles. This meant that the centrality
of whiteness to the security narrative was muted and less
prominent . Even though the white middle-class home was cast as
the locus of a privatized notion of self-defense and military
preparedness through government civil defense policies and
programs,39 the image of the US empire was one of liberalism,
inclusivity, and the melting pot. The United States sought quite
consciously to diferentiate itself from past empires as it positioned
itself to be one of two hegemons on the global stage. In this context,
the existence of Jim Crow segregation was an embarrassment for the
ruling class. In 1947, the National Security Act was passed which
entrenched security as a key element of the postwar order. Every
aspect of lifethe social, political, intellectual, and economicwas
conceived as playing a role in national defense, and a massive
security establishment was built up. The 1947 act created the Office of the Secretary of Defense, the
Joint Chiefs of Staff, the National Security Council (NSC), and the Central Intelligence Agency (CIA). The National Security Agency (NSA) was
there was
also the integration of corporate America, of universities, of
research institutions, and of the media into the machinery of the
national security state. The earlier distinctions between the citizen
and soldier and between the home front and the battle front were
blurred to shore up an imperial system at home and abroad.
Surveillance was central to sustaining and reproducing this system.
From the 1940s to the early 1970s, FBI wiretapping and bugging
operations focused on a wide range of movements, activists, and
public figures. The following list of targets compiled by historian Athan Theoharis gives a flavor of the surveillance and is worth
quoting in full: Radical activists (David Dallin, Charles Malamuth, C. B. Baldwin, Frank Oppenheimer, Bertolt Brecht, Thomas
Mann, Heinrich Mann, Helene Weigel, Berthold Viertel, Anna Seghers, Bodo Uhse, Richard Criley, Frank Wilkinson), prominent
liberal and radical attorneys (Bartley Crum, Martin Popper, Thomas Corcoran, David Wahl, Benjamin Margolis,
Carol King, Robert Silberstein, National Lawyers Guild, Fred Black), Radical labor leaders and unions (Harry
formed in 1952, conceived as an organization to carry out the gathering of signals intelligence. During this period,
Bridges; United Auto Workers; National Maritime Union; National Union of Marine Cooks and Stewards; United Public Workers; United Electrical
Radio and Machine Workers; Food, Tobacco, Agricultural and Allied Workers; International Longshoremens and Warehousemens Union; CIO
Leonard Lyons, William Beecher, Marvin Kalb, Henry Brandon, Hedrick Smith, Lloyd Norman, Hanson Baldwin, Inga Arvad),
Conference; National Association for the Advancement of Colored People; March on Washington Movement; Gandhi Society for Human Rights;
Elijah Muhammad; Nation of Islam; Stokely Carmichael; H. Rap Brown; Student Non-Violent Coordinating Committee; Alabama Peoples
Education Association; Committee to Aid the Monroe Defendants; Southern Conference for Human Welfare; Black Panther Party; Universal
Negro Improvement Association; African Liberation Day Committee),
Society, Ku Klux Klan, National Committee to Abolish HUAC, Socialist Workers Party, Washington Bookstore Association,
Northern California Association of Scientists, Federation of American Scientists, American Association of Scientific Workers, preWorld War II
isolationists (Henry Grunewald, Ethel Brigham, John OBrien, Lillian Moorehead, Laura Ingalls, America First, Jehovahs Witnesses, Los Angeles
Chamber of Commerce), and even prominent personalities (Joe Namath, Harlow Shapley, Edward Condon, Edward Prichard, Muhammad Ali,
Benjamin Spock).40 In a bid to shape public opinion, the FBI also launched a mass media campaign in 1946 that released educational
movements. About 1,500 of the 8,500 American Communist Party members were likely FBI informants in the early 1960s. By
the end of the decade, agents who had previously worked in US
foreign intelligence were transferring to the burgeoning field of
domestic intelligence to spy on radical movements, whether employed by the bureau,
military intelligence, or the expanding red squads in local police departments.41 A key part of the FBIs
countersubversion strategy was the manipulation of political
activists into committing criminal acts so that they could be arrested
and prosecuted. Agents provocateurs working for the FBI initiated disruptions of meetings and demonstrations, fights between
rival groups, attacks on police, and bombings. FBI agents also secretly distributed derogatory and scurrilous material to police, Congress,
Terror DA Answers
AT: Terror DA
Racial, ethnic, and religious profiling fails entrapment
produces fabricated information.
Stabile, University of California Berkeley School of Law JD,
2014
[Emily, 102 Calif. L. Rev. 235, COMMENT: Recruiting Terrorism Informants:
The Problems with Immigration Incentives and the S-6 Visa Lexis, accessed
7-12-15, TAP]
Since the FBI's post-9/11 establishment of a preventative stance
toward terrorism has increased the need for intelligence, the agency
has turned to the increased use of immigration law to recruit
additional confidential informants. Using the threat of immigration
consequences - particularly deportation - to produce terrorism
intelligence presents novel problems for both the intelligence
gathering process and the informants. Informants recruited in this
manner who also lack established ties to foreign terrorist
organizations have an enormous incentive to fabricate information
to fulfill their end of the agreement and avoid deportation.
Recruiting informants via immigration law also afords less
protection than recruiting them by ofering monetary rewards or
reductions in sentencing. Furthermore, the FBI's recruitment tactics
encourage ethnic and religious profiling, alienating Muslim and
Middle Eastern communities. Although Congress created the S-6 visa
classification specifically to induce cooperation from informants in terrorism
investigations, the visa is rarely used due to its stringent eligibility
requirements for informants. In order for law enforcement to successfully use
the S-6 visa program and to encourage the trust of and cooperation from
informants, legislative overhaul is needed. An S-6 visa program that
emphasizes pre-existing ties to terrorist organizations, increases the
availability of S-6 visas, and lowers the barriers to the visas' use will produce
counterterrorism intelligence that is more reliable and actionable and provide
greater protection for civil liberties and to informants themselves.
defined profile, when there are a reasonable number of events per year, and when the cost of false alarms
is low. Detecting credit card fraud is one of data minings security success stories: all credit card
companies mine their transaction databases for spending patterns that indicate a stolen card. There are
over a billion active credit cards in circulation in the United States, and nearly 8% of those are fraudulently
used each year. Many credit card thefts share a pattern purchases in locations not normally frequented
by the cardholder, and purchases of travel, luxury goods, and easily fenced items and in many cases
data-mining systems can minimize the losses by preventing fraudulent transactions. The only cost of a
false alarm is a phone call to the cardholder asking her to verify a couple of her purchases. Similarly, the
IRS uses data mining to identify tax evaders, the police use it to predict crime hot spots, and banks use it
to predict loan defaults. These applications have had mixed success, based on the data and the
Terrorist plots
are diferent, mostly because whereas fraud is common, terrorist
attacks are very rare. This means that even highly accurate
terrorism prediction systems will be so flooded with false alarms
that they will be useless. The reason lies in the mathematics of
detection. All detection systems have errors, and system designers can tune them to minimize either
application, but theyre all within the scope of what data mining can accomplish.
false positives or false negatives. In a terrorist-detection system, a false positive occurs when the system
mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an
actual attack. Depending on how you tune your detection system, you can increase the number of false
positives to assure you are less likely to miss an attack, or you can reduce the number of false positives at
any.
We might be able to deal with all of the innocents being flagged by the system if the cost of false
positives were minor. Think about the full-body scanners at airports. Those alert all the time when scanning
people. But a TSA officer can easily check for a false alarm with a simple pat-down. This doesnt work for a
The US intelligence community also likens finding a terrorist plot to looking for a needle in a haystack. And,
as former NSA director General Keith Alexander said, you need the haystack to find the needle. That
statement perfectly illustrates the problem with mass surveillance and bulk collection. When youre looking
there is no
scientific rationale for believing that adding irrelevant data about
innocent people makes it easier to find a terrorist attack, and lots of
evidence that it does not. You might be adding slightly more signal, but youre also adding
for the needle, the last thing you want to do is pile lots more hay on it. More specifically,
much more noise. And despite the NSAs collect it all mentality, its own documents bear this out. The
military intelligence community even talks about the problem of drinking from a fire hose: having so
much irrelevant data that its impossible to find the important bits. We saw this problem with the NSAs
eavesdropping program: the false positives overwhelmed the system. In the years after 9/11, the NSA
passed to the FBI thousands of tips per month; every one of them turned out to be a false alarm. The cost
was enormous, and ended up frustrating the FBI agents who were obligated to investigate all the tips. We
also saw this with the Suspicious Activity Reports or SAR database: tens of thousands of reports, and
no actual results. And all the telephone metadata the NSA collected led to just one success: the conviction
of a taxi driver who sent $8,500 to a Somali group that posed no direct threat to the US and that was
The second
problem with using data-mining techniques to try to uncover terrorist plots is that
each attack is unique. Who would have guessed that two pressure-cooker bombs would be
probably trumped up so the NSA would have better talking points in front of Congress.
delivered to the Boston Marathon finish line in backpacks by a Boston college kid and his older brother?
Each rare individual who carries out a terrorist attack will have a
disproportionate impact on the criteria used to decide whos a likely
terrorist, leading to inefective detection strategies. The third
problem is that the people the NSA is trying to find are wily, and
theyre trying to avoid detection. In the world of personalized marketing, the typical
surveillance subject isnt trying to hide his activities. That is not true in a police or national security
context.
ubiquitous surveillance would have enabled the NSA to prevent 9/11. That seems unlikely. He wasnt able
to prevent the Boston Marathon bombings in 2013, even though one of the bombers was on the terrorist
watch list and both had sloppy social media trails and this was after a dozen post-9/11 years of honing
techniques. The NSA collected data on the Tsarnaevs before the bombing, but hadnt realized that it was
more important than the data they collected on millions of other people.
NSA surveillance of
any kind, whether bulk or targeted of U.S. persons or foreigners,
played an initiating role in only 7.5 percent of cases. To break that
down further: The controversial bulk collection of telephone
metadata appears to have played an identifiable role in, at most, 1.8
percent of the terrorism cases we examined. In a further 4.4 percent
of the cases, NSA surveillance under Section 702 of targets
reasonably believed to be outside of the country that were
communicating with U.S. citizens or residents likely played a role,
while NSA surveillance under an unknown authority likely played a
role in 1.3 percent of the cases we examined.
of criminal wrongdoing without the use of traditional investigative tools.
https://www.newamerica.org/downloads/IS_NSA_surveillance.pdf.
Accessed 7-9-2015. KC)
However, our review of the governments claims about the role that
NSA bulk surveillance of phone and email communications records
has had in keeping the United States safe from terrorism shows that
these claims are overblown and even misleading.* An in-depth analysis
of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by
al-Qaedas ideology, and charged in the United States with an act of terrorism
since 9/11, demonstrates that traditional investigative methods, such as
the use of informants, tips from local communities, and targeted intelligence
operations, provided the initial impetus for investigations in the
majority of cases, while the contribution of NSAs bulk surveillance
programs to these cases was minimal. Indeed, the controversial bulk
collection of American telephone metadata, which includes the
telephone numbers that originate and receive calls, as well as the time and
date of those calls but not their content, under Section 215 of the USA
PATRIOT Act, appears to have played an identifiable role in, at most,
1.8 percent of these cases. NSA programs involving the surveillance of
non-U.S. persons outside of the United States under Section 702 of the FISA
Amendments Act played a role in 4.4 percent of the terrorism cases we
examined, and NSA surveillance under an unidentified authority played a role
in 1.3 percent of the cases we examined. Regular FISA warrants not issued in
connection with Section 215 or Section 702, which are the traditional means
for investigating foreign persons, were used in at least 48 (21 percent) of the
cases we looked at, although its unclear whether these warrants played an
initiating role or were used at a later point in the investigation. (Click on the
link to go to a database of all 225 individuals, complete with additional details
about them and the governments investigations of these cases:
http://natsec.newamerica.net/nsa/analysis). Surveillance of American
phone metadata has had no discernible impact on preventing acts of
terrorism and only the most marginal of impacts on preventing
terrorist related activity, such as fundraising for a terrorist group.
Furthermore, our examination of the role of the database of U.S. citizens
telephone metadata in the single plot the government uses to justify the
importance of the program that of Basaaly Moalin, a San Diego cabdriver
who in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaedas affiliate in
Somalia calls into question the necessity of the Section 215 bulk
collection program.5 According to the government, the database of
American phone metadata allows intelligence authorities to quickly
circumvent the traditional burden of proof associated with criminal warrants,
thus allowing them to connect the dots faster and prevent future 9/11-scale
attacks. Yet in the Moalin case, after using the NSAs phone database to link a
number in Somalia to Moalin, the FBI waited two months to begin an
investigation and wiretap his phone. Although its unclear why there was a
delay between the NSA tip and the FBI wiretapping, court documents show
there was a two-month period in which the FBI was not monitoring Moalins
calls, despite official statements that the bureau had Moalins phone number
and had identified him.6,7 This undercuts the governments theory that
the database of Americans telephone metadata is necessary to
expedite the investigative process, since it clearly didnt expedite
the process in the single case the government uses to extol its
virtues. Additionally, a careful review of three of the key terrorism cases the
government has cited to defend NSA bulk surveillance programs reveals that
government officials have exaggerated the role of the NSA in the cases
against David Coleman Headley and Najibullah Zazi, and the significance of
the threat posed by a notional plot to bomb the New York Stock Exchange.
No War Contention
No War
No war democracy, trade, and IGOs check conflict
escalation
Shermer 14 (Michael. Michael Shermer is a journalist and writer,
editor for The Skeptic, and contributor to Scientific American. 1014-2014. Perpetual Peace. Scientific American.
http://www.scientificamerican.com/article/perpetual-peace/ . Accessed 7-82015. KC)
In their 2001 book Triangulating Peace, political scientists Bruce Russett
and John Oneal employed a multiple logistic regression model on
data from the Correlates of War Project that recorded 2,300
militarized interstate disputes between 1816 and 2001. They
assigned each country a democracy score between 1 and 10, based
on the Polity Project, which measures how competitive its political
process is, as well as the fairness of its elections, checks and
balances of power, transparency, and so on. The researchers found
that when two countries scored high on the Polity scale, disputes
between them decreased by 50 percent, but when one country was
either a low-scoring democracy or an autocracy, it doubled the
chance of a quarrel between them. Kant also suggested that
international trade (economic interdependency) and membership in
international communities (transparency and accountability) reduce
the likelihood of conflict. So in their model Russett and Oneal
included data on the amount of trade between nations and found
that countries that depended more on trade in a given year were
less likely to have a militarized dispute in the subsequent year. They
also counted the number of intergovernmental organizations (IGOs)
that every pair of nations jointly belonged to and ran a regression
analysis with democracy and trade scores. Overall, democracy, trade
and membership in IGOs (the triangle of their title) all favor
peace, and if a pair of countries are in the top 10th of the scale on
all three variables, they are 81 percent less likely than an average
pair of countries to have a militarized dispute in a given year. How
has the democratic peace theory held up since 2001? With all the conflict
around the world, it seems like peace is on the rocks. But anecdotes are not
data. In a 2014 special issue of the Journal of Peace Research, Uppsala
University political scientist Hvard Hegre reassessed all the evidence on
Democracy and Armed Conflict. He stated that the empirical finding that
pairs of democratic states have a lower risk of interstate conflict than other
pairs holds up, as does the conclusion that consolidated democracies have
less conflict than semi-democracies. Hegre is skeptical that economic
interdependence alone can keep countries from going to warthe Golden
Arches Theory of Conflict Prevention popularized by Thomas Friedman's
example, Oneal and Russett 1997, 1999; Russett and Oneal 2001),
power balances matter, too. Before World War I, the balance of
power between the opposing coalitions was fairly even. There were
no pacifying preponderance efects. Although one cannot claim
World War I to be a case demonstrating the value of capitalist-peace
theory, neither does it undermine the theory seriously. It may be
objections raised against their earlier work and demonstrated that those
objections do not affect their substantive conclusions. For a while, Hegres
(2000) study seemed to necessitate a qualification of the peace by trade
proposition. He found that the pacifying effect of trade is stronger among
developed countries than among less-developed countries. More recently,
however, Mousseau, Hegre, and Oneal corrected this earlier finding and
reported: Whereas economically important trade has important
pacifying benefits for all dyads, the conflict-reducing effect of democracy
is conditional on states economic development (2003, 300). Gelpi and
Grieco (2003) suggested another qualification. In their view, trade no longer
pacifies relations between autocratic states. According to Mansfield and
Pevehouse (2003), another modification of the peace by trade proposition
might be required. The institutional setting, such as preferential trade
agreements, matters. It is even conceivable that other forms of
economic interdependence, such as crossborder investments,
exercise some pacifying impact. Foreign direct investment (FDI) certainly
promotes prosperity, growth, and democracy (de Soysa and Oneal 1999; de
Soysa 2003), but the conceivable pacifying impact of FDI still lacks sufficient
empirical investigation. The most radical criticism comes from Barbieri
(2002), according to whom bilateral trade increases the risk of conflict. As
outlined by Oneal and Russett (2003a, 2003b; Oneal 2003; Russett 2003), her
conclusion results from disregarding the military power of nationsthat is,
their different capabilities to wage war across considerable distances. Should
we really proceed on the presumption that war between Argentina and Iraq is
as conceivable as between the United States and Iraq or between Iran and
Iraq? Of course, trade has no pacifying effect on international relations
wherever the risk of conflict is extremely close to zero to begin with. Even
this inadequate. Russett and Oneal (2001) refer instead to a Kantian peace,
which is composed of three components: the democratic peace, peace by
trade, and peace by collaboration in international governmental organizations
(IGOs). In their research, the IGO element of the Kantian tripod is the weakest
and least robust one. I do not know who invented the term capitalist peace. I
have heard it spoken more frequently than I have seen it in print, but in any
event it is a felicitous term. handling of the power and distance issue by itself
does not suffice to support her conclusions. If the military-conflict variable is
restricted to those conflicts that resulted in at least one fatality, then trade is
pacifying, whether power and distance are adequately controlled or not.
Moreover, Barbieri (2003) herself found some pacifying effect of economic
freedom and openness to trade on the war involvement of nations. In spite of
the attempted criticism of Russett and Oneals findings, the peace by
trade proposition stands and enjoys powerful empirical support.
Another issue also must be considered. Barbieris (2002) measures are based
on dyadic trade shares relative to national trade, whereas Russett and
Oneals measures are based on dyadic trade shares relative to the size of
national economies. Gartzke and Li (2003) have demonstrated
arithmetically as well as empiricallythat trade shares relative to national
trade may rise when nations are disconnected from world trade. Nations may
concentrate most of their trade on a few partners and remain rather closed
economies. If Barbieris and Oneal and Russetts measures of bilateral trade
and their effects are simultaneously considered, then Barbieris trade shares
exert a conflictenhancing effect and Oneal and Russetts trade dependence
exerts a conflict-reducing effect. This finding of Gartzke and Lis study not
only replicates the substantive findings of both main contenders in the
debate about trade and conflict, but it remains robust whether one relies on
the Oneal and Russett data or on the Barbieri data, whether one includes all
dyads or only dyads for which there is some risk of military conflict to begin
with. If one is interested in finding out whether more trade is better or worse
for the avoidance of military conflict, then it seems more meaningful to focus
on a measure that is related to openness at the national level of analysis, as
Oneal and Russett (1997, 1999, 2003a, 2003b; Russett and Oneal 2001) have
done, than on a measure that may be high for fairly closed economies, as
Barbieri (2002) has done. Actually, the pacifying effect of trade might be
even stronger than the pacifying effect of democracy (Oneal and Russett
1999, 29, and 2003a, 160; Gartzke 2000, 209), especially among contiguous
pairs of nations, where conflict-proneness is greater than elsewhere.
Moreover, trade seems to play a pivotal role in the prevention of war because
it exerts direct and indirect pacifying effects. In addition to the direct
efect, there is the indirect efect of free trade as the consequent
growth, prosperity, and democracy reduce the risk of militarized
disputes and war. Because the exploitation of gains from trade is the
essence or purpose of capitalism and free markets, I label the sum of the
direct and indirect international security benefits the capitalist peace, of
which the democratic peace is merely a component.1 Even if the direct
peace by trade efect were discredited by future research,
economic freedom and globalization would still retain their crucial
role in overcoming mass poverty and in establishing the
prerequisites of the democratic peace. For that reason, I (Weede 1996,
chap. 8) advocated a capitalist-peace strategy even before Oneal and Russett
(1997, 1999) convinced me of the existence of a directly pacifying effect of
trade. An Asian statesman understood the capitalist peace intuitively even
before it was scientifically documented and established. According to Lee
Kuan Yew, The most enduring lesson of history is that ambitious growing
countries can expand either by grabbing territory, people or resources, or by
trading with other countries. The alternative to free trade is not just
poverty, it is war (qtd. in Survey: Asia 1993, 24).
and space from the disclosures themselves. It's like trying to get good at cricket by swinging the bat,
closing your eyes before you see where the ball is headed, and then being told, months later, somewhere
you do in the toilet, but that doesn't mean you don't want to close the door when you go in the stall. You
several horrifying cases of police being told by computers that someone might be up to something
suspicious, and thereafter interpreting everything they learn about that suspect as evidence of
wrongdoing. For example, when a computer programmer named David Mery entered a tube station
wearing a jacket in warm weather, an algorithm monitoring the CCTV brought him to the attention of a
human operator as someone suspicious. When Mery let a train go by without boarding, the operator
decided it was alarming behaviour. The police arrested him, searched him, asked him to explain every
scrap of paper in his flat. A doodle consisting of random scribbles was characterised as a map of the tube
station. Though he was never convicted of a crime, Mery is still on file as a potential terrorist eight years
needles. The 9/11 Commission said that America's spooks had everything they needed to predict the
attacks but it was lost amid all the noise of overcollected data. Since then, the
overcollection
has gone into overdrive the haystacks are enormous, but they still have the same number
of needles in them. I want my skies safe, just like you so I want my spooks doing their job well, not simply
hackers used
Google's lawful interception back door to hack Gmail and figure out who dissidents
talked to. Our communications systems are more secure if they're
designed to keep everyone out and adding a single back door to them blows their
switches to listen in on the prime minister during the 2005 Olympic bid. Chinese
security models up. You can't be a little bit pregnant, and the computers in your pocket and on your desk
and in your walls can't be a little bit insecure. Once they're designed for surveillance, anyone who can
bribe or impersonate a cop can access them. As for Hague: i f
If you do not have a security clearance, and if you have not received a National Security Letter,
have been contacted by the NSA to subvert a product or protocol, you need to come forward with your
implementations, open systems - these will be harder for the NSA to subvert. The Internet Engineering
Task Force, the group that defines the standards that make the internet run, has a meeting planned for
This is an
emergency, and demands an emergency response. Three, we can
influence governance. I have resisted saying this up to now, and I am saddened to say it, but
the US has proved to be an unethical steward of the internet . The UK is
no better. The NSA's actions are legitimizing the internet abuses by
China, Russia, Iran and others. We need to figure out new means of internet governance,
ones that makes it harder for powerful tech countries to monitor everything. For example, we need
to demand transparency, oversight, and accountability from our
governments and corporations. Unfortunately, this is going play directly
into the hands of totalitarian governments that want to control their country's
internet for even more extreme forms of surveillance . We need to figure out how to
prevent that, too. We need to avoid the mistakes of the International Telecommunications Union,
early November in Vancouver. This group needs to dedicate its next meeting to this task.
which has become a forum to legitimize bad government behavior, and create truly international
governance that can't be dominated or abused by any one country. Generations from now, when people
look back on these early decades of the internet, I hope they will not be disappointed in us. We can ensure
We have a
moral duty to do this, and we have no time to lose. Dismantling the surveillance state won't be
that they don't only if each of us makes this a priority, and engages in the debate.
easy. Has any country that engaged in mass surveillance of its own citizens voluntarily given up that
Whatever
happens, we're going to be breaking new ground. Again, the politics of this is a
capability? Has any mass surveillance country avoided becoming totalitarian?
bigger task than the engineering, but the engineering is critical. We need to demand that real
technologists be involved in any key government decision making on these issues. We've had enough of
lawyers and politicians not fully understanding technology; we need technologists at the table when we
build tech policy. To the engineers, I say this: we built the internet, and some of us have helped to subvert
it. Now, those of us who love liberty have to fix it.
accountability, transparency and oversight that can be applied to monitor and control such efforts through
heightened cooperation between government surveillance entities and established oversight practitioners.
In particular, the primary recommendation made here is for law enforcement organizations across levels of
response to consider developing and implementing Techno-Ethics Boards in order to ensure that the
ongoing practice of surveillance in a free society can be scrutinized and held to an acceptable standard for
a democratic country. Introduction In Thomas Hobbes 1651 treatise, Leviathan, he examined the
condition of man, government and the human spirit. Hobbes work and thought lives on today among
realist, neo-realist and conservative political thinkers. His ideas are continuously referred to in international
relations theories and discourse as a jumping off point for scholars and practitioners alike. Hobbes saw the
legitimate power of government as vested in the sovereign, once the commonwealth had agreed to such
power transference. The sovereign could then apply their will and power to mitigate a natural world of
anarchic behavior among human beings that pitted each against all. This natural world left people in a
quandary, facing a myriad of problems within a state of constant war that would impact on survival. Noting
among the chief threats: TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE
PROGRAMS 32 and which is worst of all, continual fear, and danger of violent death; and the life of man,
solitary, poor, nasty, brutish, and short. (Hobbes, 1968, p.186). As the post September 11, 2001 world of
New York City and Washington D.C., the post March 11, 2004 world of Madrid, Spain, and the post July 7,
surveillance techniques, increasing data mining and manipulation, and enhancing profiling and recognition
initiatives (see American Civil Liberties Union, 2004, for an example of the experience in the United
element of the puzzle to put into place involves establishing accountability and oversight mechanisms that
can help create transparency of government run surveillance operations to the public. To date, both
electronic
surveillance one finds a multitude of techniques that are now at the
disposal of those in power to monitor and examine both individual and population wide
discussion of this matter and its implementation have been found wanting. Looking at
practices (Marx, 2002: pp. 12-13). From closed circuit television (CCTV) to video and computer monitoring,
to polygraphs, to data aggregation and manipulation, wiretapping and enhanced eavesdropping methods,
a web of surveillance is being woven around people within society (see Muller and Boos, 2004: p. 162, for
one such example in Zurich, Switzerland). The impacts are varied, as are the success rates. Regarding
advances with technology such as CCTV alone, we find a variety of strengths and weaknesses resulting
from application. Clearly, after the London train and bus bombing in 2005, it was obvious that CCTV was
invaluable in tracking down terrorists after the attack. The roving monitoring system provided police with
quick and effective PETER A. MAMELI 33 tracking evidence that allowed for a swift and capable operational
response. This incident should make plain that CCTV has something to offer society, yet all the news about
misconduct (Goold, 2003: pp. 200-201). Muller and Boos also point out that there are a variety of
dimensions to consider when reviewing CCTV systems simply for their effectiveness, and that the
dimensions and sophistication of CCTV systems can impact on its overall value (2004: pp. 165-171). Given
the above questions,
can provide is the former. With this position clarified we can then move on to the questions
of means. Oversight of Surveillance Programs Central to the discussion of accountability of government
surveillance programs is the question of what methods of oversight are at our disposal to ensure
surveillance technologies, techniques and results are reasonably controlled and monitored? And more
importantly, how can these methods of oversight be implemented productively? For instance: TRACKING
How can
auditing of surveillance activities best serve to create public
transparency without sacrificing operational secrecy? How can program
THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 34
evaluations be developed to provide information to elected officials, administrators and citizens as to the
success or failure of surveillance efforts without compromising their effectiveness? Do contracts with
independent vendors need to require that their work on building new surveillance systems undergo
scrutiny by independent ethics boards familiar with the complexities of the technology? Should RFPs
stipulate that such new efforts take place within frameworks of ethics requirements determined
beforehand by numerous entities with expertise in the field in question? Should deployment and
implementation of surveillance tools undergo ongoing scrutiny by entities comprised of internal and
external monitors to ensure compliance with acceptable standards and norms of application in a
democratic society? Answering these questions, and more, holds the future of this field in the balance.
Some of these methods can be used up front (RFPs, contracting requirements and formative program
evaluations) and others can appear throughout the life of surveillance operations (performance and
financial audits, interim and summative program evaluations, and performance measurement reporting).
across levels of government where oversight responsibilities are concerned. While such legal tools hold a
necessary place among the approaches to monitoring and controlling such operations after long and
detailed public discussion is engaged in (such as developing actual law, and codified rules of practice for
established techniques such as wiretapping), it has at times proven PETER A. MAMELI 35 ineffective in
Bureau of Investigation (FBI) has encountered with their surveillance practices. While the USA PATRIOT Act
has authorized the use of National Security Letters, essentially administrative subpoenas, by the FBI in
investigations of international terrorism and foreign spying (Doyle, 2006), a Department of Justice, Office of
Inspector General (OIG) report identified that there was insufficient monitoring of the implementation of
this tool by its field offices in the earlier part of this decade. These findings raised questions of impropriety
and illegality in the resulting FBI surveillance activities (Associated Press, 2007). It is important that this
step was taken by the OIG before waiting for problems to find their way into the court system for
settlement through judicial review of administrative operations. And it is just this type of occurrence that
themselves struggling to offer the insight required to do the job of managing surveillance activities
effectively where newer forms of technology are involved. For example, unique expertise that exists
among private sector professionals developing technology and innovations within certain fields, such as
without
commensurate knowledge at their disposal government regulators
and elected officials may find themselves challenged to create
control mechanisms that are on point. Understanding these shortcomings, a more
facial recognition imaging, enables them to operate at such high levels that
flexible means of ongoing oversight needs to be sought out that can provide stability as implementation of
and oversight activities through the exploration of what has been termed soft law and/or soft
regulation. Discussions of soft law and soft regulation can be considered as a part of an emerging
discussion on the overall value of regulation and governance that has recently come to the foreground
(Braithwaite, Coglianese, and Levi-Faur, 2007). Soft law and soft regulation are inexact terms that cover a
multitude of quasi-legislative, often non-binding instruments used to enhance government efforts to
regulate service delivery areas. These instruments hopefully enable policy changes to emerge and harden
TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 36 through
voluntary application and adherence in both confrontational and politicized atmospheres where a wide
array of players from the public, private and non-governmental sectors are involved (see Brandsen,
Boogers and Tops, 2006: p. 550-551; and Mameli, 2000, p. 203-204).
mutually acceptable
guidelines for the ongoing management and oversight of these
activities would likely enhance their reliability in the eyes of the
public. Among the guidelines provided could be agreement to the need for time driven audits and
government surveillance programs construction and delivery of
that must be followed, they are something else indeed. Important enough to be taken note of, but ignored
at ones own professional and personal peril (Brandsen, Boogers and Tops, 2006: p. 550-551). Complicating
matters further, soft law and soft regulation often suggests that new implementation norms be followed
and attested to through self-reporting by the entities that are charged with providing a particular service.
Yet given that a gap exists between hard law and regulation and implementation in this sensitive policy
area, I PETER A. MAMELI 37 believe such an approach to remedying some of the complications involved
may very will find success if crafted carefully. This conundrum frames a central discussion point that needs
to be entertained here. How does soft law and soft regulation consistently result in something more than
soft, or even abdicated, governance? Even if governance was found lacking before, does this yield a better
answer? How can you be sure you have not let the fox guard the henhouse when you are counting on the
fox to give you a daily testament to his/her actions? Given this problem, it is important to begin by noting
that there are two sides to the coin of soft law and soft regulation. The first side of the coin views the use
of such unofficial guidelines as necessary tools to distribute new information to agents perceived as
needing to update and improve their services while still creating room for innovative practices to flourish.
part of the sender, or worst of all, a desire to engage in fraud, waste or abuse by keeping loopholes open
and outside eyes closed by one or both (see Brandsen, Boogers and Tops, 2006: p. 547-548 for a nice
break out of possible paths regulated parties can take in reaction to unofficial guidelines). Both sides of the
coin are relevant aspects of the discussion about the implications these instruments pose for practitioners
of soft law and soft regulation in complex environments. In unpacking these concerns it is important to
those being regulated to stifle innovation and simply toe the line in order to avoid being cited during
inspections and oversight even though these are not clear infractions that they will be called on
(Brandsen, Boogers and Tops, 2006: p. 550-551). In such a scenario, the process that should lead to an
active interchange of ideas between the center and the periphery that results in continuous improvement
poorly developed
unofficial guidelines that do not provide efective problem resolution
can also allow for abuse in application by practitioners . We should be
only leads to a game of follow the leader, or worse, resistance. Further still,
striving to shut off the mains that allow illegal activity to flow forward by crafting useful soft law and
regulation that also improves results. In the world of surveillance operations such a goal is of great value in
and of itself given the threats to liberty, privacy and civil rights that hang in the balance. The question that
emerges becomes: How can the relationship between those sending the soft forms of guidance and those
receiving it be made to work better? Can we ensure transparency, attain accountability, improve
effectiveness, prevent misconduct and enable innovation all at once? And, can individuals charged with
overseeing surveillance programs help this development along in a front to back process? The answer
seems to boil down to partnership and how to achieve it. If creative interchange between all parties is what
is desired, then trust must be created to allow the interchange to flourish. But the trust needs to run
through the entire process. Trust must exist in the formulation of the quasi-legislative instruments and
advice up front, and then in the oversight process that is created afterward. However, it is hard to create
that level of trust when there is resistance to oversight in PETER A. MAMELI 39 sensitive areas of national
security (involving surveillance operations, or any other activity). Certainly the recent problems between
the United States Central Intelligence Agency and its own Office of Inspector General, where the former
challenged the investigative methods of the latter in politically sensitive reviews, attest to this dilemma
(Mazzetti and Shane, 2007). Indeed, at the time of this writing the agency has successfully managed to
Yet
oversight and accountability of national security activities must
exist, and so the conundrum surrounding trust is laid bare. One undeniable finding from the CIAs
create two new positions to oversee the actions of its own internal watchdog (Miller, 2008)!
situation so far is that a lack of trust in oversight operations distracts an organization from accomplishing
its mission, at the very least. Therefore, it seems clear that trust needs to be established early on rather
than as an afterthought or result of a crisis if government is to function effectively. Trust can be developed
in a number of ways at the beginning of the process when advice is crafted and distributed to surveillance
practitioners in soft or hard forms. The first model that could be accessed to accomplish this is where the
public sector defers to nongovernmental parties from the start in the development of said guidelines (see
Brandsen, Boogers and Tops, 2006: p. 552; and, Bernstein and Cashore, 2007 for other examples). This is
similar to a model of rulemaking that Weimer refers to as private rulemaking (Weimer, 2006: p. 569). It is
important to note that the private rulemaking model is different than negotiated rulemaking, where
external parties engage in the process but dont control it, or agency rulemaking, where experts and
advisory boards are only invited in to offer their insight and support (Weimer, 2006: p. 569). Yet while
these approaches can create buy-in early that will help to ease relationships in the future, and should also
be pursued when developing soft law, it does not fully address the negative reactions to oversight
discussed above that follow down the road. Another level of trust needs to be developed in order to get
over this hurdle. And, it is incumbent on the personnel charged with such oversight to help facilitate that
trust. But how can this be achieved when thinking in the world of inspection is colored by expectations of
adversarial relationships, rather than collaborative ones? One way is to explore the creation of a means
that will ensure constructive engagement between the parties who could be involved with such a process
from front to back. To achieve this purpose I am suggesting developing Techno-Ethics Boards. Akin to
Institutional TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS
40 Review Boards (IRBs) in universities, and Bioethics Boards in health settings, Techno-Ethics Boards in
law enforcement settings would be charged with advising surveillance practitioners on how to go about
implementing hard law and regulation on these matters. They would also be responsible for addressing
ongoing questions of acceptable practice that would evolve as technology (and crime) changes. However,
different from IRBs, they would not have the ability to prevent the implementation of surveillance
programs. Due to the need for security, and the sensitive nature of information that may need to remain
protected even from the Board itself, final calls on implementation would still remain with law enforcement
personnel directly involved with the activity. Hence, the Boards oversight of said surveillance operations
of soft governance built on soft instrumentation. IRBs have been used within universities for decades in
order to protect human and animal subjects from research abuses (Neuman, 2003: p.129). While the
protections of subjects and procedures for construction of a Techno-Ethics Board to provide guidance to
government surveillance programs might indeed differ from an IRB, it is no doubt a worthwhile enterprise
to begin exploring. Could such a body stop abuses from happening where law enforcement is trying to
protect national security, but going beyond acceptable norms of practice? If so, it is at least worth the
practitioners and their subjects become victims of overzealous observation efforts, if it can be short-
a Techno-Ethics
Board would require a spray of appropriate expertise and talent, with a
circuited (Singleton, Jr. and Straits, 2005: p. 519)? As with federally mandated IRBs
membership of at least five parties (Singleton, Jr. and Straits, 2005: p. 530). My recommendations would
include, at a minimum: one lawyer, one ethicist, one technology expert, one oversight expert, and one
field practitioner. As with IRB appointments, sensitive demographic information would also need to be
taken into account in the development of a Techno-Ethics Board in order to ensure a balance of
backgrounds are represented (OSullivan, Rassell and Berner, 2007: p. 261). All may come from
government circles, or none. However, there are complications that come with including non-governmental
entities in security driven operations that makes for a quandary in this regard. It is more likely, given the
PETER A. MAMELI 41 information and context that surveillance reviews would take place under, that
personnel would need to be drawn from across differing law enforcement agencies (and perhaps levels of
government) more so than from outside parties. Regardless of who is chosen to serve however, the goal, of
course, would not be to create a confrontational atmosphere but rather a mutually supportive one where
professionals concerned with surveillance and its implications could gather to address real world
implementation concerns.
this new law would allow the authority to intercept all internet
traffic, by monitoring so-called co-operation points at the Internet Service Providers. By copying all
the information passing through the cables, the FRA will be able to extract trafficdata from, the multitude of data, both domestic and international.
but
Consequently, a mode of operation which was developed in the context of the post-war arms race will be
transferred to the Internet as this law is effectuated during 2009. However, the Internet is largely used by
private and corporate communication, rather than military information, a fact that raises questions
works, the notion of a public is borrowed from the philosopher John Dewey, who explicitly stresses the
potential since its architecture, at least ideally, promotes participation, sharing and communication, which
is precisely what Dewey is asking for. However, it seems that
and databases. Sensors include RFID-chips, digital CCTV-cameras, credit cards, mobile phones, internet
surveillance etc., and they all have the ability to record an ever increasing part of our everyday lives. This
is where we get close to the etymology of the words pan-, which means everything, and spectrum which is
the other pole of panspectrocism emerges; the need for supercomputers and advanced software and
statistics. The FRA has bought one of the fastest supercomputers in the world, and it is plugged directly
into the central fibre-cables of the Swedish Internet Service Providers. They will consequently receive a
copy of all traffic-data, and then process it in several steps in order to find patterns. The problem is,
however, that traffic-data (which contains information about with whom, at what time, how frequently etc.
we communicate) can say a great deal about you and your life. If we make social network analyses of the
meta-data you give off during a normal day, the surveyor can probably find out who most of your friends
are, and where you are most likely to be located. With more and more data, the surveyor is able to tell
your religion, sexuality, political affiliation and consumer behaviour. Citizen Journalism, Pirate Parties and
resonate in the same direction, towards a clear goal, but their basic properties and relations are essentially
Issues, such as the FRA-law, can only stir up reactions and become
issues proper if, following Dewey, there is communication between
actors allowing them to react to what is imposed on them . It has been said
heterogeneous.
that the case of the FRA-law was the first time in Swedish history that traditional newspapers lagged the
blogosphere, and for the centre-conservative government the force of citizen journalism came as quite a
surprise. The blogosphere displayed a few interesting abilities by cooperating and sharing knowledge.
One important aspect of raising issues, needed to be accounted for in this case, is
speed. Paul Virilio argues in his book Speed and Politics, that: If speed thus appears
as the essential fall out of styles of conflicts and cataclysms, the
current arms race is in fact only the arming of the race toward the
end of the world as a distance, in other words as a field of action. [5]
Speed turns distance into action, and citizen journalism has a higher
velocity than the traditional media, being dependent on printing presses, paid and
professional journalists, or hierarchical organisations. During the passing of the FRA-law, the only
ones being able to read legal documents, do proper research, and
have a constructive discussion, were bloggers. In this case (and I do not want to
generalise this observation to be valid for the media in general) we may say that the allocation of
resources was much more efficient than that of large media corporations. The critical task for the
blogosphere in making a successful attempt at stopping this law is knowledge production. Surveillance
technologies and intrusive legislations are complex matters which are often secretive in character. Signals
intelligence is maybe an extreme case, since details about methods and search criteria is necessarily kept
away from the public. The first step in the case of the FRA was ontopolitical, in the sense that there was
(and still is) a struggle to define whether signals intelligence is mass-surveillance, which would be a
Bloggers
analysed legal documents and government white papers, as a kind
of swarm intelligence, and could argue convincingly that they
entailed many legal exceptions for the FRA in registering political
opinions, sexual orientation or religious background. The counter-argument
from advocates of the law did not convince the bloggers, and the traditional media started
covering the issue extensively. During the summer of 2008, there were articles in the
disaster for integrity, or simply a means to target very few enemies of society (terrorists).
newspaper almost every day for months, and many bloggers wrote extensively in both arenas
offline venues. In cyber venues, the United States in particular has had
to justify state intrusion into cyber venues. Void of routinized
responses to traditional threats, the state must reshape or
reconfigure its self-image in order to combat the contradictions
inherent in state intrusions into cyberspace. Taking in consideration
such concerns and dynamics, this essay first sets out to explain
ontological security in the study of international relations and the
discursive practices of U.S. state agents in justifying state
surveillance practices. It then concludes by drawing parallels between
these discursive practices and various presentations at the 2014 Milton Wolf
Seminar. Ontological Security in International Relations Theory
Physical security concerns dominate realist accounts of security in
world politics (Mitzen 2006: 342). Ontological security in international
relations goes beyond the premise that states are solely concerned with
physical security. The assumption that states only seek physical
security, Mitzen (2006: 364) argues, constrains international relations
theory by failing to explain why states may seek or continue conflict
at the expense of physical security. Inherent in the conception of a
states ontological security is the notion of the state as person, or at
the very least, that states are concerned with their own self-image.
20 Ontological security is about constructing and maintaining the
stability of a states self-image. Power, in this regard, can be
understood in terms 20 See Wendt (2004) for a discussion of the validity
and appropriateness of understanding the state as person in international
relations theory. 40 of a centralized bodys internal capacity to
perceive its ability to operate upon its own selfimage, as well as
influence others and determine outcomes (Steele 2010: 15). Thus,
power is not solely based upon a states ability to make other actors do what
they would otherwise not do, to pose material threats to other states, or
assert global influence; power is about the states recognition that it can use
and recreate its own self-image. States put forward narratives about
themselves through state agents, such as government officials. State actions
must be justified, even if they go against the grain of international norms or
expectations (Steele 2008: 10). What is particularly interesting about the U.S
response to the Snowden disclosures is the manner in which the disclosures
were framed, the contradictions that arose as a result of this framing, and
how the narratives that the state produced regarding NSA practices harken
back to the self-image-making of the U.S. state. Why the United States?
When examining speeches made by U.S. state agents, publications regarding
U.S. citizenship, and the ways the United States is presented in popular
culture, common trends emerge: The United States is presented as
exceptional, as a land of shared values-- liberty, freedom, and prosperity
which were created by the nations founding fathers. David Campbell (1998:
131) suggests that America is an imagined community par excellence.
America, like all other states, is dependent upon practices that make up its
ontological being. However, as Campbell (1998) argues: Defined, therefore,
more by absence than presence, America is peculiarly dependent on
representational practices for its being. Arguably more than any other state,
the imprecise process of imagination is what constitutes American identity (p.
91). Space and time in reference to U.S. identity is crucial to this analysis
because successful fulfillment of ontological state security is predicated upon
that states ability to maintain a consistent self-identity and self-image. Void
of a people as a foundational element, the United States self-identity is quite
fleeting, and, thus, hinges on representational, symbolic, and iconic imagery
in order to ascribe to itself some form of identity (Campbell 1998: 132). The
U.S. State Narrative In a speech made prior to Snowdens disclosures,
President Obama spoke of the necessity to secure cyber infrastructure while
maintaining the internet as a free and open space: Our pursuit of
cybersecurity will notI repeat, will not includemonitoring private sector
networks or Internet traffic. We will preserve and protect the personal privacy
and civil liberties that we cherish as Americans. Indeed, I remain firmly
committed to net neutrality so we can keep the Internet as it should be
open and free. In light of the Snowden disclosures, a contradiction arises
between the actual behavior of the state through its national security agency
and the self-image of the state. President Obama sends two distinct and
seemingly irreconcilable messages regarding cyberspace: First, the United
States, as a centralized power, recognizes the tensions that it must mediate
between security and 41 liberty; Second, the United States has a vision for
cyberspace, one focused on being open and free. But free for whom? U.S.
security policy is decentralized insofar as it attempts to do too much while
still trying to keep a constant self-image (See Campbell 1998 and Gould and
Steele 2014). Cyberspace is not an American thing, but from cyberspace
comes a multitude of images that only exacerbate the imagined nature of
American identity. Thus, what cyberspace is and what cyberspace means,
from an American perspective, is inherently American. Addressing the noise
surrounding the practices of the National Security Administration, President
Obama first noted the history of intelligence gathering by the United States:
At the dawn of our Republic, a small, secret surveillance committee, born out
of the Sons of Liberty, was established in Boston. And the groups members
included Paul Revere. At night, they would patrol the streets, reporting back
any signs that the British were preparing raids against Americas early
patriots. In order to find footing and precedent in the face of ontological
insecurity in cyberspace two rhetorical moves are deployed. First, history is
resurfaced and reworked to create a seemingly appropriate metaphor for the
present. This history is doused in a patriotic whitewash, whereby particular
events are chosen but not others that are perhaps more indicative and
relevant to the current situation. Further, the parallels put forward by Obama
are not parallels at all; the nature of surveillance, global politics,
globalization, and technology are not the same as they were 200 or so years
ago. This history serves to maintain the states self-image over time.
Campbell (1998: 130) notes that the American quasi-war with France
demonstrated how previously established discursive strategies of otherness
could be invoked in novel circumstances to provide powerful modes of
understanding. Much in the same way, President Obamas return to history
had a
the inactive members of militant outfits about their existence, said Mufti Mahmud Khan, Rab's Legal and Media wing
posted on Jihadist Forum on May 2, AQIS claimed the responsibility for the murder of writer-blogger Avijit Roy. In the video,
AQIS leader Asim Umar said his organisation carried out the attack on Avijit and other blasphemers" in Bangladesh and
Pakistan. Rab officials, however, said they so far did not find any link between the arrestees and the murders and the AQIS
claim. They said they would interrogate them further in remand about the murders and the claim. Mufti Mahmud Khan told
reporters that Maulana Mayeen Uddin alias Abul Jandal, a death-row in mate and a top Huji leader, had been
The arrestees had been planning a Trishalstyle ambush on a prison van to snatch away Mayeen from custody , he
communicating with the arrestees from jail.
said. In February last year, militants attacked a prison van in Trishal of Mymensingh and liberated three condemned JMB
leaders from police custody. A policeman was killed in the attack. Two of the escapees are still at large while the other one
was killed in a shootout. Huji had wanted to free Mayeen by attacking and cutting the grills of Kashimpur Jail, Rab claimed,
days. The other arrestees were: Mohammad Saidul Islam alias Sayeed Tamim, Mosharraf Hossain, Abdur Rahman Bapary,
Al Amin Ibrahim, Mozahidul Islam Nakib, Ashraful Islam alias Abul Hashem, Robiul Islam, Habib Ullah, Shohidul Islam, and
Rab during its drive in a Mirpur house also seized bombmaking materials and manuals, and books on jihad.
Altaf Hossain.
mass casualty attacks in 2014 were the December attack by the Pakistani Taliban on a school in Peshawar,
Pakistan that killed at least 150 people and the June attack by Islamic State militants on a prison in Mosul,
Iraq, in which 670 Shiite prisoners died. At the end of 2014, the prison attack was the deadliest terrorist
operation in the world since Sept. 11, 2001, according to the report. The State Department's
counterterrorism coordinator said the numbers don't reflect improvements by the U.S. and its partners in
stamping out terrorism financing, improving information sharing, impeding foreign fighters and forming a
Terror
attacks took place in 95 countries in 2014, but were concentrated in
the Mideast, South Asia and West Africa. Iraq, Pakistan,
Afghanistan, India and Nigeria accounted for more than 60 percent
of the attacks and, if Syria is included, roughly 80 percent of the fatalities,
the report found. The rise in kidnappings is mainly attributable to
sharp increases in mass abductions by terrorist groups in Syria,
notably the Islamic State and the al-Qaida-linked al-Nusra Front . In
coalition to fight the Islamic State. "We have made progress," Ambassador Tina Kaidanow said.
Nigeria, Boko Haram was responsible for most, if not all, of the nearly 1,300 abductions in Nigeria in 2014,
including several hundred girls from a school in Chibok. By contrast, fewer than 100 terror-related
kidnappings were reported in Nigeria in 2013, according to the report.
their veils didnt conform to AQAP rules, or if they found their perfume to be too strong. At first, it was not
so bad. The AQAP militants were happy enough just giving out 'advice'.
U.S. Central Command, who is leading the Syrian training program, had about 7,000 potential recruits
identified but "It's
can achieve our goal of training a few thousand this year." " I
He suggested that the recruiting effort was failing because the U.S. has yet to tell the Syrian rebels
whether the U.S. would protect them from attack by the regime of Syrian President Bashar al-Assad.
McCain asked: "Is that fair to these young men to say we are sending you in to fight ISIS only, and by the
way, we will decide on the policy whether to defend you if you are barrel bombed?" Carter and Joint Chiefs
U.S. training
program for Iraqis was also falling far short of its goals . About 8,800
have been trained for the Iraqi Security Force (ISF), and another 2,000 for
Chairman Gen. Martin Dempsey, who also testified at the hearing, said that the
counter-terrorism activities, against projections that 24,000 would be fielded by the end of this year, Carter
said. The hearing marked what was likely to be the last Congressional testimony by Dempsey, who will
retire in October. On Thursday, the committee will hold a confirmation hearing for Dempsey's designated
successor, Marine Commandant Gen. Joseph Dunford. The hearing also offered McCain and Dempsey what
was probably their last opportunity to renew their long-standing feud over tactics, strategy, readiness and
budgets going back years. Their disputes reached the point two years ago where McCain put a temporary
hold on Dempsey's re-nomination as JCS Chairman.
view ISIS as a byproduct of the U.S. invasion of Iraq. We wrecked a country, destroying its institutions
and security forces, creating a vacuum that drew in jihadists from across the
globe. Al-Qaida had not operated in Iraq before the invasion ; it moved
in after the invasion, setting up shop in the Sunni communities
antagonized by the U.S.-led occupation. Similarly, ISIS has exploited the alienation of the Sunni population from the
sectarian Shiite-led government of Prime Minister Nuri al-Maliki to gain control of much of northern and western Iraq.
deterioration of some aspects of human rights a shrinking democratic space across Central Asia. Curbing freedoms, he
said, might create an illusion of stability in the short-run but ultimately would foster a breeding ground for extremist
ideologies. The failure to respect human rights, build accountable institutions, promote
political participation, and ensure opportunity for all creates gaps, continued the Secretary-General. Young people