Article Summaries


Snowden Deserves An Immediate Presidential Pardon



Download 396.84 Kb.
Page2/10
Date07.05.2017
Size396.84 Kb.
#17392
1   2   3   4   5   6   7   8   9   10

Snowden Deserves An Immediate Presidential Pardon

Citation: Walt, Stephen. (2013). Snowden Deserves An Immediate Presidential Pardon. Belfer Center for Science & International Affairs. Retrieved 1/2/16. http://belfercenter.ksg.harvard.edu/publication/23229/snowden_deserves_an_immediate_presidential_pardon.html

Walt Article Summary: Charges are possibly being brought against Edward Snowden for leaking classified data that revealed the extent of NSA bulk data collection. Walt argues that Snowden should be pardoned since he never revealed information about the NSA for his own personal gain. Due to Snowden’s leaks we now know the full scope of the NSA’s surveillance. We also know that a large number of non-criminal individuals were also being surveilled.

Walt Article Strategic Points:

  • This article can be used as part of an affirmative case that details the extent of NSA bulk data collection.

  • This article can also be used as a solvency argument for affirmatives that deal directly with Edward Snowden, such as a Pardon Snowden Affirmative or End Surveillance Against Whistleblowers Affirmative.

  • This article can be used to answer claims that surveillance is predominantly used against criminals and suspected terrorists, because Snowden’s revealed that surveillance was far larger in scope.

Afterword,” Homeland
Citation: Applebaum, Jacob. (2013). “Afterword,” Homeland — by Cory Doctorow. Retrieved 1/2/16. http://pastebin.com/VHBx3imj
Applebaum Article Summary: This article is more of a narrative dramatic speak about the need to move forward and disrupt injustices we see in society now. It mentions that free and open systems that help society view governments as a whole and better able to criticize, which is the key to ending over securitization and suppression of free speech.
Applebaum Article Strategic Points:

  • This article can be used as impact or internal link evidence to say it’s important to protect open spaces that question the government.

  • This article can be used as impact evidence to say surveillance is tyranny.



Protest in New Terror
Citation: Royden, Derek. (2015). Protest in New Terror. Axis of Logic. Retrieved 1/2/16. http://axisoflogic.com/artman/publish/Article_70908.shtml
Royden Article Summary: Historically the government has always targeted, infiltrated, and attack activist movements I found threatening. This includes surveillance against the civil rights movement and COINTELPRO operations against the Black Panthers. Today technology and surveillance overreach has made these tactics worst. There is evidence that the Black Lives Matter Movement is being targeted. The main reason for this is intelligence agencies like the NSA and FBI must constantly find new terror threats to justify their growing budgets and technology.
Royden Article Strategic Points:

  • This article can be used to argue that intelligence agencies invent new reason to surveil activist organizations in order to justify their existence.

  • This article can be used as part of a democracy advantage, because government surveillance programs have a long history of dismantling activist movements.

  • This article can be used to make arguments about why the continued growth of intelligence agencies is harmful.


Why “I Have to Hide” Is The Wrong Way to Think About Surveillance
Citation: Marlinspike, Moxie. (2013). Why “I Have to Hide” Is The Wrong Way to Think About Surveillance. Wired. Retrieved 1/2/16. http://www.wired.com/2013/06/why-i-have-nothing-to-hide-is-the-wrong-way-to-think-about-surveillance/
Marlinspike Article Summary: Marlinspike argues that there are so many laws and sections of the United States Code that government itself can’t even count them all. So, as private citizens we can never be sure that we are not breaking a crime. If the government only surveils “criminals” that could technically include every person in the country.
Marlinspike Article Strategic Points:

This article demonstrates how surveillance programs could technically target every person in the country.


Turnkey Tyranny: Surveillance and the Terror State
Citation: Paglen, Trevor. (2013). Turnkey Tyranny: Surveillance and the Terror State. Creative Time Reports. 1/2/16. http://creativetimereports.org/2013/06/25/surveillance-and-the-construction-of-a-terror-state/
Paglen Article Summary: Terrorism does not pose a threat to the United States. However, a country that is in a state of terror can be a threat. Terrorism work by instilling so much fear in a society that the society begins to collapse itself. Surveillance is an example. Surveillance primarily targets religious and political minorities by scaring people away from non-mainstream thought.
Paglen Article Strategic Points:

  • This article can be used as impact evidence

  • This article can be used to answer and/or clarify terrorism impacts by explaining that terrorism is a threat because of the widespread fear it causes, but not the actual damage.

  • This article can be used as part of Terrorism Advantage


Beyond the NSA, Other Agencies Spy on You Too
Citation: Buttar, Shahid. (2014). Beyond the NSA, Other Agencies Spy on You Too. Truthout. Retrieved 12/22/15. http://www.truth-out.org/opinion/item/20670-beyond-the-nsa-other-agencies-spy-on-you-too
Buttar Article Summary: People mistakenly believe that the NSA (National Security Agency) is the cornerstone of government surveillance. However, other organizations like the FBI are carrying out most surveillance operations. Also, efforts that curtail these organizations like the FREEDOM Act have not been successful.
Buttar Article Strategic Points:

  • This article can be used as a Solvency answer to Affirmatives that curtail the NSA. You can make the argument that the Aff fails, because it focusing on only a single government organization.

  • This article can also be used to show that efforts to curtail surveillance historically fail.


Buttar Full Article:

The latest discoveries about NSA spying revealed that the agency has collected 27 terrabytes of information about cellphone locations to track its targets not only in cyberspace, but also real space. It siphons billions of dollars each year from a federal budget in crisis. And it is watching you and your children.

Lost in the debate about NSA spying, however, have been the dozens of other federal agencies also complicit in Fourth Amendment abuses.

Leading the Charge: The FBI

The FBI is among the federal agencies leading the assault on the Constitution. The FBI runs its own intelligence databases, has long abused the very same sections of the PATRIOT Act for which the NSA has recently come under fire and has the further distinction of having infiltrated First Amendment-protected activist groups and religious institutions all over the country.

Nor are these new issues. Unfortunately, the FBI's abuses are well established: For at least a quarter century, the bureau deployed a series of domestic "counterintelligence programs" that were discovered by activists in the 1970s and then investigated by Congressional oversight committees. Summarized as a "sophisticated vigilante operation" in 1976 by the Senate, CoIntelPro presaged the recurrence of similar abuses under the Bush administration and continuing into the Obama administration.

In 2008, I sued the FBI to seek public disclosure of its secret policy authorizing undercover infiltration. Our FOIA case did force the bureau to disclose the document, but the FBI redacted the entire chapter on what it calls "undisclosed participation."

A bizarre - and widely overlooked - exchange in a 2010 Senate Judiciary Committee oversight hearing revealed what little we know. When asked by Senators under what legal standard the FBI Infiltrates activist groups, the then-director of the FBI assured them that “reasonable suspicion of criminal activity” was first required, only to repudiate his statement before the sun had set.

As it turns out, even reasonable suspicion of criminal activity is not required, as the FBI admitted in a letter sent to the Hill that evening, after the cameras and microphones were off. According to the FBI, any "proper purpose" can justify infiltrating an activist group, however untethered the means toward that purpose might become.



Congress: Years Late and Billions Short

After a decade of sitting on its hands and enabling the dangerous entrenchment of executive power at nearly every opportunity, Congress is finally beginning to pay attention. But even measures that purport to restrain the NSA’s dragnet spying settle for scratching at the surface.

The USA FREEDOM act was thoughtfully engineered by the authors of the PATRIOT act to restrain executive agencies including the NSA and FBI from abusing their approval of expanding powers over the past decade. Even their bill, however, fails to address most of the FBI’s recurring problems.

One measure, introduced by Rep. Rush Holt (D-NJ), would do more. Holt is not your average member of Congress. Having taught physics at Princeton (making him the only rocket scientist among his four hundred colleagues), he’s arguably the smartest member of the chamber. He’s also the former chair of the House Intelligence Committee, the successor to the Pike committee that in the 1970s famously investigated decades of FBI crimes.

Rep. Holt’s bill, the Surveillance State Repeal Act, would rescind the PATRIOT Act entirely, as well as the 2008 amendments to the Foreign Intelligence Surveillance Act. It is the only pending bill that would force the intelligence agencies to justify their powers from a pre-9/11 baseline, as they should.

Unfortunately, most members of Congress who talk about privacy have yet to walk their talk. And with leading Democrats carrying the Bush administration’s water now that President Obama is holding the glass, it will take continued collaboration across the aisle, along with creative public displays of dissent to rein in the surveillance state.




Want To Predict the Future of Surveillance, Ask Poor Communities
Citation: Eubanks, Virginia. (2014). Want To Predict the Future of Surveillance, Ask Poor Communities. The American Prospect. Retrieved 12/22/2015. http://prospect.org/article/want-predict-future-surveillance-ask-poor-communities
Eubanks Article Summary: In the article Eubanks explains that many of the ways we are spying on people is extending to poor people. For example, the government tracks welfare recipients with their social service records. Often times welfare programs are used to spy on people of gender and racial minorities.
Lastly Eubanks makes the argument that the problem with surveillance is not privacy, but rather a lack of human rights. We should resist surveillance to protect rights, not privacy.
Eubanks Article Strategic Points:

  • This article could be used to cut cards about how surveillance is more problematic to poor people and racial minorities.

  • This article could be used to explain the diversity of ways the government surveils people, which includes government records and online tracking.

  • This article could be used to answer claims that privacy protection is important, Eubanks criticizes that kind of thinking as ignoring rights.


Eubanks Full Article:

Since Edward Snowden started disclosing millions of classified NSA documents in June, terms like metadata, software backdoors, and cyber vulnerability have appeared regularly in headlines and sound bites. Many Americans were astonished when these stories broke. In blogs, comment sections, and op-ed pages, they expressed disbelief and outrage.

But I wasn’t surprised. A decade ago, I sat talking to a young mother on welfare about her experiences with technology. When our conversation turned to Electronic Benefit Transfer cards (EBT), Dorothy* said, “They’re great. Except [Social Services] uses them as a tracking device.” I must have looked shocked, because she explained that her caseworker routinely looked at her EBT purchase records. Poor women are the test subjects for surveillance technology, Dorothy told me ruefully, and you should pay attention to what happens to us. You’re next.

Poor and working-class Americans already live in the surveillance future. The revelations that are so scandalous to the middle-class data profiling, PRISM, tapped cellphones–are old news to millions of low-income Americans, immigrants, and communities of color. To be smart about surveillance in the New Year, we must learn from the experiences of marginalized people in the U.S. and in developing countries the world over. Here are four lessons we might learn if we do.

 

Lesson #1: Surveillance is a civil rights issue.

Counterintuitive as it may seem, we are targeted for digital surveillance as groups and communities, not as individuals. Big Brother is watching us, not you. The NSA looks for what they call a “pattern of life,” homing in on networks of people associated with a target. But networks of association are not random, and who we know online is affected by offline forms of residential, educational, and occupational segregation. This year, for example, UC San Diego sociologist Kevin Lewis found that online dating leads to fewer interracial connections, compared to offline ways of meeting. Pepper Miller has reported that sometimes, African Americans will temporarily block white Facebook friends so that they can have “open, honest discussions” about race with black friends. Because of the persistence of segregation in our offline and online lives, algorithms and search strings that filter big data looking for patterns, that begin as neutral code, nevertheless end up producing race, class, and gender-specific results.

Groups of “like” subjects are then targeted for different, and often unequal, forms of supervision, discipline and surveillance, with marginalized communities singled out for more aggressive scrutiny. Welfare recipients like Dorothy are more vulnerable to surveillance because they are members of a group that is seen as an appropriate target for intrusive programs. Persistent stereotypes of poor women, especially women of color, as inherently suspicious, fraudulent, and wasteful provide ideological support for invasive welfare programs that track their financial and social behavior. Immigrant communities are more likely to be the site of biometric data collection than native-born communities because they have less political power to resist it. As panicked as mainstream America is about the government collecting cellphone meta-data, imagine the hue and cry if police officers scanned the fingerprints of white, middle-class Americans on the street, as has happened to day laborers in Los Angeles, according to the Electronic Frontier Foundation.
Marginalized people are in the dubious position of being both on the cutting edge of surveillance, and stuck in its backwaters. Some forms of surveillance, like filmed police interrogations, are undoubtedly positive for poor and working-class communities and racial minorities. But marginalized people are subject to some of the most technologically sophisticated and comprehensive forms of scrutiny and observation in law enforcement, the welfare system, and the low-wage workplace. They also endure higher levels of direct forms of surveillance, such as stop-and-frisk in New York City.
The practice of surveillance is both separate and unequal. Acknowledging this reality allows us to challenge mass surveillance based on the 14th Amendment, which provides for equal protection under the law, not just on the 4th Amendment, which protects citizens against unwarranted search and seizure. Surveillance should be seen as a collective issue, a civil rights issue, not just an invasion of privacy.

 

Lesson #2: To a hammer, everything looks like a nail.



We can intuit the shape of surveillance-to-come by keeping an eye on developing countries, as well as exploring its impacts on marginalized communities here in the United States. The most sweeping digital surveillance technologies are designed and tested in what could be called “low rights environments”—poor communities, repressive social programs, dictatorial regimes, and military and intelligence operations—where there are low expectations of political accountability and transparency. Drones that deliver Hellfire missiles, Long Range Acoustic Devices (LRADs) that send pain-inducing tones over long distances, and stun cuffs that deliver 80,000 volts to detainees via remote control allow users to avoid direct responsibility for the human suffering they cause.
Many of these technologies are first developed for the U.S. military to deploy in the global south, and later tested for civilian purposes on marginal communities in the United States. LRADs, for example, were developed by San Diego-based military contractor American Technology Corporation in response to the bombing of the USS Cole in Yemen in 2000, and then famously used to disburse G20 protestors in Pittsburgh in 2009. Technologies designed for the military carry expectations about the dangerousness of the public, and can be used over-aggressively in community policing and crowd control. To a technology designed for counter-terrorism, everyone looks like a bad guy.
Then there is the digital side of things. “Law enforcement agencies, intelligence agencies, and militaries invest in Trojans, bad software, malicious network attacks and other things that we normally associate with heavy criminality,” says Amelia Andersdotter, member of the European Parliament and the Swedish Pirate Party, which is dedicated to reforming copyright and patent laws. “No one is obliged to inform users of security flaws or to fix vulnerabilities.” In fact, as the Guardian and The New York Times  reported in September, the NSA spends $250 million a year to work with technology companies to make commercial software—including encryption software—more “exploitable.” Insecure by design, this software is passed on to business and the public sector to hold software producers accountable. Presently, we mandate penalties for vendors that fail to security test their software in the airline and shipping industries, but not in other crucial areas: healthcare, nuclear plants, electricity grids. Andersdotter suggests that design liability regulations could hold software companies liable for not disclosing security flaws, responsible for damages they cause, and obliged to help users fix problems. But this solution may pose more questions than it settles: Who will administer the standards if software vendors and national governments are already subverting data-security requirements? How much transparency is possible when data holdings are centralized by commercial entities like Google, or by state entities, as in Brazil’s proposed national data centers?

 

Lesson #3: Everyone resists surveillance, not just the bad guys.

Resistance to surveillance is as common as surveillance itself. “There is always a cross-section of the population working to trick the system,” explains John Gilliom, co-author of SuperVision: An Introduction to the Surveillance. “Whether it's a college kid getting a fake ID, or the middle class family hiding a little bit of cash income to lower its tax bill, or the food-stamp recipient hiding an extra roommate. We often call this fraud or cheating, but something this widespread is more than misbehavior. It is resistance.”

“Data is the new oil. Beyond collecting information, it also means gathering power,” argues Joana Varon Ferraz, researcher from the Center of Technology and Society at Fundação Getúlio Vargas in Rio de Janeiro, Brazil, “Every government has become dataholic.” Dataholic political and commercial systems foster defiance. We don’t necessarily resist because we’ve done something wrong. We resist because surveillance is not just about privacy; it is about power, control, self-determination and autonomy.


If people remain concerned about the impact of surveillance on their lives they may voluntarily withdraw from the digital world. Gilliom suggests we might even see “a hipster social trend where disengagement becomes a form of cache.” But digital disconnection can simply be an excuse for maintaining ignorance; many people don’t have the option to disengage. For example, public assistance applicants must sign a personal information disclosure statement to permit social services to share their social security number, criminal history, personal, financial, medical and family information with other public agencies and private companies. Technically, you can refuse to sign and withhold your social security number. But if you do not sign, you cannot access food stamps, transportation vouchers, cash assistance, childcare, emergency housing assistance, and other basic necessities for survival, or even talk to a caseworker about available community resources.
There are alternatives to disengagement. Brazil and Germany introduced a joint resolution to the UN condemning the member countries of what is unofficially known as the Five Eyes Alliance—the U.S., U.K., New Zealand, Canada, and Australia—for massive electronic surveillance and infringement of human rights. The EU is developing a General Data Protection Regulation that would unify data protection under a single European law. The BRICS cable, a 21,000 mile, 12.8 Terabyte per second fiber system connecting Brazil, Russia, India, China, South Africa, and Miami—is creating an alternative data pipeline to lower the cost of communication among major economies of the global south and provide non-U.S. routes for world communications.
Answers to the dilemmas we face in the surveillance society are not likely to come from Silicon Valley or Washington. This year, the Obama administration was put in the position of defending the National Security Administration’s snooping while stumping for a Consumer Privacy Bill of Rights that boosts security for online shoppers. It is still unclear how President Obama will respond to his Review Group on Intelligence and Communications Technologies’ report calling to terminate the storage of bulk data collected under the Foreign Intelligence Surveillance Act.

 

Lesson #4: Privacy is not the problem.

In his Christmas Day address on the U.K.’s Channel 4, Edward Snowden trotted out the hoary old clichés about George Orwell, Big Brother, and the end of privacy. But for most people, privacy is a pipedream. Living in dense urban neighborhoods, public housing, favellas, prisons, or subject to home visits by caseworkers, poor and working people might wish for more personal space, but they don’t make Snowden’s mistake of assuming that privacy is “what allows us to determine who we are and who we want to be.”
We need to move away our fixation on privacy and towards a future based on digital human rights. We can take some cues from Brazil, which is currently creating a collaborative, multi-stakeholder “Internet Constitution,” the Marco Civil da Internet. The Marco connects digital communication to deeply held democratic values: internationalism, active citizenship, access to information, freedom of expression, democratic governance, civic participation, multilateralism, inclusivity and non-discrimination, plurality, cultural diversity, freedom of speech. The Marco also addresses network neutrality, personal data protection, and, yes, even privacy. But it is not the central issue. Seeing privacy as the cornerstone for democracy is a kind of naiveté we can no longer excuse nor afford.
We should care when national governments engage in surveillance of any kind, not just when they spy on us. Shock and outrage are callow luxuries, and the Snowden leaks eliminated our last justification for ignorance. Software designed for authoritarian political aims spawns repressive political environments wherever it is used. Systems tested in low rights environments will, as Dorothy informed me a decade ago, eventually be used on everyone.



Download 396.84 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10




The database is protected by copyright ©ininet.org 2024
send message

    Main page