Index 1 shell 2



Download 0.54 Mb.
Page5/16
Date19.10.2016
Size0.54 Mb.
#4438
1   2   3   4   5   6   7   8   9   ...   16

***IMPACT***




2NC – Lone Wolf Scenario




Expiration of NSA authority prevents our ability to detect lone wolf terrorists --- they are looking for any vulnerability.


Daily Mail, 5/31/2015. “Head of CIA warns that US is at risk of lone wolf terror attack after NSA powers to monitor all phone calls expired – as Isis ‘watch carefully’ for security gaps,” http://www.dailymail.co.uk/news/article-3105089/Senate-makes-ditch-bid-extend-NSA-s-bulk-collection-phone-records-Rand-Paul-swears-block-legislation-let-Patriot-Act-expire.html.
The head of the CIA has warned that Americans are now at risk after the Senate was unable to extend laws giving authorities special powers to fight terrorists.

Politicians in the upper house were unable to come to an agreement to extend key parts of the Patriot Act - that legalize controversial methods of surveillance by the National Security Agency (NSA) - which expired on Sunday.

Attempts were frustrated by Presidential candidate Rand Paul, who has taken a firm stance against the extension of powers allowing the mass collection of phone records, wire taps and warrants without evidence.

But the Head of the CIA John Brennan claims ordinary Americans, who expect the NSA to do their jobs, have been put at risk by 'political grandstanding and crusading for ideological causes' that fueled the debate.

Speaking on CBS show Face The Nation, he warned that the US - and Europe - is now in danger from technologically 'sophisticated' terrorists who are watching developments carefully and 'looking for the seams to operate' within

He claimed that the authorities do not abuse the powers, extended in 2011 to help fight lone wolf terror suspects not connected to a specific group, and that without them, it's difficult for the NSA to protect America.

Mr Brennan said: 'I think terrorist elements have watched very carefully what has happened here in the United States, whether or not it's disclosures of classified information or whether it's changes in the law and policies. They are looking for the seams to operate within.

'And this is something that we can't afford to do right now, because if you look at the horrific terrorist attacks and violence that is being perpetrated around the globe, we need to keep our country safe. And our oceans are not keeping us safe the way they did a century ago.'

The Patriot Act was passed in 2001 in the wake of the 9/11 terror attacks. Now that the provisions have expired, government agents will need to subpoena phone companies for the records.

The White House previously justified collecting the records because of the Patriot Act's Section 215, which expired on Sunday.



Two other provisions, added in 2011, also expired with it. The first is a 'roving wiretap' provision which allows government agencies to keep tracking suspects as they switch devices.

The second is a 'lone wolf' clause which allows warrants to be granted without any evidence linking a suspect to a foreign power or terrorist group.

Political struggles over the NSA and its data collection have become a national issue since whistleblower Edward Snowden revealed the extent of government programs in 2013. 

The senate's efforts to pass a replacement bill were frustrated by Kentucky's junior senator Rand Paul, who has spoken at length against the NSA's activities, which he has excoriated as illegal and unconstitutional.

Paul, a Republican who is running for president, came up against members of his own party, as well as the Obama administration.

With his presidential campaign waning, he has been accused of irresponsible political opportunism by opponents, by fighting a bill on ideological grounds that may put ordinary people at risk.

He was criticized by the White House Sunday night, which called the Patriot Act expiration an 'irresponsible lapse'. 

While Brennan didn't mention Paul by name, he said on Face The Nation: 'Unfortunately I think there is a little too much political grandstanding and crusading for ideological causes that have really fuelled the debate on this issue.

He added: 'These are authorities that have been used by the government to make sure that we're able to safeguard Americans. And the sad irony is that most Americans expect the government to protect them. And so although there's a lot of debate that goes on, on the Congress and the Hill on this issue, I think, when you go out to Boise or Tampa or Louisville, Americans are expecting their law enforcement and homeland security and intelligence professionals to do their work. And these authorities are important.' 

Paul argued 'there must be another way' but even he agrees that the lapse in these powers are likely to be temporary as politicians work on the USA Freedom Act, which is expected to pass within the next week.

Republican Senate Majority Leader Mitch McConnell called a rare Sunday session to try to pass the replacement law, but was unable to push it through in time.

And although the replacement is set to pass this week, Paul said the expiration was 'a victory no matter how you look at it'. 

In a statement, he said: 'It might be short lived, but I hope that it provides a road for a robust debate, which will strengthen our intelligence community, while also respecting our Constitution. 

He added: 'The expiration of the NSA's sweeping, all-encompassing and ineffectual powers will not relinquish functions necessary for protecting national security. The expiration will instead do what we should have done all along - rely on the Constitution for these powers.' 

According to a top lawmaker, as of 8pm Sunday no NSA employee could access their enormous phone records database, which holds metadata on millions of phone conversations handed over by telecoms companies like Verizon and AT&T.

Senate Intelligence Committee chairman Richard Burr said on Sunday: 'There is no way to get any type of agreement tonight -- either an extension or passage of a bill. So at 8pm tonight, NSA employees can not query the database'. 

In a statement issued Sunday night, Obama's press secretary Josh Earnest, urged action to pass the USA Freedom Act as quickly as possible.

He said: 'The Senate took an important - if late - step forward tonight. We call on the Senate to ensure this irresponsible lapse in authorities is as short-lived as possible.

'On a matter as critical as our national security, individual Senators must put aside their partisan motivations and act swiftly. The American people deserve nothing less.'

Some lawmakers have said the lapse raises alarming questions about how US authorities can keep the homeland safe with a diminished security toolbox.

'I think it's very very unfortunate that we're in this position,' said Senator Mike Lee, a conservative Republican who supports the reform bill.

'We've known this date was coming for four years. Four years. And I think it's inexcusable that we adjourned' for a weeklong break last week without resolving the issue.

Lee, too, conceded that the reform bill would most likely pass in the coming week.



With the clock ticking, CIA chief John Brennan warned Sunday that allowing vital surveillance programs to lapse could increase terror threats, and argued that the phone metadata dragnet has not abused civil liberties and only serves to safeguard citizens.

'This is something that we can't afford to do right now,' Brennan said of allowing the counterterrorism provisions to expire.

'Because if you look at the horrific terrorist attacks and violence being perpetrated around the globe, we need to keep our country safe, and our oceans are not keeping us safe the way they did century ago,' he said on CBS talk show Face the Nation.

Brennan added that online threats from groups like Isis would continue to grow over the next five to ten years.

He said: 'Isis has been very sophisticated and adept at using the Internet to propagate its message and reach out to individuals. We see what is happening as far as thousands upon thousands of individuals, including many thousands from the West, that have traveled into Syria and Iraq. And a number of these individuals are traveling back.

'And what we see, they're also using the Internet as a way to incite and encourage individuals to carry out acts of violence.



'So as the director of FBI says, you know, this use of these websites and their Internet capabilities is something of great concern. So yes, I think ISIS is a threat not just in the Middle East and South Asia and African regions but also to Europe as well as to the United States.'

Dispersion of technology enables lone wolf terrorists to access WMD.


Gary A. ACKERMAN, Director of the Special Projects Division at the National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of Maryland, AND Lauren E. PINSON, Senior Research/Project Manager at START and PhD student at Yale University, 14 [“An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells,” Terrorism and Political Violence, Vol. 26, Issue 1, 2014]
The first question to answer is whence the concerns about the nexus between CBRN weapons and isolated actors come and whether these are overblown. The general threat of mass violence posed by lone wolves and small autonomous cells has been detailed in accompanying issue contributions, but the potential use of CBRN weapons by such perpetrators presents some singular features that either amplify or supplement the attributes of the more general case and so are deserving of particular attention. Chief among these is the impact of rapid technological development. Recent and emerging advances in a variety of areas, from synthetic biology 3 to nanoscale engineering, 4 have opened doors not only to new medicines and materials, but also to new possibilities for malefactors to inflict harm on others. What is most relevant in the context of lone actors and small autonomous cells is not so much the pace of new invention, but rather the commercialization and consumerization of CBRN weapons-relevant technologies. This process often entails an increase in the availability and safety of the technology, with a concurrent diminution in the cost, volume, and technical knowledge required to operate it. Thus, for example, whereas fifty years ago producing large quantities of certain chemical weapons might have been a dangerous and inefficient affair requiring a large plant, expensive equipment, and several chemical engineers, with the advent of chemical microreactors, 5 the same processes might be accomplished far more cheaply and safely on a desktop assemblage, purchased commercially and monitored by a single chemistry graduate student.

The rapid global spread and increased user-friendliness of many technologies thus represents a potentially radical shift from the relatively small scale of harm a single individual or small autonomous group could historically cause. 6 From the limited reach and killing power of the sword, spear, and bow, to the introduction of dynamite and eventually the use of our own infrastructures against us (as on September 11), the number of people that an individual who was unsupported by a broader political entity could kill with a single action has increased from single digits to thousands. Indeed, it has even been asserted that “over time … as the leverage provided by technology increases, this threshold will finally reach its culmination—with the ability of one man to declare war on the world and win.” 7 Nowhere is this trend more perceptible in the current age than in the area of unconventional weapons.

These new technologies do not simply empower users on a purely technical level. Globalization and the expansion of information networks provide new opportunities for disaffected individuals in the farthest corners of the globe to become familiar with core weapon concepts and to purchase equipment—online technical courses and eBay are undoubtedly a boon to would-be purveyors of violence. Furthermore, even the most solipsistic misanthropes, people who would never be able to function socially as part of an operational terrorist group, can find radicalizing influences or legitimation for their beliefs in the maelstrom of virtual identities on the Internet.



All of this can spawn, it is feared, a more deleterious breed of lone actors, what have been referred to in some quarters as “super-empowered individuals.” 8 Conceptually, super-empowered individuals are atomistic game-changers, i.e., they constitute a single (and often singular) individual who can shock the entire system (whether national, regional, or global) by relying only on their own resources. Their core characteristics are that they have superior intelligence, the capacity to use complex communications or technology systems, and act as an individual or a “lone-wolf.” 9 The end result, according to the pessimists, is that if one of these individuals chooses to attack the system, “the unprecedented nature of his attack ensures that no counter-measures are in place to prevent it. And when he strikes, his attack will not only kill massive amounts of people, but also profoundly change the financial, political, and social systems that govern modern life.” 10 It almost goes without saying that the same concerns attach to small autonomous cells, whose members' capabilities and resources can be combined without appreciably increasing the operational footprint presented to intelligence and law enforcement agencies seeking to detect such behavior.

With the exception of the largest truck or aircraft bombs, the most likely means by which to accomplish this level of system perturbation is through the use of CBRN agents as WMD. On the motivational side, therefore, lone actors and small autonomous cells may ironically be more likely to select CBRN weapons than more established terrorist groups—who are usually more conservative in their tactical orientation—because the extreme asymmetry of these weapons may provide the only subjectively feasible option for such actors to achieve their grandiose aims of deeply affecting the system. The inherent technical challenges presented by CBRN weapons may also make them attractive to self-assured individuals who may have a very different risk tolerance than larger, traditional terrorist organizations that might have to be concerned with a variety of constituencies, from state patrons to prospective recruits. 11 Many other factors beyond a “perceived potential to achieve mass casualties” might play into the decision to pursue CBRN weapons in lieu of conventional explosives, 12 including a fetishistic fascination with these weapons or the perception of direct referents in the would-be perpetrator's belief system.

Others are far more sanguine about the capabilities of lone actors (or indeed non-state actors in general) with respect to their potential for using CBRN agents to cause mass fatalities, arguing that the barriers to a successful large-scale CBRN attack remain high, even in today's networked, tech-savvy environment. 13 Dolnik, for example, argues that even though homegrown cells are “less constrained” in motivations, more challenging plots generally have an inverse relationship with capability, 14 while Michael Kenney cautions against making presumptions about the ease with which individuals can learn to produce viable weapons using only the Internet. 15 However, even most of these pundits concede that low-level CBR attacks emanating from this quarter will probably lead to political, social, and economic disruption that extends well beyond the areas immediately affected by the attack. This raises an essential point with respect to CBRN terrorism: irrespective of the harm potential of CBRN weapons or an actor's capability (or lack thereof) to successfully employ them on a catastrophic scale, these weapons invariably exert a stronger psychological impact on audiences—the essence of terrorism—than the traditional gun and bomb. This is surely not lost on those lone actors or autonomous cells who are as interested in getting noticed as in causing casualties.

Proven Capability and Intent

While legitimate debate can be had as to the level of potential threat posed by lone actors or small autonomous cells wielding CBRN weapons, possibly the best argument for engaging in a substantive examination of the issue is the most concrete one of all—that these actors have already demonstrated the motivation and capability to pursue and use CBRN weapons, in some cases even close to the point of constituting a genuine WMD threat. In the context of bioterrorism, perhaps the most cogent illustration of this is the case of Dr. Bruce Ivins, the perpetrator behind one of the most serious episodes of bioterrorism in living memory, the 2001 “anthrax letters,” which employed a highly virulent and sophisticated form of the agent and not only killed five and seriously sickened 17 people, but led to widespread disruption of the U.S. postal services and key government facilities. 16

Other historical cases of CBRN pursuit and use by lone actors and small autonomous cells highlight the need for further exploration. Among the many extant examples: 17

Thomas Lavy was caught at the Alaska-Canada border in 1993 with 130 grams of 7% pure ricin. It is unclear how Lavy obtained the ricin, what he planned to do with it, and what motivated him.

In 1996, Diane Thompson deliberately infected twelve coworkers with shigella dysenteriae type 2. Her motives were unclear.

In 1998, Larry Wayne Harris, a white supremacist, was charged with producing and stockpiling a biological agent—bacillus anthracis, the causative agent of anthrax.

In 1999, the Justice Department (an autonomous cell sympathetic to the Animal Liberation Front) mailed over 100 razor blades dipped in rat poison to individuals involved in the fur industry.

In 2000, Tsiugio Uchinshi was arrested for mailing samples of the mineral monazite with trace amounts of radioactive thorium to several Japanese government agencies to persuade authorities to look into potential uranium being smuggled to North Korea.

In 2002, Chen Zhengping put rat poison in a rival snack shop's products and killed 42 people.

In 2005, 10 letters containing a radioactive substance were mailed to major organizations in Belgium including the Royal Palace, NATO headquarters, and the U.S. embassy in Brussels. No injuries were reported.

In 2011, federal agents arrested four elderly men in Georgia who were plotting to use ricin and explosives to target federal buildings, Justice Department officials, federal judges, and Internal Revenue Service agents.



Two recent events may signal an even greater interest in CBRN by lone malefactors. First, based on one assessment of Norway's Anders Breivik's treatise, his references to CBRN weapons a) suggest that CBRN weapons could be used on a tactical level and b) reveal (to perhaps previously uninformed audiences) that even low-level CBRN weapons could achieve far-reaching impacts driven by fear. 18 Whether or not Breivik would actually have sought or been able to pursue CBRN, he has garnered a following in several (often far-right) extremist circles and his treatise might inspire other lone actors. Second, Al-Qaeda in the Arabian Peninsula (AQAP) released two issues of Inspire magazine in 2012. Articles, on the one hand, call for lone wolf jihad attacks to target non-combatant populations and, on the other, permit the use of chemical and biological weapons. The combination of such directives may very well influence the weapon selection of lone actor jihadists in Western nations. 19



Download 0.54 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   16




The database is protected by copyright ©ininet.org 2024
send message

    Main page