Article Summaries



Download 396.84 Kb.
Page1/10
Date07.05.2017
Size396.84 Kb.
#17392
  1   2   3   4   5   6   7   8   9   10


Article Summaries…………………………………………………………………………….4-14
Beyond the NSA, Other Agencies Spy on You Too…………………………………….4

Want to Predict The Future of Surveillance: Ask Poor Communities…………………..4

The New FBI: COINTELPRO on Steroids………………………………………………5

Race, Surveillance, & Empire……………………………………………………………6

Black State of Surveillance………………………………………………………………6

Political Life of Fungability……………………………………………………………...7

Senators Push Amendments to Bar Encryption Backdoors……………………………...7

NSA’s Secret Campaign to Crack Internet Security……………………………………..8

Stop The Hysteria Over Apple Encryption………………………………………………8

Major Cyber Attack Could Cause Significant Loss of Life By 2025……………………9

Beyond the USA Freedom Act………………………………………………………......9

NSA Spying Harms Companies, Silicon Valley, & The Entire US Economy…………..10

Bipartisan Secure Data Act Has Votes to Pass House, Lawmakers Drag Their Feet……10

The Secure Data Act Could Help Law Enforcement…………………………………….11

The Harm of Surveillance………………………………………………………………..11

Snowden Deserves An Immediate Presidential Pardon………………………………….12

Afterward of Homeland………………………………………………………………….12

Protest In New Terror……………………………………………………………………13

Why “I Have To Hide” Is Wrong Way to Think About Terrorism……………………...13

Turnkey Tyranny: Surveillance & The Terror State……………………………………..14


Full Articles

Beyond the NSA, Other Agencies Spy on You Too……………………………………………15

By Shahid Buttar

Submitted By Skinner West

Keywords: NSA, FBI, USA Freedom Act, PATRIOT Act, Surveillance State Repeal Act
Want to Predict The Future of Surveillance: Ask Poor Communities………………………….17

By Virginia Eubanks

Submitted By Skinner West

Keywords: Poor and marginalized communities, welfare, social services, civil rights


The New FBI: COINTELPRO on Steroids……………………………………………………...23

By John Whitehead

Submitted By Skinner West

Keywords: FBI surveillance tactics, COINTELPRO, intensive surveillance


Race, Surveillance, & Empire……………………………………………………………………28

By Arun Kundani & Deepa Kumar

Submitted By Skinner West & King Arts

Keywords: Racism, racial security, Arab Americans, mass surveillance of Muslims


Black State of Surveillance………………………………………………………………………47

By Malkia Cyril

Submitted By Skinner West

Keywords: Jim Crow, black communities, racial surveillance, racism greater problem than privacy


Political Life of Fungability……………………………………………………………………..52

By Stephen Marshall

Submitted By Skinner West

Keywords: criminalization of black youth


Senators Push Amendments to Bar Encryption Backdoors……………………………………..54

By Bennett Cory

Submitted By Bessie Rhodes

Keywords: encryption backdoors, privacy amendments to USA Freedom Act, Secure Data Act


NSA’s Secret Campaign to Crack Internet Security……………………………………………56

By Jeff Larson

Submitted By Bessie Rhodes

Keywords: Corporate reactions to NSA hacking, government investments in hacking technology, internet security

Stop The Hysteria Over Apple Encryption…………………………………………………….64

By Bruce Schneier

Submitted By Bessie Rhodes

Keywords: Encryption backdoors in Apple products, FBI reaction to closing backdoors, computer hacking


Major Cyber Attack Could Cause Significant Loss of Life By 2025……………………….....67

By Patrick Tucker

Submitted By Bessie Rhodes

Keywords: Overhyped cyber threats, cyber vulnerabilities, electronic infrastructure failure


Beyond the USA Freedom Act…………………………………………………………………73

By Daniel Castro & Alan McQuinn

Submitted By Bessie Rhodes

Keywords: US technology company competitiveness, foreign technology investments


NSA Spying Harms Companies, Silicon Valley, & The Entire US Economy…………………75

By Washington’s Blog

Submitted By Bessie Rhodes

Keywords: Foreign privacy laws, protecting foreign investors, surveillance and internet

companies
Bipartisan Secure Data Act Has Votes to Pass House, But Will Lawmakers Drag Their Feet....83

By Carl Wicklander

Submitted By Bessie Rhodes

Keywords: Secure Data Act, congressional oversight of surveillance, watered down legislation


The Secure Data Act Could Help Law Enforcement……………………………………………85

By Alan McQuinn

Submitted By Bessie Rhodes

Keywords: Cybercrime, Secure Data Act, stopping encryption backdoors


The Harm of Surveillance………………………………………………………………………..87

By Glenn Greenwald

Submitted By King Arts

Keywords: Surveillance of government dissenters, democracy, how surveillance changes people’s behavior


Snowden Deserves An Immediate Presidential Pardon………………………………………….89

By Stephen Walt

Submitted By King Arts

Keywords: Edward Snowden, NSA bulk data collection, classified surveillance data


Afterward of Homeland…………………………………………………………………………92

By Jacob Applebaum

Submitted By King Arts

Keyword: Free speech is important, tyranny, protest


Protest In New Terror……………………………………………………………………………95

By Derek Royden

Submitted By King Arts

Keywords: Using surveillance to infiltrate activist organizations, growing surveillance budgets, civil rights, Black Lives Matter, COINTELPRO


Why “I Have To Hide” Is Wrong Way to Think About Terrorism……………………………..97

By Moxie Marlinspike

Submitted By King Arts

Keywords: United States Code is complex, too many federal laws to count


Turnkey Tyranny: Surveillance & The Terror State…………………………………………....99

By Trevor Paglen

Submitted By King Arts

Keywords: Terrorism, terror state, fear of terrorism



Beyond the NSA, Other Agencies Spy on You Too
Citation: Buttar, Shahid. (2014). Beyond the NSA, Other Agencies Spy on You Too. Truthout. Retrieved 12/22/15. http://www.truth-out.org/opinion/item/20670-beyond-the-nsa-other-agencies-spy-on-you-too
Buttar Article Summary: People mistakenly believe that the NSA (National Security Agency) is the cornerstone of government surveillance. However, other organizations like the FBI are carrying out most surveillance operations. Also, efforts that curtail these organizations like the FREEDOM Act have not been successful.
Buttar Article Strategic Points:

  • This article can be used as a Solvency answer to Affirmatives that curtail the NSA. You can make the argument that the Aff fails, because it focusing on only a single government organization.

  • This article can also be used to show that efforts to curtail surveillance historically fail.


Want To Predict the Future of Surveillance, Ask Poor Communities
Citation: Eubanks, Virginia. (2014). Want To Predict the Future of Surveillance, Ask Poor Communities. The American Prospect. Retrieved 12/22/2015. http://prospect.org/article/want-predict-future-surveillance-ask-poor-communities
Eubanks Article Summary: In the article Eubanks explains that many of the ways we are spying on people is extending to poor people. For example, the government tracks welfare recipients with their social service records. Often times welfare programs are used to spy on people of gender and racial minorities.
Lastly Eubanks makes the argument that the problem with surveillance is not privacy, but rather a lack of human rights. We should resist surveillance to protect rights, not privacy.
Eubanks Article Strategic Points:

  • This article could be used to cut cards about how surveillance is more problematic to poor people and racial minorities.

  • This article could be used to explain the diversity of ways the government surveils people, which includes government records and online tracking.

  • This article could be used to answer claims that privacy protection is important, Eubanks criticizes that kind of thinking as ignoring rights.


The New FBI Powers: COINTELPRO on Steroids
Citation: Whitehead, John. (2011). The New FBI Powers: COINTELPRO on Steroids. The Rutherford Institute. Retrieved 12/22/15. https://www.rutherford.org/publications_resources/john_whiteheads_commentary/the_new_fbi_powers_cointelpro_on_steroids
Whitehead Article Summary: The author makes the argument that the FBI surveillance programs are actually worse than COINTELPRO (Counter Intelligence Program), which is a program that the FBI used to illegally spy on and infiltrate anti-Vietnam, communist, and civil rights organizations.
Whitehead Article Strategic Points:

  • This article can be used as inherency evidence to show the growth of government surveillance.

  • This article can be used as part of a privacy advantage because it details how surveillance programs often bypass due process and warrant requirements.

  • This article can be used to answer surveillance good arguments, because the author explains how the same unsavory, and in some case illegal, tactics used by COINTELPRO are still in use.


Race, Surveillance, & Empire

Citation: Kundani, Arun & Kumar, Deepa. (2015). Race, Surveillance, & Empire. International Socialist Review. Retrieved 12/28/15. http://isreview.org/issue/96/race-surveillance-and-empire

Kundani & Kumar Article Summary: The authors of this article are making an argument that government surveillance, and law enforcement in general, has been used to reproduce racial oppression. Secondly, the authors argue that the same surveillance programs used to target racial minorities, especially Arab Muslims, were also implemented to spy on anti-neoliberal movements like Occupy Wall Street.

Kundani & Kumar Strategic Points:

  • This article can be a key piece to a racism advantage for an affirmative case.

  • This article can be used to show that Arabs and Muslims are disproportionately targets of surveillance for no other reason than apparent racism.

  • This article can be used to make arguments stating that discussion of racism and imperialism should be the focus of debates on surveillance.

  • This article can be used as impact evidence with racism or imperialism as the impact.

Black State of Surveillance

Citation: Cyril, Malkia Amala. (2015). Black State of Surveillance. The Progressive. Retrieved 12/28/15 http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance

Cyril Article Summary: There has been a long history of using surveillance specifically against racial minorities including slave laws and Jim Crow, which both had significant surveillance components. However, this kind of racial surveillance has gone largely unnoticed. It was not until Edward Snowden released information that privileged classes were being surveilled that America began to take action on this issue.



Cyril Article Strategic Points:

  • The most obvious argument this article could be used to make is describing the racist character of surveillance programs. It can also be used as part of a racism advantage.

  • This article can also be used to argue that discussions of surveillance are too focused on privileged classes, because racialized surveillance happened for decades with largely no attention.


Excerpt: The Political Life of Fungibility

Citation: Marshall, Stephen. (2012). Excerpt: The Political Life of Fungibility. Theory & Event, Volume 15, Issue 3, 2012. Project Muse.

Marshall Article Summary: Black Americans are often deemed criminal for no reason. Trayvon Martin’s death is a clear example of how a Black youth was automatically thought of as a criminal, and such thinking led to his death. So, our justice system always approach minorities as criminals with presumed guilt, such an action is dehumanizing.

Marshall Article Strategic Points:

  • This article can be used as impact evidence for dehumanization of minorities.

  • This article can be used as part of a racial profiling advantage for an affirmative case.

  • This article can make the argument that minorities, especially Black people in the context of this article, will always be the primary targets for surveillance programs.

Senators Push Amendments to Bar Encryption Backdoors

Citation: Bennett, Cory. (2015). Senators Push Amendments to Bar Encryption Backdoors. The Hill. Retrieved 12/29/15. http://thehill.com/policy/cybersecurity/243725-senators-push-for-amendment-to-bar-encryption-backdoors

Bennett Article Summary: Two Senators attempted to pass an amendment to the USA Freedom Act, which was enacted in June of 2015. The amendment would have prevented the government from making companies install encryption backdoors in their software. An encryption backdoor is a part of a computer program that allows law enforcement to access information from that program.

Bennett Article Strategic Points:

  • This article can be used as inherency evidence for an affirmative dealing with encryption backdoors.

  • It can also be used in Politics Disadvantages to show that there is some Senate support for blocking encryption backdoors.


The NSA’s Secret Campaign to Crack Internet Security

Citation: Larson, Jeff. (2013). Revealed: The NSA’s Secret Campaign to Crack Internet Security. The New York Times & ProPublica. Retrieved 12/29/15. http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

Larson Article Summary: The NSA has been engaging in secret computer and program hacking for the last few decades. Having invested billions of dollars to preserve its dominance in hacking technology. The NSA can also easily overcome most privacy and encryption technology.

Larson Article Strategic Points:

  • This article can be used as inherency evidence for an affirmative dealing with NSA hacking.

  • This article can be used to demonstrate the extent the NSA hacking.

  • This article can be used as part of a privacy advantage in an affirmative case.

Stop the Hysteria Over Apple Encryption

Citation: Schneier, Bruce. (2014). Stop the Hysteria Over Apple Encryption. CNN. Retrieved 12/29/15. https://www.schneier.com/essays/archives/2014/10/stop_the_hysteria_ov.html

Schneier Article Summary: Apple products, especially the iPhone, had an “encryption backdoor.” This backdoor allowed the government to access people’s data stored in an iPhone. When Apple finally decided to close the “backdoor” the government warned that doing so what hurt their ability to catch criminals and monitor criminal behavior. The author argues that this line of reasoning makes no sense because the same “backdoors” used by government agencies can also be used by criminals. So, allowing encryption backdoors to exist in the iPhone makes the iPhone a target for criminal activity and hacking.

Schneier Article Strategic Points:

  • This article can be used to answer arguments like the Crime Disadvantage and Terrorism Disadvantage, because allowing backdoors to remain open means they can be exploited by criminals and terrorist organizations.

  • This article can be used as part of an affirmative advantage that says curbing surveillance may actually curb crime as well.


Major Cyber Attack Will Cause Significant Loss of Life by 2025

Citation: Tucker, Patrick. (2014). Major Cyber Attack Will Cause Significant Loss of Life by 2025, Experts Predict. Defense One. Retrieved 12/29/15. http://www.defenseone.com/threats/2014/10/cyber-attack-will-cause-significant-loss-life-2025-experts-predict/97688/

Tucker Article Summary: Threats of cyber-attacks on the United States are often overly hyped. However, we do have very real vulnerabilities in our electronic infrastructure such as sewage, electricity, and city street lights. Attacks on our infrastructure can cause significant property damage. Some of our biggest issues is the growing number of cyber vulnerabilities not being fixed, and the fact that the country lacks a coordinated comprehensive cyber security policy. Nonetheless the threat of cyber-attacks may be larger than the actual risk.

Tucker Article Strategic Points:

  • This article is interesting in that in can be used as both impact evidence because of our cyber vulnerabilities, but also an answer to impact arguments because threat of cyber-attacks are overhyped.

  • This article can be used as part of an affirmative solvency to show how better and more coordinated policies are needed for safety.

Beyond the USA Freedom Act: How Surveillance Still Subverts US Competitiveness

Citation: Castro, Daniel & McQuinn, Alan. (2015). Beyond the USA Freedom Act: How Surveillance Still Subverts US Competitiveness. Informative Technology & Innovation Foundation. Retrieved 12/29/15. https://itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subverts-us-competitiveness

Castro & McQuinn Article Summary: Foreign investors are currently discouraged from investing in American technology businesses because of concerns about government surveillance. Foreign investors, in order to protect tier own privacy, will chose to invest in companies elsewhere. This could lead to more than $35 Billion leaving the American technology industry by as early as 2016.

Castro & McQuinn Article Strategic Points:

  • This article can be used to answer to Spending Disadvantages or any generic spending bad arguments.

  • This article could be an important piece of a competitiveness, hegemony, and/or economic advantage for an affirmative case.

  • This article can be used to show that there is a tradeoff effect between the technology economy and security threats.

NSA Spying Directly Harms Internet Companies, Silicon Valley, California…And the Entire US Economy

Citation: Washington’s Blog. (2013). NSA Spying Directly Harms Internet Companies, Silicon Valley, California…And the Entire US Economy. Retrieved 1/1/16. http://www.washingtonsblog.com/2013/07/nsa-spying-directly-harms-internet-companies-silicon-valley-california-and-the-entire-national-economy.html

Washington’s Blog Article Summary: American technology companies are being forced to turn over information to the NSA for purposes of surveillance. However, shareholders and foreign investors are not being told that private information is being given to the NSA. This could place investors at risks and even violate privacy laws in other countries.

Washington’s Blog Strategic Points:

  • This article can be used to show that the global market is losing confidence in American technology companies, which can answer negative economy and hegemony arguments.

  • This article could be an important piece of competitiveness, hegemony, and/or economic advantage for an affirmative case.

  • This article can be used to show how surveillance can possibly damage relations with other countries, because their citizens are also being inadvertently surveilled by the NSA. So, this article can be used against many negative relations good arguments.

Bipartisan Secure Data Act Has Votes to Pass House, But Will Lawmakers Drag Their Feet?

Citation: Wicklander, Carl. (2015). Bipartisan Secure Data Act Has Votes to Pass House, But Will Lawmakers Drag Their Feet? Independent Voter Network. Retrieved 1/1/16. http://ivn.us/2015/02/09/bipartisan-secure-data-act-votes-pass-house-will-lawmakers-drag-feet/

Wicklander Article Summary: In the House of Representatives there has been some adequate support to pass the Secure Data Act. The Secure Data Act would give Congress more power to oversee on-line bulk data collection carried out by federal intelligence agencies. However, despite bipartisan support the act has still not been enacted, and the final version has been watered down.

Wicklander Article Strategic Points:

  • This article could be used as part of a solvency contention to explain how the Secure Data Act or similar legislation needs to be passed.

  • This article can also be used to answer solvency contentions by explaining how an ineffective Congress does not pass needed legislation. Furthermore, this article argues that this kind of legislation is always watered down to such an extent that I would not be useful.


The Secure Data Act Could Help Law Enforcement Protect Against Cybercrime

Citation: McQuinn, Alan. (2014). The Secure Data Act Could Help Law Enforcement Protect Against Cybercrime. The Hill. Retrieved 1/2/16. http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against

McQuinn Article Summary: The Secure Data Act would protect the on-line/internet privacy of Americans in addition to elimination of “backdoors.” Currently, organizations like the FBI and NSA use encryption backdoors to access private data to track criminals. However, those backdoors weaken electronic security because they can also be accessed by hackers.

McQuinn Article Strategic Points:

  • This article could be used to create a solvency contention for an affirmative that wanted to pass the Secure Data Act or similar legislation.

  • This article can be used as an answer to the Crime Disadvantage because closing encryption backdoors would decrease, not increase, crime rates.

  • This article explains how passing the Secure Data Act would benefit the technology industry because they would no longer be required to introduce vulnerabilities into their technology.

The Harm of Surveillance

Citation: Greenwald, Glenn. (2014). The Harm of Surveillance, No Place To Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Published by Metropolitan Books, ISBN 9781627790734, p. 173-174

Greenwald Article Summary: When individuals are being watched they typically change their behavior to fit the expectations of whoever is watching them. Greenwald argues that government surveillance forces people to act in a certain way. Surveillance, would therefore curtail a person’s ability to choice and personal freedom. If you are always behavior the way another entity expects to behave you will never be able to forge your own path. Furthermore, surveillance may also curtail meaningful dissent and genuine challenges to power, which is negative because dissent is a part of a functioning democracy. Notable examples used against government dissenters include how civil rights activist like Martin Luther King were heavily surveilled by the FBI.

Greenwald Article Strategic Points:

  • This article can be used as part of a privacy and/or democracy advantage for an affirmative case.

  • This article can be used to generically argue that surveillance is bad, which could be used to answer any negative arguments that defend the status quo.



Download 396.84 Kb.

Share with your friends:
  1   2   3   4   5   6   7   8   9   10




The database is protected by copyright ©ininet.org 2024
send message

    Main page