Aff+-+Gabi+and+Emily

Plan
====The United States federal government should substantially curtail its surveillance of information in the custody of American corporations by exclusively limiting surveillance to investigations carried out under section 702 of the FISA Amendments Act, subject to additional use restrictions in Presidential Policy Directive 28.====

NSA surveillance is __crushing__ U.S. cloud-computing – __decks competitiveness__ and spills over to the __entire tech sector__
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.15-18, 2015, Hein Online)//JJ I. ECONOMIC IMPACT OF NSA PROGRAMS The NSA programs, and public awareness AND __by U.S. firms, gaining market share in the process.__

The best and newest research confirms the link
This study is the first to provide //substantial empirical documentation// of a chilling effect, AND potential for effects of government surveillance practices on commercial outcomes and international competitiveness.
 * Marthews and Tucker, 15 **– * National Chair at Restore the Fourth AND **PhD in economics and professor of Marketing at MIT (Alex and Catherine, “Government Surveillance and Internet Search Behavior”, 29 April 2015, [[file:///C:/Users/17GGonzalez/Downloads/SSRN-id2412564%20(2).pdf)//gg|file:///C:/Users/17GGonzalez/Downloads/SSRN-id2412564%20(2).pdf)//]]gg

That undermines US global technological leadership
CONCLUSION When historians write about this period in U.S. history it AND . government enable its tech industry to effectively compete in the global market.
 * Castro and McQuinn 15 **, Daniel Castro works at the Center for Data Innovation, Government Technology, The Information Technology & Innovation Foundation, worked at the U.S. Government Accountability Office, went to Carnegie Mellon. Alan McQuinn works at the Federal Communications Commission, previously had the Bill Archer Fellowship at the University of Texas, (June 2015, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness”, file:///C:/Users/Mark/Downloads/2015-beyond-usa-freedom-act.pdf)//AK

Tech leadership is the __primary driver of hegemony__ –
So __what accounts for America’s transformative capacity__? AND primarily) a commercial matter—even when the NSS "goes commercial.
 * Weiss 14** – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell University Press, 4/1/14, p. 1-3)//JJ
 * NSS=National Security State

Hegemonic decline causes great power wars
(Yuhan, “America’s decline: A harbinger of conflict and rivalry”, 1-22, http://www.eastasiaforum.org/2011/01/22/americas-decline-a-harbinger-of-conflict-and-rivalry/, ldg) This does not necessarily mean that the US is in systemic decline, but it AND forecast in a future that will inevitably be devoid of unrivalled US primacy.
 * Zhang et al., Carnegie Endowment researcher, 2011 **

Hegemony solidifies economic stability and trade
Kim, 14 – [Aejung Kim, Correspondent with the Department of Political Science, Kent State University, Ohio, February 28, 2014, The Effects of the U.S. Hegemony on Economic Growth in East Asia, and the Middle East and North Africa, http://www.isca.in/IJSS/Archive/v3/i4/1.ISCA-IRJSS-2013-210.pdf, pg. 2] Jeong Although there is a difficulty in defining hegemony, hegemony is categorized as four groups AND //ties with East Asian countries with the geostrategic motivation of containing the communism.//

__The pursuit of hegemony is inevitable__ – any alternative results in nuclear proliferation and Global Instability
Tooley, 3-19 – [Mark Tooley, Graduate from Georgetown University, Work at the CIA, 3-19-2015, Christianity and Nukes American nuclear disarmament will not leave the world safer or holier, The American Spectator, []] Jeong //Much of the security of the world relies on the U.S. nuclear// //AND// deter its murderous designs. Christian teaching and humanity should demand no less.

The __perception__ that the NSA is using the XO 12333 back-door to circumvent section 702 is causing a __global backlash__ against US tech companies and driving data localization
Beyond 215 and FAA, media reports have suggested that there have been collection programs AND to provide their customers with some sense of how many requests are made.
 * Eoyang, 14** - Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto) (“A Modest Proposal: FAA Exclusivity for Collection Involving U.S. Technology Companies” Lawfare, 11/24, http://www.lawfareblog.com/modest-proposal-faa-exclusivity-collection-involving-us-technology-companies

====The US needs to draw a __sharp distinction__ between domestic and national security surveillance to make the US Internet Freedom agenda credible – otherwise __global internet fragmentation__ will result==== The 2013 revelations of mass surveillance by the U.S. government transformed the AND that EU officials said stemmed directly from worries after the Snowden disclosures.32
 * Fontaine, 14** – President of the Center for a New American Security; was foreign policy advisor to Senator John McCain for more than five years; Worked at the State Department, the National Security Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New American Security, September 18, 2014, []

Localization hurts cloud computing
Cloud Computing. Data localization requirements will often prevent access to global cloud computing services AND data flow, but this will depend on the specifics of the law.
 * Chandler and Le, 15** - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)

Cloud computing is also critical to __space situational awareness__ – solves asteroids and debris
Abstract¶ In this paper we demonstrate how __a cloud-based computing architecture can__ __AND__ NEO trajectory and impact analysis to help improve planetary defencs capability for all.
 * Johnston et al 9** [Steven, PhD in computer engineering and MEng degree in software engineering, specializes in cloud-based architecture, Kenji Takeda, Solutions Architect and Technical Manager for the Microsoft Research Connections EMEA team, has extensive experience in Cloud Computing, Hugh Lewis, professor at University of Southampton, specialist in space situational awareness, Simon Cox, professor of Computational Methods and Director of the Microsoft Institute for High Performance Computing at University of Southampton, Graham Swinerd, professor at University of Southampton, specializes in space situational awareness, “Cloud Computing for Planetary Defense”, http://eprints.soton.ac.uk/71883/1/John_09.pdf, October 2009, 3/31/15]

Asteroid strikes are unpredictable and cause extinction
Once upon a time there was a Big Bang... Cause/Effect - Cause AND ” in favor of rational random inevitable expectation... and its attendant fear.
 * Brownfield 4** (Roger, Gaishiled Project, “A Million Miles a Day”, Presentation at the Planetary Defense Conference: Protecting Earth From Asteroids, 2-26, [|http://www.aiaa.org/content.cfm?pageid=406&gTable= Paper&g] ID=17092//cc)

Data localization wrecks cybersecurity
Closely related to the goal of avoiding foreign surveillance through data localization is the goal AND in Vancouver than one owned by IBM, a few miles further south.
 * Chandler and Le, 15** - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)

Cyberterrorism is the most likely impact – will have catastrophic ramifications
Terrorists will recognize the opportunity the cyber world offers sooner or later. They will AND likely major cyber threat. //It must be met with all our assets.//
 * Bucci 09** - Dr. Steven P. Bucci is IBM's Issue Lead for Cyber Security Programs and a part of the Global Leadership Initiative, the in-house think tank for IBM's public-sector practice. He most recently served as Deputy Assistant Secretary of Defense, Homeland Defense and Defense Support to Civil Authorities. (Steven, “The Confluence of Cyber Crime and Terrorism”, The Heritage Foundation, June 12, 2009, http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism//DM)

Cyberattacks go nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements
The U nited S tates is racing for the technological frontier in military __and intelligence uses of__ AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
 * Austin 13** [Director of Policy Innovation at the EastWest Institute, “Costs of American Cyber Superiority,” 8/6, []] //khirn

Applying the restrictions of PPD-28 to section 702 eliminates all negative perceptions of overbreadth
To address the problem of overbreadth in Section 702 collection, PCLOB should recommend that AND disclosure of communications content absent judicial review as a means of doing so.
 * Nojeim, 14 -** Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology(Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)