Grace+and+Liam

1NCs: T US persons, Cartels K, Foucault K, Zizek K, Psychoanalysis K, Neolib, K, politics, terror DA, States CP 2NRs have been all of these except Cartels K and Zizek

1AC Plan Text:

The United States federal government should establish Federal Communications Commission oversight of the National Security Agency to curtail its surveillance of the United States communications infrastructure.

Legal prohibitions bar NSA domestic surveillance – but the lack of a __credible oversight mechanism__ means the NSA actively captures US person data through section 702 and XO 12333
The NSA, originally formed to monitor outside threats to the security of the United AND opinion shows that Americans are dissatisfied with the reach of government surveillance.29
 * Healey, 14** - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)

Existing oversight mechanisms guarantee NSA circumvention of prohibitions on domestic surveillance – that creates a __confidence crisis__ in the future of the internet
III. OVERSIGHT IS NEEDED, AND THE FCC SHOULD PROVIDE IT A. Existing AND all preventive executive, legislative, and internal controls have not been effective.
 * Healey, 14** - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)

a) Resolving NSA overreach resolves US internet legitimacy – that creates the perception necessary to advocate for a free and borderless internet
The effects of the NSA disclosures on the Internet Freedom agenda //go beyond the realm// //AND// overall decline in U.S. soft power on free expression issues.
 * Kehl, 14** – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, []

b) The plan draws a sharp distinction between national security and bulk surveillance to make the US Internet Freedom agenda credible – otherwise __global data localization__ will result
The 2013 revelations of mass surveillance by the U.S. government transformed the AND that EU officials said stemmed directly from worries after the Snowden disclosures.32
 * Fontaine, 14** – President of the Center for a New American Security; was foreign policy advisor to Senator John McCain for more than five years; Worked at the State Department, the National Security Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New American Security, September 18, 2014, [|http://www.cnas.org/sites/default/files/publications-pdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT]

Data localization will destroy global economic growth
C. Economic Development Many governments believe that by forcing companies to localize data within AND aggregating data across borders. We discuss the impacts on these trends below.
 * Chandler and Le, 15** - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)

Economic interdependence and further growth reduces the risk of US-China War
Atanassova-Cornelis and van der Putten 14 Elena Atanassova-Cornelis is a Lecturer in East Asian Politics at the Department of Politics, University of Antwerp, Frans-Paul van der Putten is a Senior Research Fellow specialized in China at the Netherlands Institute of International Relations, November 5, 2014, “Changing Security Dynamics in East Asia: A Post-US Regional Order in the Making?” https://books.google.com/books?id=RGapBQAAQBAJ&printsec=frontcover&source=gbs_atb#v=onepage&q&f=false Indeed, there are some significant points of contention between the two powers, which AND that they would be forced into making a choice between Beijing and Washington.

Wittner 11 – (11/28/11, Lawrence, PhD in history from Columbia University, Emeritus Professor of History at the State University of New York/Albany, “COMMENTARY: Is a Nuclear War with China Possible?” http://www.huntingtonnews.net/14446) While nuclear weapons exist, there remains a danger that they will be used. AND — destroying agriculture, creating worldwide famine, and generating chaos and destruction.
 * War with China goes nuclear – safeguards won’t prevent escalation **

Studies prove economic decline causes war and miscalculation
Royal 10 — Jedidiah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, M.Phil. Candidate at the University of New South Wales, 2010 (“Economic Integration, Economic Signalling and the Problem of Economic Crises,” //Economics of War and Peace: Economic, Legal and Political Perspectives//, Edited by Ben Goldsmith and Jurgen Brauer, Published by Emerald Group Publishing, ISBN 0857240048, p. 213-215) Less intuitive is how periods of economic decline may increase the likelihood of external conflict AND such, the view presented here should be considered ancillary to those views.

Perception of NSA overreach is __crushing__ U.S. cloud-computing – __decks competitiveness__ and spills over to the __entire tech sector__
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.15-18, 2015, Hein Online)//JJ I. ECONOMIC IMPACT OF NSA PROGRAMS The NSA programs, and public awareness of AND __by U.S. firms, gaining market share in the process.__

a) Restoring the perception of the NSA establishes a legislative framework that resolves the reputation of U.S. tech companies
//Allegations of intrusive U.S//. government electronic surveillance activities have raised international outcry AND said, “ the back door makes a mockery of the front door .”
 * Eoyang and Bishai, 15** - *Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19, []

b) Surveillance reforms solve foreign protectionism and U.S. tech industry competitiveness
Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND ** Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation Foundation, June 2015, [] Almost two years ago, ITIF described how revelations about pervasive digital surveillance by the AND and pressure nations that seek to erect protectionist barriers to abandon those efforts.

Cloud computing is also critical to __space situational awareness__ – solves asteroids and debris
Abstract¶ In this paper we demonstrate how __a cloud-based computing architecture can__ __AND__ NEO trajectory and impact analysis to help improve planetary defencs capability for all.
 * Johnston et al 9** [Steven, PhD in computer engineering and MEng degree in software engineering, specializes in cloud-based architecture, Kenji Takeda, Solutions Architect and Technical Manager for the Microsoft Research Connections EMEA team, has extensive experience in Cloud Computing, Hugh Lewis, professor at University of Southampton, specialist in space situational awareness, Simon Cox, professor of Computational Methods and Director of the Microsoft Institute for High Performance Computing at University of Southampton, Graham Swinerd, professor at University of Southampton, specializes in space situational awareness, “Cloud Computing for Planetary Defense”, http://eprints.soton.ac.uk/71883/1/John_09.pdf, October 2009, 3/31/15]

Asteroid collision causes extinction
Once upon a time there was a Big Bang... Cause/Effect - Cause AND ” in favor of rational random inevitable expectation... and its attendant fear.
 * Brownfield 4** (Roger, Gaishiled Project, “A Million Miles a Day”, Presentation at the Planetary Defense Conference: Protecting Earth From Asteroids, 2-26, [|http://www.aiaa.org/content.cfm?pageid=406&gTable= Paper&g] ID=17092//cc)

Prefer magnitude over probability in this specific instance
__Even if extinction events are improbable, the expected values of countermeasures could be large__ __AND__ __between risks that threaten 99% of humanity and those that threaten 100%.__
 * Matheny, 7** (Jason G Matheny, Prof of Health Policy and Management at the Bloomberg School of Public Health at Johns Hopkins University, “Reducing the Risk of Human Extinction,” Risk Analysis Volume 27 Number 5, Oct. 15 2007, http://www.upmc-biosecurity.org/website/resources/publications/2007_orig-articles/2007-10-15-reducingrisk.html)//twemchen

Tech leadership is the __primary driver of hegemony__ –
Weiss 14 – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell University Press, 4/1/14, p. 1-3)//JJ *NSS=National Security State So __what accounts for America’s transformative capacity__ ? Where AND primarily) a commercial matter—even when the NSS "goes commercial.

Hegemonic decline causes great power wars
(Yuhan, “America’s decline: A harbinger of conflict and rivalry”, 1 AND  forecast in a future that will inevitably be devoid of unrivalled US primacy.
 * Zhang et al., Carnegie Endowment researcher, 2011 **

Contention 3 - solvency
====FCC oversight of the NSA curtails __bulk__ internet surveillance and enforces __targeted__ surveillance that excludes domestic users. FCC __technical expertise__ and __transparency__ prevent circumvention==== IV. HOW THE FCC SHOULD ADDRESS THE NSA SURVEILLANCE: IMPLEMENTING THE SOLUTION Congress AND to the oversight of the NSA and Congress should pursue codifying this solution.
 * Healey, 14** - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)

FCC __public visibility__, __expertise__ in communication tech, and __data analysis__ curb overreaching and boost __public__ and __industry__ __confidence__ in privacy protection
C. The FCC mission can be naturally expanded to protect privacy in relation to AND agency particularly well-suited to provide helpful insights to the FISA C ourt.
 * Healey, 14** - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)