| ... |
... |
@@ -1,0
+1,19 @@ |
|
1 |
+First, domestic surveillance is effective – stops terrorism. |
|
2 |
+Boot 13 – Max Boot, Senior Fellow in National Security Studies at the Council on Foreign Relations, named by the World Affairs Councils of America as one of "the 500 most influential people in the United States in the field of foreign policy," won the Eric Breindel Award for Excellence in Opinion Journalism, holds a bachelor's degree in history, with high honors, from the University of California, Berkeley and a master's degree in history from Yale University, 2013 (“Stay Calm and Let the NSA Carry On,” LA Times, June 9th, Available Online at http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance-20130609) |
|
3 |
+After 9/11, there was a widespread expectation of many more terrorist attacks on the United States. So far that hasn't happened. We haven't escaped entirely unscathed (see Boston Marathon, bombing of), but on the whole we have been a lot safer than most security experts, including me, expected. In light of the current controversy over the National Security Agency's monitoring of telephone calls and emails, it is worthwhile to ask: Why is that? It is certainly not due to any change of heart among our enemies. Radical Islamists still want to kill American infidels. But the vast majority of the time, they fail. The Heritage Foundation estimated last year that 50 terrorist attacks on the American homeland had been foiled since 2001. Some, admittedly, failed through sheer incompetence on the part of the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American jihadist, planted a car bomb in Times Square in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able to defuse it. But it would be naive to adduce all of our security success to pure serendipity. Surely more attacks would have succeeded absent the ramped-up counter-terrorism efforts undertaken by the U.S. intelligence community, the military and law enforcement. And a large element of the intelligence community's success lies in its use of special intelligence — that is, communications intercepts. The CIA is notoriously deficient in human intelligence — infiltrating spies into terrorist organizations is hard to do, especially when we have so few spooks who speak Urdu, Arabic, Persian and other relevant languages. But the NSA is the best in the world at intercepting communications. That is the most important technical advantage we have in the battle against fanatical foes who will not hesitate to sacrifice their lives to take ours. Which brings us to the current kerfuffle over two NSA monitoring programs that have been exposed by the Guardian and the Washington Post. One program apparently collects metadata on all telephone calls made in the United States. Another program provides access to all the emails, videos and other data found on the servers of major Internet firms such as Google, Apple and Microsoft. At first blush these intelligence-gathering activities raise the specter of Big Brother snooping on ordinary American citizens who might be cheating on their spouses or bad-mouthing the president. In fact, there are considerable safeguards built into both programs to ensure that doesn't happen. The phone-monitoring program does not allow the NSA to listen in on conversations without a court order. All that it can do is to collect information on the time, date and destination of phone calls. It should go without saying that it would be pretty useful to know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a terrorist organizer. As for the Internet-monitoring program, reportedly known as PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional protections. These are hardly rogue operations. Both programs were initiated by President George W. Bush and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the federal judiciary. That's why the leaders of both the House and Senate intelligence committees, Republicans and Democrats alike, have come to the defense of these activities. It's possible that, like all government programs, these could be abused — see, for example, the IRS making life tough on tea partiers. But there is no evidence of abuse so far and plenty of evidence — in the lack of successful terrorist attacks — that these programs have been effective in disrupting terrorist plots. Granted there is something inherently creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter, Citibank and other companies know at least as much about us, because they use very similar data-mining programs to track our online movements. They gather that information in order to sell us products, and no one seems to be overly alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions have become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and Washington Post are compromising our national security by telling our enemies about our intelligence-gathering capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA. This is a virtual invitation to terrorists to use other Internet outlets for searches, email, apps and all the rest. No intelligence effort can ever keep us 100 safe, but to stop or scale back the NSA's special intelligence efforts would amount to unilateral disarmament in a war against terrorism that is far from over. |
|
4 |
+ |
|
5 |
+Second, online surveillance of college students is key to prevent radicalization. |
|
6 |
+Geiger 15 Dorian Geiger, "This Is How ISIS Uses Social Media to Recruit American Teens," 11/20/2015 AZ |
|
7 |
+“Unless parents are in the position to monitor their child’s internet access — these are 17, 18, 19-year-old children — they’re not going to know what they’re being exposed to and how they’re going to react to it,” Berg added. “The ideas being sent out are sophisticated in the sense that they portray a romantic ideal of something, in the nature of a religious obligation or duty in jihad.” ISIS’s ability to stage multi-pronged terrorist attacks in cities like Paris and their willingness to decapitate Westerners and journalists is beyond troubling, but their ability to use social media to convert and recruit young European and American teens using Twitter, Facebook, and YouTube is even more chilling. “Social media is used widely by ISIS recruiters,” explained Al-Suwaij. “It’s easy. It’s in the comfort of your home. It’s behind your screen and no one is watching, and a lot of young people get attracted by that.” Dr. John Horgan, a forensic psychologist and expert in analyzing terrorist behavior at Georgia State University in Atlanta, said that ISIS recruiters have become increasingly savvy social media users. “Recruitment is an intensely personal experience,” he said. “ISIS is so good at it because they recognize the tailor-made efforts with teenagers. They’ll use North American young 20-somethings to target teenagers, or they’ll use females to target female teenagers, or they’ll use English speakers to target English speakers.” But what compels an everyday American or European teen to migrate to a warzone and join the ranks of a remorselessly murderous radical extremist group like ISIS? And what exactly is going on in their heads? “It’s that feeling we all had as teenagers: ‘I don’t fit. I don’t belong here. I want something bigger. I want to do something better with my life,’” explained Horgan. “Those are the types of things recruiters latch onto and exploit, and they’re very good at it. It’s a fantasy, ultimately, that recruiters will use to keep the conversation going on.” Zac Parsons, an organizational psychology consultant who focuses on online behavior, echoes that sentiment. He suggested it’s easier for ISIS to recruit young people because they are able to exploit teenage angst and the fact that adolescents are still finding their place in the world. “Teens tend to be more vulnerable to the appeals of ISIS for similar reasons that they are attracted to sex, drugs, alcohol, and other ‘adult’ activities — it’s a world that is clearly run by adults, and they want to be a part of that,” Parsons adds. For many adolescents being recruited by ISIS, Parsons said that the idea of dying for Allah is an especially more alluring fantasy than working a nine-to-five job in an office for the rest of their lives. “After being bombarded with the, ‘What are you going to do when you grow up?’ question, the prospect of doing God’s work is very appealing, especially if the benefits presented are eternal ones — like how ISIS promises a paradise for its soldiers who become martyrs,” he added. |
|
8 |
+College youth are uniquely vulnerable to radicalization |
|
9 |
+Fox Boston 15 "Islamic State recruiting older teens, college students," 8/29/2015 AZ |
|
10 |
+College students are heading back to the dorms and lecture halls. They are adjusting to life away from home and finding a new identity for themselves. While it may seem far-fetched, for some that makes them the perfect target for something sinister and it's happening more than you think. FOX25 investigates the way ISIS is recruiting on campus. A MOTHER'S PLEA Nineteen year old Mohammed Hamzah Khan is accused of trying to support ISIS and is facing serious terror charges. His mother, Zarine, has a public plea to the terror group to stop recruiting children: "Without the internet, without social media this would never had happened and my son would not be in this situation he is in today. Leave our children alone. Please. That's my only message. Just stop recruiting these children. They're too young they don't know what's going on . They're vulnerable. Their thinking skills have not completely developed and these people are preying on that" ISIS RECRUITMENT TACTICS AND SOCIAL MEDIA ISIS is changing it's recruitment tactics. Experts say propaganda videos are less bloody and produced professionally. Social media is a high priority and they're taking online communication to the next level to catch the eye of college students. The number of websites, forums, Twitter accounts, Facebook pages that belong to ISIS and other similar organizations have increased . Professor Dana Janbek of Lasell College studies global terrorism and new media. She says the online magazine ISIS publishes is an example of how the terror group is trying to get their message across by seeming more legitimate in an attempt at luring young people with higher skill sets. Janbek says the magazine includes current events, making it relevant and it is professionally written. ISIS RECRUITING COLLEGE STUDENTS Professor Dana Janbek tells FOX25 that even though ISIS is viewed as a extremist terror organization, they see themselves as a legitimate government and they are aiming high when recruiting college students. They rely on people with different backgrounds and different skill sets including students and professionals who have a medical backgrounds. |
|
11 |
+Studies prove |
|
12 |
+Greer 14 Scott Greer (deputy editor), "Study: Spoiled, wealthy college students more likely to support terrorism," Daily Caller, http://dailycaller.com/2014/03/20/study-spoiled-wealthy-college-students-more-likely-to-support-terrorism/#ixzz4VsjULps |
|
13 |
+According to the study conducted by Queen Mary University in London found that youth, wealth and a full-time education are significant risk factors for violent radicalization. The researchers worked from the belief that radicalization is a process and focused on the factors that define the pre-radicalization phase and make individuals susceptible to the messaging of extremist groups in their study. |
|
14 |
+Lone wolf WMD attacks cause extinction. |
|
15 |
+Ackerman and Pinson 14 – Gray A., Director of the Special Projects Division at the National Consortium for the Study of Terrorism and Responses to Terrorism (START); Lauren E., Senior Research/Project Manager at START and PhD student at Yale University, 2014 (“An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells,” Terrorism and Political Violence (Vol. 26, Issue 1) Available Online to Subscribing Institutions via Tandfonline) |
|
16 |
+The first question to answer is whence the concerns about the nexus between CBRN weapons and isolated actors come and whether these are overblown. The general threat of mass violence posed by lone wolves and small autonomous cells has been detailed in accompanying issue contributions, but the potential use of CBRN weapons by such perpetrators presents some singular features that either amplify or supplement the attributes of the more general case and so are deserving of particular attention. Chief among these is the impact of rapid technological development. Recent and emerging advances in a variety of areas, from synthetic biology 3 to nanoscale engineering, 4 have opened doors not only to new medicines and materials, but also to new possibilities for malefactors to inflict harm on others. What is most relevant in the context of lone actors and small autonomous cells is not so much the pace of new invention, but rather the commercialization and consumerization of CBRN weapons-relevant technologies. This process often entails an increase in the availability and safety of the technology, with a concurrent diminution in the cost, volume, and technical knowledge required to operate it. Thus, for example, whereas fifty years ago producing large quantities of certain chemical weapons might have been a dangerous and inefficient affair requiring a large plant, expensive equipment, and several chemical engineers, with the advent of chemical microreactors,5 the same processes might be accomplished far more cheaply and safely on a desktop assemblage, purchased commercially and monitored by a single chemistry graduate student. |
|
17 |
+The rapid global spread and increased user-friendliness of many technologies thus represents a potentially radical shift from the relatively small scale of harm a single individual or small autonomous group could historically cause. 6 From the limited reach and killing power of the sword, spear, and bow, to the introduction of dynamite and eventually the use of our own infrastructures against us (as on September 11), the number of people that an individual who was unsupported by a broader political entity could kill with a single action has increased from single digits to thousands. Indeed, it has even been asserted that ‘‘over time. . . as the leverage provided by technology increases, this threshold will finally reach its culmination—with the ability of one man to declare war on the world and win.’’7 Nowhere is this trend more perceptible in the current age than in the area of unconventional weapons. |
|
18 |
+These new technologies do not simply empower users on a purely technical level. Globalization and the expansion of information networks provide new opportunities for disaffected individuals in the farthest corners of the globe to become familiar with core weapon concepts and to purchase equipment—online technical courses and eBay are undoubtedly a boon to would-be purveyors of violence. Furthermore, even the most solipsistic misanthropes, people who would never be able to function socially as part of an operational terrorist group, can find radicalizing influences or legitimation for their beliefs in the maelstrom of virtual identities on the Internet. |
|
19 |
+All of this can spawn, it is feared, a more deleterious breed of lone actors, what have been referred to in some quarters as ‘‘super-empowered individuals.’’8 Conceptually, super-empowered individuals are atomistic game-changers, i.e., they constitute a single (and often singular) individual who can shock the entire system (whether national, regional, or global) by relying only on their own resources. Their core characteristics are that they have superior intelligence, the capacity to use complex communications or technology systems, and act as an individual or a ‘‘lone-wolf.’’9 The end result, according to the pessimists, is that if one of these individuals chooses to attack the system, ‘‘the unprecedented nature of his attack ensures that no counter-measures are in place to prevent it. And when he strikes, his attack will not only kill massive amounts of people, but also profoundly change the financial, political, and social systems that govern modern life.’’10 It almost goes without saying that the same concerns attach to small autonomous cells, whose members’ capabilities and resources can be combined without appreciably increasing the operational footprint presented to intelligence and law enforcement agencies seeking to detect such behavior. |