Cal EM Neg v. Emory BD – Texas R7 1NC Extra T Interpretation and violation – the resolution only mandates the legalization of marihuana – the 1AC also has the states and territories establish the Cannabis Exchange – that’s Extra-Topical Vote negative – First is presumption – the 1AC proves the resolution insufficient – no reason to vote aff if their harms are dependent on an exchange system that’s not germane to the topic Second is limits – infinite number of actions can be taken alongside the plan which means being negative impossible and obstructs topic education Third is ground – allowing an extra action takes out all neg ground by tacking on additional arbitrary plans which ruins clash Governmentality K Legalizing marijuana is a tactic of neoliberal governmentality that places the onus on individuals to govern themselves while the government sits back and makes sure that they’re doing it right – this increases state control through regulatory mechanisms while minimizing its perception O’Brien 13 - University of Wisconsin-Whitewater (February 25, Patrick, “Medical Marijuana and Social Control: Escaping Criminalization and Embracing Medicalization” Deviant Behavior, 34: 423–443, Taylor & Francis) A latent outcome of this legal-medical system has been its adaptation to the new criminologies evidenced in late modern society (Garland 1996, 2001). The medicalization of cannabis has defined deviance down significantly (Moynihan 1993) and effectively reduced the demands placed on the State’s criminal justice agencies. At the same time, the State has increasingly embedded social controls into the fabric of society , rather than inserting them from above in the form of sovereign command (Garland 2001). Medical dispensary owners, cultivators, investors, and employees, along with local politicians and affiliated business owners, have remained bound to State laws and policies, but have also been expected to proctor themselves while government powers watch at a distance for a breakdown in control. The State has conceded that it is unable to manage the illicit marijuana market alone and has redirected its control efforts away from the sole authority of the police, the courts, and the prisons. The dispensary industry has provided the State a situation in which it governs, but does not coercively control marijuana and its users. Instead, the State manages the drug through the actors involved in the legal-medical industry, and has effectively mandated them as active partners in sustaining and enforcing the formal and informal controls of the dispensary system. resigned its power. On the contrary, it The State controls at an ostensibly distant fashion, but it has not has retained its traditional command over the police and the prisons while expanding its efficiency and capacity to control marijuana and its users . This new reality in crime control has stratified itself across all facets of society, including its structural, cultural, and interactional dimensions. At the structural level, the legal-medical model has reduced the strain of a substantial segment of society by institutionalizing acceptable and lawful means of accessing marijuana, effectively shifting this population into an ecological position where they can be watched and controlled . The groups once involved in the illicit market have become visible, and the laws that govern the use, distribution, and production of cannabis have actually become enforceable by the State. Marijuana users have become patients, requiring a physician’s recommendation to con sume the drug lawfully. The State has mandated what medical conditions warrant a registry card, monitoring people through licensing applications, doctors’ files, government paperwork, and the medical marijuana registry. Dispensary owners have been required to grow 70%of their own product, to provide live 24-hour surveillance camera feeds of their cultivation and distribution warehouses, and to subject themselves to periodic inspection. Dispensary owners and employees have been fingerprinted and undergone extensive background checks, and marijuana businesses only operate in State zoned locations. By amassing knowledge about the social organization of the marijuana industry and its users, the government has engaged in monitoring, aggregating, and transmitting such information to law enforcement and the public. At the cultural level, the legal-medical system has provided a greater degree of social order, stability, and integration by relocating marijuana users into the fold of conventional norms and values. Cultural cohesion and conformity have been fostered through legitimate business opera tions that cater to conventional lifestyles and work hours, that quell concerns over safety and lawfulness, and reduce the alienation of a subculture of users. The State has effectively aligned a once criminal population of people with dominant ideals of normality (Goffman 1983) and dismantled a framework of deviant organization (Best and Luckenbill 1982) with distinct ideol ogies and norms concerning marijuana sales and use. The government has incorporated the norms and values of conventional society into the processes of distributing and using cannabis, and now assists in controlling marijuana through the cultural transmission (Shaw and McKay 1972) of rituals and sanctions now aligned with the normative social order. Both of these macro- and meso-level shifts have augmented State control of marijuana and its users at an interactional level. These structural and cultural changes have directly influenced micro-level processes and mediated people’s differential associations and social learning processes (Akers 2000; Sutherland 1949; Sutherland and Cressey 1955) as users have been increasingly socialized into a conventional drug lifestyle. Marijuana users in the dispensary sys tem have decreased their contacts with deviant others and increased their contacts with legitimate associations by purchasing lawfully from licensed distributors. Dispensary owners have come to interact with banks, contractors, real estate firms, tax specialists, and lawyers because they exist in legitimate occupational associations and lawful community relations. This legal-medical model has allowed the State to further monitor interactional processes through receipts, taxes, and video surveillance. This continuous supervision has led to growing discipline and normal ization. The State has prescribed conforming modes of conduct upon marijuana users with new found power (Foucault 1975). Zoning laws have mandated where transactions occur, distribution laws have defined how much can be purchased, and monitored business hours have controlled the time sales occur. The State has also strengthened individual bonds to society (Hirschi 1969) as a medical license protects users’ conventional investments (i.e., education, career, and family) and caters to their time-consuming activities as they have decided the time, speed, and location of their purchases. Finally, State medicalization of marijuana has prompted people to endorse society’s rules as progressively more politically and morally correct , since users are typically critical of cannabis prohibition. This legal-medical system has also accommodated the ideals of neoliberalism . Through the adaptive strategy of responsibilization (Garland 2001), the penalization strategies (i.e., control mechanisms) regulating marijuana have become increasingly privatized , operating through civil society. For example, although the State has demanded 24-hour video surveillance over dispensary operations, it has also required these businesses to regulate their own marijuana production and distribution, monitor their own employees and financial accounts, and direct their own branding and promotional campaigns. Furthermore, by defining deviance down, marijuana has become legally sold through privately owned dispensaries. In neoliberal fashion, marijuana has been deregulated for capital gain. Biopower and neoliberalism combine to create a unique form of necropolitics that drives endless extermination in the name of maintaining the strength of the market Banerjee 6 - University of South Australia (Subhabrata Bobby, “Live and Let Die: Colonial Sovereignties and the Death Worlds of Necrocapitalism,” Borderlands, Volume 5 No. 1, http://www.borderlands.net.au/vol5no1_2006/banerjee_live.htm) 10. Agamben shows how sovereign power operates in the production of bare life in a variety of contexts: concentration camps, 'human guinea pigs' used by Nazi doctors, current debates on euthanasia, debates on human rights and refugee rights. A sovereign decision to apply a state of exception invokes a power to decide the value of life, which would allow a life to be killed without the charge of homicide. The killings of mentally and physically handicapped people during the Nazi regime was justified as ending a 'life devoid of value', a life 'unworthy to be lived'. Sovereignty thus becomes a decision on the value of life, 'a power to decide the point at which life ceases to be politically relevant' (Agamben, 1998: 142). Life is no more sovereign as enshrined in the declaration of 'human' rights but becomes instead a political decision, an exercise of biopower (Foucault, 1980). In the context of the 'war on terror' operating in a neoliberal economy, the exercise of biopower results in the creation of a type of sovereignty that has profound implications for those whose livelihoods depend on the war on terror as well as those whose lives become constituted as 'bare life' in the economy of the war on terror. 11. However, it is not enough to situate sovereignty and biopower in the context of a neoliberal economy especially in the case of the war on terror. In a neoliberal economy, the colony represents a greater potential for profit especially as it is this space that, as Mbembe (2003: 14) suggests, represents a permanent state of exception where sovereignty is the exercise of power outside the law, where 'peace was more likely to take on the face of a war without end' and where violence could operate in the name of civilization. But these forms of necropolitical power, as Mbembe reads it in the context of the occupation of Palestine, literally create 'death worlds, new and unique forms of social existence in which vast populations are subjected to conditions of life conferring upon them the status of theliving dead ' (Mbembe, 2003: 40). The state of endless war is precisely the space where profits accrue whether it is through the extraction of resources or the use of privatized militias or through contracts for reconstruction. Sovereignty over death worlds results in the application of necropower either literally as the right to kill or the right to 'civilize', a supposedly 'benevolent' form of power that requires the destruction of a culture in order to 'save the people from themselves' (Mbembe, 2003:22). This attempt to save the people from themselves has, of course, been the rhetoric used by the U.S. government in the war on terror and the war in Iraq. 12. Situating necropolitics in the context of economy, Montag (2005: 11) argues that if necropolitics is interested in the production of death or subjugating life to the power of death then it is possible to speak of a necroeconomics - a space of 'letting die or exposing to death'. Montag explores the relation of the market to life and death in his reading of Adam Smith's Wealth of Nations and Theory of Moral Sentiments. In Montag's reading of Smith, it is 'the dread of death, the great poison to the happiness...which while it afflicts and mortifies the individual, guards and protects the society' (cited in Montag, 2005: 12). If social life was driven solely by unrestrained self-interest then the fear of punishment or death through juridical systems kept the pursuit of excessive self-interest in check, otherwise people would simply rob, injure and kill for material wealth. Thus, for Smith the universality of life is contingent on the particularity of death, the production of life on the production of death where the intersection of the political and the economic makes it necessary to exercise the right to kill. The market then, as a 'concrete form of the universal' becomes the 'very form of universality as life' and requires at certain moments to 'let die'. Or as Montag theorizes it, Death establishes the conditions of life; death as by an invisible hand restores the market to what it must be to support life. The allowing of death of the particular is necessary to the production of life of the universal. The market reduces and rations life; it not only allows death , it demands death be allowed by the sovereign power , as well as by those who suffer it. In other words, it demands and required the latter allow themselves to die. Thus alongside the figure of homo sacer, the one who may be killed with impunity, is another figure, one whose death is no doubt less spectacular than the first and is the object of no memorial or commemoration: he who with impunity may be allowed to die, slowly or quickly, in the name of the rationality and equilibrium of the market (Montag, 2005: 15). Montag, therefore, theorizes a necroeconomics where the state becomes the legitimate purveyor of violence: in this scenario, the state can compel by force by 'those who refuse to allow themselves to die' (Montag, 2005: 15). However, Montag's concept of necroeconomics appears to universalize conditions of poverty through the logic of the market. My concern however, is the creation of death worlds in colonial contexts through the collusion between states and corporations. 13. If states and corporations work in tandem with each other in colonial contexts, creating states of exception and exercising necropower to profit from the death worlds that they establish, then necroeconomics fails to consider the specificities of colonial capitalist practices. In this sense, I would argue that necrocapitalism emerges from the intersection of necropolitics and necroeconomics, as practices of accumulation in colonial contexts by specific economic actors - multinational corporations for example - that involve dispossession, death, torture, suicide, slavery, destruction of livelihoods and the general management of violence. It is a new form of imperialism, an imperialism that has learned to 'manage things better' . Colonial sovereignty can be established even in metropolitan sites where necrocapitalism may operate in states of exception: refugee detention centres in Australia are examples of these states of exception (Perera, 2002). However, in the colonies (either 'post' or 'neo'), entire regions in the Middle East or Africa may be designated as states of exception. The alternative is to refuse to imagine legality – only the formation of autonomous geographies can challenge biopolitical neoliberalism Pickerill & Chatterton 6 - Leicester University AND Leeds University (Jenny and Paul, “Notes towards autonomous geographies: creation, resistance and self-management as survival tactics” Progress in Human Geography30, 6 (2006) pp. 730–746) In essence, autonomy is a coming together of theory and practice, or praxis. Hence, it is not solely an intellectual tool nor a guide for living; it is a means and an end. Autonomous geographies represent the deed and the word, based around ongoing examples and experiments. Autonomous spaces are not spaces of deference to higher organizational levels governmental organizations, political representatives or trade union officials. They such as non- are based around a belief that the process is as important as the outcome of resistance , that the journey is an end in itself. As the Zapatistas say: ‘we don’t know how long we have to walk this path or if we will ever arrive, but at least it is the path we have chosen to take’. Autonomous geographies are based around a belief in prefigurative politics (summed up by the phrase ‘be the change you want to see’), that change is possible through an accumulation of small changes , providing much-needed hope against a feeling of powerlessness. Part of this is the belief in ‘doing it yourself ’ (see McKay, 1998) or creating workable alternatives outside the state . Many examples have flourished embracing ecological direct action, free parties and the rave scene, squatting and social centres, and opensource software and independent media (Wall, 1999; Seel et al., 2000; Plows, 2002; Chatterton and Hollands, 2003; Pickerill, 2003a; 2006). Resources are creatively reused, skills shared, and popular or participatory education techniques deployed, aiming to develop a critical consciousness, political and media literacy and clear ethical judgements (Freire, 1979). In the terrain opened up by the failure of state-based and ‘actually existing socialism’, autonomy allows a rethinking of the idea of revolution – not about seizing the state’s power but, as Holloway (2002) argues, ‘changing the world without taking power’ (Vaneigem, 1979). Autonomy does not mean an absence of structure or order, but the rejection of a government that demands obedience (Castoriadis, 1991). Examples of postcapitalist ways of living are already part of the present (Gibson-Graham, 1996). The documentation of the ‘future in the present’ has been a hallmark of work by anarchist, libertarian and radical scholars from Peter Kropotkin (1972) to Colin Ward (1989) and Murray Bookchin (1996). Their work looks for tendencies that counter competition and conflict, providing alternative paths. Some of these disappear, others survive, but the challenge remains to find them, encourage people to articulate, expand and connect them. Autonomous projects face the accusation that, even if they do improve participants’ quality of living, they fail to have a transformative impact on the broader locality and even less on the global capitalist system (DeFilippis, 2004). Consequently, in talking of local resistance, Peck and Tickell (2002) suggest that ‘the defeat (or failure) of local neoliberalisms – even strategically important ones – will not be enough to topple what we are still perhaps justified in calling “the system”’ (p. 401). However, commentators make the mistake of looking for signs of emerging organizational coherence , political leaders and a common programme that bids for state power, when the rules of engagement have changed . A plurality of voices is reframing the debate, changing the nature and boundaries of what is taken as common sense and creating workable solutions to erode the workings of market-based economies in a host of, as yet, unknown ways. Rebecca Solnit’s writings on hope remind us that, while our actions’ effects are difficult to calculate, ‘causes and effects assume history marches forward, but history is not an army . It is a crab scuttling sideways, a drip of soft water wearing away stone’ (Solnit, 2004: 4). Cybersecurity Ptx Cybersecurity’s the lone area of compromise—deal coming now Swarts, 2-2—Phil, Washington Times, “Obama budget dedicates $14B to cybersecurity,” http://www.washingtontimes.com/news/2015/feb/2/obama-budget-dedicates-14b-to-cybersecurity/ -BR The Obama administration aims to ramp up the federal government’s cybersecurity arsenal, requesting nearly $14 billion in its 2016 budget proposal — about $1 billion more than in previous budgets — to combat what many have come to view as an increasingly significant weakness in American security and infrastructure. The increased funding comes after a series of high profile attacks, which has drawn national attention to the issue, including a massive breach at Sony Pictures which the government said was carried out by North Korea. Likewise in January, the Twitter and YouTube accounts for the U.S. military’s CENTCOM — which oversees operations in Iraq and Afghanistan — was hacked by supporters of the Islamic State, a terrorist group often known by the acronyms ISIS or ISIL. “Cyber threats targeting the private sector, critical infrastructure and the federal government demonstrate that no sector, network or system is immune to infiltration by those seeking to steal commercial or government secrets,” the White House said in a statement. Though the president’s budget proposal was met with widespread criticism by GOP lawmakers on Capitol Hill Monday, cybersecurity is likely going to be one area where both parties find common ground. Much of the requested money will be split across major government agencies that focus on cybersecurity, including the Departments of Homeland Security, Justice and Defense. The plan wrecks Obama’s PC Jeremy Daw 12, J.D. from Harvard Law School, Dec 15 2012, “Marijuana Not A Priority For Obama,” http://cannabisnowmagazine.com/current-events/politics/marijuana-not-a-priority-for-obama Some hope for even more radical change. With the most recent polls suggesting that a majority of Americans favor reform of pot laws, why not seize the moment and end federal prohibition entirely? Obama could order the DEA to reschedule cannabis out of Schedule I to a less restrictive classification, which would effectively end the conflict with the federal government in medical marijuana states. Such a move could harness political will for change and put the president on the winning side of public opinion. But such moves would have serious downsides . The politics of pot, rife with cultural and political divisions since the tumultuous 1960s, remain bitterly divisive ; any politician who proposes liberalization of cannabis laws risks becoming saddled with labels borne out of a long history of ingroup/outgroup dynamics and which can rapidly drain a leader’s store of political capital . Given Obama’s susceptibility to an even older tradition of racial stereotyping which associates cannabis use with African Americans, any kind of green light to relaxed marijuana laws will cost the president dearly. Obama has sufficient PC and momentum now—his push is vital to intel-sharing Sorcher, 1-15—Sara, “Sony hack gives Obama political capital to push cybersecurity agenda (+video),” Christian Science Monitor, http://www.csmonitor.com/World/Passcode/2015/0114/Sony-hack-givesObama-political-capital-to-push-cybersecurity-agenda-video --BR “Sony hack gives Obama political capital to push cybersecurity agenda (+video)” Edward Snowden may have doomed the prospects for cybersecurity legislation last Congress – but North Korea may revive them in this one. After the leaks from the former National Security Agency contractor, privacy advocates staunchly opposed cybersecurity bills that share information with the government, amid fears they would increase the spy agency’s power to access and share even more private information from citizens. The information-sharing bills stalled. Yet President Obama’s new push this week has so far been warmly received on Capitol Hill – and on both sides of the aisle. Obama’s proposals, one week before his State of the Union address, come after the destructive hack of Sony Pictures Entertainment, for which the government has publicly blamed and sanctioned North Korea. It’s also on the heels of a maelstrom of other high-profile data breaches last – including on Home Depot and JP Morgan Chase & Co. – and this week’s brief takeover of the US military’s Central Command social media accounts by apparent Islamic State supporters. All told, it may be enough momentum to break the logjam and give members of Congress political cover to come together this session to support a controversial part of Obama’s cybersecurity agenda: To give companies immunity from lawsuits if they share certain information about cyber threats with the government with the Department of Homeland Security [DHS]. An informationsharing bill “has to pass this Congress,” Senate Intelligence Committee Chairman Richard Burr, a North Carolina Republican, told Passcode. “It helps any time the president supports something.” Moving a cybersecurity information-sharing bill “ has never been easy ,” he acknowledged, “but we’re committed to go extremely quickly.” The Sony hack was a wake-up call on Capitol Hill, several lawmakers said. The attackers not only stole private information, they destroyed company data and computer hardware, and they also coerced Sony into altering its plans to release "The Interview," the comedy about the assassination of the North Korean leaders. All of this may go a long way to persuade lawmakers that mandating information sharing about cybersecurity threats will ultimately help defend private companies. “I’m glad [Obama] is pushing to address cyber legislation,” said Republican Sen. Kelly Ayotte of New Hampshire. “We’ve stalled in the past, and if you look at what happened with the Sony attack, I think we can’t afford to stall anymore . I think his timing is right on here… . I haven’t talked to anyone in Congress who has said, ‘This shouldn’t be a priority for us.’” Sen. Angus King, an independent on the Intelligence Committee, agreed. “I think everybody realizes the urgency.” Maryland Democratic Rep. Dutch Ruppersberger, who already reintroduced his version of information-sharing legislation this session, said in a statement that, “President Obama and I agree we can no longer afford to play political games while rogue hackers, terrorists, organized criminals and even state actors sharpen their cyber skills.” However, just because “everybody’s on board with the idea of it” – as Republican Sen. John McCain puts it – doesn’t mean it will be easy to make progress on this controversial and complicated issue. “I have been to more meetings on cyber than any other issue in my time in the Senate, and gotten the least amount of result,” said Senator McCain, who chairs the Armed Services Committee. There are already divisions emerging this time around. McCain opposes the White House’s proposal to route cyberthreat information through the Department of Homeland Secu*rity. He said the National Security Agency should take that role. “I’m glad to see a proposal of theirs, for a change, and we’ll be glad to work on it – just not rubber stamp it,” said McCain. Intel-sharing provisions are critical to halting catastrophic cyberattacks Lev-Ram, 1-21—citing DeWalt, CEO of FireEye, a leader in cyber security, protecting organizations from advanced malware, zero-day exploits, APTs, and other cyberattacks. “Does President Obama's bid to bolster cyber security go far enough?” Forbes, http://fortune.com/2015/01/21/obama-state-unioncybersecurity/?icid=maing-grid7|ie8-unsupported-browser|dl31|sec3_lnk3%26pLid%3D602263 –BR Sharing real-time threat intelligence and indicators of compromise–both between the private sector and the government and among the private sector–is a critical component of a pro-active security strategy. The timely sharing of threat intelligence improves detection and prevention capabilities and provides organizations with the ability to mitigate and minimize the adverse consequences of a breach. Sharing also provides enhanced situational awareness for the community at large. FireEye research demonstrates that over 70% of malware is highly targeted and used only once. To better manage risk stemming from this continuously evolving threat environment, FireEye recommends that organizations conduct robust compromise risk assessments, adopt behavioral based tools and techniques such as detonation chambers, actively monitor their networks for advanced cyber threats, stand ready to rapidly respond in the event of a breach and share threat intelligence and lessons learned through active engagement in information sharing organizations. As a final preventative measure, organization should obtain a cyber insurance policy to help with catastrophic repercussions of a breach. Cyber threats outweigh the aff Thamboo, 14—Visha, citing Richard Clarke, a former White House staffer in charge of counterterrorism and cyber-security, “Cyber Security: The world’s greatest threat,” 11-25, https://blogs.ubc.ca/vishathamboo/2014/11/25/cyber-security-the-worlds-greatest-threat/ -- BR After land, sea, air and space, warfare had entered the fifth domain: cyberspace. Cyberspace is arguably the most dangerous of all warfares because of the amount of damage that can be done, whilst remaining completely immobile and anonymous. In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes . Computer bugs bring down military e-mail systems ; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery. Other dangers are coming: weakly governed swathes of Africa are being connected up to fibre-optic cables, potentially creating new havens for cyber-criminals and the spread of mobile internet will bring new means of attack. The internet was designed for convenience and reliability, not security. Yet in wiring together the globe, it has merged the garden and the wilderness. No passport is required in cyberspace. And although police are constrained by national borders, criminals roam freely. Enemy states are no longer on the other side of the ocean, but just behind the firewall. The illintentioned can mask their identity and location, impersonate others and con their way into the buildings that hold the digitised wealth of the electronic age: money, personal data and intellectual property. Deterrence in cyber-warfare is more uncertain than, say, in nuclear strategy: there is no mutually assured destruction, the dividing line between criminality and war is blurred and identifying attacking computers, let alone the fingers on the keyboards, is difficult. Retaliation need not be confined to cyberspace; the one system that is certainly not linked to the public internet is America’s nuclear firing chain. Although for now, cyber warfare has not spiralled out of control, it is only a matter of time , before cyber warfare becomes the most prominent type of attack, and the most deadly because of its scope and anonymity . Treaties Adv CP Text: The United States federal government should make an international public declaration acknowledging that they are in open breach of international drug treaties. The United States should end all current legalization of marihuana and ban future legalization, until international drug treaties are amended to allow legalization. Small Farms Squo solves – Illegality prevents investment from big agribusiness now CNBC 10 (April 20, “Small Growers Or Corporate Cash Crop?” http://www.cnbc.com/id/36179260) Agribusiness In The Wings? Most large agribusiness producers and distributors wouldn’t comment on any marijuana cultivation plans while it’s still largely illegal . Seed and agri-chemical maker Monsanto isn’t focused on it, says spokesman Darren Wallis, adding that even if that changed tomorrow, development of a mass-scale crop takes time. “We focus on major crops for food, feed and biofuels—corn, soybeans, cotton, canola, wheat, sugarcane and vegetables,” he says. “It takes eight to ten years of investment to bring a biotech product to market.” Other big food and agricultural firms would not comment, saying the proposition was too hypothetical or inappropriate given the largely illegal current status of the drug. Consumer demand will drive cannabis farmers to harvest indoors Lewis 13 - senior lecturer in international history at Stanford (October 22, Martin W., “Unnecessary Environmental Destruction from Marijuana Cultivation in the United States ” http://geocurrents.info/place/north-america/northern-california/unnecessary-environmentaldestruction-marijuana-cultivation-united-states) Growing sun-loving plants in buildings under artificial suns is the height of environmental and economic lunacy. Outdoors, the major inputs—light and air—are free . Why then do people pay vast amounts of money to grow cannabis indoors, regardless of the huge environmental toll and the major financial costs? The reasons are varied. Outdoor cultivation is climatically impossible or unfeasible over much of the country. Everywhere, the risk of detection is much reduced for indoor operations. Indoor crops can also be gathered year-round, whereas outdoor harvests are an annual event. But the bigger spur for artificially grown cannabis appears to be consumer demand . As noted in a Huffington Post article “ indoor growers … produce the bestlooking buds, which command the highest prices and win the top prizes in competitions .” In California’s legal (or quasi-legal) medical marijuana dispensaries, artificially grown cannabis enjoys a major price advantage, due largely to the more uniformly high quality of the product. Journalists have been noting the environmental harm of indoor marijuana cultivation for some time. Unfortunately, few people seem to care. In 2011, the San Francisco Bay Guardian reported that environmental concerns were leading some consumers to favor outdoor marijuana, but any such changes have not yet been reflected in market prices. In the cannabis industry, as in the oil industry, ecological damage does not seem to be much of an issue. Industrial model is sustainable and small farms aren’t net better -lower yields: 20-50% -land use -acidification -soil erosion/tillage -rotenone x fish -zero-sum: aff model T/O Miller 14 (Dr. Henry I. Miller, a physician and molecular biologist, was the founding director of the FDA's Office of Biotechnology and is a research fellow at Stanford University's Hoover Institution, “Organic Farming Is Not Sustainable,” May 15, http://online.wsj.com/news/articles/SB10001424052702304431104579550002888434432, Groot) You may have noticed that the organic section of your local supermarket is growing. Advocates tout organic-food production—in everything from milk and coffee to meat and vegetables—as a "sustainable" way to feed the planet's expanding population. The Worldwatch Institute, a Washington, D.C.-based environmental group, goes so far as to say organic farming "has the potential to contribute to sustainable food security by improving nutrition intake and sustaining livelihoods in rural areas, while simultaneously reducing vulnerability to climate change and enhancing biodiversity ." The evidence argues otherwise . A study by the Institute for Water Research at Ben-Gurion University in Israel, published last year in the journal Hydrology and Earth System Sciences, found that "intensive organic agriculture relying on solid organic matter, such as composted manure that is implemented in the soil prior to planting as the sole fertilizer, resulted in significant down-leaching of nitrate" into groundwater. With many of the world's most fertile farming regions in the throes of drought, increased nitrate in groundwater is hardly a hallmark of sustainability. Moreover, as agricultural scientist Steve Savage has documented on the Sustainablog website, wide-scale composting generates significant amounts of greenhouse gases such as methane and nitrous oxide. Compost may also deposit pathogenic bacteria on or in food crops, which has led to more frequent occurrences of food poisoning in the U.S. and elsewhere. of land and conventional agriculture—impose Organic farming might work well for certain local environments on a small scale, but its farms produce far less food per unit water than conventional ones. The low yields of organic agriculture—typically 20%-50% less than various stresses on farmland and especially on water consumption. A British meta-analysis published in the Journal of Environmental Management (2012) found that "ammonia emissions, nitrogen leaching and nitrous oxide emissions per product unit were higher from organic systems" than conventional farming systems, as were "land use, eutrophication potential and acidification potential per product unit." Lower crop yields are inevitable given organic farming's systematic rejection of many advanced methods and technologies. If the scale of organic production were significantly increased, the lower yields would increase the pressure for the conversion of more land to farming and more water for irrigation, both of which are serious environmental issues. Another limitation of organic production is that it disfavors the best approach to enhancing soil quality—namely, the minimization of soil disturbances such as tilling, combined with the use of cover crops. Both approaches help to limit soil erosion and the runoff of fertilizers and pesticides. Organic growers do frequently plant cover crops, but in the absence of effective herbicides, often they rely on tillage (or even labor-intensive hand weeding) for weed control. One prevalent myth is that organic agriculture does not employ pesticides. Organic farming does use insecticides and fungicides to prevent predation of its crops. More than 20 chemicals (mostly containing copper and sulfur) are commonly used in the growing and processing of organic crops and are acceptable under U.S. organic rules. They include nicotine sulfate, which is extremely toxic to warm-blooded animals, and rotenone , which is moderately toxic to most mammals but so toxic to fish that it's widely used for the mass poisoning of unwanted fish populations during restocking projects. Perhaps the most illogical and least sustainable aspect of organic farming in the long term is the exclusion of " g enetically m odified o rganism s ," but only those that were modified with the most precise and predictable techniques such as gene splicing. Except for wild berries and wild mushrooms, virtually all the fruits, vegetables and grains in our diet have been genetically improved by one technique or another, often through what are called wide crosses, which move genes from one species or genus to another in ways that do not occur in nature. Therefore, the exclusion from organic agriculture of organisms simply because they were crafted with modern, superior techniques makes no sense. It also denies consumers of organic goods nutritionally improved foods, such as oils with enhanced levels of omega-3 fatty acids. In recent decades, we have seen advances in agriculture that have been more environmentally friendly and sustainable than ever before. But they have resulted from science-based research and tech nological ingenuity by farmers, plant breeders and agribusiness companies , not from social elites opposed to modern insecticides, herbicides, genetic engineering and "industrial agriculture." Small farms fail McWilliams 09 (James, historian at Texas State University, 10/7, http://freakonomics.blogs.nytimes.com/2009/10/07/let-the-farmers-market-debatecontinue/?apage=2) Some academic critics are starting to wonder. Writing in the Journal of Rural Studies, sociologist C. Clare Hinrichs warns that “[m]aking ‘local’ a proxy for the ‘good’ and ‘global’ a proxy for the bad may overstate the value in proximity.” Building on this suspicion, she acknowledges that many small farms are indeed more sustainable than larger ones, but then reminds us that “Small scale, ‘local’ farmers are not inherently better environmental stewards.” Personal experience certainly confirms my own inability to make such a distinction. Most of us must admit that in many cases we really haven’t a clue if the local farmers we support run sustainable systems. The possibility that, as Hinrichs writes, they “may lack the awareness or means to follow more sustainable production practices” suggests that the mythical sense of community (which depends on the expectation of sound agricultural practices) is being eroded. After all, if the unifying glue of sustainability turns out to have cracks, so then does the communal cohesiveness that’s supposed to evolve from it. And this is not a big “If.” “[W]hile affect, trust, and regard can flourish under conditions of spatial proximity,” concludes Hinrichs, “this is not automatically or necessarily the case.” At the least, those of us who value our local food systems should probably take the time to tone down the Quixotic rhetoric and ask questions that make our farmer friends a little uncomfortable. Tech development solves agriculture Thompson 11 –senior fellow for The Chicago Council on Global Affairs and professor emeritus at the University of Illinois at UrbanaChampaign. (Robert, “Proving Malthus Wrong, Sustainable agriculture in 2050” http://scienceblogs.com/tomorrowstable/2011/05/proving_malthus_wrong_sustaina.php)//SQR Tools available today, including plant breeding and biotechnology, can make presently unusable soils productive and increase the genetic potential of individual crops - enhancing drought and stress tolerance, for example - while also producing gains in yields. Existing tools can also internalize plants' resistance to disease, and even improve a plant's nutritional content - meaning consumers can get more nutritional value without increasing their consumption. Furthermore, modern high-productivity agriculture minimizes farmers' impact on the environment. Failure to embrace these technologies will result in further destruction of remaining forests. Adoption of technologies that produce more output from fewer resources has been hugely successful from an economic standpoint: prior to the price spike in 2008, there was a 150-year downward trend in the real price of food. The jury is still out on whether the long-term downward trend will resume, prices will flatten out on a new higher plateau, or they will trend upward in the future. The key is investing in research in the public and private sectors to increase agricultural productivity faster than global demand grows. Long ago, British scholar Thomas Malthus predicted that the human population would eventually outgrow its ability to feed itself. However, Malthus has been proven wrong for more than two centuries precisely because he underestimated the power of agricultural research and technology to increase productivity faster than demand. There is no more reason for Malthus to be right in the 21st century than he was in the 19th or 20th - but only if we work to support, not impede, continued agricultural research and adoption of new technologies around the world. Countries will cooperate over food Burger et al. 10 -Development Economics, Corresponding author, Wageningen University (Kees, “Governance of the world food system and crisis prevention” http://www.stuurgroepta.nl/rapporten/Foodshock-web.pdf ) //SQR Both European water and agricultural policies are based on the belief that there will always be cheap food aplenty on the world market. A recent British report 23 reflects this optimism. Although production is now more prone to world market price shocks, their effects on farm incomes are softened by extensive income supports (van Eickhout et al. 2007). Earlier, in a 2003 report, a European group of agricultural economists wrote: Food security is no longer a prime objective of European food and agricultural policy. There is no credible threat to the availability of the basic ingredients of human nutrition from domestic and foreign sources. If there is a food security threat it is the possible disruption of supplies by natural disasters or catastrophic terrorist action. The main response necessary for such possibilities is the appropriate contingency planning and co-ordination between the Commission and Member States (Anania et al. 2003). Europe, it appears, feels rather sure of itself, and does not worry about a potential food crisis. We are also not aware of any special measures on standby. Nevertheless a fledgling European internal security has been called into being that can be deployed should (food) crises strike. The Maastricht Treaty (1992) created a quasi-decision-making platform to respond to transboundary threats. Since 9/11 the definition of what constitutes a threat has been broadened and the protection capacity reinforced. In the Solidarity Declaration of 2003 member states promised to stand by each other in the event of a terrorist attack, natural disaster or human-made calamity (the European Security Strategy of 2003). Experimental forms of cooperation are tried that leave member-state sovereignty intact, such as pooling of resources. The EU co-operates in the area of health and food safety but its mechanisms remain decentrslised by dint of the principle of subsidiarity. The silo mentality between the European directorates is also unhelpful, leading to Babylonian confusion. Thus, in the context of forest fires and floods the Environment DG refers to ‘civil protection’. Emissions in developing countries make CO2 reduction impossible – modeling is irrelevant Koetzle, 08 – Ph.D. and Senior Vice President of Public Policy at the Institute for Energy Research (William, “IER Rebuttal to Boucher White Paper”, 4/13/2008, http://www.instituteforenergyresearch.org/2008/04/13/ier-rebuttal-to-boucher-white-paper/) For example, if the United States were to unilaterally reduced emissions by 30% or 40% below 2004 levels[8] by 2030; net global CO2 emissions would still increase by more than 40%. The reason is straightforward: either of these reduction levels is offset by the increases in CO2 emissions in developing countries. For example, a 30% cut below 2004 levels by 2030 by the United States offsets less than 60% of China’s increase in emissions during the same period. In fact, even if the United States were to eliminate all CO2 emissions by 2030, without any corresponding actions by other countries, world-wide emissions would still increase by 30%. If the United States were joined by the other OECD countries in a CO2 reduction effort, net emissions would still significantly increase. In the event of an OCED-wide reduction of 30%, global emissions increase by 33%; a reduction of 40% still leads to a net increase of just under 30%. Simply put, in order to hold CO2 emissions at 2004 levels, absent any reductions by developing nations like China and India, all OECD emissions would have to cease.[9] The lack of participation by all significant sources of GHGs not only means it is unlikely that net reductions will occur; it also means that the cost of meaningful reductions is increased dramatically. Nordhous (2007) for example, argues that for the “importance of nearuniversal participation to reduce greenhouse gases.”[10] His analysis shows that GHG emission reduction plans that include, for example, 50% of world-wide emissions impose additional costs of 250 percent. Thus, he find’s GHG abatement plans like Kyoto (which does not include significant emitters like the United States, China, and India) to be “seriously flawed” and “likely to be ineffective.” [11] Even if the United States had participated, he argues that Kyoto would make “but a small contribution to slowing global warming, and it would continue to be highly inefficient.”[12]The data on emissions and economic analysis of reduction programs make it clear that GHG emissions are a global issue. Actions by localities, sectors, states, regions or even nations are unlikely to effectively reduce net global emissions unless these reductions are to a large extent mirrored by all significant emitting nations. No impact – empirics Willis et. al, 10 [Kathy J. Willis, Keith D. Bennett, Shonil A. Bhagwat & H. John B. Birks (2010): 4 °C and beyond: what did this mean for biodiversity in the past?, Systematics and Biodiversity, 8:1, 3-9, http://www.tandfonline.com/doi/pdf/10.1080/14772000903495833, ] The most recent climate models and fossil evidence for the early Eocene Climatic Optimum (53–51 million years ago) indicate that during this time interval atmospheric CO2 would have exceeded 1200 ppmv and tropical temperatures were between 5–10 ◦ C warmer than modern values (Zachos et al., 2008). There is also evidence for relatively rapid intervals of extreme global warmth and massive carbon addition when global temperatures increased by 5 ◦ C in less than 10 000 years (Zachos et al., 2001). So what was the response of biota to these ‘climate extremes’ and do we see the large-scale extinctions (especially in the Neotropics) predicted by some of the most recent models associated with future climate changes (Huntingford et al., 2008)? In fact opposite. the fossil record for the early Eocene Climatic Optimum demonstrates the very All the evidence from low-latitude records indicates that, at least in the plant fossil record, this was one of the most biodiverse intervals of time in the Neotropics (Jaramillo et al., 2006). It was also a time when the tropical forest biome was the most extensive in Earth’s history, extending to mid-latitudes in both the northern and southern hemispheres – and there was also no ice at the Poles and Antarctica was covered by needle-leaved forest (Morley, 2007). There were certainly novel ecosystems, and an increase in community turnover with a mixture of tropical and temperate species in mid latitudes and plants persisting in areas that are currently polar deserts. [It should be noted; however, that at the earlier Palaeocene–Eocene Thermal Maximum (PETM) at 55.8 million years ago in the US Gulf Coast, there was a rapid vegetation response to climate change. There was major compositional turnover, palynological richness decreased, and regional extinctions occurred (Harrington & Jaramillo, 2007). Reasons for these changes are unclear, but they may have resulted from continental drying, negative feedbacks on vegetation to changing CO2 (assuming that CO2 changed during the PETM), rapid cooling immediately after the PETM, or subtle changes in plant–animal interactions (Harrington & Jaramillo, 2007).] Treaties States don’t violate treaties Humphreys 13 – prof @ stanford (Keith, “Can the United Nations Block U.S. Marijuana Legalization?” 11/15, http://www.huffingtonpost.com/keith-humphreys/can-the-united-nations-bl_b_3977683.html) 1. Is the U.S. currently in violation of the UN treaties it signed agreeing to make marijuana illegal? No. The U.S. federal government is a signatory to the treaty, but the States of Washington and Colorado are not. Countries with federated systems of government like the U.S. and Germany can only make international commitments regarding their national-level policies. Constitutionally, U.S. states are simply not required to make marijuana illegal as it is in federal law. Hence, the U.S. made no such commitment on behalf of the 50 states in signing the UN drug control treaties.¶ Some UN officials believe that the spirit of the international treaties requires the U.S. federal government to attempt to override state-level marijuana legalization. But in terms of the letter of the treaties, Attorney General Holder's refusal to challenge Washington and Colorado's marijuana policies is within bounds. But the plan does and creates a precedent for a pick and choose approach to international law which spills over across all treaty areas – turns case. Hasse 13 [10/14/13, Heather Hasse is a New York consultant for International Drug Policy Consortium and the Harm Reduction Coalition, “The 2016 Drugs UNGASS: What does it mean for drug reform?” http://drogasenmovimiento.files.wordpress.com/2014/01/13-10-14-the-2016-drugs-ungasse28093what-does-it-mean-for-drug-reform_.pdf] But why? With all of the progress made in reform around the world lately, many – especially in the US – are asking if the UN is even relevant to domestic drug reform at this point. With the recent marijuana laws passed in Colorado and Washington and the proposed legislation in Uruguay – not to mention decriminalization measures enacted in Portugal and a growing number of other countries – reform seems inevitable. At some point, the argument goes, the UN system will simply be overtaken by “real world” reform on the ground. Why even bother with advocacy at the UN? This is not an easy question to answer; however, I truly believe that to be effective, reform efforts must be made at every level – locally, nationally, and globally . It may be true that reform efforts in the US and around the world have made significant progress in the last 10 years. But there is still a long way to go – marijuana is still not completely legal anywhere in the world (despite state laws to the contrary, marijuana still remains illegal under federal law throughout the US), and many human rights abuses continue to be carried out against drug users throughout the world in the name of drug control. Meanwhile, the international drug control treaties – the 1961 Single Convention on Narcotic Drugs and its progeny – remain in place and, in fact, enjoy nearly universal adherence by 184 member states. That so many countries comply – at least technically, if not in “spirit” – with the international drug treaty system, shows just how highly the international community regards the system. As well it should – the UN system is invaluable and even vital in many areas, including climate change, HIV/AIDS reduction, and, most recently, the Syrian chemical weapons crisis (and don’t forget that the international drug treaty system also governs the flow of licit medication). While it is not unheard of for a country to disregard a treaty, a system in which countries pick and choose which treaty provisions suit them and ignore the rest is, shall we say, less than ideal . But beyond the idea of simple respect for international law, there are practical aspects of reform to consider. The drug problem is a global one, involving not only consuming countries but producing and transit countries as well. Without global cooperation, any changes will at best be limited (marijuana reform in Washington and Colorado hardly affects the issue of human rights abuses in Singapore or the limitations on harm reduction measures in Russia). At worst, reform efforts enacted ad hoc around the world could be contradictory and incompatible - as might be the result if, for example, Colombia and the US opted for a regulated market without the cooperation of Costa Rica or Honduras, both transit countries. Finally, no matter what you think about the treaties and the UN drug control system, or how significant you believe them to be in the grand scheme of things, they are here for the time being, and are necessary to any discussion about drug reform. U.S. I-Law credibility is terminally dead – way too many alt causes Carasik 14 (Lauren Carasik, clinical professor of law and the director of the international human rights clinic at the Western New England University School of Law, Al Jazeera, “Human rights for thee but not for me”, 3/12/14, http://america.aljazeera.com/opinions/2014/3/the-us-lacksmoralauthorityonhumanrights.html) Last month U.S. Secretary of State John Kerry unveiled the State Department’s comprehensive annual assessment of human rights around the globe. It painted a grim picture of pervasive violations. Notably absent from the report, however, was any discussion of Washington’s own record on human rights. The report elicited sharp rebukes from some of the countries singled out for criticism. Many of them questioned the United States’ legitimacy as self-appointed global champion of human rights. China issued its own report, 154 pages long, excoriating the U.S. record on human rights and presenting a list of Washington’s violations. Egypt’s Foreign Ministry called the report “unbalanced and nonobjective” and censured the U.S. for appointing itself the world’s watchdog. Ecuador, Russia and Iran also criticized the report. By signaling that the world cares about human rights violations, the report provides a useful tool for advocates. While the omission of any internal critique is unsurprising, that stance ultimately undermines the State Department’s goals of promoting human rights abroad. Abuses unfolding around the world demand and deserve condemnation. But it is difficult for the U.S. to don the unimpeachable mantle, behave hypocritically and still maintain credibility. North-south schism It is tempting to dismiss the scolding as retaliatory howls by authoritarian states, but their critiques have long been echoed by others. Pointing to simmering divisions over human rights standards, China argued that developing countries face a different set of challenges from their more developed counterparts. This ideological debate has permeated rights discourse and often underscores a north-south schism. The divide has its roots in the history of human rights. In 1945, still reeling from the atrocities of World War II, world powers gathered in Paris to forge a multilateral agreement that would form “the foundation of freedom, justice and peace in the world.” Those principles were enshrined in the nonbinding Universal Declaration of Human Rights (UDHR). The U.N. then adopted two covenants that would have the force of law: one focused on civil and political rights and the other on economic, social and cultural rights. Together with the UDHR, they form the International Bill of Human Rights. The covenants were meant to be universal, interdependent and indivisible and equally treated, but they do not exist in a political vacuum. Although the U.S. was instrumental in creating this international framework, it has resisted conforming to many of the norms for which there is an emerging international consensus. The U.S. holds sacred its commitment to civil and political rights, such as those protected by its robust and revered Bill of Rights and proclaims itself a beacon of freedom and justice in the world. Critics argue that the rhetoric exceeds the reality on the ground. Economic and social rights are far more contested, in part because they require affirmative duties that affect resource allocation: States must take progressive action toward providing housing, food, education, health care and a host of other rights. The U.S. purports to be evenhanded. But geopolitical interests influence the tenor and content of its assessments, leading some critics to accuse the U.S. of sacrificing human rights at the altar of political expediency. For example, the U.S. has been accused of blunting its appraisal of allies such as Saudi Arabia, Bahrain, Mexico, Uzbekistan, Honduras and Israel. Economic interests also factor in. Critics decry the sale of arms to countries that by Washington’s own assessment are complicit in human rights abuses. While politically and economically self-interested maneuvering is inevitable, not all countries issue an ostensibly definitive and unvarnished report on the state of global human rights. In December during Human Rights Week, U.S. President Barack Obama issued a proclamation reaffirming the United States’ “unwavering support for the principles enshrined in the Universal Declaration of Human Rights.” Yet global headlines are dominated by high-profile U.S. human rights transgressions — indefinite detention at Guantánamo Bay, torture, extraordinary rendition, extrajudicial assassination by drones that claims the lives of innocents in addition to its targets, the aggressive pursuit of whistle-blowers and data collection that violates privacy both at home and abroad. Advocates criticize a litany of other human rights abuses, such as mass incarceration (the U.S. has 5 percent of the world’s population but 25 percent of its inmates, with disproportionate representation among minority groups), the death penalty (including post-execution revelations that raise serious doubt about already questionable convictions), racial profiling, the disenfranchisement of felons, sentences of life without parole for juvenile offenders, gun violence, solitary confinement, the shackling of pregnant inmates and many others. The New York–based Human Rights Watch says these violations disproportionately affect minority communities. “Victims are often the most vulnerable members of society: racial and ethnic minorities, immigrants, children, the elderly, the poor and prisoners,” it said in its annual report on the U.S. last year. Evading treaties Aside from specific human rights violations, the U.S. has been singularly unwilling to ratify key international human rights instruments, which reinforces its status as an outlier in the field. These include its refusal to ratify the Convention to Eliminate All Forms of Discrimination Against Women (only seven other countries are not parties to it), the International Covenant on Economic, Social and Cultural Rights, the Convention on Rights of the Child (ratified by all states except the U.S., Somalia and South Sudan) and the Convention on the Rights of Persons with Disabilities. The U.S. has also failed to ratify the American Convention on Human Rights, a regional framework on human rights in the Americas. It has ratified only two of the International Labor Organization’s eight fundamental conventions. Washington’s refusal to ratify the Rome Statute of the International Criminal Court (ICC) has provoked particular consternation. The international community has a profound interest in deterring the most violent abuses by ending impunity for war crimes, crimes against humanity and genocide. The ICC was created to promote accountability for these crimes, which are, for a complex and interrelated constellation of reasons, notoriously difficult to prosecute in domestic courts. But the U.S. will not submit to its jurisdiction, citing a number of concerns, including that the court would be subject to political manipulation and lack accountability to the U.N. and that submitting to it would violate state sovereignty. Some critics claim that it is the U.S. that fears being held to account in the international arena for the global expansion of its military and its possible commission of war crimes. To be fair, the ICC has its critics as well, who contest both its legitimacy and its efficacy. Subjects of complaint include its perceived preoccupation with African criminals, its slow pace of prosecutions and questions about how and when the international community should protect citizens of a sovereign state against atrocities. But the U.S. refusal to sign the Rome Statute, which established the ICC, undermines the principle that each and every country must be accountable to certain universal standards if they are to be rendered meaningful. American exceptionalism U.S. intransigence is often cloaked behind lofty conception of American exceptionalism — the idea that the U.S. embodies the standards of liberty and democracy to which other countries should aspire. Claiming to stand at the apex of democracy and human rights, global rights framework. the U.S. exempts itself from surrendering its sovereignty to any Resistance to the adoption of international norms is not monolithic within the country, however. In a sign of retreat from these principles at a local level, some states and municipalities are embracing international human rights standards. The “Bringing Human Rights Home” report by the Human Rights Institute at Columbia School of Law evinces the willingness of some local governments to incorporate universal human rights standards, including economic and social rights that the U.S. has so far declined to validate. In 2012 former U.S. President Jimmy Carter urged the U.S. to reclaim its moral high ground, lamenting that “America’s violation of international human rights abets our enemies and alienates our friends.” Upholding universal, inalienable and enforceable human rights standards in a pluralistic and increasingly entangled world is no easy task. But the domestic and international human rights movements are driven by the urgent goal of protecting the dignity of all human beings — including those at the margins who are powerless, poor, invisible and persecuted. The U.S. would have more credibility in promoting those principles if it reflected on its own transgressions. Naming and shaming by international actors is an essential tool for advancing human rights. But it assumes both the moral authority to sit in judgment and the humility to be self-critical. International law fails Hiken 12, "The Impotence of International Law", Associate Director Institute for Public Accuracy, Luke, 7-17, http://www.fpif.org/blog/the_impotence_of_international_law Whenever a lawyer or historian describes how a particular action “violates international law” many people stop listening or reading further. It is a bit alienating to hear the words “this action constitutes a violation of international law” time and time again – and especially at the end of a debate when a speaker has no other arguments available. The statement is inevitably followed by: “…and it is a war crime and it denies people their human rights.” A plethora of international law violations are perpetrated by every major power in the world each day, and thus, the empty invocation of international law does nothing but reinforce our own sense of impotence and helplessness in the face of international lawlessness. The United States, alone, and on a daily basis violates every principle of international law ever envisioned: unprovoked wars of aggression; unmanned drone attacks; tortures and renditions; assassinations of our alleged “enemies”; sales of nuclear weapons; destabilization of unfriendly governments; creating the largest prison population in the world – the list is virtually endless. Obviously one would wish that there existed a body of international law that could put an end to these abuses, but such laws exist in theory, not in practice. Each time a legal scholar points out the particular treaties being ignored by the superpowers (and everyone else) the only appropriate response is “so what!” or “they always say that.” If there is no enforcement mechanism to prevent the violations, and no military force with the power to intervene on behalf of those victimized by the violations, what possible good does it do to invoke principles of “truth and justice” that border on fantasy? The assumption is that by invoking human rights principles, legal scholars ho pe to reinforce the importance of, and need for, such a body of law. Yet, in reality, the invocation means nothing at the present time, and goes nowhere. In the real world, it would be nice to focus on suggestions that are enforceable, and have some potential to prevent the atrocities taking place around the globe. Scholars who invoke international law principles would do well to add to their analysis, some form of action or conduct at the present time that might prevent such violations from happening. Alternatively, praying for rain sounds as effective and rational as citing international legal principles to a lawless president, and his ruthless military. Gridlock dooms effectiveness Goldin 13 – Ian, Director of the University of Oxford’s Oxford Martin School world-leading centre of pioneering research, debate and policy for a sustainable and inclusive future (Divided Nations, Oxford University Press, 2013, google books) The 20th century was characterized by at least four terrible global tragedies. Two brutal world wars, a global pandemic, and a worldwide depression affected almost everyone on the planet. In response to these and other crises the United Nations (UN), Bretton Woods (the World Bank and I nternational M onetary F und), and other international institutions were created which aimed to ensure that humanity never faced crises on the same scale again. These institutions have enjoyed some success. After all, we are yet to witness another global conflict despite decades of Cold War tension between competing superpowers. Until 2008, modern-day recessions had not come close to the deep worldwide contraction created by the Great Depression, for which the International Monetary Fund (IMF) and World Bank can claim some credit. The World Health Organization (WHO) and other agencies may also take pride in having overcome polio, smallpox, and a number of other devastating communicable diseases and preventing a significant global pandemic despite increasing connectivity and population density. The future, however, will be unlike the past. We face a new set of challenges. The biggest of these is that our capacity to manage global issues has not kept pace with the growth in their complexity and danger. Global institutions which may have had some success in the 20th century are now unfit for purpose. The repurposing of global governance to meet the new challenges is a vital and massive undertaking. Responsibility for this revolution lies not just with the global governance organizations themselves, or indeed with national governments. Nations are divided and cannot agree a common approach, and within the leading nations there is no consensus or leadership on critical global issues. The continued failure to resolve the financial crisis which started in 2007, the impasse in climate and environment negotiations at the Rio+20 conference in 2012 and the Durban conference in 2011, as well as the stymied 'development round’ of trade negotiations initiated in Doha in 2001 should be a wake-up call to us all. Global governance is at a crossroads and appears incapable of overcoming the current gridlock in the most significant global negotiations. The number of countries involved in negotiations (close to 200 now) and the complexity of the issues and their interconnectedness have grown rapidly, as has the effect ofinstant media and other pressures on politicians. These and other factors have paralysed progress, so the prospect of resolving critical global challenges appears ever more distant. We have reached a fork in the road. New solutions must be found. Resolving questions of global governance urgently requires an invigorated national and global debate. This necessitates the involvement of ordinary citizens everywhere. For without the engagement and support of us all, reform efforts are bound to fail. Structural changes in the world have led to fundamental shifts in the nature of the challenges and their potential for resolution. In this book I select five key challenges for this century—climate change, cybersecurity, pandemics, migration, and finance—to illustrate the need for fundamental reform ofglobal governance. I am not suggesting that these issues are completely new. It is the radical change in the nature of these challenges and the complexity and potential severity of their impact that defines them as 21st-century challenges. The UN, WHO, IMF, World Trade Organization (WTO), and other institutions charged with global governance have undertaken reform at a painfully slow pace. The growing disconnect between the need for urgent collective decision making to meet 21st-century challenges and the evolutionary progress in institutional capability has led to a yawning governance gap. Cooperation overwhelmingly fails Krisch 14, The Decay of Consent: International Law in an Age of Global Public Goods Nico Krisch ICREA Research Professor Institut Barcelona d’Estudis Internacionals, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2335938 Interdependence. The trajectory of international law found in the present study is markedly different, and it reflects the fact that greater needs for cooperation – obvious in all three issue areas under analysis – are not always, or not even typically , satisfied by international law. It highlights Miles Kahler’s observation that legalization ‘is a complex and varied mosaic rather than a universal and irreversible trend’.229 But it also suggests that international law faces particular limitations when confronted with highly intractable public goods problems . In that it seems to confirm the views – of many economists and lawyers alike – that the classical international legal order, with its emphasis on consent, is ill-equipped to deal with such problems . Instead of being transformed towards nonconsensualism, as expected by many, international law is surrounded and sidelined by alternative regulatory structures minilateral, informal kind, and often with hierarchical elements. of a unilateral, 2NC Add-On Multiple barriers mean bioterror is extremely unlikely Schneidmiller, Global Security Newswire, 1-13-09 (Chris, “Experts Debate Threat of Nuclear, Biological Terrorism,” http://www.globalsecuritynewswire.org/gsn/nw_20090113_7105.php) Panel moderator Benjamin Friedman, a research fellow at the Cato Institute, said academic and governmental discussions of acts of nuclear or biological terrorism have tended to focus on "worst-case assumptions about terrorists' ability to use these weapons to kill us." There is need for consideration for what is probable rather than simply what is possible, he said. Friedman took issue with the finding late last year of an experts' report that an act of WMD terrorism would "more likely than not" occur in the next half decade unless the international community takes greater action. "I would say that the report, if you read it, actually offers no analysis to justify that claim, which seems to have been made to change policy by generating alarm in headlines." One panel speaker offered a partial rebuttal to Mueller's presentation. Jim Walsh, principal research scientist for the Security Studies Program at the Massachusetts Institute of Technology, said he agreed that nations would almost certainly not give a nuclear weapon to a nonstate group, that most terrorist organizations have no interest in seeking out the bomb, and that it would be difficult to build a weapon or use one that has been stolen. However, he disputed Mueller's assertion that nations can be trusted to secure their atomic weapons and materials. "I don't think the historical record shows that at all," Walsh said. Black-market networks such as the organization once operated by former top Pakistani nuclear scientist Abdul Qadeer Khan remain a problem and should not be assumed to be easily defeated by international intelligence services, Walsh said (see GSN, Jan. 13). It is also reasonable to worry about extremists gaining access to nuclear blueprints or poorly secured stocks of highly enriched uranium, he said. "I worry about al-Qaeda 4.0, kids in Europe who go to good schools 20 years from now. Or types of terrorists we don't even imagine," Walsh said. Greater consideration must be given to exactly how much risk is tolerable and what actions must be taken to reduce the threat, he added. "For all the alarmism, we haven't done that much about the problem," Walsh said. "We've done a lot in the name of nuclear terrorism, the attack on Iraq, these other things, but we have moved ever so modestly to lock down nuclear materials." Biological Terrorism Another two analysts offered a similar debate on the potential for terrorists to carry out an attack using Leitenberg, a senior research scholar at the Center for International and Security Studies at the University of Maryland, played down the threat in comparison to other health risks. Bioterrorism has killed five U.S. citizens in the 21st century -- the victims of the 2001 anthrax attacks, he said. Meanwhile, at least 400,000 deaths are linked each year to obesity in this country. The United States has authorized $57 billion in spending since the anthrax mailings for biological prevention and defense activities, Leitenberg said. Much of the money would have been better used to prepare for pandemic flu, he argued. "Mistaken threat assessments make mistaken policy and make mistaken allocation of financial resources," Leitenberg said. The number of states with offensive biological weapons programs appears to infectious disease material. Milton have stabilized at six beginning in the mid-1970s, despite subsequent intelligence estimates that once indicated an increasing number of efforts, Leitenberg said. Caveats in present analyses of There has been minimal proliferation of biological expertise or technology to nations of concern in recent decades, Leitenberg those states make it near-impossible to determine the extent to which their activities remain offensive in nature, he added. said. He identified roughly 12 Russian scientists who ended up in Iran and shipments of technology and pathogen strains to Iraq from France, Germany, the former Soviet Union and the United No evidence exists of state assistance to nonstate groups in this sector. Two prominent extremist organizations, al-Qaeda and Aum Shinrikyo in Japan, failed to produce pathogenic disease strains that could be used in an attack, according to Leitenberg. Terrorists would have to acquire the correct disease strain, handle it safely, correctly reproduce and store the material and then disperse it properly, Leitenberg said. He dismissed their ability to do so. "What we've found so far is that those people have been totally abysmally ignorant of how to read the technical, professional literature," Leitenberg said. "What's on the jihadi Web sites comes from American poisoners' handbooks sold here at gun shows. Which can't make anything States between 1980 and 1990. and what it would make is just garbage." Small Farms Federal illegality prevents corporate takeover Bienenstock 2013 – west coast editor of High Times (May 29, David, “GET RICH OR HIGH TRYING” http://www.vice.com/read/get-rich-or-high-trying-the-coming-age-of-corporatecannabis?Contentpage=-1) “ Capitalism is definitely going to change cannabis , because it's been completely in the shadows and totally unregulated,” Kris agrees, after I describe the story I've been working on. “At the same time, while I'm not idealistic enough to believe that legal cannabis will change the way that capitalism works and people behave, I do hope that within the cannabis industry, the way that things are rolling out will provide us with a buffer period to get it right. Obviously, if cannabis were made completely legal at the federal level and in every state all at once, the big alcohol and tobacco companies would swoop in and dominate the market by resorting to the same tactics they use in their core businesses, but that's not what's happening . Instead we're seeing cannabis legalized state-by-state, while remaining federally illegal , which keeps those kinds of players largely on the sidelines.” So call it a grey market. Or better yet call it a chance to nurture a new American industry from the green shoots up. One that breaks the Wall Street greed mold by embracing the higher ideals so many of us associate with getting high. Like cooperation, compassion, creativity, empathy, innovation, inclusion, tolerance and a feeling of interconnectedness that transcends the bottom line. The possibility of ecologically grown weed is irrelevant – producers decide against it Lewis 13 - senior lecturer in international history at Stanford (October 22, Martin W., “Unnecessary Environmental Destruction from Marijuana Cultivation in the United States ” http://geocurrents.info/place/north-america/northern-california/unnecessary-environmentaldestruction-marijuana-cultivation-united-states) Cannabis can be raised in an environmentally responsible manner, as it often is by individual growers. Healthy outdoor plants suffer little damage from insects and other invertebrates. Mammals seldom eat the leaves, and wood-rat gnawing causes only minor damage in most areas. The highest yields, moreover, are obtained by those who avoid chemicals in favor of compost, manure, and biochar (buried charcoal). The liberal use of biochar, moreover, can actually generate a negative carbon footprint, as it involves sequestering carbon in the soil. Biochar is also one of the best long-term agricultural investments imaginable; the tierra preta soils of the Amazon, made by indigenous peoples before 1500, have maintained their fertility for centuries in an environment otherwise characterized by impoverished soils that cannot retain nutrients. Given these advantages , why is organic cannabis cultivation in general, and the use of biochar more specifically, not more widespread ? One crucial issue, which holds for organic farming the world over, is the amount of labor required , which is considerable . But equally important is the lack of consumer demand . In the cannabis market, relatively few buyers consider environmental costs, focusing instead on quality and appearance. And even those who do care about ecological consequences are thwarted by the impossibility of certifying sustainable production. Perhaps carbonnegative biochar-produced cannabis could command a price premium in some markets, but consumers have no way to know if such methods were actually used. Corn proves. Hurst 09 (Blake, farmer in Missouri. The American, Journal of the American Enterprise Institute, 7/30, http://www.american.com/archive/2009/july/the-omnivore2019s-delusion-against-the-agriintellectuals) The most delicious irony is this: the parts of farming that are the most “industrial” are the most likely to be owned by the kind of family farmers that elicit such a positive response from the consumer. Corn farms are almost all owned and managed by small family farmers. But corn farmers salivate at the thought of one more biotech breakthrough, use vast amounts of energy to increase production, and raise large quantities of an indistinguishable commodity to sell to huge corporations that turn that corn into thousands of industrial products. Most livestock is produced by family farms, and even the poultry industry, with its contracts and vertical integration, relies on family farms to contract for the production of the birds. Despite the obvious change in scale over time, family farms, like ours, still meet around the kitchen table, send their kids to the same small schools, sit in the same church pew, and belong to the same civic organizations our parents and grandparents did. We may be industrial by some definition, but not our own. Reality is messier than it appears in the book my tormentor was reading, and farming more complicated than a simple morality play. New tech and adaption solve food shortages Michaels 11 Patrick Michaels is senior fellow in environmental studies at the CATO Institute. " Global Warming and Global Food Security," June 30, CATO, http://www.cato.org/publications/commentary/global-warming-global-food-security While doing my dissertation I learned a few things about world crops. Serial adoption of new technologies produces a nearly constant increase in yields. Greater fertilizer application, improved response to fertilizer, better tractor technology, better tillage practices, old-fashioned genetic selection, and new-fashioned genetic engineering all conspire to raise yields, year after year.¶ Weather and climate have something to do with yields, too. Seasonal rainfall can vary a lot from year-to-year. That's "weather." If dry years become dry decades (that's "climate") farmers will switch from corn to grain sorghum, or, where possible, wheat. Breeders and scientists will continue to develop more water-efficient plants and agricultural technologies, such as no-till production.¶ Adaptation even applies to the home garden. The tomato variety "heat wave" sets fruit at higher temperatures than traditional cultivars.¶ However, Gillis claims that "[t]he rapid growth in farm output that defined the late 20th century has slowed" because of global warming.¶ His own figures show this is wrong. The increasing trend in world crop yields from 1960 to 1980 is exactly the same as from 1980 to 2010. And per capita grain production is rising, not falling. They don’t come close to solving warming 1AC Author Cummins 10 Founder and Director of the Organic Consumers Association [Ronnie Cummins “Industrial Agriculture and Human Survival: The Road Beyond 10/10/10,” Organic Consumers Association, October 7, 2010, http://www.organicconsumers.org/articles/article_21747.cfm The currently catastrophic, but largely unrecognized, GHG damage from GMO crops and industrial food production and distribution must be reversed. This will involve wholesale changes in farming practices, government subsidies, food processing and handling. In the U.S. it will require the conversion of a million chemical farms and ranches to organic production. It will require the establishment of millions of urban backyard and community gardens, and the restoration of prairielands, forests, and wetlands. If consumer rebellion and grassroots mobilization cannot force U.S. factory farmers to change the way they farm, process, and ship their products it will be catastrophic U.S. greenhouse gas emissions and climate change . almost impossible to deal with Developing countries, lax regulation, and profit maximization means warming is inevitable Porter 2013 - writes the Economic Scene column for the Wednesday Business section (March 19, Eduardo, “A Model for Reducing Emissions” http://www.nytimes.com/2013/03/20/business/usexample-offers-hope-for-cutting-carbon-emissions.html?_r=1&) Even if every American coal-fired power plant were to close , that would not make up for the coalbased generators being built in developing countries like India and China. “Since 2000, the growth in coal has been 10 times that of renewables,” said Daniel Yergin, chairman of IHS Cambridge Energy Research Associates.¶ Fatih Birol, chief economist of the International Energy Agency in Paris, points out that if civilization is to avoid catastrophic climate change, only about one third of the 3,000 gigatons of CO2 contained in the world’s known reserves of oil, gas and coal can be released into the atmosphere.¶ But the world economy does not work as if this were the case — not governments, nor businesses, nor consumers.¶ “In all my experience as an oil company manager, not a single oil company took into the picture the problem of CO2,” said Leonardo Maugeri, an energy expert at Harvard who until 2010 was head of strategy and development for Italy’s state-owned oil company, Eni. “They are all totally devoted to replacing the reserves they consume every year.” Treaties The conventions have sovereignty and federalism exceptions Sullum 14 [03/05/14, Jacob Sullum, “Does Marijuana Legalization Violate International Law?”, http://reason.com/archives/2014/03/05/is-marijuana-legalization-illegal] In other words, our government is required to impose marijuana prohibition on recalcitrant states, regardless of what the Constitution says. Can that be true? Only if you believe that international treaties can give Congress authority that was not granted by the Constitution, which would obliterate the doctrine of enumerated powers and the state autonomy that depends on it. Even if treaties could override federalism, the agreements that the INCB cites do not purport to do so . The 1961 Single Convention on Narcotic Drugs says compliance is subject to "constitutional limitations" and undertaken with "due regard to [signatories'] constitutional, legal and administrative systems." The 1971 Convention on Psychotropic Substances and the 1988 Convention Against Illicit Traffic in Narcotic Drugs and Psychotropic Substances contain similar provisions. In light of such language, how can the INCB insist that "internal legislation" and "federal structures" have no bearing on a country's obligations under these treaties? " The INCB is just flat-out wrong in making such a claim," Richard Elliott, executive director of the Canadian HIV/AIDS Legal Network. "The says INCB's claim that its narrow, restrictive interpretations of the conventions override domestic constitutional law cannot stand in light of the actual wording of the conventions. " The INCB cites Article 27 of the Vienna Convention on the Law of Treaties, which says "a party may not invoke the provisions of its internal law as justification for its failure to perform a treaty." It also mentions Article 29, which says "unless a different intention appears from the treaty or is otherwise established, a treaty is binding upon each party in respect of its entire territory." Yet "it’s a basic principle of statutory interpretation that a specific statute or command trumps a general one," notes Alex Kreit, a professor at Thomas Jefferson School of law who specializes in drug policy. In this case, the drug treaties make allowances for the constitutional principles that the INCB says are irrelevant. So is the U.S. government violating international law by letting Colorado and Washington do what they have every right to do? No , and that desperate claim is yet another sign that pot prohibitionists are panicking. The plan’s pick and choose approach violates “pacta sunt servanda” which is the most fundamental principle of international law Lopez 14 (German, “How much of the war on drugs is tied to international treaties?” http://www.vox.com/cards/war-on-drugs-marijuana-cocaine-heroin-meth/war-on-drugs-internationaltreaties) There is a lot of disagreement among drug policy experts, enforcers, and reformers about the stringency of the treaties. Several sections of the conventions allow countries some flexibility so they don't violate their own constitutional protections. The US, for example, has never enforced penalties on inciting illicit drug use on the basis that it would violate rights to freedom of speech. ¶ Many argue that move toward legalization of use, possession, and sales is in violation of international treaties. any Under this argument, Colorado, Washington, and Uruguay are technically in violation of the treaties because they legalized marijuana for personal possession and sales.¶ Others say that countries have a lot of flexibility due to the constitutional exemptions in the conventions. Countries could claim, for instance, that their protections for right to privacy and health allow them to legalize drugs despite the conventions. When it comes to individual states in the US, the federal government can also argue that America's federalist system allows states some flexibility as long as the federal government keeps drugs illegal.¶ "It's pretty clear that the war on drugs was waged for political reasons and some countries have used the treaties as an excuse to pursue draconian policies," said Kasia MalinowskaSempruch, director of the Open Society Global Drug Policy Program. "Nevertheless, we've seen a number of countries drop criminal penalties for minor possession of all drugs. We've seen others put drugs into a pharmaceutical model, including the prescription of heroin to people with serious addictions. This seems completely possible within the treaties."¶ Even if a country decided to dismantle prohibition and violate the treaties, it's unclear how the international community would respond. If the US, for example, ended prohibition, there's little other countries could do to interfere; there's no international drug court, and sanctions would be very unlikely for a country as powerful as America.¶ Still, Martin Jelsma, an international drug policy expert at the Transnational Institute, argued that ignoring or pulling out of the international drug conventions could seriously damage America's standing around the world . "Pacta sunt servanda ('agreements must be kept') is the most fundamental principle of international law and it would be very undermining if countries start to take an 'a-la-carte' approach to treaties they have signed; they cannot simply comply with some provisions and ignore others without losing the moral authority to ask other countries to oblige to other treaties," Jelsma wrote in an email. "So our preference is to acknowledge legal tensions with the treaties and try to resolve them."¶ To resolve such issues, many critics of the war on drugs hope to reform international drug laws in 2016 during the next General Assembly Special Session on drugs.¶ "There is tension with the tax-and-regulate approach to marijuana in some jurisdictions," Malinowska-Sempruch said. "But it's all part of a process and that's why we hope the UN debate in 2016 is as open as possible, so that we can settle some of these questions and, if necessary, modernize the system." That starts a cycle of treaty violations that wrecks the whole system Harold Hongju Koh 3, Gerard C. and Bernice Latrobe Smith Professor of International Law, Yale Law School, May 2003, “FOREWORD: On American Exceptionalism,” Stanford Law Review, 55 Stan. L. Rev. 1479 Similarly, the oxymoronic concept of "imposed democracy" authorizes top-down regime change in the name of democracy. Yet the United States has always argued that genuine democracy must flow from the will of the people, not from military occupation. n67 Finally, a policy of strategic unilateralism seems unsustainable in an interdependent world. For over the past two centuries, the United States has become party not just to a few treaties, but to a global network of closely interconnected treaties enmeshed in multiple frameworks of international institutions. Unilateral administration decisions to break or bend one treaty commitment thus rarely end the matter, but more usually trigger vicious cycles of treaty violation . In an interdependent world, [*1501] the United States simply cannot afford to ignore its treaty obligations while at the same time expecting its treaty partners to help it solve the myriad global problems that extend far beyond any one nation's control: the global AIDS and SARS crises, climate change , international debt, drug smuggling, trade imbalances , currency coordination, and trafficking in human beings, to name just a few. Repeated incidents of American treaty-breaking create the damaging impression of a United States contemptuous of both its treaty obligations and treaty partners. That impression undermines American soft power at the exact moment that the United States is trying to use that soft power to mobilize those same partners to help it solve problems it simply cannot solve alone: most obviously, the war against global terrorism , but also the postwar construction of Iraq, the Middle East crisis, or the renewed nuclear militarization of North Korea. It’s super slow Ottawa 7 “Time to get on with the job” Ottawa Citizen- Most popular groundbreaking news for Canada, July 16, 2007 Monday, lexis The secretary general of the United Nations meets tomorrow with the president of the United States to discuss some of the most urgent problems facing humanity. It has been six months since Mr. Ban took office. He seems to enjoy his reputation as a cautious bureaucrat. He took his time filling key positions, and most of his statements have been uncontroversial. His name shows up in the third paragraphs of news stories, rather than in the headlines. The UN, though, has not receded from the world stage during Mr. Ban's first months. The newly reconstituted Human Rights Council took its first faltering steps and met with deserved criticism for failing to speak out about blatant abuses. UN agencies have steered the debate on drugs in Afghanistan and climate change. There are more UN peacekeeping personnel in the field than ever. On Darfur -- an immediate threat to security and development that the UN could help solve -- Mr. Ban's quiet diplomacy has been overshadowed by U.S. President George W. Bush's much stronger leadership. At one point, Mr. Ban suggested he needed more time ; time is a luxury the displaced and dying do not have. The issue of UN reform was close to Kofi Annan's heart and seems equally dear to his successor. It's been slow going on that front, too, although it's not Mr. Ban's fault that getting any change through the U nited N ations system is like walking through molasses. Gridlock makes cooperation impossible Hale et al 13 [05/24/13, Thomas Hale is a Postdoctoral Research Fellow at the Blavatnik School of Government, Oxford University. David Held is master of University College, Durham University, professor of politics and international relations there and general editor of Global Policy. Kevin Young is Assistant Professor in the Department of Political Science at the University of Massachusetts Amherst, “Gridlock: the growing breakdown of global cooperation” https://www.opendemocracy.net/thomashale-david-held-kevin-young/gridlock-growing-breakdown-of-global-cooperation] Global cooperation is gridlocked across a range of issue areas . The reasons for this are not the result of any single underlying causal structure , but rather of several underlying dynamics that work together. previous phases of global cooperation have been incredibly successful, producing unintended consequences that have Global cooperation today is failing not simply because it is very difficult to solve many global problems – indeed it is – but because overwhelmed the problem-solving capacities of the very institutions that created them . It is hard to see how this situation can be unravelled, given failures of contemporary global leadership , the weaknesses of NGOs in converting popular campaigns into institutional change and reform, and the domestic political landscapes of the most powerful countries . A golden era of governed globalization In order to understand why gridlock has come about it is important to understand how it was that the post-Second World War era facilitated, in many respects, a successful form of ‘governed globalization’ that contributed to relative peace and prosperity across the world over several decades. This period was marked by peace between the great powers, although there were many proxy wars fought out in the global South. This relative stability created the conditions for what now can be regarded as an unprecedented period of prosperity that characterized the 1950s onward. Although it is by no means the sole cause, the UN is central to this story, helping to create conditions under which decolonization and successive waves of democratization could take root, profoundly altering world politics. While the economic record of the postwar years varies by country, many experienced significant economic growth and living standards rose rapidly across significant parts of the world. By the late 1980s a variety of East Asian countries were beginning to grow at an unprecedented speed, and by the late 1990s countries such as China, India and Brazil had gained significant economic momentum, a process that continues to this day. Meanwhile, the institutionalization of international cooperation proceeded at an equally impressive pace. In in 2011, the number of institutions and their various off-shoots had grown to 7608 (Union of International Associations 2011). There was substantial growth in the number of international treaties in force, as well as the number of international regimes, formal and informal. At the same time, new kinds of institutional arrangements have emerged alongside formal intergovernmental bodies, including a variety of types of transnational governance arrangements 1909, 37 intergovernmental organizations existed; such as networks of government officials, public-private partnerships, as well as exclusively private/corporate bodies. Postwar institutions created the conditions under which a multitude of actors could benefit from forming multinational companies, investing abroad, developing global production chains, and engaging with a plethora of other social and economic processes These conditions, combined with the expansionary logic of capitalism and basic technological innovation, changed the nature of the world economy, radically increasing dependence on people and countries from every corner of the world. This interdependence, in turn, created demand for further institutionalization, which states seeking the benefits of cooperation provided, beginning the cycle anew. This is not associated with globalization. to say that international institutions were the only cause of the dynamic form of globalization experienced over the last few decades. Changes in the nature of global capitalism, including breakthroughs in transportation and information technology, are obviously critical drivers of interdependence. However, all of these changes were allowed to thrive and develop because they took place in a relatively open, peaceful, liberal, institutionalized world order. By preventing World War Three and another Great Depression, the multilateral order arguably did just as much for interdependence as microprocessors or email (see Mueller 1990; O’Neal and Russett 1997). Beyond the special privileges of the great powers Self-reinforcing interdependence has now progressed to the point where it has altered our ability to engage in further global cooperation. That is, economic and political shifts in large part attributable to the successes of the post-war multilateral order are now amongst the factors grinding that system into gridlock . Because of the remarkable success of global cooperation in the postwar order, human interconnectedness weighs much more heavily on politics than it did in 1945. The need for international cooperation has never been higher. Yet the “supply” side of the equation, institutionalized multilateral cooperation, has stalled . In areas such as nuclear proliferation, the explosion of small arms sales, terrorism, failed states, global economic imbalances, financial market instability, global poverty and inequality, biodiversity losses, water deficits and climate change, multilateral and transnational cooperation is now increasingly ineffective or threadbare. Gridlock is not unique to one issue domain, but appears to be becoming a general feature of global governance: cooperation seems to be increasingly difficult and deficient at precisely the time when it is needed most. It is possible to identify four reasons for this blockage, four pathways to gridlock: rising multipolarity, institutional inertia, harder problems, and institutional fragmentation. Each pathway can be thought of as a growing trend that embodies a specific mix of causal mechanisms. Each of these are explained briefly below. Growing multipolarity. The absolute number of states has increased by 300 percent in the last 70 years, meaning that the most basic transaction costs of global governance have grown . More importantly, the number of states that “matter” on a given issue—that is, the states without whose cooperation a global problem cannot be adequately addressed—has expanded by similar proportions. At Bretton Woods in 1945, the rules of the world economy could essentially be written by the United States with some consultation with the UK and other European allies. In the aftermath of the 2008-2009 crisis, the G-20 has become the principal forum for global economic management, not because the established powers desired to be more inclusive, but because they could not solve the problem on their own. However, a consequence of this progress is now that many more countries, representing a diverse range of interests, must agree in order for global cooperation to occur . Institutional inertia. The postwar order succeeded, in part, because it incentivized great power involvement in key institutions. From the UN Security Council, to the Bretton Woods institutions, to the Non-Proliferation Treaty, key pillars of the global order explicitly grant special privileges to the countries that were wealthy and powerful at the time of their creation. This hierarchy was necessary to secure the participation of the most important countries in global governance. Today, South, the gain from this trade-off has shrunk while the costs have grown. As power shifts from West to East, North to a broader range of participation is needed on nearly all global issues if they are to be dealt with effectively. At the same time, following decolonization, the end of the Cold War and economic development, the idea that some countries should hold more rights and privileges than others is increasingly (and rightly) regarded as morally bankrupt. And yet, the architects of the postwar order did not, in most cases, design institutions that would organically adjust to fluctuations in national power. Harder problems. As independence has deepened, the types and scope of problems around which countries must cooperate has evolved. Problems are both now more extensive, implicating a broader range of countries and individuals within countries, and intensive, penetrating deep into the domestic policy space and daily life. Consider the example of trade. For much of the postwar era, trade negotiations focused on reducing tariff levels on manufactured products traded between industrialized countries. Now, however, negotiating a trade agreement requires also discussing a host of social, environmental, and cultural subjects - GMOs, intellectual property, health and environmental standards, biodiversity, labour standards—about which countries often disagree sharply. In the area of environmental change a similar set of considerations applies. To clean up industrial smog or address ozone depletion required fairly discrete actions from a small number of top polluters. By contrast, the threat of climate change and the efforts to mitigate it involve nearly all countries of the globe. Yet, the divergence of voice and interest within both the developed and developing worlds, along with the sheer complexity of the incentives needed to achieve a low carbon economy, have made a global deal, thus far, impossible (Falkner et al. 2011; Victor 2011). Fragmentation. The institution-builders of the 1940s began with, essentially, a blank slate. But efforts to cooperate internationally today occur in a dense institutional The exponential rise in both multilateral and transnational organizations has created a more complex multilevel and multi-actor system of global governance. Within this dense web of institutions mandates can conflict, interventions are frequently uncoordinated, and all too typically scarce resources are ecosystem shaped by path dependency. subject to intense competition . In this context, the proliferation of institutions tends to lead to dysfunctional fragmentation, reducing the ability of multilateral institutions to provide public goods . When funding and political will are scarce, countries need focal points to guide policy (Keohane and Martin 1995), which can help define the nature and form of cooperation. Yet, when international regimes overlap, these positive effects are weakened. Fragmented institutions, in turn, disaggregate resources and political will, while increasing transaction costs. Bias towards inaction means it can’t solve global public goods Krisch 14, The Decay of Consent: International Law in an Age of Global Public Goods Nico Krisch ICREA Research Professor Institut Barcelona d’Estudis Internacionals, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2335938 Public Goods and International Law International law in its classical form appears as particularly illsuited to tackling this challenge; its consent-based structure imposes high hurdles and thus creates a structural bias against effective action on global public goods , especially in light of the large number of sovereign states today. Increasingly, commentators have thus urged an overhaul of the international legal order in favour of a more effective problem-solving mechanism, able to counter problems of freeriding in similar ways as domestic government does. As influential economist, William Nordhaus, has noted, ‘the Westphalian system leads to severe problems for global public goods . The requirement for unanimity is in reality a recipe for inaction . … To the extent that global public goods may become more important in the decades ahead, one of our major challenges is to devise mechanisms that overcome the bias toward the status quo and the voluntary nature of current international law in lifethreatening issues.’ 12 1NR Politics Likelihood, usability and scale outweigh Connolly, 14—Jennifer, Assistant Professor of Political Science at University of Miami, PhD in Public Policy @ USC, along with Pew Center authors Lee Rainie and Janna Anderson. “Cyber Attacks Likely to Increase,” Pew Research Center – Internet, Science and Technology, 10-29, http://www.pewinternet.org/2014/10/29/cyber-attacks-likely-to-increase/ --BR Geoff Livingston, author and president of Tenacity5 Media, responded, “ Cyberwar is the battlefield of now . Don’t kid yourself. Battlefields in Sudan, Afghanistan, and Syria are real, but there is a new battlefield and every day wars are won and lost between individuals, businesses, and countries. The Pentagon and China’s military are regularly engaged in digital spats. We really have no idea how deep this goes, but we are much closer to William Gibson’s vision in the seminal cyberpunk novel Neuromancer than any of us would like to admit.” Herb Lin, chief scientist for the Computer Science and Telecommunications Board at the National Research Council of the US National Academies of Science, replied, “More likely is cyber sabotage of individual enterprises. On a large scale, cyber attacks may be combined with kinetic attacks and the combination may cause large-scale damage .” Christian Huitema, a distinguished engineer with Microsoft, observed, “We are already witnessing the theft of trade secrets, with impact well worth tens of billions of dollars. We are also seeing active development of cyber weapons by many world powers. Historically, such new weapons are always used at least once or twice before nations realize it is too dangerous and start relying on diplomacy.” Stewart Baker, a partner at Steptoe & Johnson, a Washington law firm, wrote, “Cyberwar just plain makes sense. Attacking the power grid or other industrial control systems is asymmetrical and deniable and devilishly effective. Plus, it gets easier every year . We used to worry about Russia and China taking down our infrastructure. Now we have to worry about Iran and Syria and North Korea. Next up: Hezbollah and Anonymous.” Obama’s quick push, bully pulpit, and bartering are vital to intel-sharing Bennett, 1-20—Cory, “President makes unprecedented cybersecurity pitch,” The Hill, http://thehill.com/policy/cybersecurity/230157-obama-makes-unprecedented-cyber-pitch --BR President Obama made an historic push for cybersecurity action during his State of the Union address Tuesday night. “If we don’t act, we’ll leave our nation and our economy vulnerable,” Obama said. “If we do, we can continue to protect the technologies that have unleashed untold opportunities for people around the globe.” Although the president previously called for cybersecurity legislation during his annual address in 2013, Tuesday night’s plea easily surpassed any previous cyber mention in specificity , breadth and urgency . "No doubt about it," Rep. Elijah Cummings (D-Md.), ranking member of the House Oversight and Government Reform Committee, told The Hill in an interview. "He made the case for a bipartisan, strong effort to address cybersecurity." It was the third issue Obama mentioned while discussing national security during the speech. The president also hit nearly every aspect of the new White House cyber agenda, which was rolled out last week. “No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids," Obama said to a bipartisan standing ovation. The administration’s legislative cyber proposals include measures intended to facilitate cyber threat information-sharing between the public and private sectors; to protect student data; to raise the punishments for cyber crime; and to create a federal breach notification standard and nationwide cyber defense standards. The agenda was unveiled strategically to take advantage of the bump in cybersecurity awareness following the destructive cyberattack on Sony Pictures. Hackers allegedly backed by North Korea wiped the film studio’s computers, released internal documents and emails and made violent threats that almost caused the cancellation of a big-budget comedy release. The incident led to a full-scale government investigation and the unprecedented blaming of a foreign regime for a destructive cyberattack on U.S. soil. “We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism,” Obama said. The security industry and privacy advocates alike appreciated the president using one of the country's biggest bully pulpits to promote national awareness of cybersecurity, even if they quibble with the administration’s policy specifics. Roughly 33 million viewers watch the State of the Union each year, although viewership has been declining. “It’s every American’s job to get involved” on cybersecurity, said Tony Cole, the global government chief technical officer at cybersecurity firm FireEye. For lawmakers who have spent years struggling to convince colleagues of the colossal dangers of weak cybersecurity, the president’s remarks were quite welcome, if not a bit late. “I welcome him to the conversation,” said Rep. Michael McCaul (RTexas), chairman of the House Homeland Security Committee. “Confronting the cyber threat has been a priority of mine for the past 10 years.” Attention now turns to those same lawmakers, as the White House looks for allies to introduce its legislative offerings. “Tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children’s information,” Obama said. "That should be a bipartisan effort," he added, going off script briefly. Sen. Bill Nelson (D-Fla.), the ranking member on the Senate Commerce Committee, has already said he will introduce a data breach notification bill that closely resembles the White House proposal. It would require companies to notify consumers within 30 days that their information had been breached. Companies would also have to notify the government of certain breaches and adhere to cybersecurity standards set by the Federal Trade Commission. Rep. Jim Langevin (D-R.I.), co-chair of the Congressional Cybersecurity Caucus, said after the speech that he will soon introduce a House version of the president's data breach proposal. "I am particularly excited to see cybersecurity come center stage in the State of the Union and in the public dialogue," he added. Obama on Tuesday only mentioned the initiative in passing, with his reference to legislation to combat “identity theft.” The most contentious issue will be Obama’s proposal to enhance cybersecurity information-sharing between the government and private sector. The offering would provide limited liability protections for companies sharing cyber threat indicators with the Department of Homeland Security. The measure has been at the top of industry group’s cyber wish list for years. But cybersecurity firms caution that a rushed, non-specific bill could prove ineffective. “How are you going to implement limited liability?” Cole wondered. “What does that mean?” Privacy advocates worry those same vagueries could give the government another way to collect personal information on U.S. citizens. They’ve pushed for National Security Agency (NSA) reform to come before any cyber information sharing bill. Obama insisted he would not let NSA reform fall to the wayside. “While some have moved on from the debates over our surveillance programs, I haven’t,” he said. “As promised, our intelligence agencies have worked hard, with the recommendations of privacy advocates, to increase transparency and build more safeguards against potential abuse.” Privacy advocates remained wary after hearing Obama's remarks. "It's heartening that President Obama's address focused on Americans' privacy, but the only way to fulfill that promise is to pass surveillance reform before taking up cyber [info sharing] legislation," said Robyn Greene, policy counsel for the Open Technology Institute. The congressional calculus on the cyber threat sharing issue is also quite complex. Different committees have pushed their own sharing proposals, creating intra-party squabbles and jurisdictional turf wars. Key Democrats on cyber issues have also broken with the White House on their own cyber threat sharing bills. Rep. Dutch Ruppersberger (D-Md.) recently reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA), which would enable sharing between the private sector and the NSA, not the DHS. Senate Intelligence Committee ranking member Dianne Feinstein (D-Calif.) was also a big proponent of a Senate version of CISPA last Congress. The two recently installed chairmen on the Senate Intelligence Committee and Senate Homeland Security and Governmental Affairs Committee will play a big role in setting the legislative agenda. Both Intelligence Chairman Richard Burr (R-N.C.) and Homeland Security Chairman Ron Johnson (R-Wis.) have indicated they’re willing to work with the White House on a joint cyber proposal. In the Republican response to Obama's speech, Sen. Joni Ernst (R-Iowa) made only passing reference to the issue. “We’ll advance solutions to prevent the kind of cyberattacks we’ve seen recently," she said. Cummings told The Hill that Congress doesn't "have the right not to get something done on this." “In fact, I would consider it political malpractice not to do something," he added. The White House has insisted it will barter with a wide range of lawmakers in both parties to achieve its cyber goals. Obama reiterated Tuesday that the administration can’t go it alone on cyber. "We’re looking beyond the issues that have consumed us in the past to shape the coming century," he said. Obama’s push and prioritization is key to consensus-building Kelly, 1-25—Erin, USA Today, “Obama, Congress may find cybersecurity consensus,” http://www.usatoday.com/story/news/politics/2015/01/25/cybersecurity-information-sharingbill/22229049/ --BR President Obama and Congress appear to have found a rare area of potential agreement: cybersecurity. In his State of the Union speech, Obama called on lawmakers to pass legislation to encourage businesses to share cyber-threat information with the federal government. The idea is to alert the Department of Homeland Security quickly when private companies are hacked so federal law enforcement officials can help stop cyber criminals from striking again. Congress tried to pass information-sharing bills in the last Congress, but the bills stalled in the Senate. Now key committee leaders in the House and Senate say they plan to introduce updated legislation soon. "The president's proposal is an important first step in developing that legislation," said Sen. Ron Johnson, R-Wis., the new chairman of the Senate Homeland Security and Governmental Affairs Committee. Johnson has scheduled a hearing Wednesday on the importance of information-sharing in protecting Americans from cyberattacks. The White House and lawmakers from both parties are feeling pressure to act in the wake of the high-profile hack attacks against Sony Pictures, Target, Home Depot, and JPMorgan Chase, said Darrell West, director of the Center for Technology Innovation at the Brookings Institution. "Cybsecurity is not a Republican or Democratic problem," he said. "It's a serious problem that both parties have the same self-interest to solve before something really devastating happens like an attack against our electric grid." That doesn't mean that there are no conflicts between the White House and Congress on the issue. House Republican leaders are still angry that the president threatened to veto an information-sharing bill they passed in the last Congress. Obama said the bill did not do enough to protect the privacy of Americans' personal data in the information-sharing process. Privacy is likely to be an issue again. The president's proposal would give businesses protection from lawsuits for sharing their data with the Department of Homeland Security and other businesses to try to thwart hackers. To gain that protection, companies would be required to remove "unnecessary personal information" and take other measures to protect any personal information that must be shared. Business leaders say it would be difficult for small companies to remove personal data from their systems while trying to quickly share information about cyberattacks with federal officials. Civil liberties groups say they fear any information-sharing bill will end up handing Americans' personal data over to the government to use in law enforcement investigations that have nothing to do with hack attacks. "We don't think any bill is necessary," said Gabe Rottman, legislative counsel for the American Civil Liberties Union. "The high-profile hacks we're hearing about tend to be cases where the companies need to more careful in defending their own systems. An informationsharing bill would not have stopped any of those hacks." But business groups say that sharing information quickly could stop a hacker from going after other companies. They are hopeful that Obama's support for a bill will help speed passage of legislation this year. "We think it's very important that the administration wants to get engaged and wants a seat at the table to discuss the bill with lawmakers and the private sector," said Matt Eggers, who handles cybersecurity issues at the U.S. Chamber of Commerce. "It's good that the administration has made the cybersecurity informationsharing bill a priority . Once the Senate and House pass the bill and send it to the president's desk, we would expect that he would sign it. Cybersecurity’s the lone area of compromise—deal coming now Swarts, 2-2—Phil, Washington Times, “Obama budget dedicates $14B to cybersecurity,” http://www.washingtontimes.com/news/2015/feb/2/obama-budget-dedicates-14b-to-cybersecurity/ -BR The Obama administration aims to ramp up the federal government’s cybersecurity arsenal, requesting nearly $14 billion in its 2016 budget proposal — about $1 billion more than in previous budgets — to combat what many have come to view as an increasingly significant weakness in American security and infrastructure. The increased funding comes after a series of high profile attacks, which has drawn national attention to the issue, including a massive breach at Sony Pictures which the government said was carried out by North Korea. Likewise in January, the Twitter and YouTube accounts for the U.S. military’s CENTCOM — which oversees operations in Iraq and Afghanistan — was hacked by supporters of the Islamic State, a terrorist group often known by the acronyms ISIS or ISIL. “Cyber threats targeting the private sector, critical infrastructure and the federal government demonstrate that no sector, network or system is immune to infiltration by those seeking to steal commercial or government secrets,” the White House said in a statement. Though the president’s budget proposal was met with widespread criticism by GOP lawmakers on Capitol Hill Monday, cybersecurity is likely going to be one area where both parties find common ground. Much of the requested money will be split across major government agencies that focus on cybersecurity, including the Departments of Homeland Security, Justice and Defense. Cyber info-sharing has momentum now—vital to prevent catastrophic attacks Thune, 2-4—John, (R-S.D.) and Chairman of the Commerce, Science and Transportation Committee, the group tasked with drafting a bill on cybersecurity, “Building a More Secure Cyber Future: Examining Private Sector Experience with the NIST Framework,” http://www.commerce.senate.gov/public/index.cfm?p=Hearings&ContentRecord_id=eb8d0d69-bf71-4052-9675-ad6d4c507782&Statement_id=fe307132-6121-458c-93b1ec139b22b6bc&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=b06c39af-e033-4cba-9221-de668ca1978a&MonthDisplay=2&YearDisplay=2015 –BR "Good morning and welcome. We are here today to examine the private sector’s experience working with the National Institute of Standards and Technology (NIST) to develop and utilize the “Framework for Improving Critical Infrastructure Cybersecurity,” and also to look forward to additional steps that can be taken to help improve our nation’s cybersecurity. "No country, company, or consumer is immune to cybersecurity threats. The United States (US) faces a growing array of threats from hackers, criminals, terrorists, and nation-states who seek to gain access to sensitive or classified information. This also includes efforts to steal intellectual property or consumers’ personal information, deny the availability of normally accessible online services, or potentially sabotage the networks and control systems of critical infrastructure. "While cyber threats are not new, we saw a number of notable cyber events last year. In 2014, security flaws such as Sandworm, Shellshock, POODLE, and Heartbleed compromised millions of servers and systems. Attacks on point of sale systems sent ripples through the retail industry, not to mention the significant cyber hack on Sony Pictures. "In 2014, after a decade without passage of major cybersecurity legislation, Congress passed five cybersecurity bills that were signed into law. I am especially pleased that our Committee’s work on the Cybersecurity Enhancement Act of 2014, which I worked on with former Chairman Rockefeller was one of those bills the President signed into law. "Our Committee’s bill ensures the continuation of a voluntary and industry-led process for identifying cybersecurity standards and best practices for critical infrastructure – codifying elements of the successful process that NIST undertook to create its Cybersecurity Framework, and ensuring NIST’s continued involvement in this public-private collaboration. "The law also included important provisions for research and development, workforce development, and increased public awareness. It will help to protect the public and private sectors against the growing number of cyber threats from around the world by, among other things, strengthening and directing better cooperation across Federal agencies in research and development, improving our test beds and cloud computing security, and authorizing the National Science Foundation’s successful Cybercorps scholarships. "I am proud to note that Dakota State University in my home state is a leading institution of higher education in the area of cybersecurity. I appreciate that Dr. Josh Pauli, an Associate Professor of Cyber Security at DSU, has provided written remarks discussing that work, and I will submit that as part of the record. "I called today’s hearing primarily to hear from stakeholders about their experience with the NIST Framework. Released almost one year ago, the Framework provides a common language regarding security issues to facilitate discussions within a company between the technical IT security managers and senior management. While the Framework targets organizations that own or operate critical infrastructure, businesses across all sectors may find use of the Framework beneficial. "The success of the Framework thus far is due in large part to NIST’s collaborative relationship and engagement with the private sector. As a non-regulatory agency dedicated to promoting U.S. innovation and industrial competiveness in ways that enhance economic security, NIST has been a genuine partner and has successfully combined its technical expertise in standards with the know-how of the private sector to help advance the nation’s technology infrastructure. "Congress is now tasked with important questions about what actions the federal government should take next, including: o How do we assess the effectiveness of the Framework going forward? o What incentives do businesses and consumers need to improve their cyber defenses? o What type of cyber threat information sharing legislation is needed to help industry defend against more sophisticated cyber attacks? o What should we do to better secure our supply chain? o And what more can be done in related areas? "These questions are relevant to both the private and public sectors. According to the U.S. Government Accountability Office, “Federal agencies have significant weaknesses in information security controls…” Last year, I along with Senator Rockefeller sent letters to every agency under our committee’s jurisdiction asking targeted questions about the measures being taken to protect systems using unsupported operating systems, as well as compliance with the Federal Information Security Management Act. As Chairman, I will be continuing to conduct such oversight of agencies’ information security management. "While I am pleased that Congress took a positive step to improving our cybersecurity posture by passing a number of bills in December, I believe an absolutely necessary missing piece for this Congress is finally passing legislation to spur greater cyber threat information sharing. It is my hope that the Senate can find a path forward in this area soon . The hearing being held today underscores the seriousness of the threat and our commitment to passing information sharing legislation that did not get done last Congress." Bipartisan support for info-sharing but Obama has to push to assuage privacy concerns The Hill, 2-4—“Defense nominee: US 'not where it should be' on cybersecurity,” http://thehill.com/policy/cybersecurity/231781-defense-nominee-us-not-where-it-should-be-on-cyber -BR The Defense Department's network security “is not where it should be,” said Ashton Carter, the nominee for Defense secretary, during his Wednesday nomination hearing. “We’re not anywhere near where we should be as a country,” Carter said before the Senate Armed Forces Committee. “Not only is our civilian infrastructure susceptible to cyberattack, but we have to be concerned about our military infrastructure.” While the Islamic State in Iraq and Syria (ISIS) and Russian aggression in Ukraine dominated much of Carter’s hearing, the Pentagon pick also fielded questions on cybersecurity. “A number of countries out there, including Russia, China, North Korea, probably many others, have very sophisticated means of attacking networks,” said Sen. Joni Ernst (R-Iowa). Russia and China are both widely suspected of ongoing cyber campaigns to steal U.S. military secrets. Moscow is believed to be behind a 2008 cyberattack on the DOD. The government also recently blamed North Korea for a massive cyberattack on Sony Pictures. “How do we best protect our equipment, protect our personnel moving forward?” Ernst asked. “There’s no point in having planes and ships and armored vehicles in today’s world if the network itself is vulnerable,” Carter responded. “I hope we can work together if I’m confirmed by this committee on improving our cyber defenses, many aspects of cyber.” While there is bipartisan agreement that the DOD must improve the nation’s cyber defenses, privacy advocates have pushed back on some of the tactics used by its agencies, including the National Security Agency (NSA). In 2013, government leaker Edward Snowden disclosed secret NSA spy programs that were bulk collecting data on people in the U.S. “Do you have an opinion on where the federal government should be in regards to protecting our national security interests versus the privacy of individuals out there that might be using the network?” Ernst asked. “The federal government does have a role in protecting the country from a cyberattack in the same way it has a role in protecting the country from other kinds of attacks,” Carter replied. “I think it can do a lot more to exercise that responsibility without causing concerns over invasions of people’s privacy.” Carter emphasized the need for the DOD and private sector to exchange more cyber threat information. “I think if people fully understood ... how vulnerable we are in cyberspace, they would want us to do more,” Carter said. “Not in a way that compromised anybody’s privacy, but they would want us to do a lot more than I believe we are doing now.” Lawmakers have been trying to pass legislation that would provide legal liability protections for companies sharing cybersecurity information with the government. But concerns that the NSA could access the data to gather personal information on Americans have stalled the efforts. The White House recently put support behind its own legislative proposal to encourage public-private cyber threat information-sharing. The offering attempts to assuage privacy advocates’ concerns by funneling all the data through the less controversial Department of Homeland Security (DHS), not the NSA. Expert consensus that deadly cyberattacks are inevitable—magnitude is exponential Estes, 14— Adam Clark, BA @ Harvard, formerly of The Atlantic, Senior Writer at Gizmodo, “Why Cybersecurity Threats Are About to Get Much, Much Worse,” Gizmodo, 10-30, http://gizmodo.com/cybersecurity-threats-are-about-to-get-much-much-worse-1652889589 --BR Let me state the obvious just to get it out of the way: our nation's cybersecurity sucks and everybody knows it. The president knows it. The Pentagon knows it. And, worst of all, the hackers know it, too. That's why I'm so alarmed by a new Pew Internet survey that says we'll likely get hit with a deadly cyberattack by 2025. I don't mean to sensationalize this news, but this is scary. Because it's probably true! Ultimately, 1,642 cybersecurity experts participated in the Pew survey, which included this question: By 2025, will a major cyber attack have caused widespread harm to a nation's security and capacity to defend itself and its people? (By "widespread harm," we mean significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars.) According to many of the experts, the answer is "yes." It's not really a yes or no question when you think about it, though, because it's difficult anticipate the extent of the damage such an attack would cause. However, the vast majority of the experts do think a big attack will happen, because the battlefield is about to get a lot bigger . Up until now, many people think that cyberattacks just amount to stolen credit card numbers or computer viruses or something. That's not really the case. While your Mastercard and MacBook are valuable things to protect, the technology that relies on the industrial internet are much more valuable. That includes things like high-speed trains, water treatment facilities, and nuclear power plants. The list goes on and on. The scary truth of all this is that the list is about to grow exponentially , as new internet-connected technology comes into play. The reality of the internet of things is that connecting more things to the internet means creating more vulnerabilities. "Current threats include economic transactions, power grid, and air traffic control," Mark Nall, a program manager for NASA, told Pew. "This will expand to include others such as self-driving cars, unmanned aerial vehicles, and building infrastructure." Well, damnit. We should've seen this coming sooner, but internet technology evolved terrifically quickly. As for NSA counsel Joel Brenner explained in a column last weekend, "The Internet was not built for security, yet we have made it the backbone of virtually all private-sector and government operations, as well as communications." The one comforting thing about this pretty frightening survey is the simple fact that a lot of very smart people are working improving cybersecurity. Even NASA's lending a hand! However, the notion of a catastrophic attack is especially scary because there doesn't seem to be anything that you or I could do about it. PC’s about what Obama pushes—he’s pushing cybersecurity at the top of the agenda World Bulletin, 1-25—“Obama seeks enhanced cybersecurity laws to fight hackers,” https://news.google.com/news/story?ncl=d18Wk7pdT12gzkMYIWiZcnt4xXomM&q=obama+cybersecuri ty&lr=English&hl=en&sa=X&ei=wovNVJioNJClyQTqxIKgBA&ved=0CCoQqgIwAw –BR President Barack Obama on Tuesday will announce a renewed push to beef up U.S. cybersecurity laws after recent headline-grabbing hacks against companies like Sony Pictures and Home Depot. Obama will throw his support behind efforts to give liability protection to companies that quickly share information about attacks, but will require strict protections for personal information, the White House said in a statement. Obama also will propose new powers for law enforcement to investigate and prosecute cybercrime. The White House will build momentum for the legislative move at a cybersecurity summit slated for Feb. 13, an event that will take place not at the White House, but in Silicon Valley, at Stanford University. Obama has elevated cybersecurity to the top of his 2015 agenda , seeing it as an area where cooperation is possible with the Republican-led Congress, and will send the legislation to Capitol Hill immediately . Top of the agenda and focus The Hill, 2-2—“White House cyber budget targets industry outreach,” http://thehill.com/policy/cybersecurity/231519-white-house-cyber-budget-targets-industry-outreach -BR The White House budget released Monday includes a number of cybersecurity investments intended to strengthen the government’s partnerships with the private sector. The public-private exchange of cybersecurity information has been a top priority for the administration of late, and that continued in its fiscal 2016 budget. In addition to the agency-by-agency cyber investments, the White House emphasized several cross-government programs to enhance government outreach to industry. The budget promotes the “enhancement of government information sharing capabilities with the private sector so that they can be more vigilant and better protect themselves against emerging threats,” the White House said. Specifically, Obama is pushing for $227 million to start construction on a Civilian Cyber Campus, which would bring together the Department of Homeland Security (DHS) and FBI’s cyber workforce. The new campus would “provide a secure and modern technical footing, and improve the ability to collaborate with private industry and external partners,” the White House said. The private sector has complained of the logistical difficulties of sharing cyber information with the government. Having DHS and FBI's cyber mission on the same grounds would "improve collaboration and efficiency," the White House said. The White House also wants another $149 million “to support ongoing proactive efforts to improve the cybersecurity posture of our private sector partners.” The focus is in line with a recent slate of cyber policy proposals the White House revealed in January. The centerpiece of the initiative is a legislative offering that would give legal liability protections for private companies sharing cyber threat information with the DHS. In addition to the logistical barriers to sharing cyber information, companies worry they are exposing themselves to lawsuits or regulatory action by giving cyber data to the government. But both industry groups and government officials believe the two sides need to exchange more cyber threat details to better defend the country’s networks. “The problem is that government and the private sector are still not always working as closely together as we should,” Obama said when revealing the measure. Obama already made his pitch last week—now it’s just bargaining chips he already put in the budget DePillis, 2-3— reporter focusing on labor, business, and housing. She previously worked at The New Republic and the Washington City Paper. Washington Post. “Obama’s proposal to help workers who lose out on trade deals probably won’t win Democratic votes,” http://www.washingtonpost.com/blogs/wonkblog/wp/2015/02/03/obamas-proposal-to-help-workerswho-lose-out-on-trade-deals-probably-wont-win-democratic-votes/ --BR If President Obama's budget is a message to the world about what he’d like to see happen over the next year, Republicans aren’t his only audience — he’s talking to Democrats, too. And if there’s one thing he disagrees with congressional Democrats on most right now, it’s trade. Specifically, Obama wants the power — known as trade promotion authority, or “fast track” — to bring Congress an alreadynegotiated agreement for an up-or-down vote. Congress has to grant that power, and right now some lawmakers are balking, nervous that Obama is about to sign a massive agreement with Pacific Rim countries that could make it even easier for American companies to move production overseas. Obama made the case personally to congressional Democrats at their issues retreat last week in Philadelphia, with indeterminate results. But the president has some bargaining chips. One of them is trade adjustment assistance (TAA), the half-century-old program that compensates people who lose their jobs because of trade liberalization. Historically, it has been a way for free-traders to gain the consent of those whose constituents get shafted when trade barriers fall. This time around, it looks as though the White House may be trying to use it in the same way, in an attempt to pass the Trans-Pacific Partnership agreement once negotiations conclude. Buried deep in the president’s budget is a paragraph that backs a proposal put forth by Sen. Sherrod Brown (D-Ohio), the Senate’s most outspoken advocate of trade adjustment assistance (TAA), that would boost funding for the program to the level it was before Congress allowed it to lapse in 2014. If adopted — which is as unlikely as any of the president’s bolder requests — the plan would cost $986 million, up from $658 million in fiscal 2015. That could amount to a substantial gift for the individuals and communities hit hardest by trade deals. But would it be enough to entice nervous democrats to get behind trade promotion authority? Not likely , says Lori Wallach, who serves as a muse to the trade-skeptic progressive caucus from her perch at Public Citizen’s Global Trade Watch. The size of a TAA package, she thinks, is beside the point. In fact, the bigger it is, the plainer the admission that trade liberalization has had starkly negative effects. "TAA is like burial insurance. The thing to do, in the first place, is avoid dying,” Wallach says. "The members of Congress who are against fast track and against the TPP are not going to switch positions because of a robust TAA program. They’re looking for a different kind of trade policy, so you don’t have so many losers that need a safety net.” In other words, a generous TAA budget line is table stakes for those already inclined to support the White House trade agenda, but not enough to entice many who aren't. All talk, no action Lansing State Journal, 2-2—“Editorial: Keystone debate symbolic, not substantive,” http://www.lansingstatejournal.com/story/opinion/editorials/2015/02/02/editorial-keystone-debatesymbolic-substantive/22760235/ --BR The GOP traditionally supports such deals. The president’s party will be tougher to deliver — but that’s a challenge for him. The two main proposals, known as the Trans-Pacific Partnership and Transatlantic Trade and Investment Partnership, have been in the works for years. Negotiators reportedly are making progress, particularly on the Pacific agreement. ... Obama talks like a free-trader, but he hasn’t exactly made it a priority in his six years in the White House. In his recent State of the Union address, the president made his most straightforward plea to date for what’s known as Trade Promotion Authority. That’s the legislation he needs to give him flexibility to seal these agreements. TPA, as it’s called, obligates Congress to consider trade deals on a reasonable timetable: No stalling. TPA also prevents lawmakers from attaching amendments that would, in effect, overturn promises that U.S. representatives made at the bargaining table. ... Not every Republican trusts Obama with TPA. But most understand the benefits of free trade. ... There are more protectionists in the Democratic ranks, members of Congress who argue that free trade undercuts U.S. wages and environmental protection. ... Obama acknowledges the skeptics. “But 95 percent of the world’s customers live outside our borders,” he said in the State of the Union. ... He’s right. Now he needs to get his party to “yes.” There’s not even a bill—won’t happen until late February at the earliest Guda, 2-5—POLITICO Pro, “President Barack Obama amps up personal trade pitch,” http://www.politico.com/story/2015/02/obama-trade-democrats-congress114933.html#ixzz3QvXMcUZ0 –Br For now, negotiations on the Asia trade deal are continuing, and a fast-track bill has yet to be introduced . But that all could change in a matter of months. Lawmakers are planning to begin marking up the legislation later this month or early next, and once that happens, the trade talks are expected to speed to a conclusion, spurred on by the existence of legislation that gives participating nations some assurance that their victories on the negotiating table won’t be undone by Congress.