1NC vs. EE 1 A. Interpretation The topic requires the affirmative to reduce surveillance itself, not to just limit the methods of surveillance 1. CURTAIL MEANS DECREASE Burton's 7 Burton's Legal Thesaurus, 4E. Copyright © 2007 by William C. Burton. Used with permission of The McGraw-Hill Companies, Inc. http://legaldictionary.thefreedictionary.com/curtail curtail verb abate, abbreviate, abridge, clip, coartare, cut, cut down, cut short, decrease, diminish, halt, lessen, lop, make smaller, minuere, pare, pare down, retrench, shorten, subtract, trim See also: abate, abridge, allay, arrest, attenuate, bowdlerize, commute, condense, decrease, diminish, discount, lessen, minimize, palliate, reduce, restrain, retrench, stop 2. SURVEILLANCE IS PROCESS OF GATHERING INFORMATION, AS DISTINGUISHED FROM THE TECHNIQUES OF GATHERING Constitution Committee 9 Constitution Committee, House of Lords, Parliament, UK 2009, Session 2008-09 Publications on the internet, Constitution Committee - Second Report, Surveillance: Citizens and the State Chapter 2 http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/1804.htm 18. The term "surveillance" is used in different ways. A literal definition of surveillance as "watching over" indicates monitoring the behaviour of persons, objects, or systems. However surveillance is not only a visual process which involves looking at people and things. Surveillance can be undertaken in a wide range of ways involving a variety of technologies. The instruments of surveillance include closed-circuit television (CCTV), the interception of telecommunications ("wiretapping"), covert activities by human agents, heat-seeking and other sensing devices, body scans, technology for tracking movement, and many others. B. Violation Getting rid of backdoors gets rid of a technique for surveillance, but not the process itself. Nothing under the plan stops gathering information in other ways C. Standards 1. Limits are necessary for negative preparation and clash, and their interpretation makes the topic too big. Permitting limits on methods of surveillance, but not surveillance itself, permits the affirmative to avoid the issues of less surveillance and forces the negative to debate a huge number of different techniques 2. Effects T - At best the aff is effects T because getting rid of a method of surveillance might lead to a decrease of surveillance in the future but not directly D. T IS A VOTER because the aff is bad for debate 2 The 1AC’s use of the state as an ethical actor re-enforces the antagonism of blackness in white civil society - this whitewashes anti-black violence and reenforces the racist power-structures that render the USFG coherent Wilderson, 03 (Frank, “Gramsci's Black Marx: Whither the Slave in Civil Society” an American writer, dramatist, filmmaker and critic. He is a full professor of Drama and African American studies at the University of California, Irvine. Pp. 6-8, AF) The value of reintroducing the unthought category of the slave, by way of noting the absence of the Black subject, lies in the Black subject’s potential for extending the demand placed on state/capital formations because its reintroduction into the discourse expands the intensity of the antagonism. In other words, the slave makes a demand, which is in excess of the demand made by the worker. The worker demands that productivity be fair and democratic (Gramsci's new hegemony, Lenin's dictatorship of the proletariat), the slave, on the other hand, demands that production stop; stop without recourse to its ultimate democratization. Work is not an organic principle for the slave. The absence of Black subjectivity from the crux of marxist discourse is symptomatic of the discourse's inability to cope with the possibility that the generative subject of capitalism, the Black body of the 15th and 16th centuries, and the generative subject that resolves late-capital's over-accumulation crisis, the Black (incarcerated) body of the 20th and 21st centuries, do not reify the basic categories which structure marxist conflict: the categories of work, production, exploitation, historical self-awareness and, above all, hegemony. If, by way of the Black subject, we consider the underlying grammar of the question What does it mean to be free? that grammar being the question What does it mean to suffer? then we come up against a grammar of suffering not only in excess of any semiotics of exploitation, but a grammar of suffering beyond signification itself, a suffering that cannot be spoken because the gratuitous terror of White supremacy is as much contingent upon the irrationality of White fantasies and shared pleasures as it is upon a logic—the logic of capital. It extends beyond texualization. When talking about this terror, Cornel West uses the term “black invisibility and namelessness” to designate , at the level of ontology, what we are calling a scandal at the level of discourse. He writes: [America's] unrelenting assault on black humanity produced the fundamental condition of black culture -- that of black invisibility and namelessness. On the crucial existential level relating to black invisibility and namelessness, the first difficult challenge and demanding discipline is to ward off madness and discredit suicide as a desirable option. A central preoccupation of black culture is that of confronting candidly the ontological wounds, psychic scars, and existential bruises of black people while fending off insanity and selfannihilation. This is why the "ur-text" of black culture is neither a word nor a book, not and architectural monument or a legal brief. Instead, it is a guttural cry and a wrenching moan -- a cry not so much for help as for home, a moan less out of complaint than for recognition. (80-81) Thus, the Black subject position in America is an antagonism, a demand that can not be satisfied through a transfer of ownership/organization of existing rubrics ; whereas the Gramscian subject, the worker, represents a demand that can indeed be satisfied by way of a successful War of Position, which brings about the end of exploitation. The worker calls into question the legitimacy of productive practices, the slave calls into question the legitimacy of productivity itself. From the positionality of the worker the question, What does it mean to be free? is raised. But the question hides the process by which the discourse assumes a hidden grammar which has already posed and answered the question, What does it mean to suffer? And that grammar is organized around the categories of exploitation (unfair labor relations or wage slavery). Thus, exploitation (wage slavery) is the only category of oppression which concerns Gramsci: society, Western society, thrives on the exploitation of the Gramscian subject. Full stop. Again, this is inadequate, because it would call White supremacy "racism" and articulate it as a derivative phenomenon of the capitalist matrix, rather than incorporating White supremacy as a matrix constituent to the base, if not the base itself. What I am saying is that the insatiability of the slave demand upon existing structures means that it cannot find its articulation within the modality of hegemony (influence, leadership, consent)— the Black body can not give its consent because “generalized trust,” the precondition for the solicitation of consent, “equals racialized whiteness” (Lindon Barrett). Furthermore, as Orland Patterson points out, slavery is natal alienation by way of social death, which is to say that a slave has no symbolic currency or material labor power to exchange: a slave does not enter into a transaction of value (however asymmetrical) but is subsumed by direct relations of force, which is to say that a slave is an articulation of a despotic irrationality whereas the worker is an articulation of a symbolic rationality. White supremacy’s despotic irrationality is as foundational to American institutionality as capitalism’s symbolic rationality because, as Cornel West writes, it… …dictates the limits of the operation of American democracy -- with black folk the indispensable sacrificial lamb vital to its sustenance. Hence black subordination constitutes the necessary condition for the flourishing of American democracy, the tragic prerequisite for America itself. This is, in part, what Richard Wright meant when he noted, "The Negro is America's metaphor." (72) And it is well known that a metaphor comes into being through a violence which kills, rather than merely exploits, the object, that the concept might live. West's interventions help us see how marxism can only come to grips with America's structuring rationality -- what it calls capitalism, or political economy; but cannot come to grips with America's structuring irrationality: the libidinal economy of White supremacy, and its hyper-discursive violence which kills the Black subject that the concept, civil society, may live. In other words, from the incoherence of Black death, America generates the coherence of White life. This is important when thinking the Gramscian paradigm (and its progenitors in the world of U.S. social movements today) which is so dependent on the empirical status of hegemony and civil society: struggles over hegemony are seldom, if ever, asignifying—at some point they require coherence, they require categories for the record— which means they contain the seeds of anti-Blackness. Let us illustrate this by way of a hypothetical scenario. In the early part of the 20th century, civil society in Chicago grew up, if you will, around emerging industries such as meat packing. In his notes on “Americanism and Fordism” (280-314), Gramsci explores the “scientific management” of Taylorism, the prohibition on alcohol, and Fordist interventions into the working class family, which formed the ideological, value-laden grid of civil society in places like turn of the century Chicago: The state will always be bad for blackness – black bodies are in a perpetual state of warfare against systems of oppression Rodriguez 2010, Dylan Rodriguez is a Professor at UCR of Latin American Studies, “The Terms of Engagement: Warfare, White Locality, and Abolition”, http://crs.sagepub.com/cgi/content/abstract/36/1/151, NN Thus, behind the din of progressive and liberal reformist struggles over public policy, civil liberties, and law, and beneath the infrequent mobilizations of activity to defend against the next onslaught of racist, classist, ageist, and misogynist criminalization, there is an unspoken politics of assumption that takes for granted the mystified permanence of domestic warfare as a constant production of targeted and massive suffering, guided by the logic of normalized and mundane black, brown, and indigenous subjection to the expediencies and essential violence of the American (global) nation-building project. To put it differently: despite the unprecedented forms of imprisonment, social and political repression, and violent policing that compose the mosaic of our historical time, the establishment left (within and perhaps beyond the USA) really does not care to envision, much less politically prioritize, the abolition of US domestic warfare and its structuring white supremacist social logic as its most urgent task of the present and future . The non-profit and NGO left, in particular, seems content to engage in desperate (and usually well-intentioned) attempts to manage the casualties of domestic warfare, foregoing the urgency of an abolitionist praxis that openly, critically, and radically addresses the moral, cultural, and political premises of these wars. In so many ways, the US progressive/left establishment is filling the void created by what Ruth Wilson Gilmore has called the violent 'abandonments' of the state, which forfeits and implodes its own social welfare capacities (which were already insufficient at best) while transforming and (productively) exploding its domestic warmaking functionalities —which Gilmore (2007b: 44—5) says are guided by a 'frightening willingness to engage in human sacrifice' . Yet, at the same time that the state has been openly galvanizing itself to declare and wage violent struggle against strategically targeted local populations, the establishment left remains relatively unwilling and therefore institutionally unable to address the questions of social survival, grass roots mobilization, radical social justice, and social transformation on the concrete and everyday terms of the very domestic war(s ) that the state has so openly and repeatedly declared as the premises of its own coherence. Given that domestic warfare composes both the common narrative language and concrete material production of the state, the question remains as to why the establishment left has not understood this statecraft as the state of emergency that the condition so openly, institutionally encompasses (war!). Perhaps it is because critical intellectuals, scholar activists, and progressive organizers are underestimating the skill and reach of the state as a pedagogical (teaching) apparatus, that they have generally undertheorized how the state so skillfully generates (and often politically accommodates) sanctioned spaces of political contradiction that engulf 'dissent' and counter-state, antiracist, and antiviolence organizing. Italian political prisoner Antonio Gramscis thoughts on the formation of contemporary pedagogical state are instructive here: The State does have and request consent, but it also 'educates' this consent, by means of the political and syndical associations; these, however, are private organisms, left to the private initiative of the ruling class. (Gramsci 1995: 259). The objectification of blackness means that we are ontologically murdered over and over again with no contingency, Black flesh becomes the enslaved profit for white society Spillers, 87 (Hortense, professor at the University of Vanderbilt, 1987, The John Hopkins University Press, “Mama's Baby, Papa's Maybe: An American Grammar Book”, http://web.calstatela.edu/faculty/jgarret/texts/spillers.pdf, 7/6/14, KM) Among the myriad uses to which the enslaved community was put, Goodell identifies its value for medical research: “Assortments of diseased, damaged, and disabled Negroes, deemed incurable and otherwise worthless are bought up, it seems … by medical institutions, to be experimented and operated upon, for purposes of ‘medical education’ and the interest of medical science” [86-87; Goodell’s emphasis ]. From the Charleston Mercury for October 12, 1838, Goodell notes this advertisement: ¶ ‘To planters and others. – Wanted, fifty Negroes, any person, having sick Negroes, considered incurable by their respective physicians, and wishing to dispose of them, Dr. S. will pay cash for Negroes affected with scrofula, or king’s evil, confirmed hypochrondriasm, apoplexy, diseases of the liver, kidneys, spleen, stomach and intestines, bladder and its appendages, diarrhea, dystentery, etc. The highest cash price will be paid, on application as above.’ At No. 110 profitable “atomizing” of the captive body provides another angle on the divided flesh: we lose any hint or suggestion of a dimension of ethics, of relatedness between human personality and cultural institutions. To that extent, the procedures adopted for the captive flesh demarcate a total objectification, as the entire captive community becomes a living laboratory. ¶ The captive body, then, brings into focus a gathering of social realities as well as a metaphor for value so thoroughly interwoven in their literal and figurative emphases that distinctions between them are virtually useless. Even though the captive flesh/body has been “liberated,” and no one need pretend that even the quotation marks do not matter, dominant symbolic activity, the ruling Church Street, Charleston. [87; Goodell’s emphasis] ¶ This episteme that releases the dynamics of naming and valuation remains grounded in the originating metaphors of captivity and mutilation so that it is as if neither time nor history, nor historiography and its topics, shows movement, as the human subject is “murdered” over and over again by the passions of a bloodless and anonymous archaism, showing itself in endless disguise. Faulkner’s young Chick Mallison in The Mansion calls “it” by other names – “the ancient subterrene atavistic fear…” [227]. And I would call it the Great Long National Shame. But people do not talk like that anymore – it is “embarrassing,” just as the retrieval of mutilated female bodies will likely be “backward” for some people. Neither the shameface of the embarrassed, nor the not-looking-back of the self-assured is of much interest to us, and will not help at all if rigor is our dream. We might concede, at the very least, that sticks and bricks might break our bones, but words will most certainly kill us. The alternative is to wallow in the permutation of present and past to return and depart from the violence created by slavery – this opens up new avenues to challenge the normalized violence in modernity Hartman 02, (Columbia University African American literature and history professor, 02(Saidiya V., Fall 2002, “The time of Slavery”, The South Atlantic Quarterly, Volume 101, Number 4, pp.757-777, CLF) The point here is not to condemn tourism, but to rigorously examine the politics of memory and question whether ‘‘working through’’ is even an appropriate model for our relationship with history. In Representing the Holocaust, Dominick LaCapra opts for working through as kind of middle road between redemptive totalization and the impossibility of representation and suggests that a degree of recovery is possible in the context of a responsible working through of the past. He asserts that in coming to terms with trauma, there is the possibility of retrieving desirable aspects of the past that might be used in rebuilding a new life. 23 While LaCapra’s arguments are persuasive, I wonder to what degree the backward glance can provide us with the vision to build a new life? To what extent need we rely on the past in transforming the present or, as Marx warned, can we only draw our poetry from the future and not the past? 24 Here I am not advancing the impossibility of representation or declaring the end of history, but wondering aloud whether the image of enslaved ancestors can transform the present. I ask this question in order to discover again the political and ethical relevance of the past. If the goal is something more than assimilating the terror of the past into our storehouse of memory , the pressing question is,Why need we remember ? Does the emphasis on remembering and working through the past expose our insatiable desires for curatives, healing, and anything else that proffers the restoration of some prelapsarian intactness? Or is recollection an avenue for undoing history? Can remembering potentially enable an escape from the regularity of terror and the routine of violence constitutive of black life in the United States? Or is it that remembering has become the only conceivable or viable form of political agency? Usually the injunction to remember insists that memory can prevent atrocity, redeem the dead, and cultivate an understanding of ourselves as both individuals and collective subjects. Yet, too often, the injunction to remember assumes the ease of grappling with terror, representing slavery’s crime, and ably standing in the other’s shoes. Case SQ Loopholes exist for the FBI and NSA Cushing 14 Tim Cushing, Techdirt contributor, 12-5-14, "Ron Wyden Introduces Legislation Aimed At Preventing FBI-Mandated Backdoors In Cellphones And Computers," Techdirt., https://www.techdirt.com/articles/20141204/16220529333/ron-wyden-introduces-legislationaimed-preventing-fbi-mandated-backdoors-cellphones-computers.shtml//SRawal Here's the actual wording of the backdoor ban [pdf link], which has a couple of loopholes in it. (a) IN GENERAL.—Except as provided in subsection (b), no agency may mandate that a manufacturer, developer, or seller of covered products design or alter the security functions in its product or service to allow the surveillance of any user of such product or service, or to allow the physical search of such product, by any agency. Subsection (b) presents the first loophole, naming the very act that Comey is pursuing to have amended in his agency's favor. (b) EXCEPTION.—Subsection (a) shall not apply to mandates authorized under the Communications Assistance for Law Enforcement Act (47 U.S.C. 1001 et seq.). Comey wants to alter CALEA or, failing that, get a few legislators to run some sort of encryptiontargeting legislation up the Congressional flagpole for him. Wyden's bill won't thwart these efforts and it does leave the NSA free to continue with its pre-existing homebrewed backdoor efforts -- the kind that don't require mandates because they're performed off-site without the manufacturer's knowledge. They will still have access- government can still influence companies Newman 14 Lily Hay Newman, 12-5-2014, "Senator Proposes Bill to Prohibit Government-Mandated Backdoors in Smartphones," Slate Magazine, http://www.slate.com/blogs/future_tense/2014/12/05/senator_wyden_proposes_secure_data _act_to_keep_government_agencies_from.html//SRawal It's worth noting, though, that the Secure Data Act doesn't actually prohibit backdoors—it just prohibits agencies from mandating them. There are a lot of other types of pressure government groups could still use to influence the creation of backdoors, even if they couldn't flat-out demand them. Here's the wording in the bill: "No agency may mandate that a manufacturer, developer, or seller of covered products design or alter the security functions in its product or service to allow the surveillance of any user of such product or service, or to allow the physical search of such product, by any agency." Adv. 1 Turn - Internet freedom is used to crush dissent Siegel 11 (Lee Siegel, a columnist and editor at large for The New York Observer, is the author of “Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters. “‘The Net Delusion’ and the Egypt Crisis”, February 4, 2011, http://artsbeat.blogs.nytimes.com/2011/02/04/the-net-delusion-and-the-egyptcrisis) Morozov takes the ideas of what he calls “cyber-utopians” and shows how reality perverts them in one political situation after another. In Iran, the regime used the internet to crush the internet-driven protests in June 2009. In Russia, neofascists use the internet to organize pogroms. And on and on. Morozov has written hundreds of pages to make the point that technology is amoral and cuts many different ways. Just as radio can bolster democracy or — as in Rwanda — incite genocide, so the internet can help foment a revolution but can also help crush it. This seems obvious, yet it has often been entirely lost as grand claims are made for the internet’s positive, liberating qualities. ¶And suddenly here are Tunisia and, even more dramatically, Egypt, simultaneously proving and refuting Morozov’s argument. In both cases, social networking allowed truths that had been whispered to be widely broadcast and commented In Tunisia and Egypt — and now across the Arab world — Facebook and Twitter have made people feel less alone in their rage at the governments that stifle their lives. There is nothing more upon. politically emboldening than to feel, all at once, that what you have experienced as personal bitterness is actually an objective condition, a universal affliction in your society that Yet at the same time, the Egyptian government shut off the internet, which is an effective way of using the internet. And according to one Egyptian blogger, misinformation is being spread through Facebook — as it was in Iran — just as real information was shared by anti-government protesters. This is the “dark side of internet freedom” that Morozov is warning against. It is the freedom to wantonly crush the forces of freedom. ¶All this should not surprise anyone. It seems that, just as with every other type of technology of communication, the internet is not a solution to human conflict but an amplifier for all aspects of a conflict. As you read about pro-government agitators charging into crowds of protesters on horseback and camel, you realize that nothing has changed in our new internet age. The human situation is the same as it always was, except that it therefore can be universally opposed. ¶ is the same in a newer and more intense way. Decades from now, we will no doubt be celebrating a spanking new technology that promises to liberate us from the internet. And the argument joined by Morozov will occur once again. Adv. 2 - CyberCrime Backdooring is specifically key to combat cyber terrorist attacks Goldsmith 13 (Jack, a contributing editor at New Republic, teaches at Harvard Law School and is a member of the Hoover Institution Task Force on National Security and Law, “We Need an Invasive NSA,” New Republic, 10/10/2013, http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyberattacks)//duncan Ever since stories about the National Security Agency’s (NSA) electronic intelligence-gathering capabilities began tumbling out last June, The New York Times has published more than a dozen editorials excoriating the “national surveillance state.” It wants the NSA to end the “ mass warehousing of everyone’s data” and the use of “ back doors ” to break encrypted communications. A major element of the Times’ critique is that the NSA’s domestic sweeps are not justified by the terrorist threat they aim to prevent.¶ At the end of August, in the midst of the Times’ assault on the NSA, the newspaper suffered what it described as a “malicious external attack” on its domain name registrar at the hands of the Syrian Electronic Army, a group of hackers who support Syrian President Bashar Al Assad. The paper’s website was down for several hours and, for some people, much longer. “In terms of the sophistication of the attack, this is a big deal,” said Marc Frons, the Times’ chief information officer. Ten months earlier, hackers stole the corporate passwords for every employee at the Times, accessed the computers of 53 employees, and breached the e-mail accounts of two reporters who cover China. “We brought in the FBI, and the FBI said this had all the hallmarks of hacking by the Chinese military,” Frons said at the time. He also acknowledged that the hackers were in the Times system on election night in 2012 and could have “wreaked havoc” on its coverage if they wanted.¶ Such cyber- intrusions threaten corporate America and the U.S. government every day. “Relentless assaults on America’s computer networks by China and other foreign governments, hackers and criminals have created an urgent need for safeguards to protect these vital systems,” the Times editorial page noted last year while supporting legislation encouraging the private sector to share cybersecurity information with the government. It cited General Keith Alexander, the director of the NSA, who had noted a 17-fold increase in cyber-intrusions on critical infrastructure from 2009 to 2011 and who described the losses in the United States from cyber-theft as “the greatest transfer of wealth in history.” If a “catastrophic cyber-attack occurs,” the Timesconcluded, “Americans will be justified in asking why their lawmakers ... failed to protect them.”¶ When catastrophe strikes, the public will adjust its tolerance for intrusive government measures.¶ The Times editorial board is quite right about the seriousness of the cyber- threat and the federal government’s responsibility to redress it. What it does not appear to realize is the connection between the domestic NSA surveillance it detests and the governmental assistance with cybersecurity it cherishes. To keep our computer and telecommunication networks secure, the government will eventually need to monitor and collect intelligence on those networks using techniques similar to ones the Timesand many others find reprehensible when done for counterterrorism ends.¶ The fate of domestic surveillance is today being fought around the topic of whether it is needed to stop Al Qaeda from blowing things up. But the fight tomorrow, and the more important fight, will be about whether it is necessary to protect our ways of life embedded in computer networks.¶ Anyone anywhere with a connection to the Internet can engage in cyber-operations within the United States. Most truly harmful cyber-operations, however, require group effort and significant skill. The attacking group or nation must have clever hackers, significant computing power, and the sophisticated software—known as “malware”—that enables the monitoring, exfiltration, or destruction of information inside a computer. The supply of all of these resources has been growing fast for many years—in governmental labs devoted to developing these tools and on sprawling black markets on the Internet.¶ Telecommunication networks are the channels through which malware typically travels, often anonymized or encrypted, and buried in the billions of communications that traverse the globe each day. The targets are the communications networks themselves as well as the computers they connect—things like the Times’ servers, the computer systems that monitor nuclear plants, classified documents on computers in the Pentagon, the nasdaq exchange, your local bank, and your social-network providers.¶ To keep these computers and networks secure, the government needs powerful intelligence capabilities abroad so that it can learn about planned cyber-intrusions. It also needs to raise defenses at home. An important first step is to correct the market failures that plague cybersecurity. Through law or regulation, the government must improve incentives for individuals to use security software, for private firms to harden their defenses and share information with one another, and for Internet service providers to crack down on the botnets—networks of compromised zombie computers—that underlie many cyber-attacks. More, too, must be done to prevent insider threats like Edward Snowden’s, and to control the stealth introduction of vulnerabilities during the manufacture of computer components—vulnerabilities that can later be used as windows for cyberattacks.¶ And yet that’s still not enough. The U.S. government can fully monitor air, space, and sea for potential attacks from abroad. But it has limited access to the channels of cyber-attack and cyber-theft, because they are owned by private telecommunication firms, and because Congress strictly limits government access to private communications. “I can’t defend the country until I’m into all the networks,” General Alexander reportedly told senior government officials a few months ago.¶ For Alexander, being in the network means having government computers scan the content and metadata of Internet communications in the United States and store some of these communications for extended periods. Such access , he thinks, will give the government a fighting chance to find the needle of known malware in the haystack of communications so that it can block or degrade the attack or exploitation . It will also allow it to discern patterns of malicious activity in the swarm of communications, even when it doesn’t possess the malware’s signature. And it will better enable the government to trace back an attack’s trajectory so that it can discover the identity and geographical origin of the threat. No impact to backdoors So 13 (Candice, writer for itbusiness.ca, Carleton University formerly at Edmonton Journal, the Ottawa Citizen, the Globe and Mail, and the Windsor Star, “Security experts debate use of backdoors in coding,” itbusiness.ca, 11/7/2013, http://www.itbusiness.ca/news/securityexperts-debate-use-of-backdoors-in-coding/44646)//duncan *Citing G. Mark Hardy, president of the National Security Corporation Still, backdoors may not be as serious a concern as people have supposed , says G. Mark Hardy, president of the National Security Corporation. He has developed information security plans for four U.S. military commands, and he wrote the requirements for communication security encryption for one of its satellite programs.¶ Backdoors have been around about as long as software has been around, with many of them just being there for software developers to ensure their programs are running properly, Hardy says, adding he feels people are just starting to take notice now, though they didn’t seem to care much about that in the past.¶ “Backdoors by themselves aren’t necessarily bad or evil, but they do exist in many applications for either testing purposes or to be able to do ongoing verification that things are working correctly. The problem occurs when third parties access backdoors and the applications contain sensitive information, and now you, the consumer, are not aware of the fact,” he says.¶ “In my opinion, backdoors are not your biggest concern. The NSA doesn’t steal credit card numbers. The NSA doesn’t do identity theft and ruin your credit. Organized crime does. And organized crime, as well as other groups, actively seek exploits by which they can achieve financial gain.”¶ Hardy adds that in many cases, hackers gain access through programming errors, and not necessarily through backdoors. He adds he feels a lot of the news coming out of the NSA is really just rumours and speculation.¶ “I have not seen tangible evidence of backdoors being inserted into code by government agencies, but that is what the buzz is about,” he says.¶ While it’s almost impossible to write perfect code, completely free of errors, users need to keep their systems up-to-date, patch regularly, and avoid using free services where they can. Free services may not charge the user directly, but they may rely on a freemium model or push ads.¶ If security professionals do choose to use backdoors, they should only use well-known, published encryption algorithms that have been tried and tested, instead of proprietary algorithms, he says. For example, the Data Encryption Standard (DES) has been around for more than 30 years, with banks now using triple DES to transfer data.¶ Ultimately, Hardy says he feels citizens need to understand there is a need to protect national security. No cyber impact Jason HEALEY, Director of the Cyber Statecraft Initiative at the Atlantic Council, 13 [“No, Cyberwarfare Isn't as Dangerous as Nuclear War,” March 20, 2013, www.usnews.com/opinion/blogs/world-report/2013/03/20/cyber-attacks-not-yet-anexistential-threat-to-the-us] America does not face an existential cyberthreat today, despite recent warnings . Our cybervulnerabilities are undoubtedly grave and the threats we face are severe but far from comparable to nuclear war . The most recent alarms come in a Defense Science Board report on how to make military cybersystems more resilient against advanced threats (in short, Russia or China). It warned that the "cyber threat is serious, with potential consequences similar in some ways to the nuclear threat of the Cold War." Such fears were also expressed by Adm. Mike Mullen, then chairman of the Joint Chiefs of Staff, in 2011. He called cyber "The single biggest existential threat that's out there" because "cyber actually more than theoretically, can attack our infrastructure, our financial systems." While it is true that cyber attacks might do these things, it is also true they have not only never happened but are far more difficult to accomplish than mainstream thinking believes . The consequences from cyber threats may be similar in some ways to nuclear, as the Science Board concluded, but mostly, they are incredibly dissimilar. Eighty years ago, the generals of the U.S. Army Air Corps were sure that their bombers would easily topple other countries and cause their populations to panic, claims which did not stand up to reality. A study of the 25-year history of cyber conflict, by the Atlantic Council and Cyber Conflict Studies Association, has shown a similar dynamic where the impact of disruptive cyberattacks has been consistently overestimated . Rather than theorizing about future cyberwars or extrapolating from today's concerns, the history of cyberconflict that have actually been fought, shows that cyber incidents have so far tended to have effects that are either widespread but fleeting or persistent but narrowly focused. No attacks, so far, have been both widespread and persistent. There have been no authenticated cases of anyone dying from a cyber attack. Any widespread disruptions, even the 2007 disruption against Estonia, have been short-lived causing no significant GDP loss. Moreover, as with conflict in other domains, cyberattacks can take down many targets but keeping them down over time in the face of determined defenses has so far been out of the range of all but the most dangerous adversaries such as Russia and China. Of course, if the United States is in a conflict with those nations, cyber will be the least important of the existential threats policymakers should be worrying about. Plutonium trumps bytes in a shooting war. This is not all good news. Policymakers have recognized the problems since at least 1998 with little significant progress. Worse, the threats and vulnerabilities are getting steadily more worrying. Still, experts have been warning of a cyber Pearl Harbor for 20 of the 70 years since the actual Pearl Harbor . The transfer of U.S. trade secrets through Chinese cyber espionage could someday accumulate into an existential threat. But it doesn't seem so seem just yet, with only handwaving estimates of annual losses of 0.1 to 0.5 percent to the total U.S. GDP of around $15 trillion. That's bad, but it doesn't add up to an existential crisis or "economic cyberwar." Adv. 3 The intelligence agencies are separated from the rest of the government Glennon ’14, Professor of International Law, Fletcher School of Law and Diplomacy, Tufts University. (1/11/14, Michael J. Glennon, Harvard National Security Journal, http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf, vol.5) Neil Sheehan205 reflected on why nothing would happen. Sheehan’s Times colleague Halberstam recalled that Sheehan came away with one impression: that “the government of the United States was not what he had thought it was; it was as if there were an inner U.S. government, what he called ‘a centralized state, far more powerful than anything else . . . . It had survived and perpetuated itself . . . . [I]t does not function necessarily for the benefit of the Republic but rather for its own ends, its own perpetuation; it has its own codes which are quite different from public codes.’”206 The Trumanite network has achieved, in a word, autonomy. 207 The maintenance of Trumanite autonomy has depended upon two conditions. The first is that the Madisonian institutions appear to be in charge of the nation’s security. The second is that the Madisonian institutions not actually be in charge. Solvency Only businesses can solve—government solutions take too long Spink Adrian Spink No date (“What are Java Zero-Day Attacks and How Can They Affect You?”, NO DATE, http://www.findtheedge.com/general/what-are-java-zero-day-attacks-and-how-canthey-affect-you, accessed 7/16/15) Secuity-Measures-NeededRecent months have seen a procession of Java zero-day attacks impact a wide variety of organisations. Simply put, zero-day attacks occur when a problem with a piece of software is discovered and exploited before the developer is even aware that there is an issue. Facebook, Apple, Twitter and Microsoft have all recently disclosed compromised computers, and many more firms have been hit but not gone public with the information. The very nature of a zero-day attack means your systems could be vulnerable in the period between the exploit being identified and the patch being deployed by Oracle, the owners of Java. It’s unlikely we’ve seen the last of these exploits; Java’s rich programming language wasn’t designed for a hostile Internet environment, so it’s likely more vulnerabilities will be uncovered. There are also many other products running on our desktops that could be susceptible to this style of attack, as has been shown by the recent Internet Explorer zero-day issues. Traditional anti-virus and perimeter security techniques do not offer complete protection – for this reason, organisations need to review their risk exposure, and plan their responses accordingly. So what practical advice can we offer: 1. Remove Java? While many security experts recommend the seemingly straightforward solution of disabling or removing Java from browsers, but this is not always practical. Some firms will be dependent on Java to run both internal and third party applications. For large organisations, the cost and logistics of ensuring Java is disabled for every browser may be prohibitive. Many browsers now offer the ability to control how Java is handled, however, and the latest version of Java has enhancements to the control panel settings that may offer you a solution with a little tweaking. 2. Maximise your end-point security Antivirus solutions will protect you from the most common exploits once they have been identified, but it’s even more important to ensure: You have full coverage across all your end-points Security updates are installed on all endpoints quickly You have ‘zero-day’ and ‘Host Intrusion Prevention’ features enabled 3. User Awareness Educating your users about the potential risks, and how to avoid phishing attacks, is a great way to reduce your exposure. 4. Protect your critical information assets In the longer term, ‘advanced persistent threats’ are likely to increase. Firms need to ask themselves – while making the assumption that their network will be breached at some point in the future – what additional measures could be taken to protect critical information assets in advance, and limit damage. Summary Zero day attacks are inevitable , so buisnessess need to take steps to protect their data and systems well ahead of time. It’s tempting to put off thinking about these issues, but this is only likely to magnify the amount of damage caused if your system is targeted in the future. Backdoors are key to provide law enforcement critical information to prevent crime Hess 4/29 (Amy, Executive Assistant Director at FBI, “Encrytpion And Cybersecurity For Mobile Electronic Communication Devices,” Department of Justice, 4/29/2015, pdf)//duncan Encryption of stored data is not new, but it has become increasingly prevalent and sophisticated. The challenge to law enforcement and national security officials has intensified with the advent of default encryption settings and stronger encryption standards on both devices and networks.¶ In the past, a consumer had to decide whether to encrypt data stored on his or her device and take some action to implement that encryption. With today’s new operating systems, however, a device and all of a user’s information on that device can be encrypted by default – without any affirmative action by the consumer. In the past, companies had the ability to decrypt devices when the Government obtained a search warrant and a court order. Today, companies have developed encryption technology which makes it impossible for them to decrypt data on devices they manufacture and sell, even when lawfully ordered to do so. Although there are strong and appropriate cybersecurity and other reasons to support these new uses of encryption, such decisions regarding system design have a tremendous impact on law enforcement’s ability to fight crime and bring perpetrators to justice.¶ Evidence of criminal activity used to be found in written ledgers, boxes, drawers, and file cabinets, all of which could be searched pursuant to a warrant. But like the general population, criminal actors are increasingly storing such information on electronic devices. If these devices are automatically encrypted, the information they contain may be unreadable to anyone other than the user of the device. Obtaining a search warrant for photos, videos, email, text messages, and documents can be an exercise in futility. Terrorists and other criminals know this and will increasingly count on these means of evading detection.¶ Additional Considerations¶ Some assert that although more and more devices are encrypted, users back-up and store much of their data in “the cloud,” and law enforcement agencies can access this data pursuant to court order. For several reasons, however, the data may not be there. First, aside from the technical requirements and settings needed to successfully back up data to the cloud, many companies impose fees to store information there – fees which consumers may be unwilling to pay. Second, criminals can easily avoid putting information where it may be accessible to law enforcement. Third, data backed up to the cloud typically includes only a portion of the data stored on a device, so key pieces of evidence may reside only on a criminal’s or terrorist’s phone, for example. And if criminals do not back up their phones routinely, or if they opt out of uploading to the cloud altogether, the data may only be found on the devices themselves – devices which are increasingly encrypted.¶ Facing the Challenge¶ The reality is that cyber adversaries will exploit any vulnerability they find. But security risks are better addressed by developing solutions during the design phase of a specific product or service, rather than resorting to a patchwork solution when law enforcement presents the company with a court order after the product or service has been deployed.¶ To be clear, we in the FBI support and encourage the use of secure networks and sophisticated encryption to prevent cyber threats to our critical national infrastructure, our intellectual property, and our data. We have been on the front lines of the fight against cybercrime and economic espionage and we recognize that absolute security does not exist in either the physical or digital world. Any lawful intercept or access solution should be designed to minimize its impact upon the overall security. But without a solution that enables law enforcement to access critical evidence, many investigations could be at a dead end. The same is true for cyber security investigations; if there is no way to access encrypted systems and data, we may not be able to identify those who seek to steal our technology, our state secrets, our intellectual property, and our trade secrets.¶ A common misperception is that we can simply break into a device using a “brute force” attack – the idea that with enough computing resources devoted to the task, we can defeat any encryption. But the reality is that even a supercomputer would have difficulty with today’s high-level encryption standards. And some devices have a setting that erases the encryption key if someone makes too many attempts to break the password, effectively closing all access to that data.¶ Finally, a reasonable person might also ask, “Can’t you just compel the owner of the device to produce the information in a readable form?” Even if we could compel an individual to provide this information, a suspected criminal would more likely choose to defy the court’s order and accept a punishment for contempt rather than risk a 30-year sentence for, say, production and distribution of child pornography.¶ Without access to the right evidence, we fear we may not be able to identify and stop child predators hiding in the shadows of the Internet, violent criminals who are targeting our neighborhoods, and terrorists who may be using social media to recruit, plan, and execute an attack in our country. We may not be able to recover critical information from a device that belongs to a victim who can’t provide us with the password, especially when time is of the essence.