1AC Cybersecurity A cyberattack is coming Macri, 14 (Giuseppe, staff writer for the Daily Caller, citing NSA head Michael Rogers, “NSA Chief: US Will Suffer A Catastrophic Cyberattack In The Next Ten Years,” http://dailycaller.com/2014/11/21/nsa-chief-us-will-suffer-a-catastrophic-cyberattack-in-thenext-ten-years/, BC) N ational S ecurity A gency and U.S. Cyber Command head Adm. Michael Rogers warned lawmakers during a congressional briefing this week that the U.S. would suffer a severe cyberattack against critical infrastructure like power or fuel grids in the not-too-distant future.∂ “I fully expect that during my time as a commander, we are going to be tasked with defending critical infrastructure in the United States,” Rogers said while citing findings from an October Pew Research Center report. “ It’s only a matter of the when, not the if , that we’re going to see something dramatic … I bet it happens before 2025 .”∂ Rogers told the House Intelligence Committee Thursday he expected the attack to occur during his tenure as head of NSA the U.S. military’s cyber-war branch, and that it would likely come from state-sponsored hackers with ties to China, Russia or several other countries, many of whom have already successfully breached the systems of critical U.S. industries.∂ “There are multiple nationstates that have the capability and have been on the systems,” Rogers told the committee, adding that many were engaged in “reconnaissance” activities to surveil “specific schematics of most of our control systems.”∂ “There shouldn’t be any doubt in our minds that there are nation-states and groups out there that have the capability… to shut down, forestall our ability to operate our basic infrastructure, whether it’s generating power across this nation, whether it’s moving water and fuel,” Rogers said, warning China and “one or two others” had already broken into the U.S. power grid.∂ Rogers also predicted that in the coming years, cyber criminals previously engaged in stealing bank, credit card and other financial data would start to be co- opted by nation-states to act as “surrogates ,” obscuring countries’ fingerprints in the infiltration and theft of information valuable to planning attacks.∂ The admiral added that such criminal groups, which are often Russian-speaking, have already been using state-developed cyber tools. Backdoors create vulnerabilities that threaten cyber infrastructure – makes attacks likely Burger et al 14 (Eric, Research Professor of Computer Science at Georgetown, L. Jean Camp, Associate professor at the Indiana University School of Information and Computing, Dan Lubar, Emerging Standards Consultant at RelayServices, Jon M Pesha, Carnegie Mellon University, Terry Davis, MicroSystems Automation Group, “Risking It All: Unlocking the Backdoor to the Nation’s Cybersecurity,” IEEE USA, 7/20/2014, pg. 1-5, Social Science Research Network, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2468604)//duncan This paper addresses government policies that can influence commercial practices to weaken security in products and services sold on the commercial market. The debate on information surveillance for national security must include consideration of the potential cybersecurity risks and economic implications of the information collection strategies employed. As IEEE-USA, we write to comment on current discussions with respect to weakening standards, or altering commercial products and services for intelligence, or law enforcement. Any policy that seeks to weaken technology sold on the commercial market has many serious downsides, even if it temporarily advances the intelligence and law enforcement missions of facilitating legal and authorized government surveillance.∂ Specifically, we define and address the risks of installing backdoors in commercial products, introducing malware and spyware into products, and weakening standards. We illustrate that these are practices that harm America’s cybersecurity posture and put the resilience of American cyberinfrastructure at risk . We write as a technical society to clarify the potential harm should these strategies be adopted. Whether or not these strategies ever have been used in practice is outside the scope of this paper.∂ Individual computer users, large corporations and on security features built into information technology products and services they buy on the commercial market. If the security features of these widely available products and services are weak, everyone is in greater danger. There recently have been allegations that U.S. government agencies (and some private entities) have engaged in a number of activities deliberately intended to weaken mass market, widely used technology. Weakening commercial products and services does have the benefit that it becomes easier for U.S. intelligence agencies to conduct surveillance on targets that use the weakened technology, and more information is available for law enforcement purposes. On government agencies all depend the surface, it would appear these motivations would be reasonable. However, such strategies also inevitably make it easier for foreign powers, criminals and terrorists to infiltrate these systems for their own purposes. Moreover, everyone who uses backdoor technologies may be vulnerable, and not just the handful of surveillance targets for U.S. intelligence agencies. It is the opinion of IEEE-USA’s Committee on Communications Policy that no entity should act to reduce the security of a product or service sold on the commercial market without first conducting a careful and methodical risk assessment. A complete risk assessment would consider the interests of the large swath of users of the technology who are not the intended targets of government surveillance.∂ A methodical risk assessment would give proper weight to the asymmetric nature of cyberthreats, given that technology is equally advanced and ubiquitous in the United States, and the locales of many of our adversaries. Vulnerable products should be corrected, as needed, based on this assessment. The next section briefly describes some of the government policies and technical strategies that might have the undesired side effect of reducing security. The following section discusses why the effect of these practices may be a decrease, not an increase, in security.∂ Government policies can affect greatly the security of commercial products, either positively or negatively. There are a number of methods by which a government might affect security negatively as a means of facilitating legal government surveillance. One inexpensive method is to exploit pre-existing weaknesses that are already present in commercial software, while keeping these weaknesses a secret. Another method is to motivate the designer of a computer or communications system to make those systems easier for government agencies to access. Motivation may come from direct mandate or financial incentives. There are many ways that a designer can facilitate government access once so motivated. For example, the system may be equipped with a “backdoor.” The company that creates it — and, presumably, the government agency that requests it — would “know” the backdoor, but not the product’s (or service’s) purchaser(s). The hope is that the government agency will use this feature when it is given authority to do so, but no one else will. However, creating a backdoor introduces the risk that other parties will find the vulnerability, especially when capable adversaries, who are actively seeking security vulnerabilities, know how to leverage such weaknesses .∂ History illustrates that secret backdoors do not remain secret and that the more widespread a backdoor, the more dangerous its existence. The 1988 Morris worm, the first widespread Internet attack, used a number of backdoors to infect systems and spread widely. The backdoors in that case were a set of secrets then known only by a small, highly technical community. A single, putatively innocent error resulted in a large-scale attack that disabled many systems. In recent years, Barracuda had a completely undocumented backdoor that allowed high levels of access from the Internet addresses assigned to Barracuda. However, when it was publicized, as almost inevitably happens, it became extremely unsafe, and Barracuda’s customers rejected it.∂ One example of how attackers can subvert backdoors placed into systems for benign reasons occurred in the network of the largest commercial cellular operator in Greece. Switches deployed in the system came equipped with built-in wiretapping features, intended only for authorized law enforcement agencies. Some unknown attacker was able to install software, and made use of these embedded wiretapping features to surreptitiously and illegally eavesdrop on calls from many cell phones — including phones belonging to the Prime Minister of Greece, a hundred high-ranking Greek dignitaries, and an employee of the U.S. Embassy in Greece before the security breach finally was discovered. In essence, a backdoor created to fight crime was used to commit crime. Two scenarios to a cyber attack— First is the grid —a cyber attack causes collapse Reuters 15 (Carolyn Cohn, reporter, 7-8-15, “Cyber attack on U.S. power grid could cost economy $1 trillion: report,” http://www.reuters.com/article/2015/07/08/us-cyberattack-power-surveyidUSKCN0PI0XS20150708, BC) A cyber attack which shuts down parts of the United States' power grid could cost as much as $ 1 trillion to the U.S. economy, according to a report published on Wednesday.∂ Company executives are worried about security breaches, but recent surveys suggest they are not convinced about the value or effectiveness of cyber insurance.∂ The report from the University of Cambridge Centre for Risk Studies and the Lloyd's of London insurance market outlines a scenario of an electricity blackout that leaves 93 million people in New York City and Washington DC without power.∂ scenario, developed by Cambridge, is technologically possible once-in-200-year probability for which insurers should be prepared, the report said.∂ The and is assessed to be within the The hypothetical attack causes a rise in mortality rates as health and safety systems fail, a drop in trade as ports shut down and disruption to transport and infrastructure.∂ "The total impact to the U.S. economy is estimated at $243 billion, rising to more than $1 trillion in the most extreme version of the scenario," the report said. The losses come from damage to infrastructure and business supply chains, and are estimated over a five-year time period.∂ The extreme scenario is built on the greatest loss of power, with 100 generators taken offline, and would lead to insurance industry losses of more than $70 billion, the report added.∂ There have been 15 suspected cyber attacks on the U.S. electricity grid since 2000, the report said, citing U.S. energy department data.∂ The U.S. Industrial Control System Cyber Emergency Response Team said that 32 percent of its responses last year to cyber security threats to critical infrastructure occurred in the energy sector.∂ "The evidence of major attacks during 2014 suggests that attackers were often able to exploit vulnerabilities faster than∂ defenders could remedy them," Tom Bolt, director of performance management at Lloyd's, said in the report. An attack decimates US infrastructure within 15 minutes NYT 10 (Michiko Kakutani, Pulitzer Prize winning book reviewer, citing Richard Clarke, former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, 4-27-10, http://www.nytimes.com/2010/04/27/books/27book.html?pagewanted=all, BC) Blackouts hit New York, Los Angeles, Washington and more than 100 other American cities. Subways crash. Trains derail. Airplanes fall from the sky.∂ Gas pipelines explode. Chemical plants release clouds of toxic chlorine. Banks lose all their data. Weather and communication satellites spin out of their orbits. And the Pentagon’s classified networks grind to a halt, blinding the greatest military power in the world.∂ This might sound like a takeoff on the 2007 Bruce Willis “Die Hard” movie, in which a group of cyberterrorists attempts to stage what it calls a “fire sale”: a systematic shutdown According to the former counterterrorism czar Richard A. Clarke, however, it’s a scenario that could happen in real life — and it could all go down in 15 minutes . While the United States has a first-rate cyberoffense capacity, he says, its lack of a credible defense system, combined with the country’s heavy reliance on technology, makes it highly susceptible to a devastating cyberattack.∂ “The United States is currently far more vulnerable to cyberwar than Russia or China,” he writes. “The U.S. is more at risk from cyberwar than are of the nation’s vital communication and utilities infrastructure. minor states like North Korea. We may even be at risk some day from nations or nonstate actors lacking cyberwar capabilities, but who can hire teams of highly capable hackers.”∂ Lest this sound like the augury of an alarmist, the reader might recall that Mr. Clarke, counterterrorism chief in both the Bill Clinton and George W. Bush administrations, repeatedly warned his superiors about the need for an aggressive plan to there is a lack of coordination between the various arms of the military and various committees in Congress over how to handle a potential attack. Once again, government combat al Qaeda — with only a pallid response before 9/11. He recounted this campaign in his controversial 2004 book, “Against All Enemies.”∂ Once again, agencies and private companies in charge of civilian infrastructure are ill prepared to handle a possible disaster. ∂ In these pages Mr. Clarke uses his insider’s knowledge of national security policy to create a harrowing — and persuasive — picture of the cyberthreat the United States faces today. Mr. Clarke is hardly a lone wolf on the subject: Mike McConnell, the former director of national intelligence, told a Senate committee in February that “ if we were in a cyberwar today, the United States would lose .”∂ And last November, Steven Chabinsky, deputy assistant director for the Federal Bureau of Investigation’s cyber division, noted that the F.B.I. was looking into Qaeda sympathizers who want to develop their hacking skills and appear to want to target the United States’ infrastructure.∂ Mr. Clarke — who wrote this book with Robert K. Knake, an international affairs fellow at the Council on Foreign Relations — argues that because the United States military relies so heavily upon databases and new technology, it is “highly vulnerable to cyberattack. ” And while the newly established Cyber Command, along with the Department of Homeland Security, is supposed to defend the federal government, he writes, “the rest of us are on our own”:∂ “ There is no federal agency that has the mission to defend the banking system, the transportation networks or the power grid from cyberattack .” In fact, The Wall Street Journal reported in April 2009 that the United States’ electrical grid had been penetrated by cyberspies (reportedly from China, Russia and other countries), who left behind software that could be used to sabotage the system in the future. Economic decline causes nuclear war Harris and Burrows ‘9 (Mathew, PhD European History at Cambridge, counselor in the National Intelligence Council (NIC) and Jennifer, member of the NIC’s Long Range Analysis Unit “Revisiting the Future: Geopolitical Effects of the Financial Crisis” http://www.ciaonet.org/journals/twq/v32i2/f_0016178_13952.pdf) Increased Potential for Global Conflict Of course, the report encompasses more than economics and indeed believes the future is likely to be the result of a number of intersecting and interlocking forces. With so many possible permutations of outcomes, each with ample Revisiting the Future opportunity for unintended consequences, there is a growing sense of insecurity. Even so, history may be more instructive than ever. While we continue to Great Depression is not likely to be repeated, the lessons to be drawn from that period include the harmful effects on fledgling democracies and multiethnic societies (think Central Europe in 1920s and 1930s) and on the sustainability of multilateral institutions (think League of Nations in the same period). There is no reason to think that this would not be true in the twenty-first as much as in the twentieth century. For that reason, the ways in which the potential for greater conflict could grow would seem to be even more apt in a constantly volatile economic environment as they would be if change would be steadier. In surveying those risks, the report stressed the likelihood that terrorism and nonproliferation will remain priorities even as resource issues move up on the international agenda. Terrorism’s appeal will decline if economic growth continues in the Middle East and youth unemployment is reduced. For those terrorist believe that the groups that remain active in 2025, however, the diffusion of technologies and scientific knowledge will place some of the world’s most dangerous capabilities within their reach. Terrorist groups in 2025 will likely be a combination of descendants of long established groups_inheriting organizational structures, command and control processes, and training procedures necessary to conduct sophisticated attacks_and newly emergent collections of the angry and disenfranchised that become self-radicalized, particularly in the absence of economic outlets that would become narrower in an economic downturn. The most dangerous casualty of any economically-induced drawdown of U.S. military presence would almost certainly be the Middle East. Although Iran’s acquisition of nuclear weapons is not inevitable, worries about a nuclear-armed Iran could lead states in the region to develop new security arrangements with external powers, acquire additional weapons, and consider pursuing their own nuclear ambitions. It is not clear that the type of stable deterrent relationship that existed between the great powers for most of the Cold War would emerge naturally in the Middle East with a nuclear Iran. Episodes of low intensity conflict and terrorism taking place under a nuclear umbrella could lead to an unintended escalation and broader conflict if clear red lines between those states involved are not well established. The close proximity of potential nuclear rivals combined with underdeveloped surveillance capabilities and mobile dual-capable Iranian missile systems also will produce inherent difficulties in achieving reliable indications and warning of an impending nuclear attack. The lack of strategic depth in neighboring states like Israel, short warning and missile flight times, and uncertainty of Iranian intentions may place more focus on preemption rather than defense, potentially leading to escalating crises. 36 Types of conflict that the world continues to experience, such as over resources, could reemerge, particularly if protectionism grows and there is a resort to neo-mercantilist practices. Perceptions of renewed energy scarcity will drive countries to take actions to assure their future access to energy supplies. In the worst case, this could result in interstate conflicts if government leaders deem assured access to energy resources, for example, to be essential for maintaining domestic stability and the survival of their regime. Even actions short of war, however, will have important geopolitical implications. Maritime security concerns are providing a rationale for naval buildups and modernization efforts, such as China’s and India’s development of blue water naval capabilities. If the fiscal stimulus focus for these countries indeed turns inward, one of the most obvious funding targets may be military. Buildup of regional naval capabilities could lead to increased tensions, rivalries, and counterbalancing moves, but it also will create opportunities for multinational cooperation in protecting critical sea lanes. With water also becoming scarcer in Asia and the Middle East, cooperation to manage changing water resources is likely to be increasingly difficult both within and between states in a more dog-eat-dog world. Grid collapse leads to nuclear meltdowns Cappiello 3/29/11 – national environmental reporter for The Associated Press, master’s degrees in earth and environmental science and journalism from Columbia University (Dina, “Long Blackouts Pose Risk To U.S. Nuclear Reactors” Huffington Post, http://www.huffingtonpost.com/2011/03/29/blackout-risk-us-nuclearreactors_n_841869.html)//IS should power be knocked out it "would be unlikely that power will be recovered in the time frame to prevent core meltdown." A 2003 federal analysis looking at how to estimate the risk of containment failure said that by an earthquake or tornado In Japan, it was a one- two punch: first the earthquake, then the tsunami. Tokyo Electric Power Co., the operator of the crippled plant, found other ways to cool the reactor core and so far avert a full-scale meltdown without electricity. "Clearly the coping duration is an issue on the table now," said Biff Bradley, director of risk assessment for the Nuclear Energy Institute. "The industry and the Nuclear Regulatory Commission will have to go back in light of what we just observed and rethink station blackout duration." David Japan shows what happens when you play beat-the-clock and lose A complete loss of electrical power, generally speaking, poses a major problem for a nuclear power plant because the reactor core must be kept cool, and back-up cooling systems – mostly pumps that replenish the core with water_ require massive amounts of power to work. Without the electrical grid, or diesel generators, batteries can be used for a time, but they will not last long with the power demands. And when the batteries die, the systems that control and monitor the plant can also go dark, making it difficult to ascertain water levels and the condition of the core. One variable not considered in the NRC risk assessments of severe blackouts was cooling water in spent fuel pools, where rods once used in the reactor are placed. With limited resources, the commission decided to focus its analysis on the reactor fuel, which has the potential to release more radiation Lochbaum, a former plant engineer and nuclear safety director at the advocacy group Union of Concerned Scientists, put it another way: " ." Lochbaum plans to use the Japan disaster to press lawmakers and the nuclear power industry to do more when it comes to coping with prolonged blackouts, such as having temporary generators on site that can recharge batteries. . An analysis of individual plant risks released in 2003 by the NRC shows that for 39 of the 104 nuclear reactors, the risk of core damage from a blackout was greater than 1 in 100,000. At 45 other plants the risk is greater than 1 in 1 million, the threshold NRC is using to determine which severe accidents should be evaluated in its latest analysis. The Beaver Valley Power Station, Unit 1, in Pennsylvania had the greatest risk of core melt – 6.5 in 100,000, according to the analysis. But that risk may have been reduced in subsequent years as NRC regulations required plants to do more to cope with blackouts. Todd Schneider, a spokesman for FirstEnergy Nuclear Operating Co., which runs Beaver Creek, told the AP that batteries on site would last less than a week. In 1988, eight years after labeling blackouts "an unresolved safety issue," the NRC required nuclear power plants to improve the reliability of their diesel generators, have more backup generators on site, and better train personnel to restore power. These steps would allow them to keep the core cool for four to eight hours if they lost all electrical power. By contrast, the newest generation of nuclear power plant, which is still awaiting approval, can last 72 hours without taking any action, and a minimum of seven days if water is supplied by other means to cooling pools. Despite the added safety measures, a 1997 report found that blackouts – the loss of on-site and off-site electrical power – remained "a dominant contributor to the risk of core melt at some plants." The events of Sept. 11, 2001, further solidified that nuclear reactors might have to keep the core cool for a longer period without power. After 9/11, the commission issued regulations requiring that plants have portable power supplies for relief valves and be able to manually operate an emergency reactor cooling system when batteries go out. The NRC says these steps, and others, have reduced the risk of core melt from station blackouts from the current fleet of nuclear plants. For instance, preliminary results of the latest analysis of the risks to the Peach Bottom plant show that any release caused by a blackout there would be far less rapid and would release less radiation than previously thought, even without any actions being taken. With more time, people can be evacuated. The NRC says improved computer models, coupled with up-to-date information about the plant, resulted in the rosier outlook. "When you simplify, you always err towards the worst possible circumstance," Scott Burnell, a spokesman for the Nuclear Regulatory Commission, said of the earlier studies. The latest work shows that "even in situations where everything is broken and you can't do anything else, these events take a long time to play out," he said. "Even when you get to releasing into environment, much less of it is released than actually thought." Exelon Corp., the operator of the Peach Bottom plant, referred all detailed questions about its preparedness and the risk analysis back to the NRC. In a news release issued earlier this month, all Exelon nuclear plants are able to safely shut down and keep the fuel cooled even without electricity from the grid a core melt at Peach Bottom could begin in one hour if electrical power on- and off-site were lost, the diesel generators – the main back-up source of power for the pumps that keep the core cool with water – failed to work and other mitigating steps weren't taken. "It is not a question that those things are definitely effective in this kind of scenario," the company, which operates 10 nuclear power plants, said " ." Other people, looking at the crisis unfolding in Japan, aren't so sure. In the worst-case scenario, the NRC's 1990 risk assessment predicted that said Richard Denning, a professor of nuclear engineering at Ohio State University, referring to the steps NRC has taken to prevent incidents. Denning had done work as a contractor on severe accident analyses for the NRC since 1975. He retired from Battelle Memorial Institute in 1995. "They certainly could have made all the difference in this particular case," he said, referring to Japan. "That's assuming you have stored these things in a place that would not have been swept away by tsunami." Nuclear meltdowns cause extinction Lendman 3/13/11 – BA from Harvard University and MBA from Wharton School at the University of Pennsylvania (Stephen, “Nuclear Meltdown in Japan” Rense, http://rense.com/general93/nucmelt.htm) For years, Helen Caldicott warned it's coming. In her 1978 book, "Nuclear Madness," she said: "As a physician, I contend that nuclear technology threatens life on our planet with extinction . If present trends continue, theair we breathe, the food we eat, and the water we drink will soon becontaminated with enough radioactive pollutants to pose a potential health hazard far greater than any plague humanity has ever experienced." More below on the inevitable dangers from commercial nuclear power proliferation, besides added military ones. On March 11, New York Times writer Martin Fackler headlined, "Powerful Quake and Tsunami Devastate Northern Japan," saying: " The 8.9-magnitude earthquake (Japan's strongest ever) set off a devastating tsunami that sent walls of water (six meters high) washing over coastal cities in the north." According to Japan's Meteorological Survey, it was 9.0. The Sendai port city and other areas experienced heavy damage. "Thousands of homes were destroyed, many roads were impassable, trains and buses (stopped) running, and power and cellphones remained down. On Saturday morning, the JR rail company" reported Striking at 2:46PM Tokyo time, it caused vast destruction, shook city skyscrapers, buckled highways, ignited fires, terrified millions, annihilated areas near Sendai, possibly killed thousands, and caused a nuclear meltdown, its potential catastrophic effects far exceeding quake and tsunami devastation, almost minor by comparison under a worst case scenario. On March 12, Times writer three trains missing. Many passengers are unaccounted for. Matthew Wald headlined, "Explosion Seen at Damaged Japan Nuclear Plant," saying: "Japanese officials (ordered evacuations) for people living near two nuclear power plants whose cooling systems broke down," releasing radioactive material, perhaps in far greater amounts than reported. NHK television and Jiji said the 40-year old Fukushima plant's outer structure housing the reactor "appeared to have blown off, which could suggest the containment building had already been breached." Japan's nuclear regulating agency said radioactive levels inside were 1,000 times above normal. Reuters said , under a worst case core meltdown, all bets are off as the entire region and beyond will be threatened with permanent contamination, making the most affected areas unsafe to live in. the 1995 Kobe quake caused $100 billion in damage, up to then the most costly ever natural disaster. This time, from quake and tsunami damage alone, that figure will be dwarfed. Moreover On March 12, Stratfor Global Intelligence issued a "Red Alert: Nuclear Meltdown at Quake-Damaged Japanese Plant," saying: Fukushima Daiichi "nuclear power plant in Okuma, Japan, appears to have caused a reactor meltdown." Stratfor downplayed its seriousness, adding that such an event "does not necessarily mean a nuclear disaster," that already may have happened - the ultimate nightmare short of nuclear winter. According to Stratfor, "(A)s long as the reactor core, which is specifically designed to contain high levels of heat, pressure and radiation, remains intact, the melted fuel can be dealt Chernobyl in 1986. In fact, that disaster killed nearly one million people worldwide from nuclear radiation exposure. In their book titled, "Chernobyl: Consequences of the Catastrophe for People and the Environment," Alexey Yablokov, Vassily Nesterenko and Alexey Nesterenko said: "For the past 23 years, it has been clear that there is a danger greater than nuclear weapons concealed within with. If the (core's) breached but the containment facility built around (it) remains intact, the melted fuel can be....entombed within specialized concrete" as at nuclear power. Emissions from this one reactor exceeded a hundred-fold the radioactive contamination of the bombs dropped on Hiroshima and Nagasaki." "No citizen of any country can be assured that he or she can be protected from radioactive contamination. One nuclear reactor can pollute half the globe. Chernobyl fallout covers the entire Northern Hemisphere." Stratfor explained that if Fukushima's floor cracked, "it is highly likely that the melting fuel will burn through (its) containment system and enter the ground. This has never happened before," at least not reported. If now occurring, "containment goes from being merely dangerous, time consuming and expensive to nearly impossible," making the quake, aftershocks, and tsunamis seem mild by comparison. Potentially, millions of lives will be jeopardized. Japanese officials said Fukushima's reactor container wasn't breached. Stratfor and others said it was, making the potential calamity far worse than reported. Japan's Nuclear and Industrial Safety Agency (NISA) said the explosion at Fukushima's Saiichi No. 1 facility could only have been caused by a core meltdown. In The possibility of an extreme catastrophe can't be discounted. Moreover, independent nuclear safety analyst John Large told Al Jazeera that by venting radioactive steam from the inner reactor to the outer dome, a fact, 3 or more reactors are affected or at risk. Events are fluid and developing, but remain very serious. reaction may have occurred, causing the explosion. "When I look at the size of the explosion," he said, "it is my opinion that there could be a very large leak (because) fuel continues to generate heat." Already, Fukushima way exceeds Three Mile Island that experienced a partial core meltdown in Unit 2. Finally it was brought under control, but coverup and denial concealed full details until much later. If the cooling system fails (apparently it has at two or more plants), the super-heated radioactive fuel rods will melt, and (if so) you could conceivably have an explosion ," that, in fact, occurred. As a result, According to anti-nuclear activist Harvey Wasserman, Japan's quake fallout may cause nuclear disaster, saying: "This is a very serious situation. massive radiation releases may follow, impacting the entire region. "It could be, literally, an apocalyptic event . The reactor could blow." If so, Russia, China, Korea and most parts of Western Asia will be affected. Many thousands will die, potentially millions under a worse case scenario, including far outside East Asia. Moreover, at least five reactors are at risk. Already, a 20-mile wide radius was evacuated. What happened in Japan can occur anywhere. Yet Obama's proposed budget includes $36 billion for new reactors, a shocking disregard for global safety. Calling Fukushima an "apocalyptic event," Wasserman said "(t)hese nuclear plants have to be shut," let alone budget billions for new ones. It's unthinkable, he said. If a similar disaster struck California, nuclear fallout would affect all America, Canada, Mexico, Central America, and parts of South America. Nuclear Power: A Technology from Hell Nuclear expert Helen Caldicott agrees, telling this writer by phone that a potential regional catastrophe is unfolding. Over 30 years ago, she warned of its inevitability. Her 2006 book titled, "Nuclear Power is Not the Answer" explained that contrary to government and industry propaganda, even during normal operations, nuclear power generation causes significant discharges of greenhouse gas emissions, as well as hundreds of thousands of curies of deadly radioactive gases and other radioactive elements into the environment every nuclear plants are atom bomb factories. A 1000 megawatt reactor produces 500 pounds of plutonium annually. Only 10 are needed for a bomb able to devastate a large city, besides causing permanent radiation contamination. year. Moreover, Second is retaliation Cyber terror leads to nuclear exchanges – traditional defense doesn’t apply Fritz 9 (Jason, Master in International Relations from Bond, BS from St. Cloud), “Hacking Nuclear Command and Control,” International Commission on Nuclear Non-proliferation and Disarmament, 2009, pnnd.org)//duncan This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within established cyber terrorists’ capabilities, strategies, and tactics. If access to command and control centres is obtained, terrorists could fake or actually cause one nuclear-armed state to attack another , thus provoking a nuclear response from another nuclear power. This may be an easier alternative for terrorist groups than building or acquiring a nuclear weapon or dirty bomb themselves. This would also act as a force equaliser, and provide terrorists with the asymmetric benefits of high speed, removal of geographical distance, and a relatively low cost. Continuing difficulties in developing computer tracking technologies which could trace the identity of intruders, and difficulties in establishing an internationally agreed upon legal framework to guide responses to computer network operations, point towards an inherent weakness in using computer networks to manage nuclear weaponry. This is particularly relevant to reducing the hair trigger posture of existing nuclear arsenals.¶ All computers which are connected to the internet are susceptible to infiltration and remote control. Computers which operate on a closed network may also be compromised by various hacker methods, such as privilege escalation, roaming notebooks, wireless access points, embedded exploits in software and hardware, and maintenance entry points. For example, e-mail spoofing targeted at individuals who have access to a closed network, could lead to the installation of a virus on an open network. This virus could then be carelessly transported on removable data storage between the open and closed network. Information found on the internet may also reveal how to access these closed networks directly. Efforts by militaries to place increasing reliance on computer networks, including experimental technology such as autonomous systems, and their desire to have multiple launch options, such as nuclear triad capability, enables multiple entry points for terrorists. For example, if a terrestrial command centre is impenetrable, perhaps isolating one nuclear armed submarine would prove an easier task. There is evidence to suggest multiple attempts have been made by hackers to compromise the extremely low radio frequency once used by the US Navy to send nuclear launch approval to submerged submarines. Additionally, the alleged Soviet system known as Perimetr was designed to automatically launch nuclear weapons if it was unable to establish communications with Soviet leadership. This was intended as a retaliatory response in the event that nuclear weapons had decapitated Soviet leadership; however it did not account for the possibility of cyber terrorists blocking communications through computer network operations in an attempt to engage the system. ¶ Should a warhead be launched, damage could be further enhanced through additional computer network operations. By using proxies, multi-layered attacks could be engineered. Terrorists could remotely commandeer computers in China and use them to launch a US nuclear attack against Russia. Thus Russia would believe it was under attack from the US and the US would believe China was responsible. Further, emergency response communications could be disrupted, transportation could be shut down, and disinformation, such as misdirection, could be planted, thereby hindering the disaster relief effort and maximizing destruction. Disruptions in communication and the use of disinformation could also be used to provoke uninformed responses. For example, a nuclear strike between India and Pakistan could be coordinated with Distributed Denial of Service attacks against key networks, so they would have further difficulty in identifying what happened and be forced to respond quickly. Terrorists could also knock out communications between these states so they cannot discuss the situation. Alternatively, amidst the confusion of a traditional large-scale terrorist attack, claims of responsibility and declarations of war could be falsified in an attempt to instigate a hasty military response. These false claims could be posted directly on Presidential, military, and government websites. E-mails could also be sent to the media and foreign governments using the IP addresses and e-mail accounts of government officials. A sophisticated and all encompassing combination of traditional terrorism and cyber terrorism could be enough to launch nuclear weapons on its own, without the need for compromising command and control centres directly. Hegemony Backdoors destroy US tech innovation and competitiveness Kohn 14 (Cindy, writer for the Electronic Freedom Foundation, 9-26-14, “Nine Epic Failures of Regulating Cryptography,” https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulatingcryptography, BC) For those who weren't following digital civil liberties issues in 1995, or for those who have forgotten, here's a refresher list of why forcing companies to break their own privacy and security measures by installing a back door was a bad idea 15 years ago:∂ It will create security risks. Don't take our word for it. Computer security expert Steven Bellovin has explained some of the problems. First, it's hard to secure communications properly even between two parties. Cryptography with a back door adds a third party, requiring a more complex protocol, and as Bellovin puts it: "Many previous attempts to add such features have resulted in new, easily exploited security flaws rather than better law enforcement access." It doesn't end there. Bellovin notes:∂ Complexity in the protocols isn't the only problem; protocols require computer programs to implement them, and more complex code generally creates more exploitable bugs. In the most notorious incident of this type, a cell phone switch in Greece was hacked by an unknown party. The so-called 'lawful intercept' mechanisms in the switch — that is, the features designed to permit the police to wiretap calls easily — was abused by the attacker to monitor at least a hundred cell phones, up to and including the prime minister's. This attack would not have been possible if the vendor hadn't written the lawful intercept code. ∂ More recently, as security researcher Susan Landau explains, "an IBM researcher found that a Cisco wiretapping architecture designed to accommodate law-enforcement requirements — a system already in use by major carriers — had numerous security holes in its design. This would have made it easy to break into the communications network and surreptitiously wiretap private communications."∂ The same is true for Google, which had its "compliance" technologies hacked by China. ∂ This isn't just a problem for you and me and millions of companies that need secure communications. What will the government itself use for secure communications? The FBI and other government agencies currently use many commercial products — the same ones they want to force to have a back door. How will the FBI stop people from un-backdooring their deployments? Or does the government plan to stop using commercial communications technologies altogether? ∂ It won't stop the bad guys. Users who want strong encryption will be able to get it — from Germany, Finland, Israel, and many other places in the world where it's offered for sale and for free. In 1996, the National Research Council did a study called "Cryptography's Role in Securing the Information Society," nicknamed CRISIS. Here's what they said:∂ Products using unescrowed encryption are in use today by millions of users, and such products are available from many difficult-to-censor Internet sites abroad. Users could pre-encrypt their data, using whatever means were available, before their data were accepted by an escrowed encryption device or system. Users could store their data on remote computers, accessible through the click of a mouse but otherwise unknown to anyone but the data owner, such practices could occur quite legally even with a ban on the use of unescrowed encryption. Knowledge of strong encryption techniques is available from official U.S. government publications and other sources worldwide, and experts understanding how to use such knowledge might well be in high demand from criminal elements. — CRISIS Report at 303∂ None of that has changed. And of course, more encryption technology is more readily available today than it was in 1996. So unless the goverment wants to mandate that you are forbidden to run anything that is not U.S. government approved on your devices, they won't stop bad guys from getting access to strong encryption.∂ It will harm innovation . In order to ensure that no "untappable" technology exists, we'll likely see a technology mandate and a draconian regulatory framework . The implications of this for America's leadership in innovation are dire. Could Mark Zuckerberg have built Facebook in his dorm room if he'd had to build in surveillance capabilities before launch in order to avoid government fines? Would Skype have ever happened if it had been forced to include an artificial bottleneck to allow government easy access to all of your peer-to-peer communications? This has especially serious implications for the open source community and small innovators. Some open source developers have already taken a stand against building back doors into software.∂ It will harm US business . If, thanks to this proposal, US businesses cannot innovate and cannot offer truly secure products, we're just handing business over to foreign companies who don't have such limitations . Nokia, Siemens, and Ericsson would all be happy to take a heaping share of the communications technology business from US companies. And it's not just telecom carriers and VOIP providers at risk. Many game consoles that people can use to play over the Internet, such as the Xbox, allow gamers to chat with each other while they play. They'd have to be tappable, too. Data proves Bloomberg, 13 (Allan Holmes, staff writer, 9-10-13, “NSA Spying Seen Risking Billions in U.S. Technology Sales,” http://www.bloomberg.com/news/articles/2013-09-10/nsa-spying-seen-risking-billions-in-u-stechnology-sales, BC) Reports that the National Security Agency persuaded some U.S. technology companies to build so-called backdoors into security products, networks and devices to allow easier surveillance are similar to how the House Intelligence Committee described the threat posed by China through Huawei.∂ Just as the Shenzhen, China-based Huawei lost business after the report urged U.S. companies not to use its equipment, the NSA disclosures may reduce U.S. technology sales overseas by as much as $180 billion, or 25 percent of information technology services, by 2016, according to Forrester Research Inc., a research group in Cambridge, Massachusetts.∂ “ The National Security Agency will kill the U.S. technology industry singlehandedly ,” Rob Enderle, a technology analyst in San Jose, California, said in an interview. “These companies may be just dealing with the difficulty in meeting our numbers through the end of the decade.”∂ Internet companies, network equipment manufacturers and encryption tool makers receive significant shares of their revenue from overseas companies and governments.∂ Cisco Systems Inc., the world’s biggest networking equipment maker, received 42 percent of its $46.1 billion in fiscal 2012 revenue from outside the U.S., according to data compiled by Bloomberg. Symantec Corp., the biggest maker of computer-security software based in Mountain View, California, reported 46 percent of its fiscal 2013 revenue of $6.9 billion from markets other than the U.S., Canada and Latin America.∂ Intel Corp., the world’s largest semiconductor maker, reported 84 percent of its $53.3 billion in fiscal 2012 revenue came from outside the U.S., according to data compiled by Bloomberg.∂ ‘Exact Flipping’∂ The New York Times, the U.K.’s Guardian and ProPublica reported in early September that NSA has cracked codes protecting e-mail and Web content and convinced some equipment and device makers to build backdoors into products.∂ That followed earlier reports that the NSA was obtaining and analyzing communications records from phone companies and Internet providers.∂ The revelations have some overseas governments questioning their reliance on U.S. technology.∂ Germany’s government has called for home-grown Internet and e-mail companies. Brazil is analyzing whether privacy laws were violated by foreign companies. India may ban e-mail services from Google Inc. and Yahoo Inc., the Wall Street Journal reported. In June, China Daily labeled U.S. companies, including Cisco, a “terrible security threat.”∂ “One year ago we had the same concern about Huawei,” James Staten, an analyst at Forrester, said in an interview. “Now this is the exact flipping of that circumstance.”∂ Tarnished Reputations∂ An Information Technology and Innovation Foundation report in August found U.S. providers of cloud services -- which manage the networks, storage, applications and computing power for companies -- stand to lose as much as $35 billion a year as foreign companies, spooked by the NSA’s surveillance, seek non-U.S. offerings.∂ products and services based on a company’s reputation, and “Customers buy the NSA has single-handedly tarnished the reputation of the entire U.S. tech industry ,” said Daniel Castro, the report’s author and an analyst with the non-partisan research group in Washington, in an e-mail. “I suspect many foreign customers are going to be shopping elsewhere for their hardware and software.” Tech leadership in the private sector is uniquely key to heg Segal 4 (Adam, director of the Program on Digital and Cyberspace Policy at the Council on Foreign Relations (CFR), An expert on security issues, technology development, November/December 2004 Issue, “Is America Losing Its Edge,” https://www.foreignaffairs.com/articles/unitedstates/2004-11-01/america-losing-its-edge, BC) The U nited S tates' global primacy depends in large part on its ability to develop new technologies and industries faster than anyone else . For the last five decades, U.S. scientific innovation and technological entrepreneurship have ensured the country's economic prosperity and military power . It was Americans who invented and commercialized the semiconductor, the personal computer, and the Internet; other countries merely followed the U.S. lead.∂ Today, however, this technological edge-so long taken for granted-may be slipping, and the most serious challenge is coming from Asia. Through competitive tax policies, increased investment in research and development (R&D), and preferential policies for science and technology (S&T) personnel, Asian governments are improving the quality of their science and ensuring the exploitation of future innovations. The percentage of patents issued to and science journal articles published by scientists in China, Singapore, South Korea, and Taiwan is rising. Indian companies are quickly becoming the second-largest producers of application services in the world, developing, supplying, and managing database and other types of software for clients around the world. South Korea has rapidly eaten away at the U.S. advantage in the manufacture of computer chips and telecommunications software. And even China has made impressive gains in advanced technologies such as lasers, biotechnology, and advanced materials used in semiconductors, aerospace, and many other types of manufacturing.∂ Although the United States' technical dominance remains solid, the globalization of research and development is exerting considerable pressures on the American system. Indeed, as the United States is learning, globalization cuts both ways: it is both a potent catalyst of U.S. technological innovation and a significant threat to it. The new technologies; it United States will never be able to prevent rivals from developing can remain dominant only by continuing to innovate faster than everyone else. keep its privileged position in the world, the U nited S tates must get better at fostering technological entrepreneurship at home. But this won't be easy; to This is correlation is supported by a consensus of international relations theory Taylor 4 (Massachusetts Institute of Technology research assistant Department of Political Science) (Mark Zachary, Ph.D. candidate, lecturer, “The Politics of Technological Change: International Relations versus Domestic Institutions” http://web.mit.edu/polisci/research/wip/Taylor.pdf) Technological innovation is of central importance to the study of international relations (IR), affecting almost every aspect of the sub-field.2 First and foremost, a nation’s technological capability has a significant effect on its economic growth, industrial might, and military prowess; therefore relative national technological capabilities necessarily influence the balance of power between states, and hence have a role in calculations of war and alliance formation. Second, technology and innovative capacity also determine a nation’s trade profile, affecting which products it will import and export, as well as where multinational corporations will base their production facilities.3 Third, insofar as innovation-driven economic growth both attracts investment and produces surplus capital, a nation’s technological ability will also affect international financial flows and who has power over them.4 Thus, in broad theoretical terms, technological change is important to the study of IR because of its overall implications for both the relative and absolute power of states. And if theory alone does not convince, then history also tells us that nations on the technological ascent generally experience a corresponding and dramatic change in their global stature and influence, such as Britain during the first industrial revolution, the United States and Germany during the second industrial revolution, and Japan during the twentieth century.5 Conversely, great powers which fail to maintain their place at the technological frontier and fade from influence on international scene.6 This is not to suggest that technological innovation alone determines international politics, but rather that shifts in both relative and absolute technological capability have a major impact on international relations, and therefore need to be better understood by IR scholars indirect source of military doctrine. And for some, like Gilpin quoted above, technology is the very cornerstone of great power domination, and its transfer the main vehicle by which war and change occur in world politics.8 Jervis tells us that the balance of offensive and defensive military technology affects the incentives for war.9 Walt agrees, arguing that technological change can alter a state’s aggregate power, and thereby affect both alliance formation and the international balance of threats.10 Liberals are less directly concerned with technological change, but they must admit that by raising or lowering the costs of using force, technological progress affects the rational attractiveness of international cooperation and regimes.11 Technology also lowers information & transactions costs and thus increases the applicability of international institutions, a cornerstone of generally drift Liberal IR theory.12 And in fostering flows of trade, finance, and information, technological change can lead to Keohane’s interdependence13 or Thomas Friedman et al’s globalization.14 Meanwhile, over at the “third debate”, Constructivists cover the causal spectrum on the issue, from Katzenstein’s “cultural norms” which shape security concerns and thereby affect technological innovation;15 to Wendt’s “stripped down technological determinism” in which technology inevitably drives nations to form a world state.16 However most Constructivists seem to favor Wendt, arguing that new technology changes people’s identities within society, and sometimes even creates new cross-national constituencies, thereby affecting international politics.17 Of course, Marxists tend to see technology as determining all social relations and the entire course of history, though they describe mankind’s major fault lines as running between economic classes rather than nation-states.18 Finally, Buzan & Little remind us that without advances in the technologies of transportation, communication, production, and war, international systems would not exist in the first place.19 We control uniqueness, competition among states for relative status is inevitable—promoting US primacy is the only option Wohlforth 09 – Professor of government @ Dartmouth College. [William C. Wohlforth, “Unipolarity, Status Competition, and Great Power War,” World Politics, Volume 61, Number 1, January 2009] Second, I question the dominant view that status quo evaluations are relatively independent of the distribution of capabilities. If the status of states depends in some measure on their relative capabilities, and if states derive utility from status, then different distributions of capabilities may affect levels of satisfaction, just as different income distributions may affect levels of status competition in domestic settings. 6 Building on research in psychology and sociology, I argue that even capabilities distributions among major powers foster ambiguous status hierarchies, which generate more dissatisfaction and clashes over the status quo. And the more stratified the distribution of capabilities, the less likely such status competition is. Unipolarity thus generates far fewer incentives than either bipolarity or multipolarity for direct great power positional competition over status. Elites in the other major powers continue to prefer higher status, but in a unipolar system they face comparatively weak incentives to translate that preference into costly action. And the absence of such incentives matters because social status is a positional good—something whose value depends on how much one has in relation to others.7 “If everyone has high status,” Randall Schweller notes, “no one does.”8 While one actor might increase its status, all cannot simultaneously do so. High status is thus inherently scarce, and competitions for status tend to be zero sum.9 I begin by describing the puzzles facing predominant theories that status competition might solve. Building on recent research on social identity and status seeking, I then show that under certain conditions the ways decision makers identify with the states they represent may prompt them to frame issues as positional disputes over status in a social hierarchy. I develop hypotheses that tailor this scholarship to the domain of great power politics, showing how the probability of status competition is likely to be linked to polarity . The rest of the article investigates whether there is sufficient evidence for these hypotheses to warrant further refinement and testing. I pursue this in three ways: by showing that the theory advanced here is consistent with what we know about large-scale patterns of great power conflict through history; by [End Page 30] demonstrating that the causal mechanisms it identifies did drive relatively secure major powers to military conflict in the past (and therefore that they might do so again if the world were bipolar or multipolar); and by showing that observable evidence concerning the major powers’ identity politics and grand strategies under unipolarity are consistent with the theory’s expectations. Puzzles of Power and War Recent research on the connection between the distribution of capabilities and war has concentrated on a major war arises out of a power shift in favor of a rising state dissatisfied with a status quo defended by a declining satisfied state.10 hypothesis long central to systemic theories of power transition or hegemonic stability: that Though they have garnered substantial empirical support, these theories have yet to solve two intertwined empirical and theoretical puzzles—each of which might be explained by positional concerns for status. First, if the material costs and benefits of a given status quo are what matters, why would a state be dissatisfied with the very status quo that had abetted its rise? The rise of China today naturally prompts this question, but it is hardly a novel situation. Most of the best known and most consequential power transitions in history featured rising challengers that were prospering mightily under the status quo. In case after case, historians argue that these revisionist powers sought recognition and standing rather than specific alterations to the existing rules and practices that constituted the order of the day. In each paradigmatic case of hegemonic war, the claims of the rising power are hard to reduce to instrumental adjustment of the status quo. In R. Ned Lebow’s reading, for example, Thucydides’ account tells us that the rise of Athens posed unacceptable threats not to the security or welfare of Sparta but rather to its identity as leader of the Greek world, which was an important cause of the Spartan assembly’s vote for war. 11 The issues that inspired Louis XIV’s and Napoleon’s dissatisfaction with the status quo were many and varied, but most accounts accord [End Page 31] independent importance to the drive for a position of unparalleled primacy. In these and other hegemonic struggles among leading states in post-Westphalian Europe, the rising challenger’s dissatisfaction is often difficult to connect to the material costs and benefits of the status quo, and much contemporary evidence revolves around issues of recognition and status. 12 Wilhemine Germany is a fateful case in point. As Paul Kennedy has argued, underlying material trends as of 1914 were set to propel Germany’s continued rise indefinitely, so long as Europe remained at peace.13 Yet Germany chafed under the very status quo that abetted this rise and its elite focused resentment on its chief trading partner—the great power that presented the least plausible threat to its security: Great Britain. At fantastic cost, it built a battleship fleet with no plausible strategic purpose other than to stake a claim on global power status. 14 Recent historical studies present strong evidence that, far from fearing attacks from Russia and France, German leaders sought to provoke them, knowing that this would lead to a long, expensive, and sanguinary war that Britain was certain to join.15 And of all the motivations swirling round these momentous decisions, no serious historical account fails to register German leaders’ oft-expressed yearning for “a place in the sun.” The second puzzle is bargaining failure. Hegemonic theories tend to model war as a conflict over the status quo without specifying precisely what the status quo is and what flows of benefits it provides to states.16 Scholars generally follow Robert Gilpin in positing that the underlying issue concerns a “desire to redraft the rules by which relations among nations work,” “the nature and governance of the system,” and “the distribution of territory among the states in the system.” 17 If these are the [End Page 32] issues at stake, then systemic theories of hegemonic war and power transition confront the puzzle brought to the fore in a seminal article by James Fearon: what prevents states from striking a bargain that avoids the costs of war? 18 Why can’t states renegotiate the international order as underlying capabilities distributions shift their relative bargaining power? Fearon proposed that one answer consistent with strict rational choice assumptions is that such bargains are infeasible when the issue at stake is indivisible and cannot readily be portioned out to each side. Most aspects of a given international order are readily divisible, however, and, as Fearon stressed, “both the intrinsic complexity and richness of most matters over which states negotiate and the availability of linkages and side-payments suggest that intermediate bargains typically will exist.”19 Thus, most scholars have assumed that the indivisibility problem is trivial, focusing on two other rational choice explanations for bargaining failure: uncertainty and the commitment problem. 20 In the view of many scholars, it is these problems, rather than indivisibility, that likely explain leaders’ inability to avail themselves of such intermediate bargains. Yet recent research inspired by constructivism shows how issues that are physically divisible can become socially indivisible, depending on how they relate to the identities of decision makers.21 Once issues surrounding the status quo are framed in positional terms as bearing on the disputants’ relative standing, then, to the extent that they value their standing itself, they may be unwilling to pursue intermediate bargaining solutions. Once linked to status, easily divisible issues that theoretically provide opportunities for linkages and side payments of various sorts may themselves be seen as indivisible and thus unavailable as avenues for possible intermediate bargains. The historical record surrounding major wars is rich with evidence suggesting that positional concerns over status frustrate bargaining: expensive, protracted conflict over what appear to be minor issues; a propensity on the part of decision makers to frame issues in terms of relative rank even when doing so makes bargaining harder; decision-makers’ [End Page 33] inability to accept feasible divisions of the matter in dispute even when failing to do so imposes high costs; demands on the part of states for observable evidence to confirm their estimate of an improved position in the hierarchy; the inability of private bargains to resolve issues; a frequently observed compulsion for the public attainment of concessions from a higher ranked state; and stubborn resistance on the part of states to which such demands are addressed even when acquiescence entails limited material cost. The literature on bargaining failure in the context of power shifts remains inconclusive, and it is premature to take any empirical pattern as necessarily probative. Indeed, Robert Powell has recently proposed that indivisibility is not a rationalistic explanation for war after all: fully rational leaders with perfect information should prefer to settle a dispute over an indivisible issue by resorting to a lottery rather than a war certain to destroy some of the goods in dispute. What might prevent such bargaining solutions is not indivisibility itself, he argues, but rather the parties’ inability to commit to abide by any agreement in the future if they expect their relative capabilities to continue to shift.22 This is the credible commitment problem to which many theorists are now turning their attention. But how it relates to the information problem that until recently dominated the formal literature remains to be seen. 23 The larger point is that positional concerns for status may help account for the puzzle of bargaining failure. In the rational choice bargaining literature, war is puzzling because it destroys some of the benefits or flows of benefits in dispute between the bargainers, who would be better off dividing the spoils without war. Yet what happens to these models if what matters for states is less the flows of material benefits themselves than their implications for relative status? The salience of this Mainstream theories generally posit that states come to blows over an international status quo only when it has implications for their security or material well-being. The guiding assumption is that a state’s satisfaction [End Page 34] question depends on the relative importance of positional concern for status among states. Do Great Powers Care about Status? with its place in the existing order is a function of the material costs and benefits implied by that status.24 By that assumption, once a state’s status in an international order ceases to affect its material wellbeing, its relative standing will have no bearing on decisions for war or peace. But the assumption is undermined by cumulative research in disciplines ranging from neuroscience and evolutionary biology to economics, anthropology, sociology, and psychology that human beings are powerfully motivated by the desire for favorable social status comparisons. This research suggests that the preference for status is a basic disposition rather than merely a strategy for attaining other goals.25 People often seek tangibles not so much because of the welfare or security they bring but because of the social status they confer. Under certain conditions, the search for status will cause people to behave in ways that directly contradict their material interest in security and/or prosperity. Pg. 33-35//1ac Heg is key to global stability and solves major conflicts Thayer 6 (Associate Professor of Defense and Strategic Study @ Missouri State University, Former Research Fellow @ International Security Program @ Harvard Belfer Center of Science and International Affairs (Bradley, “In Defense of Primacy,” The National Interest, November/December) A grand strategy based on American primacy means ensuring the United States stays the world's number one power-the diplomatic, economic and military leader. Those arguing against primacy claim that the United States should retrench, either because the United States lacks the power to maintain its primacy and should withdraw from its global commitments, or because the maintenance of primacy will lead the United States into the trap of "imperial overstretch." In the previous issue of The National Interest, Christopher Layne warned of these dangers of primacy and called for retrenchment.1 Those arguing for a grand strategy of retrenchment are a diverse lot. They include isolationists, who want no foreign military commitments; selective engagers, who want U.S. military commitments to centers of economic might; and offshore balancers, who want a modified form of selective engagement that would have the United States abandon its landpower presence abroad in favor of relying on airpower and seapower to defend its interests. But retrenchment, in any of its guises, must be avoided. If the United States adopted such a strategy, it would be a profound strategic mistake that would lead to far greater instability and war in the world, imperil American security and deny the United States and its allies the benefits of primacy. There are two critical issues in any discussion of America's grand strategy: Can America remain the dominant state? Should it strive to do this? America can remain dominant due to its prodigious military, economic and soft power capabilities. The totality of that equation of power answers the first issue. The United States has overwhelming military capabilities and wealth in comparison to other states or likely potential alliances. Barring some disaster or tremendous folly, that will remain the case for the foreseeable future. With few exceptions, even those who advocate retrenchment acknowledge this. So the debate revolves around the desirability of maintaining American primacy. Proponents of retrenchment focus a great deal on the costs of U.S. action but they fall to realize what is good about American primacy. The price and risks of primacy are reported in newspapers every day; the benefits that stem from it are not. A GRAND strategy of ensuring American primacy takes as its starting point the protection of the U.S. homeland and American oil flow around the world, that the global trade and global interests. These interests include ensuring that critical resources like monetary regimes flourish and that Washington's worldwide network of allies is reassured and protected. Allies are a great asset to the United States, in part because they shoulder some of its burdens. Thus, it is no surprise to see NATO in Afghanistan or the Australians in East Timor. In contrast, a strategy based on retrenchment will not be able to achieve these fundamental objectives of the United States. Indeed, retrenchment will make the United States less secure than the present grand strategy of primacy. This is because threats will exist no matter what role America chooses to play in international politics. Washington cannot call a "time out", and it cannot hide from threats. Whether they are terrorists, rogue states or rising powers, history shows that threats must be confronted. Simply by declaring that the United States is "going home", thus abandoning its commitments or making unconvincing half-pledges to defend its interests and allies, does not mean that others will respect American wishes to retreat. To make such a declaration implies weakness and emboldens aggression. In the anarchic world of the animal kingdom, predators prefer to eat the weak rather than confront the strong. The same is true of the anarchic world of international politics. If there is no diplomatic solution to the threats that confront the United States, then the conventional and strategic military power of the United States is what protects the country from such threats. And when enemies must be confronted, a strategy based on primacy focuses on engaging enemies overseas, away from .American soil. Indeed, a key tenet of the Bush Doctrine is to attack terrorists far from America's shores and not to wait while they use bases in other countries to plan and train for attacks against the United States itself. This requires a physical, on-the-ground presence that cannot be achieved by offshore balancing. Indeed, as Barry Posen has noted, U.S. primacy is secured because America, at present, commands the "global common"--the oceans, the world's airspace and outer space-allowing the United States to project its power far from its borders, while denying those common avenues to its enemies. As a consequence, the costs of power projection for the United States and its allies are reduced, and the robustness of the United States' conventional and strategic deterrent capabilities is increased.' This is not an advantage that should be relinquished lightly. A remarkable fact about international politics today--in a world where American primacy is clearly and unambiguously on display--is that countries want to align themselves with the United States. Of course, this is not out of any sense of altruism, in most cases, but because doing so allows them to use the power of the United States for their own purposes, their own protection, or to gain greater influence. Of 192 countries, 84 are allied with America--their security is tied to the United States through treaties and other informal arrangements-and they include almost all of the major economic and military powers. That is a ratio of almost 17 to one (85 to five), and a big change from the Cold War when the ratio was about 1.8 to one of states U.S. primacy--and the bandwagoning effect-has also given us extensive influence in international politics, allowing the aligned with the United States versus the Soviet Union. Never before in its history has this country, or any country, had so many allies. United States to shape the behavior of states and international institutions. Such influence comes in many forms, one of which is America's ability to create coalitions of like-minded states to free Kosovo, stabilize Afghanistan, invade Iraq or to stop proliferation through the Proliferation Security Initiative (PSI). Doing so allows the United States to operate with allies outside of the where it can be stymied by opponents. American-led wars in Kosovo, Afghanistan and Iraq stand in contrast to the UN's inability to save the people of Darfur or even to conduct any military campaign to realize the goals of its charter. The quiet effectiveness of the PSI in dismantling Libya's WMD programs and unraveling the A. Q. Khan proliferation network are in sharp relief to the typically toothless attempts by the UN to halt proliferation. You can count with one hand countries opposed to the United States. They are the "Gang of Five": China, Cuba, Iran, North Korea and Venezeula. Of course, countries like India, for example, do not agree with all policy choices made by the United States, such as toward Iran, but New Delhi is friendly to Washington. Only the "Gang of Five" may be expected to consistently resist the agenda and actions of the United States. China is clearly the most important of these states because it is a rising great power. But even Beijing is intimidated by the United States and refrains from openly challenging U.S. power. China proclaims that it will, if necessary, resort to other mechanisms of challenging the United States, including asymmetric strategies such as targeting communication and intelligence satellites upon which the United States depends. But China may not be confident those strategies would work, and so it is likely to refrain from testing the United States directly for the foreseeable future because China's power benefits, as we shall see, from the international order U.S. primacy creates. The other states are far weaker than China. For three of the "Gang of Five" cases--Venezuela, Iran, Cuba-it is an anti-U.S. regime that is the source of the problem; the country itself is not intrinsically anti-American. Indeed, a change of regime in Caracas, Tehran or Havana could very well reorient relations. THROUGHOUT HISTORY, peace and stability have been great benefits of an era where there was a dominant power--Rome, Britain or the United States today. Scholars and statesmen have long recognized the irenic the current international order - free trade, a robust monetary regime, increasing respect for human rights, growing democratization--is directly linked to U.S. power. Retrenchment proponents seem to think that the current system can be maintained without the effect of power on the anarchic world of international politics. Everything we think of when we consider current amount of U.S. power behind it. In that they are dead wrong and need to be reminded of one of history's most significant lessons: Appalling things happen when international orders collapse. The Dark Ages followed Rome's collapse. Hitler succeeded the order established at Versailles. Without U.S. power, the liberal order created by the United States will end just as assuredly. As country and western great Rai Donner sang: "You don't know what you've got (until you lose it)." Consequently, it is important to note what those good things are. In addition to ensuring the security of the United States and its allies, American primacy within the international system causes many positive outcomes for Washington and the world. The first has been a more peaceful world. During the Cold War, U.S. leadership reduced friction among many states that were historical antagonists, most notably France and West Germany. Today, American primacy helps keep a number of complicated relationships aligned--between Greece and Turkey, Israel and Egypt, South Korea and Japan, India and Pakistan, Indonesia and Australia. This is not to say it fulfills Woodrow Wilson's vision of ending all war. Wars still occur where Washington's interests are not seriously threatened, such as in Darfur, but a Pax Americana does reduce war's likelihood, particularly war's worst form: great power wars. Second, American power gives the United States the ability to spread democracy and other elements of its ideology of liberalism. Doing so is a source of much good for the countries concerned as well as the United States because, as John Owen noted on these pages in the Spring 2006 issue, liberal democracies are more likely to align with the United States and be sympathetic to the American worldview.3 So, spreading democracy helps maintain U.S. primacy. In addition, once states are governed democratically, the likelihood of any type of conflict is significantly reduced. This is not because democracies do not have clashing interests. Indeed they do. Rather, it is because they are more open, more transparent and more likely to want to resolve things amicably in concurrence with U.S. leadership. And so, in general, democratic states are good for their citizens as well as for advancing the interests of the United States. Critics have faulted the Bush Administration for attempting to spread democracy in the Middle East, labeling such an effort a modern form of tilting at windmills. It is the obligation of Bush's critics to explain why democracy is good enough for Western states but not for the rest, and, one gathers from the argument, should not even be attempted. Of course, whether democracy in the Middle East will have a peaceful or stabilizing influence on America's interests in the short run is open to question. Perhaps democratic Arab states would be more opposed to Israel, but nonetheless, their people would be better off. The United States has brought democracy to Afghanistan, where 8.5 million Afghans, 40 percent of them women, voted in a critical October 2004 election, even though remnant Taliban forces threatened them. The first free elections were held in Iraq in January 2005. It was the military power of the United States that put Iraq on the path to democracy. Washington fostered democratic governments in Europe, Latin America, Asia and the Caucasus. Now even the Middle East is increasingly democratic. They may not yet look like Western-style democracies, but democratic progress has been made in Algeria, Morocco, Lebanon, Iraq, Kuwait, the Palestinian Authority and Egypt. By all accounts, the march of democracy has been impressive. Third, along with the growth in the number of democratic states around the world has been the growth of the global economy. With its allies, the United States has labored to create an economically liberal worldwide network characterized by free trade and commerce, respect for international property rights, and mobility of capital and labor markets. The economic stability and prosperity that stems from this economic order is a global public good from which all states benefit, particularly the poorest states in the Third World. The United States created this network not out of altruism but for the benefit and the economic well-being of America. This economic order forces American industries to be competitive, maximizes efficiencies and growth, and benefits defense as well because the size of the economy makes the defense burden manageable. Economic spin-offs foster the development of military technology, helping to ensure military prowess. Perhaps the greatest testament to the benefits of the economic network comes from Deepak Lal, a former Indian foreign service diplomat and researcher at the World Bank, who started his career confident in the socialist ideology of post-independence India. Abandoning the positions of his youth, market economic policies and globalization, which are facilitated through American primacy.4 As a witness to the failed Lal now recognizes that the only way to bring relief to desperately poor countries of the Third World is through the adoption of free alternative economic systems, Lal is one of the strongest academic proponents of American primacy due to the economic prosperity it provides. Plan The United States federal government should prohibit federal agencies from mandating the deployment of vulnerabilities in domestic data security technologies. Solvency The plan bans backdoors entirely—that strengthens cyber security and revitalizes tech competitiveness McQuinn, 14 (Alan McQuinn is a research assistant with the Information Technology and Innovation Foundation (ITIF), “The Secure Data Act could help law enforcement protect against cybercrime,” 12-19-14, http://thehill.com/blogs/congress-blog/technology/227594-the-securedata-act-could-help-law-enforcement-protect-against, BC) Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op-ed describing the role that U.S. law enforcement should play in fostering stronger data encryption to make information technology (IT) systems more secure. This op-ed explains Wyden’s introduction of the the Secure Data Act, which would prohibit the government from mandating that U.S. companies build “backdoors” in their products for the purpose of surveillance . This legislation responds directly to recent comments by U.S. officials, most notably the Federal Bureau of Investigation (FBI) Director James Comey, chastising Apple and Google for creating encrypted devices to which law enforcement cannot gain access. Comey and others have argued that U.S. tech companies should design a way for law enforcement officials to access consumer data stored on those devices. In this environment, the Secure Data Act is a homerun for security and privacy and is a good step towards reasserting U.S. competitiveness in building secure systems for a global market. ∂ By adopting its position on the issue the FBI is working against its own goal of preventing cybercrime as well as broader government efforts to improve cybersecurity. Just a few years ago, the Bureau was counseling people to better encrypt their data to safeguard it from hackers. Creating backdoor access for law enforcement fundamentally weakens IT systems because it creates a new pathway for malicious hackers, foreign governments, and other unauthorized parties to gain illicit access. Requiring backdoors is a step backwards for companies actively working to eliminate security vulnerabilities in their products. In this way, security is a lot like a ship at sea, the more holes you put in the system—government mandated or not—the faster it will sink. The better solution is to patch up all the holes in the system and work to prevent any new ones. Rather than decreasing security to suit its appetite for surveillance, the FBI should recognize that better security is needed to bolster U.S. defenses against online threats. ∂ The Secure Data Act is an important step in that direction because it will stop U.S. law enforcement agencies from requiring companies to introduce vulnerabilities in their products. If this bill is enacted, law enforcement will be forced to use other means to solve crimes, such as by using metadata from cellular providers, call records, text messages, and even old-fashioned detective work. This will also allow U.S. tech companies, with the help of law enforcement, to continue to strengthen their systems, better detect intrusions, and identify emerging threats. Law enforcement, such as the recently announced U.S. Department of Justice Cybersecurity Unit—a unit designed solely to “deter, investigate, and prosecute cyber criminals,” should work in cooperation with the private sector to create a safer environment online. A change of course is also necessary to restore the ability of U.S. tech companies to compete globally , where mistrust has run rampant following the revelations of mass government surveillance. ∂ With the 113th Congress at an end, Wyden has promised to reintroduce the Data Secure Act again in the next Congress. Congress should move expediently to advance Senator Wyden’s bill to promote security and privacy in U.S. devices and software. Furthermore, as Congress marks up the legislation and considers amendments, it should restrict not just government access to devices, but also government control of those devices. These efforts will move the efforts of our law enforcement agencies away from creating cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable. Closing backdoors strengthens digital security—that doesn’t trade off with law enforcement priorities Bankston 15 (Kevin Bankston is the Director of New America’s Open Technology Institute and Co-Director of New America’s Cybersecurity Initiative, 7-7-15, “It’s Time to End the “Debate” on Encryption Backdoors,” http://justsecurity.org/24483/end-debate-encryption-backdoors/, BC) Tech companies, privacy advocates, security experts, policy experts, all five members of President Obama’s handpicked Review Group on Intelligence and Communications Technologies, UN human rights experts, and a majority of the House of Representatives all agree: Government-mandated backdoors are a bad idea . There are countless reasons why this is true, including: They would unavoidably weaken the security of our digital data, devices, and communications even as we are in the midst of a cybersecurity crisis; they would cost the US tech industry billions as foreign customers — including many of the criminals Comey hopes to catch — turn to more secure alternatives; and they would encourage oppressive regimes that abuse human rights to demand backdoors of their own.∂ Most of these arguments are not new or surprising. Indeed, it was for many of the same reasons that the US government ultimately rejected the idea of encryption backdoors in the 90s, during what are now called the “Crypto Wars.” We as a nation already had the debate that Comey is demanding — we had it 20 years ago! — and the arguments against backdoors have only become stronger and more numerous with time. Most notably, the 21st century has turned out to be a “Golden Age for Surveillance ” for the government. Even with the proliferation of encryption, law enforcement has access to much more information than ever before: access to cellphone location information about where we are and where we’ve been, metadata about who we communicate with and when, and vast databases of emails and pictures and more in the cloud. So, the purported law enforcement need is even less compelling than it was in the 90s . Meanwhile, the security implications of trying to mandate backdoors throughout the vast ecosystem of digital communications services have only gotten more dire in the intervening years, as laid out in an exhaustive new report issued just this morning by over a dozen heavy-hitting security experts.∂ Yesterday, Comey conceded that after a meaningful debate, it may be that we as a people decide that the benefits of widespread encryption outweigh the costs and that there’s no sensible, technically feasible way to guarantee government access to encrypted data. But the fact is that we had that debate 20 years ago, and we’ve been having it again for nearly a year. We are not talking past each other; a wide range of advocates, industry stakeholders, policymakers, and experts has been speaking directly to Comey’s arguments since last fall. Hopefully he will soon start listening, rather than dooming us to repeat the mistakes of the past and dragging us into another round of Crypto Wars.∂ We have already had the debate that Comey says he wants. All that’s left is for him to admit that he’s lost.