Wake DW 1AC India Kentucky

advertisement
WAKE DW
Plan Text
TEXT: The United State federal government should remove the annual cap
on H-1B visas for all applicants from India specializing in biotechnology
1
WAKE DW
2
WAKE DW
Contention 1: The Status Quo
Companies are still seeking H1B’s-the cap will be filled by this year
NFAP 10
2010, National Foundation for American Policy, “NFAP Policy Brief”, March 2010
In recent years, U.S. Citizenship and Immigration Services (USCIS) has accepted H-1B applications for the next
fiscal year on April 1. As predicted in a March 2009 NFAP Policy Brief, the H-1B quota (and the
exemption fo graduate degree holders) was exhausted before the end of the 2010 fiscal year. 1 According to U.S.
Citizenship and Immigration Services, the final receipt date for the FY 2010 cap was December 21, 2009. 2 With the general
improvement in the economy in the first half of 2010, it is reasonable to assume employers will see
the H-1B quota exhausted in a similar fashion (or earlier) in FY 2011. The primary reason is the
annual quota of 65,000 (plus a 20,000 exemption for those with advanced degrees from a U.S.
university) is small relative to the size o the U.S. economy and labor force. There is no
evidence that during the long periods of time when no foreign nationals could receive new H-1B
petitions the job market improved for U.S. workers or professionals. The demand for skilled
foreign nationals has generally been so high and the quota so low that it has created problems for
employers. During a one-week filing window in April 2008, U.S. Citizenship and Immigration
Services (USCIS) received 163,000 H-1B applications, nearly twice as many petitions as slots available under the FY 2009
quota of 65,000, plus 20,000 for advanced degree holders from U.S. universities. The petitions were awarded to employers by lottery and no new
H-1B petitions could be issued the remainder of the fiscal year.
Even when the economy is uncertain, employers
still seek talented people on an ongoing basis. Moreover, even firm that downsize in one part of a
company may be hiring in another part
Despite drops in overall applicants India still needs more visas
The Economic Times 9
Indiatimes is the most popular Internet and mobile value-added services destination for the global Indian.
The Economic Times, “India to ask US for more H-1B visas”, 19 Oct 2009, http://economictimes.indiatimes.com/articleshow/5137427.cms?prtpage=1
NEW DELHI: India is likely to ask the United States to raise the cap on visas for skilled workers at the bilateral trade
forum meeting to be held in New Delhi later this month, a government official told ET. India may also push for a special mechanism for Indian
professionals travelling to the US for short-term assignments arising out of contractual obligations. The issue of a more liberal and
simple US visa regime for professionals will be high on India’s agenda at the bilateral meeting to be chaired by Indian
commerce minister Anand Sharma and the US trade representative Ron Kirk, the official said. H-1B visas, which are non-immigrant
US visas for skilled professionals, given for up to six years, are highly popular with Indian IT companies
such as Infosys, Wipro, TCS and Satyam, which usually corner a big chunk of such visas issued by the US.
The subsidiaries of these companies in the US usually employ H-1B visa professionals to deliver services at
customer’s location. “The number of world-wide H-1B visas issued to professionals was reduced by more
than half to 65,000 per year about two years back. This has affected the functioning of Indian companies in
the US, especially ones in the IT sector,” the official said. He added that India was keen on taking up with
the new US government the issue of a possible increase in the cap on such visas. Although, this year, the
entire quota of 65,000 H-1B visas has not yet been utilised because of the on-going global economic slow
down, the official pointed out that it was a temporary phase and the demand for US work visas would soar
the moment the global economy began to look up. India is also likely to discuss with the US delegation the legislation introduced
by two US Senators seeking a restriction on the number of H-1B visas that can be issued to a company so as to bring about a balance between the
number of foreigners and Americans employed by it. This will again impact Indian IT companies in the US which mostly use Indian software
professionals to deliver services there. Commerce and industry minister Mr Sharma has already raised these issues with Mr Kirk in his recent visit
to Washington DC. India has been raising the issue of a more liberal visa regime and a higher number of work
visas also multilaterally at the World Trade Organisation.
3
WAKE DW
An increase in experienced professionals is key
Pharmabiz 8
Indian phramacetuical magazine
(“"India needs more biotech companies", July 31, 2008, http://www.pharmabiz.com/article/detnews.asp?articleid=45456&sectionid=50)
We have made significant progress, though it has not been an all round development. Biotechnology will
play an increasingly important role in society. The more we face a resource crunch, the more our current
solutions become incapable of dealing with everyday problems. The broad ability of the applications of
biotechnology to touch almost every aspect of human existence is truly amazing. Biotechnology has an impact on the food
we eat, the clothes we wear, the fuel we drive with and the medicines we use, to name a few. India is fortunate to have a government
department that is aware of these potential applications and is actively promoting the applications of
biotechnology within the country. The industry has touched $2.5 billion. What are the factors needed to take the sector to the next level of growth?
What is missing is execution. While there is a general awareness of what is possible with biotechnology,
there is a shortage of experienced people who can translate this awareness into reality. Also, there is a dearth
of people who have first-hand practical experience in the implementation of various facets of
biotechnology. Manpower coupled with an entrepreneurship and risk encouraging environment is what is
needed to create more biotechnology led enterprises. It is not enough to have just one Serum Institute or Biocon or even a Shantha
Biotech. These enterprises were created by people who were aware of what biotechnology could do and who
were willing to take risk. We need more biotechnology companies in India working on various applications
of biotechnology.
More specifically, there’s a shortage of experienced bioinformaticists with necessary
industry skills
Exim Bank 10
India’s official/govt export bank, The premier export finance institution of the country, set up in 1982 under the Export-Import Bank of
India Act 1981. Government of India launched the institution with a mandate.
(BIOTECHNOLOGY INDUSTRY IN INDIA: OPPORTUNITIES FOR GROWTH, January, 28, 2010, http://www.businessinfo.cz/files/zahranicniobchod/Indie_Biotechnology_Industry_100128.pdf
BioInformatics. The share of BioInformatics in total revenue of Indian biotechnology sector is around 1.8% in 2008-09. This sub segment achieved
a modest growth, increasing from Rs. 190 crore in 2007-08 to Rs. 220 crore in 2008-09, at 15.7%. The industry has been found to be more export
oriented with around 77% of the total revenues coming from offshore markets in the year 2008-09. BioInformatics uses computer software tools for
database creation, data management, data warehousing, data mining, and global communication network. With the Indian IT industry eyeing for
diversification of software applications, BioInformatics poses as another potential area for IT application. The Indian
firms have been strategically devising tools so as to cater to the world requirements .
Emerging Areas in
Biotechnology Biosimilars The expiry of patent protection and regulatory data protection for certain biotechnological medicines has led to the
development of product groups that are called as biosimilars. As regulatory obstacles to biosimilars development is increasingly being resolved,
opportunities are expected to be created for generic companies in the BioPharmaceutical market. According to Datamonitor, the Indian biosimilars
market will grow to more than US$ 2 billion by 2014, as patents for key drugs are likely to expire soon. Nanotechnology From an Indian context,
nanotechnology is at a very nascent stage, but given the potential of the sector, it is expected to grow at a robust pace in the coming years. In fact,
nanotechnology has the potential to revolutionize the Indian agriculture scenario. It is also predicted that nanotechnology will transform the entire
food industry, changing the way food is produced, processed, packaged, transported, and consumed. In recent years there has been convergence of
nanotechnology and biotechnology. Stem Cell Research Stem cell research is being touted as the next wave of biotechnology not only in India but
also across the world, which could potentially revolutionize treatment of diseases in the next couple of decades. According to a study by Frost &
Sullivan, the global market for stem cell therapy is expected to be around US$ 20 billion by 2010. The Stem Cell Research Forum India has
predicted that India would have a market size of about US$ 540 million by 2010 with an annual growth rate of 15%. The potential of stem cell
technology to develop therapy for many untreatable diseases through cellular replacement or tissue engineering is being widely recognized.
Challenges Skill Development Despite mushrooming educational institutions, offering a range of courses in
biotechnology, the gap between the needs of the industry and skills taught at these institutions still remain,
though the gap is being narrowed down. It has also been mentioned that most of these institutions have limited ability
to provide the right pedagogy, or the requisite infrastructure. The challenge of bridging the gap between the
needs of the industry and the curricula taught at various institutions should be collectively addressed by the
Government, industry and academia.
4
WAKE DW
Advantage 1: Food
Scenario 1: Prices
Food prices rising now—current shortfalls are threatening their food security which
threatens to make globally high prices uncontrollable
Menon 11
Jan 3, Anjana Menon is executive editor, NDTV Profit, One of India’s largest syndicates providing latest economic news from India
(“Food security to be this decade's biggest worry”, January 3, 2011, http://www.rediff.com/business/report/food-security-to-be-biggestworry/20110103.htm)
Runaway food prices are here to stay and taming that will need far greater structural changes
than temporary clampdowns on hoarding and exports. If the last decade was about India's economic
growth, food security is what we should worry about this decade. As the economy expands,
India's hungry mouths are going to open wider and want more variety and quantity of food.
The growth in population and incomes will mean that as we munch our agricultural
production, we will also be forced, increasingly, to use our stock of greenbacks to buy food
in the international marketplace. Our enormous consumption will do to food prices what China's
lightning-paced build-up has done to commodity prices - push them on a one-way street, up north.
Anyone can see this coming, but India's complacency is somewhat comical. In many ways, the
government may have aided the food predicament without realising how great a role it has
played in shaping it. Its zeal in implementing the rural employment guarantee plan and other social sector schemes has put money into
the hands of thousands who previously had frugal access to food, if at all. Getting food to all is most certainly a good
thing especially when you consider how an economy growing at almost 9 per cent annually
still needs to have a plan in place for such a fundamental right. So while we've earned big brownie points on that score, we lose heavily on
how poorly we have anticipated our food needs. Agriculture accounts for only about 15 per cent of our gross domestic
product, and our crop yields are still low. The World Bank estimates that rice yields in India are a third of
China, and half of Vietnam. Given that all countries have a finite amount of natural
resources available to them, the only option is to vastly step up investment in improving
agricultural productivity per hectare. The government, however, over the years seems to have
focussed quite heavily on providing subsidies to the sector. Subsidies, while politically popular and sometimes necessary,
eventually rob us of greater efficiency, because they makes us lazy towards cost effective
innovation. Agriculture has lagged when it comes to better seeds, technology and improved
farming practices. Weather patterns world over are getting harder to predict and our own hapless
dependence on Mr Monsoon has already taught us that we will have to be in a constant state
of preparedness for bailouts and imports, as we haven't developed a dependable irrigation
system as a substitute. Our troubles don't quite end there. We already know of wheat rotting for lack of storage and onions getting
soaked in unseasonal rain. Much as we may claim buffer stocks, rotting food reserves are as much use to us as baby clothes to a teenager. It's time
we took storage and distribution out of government hands and gave it to the private sector to do it effectively, with pay-outs and penalties for targets
met and slipped, so it remains efficient and without leakages. As urbanisation and industrial projects compete for
land, some agricultural land will no doubt be swallowed up. Farmers have been arguing that the
increase in basic minimum wage as a result of the employment guarantee program has made labour scarce and
expensive, making farming less lucrative. Add all of this up, and ensuring food security
looks like the biggest challenge India's likely to battle. To depend increasingly on external
markets to rescue us, while dragging our feet on improvements at home, will likely end in
tears, not just over onions but in wasted greenbacks as well.
Indian shortfalls push up global prices—increased production is key
Kumar 8
Hari, Health and Society in South Asia South Asia Institute, University of Heidelberg.
5
WAKE DW
“In Fertile India, Growth Outstrips Agriculture”, New York Times,
http://www.nytimes.com/2008/06/22/business/22indiafood.html?_r=1&adxnnl=1&pagewanted=2&adxnnlx=12949704339wW/vtumcQFBFaPnORKUyA)
The gains of the Green Revolution have begun to ebb in other countries, too, like Indonesia and the
Philippines, agriculture experts say. But the implications in India are greater because of its sheer size.
India raised a red flag two years ago about how heavily the appetites of its 1.1 billion people
would weigh on world food prices. For the first time in many years, India had to import wheat for its
grain stockpile. In two years it bought about 7 million tons. Today, two staples of the Indian
diet are imported in ever-increasing quantities because farmers cannot keep up with growing
demand — pulses, like lentils and peas, and vegetable oils, the main sources of protein and calories, respectively, for most Indians. “India
could be a big actor in supplying food to the rest of the world if the existing agricultural
productivity gap could be closed,” said Adolfo Brizzi, manager of the South Asia agriculture program at the World Bank in
Washington. “When it goes to the market to import, it typically puts pressure on international
market prices, and every time India goes for export, it increases the supply and therefore
mitigates the price levels.” In April, in a village called Udhopur, not far from here, Harmail Singh, 60, wondered aloud how farmers
could possibly be expected to grow more grain. “The cultivable land is shrinking and government policies are not farmer
friendly,” he said as he supervised his wheat harvest. “Our next generation is not willing to work in agriculture. They say it is a losing proposition.”
The luckiest farmers make more money selling out to land-hungry mall developers. Gurmeet Singh Bassi, 33, blessed with a farm on the edges of a
booming Punjabi city called Ludhiana, sold off most of his ancestral land. Its value had grown more than fivefold in two years. He made enough to
buy land in a more remote part of the state and hire laborers to till it. Meanwhile, Mr. Chawla’s neighbors migrated to North America. They were
happy to lease their land to him, if he was foolish enough to stay and work it, he said. Today, he cultivates more than 100 acres. Last year, on a small
patch of that land, he planted what no one in his village could imagine putting on their plate: baby corn, which he learned was being lapped up by
upscale urban Indian restaurants and even sold abroad. At the time, baby corn brought a better profit than the government’s price for his wheat
crop.
That risks extinction
Winnail 96
Douglas S Winnail
Dr. Winnail holds a Ph.D. in Anatomy and Preventive Medicine from University of Mississippi and an M.P.H. in Health
Education, Nutrition & International Health from Loma Linda University School of Public Health.
Ph.D., M.P.H, 1996, On the Horizon: Famine, the world ahead, September/October, http://www.kurtsaxon.com/foods004.htm
As a result grain prices are the highest on record. Worldwatch Institute's president, Lester Brown, writes, "No other economic
indicator is more politically sensitive that rising food prices.... Food prices spiraling out of
control could trigger not only economic instability but widespread political upheavals"-even wars. The chaotic weather conditions we have been experiencing appear to be related to global warming caused by the release of
pollutants into the earth's atmosphere. A recent article entitled "Heading for Apocalypse?" suggests the effects of global warming--and its side
effects of increasingly severe droughts, floods and storms--could be catastrophic, especially for agriculture. The unpredictable shifts in temperature
and rainfall will pose an increased risk of hunger and famine for many of the world's poor. With world food stores dwindling,
grain production leveling off and a string of bad harvests around the world, the next couple
of years will be critical. Agricultural experts suggest it will take two bumper crops in a row to bring supplies back up to normal.
However, poor harvests in 1996 and 1997 could create severe food shortages and push millions over
the edge. Is it possible we are only one or two harvests away from a global disaster? Is there any significance to what is happening today?
Where is it all leading? What does the future hold? The clear implication is that things will get worse before they get better. Wars, famine
and disease will affect the lives of billions of people! Although famines have occurred at
various times in the past, the new famines will happen during a time of unprecedented
global stress--times that have no parallel in recorded history--at a time when the total
destruction of humanity would be possible! Is it merely a coincidence that we are seeing a growing menace of famine on a
global scale at a time when the world is facing the threat of a resurgence of new and old epidemic diseases, and the demands of an exploding
population? These are pushing the world's resources to its limits! The world has never before
faced such an ominous series of potential global crises at the same time! However, droughts and
shrinking grain stores are not the only threats to world food supplies. According to the U.N.'s studies, all 17 major fishing areas in the world have
either reached or exceeded their natural limits. In fact, nine of these areas are in serious decline. The realization that we may be facing a shortage of
food from both oceanic and land-based sources is a troubling one . It's troubling because seafood--the world's leading source of animal protein-could be depleted quite rapidly. In the early 1970s, the Peruvian anchovy catch--the largest in the world--collapsed from 12 million tons to 2 million
in just three years from overfishing. If this happens on a global scale, we will be in deep trouble. This
precarious situation is also without historical precedent!
Scenario 2: Indo-Pak
Current use of fertilizers kills productivity and makes food insecurity inevitable
6
WAKE DW
ANI 10
Asian News International, Founded over 50 years ago, ANI is today South Asia 's leading multimedia news agency with over 100 bureaus in India , South
Asia and across the globe. (“Greenpeace ‘Living Soils’ campaign calls to save soils from harmful chemical fertilizers, August 3, 2010,
http://www.dnaindia.com/india/report_greenpeace-living-soils-campaign-calls-to-save-soils-from-harmful-chemical-fertilizers_1418211)
Every year Central government spends around Rs50,000 crores on chemical fertilizer subsidies, and this is
a major driver that catalyzes intensive chemical fertilizer usage4. The Nutrient Based Subsidy (NBS) policy
which was brought in to correct this problem continues to support only chemical fertilizers, and hence fails
in its own cause. The new policy proves to be an old wine in new bottle. “On one hand our Union government worries about the
declining agricultural productivity due to soil degradation and food security and on the other hand they
continue to support chemical fertilizers. Support for organic fertilization practices in mainstream
agriculture is very minimal. This anomaly can jeopardise the Agriculture production system”, said Tapan Sharma of
Diamond Club Community Center, Sipachar, Darrang. “We should not wait for the problems to appear. In the case of Assam we should learn from bad
experiences from other regions and go the ecological way at the earliest, said Kulendra Deka, general secretary of North East
Centre for All Round Development (NE CARD), Darrang
That kills their economy
Bandhu 10
Yogesh, Research Associate, Giri Institute of Development Studies, Lucknow
(“Artificial Market Prices and Subsidies Implication for Indian Agriculture”, 2010)
Agriculture in India is the most important segment of the economy. Growth of Agricultural sector is crucial
for Indian economy as it employs two-third of its population and contributes nearly one third of national
income. However its importance in the economic, social and political fabric of India goes well beyond what
is indicated by its contribution to the economy. The large number of poor agricultural households and their
income vulnerability are major concern among policy makers. These concerns have driven both agricultural
policies and public expenditures in agriculture in India as well as in other part of the globe. Agriculture is
also one of the major sources of export earnings of our country and is crucial for improving the balance of
payments. In recent years, the export of agricultural and allied products accounted for about one-fifth of total
export earnings of India. India's share of agricultural export has remained very low in many commodities despite inherent strength of Indian agriculture
with the exception of few commodities.
Decline makes war inevitable
Schaffer 2
(Director South Asia Program, CSIS and Former U.S. Ambassador, Washington Quarterly 2002)
Mediocre growth will extract a high price in terms of political and foreign policies.
Without reforms, India's economy
will sag, leading to competitive subsidization and spiraling fiscal deficits. A more worrisome issue for the United States, however, is that this
situation could tempt India's government to take an unusually strident line toward Pakistan and its other
neighbors, which, in turn, would increase the risk of some kind of miscalculation or desperate
move by Pakistan. Continues…Particularly striking about the building blocks for the new Indo-U.S. relationship is how little Pakistan
figures in them. Yet, the long-standing dispute between India and Pakistan remains the greatest obstacle to the role India wants to play in the
world, and the possibility of unintended Indo-Pakistani conflict is still the single greatest potential danger the
United States perceives in South Asia.
Leaving Pakistan out of a discussion of Indo-U.S. ties would be disingenuous, particularly in
the aftermath of September 11. India's unresolved problems with Pakistan start with Kashmir, the subject of conflicting claims by India and
Pakistan and the object of two wars between them as well as a continuing insurgency, supported by Pakistan, in the Indian-held parts of the state.
The list of problems between the two countries also includes a group of secondary issues related to Kashmir, such as the status of the world's most
desolate, disputed military installation on the Siachen Glacier in the high Himalayas, as well as a number of other "normalization" issues, including
trade and visa regulations. Since September 11, the level and frequency of violence has increased within Kashmir and across the "Line of Control"
that separates India and Pakistan. Statements coming from both governments provide no encouragement that the leadership of either country is
close to a sustainable formula for resuming talks about the situation. India's most recent initiative for beginning talks with Kashmiri political
leaders also seems to be going nowhere. Even worse, high-profile terrorist incidents, including suicide bombings of the State Assembly building in
(CONTINUED)
Srinagar (capital of the part of Kashmir administered by India) and more recently at the Indian parliament in New Delhi, have raised tensions
between India and Pakistan dramatically. The most likely culprits in both cases are militant organizations that also appear on the U.S.
government's list of terrorist organizations, active in Kashmir but headquartered in Pakistan. U.S. actions since that latest incident have made clear
that the freedom of action these groups have enjoyed in Pakistan is incompatible with the relationship Pakistan is now trying to establish with the
7
WAKE DW
United States. The regional military buildup that followed the bombing demonstrates how easily
such incidents can provoke a
cataclysmic set of reactions and how vulnerable regional peace is to another violent incident. Resolving
these problems will require a high level of Indian and Pakistani leadership. Both countries, as well as Kashmiri
representatives, urgently need to start a process that will eventually lead to an arrangement that is comfortable for
all three parties and that addresses the issue of the Indo-Pakistani relationship and the problems of
governance within Kashmir. Any such process would be slow and crisis-ridden; finding a solution is a marathon effort, not a quick fix. The
obstacles to the success of such an endeavor are daunting. In India, coalition politics and broad popular resentment against Pakistan make it
difficult for a leader to push even in the best of times for a reasonable settlement of India's problems with Pakistan. If India's economic
performance is mediocre, this task will become more difficult. For Pakistan, Kashmir has powerful popular appeal. The
political compromise required for a settlement would be very painful, and the strength Pakistan's
government has gained by confronting militant groups over their activities in Afghanistan will not easily
carry over to Kashmir. Without such an effort, however, the likelihood of new and dangerous confrontations over Kashmir is unacceptably
high. Despite the new issues that unite India and the United States, this all-too-familiar one remains at the top of U.S. foreign
priorities and cries out for a sustained and sophisticated U.S. diplomatic strategy.
Second, Loss of food security means nuclear resource wars
Crowell 9
Ex-Member of the Air Reserve Technician program, a nucleus of managers, planners and trainers who have knowledge and expertise to smooth Air Force
Reserve Command (AFRC) units' transition from a peacetime to a wartime environment
(Gary, “Continueing Challenge”, Written at Znet. Establish policy news network, August 15, 2009, http://www.zcommunications.org/climate-changedrought-and-indias-looming-food-and-water-crisis-by-vandana2-shiva)
I read your commentary with great interest. Like all the other commentary I read in Z, I learned something solid and real, and the entire net is
beginning to help me to think in a different way. The contributing factor to the challenge of climate change is the acsending population growth
worldwide, although some regions such as Western Europe and Russia are experiencing a decline in birth rate,
China, India, Indonisia are growing, maybe not as fast and with some variance here and there. There are
still more than six billion people in the world today. It is expected, if I am not mistaken, that in another generation or so there
will be ten billion people consuming the finite resources of this planet. India will outgrow China in population, and expand
[aggressively] agressively as a military power in the region. Food security plays right into this. The ongoing
tension between Pakistan and India over [Kashmir] Kashmire, a food growing area, could lead to nuclear war.
Pakistan is espesially vulnerable and with its' hundred or so nukes faceing India's nukes over the security of
its' share of [Kashmir] Kashmire not to mention its' suspicion of India's increased diplomatic activity in
Afghanistan brings one to take a quick look at history. One does not have to go far back. Take for instance Japan's
rise as an military-industrial power. Because only about 20% of the land in the Japanese Islands could
produce food, and with limited natural resources for industrial exploitation, an expansion onto the Asian
mainland (with Anglo-Euopean-American help) was essential to what they saw as their survival. Today, China is building an
navy designed to eventually dominate the region. India will have five submarines with missile launch capability within
the next few years, and Pakistan has its' own military expansion ongoing. Yet, we are fearful of North
Korea's half dozen or so nukes, because that country is especially hungry.
War would go nuclear
UPI 4
(Nuclear War A Real Fear In South Asia Washington (UPI) Dec 17 2004 http://www.spacedaily.com/news/nuclear-india-pakistan-04k.html)
No conventional war between India and Pakistan will remain limited for long and will gradually lead to a
full-scale war and ultimately to a nuclear conflict, warns a study by a Pakistani defense official. The study, presented recently at a Washington thinktank, looks at various scenarios that could lead to an all-out war between the two South Asian neighbors, which conducted a series of nuclear tests in May 1998 and also
India and Pakistan have fought three wars since their independence from Britain in 1947 and are still engaged
in 57-year-old conflict in the Himalayan valley of Kashmir which caused two of these three wars. Most of the possible war
scenarios discussed in this study also focus on Kashmir where most international observers believe even a small conflict has
the potential of escalating into a full-fledged war. Recently, both India and Pakistan have agreed to resolve their differences through
dialogue and have taken several steps lessen tensions. The study by the Pakistani defense official envisages possible
possess nuclear-capable missiles.
8
WAKE DW
Pakistani response to a various proposals being discussed in India's defense circles for dealing
with the Kashmir insurgency, which India blames on Pakistan-backed militants. The author, who wished not to
be identified, argues that recently India has put forward the concept of a limited conventional war aimed at
achieving a specific political objective, such as putting down the uprising in Kashmir. But the
author warns that what India may see as a limited conventional war, may not be accepted to
Pakistan as such. Similarly, what India defines as limited political perspective, may have a
different implication for Pakistan, he adds. The author points out that most Western analysts and scholars are not
comfortable with India's limited war doctrine and they also believe that a limited war between
India and Pakistan cannot remain limited for long
Extinction
Nabi 3
Dr. Ghulam Nabi, India-Pakistan Summit and the Issue of Kashmir, July 13, 2003, p. http://www.pakistanlink.com/Letters/2001/July/13/05.html
The most dangerous place on the planet is Kashmir, a disputed territory convulsed and illegally occupied
for more than 53 years and sandwiched between nuclear-capable India and Pakistan. It has ignited two
wars between the estranged South Asian rivals in 1948 and 1965, and a third could trigger nuclear volleys and a
nuclear winter threatening the entire globe. The United States would enjoy no sanctuary. This apocalyptic
vision is no idiosyncratic view. The Director of Central Intelligence, the Department of Defense, and world
experts generally place Kashmir at the peak of their nuclear worries. Both India and Pakistan are racing like
thoroughbreds to bolster their nuclear arsenals and advanced delivery vehicles. Their defense budgets are
climbing despite widespread misery amongst their populations. Neither country has initialed the Nuclear
Non-Proliferation Treaty, the Comprehensive Test Ban Treaty, or indicated an inclination to ratify an
impending Fissile Material/Cut-off Convention.
9
WAKE DW
Plan creates a sustainable “gene” revolution in India which ensures long term food
security, lower prices, and better quality of life
Prakash 2k
Professor in Plant Molecular Genetics and Director of the Center for Plant Biotechnology Research at Tuskegee University
(C.S., “Gene Revolution and Food Security”, Agbioworld, March 2, 2000 http://www.agbioworld.org/biotech-info/articles/agbioarticles/revolution.html)
A revitalised Indian agriculture can be the engine of growth and biotechnology can provide the needed fuel,
says C S Prakash. India's greatest achievement in the past century has been its ability to increase its food
production and thus keeping the Malthusian fears at bay. Nevertheless, we still face daunting challenge of
hunger, poverty and malnutrition that will only get worse as the population increases in absolute numbers.
Recent advances in crop science, however, provide us with a new window of opportunity to deal with the issue
of food security. Genetic engineering is clearly the most revolutionary tool to impact agricultural research
since the discovery of genetics by Mendel. Sensible integration of biotechnology in research can accelerate the
pace of agricultural improvement and is of considerable relevance to an agrarian country like India.
Transforming India's agriculture is critical not only to deal with the issue of hunger and poverty but also to
strengthen the sector that is so fundamental to India's existence. The 'green revolution' is showing signs of
fatigue and farm productivity increases are now flattening. There are serious constraints to productivity in Indian agriculture because of
small holdings, the subsistence nature of farming, vagaries of the weather, limited water, poor land condition and stress factors such as drought, heat and saline soil
conditions. Much of the crop yield is lost due to disease, pests, and weeds while a considerable proportion of harvested fruits and vegetables are spoilt during
transportion and storage. There
is thus an urgent need to reinvigorate agricultural research to address crop
productivity issues by redesigning crop plants to benefit the farmer and the consumer, and also to develop
innovative 'value-added' agricultural products to enhance the revenue base of farming. Profitable farming not only
enhances the quality of life in rural India but will also help limit the urban sprawl due to migration and its attendant environmental problems . Beyond crop
productivity, there is also a need to address the larger food and environmental issues. A revitalised Indian
agriculture can be the engine of growth for the 21st century, and biotechnology can provide the needed fuel.
When deployed in a sensible and responsible manner , modern biotechnological tools such as genetic improvement of crops can
advance India's agriculture to address 'head-on' the challenge of feeding its increasing population with its
limited economic, land and water resources. India cannot afford to lag behind in critically examining these new technologies and making them
available to its farmers under suitable safeguards. Most experts say that the greatest promise of biotechnology is in its
application in developing countries like India and China because of their high reliance on agriculture, large farming
areas, low crop yield and the urgency for food increase and economic revitalisation . Developing countries such as Mexico, Argentina,
China and Chile have already made considerable economic advances by integrating biotechnology into their
agricultural programmes. Others such as Cuba, Egypt and South Africa are also following close behind and clearly see biotechnology as a means of
advancing their economies in an accelerated manner . India can, therefore, ignore biotechnology only at its own peril.
Biotechnology can be a boon to Indian agriculture in may ways. Crop damage can be minimised through
disease- and pest-resistant varieties while reducing the use of chemicals. Conventional plant breeding has
little ammunition to deal with these problems in an expedient and effective manner. India also has serious problems of
blast in rice, rust in wheat, leaf rust in coffee, viruses in tomato and chillies and leaf spot in groundnut across the country . These problems can be
significantly minimised in an ecologically-friendly manner with the development of genetically
reprogrammed seeds designed to resist these disease attacks, while minimising or even eliminating costly
and hazardous pesticide sprays. Genetic modification can also address the problems of shoot borers in brinjal and okra, caterpillars in pappadi
(Dolichos) beans, and of course, the boll wormin cotton which resulted in the tragic suicides of hundreds of cotton farmers. India is the third largest producer of cotton in
the world (after China and the US). Although cotton occupies only 5 per cent of the country's land, nearly 50 per cent of all pesticide used in india is bought by cotton
farmers alone at a staggering cost of Rs 16 billion annually and with incalculable impact on the environment and human health. Development
of cotton
varieties with resistance to pests thus can enhance the welfare of Indian farmers, while helping both the
India economy and its environment. New genome technologies along with bioinformatics will further
propel Indian agriculture into a new era where complex traits such as photosynthetic efficiency and crop
yield can be enhanced. Geneomic tools with esoteric names such as 'DNA Chips', 'Gene Shuffling' and
'Director Evolution' are already making an impact on biomedical research enabling the discovery of new
drugs and rapid disease diagnostics, and will surely impact agricultural research. With no more arable land
available for agricultural expansion in India, enhancing stress tolerance in crop plants will permit
productive farming on currently unproductive lands. Abiotic factors such as drought, heat, cold, soil salinity
and acidity cripple Indian crops seriously constraining their growth and yield. One could extend the
growing season of crops and minimise losses due to environmental factors. The shelf life of fruits and vegetables can be prolonged
10
WAKE DW
(CONTINUED)
to reduce losses to food spoilage, expand the market vista and improve food quality. There
has been much human misery caused by
hazardous substances in many Indian food crops
such as the presence of neurotoxin in kesar dal, cyanide in tapioca, aflatoxins in groundnut and antimetabolites in chickpea, horsegram and sweet
potato. Biotechnology has the capability to 'silence' these undesirable traits and thus improve the quality of
these 'humble' food crops so critical to the nutrition of disadvantaged and resource-poor consumers. Prolonged
'vase life' of cut-flowers will help broaden the market for horticulturists, while reducing losses and minimising their dependency on expensive cold storage. Human
and livestock health can be improved through crops with enhanced nutritional quality traits such as ironrice and vitamin A-rich rapeseed oil, and through the production of edible vaccines and other
pharmaceutical proteins. Crops with industrial applications such as those producing enzymes, 'designer'
starch and oils, biodegradable plastics and industrial chemicals can also be developed to reinvigorate the
Indian economy and create jobs. Crop plants that can clean up soil, water and air through
'phytoremediation' can be developed and planted in critical areas. Trees that grow faster with fewer disease and pest problems can
be developed with positive impact both on the rural economy and the environment . The strategic integration of biotechnology tools into
Indian agricultural systems can revolutionise Indian farming and usher in a new era in the countryside.
Compared to the 'green revolution', the 'gene revolution' is relatively scale-neutral, benefiting big and small
farmers alike. It is also environment friendly. Thus, it can be of great help to the smallest farmer with limited resources, in increasing farm
productivity through the availability of improved but powerful seed. It can also reduce his dependency on chemical inputs such as
pesticides and fertilisers. India unequivocally needs the help of such technologies to march into the next
century with a vision for economic upliftment and prosperity for its two-thirds of populace dependent on
farming.
The genomic analytical power of bioinformatics makes is critical to an Indian gene
revolution
Sankar 3*Abbreviation
Dr. R. Sankararamakrishnan is an Asstt Professor in the Department of Biological Sciences and Bioengineering. His predoctoral studies were at the
Indian Institute of Science. He received post-doctoral training in computational biology at Universitiy of Oxford and University of Illinois, UrbanaChampaign. He was serving as a Research Asstt Professor at the Mount Sinai School of Medicine, New York before joining the Institute in April, 2002
(“Bioinformatics in Post-Genomic Era”, 2003, http://www.iitk.ac.in/directions/oct03/genomic.htm)
Bioinformatics involves the application of information technology to the management and analysis of
biological data such as the sequences of nucleic acids in genes and amino acids in proteins. On average, the biological
databases are doubling in size every 15 months. As a result of this surge in data, computers have become indispensable in biological
research. This is evident from the huge increase in the number of papers published in the area of "Bioinformatics". Most bioinformatics analyses focus on
three primary sources of data: DNA or protein sequences, macromolecular structures and the results of
functional genomics experiments. Recently M. Gerstein of Yale University has submitted a definition of "bioinformatics" to the Oxford English Dictionary. According to
his definition, "Bioinformatics is conceptualizing biology in terms of molecules (in the sense of Physical Chemistry) and applying informatics techniques (derived from disciplines such as applied
bioinformatics is a
management information system for molecular biology and has many practical applications". The
applications of bioinformatics include predicting genes from genomes, identifying coding and non-coding
regions, predicting protein structures and protein-protein interactions. This article will attempt to cover some of these applications. Prof.
maths, computer science and statistics) to understand and organize the information associated with these molecules, on a large scale. In short,
Sarkar's article "The Human Genome: The Book of Life" which appeared in the November 2000 issue of "Directions" gives further details about various aspects of human genome project. Gene
Prediction It was initially believed that humans might require 100,000 genes to perform the complex functions. The total number of predicted genes for laboratory fruit fly and for a simpler
organism Caenorhabditis elegans are ~13,600 and 19,000, respectively. After the first draft was published in June 2000, the groups that sequenced the human genome found evidence for only
30,000 to 40,000 genes. However, these estimates have been recently revised, and it is now suggested that humans possess ~70,000 genes. Traditionlly, genes were cloned, sequenced and
experimentally characterized one-gene-at-a-time, allowing determination of the function of the gene products with a high level of confidence. Now with the whole-genome sequences available,
identifying genes from novel genomic data is a classical problem in bioinformatics. Several gene prediction algorithms are available from the public domains. Abinitio gene prediction methods are
based on general properties and characteristics of protein-encoding genes with simple statistical measures. Neural network and dynamic programming approaches are used in these methods.
Hidden Markov Models (HMM) have used pattern recognition techniques in predicting genes. Other approaches to gene finding are based on homology to known genes. The homology-based
methods search novel DNA sequences for coding regions similar to any known protein. An assessment of various gene prediction methods concluded that the sensitivity of ab initio methods remains
high and they generate over predictions. When a gene and its function are predicted, there is no way of knowing how accurate the assignment is. Thus gene identification and annotation constitute
the first step of the global reconstruction of the puzzle defining a living thing. This reconstruction addresses various biological aspects, including the overall genome organization, the interaction
network linking proteins, metabolic pathway, structure of the cell and the evolutionary history of the species. Gene Expression Gene expression studies have focused on devising methods to cluster
genes by similarities in expression profiles. This is in order to determine the proteins that are expressed together under different cellular conditions. Advances in the production of genome-scale
expression data have created tremendous opportunities and challenges in the elucidation of individual gene modulation, patterns of coordinate expression among individual genes and ultimately
genetic networks. This progress has stimulated the exploration of a number of algorithms and visualization tools. These methods include hierarchical clustering and self-organizing maps. In
hierarchical methods, genes with most similar expression profiles are clustered first and those with more diverse profiles are included iteratively. This method is derived from algorithms to
construct phylogenetic trees. In self-organizing map, the user pre-defines the number of clusters for the dataset. The clusters are initially assigned randomly and the genes are regrouped iteratively
until they are optimally clustered. The expression data profiles are related to structure, function and subcellular localization of each gene product. Mapping these properties provides an insight into
the characteristics of proteins that are expressed together and also suggest some interesting conclusions about the overall biochemistry of the cell. Comparative analysis of gene expression data can
be extended to tumor cells, in which the underlying causes of cancer can be uncovered by pinpointing areas of biological variations compared to normal cells. One of the difficulties in cancer
treatment has been to target specific therapies to pathogenetically distinct tumor types, in order to maximize efficacy and minimize toxicity. For example, subclasses of acute leukaemia were
successfully distinguished based on the expression profiles of the cells. As the approach does not require prior biological knowledge of the diseases, it may provide a generic strategy for classifying all
types of cancer. Proteins and Proteomics With the accumulation of vast amounts of DNA sequences in databases, researchers are realizing that merely having complete sequences of genomes is not
sufficient to elucidate biological function. The inevitable inventory of genes produced by the genome projects heralds the start of a new era: Age of proteomics. Although DNA is the blueprint for life,
it is the set of proteins that are actually transcribed and translated that determine the function of a particular cell. In 1975, the invention of two-dimensional gel electrophoresis allowed protein
11
WAKE DW
(CONTINUED)
biochemists to cut isolated spots out of a gel and sequence their amino acids. In mid 1990s, the gradual appearance of protein identification methods used nascent DNA and protein databases to
analyze mass spectra of protein fragments. Preliminary studies suggest an average number of protein forms per gene of one to two in bacteria, three in yeast and three to more than six in human
beings. Thus a human body may contain more than half a million proteins and these proteins undergo modification by addition of specific carbohydrate chains or phosphorylation. The field
proteomics is defined as characterization of all proteins and is the large-scale study of the complete protein complement of the cell, tissue or organism. The major challenge now to biologists is to use
the wealth of genetic information available from the genome sequencing programme not just to decode the amino acid sequence of the encoded protein, but also to find out their function. MultipleSequence Alignments Genomics-based approaches initially use computer-based similarity searches against proteins of known function. The results may allow some broad inferences to be made
about possible functions, which can then be explored experimentally. Multiple sequence alignments have been traditionally used to deduce structure / function by homology, to detect conserved
motifs in protein structures and in phylogenetic studies. Multiple alignment programs have used dynamic programming technique, Hidden Markov Models, stochastic techniques such as Simulated
Annealing and Genetic Algorithms and iteration techniques. In recent alignment programs, information other than the sequences themselves is now being incorporated into the multiple alignment.
(For an example of multiple sequence alignment see box on page 9). Homologous proteins are both sequentially and structurally similar and advances in sequence database search methods have led
to the detection of more and more distant homologues. The multiple sequence alignment reveals evolutionary constraints existing at particular sequence patterns that conserve residues or their
physico-chemical properties and thus allow a straightforward detection of conserved structural motifs, localization signals or key functional residues that characterize a family or sub-family of
proteins. Molecular phylogeny studies have relied on multiple alignments to define phylogenetic relationships between organisms. In the post-genomic era, phylogenetic studies can now address the
entire proteome of organisms widely scattered across the phylogenetic spectrum. Proteins are long chain molecules (polypeptide chains) and they can adopt infinite variety of conformations, each
corresponding to a unique set of values for the various peptide backbone rotation angles. Professor G.N. Ramachandran, and his colleagues from University of Madras in 1963 investigated this
problem and discovered that many of the hypothetical conformations can be excluded from considerations on the basis of steric overlaps. His findings, popularly known as Ramachandran map
(shown in left), have revolutionized the understanding of protein's three-dimensional structures. Structural Genomics Analysis of genomic sequences in organisms for which genomes have been
sequenced seem to code "hypothetical proteins" that cannot be related to other proteins of known function or structure. Understanding the physiological function of the protein products of these so
called "orphan" genes has emerged as a major challenge. Three-dimensional structural information of the proteins provides insights into biology by elucidating the relatedness to proteins of known
biological function, which could not have been arrived by sequence alone. Structural information can also identify binding motifs and catalytic centers even for proteins without a known biological
function. From the structural features, catalytic mechanisms, protein-protein associations or protein nucleic acid interactions could be predicted or proposed. Unfortunately, to date, only a small
fraction of known proteins and even fewer number of hypothetical proteins have had their structures solved by classic crystallographic methods or by nuclear magnetic resonance (NMR)
spectroscopy. The structure of the protein is characterized by its folds. Many researchers believe that a limited number of protein folds (1000 to 5000) exist in nature. It is predicted that all these
folds can be revealed by examining approximately 10,000 unique proteins. Recently, the National Institute of General Medical Sciences (NIGMS) of the National Institutes of Health sponsored a
protein structure initiative to determine the three dimensional structures of thousands of proteins within a decade. This $150 million pilot program could lead to the solution of up to 10,000 crystal
structures in the next 10 years. In contrast, only 2000 unique structures have been determined in the past 40 years of research. It is hoped that improvements in protein isolation, protein
purification, crystallization and X-ray diffraction could turn the vision of structural genomics initiative to reality. Identification of potential binding motifs and catalytic centers of proteins with no
clear function from have already shown promises using structural genomics approach. One such example is Histidine Triad (HIT) family of proteins. HIT proteins were identified through genome
analysis, from a large ubiquitous family, but as yet have no known specific biological function. These proteins are believed to be involved in cancer. Structure solution of several HIT family members
identified common structural motifs, which were used to identify a catalytic center and nucleotide-binding sites. These structural studies showed that HIT family of proteins belong to the class of
enzymes called nucleotide hydrolases and even enabled identification of compounds that could inhibit catalytic function of the HIT proteins. Computer Modeling Although technological advances
have occurred in crystallography and NMR, these methods cannot keep demand to know the structures of all proteins. Efforts to bypass these methods have led to the advancement of computational
modeling approaches. Computational modeling utilizes predictive and comparative methods to fashion a new protein structure. Ab initio methods use the physicochemical properties of the amino
acid sequence of a protein to literally calculate a 3D structure (lowest energy model) based on protein folding. These methods use one or a combination of molecular dynamics, molecular mechanics
and quantum mechanics techniques to describe atomic and molecular states interactions. In homology modeling, the structural and functional characteristics of known proteins that share many of
the sequence features ( > 30 percent identity) are used as a template to create a hypothesized structure for an unkown protein with similar functional and structural features. Threading is essentially
a small-scale form of homology modeling based on the realization that there are a limited number of structural folds that define the structure of a protein in its native and most energetically
favorable state. The individual folds serve as precise descriptors and the resulting collection of protein folds is a essentially an encyclopedia that describe each of the structural motifs a protein may
adopt. These fold libraries are used by threading algorithms to create a theoretical structure of a protein. The importance of modeling techniques is further highlighted by the fact that the majority of
the experimentally solved protein structures belong to the category of water-soluble proteins. Membrane proteins that are imbedded within the membranes constitute the second major category of
proteins and it is estimated that about 30 % of genes may encode membrane proteins. Integral membrane proteins participate in important physiological functions and are implicated in major
diseases. These proteins are difficult to crystallize and as a result only a handful of membrane protein structures are available at atomic resolution. In the mid 1980s, the structure of the first integral
membrane protein, photosynthetic reaction center, was solved and subsequently this work was awarded with Nobel prize. Structures of the potassium channel and rhodopsin are the most recent
major breakthroughs. Potassium channel is the first channel protein to have a 3D structure determined in atomic resolution. Rhodopsin belongs to the class of G-Protein Coupled Receptors
(GPCRs) whose transmembrane segments traverse the membrane seven times. GPCRs constitute vast group of cell-surface proteins that includes hormone, neurotransmitter, growth factor, light
and odorant receptors. In the absence of experimentally available structures, computer modeling techniques are the most important tools to study the structure-function relationships of these
proteins. Computer Simulations The three-dimensional structures of the proteins are only the beginning towards understanding the biological functions of the proteins. X-ray crystallography gives a
snap-shot of the protein structure and it does not reveal the full picture. In many of proteins, the adequate explanations of the mechanisms of a protein's functions come from the molecular
simulations that define the force fields surrounding the proteins. The approaches used in the simulations are molecular mechanics, molecular dynamics, Monte Carlo and quantum chemical studies.
The importance of these approaches can be illustrated by the recent simulations studies on potassium channel protein. Nearly all cells have membranes spanned by potassium-conducting channel
proteins. Potassium channels catalyze the ionic movements required to generate and shape electrical signals in neurons. In other words, without these channels, our nerves simply would not work.
The crystal structure showed a narrow 'selectivity filter' in which dehydrated potassium ion (but not sodium ion) fits precisely. Molecular dynamics free energy simulations revealed the ion
permeation mechanism in this channel protein even before the support came from experiments in the form of X-ray work. Simulation studies combined with the crystallography structures offer
fundamental insights into the physical chemistry of ion conduction in biology. These studies show how ions are coordinated in the selectivity filter; they revealed the nature of potassium ions in
transit between the channel and the aqueous solvent; and they indicate the character of water in the cation's inner hydration shell. Drug Discovery One of the earliest medical applications of
bioinformatics has been in aiding rational drug design (See accompanying article by B. Prakash). Only a small fraction of the human genes from human genome will be amenable to therapeutic
intervention. It has been estimated that the number of proteins that are drug targets is probably 5,000 to 10,000. The majority of the targets are receptors such as GPCRs and enzymes. In fact, more
than 50% of prescription drugs act on GPCRs. Computer-aided drug design (CADD) involves the design of potential drugs based on structure, physical and chemical constraints and parameters
between the drug ligand and its target, a protein. This "rational drug design" methodology has been a very powerful tool in pharmaceutical research, where drug development has traditionally been a
hit-or-miss process of blindly testing compounds that may or may not interact with a protein. Using CADD methods, researchers can now model drugs to a specific set of criteria. When combined
with combinatorial chemistry methods, scientists can dramatically increase their chances for a hit. Recent advancements in CADD include the introduction of evolutionary techniques, such as
genetic algorithms and fitness functions. Genetic algorithms induce spontaneous atomic changes to create new molecular species, while fitness functions ascertain the chemical survivability of the
new species amongst the pool of biochemicals. Gene expression studies with the help of bioinformatics may be used to hunt for new antimicrobial targets. Identification of proteins produced by
microorganisms is facilitated by the small number of genes and the completion of genome sequencing for many microorganisms. The main aim of most studies has been the search for new
diagnostic markers, candidate antigens for vaccines and determinants of virulence. For some of the microorganisms studied, two-dimensional electrophoresis databases are available on the internet.
Myobacterium tuberculosis is probably the most studied microorganism. Tuberculosis still causes more than 2 million deaths each year, so an international priority is to improve diagnosis and
develop a more effective vaccine. The current BCG vaccine varies in efficacy from almost zero protection in southern India to about 70% protection in the UK. Examination of genetic differences by
genomic analysis has been helpful in identifying the potential regulators of virulence. Such studies may also provide the basis for discrimination between BCG immunization and the presence of
virulent tuberculosis. Protein three-dimensional structure is a key to understand the function of the protein. For example, structures of HIV protease (shown in left) are used to understanding the
ligand-binding properties and in the designing of new drug molecules that can bind the active-site much more efficiently. Bioinformatic Tools The heart of bioinformatics analyses is the software
and the databases upon which many of the analyses are based. Traditionally bioinformatics software required high-end workstations (desktop to mid-range servers) with a multitude of plug-ins
and/or peripheral equipment and a user (administrator) willing to routinely download database updates. Modern experimental technologies are providing seemingly endless opportunities to
. The drive to capitalize on this enormous pool of information in
order to understand fundamental biological phenomena and develop novel therapeutics is pushing the
development of new computational tools to capture, organize, categorize, analyze, mine, retrieve and share
data and results. Most current computational applications will suffice for analyses of specific questions using relatively small data sets. Object Management Group (OMG), a software
generate massive amounts of sequence, expression and functional data
standards organization have come up with CORBA, a middleware that mediates between different languages, information sources and analysis tools, each with its own way of representing data and
methods. CORBA interfaces for methods and XML, the souped-up version of HTML, for data formats, implemented in an open source environment. Dr. Shankar Subramaniam's group at University
of Illinois, Urbana-Champaign (now in University of California , San Diego) has developed "Biology Workbench" with which one can access all publicly available databases. With access to a
networked computer, biologists can use the bioinformatics tools provided by this workbench in a point-and-click mode. But to expand scientific horizons, to accommodate larger and larger data sets
Intelligent
integration with other data domains, such as chemical and clinical, is the ultimate goal. Future of Bioinformatics in India
The draft of human genome by the public consortium is a culmination of work done from several countries. Although developing nations have to catch up in
genome research, significant progress is being made in this area. Notably, Brazil has recently published the
genomic sequence of the plant pathogen Xyllela fastidiosa that causes a range of plant diseases. It causes serious
diseases to orange trees, an economically important factor for Brazil. India is home to a large number of
indigenous populations and it is enviously positioned with this rich diversity of gene pool. Genomic studies
and to find patterns and see relationships that span temporal and spatial scales, new tools that broaden the scope and complexity of the analyses are needed.
12
WAKE DW
and bioinformatics offer ways to improve healthcare and the quality of life. With its excellent scientific talents, India
can identify and focus on specific areas of national importance. In inter-disciplinary areas such as
bioinformatics, collaborations between different groups within India and abroad should be established . In order
to access the databases scattered throughout the world, scientists working in the area of bioinformatics need fast internet connections. With its world-class software
skills, much needed bioinformatics tools can be developed in India. Following the "green revolution",
indeed a "gene revolution" has to take place in India.
13
WAKE DW
Advantage 2: U.S.-Indo Relations
Protectionist immigration policies will terminally strain economic relations
Singh 10
Research Fellow at the Institute of South Asian Studies (ISAS), an autonomous research institute at the National University of Singapore
(“H1B Visa Fee Hike: Will Indo-US Ties be Affected?”, August 2010)
Third, there
is the issue of how and to what extent this specific development will impact India-US relations in
the near to middle future. Besides official protests to the Obama administration over the implications of
this bill for India-based companies, the Indian Government now seems to be contemplating referring the
matter to the World Trade Organization (WTO). In a statement on 17 August 2010, India’s Commerce
Secretary Rahul Khullar, was quoted as saying that the visa fee hike ‘is WTO incompatible’ and that ‘if the
US wishes to put up its protectionist barriers to hurt itself let them do it but where a measure is specifically
targeting my commercial interest I cannot keep quiet’.13 The Obama administration meanwhile seems aware
of the depth of India’s grievances on the matter and has attempted to address Indian concerns.14 With the USIndia trade policy forum planned in three to four weeks time and Obama’s scheduled visit to India in November 2010, there are indications that the US might make
certain adjustments in implementing the visa hike in the light of Indian concerns. Reflecting this optimism, Indian
officials were recently quoted
as saying that they were ‘hopeful of a quick solution’ before the two sides met for their trade policy forum.15
On the whole, it is still not clear if any solution satisfactory to both sides can be found on this issue at this stage or how long it would take to arrive at such a solution.
Although it is evident that this issue has created some friction in Indo-US ties, it is unlikely to unravel the
multilayered links that both countries have increasingly developed since Obama assumed office. This incident, however, does point to a
larger potential irritant for future Indo-US ties. This irritant originates from the various domestic pressures
on the Obama administration that could impact US foreign relations with India. More specifically, as the
American public increasingly embraces protectionist postures espoused by US politicians, in tandem with
the shrill debate over immigration, an anti-immigration protectionist discourse is emerging within the US
with foreign knowledge workers an important target.16 Indian knowledge workers in this regard would be
one of the hardest hit. So might the Indo-US relations in the longer term.
Additionally, Cyber security is underemphasized leaving the U.S. vulnerable to
increasingly complex attacks
Goldsmith 10
Jack, Professor@The Harvard Law School (“The New Vulnerability”, The New REpublic June 7, 2010, http://www.tnr.com/article/books-and-arts/75262/the-newvulnerability?page=0,0)
For the past few decades, and with
increasing frequency, many thousands of foreign agents like the Google hackers, sitting
before computer monitors abroad, have “entered” the United States to steal or to destroy valuable digital
assets. They have raided the Pentagon and other government agencies to disrupt their communications and to lift sensitive or
classified information. They have attacked American corporations and taken or destroyed untold millions of dollars worth of data or intellectual property. They have
contacted CEOs and credibly threatened to destroy their businesses unless the CEOs met the extortionists’ demands. And they
have planted malicious
software--known ominously as malware--inside government and corporate headquarters, and in critical
infrastructure systems such as electrical grids and power plants. Some of this malware allows them to monitor activities in
these places; other malware, called “logic bombs,” enables them to trigger a destructive attack years later, if
doing so would be useful. If this were happening before our eyes--if thousands of foreign agents were
physically entering our borders, breaking into brick-and-mortar buildings, and removing or destroying billions of dollars of proprietary information
and monetary assets--the government would declare a national emergency. But it is happening largely out of public
sight, on computers and computer networks, and so most people are not worried . The press is increasingly filled with scary
stories about cyber thefts, cyber attacks, and even cyber war, and Google’s public confrontation with the Chinese raised awareness of the problem. But the cyber
menace is still largely invisible to the public, which naturally discounts threats it cannot see, no matter how
alarming the headlines. Yet the threat is not invisible to the government. And the government is alarmed. “This cyber threat is one of the
most serious economic and national security challenges we face as a nation,” President Obama declared in May 2009, before pledging
that the protection of “our digital infrastructure” was a national security “priority.” In February, Director of National Intelligence Dennis Blair warned that
cyber activity is occurring on an unprecedented scale with extraordinary sophistication ,” and concluded that
America’s digital infrastructure was “severely threatened.” Blair’s predecessor, Michael McConnell, said last year that “a coordinated attack from
“malicious
a remote location by a small group on our electric grid, transportation network, and banking system could create damage as potentially great as a nuclear weapon over
time.” Richard Clarke agrees with these assessments of the cyber threat. He worries in particular that it
could lead to a “full-scale cyber war” with the “potential to
change the world military balance and thereby fundamentally alter political and economic relations.” Clarke was
George W. Bush’s adviser on cyber security and cyber terrorism for two years after a long career as a senior counterterrorism official during many administrations. His book focuses too much on a
14
WAKE DW
single aspect of the cyber problem, and sometimes it fails to carry its analysis to its proper conclusion; but it is nonetheless a good introduction to this esoteric but very serious national security
problem, and citizens should read it.
U.S.-Indo Economic relations key to cyber security
Juster 4
Under Secretary of Commerce United States Government
(Kenneth, “Cybersecurity: A Key to U.S.-India Trade” Under Secretary of Commerce United States Government at the India-U.S. Information Security
Summit 2004 October 12, 2004 New Delhi, India, http://www.bis.doc.gov/news/2004/cybersecurityspeech.htm)
Information security – also known as cybersecurity – is one of the keys to unlocking the full potential of the trade and technology relationship between the United States
and India. All levels of society today – from individuals, to companies, to governments
– rely on information technology and
information networks in their daily lives – to communicate, to manage activities, to transact business, and to
provide essential services to the public. As commerce between the United States and India continues to
expand, consumers and corporations will seek to ensure that their personal information and business
proprietary data are secure, and that information services are reliable and protected. Without an adequate level of security, we
run the risk of backlash among consumers and loss of confidence among business people, which could severely limit progress in our trade and technology relationship. This conference provides an
ideal venue to consider these issues and focus on best practices for improving cybersecurity policies in the public and private sectors. I want to thank the two principal sponsors who have organized
this conference – the National Association of Software and Service Companies (NASSCOM) and the Information Technology Association of America (ITAA). In addition, I would like to recognize the
support provided by the various ministries and departments of the Indian and U.S. governments that are participating in this conference. I might add that I am particularly pleased to be sharing the
podium this afternoon with Minister Sibal. His brother, former Foreign Secretary Kanwal Sibal, joined me in November 2002 in launching the U.S.-India High Technology Cooperation Group,
which has played an important role in promoting bilateral trade and, more broadly, U.S.-Indian relations. It augurs well for our success that Kanwal’s brother Kapil is now also a joint venture
partner in this collaboration. I would like to begin this afternoon by addressing the relationship between international trade and security. I will then focus on the critical of role of cybersecurity in
the U.S.-India trade and technology relationship, on our joint efforts to enhance cybersecurity, and on the importance of working in partnership with private industry to develop and implement
cybersecurity policies and practices. International Trade and Security As Under Secretary of Commerce in the U.S. Government, I oversee the Bureau of Industry and Security. As our name suggests,
we are responsible for issues where business and security intersect. These include strategic trade controls, imports and foreign acquisitions that affect U.S. security, and industry compliance with
international arms control agreements. One of the basic truths that I have learned in managing these issues is that international trade can only flourish if it is built on a solid foundation of security.
Indeed, in today’s world, trade and security are more closely intertwined than ever before. While globalization has brought increased trade and economic interaction, which have contributed to
economic growth and the generation of wealth, it has also presented new threats and new risks. Many of the forces that drive globalization and facilitate commerce – such as our globally integrated
information and communication networks, transportation systems, and financial networks – can also be used by criminals and terrorists to threaten our security and our economic well being. That
is why trade and security must be pursued in tandem; they are and must be seen as complementary rather than competing mandates. The U.S.-India High Technology Cooperation Group It is this
principle – security as the foundation for trade – that drives the growing high-technology relationship between the United States and India. As the United States and India expand economic
interaction, each partner must have confidence that the other will protect the privacy of personal and financial data, protect the rights of intellectual property holders, and not permit the diversion of
sensitive goods and technologies to unauthorized destinations or inappropriate users. If these security concerns are properly addressed, then I firmly believe that we will continue to see an upward
trajectory in our trade and technology relationship. It is with this premise in mind that, in November 2002, our two governments, through then-Foreign Secretary Sibal and myself, formed the U.S.India High Technology Cooperation Group – or the HTCG. This Group provides a forum for our governments to discuss strategic trade and security issues as well as trade facilitation measures. In
the area of strategic trade, we are working to strengthen national export control systems while also reviewing U.S. export licensing processes and policies, so as to grant India expanded access to
sophisticated U.S. technologies, consistent with our laws and international commitments. At the same time, we are seeking to create the appropriate economic environment for facilitating hightechnology trade by identifying and lowering tariff and non-tariff barriers in India to such trade. The HTCG works in partnership with each country’s private sector, which is in the best position to
identify obstacles to high-technology commerce and propose specific policy changes. Our focus to date has been on information technology, life sciences, nanotechnology, and defense technology.
Indeed, the idea for this conference on information security originated last November in Bangalore, at the time of our second private sector forum under the auspices of the High Technology
Cooperation Group. This conference is, in effect, our third HTCG private sector forum, and Foreign Secretary Saran, my current HTCG co-chair, and I both eagerly await the policy recommendations
that will come out of your discussions. It is important to note that, since the HTCG was established, high-technology trade between the United States and India, including licensed trade, has grown
substantially. For example, in our fiscal year 2002, which ran from October 2001 through September 2002, the U.S. Government approved 423 license applications for dual-use exports to India,
valued at almost $27 million. We have just completed fiscal year 2004, and in the last two years since we established the High Technology Cooperation Group, we have seen these numbers increase
dramatically. Indeed, for fiscal year 2004, we received more than twice as many license applications as in 2002, and our approval rate jumped from 84 percent to 90 percent. Thus, we approved 912
applications, and the overall value of licensed dual-use exports from the United States to India exceeded $90 million. This is more than triple the value of such exports just two years earlier. Clearly,
the establishment of the High Technology Cooperation Group has begun the process of building confidence between our two countries for increased trade in sophisticated dual-use goods and
technologies, as we work together to enhance security. The Next Steps in Strategic Partnership Initiative At the same time, however, we realized that we needed to develop another process in order
to address the broader strategic relationship between the United States and India, including in some of the most sensitive areas for potential cooperation. That is why, in January of this year,
President Bush and then-Prime Minister Vajpayee agreed to a strategic framework to expand cooperation in four specific areas important to both countries: high-technology trade, civilian space
programs, civilian nuclear activities, and missile defense. This strategic framework is known as the Next Steps in Strategic Partnership – or NSSP for short. It is designed to progress through a series
of reciprocal steps that build on each other. It responds to India’s desire for increased access to U.S. technology for peaceful purposes by liberalizing trade in such technology in a manner that is
consistent with U.S. nonproliferation laws and obligations, and does not contribute to India’s programs for nuclear weapons and their means of delivery. The NSSP is grounded in the realization
that what unites us is stronger than what divides us. It acknowledges India’s role as a major power, while appreciating that it takes time to build a lasting strategic partnership. It sets up a process to
create and build upon successes, while establishing habits of cooperation that extend deep into the governmental fabric in both countries. The September 21 meeting between President Bush and
Prime Minister Singh celebrated the completion of the first phase of the NSSP. This included the implementation of measures to address proliferation issues and to ensure that U.S.-origin goods and
technologies are used in accordance with U.S. export control requirements. These measures allowed the United States to make modifications to U.S. export licensing policies that will foster
increased cooperation in commercial space programs and permit certain exports to power plants at safeguarded nuclear facilities. The specific modifications were as follows: We removed the Indian
Space Research Organization (ISRO) Headquarters in Bangalore from the Department of Commerce Entity List, which will permit many dual-use items to be exported to ISRO Headquarters
without an export license. We removed licensing requirements for low-level dual-use items (known as EAR99 and 999 items) exported to ISRO subordinate entities that are on the Entity List. And
we will now apply a “presumption of approval” policy to all dual-use items not controlled by the Nuclear Suppliers Group (NSG) if intended for export to the “balance-of-plant” portion of an Indian
nuclear facility subject to International Atomic Energy Agency safeguards. We believe that conclusion of Phase One will lead to significant economic benefits for both countries. In fact, these
licensing modifications are expected to reduce the number of applications submitted for exports to ISRO subordinate entities by approximately 80 percent, and reduce the total number of
applications for all dual-use exports to India by approximately 20 to 25 percent. Equally important, the NSSP is designed to send a strong signal to the publics of both countries that our two
governments are committed to moving forward through joint activity. Indeed, the United States and India realize that a genuine strategic partnership requires a strong commercial underpinning
that builds trust and positive relationships throughout both societies. That is why the NSSP is combined with engagement with the private sector through the U.S.-India Economic Dialogue and the
High Technology Cooperation Group, fora which together address a broad array of trade, economic, and security issues. The Role of Cybersecurity in U.S.-India Trade and Technology Relationship
One of the important components for the expanding trade and technology relationship between the United
States and India is cybersecurity. Cybersecurity involves the protection of information networks and
computing assets. This includes (i)protecting sensitive information from unauthorized disclosure or
interception, (ii)safeguarding the accuracy and completeness of information and software, and (iii)
ensuring that information and vital services are available to users when required. Many observers call the
era in which we live the “Information Age” because our economies and our security are dependent on information
technology. At the core of this global digital economy is the Internet, which is composed of millions of interconnected computer
networks that power today’s marketplace. Businesses and consumers use the Internet to gather information, to purchase goods and services, and to handle financial
transactions. Indeed, the ubiquity of the Internet has forced companies to reconsider business models, adopt new technologies, and seek efficiencies by leveraging their
use of the Internet. Governments
also rely on information technology and the information infrastructure to facilitate the
Information Age has brought innovation, economic growth, and a higher quality of life, it has also
spawned new and unique vulnerabilities. Computer systems and networks create new avenues for malicious
delivery of essential services to the public. While the
15
WAKE DW
actors – ranging from hackers and common criminals to foreign
intelligence agencies and international terrorists – who can do damage to all
are
of us. In an age when entire industries – such as telecommunications, banking and finance, transportation, and energy – rely on information technology, we
(CONTINUED)
now vulnerable to cyber attacks and cyber terrorism, including viruses, malicious code, denial of services attacks, and
identity theft. In fact, while a cyber attack would not, of course, be considered a weapon of mass destruction, it can be thought of as a weapon of mass disruption. One
person with relatively little training, inexpensive equipment, and access to the Internet has the potential to
disable an entire network or infrastructure. The financial and other costs related to such attacks are enormous. Corporations are on the front
lines of the Information Age, and they routinely face the threat of cyber attack. According to a survey released in September of this year of over 8,000 information
security professionals in 62 countries that was conducted by PricewaterhouseCoopers and CIO magazine, 69 percent of the respondents reported that their organizations
had experienced downtime related to security breaches, with 37 percent reporting downtime of more than four hours. About 28 percent of the respondents reported
damages from such security breaches, with 5 percent reporting damages of more than $500,000. While hackers had perpetrated the bulk of the attacks, the survey found
that current employees had caused 28 percent of the breaches and former employees had been responsible for 21 percent of the breaches. The U.S. Government
recognizes the threat of these vulnerabilities to our economy and security, and has developed a national strategy to address them. In February 2003, the Bush
Administration released its National Strategy to Secure Cyberspace, which seeks to marshal government and private sector resources to prevent cyber attacks on
America’s critical infrastructures, reduce national vulnerability to such attacks, and minimize damage and recovery time from attacks that do occur. The
Administration identified five national priority areas for our government’s attention: first, a national
cybersecurity response system; second, a national cyberspace security threat and vulnerability reduction
program; third, a national cyberspace security awareness and training program; fourth, securing
government’s cyberspace; and fifth, national security and international cyberspace security cooperation.
This conference provides a valuable opportunity to focus particular attention on the last priority – the need
for international cooperation. Such cooperation is essential because there are no boundaries in cyberspace.
The vulnerabilities of the Information Age transcend national borders. Our information and communications infrastructures are
converging into a seamless global network. This means that, as we transmit proprietary business data, sensitive personal information, and protected intellectual property
back and forth between our countries, it is critical that we work together to coordinate and implement cybersecurity strategies and policies. This is essential for the
growth of the global digital economy U.S.-India Initiatives on Cybersecurity The
United States welcomes India as a vital partner in
addressing such global cybersecurity issues. Our two economies are becoming increasingly interconnected
with the growth of computer software development in both countries, as well as the growing trend in utilizing information technology-related services in each other’s
country. According to NASSCOM, India’s
information technology sector generated $12.5 billion in exports during the
past fiscal year. Many of these services are provided to U.S. firms and consumers. And the United States
clearly provides information technology services to India. For instance, a significant portion of the $3.3 billion in U.S. service exports to
India in 2002 was related to services involving information technology. As these trends continue, the United States and India must work together to ensure a secure
environment for information exchanges, commercial transactions, and software development. In
light of our growing interdependence in
information technology, President Bush and then-Prime Minister Vajpayee agreed in November 2001 to establish the U.S.-India
Cyberterrorism Initiative. Since that time, our two governments have worked closely to address cybersecurity issues. In April 2002, the two governments
convened a meeting in New Delhi of the U.S.-India Cybersecurity Forum, and discussed ways to better coordinate joint cybersecurity activities regarding standards, legal
and law enforcement issues, defense, and infrastructure protection. Through this framework, the United States seeks to work with India to develop appropriate
standards for cybersecurity and to strengthen national laws and enforcement capabilities. While we favor a regulatory approach that is not excessive or burdensome on
legitimate businesses and consumers, we also believe
it is important that national laws on cyber crime be harmonized, so
that hackers and others do not move from country to country in search of lax enforcement and non-existent
penalties. For that reason, we believe that the Council of Europe’s Convention on Cybercrime provides a useful model to follow, as it sets forth principles for
strengthening national laws concerning cyber crimes and encouraging international cooperation on the investigation of such crimes. We urge India’s adherence to the
principles in this Convention. We also hope
that our two governments can establish 24/7 watch and warning capabilities
in order to help prevent and, if necessary, recover from incidents in which security is compromised. We
anticipate that these and other topics will be open for discussion when we host the next meeting of the U.S.-India Cybersecurity Forum in November in Washington, D.C.
The Public-Private Partnership Governments, of course, can only do so much, because so many of our information systems and networks are owned and operated by the
private sector. Accordingly, the cornerstone of our national cybersecurity strategy, as well as our cybersecurity initiatives with India, is an effective partnership with
industry. After all, industry is in the best position to identify threats and vulnerabilities, articulate the need for security and protection of assets, and share ideas and best
practices for the development of cybersecurity technologies, policies, and programs. This conference is a significant and concrete step toward building an effective
public-private partnership. I am confident that by bringing together representatives from government and industry in both countries to discuss best practices, we
can
increase our cooperation in fighting cyber crime and cyber terrorism, and ensure the security of our
information infrastructure. Let me therefore share with you briefly my views on some of the steps that industry can take to address the global challenges
of cybersecurity – steps that hopefully will be relevant to your discussions during this conference. Promote Global Culture of Security First, government and
industry must encourage the adoption of a global culture of security by working to institutionalize a
proactive commitment to information security. What are the most important elements of such a commitment? Certainly, technology is one key element.
Organizations must ensure that they have implemented anti-virus software, firewalls, strong encryption and authentication, patch management, and tools for intrusion detection. And these tools
must be kept up to date and properly configured. But technology is not the only element. Too often, the assumption is made that improving cybersecurity and fighting cyber crime can be done with
technology alone. That assumption is wrong. Just as the best alarm system will not protect a building if the alarm code is compromised, a network will not be secure if passwords are given out freely
or individuals responsible for handing sensitive data are not properly trained or screened. Issues of good process and good people, therefore, are every bit as important as having the right
technology. Indeed, it is critical at every stage that each of us as individuals take responsibility for cybersecurity. As consumers, we must be willing to take a few practical steps to safeguard our
experience online. As employees, we must take training and follow company procedures. And as managers, we must be willing to invest in the development of comprehensive security measures and
continuously educate all employees in them. Some have called these practices sensible “cyber hygiene.” With cyber hygiene practices in place, consumers, employees, and companies can more
effectively use existing technologies. Governments can also play a part by encouraging cyber hygiene and cyber ethics among its citizens from an early age. Once we get the “people-processtechnology” equation right, we will have gone a long way to implementing effective cybersecurity practices across organizations. Be Aware of “External” Security Efforts In addition to broadly
encouraging a culture of security, governmental and private organizations must recognize that security encompasses more than just our own “internal” efforts. We must also focus on “external”
security issues, such as the way in which suppliers, customers, and corporate partners protect their systems, supply chains, and data. Where necessary, an organization must work with partners to
16
WAKE DW
implement or improve cybersecurity policies and practices. We are only as secure as the weakest link in our information network. Incorporate Security into All Aspects of Technology Security should
also be incorporated into all aspects of information and communications technology as a routine matter. You would not purchase a car, and then separately buy the brakes or the steering wheel.
Well, the same should be the case with cybersecurity. Ideally, we should not have to purchase security measures as an add-on to our technology. Instead, they should be incorporated into that
(CONTINUED)
technology. Indeed, security should be included in the technical and procedural aspects of developing and fielding systems and networks. Organizations must also put resources into information
security research. In the end, it is cheaper and easier to design, develop, implement, and maintain cybersecurity programs than it is to lose time, money, productivity, and possibly customers in
trying to make adjustments after incidents or security breaches occur. Cooperate with Law Enforcement Finally, the private sector must cooperate with law enforcement, which is the key to holding
cyber criminals accountable for their actions. Some businesses and individuals are not aware that cyber theft, intrusions, and compromises can be reported to law enforcement and subsequently
prosecuted. Others may believe that information security compromises are routine and cannot be avoided. Organizations should educate their employees about the dangers of cyber crimes and
incidents, and must cooperate with law enforcement in prosecuting cyber criminals. In addition, where laws criminalizing the misuse of information technologies do not exist or are not up to date,
governments should be encouraged to adopt or modernize such laws. A comprehensive legal framework and effective enforcement capability are necessary elements of a nation’s strategy to secure
the
United States and India have charted a robust and unequivocal course of strategic partnership that will
benefit both countries. The private sector has an important role in translating these government initiatives into concrete joint activity at the business-tocyberspace. Conclusion With the conclusion of Phase One of the Next Steps in Strategic Partnership initiative and our ongoing dialogue under the High Technology Cooperation Group,
business and people-to-people levels. While government can create the appropriate environment for commercial activity, it is up to private businesses, organizations,
and individuals in both countries to reach out and build relationships. As
part of this process, to truly unlock the potential of the
U.S.-India trade and technology relationship, our governments and publics must work as partners to secure the
information networks, systems, and infrastructures that drive the economic activity between our two countries. Thank you.
H1-Bs are necessary to encourage brain circulation for citizen and commercial
networks
Davis 10
Ted, School of Public Policy @ George Mason Univeristy, *first part of a dissertation (draft)
(“Association for Public Policy Analysis and Management Migration: A World in Motion A Multinational Conference on Migration and Migration Policy”,
February 18-20, 2010, https://www.appam.org/conferences/international/maastricht2010/sessions/downloads/389.1.pdf)
The information technology services sector is the hottest flashpoint in the bilateral relationship. Many of
the Indians who flowed into U.S. graduate education in natural sciences and engineering in the 1970s and 1980s were snapped up by
American industry. They had little incentive to return home, thanks to the so-called ―license Raj,‖ which stifled
entrepreneurial energy, and the U.S. immigration regime accommodated them, albeit often with much bureaucratic sleight-of-hand. The Indian presence in
Silicon Valley and elsewhere in the U.S. high-technology industry grew rapidly. A noticeable proportion of
new ventures in the U.S. were founded by Indian-born high-tech entrepreneurs (Hart, Acs, and Tracy 2009). Some Indians
were also quite successful in climbing the career ladder within large multinational IT firms (Saxenian 2006). The technology boom of the 1990s
increased the dependence of the U.S. high-technology industry on Indian talent. In addition to recruiting Indian students
out of U.S. universities, the industry brought trained professionals from India to the U.S. under the H-1B visa
program. And when that supply grew tight, it advocated and won a temporary tripling of the size of that program in 1998. Although the H-1B visa covers a wide
range of occupations and professions, 18 Indian computer professionals dominated this category from the mid-1990s on (Lowell and Martin 2008). The feedback
effect to India was powerful. A new industry emerged there in which Indians who had migrated to the
U.S. played a key role. Multinational firms, such as Microsoft, IBM, and Intel, opened research and development centers
in India, often with former expatriates as their leaders. More important, a network of IT contractors and
subcontractors grew up to support clients in Silicon Valley and elsewhere in the U.S. Spurred by the Y2K ―bug,‖ the
Indian information technology sector grew at a compounded annual rate of 55% from 1992 to 2000 (Ministry of
External Affairs 2000). In this decade, firms such as Wipro, Infosys, and Tata Consultancy Services (TCS) have become large and powerful players in the global IT
industry. These
firms now account for a large fraction of H-1B visas (and, increasingly, L-1 visas as well).
17
WAKE DW
Those connections are key to stronger U.S.-Indo economic relations
Summers 10
Lawrence , Assistant to the President for Economic Policy and Director of the National Economic Council.
(““The U.S.-India Economic Relationship in the 21st Century” Remarks to the U.S.-India Business Council, June 2, 2010,
http://www.whitehouse.gov/administration/eop/nec/speeches/us-india-economic-relationship)
If you write or study the history of American foreign policy in the nineteenth century or the the twentieth century, there is surely a role for the U.S. relationship with
India. But I think, in
being honest, in neither the history of American foreign policy nor the history of India’s international
economic relations would our partnership be one of the most important elements in nineteenth- and
twentieth-century foreign policy. It is my confident expectation, and more importantly it is the confident expectation of the government of the United
States, that that will be very different in the twenty-first century. Two of the world’s largest economies. The world’s two largest
democracies. Two large, independent, vibrant, democratic nations. Nations committed to international cooperation in a shrinking
world have every reason to affiliate and to partner closely. The world that the United States wants to see,
the world that India want to see, is a world of increasing integrations, is a world of increasing prosperity, is
a world of tolerance, is a world at peace, is a world where prosperity comes from the bottom up, is a world
where respect for individuals is a paramount value. That is why I expect our partnership to be so crucial to the history of the next generation
and to the next century. That will be in part a matter of visits from heads of state, and the frequency of visits between heads of state has
risen in the last decade. It will be in part a matter of increasing connections between public officials of the kind that are now so
frequently. It seems like I see my friend Montek Ahluwalia somewhere every two or three months. That would not once have been the case. But it is even more
profoundly – and it reflects what we in governments do – a matter of the connections of ordinary citizens.
The students who come from India to the United States and a much greater number of students from the United States who should go to
India. One of the things I always said when I was president of Harvard was that many, many more of our students should be studying in India, given what the twentyfirst century was going to be. It
is also a matter of commercial connection. Commercial connection because we are a
large market for India, and India is a large market for us. Commercial connection because increasingly
what is going to be important is less the flow of products or even the flow of capital, but the flow of ideas,
and we are two nations who are major producers of ideas. Commercial connection because ultimately the
flow of goods, the flow of ideas, the flow of prosperity depends upon a sense of comfort and trust, and that
is only built through interaction. I believe I first spoke at one of the meetings of the U.S.-India Business Council only about halfway through your
history in the early 1990s, and you have seen enormous progress. But I am confident that the work of this organization and the connection between our
two nations is going to be far closer and far more consequential over the next generation than ever before.
The threat of cyber warfare is real- countries are increasing attacks against the USevery attack increases the risk of major power war
Habiger 10 (Eugene, Retired Air Force General, “ CYBERWARFARE AND CYBERTERRORISM: THE NEED FOR A
NEW U.S. STRATEGIC APPROACH,” The Cyber Security Institute, February 1)
However, there are reasons to believe that what is going on now amounts to a fundamental shift as opposed to business as
usual. Today’s network exploitation or information operation trespasses possess a number of characteristics that suggest
that the line between espionage and conflict has been, or is close to being, crossed. (What that suggests for the proper
response is a different matter.) First, the number of cyberattacks we are facing is growing significantly. Andrew Palowitch,
a former CIA official now consulting with the US Strategic Command (STRATCOM), which oversees the Defense
Department’s Joint Task Force‐Global Network Operations, recently told a meeting of experts that the Defense
Department has experienced almost 80,000 computer attacks, and some number of these assaults have actually “reduced”
the military’s “operational capabilities.”20 Second, the nature of these attacks is starting to shift from penetration
attempts aimed at gathering intelligence (cyber spying) to offensive efforts aimed at taking down systems (cyberattacks).
Palowitch put this in stark terms last November, “We are currently in a cyberwar and war is going on today.”21 Third,
these recent attacks need to be taken in a broader strategic context. Both Russia and China have stepped up their offensive
efforts and taken a much more aggressive cyberwarfare posture. The Chinese have developed an openly discussed
cyberwar strategy aimed at achieving electronic dominance over the U.S. and its allies by 2050. In 2007 the Department of
Defense reported that for the first time China has developed first strike viruses, marking a major shift from prior
investments in defensive measures.22 And in the intervening period China has launched a series of offensive cyber
operations against U.S. government and private sector networks and infrastructure. In 2007, Gen. James Cartwright, the
former head of STRATCOM and now the Vice Chairman of the Joint Chiefs of Staff, told the US‐China Economic and
Security Review Commission that China’s ability to launch “denial of service” attacks to overwhelm an IT system is of
particular concern. 23 Russia also has already begun to wage offensive cyberwar. At the outset of the recent hostilities with
Georgia, Russian assets launched a series of cyberattacks against the Georgian government and its critical infrastructure
18
WAKE DW
(CONTINUED)
systems, including media, banking and transportation sites.24 In 2007, cyberattacks that many experts attribute, directly
or indirectly, to Russia shut down the Estonia government’s IT systems. Fourth, the current geopolitical context must also
be factored into any effort to gauge the degree of threat of cyberwar. The start of the new Obama Administration has
begun to help reduce tensions between the United States and other nations. And, the new administration has taken initial
steps to improve bilateral relations specifically with both China and Russia. However, it must be said that over the last few
years the posture of both the Chinese and Russian governments toward America has clearly become more assertive, and at
times even aggressive. Some commentators have talked about the prospects of a cyber Pearl Harbor, and the pattern of
Chinese and Russian behavior to date gives reason for concern along these lines: both nations have offensive cyberwarfare
strategies in place; both nations have taken the cyber equivalent of building up their forces; both nations now regularly probe our cyber defenses
looking for gaps to be exploited; both nations have begun taking actions that cross the line from cyberespionage to cyberaggression; and, our bilateral
relations with both nations are increasingly fractious and complicated by areas of marked, direct competition. Clearly, there a sharp differences between
current U.S. relations with these two nations and relations between the US and Japan just prior to World War II. However, from a strategic defense
perspective, there are enough warning signs to warrant preparation. In addition to the threat of cyberwar, the limited resources required to
carry out even a large scale cyberattack also makes likely the potential for a significant cyberterror attack against the
United States. However, the lack of a long list of specific incidences of cyberterrorism should provide no comfort. There is
strong evidence to suggest that al Qaeda has the ability to conduct cyberterror attacks against the United States and its
allies. Al Qaeda and other terrorist organizations are extremely active in cyberspace, using these technologies to communicate among themselves and
others, carry out logistics, recruit members, and wage information warfare. For example, al Qaeda leaders used email to communicate with the 9‐11
terrorists and the 9‐11 terrorists used the Internet to make travel plans and book flights. Osama bin Laden and other al Qaeda members routinely post
videos and other messages to online sites to communicate. Moreover, there is evidence of efforts that al Qaeda and other terrorist
organizations are actively developing cyberterrorism capabilities and seeking to carry out cyberterrorist attacks. For
example, the Washington Post has reported that “U.S. investigators have found evidence in the logs that mark a browser's
path through the Internet that al Qaeda operators spent time on sites that offer software and programming instructions
for the digital switches that run power, water, transport and communications grids. In some interrogations . . . al Qaeda
prisoners have described intentions, in general terms, to use those tools.”25 Similarly, a 2002 CIA report on the
cyberterror threat to a member of the Senate stated that al Qaeda and Hezbollah have become "more adept at using the
internet and computer technologies.”26 The FBI has issued bulletins stating that, “U. S. law enforcement and intelligence agencies have
received indications that Al Qaeda members have sought information on Supervisory Control And Data Acquisition (SCADA) systems available on
multiple SCADA‐related web sites.”27 In addition a number of jihadist websites, such as 7hj.7hj.com, teach computer attack and hacking skills in the
service of Islam.28 While al Qaeda may lack the cyber‐attack capability of nations like Russia and China, there is every reason to believe its operatives,
and those of its ilk, are as capable as the cyber criminals and hackers who routinely effect great harm on the world’s digital infrastructure generally and
American assets specifically. In fact, perhaps, the most troubling indication of the level of the cyberterrorist threat is the
countless, serious non‐terrorist cyberattacks routinely carried out by criminals, hackers, disgruntled insiders,
crime syndicates and the like. If run‐of‐the‐mill criminals and hackers can threaten powergrids, hack vital military
networks, steal vast sums of money, take down a city’s of traffic lights, compromise the Federal Aviation Administration’s
air traffic control systems, among other attacks, it is overwhelmingly likely that terrorists can carry out similar, if
not more malicious attacks. Moreover, even if the world’s terrorists are unable to breed these skills, they can certainly buy them. There are
untold numbers of cybermercenaries around the world—sophisticated hackers with advanced training who would be willing to offer their services for the
right price. Finally, given the nature of our understanding of cyber threats, there is always the possibility that we have already been the victim or a
cyberterrorist attack, or such an attack has already been set but not yet effectuated, and we don’t know it yet. Instead, a
well‐designed
cyberattack has the capacity cause widespread chaos, sow societal unrest, undermine national governments,
spread paralyzing fear and anxiety, and create a state of utter turmoil, all without taking a single life. A
sophisticated cyberattack could throw a nation’s banking and finance system into chaos causing markets to
crash, prompting runs on banks, degrading confidence in markets, perhaps even putting the nation’s currency
in play and making the government look helpless and hapless. In today’s difficult economy, imagine how
Americans would react if vast sums of money were taken from their accounts and their supporting financial
records were destroyed. A truly nefarious cyberattacker could carry out an attack in such a way (akin to Robin
Hood) as to engender populist support and deepen rifts within our society, thereby making efforts to restore the system all the
more difficult. A modestly advanced enemy could use a cyberattack to shut down (if not physically damage) one or more regional power grids. An entire
region could be cast into total darkness, power‐dependent systems could be shutdown. An attack on one or more regional power grids could also cause
cascading effects that could jeopardize our entire national grid. When word leaks that the blackout was caused by a cyberattack, the specter of a foreign
enemy capable of sending the entire nation into darkness would only increase the fear, turmoil and unrest. While the finance and energy sectors are
considered prime targets for a cyberattack, an attack on any of the 17 delineated critical infrastructure sectors could have a major impact on the United
States. For example, our healthcare system is already technologically driven and the Obama Administration’s e‐health efforts will only increase that
dependency. A cyberattack on the U.S. e‐health infrastructure could send our healthcare system into chaos and put countless
of lives at risk. Imagine if emergency room physicians and surgeons were suddenly no longer able to access vital patient
information. A cyberattack on our nation’s water systems could likewise cause widespread disruption. An attack on the
control systems for one or more dams could put entire communities at risk of being inundated, and could create ripple
19
WAKE DW
(CONTINUED)
effects across the water, agriculture, and energy sectors. Similar water control system attacks could be used to at least temporarily deny water to
otherwise arid regions, impacting everything from the quality of life in these areas to agriculture. In 2007, the U.S. Cyber Consequences Unit determined
that the destruction from a single wave of cyberattacks on critical infrastructures could exceed $700 billion, which would be the rough equivalent of 50
Katrina‐esque hurricanes hitting the United States all at the same time.29 Similarly, one IT security source has estimated that the impact of a single
day cyberwar attack that focused on and disrupted U.S. credit and debit card transactions would be approximately $35
billion.30 Another way to gauge the potential for harm is in comparison to other similar noncyberattack infrastructure
failures. For example, the August 2003 regional power grid blackout is estimated to have cost the U.S. economy up to $10
billion, or roughly .1 percent of the nation’s GDP. 31 That said, a cyberattack of the exact same magnitude would most
certainly have a much larger impact. The origin of the 2003 blackout was almost immediately disclosed as an atypical
system failure having nothing to do with terrorism. This made the event both less threatening and likely a single time
occurrence. Had it been disclosed that the event was the result of an attack that could readily be repeated the impacts
would likely have grown substantially, if not exponentially. Additionally, a cyberattack could also be used to disrupt our
nation’s defenses or distract our national leaders in advance of a more traditional conventional or strategic attack. Many
military leaders actually believe that such a disruptive cyber pre‐offensive is the most effective use of offensive cyber capabilities. This is, in fact, the way
Russia utilized cyberattackers—whether government assets, governmentdirected/ coordinated assets, or allied cyber irregulars—in advance of the
invasion of Georgia. Widespread distributed denial of service (DDOS) attacks were launched on the Georgian governments IT systems. Roughly a day
later Russian armor rolled into Georgian territory. The cyberattacks were used to prepare the battlefield; they denied the Georgian government a critical
communications tool isolating it from its citizens and degrading its command and control capabilities precisely at the time of attack. In this way, these
attacks were the functional equivalent of conventional air and/or missile strikes on a nation’s communications infrastructure.32 One interesting element
of the Georgian cyberattacks has been generally overlooked: On July 20th, weeks before the August cyberattack, the website of Georgian President
Mikheil Saakashvili was overwhelmed by a more narrowly focused, but technologically similar DDOS attack.33 This should be particularly chilling to
American national security experts as our systems undergo the same sorts of focused, probing attacks on a constant basis. The ability of an enemy to use
a cyberattack to counter our offensive capabilities or soften our defenses for a wider offensive against the United States is much more than mere
speculation. In fact, in Iraq it is already happening. Iraq insurgents are now using off‐the‐shelf software (costing just $26) to hack U.S. drones (costing
$4.5 million each), allowing them to intercept the video feed from these drones.34 By hacking these drones the insurgents have succeeded
in greatly reducing one of our most valuable sources of real‐time intelligence and situational awareness. If our enemies in
Iraq are capable of such an effective cyberattack against one of our more sophisticated systems, consider what a more
technologically advanced enemy could do. At the strategic level, in 2008, as the United States Central Command was
leading wars in both Iraq and Afghanistan, a cyber intruder compromised the security of the Command and sat within its
IT systems, monitoring everything the Command was doing. 35 This time the attacker simply gathered vast amounts of
intelligence. However, it is clear that the attacker could have used this access to wage cyberwar—altering information, disrupting
the flow of information, destroying information, taking down systems—against the United States forces already at war. Similarly, during 2003 as the
United States prepared for and began the War in Iraq, the IT networks of the Department of Defense were hacked 294 times.36 By August of 2004, with
America at war, these ongoing attacks compelled then‐Deputy Secretary of Defense Paul Wolfowitz to write in a memo that, "Recent exploits have
reduced operational capabilities on our networks."37 This wasn’t the first time that our national security IT infrastructure was penetrated immediately in
advance of a U.S. military option.38 In February of 1998 the Solar Sunrise attacks systematically compromised a series of Department of Defense
networks. What is often overlooked is that these attacks occurred during the ramp up period ahead of potential military action against Iraq. The attackers
were able to obtain vast amounts of sensitive information—information that would have certainly been of value to an enemy’s military leaders. There is
no way to prove that these actions were purposefully launched with the specific intent to distract American military assets or degrade our capabilities.
However, such ambiguities—the inability to specifically attribute actions and motives to actors—are the very nature of cyberspace. Perhaps, these
repeated patterns of behavior were mere coincidence, or perhaps they weren’t. The potential that an enemy might use a cyberattack to
soften physical defenses, increase the gravity of harms from kinetic attacks, or both, significantly increases the potential
harms from a cyberattack. Consider the gravity of the threat and risk if an enemy, rightly or wrongly, believed that it could
use a cyberattack to degrade our strategic weapons capabilities. Such an enemy might be convinced that it could win a
war—conventional or even nuclear—against the United States. The effect of this would be to undermine our
deterrence‐based defenses, making us significantly more at risk of a major war.
20
WAKE DW
That risks multiple scenarios for accidental nuclear war
Fritz 09 (A study commissioned by the International Commission on Nuclear Non-proliferation and Disarmament
Hacking Nuclear Command and Control Jason Fritz BS (St. Cloud), July 2009)
Direct control of launch
The US uses the two-man rule to achieve a higher level of security in nuclear affairs. Under this rule two authorized
personnel must be present and in agreement during critical stages of nuclear command and control. The President must
jointly issue a launch order with the Secretary of Defense; Minuteman missile operators must agree that the launch order
is valid; and on a submarine, both the commanding officer and executive officer must agree that the order to launch is
valid. In the US, in order to execute a nuclear launch, an Emergency Action Message (EAM) is needed. This is a
preformatted message that directs nuclear forces to execute a specific attack. The contents of an EAM change daily and
consist of a complex code read by a human voice. Regular monitoring by shortwave listeners and videos posted to
YouTube provide insight into how these work. These are issued from the NMCC, or in the event of destruction, from the
designated hierarchy of command and control centres. Once a command centre has confirmed the EAM, using the twoman rule, the Permissive Action Link (PAL) codes are entered to arm the weapons and the message is sent out. These
messages are sent in digital format via the secure Automatic Digital Network and then relayed to aircraft via singlesideband radio transmitters of the High Frequency Global Communications System, and, at least in the past, sent to
nuclear capable submarines via Very Low Frequency (Greenemeier 2008, Hardisty 1985). The technical details of VLF
submarine communication methods can be found online, including PC-based VLF reception. Some reports have noted a
Pentagon review, which showed a potential “electronic back door into the US Navy’s system for broadcasting nuclear
launch orders to Trident submarines” (Peterson 2004). The investigation showed that cyber terrorists could potentially
infiltrate this network and insert false orders for launch. The investigation led to “elaborate new instructions for
validating launch orders” (Blair 2003). Adding further to the concern of cyber terrorists seizing control over submarine
launched nuclear missiles; The Royal Navy announced in 2008 that it would be installing a Microsoft Windows operating
system on its nuclear submarines (Page 2008). The choice of operating system, apparently based on Windows XP, is not
as alarming as the advertising of such a system is. This may attract hackers and narrow the necessary
reconnaissance to learning its details and potential exploits. It is unlikely that the operating system would play a
direct role in the signal to launch, although this is far from certain. Knowledge of the operating system may lead to
the insertion of malicious code, which could be used to gain accelerating privileges, tracking, valuable
information, and deception that could subsequently be used to initiate a launch. Remember from Chapter 2 that
the UK’s nuclear submarines have the authority to launch if they believe the central command has been destroyed.
Attempts by cyber terrorists to create the illusion of a decapitating strike could also be used to engage faildeadly systems. Open source knowledge is scarce as to whether Russia continues to operate such a system.
However evidence suggests that they have in the past. Perimetr, also known as Dead Hand, was an automated system
set to launch a mass scale nuclear attack in the event of a decapitation strike against Soviet leadership and
military.
In a crisis, military officials would send a coded message to the bunkers, switching on the dead hand. If nearby groundlevel sensors detected a nuclear attack on Moscow, and if a break was detected in communications links with top military
commanders, the system would send low-frequency signals over underground antennas to special rockets. Flying high
over missile fields and other military sites, these rockets in turn would broadcast attack orders to missiles, bombers and,
via radio relays, submarines at sea. Contrary to some Western beliefs, Dr. Blair says, many of Russia's nuclear-armed
missiles in underground silos and on mobile launchers can be fired automatically. (Broad 1993)
Assuming such a system is still active, cyber terrorists would need to create a crisis situation in order to activate
Perimetr, and then fool it into believing a decapitating strike had taken place. While this is not an easy task, the
information age makes it easier. Cyber reconnaissance could help locate the machine and learn its inner workings.
This could be done by targeting the computers high of level official’s—anyone who has reportedly worked on such a
project, or individuals involved in military operations at underground facilities, such as those reported to be located at
Yamantau and Kosvinksy mountains in the central southern Urals (Rosenbaum 2007, Blair 2008)
Indirect Control of Launch
Cyber terrorists could cause incorrect information to be transmitted, received, or displayed at nuclear
command and control centres, or shut down these centres’ computer networks completely. In 1995, a Norwegian
scientific sounding rocket was mistaken by Russian early warning systems as a nuclear missile launched from a US
submarine. A radar operator used Krokus to notify a general on duty who decided to alert the highest levels. Kavkaz was
implemented, all three chegets activated, and the countdown for a nuclear decision began. It took eight minutes before the
missile was properly identified—a considerable amount of time considering the speed with which a nuclear response must
be decided upon (Aftergood 2000).
21
WAKE DW
(CONTINUED)
Creating a false signal in these early warning systems would be relatively easy using computer network
operations. The real difficulty would be gaining access to these systems as they are most likely on a closed network.
However, if they are transmitting wirelessly, that may provide an entry point, and information gained through
the internet may reveal the details, such as passwords and software, for gaining entrance to the closed network.
If access was obtained, a false alarm could be followed by something like a DDoS attack, so the operators believe an
attack may be imminent, yet they can no longer verify it. This could add pressure to the decision making process,
and if coordinated precisely, could appear as a first round EMP burst. Terrorist groups could also attempt to
launch a non-nuclear missile, such as the one used by Norway, in an attempt to fool the system. The number of
states who possess such technology is far greater than the number of states who possess nuclear weapons. Obtaining them
would be considerably easier, especially when enhancing operations through computer network operations. Combining
traditional terrorist methods with cyber techniques opens opportunities neither could accomplish on their own.
For example, radar stations might be more vulnerable to a computer attack, while satellites are more vulnerable
to jamming from a laser beam, thus together they deny dual phenomenology. Mapping communications
networks through cyber reconnaissance may expose weaknesses, and automated scanning devices created by
more experienced hackers can be readily found on the internet.
Intercepting or spoofing communications is a highly complex science. These systems are designed to protect against the
world’s most powerful and well funded militaries. Yet, there are recurring gaffes, and the very nature of asymmetric
warfare is to bypass complexities by finding simple loopholes. For example, commercially available software for voicemorphing could be used to capture voice commands within the command and control structure, cut these sound bytes into
phonemes, and splice it back together in order to issue false voice commands (Andersen 2001, Chapter 16). Spoofing could
also be used to escalate a volatile situation in the hopes of starting a nuclear war. “ [they cut off the paragraph] “In
June 1998, a group of international hackers calling themselves Milw0rm hacked the web site of India’s Bhabha Atomic
Research Center (BARC) and put up a spoofed web page showing a mushroom cloud and the text “If a nuclear war does
start, you will be the first to scream” (Denning 1999). Hacker web-page defacements like these are often derided by critics
of cyber terrorism as simply being a nuisance which causes no significant harm. However, web-page defacements are
becoming more common, and they point towards alarming possibilities in subversion. During the 2007 cyber attacks
against Estonia, a counterfeit letter of apology from Prime Minister Andrus Ansip was planted on his political party
website (Grant 2007). This took place amid the confusion of mass DDoS attacks, real world protests, and accusations
between governments.
22
WAKE DW
Contention 2: Solvency
H1B’s are key to return migration which brings expertise and social capital back to the
country—software boom proves
Ahmed & Wamsley 8
Amer, graduate student of the Center for Global Trade Analysis * a Research Assistant Professor and Director of the Center for Global Trade Analysis
(“THE LIBERALIZATION OF TEMPORARY MIGRATION:
INDIA’S STORY”, Feburary 2008, https://www.gtap.agecon.purdue.edu/resources/download/3646.pdf)
Return migration has also been hailed as the cure for brain drain woes, by leading to a brain circulation
scenario, whereby the initial loss of skilled workers is mirrored by an influx of returning skilled migrant
workers. It has been argued that the returning migrant workers bring back higher productivities, experience, and
financial support which benefit India – transforming the brain drain into a gain. The mechanism by which the initial
outflow of workers – the brain drain – becomes a brain gain is illustrated in Figure 2.1. Balasubramanyam and Balasubramanyam (1997) argue that
migrants, who originally left in the 1960s and 1970s, played an important role in the establishment of the
Indian software sector upon their return. As evidence they point to a number of software companies
founded in Bangalore – including three of the most prominent firms, Wipro Limited, Infomart, and BPL
Systems – which were established by return migrant workers; concluding that it was this return migration,
and the subsequent brain gain, which provided much of the impetus for the rapid growth in India’s
software sector. 11 Anecdotal evidence suggests that remittances from the US into India in the GMig2 Data Base are too high, since the lions’
shares of remittances that go to South Asia are believed to come from unskilled workers in the Middle East. However, according to figures from the
Reserve Bank of India (2006), remittances from USA based Indian expatriates account for 44% of the total remittances received. The estimates
calculated from the GMig2 Database are thus in the ballpark. Sensitivity analyses will examine alternative remittance distributions by source
country. 12 The Gulf Cooperation Council comprises the Kingdom of Saudi Arabia, Bahrain, Qatar, Kuwait, the United Arab Emirates, and Oman.
10 Figure 2-1 Brain Circulation As a result of these potential benefits from return migration, the Indian Government
has developed programs aimed at Non-Resident Indians13 (NRI) and Persons of Indian Origin14 (PIO).
These programs include granting visa waivers and the facilitation of financial services, normally reserved
for Indian citizens. Overall engagement with potential return migrant workers and appeals to the
permanent migrants to participate in the development of India has become an integral part of government
policy in India. Currently there is very little return migration occurring, and it would be very easy to overestimate the
actual return migration rate to India. As Saxenian (2000) has noted, very few Indian expatriates come back to India permanently as return migrant
workers. Cervantes and Guellec (2002) support this by saying that in 2000 there were only 1500 return migrant workers while about thirty times
that number, leave every year. If government policies for temporary skilled migration, under any conceptual framework, are
to be successful the rate of return migration needs to be increased. A key assumption of Mode 4 liberalization is that
return migration will occur at a specific rate, since it is a temporary movement by design. Guest worker schemes
or mechanisms, such as the United States’ H1B system, would be most conducive to increasing return migration.
H1-B’s are where the biotech industry get’s its specialists
Dahms 3
A. Stephen Dahms, 2003, is executive director of the California State University System Biotechnology Program (CSUPERB); chair of the Workforce
Committee, Biotechnology Industry Organization; and a member of the ASBMB Education and Professional Development Committee “Foreign Scientists
Seen Essential to U.S. Biotechnology”, American Society for Biochemistry and Molecular Biology (ASBMB), 2003
The scarcity of skilled technicians is seen by the biotechnology industry in the U.S. and Canada as one of its
most serious challenges. The success of this industry is dependent on the quality of its workforce, and the
skills and talents of highly trained people are recognized as one of the most vital and dynamic sources of
competitive advantage. The U.S. biotechnology industry workforce has been growing 14 to 17 percent
annually over the last six years and is now over 190,000 and conservatively estimated to reach 500,000 by
2012. Despite efforts by the industry to encourage U.S. institutions to increase the production of needed
specialists, a continual shortfall in the needed expertise requires access to foreign workers. Foreign workers
with unique skills that are scarce in the U.S. can get permission to stay in the U.S. for up to six years under
the H-1B classification, after which they can apply for permanent resident status. There are currently over
600,000 foreign workers in this category across all industries, and they are critical to the success and global
competitiveness of this nation. Of these H-1B visa holders, 46 percent are from India and 10 percent are from China, followed in
descending order by Canada, Philippines, Taiwan, Korea, Japan, U.K., Pakistan, and the Russian Federation. Our annual national surveys
23
WAKE DW
(CONTINUED)
have demonstrated that between 6 and 10 percent of the biotechnology workforce have H-1B visas. The
constant shortfall in specialized technical workers that has been experienced by the biotechnology industry
over the past six years has been partially alleviated by access to talented individuals from other nations.
However, the industry's need is sufficient to justify a 25 percent increase in H-1Bs in 2004. Biotechnology
industry H-1B visa holders are mainly in highly sought after areas such as analytical chemistry,
instrumentation specialization, organic synthesis, product safety and surveillance, clinical
research/biostatistics, bio/pharm quality, medicinal chemistry, product scale-up, bioinformatics and
applied genomics, computer science, cheminformatics, pharmacokinetics, and pharmacodynamics. Forty
percent of H-1B foreign workers are at the Ph.D. level, 35 percent M.S., 20 percent B.S., and 5 percent M.D. In comparison, the U.S. biotechnology
industry technical workforce is estimated to be 19 percent Ph.D., 17 percent M.S., 50 percent B.S., and 14 percent combined voc-ed/ community
college trained. These and other survey data by industry human resource groups clearly show that
the H-1B worker skills match the most pressing employment needs of the biotechnology
industry. The data demonstrate that maintaining a reasonably-sized H-1B cap is critical to the industry.
Although the national annual H-1B visa cap was raised from 115,000 to 195,000 in the 106th Congress via S. 2045, the cap has already been
exceeded. The increased cap remains in effect until 2003 and efforts are under way to ensure that it remains
high. The Third Annual National Survey of H-1Bs in the biotechnology industry found that 80 percent are from U.S. universities, and 85 percent of
those eventually get green cards. Companies now spend, on average, $10,200 in processing fees and legal expenses to obtain each green card, an
estimated cost to the industry of more than $150 million over the past 5 years. In the wake of the 9/11 World Trade Center attacks, debate has
been focused on more restrictions on foreign students, a development that would have a severe impact
upon the competitiveness of the U.S. biotechnology industry. Clearly, the H-1B route provides a temporary
solution to shortages in the national and domestic biotechnology labor pools, shortages mirroring the
inadequate production of appropriately trained U.S. nationals by U.S. institutions of higher learning. The
reality is that universities have inadequate resources for expanding the training pipeline, particularly in the specialized areas of the research phase
of company product development. Efforts should be directed toward influencing greater congressional and federal agency attention to these
important topics.
Circulation isn’t the norm—India represents a special case whereby migration can
boost domestic industry
Davis 10
Ted, School of Public Policy @ George Mason Univeristy, *first part of a dissertation (draft)
(“Association for Public Policy Analysis and Management Migration: A World in Motion A Multinational Conference on Migration and Migration Policy”,
February 18-20, 2010, https://www.appam.org/conferences/international/maastricht2010/sessions/downloads/389.1.pdf)
In 2008, India had the highest level of H-1B and L-1 admissions for high-skill employment (Monger and Barr 2009).
Their H-1B admissions were more than five times that of Canada, the second ranked country. They also had the third highest F-1 admissions for
advanced education and the third highest individuals accepted for legal permanent residence. According to the Ministry of External Affairs (2000),
the per capita income of Indians in the U.S. was $60,093 compared to the U.S. average of $38,885. About 300,000 work in Silicon Valley
technology firms and accounted for 15% of high-tech start-ups; their average salary was over $200,000; and there were about 700 Indian-owned
companies. Many Indians in the U.S. also advanced to high positions in U.S. companies, such as the CEO of Microchip
Technologies, the president of Bell Labs, and senior vice-president of Qualcomm.
Successful Indians in the U.S. also were
notable for the relations they maintained to India. These relationships brought attention to resources and
opportunities in India—leading many multinational firms to locate research and development centers in
India, including General Electric, CISCO, Sun Microsystems, Microsoft, IBM, Intel, and Oracle (Ministry of External Affairs 2000). The
information technology sector in India, in particular, had shown significant growth with a compounded
annual growth rate of 55 percent from 1992 to 2000. In 2008-2009 the revenue of the information technology and business
process outsourcing industry in India was estimated at US $71.7 billion with an annual growth rate of 12 percent (MCIT 2009)— 10 directly
employing 2.23 million individuals and indirectly employing another 8 million individuals. Moreover, their export market was estimated at US
$40.4 billion with the U.S. accounting for 60 percent of exports. In concept, a win-win scenario occurs when two
parties in a relationship receive mutual benefits from that relationship and that one does not benefit at the
expense of the other. Qualitatively, the U.S. and India appear to have such a win-win relationship—
particularly in the information technology sector with respect to high-skill migration and economic
outcomes—though such a relationship may not be uniform across sectors. The precise nature of these relationships and
their benefits needs to be explored.
24
WAKE DW
Cyber Terror Impacts
Cyberwarfare causes space war
Coleman, 10 (Kevin Coleman, Defense Tech Chief Cyber War Correspondent, Cyber War = Space War, March 1st,
2010, http://defensetech.org/2010/03/01/cyber-war-space-war/#ixzz1948Fvj1r )
While the satellite broadband market slowed in 2009 because of the poor economy, it still increased. The market
continues to expand after U.S. regulators outlined the national broadband plan that allows satellite operators to use their
radio spectrum for Internet traffic. That is why cyber security professionals are so concerned about the convergence of
cyber space and space.
Its becoming increasingly evident that any future war between modern militaries would be both a space war and a cyber
war, in fact, they would be one and the same. Russia, China, and the U.S. have all stated they don’t want a space war, but
are all preparing for one if one occurs.
That sounds so familiar – oh wait a minute, didn’t Russia, China and the U.S. say the same thing about cyber war? Yes,
they did. Satellites in geostationary orbits provide broadband connectivity to businesses and customers. Those satellites
and their computer control ground stations present a viable target for offensive cyber actions. A hacker could disrupt or
interfere with satellite control communications and could disrupt the delivery of broadband services. In the absence of
such command signals, a satellite would malfunction.
Worldwide attention focused on China’s successful anti-satellite missile test. While military officials question the scale and
progress of the Chinese anti-satellite program, one has to wonder if China has already tested their anti-satellite cyber
weapon. Military leaders are all too aware of the convergence of space and cyber space. An increasing percentage of
military operations occur in cyber space and are integrated with and dependent on communication satellite systems in
outer space.
Extinction
Mitchell, et al 01 -Associate Professor of Communication and Director of Debate at the University of Pittsburgh
(Dr. Gordon, ISIS Briefing on Ballistic Missile Defence, “Missile Defence: Trans-Atlantic Diplomacy at a Crossroads”, No.
6 July,http://www.isisuk.demon.co.uk/0811/isis/uk/bmd/no6.html)
The dizzying speed of space warfare would introduce intense ‘use or lose’ pressure into strategic calculations, with the
spectre of split-second attacks creating incentives to rig orbiting. Death Start with automated ‘hair trigger’ devices. In
theory, this automation would enhance survivability of vulnerable space weapon platforms. However, by taking the
decision to commit violence out of human hands and endowing computers with authority to make war, military planners
could sow insidious seeds of accidental conflict.
Yale sociologist Charles Perrow has analyzed ‘complexlyinteractive, tightly coupled’ industrial systems such as space
weapons, which have many sophisticated components that all depend on each other’s flawless performance. According to
Perrow, this interlocking complexity makes it impossible to foresee all the different ways such systems could fail. As
Perrow explains, ‘[t]he odd term “normal accident” is meant to signal that, given the system characteristics, multiple and
unexpected interactions of failures are inevitable’.36 Deployment of space weapons with predelegated authority to fire
death rays or unleash killer projectiles would likely make war itself inevitable, given the susceptibility of such systems to
“normal accidents’.
It is chilling to contemplate the possible effects of a space war. According to retired Lt. Col. Robert M. Bowman, ‘even a
tiny projectile reentering from space strikes the earth with such high velocity that it can do enormous damage- even
more than would be done by a nuclear weapon of the same size!’.37 In the same Star Wars technology touted as a
quintessential tool of peace, defence analyst David Langford sees one of the most destabilizing offensive weapons ever
conceived: ’One imagines dead cities of microwave-grilled people’. Given this unique potential for destruction, it is not
hard to imagine that any nation subjected to space weapon attack would retaliate with maximum force, including use of
nuclear biological, and/or chemical weapons. An accidental war sparked by a computer glitch in space could plunge the
world into the most destructive military conflict ever seen.
And retaliation of a cyber-attack ensures global nuclear war
Lawson 09 (5/13, Dr. Sean Lawson is an assistant professor in the Department of Communication at the University of
Utah, “Cross-Domain Response to Cyber Attacks and the Threat of Conflict Escalation,” Transformation Tracker,
http://www.seanlawson.net/?p=477)
At a time when it seems impossible to avoid the seemingly growing hysteria over the threat of cyber war,[1] network
security expert Marcus Ranum delivered a refreshing talk recently, “The Problem with Cyber War,” that took a critical
look at a number of the assumptions underlying contemporary cybersecurity discourse in the United States. He
addressed one issue in partiuclar that I would like to riff on here, the issue of conflict escalation–i.e. the possibility
25
WAKE DW
that offensive use of cyber attacks could escalate to the use of physical force. As I will show, his concerns are
entirely legitimate as current U.S. military cyber doctrine assumes the possibility of what I call “cross-domain
responses” to cyberattacks. Backing Your Adversary (Mentally) into a Corner Based on the premise that completely
blinding a potential adversary is a good indicator to that adversary that an attack is iminent, Ranum has argued that “The
best thing that you could possibly do if you want to start World War III is launch a cyber attack. [...] When
people talk about cyber war like it’s a practical thing, what they’re really doing is messing with the OK button for starting
World War III. We need to get them to sit the f-k down and shut the f-k up.” [2] He is making a point similar to one that I
have made in the past: Taking away an adversary’s ability to make rational decisions could backfire. [3] For example,
Gregory Witol cautions that “attacking the decision maker’s ability to perform rational calculations may cause more
problems than it hopes to resolve. Removing the capacity for rational action may result in completely unforeseen
consequences, including longer and bloodier battles than may otherwise have been.” [4] Cross-Domain Response
So, from a theoretical standpoint, I think his concerns are well founded. But th e current state of U.S. policy may be
cause for even greater concern. It’s not just worrisome that a hypothetical blinding attack via cyberspace could
send a signal of imminent attack and therefore trigger an irrational response from the adversary. What is also
cause for concern is that current U.S. policy indicates that “kinetic attacks” (i.e. physical use of force) are
seen as potentially legitimate responses to cyber attacks. Most worrisome is that current U.S. policy implies
that a nuclear response is possible, something that policy makers have not denied in recent press reports.
The reason, in part, is that the U.S. defense community has increasingly come to see cyberspace as a “domain of
warfare” equivalent to air, land, sea, and space. The definition of cyberspace as its own domain of warfare helps in its
own right to blur the online/offline, physical-space/cyberspace boundary. But thinking logically about the potential
consequences of this framing leads to some disconcerting conclusions. If cyberspace is a domain of warfare, then it
becomes possible to define “cyber attacks” (whatever those may be said to entail) as acts of war. But what happens
if the U.S. is attacked in any of the other domains? It retaliates. But it usually does not respond only within the
domain in which it was attacked. Rather, responses are typically “cross-domain responses”–i.e. a massive bombing
on U.S. soil or vital U.S. interests abroad (e.g. think 9/11 or Pearl Harbor) might lead to air strikes against the
attacker. Even more likely given a U.S. military “way of warfare” that emphasizes multidimensional, “joint”
operations is a massive conventional (i.e. non-nuclear) response against the attacker in all domains (air, land, sea,
space), simultaneously. The possibility of “kinetic action” in response to cyber attack, or as part of offensive U.S.
cyber operations, is part of the current (2006) National Military Strategy for Cyberspace Operations [5]: Of
course, the possibility that a cyber attack on the U.S. could lead to a U.S. nuclear reply constitutes possibly the ultimate in
“cross-domain response.” And while this may seem far fetched, it has not been ruled out by U.S. defense policy makers
and is, in fact, implied in current U.S. defense policy documents. From the National Military Strategy of the United States
(2004): “The term WMD/E relates to a broad range of adversary capabilities that pose potentially devastating impacts.
WMD/E includes chemical, biological, radiological, nuclear, and enhanced high explosive weapons as well as other, more
asymmetrical ‘weapons’. They may rely more on disruptive impact than destructive kinetic effects. For example, cyber
attacks on US commercial information systems or attacks against transportation networks may have a greater economic or
psychological effect than a relatively small release of a lethal agent.” [6] The authors of a 2009 National Academies of
Science report on cyberwarfare respond to this by saying, “Coupled with the declaratory policy on nuclear weapons
described earlier, this statement implies that the United States will regard certain kinds of cyberattacks against the
United States as being in the same category as nuclear, biological, and chemical weapons, and thus that a
nuclear response to certain kinds of cyberattacks (namely, cyberattacks with devastating impacts) may be possible.
It also sets a relevant scale–a cyberattack that has an impact larger than that associated with a relatively small release of a
lethal agent is regarded with the same or greater seriousness.” [7] Asked by the New York Times to comment on this, U.S.
defense officials would not deny that nuclear retaliation remains an option for response to a massive
cyberattack:
None of their impact defense assumes Stuxnet
Clayton, 10 (Stuxnet 'virus' could be altered to attack US facilities, report warns, December 12, 2010,
http://www.csmonitor.com/USA/2010/1215/Stuxnet-virus-could-be-altered-to-attack-US-facilities-report-warns)
Stuxnet, a computer worm that hit and may have severely damaged Iranian nuclear facilities, is the type of cyberweapon
that could broadly harm the United States, undermining both society and government ability to defend the nation, says a
strongly worded report to Congress.
A successful broad-based attack on the US, using new variants of the Stuxnet weapon, could do enough widespread
damage to critical infrastructure – including water, power, transportation, and other services – that it "threatens to cause
harm to many activities deemed critical to the basic functioning of modern society," said the little-noticed report issued by
the Congressional Research Service (CRS) Dec. 9.
26
WAKE DW
If retooled slightly, Stuxnet could be directed to target a wide swath of critical infrastructure facilities, rather than a
narrow target such as Iran's nuclear fuel-enrichment facilities and nuclear power plant, the eight-page CRS synopsis
warns, quoting researchers and other analysts.
IN PICTURES: Who has nukes?
"Depending on the severity of the attack, the interconnected nature of the affected critical infrastructure facilities, and
government preparation and response plans, entities and individuals relying on these facilities could be without life
sustaining or comforting services for a long period of time," the study's summary states. "The resulting damage to the
nation’s critical infrastructure could threaten many aspects of life, including the government’s ability to safeguard national
security interests."
Terrorist groups, previously deemed not to have much independent ability to launch damaging cyberattacks, could
potentially purchase or even rent a Stuxnet-based variant from organized crime groups to launch an infrastructure attack
on the US, the report warns.
While some experts say the "cyber threat to critical infrastructure is exaggerated, regardless of the perpetrators’
capabilities," most such skepticism has been general in nature and does not factor in the new Stuxnet cyberweapon, the
report says.
The report quotes Dr. Udo Helmbrecht, executive director of the European Network and Information Security Agency, as
saying in October that “Stuxnet is really a paradigm shift, as Stuxnet is a new class and dimension of malware." He went
on to call it a "first strike" weapon that is "one of the first organized, well prepared attacks against major industrial
resources. This has tremendous effect on how to protect national (critical infrastructure) in the future.”
27
WAKE DW
1AC-BJP Advantage
Advantage: ___ BJP
The BJP is dying now-Voters don’t think its message is as relevant and they can’t win
elections
FP 10
2006 and 2005 nominee and a 2009, 2007, and 2003 winner of the National Magazine Award for General Excellence. The magazine’s readers include some of the most
influential leaders in business, government, and other professional arenas throughout the United States and more than 160 other countries.
(“Does India Still Need a Hindu Nationalist Party?”, April 30, 2010
http://www.foreignpolicy.com/articles/2010/04/30/does_india_still_need_a_hindu_nationalist_party?page=0,1)
It's been a tough 12 months for India's Bharatiya Janata Party. Last spring, the center-right political counterweight to
the Gandhi clan's left-leaning Congress Party was routed in India's national elections, losing two dozen
seats in the country's lower house after mustering just 19 percent of the national vote. The results continued
the BJP's slide, wiping out a third of the seats it had amassed during its political high a decade earlier. After
last spring's crushing defeat, the party vowed to rise again. But then more losses followed in state elections.
Most recently, a top BJP figure's testimony about his role in 2002 religious riots in Gujarat that left nearly
2,000 Muslims dead highlighted the lingering image problems the party faces. It also pointed to a larger
issue plaguing the BJP: Can the party survive while still holding on to its founding ideology? So far, there
have been no easy answers. The BJP rose to power a decade ago brandishing an assertive brand of
nationalism called Hindutva. Hindutva -- meaning, essentially, "Hindu-ness" -- stirred a potent mix of cultural
nostalgia and aggressive religious nationalism that proved to be political gold. Hindutva also has a
conveniently loose definition: It can imply anything from a fairly benign affirmation of Hindu culture and
history to a more virulently anti-Muslim chauvinism. Because of this, the BJP was able to form alliances
with hard-line subgroups like Rashtriya Swayamsewak Sangh (RSS) and Shiv Sena, a Maharashtra-based
party whose politics were expanded from localized ethnic politics to include a form of Hindutva.
They’re key to Indian democracy
Vijay 9
Tarun, Director, Dr Syama Prasad Mookerjee Research Foundation, Indian Think Tank
(“Why India needs the BJP”, August 21, 2009, http://news.rediff.com/column/2009/aug/21/why-india-needs-the-bjp.htm
These lengthy quotations are essential to understand the real purpose behind the BJP, which has accepted Dr Mookerjee and Deen Dayal Upadhyaya as its sources of inspiration showing the
the independence movement essentially drew from Hindu nationalist
ideological path. In pre-Partition days,
symbols and writings
expressed through Mahatma Gandhi's [ Images ] Ram Rajya, Sri Aurobindo's Bhawani Bharati concept which saw India as Durga incarnate and declared Sanatan Dharma as the nationality of India,
They were all deeply Hindu spiritual personalities who espoused the cause of
freedom, liberty, equality and democracy. There was less ideological apartheid than we see today and
newspapers like The Hindu and The Hindustan Times were not looked down just because they bore a word
Hindu and parties like the Hindu Mahasabha, Ram Rajya Parishad etc were in the mainstream without experiencing any kind of 'ideological untouchability'. It's only after Independence under
the influence of Nehruvian left-to-centre policies that the assertive Hindus segment was sought to be humiliated and segregated. In the contemporary political scene,
the Congress, which once represented the federal liberal character of Hindu nationalist ideas advocating equality to all, has turned into a family oriented party
where internal democratic process is completely subjugated to the wishes and whims of a supreme leader who
also happens to be a family head. Except for the Communist parties and the BJP there is a hardly a party that is
democratically run and controlled from the grassroot levels. Hence, in spite of internal bickering and trivial
issues cropping up, a party that was born post Independence representing a distinct ideology and
programmes can only be a strengthening factor for democracy. Its amazing growth and power to rule the nation quite successfully have further
added to its credibility. Those who oppose it must look at the fact sheet it has so far built -- giving India the best of the
highways, an IT and technological revolution, best run states in Gujarat, Madhya Pradesh [ Images ] and Chhattisgarh and above all a
credible opposition that has a vast acceptability at an all India level, giving a pan India character to the polity.
Vivekananda, Lokmanya Tilak, and Subhas Bose.
The poet who wrote, 'Gagan mein laharta hai bhagwa hamara (The saffron flies high in the sky)' became the most admired prime minister, the first genuinely non-Congress one and his regime saw
the best of relations with neighbours. Atal Bihari Vajpayee [ Images ] allowed Pokaran II, yet maintained better ties with the US, China and Pakistan without compromising on national interest.
This party has another distinct feature -- it can boast of a galaxy of national leaders who command a mass
following unlike others who have none but their 'eternally elected' chiefs alone for the posters and
platforms diminishing any second or third rank leadership. And you don't have to belong to a family or a family's durbar to aspire for higher goals
and posts in the party. Someone who was a village level worker and did his bit to gain acceptance could become party president and was never told, oh you don't have a particular last name hence
can rise this far and no further. Pardon me if in this context, to clarify a bit more, I recall a Q&A session I had in China where I was asked in a university by students – 'What's the use of your
democracy if it can't deliver? See Bihar and Orissa and UP's rural areas and farmers suicides? We may not be having the democracy you like to ape from the West but our one party system is
delivering fine.' I was not surprised.
The value of democracy can be understood only when you lose it after enjoying its
28
WAKE DW
(CONTINUED)
fruits. I simply said, even with half filled stomachs and often self defeating noises, we prefer freedom more than a totalitarian regime guaranteeing prosperity to all. Liberty can
have no alternative. And that's exactly the most powerful factor that makes the BJP indefatigable and invincible. The party's inner core promises to rise like a Phoenix if the outer
shell fails to translate the ideals it was born to achieve. It may look a bit preposterous to say these high pedestal things when the party is making news not for some happy reasons. It is sad, but it will
pass. The party is not built by those who were adherents of a family, but by those small yet strongly committed young hearts who built it on their shoulders because they shared a vision and a dream.
the BJP. They never aspired to make it big in Delhi [ Images ]
but from Silchar to Shimoga and Doda to Port Blair, they have been working. These workers are the strength of the party and not
those who make big speeches and then wash dirty linen in the media. They must be powered and their
moral needs to be boosted by a united commitment to principles leaders claim they accept. Today these workers have
I have seen three generations working together, first for the Jan Sangh and then for its new avatar,
emerged taller because they have lived the ideals espoused by Deen Dayal Upadhyaya who had merged his identity with the common cadre and lived by his principles through his own life's example.
He gave the alternative ideology of integral humanism before the two alien ones namely capitalism and
communism. That almost supplements and complements Gandhi's Hind Swarajya whose hundredth year is passing so unceremoniously in the raj of the 'Gandhis'. It is this
perfectly ideological rock of our civilisation represented by the BJP in politics that India needs fervently.
That’s key to Asian stability
Lee 10
John, foreign policy research fellow at the Center for Independent Studies and a Visiting Fellow at the Hudson Institute in Washington. He is the author
of Will China Fail?
(“India's Edge Over China: Soft Power In the struggle to win support around Asia, India's openness gives the country a big advantage compared with
China, columnist John Lee writes, Bloomberg, http://www.businessweek.com/globalbiz/content/jun2010/gb20100617_150774.htm)
While China's neighbors look at the country's rise with a mixture of apprehension and admiration, the story of India's reemergence as a regional power is more attractive
to many states in the region. After all, unlike China, India has no history of invasion or domination in East and Southeast Asia and does not have competing claims in the
South China Sea with other Asian states. Moreover, "in today's world," India's then-Minister of State for External Affairs Shashi Tharoor said in a speech last November,
"it is not the size of the army that wins but the country that tells the better story." As
the world's largest democracy, with a vibrant press
and thriving entertainment industry, India has huge soft power advantages over China and its state-controlled media. The
implication is India can take advantage of that goodwill as Asia's two giants battle for influence in the region and around the world. Tharoor is
correct to refer to India's soft-power advantages. But goodwill towards India and the enormous potential of Indian soft power—
the ability to influence the behavior of other states through attraction and cooptation rather than military force or economic inducement—does not arise
simply from the growing popularity of Bollywood movies or the fact that Indian contestants (along with those from Venezuela) have won
more Miss World contests than any other country. The fact that one likes Indian culture may not necessarily lead foreign governments to accede and acquiesce to Indian
foreign policy objectives. Instead, power—soft or hard—needs
to be understood within the context of how attractiveness and
influence in the region is acquired and wielded. The regional order over the past two decades has been
characterized by a move toward open markets, multinational cooperation, international rule-of-law, and an
evolving democratic community—all backed by American preeminence and Washington's security alliances and partnerships with key capitals, such as
Tokyo, Seoul, Canberra, Singapore, Manila and Bangkok. The enduring preference of all key states (with the exception of China) is to maintain the existing order vis-àvis newly reemerging powers such as China and India. STRATEGICALLY COMFORTABLE That
India is rising through full and unapologetic
participation in the American-led regional order works to its advantage. Although India is not looking to
become an American ally, New Delhi is fundamentally satisfied with the existing strategic order. As Singapore's
Foreign Minister George Yeo puts it in an interview with The Hindu newspaper in January 2007, "We see India's presence as being a beneficial
and beneficent one to all of us in Southeast Asia." Moreover, India was already a robust democratic country that
has remained intact despite still-open wounds from decades of disastrous socialist economic policies. That allows the country to leverage what
Professor Michael Mandelbaum of the Johns Hopkins School of Advanced International Studies calls " democratic exemplarism"—a paradigm
emerging from the successful examples of not just the U.S. but the evolving liberal democracies in East and
Southeast Asia. In particular, Indian politics and society are well aligned with regional standards of what
constitutes a modern and legitimate social and political system. Unlike the intolerance of political pluralism
in China, India's domestic habits of negotiation and compromise from 60 years of robust democracy offer
greater reassurance to other states that these virtues will be carried over in New Delhi's interaction with
other capitals. NOT MUCH APPREHENSION Therefore, in addition to being impressed with India's recently acquired hard-power abilities (such as its
naval fleet of almost 60 surface ships), plus an economy that has been growing at a rate of 7 percent to 8 percent for almost two decades, political and
strategic elites increasingly see India as a predictable, stabilizing, cooperative, and attractive rising power.
The notable lack of apprehension about India's rise and the eagerness to help India emerge as a new center
of power in Asia is demonstrated by the remarkable speed with which India has been welcomed as a trusted
strategic player in the region by all status quo states—fulfilling New Delhi's objective of becoming an
indispensable and crucial player in the regional security setup.
29
WAKE DW
Global nuke war
Cirincione 2k
(Cirincione, Joseph. "The Asian Nuclear Reaction Chain." Foreign Policy (Spring 2000): 120. Expanded Academic ASAP.)
The blocks would fall quickest and hardest in Asia, where proliferation pressures are already building more
quickly than anywhere else in the world. If a nuclear breakout takes place in Asia, then the international
arms control agreements that have been painstakingly negotiated over the past 40 years will crumble.
Moreover, the United States could find itself embroiled in its fourth war on the Asian continent in six
decades--a costly rebuke to those who seek the safety of Fortress America by hiding behind national missile defenses. Consider what is already happening: North
Korea continues to play guessing games with its nuclear and missile programs; South Korea wants its own missiles to match Pyongyang's; India and Pakistan shoot
across borders while running a slow-motion nuclear arms race; China modernizes its nuclear arsenal amid tensions with Taiwan and the United States; Japan's vice
defense minister is forced to resign after extolling the benefits of nuclear weapons; and Russia--whose Far East nuclear deployments alone make it the largest Asian
nuclear power--struggles to maintain territorial coherence.
Five of these states have nuclear weapons; the others are capable of
constructing them. Like neutrons firing from a split atom, one nation's actions can trigger reactions
throughout the region, which in turn, stimulate additional actions. These nations form an interlocking Asian
nuclear reaction chain that vibrates dangerously with each new development. If the frequency and intensity of
this reaction cycle increase, critical decisions taken by any one of these governments could cascade into the
second great wave of nuclear-weapon proliferation, bringing regional and global economic and political instability and, perhaps, the
first combat use of a nuclear weapon since 1945.
Indian-American immigrants key-They give money and legitimacy to the BJP
Mathew & Prashad 1
B. Mathew and V. Prashad Proffessors@ Rider College, New Jersey and Trinity College, Connecticut, respectively
(“Hindutva for a Few Dollars a Day”, 2001, Sabrang Alternative News Network, http://www.sabrang.com/news/biju1.htm)
Money Talks Besides the electronic networks and university campuses, Yankee Hindutva draws upon traditional organising sites such as temples, conferences and regional economic and cultural
institutions. The busloads of young Indian-Americans arriving at the GV2000 conference for a dose of the spiritual offers evidence for traditional mass mobilisation; the T-shirts distributed by
Yankee Hindutva is
not an anachronistic project which will be worn out by the sands of time; if that were so, its growth should not cause fear. The ensemble
is strongly linked with the movement in India and its strategies reveal the virtuoso techniques by which it
draws the youth (by acknowledging their crises, even if its own offer of a solution is far from adequate). The Vishwa Hindu Parishad’s Memorandum of Association clearly demonstrates
ISKCON (“Be Udderly Cool”, “Save a Cow”) and the blue baseball caps with VHPA embossed in white, offer evidence of the traditional forms of propaganda.
the global strategies of what is a dynamic, global project: (a) The Trustees may open or may help to establish Associations in countries outside Bharat having similar aims and objects or affiliate such
associations with the Parishad. (b) The Board of Trustees shall have the power to collect funds and donations from Hindus residing outside Bharat or from the Associations established or affiliated
as mentioned in sub-rule (a) of this rule to hold such funds and spend them for the objects of the Parishad. For this purpose the Trustees may appoint any bank or person to act as their authorised
The Hindutva project is engineered by the bourgeois-technocrat, who forms part of the new trans-national elite in our recent phase of global capitalism. This elite
is able to conduct its political work in two nations. The Hindujas, for example, both welcome the BJP as a
positive force in Indian politics and simultaneously donate millions of dollars to Columbia University to
start a Vedic Studies program. A management consultant in Maryland posts two letters addressed to him on the internet to demonstrate his sympathies for the Hindutva
agent.
project: one from Ashok Singhal on Goverment of India letterhead (Singhal was Home Minister for 14 days this year) and the other from Jay Dubashi, the BJP’s economic wizard. How does this
As a member of the trans-national elite, he is perhaps not altogether ‘obscure’, for
his American location makes him powerful in India. The financial clout of the Hindutva forces in the US
can be understood if one looks at the growth in its income figures over the last five years. Between 1990-92
the average income of the VHPA was $385,462. By 1993, its income had gone up to $1,057,147. Over the
years, the VHPA has discreetly transferred money into India. It is common knowledge that during the wave of Shilapujan ceremonies across the globe,
millions of dollars in cash and kind reached India. It is also common knowledge that VHP and BJP
functionaries carry back huge sums of money in cash or kind after each visit to the US. We do not know the sums involved. One aspect of
‘obscure’ consultant get such access to power?
the financial relations of the VHPA to the Subcontinent can be documented: the VHPA runs two programmes, the Vanvasi Seva and Support a Child, which transfer money to non-governmental
front organisations in South Asia. Compared to the volume of industrial investment flowing into India, the figures of half a million under the Seva programme appear to be insignificant. However,
that half million enters the country in a sector which draws money from neither the Indian State nor multi-national capital. This sector is made up of organisations which battle for the spoils of the
The Hindutva groups are immediately among the elite of
these groups given their pipeline of funds and these groups are, therefore, able to exert their influence among
subaltern populations. In addition to the financial significance of the American groups, the NRIs offer their
Indian allies legitimacy. Imperial domination began a tradition in India of valorising anything ‘foreign’; the
BJP frequently refers to its American allies in order to reaffirm its legitimacy as the party that appeals to even
those who live overseas.
liberal elements in the advanced industrial countries as well as the domestic bourgeoisie.
30
WAKE DW
OLD Contention 2: Solvency
More H1-B’s to India are key to a deeper relations insulated from political fights. China
and the Soviet Union prove visas foster other forms of cooperation
Pickering & Agre 10
Thomas & Peter, Pickering served as undersecretary of state from 1997-2000 and chairs the advisory council of the Civilian Research and Development
Foundation. Agre, a Nobel laureate, is a physician and director of the Malaria Research Institute at the Johns Hopkins Bloomberg School of Public
Health. He is president of the American Association for the Advancement of Science. ( “Science diplomacy aids conflict reduction”, February 20, 2010,
http://www.signonsandiego.com/news/2010/feb/20/science-diplomacy-aids-conflict-reduction/)
The White House and Congress have made welcome moves to embrace the potential of science diplomacy, but in the months and years
will need to exert still more leadership and make sure the effort has the resources needed to
succeed. Science diplomacy is hardly a new idea. A 1979 agreement between the U nited States and China
paved the way for bilateral scientific cooperation that has generated vast benefits for both nations,
including reduced tensions and billions of dollars in economic activity. U.S. and Soviet nongovernmental
organizations contributed to a Cold War thaw through scientific exchanges, with little government support
other than travel visas. Now, science diplomacy may help America open a door toward improved relations with Pyongyang, too. Last
ahead, they
December, six Americans representing leading scientific organizations sat down with their North Korean counterparts. High-level science
delegations from the United States in recent months also have visited Syria, Cuba and Rwanda, not to mention Asian and European nations.
America’s scientific and technological accomplishments are admired worldwide, suggesting a valuable way to promote dialogue. A June 2004 Zogby
International poll commissioned by the Arab American Institute found that a deeply unfavorable view of the U.S. in many Muslim nations, but a
profoundly favorable view of U.S. science and technology. Similarly, Pew polling data from 43 countries shows that favorable views of U.S.
science and technology exceed overall views of the United States by an average of 23 points. Within the scientific
community, journals routinely publish articles cowritten by scientists from different nations, and scholars
convene frequent conferences to extend those ties. Science demands an intellectually honest atmosphere,
peer review and a common language for the professional exchange of ideas. Basic values of transparency,
vigorous inquiry and respectful debate are all essential. The North Korea visit, organized by the U.S.-Democratic People’s
Republic of Korea Science Engagement Consortium, exemplifies the vast potential of science for diplomacy. The U.S.
government already has 43 bilateral umbrella science and technology agreements with nations worldwide, and the administration of President
Barack Obama is elevating the profile of science engagement. In June, in Cairo, he promised a range of joint science and technology initiatives with
Muslim-majority countries. In November, Secretary of State Hillary Clinton appointed three science envoys to foster new partnerships and address
common challenges, especially within Muslim-majority countries. In addition to providing resources, the government should quickly
and significantly increase the number of H1-B visas being approved for foreign doctors, scientists and
engineers. Foreign scientists working or studying in U.S. universities make critical contributions to human
welfare and to our economy, and they often become informal goodwill ambassadors for America overseas.
Science is a wide-ranging effort that naturally crosses borders, and so scientist-to-scientist collaboration
can promote goodwill at the grass roots.
Increased H1B’s are key to the Indian biotech sector-Brain circulation brings expertise and social
capital back to the country-The software boom proves
Ahmed & Wamsley 8
Amer, graduate student of the Center for Global Trade Analysis * a Research Assistant Professor and Director of the Center for Global Trade Analysis
(“THE LIBERALIZATION OF TEMPORARY MIGRATION:
INDIA’S STORY”, Feburary 2008, https://www.gtap.agecon.purdue.edu/resources/download/3646.pdf)
Return migration has also been hailed as the cure for brain drain woes, by leading to a brain circulation
scenario, whereby the initial loss of skilled workers is mirrored by an influx of returning skilled migrant
workers. It has been argued that the returning migrant workers bring back higher productivities, experience, and
financial support which benefit India – transforming the brain drain into a gain. The mechanism by which the initial
outflow of workers – the brain drain – becomes a brain gain is illustrated in Figure 2.1. Balasubramanyam and Balasubramanyam (1997) argue that
migrants, who originally left in the 1960s and 1970s, played an important role in the establishment of the
Indian software sector upon their return. As evidence they point to a number of software companies
founded in Bangalore – including three of the most prominent firms, Wipro Limited, Infomart, and BPL
Systems – which were established by return migrant workers; concluding that it was this return migration,
and the subsequent brain gain, which provided much of the impetus for the rapid growth in India’s
software sector. 11 Anecdotal evidence suggests that remittances from the US into India in the GMig2 Data Base are too high, since the lions’
shares of remittances that go to South Asia are believed to come from unskilled workers in the Middle East. However, according to figures from the
Reserve Bank of India (2006), remittances from USA based Indian expatriates account for 44% of the total remittances received. The estimates
31
WAKE DW
calculated from the GMig2 Database are thus in the ballpark. Sensitivity analyses will examine alternative remittance distributions by source
country. 12 The Gulf Cooperation Council comprises the Kingdom of Saudi Arabia, Bahrain, Qatar, Kuwait, the United Arab Emirates, and Oman.
10 Figure 2-1 Brain Circulation As a result of these potential benefits from return migration, the Indian Government
has developed programs aimed at Non-Resident Indians13 (NRI) and Persons of Indian Origin14 (PIO).
These programs include granting visa waivers and the facilitation of financial services, normally reserved
for Indian citizens. Overall engagement with potential return migrant workers and appeals to the
permanent migrants to participate in the development of India has become an integral part of government
policy in India. Currently there is very little return migration occurring, and it would be very easy to overestimate the
actual return migration rate to India. As Saxenian (2000) has noted, very few Indian expatriates come back to India permanently as return migrant
workers. Cervantes and Guellec (2002) support this by saying that in 2000 there were only 1500 return migrant workers while about thirty times
that number, leave every year. If government policies for temporary skilled migration, under any conceptual framework, are
to be successful the rate of return migration needs to be increased. A key assumption of Mode 4 liberalization is that
return migration will occur at a specific rate, since it is a temporary movement by design. Guest worker schemes
or mechanisms, such as the United States’ H1B system, would be most conducive to increasing return migration.
Circulation isn’t the norm-India represents a special case whereby migration can boost
domestic industry
Davis 10
Ted, School of Public Policy @ George Mason Univeristy, *first part of a dissertation (draft)
(“Association for Public Policy Analysis and Management Migration: A World in Motion A Multinational Conference on Migration
and Migration Policy”, February 18-20, 2010,
https://www.appam.org/conferences/international/maastricht2010/sessions/downloads/389.1.pdf)
In 2008, India had the highest level of H-1B and L-1 admissions for high-skill employment (Monger and Barr 2009).
Their H-1B admissions were more than five times that of Canada, the second ranked country. They also had the third highest F-1 admissions for
advanced education and the third highest individuals accepted for legal permanent residence. According to the Ministry of External Affairs (2000),
the per capita income of Indians in the U.S. was $60,093 compared to the U.S. average of $38,885. About 300,000 work in Silicon Valley
technology firms and accounted for 15% of high-tech start-ups; their average salary was over $200,000; and there were about 700 Indian-owned
companies. Many Indians in the U.S. also advanced to high positions in U.S. companies, such as the CEO of Microchip
Technologies, the president of Bell Labs, and senior vice-president of Qualcomm.
Successful Indians in the U.S. also were
notable for the relations they maintained to India. These relationships brought attention to resources and
opportunities in India—leading many multinational firms to locate research and development centers in
India, including General Electric, CISCO, Sun Microsystems, Microsoft, IBM, Intel, and Oracle (Ministry of External Affairs 2000). The
information technology sector in India, in particular, had shown significant growth with a compounded
annual growth rate of 55 percent from 1992 to 2000. In 2008-2009 the revenue of the information technology and business
process outsourcing industry in India was estimated at US $71.7 billion with an annual growth rate of 12 percent (MCIT 2009)— 10 directly
employing 2.23 million individuals and indirectly employing another 8 million individuals. Moreover, their export market was estimated at US
$40.4 billion with the U.S. accounting for 60 percent of exports. In concept, a win-win scenario occurs when two
parties in a relationship receive mutual benefits from that relationship and that one does not benefit at the
expense of the other. Qualitatively, the U.S. and India appear to have such a win-win relationship—
particularly in the information technology sector with respect to high-skill migration and economic
outcomes—though such a relationship may not be uniform across sectors. The precise nature of these relationships and
their benefits needs to be explored.
H1B’s are how the industry gets it’s specialists
Dahms & Trow 5
A. Stephen Dahms is at the California State University System Biotechnology Program, San Diego State University, San Diego, California, USA and
Stephen C. Trow is at Trow & Rahal, PC, an immigration law firm in Washington, DC, USA, “US biotechnology companies and foreign nationals: the
changing dynamics of access to H-1B visas” Volume 23 Number 5 May 2005 Nature Biotechnology
Regional biotechnology industry clusters cite access to a skilled labor pool as one of the top two or three
most significant hurdles to commercialization. In the United States, a shortfall in the labor pool has
required access to foreign workers in a variety of areas and expertise. Starting with efforts in California, the
industry was surveyed in 1998–2001, which led to findings that, depending upon the region, between 6% and 10% of the US
biotechnology workforce had H-1B visas, with an estimate of 18,000 in the biotech industry nationally, and
projected needs of 25% annual increases in some of the clusters. Relatedly, the US Department of Commerce reported in
2003 that the biotech industry workforce grew annually by 12% over the period 1997–2003. Biotechnology industry surveys of H-1B visa usage1 also
32
WAKE DW
found that 80% of biotechnology H-1Bs were from US universities, 75% were graduate-degreed (40% PhD, 35% MS, 20% BS and 5% MD), 85%
eventually acquired permanent residency in the US and companies were spending an average of $10,200 on each H-1B worker for processing fees
and legal expenses through to a green card, leading to the conclusion that US companies had spent in excess of $150 million over the previous five
years to acquire and keep their H-1B workers. These and other survey data also clearly showed that the H-1B worker
skill sets sought by biotech companies identically match the most pressing employment needs of the
industry overall and that their compensation was equal to, or in most cases, higher than US nationals.
Recent history Access to H-1B visas is limited by a ‘cap’ or annual limit on the number of new foreign
workers who can be granted H-1B visa status. Increasing demand for H-1B visa status first exceeded the cap in September 1997,
and then caused major disruptions in May 1998 when processing of petitions for new H-1B workers was suspended for the remaining five months of
fiscal year (FY) 1998. In response to pressure exerted by the information technology (IT) industry and the Biotechnology
Industry Organization (BIO; Washington, DC, USA), the H-1B cap was raised from 65,000 to 115,000 in FY 1999 and
then again to 195,000 in FY 2001, with a provision that the cap would revert to 65,000 on October 1, 2004.
Starting in mid-2001, discussions began within BIO about legislative strategies to raise the cap from
65,000 back to a level that would assure access to these talented foreign nationals. This initiative
was derailed by the events of September 11, after which any discussion of increasing the entry of foreign
workers was counter to public and congressional opinion. Although there has not been a biotechnology
industry H-1B needs survey since early 2001, it is thought that demands are increasing in the range of
3,500 to 5,000 per year. Fortunately, the law raising the cap for FY 2001 also exempted from the cap all H-1B workers employed at an
institution of higher education or a related or affiliated nonprofit entity, or at a nonprofit research organization or a governmental research
organization, thus removing approximately 10,000 workers from the H-1B cap. The current situation On October 1, 2004, when FY 2005 began and
the H-1B cap reverted to 65,000, the US Citizenship and Immigration Services (USCIS) announced that it had received enough H-1B petitions
during the preceding six months to use up the entire supply for FY 2005. The USCIS indicated that it would continue to process petitions that it
received before October 1, but it would not accept any new H-1B petitions that are subject to the cap for FY 2005. It also announced that it would
start to accept petitions for FY 2006 on April 1, 2005, six months before the start of FY 2006. Many employers expected that the USCIS would
receive enough petitions to exhaust the FY 2006 supply well before October 1, 2005, and made plans to file their petitions in April 2005. In
December 2004, the FY 2005 Omnibus Appropriations Act exempted from the H-1B cap up to 20,000 foreign nationals per year who have earned a
master’s degree or higher from a US university. This change was prompted by renewed pressure from the IT, semiconductor and engineering
industrial sectors, especially the National Association of Manufacturers (which BIO has partnered with on the H-1B issue since the mid-1990s). The
new exemption is vitally important for foreign students who graduated from US universities during 2004 and are now working in F-1 or J-1 visa
status with practical training authorization that expires before October 1, 2005. The exemption was scheduled to take effect on March 8, 2005, and
it was expected that the 20,000 new slots would be taken quickly, so employers made plans to file petitions for qualifying workers on March 8.
There were no changes in the other exemptions from the H-1B cap, so employers continued with their plans to file petitions for nonexempt workers
on April 1. However, on March 4, 2005, the USCIS announced that it was not ready to accept petitions for these 20,000 new H-1B slots as scheduled
on March 8, and then it announced to great surprise that these 20,000 slots would not be limited to foreign nationals with a master’s/PhD degree
from a US university. The USCIS did not publish a rationale for this dramatic change, but it appears to be based on a determination that at least
20,000 petitions for master’s/PhD graduates of US universities had already been approved during FY 2005, making the 20,000 new slots available
to any qualified applicants. In addition, in late March the USCIS announced that it had mistakenly approved at least 10,000 more H-1B petitions
during FY 2005 than authorized by the 65,000 cap. This series of announcements left employers wondering whether the 10,000 excess approvals
would be deducted from the 20,000 new slots, leaving only 10,000 new slots to be given to any and all qualified applicants. As of April 20 the
USCIS had still not announced the filing date and procedure for the 20,000 new H-1B slots that were expected to be available on March 8, nor had
it indicated whether the 10,000 excess approvals would be deducted from the 20,000 new slots. The prospects for recent master’s/PhD graduates of
US universities to avoid gaps in their work authorization before October 1, 2005, are looking much worse, whereas graduates of foreign universities
and bachelor’s degree graduates of US universities can now hope for a windfall H-1B approval before October 1. Regardless of how these
issues are resolved, the delay and uncertainty have made life more difficult for employers and workers
seeking H-1B status. Fee hikes and usage Employers struggling with the limited supply of H-1B visas and confusion over eligibility for the
20,000 new slots are also facing sharply higher filing fees for H-1B petitions. The FY 2005 Omnibus Appropriations Act reinstated a ‘training’ fee
that had lapsed in October 2003 and increased that fee from $1,000 to $1,500 for most H-1B petitions. The training fee is reduced to $750 for
employers that have no more than 25 full-time equivalent employees, including employees of affiliates and subsidiaries. This fee will fund job
training and scholarships for US workers, and government processing of H-1B cases. The Appropriations Act also imposed an additional $500
‘fraud prevention’ fee for each petition seeking an initial grant of H-1B status or authorization to change employers in H-1B status. This will provide
additional funding for visa fraud prevention programs at USCIS and other government agencies. These new fees are separate from the mandatory
$185 base fee for an H-1B visa petition, and the optional $1,000 fee for premium processing (faster service) from the USCIS. The total filing fee for a
large employer seeking premium processing of an H-1B visa petition is now $3,185. Over $500 million of H-1B training fees have been collected and
routed by the US Department of Labor since 1999 to fund new training programs to help reduce dependency upon foreign nationals, but
unfortunately none of these funds has been directed at the graduate-degree education that the biotechnology industry needs. Biotech
employers are paying H-1B training fees to create programs to relieve their dependency on foreign workers,
yet most H-1B workers in the biotech and high-tech industries are coming from US educational institutions.
The problem arises on the supply side of the labor equation, not the demand side. Currently, over 25% of all
PhDs in the US are foreign nationals, and over 50% of all graduate students are foreign students. Funding
graduate-level training programs will not reduce the demand for H1B workers if US students decline to
enroll in those programs. Conclusions Clearly, the H-1B visa program provides a temporary solution to
shortages in the national and domestic biotech labor pools— shortages that mirror the inadequate
production of appropriately trained US nationals by US institutions of higher learning. The reality is that
universities have inadequate resources for expanding their training pipelines, especially in specialized areas
33
WAKE DW
that follow the basic-research phase of company product development. Efforts should be directed toward
influencing greater congressional and federal agency attention to these important topics, especially an
increase in the H-1B cap and effective use of the very sizable H-1B fee–derived training funds.
34
WAKE DW
OLDAdvantage 1: Indian Agriculture
India’s agricultural sector is on the verge of disaster. Thousands commit suicide as
limited resources and irregular monsoons make new tech key to expanding
productivity
Straits Times 10
Established in 1845 the Country's highest-selling paper in any language
(“India Faces Food Shortage” by, Ravi Velloor, June 28, 2010 http://wildsingaporenews.blogspot.com/2010/06/india-faces-food-shortage.html)
But he
has one growing worry: India's failing farm sector, where six out of 10 of its citizens make their living.
Shortages of grain are a major concern, and food prices are soaring. Misery on the farm front, including
farmers' inability to pay off moneylenders, leads to thousands taking their own lives every year. 'India must
strive to raise agricultural production from 2 per cent annually on average to 4 per cent,' Dr Singh, an economist by
training, said recently. The annual monsoon has become unreliable. When it failed last year, production of food
grains dropped to below 220 million tonnes, barely enough to feed a population of 1.2 billion. Farm
productivity is so poor that India lags behind its neighbours Pakistan, Sri Lanka and Bangladesh in the
amount of rice it can extract from every acre of land. 'We are on the verge of a disaster,' says Professor
M.S. Swaminathan, India's foremost agriculture scientist and a Magsaysay Prize winner. 'We will be in
serious difficulty if food productivity is not increased and farming is neglected.' Even though the forecast is
for a normal monsoon this year, long-term issues remain to be tackled and that is on Dr Singh's mind. 'India
commands about 2.3 per cent of the world's land area and about 4 per cent of the earth's fresh water
resources, but feeds about 17 per cent of the world's population,' he pointed out. 'This puts tremendous pressure
on our resources and makes the need for newer and better technologies even more critical.' What is proving
elusive for Dr Singh is the sort of success that his home state, Punjab, achieved in the late 1960s, when Prof
Swaminathan and other scientists helped bring about what is known as India's Green Revolution.
India’s response to shortfalls is increasing fertilizer use which further decreases productivity and
makes food insecurity inevitable
ANI 10
Asian News International, Founded over 50 years ago, ANI is today South Asia 's leading multimedia news agency with over 100 bureaus in India , South
Asia and across the globe. (“Greenpeace ‘Living Soils’ campaign calls to save soils from harmful chemical fertilizers, August 3, 2010,
http://www.dnaindia.com/india/report_greenpeace-living-soils-campaign-calls-to-save-soils-from-harmful-chemical-fertilizers_1418211)
Every year Central government spends around Rs50,000 crores on chemical fertilizer subsidies, and this is
a major driver that catalyzes intensive chemical fertilizer usage4. The Nutrient Based Subsidy (NBS) policy
which was brought in to correct this problem continues to support only chemical fertilizers, and hence fails
in its own cause. The new policy proves to be an old wine in new bottle. “On one hand our Union government worries about the
declining agricultural productivity due to soil degradation and food security and on the other hand they
continue to support chemical fertilizers. Support for organic fertilization practices in mainstream
agriculture is very minimal. This anomaly can jeopardise the Agriculture production system”, said Tapan Sharma of
Diamond Club Community Center, Sipachar, Darrang. “We should not wait for the problems to appear. In the case of Assam we should learn from bad
experiences from other regions and go the ecological way at the earliest, said Kulendra Deka, general secretary of North East
Centre for All Round Development (NE CARD), Darrang
Productivity loss causes Indo-Pak nuclear war
Crowell 9
Ex-Member of the Air Reserve Technician program, a nucleus of managers, planners and trainers who have knowledge and expertise to smooth Air Force
Reserve Command (AFRC) units' transition from a peacetime to a wartime environment
(Gary, “Continueing Challenge”, Written at Znet. Establish policy news network, August 15, 2009, http://www.zcommunications.org/climate-changedrought-and-indias-looming-food-and-water-crisis-by-vandana2-shiva)
I read your commentary with great interest. Like all the other commentary I read in Z, I learned something solid and real, and the entire net is
beginning to help me to think in a different way. The contributing factor to the challenge of climate change is the acsending population growth
worldwide, although some regions such as Western Europe and Russia are experiencing a decline in birth rate,
China, India, Indonisia are growing, maybe not as fast and with some variance here and there. There are
still more than six billion people in the world today. It is expected, if I am not mistaken, that in another generation or so there
35
WAKE DW
will be ten billion people consuming the finite resources of this planet. India
will outgrow China in population, and expand
[aggressively] agressively as a military power in the region. Food security plays right into this. The ongoing
tension between Pakistan and India over [Kashmir] Kashmire, a food growing area, could lead to nuclear war.
Pakistan is espesially vulnerable and with its' hundred or so nukes faceing India's nukes over the security of
its' share of [Kashmir] Kashmire not to mention its' suspicion of India's increased diplomatic activity in
Afghanistan brings one to take a quick look at history. One does not have to go far back. Take for instance Japan's
rise as an military-industrial power. Because only about 20% of the land in the Japanese Islands could
produce food, and with limited natural resources for industrial exploitation, an expansion onto the Asian
mainland (with Anglo-Euopean-American help) was essential to what they saw as their survival. Today, China is building an
navy designed to eventually dominate the region. India will have five submarines with missile launch capability within
the next few years, and Pakistan has its' own military expansion ongoing. Yet, we are fearful of North
Korea's half dozen or so nukes, because that country is especially hungry.
That risks extinction
Nabi 3
Dr. Ghulam Nabi, India-Pakistan Summit and the Issue of Kashmir, July 13, 2003, p. http://www.pakistanlink.com/Letters/2001/July/13/05.html
The most dangerous place on the planet is Kashmir, a disputed territory convulsed and illegally
occupied for more than 53 years and sandwiched between nuclear-capable India and Pakistan. It
has ignited two wars between the estranged South Asian rivals in 1948 and 1965, and a third could trigger nuclear volleys
and a nuclear winter threatening the entire globe. The United States would enjoy no sanctuary.
This apocalyptic vision is no idiosyncratic view. The Director of Central Intelligence, the
Department of Defense, and world experts generally place Kashmir at the peak of their nuclear
worries. Both India and Pakistan are racing like thoroughbreds to bolster their nuclear arsenals
and advanced delivery vehicles. Their defense budgets are climbing despite widespread misery
amongst their populations. Neither country has initialed the Nuclear Non-Proliferation Treaty, the
Comprehensive Test Ban Treaty, or indicated an inclination to ratify an impending Fissile
Material/Cut-off Convention.
Fertilizers cause chemical imbalances, increased vulnerability to disease, and
hardpans-All of which destroy the soil ecosystem and overall productivity
Deppner 10
Dave, Executive Director at Future Trees Inc, Florida’s formost company for forestry (“Lessons in Sustainable Land Development, February 16, 2010,
http://www.agribusinessweek.com/lessons-in-sustainable-land-development/)
Besides these physical processes, we also see chemicals that damage soils; primarily in the form of insecticides and fertilizers. Chemical
fertilizers and
insecticides are unsustainable, temporary solutions that rarely improve the quality of the soil. Pesticides often kill many of
the insects and microbes in soils that are needed for natural processes. There are, in fact, many beneficial insects that eat many of the pest insects, but most insecticides
kill everything indiscriminately. Not only are they poisonous and often improperly used, but most pesticides that are banned from use and sale in the United States and
Europe are available throughout the developing world. Furthermore, insecticides get concentrated from smaller insects to the larger animals that eat them, ultimately
poisoning the entire food chain. Alternatives to pesticide use entail (1) giving crops the strength they need to resist infestation by adding nutrients and organic matter to
the soil, and (2) using Integrated Pest Management techniques that ward off and kill insects. Fertilizers also cause
long term damage, and are
often inadequate in their nutrient composition. Soil need rich organic matter in the form of humus,
compost, manure, etc. Commercial fertilizers, often in the form of NPK pellets, contain just nitrogen,
potassium, and phosphorus. These are three of the major nutrients, but there are also plenty of other nutrients –
such as manganese, iron, boron, zinc, and copper – that chemical fertilizers tend not to contain.
Furthermore, rains can immediately leach these chemical fertilizers down through the soil, contaminating
groundwater and forcing farmers to apply more fertilizer every year. I know insecticides are bad, but how do fertilizers damage the
soil? We often see communities using NPK fertilizer in forms such as 10-1-20, 14-14-14, and 20-20-20. These
numbers refer to the portions of nitrogen, phosphorus, and potassium in the fertilizer. Chemical fertilizers
cause at least four major problems in soil and vegetation. Fertilizers kill beneficial organisms that live in the
soil. These include both small microorganisms and larger ones such as earthworms. Chemical fertilizers are
often acidic, which causes the pH of the soil to change, thereby harming organisms that are critical to soil
health. Chemical fertilizers create hardpans in the soil. Hardpans are hard layers that can form naturally or
36
WAKE DW
unnaturally under the soil. While microorganisms and organic matter hold healthy soil together, the
chemicals actually break down the soil particles creating a cement-like state, which decreases the soil’s ability
to trap and hold water. Additionally, chemicals applied to crops can seep into surface and underground water supplies, thus contaminating them – a major
concern in rural areas of the developing world that lack treated drinking water. Fertilizers can damage plants’ health because a plant’s
ability to defend itself from bacteria and fungi is directly related to nutrient amounts in the soil. Large
increases in either nitrogen or phosphorus can kill certain beneficial microorganisms that live in the roots of
plant, making them more susceptible to injury and diseases. Sudden, large increases in nitrogen levels,
combined with a lack of trace elements, have been shown to cause diseases in plants. Plants can experience a
deficiency in trace minerals, even if the trace minerals are locally available in the soil. This is because
overuse of chemical fertilizers inhibits the chemical and physical reactions that transfer the trace elements
into the plants through the root hairs. This is all very complicated, and is beyond the scope of this article to explain, but it is a known fact that the
roots of plants can get covered by so many charged particles, such as sodium ions, that they can no longer
absorb the other minerals they need. Green manures are sustainable alternatives to chemical fertilizers. Agricultural crops which received green
manure of Gliricidia sepium (kakawate) yielded 9.5 tons per hectare of corn in Oromia, Ethiopia. A similar yield was obtained from plots which received green manure of
ipil-ipil and Leucaena diversifalia, but a significantly ‘reduced yield was obtained from plots receiving recommended levels of chemical fertilizer. This implies that the use
of multipurpose fast growing agroforestry species as a green manure can boost grain production over levels obtained from chemical fertilizer. Additionally, the
multipurpose species provide the farmer with fruit, fuelwood, fodder and construction wood.
That risks biodiversity and all life on earth
Garner 2
J.H.B., Senior Scientist at the National Center for environmental Assessment, U. S. Environmental Protection Agency, Research
(“Air Pollutants, Plants Response, Soil Microbes and Ecosystem Biodiversity”, July 2, 2002, http://isebindia.com/01_04/02-07-1.html)
The importance of soil organisms for plant growth has been recognized for more than a century. Today, greater recognition of the fact that soil
organisms can
influence ecosystem processes has lead to increase in the study of the soil and freshwater, and marine sediments. The soil environment,
which is composed of minerals and organic matter, water, air, and vast array of bacteria, fungi, algae,
actinomycetes, protozoa, nematodes, and arthropods, is one of the most dynamic sites of biological interactions in nature
many of which are microscopic, are unknown. Their ecology is at least as important as the ecology of any community or
ecosystem that has been studied above ground. There is interrelatedness between the aboveground and
belowground ecosystems. Soil organisms (the consumers), depend on aboveground vegetation (the
producers), for the sugars and carbohydrates (carbon compounds) produced during photosynthesis.
Without the soil ecosystem and the microorganisms involved in the mineral nutrient cycles, plant growth,
agriculture, and life in general would not be possible. Soil biodiversity is a crucial factor in regulating how
ecosystems function. Interest in soil biodiversity has increased with the awareness of the fact that many of the most important
interactions between plants take place below ground. Especially in nutrient poor soils, the dynamic interactions
between plant roots, animals and microbial processes appear to determine what grows where and how.
Bacteria and fungi are usually most abundant in the rhizosphere, the area around the root where exudates are most abundant. They benefit from the nutrients
(chiefly simple sugars) exuded by plant roots into the soil. In turn their activities create chemical and biological changes in rhizosphere.
By decomposing organic matter they play an essential role in controlling and making inorganic mineral
nutrients available for plant uptake. Bacteria in the soil are essential in the cycling of nitrogen, carbon,
phosphorus and sulfur. They also assist in making other major mineral nutrients such as potassium, magnesium, and iron
available for plant uptake. Mycorrhizae Fungi, as integral components of soil ecosystems, are involved either directly or indirectly with all other organisms in the soil.
Success of other organisms in the system, and even survival of the soil ecosystem itself, depends on fungal activity. Fungi are a source of food for many soil organisms,
including bacteria, other fungi, nematodes, insects, earthworms and mammals. Fungi
form mycorrhizae, a mutualistic, symbiotic
relationship with plant roots that is integral in the uptake of nutrients and may be one of the most
important and least understood biological associations regulating community and ecosystem functioning,
are formed by fungi attracted by energy-rich carbon compounds in the plant root exudates. The mycorrhizal
relationship is widespread in the plant kingdom and is found in a variety of habitats from the tropics to boreal regions. The majority of plants cannot
take up mineral nutrients and water from the soil and achieve optimum growth and reproduction without
mycorrhizae. The few exceptions are aquatic plants, sedges and members of cabbage family. Most mycorrhizal fungi are obligately dependent on the host for their
energy requirements. In return, their role in the uptake of mineral nutrients, make them essential to plant growth. The fungus-plant root relationship is of particular
benefit to plants growing in nutrient-poor soils. Mycorrhizae
are sensitive to changes in the capacity of host plants to
translocate the carbon compounds to the roots. An indirect effect can occur when the pollutant influences
the allocation of the carbon from the plant leaves and reduces the supply of sugars to the roots. A direct
effect occurs if deposition of the pollutant influences the growth and physiology of the root and reduces its
capacity to absorb nutrients from the soil.
37
WAKE DW
India is a big player in bio D-It’s one of the few designated “megadiverse” countries in
the world
Gokhale 10
Yogesh, Holds a Doctoral degree in Botany from Mumbai University, Fellow, The Energy and Resources Institute (TERI
(“Megadiverse India!”, August 11, 2010, http://www.teriin.org/article_yogesh.pdf)
India is one of the 12 megadiverse countries in the world, commanding 7%-8% of the world's biodiversity
and supporting 16% of the major forest types, varying from alpine pastures in the Himalayas to temperate,
~sub-tropical, tropical forests, and mangroves in the coastal areas. However, the country is facing several challenges with regard to
maintaining its megadiverse status. Dr Yogesh Gokhale analyses India's position from the domestic, as well as international point of view, and finds what the country
needs to do to safeguard its rich biodiversity. Every now and then, we hear news of tigers being poisioned by people for the 'crime' of cattle lifting. But, do you know that
there are people in India who believe that cattle lifting by a tiger is its right? The Madia Gond tribals of Mendha-Lekha, Maharashtra, believe that the act is justified
because humans are living in the tiger's habitat, forcing it to resort to such means of survival. The total area of Mendha-Lekha village is about 1600 ha, of which 80% is
forest. Threat to natural resources and livelihood of the villagers led to the emergence of 'Mawa Mate, Mawa Raj' concept in the village, meaning "in our village, we are
the government': Mendha-Lekha believes in Gram Swaraj (village democracy), based on Gram Sabha (village assembly), and has put in place numerous measures to
protect the environment, such as the creation of a Van Suraksha Samiti (Forest Protection Committee) with the villagers. It is really interesting to see the way the Madia
Gonds have internalized the environment as part of their developmental aspirations. However, cases like this are in stark contrast to those of the city dwellers, who are
completely distanced from nature. For instance, the population of domestic sparrows has been reducing in various cities of India for the past many years. But, there is
each and every living
organism on the earth-that makes up its biological diversity or biodiversity-is quintessential for survival of
the human race and the planet. WHAT IS BIODIVERSITY? Biodiversity is the term given to the variety of life on the
earth and the natural patterns it forms. It is formally defined in the Biological Diversity Act 2002 as "the variability among living organisms from
hardly any concern about this amongst the urban communities. Many cannot even imagine the gravity of the situation. The truth is that
all sources and the ecological complexes of which they are part,and includes diversity within species or between species and of ecosystems': The recent interest in
biodiversity can be traced back to the Rio Earth Summit of 1992, where world leaders agreed on a comprehensive 'sustainaole development' strategy, leading to the
creation of the Convention on Biological Diversity (CBD). CBD establishes three broad goals: conservation of biological diversity; sustainable use of its components; and
fair and equitable sharing of the benefits from the use of genetic resources. India was among the first countries to sign the CBD(on 5 June 1992).Since then, biodiversity
has emerged as a major political rallying point in international negotiations. The most crucial aspect about biodiversity is that this
distribution is not
even across the world. On the one hand, much of the world’s biodiversity is concentrated in the forests of
developing countries. On the other, much of the technology and financial capital that can convert the elements of biodiversity into commercial products rests
with the developed countries. The acknowledgement of conservation and trade importance of biodiversity, along with the associated knowledge, has led to the formation
of political conglomerations of biodiversity-rich nations at the international level and the recognition of the importance of domestic actions of tropical countries for
biodiversity conservation. One such group is Like-Minded Megadiverse Countries (LMMC), made of 17 countries rich in biological diversity and associated traditional
knowledge, mainly developing tropical ones . A
megadiverse country is a country that harbours the majority of the earth’s
species. The LMMC group holds more than 70% of all biodiversity and 45% of the world’s population. The review of world data on species richness suggests that
LMMC group holds the top four positions in the case of mammals, birds, amphibians, reptiles, and higher plants. It is, thus, well recognized as an important negotiating
block in the UN and other international fora. And one
such megadiverse country is India. Megadiverse country With only 2.4% of land area, India
accounts for 7%-8% of the recorded species of the world. After surveying almost 70% of the country’s land area, about 45000 species of
plants and 89000 species of animals have been described till date. It has been estimated that another 400,000 species may still
exist in India which so far remain undescribed! The rich domesticated fauna, with about 60 livestock breeds, 20 goat breeds, and 163,155 accessions in
the national gene bank of domesticated plants are an integral part of Indian culture. Out of the 34 biodiversity hotspots identified so far,
which hold high numbers of endemic species but cover only 2.3% of their combined area of remaining
habitat in the world, India has two hotspots-the Himalays and the Western Ghats. The efforts of in situ conservation in India are mainly concertrade
in 617 procted areas as of 2010. Also, India has 14 biosphere reserves, spread across various bio-geographic zones of the
country. The Sundarbans, Gulf of Mannar, and the Nilgiri are now included in the international network of biosphere reserves, spread across various bio-geographic
zones of the country. The Sundarbans, Gulf of Mannar, and the Nilgiri are now included in the international network of biosphere reserves recognized by United Nations
Educational, Scientific, and Cultural Organization (UNESCO). Also, India has six World Heritage Sites listed by UNESCO. Till date, 25 wetlands have been designated as
Ramsar sites. From the cultural perspective, India has about 40000-50000 endogamous groups of people, suggesting a very high level of diversity of languages, culture,
knowledge of ecosystems, and so on. More than 400 000 practiioners of traditional medicinal systems in the country use 80% of the plant-based raw material for making
durgs. With
the wide variety of terrain and the climatic conditions, which range from permanent snowfields to
tropical coastlands; from areas of virtual desert in the North west to fertile, intensively cultivated rice fields
in the North East, India has been classified into 10 biogeographic regions. The unique geo-physical and
hydro-climatic conditions represented by these zones are instrumental in the evolution of the rich
biodiversity of this country. The wild and domesticated biodiversity is distributed along the global biodiversity hotspots, centres of domestication of
domesticated species of plants and animals, protected areas, community conserved areas, and so on. Considering the overlapping priorities of biodiversity conservation
in India, various efforts have been undertaken using processes such as the hotspot science . One
of the major foci of the hotspot science is the
uniqueness of the region in terms of species diversity restricted to specific areas (endemism) and special
ecosystems. Interestingly, as recent as in 2009, a large number of species were discovered in India’s biodiversity hotspots. While 20 new faunal species were
discovered from the Western Ghats, 37 were found in the Himalayas. Similarly, 41 new species of plants have been reported in recent times from different parts of the
country. Here are some more conservation measures used by the country to protect its rich biodiversity
Biotech and bioinformatics are key to a newer, more sustainable “gene” revolution in India which
ensures long term food security, and increased quality of life
38
WAKE DW
Prakash 2k
Professor in Plant Molecular Genetics and Director of the Center for Plant Biotechnology Research at Tuskegee University
(C.S., “Gene Revolution and Food Security”, Agbioworld, March 2, 2000 http://www.agbioworld.org/biotech-info/articles/agbioarticles/revolution.html)
A revitalised Indian agriculture can be the engine of growth and biotechnology can provide the needed fuel,
says C S Prakash. India's greatest achievement in the past century has been its ability to increase its food
production and thus keeping the Malthusian fears at bay. Nevertheless, we still face daunting challenge of
hunger, poverty and malnutrition that will only get worse as the population increases in absolute numbers.
Recent advances in crop science, however, provide us with a new window of opportunity to deal with the issue
of food security. Genetic engineering is clearly the most revolutionary tool to impact agricultural research
since the discovery of genetics by Mendel. Sensible integration of biotechnology in research can accelerate the
pace of agricultural improvement and is of considerable relevance to an agrarian country like India.
Transforming India's agriculture is critical not only to deal with the issue of hunger and poverty but also to
strengthen the sector that is so fundamental to India's existence. The 'green revolution' is showing signs of
fatigue and farm productivity increases are now flattening. There are serious constraints to productivity in Indian agriculture because of
small holdings, the subsistence nature of farming, vagaries of the weather, limited water, poor land condition and stress factors such as drought, heat and saline soil
conditions. Much of the crop yield is lost due to disease, pests, and weeds while a considerable proportion of harvested fruits and vegetables are spoilt during
transportion and storage. There
is thus an urgent need to reinvigorate agricultural research to address crop
productivity issues by redesigning crop plants to benefit the farmer and the consumer, and also to develop
innovative 'value-added' agricultural products to enhance the revenue base of farming. Profitable farming not only
enhances the quality of life in rural India but will also help limit the urban sprawl due to migration and its attendant environmental problems. Beyond crop
productivity, there is also a need to address the larger food and environmental issues. A revitalised Indian
agriculture can be the engine of growth for the 21st century, and biotechnology can provide the needed fuel .
When deployed in a sensible and responsible manner , modern biotechnological tools such as genetic improvement of crops can
advance India's agriculture to address 'head-on' the challenge of feeding its increasing population with its
limited economic, land and water resources. India cannot afford to lag behind in critically examining these new technologies and making them
available to its farmers under suitable safeguards. Most experts say that the greatest promise of biotechnology is in its
application in developing countries like India and China because of their high reliance on agriculture, large farming
areas, low crop yield and the urgency for food increase and economic revitalisation. Developing countries such as Mexico, Argentina,
China and Chile have already made considerable economic advances by integrating biotechnology into their
agricultural programmes. Others such as Cuba, Egypt and South Africa are also following close behind and clearly see biotechnology as a means of
advancing their economies in an accelerated manner . India can, therefore, ignore biotechnology only at its own peril.
Biotechnology can be a boon to Indian agriculture in may ways. Crop damage can be minimised through
disease- and pest-resistant varieties while reducing the use of chemicals. Conventional plant breeding has
little ammunition to deal with these problems in an expedient and effective manner. India also has serious problems of
blast in rice, rust in wheat, leaf rust in coffee, viruses in tomato and chillies and leaf spot in groundnut across the country. These problems can be
significantly minimised in an ecologically-friendly manner with the development of genetically
reprogrammed seeds designed to resist these disease attacks, while minimising or even eliminating costly
and hazardous pesticide sprays. Genetic modification can also address the problems of shoot borers in brinjal and okra, caterpillars in pappadi
(Dolichos) beans, and of course, the boll wormin cotton which resulted in the tragic suicides of hundreds of cotton farmers. India is the third largest producer of cotton in
the world (after China and the US). Although cotton occupies only 5 per cent of the country's land, nearly 50 per cent of all pesticide used in india is bought by cotton
farmers alone at a staggering cost of Rs 16 billion annually and with incalculable impact on the environment and human health. Development
of cotton
varieties with resistance to pests thus can enhance the welfare of Indian farmers, while helping both the
India economy and its environment. New genome technologies along with bioinformatics will further
propel Indian agriculture into a new era where complex traits such as photosynthetic efficiency and crop
yield can be enhanced. Geneomic tools with esoteric names such as 'DNA Chips', 'Gene Shuffling' and
'Director Evolution' are already making an impact on biomedical research enabling the discovery of new
drugs and rapid disease diagnostics, and will surely impact agricultural research. With no more arable land
available for agricultural expansion in India, enhancing stress tolerance in crop plants will permit
productive farming on currently unproductive lands. Abiotic factors such as drought, heat, cold, soil salinity
and acidity cripple Indian crops seriously constraining their growth and yield. One could extend the
growing season of crops and minimise losses due to environmental factors. The shelf life of fruits and vegetables can be prolonged
to reduce losses to food spoilage, expand the market vista and improve food quality. There has been much human misery caused by
hazardous substances in many Indian food crops
such as the presence of neurotoxin in kesar dal, cyanide in tapioca, aflatoxins in groundnut and antimetabolites in chickpea, horsegram and sweet
potato. Biotechnology has the capability to 'silence' these undesirable traits and thus improve the quality of
39
WAKE DW
these 'humble' food crops so critical to the nutrition of disadvantaged and resource-poor consumers. Prolonged
'vase life' of cut-flowers will help broaden the market for horticulturists, while reducing losses and minimising their dependency on expensive cold storage. Human
and livestock health can be improved through crops with enhanced nutritional quality traits such as ironrice and vitamin A-rich rapeseed oil, and through the production of edible vaccines and other
pharmaceutical proteins. Crops with industrial applications such as those producing enzymes, 'designer'
starch and oils, biodegradable plastics and industrial chemicals can also be developed to reinvigorate the
Indian economy and create jobs. Crop plants that can clean up soil, water and air through
'phytoremediation' can be developed and planted in critical areas. Trees that grow faster with fewer disease and pest problems can
be developed with positive impact both on the rural economy and the environment . The strategic integration of biotechnology tools into
Indian agricultural systems can revolutionise Indian farming and usher in a new era in the countryside.
Compared to the 'green revolution', the 'gene revolution' is relatively scale-neutral, benefiting big and small
farmers alike. It is also environment friendly. Thus, it can be of great help to the smallest farmer with limited resources, in increasing farm
productivity through the availability of improved but powerful seed. It can also reduce his dependency on chemical inputs such as
pesticides and fertilisers. India unequivocally needs the help of such technologies to march into the next
century with a vision for economic upliftment and prosperity for its two-thirds of populace dependent on
farming.
The genomic analytical power of bioinformatics makes it key to an Indian gene revolution
Sankar 3*Abbreviation
Dr. R. Sankararamakrishnan is an Asstt Professor in the Department of Biological Sciences and Bioengineering. His predoctoral studies were at the
Indian Institute of Science. He received post-doctoral training in computational biology at Universitiy of Oxford and University of Illinois, UrbanaChampaign. He was serving as a Research Asstt Professor at the Mount Sinai School of Medicine, New York before joining the Institute in April, 2002
(“Bioinformatics in Post-Genomic Era”, 2003, http://www.iitk.ac.in/directions/oct03/genomic.htm)
Bioinformatics involves the application of information technology to the management and analysis of
biological data such as the sequences of nucleic acids in genes and amino acids in proteins. On average, the biological
databases are doubling in size every 15 months. As a result of this surge in data, computers have become indispensable in biological
research. This is evident from the huge increase in the number of papers published in the area of "Bioinformatics". Most bioinformatics analyses focus on
three primary sources of data: DNA or protein sequences, macromolecular structures and the results of
functional genomics experiments. Recently M. Gerstein of Yale University has submitted a definition of "bioinformatics" to the Oxford English Dictionary. According to
his definition, "Bioinformatics is conceptualizing biology in terms of molecules (in the sense of Physical Chemistry) and applying informatics techniques (derived from disciplines such as applied
bioinformatics is a
management information system for molecular biology and has many practical applications". The
applications of bioinformatics include predicting genes from genomes, identifying coding and non-coding
regions, predicting protein structures and protein-protein interactions. This article will attempt to cover some of these applications. Prof.
maths, computer science and statistics) to understand and organize the information associated with these molecules, on a large scale. In short,
Sarkar's article "The Human Genome: The Book of Life" which appeared in the November 2000 issue of "Directions" gives further details about various aspects of human genome project. Gene
Prediction It was initially believed that humans might require 100,000 genes to perform the complex functions. The total number of predicted genes for laboratory fruit fly and for a simpler
organism Caenorhabditis elegans are ~13,600 and 19,000, respectively. After the first draft was published in June 2000, the groups that sequenced the human genome found evidence for only
30,000 to 40,000 genes. However, these estimates have been recently revised, and it is now suggested that humans possess ~70,000 genes. Traditionlly, genes were cloned, sequenced and
experimentally characterized one-gene-at-a-time, allowing determination of the function of the gene products with a high level of confidence. Now with the whole-genome sequences available,
identifying genes from novel genomic data is a classical problem in bioinformatics. Several gene prediction algorithms are available from the public domains. Abinitio gene prediction methods are
based on general properties and characteristics of protein-encoding genes with simple statistical measures. Neural network and dynamic programming approaches are used in these methods.
Hidden Markov Models (HMM) have used pattern recognition techniques in predicting genes. Other approaches to gene finding are based on homology to known genes. The homology-based
methods search novel DNA sequences for coding regions similar to any known protein. An assessment of various gene prediction methods concluded that the sensitivity of ab initio methods remains
high and they generate over predictions. When a gene and its function are predicted, there is no way of knowing how accurate the assignment is. Thus gene identification and annotation constitute
the first step of the global reconstruction of the puzzle defining a living thing. This reconstruction addresses various biological aspects, including the overall genome organization, the interaction
network linking proteins, metabolic pathway, structure of the cell and the evolutionary history of the species. Gene Expression Gene expression studies have focused on devising methods to cluster
genes by similarities in expression profiles. This is in order to determine the proteins that are expressed together under different cellular conditions. Advances in the production of genome-scale
expression data have created tremendous opportunities and challenges in the elucidation of individual gene modulation, patterns of coordinate expression among individual genes and ultimately
genetic networks. This progress has stimulated the exploration of a number of algorithms and visualization tools. These methods include hierarchical clustering and self-organizing maps. In
hierarchical methods, genes with most similar expression profiles are clustered first and those with more diverse profiles are included iteratively. This method is derived from algorithms to
construct phylogenetic trees. In self-organizing map, the user pre-defines the number of clusters for the dataset. The clusters are initially assigned randomly and the genes are regrouped iteratively
until they are optimally clustered. The expression data profiles are related to structure, function and subcellular localization of each gene product. Mapping these properties provides an insight into
the characteristics of proteins that are expressed together and also suggest some interesting conclusions about the overall biochemistry of the cell. Comparative analysis of gene expression data can
be extended to tumor cells, in which the underlying causes of cancer can be uncovered by pinpointing areas of biological variations compared to normal cells. One of the difficulties in cancer
treatment has been to target specific therapies to pathogenetically distinct tumor types, in order to maximize efficacy and minimize toxicity. For example, subclasses of acute leukaemia were
successfully distinguished based on the expression profiles of the cells. As the approach does not require prior biological knowledge of the diseases, it may provide a generic strategy for classifying all
types of cancer. Proteins and Proteomics With the accumulation of vast amounts of DNA sequences in databases, researchers are realizing that merely having complete sequences of genomes is not
sufficient to elucidate biological function. The inevitable inventory of genes produced by the genome projects heralds the start of a new era: Age of proteomics. Although DNA is the blueprint for life,
it is the set of proteins that are actually transcribed and translated that determine the function of a particular cell. In 1975, the invention of two-dimensional gel electrophoresis allowed protein
biochemists to cut isolated spots out of a gel and sequence their amino acids. In mid 1990s, the gradual appearance of protein identification methods used nascent DNA and protein databases to
analyze mass spectra of protein fragments. Preliminary studies suggest an average number of protein forms per gene of one to two in bacteria, three in yeast and three to more than six in human
beings. Thus a human body may contain more than half a million proteins and these proteins undergo modification by addition of specific carbohydrate chains or phosphorylation. The field
proteomics is defined as characterization of all proteins and is the large-scale study of the complete protein complement of the cell, tissue or organism. The major challenge now to biologists is to use
the wealth of genetic information available from the genome sequencing programme not just to decode the amino acid sequence of the encoded protein, but also to find out their function. MultipleSequence Alignments Genomics-based approaches initially use computer-based similarity searches against proteins of known function. The results may allow some broad inferences to be made
about possible functions, which can then be explored experimentally. Multiple sequence alignments have been traditionally used to deduce structure / function by homology, to detect conserved
motifs in protein structures and in phylogenetic studies. Multiple alignment programs have used dynamic programming technique, Hidden Markov Models, stochastic techniques such as Simulated
Annealing and Genetic Algorithms and iteration techniques. In recent alignment programs, information other than the sequences themselves is now being incorporated into the multiple alignment.
40
WAKE DW
(For an example of multiple sequence alignment see box on page 9). Homologous proteins are both sequentially and structurally similar and advances in sequence database search methods have led
to the detection of more and more distant homologues. The multiple sequence alignment reveals evolutionary constraints existing at particular sequence patterns that conserve residues or their
physico-chemical properties and thus allow a straightforward detection of conserved structural motifs, localization signals or key functional residues that characterize a family or sub-family of
proteins. Molecular phylogeny studies have relied on multiple alignments to define phylogenetic relationships between organisms. In the post-genomic era, phylogenetic studies can now address the
entire proteome of organisms widely scattered across the phylogenetic spectrum. Proteins are long chain molecules (polypeptide chains) and they can adopt infinite variety of conformations, each
corresponding to a unique set of values for the various peptide backbone rotation angles. Professor G.N. Ramachandran, and his colleagues from University of Madras in 1963 investigated this
problem and discovered that many of the hypothetical conformations can be excluded from considerations on the basis of steric overlaps. His findings, popularly known as Ramachandran map
(shown in left), have revolutionized the understanding of protein's three-dimensional structures. Structural Genomics Analysis of genomic sequences in organisms for which genomes have been
sequenced seem to code "hypothetical proteins" that cannot be related to other proteins of known function or structure. Understanding the physiological function of the protein products of these so
called "orphan" genes has emerged as a major challenge. Three-dimensional structural information of the proteins provides insights into biology by elucidating the relatedness to proteins of known
biological function, which could not have been arrived by sequence alone. Structural information can also identify binding motifs and catalytic centers even for proteins without a known biological
function. From the structural features, catalytic mechanisms, protein-protein associations or protein nucleic acid interactions could be predicted or proposed. Unfortunately, to date, only a small
fraction of known proteins and even fewer number of hypothetical proteins have had their structures solved by classic crystallographic methods or by nuclear magnetic resonance (NMR)
spectroscopy. The structure of the protein is characterized by its folds. Many researchers believe that a limited number of protein folds (1000 to 5000) exist in nature. It is predicted that all these
folds can be revealed by examining approximately 10,000 unique proteins. Recently, the National Institute of General Medical Sciences (NIGMS) of the National Institutes of Health sponsored a
protein structure initiative to determine the three dimensional structures of thousands of proteins within a decade. This $150 million pilot program could lead to the solution of up to 10,000 crystal
structures in the next 10 years. In contrast, only 2000 unique structures have been determined in the past 40 years of research. It is hoped that improvements in protein isolation, protein
purification, crystallization and X-ray diffraction could turn the vision of structural genomics initiative to reality. Identification of potential binding motifs and catalytic centers of proteins with no
clear function from have already shown promises using structural genomics approach. One such example is Histidine Triad (HIT) family of proteins. HIT proteins were identified through genome
analysis, from a large ubiquitous family, but as yet have no known specific biological function. These proteins are believed to be involved in cancer. Structure solution of several HIT family members
identified common structural motifs, which were used to identify a catalytic center and nucleotide-binding sites. These structural studies showed that HIT family of proteins belong to the class of
enzymes called nucleotide hydrolases and even enabled identification of compounds that could inhibit catalytic function of the HIT proteins. Computer Modeling Although technological advances
have occurred in crystallography and NMR, these methods cannot keep demand to know the structures of all proteins. Efforts to bypass these methods have led to the advancement of computational
modeling approaches. Computational modeling utilizes predictive and comparative methods to fashion a new protein structure. Ab initio methods use the physicochemical properties of the amino
acid sequence of a protein to literally calculate a 3D structure (lowest energy model) based on protein folding. These methods use one or a combination of molecular dynamics, molecular mechanics
and quantum mechanics techniques to describe atomic and molecular states interactions. In homology modeling, the structural and functional characteristics of known proteins that share many of
the sequence features ( > 30 percent identity) are used as a template to create a hypothesized structure for an unkown protein with similar functional and structural features. Threading is essentially
a small-scale form of homology modeling based on the realization that there are a limited number of structural folds that define the structure of a protein in its native and most energetically
favorable state. The individual folds serve as precise descriptors and the resulting collection of protein folds is a essentially an encyclopedia that describe each of the structural motifs a protein may
adopt. These fold libraries are used by threading algorithms to create a theoretical structure of a protein. The importance of modeling techniques is further highlighted by the fact that the majority of
the experimentally solved protein structures belong to the category of water-soluble proteins. Membrane proteins that are imbedded within the membranes constitute the second major category of
proteins and it is estimated that about 30 % of genes may encode membrane proteins. Integral membrane proteins participate in important physiological functions and are implicated in major
diseases. These proteins are difficult to crystallize and as a result only a handful of membrane protein structures are available at atomic resolution. In the mid 1980s, the structure of the first integral
membrane protein, photosynthetic reaction center, was solved and subsequently this work was awarded with Nobel prize. Structures of the potassium channel and rhodopsin are the most recent
major breakthroughs. Potassium channel is the first channel protein to have a 3D structure determined in atomic resolution. Rhodopsin belongs to the class of G-Protein Coupled Receptors
(GPCRs) whose transmembrane segments traverse the membrane seven times. GPCRs constitute vast group of cell-surface proteins that includes hormone, neurotransmitter, growth factor, light
and odorant receptors. In the absence of experimentally available structures, computer modeling techniques are the most important tools to study the structure-function relationships of these
proteins. Computer Simulations The three-dimensional structures of the proteins are only the beginning towards understanding the biological functions of the proteins. X-ray crystallography gives a
snap-shot of the protein structure and it does not reveal the full picture. In many of proteins, the adequate explanations of the mechanisms of a protein's functions come from the molecular
simulations that define the force fields surrounding the proteins. The approaches used in the simulations are molecular mechanics, molecular dynamics, Monte Carlo and quantum chemical studies.
The importance of these approaches can be illustrated by the recent simulations studies on potassium channel protein. Nearly all cells have membranes spanned by potassium-conducting channel
proteins. Potassium channels catalyze the ionic movements required to generate and shape electrical signals in neurons. In other words, without these channels, our nerves simply would not work.
The crystal structure showed a narrow 'selectivity filter' in which dehydrated potassium ion (but not sodium ion) fits precisely. Molecular dynamics free energy simulations revealed the ion
permeation mechanism in this channel protein even before the support came from experiments in the form of X-ray work. Simulation studies combined with the crystallography structures offer
fundamental insights into the physical chemistry of ion conduction in biology. These studies show how ions are coordinated in the selectivity filter; they revealed the nature of potassium ions in
transit between the channel and the aqueous solvent; and they indicate the character of water in the cation's inner hydration shell. Drug Discovery One of the earliest medical applications of
bioinformatics has been in aiding rational drug design (See accompanying article by B. Prakash). Only a small fraction of the human genes from human genome will be amenable to therapeutic
intervention. It has been estimated that the number of proteins that are drug targets is probably 5,000 to 10,000. The majority of the targets are receptors such as GPCRs and enzymes. In fact, more
than 50% of prescription drugs act on GPCRs. Computer-aided drug design (CADD) involves the design of potential drugs based on structure, physical and chemical constraints and parameters
between the drug ligand and its target, a protein. This "rational drug design" methodology has been a very powerful tool in pharmaceutical research, where drug development has traditionally been a
hit-or-miss process of blindly testing compounds that may or may not interact with a protein. Using CADD methods, researchers can now model drugs to a specific set of criteria. When combined
with combinatorial chemistry methods, scientists can dramatically increase their chances for a hit. Recent advancements in CADD include the introduction of evolutionary techniques, such as
genetic algorithms and fitness functions. Genetic algorithms induce spontaneous atomic changes to create new molecular species, while fitness functions ascertain the chemical survivability of the
new species amongst the pool of biochemicals. Gene expression studies with the help of bioinformatics may be used to hunt for new antimicrobial targets. Identification of proteins produced by
microorganisms is facilitated by the small number of genes and the completion of genome sequencing for many microorganisms. The main aim of most studies has been the search for new
diagnostic markers, candidate antigens for vaccines and determinants of virulence. For some of the microorganisms studied, two-dimensional electrophoresis databases are available on the internet.
Myobacterium tuberculosis is probably the most studied microorganism. Tuberculosis still causes more than 2 million deaths each year, so an international priority is to improve diagnosis and
develop a more effective vaccine. The current BCG vaccine varies in efficacy from almost zero protection in southern India to about 70% protection in the UK. Examination of genetic differences by
genomic analysis has been helpful in identifying the potential regulators of virulence. Such studies may also provide the basis for discrimination between BCG immunization and the presence of
virulent tuberculosis. Protein three-dimensional structure is a key to understand the function of the protein. For example, structures of HIV protease (shown in left) are used to understanding the
ligand-binding properties and in the designing of new drug molecules that can bind the active-site much more efficiently. Bioinformatic Tools The heart of bioinformatics analyses is the software
and the databases upon which many of the analyses are based. Traditionally bioinformatics software required high-end workstations (desktop to mid-range servers) with a multitude of plug-ins
and/or peripheral equipment and a user (administrator) willing to routinely download database updates. Modern experimental technologies are providing seemingly endless opportunities to
. The drive to capitalize on this enormous pool of information in
order to understand fundamental biological phenomena and develop novel therapeutics is pushing the
development of new computational tools to capture, organize, categorize, analyze, mine, retrieve and share
data and results. Most current computational applications will suffice for analyses of specific questions using relatively small data sets. Object Management Group (OMG), a software
generate massive amounts of sequence, expression and functional data
standards organization have come up with CORBA, a middleware that mediates between different languages, information sources and analysis tools, each with its own way of representing data and
methods. CORBA interfaces for methods and XML, the souped-up version of HTML, for data formats, implemented in an open source environment. Dr. Shankar Subramaniam's group at University
of Illinois, Urbana-Champaign (now in University of California , San Diego) has developed "Biology Workbench" with which one can access all publicly available databases. With access to a
networked computer, biologists can use the bioinformatics tools provided by this workbench in a point-and-click mode. But to expand scientific horizons, to accommodate larger and larger data sets
Intelligent
integration with other data domains, such as chemical and clinical, is the ultimate goal. Future of Bioinformatics in India
The draft of human genome by the public consortium is a culmination of work done from several countries. Although developing nations have to catch up in
genome research, significant progress is being made in this area. Notably, Brazil has recently published the
genomic sequence of the plant pathogen Xyllela fastidiosa that causes a range of plant diseases. It causes serious
diseases to orange trees, an economically important factor for Brazil. India is home to a large number of
indigenous populations and it is enviously positioned with this rich diversity of gene pool. Genomic studies
and bioinformatics offer ways to improve healthcare and the quality of life. With its excellent scientific talents, India
can identify and focus on specific areas of national importance. In inter-disciplinary areas such as
bioinformatics, collaborations between different groups within India and abroad should be established . In order
to access the databases scattered throughout the world, scientists working in the area of bioinformatics need fast internet connections. With its world-class software
skills, much needed bioinformatics tools can be developed in India. Following the "green revolution",
indeed a "gene revolution" has to take place in India.
and to find patterns and see relationships that span temporal and spatial scales, new tools that broaden the scope and complexity of the analyses are needed.
41
WAKE DW
42
WAKE DW
Impact-Chinese War
U.S.-Sino war causes extinction
Hsiung 1
James Hsiung, professor of politics and international law at NYU, 21ST CENTURY WORLD ORDER AND THE ASIA PACIFIC, 2001, p. 359-60
But decision-makers cannot afford such luxury. Lee Kuan Yew, Singapore’s Senior Minister, issued a grave warning presumably directed at all government leaders,
including the United States, that the Taiwan power kege could ignite a conflagaration that would engulf the entire region. It
might even embroil
the United States in a nuclear holocaust that nobody wants.
Often-times, well-meaning analysts raise the question
whether China, with its present military capability and modest defense expenditures (about U.S. $15 billion annually0, can or cannot take Taiwan by forces. But this is the wrong question to
pose. As the late patriarch Deng Xiapoing put it, “We rather have it proven that we trade but failed [to stop it[ even by force, than be accused [by our disgruntled compatriots and posterity] of
not trying to stop Taiwan from going independent.” Earlier, I raised the issue of stability within the U.S.-China-Japan triad, precisely with the U.S.-Japan alliance in view. Apparently, many
in Japan have apprehensions about the stability. Japanese Nobel laureate (for literature) Ohe Kenzaburo, for instance, once told a pen pal that he was fearful of the outcome of a conflict
Because of its alliance relationship, Japan would be
embroiled in a conflict that it did not choose that might escalate into a nuclear holocaust.
From the ashes of such a nuclear conflict, he figured, some form of life may still be found
in the combatant nuclear giants, China and the United States, But, Kohaburo argued,
there would be absolutely nothing left in Japan or Taiwan or in the conflict’s wake.
between the United States and China over the question of Taiwan.
43
WAKE DW
Impact-Russian War-Extinction
A US-Russian war is the only scenario for extinction. Such existential risks outweigh diseases,
world wars, and smaller nuclear wars.
Bostrom ‘02
(Dr. Nick, Professor of Philosophy and Global Studies at YALE, "Existential Risks: Analyzing Human Extinction Scenarios
and Related Hazards," 3-8-02, http://www.transhumanist.com/volume9/risks.html)
Risks in this sixth category are a recent phenomenon. This is part of the reason why it is useful to distinguish them from
other risks. We have not evolved mechanisms, either biologically or culturally, for managing such risks.
Our intuitions and coping strategies have been shaped by our long experience with risks such as
dangerous animals, hostile individuals or tribes, poisonous foods, automobile accidents, Chernobyl, Bhopal, volcano
eruptions, earthquakes, draughts, World War I, World War II, epidemics of influenza, smallpox, black
plague, and AIDS. These types of disasters have occurred many times and our cultural attitudes towards risk have been
shaped by trial-and-error in managing such hazards. But tragic as such events are to the people immediately
affected, in the big picture of things – from the perspective of humankind as a whole – even the worst
of these catastrophes are mere ripples on the surface of the great sea of life. They haven’t
significantly affected the total amount of human suffering or happiness or determined the long-term
fate of our species.
With the exception of a species-destroying comet or asteroid impact (an extremely rare
occurrence), there were probably no significant existential risks in human history until the midtwentieth century, and certainly none that it was within our power to do something about. The first manmade
existential risk was the inaugural detonation of an atomic bomb. At the time, there was some concern that the explosion
might start a runaway chain-reaction by “igniting” the atmosphere. Although we now know that such an outcome was
physically impossible, it qualifies as an existential risk that was present at the time. For there to be a risk, given the
knowledge and understanding available, it suffices that there is some subjective probability of an
adverse outcome, even if it later turns out that objectively there was no chance of something bad
happening. If we don’t know whether something is objectively risky or not, then it is risky in the
subjective sense. The subjective sense is of course what we must base our decisions on. [2] At any given
time we must use our best current subjective estimate of what the objective risk factors are.[3]
A much greater
existential risk emerged with the build-up of nuclear arsenals in the US and the USSR. An all-out
nuclear war was a possibility with both a substantial probability and with consequences that might
have been persistent enough to qualify as global and terminal. There was a real worry among those
best acquainted with the information available at the time that a nuclear Armageddon would occur
and that it might annihilate our species or permanently destroy human civilization.[4] Russia
and the US retain large nuclear arsenals that could be used in a future confrontation, either
accidentally or deliberately. There is also a risk that other states may one day build up large nuclear arsenals. Note
however that a smaller nuclear exchange, between India and Pakistan for instance, is not an
existential risk, since it would not destroy or thwart humankind’s potential permanently.
Such a war might however be a local terminal risk for the cities most likely to be targeted. Unfortunately, we shall see that
nuclear Armageddon and comet or asteroid strikes are mere preludes to the existential risks that we will encounter in the
21st century. The special nature of the challenges posed by existential risks is illustrated by the following points: ·
Our
approach to existential risks cannot be one of trial-and-error. There is no opportunity to learn from
errors. The reactive approach – see what happens, limit damages, and learn from experience – is unworkable. Rather, we
must take a proactive approach. This requires foresight to anticipate new types of threats and a willingness to take decisive
preventive action and to bear the costs (moral and economic) of such actions. ·
We cannot necessarily rely on the
institutions, moral norms, social attitudes or national security policies that developed from our experience with managing
other sorts of risks. Existential risks are a different kind of beast. We might find it hard to take them as seriously as we
should simply because we have never yet witnessed such disasters.[5] Our collective fear-response is likely ill calibrated to
the magnitude of threat. ·
Reductions in existential risks are global public goods [13] and may therefore be
undersupplied by the market [14]. Existential risks are a menace for everybody and may require acting on
the international plane. Respect for national sovereignty is not a legitimate excuse for failing to take
countermeasures against a major existential risk. ·
If we take into account the welfare of
44
WAKE DW
future generations, the harm done by existential risks is multiplied by another factor,
the size of which depends on whether and how much we discount future benefits [15,16].
Russian causes extinction
Caldicott 3
Caldicott, head of Physicians for Social Responsibility, 2003 [Helen , The Asheville Citizen-Times, November 16, p. lexis/nexis]
Caldicott: I agree. Anyone can make their own nuclear weapon if they can steal some plutonium, and it's all around. The desig n is on the Internet. You can buy stuff in
your local hardware shop and make your own bomb. Cities will be blown up, but I am talking about the end of creation. There's a huge
magnitude of difference between blowing up New York or Dehli or Seoul or whatever and destroying the only life in the universe. And that is what we have got to get into
our brains to understand that and that's what we're about to do any second of any day .
You need a thousand bombs to cause
nuclear winter and the end of life on Earth. There are only two countries now that can do
that and there only ever will be because it costs an awful lot to build a thousand bombs and
deliver them. Only two countries are threatening life on the planet -- Russia and America.
45
Download