GMU CM 1AC – GSU Cartels State legalization is inevitable- but it fails absent federal reform Ferner 14 Lawmaker Predicts Marijuana Will Be Legal Within 5 Years, Matt Ferner, Denver editor for the Huffington Post, graduate of University of Colorado Boulder and University of California, Los Angeles, 04/02/2014, http://www.huffingtonpost.com/2014/04/02/marijuana-prohibition-ending_n_5065594.html Two states with legal recreational use. Twenty more that allow medical use. Record-high support at the national level for more permissive policies. It seems fair to say that the United States' official stance on marijuana is shifting quickly . In fact, one congressman is predicting that U.S. pot prohibition will be a thing of the past before the end of the decade. "I think it’s game over in less than five years ," Rep. Earl Blumenauer (D-Ore.) said Monday during an interview with The Huffington Post. "There's no question that we're likely to see another state or two this year legalizing [recreational] use," Blumenauer said. "We're going to see more medical marijuana progress. The crazy prohibitions on bank services and probably the tax disparities -- these are all eroding." As of now, 20 states have legalized marijuana for medical purposes, and voters in Colorado and Washington have approved marijuana for recreational use. About a dozen more states are expected to legalize marijuana in some form over the next several years. One recent study has projected a $10 billion legal marijuana industry by 2018. Despite a growing and profitable legal marijuana industry, the federal government continues to ban the plant , classifying it as a Schedule I substance alongside drugs like heroin and LSD, and maintaining that it has "no currently accepted medical use." Such policies cause a number of problems for state-legal, state-licensed pot businesses. Banks often refuse to work with marijuana businesses out of fear that they could be implicated as money launderers if they offer traditional banking services. The pot businesses also can't deduct traditional business expenses like advertising costs, employee payroll, rent and health insurance from their combined federal and state taxes, meaning that dispensary owners around the U.S. often face effective tax rates of anywhere from 50 to 80 percent , due to an antiquated Internal Revenue Service rule. Federal prohibition is the key impediment to state legalization *tentative Lopez 14 6 ways the federal government continues its war on marijuana, German Lopez, Writing Fellow Vox Media, Inc, June 11, 2014, http://www.vox.com/2014/6/11/5799916/6-ways-the-federal-government-continuesits-war-on-marijuana Voters and lawmakers in 22 states have legalized medical marijuana, and voters in two states have approved full marijuana legalization. But federal officials haven't gone along with the new drug paradigm. Through multiple measures, ranging from hurdles in the tax code to restricted waterways, the federal government has made it a lot harder for marijuana businesses to operate. Even in states where medical or recreational marijuana is legal, the federal government's anti-marijuana stance has major repercussions. Here are just a few of the ways the federal government's policies affect states' marijuana laws. 1) Marijuana businesses can't file for some federal tax deductions Under the federal tax code, marijuana businesses can't file for several deductions and, as a result, their income tax rates can soar to as high as 70 percent. The culprit: a section of the federal tax code, known as 280E, originally meant for illegal drug dealers. Businesses, as a result, can deduct costs for growing pot, but they can't deduct typical business expenses, such as advertising or rent. This obviously makes running a medical or retail marijuana business a lot more expensive. As Colorado accountant Jim Marty put it to NPR, "If they were in a normal business, their top bracket would be about 45 percent. But if you have to pay tax on your gross profit and not your net income, the calculations I've done puts the federal and state income tax at about 70 percent." 2) Federal prohibition makes it too difficult for marijuana businesses to work with conventional banks Since marijuana is still illegal at the federal level, banks are leery of working with businesses that deal in the drug. This wariness persisted even after a federal guidance that attempted to put some banks' minds at rest, largely because banks feel the guidance imposed too many unrealistic rules and restrictions for doing business with marijuana shops and cultivators. That means marijuana businesses operate as largely cash-only operations, and they can't take conventional loans. As a result, it's riskier and more expensive to run a marijuana business: the cash-only model makes pot shops and cultivators more vulnerable to theft, and the loans given to these businesses typically have much higher interest rates. 3) The National Institute on Drug Abuse holds a monopoly over medical marijuana research The federal government holds a research monopoly on one drug: marijuana. To study the drug's effects without running afoul of federal law, researchers need to get supplies from a University of Mississippi farm contracted by the federal government — the only federally legal marijuana farm in the country. Researchers, such as the University of Arizona's Sue Sisley, complain that this adds a massive hurdle to conducting medical marijuana research, since it can take months and even years to get approval for legal marijuana supplies. The Drug Enforcement Administration (DEA), for its part, has taken some steps to make getting supplies easier. In May, a DEA order boosted the amount of marijuana that can be grown at the farm from 21 kilograms to 650 kilograms. The idea, National Institute on Drug Abuse officials said, was to meet rising demand from researchers. Medical marijuana advocates say it doesn't have to be this way. The federal government could, for example, eliminate the extra approval requirement and let other willing growers, such as Lyle Craker of the University of Massachusetts, Amherst, into the fold. That could significantly speed up the process, and allow researchers to get to the bottom of whether the legalization of medical marijuana is truly justified. 4) The feds restrict water for growing marijuana plants The US Bureau of Reclamation in late May ruled that it won't allow federally controlled water to be used for marijuana farms, even if the farms are legal under state law. The agency said its decision was necessary to comply with federal laws and rules keeping marijuana illegal. McClatchy DC reported that the ruling could hit Washington, where full marijuana legalization is moving forward, the hardest, because the federal government controls water for roughly two-thirds of the state's irrigated land. Marijuana farmers said the ruling will be an inconvenience, but there will be ways around it. Washington officials, for one, have suggested some alternatives: drilling wells or tapping into a city's water supply. It's expected taking these extra steps will be more expensive, but it won't be unmanageable. 5) The DEA sometimes raids marijuana businesses Even after President Barack Obama vowed to stop the DEA's raids on marijuana businesses that are compliant with state law, the raids have continued. Sometimes these raids seem justifiable. In Colorado, for instance, the DEA and IRS went after a marijuana shop accused of money laundering and ties to Colombian drug cartels. If these charges hold up, the feds probably made the right call. In some cases, however, the Huffington Post found the raids hit legitimate businesses who are compliant with state laws. For marijuana entrepreneurs, the fear of federal raids is a persistent concern. After all, it's very hard for a business to operate under an environment in which it's possible the federal government will shut it all down at a moment's notice. 6) The DEA intimidates doctors into not participating in the medical marijuana industry As the DEA confirmed to Vox earlier in the week, it's protocol for the agency to intimidate physicians, hospitals, and pharmacies who consider participating in medical marijuana operations that are compliant with state law. "DEA enforces the Controlled Substances Act (CSA), and as a regulatory agency, it also ensures that those who are registered with DEA to handle controlled substances — including physicians, hospitals, and pharmacies — are aware of their obligations under the CSA," a DEA spokesperson said. "It would not be appropriate to comment on specific interactions with registrants or any ongoing investigations." To enforce these rules, the DEA offers doctors and other medical providers a choice: either they stop their involvement in the medical marijuana industry, or they'll lose a federal licenses that's needed for prescribing certain drugs. Since some medical providers' livelihoods can rely on their ability to prescribe drugs, they usually opt to abandon their medical marijuana dealings. The Boston Globe reported that this has been happening for some time now in Massachusetts. So far, several doctors say they have dropped their jobs with medical marijuana dispensaries in response to the alleged threats. How can this change? Many of these problems stem from the federal government classifying marijuana as a schedule 1 substance. Under the DEA's scheduling system, this labels marijuana as a more dangerous and less medically valuable drug than cocaine and meth — a label that most medical experts and scientists consider absurd. The Obama administration, through the US Department of Justice or US Department of Health and Human Services, could unilaterally begin a review process that would change the DEA's harsh classification of marijuana. But so far the administration has said it will only act with congressional support. Of course, legislators could also take action to rework the drug scheduling system, tax code, rules on waterways, or other hurdles facing the marijuana industry. Congress, for its part, seems to be moving in favor of laxer marijuana laws. The Republican-controlled House of Representatives in late May voted — for the first time — to prohibit the federal government from interfering with states' medical marijuana laws. Whether that bill will succeed in the Senate and get the president's signature to become law is, for now, unclear. Either way, the contradiction between state and federal laws is a constant concern for marijuana businesses and the states in which they operate. Until the federal government's laws and rules align with states', the contradiction will continue shutting down businesses that are legal under state law or, at the very least, making their operations a lot more expensive. Legalization overwhelms cartel market share Zoë Amerigian 11 is COHA Research Associate and Membership Coordinator at Marijuana Policy Project, “Legalizing Marijuana: AN Exist Strategy from the War on Drugs,” 4-19-11, http://www.coha.org/legalizing-potan-exit-strategy-from-the-war-on-drugs/ DOA: 5-19-14, y2k Eliminating the marijuana market share of Mexican cartels would hit them especially hard because it serves as a steady, reliable source of income and carries relatively little risk for them to produce. The percentage of total cartel drug revenues from marijuana is greatly debated—Mexican and American official figures range from 50-65 percent, but a study by the RAND Corporation suggests closer to 15-26 percent.13 Even the most conservative of these estimates—roughly a fifth of revenue—would strike a blow to cartel profits if eliminated. Marijuana is particularly valuable to cartels because they control the entire production line; they both grow and distribute it themselves, making it more reliable and less risky. Conversely, cocaine is imported to Mexico mostly from South America, heightening the risk of smuggling it. More troubling is that cartels are now even growing marijuana on U.S. public lands, mostly throughout national parks and forests, in order to avoid the task of smuggling drugs across the U.S.-Mexican border.14 If Mexico were to reach the point of legalizing marijuana, the U.S. could continue to buy the drug legally from south of the border, like many other consumer goods. But even if Mexico did not implement its own legalization, recent data indicates that a domestic U.S. industry could fill the role of the supplier and eliminate the need for Mexican marijuana. The drug is increasingly grown domestically and U.S. growers are already posing a threat to Mexican market share. Exact numbers are impossible to assess, but figures of American domestic marijuana production range from 30-60 percent of the total consumed in the U.S.16 Additionally, a report by the RAND Corporation found that legalizing marijuana in California alone (and a subsequent rise in state-wide marijuana production) could lower Mexican cartel marijuana revenues by 65-85 percent. This could occur if Californian marijuana were smuggled to the rest of the U.S. where the drug would still be illegal. The marijuana’s projected high quality and low price would make it an extremely competitive product.17 It seems reasonable to assume that if the drug were legalized in all fifty states, the domestic market could easily overwhelm the Mexican market share. In terms of tangible effects on Mexican drug violence, the RAND Corporation and UNODC agree that removing U.S. demand for illegal marijuana would increase in the long run, once U.S. demand is met by domestic supply, cartels would be financially debilitated and, most likely, some of the violence quelled . The U.S. population is by far the largest drug market for Mexico, making our action necessary for any transnational legalization to be effective. While cocaine, methamphetamines, and heroin are still funding cartels, drug violence will not be completely eliminated; but any move to starve their resources is a step forward in weakening them and, ultimately, saving lives. violence in the short run because Mexican cartels would be fighting for dominance in a shrinking market.18 But Plan frees up law enforcement resources Hesson 14 Will Mexican Cartels Survive Marijuana Legalization? TED HESSON, immigration editor at Fusion, 02/24/2014, http://fusion.net/justice/story/mexican-cartels-survive-marijuana-legalization-450519 1. Mexico is the top marijuana exporter to the U.S. A 2008 study by the RAND Corporation estimated that Mexican marijuana accounted for somewhere between 40 and 67 percent of the drug in the U.S. The cartel grip on the U.S. market may not last for long. Pot can now be grown for recreational use in Colorado and Washington, and for medical use in 20 states. For the first time, American consumers can choose a legal product over the black market counterpart. Beau Kilmer, the co-director of the RAND Drug Policy Research Center, says that a few states legalizing marijuana won’t eliminate the flow of the drug from down south, but a change in policy from the federal government would be a game changer. “Our research also suggests that legalizing commercial marijuana production at the national level could drive out most of the marijuana imported from Mexico,” he wrote in a 2013 op-ed. 2. Marijuana makes up more than $1 billion of cartel income Pot isn’t the main source of income for cartels. They make most of their cash from drugs like cocaine and heroin. But marijuana accounts for 15 to 26 percent of the cartel haul, according to RAND’s 2008 data. That translates to an estimated $1.1 billion to $2 billion of gross income. The drop in sales certainly wouldn’t end the existence of drug traffickers — they bring in an estimated $6 billion to $8 billion annually — but losing a fifth of one’s income would hurt any business. On top of that, Kilmer says that marijuana likely makes up a higher percentage of the cartel take today than it did back in 2008. So taking away pot Authorities could focus on other drugs Marijuana made up 94 percent of the drugs seized by Border Patrol in the 2012 fiscal year, judging by weight. If pot becomes legal in the U.S. and cartels are pushed out of the market, that would allow law-enforcement agencies to dedicate more resources to combat the trafficking of drugs like heroin and cocaine. This scenario presupposes that marijuana will be cheap enough in the states to disincentivize continued smuggling from Mexico. Eric would sting even more. 3. Farnsworth, the vice president of the Council of the Americas and Americas Society, says that high taxes could preserve the illicit market. “There will always be arbitrage opportunities even for a legal product,” he said. “Cigarettes are completely legal in the U.S. and worldwide, yet counterfeits and parallel imports to evade legal market could overtake illegal sales . American buyers may be willing to pay more for legal weed and high tax rates could drop as states change their drug policies. taxes are a major part of criminal enterprises and gangs.” In the future, though, the That would make smuggling it across the border a waste of time. Marijuana solves other drug revenues---diversification fails Erik Kaine 11 is Forbes Contributor, “Would Legalizing Marijuana Stop the Drug Violence in Mexico?” 6-24-11, http://www.forbes.com/sites/erikkain/2011/06/24/would-legalizing-marijuana-stop-the-drug-violence-in-mexico/ DOA: 5-20-14, y2k I think what Longmire is missing is the way legalization of pot would undermine the very nature of the black market from the ground up. It’s not just about profits, for one thing. Marijuana is rightly considered a gateway drug but this is almost entirely because when someone purchases marijuana they do so from a dealer. Dealers invariably have other drugs as well. More people smoke pot than do drugs like cocaine, but cocaine and other illicit substances have a high profit margin for dealers and the cartels. So if you legalize marijuana you hit the black market infrastructure where it hurts. Suddenly people are buying their marijuana from the grocery store or a dispensary instead of from a dealer, and the ability of dealers to push other harder drugs becomes greatly diminished. People who want to get high are suddenly able to do so legally so long as they stick to marijuana, making the risk-gap between using marijuana and other drugs suddenly much wider. In other words, legalizing marijuana fundamentally alters the landscape of the black market in ways that would make it harder for drug traffickers to access the market in the first place, creating fewer consumers and potential consumers almost overnight. This means that even if marijuana makes up much less than 60 percent of the cartels’ profits (Ozemik cites numbers around 26%) removing marijuana from their product line would cut into profits all across the board. This would significantly weaken the cartels and would – at some point – lead to a decrease in violence both in Mexico and here in the United States. We should always be skeptical, and crime organizations may indeed move into other areas of business, but legalizing marijuana would hurt the cartels much more than the current war on drugs. People won’t switch to other drugs Andrew Kirell 12, Mediaite editor-in-chief, “The Weekly Standard Is Absolutely Wrong About Drug Legalization,” 5-1-12, http://www.mediaite.com/online/the-weekly-standard-is-absolutely-wrong-about-drug-legalization/ DOA: 6-8-14, y2k According to the government’s National Survey on Drug Use & Health, most people who try hard drugs give it up. Nearly 4 million people report to have tried heroin before, but only 213,000 are regular users. That’s about 5%. Same rate for crack cocaine use. For meth, the percentage is even smaller. Walters also ignores the laws of economics. Demand for hard drugs like heroin is what economists call “ inelastic .” Even if the price decreases dramatically, the demand will not increase dramatically. There may be an increase in use, but only on the margins. In other words: most of us have absolutely no interest in trying heroin. And even a dramatic price decrease won’t make us suddenly all crave that good junk. National legalization is key---solves every other alt cause to cartels Nathan Jones 14 is the Alfred C. Glassell III Postdoctoral Fellow in Drug Policy at the Baker Institute. 14, "Will recreational marijuana sales in Colorado hurt Mexican cartels?," 9-12-2014, Baker Institute Blog, http://blog.chron.com/bakerblog/2014/01/will-recreational-marijuana-sales-in-colorado-hurt-mexican-cartels/, DOA: 9-12-2014, y2k -In terms of the impact on Mexican cartels in the short term, we might see a spike in other extortion-related crimes as profit starvation sets in for certain cells in illicit networks. Attributing this to These illicit networks may further diversify into territorial extortionist activities, but over the long term will be wiped out by civil society and the state as these crimes draw a powerful backlash. I documented this process in Tijuana in my 2011 doctoral dissertation. The real benefits of legalization will be seen in the medium- and long-term. By cutting into Mexican cartel profits, other cartel activities and power could be reduced. We know that cartel profits can be redistributed to local cells to maintain territorial control. The ability to weaken or reduce these payments could limit their activities and capital investments in kidnapping and extortion franchises. Finally, reducing cartel profits could help Mexico strengthen its institutions. Building effective police and security institutions takes decades. Decades can stretch into centuries if those agencies are constantly rejiggered and re-corrupted by highly profitable and sophisticated organized criminal networks. Reducing illicit profits could have an important and salubrious effect on the ability of Mexico to strengthen its security apparatus. Colorado’s legalization of marijuana will have a negligible impact on drug-related violence in Mexico because Colorado is too small a market, and enforcement on marijuana leaving the state will be artificially tight for the first year or two. As other states legalize — Washington is set to fully implement its voter-approved initiative later this year and states like California and Washington appear poised to do so in the coming years — we will see a larger impact. If a state such as Texas were to legalize, we would see a rapid and much greater impact due to the state’s size, geographic proximity to Mexico, and penchant for limited regulation of big business. It is Colorado’s leadership role in this broader trend that could have a real impact over the long term on cartel profits and violence in Mexico. changing market dynamics in the United States will be difficult, given that violent black market forces (rival cartels) may be a much more important confounding variable. Cartels cause Mexico instability Pease 11 (Shadd A. June. Shadd A. Pease holds a Master of Arts in International Security from University of Denver Josef Korbel School of International Studies. Pease's concentration on the areas of military analysis and intelligence culminated in his graduate thesis, “Instability in the South: The Implications of Mexican State Failure on U.S. National Security.” Supervised by Dr. Paul R. Viotti. Dr. Viotti has a PhD in International Relations, American Foreign Policy, and US National Security Policy. “Instability in the South: Implications of Mexican State Failure on U.S. National Security” Accessed by Proquest) 5/27/14 RK Large swaths of Mexico are essentially controlled by the DTOs. Although a majority of the casualties of the violence are members of these many ordinary Mexican citizens are affected by the violence and carnage. Additionally, the instability and insecurity of the Northern areas of Mexico have left many American cities at risk. In a March 2009 article released by The Brookings Institute, author Vanda Felbab-Brown states, “The number of kidnappings in Phoenix, Arizona, for example, tripled from 48 in 2004 to 241 in 2008. Drug turf wars among the drug trafficking organizations are beginning to occur in major violent organizations, or somehow related to drug trafficking, cities in the U.S., such as Dallas, Texas.” This is an unnerving negative externality of the narcotics problem occurring along the U.S. southern border. Continued kidnappings and murders will persist until the DTOs operating in Mexico are brought under control. As mentioned previously, the various drug trafficking organizations operate throughout the state of Mexico. Two of the largest DTOs, the Tijuana Cartel and the Juarez Cartel are in close proximity with two major American cities: San Diego, California and El Paso, Texas. Furthermore, many of the drug trafficking organizations operate in conjunction with each other. The figure below provides the current areas of the major Mexican drug trafficking organizations. Figure 2: Drug Trafficking Organizations Areas of Influence The drug trafficking organizations pose a serious threat to the security of Mexico. This is due in large part to the blatant disregard many of the members of these organizations have for the government of Mexico and its citizenry. The Mexican government has implemented a tougher stance against the various DTOs by deploying military forces; however, the drug trafficking organizations are heavily entrenched into the society of the Mexican state. In a February 2009 article from The Wall Street Journal, the Mexican academic Edgardo Buscaglia “estimates there are 200 counties in Mexico-some 8% of the totalwhere drug gangs wield more influence behind the scenes than the authorities. With fearsome arsenals of rocket-propelled grenades, bazookas, and automatic weapons, cartels are often better armed than the police and even the soldiers they fight.” The type of arms that the various drug trafficking organizations own, the ability to control large areas of the Mexican state, and the cultural entrenchment of these organizations is disconcerting for the security of Mexico . In addition, the drug trafficking cartels are beginning to elevate their deadly attacks by implementing improvised explosive devices (IEDs) into their assaults. Triggers Hezbollah border-terrorism---causes US retaliation against Iran Steven Metz 14, a defense analyst, "Strategic Horizons: All Options Bad If Mexico’s Drug Violence Expands to U.S.," 2-19-2014, No Publication, http://www.worldpoliticsreview.com/articles/13576/strategic-horizons-alloptions-bad-if-mexico-s-drug-violence-expands-to-u-s, DOA: 8-16-2014, y2k Over the past few decades, violence in Mexico has reached horrific levels, claiming the lives of 70,000 as criminal organizations fight each other for control of the drug trade and wage war on the Mexican police, military, government officials and anyone else unlucky enough to get caught in the crossfire. The chaos has spread southward, engulfing Guatemala, Honduras and Belize. Americans must face the possibility that the conflict may also expand northward, with intergang warfare, assassinations of government officials and outright terrorism in the United States. If so, this will force Americans to undertake a fundamental reassessment of the threat , possibly redefining it as a security issue demanding the use of U.S. military power. One way that large-scale drug violence might move to the United States is if the cartels miscalculate and think they can intimidate the U.S. government or strike at American targets safely from a Mexican sanctuary. The most likely candidate would be the group known as the Zetas. They were created when elite government anti-drug commandos switched sides in the drug war, first serving as mercenaries for the Gulf Cartel and then becoming a powerful cartel in their own right. The Zetas used to recruit mostly ex-military and ex-law enforcement members in large part to maintain discipline and control. But the pool of soldiers and policemen willing to join the narcotraffickers was inadequate to fuel the group’s ambition. Now the Zetas are tapping a very different, much larger, but less disciplined pool of recruits in U.S. prisons and street gangs. This is an ominous turn of events. Since intimidation through extreme violence is a trademark of the Zetas, its spread to the United States raises the possibility of largescale violence on American soil. As George Grayson of the College of William and Mary put it, “The Zetas are determined to gain the reputation of being the most sadistic, cruel and beastly organization that ever existed.” And without concern for extradition, which helped break the back of the Colombian drug cartels, the Zetas show little fear of the United States government, already having ordered direct violence against American law enforcement. Like the Zetas, most of the other Mexican cartels are expanding their operations inside the United States. Only a handful of U.S. states are free of them today. So far the cartels don’t appear directly responsible for large numbers of killings in the United States, but as expansion and reliance on undisciplined recruits looking to make a name for themselves through ferocity continue, the chances of miscalculation or violent freelancing by a cartel affiliate mount. This could potentially move beyond intergang warfare to the killing of U.S. officials or outright terrorism like the car bombs that drug cartels used in Mexico and Colombia. In an assessment for the U.S. Army War College Strategic Mexico’s violence could spread north is via the partnership between the narcotraffickers and ideologically motivated terrorist groups. The Zetas already have a substantial connection to Hezbollah, based on collaborative narcotrafficking and arms smuggling. Hezbollah has relied on terrorism since its founding and has few qualms about conducting attacks far from its home turf in southern Lebanon. Since Hezbollah is a close ally or proxy of Iran, it might some day attempt to strike the United States in retribution for American action against Tehran. If so, it would likely attempt to exploit its connection with the Zetas, pulling the narcotraffickers into a transnational proxy war. The foundation for this scenario is already in place: Security analysts like Douglas Farah have warned of a “tier-one security threat for the United States” from an “improbable alliance” between narcotraffickers and antiAmerican states like Iran and the “Bolivarian” regime in Venezuela. The longer this relationship continues and the more it expands, the greater the chances of dangerous miscalculation. No matter how violence from the Mexican cartels came to the United States, the key issue would be Washington’s response. If the Zetas, another Mexican cartel or someone acting in their stead launched a campaign of assassinations or bombings in the United States or helped Hezbollah or some other transnational terrorist organization with a mass casualty attack, and the Mexican government proved unwilling or unable to respond in a way that Washington considered adequate, the United States would have to consider military action. While the United States has deep cultural and Studies Institute, Robert Bunker and John Sullivan considered narcotrafficker car bombs inside the United States to be unlikely but not impossible. A second way that economic ties to Mexico and works closely with Mexican law enforcement on the narcotrafficking problem, the security relationship between the two has always been difficult—understandably so given the long history of U.S. military intervention in Mexico. Mexico would be unlikely to allow the U.S. military or other government agencies free rein to strike at narcotrafficking cartels any U.S. president would face immense political pressure to strike at America’s enemies if the Mexican government could not or would not do so itself. Failing to act firmly and decisively would weaken the president and encourage the Mexican cartels to believe that they could attack U.S. targets with impunity. After all, the primary lesson from Sept. 11 was that playing only defense and allowing groups that attack the United States undisturbed foreign sanctuary does not work. But using the U.S. military against the cartels on Mexican soil could weaken the Mexican government or even cause its collapse, end in its territory, even if those organizations were tied to assassinations, bombings or terrorism in the United States. But further security cooperation between Mexico and the United States and damage one of the most important and intimate bilateral economic relationships in the world. Quite simply, every available strategic option would be disastrous. US retaliation causes extinction Avery 13 An Attack On Iran Could Escalate Into Global Nuclear War, John Scales Avery, B.Sc. in theoretical physics from MIT and an M.Sc. from the University of Chicago, studied theoretical chemistry at the University of London, and was awarded a Ph.D. now Lektor Emeritus, Associate Professor, at the Department of Chemistry, University of Copenhagen, 06 November, 2013, http://www.countercurrents.org/avery061113.htm Despite the willingness of Iran's new President, Hassan Rouhani to make all reasonable concessions to US demands, Israeli pressure groups in Washington continue to demand an attack on Iran. an attack might escalate into a global nuclear war, with catastrophic consequences. As we approach the 100th anniversary There is a danger that an attack on Iran would escalate into a large-scale war in the Middle East, entirely destabilizing a region that is already deep in problems. The unstable government of Pakistan might be overthrown, and the revolutionary Pakistani government might enter the war on the side of Iran, thus introducing nuclear weapons into the conflict. Russia and China, firm allies of Iran, might also be drawn into a general war in the Middle East. Since much of the world's oil comes from the region, such a war would certainly cause the price of oil to reach unheard-of heights, with catastrophic effects on the global economy. In the dangerous situation that could potentially result from an attack on Iran , there is a risk that nuclear weapons would be used, either intentionally, or by accident or miscalculation. Recent research has shown that besides making large areas of the world uninhabitable through long-lasting radioactive contamination, a nuclear war would damage global agriculture to such a extent that a global famine of previously unknown proportions would result. Thus, nuclear war is the ultimate ecological catastrophe. It could destroy human civilization and much of the biosphere. To risk such a war would be an unforgivable offense against the lives and future of all the peoples of the world, US citizens included. But such World War I, we should remember that this colossal disaster escalated uncontrollably from what was intended to be a minor conflict. Cartels undermine investment needed for successful energy reform Chapa 14 Mexico's oil industry on a collision course with drug cartels, Sergio Chapa, Interactive Manager, 08.12.2014, http://www.valleycentral.com/news/story.aspx?id=1082548#.U_uy-FZD9c5 Monday was a historic day in Mexico where congress passed a second round of legislation to open the nation's oil industry to foreign investment. Supporters say both investment and technology are sorely needed to improve Mexico's national oil company PEMEX and their aging infrastructure. Opponents are worried about corruption and Mexico getting short-changed on a highlyprized natural resource. But with the lands with the most oil and natural gas reserves terrorized by drug cartels, experts believe energy reform is on a collision course with organized crime. Cartel Lands Ranging from Gulf of Mexico in Tamaulipas the foothills of Coahuila, the Burgos Basin contains untold amounts of oil and natural gas. Foreign investment, hydraulic fracturing technology and water infrastructure improvements are needed on land while deep water oil platforms are needed in the gulf. But northern Mexico remains divided up by the Zetas drug cartel and rival members of the Gulf Cartel. In addition to fighting with each other and soldiers, the two groups have been linked to the theft of oil and gasoline as well as kidnapping and extortion of businessmen. UTB Professor Guadalupe Correa-Cabrera is an expert on Mexican drug cartels. Although there have been no confirmed direct attacks on oil companies or their workers, some foreign workers have reportedly been caught in the cartel cross-fire . There have also been rumors of foreign oil workers kidnapped in Tamaulipas, none of those reports have been confirmed. "It's a very big risk for those companies to come," Correa-Cabrera said. Oil Theft The theft of oil, gasoline and other petroleum products has been documented in dozens of cases in the State of Tamaulipas and neighboring Nuevo Leon over the past four years. Drug cartel operatives have placed illegal siphons directly on pipelines with stolen gasoline being sold openly at discount prices in the streets of Mexican border cities. Professor Correa-Cabrera said stolen oil and gasoline is a multimillion dollar business for drug cartels and they aren't likely to give it up any time soon. The professor said foreign companies and their drilling operations could be an equally tempting targets for drug cartels. "They are not going to disappear just because legislation is passed," Correa-Cabrera said. Energy boom makes hegemony sustainable- it’s the NAFTA century Kotkin 13 America's True Power In The NAFTA Century, Joel Kotkin, R.C. Hobbs Professor of Urban Studies at Chapman University in California and executive editor of newgeography.com, 9/13/2013, http://www.forbes.com/sites/joelkotkin/2013/09/13/americas-true-power-in-the-nafta-century/ Welcome then to the NAFTA century , in which our power is fundamentally based on developing a common economic region with our two large neighbors. Since its origins in 1994, NAFTA has emerged as the world’s largest trading bloc, linking 450 million people that produce $17 trillion in output. Foreign policy elites in both parties may focus on Europe, Asia and the Middle East, but our long-term fate lies more with Canada, Mexico and the rest of the Americas. Nowhere is this shift in power more obvious than in the critical energy arena, the wellspring of our deep involvement in the lunatic Middle East. Massive finds have given us a new energy lifeline in places like the Gulf coast, the Alberta tar sands, the Great Plains, the Inland West, Ohio, Pennsylvania and potentially California. And if Mexico successfully reforms its state-owned energy monopoly, PEMEX, the world energy — and economic — balance of power will likely shift more decisively to North America . Mexican President Pena Nieto’s plan, which would allow increased foreign investment in the energy sector, is projected by at least one analyst to boost Mexico’s oil output by 20% to 50% in the coming decades. Taken together , the NAFTA countries now boast larger reserves of oil, gas (and if we want it, coal) than any other part of the world. More important, given our concerns with greenhouse gases, NAFTA countries now possess, by some estimates, more clean-burning natural gas than Russia, Iran and Qatar put together. All this at a time when U.S. energy use is declining, further eroding the leverage of these troublesome countries. This particularly undermines the position of Putin , who has had his way with Obama but faces long-term political decline. Russia, which relies on hydrocarbons for two-thirds of its export revenues and half its budget, is being forced to cut gas prices in Europe due to a forthcoming gusher of LNG exports from the U.S. and other countries. In the end, Russia is an economic one-horse show with declining demography and a discredited political system. In terms of the Middle East, the NAFTA century means we can disengage , when it threatens our actual strategic interests. Afraid of a shut off of oil from the Persian Gulf? Our response should be: Make my day . Energy prices will rise, but this will hurt Europe and China more than us , and also will stimulate more jobs and economic growth in much of the country, particularly the energy belts of the Gulf Coast and the Great Plains. China and India have boosted energy imports as we decrease ours; China is expected to surpass the United States as the world’s largest oil importer this year. At the same time, in the EU, bans on fracking and over-reliance on unreliable, expensive “green” energy has driven up prices for both gas and electricity. These high prices have not only eroded depleted consumer spending but is leading some manufacturers, including in Germany, to look at relocating production, notably to energy-rich regions of the United States. This shift in industrial production is still nascent, but is evidenced by growing U.S. manufacturing at a time when Europe and Asia, particularly China, are facing stagnation or even declines. Europe’s industry minister recently warned of “an industrial massacre” brought on in large part by unsustainably high energy prices. The key beneficiaries of NAFTA’s energy surge will be energy-intensive industries such as petrochemicals — major new investments are being made in this sector along the Gulf Coast by both foreign and domestic companies. But it also can be seen in the resurgence in North American manufacturing in automobiles , steel and other key sectors. Particularly critical is Mexico’s recharged industrial boom . In 2011 roughly half of the nearly $20 billion invested in the country was for manufacturing. Increasingly companies from around the world see our southern neighbor as an ideal locale for new manufacturing plants ; General Motors , Audi , Honda, Perelli, Alcoa and the Swedish appliance giant Electrolux have all announced major investments. Critically this is not so much Ross Perot’s old “sucking sound” of American jobs draining away, but about the shift in the economic balance of power away from China and East Asia. Rather than rivals, the U.S., Mexican and Canadian economies are becoming increasingly integrated , with raw materials, manufacturing goods and services traded across the borders. This integration has proceeded rapidly since NAFTA, with U.S. merchandise exports to Mexico growing from $41.6 billion in 1993 to $216.3 billion in 2012, an increase of 420%, while service exports doubled. Meanwhile U.S. imports from Mexico increased from $39.9 billion in 1993 to $277.7 billion in 2012, an increase of 596%. At the same time, U.S. exports to Canada increased from $100.2 billion in 1993 to $291.8 billion in 2012. Investment flows mirror this integration. As of 2011, the United States accounted for 44% of all foreign investment in Mexico, more than twice that of second-place Spain; Canada, ranking fourth, accounts for another 10%. Canada, which, according to a recent AT Kearney report, now ranks as the No. 4 destination for foreign direct investment, with the U.S. accounting for more than half the total in the country. Over 70% of Canada’s outbound investment goes to the U.S. Our human ties to these neighbors may be even more important. (Disclaimer: my wife is a native of Quebec). Mexico, for example, accounts for nearly 30% of our foreign-born population, by far the largest group. Canada, surprisingly, is the largest source of foreign-born Americans of any country outside Asia or Latin America. We also visit each other on a regular basis, with Canada by far the biggest sender of tourists to the U.S., more than the next nine countries combined; Mexico ranks second. The U.S., for its part, accounts for two-thirds of all visitors to Canada and the U.S. remains by far largest source of travelers to Mexico. These interactions reflect an intimacy Americans simply do not share with such places as the Middle East (outside Israel), Russia, and China. There’s the little matter of democracy, as well as a common sharing of a continent, with rivers, lakes and mountain ranges that often don’t respect national borders. Policy-maker may prefer to look further afield but North America is our home, Mexico and Canada our natural allies for the future. Adios, Middle East and Europe; bonjour, North America. US engagement is inevitable---maintaining Hegemony is key to solve nuclear conflict and every geopolitical hotspot and to fostering international cooperation which solves every existential threat Brooks, Ikenberry, and Wohlforth 13 Stephen Brooks is Associate Professor of Government at Dartmouth College AND John Ikenberry is Albert G. Milbank Professor of Politics and International Affairs at Princeton University and Global Eminence Scholar at Kyung Hee University in Seoul AND John Wohlforth is Daniel Webster Professor of Government at Dartmouth College. “Lean Forward,” Jan/Feb 2013, Foreign Affairs, EBSCO, Accessed date: 1-9-13 y2k In Defense of American Engagement Since the end of World War II, the U nited S tates has pursued a single grand strategy: deep engagement . In an effort to protect its security and prosperity, the country has promoted a liberal economic order and established close defense ties with partners in Europe, East Asia, and the Middle East. Its military bases cover the map, its ships patrol transit routes across the globe, and tens of thousands of its troops stand guard in allied countries such as Germany, Japan, and South Korea. The details of U.S. foreign policy have differed from administration to administration, including the emphasis placed on democracy promotion and humanitarian goals, but for over 60 years , every president has agreed on the fundamental decision to remain deeply engaged in the world, even as the rationale for that strategy has shifted. During the Cold War, the United States' security commitments to Europe, East Asia, and the Middle East served primarily to prevent Soviet encroachment into the world's wealthiest and most resource-rich regions. Since the fall of the Soviet Union, the aim has become to make these same regions more secure, and thus less threatening to the U nited S tates, and to use these security partnerships to foster the cooperation necessary for a stable and open international order . Now, more than ever, Washington might be tempted to abandon this grand strategy and pull back from the world. The rise of China is chipping away at the United States' preponderance of power, a budget crisis has put defense spending on the chopping block, and two long wars have left the U.S. military and public exhausted. Indeed, even as most politicians continue to assert their commitment to global leadership, a very different view has taken hold among scholars of international relations over the past decade: that the United States should minimize its overseas military presence, shed its security ties, and give up its efforts to lead the liberal international order. Proponents of retrenchment argue that a globally engaged grand strategy wastes money by subsidizing the defense of well-off allies and generates resentment among foreign populations and governments. A more modest posture, they contend, would put an end to allies' free-riding and defuse anti-American sentiment. Even if allies did not take over every mission the United States now performs, most of these roles have nothing to do with U.S. security and only risk entrapping the United States in unnecessary wars. In short, those in this camp maintain that pulling back would not only save blood and treasure but also make the are wrong . In making their case, advocates of retrenchment overstate the costs of the current grand strategy and understate its benefits . In fact, the budgetary savings of lowering the U nited S tates' international profile are debatable, and there is little evidence to suggest that an internationally engaged America provokes other countries to balance against it, becomes overextended, or gets dragged into unnecessary wars. The benefits of deep engagement, on the other hand, are legion. U.S. security commitments reduce competition in key regions and act as a check against potential rivals. They help maintain an open world economy and give Washington leverage in economic negotiations. And they make it easier for the U nited S tates to secure cooperation for combating a wide range of global threats . Were the U nited S tates to cede its global leadership role, it would forgo these proven upsides while exposing itself to the unprecedented downsides of a world in which the country was less secure, prosperous, and influential. United States more secure. They UNBALANCED One such alleged cost of the current grand strategy is that, in the words of the political scientist Barry Posen, it "prompts states to balance against U.S. power however they can." Yet there is no evidence that countries have banded together in anti-American alliances or tried to match the United States' military capacity on their own-- or that they will do so in the future. Indeed, it's hard to see how the current grand strategy could generate true counterbalancing. Unlike past hegemons, the United States is geographically isolated, which means that it is far less threatening to other major states and that it faces no contiguous great-power rivals that could step up to the task of balancing against it. Moreover, any competitor would have a hard time matching the U.S. military. Not only is the United States so far ahead militarily in both quantitative and qualitative terms, but its security guarantees also give it the leverage to prevent allies from giving military technology to potential U.S. rivals. Because the United States dominates the high-end defense industry, it can trade access to its defense market for allies' agreement not to transfer key military technologies to its competitors. The embargo that the United States has convinced the EU to maintain on military sales to China since 1989 is a case in point. If U.S. global leadership were prompting balancing, then one would expect actual examples of pushback--especially during the administration of George W. Bush, who pursued a foreign policy that seemed particularly unilateral. Yet since the Soviet Union collapsed, no major powers have tried to balance against the United States by seeking to match its military might or by assembling a formidable alliance; the prospect is simply too daunting. Instead, they have resorted to what scholars call "soft balancing," using international institutions and norms to constrain Washington. Setting aside the fact that soft balancing is a slippery concept and difficult to distinguish from everyday diplomatic competition, it is wrong to say that the practice only harms the United States. Arguably, as the global leader, the United States benefits from employing soft-balancing-style leverage more than any other country. After all, today's rules and institutions came about under its auspices and largely reflect its interests, and so they are in fact tailor-made for soft balancing by the United States itself. In 2011, for example, Washington coordinated action with several Southea st Asian states to oppose Beijing's claims in the South China Sea by pointing to established international law and norms. Another argument for retrenchment holds that the United States will fall prey to the same fate as past hegemons and accelerate its own decline. In order to keep its ambitious strategy in place, the logic goes, the country will have to divert resources away from more productive purposes--infrastructure, education, scientific research, and so on--that are necessary to keep its economy competitive. Allies, meanwhile, can get away with lower military expenditures and grow faster than they otherwise would. The historical evidence for this phenomenon is thin; for the most part, past superpowers lost their leadership not because they pursued hegemony but because other major powers balanced against them--a prospect that is not in the cards today. (If anything, leading states can use their position to stave off their decline.) A bigger problem with the warnings against "imperial overstretch" is that there is no reason to believe that the pursuit of global leadership saps economic growth. Instead, most studies by economists find no clear relationship between military expenditures and economic decline. To be sure, if the United States were a dramatic outlier and spent around A quarter of its GDP on defense, as the Soviet Union did in its last decades, its growth and competitiveness would suffer. But in 2012, even as it fought a war in Afghanistan and conducted counterterrorism operations around the globe, Washington spent just 4.5 percent of GDP on defense--a relatively small fraction, historically speaking. (From 1950 to 1990, that figure averaged 7.6 percent.) Recent economic difficulties might prompt Washington to reevaluate its defense budgets and international commitments, but that does not mean that those policies caused the downturn. And any money freed up from dropping global commitments would not necessarily be spent in ways that would help the U.S. economy. Likewise, U.S. allies' economic growth rates have nothing to do with any security subsidies they receive from Washington. The contention that lower military expenditures facilitated the rise of Japan, West Germany, and other countries dependent on U.S. defense guarantees may have seemed plausible during the last bout of declinist anxiety, in the 1980s. But these states eventually stopped climbing up the global economic ranks as their per capita wealth approached U.S. levels--just as standard models of economic growth would predict. Over the past 20 years, the United States has maintained its lead in per capita GDP over its European allies and Japan, even as those countries' defense efforts have fallen further behind. Their failure to modernize their militaries has only served to entrench the United States' dominance. LED NOT INTO TEMPTATION The costs of U.S. foreign policy that matter most, of course, are human lives, and critics of an expansive grand strategy worry that the United States might get dragged into unnecessary wars. Securing smaller allies, they argue, emboldens those states to take risks they would not otherwise accept, pulling the superpower sponsor into costly conflicts--a classic moral hazard problem. Concerned about the reputational costs of failing to honor the country's alliance commitments, U.S. leaders might go to war even when no national interests are at stake. History shows, however, that great powers anticipate the danger of entrapment and structure their agreements to protect themselves from it. It is nearly impossible to find a clear case of a smaller power luring a reluctant great power into war. For decades, World War I served as the canonical example of entangling alliances supposedly drawing great powers into a fight, but an outpouring of new historical research has overturned the conventional wisdom, revealing that the war was more the result of a conscious decision on Germany's part to try to dominate Europe than a case of alliance entrapment. If anything, alliances reduce the risk of getting pulled into a conflict. In East Asia, the regional security agreements that Washington struck after World War II were designed, in the words of the political scientist Victor Cha, to "constrain anticommunist allies in the region that might engage in aggressive behavior against adversaries that could entrap the United States in an unwanted larger war." The same logic is now at play in the U.S.Taiwanese relationship. After cross-strait tensions flared in the 1990s and the first decade of this century, U.S. officials grew concerned that their ambiguous support for Taiwan might expose them to the risk of entrapment. So the Bush administration adjusted its policy, clarifying that its goal was to not only deter China from an unprovoked attack but also deter Taiwan from unilateral moves toward independence. For many advocates of retrenchment, the problem is that the mere possession of globe-girdling military capabilities supposedly inflates policymakers' conception of the national interest, so much so that every foreign problem begins to look like America's to solve. Critics also argue that the country's military superiority causes it to seek total solutions to security problems, as in Afghanistan and Iraq, that could be dealt with in less costly ways. Only a country that possessed such awesome military power and faced no serious geopolitical rival would fail to be satisfied with partial fixes, such as containment, and instead embark on wild schemes of democracy building, the argument goes. Furthermore, they contend, the United States' outsized military creates a sense of obligation to do something with it even when no U.S. interests are at stake. As Madeleine Albright, then the U.S. ambassador to the UN, famously asked Colin Powell, then chairman of the Joint Chiefs of Staff, when debating intervention in Bosnia in 1993, "What's the point of having this superb military you're always talking about if we can't use it?" If the U.S. military scrapped its forces and shuttered its bases, then the country would no doubt eliminate the risk of entering needless wars, having tied itself to the mast like Ulysses. But if it instead merely moved its forces over the horizon, as is more commonly proposed by advocates of retrenchment, whatever temptations there were to intervene would not disappear. The bigger problem with the idea that a forward posture distorts conceptions of the national interest, however, is that it rests on just one case: Iraq. That war is an outlier in terms of both its high costs (it accounts for some two-thirds of the casualties and budget costs of all U.S. wars since 1990) and the degree to which the United States shouldered them alone. In the Persian Gulf War and the interventions in Bosnia, Kosovo, Afghanistan, and Libya, U.S. allies bore more of the burden, controlling for the size of their economies and populations. Besides , the Iraq war was not an inevitable consequence of pursuing the United States' existing grand strategy; many scholars and policymakers who prefer an engaged America strongly opposed the war . Likewise, continuing the current grand strategy in no way condemns the United States to more wars like it. Consider how the country, after it lost in Vietnam, waged the rest of the Cold War with proxies and highly limited interventions. Iraq has generated a similar reluctance to undertake large expeditionary operations--what the political scientist John Mueller has dubbed "the Iraq syndrome." Those contending that the United States' grand strategy ineluctably leads the country into temptation need to present much more evidence before their case can be convincing. KEEPING THE PEACE Of course, even if it is true that the costs of deep engagement fall far below what advocates of The most obvious benefit of the current strategy is that it reduces the risk of a dangerous conflict. The United States' security commitments deter states with aspirations to regional hegemony from contemplating expansion and dissuade U.S. partners from trying to solve security problems on their own in ways that would end up threatening other states. Skeptics discount this benefit by arguing that U.S. security guarantees aren't necessary to prevent dangerous rivalries from erupting. They maintain that the high costs of territorial conquest and the many tools countries can use to signal their benign intentions are enough to prevent conflict. In other words, major powers could peacefully manage regional multipolarity without the American pacifier. But that outlook is too sanguine . If Washington got out of East Asia, Japan and South Korea would likely expand their military capabilities and go nuclear , which could provoke a destabilizing reaction from China . It's worth noting that during the Cold War, both South Korea and Taiwan tried to obtain nuclear weapons; the only thing that stopped them was the United States, which used its security commitments to restrain their nuclear temptations. Similarly, retrenchment claim, they would not be worth bearing unless they yielded greater benefits. In fact, they do. were the U nited S tates to leave the Middle East , the countries currently backed by Washington--notably, Israel , Egypt , and Saudi Arabia --might act in ways that would intensify the region's security dilemmas. There would even be reason to worry about Europe . Although it's hard to imagine the return of great-power military competition in a post-American Europe, it's not difficult to foresee governments there refusing to pay the budgetary costs of higher military outlays and the political costs of increasing EU defense cooperation. The result might be a continent incapable of securing itself from threats on its periphery, unable to join foreign interventions on which U.S. leaders might want European help, and vulnerable to the influence of outside rising powers. Given how easily a U.S. withdrawal from key regions could lead to dangerous competition, advocates of retrenchment tend to put forth another argument: that such rivalries wouldn't actually hurt the United States. To be sure, few doubt that the United States could survive the return of conflict among powers in Asia or the Middle East--but at what cost? Were states in one or both of these regions to start competing against one another, they would likely boost their military budgets , arm client states , and perhaps even start regional proxy wars, all of which should concern the United States, in part because its lead in military capabilities would narrow. Greater regional insecurity could also produce cascades of nuclear proliferation as powers such as Egypt, Saudi Arabia, Japan, South Korea, and Taiwan built nuclear forces of their own. Those countries' regional competitors might then also seek nuclear arsenals. Although nuclear deterrence can promote stability between two states with the kinds of nuclear forces that the Soviet Union and the United States possessed, things get shakier when there are multiple nuclear rivals with less robust arsenals . As the number of nuclear powers increases, the probability of illicit transfers , irrational decisions , accidents , and unforeseen crises goes up. The case for abandoning the United States' global role misses the underlying security logic of the current approach. By reassuring allies and actively managing regional relations, Washington dampens competition in the world’s key areas, thereby preventing the emergence of a hothouse in which countries would grow new military capabilities. For proof that this strategy is working, one need look no further than the defense budgets of the current great powers: on average , since 1991 they have kept their military expenditures as A percentage of GDP to historic lows , and they have not attempted to match the United States' top-end military capabilities. Moreover, all of the world's most modern militaries are U.S. allies, and the United States' military lead over its potential rivals is by many measures growing . On top of all this, the current grand strategy acts as a hedge against the emergence regional hegemons. Some supporters of retrenchment argue that the U.S. military should keep its forces over the horizon and pass the buck to local powers to do the dangerous work of counterbalancing rising regional powers. Washington, they contend, should deploy forces abroad only when a truly credible contender for regional hegemony arises, as in the cases of Germany and Japan during World War II and the Soviet Union during the Cold War. Yet there is already a potential contender for regional hegemony-- China --and to balance it, the United States will need to maintain its key alliances in Asia and the military capacity to intervene there. The implication is that the United States should get out of Afghanistan and Iraq, reduce its military presence in Europe, and pivot to Asia. Yet that is exactly what the Obama administration is doing. Preoccupied with security issues, critics of the current grand strategy miss one of its most important benefits: sustaining an open global economy and a favorable place for the United States within it. To be sure, the sheer size of its output would guarantee the United States a major role in the global economy whatever grand strategy it adopted. Yet the country's military dominance undergirds its economic leadership . In addition to protecting the world economy from instability, its military commitments and naval superiority help secure the sealanes and other shipping corridors that allow trade to flow freely and cheaply. Were the U nited S tates to pull back from the world, the task of securing the global commons would get much harder. Washington would have less leverage with which it could convince countries to cooperate on economic matters and less access to the military bases throughout the world needed to keep the seas open. A global role also lets the United States structure the world economy in ways that serve its particular economic interests. During the Cold War, Washington used its overseas security commitments to get allies to embrace the economic policies it preferred--convincing West Germany in the 1960s, for example, to take costly steps to support the U.S. dollar as a reserve currency. U.S. defense agreements work the same way today. For example, when negotiating the 2011 free-trade agreement with South Korea, U.S. officials took advantage of Seoul's desire to use the agreement as a means of tightening its security relations with Washington. As one diplomat explained to us privately, "We asked for changes in labor and environment clauses, in auto clauses, and the Koreans took it all." Why? Because they feared a failed agreement would be "a setback to the political and security relationship." More broadly, the United States wields its security leverage to shape the overall structure of the global economy . Much of what the United States wants from the economic order is more of the same: for instance, it likes the current structure of the World Trade Organization and the International Monetary Fund and prefers that free trade continue. Washington wins when U.S. allies favor this status quo , and one reason they are inclined to support the existing system is because they value their military alliances. Japan, to name one example, has shown interest in the Trans-Pacific Partnership, the Obama administration's most important free-trade initiative in the region, less because its economic interests compel it to do so than because Prime Minister Yoshihiko Noda believes that his support will strengthen Japan's security ties with the United States. The United States' geopolitical dominance also helps keep the U.S. dollar in place as the world's reserve currency, which confers enormous benefits on the country, such as a greater ability to borrow money. This is perhaps clearest with Europe: the EU'S dependence on the United States for its security precludes the EU from having the kind of political leverage to support the euro that the United States has with the dollar. As with other aspects of the global economy, the United States does not provide its leadership for free: it extracts disproportionate gains. Shirking that responsibility would place those benefits at risk. CREATING COOPERATION What goes for the global economy goes for other forms of international cooperation . Here, too, order to counter transnational threats , such as terrorism , piracy , organized crime , climate change , and pandemics , states have to work together and take collective action. But cooperation does not come about effortlessly, especially when national interests diverge. The United States' military efforts to promote stability and its broader leadership make it easier for Washington to launch joint initiatives and shape them in ways that reflect U.S. interests. After all, cooperation is hard to come by in regions where chaos reigns, and it flourishes where leaders can anticipate lasting stability . U.S. alliances are about security first, but they also provide the political framework and channels of communication for cooperation on nonmilitary issues . NATO, for example, has spawned new institutions, such as the Atlantic Council, a think tank, that make it easier for Americans and Europeans to talk to one another and do business. Likewise, consultations with allies in East Asia spill over into other policy issues; for example, when American diplomats travel to Seoul to manage the military alliance, they also end up discussing the Trans-Pacific Partnership. Thanks to conduits such as this, the United States can use bargaining chips in one issue area to make progress in others. The benefits of these communication channels are especially pronounced when it comes to fighting the kinds of threats that require new forms of cooperation, such as terrorism and pandemics. With its alliance system in place, the United States is in a stronger position than it would otherwise be to advance cooperation and share burdens. For example, the intelligence-sharing network within NATO, which was originally designed to gather information on the Soviet Union, has been adapted to deal with terrorism. Similarly, after a tsunami in the Indian Ocean devastated surrounding countries in 2004, Washington had a much easier time orchestrating a fast humanitarian response with Australia, India, and Japan, since their militaries were already comfortable working with one another. The operation did wonders for the United States' image in the region. The United States' global role also has the more direct effect of facilitating the bargains among governments that get cooperation going in the first place. American leadership benefits many countries but disproportionately helps the United States. In As the scholar Joseph Nye has written, "The American military role in deterring threats to allies, or of assuring access to a crucial resource such as oil in the Persian Gulf, means that the provision of protective force can be used in bargaining situations. Sometimes the linkage may be direct; more often it is a factor not mentioned openly but present in the back of statesmen's minds." THE DEVIL WE KNOW Should America come home? For many prominent scholars of international relations, the answer is yes--a view that seems even wiser in the wake of the disaster in Iraq and the Great Recession. Yet their arguments simply don't hold up. There is little evidence that the United States would save much money switching to a smaller global posture. Nor is the current strategy self-defeating : it has not provoked the formation of counterbalancing coalitions or caused the country to spend itself into economic decline. Nor will it condemn the United States to foolhardy wars in the future. What the strategy does do is help prevent the outbreak of conflict in the world's most important regions, keep the global economy humming , and make international cooperation easier . Charting a different course would threaten all these benefits. This is not to say that the United States' current foreign policy can't be adapted to new circumstances and challenges. Washington does not need to retain every commitment at all costs, and there is nothing wrong with rejiggering its strategy in response to new opportunities or setbacks. That is what the Nixon administration did by winding down the Vietnam War and increasing the United States' reliance on regional partners to contain Soviet power, and it is what the Obama administration has been doing after the Iraq war by pivoting to Asia. These episodes of rebalancing belie the argument that a powerful and internationally engaged America cannot tailor its policies to a changing world. A grand strategy of actively managing global security and promoting the liberal economic order has served the United States exceptionally well for the past six decades , and there is no reason to give it up now. The country's globe-spanning posture is the devil we know, and a world with a disengaged America is the devil we don't know . Were American leaders to choose retrenchment, they would in essence be running a massive experiment to test how the world would work without an engaged and liberal leading power. The results could well be disastrous. FBI Federal prohibition creates a shortage of cyber-security workers Aliya Sternstein 14, Next Gov Senior Correspondent, FEDERAL CYBER HIRING COULD TAKE A HIT UNDER MARIJUANA MANDATE, March 14, http://www.nextgov.com/cybersecurity/2014/03/federal-cyberhiring-could-take-hit-under-marijuana-mandate/80527/, accessed 8/7/14]jap The Obama administration’s policy to uphold a ban on federal employees smoking pot -- even where recreational marijuana is now legal under state law -- could snuff out efforts to hire nonconventional but trusted hackers to search for holes in government computer systems. Many of the best of these white hats known as “ethical hackers” tend to shy away from the establishment. "It is only recently that I started hearing that this state ban would be a challenge to hiring ethical hackers," said Kathleen Smith, chief management officer at ClearedJobs.Net, an online forum for cleared security professionals that also hosts job fairs. "The managers are having a difficult time with balancing between what an employee can do based on state law -- and what they are banned from doing based on federal law, especially with regards to cleared work and their security clearance." A July 2013 blog post on state marijuana laws that appeared on ClearedJobs.Net was the second most popular story on the site last year. It read: “Those of you with (or planning to obtain) security clearances who have an interest in adding marijuana use to your recreational pastime may think, ‘Great! If I’m ever in Colorado or Washington State, I can smoke pot without any ramifications!’ Unfortunately, you are wrong!” Colorado on New Year's Day became the first state to allow the use of marijuana for leisure, and Washington will follow this summer. The federal government effectively criminalized marijuana in 1937. Now the feds say they will look Marijuana is illegal under federal law and the rules prohibiting federal employees from using it still apply, regardless of state laws,” a Justice Department spokesperson told Nextgov's sister publication Government Executive. Officials already had announced that federal employees are barred from inhaling while working in Colorado or anywhere else where cannabis is legal . Undergraduate code crackers – in high demand nationwide -- are seeing that some freedoms granted to their neighbors will not apply to them if they join public service. "When I'm talking to college kids, I tell people: 'You are going to have to think about how you are going to change your life to do this,'" Smith said. A December 2013 letter to Obama administration officials from the information security trade group (ISC)2 said 61 percent of federal employees surveyed "believe that their agency has too few information security workers to manage threats now, let alone in the future, yet information security positions are going unfilled." Federal employers might be able to entice nonconventional computer whizzes with stimulants the other way in states that legalize dope, unless they see drugged driving, distribution to minors or certain other infractions. Or, unless those rolling a joint work for them. “ instead of hallucinogens, Smith said. "What I found with people who like doing cleared work and working for the government is they like to work on the really cool stuff," said Smith, whose clients include security cleared professionals in the federal government and private sector. "The price to work on the really cool stuff might be: Some of the recreational drug use I can't do any longer." Legalization is key to recruiting Sam Tracy 14, Chairman of Students for Sensible Drug Policy, “The FBI Isn't Updating Its Drug-Related Hiring Policies, But It Should Be,” 5-27-14, http://www.huffingtonpost.com/sam-tracy/the-fbi-isnt-updatingits_b_5394775.html?utm_hp_ref=tw, DOA: 8-13-14, y2k Last week, the Internet erupted in praise, skepticism, and played-out puns following reports that the FBI was reconsidering its hiring restrictions on marijuana use. FBI Director James B. Comey said Monday that the agency was "grappling with the question right now" as the country changed its approach to marijuana, but backpedaled two days later, declaring at a Senate hearing, "I am absolutely dead set against using marijuana... I did not say I'm going to change that ban." It's a shame -- to stay as effective as possible, the FBI would do well to become more flexible on prospective employees' marijuana use. The supposed potential change was a reaction to the agency's troubles recruiting hackers to fight cybercrime amid growing threats from China and elsewhere. Comey, playing up stereotypes while stating a valid concern, went so far to say, "I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview." Meanwhile, the FBI's policies state that job applicants can't have used marijuana within the past three years, any other illegal drug in the past 10, or ever sold or transported any illegal drug. It is certainly true that many talented young hackers use marijuana . 14 percent of 18-29 year olds told the latest Gallup poll they were current marijuana users, and 36 percent reported trying it at some point in their lives -- and hackers are one of many subcultures well-known for their cannabis use. The cream of the crop is even more susceptible to disqualification: a number of studies have found smart people are more likely to experiment with drugs than their less-intelligent peers. But a policy change wouldn't just affect young hackers who use marijuana recreationally. The FBI employs over 35,000 people, from hackers to secretaries to spies to janitors. When a young hacker who enjoys marijuana is turned away from an FBI job for her past-time, she can probably find a better-paying, drug-test-free job at Google, Microsoft, or one of the countless startups hoping to be listed along with those giants one day. But a medical marijuana patient in one of the 21 states (and the nation's capital) where it's legal may A majority of Americans live in states where it's legal to use marijuana for medical purposes, and millions of adults who live in (or vacation to) Colorado can already use it like they do alcohol or tobacco. Yet the federal government's unwillingness to update its approach to marijuana precludes countless otherwise law-abiding citizens from serving our country in agencies like the FBI or CIA. This already-nonsensical policy is all the more ridiculous when you consider our last three presidents -- each the ultimate head of the FBI -- has admitted to past illegal drug use. If having used cocaine doesn't disqualify one from being Commander in Chief, why should it take you out of the running to be an entrylevel security analyst? The FBI could greatly expand its applicant pool, thus increasing the quality of its hires, if it simply threw out the rules barring past drug use and focused instead on preventing on-the-job impairment. They've already eased up on their restrictions before: no one who used not have as many options, and current FBI employees who could benefit from its use may turn to more risky treatment alternatives in order to keep their jobs. marijuana more than 15 times could be hired before the FBI changed to its current policies in 2007. What drugs someone chooses to use has nothing to do with their trustworthiness or love of country, and we'd all do well to stop pretending it does. New recruits are key to FBI cyber-operations---solves espionage and grid attacks Richard P. Quinn 14, National Security Assistant Special Agent in Charge, Philadelphia Field Office, Federal Bureau of Investigation “Statement Before the House Homeland Security Committee, Subcommittee on Cyber Security, Infrastructure Protection, and Security Technologies,” 4-16-14, http://www.fbi.gov/news/testimony/thefbis-role-in-cyber-security, DOA: 8-13-14, y2k FBI is a threat-focused, intelligence-driven organization. Each employee of the FBI understands that to mitigate the key threats facing our adversaries continue to evolve, so, too, must the FBI. We live in a time of acute and persistent terrorist, state-sponsored, and criminal threats to our national security, our economy, and our communities. Today’s nation, we must constantly strive to be more efficient and more effective. Just as our These diverse threats facing our nation and our neighborhoods underscore the complexity and breadth of the FBI’s mission. We remain focused on defending the United States against terrorism, foreign intelligence, and cyber threats; upholding and enforcing the criminal laws of the United States; protecting civil rights and civil liberties; and providing leadership and criminal justice We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us. They may seek to strike our critical infrastructure and our economy. Given the scope of the cyber threat, agencies across the federal government are making cyber security a top priority. Within the FBI, we are prioritizing high-level intrusions—the biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks, rather than simply react after the fact. FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources and wiretaps, surveillance, and forensics—to fight cyber crime. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF). services to federal, state, local, and international agencies and partners. The Cyber Threat and FBI Response Through our 24-hour cyber command center, CyWatch, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI We also work with the private sector through partnerships such as the we are training our state and local counterparts to triage local cyber matters, so that we can focus on national security issues. In addition, our legal attaché offices overseas work to coordinate field offices and legal attachés, and the private sector in the event of a cyber intrusion. Domestic Security Alliance Council, InfraGard, and the National Cyber Forensics and Training Alliance. And cyber investigations and address jurisdictional hurdles and differences in the law from country to country. We are supporting partners at Interpol and The Hague as they work to establish to be successful in the fight against cyber crime, we must continue to recruit, develop, and retain a highly skilled workforce. To that end, we have developed a number of creative staffing programs and collaborative private industry partnerships to ensure that over the long term we remain focused on international cyber crime centers. We continue to assess other locations to ensure that our cyber personnel are in the most appropriate locations across the globe We know that our most vital resource—our people. As the committee is well aware, the frequency and impact of cyber attacks on our nation’s private sector and government networks have increased the FBI has seen an 82 percent increase in the number of computer intrusion investigations. Recent Successes While the FBI and our partners have had multiple recent investigative successes against the threat, we are continuing to push ourselves to respond more rapidly and prevent attacks before they occur. One area in which we recently have had great success with our overseas partners is in targeting infrastructure we believe has been used in distributed denial of service (DDoS) attacks, and preventing that infrastructure from being used for future attacks . A DDoS attack is an attack on a computer system or network that causes a loss of service to users, typically dramatically in the past decade, and are expected to continue to grow. Since 2002, the loss of network connectivity and services by consuming the bandwidth of the victim network. Since October 2012, the FBI and the Department of Homeland Security (DHS) have released nearly 168,000 Internet Protocol addresses of computers that were believed to be infected with DDoS malware. We have released this information through Joint Indicator Bulletins (JIBs) to more than 130 countries via DHS’s National Cybersecurity and Communications Integration Center (NCCIC), where our liaisons provide expert and technical advice for increased coordination and These actions have enabled our foreign partners to take action and reduced the effectiveness of the botnets and the DDoS attacks. We are continuing to target botnets through this strategy and others. In April 2013, the FBI Cyber Division initiated an collaboration, as well as to our legal attachés overseas. aggressive approach to disrupt and dismantle the most significant botnets threatening the economy and national security of the United States. This initiative, named Operation Clean Slate, is the FBI’s broad campaign to implement appropriate threat neutralization actions through collaboration with the private sector, DHS, and other United States government partners, as well as our foreign partners. This includes law enforcement action against those responsible for the creation and use of the illegal botnets, mitigation of the botnet itself, assistance to victims, public service announcements, and long-term efforts to improve awareness of the botnet threat through community outreach. Although each botnet is unique, Operation Clean Slate’s strategic approach to this significant threat ensures a comprehensive neutralization strategy, incorporating a unified public/private response and a whole-of-government approach to protect U.S. interests. The impact botnets has been significant. Botnets have caused over $113 billion in losses globally, with approximately 378 million computers infected each year, equaling more than one million victims per Operation Clean Slate has resulted in several successes. Working with our partners, we disrupted the Citadel Botnet. This botnet was designed to facilitate unauthorized access to computers of individuals and financial institutions to steal online banking credentials, credit card day, translating to 12 victims per second. To date, information, and other personally identifiable information. Citadel was responsible for the loss of over a half billion dollars. As a result of our actions, more than 1,000 Citadel domains were Building on the success of the disruption of Citadel, in December 2013, the FBI and Europol, together with Microsoft and other industry partners, disrupted the ZeroAccess Botnet. ZeroAccess was responsible for infecting more than two million computers, specifically targeting search results on Google, Bing, and Yahoo search engines, and is estimated to have cost online advertisers $2.7 million each month. In January 2014, Aleksandry Andreevich Panin, a Russian national, pled guilty to conspiracy to commit wire and bank fraud for his role as the primary developer and distributor of the malicious software known as Spyeye, which infected more than 1.4 million computers in the United States and abroad. Based on information received from the financial services industry, seized, accounting for more than 11 million victim computers worldwide. In addition, working with foreign law enforcement, we arrested a major user of the malware. more than 10,000 bank accounts had been compromised by Spyeye infections in 2013 alone. Panin’s co-conspirator, Hamza Bendelladj, an Algerian national who helped Panin develop and The need to prevent attacks is a key reason the FBI has redoubled our efforts to strengthen our cyber capabilities while protecting privacy, confidentiality, and civil liberties. The FBI’s Next Generation Cyber Initiative, which we launched in 2012, entails a wide range of measures, including focusing the Cyber Division on intrusions into distribute the malware, was also arrested in January 2013 in Bangkok, Thailand. Next Generation Cyber Initiative computers and networks—as opposed to crimes committed with a computer as a modality; establishing Cyber Task Forces in each of our 56 field offices to conduct cyber intrusion investigations and respond to significant cyber incidents; hiring additional computer scientists to assist with technical investigations in the field; and expanding partnerships and collaboration at the NCIJTF. FBI key---other actors fail Gordon M. Snow 11, Assistant Director, Cyber Division Federal Bureau of Investigation, Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, April 12, 2011, http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism, DOA: 813-14, y2k As both an intelligence and law enforcement agency, the FBI can address every facet of a cyber case—from collecting intelligence on the subjects in order to learn more about their networks to dismantling those networks and prosecuting the individual perpetrators. The ability to take action on the information we collect is critical because what may begin as a criminal investigation may become a national security threat. In addition, the FBI’s presence in legal attachés in 61 cities around the world assists in the critical exchange of case-related information and the situational awareness of current threats, helping to combat the global scale and scope of cyber breaches. The FBI is also changing to adapt to the ever-evolving technology and schemes used by cyber criminals. Intelligence now drives operations in the FBI. The Bureau is working in new ways with long-standing and new partners to address the cybersecurity threat. Cyber Threats Against the Private Sector Cyber criminal threats to the U.S. result in significant economic losses. But the threat against financial institutions is only part of the problem. Also of serious concern are threats to critical infrastructure, the theft of intellectual property, and supply chain issues. Cyber Threats to U.S. Critical Infrastructure U.S. critical infrastructure faces a growing cyber threat due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of our critical infrastructures provides more cyber access points for adversaries to exploit. New “smart grid” and “smart home” products, designed to provide remote communication and control of devices in our homes, businesses, and critical infrastructures, must be developed and implemented in ways that will also provide protection from Industrial control systems, which operate are at elevated risk of cyber exploitation unauthorized use. Otherwise, each new device could become a doorway into our systems for adversaries to use for their own purposes. the physical processes of the nation’s pipelines, railroads, and other critical infrastructures, . The FBI is concerned about the proliferation of malicious techniques that could degrade, disrupt, or destroy critical infrastructure. Although likely only advanced threat actors are currently capable of employing these techniques, as we have seen with other malicious software tools, these capabilities will eventually be within reach of all threat actors. Intellectual Property Theft and Supply Chain Risks Intellectual property rights violations, including theft of trade secrets, digital piracy, and trafficking counterfeit goods, also represent high cyber criminal threats, result ing in losses of billions of dollars in profits annually. These threats also pose significant risk to U.S. public health and safety via counterfeit pharmaceuticals, electrical components, aircraft parts, and automobile parts. Cyber crime that manipulates the supply chain could pose a threat to national security interests and U.S. consumers. Poorly manufactured computer chips or chips that have been salvaged and repackaged infringe on intellectual property rights and could fail at critical times, posing a serious health and safety threat to U.S. citizens. Malware could be embedded on the chips to exfiltrate information from computers and result in the theft of personally identifiable information (PII) that could then be used in future cyber crimes. As the quality of counterfeit goods increases, U.S. consumers may be challenged to tell the difference between authentic and fraudulent goods. Operation Cisco Raider is a joint initiative between the U.S. and Canada that targets the illegal distribution of counterfeit network hardware manufactured by private entities in China. The use of counterfeit network components can lead to exploitation of cyber infrastructure vulnerabilities and even network failure. Since 2006, Operation Cisco Raider has seized over 3,500 network components amounting to $3.5 million of Cisco retail products. Ten individuals have been convicted as a result of the joint initiative. The Booming Business of Botnets Botnets are networks of compromised computers controlled remotely by an attacker. Criminals use botnets to facilitate online schemes that steal funds or data, to anonymize online activities, and to deny access by others to online resources. The botnets run by criminals could be used by cyber terrorists or nation states to steal sensitive data, raise funds, limit attribution of cyber attacks, or disrupt access to critical national infrastructure. Today’s botnets are often modular and can add or change functionality using internal update mechanisms. Today’s cyber criminals are business savvy. These criminals are building businesses based on the development, management, and sale of botnets. These criminal groups have programmers who write the malicious software, salespeople who sell the code or lease out botnet services, and, in some instances, dedicated support personnel. These criminals are working to make botnets easier to deploy and more difficult to detect. Successful botnet development and operations use techniques similar to legitimate businesses, including the involvement of personnel with various specialties, feature-based pricing structures, modularization, and software copy protection. The development and sale of kit-based botnets has made it easier for criminals with limited technical expertise to build and maintain effective botnets. Botnet development and management is approached in a business-like fashion. Some criminals rent or sell their botnets or operate them as a specialized portion of an ad hoc criminal organization. At least one botnet kit author implemented a copy protection scheme, similar to major commercial software releases, which attempts to limit unauthorized use of the botnet kit. Botnets that specialize in data exfiltration are able to capture the contents of encrypted webpages and modify them in real time. When properly configured, criminals can ask additional questions at login or modify the data displayed on the screen to conceal ongoing criminal activity. Criminals purchase the base kits for a few thousand dollars and can pay for additional features to better target specific webservices. The “Not for Profit” Cyber Criminal Hacktivist groups such as Anonymous undertake protests and commit computer crimes as a collective unit. Anonymous does not have a leader or a controlling party, but instead relies on the collective power of individual participants. Its members utilize the Internet to communicate, advertise, and coordinate their actions. Anonymous has initiated multiple criminal Distributed Denial of Service attacks against the Recording Industry Association of America, the Motion Picture Association of America, the Church of Scientology, and various businesses in support of WikiLeaks. Just last month, Anonymous hacked into the website of a U.S. security firm with U.S. government contracts and stole approximately 72,000 e-mails from the company and posted them online. This attack was in response to the claim that a researcher at the company had identified key members of Anonymous. Financial Estimates of Damages Cyber criminals are forming private, trusted, and organized groups to conduct cyber crime. The adoption of specialized skill sets and professionalized business practices by these criminals is steadily increasing the complexity of cyber crime by providing actors of all technical abilities with the necessary tools and resources to conduct cyber crime. Not only are criminals advancing their abilities to attack a system remotely, but they are becoming adept at tricking victims into compromising their own systems. Once a system is compromised, cyber criminals will use their accesses to obtain PII, which includes online banking/brokerage account credentials and credit card numbers of individuals and businesses that can be used for financial gain. As cyber crime groups increasingly recruit experienced actors and pool resources and knowledge, they advance their ability to be successful in crimes against more profitable targets and will learn the skills necessary to evade the security industry and law enforcement. The potential economic consequences are severe. The sting of a cyber crime is not felt equally across the board. A small company may not be able to survive even one significant cyber attack. On the other hand, companies may not even realize that they have been victimized by cyber criminals until weeks, maybe even months later. Victim companies range in size and industry. Often, businesses are unable to recoup their losses, and it may be impossible to estimate their damage. Many companies prefer not to disclose that their systems have been compromised, so they absorb the loss, making it impossible to accurately calculate damages. As a result of the inability to define and calculate losses, the best that the government and private sector can offer are estimates. Over the past five years, estimates of the costs of cyber crime to the U.S. economy have ranged from millions to hundreds of billions. A 2010 study conducted by the Ponemon Institute estimated that the median annual cost of cyber crime to an individual victim organization ranges from $1 million to $52 million. According to a 2011 publication released by Javelin Strategy and Research, the annual cost of identity theft is $37 billion. This includes all forms of identity theft, not just cyber means. The Internet Crime Complaint Center (IC3), which aggregates self-reported complaints of cyber crime, reports that in 2010, identity our cyber adversaries’ capabilities are at an all-time high, combating this challenge is a top priority of the FBI and the entire government. Thanks to Congress and the administration, we are devoting significant resources to this threat. Our partnerships within industry, academia, and across all of government have also led to a dramatic improvement in our ability to combat this threat. The FBI’s statutory authority, expertise, and ability to combine resources across multiple programs make it uniquely situated to investigate, collect, and disseminate intelligence about and counter cyber threats from criminals, nation-states, and terrorists. The FBI is a substantial component of the Comprehensive National Cybersecurity Initiative (CNCI), the interagency strategy to protect our digital infrastructure as a national security priority. Through the CNCI, we and our partners collaborate to collect intelligence, gain visibility on our adversaries, and facilitate dissemination of critical information to decision makers. The FBI has cyber squads in each of our 56 field offices , with more than 1,000 advanced cyber-trained FBI agents, analysts, and forensic examiners. We have increased the capabilities of our employees by selectively seeking candidates with technical skills and enhancing our cyber training. In addition, as part of the FBI’s overall transformation to an intelligence-driven organization, the Cyber Division has implemented Threat Focus Cells, which bring together subject matter experts from various agencies to collaborate and address specific identified theft schemes made up 9.8 percent of all cyber crime. Addressing the Threat Although cyber threats. Cyber-threat is high Jordain Carney 14, Staff @ National Journal, “Defense Leaders Say Cyber is Top Terror Threat,” 1-6-14, http://www.nationaljournal.com/defense/defense-leaders-say-cyber-is-top-terror-threat-20140106, DOA: 8-13-14, y2k Defense officials see cyberattacks as the greatest threat to U.S. national security, according to a survey released Monday. Forty-five percent of respondents to the Defense News Leadership Poll named a cyberattack as the single greatest threat—nearly 20 percentage points above terrorism, which ranked second. The Defense News Leadership Poll, underwritten by United Technologies, surveyed 352 Defense News subscribe rs, based on job seniority, between Nov. 14 and Nov. 28, 2013. The poll targeted senior employees within the White House, Pentagon, Congress, and the defense industry. "The magnitude of the cyber problem, combined with declining budgets, will challenge the nation for years to come," said Vago Muradian, the editor of Defense News. It's not the first time cyber has ranked at or near the top of a list of security concerns. Seventy percent of Americans called a cyberattack from another country a major threat in a Pew Research Center survey released last month. Defense FBI Director James Comey, Rand Beers, the then-acting secretary for the Homeland Security Department, and Gen. Keith Alexander, director of the National Security Agency, each voiced their concerns before Congress last year. And House Intelligence Committee Chairman Mike Rogers, R-Mich., called it the "largest national security threat to the face the U.S. that we are not even close to being prepared to handle as a country." Department officials, for their part, have warned about the increasing threat. Grid attacks wipe-out the US military---causes nuclear war Robert Tilford 12, Graduate US Army Airborne School, Ft. Benning, Georgia, “Cyber attackers could shut down the electric grid for the entire east coast” 2012, http://www.examiner.com/article/cyber-attackers-could-easily-shutdown-the-electric-grid-for-the-entire-east-coa To make matters worse a cyber attack that can take out a civilian power grid, for example could also cripple the U.S. military.¶ grids that supply cities and towns, stores and gas stations, cell towers and heart monitors also power “every military base in our country.”¶ “Although bases would be prepared to weather a short power outage with backup diesel generators, within hours, not days, fuel supplies would run out”, he said.¶ Which means military command and control centers could go dark.¶ Radar systems that detect air threats to our country would shut Down completely.¶ “Communication between commanders and their troops would also go silent. And many weapons systems would be left without either fuel or electric power”, said Senator Grassley.¶ “So in a few short hours or days, the mightiest military in the world would be left scrambling to maintain base functions”, he said.¶ We contacted the Pentagon and officials confirmed the threat of a cyber attack is something very real.¶ Top national security officials—including the Chairman of the Joint Chiefs, the Director of the National Security Agency, the Secretary of Defense, and the CIA Director— have said, “preventing a cyber attack and improving the nation’s electric grids is among the most urgent priorities of our country” (source: Congressional Record). ¶ So how serious is the Pentagon taking all this?¶ Enough to start, or end a war over it, for sure.¶ A cyber attack today against the US could very well be seen as an “Act of War” and could be met with a “full scale” US military response.¶ That could include the use of “nuclear weapons”, if authorized by the President. The senator notes that is that the same power Cyber-terror causes accidental nuclear war Jason Fritz 9, Former Captain of the U.S. Army, July, Hacking Nuclear Command and Control, www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.doc The US uses the two-man rule to achieve a higher level of security in nuclear affairs. Under this rule two authorized personnel must be present and in agreement during critical stages of nuclear command and control. The President must jointly issue a launch order with the Secretary of Defense; Minuteman missile operators must agree that the launch order is valid; and on a submarine, both the commanding officer and executive officer must agree that the order to launch is valid. In the US, in order to execute a nuclear launch, an Emergency Action Message (EAM) is needed. This is a preformatted message that directs nuclear forces to execute a specific attack. The contents of an EAM change daily and consist of a complex code read by a human voice. Regular monitoring by shortwave listeners and videos posted to YouTube provide insight into how these work. These are issued from the NMCC, or in the event of destruction, from the designated hierarchy of command and control centres. Once a command centre has confirmed the EAM, using the two-man rule, the Permissive Action Link (PAL) codes are entered to arm the weapons and the message is sent out. These messages are sent in digital format via the secure Automatic Digital Network and then relayed to aircraft via singlesideband radio transmitters of the High Frequency Global Communications System, and, at least in the past, sent to nuclear capable submarines via Very Low Frequency (Greenemeier 2008, Hardisty 1985). The technical details of VLF submarine communication methods can be found online, including PC-based VLF potential “electronic back door into the US Navy’s system for broadcasting nuclear launch orders to Trident submarines” (Peterson 2004). The investigation showed that cyber terrorists could potentially infiltrate this network and insert false orders for launch. The investigation led to “elaborate new instructions for validating reception. Some reports have noted a Pentagon review, which showed a launch orders” (Blair 2003). Adding further to the concern of cyber terrorists seizing control over submarine launched nuclear missiles; The Royal Navy announced in 2008 that it would be installing a Microsoft Windows operating system on its nuclear submarines (Page 2008). The choice of operating system, apparently based on This may attract hackers and narrow the necessary reconnaissance to learning its details and potential exploits. It is unlikely that the operating system would play a direct role in the signal to launch, although this is far from certain. Knowledge of the operating system may lead to the insertion of malicious code, which could be used to Windows XP, is not as alarming as the advertising of such a system is. gain accelerating privileges, tracking, valuable information, and deception that could subsequently be used to initiate a launch. Remember from Chapter 2 that the UK’s nuclear submarines have the authority to launch if they believe the central command has been destroyed.¶ Attempts by cyber terrorists to create the illusion of a decapitating strike could also be used to engage faildeadly systems. Open source knowledge is scarce as to whether Russia continues to operate such a system. However evidence suggests that they have in the past. Perimetr, also known as Dead Hand, was an automated system set to launch a mass scale nuclear attack in the event of a decapitation strike against Soviet leadership and military.¶ In a crisis, military officials would send a coded message to the bunkers, switching on the dead hand. If nearby ground-level sensors detected a nuclear attack on Moscow, and if a break was detected in communications links with top military commanders, the system would send low-frequency signals over underground antennas to special rockets. Flying high over missile fields and other military sites, these rockets in turn would broadcast attack orders to missiles, bombers and, via radio relays, submarines at sea. Contrary to some Western beliefs, Dr. Blair says, many of Russia's nuclear-armed missiles in underground silos and on mobile launchers can be fired automatically. (Broad 1993) ¶ Assuming such a system is still active, cyber terrorists would need to create a crisis situation in order to activate Perimetr, and then fool it into believing a decapitating strike had taken place . While this is not an easy task, the information age makes it easier. Cyber reconnaissance could help locate the machine and learn its inner workings. This could be done by targeting the computers high of level official’s —anyone who has reportedly worked on such a project, or individuals involved in military operations at underground facilities, such as those reported to be located at Yamantau and Kosvinksy mountains in the central southern Urals (Rosenbaum 2007, Blair 2008) ¶ Indirect Control of Launch¶ Cyber terrorists could cause incorrect information to be transmitted, received, or displayed at nuclear command and control centres, or shut down these centres’ computer networks completely. In 1995, a Norwegian scientific sounding rocket was mistaken by Russian early warning systems as a nuclear missile launched from a US submarine. A radar operator used Krokus to notify a general on duty who decided to alert the highest levels. Kavkaz was implemented, all three chegets activated, and the countdown for a nuclear decision began. It took eight minutes before the missile was properly identified—a considerable amount of time considering the speed with which a nuclear response must be decided upon (Aftergood 2000).¶ Creating a false signal in these early warning systems would be relatively easy using computer network operations. The real difficulty would be gaining access to these systems as they are most likely on a closed network. However, if they are transmitting wirelessly, that may provide an entry point, and information gained through the internet may reveal the details, such as passwords and software, for gaining entrance to the closed network . If access was obtained, a false alarm could be followed by something like a DDoS attack, so the operators believe an attack may be imminent, yet they can no longer verify it. This could add pressure to the decision making process, and if coordinated precisely, could appear as a first round EMP burst. Terrorist groups could also attempt to launch a non-nuclear missile, such as the one used by Norway, in an attempt to fool the system. The number of states who possess such technology is far greater than the number of states who possess nuclear weapons. Obtaining them would be considerably easier, especially when enhancing operations through computer network operations. Combining traditional terrorist methods with cyber techniques opens opportunities neither could accomplish on their own. For example, radar stations might be more vulnerable to a computer attack, while satellites are more vulnerable to jamming from a laser beam, thus together they deny dual phenomenology. Mapping communications networks through cyber reconnaissance may expose weaknesses, and automated scanning devices created by more experienced hackers can be readily found on the internet. ¶ Intercepting or spoofing communications is a highly complex science. These systems are designed to protect against the world’s most powerful and well funded militaries. Yet, there are recurring gaffes, and the very nature of asymmetric warfare is to bypass complexities by finding simple loopholes. For example, commercially available software for voice-morphing could be used to capture voice commands within the command and control structure, cut these sound bytes into phonemes, and splice it back together in order to issue false voice commands (Andersen 2001, Chapter 16). Spoofing could also be used to escalate a volatile situation in the hopes of starting a nuclear war. “ [they cut off the paragraph] “In June 1998, a group of international hackers calling themselves Milw0rm hacked the web site of India’s Bhabha Atomic Research Center (BARC) and put up a spoofed web page showing a mushroom cloud and the text “If a nuclear war does start, you will be the first to scream” (Denning 1999). Hacker web-page defacements like these are often derided by critics of cyber terrorism as simply being a nuisance which causes no significant harm. However, web-page defacements are becoming more common, and they point towards alarming possibilities in subversion. During the 2007 cyber attacks against Estonia, a counterfeit letter of apology from Prime Minister Andrus Ansip was planted on his political party website (Grant 2007). This took place amid the confusion of mass DDoS attacks, real world protests, and accusations between governments. Cyber-espionage undermines missile defense and fuels global arms modernization John Reed 13, a national security reporter for Foreign Policy, “Here's How Foreign Spies Are Now Getting U.S. Weapons Tech,” 7-23-13, http://complex.foreignpolicy.com/posts/2013/07/23/heres_how_foreign_spies_are_now_getting_us_missile_tech, DOA: 8-14-14, y2k foreign spies want to acquire America's latest weapons technology, they just hack into networks and steal the digital designs. 2012 marked the the first time, overseas intelligence agencies used cyber espionage - rather than the old-fashioned kind -- as their number one way to pilfer information on U.S. weapons. That's according to a new report by one of Pentagon branches responsible for preventing such spying. Not Forget the shady middlemen; never mind the students just a little too eager to find out the particulars of engines and warheads. Today, when coincidentally, perhaps, half of all successful incidents in 2012 of espionage against American defense contractors originated in Asia, up from 43 percent the previous year. THis report cyber attacks are steadliy replacing -- or at least complementing -- attempts to flat-out purchase U.S. defense technology or simply ask for more information about it as the top MO of industrial intelligence operators. This shift from overt attempts at higlights what plenty of us have come to grasp intuitively, collecting information on U.S. weapons to cyber theft means that it may become more difficult to detect when a rival is trying to gain access to America's defense secrets. It also shows why the Obama administration has been in such a tizzy of China's alleged industrial espionage. According to the report from the Defense Security Service, these spies were particularly interested in gathering information on U.S. electronics; worldwide collection attempts in this sector spiked 94 percent from the year before. A "substantial" number of those electronics were radiation-resistant electronics that can be used in nuclear weapons, ballistic missiles, aerospace and space programs, according to the report. "Foreign entities, especially those linked to countries with mature missile programs, increasingly focuses collection efforts on U.S. missile technology, usually aimed at particular missile subsystems," reads the report. Why are nations with mature missile programs trying to steal secrets about American missile parts? To make their missiles even more deadly, of course. "After a country masters the chemistry and physics required to launch a missiles, scientists and engineers can focus on accuracy and lethality, the desired characteristics of modern missiles," the report notes. Getting their hands on U.S. missile parts will also help these countries defend against American weapons. "Reverse-engineering would probably give East Asia and the Pacific scientists and engineers a better understanding of the capabilities of the targeted and acquired technology to develop countermeasures to U.S. weapons systems," reads the document. Overall, foreign spies' top four American targets were "information systems; electronics; lasers, optics and sensors; and aeronautic systems technologies," according to the report. All of these are crucial parts of the weapons that have given the U.S. a clear advantage on battlefields for the last 20 years. Information systems are how the US military passes massive amounts of intelligence and communications data. Meanwhile optics, lasers and sensors are key technologies that help American drones spy on enemies and that guide its smart weapons onto targets. Aeronautic systems technologies, as you know, are the parts that make up the Pentagon's next-generation rockets, stealth drones and fighters -exactly the types of weapons that nations like China are trying to replicate. The report doesn't specifically call out China as the home of these spies. But let's be honest, the vast majority of espionage attempts originating from Asia are likely coming from China. "DSS continues to take the politically correct route and hide China within the ‘East Asia and Pacific' category, disappointing," Richard Bejtlich, chief security officer of the cybersecurity firm Mandiant, told Killer Apps after reading the report. The Defense Security Service document was published on July 17, two days before David Shedd, deputy director of the Defense Intelligence Agency told Killer Apps that his agency is constantly finding new attempts by foreign government to install spyware on U.S. weapon systems. (In 2011, a Senate investigation found that tons of counterfeit electronic parts made in Far East countries -targeted everything from the Standard Missiles and Ground Based Interceptors used for missile defense to TOW antitank missiles, Trident Submarine launched nuclear missiles, Tomahawk cruise missiles and Patriot anti-aircraft missiles and Harpoon anti-ship missiles. It's bad enough that U.S. China were making their way into U.S. weapons; these parts could hide spyware or ‘back doors' allowing enemies to take over or disable the weapons.) who accounted for 54 percent of the interest in American missile tech -- intelligence officials are constantly discovering new plans to insert spyware and back doors into the Defense Department's supply chain. But what may be worse is that American analysts "Our adversaries are very active in trying to introduce material into the supply chain in ways that threaten our security from the standpoint of their abilities to collect [intelligence] and disrupt" U.S. military operations, said David Shedd, deputy director of the Defense Intelligence Agency during a speech at the Aspen Security Forum in Colorado on July 19. DIA is finding more and more plots to deliver these are only discovering indirect evidence of this infiltration, according to a senior DOD intelligence official. The back doors themselves remain maddeningly hard to find. parts through front companies that are "the instrument of the hostile service that's guiding and directing them," Shedd told Killer Apps during the forum. "My concern is that our adversaries -- and they're multiple in the supply chain context -- have been very active for a very long time," David Shedd, deputy director of the Defense Intelligence Agency told Killer Apps at the Aspen Security Forum in Colorado. "We're finding things, not in the supply chain itself but plans and intentions through" front companies posing as legitimate DOD parts suppliers. This is hardly a new threat. (Yours truly has written about the epidemic of counterfeit parts poisoning DOD supply chains since 2008.) A 2011 Senate investigation discovered an unbelievable amount of fake semiconductors in brand new DOD weapons such as the Navy's P-8 Poseidon sub-killing plane and anti-ICBM missiles used by the Missile Defense Agency. Perhaps In addition to the obvious safety threat posed by say, fake aircraft bolts or wiring one of the main dangers to the supply chain is that spyware or back doors can be built into critical electronic circuits. Spyware and backdoors could allow an enemy to easily monitor U.S. operations or even disable American weapons systems. Israel is rumored to have used digital back doors planted in the software of Syrian air defenses to disable their radars during its 2007 air strike against the unsurprisingly, the vast majority of the parts were found to come from China. harnesses, Dayr as-Zawr nuclear facility. Just as scary as the fact that this kind of espionage has been going on for years, is the fact that the massive advantage the U.S. military has in hardware and manpower doesn't exist in the digital world. "As we learn more about our own cyber requirements and needs, we have a better understanding that the world is a flatter world in terms of what our adversaries can do in the supply chain," Shedd told Killer Apps. a little bit that While DOD has poured counterintelligence resources at the problem, "I sense it's insufficient" said Shedd during his speech. Global modernization causes nuclear war C.D. Haney 14, Admiral and Commander of the US Strategic Command, “Statement Before the Senate Committee on Armed Services, 2-27-14, http://www.stratcom.mil/files/2014_Posture_Statement.pdf, DOA: 8-1414, y2k The current security environment is more complex, dynamic and uncertain than at any time in recent history. Advances of significant nation state and non-state military capabilities continue across all air, sea, land, and space domains—as well as in cyberspace. This trend has the potential to adversely impact strategic stability. Nation states such as Russia and China are investing in long-term and wide-ranging military modernization programs to include extensive modernization of their strategic capabilities. Nuclear weapons ambitions and the proliferation of weapon and nuclear technologies continues, increasing risk that countries will resort to nuclear coercion in regional crises or nuclear use in future conflicts. A number of actors are improving their existing Weapons of Mass Destruction (WMD) capabilities while others are pursuing new capabilities along with the technologies to deliver deadly agents against targets of their choice. These include nations as well as non-state Violent Extremist Organizations (VEOs). Missile defense solves nuclear war and checks A2/AD capabilities Richard Weitz 13, director of the Center for Political-Military Analysis and a Senior Fellow at the Hudson Institute, “The Geopolitics of Missile Defense: Many nations already have, or are acquiring, short- and medium- range missiles. The United States is leading the efforts to negate such threats,” 4-5-13, http://thediplomat.com/2013/04/the-geopolitics-of-missile-defense/?allpages=yes, DOA: 8-14-14, y2k The United States finds itself at the heart of the international politics of missile defense. Its leading global role in developing and deploying BMD technologies and its worldwide network of alliances both empower and oblige the United States to defend much of the world from missile attack. These same alignments also provide the ties the Pentagon needs to construct a globally linked network of BMD sensors and facilities. For this reason, Washington has lobbied its friends and allies to cooperate with U.S. regional BMD initiatives as a means to strengthen mutual defense capabilities and to supplement traditional U.S. nuclear and conventional deterrence guarantees with missile defenses. The Obama administration has also used its strong investments in missile defense to reassure countries concerned by the missile defenses complement deterrence by causing potential aggressors to doubt that any attack could succeed as well as providing a hedge should deterrence fail. More than 30 countries already have, or are acquiring, short- and medium-range missiles able to deliver conventional payloads at great speed and distance. Some are trying to develop longer-range missiles that can carry warheads armed with various weapons of mass destruction (nuclear, chemical, and biological). The 2010 Ballistic Missile Defense Review (BMDR) predicts that the missile threats to the United States and its allies will grow in quantity and quality as antagonistic states increase the size and capabilities of their ballistic missiles. With respect to the latter, ballistic missile systems are becoming more flexible, mobile, reliable, survivable, accurate, and able to fly longer and farther. In principle, U.S. BMD systems make several critical contributions to U.S. security. They can: · defend the American homeland, U.S. forces and citizens located overseas, and U.S. friends and allies · deter such attacks by enhancing both the capacity and the perceived will of the defender to thwart any aggression · dissuade potential aggressors from seeking to acquire and deploy ballistic missiles or nuclear warheads by reducing their perceived value · reassure U.S. friends and allies about the U.S. will and commitment to defend them, which contributes to other U.S. goals such as dissuading them from obtaining nuclear or other destabilizing retaliatory weapons · overcome anti-access/area-denial (A2AD) and other asymmetric tactics that use missiles to try to negate U.S. conventional advantages Under both the George W. Bush and Barack Obama administrations, the United States has employed a variety of tools to address these administration’s desire to downplay the role of nuclear weapons in U.S. foreign policy. U.S. officials have persuaded most allied governments that missile threats. U.S. officials have engaged in bilateral and multilateral diplomacy in an effort to persuade North Korea and Iran to end their nuclear weapons programs and refrain from the further testing of ballistic missiles. They have also used declaratory policy by repeatedly warning these countries against developing, testing, or using these capabilities. Additionally, the United States has provided security assistance to help U.S. allies enhance their own defense capabilities. The Pentagon also bases or deploys large numbers of U.S. troops in each region, with an impressive range of conventional and unconventional capabilities, reinforced by U.S.-based assets with global reach, such as long-range strategic bombers. The United States has offered many of the United States has been constructing missile defense architectures in each region as well as globally to counter Iranian and North Korean missile threats. These include short-range missile defense systems such as PAC-3 batteries, theater defenses such as THAAD and Aegis-equipped naval vessels, and the ground-based midcourse interceptors based in Alaska and California. these countries diverse security guarantees, including implicit and sometimes explicit pledges to potentially employ U.S. nuclear capabilities to protect them. Finally, A2/AD causes Chinese expansion in the SCS Hicks et al 12, Rear Admiral Hicks, USN (Ret.), former commanding officer of the Aegis cruiser USS Cape St. George (CG 71) and former Program Director, Aegis BMD, is Vice President, Naval Surface Radars, Lockheed Martin MS2—AND—Captain Galdorisi, USN (Ret.), is director of the Corporate Strategy Group at the Space and Naval Warfare Systems Center Pacific—AND—Dr. Truver is Director, National Security Programs, Gryphon Technologies LC. He also serves on the editorial board of the Naval War College Review. “THE AEGIS BMD GLOBAL ENTERPRISE,” Naval War College Review, Summer 2012, Vol. 65, No. 3, A “High End” Maritime Partnership, DOA: 8-15-14, y2 China also is crafting an antiaccess/area-denial strategy for the western Pacific based in part on the operational-level use of ballistic missiles. As underscored recently in these pages, “China seeks the capacity to find U.S. aircraft carriers roughly a thousand miles from the mainland and to attack them with homing ASBMs (antiship Iran and North Korea are not alone in leveraging this aspect of potential ballistic- missile employment. ballistic missiles).”12 The most prominent aspect of this threat is China’s development of the world’s first “carrier killer” ballistic missile, the DF-21D. Another commentator has declared, “The The Pentagon has described China’s programme as ‘the most active land-based ballistic- and cruise-missile programme in the world.’ Missiles are good value. Compared with a fully equipped aircraft-carrier, which might cost $15 billion–20 billion, a missile costs about $1m. . . . And American strategists are closely watching an experimental anti-ship ballistic missile with a manoeuvrable warhead, which could make it hard for American fleets to approach the Chinese shore.”14 A January 2011 New York Times editorial captured the level of concern regarding China’s emerging capabilities: Beijing’s drive to extend its military and territorial reach is making America’s close allies in the region nervous and raising legitimate questions about American diplomacy and future military procurement. The commander of America’s Pacific forces recently revealed that China could soon deploy a ballistic missile capable of threatening American aircraft carriers in the region. DF-21D is the ultimate carrier-killer missile.”13 Indeed, as The Economist has pointed out, “ The Pentagon has a long history of hyping the Chinese threat to justify expensive weapons purchases, and sinking welldefended ships with ballistic missiles is notoriously hard. But what should China seems increasingly intent on challenging United States naval supremacy in the western Pacific. At the same time it is aggressively pressing its claims to disputed offshore islands in the East and South China Seas. Washington must respond, carefully but firmly. The Pentagon must accelerate efforts to make American naval forces in Asia less vulnerable to Chinese missile threats by giving them the means to project their deterrent power from further offshore.15 Some would downplay the threat posed by China and the DF-21D missile, arguing that—as a result of the “Walmart Factor” that intertwines the two economies —state-on-state conflict with China is not likely.16 However, China needs only to make rightly concern American military planners is not so much the missile but the new Chinese naval strategy behind it. the likely cost to the United States of intervening in western Pacific affairs— to counter Chinese threats against Taiwan or bullying of neighbors over disputed claims in the South China Sea—high enough to render intervention no longer a reasonable deterrent.17 Moreover, China’s increasing dependence on Mideast oil creates plausible scenarios in which it would export the DF21D to countries like Iran. Given the marginal success of ongoing nonproliferation efforts, DF-21Ds could find their way to yet other governments or even to transnational or terrorist groups with To counter the most pressing part of this spectrum of ballistic-missile threats— states already possessing WMD-armed ballistic missiles—the United States has fielded an initial national-level BMDS, integrating land, sea, air, and space elements. The first priority of the BMDS implementation strategy—establishing a limited defensive capability against North Korean ballistic missiles—has animus toward the United States, its allies, or friends. largely been achieved, with Patriot Advanced Capability–3 (PAC-3) batteries, the Ground- Based Midcourse Defense (GMD) system, the forward-deployed AN/TPY-2 radar, and Aegis BMD ships for long-range search, cueing, and engagement. Causes nuclear war over the West Philippines The Manila Times 13, citing Stratfor, “The West Philippine Sea: A nuclear flashpoint?” 11-3-13, http://www.manilatimes.net/the-west-philippine-sea-a-nuclear-flashpoint/50175/ DOA: 8-15-14, y2k The analytical piece of Stratfor on China’s grand plan to beef up its submarine-based nuclear arsenal shines new light on Beijing’s intentions in the West Philippine Sea. China has long staked a claim on the small islands, atolls and rocky outcrops that dot the West Philippine Sea (which is how the South China Sea is now referred to by Philippine officialdom). The popular perception is that the Chinese want to tap its vast oil, gas and mineral deposits and rich fishing grounds. But at least four other countries, the Philippines included, also want to partake of the West Philippine Sea’s bounty, and consider China as encroaching in their territory. The border dispute has churned up a political maelstrom that threatens to engulf the entire region. Lately, China has become more forceful in asserting its claim and has increased its naval presence in the contested zone. Last week, the New York Times reported that a general in the Chinese army has revealed that Beijing plans to set up a naval blockade around the Panatag Shoal and other disputed areas and starve out the remote outposts of rival claimants. Stratfor sees China’s aggressiveness as more than just an attempt to help itself to the West Philippine Sea’s resources. The Asian superpower wants to secure the area for its missile-equipped nuclear submarines and eventually provide the subs access to the Pacific Ocean, “to enhance its deterrent potential against other nuclear powers, especially the US, Russia and India,” according to Stratfor. A recent Reuters report puts China’s “blue-water” expansion into sharper prospective. It quoted Japanese and Western naval experts as saying Chinese shipyards “are turning out new nuclear and conventional submarines, destroyers, missile-armed patrol boats This is a disturbing development for the Philippines. It already has its hands full fending off Chinese incursions into its waters; now it faces the grim prospect of getting caught in the middle of a nuclear conflict between superpowers. China’s daring designs on the West Philippine Sea come at a time when the United States is shifting 60 percent of its naval forces to the Pacific, a move that many and surface ships at a higher rate than any other country.” interpret as Washington’s way of blunting Beijing’s seaward thrust. A key component of the US pivot is the stationing of American troops in the Philippines on a rotating basis and equipping the Armed Forces with coastal radar The US and China may be on a collision course just off our shores, unless a diplomatic balance brings about de-escalation. But Beijing has gone on a diplomatic offensive as well, trying to win over Asian facilities. With the revelation of the Chinese general, the US will no doubt include aircraft and surface vessels that could detect and destroy submarines. countries by dangling the economic carrot. For the moment, Malacanang is treading cautiously, not wanting to be drawn into a new confrontation with Beijing over the Chinese general’s pronouncement. “We won’t comment on that yet because we don’t want to automatically attribute such statement to the Chinese government. It would be better for us not to comment on that matter which is already sensitive as it is,” presidential spokesman Abigail Valte said. But expect the West Philippine Sea to continue to be a flashpoint in the years to come. Plan The United States should legalize marihuana and remove it from the Controlled Substances Act.