Case 1 Intelligence Advantage 2 1NC — Intelligence Advantage They can’t solve for spy aircrafts and battlefield sensors Irwin 12 [Sandra Irwin, “Too Much Information, Not Enough Intelligence,” National Defense, May 2012, pg. http://tinyurl.com/7ty8gl8 The Defense Department over the last decade has built up an inventory of billions of dollars worth of spy aircraft and battlefield sensors. Those systems create avalanches of data that clog military information networks and overwhelm analysts. Intelligence experts say the military is drowning in data but not able to convert that information into intelligible reports that break it down and analyze it. “The challenge for users of intelligence is that all the different types of information come in a stove-piped manner,” says Michael W. Isherwood, a defense analyst and former Air Force fighter pilot. Intelligence feeds include electronic signals, satellite imagery, moving-target data and fullmotion video. “How do you integrate this into a clear picture?” Isherwood asks. “That is one of the enduring challenges in the ISR [intelligence, surveillance and reconnaissance] arena for all the services.” The returnee threat is low Zammit 15 – Researcher @ Monash University's Global Terrorism Research Centre [Andrew Zammit (PhD candidate @ University of Melbourne)“Australian foreign fighters: Risks and responses,” Lowy Institute for International Policy, April 2015 Despite the seriousness of the threat, it does not follow that most foreign fighters attempt attacks on return. In fact, very few do. In his study of foreign fighters, Hegghammer found that only up to one in nine jihadist foreign fighters from Western countries later became involved in terror plots within the West, and that even this was likely to be an overestimate.18 Similarly, a study by Jeanine de Roy van Zuijdewijn found that only a very small portion of Western jihadist fighters returned to carry out attacks.19 This leaves governments with a seemingly paradoxical problem: most foreign fighters do not prove a threat on return, but those who do are highly dangerous and have been involved in a substantial proportion of the domestic jihadist plots in the West, including the most serious attacks such as the 2005 London bombings. This raises the question of what distinguishes the many returned foreign fighters who do not pose a domestic threat from the few who do. Pg. 4-5 No Saudi-Iran war Khashoggi 15 - US-educated Saudi journalist, columnist, author and the general manager and editor-in-chief of Al Arab News Channel [Jamal Khashoggi, “Saudi Arabia and Iran heading to war?,” Al Arabiya News, Monday, 8 June 2015, pg. http://tinyurl.com/pkajljf Saudi Arabia does not want an open confrontation with Iran, realizing the high cost of such a war. The same goes for Iran, which knows that the military budget, especially for the air force, is not in its favor. Moreover, Riyadh has alliances with a number of Arab and Islamic countries 3 willing to defend the Land of the Two Holy Mosques. Both countries have enough arms to destroy each others’ capacities. It is a binary threat and an important deterrence. Iran is a model of internal stability Saremi 15 - Strategic analyst w/ a PhD in International Relations [Dr. Fariborz Saremi, “Is Iran the Most Stable Country in Region?,” Counter Punch, January 30, 2015, pg. http://tinyurl.com/pp6pywf In the turbulent 35 years since the Islamic Republic of Iran emerged overnight following revolution in that country, the balance of power in Middle East has shifted. For much of that time Iran has been hampered by internal power struggles, the imposition of sanctions, and from ostracization due to its links with terrorism. Today, however, Iran is emerging as a model of stability given that several of its neighbors have fallen into utter turmoil. Some of them are still suffering the back-swell from the Arab Spring, while others are under severe threat from violent extremists such as ISIS. Finally, observers see a distinct possibility that Iran may move towards meaningful rapprochement with its former enemies in the west. TURN: ISIS threat will reset US-Iran relations Mohseni 14 – Director of the Iran Project @ Harvard Kennedy School’s Belfer Center for Science and International Affairs and a Fellow for Iran Studies at the Kennedy School. [Payam Mohseni, “Bad Move, ISIS: Why America and Iran Should Work Together,” The National Interest, October 6, 2014, pg. http://tinyurl.com/ph83pjx While a threat to U.S. interests, the Islamic State of Iraq and al-Sham (ISIS) presents us with a unique opportunity to “reset” the Middle East equation—to actively transform regional relations, to abate the cold war between Iran and Saudi Arabia and to forge a new working relationship with Iran. As the United States moves to escalate its war against ISIS and forge a coalition against the terrorist group, it is important that Iran be included in the process. After all, U.S. and Iranian interests have increasingly converged in the Middle East with the emergence of a common enemy, and no power in the region is better suited to taking on ISIS than Iran and its affiliated Shi’a militias in Iraq. Just as importantly, Iran will have to be a key part of any meaningful solution to regional instability and any effort to help sustain a new unity government in Iraq. By formally acknowledging the role it can play in the conflict, Iran can be guided into becoming a constructive stakeholder in a more inclusive Middle East order—a goal that has become increasingly salient as the possible success of the Iranian nuclear negotiations forebodes a transformation of the Middle East status quo and Iran’s role in the region. Despite its public statements, Iran has already signaled its willingness to cooperate on ISIS. Iran’s decision to remove its support from former Iraqi prime minister Nouri al-Maliki was not primarily driven by fear or simply a response to the grave threat posed by ISIS—as commonly perceived in the West—but rather a demonstration of its own flexibility and accommodation with regional powers. Based on my conversations with the conservative elite in Tehran during the summer, the Iranian leadership does not view ISIS as a serious threat to the country, but rather an opportunity for further empowerment—not just for Iran, but for the larger Shi’a 4 community and the “popular militias” in Iraq as they become entrenched as a consequence of the conflict. Iran’s influence and leverage in Iraq has certainly expanded with the ISIS offensive. By rapidly moving to support the Shi’a militias at the very beginning of the conflict, Iran has effectively gained the support of the Iraqi Shi’a as they have been pushed toward Iran as a source of protection. Iranian influence has also increased over the Sunni Kurds as it has helped them establish a buffer zone on its Western frontier. Iran’s decision to facilitate Maliki’s removal signals the leadership’s intent and willingness to cooperate with regional countries and the United States in search of a political solution instead. This intent is most clearly demonstrated by the prominent role played by Rear Admiral Ali Shamkhani, the chairman of Iran’s Supreme National Security Council, when he traveled to Iraq to broker an agreement on a new unity government. Shamkhani’s role is important for two reasons. First, not only is he a moderate in the Iranian political spectrum—appointed last year by President Rouhani—but he is also an Iranian of Arab origin who is believed to be held in high esteem by the Saudi King. Both his appointment and his recent visit to Iraq signal Iran’s desire to pursue rapprochement with the Saudis and abate sectarianism. Second, Shamkhani’s role demonstrates that the Iranian Revolutionary Guards work within the constitutional boundaries of the state—operating within, rather than outside, the Supreme National Security Council to discuss and negotiate Iran’s role in Iraq. This development was particularly striking, since the security files of Iraq and Syria belong to the Revolutionary Guards and the position of the Guards has only strengthened with the escalation of the ISIS conflict. By working within the Council, the Guards opened the space and possibility for greater foreign cooperation, allowing the Iranian government to influence and coordinate with the Guards based on government discussions with the Iraqis and external powers. These positive signals, however, seem to contravene Iran’s growing declarations that it will not engage U.S. efforts against ISIS. It also begs the question of why Iran would cooperate with the United States or an Arab coalition if it perceives itself to be strengthened by the conflict and if it considers ISIS to be a foreign conspiracy. Of course, it is not likely that Iran will work with the United States openly, due to the historical relations between the two countries, but it may do so within a regional framework that formalizes Iran’s role and protects its interests in the Middle East. In other words, Iran is looking at the larger picture and vision it has for the future Middle East beyond ISIS and will base its foreign policies on two driving considerations: Iran’s role in the security architecture of the region, including in Syria, and the increasing sectarian nature of conflicts and politics in the Middle East. If cooperation preserves Iran’s role in the region and diminishes sectarian strife, Iran will cooperate. For Iran to do so explicitly and publicly will depend on how it sees itself to be accepted and incorporated as part of this process—one from which it sees itself largely excluded thus far. By viewing ISIS as an opportunity to “reset” its working relation with Iran in the region, the United States can help Iran become a constructive player in the conflict and weaken the potential for it to act as a spoiler or destabilizing force. Moreover, it will allow the United States to make effective use of Iranian power and the Shi’a militias in opposing ISIS, by far the best regional means of military boots on the ground. To do so, the United States must not only clarify its own vision for the Middle East, but also, just as importantly, persuade Saudi Arabia to cooperate and work with the Iranians. Yes, engaging Iran and incorporating it as part of the 5 Middle East order will be a daunting task fraught with its own risks, particularly at a time when the nuclear negotiations are taking place. But not doing so will only further exacerbate the ongoing conflict in a direction that will be worse not only for the entire Middle East, but for U.S. interests as well. Common ground prevents war Duggan 15 – Professor of history @ Georgetown University, [Dr. Michael F. Duggan, “The Persian Elephant in the Room: Revitalizing U.S.-Iran Relations After the Iran Nuclear Deal,” Georgetown Journal of International Affairs, April 9, 2015, pg. http://tinyurl.com/ofngsf8 Deep down every specialist of the Middle East with a grounding in history knows that in dealing with Iran there are only a handful of options, and that all but one or two of them are likely to produce constructive results. The others are likely to produce little more than continued violence and instability in an already troubled region, and will do nothing to prevent Iran from achieving its nuclear goals. It is therefore mystifying as to why the United States and Israel have used rhetoric that will be impossible to back up without catastrophic consequences, and which will inflame an already difficult situation. In terms of the United States’s general treatment of Iran, it would seem that the options are fourfold. First, the United States could keep up its economic sanctions in an attempt to generate Iranian compliance under threat of further destabilizing the nation’s economy. The problem with this sort of approach—beyond the very real violence it does to civilians—is that it will do nothing to derail Iran’s nuclear program, and in fact signals the exact sort of hostility that continues to justify the desire for and pursuit of such weapons in Iranian eyes. Some Americans think that because sanctions worked in Libya (over a period of more than two decades and before a NATO air campaign), they will also work in Iran. But Gadaffi’s Libya and present-day Iran are two fundamentally different cases. Whereas Libya is a flat analog to Afghanistan, consisting of a number of mostly disunified tribes with a territorial boundary drawn around them, Iran—historical Persia—is a proud civilization with antecedents that date back to before the time of the Ancient Greeks and Israelites. Iran is more like pre-WWII Japan in the sense that its people are unlikely to knuckle under to the pressure of external sanctions and embargoes. Rather, it is quite possible that they will unify, radicalize, and eventually fight. At the very least, continued U.S. sanctions will push Iran closer to Russia. Iran’s relative social stability, its considerable natural resources, and its potential for strengthened economic ties with Russia and China will allow it to safely endure any sanctions imposed by the West. A second option for the United States is to attack Iran outright. Over the past half-decade, some American and Israeli leaders have talked openly about pursuing this course of action. Doing so, however, would embroil the United States in a war with a nation with more than twice the population of Iraq, almost four times its land area, a far more varied and difficult terrain, and a much more capable military. Considering how its military adventures in Iraq and Afghanistan have gone to date, U.S. leadership should probably err on the side of nonmilitary options vis-àvis Iran first. Attacking Iran directly would only destabilize the wider region in a way that could potentially spell the eventual end of Israel—and bankrupt the United States in the process. The third option is for the United States to contrive some way to divide and/or isolate Iran, the world’s dominant Shiite Muslim nation, from the rest of the (mostly Sunni) Islamic world. 6 However, such a divide and conquer component to a grand strategy primarily focused on economic sanctions would be completely obvious to the great majority of the world’s Muslims. Moreover, the very real and menacing conflict between Sunni and Shia in the greater Muslim world that threatens to escalate into a regional conflagration constitutes a further elephant in the room of U.S. strategic planning. Such a strategy would also run afoul of the inconvenient truth that Iranian-backed forces are currently shouldering a large portion of the ground war against ISIS in Western Iraq, and are proving to be valuable assets there. Divide and conquer strategies—using mutual hatreds to play enemies off each other—is a dirty and tricky game that can easily blow up in the faces of those who initiate them (see the civil war in Ukraine). This leaves only the fourth and most realistically promising approach to the situation: the United States could try to find common ground with Iran and bury the hatchet. After all, it is in the national interest of the United States to be on good terms with regional powers and soonto-be nuclear states, and there is a slight chance that positive relations may actually preclude the latter. Without overstating things, Iran is now thedominant regional power of Southwest Asia—and it was the United States’ removal of Iraq as a secular counterbalance that elevated Iran to this status, or at least helped cement its claim. Moreover, the nuclear genie was let out of the bottle when India, Israel, and Pakistan developed bombs of their own, and there is nothing the United States can do to reverse the process. Finally, in 2001, Iran allowed the United States passage through Iranian air space in order to launch the latter’s invasion of Afghanistan, and it is time we acknowledged this good faith accommodation with renewed talks about the general security of the region. 7 Ext Zammit 15 – No Returnee threat They will go quiet upon return Zammit 15 – Researcher @ Monash University's Global Terrorism Research Centre [Andrew Zammit (PhD candidate @ University of Melbourne)“Australian foreign fighters: Risks and responses,” Lowy Institute for International Policy, April 2015 Some research indicates that those who train with jihadist groups are more likely to pose a terrorist threat on return than those who actually fight on the frontlines. Van Zuijdewijn’s study of Western jihadist foreign fighters involved in European terror plots found that two-thirds had trained, while only one-third had actually engaged in combat. 32 A study by Jonathan GithensMazer on UK foreign fighters supports this. His research found that many jihadist combat veterans often went quiet on return or actively discouraged others from becoming involved, while some particularly dangerous returnees had not made it to the frontlines.33 There are parallels with the involvement of former US military personnel in far-right extremist groups. Research has found that they tended to have had short-lived and unsuccessful military careers, suggesting that those most likely to turn to violent extremism once back home may be those who feel they have more to prove. 34 By contrast, exposure to combat increases the likelihood of a foreign fighter becoming disillusioned or indeed being injured or killed. Pg. 6 8 Ext Serami 15 – Iran stable It has a thriving economy. No internal backlash Nair 15 – Founder and CEO of the Global Institute For Tomorrow (GIFT) [Chandran Nair, “The Futility and Immorality of Iran Sanctions,” Huffington Post, Posted: 07/09/2015 12:06 pm EDT, pg. http://tinyurl.com/nwyfrdz Contrary to what many have come to believe, U.S. sanctions on Iran are not as crippling as they are made out to be. Unlike many of its neighbors who are almost entirely dependent on oil, Iran is a diversified economy with a functioning manufacturing, agricultural and service sector, albeit inefficient due to sanctions and inadequate investments. The World Bank classifies it as an "upper middle income" country and despite sanctions Iran, with a GDP of $415.3 billion, is still the second largest economy in the Middle East and North Africa region. Average life expectancy (74 years) is almost as good as any in the developed world, and when it comes to primary school enrollment, Iran is leagues ahead of its neighbors. But, if anything, the Iranian people are resourceful and creative. They get around the problem through ingenuity and enterprise. A thriving currency market in the bazaars of Isfahan allowed me to exchange as much cash as I wanted for my travel and shopping, and sellers were happy to accept the Hong Kong dollar, renminbi and the yen. Carpet merchants, hoteliers and even taxi drivers are ever ready to swap foreign currencies for the riyal. Bank Melli Iran even issues prepaid "cash cards" that allow tourists to swipe transactions just as they would in Hong Kong or Singapore. 9 Ext Mohseni 15 – Turn: US-Iran Relations ISIS threat will force US-Iran to work together Mekhennet 14 [Souad Mekhennet, “ISIS is the best thing to happen to Iran-U.S. relations in years,” The Washington Post, June 19, 2014, pg. http://tinyurl.com/q3suo99 TEHRAN—Even here, nobody is happy about Iraq’s implosion. But Iranian officials are preparing to make the best of it. In a raft of interviews this week with government officials, a consensus has emerged: Iraq is a chance to make amends with the United States. It may even be the beginning of a beautiful friendship. Already, the question both here and in Washington is not “if” Tehran and Washington should work together to combat the advance of the Islamist insurgency ISIS, but “how.” “We are open to any constructive process here that could minimize the violence, hold Iraq together — the integrity of the country — and eliminate the presence of outside terrorist forces that are ripping it apart,” Secretary of State John Kerry said in Washington Monday. President Obama added today that “Iran can play a constructive role.” Iran is moving to cast itself as a U.S. ally in the fight against terrorism (despite its official sponsorship of Hezbollah). In meetings here over the last week, part of the Bergedorf Round Table — the session was called “Stability in the Middle East: Prospects for Cooperation between Iran and the West” — Iranian officials repeatedly said things like this: “Like the U.S. and Europe, we are fighting terrorism.” They also stressed common interests with the West. (My trip, like the conference, was sponsored by the Körber Foundation, a nonpartisan group devoted to social development.) ISIS threat fuels US-Iran cooperation Milani 14 – Professor of Politics and the Executive Director of the Center for Strategic and Diplomatic Studies @ University of South Florida [Mohsen Milani, “This is What Détente Looks Like,” Foreign Affairs, August 27, 2014, pg. http://tinyurl.com/os9l9t9 Tehran and Washington find themselves on the same side in the fight against the Islamic State of Iraq and al-Sham (ISIS), also called the Islamic State (IS), and there are already signs that they have been cooperating against the extremist group’s advance through Iraq. Although there is no guarantee that this will last for the duration of the war, such cooperation is clearly a positive step. The United States and Iran both view ISIS as a significant threat to their own interests. An ISIS stronghold near the Iranian border would be a profound and immediate security threat to Tehran. For one, the Sunni jihadists of ISIS are openly disdainful of the Shia faith, the sect of Islam that the overwhelming majority of Iranians and the majority of Iraqis adhere to. The group is already in a sectarian war in Syria and Iraq, and Tehran must assume that it eventually plans on turning its attention to Iran. Washington, for its part, has also concluded that ISIS poses a significant threat. If ISIS manages to create a safe haven in Iraq, it could use the territory to plan operations against the West, undermine Western allies in the region, and endanger oil shipments in the Persian Gulf. In the meantime, the group’s war against the Iraqi state also poses a danger to U.S. interests. Over the 10 past decade, Washington has paid a high price in blood and treasure to create a stable and relatively friendly Iraq. The collapse of that state would be a humiliating defeat. Although the United States and Iran have different visions for the future of Iraq, they share three major strategic goals there: protecting Iraq’s territorial integrity; preventing a sectarian civil war that could easily metastasize into the entire region; and defeating ISIS. There is also a precedent of tactical cooperation in Iraq between Tehran and Washington: In 2001, the two cooperated to dislodge the Taliban from Afghanistan. ISIS threat is large enough to solidify cooperation with US and solves their IranSaudi war impact Milani 14 – Professor of Politics and the Executive Director of the Center for Strategic and Diplomatic Studies @ University of South Florida [Mohsen Milani, “This is What Détente Looks Like,” Foreign Affairs, August 27, 2014, pg. http://tinyurl.com/os9l9t9 Despite these difficulties, cooperation between Washington and Tehran is likely to deepen, rather than ebb, in the weeks ahead. ISIS is a clear transnational threat that demands a transnational solution. Iran has considerable experience fighting against ISIS in Syria and Lebanon and can offer much assistance to those who seek to eradicate the threat posed by the militant group. Indeed, the fight against ISIS may even produce the previously unthinkable: cooperation between Iran and Saudi Arabia, two countries that have more or less fought an open proxy war for the past several years in Iraq, Lebanon, and Syria. Now, both countries are threatened by ISIS, which explains why Saudi Arabia openly welcomed Abadi’s nomination to become prime minister. Two weeks ago, Alaeddin Boroujerdi, chairman of the Iranian parliament’s Foreign Policy and National Security Committee, correctly stated that Iran, Saudi Arabia, and the United States are the key players in Iraq. If Washington and Tehran manage to cooperate to stabilize in Iraq, it would not only be good news for the Iraqis -- it could also pave the way for a final agreement in the ongoing nuclear negotiations. In that sense, the two countries would have truly achieved significant rapprochement, if not in the way that many observers originally anticipated. 11 Ext Duggan 15 – Iran War Impact Goes nuclear Avery, 13 --- Associate Professor, University of Copenhagen (11/6/2013, John Scales Avery, “An Attack On Iran Could Escalate Into Global Nuclear War,” http://www.countercurrents.org/avery061113.htm) Despite the willingness of Iran's new President, Hassan Rouhani to make all reasonable concessions to US demands, Israeli pressure groups in Washington continue to demand an attack on Iran. But such an attack might escalate into a global nuclear war, with catastrophic consequences. As we approach the 100th anniversary World War I, we should remember that this colossal disaster escalated uncontrollably from what was intended to be a minor conflict. There is a danger that an attack on Iran would escalate into a large-scale war in the Middle East, entirely destabilizing a region that is already deep in problems. The unstable government of Pakistan might be overthrown, and the revolutionary Pakistani government might enter the war on the side of Iran, thus introducing nuclear weapons into the conflict. Russia and China, firm allies of Iran, might also be drawn into a general war in the Middle East. Since much of the world's oil comes from the region, such a war would certainly cause the price of oil to reach unheard-of heights, with catastrophic effects on the global economy. In the dangerous situation that could potentially result from an attack on Iran, there is a risk that nuclear weapons would be used, either intentionally, or by accident or miscalculation. Recent research has shown that besides making large areas of the world uninhabitable through longlasting radioactive contamination, a nuclear war would damage global agriculture to such a extent that a global famine of previously unknown proportions would result. Thus, nuclear war is the ultimate ecological catastrophe. It could destroy human civilization and much of the biosphere. To risk such a war would be an unforgivable offense against the lives and future of all the peoples of the world, US citizens included. Iran war escalates White 11, July/August 2011 (Jeffrey—defense fellow at the Washington Institute for Near East Policy, What Would War With Iran Look Like, National Interest, p. http://www.the-americaninterest.com/article-bd.cfm?piece=982) A U.S.-Iranian war would probably not be fought by the United States and Iran alone. Each would have partners or allies, both willing and not-so-willing. Pre-conflict commitments, longstanding relationships, the course of operations and other factors would place the United States and Iran at the center of more or less structured coalitions of the marginally willing. A Western coalition could consist of the United States and most of its traditional allies (but very likely not Turkey, based on the evolution of Turkish politics) in addition to some Persian Gulf states, Jordan and perhaps Egypt, depending on where its revolution takes it. Much would depend on whether U.S. leaders could persuade others to go along, which would mean convincing them that U.S. forces could shield them from Iranian and Iranian-proxy retaliation, or at least substantially weaken its effects. Coalition warfare would present a number of challenges to the U.S. government. Overall, it would lend legitimacy to the action, but it would also 12 constrict U.S. freedom of action, perhaps by limiting the scope and intensity of military operations. There would thus be tension between the desire for a small coalition of the capable for operational and security purposes and a broader coalition that would include marginally useful allies to maximize legitimacy. The U.S. administration would probably not welcome Israeli participation. But if Israel were directly attacked by Iran or its allies, Washington would find it difficult to keep Israel out—as it did during the 1991 Gulf War. That would complicate the U.S. ability to manage its coalition, although it would not necessarily break it apart. Iranian diplomacy and information operations would seek to exploit Israeli participation to the fullest. Iran would have its own coalition. Hizballah in particular could act at Iran’s behest both by attacking Israel directly and by using its asymmetric and irregular warfare capabilities to expand the conflict and complicate the maintenance of the U.S. coalition. The escalation of the Hizballah-Israel conflict could draw in Syria and Hamas; Hamas in particular could feel compelled to respond to an Iranian request for assistance. Some or all of these satellite actors might choose to leave Iran to its fate, especially if initial U.S. strikes seemed devastating to the point of decisive. But their involvement would spread the conflict to the entire eastern Mediterranean and perhaps beyond, complicating both U.S. military operations and coalition diplomacy. Extinction Giribets 12 [Miguel Giribets, “If US Attacks Iran, Human Survival May Be at Risk (Part III),” Argen Press, 10 January 2012, pg. http://watchingamerica.com/News/141596/if-us-attacks-iranhuman-survival-may-be-at-risk-part-iii/] The dangers of global war are clear. On one side, hundreds of Russian technicians would die working on Iranian nuclear facilities, to which Russia could not stand idly by. According to Chossudovsky: "Were Iran to be the object of a "pre-emptive" aerial attack by allied forces, the entire region, from the Eastern Mediterranean to China's Western frontier with Afghanistan and Pakistan, would flare up, leading us potentially into a World War III scenario. The war would also extend into Lebanon and Syria. It is highly unlikely that the bombings, if they were to be implemented, would be circumscribed to Iran's nuclear facilities as claimed by US-NATO official statements. What is more probable is an all out air attack on both military and civilian infrastructure, transport systems, factories, public buildings. "The issue of radioactive fallout and contamination, while casually dismissed by US-NATO military analysts, would be devastating, potentially affecting a large area of the broader Middle East (including Israel) and Central Asian region." As an example, a few years ago Burma moved its capital Rangoon to Pyinmana, because it believed that the effects of nuclear radiation caused by an attack on Iran would be less there. Radiation and nuclear winter could have uncontrollable consequences for humans. Put plainly, the survival of the human race would be put at stake if the U.S. attacks Iran. 13 Iran prolif escalates – global prolif – nuke wars everywhere Edelman, 11 — Distinguished Fellow at the Center for Strategic and Budgetary Assessments, former U.S. Undersecretary of Defense for Policy (Eric, “The Dangers of a Nuclear Iran: The Limits of Containment”, Foreign Affairs, 2011, proquest) FROM ISLAMABAD TO RIYADH The reports of the Congressional Commission on the Strategic Posture of the United States and the Commission on the Prevention ofWeapons of Mass Destruction Proliferation and Terrorism, as well as other analyses, have highlighted the risk that a nuclear-armed Iran could trigger additional nuclear proliferation in the Middle East, even if Israel does not declare its own nuclear arsenal.Notably, Algeria, Bahrain, Egypt, Jordan, Saudi Arabia,Turkey, and the United Arab Emirates- all signatories to the Nuclear Nonproliferation Treaty (npt)-have recently announced or initiated nuclear energy programs. Although some of these states have legitimate economic rationales for pursuing nuclear power and although the low-enriched fuel used for power reactors cannot be used in nuclear weapons, these moves have been widely interpreted as hedges against a nuclear-armed Iran. The npt does not bar states from developing the sensitive technology required to produce nuclear fuel on their own, that is, the capability to enrich natural uranium and separate plutonium from spent nuclear fuel.Yet enrichment and reprocessing can also be used to accumulate weapons-grade enriched uranium and plutonium-the very loophole that Iran has apparently exploited in pursuing a nuclear weapons capability. Developing nuclear weapons remains a slow, expensive, and difficult process, even for states with considerable economic resources, and especially if other nations try to constrain aspiring nuclear states' access to critical materials and technology.Without external support, it is unlikely that any of these aspirants could develop a nuclear weapons capability within a decade. There is, however, at least one state that could receive significant outside support: Saudi Arabia. And if it did, proliferation could accelerate throughout the region. Iran and Saudi Arabia have long been geopolitical and ideological rivals. Riyadh would face tremendous pressure to respond in some form to a nuclear-armed Iran, not only to deter Iranian coercion and subversion but also to preserve its sense that Saudi Arabia is the leading nation in the Muslim world. The Saudi government is already pursuing a nuclear power capability, which could be the first step along a slow road to nuclear weapons development. And concerns persist that it might be able to accelerate its progress by exploiting its close ties to Pakistan. During the 1980s, in response to the use of missiles during the Iran-Iraq War and their growing proliferation throughout the region, Saudi Arabia acquired several dozen css-2 intermediate-range ballistic missiles from China. The Pakistani government reportedly brokered the deal, and it may have also offered to sell Saudi Arabia nuclear warheads for the css-2s, which are not accurate enough to deliver conventional warheads effectively. There are still rumors that Riyadh and Islamabad have had discussions involving nuclear weapons, nuclear technology, or security guarantees. This "Islamabad option" could develop in one of several different ways. Pakistan could sell operational nuclear weapons and delivery systems to Saudi Arabia, or it could provide the Saudis with the infrastructure, material, and technical support they need to produce nuclear weapons themselves within a matter of years, as opposed to a decade or longer.Not only has Pakistan provided such support in the past, but it is currently building two more heavy-water reactors for plutonium production and a second chemical reprocessing facility to extract plutonium from spent nuclear fuel. In other words, it might 14 accumulate more fissile material than it needs to maintain even a substantially expanded arsenal of its own. Alternatively, Pakistan might offer an extended deterrent guarantee to Saudi Arabia and deploy nuclear weapons, delivery systems, and troops on Saudi territory, a practice that the United States has employed for decades with its allies. This arrangement could be particularly appealing to both Saudi Arabia and Pakistan. It would allow the Saudis to argue that they are not violating the npt since they would not be acquiring their own nuclear weapons. And an extended deterrent from Pakistan might be preferable to one from the United States because stationing foreign Muslim forces on Saudi territory would not trigger the kind of popular opposition that would accompany the deployment of U.S. troops. Pakistan, for its part, would gain financial benefits and international clout by deploying nuclear weapons in Saudi Arabia, as well as strategic depth against its chief rival, India. The Islamabad option raises a host of difficult issues, perhaps the most worrisome being how India would respond. Would it target Pakistan's weapons in Saudi Arabia with its own conventional or nuclear weapons? How would this expanded nuclear competition influence stability during a crisis in either the Middle East or South Asia? Regardless of India's reaction, any decision by the Saudi government to seek out nuclear weapons, by whatever means, would be highly destabilizing. It would increase the incentives of other nations in the Middle East to pursue nuclear weapons of their own. And it could increase their ability to do so by eroding the remaining barriers to nuclear proliferation: each additional state that acquires nuclear weapons weakens the nonproliferation regime, even if its particular method of acquisition only circumvents, rather than violates, the npt. N-PLAYER COMPETITION Were Saudi Arabia to acquire nuclear weapons, the Middle East would count three nuclear-armed states, and perhaps more before long. It is unclear how such an n-player competition would unfold because most analyses of nuclear deterrence are based on the U.S.Soviet rivalry during the Cold War. It seems likely, however, that the interaction among three or more nuclear-armed powers would be more prone to miscalculation and escalation than a bipolar competition. During the Cold War, the United States and the Soviet Union only needed to concern themselves with an attack from the other.Multipolar systems are generally considered to be less stable than bipolar systems because coalitions can shift quickly, upsetting the balance of power and creating incentives for an attack. More important, emerging nuclear powers in the Middle East might not take the costly steps necessary to preserve regional stability and avoid a nuclear exchange. For nuclear-armed states, the bedrock of deterrence is the knowledge that each side has a secure second-strike capability, so that no state can launch an attack with the expectation that it can wipe out its opponents' forces and avoid a devastating retaliation. However, emerging nuclear powers might not invest in expensive but survivable capabilities such as hardened missile silos or submarinebased nuclear forces. Given this likely vulnerability, the close proximity of states in the Middle East, and the very short flight times of ballistic missiles in the region, any new nuclear powers might be compelled to "launch on warning" of an attack or even, during a crisis, to use their nuclear forces preemptively. Their governments might also delegate launch authority to lower-level commanders, heightening the possibility of miscalculation and escalation. Moreover, if early warning systems were not integrated into robust command-and-control systems, the risk of an unauthorized or accidental launch would increase further still. And without sophisticated early warning systems, a nuclear attack might be unattributable or attributed incorrectly. That is, assuming that the leadership 15 of a targeted state survived a first strike, it might not be able to accurately determine which nation was responsible. And this uncertainty, when combined with the pressure to respond quickly, would create a significant risk that it would retaliate against the wrong party, potentially triggering a regional nuclear war. Most existing nuclear powers have taken steps to protect their nuclear weapons from unauthorized use: from closely screening key personnel to developing technical safety measures, such as permissive action links, which require special codes before the weapons can be armed. Yet there is no guarantee that emerging nuclear powers would be willing or able to implement these measures, creating a significant risk that their governments might lose control over the weapons or nuclear material and that nonstate actors could gain access to these items. Some states might seek to mitigate threats to their nuclear arsenals; for instance, they might hide their weapons. In that case, however, a single intelligence compromise could leave their weapons vulnerable to attack or theft. 16 Ext Duggan 15 – Iran Solves the Case Only US-Iran cooperation can resolve the ISIS threat Milani 15 – Professor of Politics and the Executive Director of the Center for Strategic and Diplomatic Studies @ University of South Florida [Mohsen Milani, “What are the Prospects for US-Iran Cooperation Against ISIS?,” Iran Matters, May 20, 2015, pg. http://tinyurl.com/q3jo3ac As the situation stands now, the United States is faced with a dilemma: “If we don’t put boots on the ground to fight ISIS, who will?” It is unlikely that Arab states like Saudi Arabia, other GCC countries, Egypt, and Jordan will have the desire to muster an army to fight a force that is primarily Sunni. The Iraqi Security Forces, despite U.S. training, have proved incapable of single handedly defeating the jihadist threat. The Turkish military has the strength, but the government is determined to overthrow the Assad regime and therefore is unlikely to engage in any military operations against ISIS at this time. Nor does the Shi’a dominated government in Iraq have any interest to invite Sunni armies to interfere in Iraq’s internal affairs. The Kurdish Peshmerga have the desire, willingness and the manpower to fight ISIS, but they cannot single handedly defeat ISIS or expel them from Iraq. Iran has the willingness and the determination to fight against ISIS by helping the Iraqi government. Moreover, Iranian trained Iraqi militias have had a good record of fighting against ISIS. Should there be a nuclear agreement between six global powers and Iran, there is a reasonable possibility that the hostile relations between Iran and the U.S. can change and the two countries can join together to undermine ISIS and address other areas of common interest. 17 Turn – Leaks Decrease Coop Turn: Leaks undermine intel cooperation Walsh 15 - Professor of political science @ University of North Carolina - Charlotte. [James Igoe Walsh, “How the latest leak hurts intelligence cooperation,” The Washington Post, February 25, 2015, pg. http://tinyurl.com/pleau7m The leak is likely to have important implications for the willingness of intelligence agencies to share information in the future. At its heart, intelligence sharing involves the exchange of not simply information, but information that must be kept secret from others. States that share secrets worry that their partners will divulge them, deliberately or inadvertently. The current leak is the latest case, after Wikileaks and the Edward Snowden revelations, where an intelligence “insider” has broken this promise of secrecy. States’ reaction to this leak will have important consequences for their own security. Greater limits on intelligence sharing might restrict states’ ability to counter transnational terrorist groups and other threats to peace and stability. Leaks by insiders have fast become the biggest challenge to the current intelligence sharing regime. To some extent, these leaks are a public good. They have provided a lot of information about intrusions on civil liberties and human rights by intelligence agencies around the world. Intelligence agencies are likely to want to share less after this document leak. It makes sense to share only with those whom you trust to keep information secret. Insider leaks may lead states to update their assessments of the trustworthiness of their partners. But limiting sharing to only the most trustworthy states imposes quite serious costs. Only a handful of countries have foreign intelligence services of any size, and none comes close to matching the United States. For smaller countries, this means there are relatively few partners who can provide intelligence on a wide range of issues. After the Wikileaks and Snowden revelations, many commentators suggested that foreign intelligence services would limit sharing with the United States, but it is not clear that this has actually happened. But cooperating with only the most trustworthy states is not the only way to share intelligence. As I discuss in my book, “International Politics of Intelligence Sharing,” cooperating states can construct institutions and practices that limit their vulnerability to exploitation by their partners. The United States, for example, provides funding and technical support to the intelligence agencies of a number of smaller states. This not only builds partner states’ capacity to develop mutually useful intelligence, but also provides the United States with leverage it can use to punish partners who violate sharing agreements. This and earlier insider threats suggest it is becoming increasingly difficult for intelligence services to keep their secrets secret. Although we do not yet know the motives of the leaker or leakers in the South African case, many of the previous leakers were unhappy about their governments’ willingness to aggressively exploit their growing capacity to monitor communications, even when doing so threatens civil liberties. 18 1NC — Squo Solves Status quo solves US-Saudi intelligence sharing Hosenball et al. 4/10 (MARK HOSENBALL, PHIL STEWART AND WARREN STROBEL, 2015, Reuters, “Exclusive: U.S. expands intelligence sharing with Saudis in Yemen operation,” http://www.reuters.com/article/2015/04/11/us-usa-saudi-yemen-exclusiveidUSKBN0N129W20150411)//RTF The United States is expanding its intelligence-sharing with Saudi Arabia to provide more information about potential targets in the kingdom's air campaign against Houthi militias in Yemen, U.S. officials told Reuters. The stepped-up assistance comes as two weeks of relentless air strikes by the Saudis and other Gulf Arab allies have largely failed to halt advances by the Iranlinked Houthi forces. The U.S. officials said the expanded assistance includes sensitive intelligence data that will allow the Saudis to better review the kingdom's targets in fighting that has killed hundreds and displaced tens of thousands since March. "We have opened up the aperture a bit wider with what we are sharing with our Saudi partners," said one U.S. official. "We are helping them get a better sense of the battlefield and the state of play with the Houthi forces. We are also helping identify 'no strike' areas they should avoid" to minimize any civilian casualties, the official said. U.S. ally Saudi Arabia is concerned that the violence could spill over the border it shares with Yemen, and is also worried about the influence of Shi'ite Iran, which has denied Saudi allegations it has provided direct military support to the Houthis. The United States, whose fight against al Qaeda militants in Yemen has been dealt a heavy setback by the Houthi takeover of the capital Sanaa and ousting of the previous government, has avoided a direct role in the worsening conflict. It will still stop short of picking targets for the Saudis, said the four U.S. officials, who spoke on condition of anonymity. But Washington has come under pressure to do more to assist the alliance led by Saudi Arabia, which fears the Houthi advance is expanding the influence of arch foe Iran to its border. Saudi concerns of growing Iranian influence have also been heightened by nuclear talks between Tehran and world powers that could result in a deal by June 30 removing punishing sanctions on the country. A senior U.S. diplomat said earlier this week that Washington was speeding up arms supplies and bolstering intelligence sharing with the Saudi-led alliance. The Pentagon has said it is beginning aerial refueling of Arab coalition jets – although outside Yemeni airspace. Until recent days, U.S. intelligence support was limited to examining Saudi targeting information to try to affirm its accuracy, U.S. and Saudi officials said. The U.S. role has now expanded in size and scope, involving more detailed “vetting” of targeting information prepared by the Saudis, with a particular interest in helping the Saudis to avoid civilian casualties, according to the U.S. officials. The White House and Pentagon would not comment specifically when asked about expanded intelligence-sharing. "The United States is providing our partners with necessary and timely intelligence to defend Saudi Arabia and respond to other efforts to support the legitimate government of Yemen," said Alistair Baskey, a White House spokesman. LEGAL BARRIERS Aid groups have said the Saudi strikes, which began March 25, have caused many civilian deaths, including a March 30 attack on a Houthi-controlled refugee camp in northern Yemen that the International Organization for Migration said killed 40 people. Senior Saudi officials have blamed such incidents on the Houthis themselves. The Saudi-led air campaign is aimed at rolling back territorial gains by the Houthis and reinstalling Yemeni President Abd-Rabbu Mansour Hadi, who has fled the country. While the White House announced U.S. intelligence support soon after the operation began, American officials said that data sharing had been extremely minimal in the campaign's early days. That is partly due to legal barriers, the officials said. While the United States has used lethal force against an al Qaeda offshoot in Yemen, it does not consider itself at war with the Houthis. Some officials said the U.S. administration's analysis is that it lacks the ability under international and U.S. law to collaborate with the Saudis in an offensive against the Houthis. Baskey said that U.S. actions were "fully consistent with applicable domestic and international legal requirements." Deputy Secretary of State Antony Blinken spoke in general terms about the expanded cooperation during a Monday visit to Riyadh, without disclosing specifics. "Saudi Arabia is sending a strong message to the Houthis and their allies that they cannot overrun Yemen by force," Blinken said. "As part of that effort, we have expedited weapons deliveries, we have increased our intelligence sharing, and we have established a joint coordination planning cell in the Saudi operation center," he added. The United States has sent a 20-member military coordination team to interact with the Gulf allies, led by Marine Major General Carl Mundy. Assigning a two-star general will facilitate interactions with other high-ranking officials from other nations, U.S. officials said. The United States this week started daily air-to-air refueling flights of fighter jets from Saudi Arabia and the United Arab Emirates. But even with its refueling flights, the United States is exhibiting caution -- carrying out the flights outside Yemeni airspace and requesting financial reimbursement from allies. It is still unclear how the United States plans to accelerate the delivery of bombs and guidance kits to its allies. One person familiar with the matter, speaking on condition of anonymity, said the United States might accelerate shipments to the United Arab Emirates, which could then also help resupply Saudi Arabia. 19 Squo solves- countries are already taking measures to mitigate the threat and intel sharing is taking place Zelin and Prohov 14 (Aaron and Jonathan, May 18th, Aaron Y. Zelin is the Richard Borow Fellow at The Washington Institute and the Rena and Sami David Fellow at the International Centre for the Study of Radicalisation. He also runs the website Jihadology.net. Jonathan Prohov is a research assistant at the Institute, “Proactive Measures: Countering the Returnee,” http://www.washingtoninstitute.org/policy-analysis/view/proactive-measures-countering-the-returnee-threat)//RTF Fears that foreign fighters traveling to Syria might return home once the conflict is over and engage in terrorism have prompted an unprecedented level of proactive measures by countries around the world. In the past, many countries only changed their laws after an attack occurred, but this time around many states are trying to get ahead of the issue. Compared to the number of foreigners who fought against the United States in Iraq or the Soviets in Afghanistan, the number of foreigners fighting in Syria has exceeded both of those cases -- and in less than half the time. Around 9,000 individuals from more than 80 countries have joined the fight against the Asad regime, with the majority coming from the Arab world and Western Europe. U.S. intelligence officials told the Los Angeles Times in February that at least 50 Americans had joined the fight in Syria, and FBI director James Comey recently stated that the number of Americans who had either traveled to Syria or tried to do so had grown by a few dozen since the beginning of 2014. The United States was one of the first to designate Jabhat al-Nusra, Al Qaeda's branch in Syria, as a terrorist organization. Some European Union (EU) countries, as well as Canada, Australia, and Britain, have followed suit. The United States has also used sting operations to stop individuals from joining the fight. Australia has used laws already on the books that allow it to revoke individuals' passports to prevent its citizens from going to fight in Syria in the first place and to prevent those who have already gone from getting back into the country. In the EU, the Netherlands has banned certain individuals from returning home, used ankle bracelets to track those who have returned from Syria, and ruled that preparing to travel to Syria to participate in jihad is a crime. In Germany, three different Salafist organizations have been banned for providing recruitment networks for groups fighting in Syria, and one German official has proposed setting up a network of telephone hotlines and counseling centers to enable friends and relatives to report radicalized young men as a sort of early warning system. Some EU countries have also discussed cutting off individuals' access to government benefits such as healthcare and other social services if they've participated in the jihad in Syria. One way Britain has tried to combat the recruitment of its citizens is by removing recruitment material from the Internet. Between January and March 2014, Britain had 8,000 "takedowns" of online content -- a sudden and dramatic increase, considering there were only 21,000 takedowns conducted over the previous four years combined. The Foreign and Commonwealth Office has also been putting money into a social media program aimed at deterring British citizens from traveling to Syria to fight. In addition, the British police recently announced that they will be partnering with charitable organizations in a campaign to prevent young people from going to Syria. As reported by the New York Times, "Officers plan to hand out leaflets at British ports warning of the risks of traveling to Syria, and officers plan to advise people who want to support humanitarian efforts in Syria to avoid traveling there and to donate to nonprofit organizations instead." Just last week, the House of Commons Home Affairs Committee issued a detailed report recommending a number of new policy initiatives aimed at dealing with the returnee threat; these included revoking the passports of British citizens fighting in Syria, sending "spotters" to countries that border Syria to identify British citizens at risk of crossing the border to fight (a program currently used to track soccer hooligans in foreign countries), and coordinating with mental health practitioners to help returning fighters cope with the violence they've experienced. And according to the New York Times, the House of Lords on Monday "passed legislation that allows the government to strip terrorism suspects of their citizenship even if it renders them stateless." Britain's counterparts in France launched a new counter-radicalization program in October 2013, and they recently announced an expansion of the program with 20 additional measures, including a plan to stop minors from leaving France without parental consent; increased surveillance of Islamist websites that recruit fighters; and, similar to the program proposed in Germany, a system to encourage parents to identify and report suspicious behavior in their children. Smaller countries like Bosnia, Finland, and Azerbaijan are also considering strengthening their anti-terrorism laws. Bosnia recently passed a law that imposes a sentence of up to ten years for any citizen who fights or recruits others to fight in a conflict abroad. Finland's parliament has begun to debate strengthening their terrorism laws to include making it a criminal offense to receive training to commit acts of terror. In Azerbaijan, an amendment has been introduced to increase penalties for involvement in international terrorism, financing of terrorism, and using any form of media for extremist purposes. 20 Most countries in the Arab world are also concerned and are taking steps in anticipation of potential problems. Saudi Arabia has done this before, opening a rehabilitation center in Riyadh in 2007 for all Al Qaeda members serving prison sentences. Beyond opening additional rehabilitation centers to serve those who fight in Syria, the Saudis have increased preventive measures in several other ways: in early February 2014, the government issued a royal order declaring that any citizen who fights in conflicts abroad will face between three and twenty years in jail. A month later, the Saudis released a royal decree designating Jabhat al-Nusra and Al Qaeda in Iraq (better known these days as the Islamic State of Iraq and Syria, or ISIS) as terrorist organizations. To help deter further recruitment of Saudi citizens by groups in Syria, the Saudis also promoted a disillusioned returned Saudi fighter, Sulayman Sa'ud Subai'i, on the television program Humumana ("Our Concerns"). In the show, Subai'i explained that the Syrian jihad is not as glamorous as it is portrayed in the media and online and decried a number of offensive practices he saw various rebel groups in Syria engaged in, including what he referred to as "the weaponization of takfir" among the different rebel groups. (Takfir is an Islamic term that refers to the act of labelling another Muslim as a non-Muslim, which in this context then implies that one can now kill that person.) In Kuwait, where much of the financing for extremists in Syria has originated or been routed through, members of parliament passed a bill in early April 2014 to combat money laundering and funding of terror groups that carries a potential sentence of up to 20 years in prison. Similarly, Turkey passed an anti-terrorism finance law in February 2013 in order to maintain compliance as a member of the Financial Action Task Force, a money-laundering watchdog organization comprised of 36 members. The new law allows the state to freeze the financial assets of terrorists without a court order; however, Turkey's enforcement of these laws remains very poor. More recently -- and perhaps more effectively -- Turkey also changed its policy related to issuing tourist visas. Starting in mid-April 2014, tourists wanting to travel to Turkey must obtain a visa ahead of time and cannot simply get one at the airport once they arrive in Turkey. Turkey has also administratively authorized a no-entry list for over 3000 individuals based on information received from Interpol, other countries, and individuals' families. In addition, the country has started building a fence along parts of its border with Syria. Major fighting along Jordan's borders since the conflict in Syria began combined with the fact that a number of Jordanians have gone to fight in Syria prompted Jordan to update its 2006 Anti-Terrorism Law: amendments include a clause that criminalizes the act of joining or attempting to join jihadi groups abroad and recruiting or attempting to recruit for these groups. The law also explicitly criminalizes using "information technology, the Internet or any means of publication or media, or the creation of a website, to facilitate terrorist acts or back groups that promote, support or fund terrorism." In Lebanon, where violence has spiked tremendously due to the spillover effects of the Syrian conflict raging next door (including several bombing incidents carried out by Al Qaeda-affiliated groups), laws have remained unchanged thanks to a 10-month period of political deadlock that has prevented the formation of a government. Instead, law enforcement personnel have beefed up their domestic enforcement efforts, including dramatically increasing the number of arrests and preemptively detonating cars they suspect of being rigged with explosives. Taking a less bellicose approach, the Tunisian government has established a mechanism for individuals who have gone to Syria but have not killed anyone to be integrated back into society through an amnesty program. Ridha Sfar, a deputy minister in Tunisia's interior ministry, described it as "a forgiveness and repentance law which was previously enacted in countries like Algeria and Italy," and said that the policy applied to "[a]ny Tunisian who does not have blood on his hands." Morocco is also looking into a reintegration process for those who do not pose a security risk. Currently, the Moroccan government is using administrative powers to delay the issuance of passports to those it suspects intend to travel to Syria to fight; however, this measure is unlikely to be successful since of the Moroccans that have traveled to Syria, 81% were previously unknown to Moroccan security forces. Broader multilateral approaches are also being taken to mitigate 21 this issue. In February 2014, the Global Counterterrorism Forum (GCTF) -- an international organization created by the United States and Turkey in 2011 with 30 member countries and partnerships with several other international organizations -- launched the "Foreign Terrorist Fighters" Initiative. Led by the Netherlands and Morocco, the Initiative "will include two expert meetings and the development of good practices that could be adopted by the GCTF at the ministerial level." At the opening meeting, participants discussed the challenges posed by foreign fighters and the ways different countries and organizations are already dealing with the issue. For instance, some states have begun utilizing Interpol yellow notices -- designed to locate missing persons -- to disseminate information about suspected foreign fighters. Only time will tell how effective all of these policies will prove to be at mitigating the threat of foreign fighters returning home from Syria. The fact that countries across the region and far beyond are already making such changes indicates the seriousness of the threat posed by the proliferation of violence well beyond Syria's borders. Foreign fighters present such a complex problem that prospects for failure are likely. Multilateral counterterrorism mechanisms instituted after 9/11 mean that the United States and the international community do not have to build capabilities and relationships from scratch. Yet even as additional programs and policies are implemented and strengthened, the fact remains that it only takes one successful attack for these policies to be deemed insufficient. Attacks have already occurred in the Middle East, where security is precarious due to domestic instability, and attacks have quietly been thwarted in western countries as well. The United States must remain vigilant at home and continue to take a leadership role abroad, encouraging best practices and helping foreign governments craft policies to address the threat. In particular, the United States needs to apply further pressure on certain key countries, such as Turkey, which is the main point of entry into Syria for foreign fighters and whose borders are still notoriously easy for fighters to cross, and Kuwait, which remains the "epicenter of fundraising for terrorist groups in Syria." Meanwhile, the source of the problem -- the Syrian conflict itself -- has become what the Economist describes as a "bloody stalemate" with no end in sight. 22 2NC — Squo Solves Status quo intel sharing solves Nielsen 1/19 (Nikolaj, 2015, Danish-American journalist working for EUobserver in Brussels. He won a King Baudouin Foundation grant for investigative journalism in 2010, “EU to increase intelligence sharing with Arab states,” https://euobserver.com/foreign/127283)//RTF The EU wants to step up security and intelligence co-operation with neighbouring countries to counter terrorist threats. The plan is part of a broader effort discussed on Monday (19 January) by EU foreign ministers to reduce the risk of militant attacks by getting national intelligence and law enforcement agencies to share data and to communicate better with each other and their counterparts in Turkey, north Africa, and Asia. An EU source said it could involve a future proposal by the EU’s counter-terrorism chief Gilles de Kerchove to rebuild dismantled intelligence agencies in post-Arab spring countries, such as Tunisia. Federica Mogherini, the EU’s foreign policy chief, told reporters in Brussels she wants "security attaches" posted in EU delegations to help liaise with the host country’s authorities. She also wants to reach out to Arab-speaking populations by "improving our capacity to speak Arabic, read Arabic" and "listen to the messages coming from the Arab world". Mogherini, in a separate meeting with Arab League secretary general Nabil El Arabi, agreed to work closer together on counter-terrorism threat and announced that projects would be launched in the coming weeks with Algeria, Egypt, Turkey, Yemen, the Gulf countries and some African nations. “We know very well that the first victims of terrorists and terrorist attacks are Muslims and Arab countries,” she said. Monday’s meeting, marked by a sense of urgency, outlined plans with formal decisions set to be taken on 12 February. A meeting in Brussels is also planned in the next few days with experts from the EU, US, Australia, Canada, Iceland, Japan, Norway, Switzerland, and UN agencies to figure out how to cut the funding schemes that bankroll militant groups in Iraq and Syria. The aftermath of the Charlie Hebdo murders, which left 17 dead, has seen national governments trying to fast track security measures provisionally announced last October. These includes, among others, stepping up external border checks and blocking, with the help of Facebook, Google, Twitter, and Microsoft, online content that glorifies the violence perpetrated by Islamic militants. But concerns are mounting that additional security calls made by national governments, such as confiscating passports, pose a threat to civil liberties and may result in unanticipated adverse affects. Squo solves intel coop Born 07 (Hans, October 6th, Senior Fellow, DCAF, Geneva, “International Intelligence Cooperation: The Need for Networking accountability,” http://www.dcaf.ch/content/download/37081/529379/version/1/file/born-international-intelligence-cooperationnetworking-accountability-071006.pdf)//RTF International intelligence cooperation takes many forms, from ad hoc information sharing to the institutionalized exchange of intelligence between states. Cooperation may occur: Bilaterally; • Multilaterally within specific arrangements for intelligence sharing such as the Club of Bern, UKUSA and the Alliance Base Counterterrorist Intelligence Center near Paris;3 • Intelligence cooperation (or the lack thereof) takes place within the context of international organizations such as NATO and the EU. There can be little doubt that states have for long shared intelligence. However, the events of 11 September 2001 and subsequent terrorist attacks in Bali, Beslan, London and Madrid have driven states to cooperate more intensively and on a broader range of issues than ever before. This increased cooperation has not only developed between traditional international partners in the West, but has also extended to a range of states that were not previously considered to be traditional allies in security matters – principally in the Middle East, Central Asia and Southeast Asia. Cooperation with these non-traditional partners has generated significant problems, largely because the collection and use of intelligence may not be subject to the same human rights safeguards as applied in NATO member states. As many of you may be aware, international intelligence cooperation as part of the so-called ‘war on terror’ has generated a series of high profile controversies – to name just two examples – the alleged CIA secret detention centres in Europe and the case of Maher Arar in Canada. These practices have been exposed through inquiries, however, the fact these events took place is in part the result of a lack of accountability of intelligence cooperation, I will now discuss this ‘accountability gap’ more fully. 23 24 Alt Causes Alt Causes to Intel Sharing: 1. Personal data McGill and Gray 12 (Anna-Katherine Staser and David H, Summer, School of Graduate and Continuing Studies in Diplomacy and Campbell University, “Challenges to International Counterterrorism Intelligence Sharing,” http://globalsecuritystudies.com/McGill%20Intel%20Share.pdf)//RTF Personal data is critical to counterterrorism efforts because it “often provide[s] the only evidence of connections between members of terrorist groups and the types of activities that they are conducting” (Bensehal 48). However, Europe has shown resistance to freely sharing this type of information with its American counterparts since many of the US’s European allies have much more stringent views on the protection of personal data. In the EU, there are safeguards at the national and regional level that regulate the storage and sharing of personal data information. These laws are a product of Europe’s historical experience with fascism and thus its sensitivity to the abuse of such information as travel records or communications (Bensahel, 48). In “The Counterterror Coalitions: Europe, NATO, and the European Union” Nora Bensahel explains “by contrast, the United States protects personal information through legal precedents and procedures rather than [unified] legislation” which the Europeans find insufficient (48). The EU’s concerns over the US’s protection of personal data caused them to withhold information from the US and created a substantial challenge to their combined counterterrorism efforts. Following 9/11 the heightened political will to overcome such issues enabled the US and the EU to compromise on this issue but there are lingering limits to EU willingness to share personal data with the US. In the wake of the attacks, the US and Europol signed an agreement to permit the sharing of personal data. Although it increased operational effectiveness and intelligence sharing this agreement is limited to law enforcement operations which excludes personal data found in commercial activities. Furthermore, provisions in the agreement state that “personal information can be used only for the specific investigation for which it was requested” (Bensahel, 48). If the suspect is being investigated for murder and is discovered to have ties to a smuggling ring the US must submit a separate request to use the murder information in the case regarding the smuggling activities. 2. Extraordinary Rendition McGill and Gray 12 (Anna-Katherine Staser and David H, Summer, School of Graduate and Continuing Studies in Diplomacy and Campbell University, “Challenges to International Counterterrorism Intelligence Sharing,” http://globalsecuritystudies.com/McGill%20Intel%20Share.pdf)//RTF The US and the EU have also had substantial disagreements on the treatment and punishment of accused terrorists. This tension hinges on such issues as the use of the death penalty and “extraordinary rendition”. Fortunately, the death penalty issue was resolved with the passage of an multilateral treaty on extradition however the US has not fully recovered from the backlash of criticism and mistrust from its practice of “extraordinary rendition”. Prior to a May 2002 summit, the US and EU were at a disagreement over the death penalty. The EU’s aversion to capital punishment led it to not only hesitate from sharing information but deny requests for extradition unless the US would guarantee that the individual in question would not face the death penalty. The 2002 summit did however bring both the US and EU to at least agree in principle to a treaty on extradition and Mutual Legal Assistance Treaty (MLAT) and both parties ratified the treaties in 2003. The extradition treaty allowed for a blanket policy for European nations to “grant extradition on the condition that the death penalty will not be imposed” and the MLAT provided enhanced capability to gather and exchange information (Bensahel 49). The CIA’s use of “extraordinary rendition”, the practice of transporting a suspect to a third country for interrogation, has also stoked the ire of many traditional allies. Critics charge that this tactic quite simply allows the CIA to sidestep international laws and obligations by conducting interrogations in nations with poor human25 rights records. In 2003, an Italian magistrate formally indicted 13 CIA agents for allegedly kidnapping an Italian resident and transporting him to a third country for interrogation. Ultimately 22 CIA agents and one US military officer were convicted in absentia of crimes connected to the abduction (Stewart, 1). The case not only heightened criticism of the US in Italy but challenged U.S. strategic communications aimed at reducing anti-Americanism worldwide (Reveron 462). According to Julianne Smith, director of the Europe program at the Center for Strategic and International Studies (CSIS), “[extraordinary rendition] makes it extremely difficult [for European governments] to stand shoulder-to-shoulder with the U.S.” (Heller 1). In 2002 Deputy Secretary of State Richard Armitage testified that increased counterterrorism collection and sharing “results not just from collective revulsion at the nature of the attacks, but also the common recognition that such groups present a risk to any nation with an investment in the rule of law” (qtd in Reveron, 455). Indeed, increased political will on both ends has greatly improved intelligence sharing between the US and its allies. Yet, as demonstrated in the previous section, bonding over the catastrophic events of 9/11 cannot settle all disputes even with the closest of friends. It is even more difficult as commonalities and shared interests are limited at best, as is the case with many of the US’s new allies. As will be discussed in the following section, extraordinary rendition is just one of the ways the US is currently challenged by its relationships with new allies. 3. Anti-Americanism McGill and Gray 12 (Anna-Katherine Staser and David H, Summer, School of Graduate and Continuing Studies in Diplomacy and Campbell University, “Challenges to International Counterterrorism Intelligence Sharing,” http://globalsecuritystudies.com/McGill%20Intel%20Share.pdf)//RTF Non-traditional relationships with Muslim nations like Saudi Arabia and Pakistan have been critical to the crackdown on terrorism financing and the ongoing operations against terrorists and insurgents in both Afghanistan and Pakistan’s Federally Administered Tribal Areas. Yet the domestic populations of these nations put strains on cooperation with the US. In Saudi Arabia, the ultra conservative Wahhabi culture prevented the Saudi royal family from taking decisive action against terrorism facilitation within its boundaries years after it openly agreed to multilateral anti-terrorism treaties. Though it would stand to reason that the Saudi royals had a vested interest in undermining groups like al Qaeda who considered Saudi Arabia to be an apostate regime and therefore a target, it could not risk inciting public outrage by cracking down on donations to these groups. The intermingling of naïve benevolence toward seemingly legitimate charities, those hiding behind the veil of religious duty, and sympathy for al Qaeda’s cause against the West made enforcement of counterterrorism measures in Saudi Arabia highly unlikely. It wasn’t until the 2003-2004 Riyadh terrorist attacks did the Saudis jump into action. Since then they have been an extremely helpful ally for the US and yet domestic support for Islamic extremists remain and will continue to cause strains for US-Saudi CT cooperation in the future. The US-Saudi relationship was able to weather the storm of domestic anti-Americanism in large part to the long history of their alliance. Though traditional by no means this arrangement hinged on the trade of oil for security and the US dependence on Saudi oil prevented it from abandoning its relationship despite the feet dragging on CT issues. Had the Saudis not made an about face following the Riyadh attacks, it is questionable if this relationship would have survived. The US’s relationship with Pakistan, however, does not enjoy the same benefits of a long-nurtured and ingrained alliance. Over the past half-century the relationship has been marked with highs and lows and though the US is heavily reliant on Pakistan for CT operations in Central Asia now, recent developments threaten to dismantle their alliance. Pakistan is home to many Islamic radicals and militants including Tehrik-i-Taliban Pakistan, responsible for the attempted Time Square bombing, and Lashkar-e Toiba, responsible for the 2008 Mumbai attacks. These extremist groups, Lashkar-e Toiba in particular, enjoy a considerable amount of influence amongst the populace and antiAmericanism is a cornerstone of the message it wishes to impart on the Pakistani people. The recent crisis over the arrest Raymond Davis, a CIA contractor accused of killing two Pakistani men in Lahore, highlights this tension and threatens Pakistani support of the war on terrorism as well as its own domestic stability. Upon the arrest of Davis, the US demanded his release on the grounds of diplomatic immunity. The location of the shooting, the city of Lahore in the Punjab region of Pakistan happens to be a hotbed of anti-American sentiment and a stronghold of many Pakistan based militant groups. Despite American pressure, and possibly pressure from the government of Pakistan, the Lahore courts have denied Davis’s diplomatic immunity. For the past month multiple demonstrations organized by extremists groups like Lashkar-e Toiba and Jammati-Islami have called for the execution of Davis and accused the Pakistani government of being “Washington’s agents” (Hindustan Times). Demonstrators were also seen carrying signs with messages like “Friends of America are traitors” (Arnoldy 1). As a result of the public outcry against US demands for Davis’s release the Government of Pakistan has officially stated that it will not make a 26 determination on Davis’s diplomatic immunity until March 14th. The US, in response, cancelled Secretary of State Hillary Clinton’s meeting with Pakistan’s Foreign Minister and a trilateral meeting with Afghanistan and Pakistan officials in Washington (Crilly 1; Arnoldy 1). Adding to the political pressure against the Government of Pakistan, President Obama himself spoke out on the matter shortly after the crisis began to urge the Pakistanis to release Davis on the conditions of diplomatic immunity and to emphasize that the case was a priority for the US government (Tapper & Farren 1). He further emphasized the importance of this matter by stating that the arrest and detention of foreign diplomats is a violation of the Vienna Convention and sets a dangerous precedent. If the Pakistanis chose to detain Davis they risk losing US aid and if Pakistan’s anti-American sentiments are further incited, and possibly exploited by Pakistani extremist groups, the US may lose a key ally in its CT and counterinsurgency operations in Afghanistan and the FATA. 27 1NC Turns Iran-Saudi ISIS conflict key to Iran-Saudi bilateral relations—preserves broader stability in Mideast—specifically resolves proxy wars. Even if that fails, ISIS doesn’t collapse Iran. Daily Star 14 Lebanese paper of record, 2014-09-06, “ISIS Brings Saudi Arabia and Iran Closer,” http://www.aina.org/news/20140905213005.htm Beirut -- The ISIS threat has brought Saudi Arabia and Iran closer together, and convinced the two rivals of the need to cooperate in order to face an "existential and strategic" menace to their countries, analysts and experts said. They also emphasized that Saudi-Iranian cooperation is crucial to confront the mounting threat posed by ISIS. The jihadist group has sent shockwaves across the entire world over the past few months following its significant military advances in Iraq and Syria, coupled with its brutal practices, namely the execution of its prisoners and the beheading of two American journalists. A long-awaited rapprochement between Riyadh and Tehran is a key tool to defuse sectarian tensions and long-simmering conflicts in the region, particularly in Syria and Iraq, analysts said. "The ISIS threat has brought Iran and Saudi Arabia closer together and convinced them to engage in diplomacy in order to resolve lingering issues," Hilal Khashan, a professor of political science at the American University of Beirut, told The Daily Star. "I think Saudi-Iranian cooperation is very important in the battle to defeat ISIS. In order for them to successfully eliminate the ISIS threat, they need to agree on lingering regional issues, such as the situation in Yemen, Iraq and Syria," he said. "For Saudi Arabia, ISIS poses an existential threat, while ISIS poses a strategic threat for Iran in the region," Khashan added. " ISIS can have an appeal to a segment of the Saudi population, but it does not have such an appeal within the Iranian population." Sami Nader, a professor of economics and international relations at the Universite St. Joseph, echoed a similar view. "A Saudi-Iranian rapprochement is fundamental to confront the Daesh threat in the region," Nader told The Daily Star, using the Arabic acronym for ISIS. "For Saudi Arabia, ISIS poses an existential threat, while the militant group poses a strategic threat for Iran." "Both countries have shown a great deal of pragmatism in the attempt to cooperate to face the Daesh threat," said Nader, also the director of the Levant Institute for Strategic Affairs (LISA), a Beirut-based think-tank. " A Saudi-Iranian rapprochement is a master key to defuse conflicts in the region , namely in Iraq, Syria, Yemen, Lebanon and Bahrain." Nader said that strained SaudiIranian ties were going through "detente" that could lead to the beginning of a rapprochement. "For now, [the] détente is based on a single subject, which is a common threat posed by ISIS. Both countries are facing the Daesh threat . This is why confrontation by their proxies in the region has calmed down ," he said. Signs of a thaw in strained Saudi-Iranian relations emerged last month when Iran's Deputy Foreign Minister Hossein Amir Abdollahian held an ice-breaking meeting with Saudi Foreign Minister Prince Saud al-Faisal in the Saudi city Jeddah. Abdollahian described the talks, which also covered the ISIS threat, as "positive and constructive." "Both sides emphasized the need to open a new page of political relations between the two countries," he said the after meeting Prince Saud. Abdollahian is expected to visit Beirut next week as part of a tour that will also take him to Syria to brief officials in both countries on the new climate of understanding between Saudi Arabia and Iran, a political source told The Daily Star. Prince Saud has said he had invited his Iranian counterpart Mohammad Javad Zarif to visit Saudi Arabia and was awaiting a reply. He said Iran is a neighboring country which can contribute to stability in the region. Zarif said he was ready to visit Saudi Arabia and welcome Prince Saud in Tehran. Speaking at a news conference in Tehran Aug. 31, Zarif, commenting on Abdollahian's talks in Jeddah, said: " Iran is always eager to establish good relations with neighboring states and Saudi Arabia is the most important of these states. It is an important country at the Islamic world level and enjoys a wide role and influence." He said Iran and Saudi Arabia have "common interests and are facing common threats. "Extremism, violence and terrorism are the most important dangers facing the Islamic world," he added. Since he was elected as Iran's president last year, Hassan Rouhani has said he would make it a top priority to mend frayed relations with Saudi Arabia. The imminent détente between Riyadh and Tehran comes as U.S. President Barack Obama, with his NATO allies, is struggling to establish an international coalition to confront the ISIS threat. The United States said Friday that it was forming a "core coalition" to battle ISIS militants in Iraq. Obama sought to use a NATO summit in Wales to enlist allied support in fighting the Islamist militants, but it is unclear how many nations might join 28 the United States in the battle. A Saudi-Iranian rapprochement would have ramifications across the Middle East, potentially cooling political and military struggles in Syria, Iraq, Lebanon, Bahrain and Yemen. Saudi Arabia has long been suspicious of Iran's influence in the region. Riyadh and other Gulf states have also been apprehensive of Tehran's nuclear ambitions. Saudi-Iranian relations have been further strained by policy differences, particularly over the war in Syria, where the two countries support opposing sides. Saudi Arabia and its Gulf neighbors back rebels fighting to topple President Bashar Assad's government, which is supported by Tehran. In Lebanon, Saudi Arabia and Iran also support opposing sides. While Saudi Arabia backs the Future Movement-led March 14 coalition, Iran supports the Hezbollah-led March 8 alliance. Speaker Nabih Berri and rival Lebanese politicians have said that improved Iranian-Saudi relations would result in breakthroughs in Lebanon and the conflicts in Syria and Iraq. Berri expressed hope that renewal of talks between Saudi Arabia and Iran would ward off terrorism threats facing the region. "I am counting on the Saudi-Iranian meeting to fight off the danger facing the region," Berri was quoted as saying by lawmakers last week. Shafik Masri, a professor of international law at the Lebanese University and the American University of Beirut, agreed that a Saudi-Iranian détente is pivotal to confronting the rapprochement has not materialized yet . But there are intentions driven by an understanding between Saudi Arabia and Iran," Masri told The Daily Star. " The Saudi-Iranian ISIS threat. "A Saudi-Iranian understanding is seeking to address the region's problems, beginning with the ISIS threat." 29 1NC Russia Relations ISIS threat isn’t existential—but protracted fight rebuilds US-Russia relations— overwhelms Ukraine Naumkin and Kramer 14 Mark Kramer, Professor, Director of the Cold War Studies Program at Harvard's Davis Center for Russian and Eurasian Studies, Vitaly Naumkin, director of the Institute of Oriental Studies at the Russian Academy of Sciences (RAS), editor-in-chief of Vostok (ORIENS) journal, member of the Science Council at the Russian Foreign Ministry and the Russian Security Council, “Will the ISIS threat help to reset US-Russia anti-terrorism cooperation?” Aug 19, 2014, http://www.russia-direct.org/debates/will-isis-threat-help-resetus-russia-anti-terrorism-cooperation The new round of limited airstrikes carried out by the U.S. against the Islamic State of Iraq and Greater Syria (ISIS) indicates that U.S. President Barack Obama is very concerned about the increasingly unstable situation in northern Iraq. Likewise, UK Prime Minister David Cameron makes no bones about his readiness and resolve to provide diplomatic and military aid to help prevent ISIS – which he called a "monstrous organization" - from expanding further. Even though both Obama and Cameron are hesitant about may use “all the assets we have – our diplomacy, our political relationships, our aid, the military prowess and expertise we have to help others ,” as Cameron told BBC1's Breakfast program on Monday. Likewise, Russia is still trying to figure out what to do about the potential threat that ISIS and religious radicalism pose for the region. On July 22, Russia’s putting boots on the ground and sending their troops, they Foreign Ministry expressed concerns about ISIS persecuting and oppressing representatives of religious minorities, including Christians, forcing them to flee the country. It regarded “such aggressive and systematic actions” as “absolutely unacceptable and criminal.” ISIS has become a sort of bogeyman for a reason. Its religious fanaticism, severe discipline and brutality can overshadow even Al-Qaeda’s. Its military advance and expanding turf in Iraq is become more obvious, even though its ambitions to establish a caliphate throughout the Middle East and Europe looks like an exaggeration and a surreal fantasy. In July, Russia’s Foreign Ministry called all the world’s stakeholders to do “their utmost” to prevent the ethnic and religious hatred that may have very grave implications for the world. Yet this call seems to be futile. On one hand, there is the increasing confrontation between Russia and the West over Ukraine and lingering distrust toward the Kremlin, and on the other hand, skepticism about the true scale of the ISIS threat. Indeed, naysayers would posit that the ISIS threat is highly exaggerated. Does ISIS really pose a threat to Russia and the U.S.? Can this Islamic organization really succeeded in expanding its influence globally? Should the world really take seriously the declarations from ISIS about their geopolitical ambitions and a global caliphate? “ISIS is surely a major problem for Iraq, and its tactics and strategy are that doesn't mean it is a serious threat to the American homeland.” Yet some experts admit that despite the looming abhorrent, such as its use of crucifixions and its genocidal attacks on the small Yazidi minority,” reads CNN’s website. “But threat from ISIS, so far it is not included in Russia’s international agenda. Jack Goldstone, political expert and professor at George Mason University, argues that Russia might not be interested in dealing with ISIS as much as NATO and the Persian Gulf countries are. “While ISIS is both a threat to Russian interests and to Russian clients (Bashar Assad in Syria), Ukraine is far more important to Russia,” he said. “So I do not expect Russia to change its behavior. It will focus on Ukraine first, and the Middle East second." Most importantly, the sanctions war between Russia and the West triggered by the Ukrainian crisis might put at stake Russian-American counter-terrorism cooperation. “Putting Russian security chiefs on the EU sanctions list formalizes the end of anti-terrorist cooperation between Russia and the West,” wrote Carnegie Moscow Center’s Dmitri Trenin in his Facebook post on July 22. the looming threat of ISIS and international terrorism for Russia, the U.S., and Europe seems like it has the potential to bring them closer together and forget about (or at Nevertheless, least ignore) their differences over Ukraine . Although such a scenario is unlikely (at least while ISIS doesn’t pose a more serious existential threat for all stakeholders), the question of how to minimize Russia-West confrontation over Ukraine to deal with ISIS together remains open. Russia Direct interviewed experts to find out if ISIS poses a real threat for Washington and Moscow and if they can overcome their differences over Ukraine and find ways to collaborate despite the beginnings of a new Cold War? Mark Kramer, Professor, Director of the Cold War Studies Program at Harvard's Davis Center for Russian and Eurasian Studies Despite severe tensions over Ukraine, the United States and Russia still have 30 important common interests, which they can pursue cooperatively. In particular, the two countries have a lot to gain by working together on some counter-terrorism issues, including efforts to neutralize the Islamic State (formerly known as ISIS). Because of glaring blunders committed by the Obama administration in its dealings with Iraq, the brutal terrorists in the Islamic State were able to gain a foothold and spread their influence. Obama's weak and indecisive response to the disaster in Syria has further strengthened the Islamic State and other radical Islamist terrorists who are using Syria as a training ground. Russia has not made as many foolish blunders, but it has not done enough to try to combat the Islamic State. U.S.-Russian cooperation against the Islamic State might inspire other countries to do more, including counter-terrorism offensives that would take the fight to ISIS, seeking to destroy it. U.S.-Russian cooperation [in the region] might prove difficult in some respects – the Russian authorities will want to solidify Bashar al-Assad's regime, whereas the United States has sought to replace Assad – but these problems are not so severe that they will stymie cooperation altogether. Cooperation against the Islamic State might have the further important benefit of getting U.S. and Russian officials to begin to ease the confrontational stance they have taken against each other. Tensions will persist for a long while to come, but the shrill rhetoric of recent months has been needlessly antagonistic. Cooperation against radical Islamic terrorists might help to turn things around at least a bit. Vitaly Naumkin, director of the Institute of Oriental Studies at the Russian Academy of Sciences (RAS), editor-in-chief of Vostok (ORIENS) journal, member of the Science Council at the Russian Foreign Ministry and the Russian Security Council No doubt, putting Russian security chiefs on the EU sanctions list further complicates Russia – West counter-terrorist cooperation, but cannot completely destroy it given the size of the threat emanating from terrorism and religious extremism for both sides . One example: According to Guido Steinberg from Stiftung Wissenschaft und Politik, Chechen jihadist fighters in Syria “represent a domestic security problem for Europe and Turkey” because many of them come from the diaspora – Georgia, Turkey, and “dozens from Austria and France and rather fewer from Belgium, Scandinavia and Germany.” What will be their agenda when they come back home and who are they going to fight against? Without meaningful cooperation, we’ll be not able to deter this threat. Another example: ISIS leaders declare that they will be killing Americans everywhere in the world. Doesn’t the U.S. need cooperation with all partners including Russia to obstruct terrorists from inflicting damage to U.S. citizens inside and outside the U.S.? Russia, in turn, also needs international support in its struggle against terrorism and extremism. I do believe that we can overcome our disagreements over the Ukrainian crisis however serious they are and at least preserve what is left from the cooperation between Russia and the West in the field of security, which is becoming more and more indispensable for them in this era of hyper-globalization. Relations prevent nuclear war—93% of the world’s arsenals Shukla 5/21/15 Vikas is a reporter and value investor. He has an MBA in finance and a deep interest in tech, science and politics. “How Russia And The US Can Avert A Nuclear War,” http://www.valuewalk.com/2015/04/russia-us-can-avert-a-nuclear-war/ While Russia and the U.S. agreed in 2010 to reduce their nuclear arsenal to about 1,500 warheads each, the two countries are aggressively upgrading their nuclear weapons. The U.S. and Russia together have 93% of the world's nuclear stockpile. Ukraine crisis has brought down the relations between Moscow and Washington to historic lows. Russia US Russia and the U.S. still practice Cold War-era nuclear doctrine In a column published in The The New York Times Company (NYSE:NYT), the former US Marine Corps General James E. Cartwright and former Russian Major General Vladimir Dvorkin said that a nuclear war was a serious and real threat. They believe that rising tensions between the two countries, modern technologies, and Cold War-era nuclear doctrines all point to the possibility of a nuclear war. Last month, reports surfaced that Russian President Vladimir Putin had put nuclear warheads on alert during the Crimea crisis last year. Cartwright and Dvorkin say that the Cold War-era nuclear doctrine is still practiced by the U.S. and Russia. It dictates three strategic options: first strike, post-attack retaliation and launch on warning . Of them, launch on warning is the riskiest scenario. Under this strategy, a country fires its nuclear missiles upon detecting the launch of enemy rockets . It relies on ground radar and early-warning satellites for information about the launch of enemy missiles. Russia and U.S. should eliminate launch on warning from their strategies Strategic missiles have a flight time of about 15-30 minutes, so the target country 31 has only a few minutes to decide whether to launch after detection of an apparent attack. Due to the emergence of cyber-warface, there is a significantly high potential for false alerts from early warning systems. So, there is a likelihood of error and the opportunities for ill-considered decisions are quite real. Cartwright and Dvorkin said that the presidents of Russia and the United States should discuss and eliminate the launch on warning option from their nuclear strategies. The two countries should restart military-to-military talks, which were suspended due to the Ukraine crisis, "to pursue this stand-down as an urgent priority." A joint decision on this will not affect either country's nuclear deterrence, they said. Once the Russia-U.S. relations are restored, they can explore detailed verification measures . 32 1NC Assad Tradeoff Eliminating ISIS causes Assad fill-in—reestablishes his power CNN 9/24/14 “Obama's Syria dilemma: Does hurting ISIS help al-Assad?” http://edition.cnn.com/2014/09/24/world/meast/syria-isis-airstrikes-assad/index.html The United States has inflicted damage on one enemy in Syria with the airstrikes it launched against ISIS. But it may also be helping another foe: the regime of President Bashar al-Assad. Rewind a year, and it was al-Assad's forces, not Islamic militants, against which President Barack Obama was weighing military action. Those strikes never happened, due in large part to a timely diplomatic intervention from Russia. Now, warplanes from the U.S. and Arab nations are pummeling the stronghold of ISIS, a group that has gained global notoriety for its brutal tactics and ruthless treatment of people who don't follow its extremist version of Islam. But ISIS, which controls broad areas of northern Syria and Iraq, has also been racking up military victories against al-Assad's troops. The Syrian regime may end up as "the real winner" from the expanded campaign against ISIS , said CNN Political Commentator Peter Beinhart. First tweet of the Syrian airstrikes First tweet of the Syrian airstrikes 01:08 PLAY VIDEO Who is Khorasan? Who is Khorasan? 03:02 PLAY VIDEO Iraqi PM: Happy Arab nations joined U.S. Iraqi PM: Happy Arab nations joined U.S. 01:09 PLAY VIDEO The potential benefits to al-Assad from the airstrikes "may be the most dangerous and morally troubling consequence of President Obama's decision to cross the Syrian border to fight the Islamic State," The New York Times warned in an editorial Tuesday. To try to prevent that, the Obama administration has to delicately navigate this minefield. Here are the challenges it faces: 1. Distance itself from al-Assad The White House has been at pains to stress that the airstrikes took place without any cooperation with al-Assad's government, which has been fighting against rebel groups for more than three years in a vicious conflict that has killed around 200,000 people. "I want to be very clear ... that we did not coordinate with them, we did not provide them advance notice of the timing or of targets that the U.S. was going to strike. In fact, we warned them to not pose a threat to our aircraft," Ben Rhodes, Obama's deputy national security adviser for strategic communications said Tuesday. The only contact, he said, was U.S. Ambassador to the United Nations Samantha Power telling her Syrian counterpart that direct action was to be taken. U.S. officials are also playing down the advantages of the airstrikes to the Syrian regime, although not very convincingly. Map: Airstrikes in Syria EXPAND IMAGE "I wouldn't characterize the effects we had last night as benefiting Assad," said Lt. Gen. William Mayville, director of operations for the Joint Chiefs of Staff. 2. Quickly bolster moderate rebels The big question is that if the airstrikes weaken ISIS' grip on northern Syria, who will step in and take that territory. In his address Tuesday, Obama emphasized intensified U.S. efforts to train and equip more moderate Syrian rebels as "the best counterweight" to both ISIS and al-Assad. But many analysts are skeptical that the rebels will be in a position to make major inroads anytime soon. Congress only approved Obama's request to arm and train "appropriately vetted" rebel groups last week. U.S., Arab nations attack ISIS in Syria 13 photos 01 isis airstrikes 092502 isis airstrikes 092505 isis airstrikes03 isis airstrikes 092507 Syria attack obama 092302 syria attack 092303 syria attack 092305 syria attack 092304 syria attack 092301 syria attack 092306 syria attack10 syria attack 092311 syria attack 0914 EXPAND GALLERY What life is like inside ISIS stronghold What life is like inside ISIS stronghold 02:40 PLAY VIDEO What weapons are U.S. using? What weapons are U.S. using? 01:23 PLAY VIDEO Pentagon: ISIS fight will take years Pentagon: ISIS fight will take years 04:23 PLAY VIDEO Turning those groups into a force that can take on ISIS' feared fighters and al-Assad's military will take time. But the strikes against ISIS are happening now. 3. Manage a fragmented opposition Experts say that the rebels fighting for the Western-backed Free Syrian Army (FSA) lack a unified leadership. "Syria is a fragmented country, and most of these militias have a very town-centric quality. They're based on clan structures and regional structures," Joshua Landis, director of the Center for Middle East Studies at the University of Oklahoma, said in an interview with WBEZ earlier this month. "None of them have really developed a national scope, except for the Islamist ones, like al Qaeda and ISIS," he said. The sheer number of different militias across Syria -- estimated in the hundreds -- runs the risk of turning Syria into a patchwork of warlord fiefdoms. "If you just give them money without unifying them, you're going to get Somalia," said Landis. 4. Juggle unaligned objectives Keeping the rebels on board with American military objectives is also fraught with difficulty. The initial reaction from Syrian activists to the airstrikes Tuesday was a sense of relief that the U.S. had taken action against ISIS, CNN's Arwa Damon reported. But that was before it emerged that the strikes had also hit members of the al-Nusra Front, a terrorist organization that was nonetheless among the rebel groups resisting ISIS. That news, along with reports of civilian casualties, soured the mood among the activists, Damon reported, with apprehension growing on the ground about what intentions of the U.S. and its allies have for Syria. The focus on defeating ISIS may also be hard to stomach for many rebels. "We have to remember, the FSA wants to destroy Assad, not ISIS," Landis said. "They will destroy ISIS if America makes it contingent -- they don't like ISIS. But their goal, from the beginning, has been to fulfill this revolution. If their only object is to kill ISIS, many of them feel the revolution will be dead." 33 Fall of Assad is coming in the squo—that destroys Hezbollah power projection and influence Yacoubian 11 “Hezbollah After Assad,” Aug 20, 2014, Mona Yacoubian serves as Deputy Assistant Administrator for the Middle East Bureau https://www.foreignaffairs.com/articles/middle-east/2011-12-01/hezbollah-after-assad Hezbollah faces a moment of reckoning. The increasingly likely demise of Bashar al-Assad’s regime in Damascus would deprive the militant Lebanese Shia organization of one of its main patrons and could constrain its ability to play an active role in regional politics. Moreover, by offering up unbridled support for Syria, Hezbollah has placed itself at odds with the popular revolts that are unseating autocratic rulers across the Arab world, undermining the narratives of resistance and justice for the oppressed that it has long espoused. Facing the loss of a key ally and with its credibility compromised, an off-balance Hezbollah could turn inward, deepening its involvement in Lebanese politics in order to consolidate its power. Together with Iran, Hezbollah stands to lose the most from the fall of the Syrian regime. Over the years, the organization and the Assad regime have nurtured strong ties due to their often overlapping interests in Lebanon, a proxy arena for Western confrontation with Iran and Syria. The relationship deepened following Syria’s 2005 withdrawal from Lebanon, which forced Damascus to rely more heavily on Hezbollah to extend its influence in the country. Assad has reportedly supplied Hezbollah with training and access to sophisticated weapons systems, including long-range Scud missiles, on Syrian soil. Beyond its bilateral ties to Hezbollah, Damascus has also served as an important conduit for Iranian arms and played a bridging role between the Persian power and its Lebanese acolytes. Bound together by their shared hostility toward Israel, these three allies, together with Hamas, have formed a so-called axis of resistance to serve as a counterweight to more moderate forces in the region. Although Hezbollah’s relationship with Iran would endure without Assad, the alliance would lose an important center of gravity. Moreover, the instability in Syria has deepened sectarian divisions in Lebanon, which could further challenge Hezbollah. Lebanon’s Sunnis overwhelmingly support the Syrian opposition and have publicly demonstrated their outrage at Damascus’ repression; the ruling March 8 bloc, comprising Hezbollah, the Shia party Amal, and their Christian allies, has sided with Assad. Rival pro- and anti-Syrian rallies regularly occur in Beirut and in the northern city of Tripoli, where Sunni-Alawi clashes in June left several dead and required the Lebanese army to quell the violence. Although Hezbollah’s military predominance in Lebanon minimizes the prospects for renewed civil war, a surge in sectarian violence would significantly undermine its position. Hezbollah’s steadfast support for Assad has already dealt its credibility a severe blow, in Lebanon and across the region. Its pro-regime declarations stand in marked contrast to the group’s boisterous encouragement of every other popular uprising during the Arab Spring. Hassan Nasrallah, Hezbollah’s charismatic leader, was once a hero across the Arab world but now appears increasingly tone deaf as he struggles to defend Damascus against a growing chorus of Arab and Muslim condemnation. Established media outlets, such as al Jazeera, as well as Arab youth using social media sites, charge Nasrallah with hypocrisy and double standards. The revolt against Assad has put Iran and Hezbollah on the wrong side of Arab history, and has compromised their mantle as champions of the oppressed. No matter what happens in Syria, Hezbollah will retain its preeminent military and political role in Lebanon. But the likely end of the Assad regime poses an existential dilemma for the organization, accentuating the divide between its regional objectives of resisting the West and Israel and its local role in Lebanon as the representative of a once marginalized Shia community. The organization may need to recalibrate its priorities, choosing either to double down on its military objectives or evolve into a wholly political force and further develop as a grassroots movement with a vast political and social network. If Hezbollah goes with the first option, it would likely move quickly to consolidate its control over Lebanon, possibly using military force. Such a move might be precipitated by emboldened Sunni aggression toward Hezbollah or by other circumstances that threaten the organization and its weapons. But Hezbollah’s probable triumph in an armed struggle would be a pyrrhic victory, dramatically undermining its popular credibility in Lebanon and leaving the country highly unstable. Hezbollah might also choose to direct its militancy toward Israel. This could come as part of a broader struggle between Israel and Iran or as a result of escalating tensions between Israel and Hezbollah. Hezbollah is not likely to intentionally provoke another war with Israel; both sides have acknowledged that a third Israel-Lebanon war would be far more brutal, and encompass far more territory, than the one in 2006. But if either Israel or Hezbollah miscalculated and provoked a conflict, Hezbollah would be at a strategic disadvantage without a Syrian supply line and safe haven. War with Israel could rejuvenate Hezbollah’s resistance narrative, particularly if Israel used excessive force that produced massive civilian casualties. But Hezbollah would pay a significant price internally, particularly with its war-weary Shia constituency. 34 AT Hurts Privacy The program itself is incredibly reasonable and has built in safeguards to prevent widespread paranoia and civil liberties violations USDA, 2014, (“USDA Insider Threat Program,” Office of Homeland Security and Emergency Coordination (OHSEC), U.S. DEPARTMENT OF AGRICULTURE, June 30, 2014, http://www.ocio.usda.gov/sites/default/files/docs/2012/DR%204600003%20Insider%20Threat.htm)//erg The purpose of this directive is to set forth the U.S. Department of Agriculture’s (USDA) roles and responsibilities for an Insider Threat Program, as directed by Executive Order (EO) 13587 dated October 7, 2011, titled, Structural Reforms to Improve the Security of Classified Networks and Responsible Sharing and Safeguarding of Classified Information and the National Insider Threat Policy and the Minimum Standards issued in November 2012. 2. BACKGROUND The Secretary of Agriculture, under EO 13587, is mandated to develop and implement an Insider Threat Program with the primary mission to prevent, deter and detect compromises of classified information by malicious insiders. Although EO 13587 applies only to the safeguarding and sharing of classified national security information , the National Insider Threat Task Force (NITTF) recognizes that an agency may possess information that it considers sensitive but that is not classified. As stated in the NITTF’s Guide to Accompany the National Insider Threat Policy and Minimum Standards, issued in November 2013, the policies and standards under EO 13587 can be applied generally to protect the sensitive but unclassified environment. The National Insider Threat Policy and Minimum Standards require that the USDA addresses key components to be implemented: a. Establish a program for deterring, detecting, and mitigating insider threat;, security, information assurance, and other relevant functions and resources to identify and counter the insider threat; b. Establish an integrated capability to monitor and audit information for insider threat detection and mitigation. Critical program requirements include but are not limited to: (1) monitoring user activity on classified computer networks controlled by the Federal Government; (2) evaluation of personnel security information; (3) employee awareness training of the insider threat and employees' reporting responsibilities; and (4) gathering information for a centralized analysis, reporting, and response capability. c. Develop and implement sharing policies and procedures whereby the organization's insider threat program accesses, shares, and integrates information and data derived from offices across the organization, including security, information assurance, and human resources offices. d. Designate a senior official(s) with authority to provide management, accountability, and oversight of the organization's insider threat program and make resource recommendations to the appropriate agency official. e. Consult with records management, legal counsel, and civil liberties and privacy officials to ensure any legal, privacy, civil rights , or civil liberties issues (including use of personally identifiable information) are appropriately addressed. f. Promulgate additional department and agency guidance, if needed, to reflect unique mission requirements, but not inhibit meeting the minimum standards issued by the NITTF pursuant to this policy. g. Perform selfassessments of compliance with insider threat policies and standards; the results of which shall be reported to the Senior Information Sharing and Safeguarding Steering Committee (hereinafter Steering Committee). h. Enable independent assessments, in accordance with Section 2.1 (d) of Executive Order 13587, of compliance with established insider threat policy and standards by providing information and access to personnel of the NITTF. They exaggerate—the program itself protects liberties FAS No Date, (“National Insider Threat Policy,” http://www.fas.org/sgp/obama/insider.pdf)//erg 35 Executive Order 13587 directs United States Government executive branch departments and agencies (departments and agencies) to establish, implement, monitor, and report on the effectiveness of insider threat programs to protect classified national security information (as defined in Executive Order 13526; hereinafter classified information), and requires the development ofan executive branch program for the deterrence, detection, and mitigation of insider threats, including the safeguarding o f classified information from exploitation, compromise, or other unauthorized disclosure. Executive Order 12968 promulgates classified information access eligibility policy and establishes a uniform Federal personnel security program for employees considered for initial or continued access to classified information. Consistent with Executive Orders 13587 and 12968, this policy is applicable to all executive branch departments and agencies with access to classified information, or that operate or access classified computer networks; all employees with access to classified information, including classified computer networks (and including contractors and others who access classified information, or operate or access classified computer networks controlled by the federal government); and all classified information on those networks. This policy leverages existing federal laws, statutes, authorities, policies, programs, systems, architectures and resources in order to counter the threat of those insiders who may use their authorized access to compromise classified information. Insider threat programs shall employ risk management principles, tailored to meet the distinct needs, mission, and systems of individual agencies, and shall include appropriate protections for privacy, civil rights, and civil liberties. The Insider Threat Program has checks built into it to balance b/w preserving civil liberties and national security—protects whistleblowers, privacy and rights NCSC, ’14, (“National Insider Threat Task Force Mission Fact Sheet,” NCSC, Aug 15, 2014, http://www.ncsc.gov/nittf/docs/National_Insider_Threat_Task_Force_Fact_Sheet.pdf)//erg Is this insider threat emphasis going to infringe on anyone’s civil rights? Insider threat programs are developed and operated in coordination with an agency’s records management office, legal counsel, and civil liberties and privacy officials to build in protections against infringing upon employees’ civil liberties/civil rights, privacy or whistleblower protections. Departments and agencies are required to provide training in these areas to program personnel, as well as the general workforce. Department and agency heads also have a responsibility to ensure these protections are maintained through oversight of their insider threat programs. Insider threat programs target anomalous activities, not individuals. Additionally, government employees who handle classified information understand that, to hold a security clearance, they accept additional oversight of their workplace activities. Employees sign authorizations for the conduct of investigations to obtain and retain security clearances and there are warning banners on computers and in certain areas of facilities that alert people that they have less expectation of privacy. What harm can someone do to our government based on the unauthorized release of classified information? When classified information is divulged in an unauthorized manner outside the confines of the U.S. Government (USG) national security structure, that information can create situations that are harmful to U.S. interests and, in some cases, could be life-threatening . Classified information in the wrong hands can provide a unique and potentially dangerous advantage to those states and non-state actors whose interests are opposed to those of the United States. For example, the unauthorized release of classified information could: provide details about weapons systems we rely on to defend our country; expose our overseas intelligence operations and personnel; and identify critical vulnerabilities in the U.S. national infrastructure which, if exploited, could damage internal U.S. defense, transportation, health, financial, and/or communications capabilities. 36 The Insider Threat programs protects employees’ best interests NCSC, ’14, (“National Insider Threat Task Force Mission Fact Sheet,” NCSC, Aug 15, 2014, http://www.ncsc.gov/nittf/docs/National_Insider_Threat_Task_Force_Fact_Sheet.pdf)//erg Do all insider threats involve malicious individuals? It is critically important to recognize that an individual may have no malicious intent, but is in need of help. We have invested a tremendous amount in our national security workforce and it is in everyone’s best interests to help someone who may wrongly feel he or she has no other option than to commit an egregious act – such as espionage, unauthorized disclosure, suicide, workplace violence, or sabotage. Intervention prior to the act can save an employee’s career, save lives and protect national security information. There are also unwitting insiders who can be exploited by others. Our adversaries have become increasingly sophisticated in targeting U.S. interests, and an individual may be deceived into advancing our adversaries’ objectives without knowingly doing so. Is every agency required to implement the new minimum standards? Yes, taken together, the E.O. and the national policy mandate that every executive branch agency with access to there is a recognition of differing levels of risk—and, therefore, differing levels of protection required — classified information establish an insider threat program in line withstandardsandguidancefromtheNITTF. However, based on such things as size of cleared population, extent of access to classified computer systems, and amount of classified information maintained by the D/A. The national insider threat policy directs heads of D/As to developtheirprogramsusingriskmanagementprinciples. TheNITTFisworkingwithD/As,as well as the Classified Information Sharing and Safeguarding Office in the office of the Program Manager--Information Sharing Executive, to assess the extent of applicability of the minimum standards to each of the 70+ executive branch D/As with access to classified information based on associated risk. Observation and behavioral analysis don’t produce modern day Salem Winkler and Manke, ’14, (Ira, Irari Report, Secure Mentem, Internet Security Advisors Group and Samantha, Executive Vice President of Secure Mentem,” How to create awareness of the insider threat,” CSO, Apr 15, 2014, http://www.csoonline.com/article/2142603/securityleadership/how-to-create-awareness-of-the-insider-threat.html)//erg You must however avoid manifesting a modern day Salem. The focus of your guidance should be telling employees to look for behaviors that are clear violations of policies and procedures. Examples include observing people looking through other people’s desks, asking for passwords, being in areas that they do not belong, and attempting to access other people’s computer accounts. There are also financial and other wrongdoings related to job roles and industry sector. A more delicate, but just as important, aspect of awareness is for people to be comfortable reporting uncomfortable feelings. This is admittedly vague, but uncomfortable feelings have resulted in catching malicious insiders in a variety of incidents. In one case we are personally familiar with, an employee felt uncomfortable that one of her coworkers was speaking Chinese a lot on the telephone at work, and they did not work with any Chinese people. The woman reported the incident and an FBI investigation uncovered that the employee in question was funneling information to Chinese intelligence operatives. Everyone violates policies and procedures at some point in time, without malicious intent. However, people need to know that some of the most harmful incidents were stopped because of observant employees. Again though, the focus is on reporting of incidents, and not of the individuals committing the violations. This is important for a wide variety of reasons. The action that employees need to take is to simply report the questionable incidents to Human Resources, their management or the security team. However, you need to remember to allow for anonymous reporting and have strong measures in place to protect the identity of the employee reporting the incident. Reporting another employee can clearly result in negative consequences for all 37 involved. The anonymity is critical even if it potentially means that it is impossible to gather criminal evidence. The goal is to detect incidents and stop the loss. Most organizations should already have an established incident reporting structure. Those that do not should consult with the legal and human resources departments to create one. Clearly, when trying to motivate employees to inform the organization about the violations of other employees, you should get the Human Resources and Legal departments involved in at least approving the awareness materials that are distributed. They very likely will be able to provide guidance on how to best implement other aspects of the program as well. [Insider threats and how they can be mitigated] Snowden's activities triggered an interest in organizations to examine what technological controls that they can put in place to stop their own Snowden. Yet much like NSA realized that Snowden’s coworkers should have detected his crimes, all organizations must proactively strengthen their non-technical security measures, including especially awareness. Snowden’s coworkers should have been able to more effectively detect his actions than any technical countermeasure could have. Therefore, companies that are truly interested in preventing the insider threat should focus on making their employees the primary detectors of insider abuse . The insider threat is too important a subject to shy away from, no matter how sensitive the implications may be. Unfortunately, history has shown us that the risk is too great. Agencies are focusing on collecting electronic data—no “workplace” impact/overwhelmed filers Davenport, ’14, (Christian, has served as an editor on the Metro desk and as a reporter covering military affairs, Post author, “Federal agencies embrace new technology and strategies to find the enemy within,” Washington Post, March 7, 2014, http://www.washingtonpost.com/business/economy/federal-agencies-embrace-newtechnology-and-strategies-to-find-the-enemy-within/2014/03/07/22ce335e-9d87-11e3-9ba6800d1192d08b_story.html)//erg After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence strategies at their own employees to root out spies, terrorists or leakers. Agencies are now monitoring their computer networks with unprecedented scrutiny, in some cases down to the keystroke, and tracking employee behavior for signs of deviation from routine. At the Pentagon, new rules are being written requiring contractors to institute programs against “insider threats,” a remarkable cultural change in which even workers with the highest security clearances face increased surveillance. The “if you see something, say something” mind-set of the post-9/11 world has fully arrived in the workplace, with new urgency following high-profile leaks such as the revelations of former National Security Agency contractor Edward Snowden. “People’s sensitivity to this has changed substantially,” said Lynn Dugle, president of a Raytheon business unit that markets an insider threat detection system called SureView. “I can tell you five years ago, when we were talking to agencies or companies about insider threat, we would normally be talking to (chief information officers) who were under budget stress. . . . And that was a very tough sell. Now we see boards of directors and CEOs really understanding what the threat can mean to them, and the risk it poses to them.” In response to the breach by former Army intelligence analyst Pfc. Bradley Manning, President Obama in 2011 issued an executive order that established a National Insider Threat Task Force and required all federal agencies that handle classified material to institute programs designed to seek out saboteurs and spies. While corporate security has long been part of Beltway culture, the heightened focus and the emergence of new monitoring technology touched off a burgeoning industry. In addition to Raytheon, Lockheed Martin has developed an insider-threat detection service, as have several start-ups in the Washington area. Even Booz Allen Hamilton, which faced national embarrassment when Snowden, one of its employees, walked off with some of the country’s most guarded secrets, counsels its clients on how to detect rogue employees. A recent job posting said the company was looking for an “insider threat analyst,” which required a security clearance and more than five years of experience in counterintelligence. The posting spread on the Web and sparked ridicule over the notion that the company that employed Snowden was now looking to help turn the historic breach into a profitable lesson learned. Raytheon’s SureView program allows agencies to create all sorts of internal alerts indicating when something may be amiss. A company could, for example, program the software to detect whenever a file containing the words “top secret” or “proprietary” is downloaded, e-mailed or moved from one location on the system to another. Once that wire is tripped, an alert almost immediately pops up on a security analyst’s monitor, along with a 38 digital recording of the employee’s screen. All the employee’s actions — the cursor scrolling over to open the secure file, the file being copied and renamed — can be watched and replayed, even in slow motion. It’s the cyber equivalent of the security camera that records robbers sticking up a convenience store. Lockheed Martin provides a service called Wisdom, which acts as “your eyes and ears on the Web,” according to a company official. At its broadest use, the service can monitor mountains of data on the Web — Facebook, Twitter, news sites or blogs — to help predict everything from a foreign coup or riot to political elections. But it can also be turned inward, at employees’ online habits, to predict who within the organization might go rogue. Counterintelligence officials use Wisdom to “evaluate employee behavior patterns, flagging individuals who exhibit high risk characteristics,” the company says in a brochure. “I like to think of it as a digital intuition that is being developed,” said Jason O’Connor, Lockheed’s vice president for analysis and mission solutions. A trade-off for companies The market is much broader than the defense and intelligence industries. It extends to hospitals, which need to protect patients’ information; retailers, which hold customers’ credit card numbers; and financial institutions. Some worry that the programs are an overreaction to a relatively rare threat that will do more to hinder the free flow of information than to deter crime, while creating repressive working environments. Despite the soon-to-come federal mandate, many defense contractors have “already implemented fairly imposing controls to minimize the unauthorized use of data,” said Loren Thompson, a defense industry consultant who has worked with Lockheed Martin and other contractors. But he warned that this “clearly is a trade-off in which values like efficiency and collaboration will be sacrificed in order to reduce the likelihood of internal wrongdoers from succeeding.” After Sept. 11, many agencies were criticized for not sharing sensitive information that could have prevented the attacks, so steps were taken to consolidate data within the government. Thompson fears the current climate of worry about Snowden-like leaks could lead to a return to the old habits, with key information once again compartmentalized. “Insider threats are a real problem, but mandating a particular standard for all contractors will cost huge amounts of money and quite possibly result in the wrong steps being taken,” he said. In addition to the cases that have made headlines worldwide, there are an untold number of incidents in the broader corporate world where insiders wreak havoc — from the systems administrator at what was then UBS Paine Webber who planted a “logic bomb” on the company’s network, to the Chinese national who was convicted of stealing trade secrets from Ford Motor Co. Tech systems protect against privacy violations while monitoring sensitive databases Davenport, ’14, (Christian, has served as an editor on the Metro desk and as a reporter covering military affairs, Post author, “Federal agencies embrace new technology and strategies to find the enemy within,” Washington Post, March 7, 2014, http://www.washingtonpost.com/business/economy/federal-agencies-embrace-newtechnology-and-strategies-to-find-the-enemy-within/2014/03/07/22ce335e-9d87-11e3-9ba6800d1192d08b_story.html)//erg ‘Looking at the patterns’ Chris Kauffman, the founder and chief executive of Personam, a McLean company that focuses entirely on insider threats, said programs can “assess insider threatening behaviors without breaching the employee’s privacy.” “There’s always the concern of the Orwellian overseers watching everything we’re doing. But we’re very sensitive to that,” he said. “We evaluate the activities and the transactions over the networks. Which Web sites they go to, which file servers they go to. But what we don’t do is absorb the content of that data. We don’t read e-mails or chats or texts. Or even the content of the Web sites they go to. We’re looking at the patterns they use.” MITRE, a not-for-profit research and development company, did a study in 2009 where it asked some of its own employees to try to access sensitive information on its own network. In addition to assessing the network’s strength, the company wanted to “study evasiveness,” said Deanna Caputo, MITRE’s principal behavioral psychologist. “We wanted to see what good guys gone bad would look like.” Working under a grant from the Defense Advanced Research Projects 39 Agency, the Pentagon’s research arm, Georgia Tech computer scientists have worked to develop software that can detect a rogue employee even before he or she has broken bad. “When a soldier in good mental health becomes homicidal or a government employee abuses access privileges to share classified information, we often wonder why no one saw it coming,” said a Georgia Tech news release. All this corporate scrutiny doesn’t necessarily bother groups that advocate for privacy protections. When it comes to using a government or corporate network, employees often do not have expectations of privacy, especially if they are dealing with classified information, said Ginger McCall, an associate director at the Electronic Privacy Information Center. “ I think there is an important distinction between monitoring a person’s personal e-mails and monitoring access to sensitive databases ,” she said. And since so much information about ordinary Americans is contained on government and corporate databases, there are benefits to making sure they are protected and under constant surveillance. “We would want to know if someone at the FBI is accessing a database on a person when they shouldn’t be,” she said. Michael Crouse, Raytheon’s director of insider threat strategies, said such programs help agencies “trust but verify.” “We trust our privileged users,” he said. “But what we’re seeing is that you can verify that they are doing the work that is assigned to their role.” It’s sort of like a big factory, he said, “where the foreman is looking down on the factory floor making sure everyone is doing their job.” 40 Groupthink Advantage 41 1NC — Groupthink Advantage No nuclear war Shukla 15 - Vikas is a reporter and value investor. He has an MBA in finance and a deep interest in tech, science and politics (Vikas, “Russia-US Tension Over Ukraine Won’t Lead To Nuclear War”, valuewalk.com, May 15, 2015, http://www.valuewalk.com/2015/05/russia-ustension-nuclear-war/) JC In February, Russia was rated among the most unfavorable countries by Americans in a Gallup poll. Tensions between the U.S. and Russia have escalated over the Ukraine crisis. The United States as accused Russia of backing separatists in eastern Ukraine. But there is no threat of a nuclear war between Moscow and Washington, says a senior U.S. State Department official. In an interview with Russia’s Kommersant newspaper, Rose Gottemoeller, the Under Secretary of State for Arms Control and International Security for the US State Department, said that the White House did not believe the Ukrainian conflict would trigger a nuclear crisis. Though the two countries have different opinions regarding the Ukraine crisis, neither Russia nor the U.S. desire to use nuclear weapons to back up their arguments. Gottemoeller told the Russian newspaper that the two countries have a "stable relationship" on nuclear issues. The State Department official added that the two countries have taken a series of steps over the past few decades to reduce their nuclear arsenal. Gottemoeller's statement comes as many other security experts have proclaimed that Russia and the U.S. are heading towards a nuclear war. Obama resists groupthink Hughes 14 [Brian Hughes, “Obama warns against 'groupthink' in government,” Washington Examiner, 9/24/14 6:26 PM, pg. http://tinyurl.com/oq3q6mm President Obama at a government transparency meeting at the United Nations General Assembly Wednesday advised fellow world leaders to heed the criticisms of their citizens to avoid “groupthink” in government. “All governments think they’re doing what’s right and don’t like criticism,” Obama said at the Open Government Partnership Event in New York City. “It’s shocking to say that all not criticism from civil society is always fair. But, as leaders, making our governments more open does mean that as a consequence of that criticism, there’s self-reflection. It means that questions were asked that might not have otherwise been answered, and that groupthink doesn’t develop inside a government.” Turn: Political resolve key to deterring Russia Stephens 14 - Columnist on politics, global affairs and economics @ Financial Times [Philip Stephens, “Europe needs a cold war lesson in deterrence,” Financial Times, July 24, 2014 5:51 pm, pg. http://tinyurl.com/nr69amw There is nothing to be gained from another cold war, even if it is evident that Vladimir Putin wants to tear up the post-communist settlement in Europe. There are, however, lessons to be 42 rescued from the decades-long confrontation with the Soviet Union. One of them is about deterrence. Politicians sedated by hopes of a world organised around international collaboration will have to wake up again to the dynamics of great power rivalry. Francis Fukuyama was half right in declaring the end of history. Capitalism reigns supreme, but rising states such as China and declining ones such as Russia have found a new political model. Authoritarian capitalism, as the Harvard scholar Michael Ignatieff called it in this summer’s Ditchley Foundation annual lecture, presents them with an alternative to liberal democracy. As for a rules-based global system, these states prefer to dine à la carte. They take what they like and reject what is inconvenient. Europeans have been slow to recognise the world as it is rather than as they imagined. The reaction to Russia’s march into Ukraine has made this painfully obvious. The reflex has been to seek to defuse the crisis. On one level this is admirable – war did not solve much in Iraq and Afghanistan. The snag is that ceding ground to Mr Putin does not amount to de-escalation. To the contrary, weakness stokes the Russian president’s expansionism. The west’s priority – and the downing by Russian-backed insurgents of Malaysia Airlines flight MH17 provides an opportunity – should be to recover the concept of deterrence. Not the nuclear deterrence of mutually assured destruction but the traditional understanding that political resolve and a readiness to deploy force can apply a brake. The mistake many Europeans have made – and, to a lesser degree, Barack Obama’s White House has done the same – is to confuse deterrence with escalation. I cannot count the times I have heard politicians and policy makers say they must tread carefully for fear of provoking Mr Putin. Some of these protestations are self-serving – what these people really mean is that they do not want to jeopardise economic relationships. But there seems also to be a genuine misunderstanding about the purpose of deterrence. Imposing sanctions on Moscow will not of itself persuade Mr Putin to pull out of Ukraine. It might persuade him to think twice before marching his army into other Russian-speaking territories. To be effective, deterrence has above all to be credible. The potential adversary has to believe that aggression will provoke proportionate retaliation, whether economic or, as a last resort, military. The sanctions imposed on Moscow by the EU have been anything but credible. Washington has gone further, but not far enough to signal serious intent. What Mr Putin has seen of a divided west tells him it is bluffing. He will take sanctions seriously when he sees that those threatening them are ready to bear the costs. Turn: Perceived decline in our readiness to fight encourages Russian aggression and escalation Olson 14 – Reporter for Stars and Stripes [Wyatt Olson, “Military’s reduced readiness seen as emboldening China, Russia,” Stars and Stripes, Published: May 20, 2014, pg. http://tinyurl.com/n6vq7zr “The U.S. certainly retains an ability to project an awful lot of air and sea power for more limited contingencies — and do so very quickly,” said Anthony Cordesman, a defense expert at the bipartisan Center for Strategic and International Studies in Washington, D.C. 43 And even if U.S. forces did become embroiled in Pacific confrontations such as those unfolding in Vietnam and the Philippines, they aren’t the kind of interventions that demand huge followup forces, he said. Cordesman cautioned against equating these kinds of skirmishes with a potential outbreak of hostilities on the Korean peninsula because the U.S. is prepared and willing to match escalation there, he said. “You’re not going to go to general war over an [exclusive economic zone] or a reef somewhere in the Pacific,” he said. Still, Cordesman admitted, irrational behavior and miscalculations by adversaries can quickly lead to escalation and “the need for putting many more follow-on forces in the field over time.” Some experts say that flagging readiness — real or perceived — actually invites escalation by weakening America’s “deterrent effect” as China and Russia continue beefing up their Pacific forces. In congressional testimony, top-ranking military chiefs have already warned that readiness is deteriorating, partly because of cuts from last year’s sequester at a time the military is struggling to refit and retrain after a decade of wars in Iraq and Afghanistan. Gen. Curtis Scaparrotti, commander of U.S. forces in South Korea, testified before a Senate subcommittee in March that he was concerned about the readiness of “follow-on forces” that would be required should the peninsula enter crisis. Marine Corps Commandant Gen. John Amos told the same committee last fall that budget cuts leave “fewer forces, arriving less-trained, arriving later in the fight.” Reduced readiness cuts two ways, said Todd Harrison, a defense expert with the nonpartisan Center for Strategic and Budgetary Assessments in Washington, D.C. “I think this reduction in readiness that we’re looking at will reduce our confidence in the ability of our military to intervene successfully if called upon,” he said. “That may weaken the deterrent effect on potential adversaries, but it could also create a situation where we selfdeter.” Dakota Wood, a defense expert at the conservative Heritage Foundation in Washington, D.C., said that America’s current budget and readiness woes do not go unnoticed by China and Russia. “There’s this deterrent value in being strongly forward, being strongly postured and having the perception that not only are your forces ready for action, but that the government in the U.S. is willing to press that case if it comes to it. “When it comes to China, we are seeing increasing aggressiveness in trying to push forward their territorial claims in the East and South China Seas. “China is likely viewing this as a window of opportunity to aggressively press its claims in these waters, and the U.S. is not well postured to come to the assistance of friends and allies in the region.” Wood described this “pattern of conduct” as “taking small bites of an apple,” which over time will consume it. “So each one of these little actions is below the threshold that would invite a large-scale conventional military response,” he said. “But they’re willing and able to take these small bites because they know the U.S., by this series of incidents, is unwilling to press the case.” 44 Terrence K. Kelly director of the Strategy and Resources Program at the RAND Corporation, said that individual skirmishes such as these might seem insignificant. But over time countries such as China and Russia can achieve their goals by “nibbling away” with “subresponse-level” aggression, Kelly said. “It’s probably calculated to slowly over time achieve an effect that won’t elicit a military response from the U.S. or its allies,” he said. Cordesman said, however, that even a modest U.S. intervention could lead to unintended escalation. “The problem is that the United States responding — even if it solves one small, short-term problem — may lead to the other side responding in ways that again produce a steady pattern of escalation,” Cordesman said. 45 Ext Shukla – No US Russia war No war over Ukraine – expert consensus proves Koplowitz 15 - graduated from the SUNY-Albany, where he received a bachelor's degree in political science and minored in journalism. And he reports on crime and breaking news events for International Business Times ( Howard, “US And Russia Going To War? Ukraine Crisis May Lead To Military Conflict, Mikhail Gorbachev Warns, Others Not So Sure”, ibtimes.com, January 29, 2015, http://www.ibtimes.com/us-russia-going-war-ukraine-crisis-may-lead-militaryconflict-mikhail-gorbachev-warns-1798992) JC While Gorbachev, the Soviet Union's head of state from 1988 until its dissolution in 1991, warned of war, most academics surveyed in a snap poll released Sunday don’t envision the U.S. and Russia going to war in the next decade. On a scale of zero to 10, with zero meaning no likelihood of going to war and 10 meaning high likelihood, a plurality of scholars -- 23 percent -- rated the chance at 2. Nearly 20 percent rated the chances as a 3, another 20 percent as a 1 and about 12 percent said there was zero chance, according to the poll conducted by the Teaching, Research and International Policy Project at the Institute for the Theory and Practice of International Relations at the College of William & Mary in Virginia. Only .14 percent of scholars rated the chances of war at a 10. A plurality of scholars also disagreed that the U.S. and Russia were heading back toward a new cold war. More than 48 percent, or 273 scholars, said that was the case, while 38 percent said the two countries are heading back toward a cold war and about 13 percent weren’t sure. The U.S won’t go to war over Ukraine – multiple warrants prove Peck 14 - contributing editor for Foreign Policy Magazine, a writer for the War is Boring defense blog and of course a contributor at Forbes ( Michael, “7 Reasons Why America Will Never Go To War Over Ukraine”, forbes.com, March 5, 2014, http://www.forbes.com/sites/michaelpeck/2014/03/05/7-reasons-why-america-will-never-goto-war-over-ukraine/) JC America is the mightiest military power in the world. And that fact means absolutely nothing for the Ukraine crisis. Regardless of whether Russia continues to occupy the Crimea region of Ukraine, or decides to occupy all of Ukraine, the U.S. is not going to get into a shooting war with Russia. This has nothing to do with whether Obama is strong or weak. Jimmy Carter or Ronald Reagan would face the same constraints. The U.S. may threaten to impose economic sanctions, but here is why America will never smack Russia with a big stick: Russia is a nuclear superpower. Russia has an estimated 4,500 active nuclear warheads, according to the Federation of American Scientists. Unlike North Korea or perhaps Iran, whose nuclear arsenals couldn’t inflict substantial damage, Russia could totally devastate the U.S. as well as the rest of the planet. U.S. missile defenses, assuming they even work, are not designed to stop a massive Russian strike. For the 46 years of the Cold War, America and Russia were deadly rivals. But they never fought. Their proxies fought: Koreans, Vietnamese, Central Americans, Israelis and Arabs. The one time 46 that U.S. and Soviet forces almost went to war was during the Cuban Missile Crisis. Neither Obama nor Putin is crazy enough to want to repeat that. Russia has a powerful army. While the Russian military is a shadow of its Soviet glory days, it is still a formidable force. The Russian army has about 300,000 men and 2,500 tanks (with another 18,000 tanks in storage), according to the “Military Balance 2014″ from the International Institute for Strategic Studies. Its air force has almost 1,400 aircraft, and its navy 171 ships, including 25 in the Black Sea Fleet off Ukraine’s coast. U.S. forces are more capable than Russian forces, which did not perform impressively during the 2008 Russo-Georgia War. American troops would enjoy better training, communications, drones, sensors and possibly better weapons (though the latest Russian fighter jets, such as the T-50, could be trouble for U.S. pilots). However, better is not good enough. The Russian military is not composed of lightly armed insurgents like the Taliban, or a hapless army like the Iraqis in 2003. With advanced weapons like T-80 tanks, supersonic AT-15 Springer anti-tank missiles, BM-30 Smerch multiple rocket launchers and S-400 Growler anti-aircraft missiles, Russian forces pack enough firepower to inflict significant American losses. Ukraine is closer to Russia. The distance between Kiev and Moscow is 500 miles. The distance between Kiev and New York is 5,000 miles. It’s much easier for Russia to send troops and supplies by land than for the U.S. to send them by sea or air. The U.S. military is tired. After nearly 13 years of war, America’s armed forces need a breather. Equipment is worn out from long service in Iraq and Afghanistan, personnel are worn out from repeated deployments overseas, and there are still about 40,000 troops still fighting in Afghanistan. The U.S. doesn’t have many troops to send. The U.S. could easily dispatch air power to Ukraine if its NATO allies allow use of their airbases, and the aircraft carrier George H. W. Bush and its hundred aircraft are patrolling the Mediterranean. But for a ground war to liberate Crimea or defend Ukraine, there is just the 173rd Airborne Brigade in Italy, the 22nd Marine Expeditionary Unit sailing off Spain, the 2nd Stryker Cavalry Regiment in Germany and the 82nd Airborne Division at Fort Bragg, North Carolina. While the paratroopers could drop into the combat zone, the Marines would have sail past Russian defenses in the Black Sea, and the Stryker brigade would probably have to travel overland through Poland into Ukraine. Otherwise, bringing in mechanized combat brigades from the U.S. would be logistically difficult, and more important, could take months to organize. The American people are tired. Pity the poor politician who tries to sell the American public on yet another war, especially some complex conflict in a distant Eastern Europe nation. Neville Chamberlain’s words during the 1938 Czechoslovakia crisis come to mind: “How horrible, fantastic, incredible it is that we should be digging trenches and trying on gas-masks here because of a quarrel in a far away country between people of whom we know nothing.” America‘s allies are tired. NATO sent troops to support the American campaign in Afghanistan, and has little to show for it. Britain sent troops to Iraq and Afghanistan, and has little to show for it. It is almost inconceivable to imagine the Western European public marching in the streets to demand the liberation of Crimea, especially considering the region’s sputtering economy, which might be snuffed out should Russia stop exporting natural gas. As for military capabilities, 47 the Europeans couldn’t evict Libyan dictator Muammar Gaddafi without American help. And Germans fighting Russians again? Let’s not even go there. 48 Ext Hughes 14 – No Obama groupthink Their internal link is theoretically flawed Badie 10 — Dina Badie, Assistant Professor of Politics and International Studies at Centre College KY and Ph.D. at the University of Connecticut, expert in international relations and security and American foreign policy in the Middle East and Asia, 2010 (“Groupthink, Iraq, and the War on Terror: Explaining US Policy Shift toward Iraq,” Foreign Policy Analysis Journal p.277296, 2010, Available online at http://onlinelibrary.wiley.com/doi/10.1111/j.17438594.2010.00113.x/pdf , accessed 7/7/15, J.L.) Janis's work on groupthink incited much interest and criticism. The original formulation failed to position groupthink within the socio-psychological literature, resulting in an incomplete explanation of its emergence and its mechanism. Longley and G Pruitt (1980) recognized this lack of determinacy. They argue that some of Janis's "symptoms" were in fact antecedents and that a causal link could not be established between groupthink and its preconditions. Longley and Pruitt recognized that groups eventually bring an end to the deliberative process in order to make a decision; a lack of deliberation does not in itself indicate the presence of groupthink. They instead argue that the timing of the end to deliberation depends on the nature of the decision, whether a major foreign policy or a routine task. Other critics of groupthink sought to offer alternative explanations to small group dynamics that extended "beyond groupthink." Hoyt and Garrison (1997) recognize that within the context of small groups, individuals can "manipulate" the decision-making process on several levels. Manipulation can take place in the traditional sense whereby individuals can alter procedural norms, but can also take the form of structural manipulation through deliberate inclusion and exclusion of individuals (1997:252). Additionally, individuals can manipulate the deliberative process through direct influence; the success of individual manipulation is determined by the individual's likeability, acceptance of his/her authority, perception of expertise, or recognition of the efficacy of the strategy (1997:258). As Hoyt and Garrison propose, the effects of manipulation may, in some cases, offer an alternative to groupthink. Group think theory is flawed — lack of studies Griffin 91 — Em Griffin, professor in the Communication department at Wheaton College, author of “A First Look,” 1991 (“CRITIQUE: AVOIDING UNCRITICAL ACCEPTANCE OF GROUPTHINK,” A First Look at Communication Theory First Edition, McGraw-Hill, 1991, available online at http://highered.mheducation.com/sites/dl/free/0073010189/228 359/groupthink2.html , accessed 7/10/15) JL Janis calls for greater critical assessment of proposals lest they be adopted for reasons other than merit. Since his description of groupthink has received great popular approval—perhaps because we’re fascinated with colossal failure, it seems only fair to note that efforts to validate the theory have been sparse and not particularly successful. Most students of groupthink pick a high-profile case of decision making where things went terribly wrong and then use Janis’s model as a cookie cutter to analyze the disaster—much as I’ve done with the Challenger and New Era. They seem to take the existence of groupthink for granted and employ the theory to warn against future folly or suggest ways to avoid it. This 49 kind of retrospective analysis is great for theory construction, but provides no comparative basis for accepting or rejecting the theory. For example, is the lack of evidence that NASA managers formed a cohesive in-group when they approved the Challenger launch a good reason to drop or revise the theory? Or does my report of extensive "due diligence" of New Era invalidate the claim that groupthink was a reason so many people fell for the fraud? Janis thought it made sense to test the groupthink hypothesis in the laboratory prior to trying to prove it in the field.19 His suggestion is curious, however, because a minimal test of his theory that controls for the antecedent conditions shown on the left side of Figure 18.2 would require over 7000 willing participants.20 As it is, the few reported groupthink experiments have tended to focus on cohesiveness—a quality that’s hard to create in the laboratory. The results are mixed at best. Janis’s quantitative study of nineteen international crises is problematic as well. When he and two co-authors linked positive outcomes with high-quality decision-making procedures during international crises, they never assessed the cohesiveness of the groups in charge.21 50 Ext Olson 14 – Readiness prevents war US readiness is key to halt Russian attacks on Ukraine. The entire architecture of European security is at risk Stephens 14 – Associate editor of the Financial Times [Philip Stephens (Fulbright Fellow and winner of the 2002 David Watt Prize for outstanding political journalism), “Europe needs a cold war lesson in deterrence,” Financial Times, July 24, 2014 5:51 pm, pg. http://tinyurl.com/prfj6kq Europeans have been slow to recognise the world as it is rather than as they imagined. The reaction to Russia’s march into Ukraine has made this painfully obvious. The reflex has been to seek to defuse the crisis. On one level this is admirable – war did not solve much in Iraq and Afghanistan. The snag is that ceding ground to Mr Putin does not amount to de-escalation. To the contrary, weakness stokes the Russian president’s expansionism. The west’s priority – and the downing by Russian-backed insurgents of Malaysia Airlines flight MH17 provides an opportunity – should be to recover the concept of deterrence. Not the nuclear deterrence of mutually assured destruction but the traditional understanding that political resolve and a readiness to deploy force can apply a brake. The mistake many Europeans have made – and, to a lesser degree, Barack Obama’s White House has done the same – is to confuse deterrence with escalation. I cannot count the times I have heard politicians and policy makers say they must tread carefully for fear of provoking Mr Putin. Some of these protestations are self-serving – what these people really mean is that they do not want to jeopardise economic relationships. But there seems also to be a genuine misunderstanding about the purpose of deterrence. Imposing sanctions on Moscow will not of itself persuade Mr Putin to pull out of Ukraine. It might persuade him to think twice before marching his army into other Russian-speaking territories. To be effective, deterrence has above all to be credible. The potential adversary has to believe that aggression will provoke proportionate retaliation, whether economic or, as a last resort, military. The sanctions imposed on Moscow by the EU have been anything but credible. Washington has gone further, but not far enough to signal serious intent. What Mr Putin has seen of a divided west tells him it is bluffing. He will take sanctions seriously when he sees that those threatening them are ready to bear the costs. European hesitation has ceded to the Kremlin control of the public debate. The annexation of Crimea overturned the cardinal pillar of European security since 1945: states cannot extend their territory by force of arms. As such, Russia’s action represents a profound threat to the security of the continent. Yet to listen to the discussion in some European capitals is to wonder if Mr Putin is not among the victims. Nato has a chance to remedy this when its leaders hold a summit in Newport, Wales, in September. The gathering had been intended as a stocktaking exercise after the alliance’s planned withdrawal from Afghanistan. The imperative now is to restore NATO as a solid guardian of the post-1945 security order. Many of the things the alliance needs to do are practical. They are set out persuasively in a report published this week by the think-tank Chatham House. Nato needs to find ways of working in groupings smaller than the full membership of 28. The alliance should extend the 51 interoperability of forces and improve planning and burden-sharing. Governments badly need to re-explain to their electorates why Nato is vital for their security. Jihadis are not the only threat. The big danger, though, lies in the credibility deficit. Seen from Moscow, Nato looks like two-tier alliance. No one doubts its resolve to defend, say, Germany, but does the Article 5 guarantee of collective security apply equally to the states that joined after the collapse of communism? Would the US – or Britain, France, or Italy – really resist if Mr Putin turned his attention to “protecting” the Russian-speaking people of the Baltics? If the answer is no, the alliance is worthless. The best way to make sure the commitment is never tested is to make it credible. That can be done by stationing sufficient “tripwire” forces in the east to persuade Mr Putin that a robust response to aggression would be unavoidable. The heavy lifting, as ever, will have to be done by the US. Europe has depended since 1945 on Washington’s security guarantee and events in Ukraine suggest that is not about to change. But Europeans cannot forever be reluctant partners in their own defence. The way to avoid war is to deter aggressors. 52 No Groupthink Organization electronic detection protocols check and prevent groupthink Lewellen et al ’13, (Todd Lewellen, George J. Silowash, Daniel Costa, “Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time,” Software Engineering Institute, October 2013, http://resources.sei.cmu.edu/asset_files/TechnicalNote/2013_004_001_64688.pdf)//erg We define a malicious insider as a current or former employee, contractor, or business partner with all three of the following attributes: • has or had authorized access to an organization’s network, system, or data • intentionally exceeded or misused that access • negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems Malicious insiders are able to act within an organization by taking advantage of weaknesses they find in systems. Organizations must be aware of such weaknesses and how an insider may exploit them. Organizations must also be aware of the many ways in which weaknesses are introduced. For example, an organization may have relaxed or nonexistent acceptable-use policies for internet access. In other cases, a lack of situational awareness introduces weaknesses that malicious insiders can exploit. Additionally, an organization that allows its employees to use web-based services, such as email, increases the potential for data leakage. Establishing proper auditing policies and technical controls, as discussed in this technical note, mitigates some of these risks. Our research has revealed that most malicious insider crimes fit into one of three categories: information technology sabotage, theft of intellectual property (IP), and fraud. This technical note focuses on the theft of information using web-based services, in particular, email accessed through a web browser using the HTTP protocol and encrypted with SSL. The tools and techniques presented in this technical note represent only a subset of practices an organization could implement to mitigate insider threats. For example, organizations may wish to deploy commercially available software to prevent data loss. These tools and methods can be used by organizations of any size. We intentionally selected open source and public-domain tools since they are freely available to the public. 2.1 TheMan-in-The-Middle(MiTM)Proxy This report builds on the previously published technical note, Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection [Silowash 2012]. Those wishing to implement the capabilities discussed in this report will need to be familiar with the prior technical note and will need to have configured their environment accordingly. This technical note will leverage the existing work by implementing an additional ICAP server to perform additional content scanning of attachments and text entered into web pages to determine if IP is being exfiltrated. 2.2 TheInspectionProcess In the prior technical note, Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection, a Squid proxy server, C-ICAP, and ClamAV are used to inspect CMU/SEI-2013-TN-008 | 2 both clear text and encrypted web sessions for the presence of documents that may contain keywords or are tagged with hidden metadata [Silowash 2012]. Expanding on this, the CERT® Insider Threat Center developed an additional tool for inspecting documents. This tool leverages the GreasySpoon ICAP server1 and Apache Lucene2. According to the Apache Software Foundation, “Apache LuceneTM is a high-performance, full-featured text search engine library written entirely in Java. It is a technology suitable for nearly any application that requires full-text search, especially cross-platform” [Apache 2012]. The CERT Insider Threat Center developed an agent that resides on the GreasySpoon ICAP server. This agent is written in Java and monitors a given directory of IP. When a new file is created, updated, or deleted, the agent reads the file and updates Lucene’s index. When a user uploads a document to a web-based service such as Gmail, Yahoo Mail, or Facebook, or pastes text into an online form, the document or text is compared to the indexed library of IP. If the document or text matches any of the IP above an organizationally defined threshold, the connection is blocked. Because Squid allows for the simultaneous use of multiple ICAP servers, this approach can be used with the document tagging and keyword detection capabilities discussed in the prior technical note. 53 AT Russia Scenario The US is gearing up to fight Russia now – the aff cant resolve this Bandow 6/24 (Doug, Senior Fellow at the Cato Institute and a former Special Assistant to President Ronald Reagan, “Washington Confronts Russia over Ukraine: Yet Europeans Won’t Protect Themselves from Vladimir Putin,” http://www.cato.org/publications/commentary/washington-confronts-russia-over-ukraine-yet-europeans-wont-protect)//RTF Europe is at risk, we are told. Russia’s assault on Ukraine threatens the post-Cold War order. Moscow may follow up with similar attacks on Moldova and even such NATO members as Estonia, Latvia, and Lithuania. But no one in Europe seems to care. Even the countries supposedly in Vladimir Putin’s gun sites aren’t much concerned. No one is bolstering their military. And the European people oppose taking any military risks to help their neighbors. Unfortunately, the Ukraine crisis is likely to continue for some time. The allies hope sanctions will bring Moscow to heel, but the Pew Research Center found that 88 percent of Russians backed Vladimir Putin’s foreign policy, the highest number since Pew started polling in 2003. At least Putin, though no friend of the West, is no fool. He recently opined: “only an insane person and only in a dream can imagine that Russia would suddenly attack NATO.” But if Putin changes his mind, the Europeans don’t plan on defending themselves. Instead, virtually everyone expects America to save them, if necessary. Washington is being played for a sucker as usual. Defense Secretary Ashton Carter is visiting Europe this week. On Monday while observing exercises by NATO’s new rapid response force he announced that the U.S. will contribute aircraft, weapons, and personnel to the “Very High Readiness Joint Task Force.” Americans will provide intelligence, logistics, reconnaissance, and surveillance support. That’s not all. Separately, the Obama administration plans to pre-position tanks and other equipment for a combat brigade in seven nations in Eastern Europe. James Stavidis, a former NATO commander, now dean of the Fletcher School at Tufts, said this “provides a reasonable level of reassurance to jittery allies.” Carter explained that Washington was acting “because the United States is deeply committed to the defense of Europe, as we have for decades.” America is more committed to Europe than are Europeans. “We are moving forward together, with new capabilities,” he said. What does he mean by “we”? Washington again will do the heavy lifting. “You can nearly hear the sigh of relief in Europe,” said Heather Conley of the Center for Strategic and International Studies, in learning that the U.S. again would bail out its allies. The Europeans scrimp on the military while funding their generous welfare state. They promise Washington whatever it desires—to increase outlays, hit the two percent of GDP level, improve international coordination, and more. Then they will go back to doing what they do best, depend on America. “ Washington is being played for a sucker as usual.” NATO always stood for North America and the Others. During the Cold War the allied states shamelessly took a very cheap ride on the U.S. That made sense in the immediate aftermath of World War II, but by the 1960s Europe had recovered and should have spent amounts commensurate with the Soviet threat. However, Europeans correctly gauged that Washington wouldn’t leave, despite periodically upbraiding them for their meager efforts. Cato Institute forum on future of NATO The problem has gotten worse in recent years. The U.S. accounts for three-quarters of NATO outlays even though Europe has a larger GDP than America. Because of European cutbacks, overall outlays are down 1.5 percent this year. Of 28 members only the U.S., Britain, and Greece—mostly because of its confrontation with fellow alliance member Turkey—typically broke the officially recommended level of two percent of GDP. Estonia has become a member of that exclusive club, but not Latvia and Lithuania, despite being on the front line. After frenetically demanding that the U.S. do more, Poland only hit that mark this year. But several members have been cutting outlays, despite the continent’s embarrassing showing against Libya (running out of missiles, for instance) and limited capacity to aid the Baltics (little more than nil) let alone defend a nation like Ukraine. Of the five largest European defense budgets, only France’s will increase. Those of Canada, Germany, Great Britain, and Italy will continue to decline. None of these countries will hit the recommended two percent of GDP level in 2015. Only Britain and France exceed 1.5 percent. Canada barely makes one percent. (At the G-7 Summit President Barack Obama essentially begged the British to spend more; London has responded by considering whether reclassifying intelligence and foreign aid outlays as “military” would allow Britain to technically meet the standard.) Those NATO members spending more this year—Estonia, Latvia, Lithuania, Poland, Netherlands, Norway, and Romania—collectively have outlays only half that of Britain. Cooperation is poor even among those most at risk. Add Poland to the three Baltic and five Nordic states and the group enjoys a GDP about a third larger than that of Russia. However, their military outlays are only about 40 percent of Moscow’s. Moreover, complains Edward Lucas of the Center for European Policy Analysis, they “are divided” and suffer from “strategic incoherence.” Never mind the events of the last year. Ukraine has not served as Thomas Jefferson’s famed “fire bell in the night,” despite the supposedly terrible threat posed to the peace and stability of Europe. “It is much more business as usual,” said British defense analyst Ian Kearns. As of 2013 the Europeans devoted just 3.6 percent of their governments’ budgets to the military, compared to a fifth of U.S. government spending. America’s 54 per capita military outlays are five times that of the alliance’s Cold War members and eight times that of those states which joined later. “Total military spending by NATO’s European members was less in real terms in 2014 than in 1997—and there are 12 more member states in NATO today,” observed my Cato Institute colleague Chris Preble. The issue is more than just money. From the onset of the crisis with Russia a number of American analysts have proposed deploying U.S. forces to Ukraine, treating the latter as if it was a NATO ally. No Europeans have volunteered to follow. The U.S. House has approved legislation to arm Kiev’s forces, and a similar measure is being pushed by ever warlike Senate Armed Services Committee Chairman John McCain. Most European governments have resisted the idea. “Make no mistake: we will defend our allies,” declared Carter. But will the Europeans defend anyone, even themselves? A new poll suggests not. The Pew Foundation recently surveyed eight leading NATO countries: If Russia got into a conflict with another member of NATO, should your country use military force in the victim’s defense? A majority of French, Germans, and Italians said no. (The Germans were particularly emphatic, with 58 percent rejecting war. German support for NATO has dropped by 18 percent in just six years.) Only pluralities said yes in Poland, Spain, and the United Kingdom. (Yet Poland is insisting that everyone else defend it!) The highest European support level was in Britain, at 49 percent. Only in America, naturally, and Canada did a majority say yes (56 and 53 percent, respectively). Ivo Daalder, a former U.S. ambassador to NATO, said “it will take a serious effort by the alliance to convince its public of the need to prepare for, deter and, if necessary, respond to a Russian attack.” Yet why should they take action as long as they believe they can count on Washington to save them? According to Pew, two-thirds of Europeans were convinced the Americans would come rushing over to do what they would not do for themselves. It’s time to change that. Judy Dempsey of Carnegie Europe asked why Washington allowed itself to be used in this way: “Europe is prosperous. It should be confident enough both to take care of its own security and to contribute to a greater role in burden sharing.” It will not do so as long as U.S. policymakers insist that Americans do the job instead. The Cold War is over. Moscow is an unpleasant regional actor, not a global threat. Europe has a much larger GDP and population than Russia and even with its current anemic level of military outlays devotes more to defense. The U.S. government is essentially bankrupt, with far greater unfunded liabilities than the Europeans, despite Greece’s travails. Instead of pouring more resources into NATO, Washington should be disengaging militarily, turning leadership of the alliance and responsibility for defending the continent over to Europe. Americans shouldn’t be expected to protect their rich cousins even if the latter were devoted to protecting each other. That the Europeans expect the U.S. to do their job is yet another reason for Americans to say no more. The impact’s inevitable- congress already wants to arm Ukraine Wong 15 (Kristina, 2/5/15, The Hill, “Lawmakers to Obama: Arm Ukraine now,” http://thehill.com/policy/defense/231874senators-to-obama-arm-ukraine-now)//RTF The White House came under bipartisan pressure from both sides of the Capitol to provide weapons to Ukraine Thursday. Republicans and Democrats on the Senate Armed Services Committee made a big push on the issue, while a bipartisan group of House members called for the same course of action in a letter. "The United States must act with urgency to provide defensive lethal assistance to Ukraine," said Sen. John McCain (R-Ariz.), the chairman of the Armed Services Committee. "Russia's invasion of sovereign territory of Ukraine, which has continued unabated in the face of political and economic sanctions, is the gravest threat to European security in decades," he said. In an unusual display of bipartisan agreement, McCain was joined at the press conference by the committee's ranking member, Sen. Jack Reed (D-R.I.), and Sens. James Inhofe (R-Okla.), Bill Nelson (D-Fla.), Lindsey Graham (R-S.C.), Richard Blumenthal (D-Conn.), Kelly Ayotte (R-N.H.), Joe Donnelly (D-Ind.), Joni Ernst (R-Iowa), Mike Rounds (R-S.D.), Tom Cotton (R-Ark.) and Dan Sullivan (RAlaska). Meanwhile, the group of House lawmakers said that the administration needed to provide weapons to Ukraine to deter further Russian aggression. "We are calling on the Administration to increase its support for Ukraine. Tighter sanctions and greater humanitarian assistance should be part of that support, but now, more than ever, the U.S. must supply Ukraine with the means to defend itself," they said in their letter. Rep. Adam Schiff (D-Calif.), ranking member on the House Intelligence committee, was the lead signatory on the letter. He was joined by more than 30 Republicans and Democrats. The U.S. and Western allies slapped economic sanctions on Moscow after it invaded Ukraine and annexed its peninsula of Crimea last March, but the country has continued to arm and train pro-Russian rebels in Eastern Ukraine. Secretary of State John Kerry said while visiting Ukraine on 55 Thursday that President Obama is "reviewing all his options." "Among those options obviously is the possibility of providing defensive systems to Ukraine," he said, according to the Associated Press. However, he added, "We are not interested in a proxy war. Our objective is to change Russia's behavior." The White House has so far turned down Ukraine's requests for weapons out of fear it would further provoke Russia, but has provided nearly $122 million in non-lethal military equipment to Ukrainian forces, such as blankets, body armor and meal packets. The senators said the time has come to provide weapons as well, given gains by rebels in recent weeks and Russian President Vladimir Putin's violation of a ceasefire agreement. "Blankets don't do very well against tanks," said McCain. Providing arms "will raise the risk and costs Russia must incur to continue its offensive," he said. McCain said that since April, Russian-backed separatists in Ukraine have killed 5,358 Ukrainian forces, wounded 12,235 others and killed 224 civilians. Reed said Ukrainian forces have fought courageously. "We must help Ukraine to defend itself against Russian aggression," he said. "We cannot let Vladimir Putin get away with invading another sovereign country. ... This is what we should do, lethal assistance," Nelson added. "We should always be on the side of struggling democracies," Graham said. "Helping a friend somewhere makes friends of America everywhere feel better." Blumenthal called Putin "a thug." "He has not responded to sanctions. Sanctions are not working," he said. "He is the schoolyard bully," added Ayotte. "I am so glad we've come together on a bipartisan basis to do this." Donnelly calle Ukraine a "friend" of the United States and said providing arms "is the least that we can do." Meanwhile, the letter from the House members urged the administration to provide "a substantial amount of military assistance as soon as possible in 2015," and in the following years. That assistance should include non-lethal aid such as counterbattery radars, drones, electronic counter-measures against Russian drones, secure communications capabilities, armored Humvees and medical equipment, they said. Lethal aid should include light anti-armor missiles, "given the large numbers of armored vehicles that the Russians have deployed in Donetsk and Luhansk and the abysmal condition of the Ukrainian military’s light anti-armor weapons," the letter said. The letter was also signed by Reps. Steny Hoyer (D-Md), Michael Burgess (R-Texas), Gerry Connolly (D-Va), Steve Chabot (R-Ohio), Rosa DeLauro (D-Conn.), Eliot Engel (DN.Y.), Michael Fitzpatrick (R-Penn.), Alcee Hastings (D-Fla.), Steve Israel (D-N.Y.), David Jolly (R-Fla.), Marcy Kaptur (D-Ohio), Mike Kelly (R-Penn.), John Larson (D-Conn.), Sander Levin (D-Mich.), Daniel Lipinsky (D-Ill.), Thomas Marino (R-Penn.), Michael McCaul (RTexas), Tom McClintock (R-Calif.), Tim Murphy (R-Penn.), Mike Quigley (D-Ill.), Bill Pascrell (D-N.J.), Robert Pittenger (R-N.C.), Ted Poe (R-Texas), Reid Ribble (R-Wisc.), Thomas Rooney (R-Fla.), Peter Roskam (R-Ill.), David Schweikert (R-Ariz.), John Shimkus (R-Ill.), Adam Smith (D-Wash.), Steve Stivers (R-Ohio), and Michael Turner (R-Ohio). The non-voting member from Guam, Del. Madeleine Bordallo (D), also signed. "We know that a resolution to the Ukrainian crisis will ultimate require a diplomatic, not military, solution," the letter said. "But Russia is feeling emboldened, and Ukraine is economically stretched to its breaking point. It is time to provide the Ukrainiain government with the tools to keep the separatists at bay and to make the conflict too costly for their Russians patrons to continue." Separately, Senate Foreign Relations Committee Chairman Bob Corker (R-Tenn.) urged President Obama in a letter Thursday to fully implement a law passed last year, which requires him to report to Congress by Feb. 15 on plans to provide weapons to Ukraine. “We hope the administration will submit a report to the Senate Foreign Relations Committee later this month that clearly states your readiness to supply appropriate lethal assistance to the Ukrainian government and provides details of the specific weapons to be delivered,” said Corker, a co-author of the bill. Republican Congress makes the impact inevitable Jensen 14 (Donald, November 18th, resident fellow at the Center for Transatlantic Relations in the Nitze School of International Studies at Johns Hopkins University, “Republican Congress to Push Harder Russia Line,” http://imrussia.org/en/analysis/world/2085republican-congress-to-push-harder-russia-line)//RTF The United States’ recent midterm elections tipped the balance of power away from president Barack Obama and will greatly complicate his remaining two years in office, not just in terms of domestic policy, but foreign policy as well. Riding a wave of popular discontent, the Republican Party gained eight seats (which could increase by one after Louisiana holds a runoff in December). The GOP also increased its majority in the House of Representatives and performed well in state races. The Republican capture of the Senate will force Obama to scale back his legislative agenda and limit his ambitions to either executive actions that do not require legislative approval, or issues that have bipartisan support. But the Republicans, hoping to win the White House in 2016, will also be under pressure to show the electorate that they are capable of governing after drawing scorn for shutting down the government last year and allegedly demonizing the president. The president’s supporters and the national media, in turn, are also guilty of exaggeration: they are fond of caricaturing the GOP as being held hostage to an “extremist” Tea Party base. Many of these 56 critics expect (and hope) that Republican unity will be difficult to achieve. The day after the midterm elections, President Obama promised to work with Republicans, but warned that he was also prepared to make more use of his executive powers. Foreign policy is rarely a primary concern of U.S. voters. Indeed, surveys suggest that those who went to the polls this November were primarily concerned with the state of the economy, partisan gridlock in Washington, and Obama’s leadership. In September, according to a Pew Research Center poll, 64 percent of respondents said foreign policy would be an important factor in their midterm election vote. In an October poll, by a margin of 43 to 37 percent, voters believed Republicans would do a better job of handing foreign affairs than Democrats. It appears such sentiments have much to do with the public’s view that Obama has demonstrated poor leadership on international issues. “Setting aside individual debates about individual policy choices,” David Rothkopf recently wrote for Foreign Policy, “the public wants America and its leaders to appear strong.” In recent weeks, the opinions of the Washington elite on how to deal with Russia, like public sentiment more generally, have been marked by an uneasy balance. Earlier this year, views were divided. One point of view maintained that Russia’s meddling in Ukraine was mostly a defensive action against the threat of NATO enlargement and Ukraine’s disintegration; the other accused Russian president Vladimir Putin of directly challenging Europe’s political and security structures and Western values, and argued that he needed to be countered. The shoot-down of Malaysian Flight MH17 in July and subsequent abundant evidence of Russia’s extensive military involvement in the incident yielded a consensus behind the latter view. Yet there remained disagreements over how far Putin would go and how the U.S. should push back. The Obama Administration expressed warm words of support for Ukraine, but was strongly against arming Kiev. It argued that doing so would provoke Russia into greater intervention; that Ukraine’s armed forces could not “absorb” high-tech equipment; that there exists no military solution to the crisis; and that Ukraine would be better able to withstand Russian aggression if it focused on political and economic reform. In Congress, however, where sympathy for Ukraine was strong (and bipartisan), there was firm support for providing arms. This debate took place, as Standard Bank analyst Tim Ash wrote in October, amid widespread uncertainty about what Putin would do next and general agreement that Western sanctions on Russia are working. Although they may have done little to directly discourage Russian military activity, sanctions have extracted a heavy price from Russia and the elites around Putin. Two bills that would provide Ukraine with defensive but lethal weapons are likely to be taken up by the new Republican Senate majority, despite the president’s wishes. With a GOP majority in both houses of Congress— including in the crucial Senate Armed Services and Foreign Affairs Committees—Republican leaders are now likely to step up the pressure on the weakened president, already a lame duck, to be tougher on Russia and provide weapons to Ukraine. Senator John McCain, the incoming chairman of the Senate Armed Service Committee, said in an interview on November 5 that he has already discussed a new national security agenda with fellow Republicans Bob Corker and Richard Burr, who are likely to be chairmen of the Senate Foreign Relations Committee and Senate Select Committee on Intelligence, respectively. McCain promised to raise the issue of military assistance. Two bills that would provide Ukraine with defensive but lethal weapons are likely to be taken up by the new Republican Senate majority, despite the president’s wishes. The first of these bills, the Ukraine Security Assistance Act of 2014, would help Ukraine “neutralize the military-support advantage that separatist rebels are using to target civilian and military aircraft in in eastern Ukraine” and would authorize President Obama to “provide adequate and necessary assistance to protect Ukrainian democracy and sovereignty.” The second, the Ukraine Freedom Support Act of 2014, calls for military and security assistance to Ukraine, designates it as a “major non-NATO ally” (MNNA), and imposes further sanctions on the Russian Federation. MNNA is a designation given by the United States government to close allies (including Australia, Egypt, Israel, Japan, and South Korea) who have strategic working relationships with U.S. armed forces but are not members of NATO. While the MNNA status does not automatically establish a mutual defense pact with the United States, it does confer a variety of military and financial advantages that otherwise are not obtainable by nonNATO countries. Moreover, codifying U.S. sanctions against Russia into legislation would make it far more difficult to end them than is currently the case, thereby immunizing the sanctions against actions by the White House. It is unclear whether Obama will veto either bill should they pass. The White House’s rationale that arming Kiev would provoke Moscow grows ever weaker, as Russia has stepped up its military support of the eastern breakaway republics in recent days. An Obama veto would also put him at odds with powerful congressional leaders in both parties, now emboldened by the elections to take a tougher line on an issue that appears secondary to the rest of the president’s agenda. In the past, Obama has stood his ground in the face of congressional opposition when he believed he was right, but according to sources in Congress, he has not yet indicated what he would do if a Ukraine bill were to reach his desk. Putin’s intentions, as ever, remain uncertain. On the one hand, the Kremlin has little incentive to escalate its military presence in Ukraine, regardless of any military assistance the U.S. might provide Ukraine (though such aid would certainly give Putin pause). Russian public opinion does not support an invasion: Kremlin 57 authorities made great efforts during the fighting of August and September to restrict media coverage of Russian military casualties. The economic costs of rebuilding the Ukrainian east or funding additional sustained major military operations are likely prohibitive, given the downturn in the Russian economy. On the other hand, Putin’s current stepped-up support for separatist forces, in violation of the Minsk agreement and despite Western threats, suggests that he could go further no matter the economic cost or Western reaction. For example, he could carry out a quick strike to establish a land bridge to Crimea. The Obama Administration also continues to seek Russian cooperation on Iran and the Middle East, showing Putin there are limits to Washington’s willingness to push back over Ukraine. In the end, therefore, the dispute in Washington over military assistance to Ukraine may have more to do with the power struggle between Congress and the administration than the realities of the military situation on the ground. Republicans are pushing for it Coca 6/24 (Onan, 2015, writing for Eagles Rising, “John McCain says It's "Shameful" Not to Send Arms to Ukraine!,” http://eaglerising.com/20010/john-mccain-says-its-shameful-not-to-send-arms-to-ukraine/#TKxhbSzXdKLiqT4d.99)//RTF GOP Sen. John McCain spoke at a Saturday press conference during his trip to Ukraine and lambasted the U.S. for refusing to provide weapons to Ukrainian forces. According to McCain, Ukraine has shown repeatedly that it’s willing to fight for freedom, making it shameful to deny the country much-needed military assistance against well-armed separatists in the eastern region, The Associated Press reports. For McCain, the 300 paratroopers sent as advisers in April aren’t sufficient. A lack of weapons only cedes more ground to Russian President Vladimir Putin’s designs to pull Ukraine away from NATO and other western countries, he says. Observers allege that the reason separatists in Luhansk and Donetsk are able to keep fighting is because Russian support lurks behind the scenes. Putin steadfastly denies any and all such accusations. “This is shameful that we will not provide [the Ukrainians] with weapons to defend themselves. They are fighting with 20th-century weapons against Russia’s 21st-century weapons. That’s not a fair fight,” McCain said, after meeting with Ukrainian President Petro Poroshenko and other officials. Since Russia annexed Crimea last year, McCain has been one of the most vocal proponents of shipping military gear to Ukraine. “We need to give long-term military assistance… because God knows what Vladimir Putin will do next,” McCain said in March 2014. Accompanying McCain was Republican Sen. Tom Cotton, who argued that sending weapons is a necessity, as Putin has repeatedly refused de-escalation attempts. The National Defense Authorization Act includes $300 million for military assistance to Ukraine, but the defense budget bill still needs to make it through Congress and the White House first. Recent back-and-forth disputes between the Republican-dominated legislature and the Obama administration threaten the bill’s passage. Russia meanwhile opposes any attempt from the U.S. to send military assistance, saying that any military aid will out increase instability. Putin has also warned Israel in April not to sell weapons. Shortly after the press conference, Lithuania’s ambassador to Ukraine, Marius Yanukonis, said that Lithuania is preparing to ship arms to Ukrainian forces, in an effort to persuade other NATO member countries to follow suit. A bill providing military support’s already passed the senate AP 6/20 (Associated Press, 2015, “US Senator McCain slams European stance on Ukraine,” http://news.yahoo.com/us-senator-mccain-slams-european-stance-ukraine172844262.html)//RTF KIEV, Ukraine (AP) — U.S. Sen. John McCain has said during a visit to Ukraine that it is shameful that Washington's European allies have not done more to assist Ukrainian forces in their quest to defeat Russian-backed separatists in the east. McCain was part of a delegation of U.S. senators that met Saturday with senior Ukrainian officials, including President Petro Poroshenko, after visiting troops and volunteers working on the front line. The U.S. Senate this week approved a bill that includes provisions to supply Ukraine with $300 million worth of defensive military equipment. Approval from Congress and the White House is still pending. European countries have favored a diplomatic settlement as a way out of the conflict. Russia condemns U.S. military aid to Ukraine and says it will foment instability. 58 59 Solvency 60 Noncompliance The Navy needs their ITP program – they wont stop Lombardo 13 (Tony -Staff writer, SECNAV launches plan to battle 'insider threats', Sep. 7, 2013, http://archive.navytimes.com/article/20130907/NEWS/309070005/SECNAV-launches-planbattle-insider-threats-, JZG) The Navy has a new plan to confront “insider threats” in the Navy and Marine Corps, and it will involve more scrutiny, better training and a team of top leaders to oversee its implementation. Navy Secretary Ray Mabus issued an instruction in August that creates the Department of the Navy Insider Threat Program. The goal is to prevent cases like the data leaks by Army Pfc. Bradley Manning and former National Security Agency contractor Edward Snowden, and violence like Army Maj. Nidal Hasan’s shooting rampage at Fort Hood, Texas. “With this instruction, Secretary Mabus has given the Department of the Navy its marching orders,” said Vice Adm. Michael Rogers, head of Fleet Cyber Command. “We need to do all we can to be aware of the threat, and take those actions necessary to reduce that threat.” As head of the Navy’s cybersecurity arm, Rogers’ team of cyber warriors plays a critical role in fighting insider threats. But Rogers insists the threat is an “all hands” issue. “All who serve within the Navy — active, reserve, officer, enlisted, civilian employees and contract support personnel — are put at risk by this threat, and all can help diminish that threat,” said Rogers, who responded to Navy Times’ questions via email. 61 Counterplans 62 Reform ITP CP 63 1NC CP Text: The United States federal government should update the ITP program to include a common definition of what an insider threat is and realign insider threat training to focus toward preventing threats. Common definitions solves cohesion Porter 14 -Master in Security Studies (Michael Lawrence, COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS, May 2014, http://repositories.tdl.org/asu-ir/bitstream/handle/2346.1/30135/PORTER-THESIS2014.pdf?sequence=1&isAllowed=y, JZG) The first improvement that is needed is the establishment of a common definition of an insider threat. Currently, there are over 15 different definitions as outlined in the NCIX’s Official Terms & Definitions of Interest List122. Such a broad list of definitions leaves many questions in the minds of the different IC agencies as to what an insider threat is, and who has jurisdiction regarding collection, analysis, and apprehension. Most importantly, the definition in the 2012 National Policy lacks any sort of tie to a foreign nexus123. This vague language creates confusion as to who has jurisdiction over potential insiders. According to the policy definition, CI would have been responsible for identifying and handling any threat, to include domestic law enforcement cases. The problem is that if these threats are American citizens, not working for extremist organizations or foreign nations, then CI does not have jurisdiction as assigned in EO 12333 . This current lack of specificity can cause confusion when it comes to handling insider threats, because over utilization of CI and LE on areas outside of their jurisdiction leaves them both overexerted and stretched thin125. Furthermore, establishing a definition will be difficult with as many different and divergent definitions as we already have throughout the government. As was mentioned, consensus is important and right now there is none. Changing this will require the NITTF to build common ground and push past the differences. The important thing to remember is that words have meanings and, as the 2009 NIS states, insider threats are the priority for CI126. An open-ended definition will tax a stressed organization. Specificity allows work to be spread across the spectrum of CI and Law Enforcement cases and thus increase the amount of success. Chapter 1 of this paper outlined the author’s definition of an insider threat as “an individual with placement and access to critical infrastructures, military units, and the government and their supporting agencies who have allegedly turned against and targeted their parent organization, thus aiding a foreign power or international terrorist organization.” This definition is based on a conglomeration of multiple different definitions used across the IC. It encompasses all of the critical elements of the threat and leaves no question in the minds of the different agencies as to who has jurisdiction. Simply adopting a new definition does not mean that “jurisdiction battles” will be solved. Inherent to any definition is the constant need for cooperation amongst the different organizations of CI and in the case of uncertainty, to allow for joint investigations and the sharing of potentially valuable information between the different disciplines127 Evaluation will be more than just the success or failure of a standard definition. The definition itself will be tied to a broader evaluation of the National Threat Policy. Accordingly, the ITAG and the JITTF would be primarily responsible for the evaluation of current policies. In order to do this, an evaluation of classified and unclassified reporting and investigations, at the national level, will identify increases in reporting, opening of investigations, opening of joint investigations, prosecutions, and operations conducted. An increase in these numbers would be a strong indication that programs are working, at least in the short-term. This data would be compiled and presented by the NCIX to the DNI and policy makers as an indicator of the change that is occurring with new policies. Granted this information would not be shown to all policy makers, but there are representatives in Congress and the White House that would be privy to this information, and that serve as representatives for the broader policy community128. 64 Adding threat prevention training solves Porter 14 -Master in Security Studies (Michael Lawrence, COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS, May 2014, http://repositories.tdl.org/asu-ir/bitstream/handle/2346.1/30135/PORTER-THESIS2014.pdf?sequence=1&isAllowed=y, JZG) The second improvement needed is that the CI Community should realign insider threat training to focus toward preventing threats, not simply identifying them. The National Insider Threat Policy includes a set of “Minimum Standards for Executive Branch Insider Threat Programs.” These minimum standards are the current guidelines promulgated by the executive branch, the NCIX, and the JITTF regarding Insider Threat Programs129. The programs’ standards have addressed many of the issues relating to insider threats except one key issue: prevention. The minimum standards read more like a list of training for identification of a current threat, and less like a set of preventative measures. Identifying threats is useful, but the problem with insider threats is that they are often unidentifiable; more is needed in the form of prevention. The major problem with passing changes such as these is, once again, the problem of time. As previously stated, policy makers like to see fast results. Preventative measures will not get nearly the same results as fast as identification. Focusing training on identification can give quantifiable numbers to policy makers about how successful a program has been by catching bad guys. One can hope that politics is not all that is at play when it comes to determining how these programs are organized, but these changes will need to be made quickly because the longer they wait the longer the system goes without preventative measures. Not much needs to be added to current CI training, but an understanding of the basic threat psychology, as addressed in Chapter 2, should be a part of the Minimum Standards. A key element of this “preventative measure” is the provision of information regarding where developing threats can seek assistance, how coworkers can report suspected problems for assistance, and how supervisors can refer to assistance. These insights would be crucial both for impacting the potential downward spiral and the apprehension of an individual. The one major outlet that exists is in Employee Assistance Programs (EAPs). As stated in EO 12968, all individuals working for agencies with access to classified information are eligible to use EAPs for “assistance concerning issues that may affect their eligibility for access to classified information, such as financial matters, mental health, or substance abuse.” Essentially EAPs are counseling services for those in the IC who need an extra support structure to get personal help130. The problem is that often there is a stigma placed on anyone for using these services. The proper use of these programs is crucial for serving this preventative measure and should be included in training as a healthy outlet free of judgment or damage to one’s career. One thing that the Spy cycle and the Radicalization cycle both underscored was that in the earliest stages of the development of an insider threat, there was a need for help. The spy found that help in the solace of a foreign intelligence service, while the future violent extremist found it in the support network of an international terrorist organization. By focusing training on identification at the later stages of development, we are skipping an important step in the progression of an insider threat. Ignoring the early stages does nothing to prevent those potential future threats sitting on the edge of right and wrong from making bad choices. By adding to the current training a focus of earlier detection then the potential to remove the future insiders from their support structure and offer them a healthy outlet is possible. Additionally, teaching this training to everyone will turn personnel into sensors for future threats, not just current ones131 65 2NC Reform to the ITP is necessary Porter 14 -Master in Security Studies (Michael Lawrence, COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS, May 2014, http://repositories.tdl.org/asu-ir/bitstream/handle/2346.1/30135/PORTER-THESIS2014.pdf?sequence=1&isAllowed=y, JZG) Chapter 4: The Reform Process Given the many insider threat-related challenges the CI Community faces, the United States has done a great deal to confront this dangerous enemy . Nonetheless, the CI Community must make additional changes due to weaknesses in the current legislative processes, organizational interactions, and other issues involved in this effort 99. As addressed in Chapter 3, the structure of the CI Community has adapted over the years, but the sad reality is that these changes happened largely as a result of failures in the system and kneejerk reactions designed to address specific instances of failure100. Even then, the changes that do occur often do not come easily and are the result of extensive reform processes throughout the IC. The ever-present threat posed by insiders means that the US CI Community must routinely evaluate the process it operates under and look to better itself. Our CI specialists must address a range of persistent vulnerabilities to help strengthen the American security apparatus. The problem is that substantive reform is often very difficult to accomplish in the IC, and subsequently the CI Community, for two reasons. First, intelligence reform is usually more politically motivated than it is focused on, and motivated by, the need for substantive change101. Second, since the IC is a tool of the policy makers, who ultimately oversee these organizations, this often means that the people making decisions for the IC have little to no real understanding of the Intelligence process102. As Chapter 3 demonstrated, there were multiple reforms over the past 20 years that have helped mold the CI Community into an organization that could fight the insider threat. These changes however, were not the result of planned reform, they were reactionary movements to larger community failures that allowed insiders like Ames, Hanssen, and Hassan to exist. Politicians do not like huge failures for political reasons, so large high-profile events act as ”motivation” for change, and to show their constituents that they are making things better103 66 DOD CP 67 1NC CP Text: The Department of Defense should enact new efficiency standards and guidelines for their insider threat program. Reform through the GAO standards solves efficiency and insider threats Pomerleau 15 (Mark, DOD coming up short on insider threat safeguards, GAO says, Jun 04, 2015, http://defensesystems.com/Articles/2015/06/04/DOD-insider-threat-gaps-GAO.aspx?Page=1, JZG) While certain components of DOD’s insider-threat implementation program have been incorporated, other major standards have been neglected, according to a Government Accountability Office report. Specifically, the department has not analyzed gaps or incorporated risk assessments into the program. Going back to 2000, DOD issued an integrated process team report to guard against insider threats to information systems. This issue came to a head in 2010 following massive disclosures of classified information by then-Army soldier Bradley (now Chelsea) Manning. (The report refers to leaks by Manning and Edward Snowden, though not by name.) Congress in 2011 called for DOD to establish an insider threat program while the White House issued an executive order establishing an interagency task force, known as the National Insider Threat Task Force. A 2012 presidential memorandum directed agencies to create insider threat programs by May 2013 and identified six minimum standards for the programs: (1) designation of senior official(s); (2) information integration, analysis, and response; (3) insider-threat program personnel; (4) access to information; (5) monitoring user activity on networks; and (6) employee training and awareness. GAO stated that DOD and the six selected DOD components it reviewed have begun incorporating the minimum standards, they have not done so consistently. GAO’s report, which was originally issued in a classified setting in April, notes that around that same time, DOD made a particular point to highlight the need to mitigate insider threats in its newly updated Cyber Strategy, which said DOD was pursuing security against insider threats “through continuous network monitoring, improved cybersecurity training for the workforce, and improved methods for identifying, reporting, and tracking suspicious behavior.” The report continued: “Mitigating the insider threat requires good leadership and accountability throughout the workforce. Beyond implementing policies and protocols, leaders will strive to create a culture of awareness to anticipate, detect, and respond to insider threats before they have an impact.” Although DOD is required to complete a continuing analysis of gaps in security measures, DOD officials reported in 2014 that this survey had been suspended due to financial and personnel limitations. “This survey would have allowed DOD to define existing insider-threat program capabilities; identify gaps in security measures; and advocate for the technology, policies, and processes necessary to increase capabilities in the future,” GAO wrote. Without that information, “the department will not know whether their capabilities for insider-threat detection and analysis are adequate and fully address the statutory requirements.” GAO starkly pointed out that it found DOD had not incorporated risk assessment s into insider threat programs. Risk assessments, GAO pointed out, “provide a basis for establishing appropriate policies and selecting cost-effective techniques to implement these policies. Risk assessments generally include the tasks of identifying threats and vulnerabilities, and determining consequences.” Despite the fact that some DOD officials said insider threats are included in other risk assessments, these assessments are “technical in nature and focus on the vulnerabilities of individual systems” and “do not provide insider-threat program officials with complete information to make informed risk and resource decisions about how to align cybersecurity protections.” Further compounding this issue, GAO continued, is that officials in the Office of the Undersecretary of Defense for Intelligence do not view the results of the National Security Agency assessments or Command Cyber Readiness Inspection reports, meaning a “senior-level official does not know which specific types of risk the department is incurring.” Aside from the two major flaws mentioned at the outset, GAO also picked up on a lack of guidance from the top level of DOD. “DOD officials stated that they would need supplemental planning guidance that helps them identify actions, such as the key elements, beyond the minimum standards that they should take to enhance their insider-threat programs,” according to the report. “The current DOD directive does not contain additional guidance for implementing key elements of an insider-threat program beyond the 68 minimum standards.” A draft implementation plan provides guidance on minimum standards but not recommended elements. DOD was expected to release a supplemental guidance in January 2015. 69 2NC The insider threat program has a ton of data now – new guidelines and effectiveness measures are critical to success Tucker 7-19 (Patrick -Patrick Tucker is technology editor for Defense One. He’s also the author of The Naked Future: What Happens in a World That Anticipates Your Every Move? (Current, 2014). Previously, Tucker was deputy editor for The Futurist for nine years. Tucker has written about emerging technology in Slate, The Sun, MIT Technology Review, Wilson Quarterly, The American Legion Magazine, BBC News Magazine, Utne Reader, and elsewhere, “To Prevent Insider Threats, DOD Must First Define ‘Normal’”, JULY 19, 2015, http://www.defenseone.com/threats/2015/07/insider-threat-prevention-complicatedautomated/118099/, JZG) Imagine your job is to anticipate when that sort of thing might occur by using digital data produced by and about soldiers like Hasan. The task before you is enormous. There were around 65,000 people personnel stationed at Fort Hood at the time of Hasan’s rampage. If you were to scan every piece of electronic communication between those soldiers, and their contacts, for hints of future violence, your graph would include 14,950,000 different nodes—people, devices, and other communication points—and up to 4,680,000,000 messages, according to a paper published after the incident by the Defense Advanced Research Projects Agency, or DARPA. Nevertheless, predicting such insider attacks on the basis of digital clues is something the Defense Department is committed to doing. Following the 2011 leak of classified documents by Army Pvt. First Class Bradley (now Chelsea) Manning, President Obama signed Executive Order 13587, establishing the National Insider Threat Task Force. The Defense Department and the Task Force have since taken various steps to predict and prevent insider attacks. But the ultimate goal — a continuous and automated understanding of every potential threat posed by everyone with any connection to the defense establishment — remains elusive. DOD is working to meet one of the Task Force’s key recommendations: establish a center to coordinate its insider threat efforts, codify best practices, and monitor the most important cases . This Defense Insider Threat Management and Analysis Center, or DITMAC, slated to reach initial capability this fall, is meant to be able to analyze and fuse insider threat data that it gets from different components. Full operational capability will come in 2018 or 2019. Insider threat detection, as specified by DOD requirements, will also become standard for any defense contractor with top-secret clearance, according to forthcoming changes in the National Industrial Security Program Operational Manual. Key to DoD’s these efforts is what’s called continuous evaluation, a method to continuously monitor personnel with important clearances or access for changes that Department believes could make them insider threats, like credit problems, family issues, arrests, etc. But DoD would like to be able to subject all personnel to that sort of examination. A recent quarterly report of the Insider Threat program suggested that 225,000 personnel would be subject to continuous evaluation by one of the CE pilot programs by the end of 2015, and 1 million by 2017. But, as recent GAO reports make clear, progress has been uneven. The DoD CE program will automatically and continuously check records using data from the government, commercial sources to insure to look for warning signs. “As it matures, the CE capability will continuously ingest and filter data as it becomes available and provide … relevant information to appropriate security entities for action,” Mark Nehmer, who is leading that effort as the DITMAC team’s deputy chief for implementation, told Defense One in an email. That means developing software to detect threat signals, bad credit, unusual travel, arms purchases, etc. the second that that information becomes available. The usefulness of continuous evaluation will depend on DOD’s ability to tell normal behavior from abnormal on a department-wide scale and do so automatically. A few years ago, DARPA funded a program called Anomaly Detection at Multiple Scales, or ADAMS. The goal was to “create, adapt and apply 70 technology to the problem of anomaly characterization and detection in massive data sets…The focus is on malevolent insiders that started out as ‘good guys.’ The specific goal of ADAMS is to detect anomalous behaviors before or shortly after they turn.” That set the stage for many current research efforts. “We’re working through a number of different efforts right now, behavioral analytics, to actually try and figure out [for] all of these different known insider threats that we’ve seen, what the characteristics have been of those individuals, what are the behaviors that they’ve exhibited,” said Nehmer. “Where were they in their work life? Where were they in their social life? We’re doing as deep a dive as we can get on individuals that have actually exhibited insider threat behavior,” Nehmer said at a recent Defense One event. That seems straightforward enough — but it presents a technical challenge as big as big data. Consider Hasan, on whom the Army had an abundance of data. They knew that he had become withdrawn after receiving abuse from other soldiers and that he wanted out of the military. In the summer of 2009, they knew that Hasan had begun to buy non-issue guns. The military looks for those behaviors among many others, as indicators of potential insider attacks. This 2011 guide to characterizing so-called “indicators of potential insider attackers lists a few of them. “Socially withdraws on some occasions,” “strange habits,” and “lacks positive identity with unit or country” are Category I indicators that could apply to every American teenager. The Category III indicators include “takes unusual travel,” “Exhibits sudden interest in partner nation headquarters or individual living quarters,” and “Stores or collects ammunition or other items that could be used to injure or kill multiple personnel.” But these clues can present themselves too late. The thing about “normal behavior” is that its definition depends entirely on context. Normal for one person in one job is abnormal for another. “There is no normal across a department,” says Nehmer, “There is no normal across a command … We’ve been doing some machine learning in the department and they’ve been looking at what normal behavior looks like by a single position. You go to a particular component, you go to a sub unit in that component, and then you look at a position. We know what that should look like. That’s where we’ve done the homework.” “For instance, say you have someone who is an administrative assistant. And this assistant is spending a lot of time looking at foreign military websites. And they’re downloading things off the Internet and sending emails to a foreign email address. So someone looks into that and finds that the person is actually putting together travel for one of the flags [flag officers], in that particular country.” Nehmer says that that sort of behavior should be automatically flagged by a user activity monitoring, or UAM, system, prompting a closer inspection by a human analyst within the insider’s component. It shouldn’t necessarily trigger high institutional concern. Developing software to automatically flag and possibly mitigate concerns as they come up will involve training programs on massive amounts of anonymized data related to emails, texts, and messages. As continuous evaluation rolls out, a higher level of surveillance is going to become the norm across the Defense Department. Patricia Larsen, co-director of the National Insider Threat Task Force, said that while continuous evaluation might feel intrusive for DOD employees, it doesn’t actually represent a fundamental change from types of screening and vetting procedures that the Department undertakes now. Analysts looking for insider threats today can use a tool called the Automated Continuous Evaluation System, or ACES, to run queries about an individual across different databases. It’s Google for instant background checks, not truly automatic. “ACES has been running for 20 years,” Larsen said. “So we have been looking at you as a person. But it’s been a slow, methodical and sometimes painstaking way of doing it. What we’re saying is that there’s a lot of information about you that’s already out there. We want to put it together in one place so we can short-circuit the information gathering point and get to the analysis of you faster and be able to look at you more proactively.” Carrie Wibben, director security policy and oversight division for the Office of the Under Secretary of Defense (Intelligence) likened the new level of scrutiny to a routine lie-detector test. “I don’t like that,” she said, “but I feel better knowing that everyone alongside me had to go through the same polygraphic examinations that I had.” Of course, continuous evaluation will be a great deal more intrusive than a one-time polygraph session. It will, among other things, collect every DOD worker’s public posts on social media along with all other communication that the Department can legally collect. Such data could be used, as far as possible, to monitor not just credit and life changes but each individual’s current emotional state. “A machine could monitor that and get a contextual feel for a person’s mood. I think that’s in the future. But we have to sift through the volumes that we’re talking about and you have to get a baseline for people,” said Nehmer. Deriving a sense of mood or sentiment from textual clues, perhaps in real time, is a fast-growing area of machine learning research. Consider this paper by Chris Poulin in which he and his fellow researchers tried to use subtle language clues harvested from social media to predict which veterans might attempt suicide. They found indicators that allowed them to predict with better than than 65% accuracy. Then there’s another worry: the data that’s left off the table. Asked how her office was looking into deep web or dark web content for insider threat indicators, Wibben answered, “We’re not looking to that at all. We have to stay within the bounds of the [Standard Form 86] consent form, so things that individuals put out there publicly, that’s what we’re looking at right now. If you protect it behind a password, we’re not looking at it… at least not on the background investigation, continuous evaluation side.” All the data that DOD can obtain, legally but at no small inconvenience to those who soldiers who create it, may still not be enough to prevent future insider attacks from taking place. 71 All Agencies are in ITP The DOD is part of XO 13587 NCSC.gov No Date (NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET, http://www.ncsc.gov/nittf/docs/National_Insider_Threat_Task_Force_Fact_Sheet.pdf, JZG) Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the National Insider Threat Task Force (NITTF) is co-chaired by the U.S. Attorney General and the Director of National Intelligence (DNI). They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive (NCIX) to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 70 federal D/As that handle classified material. Currently, the following departments and agencies have representatives on the NITTF: FBI, Office of the National Counterintelligence Executive (ONCIX), Defense Intelligence Agency (DIA), Veterans Administration (VA), and Department of Justice (DOJ). The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The Steering Committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, ODNI, ONCIX, NSA, DIA, the Program Manager--Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. All agencies are included NCSC.gov No Date (NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET, http://www.ncsc.gov/nittf/docs/National_Insider_Threat_Task_Force_Fact_Sheet.pdf, JZG) Is every agency required to implement the new minimum standards? Yes, taken together, the E.O. and the national policy mandate that every executive branch agency with access to classified information establish an insider threat program in line with standards and guidance from the NITTF. However, there is a recognition of differing levels of risk—and, therefore, differing levels of protection required—based on such things as size of cleared population, extent of access to classified computer systems, and amount of classified information maintained by the D/A. The national insider threat policy directs heads of D/As to develop their programs using risk management principles. The NITTF is working with D/As, as well as the Classified Information Sharing and Safeguarding Office in the office of the Program Manager--Information Sharing Executive, to assess the extent of applicability of the minimum standards to each of the 70+ executive branch D/As with access to classified information based on associated risk. 72 Coast Guard CP 73 1NC CP Text: The Coast Guard should implement reforms to its insider threat program. Coast Guard insider threat prevention needs to be reformed to solve McDermott 15 (Ryan -Editor in the Government Publishing Group at FierceMarkets, G: Coast Guard taking steps to reduce insider threats, but more needs to be done, April 9, 2015, http://www.fiercehomelandsecurity.com/story/ig-coast-guard-taking-steps-reduce-insiderthreats-more-needs-be-done/2015-04-09, JZG) Although the Coast Guard has taken steps to reduce insider threats, there's still more to do, including training Coast Guard employees about insider threat awareness, says a March 27 Homeland Security Department inspector general report. The IG reviewed the efforts of the Coast Guard's progress toward protecting its information technology assets from threats posed by its employees, especially those with trusted or elevated access to sensitive but unclassified information systems or data. Coast Guard has generally been doing a good job, the report (pdf) says. The service established an Insider Threat Working Group designed to implement a program focused on the insider risk and has established the Cyber Security Operations Center to monitor and respond to potential insider threat risks. They also implemented a process to verify that system administrators have the appropriate level of access to information technology systems and networks to perform their assigned duties. But Coast Guard still needs to implement software to protect against the unauthorized removal of sensitive information through the use of removable media devices, such as flash drives, and email accounts. Coast Guard also should implement stronger physical security controls to protect Coast Guard's information technology assets from possible loss, theft, destruction or malicious actions, the IG says. Employees at the Coast Guard all need better threat security awareness training, says the report. Coast Guard agreed with all of the IG's recommendations. 74 2NC Coast guard reform is needed – prevents terrorism and allows for an effective coast guard Kimery 15 (Anthony, Insider Threats Continue To Pose Risks To USCG, IG Audit Found 04/07/2015, http://www.hstoday.us/briefings/daily-news-analysis/single-article/insider-threats-continue-topose-risks-to-uscg-ig-audit-found/b03b06fe2027f79bc68b50d296f5864e.html, JZG) The Department of Homeland Security (DHS) Inspector General (IG) concluded in a 29-page audit report that while the US Coast Guard (USCG) has taken steps to address the risk of insider threats to its information systems and data, is still needs to take additional steps to further address the risks posed by so-called “trusted insiders” inside the Coast Guard. “An internal breach by a trusted employee could impact [the Coast Guard’s] ability to protect the nation’s maritime interests and environment,” the IG disclosed. Specifically, the IG said the Coast Guard needs to implement software to protect against the unauthorized removal of sensitive information through the use of removable media devices and email accounts; implementing stronger physical security controls to protect USCG’s information technology assets from possible loss, theft, destruction or malicious actions; and providing insider threat security awareness training for all Coast Guard employees. According to the IG’s audit report, the Coast Guard “has taken some steps to address the risk of insider threats to its information systems and data, such as establishing an Insider Threat Working Group that’s designed to implement a holistic program focused on the insider risk.” “In addition,” the IG stated, “USCG implemented a process to verify that system administrators have the appropriate level of access to information technology systems and networks to perform their assigned duties. Further, USCG established the Cyber Security Operations Center to monitor and respond to potential insider threat risks or incidents against USCG information systems and networks.” The Coast Guard concurred with all three of the IG’s recommendations, which, “if implemented, should strengthen USCG’s management of the threat posed by trusted insiders,” the IG stated. In its audit of Coast Guard efforts to address the risk posed by trusted insiders, the IG determined the USCG “has taken some steps to address the risk of insider threats,” but that it also discovered “additional steps [that] are needed to further reduce the risk of insider threats to information technology assets.” The IG said it’s testing “revealed potential vulnerabilities in technical and physical security controls that could allow for: The unauthorized data removal from USCG information systems; and The loss, theft or destruction of information technology assets. “In addition,” the IG stated, “insider threat security awareness training is needed for USCG employees. The IG’s audit report stated, “ Trusted insiders could be given elevated access to mission-critical assets, including personnel, facilities, information, equipment, networks or systems. Potential threats can include damage to the United States through espionage, terrorism and unauthorized disclosure of national security information.” Continuing, the IG said, “Trusted insiders may also be aware of weaknesses in organizational policies and procedures, as well as physical and technical vulnerabilities in computer networks and information systems.” And “this institutional knowledge poses a continual risk to the organization,” the IG’s audit said, emphasizing that, “In the wrong hands, insiders use this knowledge to facilitate malicious attacks on their own or collude with external attackers to carry out such attacks.” According to Coast Guard officials interviewed at length by the IG, “a malicious insider could do the most harm to the USCG mission by: Compromising sensitive and classified information; Damaging operational infrastructure and resources; and Causing loss of life through workplace violence. 75 ADAMS CP 76 1NC - Solvency The Defense Advanced Research Projects Agency should substantially increase its funding for the Anomaly Detection at Multiple Scales program. ADAMS is still in its infancy—but success makes the ITP more effective— destroys false positives Keating 13 Joshua E. Keating is an associate editor at Foreign Policy. JUNE 13, 2013, “Type ‘S’ for Suspicious,” http://foreignpolicy.com/2013/06/13/type-s-for-suspicious/ Government-funded trolls. Decoy documents. Software that identifies you by how you type. Those are just a few of the methods the Pentagon has pursued in order to find the next Edward Snowden before he leaks. The small problem, military-backed researchers every spot-the-leaker solution creates almost as many headaches as it’s supposed to resolve . With more than 1.4 million Americans holding top-secret clearance throughout a complex network of tell Foreign Policy, is that military, government, and private agencies, rooting out the next Snowden or Bradley Manning is a daunting task. But even before last week’s National Security Agency (NSA) revelations, the government was funding research to see whether there are telltale signs in the mountains of data that can help detect internal threats in advance. In the months following the WikiLeaks revelations, the Defense Advanced Research Projects Agency (DARPA) — the U.S. military’s far-out tech arm — put out a number of requests for research on methods to detect suspicious behavior in large datasets as a way to root out rogue actors like Manning (or in more extreme cases, ones like Fort Hood shooter Nidal Malik Hasan.) The most ambitious of these is known as Anomaly Detection at Multiple Scales (ADAMS), a program that as an October 2010 research request put it, is meant "to create, adapt and apply technology to the problem of anomaly characterization and detection in massive data sets." The hope is that ADAMS would develop computers that could analyze a large set of user-generated data — the emails and data requests passing through an NSA office in Honolulu for instance — and learn to detect abnormal behavior in the system. The tricky part of this kind of analysis is not so much training a computer to detect aberrant behavior — there’s plenty of that going around on any large network — it’s training a computer what to ignore. "I like to use the example of learning to recognize the difference between reindeer and elk," wrote Oregon State University computer scientist Tom Dietterich, who worked on developing anomaly detection methods for ADAMS, in an email to Foreign Policy. "If all I need to do is tell these species apart, I can focus on the size [of] their antlers and whether the antlers have velvety fur, and I don’t need to consider color. But if I only focus on these features, I won’t notice that Rudolph the Red-Nosed Reindeer is anomalous, because I’m ignoring color (and noses, for that matter). So in an anomaly detection system, it is important to consider any attribute (or behavior) that might possibly be relevant rather than trying to focus on a very few specific characteristics." Over the past three years, DARPA has shelled out millions of dollars on efforts to learn how to root out Rudolphs from the rest of the reindeer and find out exactly what these red noses look like. This includes a $9 million award to Georgia Tech to coordinate research on developing anomaly detection algorithms. You can peruse much of the research funded through ADAMS online. For instance, a proposal by the New York-based firm Allure Security Technology, founded by a Columbia University computer science professor, calls for seeding government systems with "honeypot servers" and decoy documents meant to entice potential leakers to subversives. The files would alert administrators when accessed and allow the system to develop models for suspicious behavior. The company cheekily refers to this technique as "fog computing." Another ADAMS-funded paper by Carnegie Mellon University computer scientist Kevin Killourhy looks at systems to "distinguish people based on their typing." For instance, Killourhy explains, when three typists are asked to type the password ".tie5Roanl," the three users can be easily identified by how long they hold down the "t" key. The paper suggests such technologies "could revolutionize insider-threat detection," though unfortunately even the best systems can have an error rate of up to 63 percent, and detection can apparently be thrown off if the person just isn’t a very good typist. (Note to prospective whistle-blowers: Try two-finger typing.) Under the fairly obtuse title "Non-Negative Residual Matrix Factorization with Application to Graph Anomaly Detection," two DARPA-supported IBM researchers attempted to identify the kind of behaviors that might indicate suspicious behavior in a large network. These included "a connection between two nodes which belong to two remotely connected communities," such as an author publishing a paper on a topic not normally associated with his or her research; "port-scanning like behavior," which is when a particular IP address is receiving information from an unusually high number of other addresses; and "collusion," such as a "group of users who always give good ratings to another group of users in order to artificially boost the reputation of the target group." The thinking has gone somewhat beyond the theoretical level. At a conference in May, researchers from defense firm SAIC presented results from the PRODIGAL (Proactive Discovery of Insider Threats Using Graph Analysis and Learning) research team — part of the overall ADAMS initiative — which tested a series of anomaly 77 detection methods on an organization of approximately 5,500 users over the course of two months. "Red teams" were inserted into the data simulating characters such as a "saboteur," an intellectual property thief, and a "rager" — someone prone to "strong, vociferous, abusive, and threatening language in email/Webmail/instant messages." The detection methods varied widely in effectiveness. Such systems are clearly not yet up to the task of identifying a leaker before he or she strikes, and Dietterich, the Oregon State computer scientist, was cautious when asked whether they ever would be. "Anything I would say here would just be speculation, and artificial intelligence researchers have learned the painful lesson that we are very bad at predicting when, if, or how the methods we develop will be useful," he stated. ADAMS may still be in the trial stage, but "insider threat" detection was clearly a major priority for the U.S. government even before last week. In October 2011, for instance, President Barack Obama signed an executive order calling for the creation of an interagency Insider Threat Task Force charged with the "safeguarding of classified information from exploitation, compromise, or other unauthorized disclosure." 78 1NC – PTX Net Benefit Black budget means no link to politics Wired 12 02.15.12, “SEE FOR YOURSELF: THE PENTAGON’S $51 BILLION ‘BLACK’ BUDGET” http://www.wired.com/2012/02/pentagons-black-budget/ Because it’s not easy saying we have the complete number. The Pentagon likes to play a little hide and seek with its black budget. Projects with code names like the Navy’s “RETRACT JUNIPER” and “LINK PLUMERIA” are simple enough to find in the research development, testing and evaluation budget (.pdf). As are many of the Army’s “TRACTOR” projects: “TRACTOR NAIL,” “TRACTOR CAGE,” and so on. But then comes along a project like “TRACTOR DESK” hiding in one of the Army’s eight research budget documents, while others find their way to the operations and maintenance and procurement budgets. These projects are also where to go when searching for what’s getting cut. Something called the “Classified Program USD(P),” formerly valued around a respectable $100 million, had its budget reduced to zero. “TRACTOR JUTE” is on life support and “COBRA JUDY” had the sting taken out of it. Most other projects saw lesser cuts, however, and others like “RETRACT MAPLE” even saw minor gains. This is also while the researcher at Darpa only received a slight trim. The Pentagon budget also sheds light on the shadowy world of special operations forces and their “new normal” requirements in Afghanistan “and other locations” like the Horn of Africa. According to SOCOM’s operation and maintenance budget, an estimated 11,500 special forces personnel are expected to be in Afghanistan next year, a drop from the 12,321 (or so) commandos financed for this year. SOCOM is also getting a $796 million shave, but some budget wizardry should make up the difference. According to the budget, $889 million was shuffled from SOCOM’s overseas spending to “baseline” budgets with titles like “contract services” and “contractor logistics support.” Yet, “The overall amount of troops and missions within [Afghanistan] are projected to increase,” it says. This means the special forces will “require additional resources to reposition personnel and equipment as well as increase the number of missions executed,” says the report (.pdf). Though to put it in perspective, the Pentagon is still spending more on classified projects than most nations spend on their entire military forces in year. And that’s just the beginning. The budget for the Military Intelligence Program was released this week, adding another $19.2 billion — down from a record $27 billion in 2010. That also doesn’t include the budget for the National Intelligence Program, which oversees spy agencies like the CIA. Their budget hasn’t been released yet but prior budgets have shown it to hover in the $50 billion range. So we could be talking about $120 billion or more in black accounts. There’s also a slight problem. The Pentagon has another “classified” budget line with the money to show for it, but the dollar-amounts don’t match the individual projects. In other words, the exact amount the Pentagon spends on its black projects may, in fact, be a mystery even to itself. 79 2NC - Solvency ADAMS key to effective data analysis Hemsoth 12 Nicole Hemsoth, Co-Editor at The Platform, August 15, 2012, “How DARPA Does Big Data,” http://www.datanami.com/2012/08/15/how_darpa_does_big_data/ DARPA, like other government agencies worldwide, is struggling to keep up with its lava flow of hot military intellignce data. Research and public sector organizations have become experts at finding new ways to create data, so the challenge has been keeping up with it—effectively running fast enough to stay just ahead of the heat with the hopes of being able to understand its source before the stream hardens and becomes static, useless. As many are already aware, these challenges were at the heart of the U.S. government’s recent big data drive, where funding was doled out to address barriers to making use of the flood of intelligence, research and military data. This week we wanted to take a step back and look at how a defense-oriented intelligence and research organization is trying to capture, handle and make the best use of its data flows by highlighting select projects. Without further delay, let’s begin with the first big intel data project– NEXT — Who Needs Precogs When You Have ADAMS? >> Who Needs Precogs When You Have ADAMS? It’s a sad but relatively commonplace surprise when a solider or government agent whom others might have thought to be in good mental health suddenly begins making bad decisions— either to the detriment of national security or those around him. When this happens, the first reaction is often one of awe, “how could something like this happen—how couldn’t someone know that there was a problem before it got to such a point?” In other words, in the case of a government that has some of the most sophisticated intelligence-gathering and analysis capabilities, how could anything slip through the cracks? DARPA is seeking to snag this problem by understanding operative and soldier patterns via network activity and large volumes of data with a $35 million project that has been underway since late 2010. According to DARPA, the Anomaly Detection at Multiple Scales (ADAMS) program has been designed to “create, adapt and apply technology to anomaly characterization and detection in massive data sets.” The agency says that triggers in the large data would tip them off to possible “insider threats” in which “malevolent (or possibly inadvertent) actions by a trusted individual are detected against a background of everyday network activity.” DARPA says that the importance of anomaly detection is cemented in the “fact that anomalies in data translate to significant, and often critical actionable information.” They claim that operators in the counter-intelligence community are the target end users for ADAMS insider threat detection technology. While there are not many details about the actual algorithms or systems used to handle this information, when the project was first announced the agency was seeking an “automated and integrated modeling, correlation, exploitation, prediction, and resource management” system to handle the needs. Researchers from Georgia Tech are among those who are helping DARPA with its insider threat detection project. Under the leadership of computer scientist Dr. David Bader, the team has been in the midst of a $9 million, 2-year project to create a suite of algorithms that can scan for such anomalies across a diverse pool of data, including email, text messages, file transfers and other forms of data. To develop new approaches for identifying “insider threats” before an incident occurs, Georgia Tech researchers will have access to massive data sets collected from operational environments where individuals have explicitly agreed to be monitored. The information will include electronically recorded activities, such as computer logins, emails, instant messages and file transfers. The ADAMS system will be capable of pulling these terabytes of data together and using novel algorithms to quickly analyze the information to discover anomalies. “We need to bring together high-performance computing, algorithms and systems on an unprecedented scale because we’re collecting a massive amount of information in real time for a long period of time,” explained Bader. “We are further challenged because we are capturing the information at different rates — keystroke information is collected at very rapid rates and other information, such as file transfers, is collected at slower rates.” 80 2NC – S False Positives CP solves false positives—that’s the internal link to Intel—perception solves groupthink Defense Systems 11 Henry Kenyon, contributing writer for Defense Systems, Nov 17, 2011, “DARPA program seeks early detection of insider threats,” http://defensesystems.com/articles/2011/11/17/darpa-anomaly-detection-at-multiplescales.aspx Usually the pattern of events that leads to a person becoming an insider threat is only discovered after the fact. Now a team of researchers funded by the Defense Advanced Research Projects Agency (DARPA) and the Army Research Office is developing a set of algorithms to detect anomalous activity before the damage is done. DARPA’s Anomaly Detection at Multiple Scales (ADAMS) program seeks to create a software-based approach to track a person's online work activity — everything from e-mail messages to instant messages, file access, and Web traffic — to detect anomalous behavior, explained David Bader, the project’s co-principal investigator and a professor at the Georgia Tech School of Computational Science and Engineering and the Georgia Tech Research Institute. The project is led by Science Applications International Corporation (SAIC) and includes researchers from Oregon State University, the University of Massachusetts, and Carnegie Mellon University. The project also seeks to determine how trusted insiders become radicalized; but doing so requires sifting through terabytes of data. This is a big challenge, one that requires powerful algorithms running on high performance computers, Bader said. One of the ADAMS program's predictive aspects will be to find and flag suspicious behavior before a security breach occurs. “Our system tries to find these individuals who have gone down that slippery slope, but before they’ve done any crime or anything illegal,” he said. ADAMS will collect data and put the pieces together for analysts by highlighting potential threats. Researchers want the system to boil down the number of anomalies to a short list for an analyst to investigate. “Today an analyst is overwhelmed with thousands of anomalies per day,” said Bader. The team is taking a different approach from traditional methods that use pattern matching and profiling by working on algorithms to identify suspicious user activities through change detection. Because an anomaly is an unexplained event in the context of a person's work routine, the algorithms being developed for ADAMS will allow analysts to understand a user’s behavior. “Unlike pattern matching , which has many false positives , we’re using a different approach to understand humans within an organization,” he said. 81 2NC – No Link PTX DARPA is getting a lot more money—it can shift it to ADAMS UPI 14 “Proposed 2015 budget means more funding for DARPA,”March 6, 2014, http://www.upi.com/Business_News/Security-Industry/2014/03/06/Proposed-2015-budgetmeans-more-funding-for-DARPA/36881394141291/ WASHINGTON, March 6 (UPI) -- The U.S. Defense Advanced Research Projects Agency says the Defense Department's proposed 2015 budget will restore more of its financial resources . Those resources, it said, will allow promising "investments in new technology-driven ideas for the United States." "We (the United States) are faced with huge uncertainties and shifting threats, but we also have unparalleled opportunities to advance technologies in a way that can provide the nation with dramatic new capabilities," said DARPA Director Arati Prabhakar. The proposed Defense Department budget is part of President Barack Obama's budget request to Congress. DARPA will receive $2.915 billion in funding for 2015 if the current budget request is passed. The fiscal year 2014 appropriation was $2.779 billion, which restored $199 million in previously cut funding. DARPA said it lost 20 percent in real terms between fiscal 2009-2013. The new amount would "enable DARPA to invest more in vital areas that will improve U.S. national security by rethinking complex military systems, capitalizing on information at scale, and advancing biology as technology," Prabhakar said in a release. "It also would allow DARPA to restore funding for its basic research portfolio so that we can continue to create new technologies in support of future capabilities." 82 Disadvantages 83 Terrorism 84 1NC — Terrorism Leaks risk terrorism Clapper 15 - Director of National Intelligence [James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee, February 26, 2015 COUNTERINTELLIGENCE We assess that the leading state intelligence threats to US interests in 2015 will continue to be Russia and China, based on their capabilities, intent, and broad operational scopes. Other states in South Asia, the Near East, and East Asia will pose increasingly sophisticated local and regional intelligence threats to US interests. For example, Iran’s intelligence and security services continue to view the United States as a primary threat and have stated publicly that they monitor and counter US activities in the region. Penetrating the US national decisionmaking apparatus and Intelligence Community will remain primary objectives for foreign intelligence entities. Additionally, the targeting of national security information and proprietary information from US companies and research institutions dealing with defense, energy, finance, dual-use technology, and other areas will be a persistent threat to US interests. Non-state entities, including transnational organized criminals and terrorists, will continue to employ human, technical, and cyber intelligence capabilities that present a significant counterintelligence challenge. Like state intelligence services, these non-state entities recruit sources and perform physical and technical surveillance to facilitate their illegal activities and avoid detection and capture. The internationalization of critical US supply chains and service infrastructure, including for the ICT, civil infrastructure, and national security sectors, increases the potential for subversion. This threat includes individuals, small groups of “hacktivists,” commercial firms, and state intelligence services. Trusted insiders who disclose sensitive US Government information without authorization will remain a significant threat in 2015. The technical sophistication and availability of information technology that can be used for nefarious purposes exacerbates this threat. Pg. 2 85 Politics 86 1NC — Politics Link Massive congressional opposition to eliminating the Insider Threat Program. National Defense Authorization Act proves Aftergood 14 - Directs the FAS Project on Government Secrecy. [Steven Aftergood, “Congress Tells DoD to Report on Leaks, Insider Threats,” Federation of American Scientist, Posted on Dec.08, 2014, pg. http://tinyurl.com/o4tq4y9 For the next two years, Congress wants to receive quarterly reports from the Department of Defense on how the Pentagon is responding to leaks of classified information. The reporting requirement was included in the pending National Defense Authorization Act for FY 2015 (Sec. 1052). “Compromises of classified information cause indiscriminate and long-lasting damage to United States national security and often have a direct impact on the safety of warfighters,” the Act states. “In 2010, hundreds of thousands of classified documents were illegally copied and disclosed across the Internet,” it says, presumably referring to the WikiLeaks disclosures of that year. “In 2013, nearly 1,700,000 files were downloaded from United States Government information systems, threatening the national security of the United States and placing the lives of United States personnel at extreme risk,” the Act states, in a presumed reference to the Snowden disclosures. “The majority of the information compromised relates to the capabilities, operations, tactics, techniques, and procedures of the Armed Forces of the United States, and is the single greatest quantitative compromise in the history of the United States.” The Secretary of Defense will be required to report on changes in policy and resource allocations that are adopted in response to significant compromises of classified information. The defense authorization act does not address irregularities in the classification system, such as overclassification or failure to timely declassify information. It does call for additional reporting on the Department of Defense “insider threat” program (Sec. 1628), and on “the adoption of an interim capability to continuously evaluate the security status of the employees and contractors of the Department who have been determined eligible for and granted access to classified information.” By definition, this continuous evaluation approach does not focus on suspicious individuals or activities, but rather is designed to monitor all security-cleared personnel. 87 2NC/1NR — Politics Links Bipartisan support for the insider threat program Sasso 13 (Brendan, Senators back NSA bill, target ‘insider threats’, 11/06/13, http://thehill.com/policy/technology/189416-senate-panel-advances-surveillance-funding, JZG) The Senate Intelligence Committee has advanced legislation to reauthorize funding for the National Security Agency and surveillance programs. The bill includes new funding for technology to combat "insider threats" and leaks of classified information. The committee approved the legislation in a 13-2 vote late Tuesday. The approval of the annual funding measure comes after leaks by former NSA contractor Edward Snowden earlier this year revealed controversial details about the scope of the government's secret surveillance programs. The bill would empower the director of national intelligence to make improvements to the government's process for investigating people with security clearances , such as Snowden. Intelligence officials say the Snowden leaks have damaged the ability of the U.S. to spy on terrorists and thwart attacks. The bill would create new protections for "legitimate" whistle-blowers to bring their concerns to Congress or agency leaders, the committee said. The measure would also make the NSA director and inspector general subject to Senate confirmation. "We recognize that budget reductions and sequestration are impacting our intelligence agencies, and Congress has a responsibility to ensure the [director of national intelligence] and other intelligence leaders have the resources and flexibility they need to protect the nation,” committee Chairwoman Dianne Feinstein (D-Calif.) said in a statement. The exact level of funding for the surveillance programs is classified. According to documents leaked by Snowden to The Washington Post, the "black budget" for intelligence operations in 2013 was $52.6 billion, including $10.8 billion for the NSA alone. The funding reauthorization bill now heads to the Senate floor. The House Intelligence Committee has yet to move companion legislation. Both houses support the ITP Abbott 13 (Maxwell, PR Watch, Bills in Congress Crack Down on Whistleblowers, 21 December 2013, http://www.truth-out.org/opinion/item/20777-bills-in-congress-crackdown-onwhistleblowers#, JZG) President Obama was elected on a platform that included promises for increased transparency and openness in government. Despite this rhetoric, Obama has prosecuted more whistleblowers than any administration in history and overseen the massive growth of the NSA's surveillance apparatus. In November, the Senate (S. 1681) and House (H.R. 3381) Intelligence Committees each released their own version of the "Intelligence Authorization Act for Fiscal Year 2014." This was an opportunity for Congressional leadership to address one of the defining issues of our time and either take a stand for increased transparency or continue down an Orwellian path of pervasive secrecy. A review of each chamber's proposed legislation demonstrates that "1984" is the future. Stopping "Insider Threats" The bills contain provisions which will intensify efforts to stop whistleblowers or "insider threats," no doubt inspired by Edward Snowden and his release of sensitive NSA documents. The House version of the funding bill provides $75 million of increased funding specifically for classified information protection. According to Tom Devine, Legal Director of the Government Accountability Project, "the 'insider threat' program is a cover for a witch hunt of whistleblowers." The media and both parties support being tough on whistleblowers Hanrahan 15 —John Hanrahan is a former executive director of The Fund for Investigative Journalism and reporter for The Washington Post, The Washington Star, UPI and other news organizations. He also has extensive experience as a legal investigator. Hanrahan is the author of Government by Contract and co-author of Lost Frontier: The Marketing of Alaska. 6-25-2015 ("War on Whistleblowers, After Obama,"consortium news, 6-25-2015, Available Online at 88 https://consortiumnews.com/2015/06/25/war-on-whistleblowers-after-obama/, Accessed 7-142015) And here’s another thing: With leaders of both political parties having either kept silent or cheered on the Obama administration’s unprecedented crackdown on whistleblowers, who in high position in Congress would have one shred of moral authority or credibility to challenge a future president’s excesses under the Espionage Act? On the question of keeping American citizens in the dark and of punishing whistleblowers who dare to enlighten them, we truly have bipartisan authoritarianism. NSA whistleblower Edward Snowden speaking in Moscow on Oct. 9, 2013. (From a video posted by WikiLeaks) NSA whistleblower Edward Snowden speaking in Moscow on Oct. 9, 2013. (From a video posted by WikiLeaks) And then a third thing: Don’t count much on major U.S. news media for any meaningful oversight of, and opposition to, the treatment of whistleblowers under future presidents. The mainstream press and big-name journalists — with some intermittent, notable exceptions such as these two New York Times editorials and this Newark Star-Ledger editorial — have largely ignored the jail-the-whistleblowers policies of the Obama administration. Or, worse, as we’ve reported before, some of the most prominent names in the media joined elected and appointed government officials in calling for harsh penalties for Edward Snowden, Chelsea Manning, Julian Assange and Wikileaks, and others whom they claim (without proof) to have endangered U.S. national security by providing classified information to the news media. With his Justice Department having produced three times as many Espionage Act indictments for classified document disclosure as all other administrations combined since the passage of that legislation back in 1917, Obama has opened the door for his successors to continue — and even expand — the assault on national security state whistleblowers who act in the public interest. Would any of the announced presidential candidates close that door after Obama leaves office in January 2017? Again, as with leading journalists and members of Congress, don’t count on it. It’s an open question as to whether any future president could be more aggressive than Obama in going after whistleblowers. But based on the vengeful views of many of the large crop of Republican candidates and on Democratic front-runner Hillary Clinton’s tough statements on Edward Snowden’s NSA spying disclosures, prospects are not good for a sharp departure from the whistleblower crackdown of the last six years. Clinton and leading Republican candidates take the hard line that Snowden committed a serious crime and must be punished for it, with no chance of leniency. Obama is all in on the war on whistleblowers [then some flip flop link in the other ptx file] Chapman 15 —Chapman is president and founder of the American Small Business League, 430-2015 ("Congress should investigate the war on government whistleblowers," 4-30-2015, Available Online at http://thehill.com/blogs/congress-blog/the-administration/240592congress-should-investigate-the-war-on-government, Accessed 7-14-2015) 89 I searched the phrase “Obama’s war on whistleblowers” the other day and was stunned at the number of stories that popped up on the Internet. The Obama administration’s unprecedented war on whistleblowers and the administration’s historic lack of transparency has been reported all around the world. Academy award winning director Robert Greenwald’s documentary, The War on Whistleblowers, chronicles the nightmare four individuals endured to expose unsafe weapons systems at the Pentagon and illegal activities by federal agencies. Congress should hold hearings on why federal employees and private citizens that have exposed blatant wrong doing by federal contractors and illegal behavior by federal agencies continue to be harassed and persecuted. Individuals that report fraud and illegal activities by federal agencies are still having their careers ruined and in some cases facing federal prosecution and even harassment by the IRS. If you uncover a government contractor that has cheated the federal government you can receive millions in rewards under the False Claims Act. I think the same principal should apply for uncovering fraud within the federal government. If a federal employee or private citizen exposes fraud within the federal government they should be assisted and protected not persecuted and prosecuted. have won dozens of legal battles with the federal government under the Freedom of Information Act. My research prompted the first GAO investigation into fraud in federal small business contracting programs. Now the House Small Business Committee has unanimously adopted an amendment to request yet another GAO investigation into fraud in federal small business contracting programs based on my research. Rep. Janice Hahn (D-Calif.) drafted the amendment to uncover why Fortune 500 firms continue to land billions in federal small business contracts year after year. The federal government should support and protect private citizens like myself that expose fraud and abuse within the government, but unfortunately that has not been my experience. I recently won a major Freedom of Information Act case against the Pentagon. Federal District Court Judge William Alsup described me as being in a “David and Goliath” battle with “big government.” In talking about the Pentagon’s efforts to withhold information Judge Alsup stated, “and here is the United States covering it up.” In a subsequent hearing he accused the Pentagon of “trying to suppress the evidence.” Is the United States Department of Justice helping me to uncover abuse and mismanagement at the Pentagon? No, the Department of Justice is representing the Pentagon and essentially helping them withhold evidence of possible fraud and abuse in the Pentagon’s Comprehensive Subcontracting Plan Test Program (CSPTP). It seems like I’m doing the job the Justice Department and the SBA Office of Inspector General should be doing. Shouldn’t they be doing all the work I have done to expose fraud and abuse in federal small business contracting and subcontracting programs? Looking at the way whistleblowers have been treated recently I’m concerned that I’m more likely to get a retaliatory IRS audit and/or prosecution by the Department of Justice than any kind of protection or assistance from the federal government. 90 Flip flopping when it comes to Executive Orders drains Political Capital — immigration proves Brown 14 —Carrie Budoff Brown is the editor of POLITICO Europe. , 7-25-2014 ("Obama's immigration flip flop," POLITICO, 7-25-2014, Available Online at http://www.politico.com/story/2014/07/barack-obama-immigration-rhetoric-then-vs-now109352.html, Accessed 7-14-2015) Obama’s pledge to use his executive powers by the end of the summer marked both a dramatic reversal in rhetoric and a major strategic shift on immigration. The president is no longer emphasizing his own powerlessness but rather his determination “to fix as much of our immigration system as I can on my own, without Congress.” The administration is examining how far it can go, legally and politically, to protect millions of undocumented immigrants from deportation. Despite the flow of young Central American children across the southwestern border, Obama remains committed to taking significant action, according to senior advisers and advocates who have attended recent meetings with White House officials. In other words, Obama has signaled that he intends to do exactly what he’s long said he’s unable to do. “I take executive action only when we have a serious problem, a serious issue, and Congress chooses to do nothing,” Obama said last month in his Rose Garden announcement. “And in this situation, the failure of House Republicans to pass a darn bill is bad for our security, it’s bad for our economy, and it’s bad for our future.” Even immigrant rights advocates, who were on the receiving end of the White House denials for years, were surprised by his abrupt and enthusiastic move toward executive action in June after House Speaker John Boehner (R-Ohio) ruled out a legislative overhaul of immigration this year. Activists had gotten so fed up in recent months that some tagged the president as the “deporter-in-chief” and demanded that he shift immediately from a legislative strategy to an administrative one. “The way they talked about it was, ‘There’s nothing we can do, only Congress can solve it, we don’t have the authority,’” said Lorella Praeli, director of advocacy and policy for United We Dream. “That is very different from what they are saying today. It is completely different.” The shift could be used by critics as an example of Obama saying one thing and doing something else, another “evolution,” in White House parlance, on a hot-button social issue. Some Republicans see it as fertile ground for advancing their midterm election strategy, which focuses on raising questions about the president’s credibility and competence. “It brings into question, when he commits to other things, whether he will keep that commitment,” said Sen. John McCain (R-Ariz.), who worked closely with Obama on passing a Senate immigration overhaul bill last year. “Things in this town, to a large degree, are done on people’s commitments.” Executive Orders divide Democrats and unite the GOP against Obama. Kraushaar 14 —Josh Kraushaar is the political editor for National Journal, and pens the weekly "Against the Grain" column. Kraushaar has been managing editor for politics at National Journal, and as executive editor and editor-in-chief of The Hotline. In addition to his 91 management of The Hotline, Kraushaar plays a critical role in shaping National Journal's overall political coverage. He was a political correspondent for PoliticoKraushaar has also served as the editor of House Race Hotline. Kraushaar has appeared as a political analyst on television and radio, including FOX News, MSNBC, CNN, National Public Radio and C-SPAN., 11-18-2014 ("Obama's Agenda Threatens to Divide the Democratic Party," nationaljournal, 11-18-2014, Available Online at http://www.nationaljournal.com/against-the-grain/obama-s-agendathreatens-to-divide-the-democratic-party-20141118, Accessed 7-14-2015) President Obama's biggest problem over the next two years may not be coming from recalcitrant Republicans, but from members of his own party blanching at his activist agenda over the final two years of his presidency. While the midterm election results suggested widespread dissatisfaction with the president's policies, Obama nonetheless is planning to press forward on several polarizing decisions in his final two years. It could help advance his legacy, but come at the expense of the Democratic Party's long-term health. Three of the administration's biggest agenda items—threatening a veto of bipartisan legislation authorizing construction of the Keystone XL pipeline, reaching a nuclear deal with Iran, and issuing an executive order legalizing millions of illegal immigrants—divide Democrats, and unite Republicans. If the president moves forward with all of them, it would aggravate fissures in an increasingly-divided Democratic Party. And it would put Hillary Clinton, his party's expected 2016 standard-bearer, in an uncomfortable position even before she announces her candidacy. She's already avoided taking stances, if not outright rejecting the direction Obama is heading during his final two years in office. The dirty secret in Washington is that while Obama (rightly) blamed Republicans for holding positions to the right of the American electorate, the president is pursuing policies that are equally as far to the left. Approving construction of the long-delayed Keystone XL pipeline may not be the most consequential legislation, but it is symbolic of the lengths the administration has gone to avoid a postelection bipartisan accomplishment. Embattled Sen. Mary Landrieu, on the ballot next month in a Louisiana Senate runoff, has been furiously lobbying colleagues to approve the pipeline, and won support from 14 Democrats in an unsuccessful vote Tuesday. A new USA Today poll of adults, conducted last week, found strong support for it—60 percent backing construction of the Keystone pipeline, with only 25 percent opposed. This month, the Pew Research Center found even 44 percent of Democrats supporting it, with 46 percent opposed. When Republicans take control of the Senate in January, it's expected to pass with at least 63 votes. A president looking to change the tone in Washington would be well-served to find common ground on an issue that members of both parties agree on. But instead, he dismissed its jobcreating benefits and left his spokesman, Josh Earnest, to hint at a veto last week. The project has now been delayed for six years. Given that energy issues played a consequential role in Senate contests from Colorado to Kentucky—and are dooming the prospects of an otherwisereliable ally in Landrieu—the administration's stubbornness on the issue is baffling. If it's only a symbolic issue, why not use it to build some confidence-building capital with Republicans on other more significant goals? Blame environmental activists, who make up a small slice of the Democratic electorate but an outsize share of influence, for the gridlock. The president is either being held hostage by his 92 base, or is in sync ideologically with their interests. Either way, it's remarkably similar to the problems Republican congressional leaders faced with their rank-and-file—a conflict that led to the deeply unpopular government shutdown. (And as I wrote in last week's column, there are clear signs that the incoming Republican-controlled House and Senate are more pragmatic than their predecessors, making the president's leftward lurch before the next Congress is even sworn in a case of awful timing.) Public opinion is more closely divided on immigration reform. Majorities sympathize with the ends but not the means of the administration's intent to issue an executive order legalizing millions of undocumented immigrants. There's a reason that the president avoided intervening in the middle of the midterm campaign, a telltale acknowledgement that a unilateral decision was a major political loser. The latest round of polling backs that up. Among all adults surveyed in a new USA Today poll, a 46 percent plurality want the president to wait for the GOP Congress to act on immigration, while 42 percent support the president's desire to act now. If the sample was of registered voters, the margin would be even greater. Within the White House, the prevailing political support for the sweeping executive action is twofold: Win back enthusiasm from Hispanic voters, and bait Republicans into opposing the move in the most self-defeating way possible. It's a risky political decision, one that downplays the fact that the White House is running against public opinion on the issue and spending the little political capital Obama has left in doing so. There's hardly a guarantee that Hispanics would respond to the executive order by turning out for Hillary Clinton, and it could spark a backlash from blue-collar voters migrating away from the party. Over one-quarter of Democrats oppose unilateral action on immigration, a significant enough minority to cause the party future problems. In the meantime, it risks foreclosing other opportunities for working with the GOP Congress on trade, tax reform, or even a scaled-back version of immigration reform in the future. Again, Obama is playing to the base over reaching out to the middle. Unknown cost of Executive Orders cause fights and drain PC Gregory Korte, 15 —Gregory Korte is a White House reporter for USA TODAY, focusing on executive power and the presidency, 3-21-2015 ("How much do executive orders cost? No one knows," USA TODAY, 3-21-2015, Available Online at http://www.usatoday.com/story/news/politics/2015/03/21/cost-of-obama-executiveorders/25024489/, Accessed 7-14-2015) Public opinion is more closely divided on immigration reform. Majorities sympathize with the ends but not the means of the administration's intent to issue an executive order legalizing millions of undocumented immigrants. There's a reason that the president avoided intervening in the middle of the midterm campaign, a telltale acknowledgement that a unilateral decision was a major political loser. The latest round of polling backs that up. Among all adults surveyed in a new USA Today poll, a 46 percent plurality want the president to wait for the GOP Congress to act on immigration, while 42 percent support the president's desire to act now. If the sample was of registered voters, the margin would be even greater. Within the White House, the prevailing political support for the sweeping executive action is twofold: Win back enthusiasm from Hispanic voters, and bait Republicans into opposing the move in the most self-defeating way possible. It's a risky political decision, one that 93 downplays the fact that the White House is running against public opinion on the issue and spending the little political capital Obama has left in doing so. There's hardly a guarantee that Hispanics would respond to the executive order by turning out for Hillary Clinton, and it could spark a backlash from blue-collar voters migrating away from the party. Over one-quarter of Democrats oppose unilateral action on immigration, a significant enough minority to cause the party future problems. In the meantime, it risks foreclosing other opportunities for working with the GOP Congress on trade, tax reform, or even a scaled-back version of immigration reform in the future. Again, Obama is playing to the base over reaching out to the middle. When President Obama issued an executive order granting civilian federal employees a 1% pay raise last December, the White House did not tell Congress how much those raises would cost. Instead, White House Office of Management and Budget Director Shaun Donovan said in a report that the order "is not anticipated to increase discretionary obligations and outlays overall." To Rep. Ander Crenshaw, R-Fla., that statement is "ludicrous." As Congress and the White House battle over whether Obama has the executive authority to halt deportation, delay implementation of the Affordable Care Act or negotiate a nuclear deal with Iran, another skirmish has opened up over the question of how much Obama's executive orders cost. The answer: No one knows. Crenshaw, the chairman of a House appropriations subcommittee that controls the White House budget, is trying to fix that. He inserted a provision into the spending bill passed by Congress last year, requiring OMB to issue a statement on the budgetary impact of each executive order. But 10 executive orders later, Congress has no more insight into their cost. OMB has declared six to have a "de minimus," or trivial, effect on costs or revenues, and four are expected to increase spending by an unknown amount. For example, an executive order signed Thursday, requiring agencies to cut their greenhouse gas emissions by 40%, contains the same boilerplate language as the pay raise. "This executive order is not anticipated to increase discretionary obligations and outlays overall." But it also suggests long-term cost savings through decreased energy and water use. Congress continues to support Insider Threat Aftergood 14 — Steven Aftergood directs the FAS Project on Government Secrecy.("Congress Tells DoD to Report on Leaks, Insider Threats," Federation Of American Scientists, 12-8-2014, Available Online at https://fas.org/blogs/secrecy/2014/12/dod-leaks-report/, Accessed 7-162015) For the next two years, Congress wants to receive quarterly reports from the Department of Defense on how the Pentagon is responding to leaks of classified information. The reporting requirement was included in the pending National Defense Authorization Act for FY 2015 (Sec. 1052). 94 “Compromises of classified information cause indiscriminate and long-lasting damage to United States national security and often have a direct impact on the safety of warfighters,” the Act states. “In 2010, hundreds of thousands of classified documents were illegally copied and disclosed across the Internet,” it says, presumably referring to the WikiLeaks disclosures of that year. “In 2013, nearly 1,700,000 files were downloaded from United States Government information systems, threatening the national security of the United States and placing the lives of United States personnel at extreme risk,” the Act states, in a presumed reference to the Snowden disclosures. “The majority of the information compromised relates to the capabilities, operations, tactics, techniques, and procedures of the Armed Forces of the United States, and is the single greatest quantitative compromise in the history of the United States.” The Secretary of Defense will be required to report on changes in policy and resource allocations that are adopted in response to significant compromises of classified information. The defense authorization act does not address irregularities in the classification system, such as overclassification or failure to timely declassify information. It does call for additional reporting on the Department of Defense “insider threat” program (Sec. 1628), and on “the adoption of an interim capability to continuously evaluate the security status of the employees and contractors of the Department who have been determined eligible for and granted access to classified information.” 95 Insider Threat DA 96 UQ/Links The NITTF is vital for national security but still preserves an environment of productivity and trust NCSC, ’14, (“National Insider Threat Task Force Mission Fact Sheet,” NCSC, Aug 15, 2014, http://www.ncsc.gov/nittf/docs/National_Insider_Threat_Task_Force_Fact_Sheet.pdf)//erg Why was the NITTF established? The National Insider Threat Task Force was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the National Insider Threat Task Force (NITTF) is cochairedbytheU.S.AttorneyGeneralandtheDirectorofNationalIntelligence(DNI). They,in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive (NCIX) to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 70 federal D/As that handle classified material. Currently, the following departments and agencies have representatives on the NITTF: FBI, Office of the National Counterintelligence Executive (ONCIX), Defense Intelligence Agency (DIA), Veterans Administration (VA), and Department of Justice (DOJ). The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The Steering Committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, ODNI, ONCIX, NSA, DIA, the Program Manager-Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. What is an insider threat? It is a threat posed to U.S. national security by someone who misuses or betrays, wittingly or unwittingly, his or her authorized access to any U.S. Government resource. This threat can include damage through espionage, terrorism, sabotage, unauthorized disclosure of national security information, or through the loss or degradation of departmental resources or capabilities.  How does the task force operate? The NITTF has drawn together expertise from across the government in the areas of security, counterintelligence, and information assurance to develop the policies and standards necessary for individual D/As to implement insider threat programs . Part of the NITTF effort involves hosting training and providing D/As with assistance to better educate their workforce to recognize potential insider threat activity, without creating an atmosphere of distrust . The NITTF conducts assessments of the adequacy of insider threat programs within individual D/As. Through its interface with individual D/As, the NITTF identifies and circulates best practices for detecting, deterring and mitigating emerging threats, and continues to assist D/As in troubleshooting issues. How do you detect an insider threat? Detection of potentially malicious behavior involves authorized insider threat personnel gathering information from many sources and analyzing that information for clues or behavior of concern. A single indicator may say little; however, if taken together with other indicators, a pattern of concerning behavior may arise that can add up to someone who could pose a threat . It is important to consider relevant information from multiple sources to determine if an employee’s behavior deserves closer scrutiny, or whether a matter should be formally brought to the attention of an investigative or administrative entity, such as the FBI or an agency’s Inspector General. It is also possible that the individual has no malicious intent, but is in need of help. In either case, the individual may pose a threat to national security, and the situation requires further inquiry. 97 DOD insider threat prevention is getting better now- new tech and behavioral analysis solve threats Pomerleau 15 (Mark, Jul 16, 2015, DOD trying behavioral analytics as a way to thwart insider threats, http://defensesystems.com/Articles/2015/07/16/DOD-IC-behavioral-analytics-insiderthreats.aspx?Page=3, JZG) The thought of a data breach such as the one that hit the Office of Personnel Management is truly frightening to government officials and the public at large. The sensitive personal data of tens of millions of federal employees that has been lifted recently not only puts individuals at risk, but compromises certain operational practices of the U.S. military/intelligence complex. But while these incidents are disturbing, they are also to be expected. “To grab the equivalent in the Chinese system, I would not have thought twice,” former CIA and NSA chief Gen. Michael Hayden (ret.) said recently about the OPM hacks thought to be perpetrated by China. “I would not have asked permission...This is not ‘shame on China.’ This is ‘shame on us’ for not protecting that kind of information.” And while the U.S. works to exploit intelligence gaps and deficiencies of adversaries and protect its own data from similar attacks, one other trend that has blindsided the defense and intelligence communities can’t be overlooked—leaks from the inside. The insider threat has posed significant challenges, from the trove of millions of documents unearthed by former contractor Edward Snowden to the documents released by former Army Pvt. Chelsea Manning. “The insider threat is not new. But what is changing is that threat landscape,” Patricia Larsen, co-director of the National Insider Threat Task Force of the Office of the Director of National Intelligence, said this week during a panel discussion in Arlington, Va., hosted by Defense One. Larsen noted that in the not-so-distant past, these types of breaches were much harder to pull off. One had to stand at a copier, copy several pages, and meet someone somewhere. “Now, somebody sitting at the comfort of their desk can go to a website…and find their secure drop page and upload a classified document or something sensitive, still be anonymous and have that published in tomorrow’s Washington Post…That is a whole different paradigm,” she warned. For Larsen, however, the part of the solution for mitigating potential threats also poses a risk if one is capable of getting into the system. “In the past, it was very hard to get a lot of information about you as a person in one place,” she said. “Now, it is so much easier to pull the entire 360 of an individual using technology and using all the data we’ve collected on you. That is a great, great asset for any insider threat program. It’s also a liability because that same individual can access a ton of information sitting from the comfort of their own workstation as well.” The Defense Department is trying a few different technological approaches to mitigating the insider threat, through various beta programs and behavioral analytics. One such effort is the creation of the DOD Insider Threat Management and Analysis Center, or DITMAC, which would “enable information sharing collaboration analysis and risk management across the Department of Defense components to address current and emerging threats to DOD personnel and missions,” said Mark Nehmer, deputy chief of implementation for DITMAC. In 2013, then-Secretary of Defense Chuck Hagel outlined the establishment of DITMAC as one of four key recommendations following the Navy Yard shooting. Over the past year, DITMAC has worked “to really gather and fuse relative information from different data sources within the department,” said Carrie Wibben, director of Security Policy Operations Directorate at the Office of the Undersecretary of Defense. Information Management Enterprise System Application, or IMESA, is another approach being used to vet individuals with regard to workplace violence, Wibben said. IMESA is also useful for evaluating the identity of individuals by comparing Common Access Cards with information in internal and external databases to ensure that individuals are who they say they are. DOD also is working with behavioral analytics, Nehmer said, to compile the indicators, characteristics and behaviors associated with insider threats, including “ how they’ve written, where were they in social media, where were they in their work life, where were they in their personal life that we know of that we can find – as deep a dive as we can get on the individuals that we know have actually committed insider threat behaviors.” 98 But despite the push of what Nehmer called this “human science,” he said he’s not sure when DOD will be able to establish verifiable metrics for identifying insider threats. The other component to the behavioral issue is tying it to authorizing users within the network. “Authentication goes back to identity. It says you’re credentialed to get in. But what if you steal the credentials? Well now you’re authorized, you have the authority to be there but you still shouldn’t,” Christine Heckart, CMO of Brocade, a data storage and networking solutions firm, said in an interview in June. “So, we’ve got to look beyond identity, beyond the normal sources of authentication to behavior. The network can understand and take a benchmark on all kinds of behavioral based analytics. What is the norm? And the minute you start deviating from that norm, you can say ‘alright, there might be a problem.’” Heckart explained that in real time, the network can respond by either stopping traffic and calling for more analytics or shutting down operations until a human authorizes the activity. “Once we add behavioral-based analytics and tools to the identity and credentialed based system, you’ve got additional layers,” of security protection, she said. Expanded use of multi-factor authentication is something that many security experts and Federal CIO Tony Scott have called for, especially after recent high-profile security breaches. Going forward, one challenge regarding analyzing online behavior, however, is context. Computers and humans have not figured out a way to determine context of social media postings to determine the tone, be it serious or sarcastic, though, this is only one component of a multi-pronged risk assessment. Litany of reasons the program is good Amjad and Gelles, ’15, (Adnan, partner, Cyber Risk Services, Deloitte & Touche LLP and Michael, director, Deloitte Consulting LLP, “9 Building Blocks of Insider Threat Mitigation Programs,” CIO Journal, March 23, 2015, http://deloitte.wsj.com/cio/2015/03/23/9-buildingblocks-of-insider-threat-mitigation-programs/)//erg A definition of insider threats. Few organizations have a specific internal working definition of insider threats because they’ve traditionally paid more attention to preventing external attacks. Yet defining what constitutes an insider threat is an essential first step in formulating a mitigation program; it helps to inform the program’s size, structure, scope, and alignment with business risk priorities. Broadly speaking, an insider threat can be defined as an employee, contractor, or vendor that either maliciously or due to complacency or ignorance uses privileged access in a way that results in malfeasance, whether fraud, espionage, sabotage, data theft, or workplace violence. A risk assessment. It’s important to prioritize the critical assets requiring extra protection—for example, facilities, source code, and customer information—and determine the organization’s tolerance for loss of or damage to those assets. Identify the top threats that could affect your business and consider vulnerabilities from a technology and process perspective: What weaknesses or loopholes could an insider abuse? How could an employee exploit or damage a facility, product, process, or fellow employees without ever using a computer system? Tailor the development of the insider threat mitigation program to address those specific needs and threats, and take into account the organization’s culture—in other words, the specific measures it may or may not be willing to take (such as monitoring employees, blocking Web mail, or restricting the use of USB drives) to protect critical assets while sustaining the way it has traditionally operated and done business. Broad-based support. An insider threat mitigation program should have one owner but comprise a broad set of invested stakeholders. It should also have top leadership support. Consider establishing a cross-disciplinary insider threat working group with stakeholders from a variety of functions that may include HR, risk, legal, finance, IT, and research and development (R&D). These stakeholders can serve as change agents and cement buy-in from their respective functions. The working group should assist in addressing common concerns, such as privacy and legal issues, and support the development of messaging tailored to executives, managers, and the broader employee population. Technology. Identity and access management systems, compliant provision systems, data loss prevention systems, digital rights management systems, and encryption are just a few of the technologies companies can implement to help monitor and prevent unauthorized access and restrict employees’ ability to download, print, or transmit certain data assets. People-centric policies and training. While technology is an essential component of detecting and preventing insider threats, insider threats are fundamentally a people issue that involves a peoplecentric solution. Consequently, an insider threat mitigation program should define the behavioral expectations of the workforce through clear and consistently enforced policies that also articulate the consequences for violating them. Policy areas might include segregation of duties, social media, processes for reporting incidents, and bring your own device. The program should also include customized security training based on employees’ physical 99 and network access levels, privilege rights, and job responsibilities. Audits and verification. Establishing routine and random reviews of privileged and critical functions such as IT, finance, and R&D can also help identify potential insider threats. Continually monitor systems that employees in those functions access and the data they download. Organizations should trust their workforce, but balance that trust with verification to avoid unfettered access and single points of failure. Behavioral analysis. Case studies analyzed by the CERT Division of the Software Engineering shown that insider threats are seldom impulsive acts. Instead, the analyses indicate that insiders move on a continuum from idea to action. Along the way, they often display observable behaviors that can serve as risk indicators or otherwise signal malicious intent: They may begin coming in late to work, staying at the office after hours, violating policies, or trying to access systems or facilities they don’t typically use. Therefore, effective detection of insider threats should include Institute at Carnegie Mellon University³ have behavioral-based techniques that consider how people operate in the office and on the network, and build baselines of normal behavior to help identify anomalies. Analytics. Correlating precursors or potential risk indicators can give organizations insights into micro and macro trends regarding the high-risk behaviors exhibited across the organization. An advanced analytics platform that correlates data from a variety of tools can help organizations identify potential insider threats to investigate. Analytics can also shed light on processes and policies that the organization should either strengthen or implement; these processes can often enhance efficiency and productivity. Status quo solves—the program is becoming more targeted and effective—it’s necessary for security Dillard, ’14, (John, President of Big Sky, application of evidence-based management science to security and insider threats, “Changes To National Insider Threat Policy: Is Your Agency Prepared?” Big Sky, 2014, http://www.bigskyassociates.com/blog/bid/370857/Changes-ToNational-Insider-Threat-Policy-Is-Your-Agency-Prepared)//erg Until recently, national insider threat policy wasn’t measuring if your agency’s insider threat detection program actually identified insider threats. The only measure was that you had a program that met certain standards. However, all of that is changing fast , especially for agencies under the Department of Defense. (Other agencies likely need to follow suit, more below.) Because of major insider threat incidents like THE WASHINGTON NAVY YARD SHOOTING and Edward Snowden’s information leaks, federal law now mandates that your agency not only have an insider threat detection program, but that your internal organizational security meet specific functioning standards. In order to understand what action steps your agency needs to take today, we need to take a step back to review the evolving story of national insider threat policy. Memorandum For National Insider Threat Policy In November 2012, President Obama issued a MEMORANDUM FOR ALL AGENCIES UNDER HIS JURISDICTION entitled, “The National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs.” The policy requires all executive departments and agencies that access classified information to establish insider threat detection programs. The required programs must adhere to minimum standards for personnel security, threat and risk analysis, law enforcement, information sharing, network monitoring and training and awareness. Each agency and department must conduct quarterly self-assessments on insider threat compliance and report the results to the National Insider Threat Task Force, which oversees the policy implementation. Memorandum Failure Points As with most far-reaching national policies, many of the memorandum’s requirements aren’t specific in expressing what insider threat compliance involves. Usually, it is up to the agencies themselves to determine compliance. For example, the mandatory self-assessments use metrics known as Key Information Sharing and Safeguarding Indicators (KISSI). These are essentially “yes or no” questions that assess whether an agency has an insider threat detection program. There are about fifty of these questions in the assessment, including: Do we have an implemented 100 insider threat program? Do we have an insider threat policy? Do we monitor user activities for insider threat indicators? Do we conduct briefings for travel to countries with high-risk security threats and vulnerabilities? KISSI assessments are useful for a highlevel view of an agency’s insider threat compliance, but they don’t measure the effectiveness of the program. Instead, metrics should CALCULATE THE VALUE OF DIFFERENT EFFORTS IN PREVENTING INSIDER THREATS and should require nuanced discussion in their answers. For example, after noting that your agency employs network monitoring tools, you should also ask: What kinds of network monitoring tools are employed? How much do they cost? What aspects of user behavior do they monitor? How effectively do they detect anomalous or suspicious behavior? With the Snowden affair and Navy Yard shooting occurring after the November 2012 memorandum was issued, the failure points of the policy became clearer. As a result, federal policy focused more intently on the effectiveness of insider threat detection programs. A Shift Toward Effectiveness: The 2014 NDA Act The best example this shift toward insider threat detection effectiveness is the 2014 National Defense Authorization (NDA) Act. This law mandates the Secretary of Defense, Director of National Intelligence and the Director of the Office of Management and Budget develop a strategy to modernize personnel security for the Department of Defense and reduce insider threats and espionage. The President and Congress also demanded that these updated processes be evaluated with specific metrics. By assessing the effectiveness of the Defense Department’s insider threat detection program, the new law could be much more applicable in deterring and detecting potential threats. Implications For Other Federal Agencies While the NDA Act focuses primarily on Defense Department personnel, the law also emphasizes the importance of sharing information between different agencies – including those not under the Department of Defense. Specifically, it calls for the electronic integration of information systems between every agency deemed necessary for complete insider threat assessment and deterrence. If your agency is included in that information sharing or system integration, then you need to prepare your agency for full compliance with the NDA Act and its insider threat detection implications. The NDA Act shows that Congress and the President aren’t satisfied with agency self-built and self-assessed insider threat programs – instead, they’re raising the bar. While that might initially only include the Department of Defense and a handful of connected groups, every agency should plan for the NDA’s jurisdiction to widen if its initial requirements are successful. Even if your agency doesn’t fall under the initial jurisdiction of the new law, start preparing today for more accountable insider threat detection metrics. And since NDA requirements don’t come with an explicit budget increase, plan to COMPLETE YOUR UPGRADES WITH LITTLE OR NO BUDGET BOOST. Insider threat program secures DoD programs that combat terrorism and crime Work, ’14, (Robert O., Deputy Secretary of Defense, “The DoD Insider Threat Program,” NUMBER 5205.16, September 30, 2014, http://www.dtic.mil/whs/directives/corres/pdf/520516p.pdf)//erg 1. PURPOSE. In accordance with sections 113 and 131 through 137 of Title 10, United States Code (U.S.C.) (Reference (a)); Presidential Memorandum (Reference (b)); Executive Orders (E.O.s) 12333, 13526, and 13587 (References (c), (d), and (e)); section 922 of Public Law 112- 81 (Reference (f)); National Security Directive 42 (Reference (g)), and Committee on National Security Systems Directive 504 (Reference (h)), this directive: a. Establishes policy and assigns responsibilities within DoD to develop and maintain an insider threat program to comply with the requirements and minimum standards to prevent, deter, detect, and mitigate actions by malicious insiders who represent a threat to national security or DoD personnel, facilities, operations, and resources. b. Identifies appropriate training, education, and awareness initiatives that may be made available to DoD personnel and contractors in accordance with Reference (b). c. Ensures appropriate DoD policies, including but not limited to counterintelligence (CI), cybersecurity, security, civilian and military personnel management, workplace violence, emergency management, law enforcement (LE), and antiterrorism (AT) risk management, are evaluated and modified to effectively address insider threats to DoD. d. Cancels Secretary of Defense Memorandum (Reference (i)). e. Incorporates and cancels Deputy Secretary of Defense Memorandum (Reference (j)). 2. APPLICABILITY. This directive: a. Applies to: (1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant 101 Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within DoD (referred to collectively in this directive as the “DoD Components”). (2) Contractors and other non-DoD entities that have authorized access to DoD resources as required by their contract or agreement. (3) Individuals who volunteer and donate their services to the DoD Components, including non-appropriated fund instrumentalities, pursuant to DoD Instruction (DoDI) 1100.21 (Reference (k)). b. Will not alter or supersede: (1) The existing authorities and policies of the Director of National Intelligence regarding the protection of sensitive compartmented information and special access programs for intelligence as directed by Reference (c) and other laws and regulations. (2) Existing statutes, E.O.s, and DoD policy issuances governing access to or dissemination of LE, LE sensitive, or classified LE information. (3) Existing suspicious activity reporting and dissemination requirements as outlined in DoDI 2000.26 (Reference (l)). 3. POLICY. It is DoD policy that: a. DoD will implement the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs in accordance with References (b), (e), (f), and (h). b. The threat that an insider will use their authorized access to do harm to the security of the United States requires the integration and synchronization of programs across the Department. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosure of national security information, or through the loss or degradation of resources or capabilities. Insider Threat Program allows for reasonable monitoring in vital national security departments Work, ’14, (Robert O., Deputy Secretary of Defense, “The DoD Insider Threat Program,” NUMBER 5205.16, September 30, 2014, http://www.dtic.mil/whs/directives/corres/pdf/520516p.pdf)//erg Through an integrated capability to monitor and audit information for insider threat detection and mitigation, the DoD Insider Threat Program will gather, integrate, review, assess, and respond to information derived from CI, security, cybersecurity, civilian and military personnel management, workplace violence, AT risk management, LE, the monitoring of user activity on DoD information networks, and other sources as necessary and appropriate to identify, mitigate, and counter insider threats. d. Appropriate training, education, and awareness of the insider threat will be provided to DoD military and civilian personnel, DoD contractors, and volunteers who have access to DoD resources. DoDD 5205.16, September 30, 2014 2 e. The collection, use, maintenance, and dissemination of information critical to the success of DoD efforts to counter insider threats must comply with all applicable laws and DoD policy issuances, including those regarding whistleblower, civil liberties, and privacy protections . (1) Personally identifiable information (PII) for U.S. persons must be handled in accordance with section 552a of Title 5, U.S.C. (also known as “The Privacy Act of 1974” (Reference (m))), DoD Directive (DoDD) 5400.11 (Reference (n)), and DoD 5400.11-R (Reference (o)). (2) Defense Intelligence Components will handle U.S. persons’ PII in accordance with DoD 5240.1-R (Reference (p)). (3) Activities related to the insider threat program, including information sharing and collection, will comply with DoDI 1000.29 (Reference (q)). (4) Information on individuals and organizations not affiliated with the DoD will not be collected unless allowed pursuant to DoDD 5200.27 (Reference (r)). (5) Personally identifiable health information must be handled in accordance with Public Law 104-191 (Reference (s)), parts 160, 162, and 164 of Title 45, Code of Federal Regulations (Reference (t)), DoDI 6490.04 (Reference (u)), DoDI 6490.08 (Reference (v)), DoD 6025.18-R (Reference (w)), and DoD 8580.02-R (Reference (x)). 4. RESPONSIBILITIES. See Enclosure 2. 5. INFORMATION COLLECTIONS REQUIREMENTS. The DoD Insider Threat Program annual progress report and quarterly Key Information Sharing and Safeguarding Indicators questionnaire self-assessment compliance reports, referred to in paragraphs 1e, 5d, 5e, 6e, 6f, 8g, 11f and 11h of Enclosure 2 of this directive, have been assigned report control symbol DD- CIO(A,Q)2561 in accordance with the procedures in Volume 1 of DoD Manual 8910.01 (Reference (y)). 102 Shift to more effective board/oversight is key—avoids paranoia and bad work environment Bunn, ’13, (Chris, Manager of IS Decisions, “Insider Threat Program. From Paranoia to Protection,” IS Decisions, 2013, http://www.isdecisions.com/blog/it-security/insider-threatprogram-from-paranoia-to-protetion/)//erg The Unreported Insider Threat Insider cases are numerous and spin all industries. It’s said that 3 out of 4 cases are unreported! As you can see reputation is perhaps the biggest risk of all. Organizations don’t want to tell or don’t even know. This shouldn’t however be about the business of fear. It calls for a Risk Management approach. Understand the risk and balance it. This however, requires top level strategic oversight for any enterprise . Risk Management is and must be, a problem for the board. Are the board always considered when an organization attempts to manage these risks? From our own research involving 500 IT decision makers, the insider threat is not a top security priority, even for IT professionals. This however could be changing. The belief is that the Target Breach could well be a turning point. The breach resulted in the first CEO to lose their job because of an insider security breach and possibly five other directors to follow. This is significant. Every board should now be thinking this is not going to happen to me. we need to address this problem. The latest news however suggests that the retailer’s chief executive and board may not get a complete picture on the company’s security, if the CISO does not report directly to them. Proactive Steps to Mitigate the Risk Today’s reality is there are proactive steps to mitigate the risk. But organizations and individuals are guilty of not having the time, so end up creating bigger gaps. One typical example is when employees who have left the organization still have access to the network. The thinking suggests if your organization is not doing the basics – forget about any more complex behavior analysis to alert high risks or any big data tools. Building an Insider Threat Program Building an Insider Threat Program moves an organization from paranoia to protection . Not only is this a sensible thing to do but a US Mandate means organizations must develop an Insider Threat Program if dealing with a federal government. It also applies to worldwide companies that are dealing with the US government. To help the CERT Insider Threat Centre has been serving as a trusted broker to assist the community in the short term and through ongoing research since 2001. The foundation of their work is a database of more than 1000 insider threat cases, government records and information from criminals themselves, which helps characterize the nature of the insider threat problem and offers dynamic indicators of insider threat risk. They also identify and experiment with administrative and technical controls for insider threat mitigation. The CERT Insider Threat Program helps organizations consider or start making themselves more secure and more immune to reputation and financial damage. In the UK, The CPNI (Centre for the Protection of National Infrastructure) and PA Consulting published new guidance (HoMER) to help organizations reduce employee risk. HoMER (Holistic Management of Employee Risk) offers a range of practical measures to help organizations reduce the risk from their employees. The risk ranges from oversight such as sharing passwords to opportunistic behavior including theft and fraud. Moving from paranoia to protection Moving from paranoia to protection means involving a sophisticated tool set, staff and manager’s awareness and an efficient process. At IS Decisions, our solution UserLock is a unique and proven technology tool that helps organizations mitigate the risk of insider threat by securing users access to the shared Windows network. Whether we’re dealing with careless or malicious activity both involve authenticated users who have access and rights. Organizations are recognizing the need to better manage and secure network access for authenticated users to reduce the risk of security breaches. FileAudit helps organizations proactively track, alert and report on all access (and access attempts) to files and folders. It helps protect an organizations most sensitive information stored on Windows Servers. Team methods and co-worker cooperation can detect threats and eliminate dark corners that make attacks possible Catrantzos, ’10, (Nick, Adjunct Professor, Homeland Security & Author of Managing the Insider Threat: No Dark Corners, “Tackling the Insider Threat,” CRISP REPORT, ASIS Foundation, 2010, http://www.popcenter.org/library/crisp/insider-threat.pdf)//erg 103 All a hostile insider needs to carry out an attack are access to a worthy target, an open door, and a dark corner from which to study and strike. Insider threat studies abound, and the malicious insider phenomenon remains statistically rare yet potentially devastating to any institution with critical assets to defend. Accepted wisdom offers conventional security advice: preemployment background investigations, random audits, tighter access controls, more invasive monitoring through procedural or technological innovations. This report combines a review of the insider threat literature with the findings of a Delphi study to arrive at a new approach to defeating the kind of trust betrayer intent on carrying out an attack that is fatal to the organization. While the Delphi research itself began with substantially the same views and counsel as prevailing wisdom represented in the literature, it ended altogether somewhere else. Certain pivot points in the research revealed that a reasonably prepared infiltrator poses a greater threat than a disgruntled career employee—at least if the focus is on adversaries bent on bringing an institution to its knees, rather than on exacting revenge against bosses or carrying out nuisance-level attacks against the employer. Research findings also highlighted flaws in traditional defenses, including background investigations that identify neither the prepared infiltrator nor the future disgruntled careerist. Findings even suggested random audits are seldom truly random and pose only a surmountable hurdle to a worthy adversary. Moreover, ineffective exercise of employer prerogatives like probationary periods appears underexploited as an insider threat defense. Into this context, a new approach emerged. This approach is about engaging co-workers on the team level to take a hand in their own protection . It calls into protective service the vast majority of employees consigned to the sidelines and sometimes referred to as the weakest link in insider defense. Instead, with a shift in emphasis toward more productive countermeasures, the proposed alternative brings these people off the sidelines and onto the front lines, making them the first line of defense. No Dark Corners extends to private spaces and institutions the seminal theories of proprietary interest and ownership that “Defensible Space” and “Fixing Broken Windows” demonstrated for public housing and community environments. In defending against insider threats, this approach proposes less emphasis on the laser of specialized monitoring by corporate sentinels. Instead, it promotes using the flashlight of open team engagement as a method of implementing layered defenses , particularly on the front lines of detection and intervention, where critical operations take place. Snowden could have been detected with the program—insiders are dangerous but detectable McNamera, ’13, (Paul, “Snowden used sys admin role to collect passwords: Reuters,” Network World, Nov 8, 2013, http://www.networkworld.com/article/2225752/security/snowden-used-sys-admin-role-tocollect-passwords--reuters.html)//erg Reuters is reporting this morning that former NSA contractor Edward Snowden "persuaded" some two dozen colleagues at a Hawaii government facility to give him their login credentials by claiming it was necessary for him to do his job as systems administrator. From that Reuters report: A handful of agency employees who gave their login details to Snowden were identified, questioned and removed from their assignments, said a source close to several U.S. government investigations into the damage caused by the leaks. Snowden may have persuaded between 20 and 25 fellow workers at the NSA regional operations center in Hawaii to give him their logins and passwords by telling them they were needed for him to do his job as a computer systems administrator, a second source said. The revelation is the latest to indicate that inadequate security measures at the NSA played a significant role in the worst breach of classified data in the super-secret eavesdropping agency's 61year history. It's not clear whether "removed from their assignments" means fired or not, but, if true, his damaging the careers of coworkers will add another dimension to the debate about whether Snowden is a whistleblower or a traitor. What is clear has 104 long been understood, though: There is no greater security threat than a "trusted" insider with access. Behavioral analysis within the program stops attacks Winkler and Manke, ’14, (Ira, Irari Report, Secure Mentem, Internet Security Advisors Group and Samantha, Executive Vice President of Secure Mentem,” How to create awareness of the insider threat,” CSO, Apr 15, 2014, http://www.csoonline.com/article/2142603/securityleadership/how-to-create-awareness-of-the-insider-threat.html)//erg One of the results of Edward Snowden's data leak is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities. The question then becomes how do you train employees to tactfully recognize the signs of a malicious insider, without creating widespread distrust within an organization. Back when I worked at NSA, one of my coworkers pointed out two documents that both describe a fellow employee who was 1) always interested in what their coworkers are doing, 2) volunteers for extra assignments, 3) always works late, and 4) never takes a vacation. One of the documents was from human resources on how to get promoted. The other was from the security department describing how to tell if your coworker is a spy. MORE ON CSO: 10 ways to prep for – and ace – a security job interview Clearly NSA employees failed to determine which side of the spectrum Snowden fell on, while employees at his past employer, the CIA, accurately determined his predisposition to expose classified information. Snowden demonstrates that even within organizations that should know better, detecting a malicious insider is hit or miss. How then is an organization outside of the Intelligence Community supposed to make their employees aware of the concern, especially without inspiring a witchhunt? The problem is real. Malicious insiders have wreaked havoc in organizations of all types. While the IT world focuses on stories of rogue administrators, insiders in all roles carry out thefts and other malicious actions. While some wrongdoers are very clever and are able to cover their actions very well, the reality is that just about all malicious insiders show indications of their intent. This is relevant to awareness programs as their coworkers are in the best position to see those indications. Balancing concerns of tact and awareness is delicate, but it must be done to maintain order. Generally, there are three requirements for awareness to be effective: 1) Understanding of the problem, 2) Knowledge of what actions to take, and 3) Motivation to take the appropriate actions. Generally understanding the problem should create motivation, but an effective awareness program must specifically ensure that it addresses both concerns . You can be aware an issue exists, while not being motivated to do anything about it. The easy part of addressing the insider threat is that there are now many examples to help get the message across. People like Snowden and Chelsea Manning are clear examples that it only takes one person to cause a lot of damage. While these individuals have become household names, it is better to use examples from your own company or industry. While some companies understandably do not like to highlight their own incidents, they can anonymize the cases. The message is actually simple, insiders are a big threat and do not ignore signs of questionable behaviors. The message tagline could be the organizational equivalent of, “If you see something, say something.” The message should highlight to be on the lookout for violations of policies and procedures. It is also critical to remind employees that it is people, just like themselves, who have stopped major insider crimes. [Why companies need to check their handling of internal threats] Insider Threat program utilizes patterns and best data studies Moore, ’14, (Andrew P, CERT Insider Threat Team Research Leader, “Designing Insider Threat Programs,” SEI, September 29, 2014, http://blog.sei.cmu.edu/post.cfm/designing-insiderthread-programs-272)//erg Insider threat is the threat to organization’s critical assets posed by trusted individuals - including employees, contractors, and business partners - authorized to use the organization’s information technology systems. Insider threat programs within an organization help to manage the risks due to these threats through specific prevention, detection, and response practices and technologies. The National Industrial Security Program 105 Operating Manual (NISPOM), which provides baseline standards for the protection of classified information, is considering proposed changes that would require contractors that engage with federal agencies, which process or access classified information, to establish insider threat programs. The proposed changes to the NISPOM were preceded by Executive Order 13587, Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information. Signed by President Obama in September 2011, Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement insider threat detection and prevention programs. Since the passage of Executive Order 13587, the following key resources have been developed: The National Insider Threat Task Force developed minimum standards for implementing insider threat programs. These standards include a set of questions to help organizations conduct insider threat self-assessments. The Intelligence and National Security Alliance conducted research to determine the capabilities of existing insider threat programs The Intelligence Community Analyst-Private Sector Partnership Program developed a roadmap for insider threat programs. CERT’s insider threat program training and certificate programs are based on the above resources as well as CERT’s own Insider Threat Workshop, common sense guidelines for mitigating insider threats, and in-depth experience and insights from helping organizations establish computer security incident response teams. As described in this blog post, researchers from the Insider Threat Center at the Carnegie Mellon University Software Engineering Institute are also developing an approach based on organizational patterns to help agencies and contractors systematically improve the capability of insider threat programs to protect against and mitigate attacks. A Pattern-based Approach to Insider Threat This post is the latest installment in an ongoing series describing our research to create and validate an insider threat mitigation pattern language to help organizations prevent, detect, and respond to insider threats. As described in a previous post, our research is based upon our database of more than 700 insider threat cases and interviews with the United States Secret Service, victims’ organizations, and convicted felons. From that database, we identified 26 patterns that capture reusable solutions to recurring problems associated with insider threat. Insider threat mitigation patterns are organizational patterns that involve the full scope of enterprise architecture concerns, including people, processes, technology, and facilities. This broad scope is necessary because insiders often have authorized access—both online and physical—to organizational systems. Our approach acknowledges inter-relationships between organizational structures, such as policy, training, and employee and policy agreements, and draws upon those inter-relationships to describe the patterns themselves. The following is a high-level outline of a pattern for disabling access after an insider leaves an organization for other employment, an older version of which was published at the 2013 PLOP Workshop: Title: Eliminate Methods of Access after Departure Intent: To avoid insider theft of information or sabotage of information technology after departure Context: An insider is departing an organization for employment elsewhere and you have a comprehensive record of access paths the insider has for accessing the organization’s systems Problem: Insiders who depart an organization under problematic circumstances may become angry to the point of wanting to steal information from the organization or compromise the integrity of the organization’s information or information systems. Active access paths into the organization’s systems after departure provide the opportunity to do that. Solution: Disable accounts that you know about upon departure, and prepare to monitor suspicious remote access after departure for signs of unauthorized access attempts Related Patterns: Monitor Activity after Departure For organizations and agencies establishing insider threat programs, our approach specifies what processes are important and stresses the need for consistent enforcement what policies are important how those processes and policies are implemented both by humans and technology what technology is needed to support all of that There will undoubtedly be great variation in insider threat programs, depending on the risks faced by individual organizations. We therefore use capability development scenarios to designate paths through the mitigation pattern language with the goal of mitigating a specific insider threat behavior. The mitigation pattern outlined above will be used in a capability development scenario described below. Such capability development scenarios serve to guide insider threat program designers as they try to ensure their programs are resilient against insider threats to their critical assets. An Example Capability Development Scenario In a forthcoming report on this topic, we will outline several capability development scenarios (CDSs). One scenario involves mitigating theft of intellectual property when an employee resigns or is fired from the organization: Through our analysis of our insider threat database, we observed that 70 percent of insiders who stole intellectual property from an employer did so within 60 days of their termination from an organization. This CDS urges that both parties must agree at employee hiring regarding the ownership of intellectual property as well as the consequences if the agreement is breached. Upon termination, whether voluntary or forced, the organization should disable insider’s accesses. During the exit interview, the organization must review existing agreements regarding IP. The CDS advocates that an employer monitor insider actions 60 days prior to termination and for 60 days after termination. Suspicious behaviors including uncharacteristically large downloads of intellectual property should be handled either by the human resources or legal departments or a combination of both. As specified by the associated path through the mitigation pattern language, this CDS advocates that organizations Screen Employees Agree on IP Ownership Periodically Raise Security Awareness Log Employee Actions Increase Monitoring Due to an Employee’s Pending Departure Reconfirm Employee Agreements on Departure Eliminate Methods of Access after Departure Monitor Activity after Departure In summary, mitigating theft of IP at departure involves ensuring that the 106 organization increases their monitoring of any insider with access to critical assets for specific suspicious behaviors when the insider resigns or is terminated. In addition, the insider must agree to and be reminded that they can’t take organization-owned IP with them. Future Work in Insider Threat Continuing our efforts to help federal agencies and contractors develop insider threat programs, per executive order 13587, we are now seeking active government partners to apply and refine our approach. We also are continuing our research into fundamental patterns of insider threat mitigation to make sure that they remain well grounded and validated scientifically. Looking ahead, we plan next to investigate insider social networks and the role they play in contributing to insider threat. In particular, we plan to examine how those social networks change over time to determine whether we can distinguish the social networks of malicious and non-malicious insiders. As part of this research, we are collaborating with Dr. Kathleen Carley, a professor at Carnegie Mellon University’s Institute for Software Research in the School of Computer Science. The insider threat program sets extensive threat mitigation standards— employees could unintentionally aid an external organization—detection and monitoring are key Amjad and Gelles, ’15, (Adnan, partner, Cyber Risk Services, Deloitte & Touche LLP and Michael, director, Deloitte Consulting LLP, “9 Building Blocks of Insider Threat Mitigation Programs,” CIO Journal, March 23, 2015, http://deloitte.wsj.com/cio/2015/03/23/9-buildingblocks-of-insider-threat-mitigation-programs/)//erg You can’t blame organizations that focus their cyber risk mitigation programs primarily, if not exclusively, on external threats. After all, external actors, including hostile nation-states and criminal organizations, are alleged to have been behind some of the most damaging and high-profile cyber attacks of the past two years. But, often enough, those external actors are assisted by an employee or third party associated with the targeted organization. An employee or contractor, either ignorant of or flippant toward company policies or specific security threats, may unwittingly download malware onto a corporate network, giving attackers access to intellectual property (IP), employee social security numbers, patients’ protected health information, or customer credit card data. On other occasions, employees and contractors aren’t innocent. When they leave a company, some may feel entitled to walk off with IP they helped to develop, even though the IP legally belongs to the organization. And even if they’re not stealing sensitive information for personal or financial gain, plenty get a voyeuristic thrill from accessing data and records that literally aren’t their business. According to a survey conducted on behalf of Raytheon, 65 percent of respondents indicated curiosity, not job necessity, compels users with privileged access to peek (or worse) at sensitive or confidential data.¹ Given the many ways insiders may threaten their organizations’ security, it’s no wonder nearly nine out of 10 IT professionals polled on behalf of data security provider Vormetric believe their organizations are vulnerable to insider threats.² And almost as many IT professionals surveyed appear to have trouble addressing the risks insiders can pose. According to the Raytheon survey, 88 percent of respondents are concerned about insider threats but have difficulty identifying specific threatening actions, and 69 percent said their security tools don’t provide enough context to determine insiders’ intent. A well-designed and executed insider threat mitigation program that considers how individuals conduct themselves in both virtual and physical environments and that includes policies, training, technology, behavioral analysis, and a broad set of stakeholders can help organizations detect, prevent, and respond to insider threats. Here are nine crucial components to consider when implementing a systematic insider threat mitigation program. 107 They are wrong—they get rid of key detection procedures. Behavioral analysis and awareness is key to catch threats Garlipp, ’14, (Matthew, Associate at Grant Thornton LLP, “HOW CAN YOU COMBAT INSIDER THREATS?” Gov Loop, December 3, 2014, https://www.govloop.com/can-combat-insiderthreats/)//erg Insider threats can have severe consequences, with victim organizations facing significant costs and damages. According to the FBI, the average cost per incident is $412,000, with victims losing an average of $15 million a year. Although most agencies primarily focus on external cyber threats, it is crucial to also prepare and combat insider threats. The U.S. Computer Emergency Response Team (CERT) defines an insider threat as: A current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems. Insider threats are not necessarily hackers and they often don’t start with malicious intent. Usually a trigger event — such as a denied vacation or being bypassed for a raise or promotion — initiates the threat. What’s more striking, the CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University found that 90 percent of IT saboteurs were system administrators. Despite this, most security tools are designed with hackers in mind, but they’re not always the real threat. For a more overarching, office-wide approach, Patrick Reidy, former chief information security officer at the FBI, offers three pieces of advice regarding insider threats: A good insider threat program should focus on deterrence, not detection. An employee’s work environment, regardless of job function, should discourage insiders by crowdsourcing security and deploying data-centric, not systemcentric, security. By creating a data-centric approach, organizations can monitor how data moves across an agency and block certain actions from occurring. This gives a more holistic view of data, rather than just simply monitoring a workstation or specific network systems. This helps create an environment where it is difficult to become an “insider.” Avoid the data overload problem. In security efforts, do not get overwhelmed with data. Reidy proposes that only two sources of data are needed: HR data to better understand employees and workplace or personnel issues and system logs to track what is being printed or downloaded via USB, CD or DVD. D etection of insider threats must use behavior-based techniques . Detecting insider threats is very hard, like looking for “a needle in a stack of needles,” Reidy said. By using behavioral analytics, agencies can build a baseline of behavior and look for red flags — anomalies that differentiate potential insiders from innocuous employees. The CERT Division of SEI also provides 10 best practices to prevent and combat insider threats: Institute periodic enterprise-wide risk assessments and security awareness training for all employees. Implement strict password and account management policies and practices. Log, monitor and audit employee online actions, especially unusually large queries, downloads, print jobs or e-mails, or other suspicious behavior. Use extra caution with system administrators and privileged users. Collect and save data for use in investigations. Implement secure backup and recovery processes. Clearly document insider threat controls. Provide an Employee Assistance Program or other recourse for employees experiencing personal problems. Deactivate computer access and change passwords for all accounts upon termination, including external accounts. Train management on the patterns of behavior that could indicate an IT sabotage attack. Insider threats present potentially catastrophic risks for all organizations, no matter what sector. But preparation, awareness, training, periodic assessments and the implementation of security measures and strategies can decrease an organization’s vulnerability. The program provides key oversight that gets rid of dark corners—prevents cascading failure of critical infrastructure—peer vigilance key Catrantzos, ’10, (Nick, Adjunct Professor, Homeland Security & Author of Managing the Insider Threat: No Dark Corners, “Tackling the Insider Threat,” CRISP REPORT, ASIS Foundation, 2010, http://www.popcenter.org/library/crisp/insider-threat.pdf)//erg 108 All a hostile insider needs to carry out an attack are access to a worthy target, an open door, and a dark corner from which to plot and maneuver. Any adversary seeking to strike a devastating blow against any institution need look no further. Public and private sector institutions and critical infrastructures number among the many worthy targets, as would any organization with critical assets to be defended. The potential for loss does not always stop at the door of one target, however. Not only are some targets like infrastructure irreplaceable, their damage or destruction may lead to cascading failures of other, interdependent components, from banking and finance to emergency responders, from transportation and logistics to food and agriculture. All depend on electricity or water or communications–the double-edged sword of living in an interconnected world. The open door comes from a traditional culture of openness and few restrictions to movement or assets in the average workplace. This openness flourishes because local government agencies and investor-owned organizations alike must answer to demanding stockholders, ratepayers, and various regulatory agencies. Even when these organizations have critical assets to protect, when it comes to their public customers, they cannot be perceived as having something to hide. In this environment , defenses against infiltrators or any type of insider threat require a cultural shift . The challenge is to close the door to infiltrators while leaving it open to legitimate workers and business. Even if an infiltrator sets sights on a worthy target and exploits weak defenses , he or she still needs a dark corner free of oversight in order to gather pre-strike intelligence and then initiate an attack without risk of timely intervention and defeat. The best way to defeat such an attack is to remove the dark corners. Our society’s reliance on technology and specialists to solve problems can marginalize the average employee, excluding him or her from playing a useful and necessary role in insider defense. Employees should be recognized as the first line of defense, bringing them onto the front lines with a No Dark Corners approach. Consequently, in addressing the insider threat, we must reconsider our usual efforts to penetrate with the intensity and focus of a laser what we should instead be illuminating with a flashlight. No matter how deep the laser drills, it points to only a fragment of the entire picture. Caught in the laser’s beam, a clever insider can mask or explain away hostile activities with relative ease. The same malicious insider, however, cannot deceive alert peers whose combined, wider gaze acts as a flashlight making enemy action visible before it is too late to intervene. The new approach offers open team and employee engagement as a method of implementing layered defenses, particularly on the front lines of detection and intervention, where critical operations take place. The insider threat remains as alive as it is statistically rare, despite generations of study. Infiltrators continue to pose a risk to critical infrastructure and other institutions . There are no easy answers. No Dark Corners shows promise, however, as an approach to overcome gaps in traditional defenses. By going beyond corporate sentinels to engage stakeholders in their own protection, this approach offers the victory of ownership over surprise. Counter measures against insider threats are critical for preventing crime and terrorist attacks Catrantzos, ’10, (Nick, Adjunct Professor, Homeland Security & Author of Managing the Insider Threat: No Dark Corners, “Tackling the Insider Threat,” CRISP REPORT, ASIS Foundation, 2010, http://www.popcenter.org/library/crisp/insider-threat.pdf)//erg The insider threat is an Achilles heel for critical infrastructure protection and the protection of any enterprise or institution targeted for destruction by adversaries. While risk and vulnerability assessments skyrocketed in the aftermath of 9/11, as reflected in the federal subsidies promoting them, the security focus centered largely on the vulnerability of large populations to attack (Masse, O’Neil, & Rollins, 2007, pp. 5– 7). In this context, adversaries were characterized as traditional attackers working as outsiders who generally approach their targets head on with brute force–precisely in the manner of the 9/11 hijackers. The insider threat, in this context, has 109 been generally relegated to secondary status. One possible reason is that there is a dearth of statistically significant data on hostile insiders. As a review of the current literature indicates, trust betrayal—whether in espionage or other fields— remains statistically rare (Shaw & Fischer, 2005, p. 34; Parker & Wiskoff, 1991, p. 4).1 When analyzed further, the insider threat has been subordinated to cyber security studies centering on hackers and disgruntled employees, ex-employees, or consultants (Brackney & Anderson, 2004; Cappelli, Moore, Trzeciak, & Shimeall, 2009; Leach, 2009). While such studies have supplied value and drawn attention to the problem, they 1 Shaw and Fischer, looking at espionage as a subset of trust betrayal, argued that such trust betrayal appeared relatively rare, while betrayals by cyber insiders might be poised to be more frequent, hence more amenable to profiling and categorizing by subtype. have offered few solutions other than to advise continuing scrutiny. Data compiled to date suggest that the vast majority of insider cyber attacks have been either fraud-driven or moderate in scope and impact. In other words, such attacks remain less than devastating to the targeted employer–the modern, electronic equivalent of embezzlement or vandalism (Kowalski, Cappelli, & Moore, 2008, pp. 24– 26). Similarly, such studies preserve their narrow focus by excluding cases of espionage, while at the same time avowing that the threat remains real and advising ordinary, more-of-thesame solutions like layered defense (Capelli, Moore, Trzeciak, & Shimeall, pp. 6–8). Consequently, it is difficult for security practitioners to derive new insights from cyber- centric insider threat investigations. The net result is that today’s insider threat remains substantially as it did yesterday: often studied retroactively, yet seldom yielding practical tools, tactics, or recommendations that would serve a defender in countering the threat. The overall aim of this study is to identify countermeasures that defenders can use to prevent terrorist attacks via trust betrayers and thereby reduce the vulnerability of critical infrastructure and institutions. The journey to this destination involves applying lessons of experts from other, more mature arenas of defense from insider threats, such as workplace violence, line management, corporate security, and counterespionage. In the course of following this path, the study also explores one answer to the question, “If current indicators and countermeasures fall short, what should we do differently?” Insider threats are real—staff awareness is key to detection Greitzer, et al ’08, (Frank L., a chief scientist at the Pacific Northwest National Labo- ratory, Andrew P. Moore is a senior member of the technical staff of CERT at the Soft- ware Engineering Institute at Carnegie Mellon University, Dawn M. Cappelli is senior member of the technical staff, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull is a graduate fellow with the Oak Ridge Institute for Sci- ence and Education, “Combating the insider Cyber threat,” 2008, http://www.dtic.mil/dtic/tr/fulltext/u2/a498605.pdf)//erg (Summary.pdf ), reveal that current or former employees and contrac- tors are the second greatest cybersecurity threat, exceeded only by hackers, and that the number of security incidents has increased geometrically in recent years. The insider threat is manifested when human behavior departs from com- pliance with established policies, regardless of whether it results from malice or a disregard for security policies . The types of crimes and abuse associated with insider threats are significant ; the most se- rious include espionage, sabotage, terrorism, embezzlement, extor- tion, bribery, and corruption. Ma- licious activities include an even broader range of exploits, such as copyright violations, negligent use of classified data, fraud, unauthor- ized access to sensitive informa- tion, and illicit communications with unauthorized recipients. The “insider” is an individual currently or at one time authorized to access an organization’s infor­ mation system, data, or network; such authorization implies a de- gree of trust in the individual. The insider threat refers to harmful acts that trusted insiders might carry out; for example, something that causes harm to the organization, or an unauthorized act that benefits the individual. A 1997 US Depart- ment of Defense (DoD) Inspec- tor General report1 found that 87 percent of identified intruders into DoD information systems were ei- ther employees or others internal to the organization. More gener- ally, recent studies of cybercrime (such as the 2004 through 2006 E-Crime Watch Surveys; www.cert. org/archive/) in both government and commercial 110 sectors reveal that although the proportion of insid- er events is declining (31 percent in 2004 and 27 percent in 2006), the financial impact and operat- ing losses due to insider intrusions are increasing. Of those compa- nies experiencing security events, the majority (55 percent) report at least one insider event (up from 39 percent in 2005). In this article, we’ll focus on the need for effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them. Insider threats are real and dangerous—full vigilance is key Spitzner, ’03, (Lance, internationally recognized leader in the field of cyber threat research and security training and awareness, “Honeypots: Catching the Insider Threat,” Honeypot Technologies Inc, 2003, http://craigchamberlain.com/library/insider/Honeypots%20%20%20Catching%20the%20Insider%20Threat.pdf)//erg Before we can discuss how honeypots, specifically Honeynets and honeytokens, can catch the insider threat, we need to first define Our goal is to detect, identify, and confirm insider threats. This means leveraging honeypots to not only indicate that we have an insider, but also confirm their actions, and potentially learn their motives and resources. What makes our goal difficult is the threat we face, the sophisticated insider. What we mean by this is someone who is technically skilled, highly motivated, and has access to extensive resources. For example, this threat may be an what our goal is, and the threat we face. employee working for a large corporation, but in reality they are employed by a competitor to engage in corporate espionage. A second example is highly skilled, disgruntled employee motivated to cause a great deal of damage before they are fired. A third example could be a spy working for a foreign country. Regardless of who the insider is, we are dealing with a highly dangerous threat, one that is extremely difficult to detect. They have access to critical information; they know the structure of the organization. They are most likely after information, not systems. As a result, there may be few attacks and their access to information may even be authorized. It is what they do with that information that comprises the threat. It is our goal to detect and capture the activity of this threat. For the purposes of this paper, we will take the lessons learned from the ARDA Cyber Indications and Warning workshop. In this workshop, we focused on past spies in the Intelligence community. Examples of such spies include Aldrich Ames, Robert Hansen, and Anna Montes. These individuals were all highly trusted individuals with extensive and critical knowledge to their respective organizations. However, as insiders they were able to cause extreme harm to their organizations, and over long periods of time without being detected. 111 Internal Link Turns Groupthink Combatting the insider threat avoids groupthink Catrantzos, ’10, (Nick, Adjunct Professor, Homeland Security & Author of Managing the Insider Threat: No Dark Corners, “Tackling the Insider Threat,” CRISP REPORT, ASIS Foundation, 2010, http://www.popcenter.org/library/crisp/insider-threat.pdf)//erg The Delphi process is iterative yet anonymous, and required a significant commitment on the part of respondents, including responses that took the form of explanatory narratives. In order to obtain meaningful insights rather than just confirming the author’s opinions, this study sought out practitioners who each have over 20 years of experience in responsible charge in their respective fields and were willing to voluntarily participate in what would otherwise constitute billable hours. This undertaking required the fullest stretch of the author’s network and availing of professional courtesy. Despite 31 years of industry experience and an address book with some 2,024 entries, the author rated himself fortunate to be able to assemble a dozen professionals who contributed their career thoughts throughout the Delphi process. Note that the Delphi method isolates respondents from each other, rather than gathering them together in a focus group . This technique defends against groupthink and offers equal deference to the introverted whose voices might otherwise go unheard in the presence of more vocal and extroverted participants gathered together in the same room. In order to increase respondent numbers, the research would have risked a corresponding lowering of the bar in experience and insight of experts. Neophytes are in greater supply, as are graduate students who would be more receptive to providing iterative responses. However, such a response pool would necessarily rob the process of the kind of wisdom and “deep smarts” that come only through broad, practical experience over time (Leonard & Swap, 2004). In Delphi research, the smallest number of respondents should not fall under 10, hence this study settled on 12—in case of any losses from one round of questions to the next. In practice, informed analysts have gone on record to state that “the sample size varies... from 4 to 171 ‘experts.’ One quickly concludes that there is no ‘typical’ Delphi; rather that the method is modified to suit the circumstances and research question (Skulmoski, G. J., Harman, F. T., & Krahn, J., 2007, p. 5).” Other analysts, applying the Delphi method to policy issues, found useful sample sizes varying from 10 to 50 experts (Linstone, H., & Turoff, M., 2002, p. 82). The Delphi research effort itself extended from January through April 2009 and consisted of three iterative rounds of questions and feedback. Recruitment of experts and gathering of their signed, informed consent forms, in satisfaction of the requirements of the Institutional Review Board of the Naval Postgraduate School, took place between the months of November 2008 to January 2009. 112 Russia Containment DA 113 1NC Deterring Russia in Europe is k2 curb Russian expansionism O’Hanlon 7/12 (Michael, 2015, senior fellow at The Brookings Institution, “We Need to Get Serious About Russia, Now,” http://www.politico.com/magazine/story/2015/07/we-need-to-get-tough-with-russia-now-120002.html#ixzz3gOxGu49h)//RTF We are at a crucial juncture in the conflict over Ukraine and the West’s relationship with Russia. Obama’s restraint has been wise at one level, but Washington’s tendency has been to move this issue to the back burner and hope it stays there. Yet there is little reason to think that it will—and also little reason to believe that a new U.S. president in 18 months, who will probably be harder-line in dealing with Vladimir Putin than Barack Obama has been, will be able to fix the situation either. As Gen. Joseph Dunford, the incoming Joint Chiefs chairman, told the Senate Armed Services Committee at his confirmation hearing last week: “If you want to talk about a nation that could pose an existential threat to the United States, I would have to point to Russia. … If you look at their behavior, it’s nothing short of alarming,” Meanwhile the current crisis over Greece and the Eurozone—which is not likely to end soon, if ever—is only likely to further undermine Europe’s resolve and induce it to turn inward, allowing Putin to breathe easier. Or at least, the Russian president might get that impression. So the United States and its NATO allies need to get serious about the situation now, and complement their existing policy approach with new ideas—some of them to show resolve and firmness towards Putin and Russia, others to offer him a way out of this crisis should he wish to take such a path. But this is not a time for drift; the longer the Kremlin senses irresolution in the West, the more it is likely to assume that its new “order” in the east is a fait accompli. There is also a risk it could become yet more aggressive, even towards the NATO-member Baltic states, in some way. The context of the situation was well summarized in a recent poll, released June 10, that the Pew Research Center conducted over the previous several months. It underscored that the West has a number of strengths in dealing with Putin—but also a number of serious vulnerabilities that will not get better just by ignoring them. The survey, led by Bruce Stokes and Katie Simmons, found that majorities of citizens in a number of key NATO states would not favor the use of force to protect another alliance member in the event of Russian aggression against them. That would seem, on its face, to ignore Article V of the NATO alliance’s founding charter, the Washington Treaty of 1949, which states that an attack on one is an attack on all, and should be treated accordingly. This may appear to some as tantamount to an invitation to renewed Russian aggression. It seems to raise the scenario of Vladimir Putin again employing his patriotic cyber attackers and “little green men,” not just in Crimea but perhaps in Latvia or Estonia—former republics in the Soviet Union turned independent nations and, since 2004, members of NATO. Each also has significant populations of Russian speakers that Putin can claim want to be reunited with the motherland; each is too far east for NATO easily to mount a military defense in any case. Are such parts of the Western alliance, and perhaps other countries like Poland, now vulnerable to Russian aggression? In fact, it would be a mistake to reach this conclusion based on the Pew survey or any other recent polling. While there are indeed some troubling findings in the Pew results, on balance what emerges is the picture of an alliance that still provides the West with considerable cohesion, and considerable leverage, in addressing the problem of Putin. Before trying to make sense of the poll results, it is important to summarize not just the headline-dominating findings noted above, but several other key results from Pew: The NATO publics have negative views of Russia and Putin. They seem to have little doubt of who is primarily responsible for the crisis in relations of the last two years, dating to the immediate aftermath of the Sochi Olympics when protests in Ukraine forced out the country’s previous leader, President Yanukovich. Five of eight NATO countries surveyed (the UK, France, Spain, Italy and Germany) oppose sending weapons to Ukraine to defend itself in the current crisis. NATO countries remain more than willing to employ sanctions against Russia over its behavior. This was true in every alliance member-state that was polled, including Germany, the most pro-Russia NATO state that was included in the polling. Indeed, although just 38 percent of Germans favored a military response in the event of a hypothetical Russian attack against another NATO member, they remained in favor of sanctions against Russia. Only 29 percent favored a loosening of the current sanctions, unless Russia’s behavior were to change. This helps explain why the EU just reauthorized sanctions against Russia, with even Greece in support. Putin remains extremely popular in Russia, with favorability ratings approaching 90 percent; Russians currently blame the West, and falling oil prices, for their current economic woes, and not their own government or its policies. Forebodingly, most Russians believe that eastern Ukraine, where the current fighting rages, should not remain part of Ukraine but should either become independent or join their 114 country. Two more key points are crucial to remember. First, the type of hypothetical Russian attack against a NATO country that formed the premise for the Pew question about Article V was not clearly specified. Perhaps respondents were in some sense wondering if a takedown of several Latvian or Estonian computer networks really needed to be met with NATO tanks? For most western publics, the advisability of a major military response might well, understandably enough, depend in detail on the nature of the perceived Russian attack as well as the other options available to the alliance. Second, and relatedly, it is important to remember that Article V does NOT demand an automatic, unconditional military response by each alliance member. It says, rather, that an attack on one should lead to a response by all—involving whatever means the individual states determine. This ambiguity may risk complicating deterrence, to be sure—but it worked during the Cold War and, if NATO leaders are sufficiently clear in their dealings with Putin, it can and should work now. These results collectively suggest the following path ahead: The United States and other NATO member states should adopt the Pentagon’s recent proposal to station modest amounts of equipment in the easternmost NATO countries—a proposal that is harder to oppose at this juncture given Putin’s continued stirring up of the conflict. Ideally, equipment from NOT ONLY America BUT also other NATO countries would be part of the initiative. The sanctions tool remains powerful and should still be employed. As they pursue Russian compliance with the so-called Minsk accords, which Moscow agreed to this past winter, and which would allow autonomy for Ukraine’s eastern provinces in return for verifiable Russian withdrawal from those same regions and an end to hostility by separatists, western policymakers can and should keep up the economic pressure. A grand solution should also be proposed to Moscow. As a complement to the Minsk concept and the continuation of economic sanctions, the West should offer a proposal for a new Central European security architecture for non-NATO states that Russia would be asked and expected to co-guarantee, if it wishes that countries like Ukraine permanently forgo pursuit of NATO membership. This should not weaken Ukraine’s formal sovereignty; no long-term “Hong Kong handover” solution is needed. But all would understand that Ukraine would not formally join the West in geostrategic terms, though it certainly could accept western help out of its current economic malaise once the right policy foundation was established. So far Putin has managed to convince Russians that their economic predicament is not his fault, but over time, he may not be able to maintain the charade. The Pew poll suggests that Western publics are firmly united behind this sanctions-based approach—and that modern democracies, while wary about the use of force, are a far cry from the paper tigers their critics sometimes purport them to be. But our policies are far from adequate to the task at hand and need to be improved now—before the situation escalates further and reduces our room for maneuver, and before the 2016 U.S. presidential race reduces Washington’s room for maneuver as well. Expansion risks war and nuclear use Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF II. The gamble: Putin's plan to make Russia great again Should the warnings prove right, and a major war break out in Europe between Russia and the West, then the story of that war, if anyone is still around to tell it, will begin with Russian President Vladimir Putin trying to solve a problem. That problem is this: Putin's Russia is weak. It can no longer stand toe to toe with the US. It no longer has Europe divided in a stalemate; rather, it sees the continent as dominated by an ever-encroaching anti-Russian alliance. In the Russian view, the country's weakness leaves it at imminent risk, vulnerable to a hostile West bent on subjugating or outright destroying Russia as it did to Iraq and Libya. This is made more urgent for Putin by his political problems at home. In 2012, during his reelection, popular protests and accusations of fraud weakened his sense of political legitimacy. The problem worsened with Russia's 2014 economic collapse; Putin's implicit bargain with the Russian people had been that he would deliver economic growth and they would let him erode basic rights. Without the economy, what did he have to offer them? Putin's answer has been to assert Russian power beyond its actual strength — and, in the process, to recast himself as a national hero guarding against foreign enemies. Without a world-power-class military or economy at his disposal, he is instead wielding confusion and uncertainty — which Soviet leaders rightly avoided as existential dangers — as weapons against the West. Unable to overtly control Eastern Europe, he has fomented risks and crises in there, sponsoring separatists in Ukraine and conducting dangerous military activity along NATO airspace and coastal borders, giving Russia more leverage there. Reasserting a Russian sphere of influence over Eastern Europe, he apparently believes, will finally give Russia security from the hostile West — and make Russia a great power once more. Knowing his military is outmatched 115 against the Americans, he is blurring the distinction between war and peace, deploying tactics that exist in, and thus widen, the gray between: militia violence, propaganda, cyberattacks, under a new rubric the Russian military sometimes calls "hybrid war." "This was the theory of the Kaiser before World War I: The more threatening you are, the more people will submit to your will. Putin’s going to threaten and threaten and hope that NATO bends. But the long run of international relations suggests that it goes the other way." Unable to cross America's red lines, Putin is doing his best to muddy them — and, to deter the Americans, muddying his own. Turning otherwise routine diplomatic and military incidents into games of high-stakes chicken favors Russia, he believes, as the West will ultimately yield to his superior will. To solve the problem of Russia's conventional military weakness, he has dramatically lowered the threshold for when he would use nuclear weapons, hoping to terrify the West such that it will bend to avoid conflic t. In public speeches, over and over, he references those weapons and his willingness to use them. He has enshrined, in Russia's official nuclear doctrine, a dangerous idea no Soviet leader ever adopted: that a nuclear war could be winnable. Putin, having recast himself at home as a national hero standing up to foreign enemies, is more popular than ever. Russia has once more become a shadow hanging over Eastern Europe, feared and only rarely bowed to, but always taken seriously. Many Western Europeans, asked in a poll whether they would defend their own Eastern European allies from a Russian invasion, said no. Russia's aggression, born of both a desire to reengineer a European order that it views as hostile and a sense of existential weakness that justifies drastic measures, makes it far more willing to accept the dangers of war. As RAND's F. Stephen Larrabee wrote in one of the increasingly urgent warnings that some analysts are issuing, "The Russia that the United States faces today is more assertive and more unpredictable — and thus, in many ways, more dangerous — than the Russia that the United States confronted during the latter part of the Cold War." Joseph Nye, the dean of Harvard University's school of government and one of America's most respected international relations scholars, pointed out that Russia's weakness-masking aggression was yet another disturbing parallel to the buildup to World War I. "Russia seems doomed to continue its decline — an outcome that should be no cause for celebration in the West," Nye wrote in a recent column. "States in decline — think of the Austro-Hungarian Empire in 1914 — tend to become less risk-averse and thus much more dangerous." Nuclear war in Europe with Russia is possible and on the brink Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF It was in August 2014 that the real danger began, and that we heard the first warnings of war. That month, unmarked Russian troops covertly invaded eastern Ukraine, where the separatist conflict had grown out of its control. The Russian air force began harassing the neighboring Baltic states of Estonia, Latvia, and Lithuania, which are members of NATO. The US pledged that it would uphold its commitment to defend those countries as if they were American soil, and later staged military exercises a few hundred yards from Russia's border. Both sides came to believe that the other had more drastic intentions. Moscow is convinced the West is bent on isolating, subjugating, or outright destroying Russia. One in three Russians now believe the US may invade. Western nations worry, with reason, that Russia could use the threat of war, or provoke an actual conflict, to fracture NATO and its commitment to defend Eastern Europe. This would break the status quo order that has peacefully unified Europe under Western leadership, and kept out Russian influence, for 25 years. Fearing the worst of one another, the US and Russia have pledged to go to war, if necessary, to defend their interests in the Eastern European borderlands. They have positioned military forces and conducted chest-thumping exercises, hoping to scare one another down. Putin, warning repeatedly that he would use nuclear weapons in a conflict, began forward-deploying nuclear-capable missiles and 116 bombers. Europe today looks disturbingly similar to the Europe of just over 100 years ago, on the eve of World War I. It is a tangle of military commitments and defense pledges, some of them unclear and thus easier to trigger. Its leaders have given vague signals for what would and would not lead to war. Its political tensions have become military buildups. Its nations are teetering on an unstable balance of power, barely held together by a Cold War–era alliance that no longer quite applies. If you take a walk around Washington or a Western European capital today, there is no feeling of looming catastrophe. The threats are too complex, with many moving pieces and overlapping layers of risk adding up to a larger danger that is less obvious. People can be forgiven for not seeing the cloud hanging over them, for feeling that all is well — even as in Eastern Europe they are digging in for war. But this complacency is itself part of the problem, making the threat more difficult to foresee, to manage, or, potentially, to avert. There is a growing chorus of political analysts, arms control experts, and government officials who are sounding the alarm, trying to call the world's attention to its drift toward disaster. The prospect of a major war, even a nuclear war, in Europe has become thinkable, they warn, even plausible. What they describe is a threat that combines many of the hair-trigger dangers and world-ending stakes of the Cold War with the volatility and false calm that preceded World War I — a comparison I heard with disturbing frequency. They described a number of ways that an unwanted but nonetheless major war, like that of 1914, could break out in the Eastern European borderlands. The stakes, they say, could not be higher: the post–World War II peace in Europe, the lives of thousands or millions of Eastern Europeans, or even, in a worstcase scenario that is remote but real, the nuclear devastation of the planet. 117 2NC – Containment Key Hardline responses to Russia deter expansion Aleksashenko 5/28 (Sergei, 2015, nonresident senior fellow in Global Economy and Development @ Brookings, Former deputy chairman of the Central Bank of Russia and former chairman of Merrill Lynch Russia, “Stop calling Russia weak,” http://www.brookings.edu/blogs/order-from-chaos/posts/2015/05/29-russia-not-weak-aleksashenko)//RTF Twelve weeks have passed since the second Minsk agreement was signed, and the military situation in Eastern Ukraine has quieted. While this is a positive development, we cannot declare the crisis over. Unfortunately, it seems most likely that another territory with non-specified status will emerge in Europe, opening the door for yet another frozen conflict in the region. In the short run, the current situation in Ukraine is in some sense understood on all sides: Ukraine is able to concentrate on its reform agenda efforts; Russia can keep Donbass hostage and maintain its ability to destabilize Ukraine at any moment; Europe can relax a bit as the threat of military spillover subsides; and the United States hopes to just forget about the whole headache. But that approach would be a major strategic mistake for the U.S. and Europe. In the wake of the 2008 Georgian war, the West made the grave error of letting down its guard. Going this direction again means undermining European and American principles. At the same time, it undermines our very global security system, which rejects the use of force as an instrument of conflict resolution and forcible changes of the state borders via military intervention. By accepting the status quo in Ukraine, the West suggests to the world that it will not prevent Putin from imposing his narrative across Russian borders. More broadly, it risks demonstrating that it is the rule of force—not of law—that reigns in the world today. Tacitly supporting a return to business as usual in Ukraine makes life easier for the U.S. and Europe. But the West’s reliance on traditional methods of diplomacy is a mistake in dealing with Putin, who has clearly decided to employ nontraditional forms of international relations. The West needs a nontraditional response to Russia’s nontraditional foreign policy. If leaders in Europe and the U.S. believe Putin is weak—as Valeriano and Maness propose—they should demonstrate that fact to the world and to the Russian president himself. We have yet to see that kind of clear demonstration. 118 2NC – Expansionism Bad Russian expansion into the Baltic states causes war Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF IV. How it would happen: The Baltics scenario In September of last year, President Obama traveled to Estonia, a nation of 1.3 million people that most Americans have never heard of, and pledged that the United States would if necessary go to war with Russia to defend it. Estonia, along with Latvia and Lithuania — together known as the Baltic states — are at the far edge of Eastern Europe, along Russia's border. They were formerly part of the Soviet Union. And they are where many Western analysts fear World War III is likeliest to start. These small countries are "the most likely front line of any future crisis," according to Stephen Saideman, an international relations professor at Carleton University. Allison and Simes, in their essay warning of war, called the Baltics "the Achilles’ heel of the NATO alliance." A full quarter of Estonia's population is ethnically Russian. Clustered on the border with Russia, this minority is served by the same Russian state media that helped stir up separatist violence among Russian speakers in eastern Ukraine. But unlike Ukraine, the Baltic states are all members of NATO, whose charter states that an attack on one member is an attack on them all. Whereas a Russian invasion of Ukraine prompted Western sanctions, a Russian invasion of Estonia would legally obligate the US and most of Europe to declare war on Moscow. "We'll be here for Estonia. We will be here for Latvia. We will be here for Lithuania. You lost your independence once before. With NATO, you will never lose it again," Obama pledged in his September speech in Estonia. Less than 48 hours after Obama's address, Russian agents blanketed an Estonia-Russia border crossing with tear gas, stormed across, and kidnapped an Estonian state security officer, Eston Kohver, who specialized in counterintelligence. Kohver has been held illegally in a Russian prison for nine months now. It was something like an act of geopolitical trolling: aggressive enough to assert Russian dominion over Estonia, but not so aggressive as to be considered a formal act of war that would trigger a Western counterattack. And it was one of several signs that Putin's Russia is asserting a right to meddle in these former Soviet territories. The Russian military has already begun pressing the Baltic states. Russian warships were spotted in Latvian waters 40 times in 2014. Russian military flights over the Baltics are now routine, often with the planes switching off their transponders, which makes them harder to spot and increases the chances of an accident. Military activity in the region had reached Cold War levels. NATO, fearing the worst, is increasing military exercises in the Baltics. The US is installing heavy equipment. And in February, the US military paraded through the Russian-majority Estonian city of Narva, a few hundred yards from Russia's borders. It's a textbook example of what political scientists call the security dilemma: Each side sees its actions as defensive and the other side's as offensive. Each responds to the other's perceived provocations by escalating further, a self-reinforcing cycle that can all too easily lead to war. It is considered, for example, a major contributor to the outbreak of World War I. That it is entirely foreseeable does little to reduce the risk. Even if Russia in fact has no designs on the Baltics, its bluffing and posturing has already created the conditions for an unwanted war. In early April, for example, a Russian fighter jet crossed into the Baltic Sea and "buzzed" a US military plane, missing it by only 20 feet. It was one of several recent near-misses that, according to a think tank called the European Leadership Institute, have had a "high probability of causing casualties or a direct military confrontation between Russia and Western states." Meanwhile, Russia has been flying its nuclear-capable strategic bombers along NATO airspace, often with the planes' transponders switched off, making an accident or misperception more likely. As if that weren't dangerous enough, the bombers — hulking, decades-old Tupolev Tu-95 models — have become prone to accidents such as engine fires. What if a Tu-95 went down unexpectedly, say, off the coast of Norway? What if it was carrying nuclear warheads, or it went down during a moment of high tension? Such incidents can lead to misunderstandings, and such misunderstandings can lead to war. By late April, when NATO officials gathered at the security conference in Estonia's capital of Tallinn, the severity of the danger had become unmistakable. As Ahmed Rashid wrote from the conference: Baltic presidents and NATO officials were unusually blunt in describing the extent to which the security architecture in Eastern Europe has collapsed, how Russia poses the gravest threat to peace since World War II, and how the conflict in Ukraine and the loss of the Crimea has left the Baltic states on the front line of an increasingly hostile standoff. Amid these tensions, the thought of a plane crash leading to war seems scarily plausible. It is not just Western officials who fear such an incident could spark war. Fyodor Lukyanov, the prominent Russian analyst who is considered close to the government, worried that the NATO military exercises in the Baltics meant to deter Russia were also contributing to the problem. "Russia reacts to that because Russia perceives it as a hostile approach to the Russian border," he explained. "And it’s a vicious circle." It is easy to imagine, Lukyanov said, any number of ways that the powder keg could explode. " Without any intention to create the big conflict, it might 119 happen," he said. "One step, another step, and reciprocity can become very dangerous. Say a Russian aircraft comes very close to an area that NATO believes is prohibited while Russia believes it’s not prohibited, and then British aircraft respond. It might be manageable, and in most cases of course it will be, but who knows." 120 2NC – NATO Scenario If NATO doesn’t intervene, it’ll be destroyed Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF V. How it would happen: A plot to break NATO It was Andrei Piontkovsky, a Russian political analyst and frequent Kremlin critic, who first suggested the theory, last August, that Putin's plan for the Baltics was more sophisticated, and more calculated, than anybody realized. Piontkovsky was trying to answer a question that Western analysts and policymakers had been puzzling over since Russian provocations began in the Baltics last fall: What does Putin want? Unlike in Ukraine, with which Russia has a long shared history, there is little demand among the Russian public for intervention in the Baltic states. They are of modest strategic value. And the risks of Russia's aggression there are potentially catastrophic. Why bother? His is a theory that is now taken much more seriously by Western policymakers — and appears more plausible all the time. Putin hopes to spark a conflict in the Baltics, Piontkovsky wrote, so as to force Western European leaders into an impossible choice: Fulfill their NATO obligation to defend the Baltics and counterattack, even if it means fighting World War III over a tiny post-Soviet republic most Europeans couldn't care less about — or do nothing. The implications of doing nothing, Piontkovsky pointed out, would extend far beyond the Baltics. It would lay bare NATO's mutual defense provision as a lie, effectively dissolving the military alliance, ending a quarter-century of Europe's security unification under Western leadership, and leaving Eastern Europe once more vulnerable to Russian domination. In this way, Putin could do what Soviet leaders never came close to: defeat NATO. "This is his most cherished objective," Piontkovsky told me when we talked in his kitchen, in a leafy Moscow neighborhood across the river from Gorky Park. "It's an enormous temptation. He may retreat at any stage, but the temptation is enormous, to destroy NATO. ... The risk is big, yes? But the prize is enormous." "To destroy NATO, to demonstrate that Article V does not work, the Baltic republics of Estonia and Latvia are the best place for this," he said. "It's happening now, every day. Intrusions into the airspace, psychological pressure, the propaganda on TV." He suggested that Putin, rather than rolling Russian tanks across the border, would perhaps seed unmarked Russian special forces into, say, the Russian-majority city of Narva in Estonia, where they would organize localized violence or a phony independence referendum. A handful of such unacknowledged forces, whom Putin referred to as "little green men" after they appeared in Crimea, would perhaps be dressed as local volunteers or a far-right gang; they might be joined by vigilantes, as they were in eastern Ukraine. They would almost certainly be aided by a wave of Russian propaganda, making it harder for outsiders to differentiate unmarked Russian troops from civilian volunteers, to determine who was fighting where and had started what. Such an intervention would force NATO into an impossible choice: Are you really going to open fire on some hoodlums stirring up trouble in Estonia, knowing they might actually be unmarked Russian troops? Would you risk the first major European war since 1945, all to eject some unmarked Russian troops from the Estonian town of Narva? Putin, Piontkovsky believes, is gambling that the answer is no. That NATO would not intervene, thus effectively abandoning its commitment to defend its Eastern European member states. Piontkovsky's scenario, once considered extreme, is now widely seen by Western security experts and policymakers as plausible. At the end of 2014, the military intelligence service of Denmark, a member of NATO, issued a formal paper warning of precisely that: Russia may attempt to test NATO’s cohesion by engaging in military intimidation of the Baltic countries, for instance with a threatening military build-up close to the borders of these countries and simultaneous attempts of political pressure, destabilization and possibly infiltration. Russia could launch such an intimidation campaign in connection with a serious crisis in the post-Soviet space or another international crisis in which Russia confronts the United States and NATO. "The concern is that what Putin wants to do is break NATO, and the best 121 way to do that would be to poach on the Baltics," Saideman, the political scientist, told me on a call from a European security conference where he said the scenario was being taken very seriously. "And if Germany doesn’t respond to incursions in the Baltics, if France doesn’t respond and it’s just an American operation, then it will lead to the breaking of NATO, is the theory," he said. "That’s the biggest concern." Saideman described a variation on this scenario that I heard from others as well: that Putin might attempt to seize some small sliver of the Baltics quickly and bloodlessly. This would make it politically easier for Western European leaders to do nothing — how to rally your nation to war if hardly anyone has even been killed? — and harder to counterattack, knowing it would require a fullscale invasion. "I think they’re very serious about this," Saideman said. "There’s a real concern." Either Russian expansion causes war or it fractures NATO Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF VI. How it would happen: The fog of hybrid war In early 2015, Pew pollsters asked citizens of several NATO states the exact question that analysts and policymakers from Washington to Moscow are gaming out: "If Russia got into a serious military conflict with one of its neighboring countries that is our NATO ally, do you think our country should or should not use military force to defend that country?" The numbers from Western Europe were alarming: Among Germans, only 38 percent said yes; 58 percent said no. If it were up to German voters — and to at least some extent, it is — NATO would effectively surrender the Baltics to Russia in a conflict. This poll is even worse than it looks. It assumes that Russia would launch an overt military invasion of the Baltics. What would actually happen is something far murkier, and far more likely to leverage European hesitation: the playbook from Ukraine, where Russia deployed its newly developed concepts of postmodern "hybrid war," designed to blur the distinction between war and not-war, to make it as difficult as possible to differentiate grassroots unrest or vigilante cyberattacks from Russian military aggression. Putin may already be laying the groundwork. In March of 2014, shortly after Russia had annexed Crimea, Putin gave a speech there pledging to protect Russians even outside of Russia, which many took as a gesture to the substantial Russian minorities in the Baltics. "That kind of misperception situation is definitely possible, and that’s how wars start" Then, in October, Putin warned that "open manifestations of neo-Nazism" had "become commonplace in Latvia and other Baltic states" — repeating the language that he and Russian state media had earlier used to frighten Russian speakers in Ukraine into taking up arms. This April, several Russian outlets issued spurious reports that Latvia was planning to forcibly relocate ethnic Russians into Nazi-style ghettos — an echo of similar scaremongering Russian propaganda broadcast in the runup in Ukraine. Martin Hurt, a former senior official of the country's defense ministry, warned that his country's ethnic Russian minority could be "receptive to Kremlin disinformation." Moscow, he said, could generate unrest "as a pretext to use military force against the Baltic states." In early 2007, Estonia's parliament voted to relocate a Soviet-era military statue, the Bronze Soldier, that had become a cultural symbol and annual rallying point for the country's ethnic Russians. In response, Russian politicians and state media accused the Estonian government of fascism and Nazi-style discrimination against ethnic Russians; they issued false reports claiming ethnic Russians were being tortured and murdered. Protests broke out and escalated into riots and mass looting. One person was killed in the violence, and the next day hackers took many of the country's major institutions offline. Russia could do it again, only this time gradually escalating further toward a Ukraine-style conflict. NATO is just not built to deal with such a crisis. Its mutual defense pledge, after all, rests on the assumption that war is a black-and-white concept, that a country is either at war or not at war. Its charter is from a time 122 when war was very different than it is today, with its many shades of gray. Russia can exploit this flaw by introducing low-level violence that more hawkish NATO members would consider grounds for war but that war-averse Western European states might not see that way. Disagreement among NATO's member states would be guaranteed as they hesitated over where to declare a moment when Russia had crossed the line into war. Meanwhile, Russian state media, which has shown real influence in Western Europe, would unleash a flurry of propaganda to confuse the issue, make it harder to pin blame on Moscow for the violence, and gin up skepticism of any American calls for war. Germany, which is widely considered the deciding vote on whether Europe would go to war, would be particularly resistant to going to war. The legacy of World War II and the ideology of pacifism and compromise make even the idea of declaring war on Russia unthinkable. German leaders would come under intense political pressure to, if not reject the call to arms, then at least delay and negotiate — a de facto rejection of NATO's collective self-defense. In such a scenario, it is disturbingly easy to imagine how NATO's European member states could split over whether Russia had even crossed their red line for war, much less whether to respond. Under a fog of confusion and doubt, Russia could gradually escalate until a Ukraine-style conflict in the Baltics was foregone, until it had marched far across NATO's red line, exposing that red line as meaningless. But the greatest danger of all is if Putin's plan were to stumble: By overreaching, by underestimating Western resolve to defend the Baltics, or by starting something that escalates beyond his control, it could all too easily lead to full-blown war. "That kind of misperception situation is definitely possible, and that’s how wars start ," Saideman said, going on to compare Europe today with 1914, just before World War I. "The thing that makes war most thinkable is when other people don’t think it’s thinkable." In 1963, a few months after the Cuban missile crisis had almost brought the US and gave a speech drawing on the lessons of the world's brush with nuclear war: "Above all, while defending our vital interests, nuclear powers must avert those confrontations which bring an adversary to a choice of either a humiliating retreat or a nuclear war." That is the choice that Putin may well force upon NATO. Soviet Union to blows, President John F. Kennedy Russian Expansion fractures NATO Johnston 6/3 (Ian, 2015, The Guardian, “Nato and EU face collapse if they fail to stop Russian aggression, warn experts,” http://www.independent.co.uk/news/world/politics/nato-and-eu-face-collapse-if-they-fail-to-stop-russian-aggression-experts-warn10295927.html)//RTF Nato and the European Union “could collapse” in the face of increasing aggression from Russia, which has been emboldened by the EU’s apparent unwillingness to “defend its principles”, an influential think-tank has warned. A major study by Chatham House found the conflict in Ukraine – where Moscow is backing separatist rebels – represented a “defining” moment for the future of Europe. It called for the West to increase the strength of its conventional military forces. It also warned that Russia was prepared to use tactical nuclear weapons in certain circumstances and Nato should make clear that a so-called “limited war” was “impossible”. “The conflict in Ukraine is a defining factor for the future of European security,” the report said. “Ukraine’s failure would deepen instability in Eastern Europe, increase the risk of further Kremlin adventures and diminish the prospects for eventual beneficial change in Russia. “Russia may have the greater interest in Ukraine. But the West has an even bigger interest in preserving the postCold War environment. “If that is dismantled, it is conceivable that Nato and the EU could collapse too.” The report, whose authors include two former ambassadors to Moscow, Sir Roderic Lyne and Sir Andrew Wood, said Russian President Vladimir Putin had been encouraged by the “weak and unconvincing responses” from the West to events such as Russia’s seizure of South Ossetia and Abkhazia from Georgia in 2008. “The Kremlin perceives that Europe lacks the will to pay the necessary price to defend its principles,” it said. “Russian ambitions and intentions had been telegraphed for well over a decade, but the West found it easier at 123 the time to disregard them and indulge in the fantasy that Russia was progressing towards a liberal-democratic model with which the West felt comfortable. “The war in Ukraine is, in part, the result of the West’s laissez-faire approach to Russia.” And it warned that if there was a wider conflict in Europe, Russia would be prepared to use tactical nuclear weapons. “Nato must retain its credibility as a deterrent to Russian aggression. In particular, it needs to demonstrate that limited war is impossible and that the response to ‘ambiguous’ or ‘hybrid’ war will be robust.” Hybrid tactics is a term that describes the deployment of unbadged Russian troops and the use of local pro-Moscow forces in eastern Ukraine. The growing threat from Moscow means that “conventional deterrent capability must be restored as a matter of urgency and convincingly conveyed, to avoid presenting Russia with inviting targets”, the think-tank warned. The Treasury has reportedly asked the Ministry of Defence to make spending cuts of £1bn this year. David Lidington, the Europe minister, said: “The UK is working closely with EU and G7 partners in response to Russian actions in Ukraine. “The UK is also playing a leading role in Nato exercises in Eastern Europe and with Baltic partners as part of the assurance measures and collective defence in the region.” Collapse of NATO causes multiple escalatory nuclear wars John Duffield 1994, Assistant Professor of Government and Foreign Affairs at the University of Virginia, [Political Science Quarterly 109:5, p. 766-7] Initial analyses of NATO's future prospects overlooked at least three important factors that have helped to ensure the alliance's enduring relevance. First, they underestimated the extent to which external threats sufficient to help justify the preservation of the alliance would continue to exist. In fact, NATO still serves to secure its members against a number of actual or potential dangers emanating from outside their territory. These include not only the residual threat posed by Russian military power, but also the relatively new concerns raised by conflicts in neighboring regions. Second, the pessimists failed to consider NATO's capacity for institutional adaptation. Since the end of the cold war, the alliance has begun to develop two important new functions. NATO is increasingly seen as having a significant role to play in containing and controlling militarized conflicts in Central and Eastern Europe. And, at a deeper level, it works to prevent such conflicts from arising at all by actively promoting stability within the former Soviet bloc. Above all, NATO pessimists overlooked the valuable intra-alliance functions that the alliance has always performed and that remain relevant after the cold war. Most importantly, NATO has helped stabilize Western Europe, whose states had often been bitter rivals in the past. By damping the security dilemma and providing an institutional mechanism for the development of common security policies, NATO has contributed to making the use of force in relations among the countries of the region virtually inconceivable. In all these ways, NATO clearly serves the interests of its European members. But even the United States has a significant stake in preserving a peaceful and prosperous Europe. In addition to strong transatlantic historical and cultural ties, American economic interests in Europe— as a leading market for U.S. products, as a source of valuable imports, and as the host for considerable direct foreign investment by American companies — remain substantial. If history is any guide, moreover, the United States could easily be drawn into a future major war in Europe, the consequences of which would likely be even more devastating than those of the past, given the existence of nuclear weapons.11 124 2NC – War Goes Nuclear Russian nuclear doctrine means war in Ukraine escalates Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF III. The drift: How the unthinkable became possible The Cold War was a dangerous game, but it was a game in which everyone knew and agreed upon the stakes and the rules. That is not the case today. The Western side believes it is playing a game where the rules are clear enough, the stakes relatively modest, and the competition easily winnable. The Russian side, however, sees a game where the rules can be rewritten on the fly, even the definition of war itself altered. For Russia, fearing a threat from the West it sees as imminent and existential, the stakes are unimaginably high, justifying virtually any action or gamble if it could deter defeat and, perhaps, lead to victory. Separately, the ever-paranoid Kremlin believes that the West is playing the same game in Ukraine. Western support for Ukraine's government and efforts to broker a ceasefire to the war there, Moscow believes, are really a plot to encircle Russia with hostile puppet states and to rob Russia of its rightful sphere of influence. Repeated Russian warnings that it would go to war to defend its perceived interests in Ukraine, potentially even nuclear war, are dismissed in most Western capitals as bluffing, mere rhetoric. Western leaders view these threats through Western eyes, in which impoverished Ukraine would never be worth risking a major war. In Russian eyes, Ukraine looks much more important: an extension of Russian heritage that is sacrosanct and, as the final remaining component of the empire, a strategic loss that would unacceptably weaken Russian strength and thus Russian security. Both side are gambling and guessing in the absence of a clear understanding of what the other side truly intends, how it will act, what will and will not trigger the invisible triplines that would send us careening into war. Today's tensions bear far more similarity to the period before World War I During the Cold War, the comparably matched Western and Soviet blocs prepared for war but also made sure that war never came. They locked Europe in a tense but stable balance of power; that balance is gone. They set clear red lines and vowed to defend them at all costs. Today, those red lines are murky and ill-defined. Neither side is sure where they lie or what really happens if they are crossed. No one can say for sure what would trigger war. That is why, analysts will tell you, today's tensions bear far more similarity to the period before World War I: an unstable power balance, belligerence over peripheral conflicts, entangling military commitments, disputes over the future of the European order, and dangerous uncertainty about what actions will and will not force the other party into conflict. Today's Russia, once more the strongest nation in Europe and yet weaker than its collective enemies, calls to mind the turn-of-the-century German Empire, which Henry Kissinger described as "too big for Europe, but too small for the world." Now, as then, a rising power, propelled by nationalism, is seeking to revise the European order. Now, as then, it believes that through superior cunning, and perhaps even by proving its might, it can force a larger role for itself. Now, as then, the drift toward war is gradual and easy to miss — which is exactly what makes it so dangerous. But there is one way in which today's dangers are less like those before World War I, and more similar to those of the Cold War: the apocalyptic logic of nuclear weapons. Mutual suspicion, fear of an existential threat, armies parked across borders from one another, and hair-trigger nuclear weapons all make any small skirmish a potential armageddon. In some ways, that logic has grown even more dangerous. Russia, hoping to compensate for its conventional military forces' relative weakness, has dramatically relaxed its rules for using nuclear weapons. Whereas Soviet leaders saw their nuclear weapons as pure deterrents, something that existed precisely so they would never be used, Putin's view appears to be radically different. Russia's official nuclear doctrine calls on the country to launch a battlefield nuclear strike in case of a conventional war that could pose an existential threat. These are more than just words: Moscow has repeatedly signaled its willingness and preparations to use nuclear weapons even in a more limited war. This is a terrifyingly low bar for nuclear weapons use, particularly given that any war would likely occur along Russia's borders and thus not far from Moscow . And it suggests Putin has adopted an idea that Cold War leaders considered unthinkable: that a "limited" nuclear war, of small warheads dropped on the battlefield, could be not only survivable but winnable. "It’s not just a difference in rhetoric. It’s a whole different world," Bruce G. Blair, a nuclear weapons scholar at Princeton, told the Wall Street Journal. He called Putin's decisions more dangerous than those of any Soviet leader since 1962. "There’s a low nuclear threshold now that didn’t exist during the Cold War." Nuclear theory is complex and disputable; maybe Putin is right. But many theorists would say he is wrong, 125 that the logic of nuclear warfare means a "limited" nuclear strike is in fact likely to trigger a larger nuclear war — a doomsday scenario in which major American, Russian, and European cities would be targets for attacks many times more powerful than the bombs that leveled Hiroshima and Nagasaki. Even if a nuclear war did somehow remain limited and contained, recent studies suggest that environmental and atmospheric damage would cause a "decade of winter" and mass crop die-outs that could kill up to 1 billion people in a global famine. Russian nuclear doctrine means even conventional wars escalate Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF VIII. The nuclear dangers: The red line is closer than you think This August, as the Russian military launched its undeclared and unofficial invasion of eastern Ukraine to defend separatist rebels there against defeat, Putin attended an annual youth conference at Lake Seliger, just north of Moscow. During a Q&A session, a teaching student asked an odd question about the "cyclical" nature of history and concerns that Russia could be "drawn into a new, open global conflict." Putin, in his answer, did something that the leaders of major nuclear powers generally avoid doing — he rattled the nuclear saber a bit: Let me remind you that Russia is one of the world’s biggest nuclear powers. These are not just words — this is the reality. What’s more, we are strengthening our nuclear deterrent capability and developing our armed forces. They have become more compact and effective and are becoming more modern in terms of the weapons at their disposal. There is a certain fear in Russia, never far from the surface, that the only thing preventing the West from realizing its dream of destroying or subjugating Russia is its nuclear arsenal. (Three months later, Putin warned that the West wanted to tame the Russian bear so as to "tear out his fangs and his claws," which he explained meant its nuclear weapons.) "There is a widespread belief that the only guarantee for Russian security, if not sovereignty and existence, is the nuclear deterrent," Lukyanov, the Russian foreign policy expert, explained. "After the Yugoslavia wars, Iraq War, Libyan intervention, it’s not an argument anymore, it’s conventional wisdom: 'If Russia were not a nuclear superpower, the regime change of an Iraqi or Libyan style would be inevitable here. The Americans are so unhappy with the Russian regime, they would do it. Praise God, we have a nuclear arsenal, and that makes us untouchable.'" But Russia faced a problem: Its conventional military forces are now so much weaker than NATO's, and its capital city so close to NATO's forces in the Baltics, that it feared NATO tank divisions could push all the way to Moscow and quickly win a war without ever using a nuclear weapon. Both the US and Russia had pledged to use nuclear weapons only to deter one another from nuclear attacks. This kept the Cold War cold. But because the US would not need its ICBMs to win a war, that deterrence is no longer enough to keep Russia safe. In response, Russia has been gradually lowering its bar for when it would use nuclear weapons, and in the process upending the decades-old logic of mutually assured destruction, adding tremendous nuclear danger to any conflict in Europe. The possibility that a limited or unintended skirmish could spiral into nuclear war is higher than ever. Russia's nuclear doctrine, a formal document the Kremlin publishes every few years outlining when it will and will not use nuclear weapons, declares that the Russian military can launch nuclear weapons not just in the case of a nuclear attack, but in case of a conventional military attack that poses an existential threat. In other words, if Russia believes that American tanks could be bound for the Kremlin, it has declared it may respond by dropping nuclear bombs. The danger that this adds to any possible confrontation, particularly along the Baltic states, is difficult to overstate. If an accident or miscalculation were to lead to a border skirmish, all it would take is for the Kremlin to misperceive the fighting as the beginning of an assault toward Moscow and its own doctrine would call for using nuclear weapons. Indeed, it would be the only way to avoid total defeat. There is another layer of danger and uncertainty to this: It is not clear what Russia 126 would consider a conventional threat worthy of a nuclear response. A few months after he'd annexed Crimea, Putin revealed that during Russia's undeclared invasion of the territory he had considered putting his country's nuclear forces on alert; his government has signaled it would consider using nuclear force to defend Crimea from an attack, something Russian analysts told me was not just bluster. The United States, of course, has no intention of militarily retaking Crimea, despite surprisingly common fears to the contrary in Russia. But Russian paranoia about such a threat, and a possible willingness to use nuclear weapons to avert it, adds more danger to the already dangerous war in eastern Ukraine and the fears that greater Russian or Western involvement there could spark a broader conflict. And the Crimea revelation raises a disconcerting question: Where exactly does Moscow place the line for a threat severe enough to use nuclear weapons? Its doctrine says they should be used only against an existential threat, but an attack on Crimea would be far from existentially dangerous. We can only guess where the real red line lays, and hope not to cross it by mistake. Any war escalates- Russian actions put us on the brink Fisher 6/29 (Max, 2015, writing for Vox, “How World War III became possible,” http://www.vox.com/2015/6/29/8845913/russia-war)//RTF IX. The nuclear dangers: How Putin is pushing us back to the brink There is a specific moment that arms control experts often cite to highlight the dangers of nuclear weapons, how they kept the world poised, for years at a time, mere minutes away from nuclear devastation. That moment was September 26, 1983. That evening, a Russian lieutenant colonel named Stanislav Petrov settled in for his shift overseeing the Soviet Union's missile attack early warning system. Petrov had a top-secret network of satellites, all pointed squarely at the United States and its arsenal of nuclear-armed intercontinental ballistic missiles, which pointed back at him. The US and Soviet Union were ramping up development of ICBMs, which could circle the globe in 30 minutes and reduce an enemy city to ash. Both sides were driven by fear that the other could one day gain the ability to launch a preemptive nuclear strike so devastating and so fast that it would start and win the war within hours. Each sought to develop ever more sensitive warning systems, and ever more rapid mechanisms for retaliation, to deter the threat. Petrov ran one such warning system. If he caught an American attack as soon as it crossed his sensors, it would give the Soviet leadership about 20 minutes of warning time. That was their window to determine how to respond. The space for mistakes was effectively zero. Five hours into Petrov's shift that night, something he had never encountered in his 11-year career happened: The system went into full alarm. The word "LAUNCH" displayed in large red letters. The screen announced a "high reliability" of an American ICBM barreling toward the Soviet Union. Petrov had to make a decision: Would he report an incoming American strike? If he did, Soviet nuclear doctrine called for a full nuclear retaliation; there would be no time to double-check the warning system, much less seek negotiations with the US. If he didn't, and he was wrong, he would have left his country defenseless, an act tantamount to treason. His gut instinct told him the warning was in error, but when he flipped through the incoming imagery and data and he could reach no hard conclusion from it. After a few moments, he called his superiors and stated categorically that it was a false alarm. There was, he insisted, no attack. Petrov waited in agony for 23 minutes — the missile's estimated time to target — before he knew for sure that he'd been right. Only a few people were aware of it at the time, but thanks to Petrov, the world had only barely avoided World War III and, potentially, total nuclear annihilation. The US and Soviet Union, shaken by this and other near-misses, spent the next few years stepping back from the brink. They decommissioned a large number of nuclear warheads and signed treaties to limit their deployment. One of their most important measures was a 1987 agreement called the Intermediate-Range Nuclear Forces (INF) Treaty, which saw both sides conclude that the medium-range, landbased nuclear missiles they'd stuffed across Europe were simply too dangerous and destabilizing to be allowed. Because the missiles could reach Moscow or Berlin or London at lightening speeds, they shortened the "response time" to any crisis — the window in which a Soviet or Western leader would have to decide whether the country was under attack before such an attack would hit — to just a few minutes. They made the danger of an unintended escalation, or of an error like the that one Petrov only barely prevented, far greater. The risk they posed was deemed, in the 1987 INF Treaty, unacceptable to the world. And the weapons were removed. Putin has taken several steps to push Europe back toward the nuclear brink , to the logic of nuclear escalation and hair-trigger weapons that made the early 1980s, by many accounts, the most dangerous time in human history. Perhaps most drastically, he appears to have undone the 1987 INF Treaty, reintroducing the long-banned nuclear weapons. In March, Russia announced it would place nuclear-capable bombers and medium-range, nuclear-capable Iskander missiles in the Russian enclave of Kaliningrad — only an hour, by commercial airliner, from Berlin. Meanwhile, it has been testing 127 medium-range, land-based missiles. The missiles, to the alarm of the United States, appear to violate the INF Treaty. This is far from Putin's only nuclear escalation. He is developing more nuclear weapons, and calling frequent attention to them, as apparent cover for his aggression and adventurism in Europe. There are suspicions, for example, that Russia may have deployed nuclear-armed submarines off of the US Eastern Seaboard. What makes this so dangerous is that Putin appears to believe, as the scholar Edward Lucas outlined in a recent report for the Center for European Policy Analysis, that he has a greater willingness than NATO to use nuclear weapons, and thus that his superior will allows him to bully the otherwise stronger Western powers with games of nuclear chicken. This is a substantial, and indeed terrifying, break from Cold War– era nuclear thinking, in which both sides rightly feared nuclear brinksmanship as too dangerous to contemplate and used their weapons primarily to deter one another. "Russia’s nuclear saber-rattling is unjustified, destabilizing and dangerous," NATO Secretary-General Jens Stoltenberg said in a May speech in Washington. Putin is acting out of an apparent belief that increasing the nuclear threat to Europe, and as a result to his own country, is ultimately good for Russia and worth the risks. It is a gamble with the lives of hundreds of millions of Europeans, and perhaps many beyond, at stake. 128