SWS Bosem-Valladares 1NC v. KQ Fry-Johnson

advertisement
T-Surveillance
A. Domestic surveillance is info gathering on US persons
IT Law Wiki 15 IT Law Wiki 2015 http://itlaw.wikia.com/wiki/Domestic_surveillance
Definition Edit
Domestic surveillance is the acquisition of nonpublic information concerning United States persons.
B. Backdoors are used for cyberwarfare—not surveillance
Gellman and Nakashima 13
(Barton Gellman. Barton Gellman writes for the national staff. He has contributed to three Pulitzer Prizes for The Washington Post, most
recently the 2014 Pulitzer Prize for Public Service. He is also a senior fellow at the Century Foundation and visiting lecturer at Princeton’s
Woodrow Wilson School. After 21 years at The Post, where he served tours as legal, military, diplomatic, and Middle East correspondent,
Gellman resigned in 2010 to concentrate on book and magazine writing. He returned on temporary assignment in 2013 and 2014 to anchor
The Post's coverage of the NSA disclosures after receiving an archive of classified documents from Edward Snowden. Ellen Nakashima is a
national security reporter for The Washington Post. She focuses on issues relating to intelligence, technology and civil liberties. She
previously served as a Southeast Asia correspondent for the paper. She wrote about the presidential candidacy of Al Gore and co-authored a
biography of Gore, and has also covered federal agencies, Virginia state politics and local affairs. She joined the Post in 1995. "U.S. spy
agencies mounted 231 offensive cyber-operations in 2011, documents show," Washington Post. 8-30-2013.
https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documentsshow/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html//ghs-kw)
an implant’s purpose is to create a back door for future access. “You pry open the window
somewhere and leave it so when you come back the owner doesn’t know it’s unlocked, but you can
Sometimes
get back in when you want to,” said one intelligence official, who was speaking generally about the topic and was not privy to the budget. The official spoke on the
condition of anonymity to discuss sensitive technology. Under U.S. cyberdoctrine, these operations are known as “exploitation,” not “attack,”
but they are essential precursors both to attack and defense. By the end of this year, GENIE is projected to control
at least 85,000 implants in strategically chosen machines around the world. That is quadruple the number — 21,252 — available
in 2008, according to the U.S. intelligence budget. The NSA appears to be planning a rapid expansion of those numbers, which were
limited until recently by the need for human operators to take remote control of compromised machines. Even with a staff of 1,870 people, GENIE made full use of only 8,448 of the 68,975
the NSA has brought online an
automated system , code-named TURBINE, that is capable of managing “potentially millions of implants” for intelligence gathering
machines with active implants in 2011. For GENIE’s next phase, according to an authoritative reference document,
“and
active attack.”
C. THE AFFIRMATIVE INTERPRETATION IS BAD FOR DEBATE
Limits are necessary for negative preparation and clash, and their interpretation
makes the topic too big. They include cyberwarfare--- and thus include TONS of nonsurveillance affs destroying limits.
D. T is voter for good, well-prepared debating
Foreign Backdoors CP
Counterplan: the United States federal government should ban the creation of
intentionally deployed vulnerabilities in domestic data security technologies ¶ but
should not prohibit the surveillance of such vulnerabilities and should mandate
clandestine corporate disclosure of foreign-government-mandated backdoors to the
United States federal government.
1. Backdoors are inevitable—we’ll use backdoors created by foreign governments
Wittes 15
(Benjamin Wittes. Benjamin Wittes is editor in chief of Lawfare and a Senior Fellow in Governance Studies at the Brookings Institution. He is
the author of several books and a member of the Hoover Institution's Task Force on National Security and Law. "Thoughts on Encryption and
Going Dark, Part II: The Debate on the Merits," Lawfare. 7-22-2015. http://www.lawfareblog.com/thoughts-encryption-and-going-dark-partii-debate-merits//ghs-kw)
Still another approach is to let other governments do the dirty work. The computer scientists' report
cites the possibility of other sovereigns adopting their own extraordinary access regimes as a reason for
the U.S. to go slow: Building in exceptional access would be risky enough even if only one law
enforcement agency in the world had it. But this is not only a US issue. The UK government promises
legislation this fall to compel communications service providers, including US-based corporations, to
grant access to UK law enforcement agencies, and other countries would certainly follow suit. China has
already intimated that it may require exceptional access. If a British-based developer deploys a
messaging application used by citizens of China, must it provide exceptional access to Chinese law
enforcement? Which countries have sufficient respect for the rule of law to participate in an international exceptional access framework?
How would such determinations be made? How would timely approvals be given for the millions of new products with communications
capabilities? And how would this new surveillance ecosystem be funded and supervised? The US and UK governments have fought long and
hard to keep the governance of the Internet open, in the face of demands from authoritarian countries that it be brought under state control.
Does not the push for exceptional access represent a breathtaking policy reversal? I am certain that the
computer scientists are
correct that foreign governments will move in this direction, but I think they are misreading the consequences of this.
China and Britain will do this irrespective of what the United States does, and that fact may well
create potential opportunity for the U.S. After all, if China and Britain are going to force U.S.
companies to think through the problem of how to provide extraordinary access without
compromising general security, perhaps the need to do business in those countries will provide much
of the incentive to think through the hard problems of how to do it. Perhaps countries far less
solicitous than ours of the plight of technology companies or the privacy interests of their users will
force the research that Comey can only hypothesize. Will Apple then take the view that it can offer phones to
users in China which can be decrypted for Chinese authorities when they require it but that it's
technically impossible to do so in the United States?
Military DA
1. Cyber-deterrence is strong now but keeping our capabilities in line with other
powers’ is key to maintain stability
Healey 14
(Healey, Jason. Jason Healey is a Nonresident Senior Fellow for the Cyber Statecraft Initiative of the Atlantic Council and Senior Research
Scholar at Columbia University's School of International and Public Affairs, focusing on international cooperation, competition, and conflict
in cyberspace. From 2011 to 2015, he worked as the Director of the Council's Cyber Statecraft Initiative. Starting his career in the United
States Air Force, Mr. Healey earned two Meritorious Service Medals for his early work in cyber operations at Headquarters Air Force at the
Pentagon and as a plankholder (founding member) of the Joint Task Force – Computer Network Defense, the world's first joint cyber
warfighting unit. He has degrees from the United States Air Force Academy (political science), Johns Hopkins University (liberal arts), and
James Madison University (information security). "Commentary: Cyber Deterrence Is Working," Defense News. 7-30-2014.
http://archive.defensenews.com/article/20140730/DEFFEAT05/307300017/Commentary-Cyber-Deterrence-Working//ghs-kw)
Despite the mainstream view of cyberwar professionals and theorists,
cyber deterrence is not only possible but has been
working for decades. Cyberwar professionals are in the midst of a decades-old debate on how America could deter
adversaries from attacking us in cyberspace. In 2010, then-Deputy Defense Secretary Bill Lynn summed up the prevailing view
that “Cold War deterrence models do not apply to cyberspace” because of low barriers to entry and the anonymity of Internet attacks. Cyber
attacks, unlike intercontinental missiles, don’t have a return address. But this view is too narrow and technical. The
history of how
nations have actually fought (or not fought) conflicts in cyberspace makes it clear deterrence is not only
theoretically possible, but is actually keeping an upper threshold to cyber hostilities. The hidden hand of
deterrence is most obvious in the discussion of “a digital Pearl Harbor.” In 2012, then-Defense Secretary
Leon Panetta described his worries of such a bolt-from-the-blue attack that could cripple the United
States or its military. Though his phrase raised eyebrows among cyber professionals, there was broad agreement with the
basic implication: The United States is strategically vulnerable and potential adversaries have both the
means for strategic attack and the will to do it. But worrying about a digital Pearl Harbor actually dates
not to 2012 but to testimony by Winn Schwartau to Congress in 1991. So cyber experts have been
handwringing about a digital Pearl Harbor for more than 20 of the 70 years since the actual Pearl
Harbor. Waiting for Blow To Come? Clearly there is a different dynamic than recognized by conventional wisdom. For over
two decades, the United States has had its throat bared to the cyber capabilities of potential adversaries
(and presumably their throats are as bared to our capabilities), yet the blow has never come. There is no
solid evidence anyone has ever been killed by any cyber attack; no massive power outages, no disruptions of hospitals or faking of hospital
records, no tampering of dams causing a catastrophic flood. The
Internet is a fierce domain and conflicts are common
between nations. But deterrence — or at least restraint — has kept a lid on the worst. Consider: ■ Large
nations have never launched strategically significant disruptive cyber attacks against other large nations.
China, Russia and the United States seem to have plans to do so not as surprise attacks from a clear sky, but as part of a major (perhaps even
existential) international security crisis — not unlike the original Pearl Harbor. Cyber
attacks between equals have always
stayed below the threshold of death and destruction. ■ Larger nations do seem to be willing to launch
significant cyber assaults against rivals but only during larger crises and below the threshold of death
and destruction, such as Russian attacks against Estonia and Georgia or China egging on patriotic hackers to disrupt computers in dustups with Japan, Vietnam or the Philippines. The United States and Israel have perhaps come closest to the threshold with the Stuxnet attacks
but even here, the attacks were against a very limited target (Iranian programs to enrich uranium) and hardly out of the blue. ■ Nations seem
almost completely unrestrained using cyber espionage to further their security (and sometimes commercial) objectives and only slightly more
restrained using low levels of cyber force for small-scale disruption, such as Chinese or Russian disruption of dissidents’ websites or British
disruption of chat rooms used by Anonymous to coordinate protest attacks. In
a discussion about any other kind of military
power, such as nuclear weapons, we would have no problem using the word deterrence to describe
nations’ reluctance to unleash capabilities against one another. Indeed, a comparison with nuclear
deterrence is extremely relevant, but not necessarily the one that Cold Warriors have recognized. Setting a
Ceiling Nuclear weapons did not make all wars unthinkable, as some early postwar thinkers had hoped.
Instead, they provided a ceiling under which the superpowers fought all kinds of wars, regular and
irregular. The United States and Soviet Union, and their allies and proxies, engaged in lethal, intense conflicts from Korea to Vietnam and
through proxies in Africa, Asia and Latin America. Nuclear warheads did not stop these wars, but did set an upper
threshold neither side proved willing to exceed. Likewise, the most cyber capable nations (including America,
China and Russia) have been more than willing to engage in irregular cyber conflicts, but have stayed well
under the threshold of strategic cyber warfare, creating a de facto norm. Nations have proved just as
unwilling to launch a strategic attack in cyberspace as they are in the air, land, sea or space. The new
norm is same as the old norm. This norm of strategic restraint is a blessing but still is no help to deter cyber crime or the
irregular conflicts that have long occurred under the threshold. Cyber espionage and lesser state-sponsored cyber disruption seem to be
increasing markedly in the last few years.
2. Backdoors are key to cyberoffensive capabilities
Schneier 13
(Schneier. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School and a program fellow at the New America
Foundation's Open Technology. He is an American cryptographer, computer security and privacy specialist, and writer. He is the author of
several books on general security topics, computer security and cryptography. He is also a contributing writer for The Guardian news
organization.[ "US Offensive Cyberwar Policy.” 06-21-2013. https://www.schneier.com/blog/archives/2013/06/us_offensive_cy.html//ghskw)
Cyberattacks have the potential to be both immediate and devastating. They can disrupt
communications systems, disable national infrastructure, or, as in the case of Stuxnet, destroy nuclear reactors; but
only if they've been created and targeted beforehand. Before launching cyberattacks against another country,
we have to go through several steps. We have to study the details of the computer systems they're
running and determine the vulnerabilities of those systems. If we can't find exploitable vulnerabilities, we need
to create them: leaving "back doors," in hacker speak. Then we have to build new cyberweapons designed
specifically to attack those systems. Sometimes we have to embed the hostile code in those networks -- these are called "logic
bombs" -- to be unleashed in the future. And we have to keep penetrating those foreign networks, because
computer systems always change and we need to ensure that the cyberweapons are still effective. Like
our nuclear arsenal during the Cold War, our cyberweapons arsenal must be pretargeted and ready to launch. That's
what Obama directed the US Cyber Command to do. We can see glimpses of how effective we are in Snowden's
allegations that the NSA is currently penetrating foreign networks around the world: "We hack network
backbones -- like huge Internet routers, basically -- that give us access to the communications of
hundreds of thousands of computers without having to hack every single one."
3. Loss of cyber-offensive capabilities incentivizes China to take Taiwan—turns heg
and the economy
Hjortdal 11
(Magnus Hjortdal received his BSc and MSc in Political Science, with a specialization in IR, from the University of Copenhagen. He was an
Assistant Lecturer at the University of Copenhagen, a Research Fellow at the Royal Danish Defence College, and is now the Head of the
Ministry of Foreign Affairs in Denmark. “China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence ,” Journal of Strategic Security,
Vol. 4 No. 2, Summer 2011: Strategic Security in the Cyber Age, Article 2, pp 1-24.
http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1101&context=jss//ghs-kw)
China's military strategy mentions cyber capabilities as an area that the People's Liberation Army (PLA)
should invest in and use on a large scale.13 The U.S. Secretary of Defense, Robert Gates, has also declared that China's
development in the cyber area increasingly concerns him,14 and that there has been a decade-long trend of cyber attacks
emanating from China.15 Virtually all digital and electronic military systems can be attacked via cyberspace. Therefore, it is essential for
a state to develop capabilities in this area if it wishes to challenge the present American hegemony. The
interesting question then is whether China is developing capabilities in cyberspace in order to deter the United States.16 China's military
strategists describe cyber capabilities as a powerful asymmetric opportunity in a deterrence strategy.19
Analysts consider that an "important theme in Chinese writings on computer-network operations (CNO)
is the use of computer-network attack (CNA) as the spearpoint of deterrence."20 CNA increases the
enemy's costs to become too great to engage in warfare in the first place, which Chinese analysts judge
to be essential for deterrence.21 This could , for example, leave China with the potential ability to deter the
United States from intervening in a scenario concerning Taiwan. CNO is viewed as a focal point for the People's
Liberation Army, but it is not clear how the actual capacity functions or precisely what conditions it works under.22 If a state with
superpower potential (here China) is to create an opportunity to ascend militarily and politically in the
international system, it would require an asymmetric deterrence capability such as that described
here.23 It is said that the "most significant computer network attack is characterized as a pre-emption
weapon to be used under the rubric of the rising Chinese strategy of […] gaining mastery before the
enemy has struck."24 Therefore, China, like other states seeking a similar capacity, has recruited massively within the hacker milieu
inside China.25 Increasing resources in the PLA are being allocated to develop assets in relation to cyberspace.26 The improvements are visible:
The PLA has established "information warfare" capabilities,27 with a special focus on cyber warfare that, according to their doctrine, can be
used in peacetime.28 Strategists from the PLA advocate the use of virus and hacker attacks that can paralyze and surprise its enemies.29
Aggressive and Widespread Cyber Attacks from China and the International Response China's
use of asymmetric capabilities,
especially cyber warfare, could pose a serious threat to the American economy.30 Research and development in
cyber espionage figure prominently in the 12th Five-Year Plan (2011–2015) that is being drafted by both the Chinese central government and
the PLA.31 Analysts say that China
could well have the most extensive and aggressive cyber warfare capability in
the world, and that this is being driven by China's desire for "global-power status."32 These observations do not
come out of the blue, but are a consequence of the fact that authoritative Chinese writings on the subject present cyber warfare as an obvious
asymmetric instrument for balancing overwhelming (mainly U.S.) power, especially in case of open conflict, but also as a deterrent.33
4. Escalates to nuclear war and turns the economy
Landay 2k
(Jonathan S. Landay, National Security and Intelligence Correspondent, -2K [“Top Administration Officials Warn Stakes for U.S. Are High in
Asian Conflicts”, Knight Ridder/Tribune News Service, March 10, p. Lexis. Ghs-kw)
Few if any experts think China
and Taiwan, North Korea and South Korea, or India and Pakistan are spoiling to fight.
a minor miscalculation by any of them could destabilize Asia, jolt the global economy and even
start a nuclear war. India, Pakistan and China all have nuclear weapons, and North Korea may have a
But even
few, too. Asia lacks the kinds of organizations, negotiations and diplomatic relationships that helped
keep an uneasy peace for five decades in Cold War Europe. “Nowhere else on Earth are the stakes as
high and relationships so fragile,” said Bates Gill, director of northeast Asian policy studies at the Brookings Institution, a
Washington think tank. “We see the convergence of great power interest overlaid with lingering
confrontations with no institutionalized security mechanism in place. There are elements for potential
disaster.” In an effort to cool the region’s tempers, President Clinton, Defense Secretary William S. Cohen and National Security Adviser
Samuel R. Berger all will hopscotch Asia’s capitals this month. For America, the stakes could hardly be higher. There are
100,000 U.S. troops in Asia committed to defending Taiwan, Japan and South Korea, and the United
States would instantly become embroiled if Beijing moved against Taiwan or North Korea attacked South Korea.
While Washington has no defense commitments to either India or Pakistan, a
conflict between the two could end the global
taboo against using nuclear weapons and demolish the already shaky international nonproliferation
regime. In addition, globalization has made a stable Asia _ with its massive markets, cheap labor, exports
and resources indispensable to the U.S. economy. Numerous U.S. firms and millions of American jobs
depend on trade with Asia that totaled $600 billion last year, according to the Commerce Department.
Gender Privacy K
1. Discourse of National Security is dominated by masculine high politics--- and
ostracizes female voices
Blanchard 3 (Eric M. Blanchard, is currently Adjunct Assistant Professor in the Political Science
department at Columbia University in New York City. Summer 2003. “Signs: Journal of Women in Culture
and Society”. Signs, Vol. 28, No. 4 (Summer 2003), pp. 1289-1312 //MV)
National security discourses are typically part of the elite world of masculine high politics. Statesmen,
diplomats, and the military conduct the business of states, and too often war, imbuing the relations and
processes of the society of nation-states with an atmosphere seemingly devoid of women and an
interest in issues of concern to women. The academic discipline charged with theorizing this world, international
relations (IR), has only recently made a place for feminist analysis, and then only grudgingly. Academic
feminism and IR are contemporaries, each developing through the war-torn twentieth century and
motivated by some of the same international events, although work in IR often overlooks women’s
contributions, such as the 1919 International Congress of Women, which ran parallel to Versailles (Grant 1992, 86). While in some respects
estranged from the mainstream of IR, feminist and gender scholars have launched an important critique of the
core issues of the discipline: war, peace, and the quest to secure the boundaries of the nation-state. In a
rapidly changing, post-9/11 world, feminist voices must be heard if the international system is to
achieve a more comprehensive security in the face of terror networks, technowar, and mounting civilian
casualties.
2. The alternative is to vote negative and endorse a “politic of testifying” that replaces
public representation with the private world--- thus bringing the oppression of women
into light
3. Patriarchal Militarism will cause extinction—recognition of the non-male in a
reversal of the public and private is key to prevent it
Reardon 93 (Betty, UN consultant, 1993, Women and Peace—Feminist Visions of Global Security p.
21-25 //MV)
Women's traditional roles of engaging in multiple activities, as generalists, have given them this broad, integrated view of peace and secunty
that provides a hopeful alternative to the more narrow and fragmented views that most influence present processes of national and
international security policy formation. Perhaps nothing
can be more provocative of new ways of thinking about
security than turning the present notions upside down. The shortest. strongest. and perhaps mostmeaningful way of
describing this view is reversing the common relationship between means and ends. Women, as is evident from the foregoing passages quoted
from The Nairobi Forward Looking Strategies, see peace as the route to security rather than the other way around. Gandhi's assertion, "There is
no way to peace. Peace is the way," is an excellent summary of a feminine view of security, a view largely formed by women's experience of
nurturing, caregiving, and household maintenance. Peace, as will be noted in the discussion of positive peace in chapter 3, provides the
conditions and resources most conductive to caregiving and nurturing. War and preparation for war reduce and destroy resources and limit and
complicate the conditions for care and nurture. Women who bring forth human life, and carry the responsibility for maintaining it and providing
it with the most humane quality possible see security in terms of the possibilities for life, its maintenance, and the improvement of its quality.
Security lies in things hoped for and planned for, perhaps more than in things as they are. Secunty is in large part futures perception.
Security, we argue, is as much a matter of perception as "reality"; as is well attested by the real insecurity
produced by the present security system which (in spite of the warming ofthe Cold War) still relies heavilv on armed
force and the threat system, a reliance which erodes all other dimensions of security. Authentic human security,
we believe, derives mainly from the reasonable expectation of well being. In that women's lives have been largely devoted to fulfilling
expectations of well-being, feminists who see the relevance and values of women's experience discern it in a new multi-dimensional approach
to security… The holistic feminist approach contrasts starkly with conventional security, views and policies which reduce virtually all the issues
to the questions of "national security" and "military preparedness." The dysfunctionality of this reductionist view of security is readily evident
to all who are concerned with the quality of the life to be made secure. Feminists see in its deleterious effects on women how the inordinate
priority given to the military erodes authentic security, global, national, and local. (Scott and Reardon 1991) What women householders and
caregivers experience as authentic security is the expectation of well-being for those for whom they are providing care: their families, their
communities, and the vulnerable and impoverished whose need for care and nurturance many women feel as they feel the needs of "their
own." It
is the pursuit of these positive expectations that women bring to the endeavor, both in the
private sphere and in the public sphere, where they campaign for security at all social levels from
neighborhood or village to the international system. Their campaigns reveal their notions of what
constitutes security. Women's views of global security might be summarized as a world in which all the Earth's peoples could live with
four fundamental expectations. And women's actions for peace are inspired by the severe threats to the realization of those expectations
posed by the present world order. First, that our planet will continue to be able to sustain life. Yet scientists have warned that the ozone layer
has been so seriously damaged that it may be irreparable. The damage is causing severe harm to the human immune system and bringing
about a drastic increase in skin cancer. Deforestation, especially in the Amazon Basin, has significantly reduced the Earth's supply of oxygen.
Without sufficient oxygen, life cannot be sustained. Waters polluted by poverty and industrial misuse, and atmosphere damaged by weapons
testing, are destroying natural systems. Yet research and development of chemical and biological weapons continue. The
very weapons
we have developed to defend our security are themselves a threat to our security in the potential
consequences of their use in combat and in the actual processes of their development and testing. Next,
that the basic needs of life will be met. Yet. as more people of the world fall into poverty, millions are without clean, potable water, housing,
adequate food, fundamental education, and health care of any kind. Most of these are women. Inflation is rampant, unemployment is
increasing; uncared for children roam the streets of the world's great cities. Third, that human dignity and integrity will be respected, and
personal well-being and possibilities for individual and social development will not be impeded by traditional customs, social structures, or
political policies at local, national, or global levels. Yet a review of the Declaration of the Convention on All Forms of Discrimination against
Women provides a list of a broad and tragic range of impediments to women's personal well-being that still prevail throughout the world.
Apartheid and racism in various forms impede the social development of many indigenous peoples. The
arms produced for national
defense have been used to maintain racist, repressive systems that deny the personal well being and
human rights of ethnic groups and political dissenters. Fourth, that we can be protected from preventable harm and cared
for in times of disaster without enduring greater harm, that the life and well-being of the Earth’s peoples will not be harmed as a consequence
of imbalanced security policies, preparation for war, and armed conflict. Yet, in
a highly militarized world. local conflicts rage
that daily impose death and suffering on noncombatants as well as armed forces. The 1991 war in the Persian
Gulf and the 1992 war in a disintegrating Yugoslavia took uncounted numbers of civilian lives, produced hundreds of thousands of refugees.
and reduced living conditions to circumstances that of themselves were lethal. A
flourishing trade in conventional arms fuels
the flames of these conflicts and consumes resources in a truly incendiary manner, leaving in ashes
people's hopes for even a minimal standard of life. The technological arms race, with its advancing
weapons development, has also further diverted resources from social and human purposes as it
escalates to the point of the possibility of total destruction. Arms development cannot be relied upon to prevent
aggression and warfare. A case can be made that, on the contrary, arms production and trafficking encourage armed conflict, eroding rather
than assuring our expectation of protection or "defense." Each of these expectations has been the focus of major United Nations reports and
declarations on development, human rights, the environment, and disarmament and security. But little public heed has been paid. However,
women's movements and initiatives are insisting that we must turn our attention to meeting these four fundamental expectations that
constitute authentic security. They help to point out that we must attend to the obstacles to these expectations in an integrated,
comprehensive fashion based on an understanding of the interrelationships among them. Until we understand the connections among these
four expectations and the other global problems deriving from their frustration, neither the world nor any of its people will be secure.
Alternative approaches are an urgent necessity. Women's experiences and feminine values are sources
of such alternatives. Feminine Characteristics as Approaches to Peace and Security The discussions in this book and elsewhere of the
need for women's participation in public affairs are essentially a call to valorize those feminine characteristics that are conducive to peace and
comprehensive approaches to security. Some feminists argue that these
characteristics hold the greatest possibilities to
move us from the present condition of continuous armed conflict, potential nuclear annihilation, and
ecological collapse toward the achievement of a truly just world peace and authentic global security.
worries about her children, attends dinner parties.
Case
Cyber
1. No internal link—absent ev that the NSA puts backdoors in electric grids you should
give them 0% risk because they don’t have an advantage
NYT 13
(Editorial Board. "Close the N.S.A.’s Back Doors," New York Times. 9-21-2013.
http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-backdoors.html//ghs-kw)
In 2006, a federal agency, the
National Institute of Standards and Technology, helped build an international
encryption system to help countries and industries fend off computer hacking and theft. Unbeknown to the
many users of the system, a different government arm, the National Security Agency, secretly inserted a “back door”
into the system that allowed federal spies to crack open any data that was encoded using its technology. Documents
leaked by Edward Snowden, the former N.S.A. contractor, make clear that the agency has never met an encryption system that it has not tried
to penetrate. And it frequently tries to take the easy way out. Because modern cryptography can be so hard to break, even using the brute
force of the agency’s powerful supercomputers,
the agency prefers to collaborate with big software companies and
cipher authors, getting hidden access built right into their systems. The New York Times, The Guardian and
ProPublica recently reported that
the agency now has access to the codes that protect commerce and banking
systems, trade secrets and medical records, and everyone’s e-mail and Internet chat messages,
including virtual private networks. In some cases, the agency pressured companies to give it access; as The Guardian reported
earlier this year, Microsoft provided access to Hotmail, Outlook.com, SkyDrive and Skype. According to some of the
Snowden documents given to Der Spiegel, the N.S.A. also has access to the encryption protecting data on iPhones,
Android and BlackBerry phones.
2. Their evidence concedes that there’s no impact to a cyberattack – empirically
proven
Macri, 14
(Giuseppe, staff writer for the Daily Caller, citing NSA head Michael Rogers, “NSA Chief: US Will Suffer A
Catastrophic Cyberattack In The Next Ten Years,” http://dailycaller.com/2014/11/21/nsa-chief-us-willsuffer-a-catastrophic-cyberattack-in-the-next-ten-years/, BC)
N ational S ecurity A gency and U.S. Cyber Command head Adm. Michael Rogers warned lawmakers during a congressional briefing
this week that
the U.S. would suffer a severe cyberattack against critical infrastructure like power or fuel
grids in the not-too-distant future.∂ “I fully expect that during my time as a commander, we are going to be tasked with defending critical
infrastructure in the United States,” Rogers said while citing findings from an October Pew Research Center report. “ It’s only a matter
of the when, not the if , that we’re going to see something dramatic … I bet it happens before 2025 .”∂ Rogers
told the House Intelligence Committee Thursday he expected the attack to occur during his tenure as head of NSA the U.S. military’s cyber-war
branch, and that it
would likely come from state-sponsored hackers with ties to China, Russia or several other
countries, many of whom have already successfully breached the systems of critical U.S. industries .∂
“There are multiple nation-states that have the capability and have been on the systems,” Rogers told the committee, adding that many were
engaged in “reconnaissance” activities to surveil “specific schematics of most of our control systems.”∂ “There shouldn’t be any doubt in our
minds that there are nation-states and groups out there that have the capability… to shut down, forestall our ability to operate our basic
infrastructure, whether it’s generating power across this nation, whether it’s moving water and fuel,” Rogers said, warning
China and
“one or two others” had already broken into the U.S. power grid .∂ Rogers also predicted that in the coming
years, cyber
criminals previously engaged in stealing bank, credit card and other financial data would start to be co-opted by
nation-states to act as “surrogates ,” obscuring countries’ fingerprints in the infiltration and theft of information valuable to
planning attacks.∂ The admiral added that such
criminal groups, which are often Russian-speaking, have already
been using state-developed cyber tools.
3. Their impacts are all hype—no cyberattack
Walt 10 – Stephen M. Walt 10 is the Robert and Renée Belfer Professor of international relations at
Harvard University "Is the cyber threat overblown?" March 30
walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblown
Am I the only person -- well, besides Glenn Greenwald and Kevin Poulson -- who thinks the "
cyber-warfare" business may be overblown? It’s clear the U.S. national security
establishment is paying a lot more attention to the issue, and colleagues of mine -- including some pretty serious and level-headed people -- are increasingly worried by the danger of
some sort of "cyber-Katrina." I don't dismiss it entirely, but this sure
looks to me like a classic opportunity for threat-inflation .¶ Mind you, I'm
not saying that there aren't a lot of shenanigans going on in cyber-space, or that various forms of cyber-warfare don't have military potential. So I'm not arguing for complete head-in-
here’s what makes me worry that the threat is being overstated .¶ First, the whole issue is highly
esoteric -- you really need to know a great deal about computer networks, software, encryption, etc., to know how serious the danger might be. Unfortunately, details
about a number of the alleged incidents that are being invoked to demonstrate the risk of a "cyber-Katrina," or a
cyber-9/11, remain classified, which makes it hard for us lay-persons to gauge just how serious the problem really
was or is. Moreover, even when we hear about computers being penetrated by hackers, or parts of the internet crashing,
etc., it’s hard to know how much valuable information was stolen or how much actual damage was
done. And as with other specialized areas of technology and/or military affairs, a lot of the experts have a clear vested interest in
the-sand complacency. But
hyping the threat , so as to create greater demand for their services. Plus, we already seem to have
politicians leaping on the issue as a way to grab some pork for their states.¶ Second, there are lots of different problems
being lumped under a single banner, whether the label is "cyber-terror" or "cyber-war." One issue is the use of various computer tools to degrade an
enemy’s military capabilities (e.g., by disrupting communications nets, spoofing sensors, etc.). A second issue is the alleged threat that bad guys would penetrate computer networks and
shut down power grids, air traffic control, traffic lights, and other important elements of infrastructure, the way that internet terrorists (led by a disgruntled computer expert) did in the
movie Live Free and Die Hard. A third problem is web-based criminal activity, including identity theft or simple fraud (e.g., those emails we all get from someone in Nigeria announcing
that they have millions to give us once we send them some account information). A fourth potential threat is “cyber-espionage”; i.e., clever foreign hackers penetrate Pentagon or
defense contractors’ computers and download valuable classified information. And then there are annoying activities like viruses, denial-of-service attacks, and other things that affect
This sounds like a rich menu of potential
trouble, and putting the phrase "cyber" in front of almost any noun makes it sound trendy and a bit
more frightening. But notice too that these are all somewhat different problems of quite different importance, and the appropriate response to each is likely to be different
too. Some issues -- such as the danger of cyber-espionage -- may not require elaborate technical fixes
but simply more rigorous security procedures to isolate classified material from the web. Other problems may not
require big federal programs to address, in part because both individuals and the private sector
the stability of web-based activities and disrupt commerce (and my ability to send posts into FP).¶
have incentives to protect themselves (e.g., via firewalls or by backing up critical data). And as Greenwald warns, there may be real costs to civil
liberties if concerns about vague cyber dangers lead us to grant the NSA or some other government agency greater control over the Internet. ¶ Third, this is another issue that cries out
Is the danger that some malign hacker crashes a power grid greater than the
likelihood that a blizzard would do the same thing? Is the risk of cyber-espionage greater than the
potential danger from more traditional forms of spying? Without a comparative assessment of different risks and the costs of mitigating
for some comparative cost-benefit analysis.
each one, we will allocate resources on the basis of hype rather than analysis. In short, my fear is not that we won't take reasonable precautions against a potential set of dangers; my
concern is that we will spend tens of billions of dollars protecting ourselves against a set of threats that are not as dangerous as we are currently being told they are.
4. No impact to or risk of nuclear meltdowns – their evidence
Cappiello 3/29/11 – national environmental reporter for The Associated Press, master’s degrees in
earth and environmental science and journalism from Columbia University (Dina, “Long Blackouts Pose
Risk To U.S. Nuclear Reactors” Huffington Post, http://www.huffingtonpost.com/2011/03/29/blackoutrisk-us-nuclear-reactors_n_841869.html)//IS
A 2003 federal analysis looking at how to estimate the risk of containment failure said that should
earthquake or tornado it
power be knocked out by an
"would be unlikely that power will be recovered in the time frame to prevent core
meltdown." In Japan, it was a one-two punch: first the earthquake, then the tsunami. Tokyo Electric Power Co., the operator of the crippled
plant, found other ways to cool the reactor core and so far avert a full-scale meltdown without electricity. "Clearly the coping duration is an
issue on the table now," said Biff Bradley, director of risk assessment for the Nuclear Energy Institute. "The industry and the Nuclear Regulatory
Commission will have to go back in light of what we just observed and rethink station blackout duration." David Lochbaum, a former plant
engineer and nuclear safety director at the advocacy group Union of Concerned Scientists, put it another way: "Japan
shows what
happens when you play beat-the-clock and lose." Lochbaum plans to use the Japan disaster to press lawmakers and the
nuclear power industry to do more when it comes to coping with prolonged blackouts, such as having temporary generators on site that can
recharge batteries. A
complete loss of electrical power, generally speaking, poses a major problem for a
nuclear power plant because the reactor core must be kept cool, and back-up cooling systems – mostly
pumps that replenish the core with water_ require massive amounts of power to work. Without the
electrical grid, or diesel generators, batteries can be used for a time, but they will not last long with the
power demands. And when the batteries die, the systems that control and monitor the plant can also go
dark, making it difficult to ascertain water levels and the condition of the core. One variable not
considered in the NRC risk assessments of severe blackouts was cooling water in spent fuel pools, where
rods once used in the reactor are placed. With limited resources, the commission decided to focus its
analysis on the reactor fuel, which has the potential to release more radiation. An analysis of individual
plant risks released in 2003 by the NRC shows that for 39 of the 104 nuclear reactors, the risk of core
damage from a blackout was greater than 1 in 100,000. At 45 other plants the risk is greater than 1 in
1 million , the threshold NRC is using to determine which severe accidents should be evaluated in its latest analysis. The Beaver Valley
Power Station, Unit 1, in Pennsylvania had the greatest risk of core melt – 6.5 in 100,000, according to the analysis. But that risk may have been
reduced in subsequent years as NRC regulations required plants to do more to cope with blackouts. Todd Schneider, a spokesman for
FirstEnergy Nuclear Operating Co., which runs Beaver Creek, told the AP that batteries on site would last less than a week. In 1988, eight years
after labeling blackouts "an unresolved safety issue," the NRC required nuclear power plants to improve the reliability of their diesel
generators, have more backup generators on site, and better train personnel to restore power. These steps would allow them to keep the core
cool for four to eight hours if they lost all electrical power. By contrast, the newest generation of nuclear power plant, which is still awaiting
approval, can last 72 hours without taking any action, and a minimum of seven days if water is supplied by other means to cooling pools.
Despite the added safety measures, a 1997 report found that blackouts – the loss of on-site and off-site electrical power – remained "a
dominant contributor to the risk of core melt at some plants." The events of Sept. 11, 2001, further solidified that nuclear reactors might have
to keep the core cool for a longer period without power. After 9/11, the commission issued regulations requiring that
plants have
portable power supplies for relief valves and be able to manually operate an emergency reactor
cooling system when batteries go out. The NRC says these steps, and others, have reduced the risk of
core melt from station blackouts from the current fleet of nuclear plants.
latest analysis of the risks to the Peach Bottom plant show that
For instance, preliminary results of the
any release caused by a blackout there would be far less
rapid and would release less radiation than previously thought, even without any actions being taken.
With more time, people can be evacuated . The NRC says improved computer models, coupled with up-to-date information
about the plant, resulted in the rosier outlook. "When you simplify, you always err towards the worst possible circumstance," Scott Burnell, a
spokesman for the Nuclear Regulatory Commission, said of the earlier studies.
The latest work shows that "even in
situations where everything is broken and you can't do anything else, these events take a long time to
play out," he said. "Even when you get to releasing into environment, much less of it is released than
actually thought. " Exelon Corp., the operator of the Peach Bottom plant, referred all detailed questions about its preparedness and the
risk analysis back to the NRC. In a news release issued earlier this month, the company, which operates 10 nuclear power plants, said "all
Exelon nuclear plants are able to safely shut down and keep the fuel cooled even without electricity
from the grid." Other people, looking at the crisis unfolding in Japan, aren't so sure. In the worst-case scenario, the NRC's 1990 risk
assessment predicted that a core melt at Peach Bottom could begin in one hour if electrical power on- and offsite were lost, the diesel generators – the main back-up source of power for the pumps that keep the
core cool with water – failed to work and other mitigating steps weren't taken. "It is not a question that
those things are definitely effective in this kind of scenario," said Richard Denning, a professor of nuclear engineering at
Ohio State University, referring to the steps NRC has taken to prevent incidents. Denning had done work as a contractor on severe accident
analyses for the NRC since 1975. He retired from Battelle Memorial Institute in 1995. "They certainly could have made all the difference in this
particular case," he said, referring to Japan. "That's assuming you have stored these things in a place that would not have been swept away by
tsunami."
5. No motivation for US/China war – relations are resilient
Lee 13 (Lee Kuan Yew, former prime minister of on Singapore, The Atlantic, “Interview: Lee Kuan Yew
on the Future of U.S.- China Relations,” March 5,
http://www.theatlantic.com/international/archive/2013/03/interview-lee-kuan-yew-on-the-future-ofus-china-relations/273657/BB)
How likely is a major confrontation between the United States and China? Competition
between the United States and China
is inevitable, but conflict is not. This is not the Cold War. The Soviet Union was contesting with the United States for global
supremacy. China is acting purely in its own national interests. It is not interested in changing the world.
There will be a struggle for influence. I think it will be subdued because the Chinese need the United States, need
U.S. markets, U.S. technology, need to have students going to the United States to study the ways and means
of doing business so they can improve their lot. It will take them 10, 20, 30 years. If you quarrel with the United
States and become bitter enemies, all that information and those technological capabilities will be cut off. The
struggle between the two countries will be maintained at the level that allows them to still tap the
United States. Unlike U.S.-Soviet relations during the Cold War, there is no irreconcilable ideological conflict between
the United States and a China that has enthusiastically embraced the market. Sino-American relations are both
cooperative and competitive. Competition between them is inevitable, but conflict is not. After the collapse of
the Soviet Union, the United States and China are more likely to view each other as competitors if not adversaries. But the die has not been
cast. The best possible outcome is a new understanding
that when they cannot cooperate, they will coexist and allow
all countries in the Pacific to grow and thrive. A stabilizing factor in their relationship is that each nation requires
cooperation from and healthy competition with the other. The danger of a military conflict between China
and the United States is low. Chinese leaders know that U.S. military superiority is overwhelming and will remain so
for the next few decades. They will modernize their forces not to challenge America but to be able, if necessary, to
pressure Taiwan by a blockade or otherwise to destabilize the economy. China's military buildup delivers a strong message to the United
States that China is serious about Taiwan. However, the Chinese do not want to clash with anyone -- at least not for the next
15 to 20 years. The Chinese are confident that in 30 years their military will essentially match in sophistication the U.S. military. In the long
term, they do not see themselves as disadvantaged in this fight. China will not let an international court arbitrate territorial disputes in the
South China Sea, so the presence of U.S. firepower in the Asia-Pacific will be necessary if the U.N. Law of the Sea is to prevail.
6. China is not in the position to wage a trade war with the United States in the SQ–
it’s stock market is down by more than a third and is continuing to drop. China
depends on the United States for stability and now is not a time to wage an attack.
Heg
1. US tech leadership is strong now, despite Asia’s rise in science—their ev
Segal 4
(Adam, director of the Program on Digital and Cyberspace Policy at the Council on Foreign Relations
(CFR), An expert on security issues, technology development, November/December 2004 Issue, “Is
America Losing Its Edge,” https://www.foreignaffairs.com/articles/united-states/2004-11-01/americalosing-its-edge, BC)
The
U nited S tates' global primacy depends in large part on its ability to develop new technologies and
industries faster than anyone else . For the last five decades, U.S. scientific innovation and technological
entrepreneurship have ensured the country's economic prosperity and military power . It was
Americans who invented and commercialized the semiconductor, the personal computer, and the
Internet; other countries merely followed the U.S. lead.∂ Today, however, this technological edge-so long taken for
granted-may be slipping, and the most serious challenge is coming from Asia. Through competitive tax policies,
increased investment in research and development (R&D), and preferential policies for science and
technology (S&T) personnel, Asian governments are improving the quality of their science and
ensuring the exploitation of future innovations . The percentage of patents issued to and science
journal articles published by scientists in China, Singapore, South Korea, and Taiwan is rising. Indian
companies are quickly becoming the second-largest producers of application services in the world, developing, supplying, and managing
database and other types of software for clients around the world. South
Korea has rapidly eaten away at the U.S.
advantage in the manufacture of computer chips and telecommunications software. And even China has
made impressive gains in advanced technologies such as lasers, biotechnology, and advanced materials
used in semiconductors, aerospace, and many other types of manufacturing.∂ Although the United States'
technical dominance remains solid , the globalization of research and development is exerting considerable pressures on the
American system. Indeed, as the United States is learning, globalization cuts both ways: it is both a potent catalyst of U.S. technological
innovation and a significant threat to it. The
United States will never be able to prevent rivals from developing new technologies; it can
remain dominant only by continuing to innovate faster than everyone else. But this won't be easy; to keep
its privileged position in the world, the U nited S tates must get better at fostering technological
entrepreneurship at home.
2. Companies won’t leave the US—market is too large
Corn 7/13
(Corn, Geoffrey S. * Presidential Research Professor of Law, South Texas College of Law; Lieutenant Colonel (Retired), U.S. Army Judge Advocate
General’s Corps. Prior to joining the faculty at South Texas, Professor Corn served in a variety of military assignments, including as the Army’s Senior
Law of War Advisor, Supervisory Defense Counsel for the Western United States, Chief of International Law for U.S. Army Europe, and as a Tactical
Intelligence Officer in Panama. “Averting the Inherent Dangers of 'Going Dark': Why Congress Must Require a Locked Front Door to Encrypted Data,”
SSRN. 07-13-2015. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2630361&download=yes//ghs-kw)
The risks related to “going dark” are real. When the President of the United States,60 the Prime Minister of the United Kingdom,61 and the
Director of the FBI62 all publically express deep concerns about how this phenomenon will endanger their respective nations, it is difficult to
ignore. Today, encryption technologies that are making it increasingly easy for individual users to prevent even lawful government access to
potentially vital information related to crimes or other national security threats. This evolution of individual encryption capabilities represents a
fundamental distortion of the balance between government surveillance authority and individual liberty central to the Fourth Amendment. And
balance is the operative word. The right of The People to be secure against unreasonable government intrusions into those places and things
protected by the Fourth Amendment must be vehemently protected. Reasonable searches, however, should not only be permitted, but they
should be mandated where necessary. Congress
has the authority to ensure that such searches are possible. While
some argue that this could cause American manufacturers to suffer, saddled as they will appear to be by
the “Snowden Effect,” the rules will apply equally to any manufacturer that wishes to do business in the
United States. Considering that the United States economy is the largest in the world, it is highly unlikely
that foreign manufacturers will forego access to our market in order to avoid having to create CALEA-like
solutions to allow for lawful access to encrypted data. Just as foreign cellular telephone providers, such as
T-Mobile, are active in the United States, so too will foreign device manufacturers and other
communications services adjust their technology to comply with our laws and regulations. This will put
American and foreign companies on an equal playing field while encouraging ingenuity and competition.
Most importantly, “the right of the people to be secure in their persons, houses, papers, and effects” will be protected not only “against
unreasonable searches and seizures,” but also against attacks by criminals and terrorists. And is not this, in essence, the primary purpose of
government
3. Alt cause—military budget cuts
Morrison 14
(Charles Morrison. Morrison received his MA in Security Studies from Georgetown University and his BA in IR from Tufts University.
"Technological superiority no longer sufficient for US military dominance," AEI. 8-5-2014. http://www.aei.org/publication/technologicalsuperiority-no-longer-sufficient-for-us-military-dominance///ghs-kw)
The panel outlines three disturbing trends that are helping to close this capability gap. For one, advanced military technologies—many of which
used to be America-only capabilities—are now proliferating to potential competitors. For instance, at least 75 states are currently pursuing
unmanned systems. Secondly, states
like China and Russia have focused their military investments on countering
US systems and exploiting their weaknesses. And finally, the US government’s relative share of research and
development spending has declined. As a result of these developments, the report argues that the US “must now
plan for battlefields that are more lethal, conflict that unfolds more rapidly, and greatly restricted operational depth making sanctuary far more
difficult to create and maintain.” If that wasn’t depressing enough, the panel also warns that even
if the US is able to maintain a
technological edge through increased investment, “capability is not always a substitute for capacity.” In
other words, if the US military keeps shrinking, no amount of innovation or advanced technology will
make up for real losses in combat power. Yet, at the same time, without “significant investments” to
maintain US technological superiority, the Pentagon’s ability to meet national objectives will be greatly at risk. Fortunately,
policymakers can eliminate the false choice between capability and capacity now facing the Pentagon. As the panel recommends, Congress
and the President can immediately overturn the 2011 Budget Control Act and restore defense spending to the plan set forth
by Robert Gates in 2012. By itself, this step would be insufficient to rebuild American military strength, however, without higher
budgets, the Pentagon will increasingly face devastating tradeoffs that will end up costing American lives. While
restoring Pentagon spending to 2012 levels will not be easy, the NDP makes clear that experts from both political parties now
agree that higher defense budgets are a national imperative. With higher funding levels, the Pentagon
could get serious about military modernization and begin to invest in the kind of 21st century military
arsenal that raises the bar for conflict and ensures the men and women of the American military never
face a fair fight.
4. Economic decline and internal domestic conflict following it has made American soft
and hard power unsustainable and ineffective at current levels
Cedras, Undergraduate at the Department of Politics and International Relations at
the University of Reading, 14 (Jamina, 7-3-14, Academia, “Is US power in decline?” ,
https://www.academia.edu/7516584/Is_US_power_in_decline)
A state’s ability to exercise both soft and hard power stems primarily from its intrastate stability and domestic capabilities. Given that
contemporary declinist rhetoric has centered on the economic rise of China, it is fundamental to note that the rise of one country's power does
not necessarily translate to the fall of another in absolute terms. The
decline of American power in absolute terms may
thus be made apparent through an internal examination of the United States. Economically, politically,
socially and environmentally, the US now faces an array of complications that have burdened its role as
the global hegemony. Granted these complications are nothing new, they are worrisome given the interdependent nature of
economies today. At present, the economic foundation of US hegemony stems from the dollar’s role as the
international system’s reserve currency (Layne, 2012: 418). However, given the US’s economic downturn post
2008 and the federal government’s credit rating downgrade to AA+ in 2011, fears of dollar devaluation are
not unwarranted. The American budget and trade deficits have ballooned and discredited the US’s debt
repayment capabilities. Although it is essential to note that no country is without fault, surely it is not irrational to expect a
global hegemony to help solve an economic crisis and not initiate one. The US deficit shows no signs of
reduction within the foreseeable future and imperial overstretch has been costly for the US national
budget, a decline in US power is obvious from this perspective. The political rigidity surrounding the legislative
branch of government has also had a magnitude of implications for the US economy. At present the US is
exhibiting the greatest division over foreign policy between the Democrats and Republicans since the Second World War (Trubowitz, 2012:
157). As Timothy Ash asserts: “The
erosion of American power is happening faster than most of us predicted - while
behave like rutting stags with locked antlers" (Timothy Garton Ash, 2013). One only needs to consider the
2013 Government shutdown and its subsequent costs as confirmation of this. In addition to these monetary costs, the
continual trend of rising income inequality and the deep rooted concerns surrounding the education and
healthcare market alike have raised intrinsic equity concerns that may pose threats to future political
stability in the US, damaging both America’s soft and hard power.
the politicians
5. Status quo solves innovation—new programs
WashPo 11/16
(Robert Burns. "Hagel announces DOD plan to maintain U.S. military’s superiority," Washington Post. 11-16-2014.
https://www.washingtonpost.com/politics/hagel-announces-innovation-initiative-to-fend-off-risks-to-us-militarysuperiority/2014/11/16/e2257a42-6db5-11e4-8808-afaa1e3a33ef_story.html//ghs-kw)
Hagel announced a “defense innovation initiative” that he likened to historic and successful campaigns
during the Cold War to offset the military advantages of U.S. adversaries. He described a “gamechanging” strategy to sharpen American’s military edge in the face of budget impasses on Capitol Hill.
“We must change the way we innovate, operate and do business,” he told a defense forum at the Ronald Reagan
Presidential Library. In a memo to Pentagon leaders in which he outlined the initiative, Hagel said the United States must not lose its
commanding edge in military technology. “While we have been engaged in two large land-mass wars over the last 13 years, potential
adversaries have been modernizing their militaries, developing and proliferating disruptive capabilities across the spectrum of conflict. This
represents a clear and growing challenge to our military power,” he wrote. Speaking just a short walk from Reagan’s tomb, Hagel invoked the
late president’s legacy as a rebuilder of U.S. military strength in the 1980s and cited Reagan’s famous call for the Soviets to tear down the Berlin
Wall, which epitomized a divided Europe and a world at risk of a new global war. “America and its allies prevailed over a determined Soviet
adversary by coming together as a nation — over decades and across party lines — to make long-term, strategic investments, including in
innovation and reform of our nation’s military,” he said. Those investments “ultimately helped force the Soviet military and Soviet regime to
fold its hand.” In separate remarks to the defense forum, the vice chairman of the Joint Chiefs of Staff, Adm. James A. Winnefeld Jr., said Russia
and China began reasserting themselves on the world stage to capitalize on America’s “distraction” in the long wars in Iraq and Afghanistan. “In
protecting our allies against potential mischief from these powers, we’ve always counted on our overmatch in capability and capacity to offset
the challenges of distance and initiative,” Winnefeld said. “That overmatch is now in jeopardy.” Hagel, a Republican who served two terms in
Congress as a senator from Nebraska, said the United States can no longer count on outspending its rivals and potential adversaries. But longstanding overseas alliances and America’s reputation for dependability require, he said, that the military be able to project power abroad — an
expensive capability that he said is now at risk. “If this capability is eroded or lost, we will see a world far more dangerous and unstable — far
more threatening to America and our citizens here at home than we have seen since World War II,” he said. Hagel said the United States cannot
afford to relax or assume that the military superiority it developed during the Cold War will automatically persist. “We
are not waiting
for change to come to us — we are taking the initiative, getting ahead of the changes we know are
coming and making the long-term investments we need for the future,” he said. Hagel said he is launching a
long-range research and development program to find and field breakthroughs in key technology,
including robotics, miniaturization and advanced manufacturing techniques such as 3-D printing. He said the
Pentagon will call on the private sector and on academia for help. “This program will look toward the
next decade and beyond,” he said. “In the near-term, it will invite some of the brightest minds from
inside and outside government to start with a clean sheet of paper and assess what technologies and
systems DOD ought to develop over the next three to five years.”
Solvency
1. HUGE SOLVENCY DEFICIT– their plan text is The USFG should substantially curtail its
surveillance of intentionally deployed vulnerabilities in domestic data security
technologies but their solvency advocate talks about the Secure Data Act, which bans
government mandated backdoor construction. The plan text only curtails its
surveillance so it doesn’t stop the creation of the backdoors. Further, it only curtails
surveillance of SECURITY backdoors--- means they can’t solve their tech advantage
because companies will still be forced to create backdoors
2. Circumvention – their evidence concedes NSA will force companies to build
backdoors
Trevor Timm 15, Trevor Timm is a Guardian US columnist and executive director of the Freedom of the
Press Foundation, a non-profit that supports and defends journalism dedicated to transparency and
accountability. 3-4-2015, "Building backdoors into encryption isn't only bad for China, Mr President,"
Guardian, http://www.theguardian.com/commentisfree/2015/mar/04/backdoors-encryption-chinaapple-google-nsa)//GV
Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no further than President Obama’s stark
criticism of China’s plan to do exactly that on Tuesday. If only he would tell the FBI and NSA the same thing. In a stunningly short-sighted move,
the FBI - and more recently the NSA - have been pushing for a new US law that would force tech
companies like Apple and Google to hand over the encryption keys or build backdoors
into their products
and tools so the government would always have access to our communications. It was only a matter of time before other governments jumped
on the bandwagon, and China wasted no time in demanding the same from tech companies a few weeks ago. As President Obama himself
described to Reuters, China has proposed an expansive new “anti-terrorism” bill that “would essentially force all foreign companies, including
US companies, to turn over to the Chinese government mechanisms where they can snoop and keep track of all the users of those services.”
Obama continued: “Those kinds of restrictive practices I think would ironically hurt the Chinese economy over the long term because I don’t
think there is any US or European firm, any international firm, that could credibly get away with that wholesale turning over of data, personal
data, over to a government.” Bravo! Of course these are the exact arguments for why it would be a disaster for US government to force tech
companies to do the same. (Somehow Obama left that part out.) As Yahoo’s top security executive Alex Stamos told NSA director Mike Rogers
in a public confrontation last week, building backdoors into encryption is like “drilling a hole into a windshield.” Even if it’s technically possible
to produce the flaw - and we, for some reason, trust the US government never to abuse it - other countries will inevitably demand access for
themselves.
Companies will no longer be in a position to say no, and even if they did, intelligence services
would find the backdoor unilaterally - or just steal the keys outright. For an example on how this works, look no
further than last week’s Snowden revelation that
the UK’s intelligence service and the NSA stole the encryption keys
for millions of Sim cards used by many of the world’s most popular cell phone providers.
It’s happened
many times before too. Security expert Bruce Schneier has documented with numerous examples, “Back-door access built for the good guys is
routinely used by the bad guys.” Stamos repeatedly (and commendably) pushed the NSA director for an answer on what happens when China
or Russia also demand backdoors from tech companies, but Rogers didn’t have an answer prepared at all. He just kept repeating “I think we can
work through this”. As Stamos insinuated, maybe Rogers should ask his own staff why we actually can’t work through this, because virtually
every technologist agrees backdoors just cannot be secure in practice. (If you want to further understand the details behind the encryption vs.
backdoor debate and how what the NSA director is asking for is quite literally impossible, read this excellent piece by surveillance expert Julian
Sanchez.) It’s downright bizarre that the US government has been warning of the grave cybersecurity risks the country faces while, at the very
same time, arguing that we should pass a law that would weaken cybersecurity and put every single citizen at more risk of having their private
information stolen by criminals, foreign governments, and our own. Forcing backdoors will also be disastrous for the US economy as it would be
for China’s. US tech companies - which already have suffered billions of dollars of losses overseas because of consumer distrust over their
relationships with the NSA - would lose all credibility with users around the world if the FBI and NSA succeed with their plan. The White House
is supposedly coming out with an official policy on encryption sometime this month, according to the New York Times – but the President can
save himself a lot of time and just apply his comments about China to the US government. If he knows backdoors in encryption are bad for
cybersecurity, privacy, and the economy, why is there even a debate?
3. No impact to backdoors, and there are already solutions to backdoors – their
evidence
Kohn 14
(Cindy, writer for the Electronic Freedom Foundation, 9-26-14, “Nine Epic Failures of Regulating
Cryptography,” https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulating-cryptography, BC)
For those who weren't following digital civil liberties issues in 1995, or for those who have forgotten, here's
a refresher list of why forcing
companies to break their own privacy and security measures by installing a back door was a bad idea 15
years ago:∂ It will create security risks. Don't take our word for it. Computer security expert Steven Bellovin has
explained some of the problems. First, it's hard to secure communications properly even between two parties. Cryptography with a back
door adds a third party, requiring a more complex protocol, and as Bellovin puts it: "Many previous attempts to add such features have resulted in
new, easily exploited security flaws rather than better law enforcement access." It doesn't end there. Bellovin notes: ∂ Complexity in the protocols isn't the only
problem; protocols require computer programs to implement them, and more complex code generally creates more exploitable bugs. In the most notorious
incident of this type, a cell phone switch in Greece was hacked by an unknown party. The so-called 'lawful intercept' mechanisms in the switch — that is, the
features designed to permit the police to wiretap calls easily — was abused by the attacker to monitor at least a hundred cell phones, up to and including the prime
minister's. This attack would not have been possible if the vendor hadn't written the lawful intercept code. ∂ More recently, as security researcher Susan Landau
explains, "an IBM researcher found that
a Cisco wiretapping architecture designed to accommodate law-
enforcement requirements — a system already in use by major carriers — had numerous security
holes in its design. This would have made it easy to break into the communications network and
surreptitiously wiretap private communications."∂ The same is true for Google, which had its
"compliance" technologies hacked by China.∂ This isn't just a problem for you and me and millions of companies that need secure
communications. What will the government itself use for secure communications? The FBI and other government agencies currently use many commercial products
— the same ones they want to force to have a back door. How will the FBI stop people from un-backdooring their deployments? Or does the government plan to
stop using commercial communications technologies altogether? ∂ It won't stop the bad guys. Users who want strong encryption will be able to get it — from
Germany, Finland, Israel, and many other places in the world where it's offered for sale and for free. In 1996, the National Research Council did a study called
"Cryptography's Role in Securing the Information Society," nicknamed CRISIS. Here's what they said: ∂ Products using unescrowed encryption are in use today by
millions of users, and such products are available from many difficult-to-censor Internet sites abroad. Users could pre-encrypt their data, using whatever means
were available, before their data were accepted by an escrowed encryption device or system.
Users could store their data on remote
computers, accessible through the click of a mouse but otherwise unknown to anyone but the data
owner, such practices could occur quite legally even with a ban on the use of unescrowed encryption .
Knowledge of strong encryption techniques is available from official U.S. government publications and other sources worldwide, and experts understanding how to
use such knowledge might well be in high demand from criminal elements. — CRISIS Report at 303∂ None of that has changed. And of course, more encryption
technology is more readily available today than it was in 1996. So unless the goverment wants to mandate that you are forbidden to run anything that is not U.S.
It will harm innovation . In order to
ensure that no "untappable" technology exists, we'll likely see a technology mandate and a draconian
regulatory framework. The implications of this for America's leadership in innovation are dire. Could
Mark Zuckerberg have built Facebook in his dorm room if he'd had to build in surveillance capabilities
before launch in order to avoid government fines? Would Skype have ever happened if it had been forced to include
an artificial bottleneck to allow government easy access to all of your peer-to-peer communications? This has especially
serious implications for the open source community and small innovators. Some open source developers
have already taken a stand against building back doors into software.∂ It will harm US business . If, thanks to
government approved on your devices, they won't stop bad guys from getting access to strong encryption.∂
US businesses cannot innovate and cannot offer truly secure products, we're just handing
business over to foreign companies who don't have such limitations . Nokia, Siemens, and Ericsson
would all be happy to take a heaping share of the communications technology business from US
companies. And it's not just telecom carriers and VOIP providers at risk. Many game consoles that people can use to play over
the Internet, such as the Xbox, allow gamers to chat with each other while they play. They'd have to be
tappable, too.
this proposal,
Download