Professional Documents
Culture Documents
Affirmative
Case
1AC
Plan-Text
The United States federal government should require a warrant for all of its
electronic domestic surveillance.
State
military and research offices were the main 20th century beneficiaries of advanced
encryption techniques until the development of public-key cryptography in the
1970s, which afforded commercial and private users a means to protect their data
against unwanted infiltration. Now, what was once a mere means to share secrets has
become an indispensable component of personal and national data
security. An estimated 40 million cyberattacks occurred in 2014, imposing millions in
costs and weeks of frustration for organizations and individual users alike. Many of
these costly breaches could be prevented through encryption techniques
that regulate data access, authenticate users, and secure sensitive
information. A secret report from the U.S. National Intelligence Councilironically, leaked by Edward Snowden thanks to
the governments own poor authentication practiceseven made the case that encryption was the "best
defense" to protect private data. Yet intelligence agencies and their allies have
consistently set out to limit encryption technologies ( many of which they developed or relied upon
themselves previously). The seeds of the first Crypto Wars were sown during the Cold War ,
communications with James Madison, John Adams, and James Monroe to "keep matters merely personal to ourselves."
when the U.S. imposed strong export controls on encryption techniques to keep them away from the Ruskies. Only a small set of
relatively weak techniques approved by the Commerce and State Departments could be used in international business. But this
earlier export ban. In March, a massive vulnerability affecting the Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
protocols ubiquitous to most users Internet experiences, called "FREAK," was discovered. Later in May, researchers discovered a
computing, when only institutional (and usually government-connected) organizations operating huge supercomputers would be
effected by such bansalthough academics did not exactly hide their discontent at the inconvenience dealt to their research
projects. The rise of the home computer dramatically changed the calculus. The export ban on encryption imposed arbitrary
boundaries on a network that is borderless by definition. Enter the cypherpunks: a ragtag, homebrew crew of anti-authoritarian
hackers hell-bent on subverting spooks and protecting privacy on the Net. These luminaries developed the tools and rhetoric to
make bad laws irrelevant by making them unenforceable. For example, Phil Zimmermans Pretty Good Privacy (PGP) program, a
mainstay of modern email delivery, which Zimmerman posted to Usenet in 1991. After a three-year criminal investigation, the U.S.
Attorney's Office decided not to prosecute Zimmerman for sharing the encryption protocol. Throughout the '90s, federal officials
these outrageous methods were exposed to the world did the forces of surveillance bother attempting to legitimize these practices
through less illegal public meansalbeit with the rhetorical gall of concealing obvious spying ambitions in the more reasonable garb
of genuine law enforcement concerns.
as has been repeated by General Keith Alexander, and is reflected in the NSA slide in Figure 1
to "collect it all" :32 from undersea cable taps, to Yahoo video chats, to inflight Wi-Fi, to virtual worlds and online multiplayer games like Second Life and World of Warcraft.
The NSA has at least three different programmes to get Yahoo and Google user data. This shows that they try to get
the same data from multiple mechanisms.33 With the GCHQ under the MUSCULAR programme it hacked into the
internal data links of Google and Yahoo34 for information that it could mostly have gotten through the PRISM
highlight the many points at which our data is insecure, and the vast
numbers of vulnerabilities to surveillance that exist throughout our
digital world. However, while the NSA is the largest threat in the
surveillance game, it is not the only threat. Governments all around the
world are using the internet to surveil their citizens. Considering the rate
of technological change, it is not unforeseeable that the methods, tools
and vulnerabilities used by the NSA will be the tools of states, cyber
criminals and low-skilled hackers of the future. Regardless of who the
perceived attacker or surveillance operative may be, and whether it is the
NSA or not, large-scale, mass surveillance is a growing cyber security
threat.
internet and technology users around the world less secure. The NSA has
The NSA has been working with the GCHQ to hack into
Google and Yahoo data centres.37 The NSA also works to undermine
internet service providers.36
adversaries. Today, common criminals, organized crime rings, and nationstates leverage sophisticated techniques to launch attacks that are highly
targeted and very difficult to detect. Particularly worrisome are attacks by tremendously skilled
threat actors that attempt to steal highly sensitiveand often very valuableintellectual property, private
communications, and other strategic assets and information. It is a threat that is nothing short of formidable. In
companiesranging from small banks, major defense contractors, and leading retailersthat they had been victims
3 Internal links
1. Norm-BuildingCurtailing surveillance is key to effective
norms-buildingthat prevents cyber-warfare
Farrell 2015, Henry Farrell, PhD in Government from Georgetown University,
Associate Professor of Political Science and International Affairs, April 2015,
Promoting Norms for Cyberspace, Council on Foreign Relations,
http://www.cfr.org/cybersecurity/promoting-norms-cyberspace/p36358?cid=nlcpress_release-press_note--link220150406&sp_mid=48385113&sp_rid=YWtpbWVyeUBoc3RvZGF5LnVzS0
U.S. policymakers argue that the United States and others need to build norms to
mitigate cybersecurity problems. Admiral Michael S. Rogers, head of the National Security Agency
(NSA) and Cyber Command, has argued that shared norms are a basic building block for cybersecurity. He has
called on actors in academia and civil society to help design them and to assist in their spread. It may seem
major problems. First, it is easiest to promote norms when one can invoke common values to support them, yet the
world's cyber powers have differentand radically incompatiblevalues over how to protect cyberspace. The
clashing interests between democratic and authoritarian regimes on the value of an open Internet and definitions of
exposed gap between U.S. rhetoric and actions . At the very least, other states must be
persuaded that following a norm is in their national interest. The disclosures, however, reinforced the view of many
states that the United States disproportionately benefits from an open, global, and secure Internet, and is only
In
light of the Snowden disclosures, the United States is poorly placed to
persuade other actors of its good faith or its commitment to shared
interests and values. The extent of the damage to the U.S. reputation was
revealed when the United States accused North Korea of hacking into
Sony's servers and announced its intention to retaliate against North Korea through low-level sanctions.
committed to these values to the extent that they further U.S. economic, political, and military objectives.
Building on previous indictments of Chinese soldiers for hacking into U.S. firms, U.S. officials followed an approach
of "naming and shaming" cyberattackers while pursuing sanctions and possible criminal charges. These actions are
highly unlikely to result in successful prosecutions, but potentially serve a normative purpose by signaling to the
and terrorists. In a twin pair of appearances before the Senates judiciary and intelligence committees on Wednesday,
James Comey testified that Isiss use of end-to-end encryption, whereby the
messaging service being used to send information does not have access to the
decryption keys of those who receive it, helped the group place a devil on the
shoulders of potential recruits saying kill, kill, kill, kill. Comey said that while the FBI is thus far disrupting Isis
plots, I cannot see me stopping these indefinitely. He added: I am not trying to scare folks. Since October, following
Apples decision to bolster its mobile-device security, Comey has called for a
debate about inserting back doors or front doors, as he prefers to call them
into encryption software, warning that encryption threatens to lead us all to a
very, very dark place. But Comey and deputy attorney general Sally Quillian Yates testified that they do not
at the moment envision proposing legislation to mandate surreptitious or backdoor
access to law enforcement. Both said they did not wish the government to itself
hold user encryption keys and preferred to engage communications
providers for access, though technicians have stated that what Comey and Yates seek is fundamentally incompatible
with end-to-end encryption. Comey, who is not a software engineer, said his response to that was: Really? He framed
himself as an advocate of commercial encryption to protect personal data who
believed that the finest minds of Silicon Valley can invent new modes of
encryption that can work for US law enforcement and intelligence agencies
without inevitably introducing security flaws. While the FBI director did not specifically cite
which encrypted messaging apps Isis uses, the Guardian reported in December that its grand mufti used WhatsApp to communicate
The National Security Agency has a secret backdoor into its vast
databases under a legal authority enabling it to search for US citizens'
email and phone calls without a warrant , according to a top-secret
document passed to the Guardian by Edward Snowden. The previously
undisclosed rule change allows NSA operatives to hunt for individual Americans'
communications using their name or other identifying information. Senator Ron
Wyden told the Guardian that the law provides the NSA with a loophole
potentially allowing "warrantless searches for the phone calls or emails of
law-abiding Americans". The authority, approved in 2011, appears to contrast
with repeated assurances from Barack Obama and senior intelligence officials to
both Congress and the American public that the privacy of US citizens is protected
from the NSA's dragnet surveillance programs. The intelligence data is being
gathered under Section 702 of the of the Fisa Amendments Act (FAA), which gives
the NSA authority to target without warrant the communications of foreign targets,
who must be non-US citizens and outside the US at the point of collection. The
communications of Americans in direct contact with foreign targets can
also be collected without a warrant, and the intelligence agencies
acknowledge that purely domestic communications can also be
inadvertently swept into its databases. That process is known as
"incidental collection" in surveillance parlance. But this is the first
evidence that the NSA has permission to search those databases for
specific US individuals' communications. A secret glossary document provided
to operatives in the NSA's Special Source Operations division which runs the Prism
program and large-scale cable intercepts through corporate partnerships with
technology companies details an update to the "minimization" procedures that
govern how the agency must handle the communications of US persons. That group
is defined as both American citizens and foreigners located in the US. "While the
FAA 702 minimization procedures approved on 3 October 2011 now allow for use of
certain United States person names and identifiers as query terms when reviewing
collected FAA 702 data," the glossary states, "analysts may NOT/NOT [not repeat
not] implement any USP [US persons] queries until an effective oversight process
has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of
National Intelligence]." The term "identifiers" is NSA jargon for information relating
to an individual, such as telephone number, email address, IP address and
username as well as their name. The document which is undated, though
metadata suggests this version was last updated in June 2012 does not say
whether the oversight process it mentions has been established or whether any
searches against US person names have taken place. Ron Wyden Senator Ron
Wyden. Photograph: Jacquelyn Martin/AP Wyden, an Oregon Democrat on the
Senate intelligence committee, has obliquely warned for months that the NSA's
retention of Americans' communications incidentally collected and its ability to
search through it has been far more extensive than intelligence officials
have stated publicly. Speaking this week, Wyden told the Guardian it amounts
to a "backdoor search" through Americans' communications data..
hours or days, the mightiest military in the world would be left scrambling to
maintain base functions, he said. We contacted the Pentagon and officials
confirmed the threat of a cyber attack is something very real . Top
national security officialsincluding the Chairman of the Joint Chiefs, the Director of the National Security
Agency, the Secretary of Defense, and the CIA Director have said, preventing a cyber attack and
improving the nations electric grids is among the most urgent priorities of our country (source: Congressional
Record). So how serious is the Pentagon taking all this? Enough to start, or end a war over it, for sure. A cyber attack
today against the US could very well be seen as an Act of War and could be
met with a full scale US military response. That could include the use of
nuclear weapons, if authorized by the President.
Michael, "U.S. Not Ready for Cyberwar Hostile Hackers Could Launch", Feb 21 2013,
www.thedailybeast.com/articles/2013/02/21/u-s-not-ready-for-cyber-war-hostilehackers-could-launch.html
If the nightmare scenario becomes suddenly real ... If hackers shut down much of the
electrical grid and the rest of the critical infrastructure goes with it ... If we are plunged into
chaos and suffer more physical destruction than 50 monster hurricanes and economic damage that dwarfs the
would seek not simply to shut down systems, but wreck them , using
software to destroy hardware. Some believe we could then be sent into
chaos not just for days of even weeks, but for months . The mother of all
nightmare scenarios would see electric, oil, gas, water, chemical, and
transit, our entire essential infrastructure , knocked out as we sought to
replace equipment that can take more than a year to manufacture
and is in
many cases no longer made in the U.S. Lights would stay out. Gas stations would be unable to pump and would
have nothing to pump anyway. There would be no heat, no fuel, in many places no running water, no sewage
treatment, no garbage, no traffic lights, no air-traffic control, minimal communication, and of course, no Wi-Fi.
Neighborhoods around chemical plants could become Bhopals.
The problem is entirely fixable and NERC and the US government are
leaving the American people and its infrastructure totally unprotected
from a total meltdown of nuclear power plants as a result of a prolonged
power failure. Critical Analyses According to Judy Haar, a recognized expert in
nuclear plant failure analyses, when a nuclear power plant loses access to
off-grid electricity, the event is referred to as a station blackout. Haar states
that all 104 US nuclear power plants are built to withstand electrical outages without experiencing any core
damage, through the activation of an automatic start up of emergency generators powered by diesel. Further,
Verde Nuclear power plant. My source informed me that as per NERC policy, nuclear power plants are required to
have enough diesel fuel to run for a period of seven days. Some plants have thirty days of diesel. This is the good
news, but it is all downhill from here. The Unresolved Power Blackout Problem
A long-term loss of
that there is no long term solution to a power blackout and that all bets are off if the blackout is due to an EMP
Landry who worked for Raytheon in various Department of Defense projects for 28 years, many of them in this
arena and Roger also confirmed this information and that the above information is well known in the industry. When
I examine Congressman Franks letter to NERC and I read between the lines, it is clear that Franks knows of this risk
as well, he just stops short of specifically mentioning it in his letter. Placing Odds On a Failure Is a Fools Errand An
for 39 of
the 104 nuclear reactors, the risk of core damage from a blackout was
greater than 1 in 100,000. At 45 other plants the risk is greater than 1 in 1 million, the threshold NRC
analysis of individual plant risks released in 2003 by the Nuclear Regulatory Commission shows that
is using to determine which severe accidents should be evaluated in its latest analysis. According to the Nuclear
Regulatory Commission, the Beaver Valley Power Station, Unit 1, in Pennsylvania has the greatest risk of
the event of an EMP attack, can tanker trucks with diesel fuel get to all of the nuclear power plants in the US in time
to re-fuel them before they stop running? Will tanker trucks even be running themselves in the aftermath of an EMP
attack? And in the event of an EMP attack, it is not likely that any plant which runs low on fuel, or has a generator
malfunctions, will ever get any help to mitigate the crisis prior to a plethora of meltdowns occurring. Thus, every
nuclear power plant in the country has the potential to cause a Chernobyl or Fukushima type accident if our country
coming . Adding fuel to the fire lies in the fact that the power
transformers presently take at least one year to replace. Today, there is a
three year backlog on ordering because so many have been ordered by China. This makes one
wonder what the Chinese are preparing for with these multiple orders for both transformers and generators. In
short, our unpreparedness is a prescription for disaster . As a byproduct of my
investigation, I have discovered that most, if not all, of the nuclear power plants are on known earthquake fault
lines. All of Californias nuclear power plants are located on an earthquake fault line. Can anyone tell me why would
anyone in their right mind build a nuclear power plant on a fault line? To see the depth of this threat you can visit an
have a mass power grid take down, but it is a matter of when . I would
echo her concerns and apply the not if, but when admonition to the
possibility of a mass meltdown in this country . It is only a matter of time
until this scenario for disaster comes to fruition . Our collective negligence
and high level of extreme depraved indifference on the part of NERC is
criminal because this is indeed an Extinction Level Event . At the end of the day, can
anyone tell me why would any country be so negligent as to not provide its nuclear plants a fool proof method to
cool the secondary processes of its nuclear materials at all of its plants? Why would ANY nuclear power plant be
built on an earthquake fault line? Why are we even using nuclear energy under these circumstances? And why are
we allowing the Chinese to park right next door to so many nuclear power plants?
The study
examines the total costs organizations incur when responding to cyber crime
incidents. These include the costs to detect, recover, investigate and manage the
incident response. Also covered are the costs that result in after-the-fact activities and efforts to contain additional costs
from business disruption and the loss of customers. These costs do not include the plethora of
expenditures and investments made to sustain an organizations security
posture or compliance with standards, policies and regulations . Global at a glance This
years annual study was conducted in the United States, United Kingdom, Germany, Australia, Japan, France and for the first time,
the Russian Federation, with a total benchmark sample of 257 organizations. Country-specific results are presented in seven
separate reports. Figure 1 presents the estimated average cost of cyber crime for seven country samples involving 257 separate
companies, with comparison to last years country averages. Cost figures are converted into U.S. dollars for comparative purposes.
is also interesting to note that all six countries experienced a net increase in the cost of cyber crime cost over the past year
ranging from 2.7 percent for Japan to 22.7 percent for the United Kingdom. The percentage net change between FY 2014 and FY
2013 (excluding Russia) is 10.4 percent. Summary of global findings Following are the most salient findings for a sample of 257
organizations requiring 2,081 separate interviews to gather cyber crime cost results. In several places in this report, we compare the
with a range from $0.5 million to $61 million per company each year. Last years mean cost for 235 benchmarked organizations was
We observe a 10.4 percent net change from last year (excluding the Russian sample).
Cyber crime cost varies by organizational size . Results reveal a positive relationship between
organizational size (as measured by enterprise seats) and annualized cost.3 However, based on enterprise seats,
we determined that small organizations incur a significantly higher per capita cost
than larger organizations ($1,601 versus $437). All industries fall victim to cybercrime,
but to different degrees. The average annualized cost of cyber crime appears to vary by
industry segment, where organizations in energy & utilities and financial services
experience substantially higher cyber crime costs than organizations in media, life
sciences and healthcare. The most costly cyber crimes are those caused by malicious insiders, denial of services and
$7.2 million.
web-based attacks. These account for more than 55 percent of all cyber crime costs per organization on an annual basis. Mitigation
of such attacks requires enabling technologies such as SIEM, intrusion prevention systems, applications security testing solutions
and enterprise GRC solutions. Cyber attacks can get costly if not resolved quickly . Results show a
positive relationship between the time to contain an attack and organizational cost. Please note that resolution does not necessarily
the highest budget allocation. In contrast, the host layer receives the lowest funding level.
The years before 1914 saw the formation of trade blocs separated by high tariff
barriers. Back then, the world was dominated by several roughly equivalent powers, albeit with different strengths
and weaknesses. Today, the world is similarly multi-polar. The United States is in a position of clear leadership, but
China is coming up fast. Europe is weaker than it was, but is still a force to be reckoned with. Japan, Russia, Brazil,
India are also too powerful to ignore. A hundred years ago, big international infrastructure projects such as the
Berlin-Baghdad Railway, and before it the Suez Canal, were built to protect favored trading. Todays equivalent may
be the bilateral mining partnerships forged between, for instance, China and mineral-rich African states. Today, the
World Trade Organization offers some defence against tariffs. But protectionism could be become entrenched if
prolonged economic stagnation leads countries to pursue their own narrow interests. Germany, Austria, Russia and
France lost between 20 and 35 percent of national output between 1913 and 1918, according to Angus Maddisons
data used in Stephen Broadberrys The Economics of World War One: A Comparative Analysis. British GDP
declined in 1914 and 1915, but grew 15 percent over the four years, as did the U.S. economy. The 37 million
cataclysm might be something quite surprising. A global run on bank and other investment assets or an outbreak of
hyperinflation, maybe? These threats get more serious the more policymakers pump up equity, bond, property and
banking bubbles.
cordial
the alleged monitoring of her personal cellphone. Chinese and other officials charged America with blatant
hypocrisy. The fallout affected the private sector as well; where previously the focus of many observers had been on
difficult for the U.S. government to press for better corporate practices and for companies to resist overly broad
surveillance mandates.
THE END OF THE WORLD AS WE KNOW IT If they succeed, it very well may lead to the end of
the world as we know it. There will be no Internet. There will be many nets: ChinaNet,
Euronet, maybe Deutsche Net and France net and Brazil Net and Russia
Net. It will resemble the world before the Internet with many private
networks and a constant challenge of interconnection.
The
Internet was created to take the friction out of digital communications,
whether those borders were university boundaries or national borders. The digital borders will
begin to rise and with it the cost of doing everything will begin to grow .
all the devices I needed to use to connect to the early Internet because of a variety of technical standards.
The
As we disconnect, nationalism is
Virginia-based company that provides website hosting services, has seen a 30-percent decline in foreign sign-ups.
And a Canadian software company recently reported a clients demand that its data not be routed through the U.S.
The steady stream of leaks about the NSAs data collection capabilities
has damaged the reputation of the$150 billion U.S. cloud computing
industry. According to the Information Technology & Innovation Foundation (ITIF), the industry could
lose as much as 20 percent of its revenue to foreign companies that
capitalize on the fear that personal information will be caught in a U.S.
dragnet if their data is stored on U.S. servers . In China, companies such as
Neusoft and ChinaSoft are seeing increased sales of their products and
improving share prices. Norwegian email service Runbox reported a 34-percent annual increase in
customers. Wuala, a Swiss cloud provider, says it has more than doubled its
growth as Switzerland touts the benefits of the countrys political
neutrality and privacy laws for its data storage companies. Further
complicating matters is the possible extraterritorial application of U.S. law
to citizens of foreign countries. In July, a New York judge ruled that U.S. search warrants can reach
the digital information of foreign persons stored overseas. If upheld, this ruling will magnify the distrust of U.S.
This poses
potential danger to American tech companies that want to provide secure
cloud storage to both domestic and foreign clients. Hopefully, the U.S. government will
change its position and stop the madness of hurting U.S. tech firms competitiveness. U.S. tech
companies ability to compete depends on meeting the security and
privacy concerns of their customers. Thats why a coalition of companies
like Microsoft, Yahoo and Google is calling for reasonable reforms of American
intelligence programs to promote greater transparency (and, in turn,
cloud providers because data anywhere could be accessible to American law enforcement.
greater trust) around the globe. Our nations tech leaders support efforts such as Sen.
Patrick Leahys (D-Vt.) USA FREEDOM Act and bipartisan efforts to reform the Electronic Communications Privacy
Act of 1986, which would ban bulk collection of Americans phone records and
Internet data and eliminate arbitrary rules dictating when law
enforcement agencies can access stored communications. Legislation
bringing narrowly-tailored rules and greater transparency to government
intelligence activities and the scope of law enforcements reach will
assure American and foreign consumers their information is safe with U.S.
companies. This will begin to repair the damage done to our tech industry .
As the E.U.s Kroes remarked about living in what she called an age of total information, Potential doesnt count for
much in an atmosphere of distrust. European cloud users and American cloud providers and policy makers need to
Scenario 1Censorship
China is using the Snowden leaks as momentum to push for
internet sovereigntya policy that would allow repressive
regimes to sensor digital contentthe US must rally a coalition
of pro-internet-freedom countries to prevent fragmentation
Chang, Research Associate @ the Center for a New American
Security, 14
Amy, "How the 'Internet with Chinese Characteristics' Is Rupturing the Web", Dec 15
2014, The World Post, www.huffingtonpost.com/amy-chang-/china-internetsovereignty_b_6325192.html
China is openly undermining the United States' vision of a free and open
Internet . Motivated by maintaining the fragile balance between information control, social and political
stability, and continued modernization and economic growth for an online population of over 600 million, the
Chinese government is attempting to alter how nations understand their role in Internet governance
through
administrative
control of the Internet fits neatly in China's broader cybersecurity
strategy: to maintain the Chinese Communist Party rule over China.
multilateral meetings, and United Nations meetings. As I argue in my recent report,
China
has also employed an engagement strategy of candor and trust to promote its message, though it often backfires.
This November, China hosted its first World Internet Conference in Wuzhen, the theme of which was "An
Interconnected World Shared and Governed by All." The conference hosted a number of business executives and
government officials from China and abroad to, according to President Xi Jinping's welcome letter, "contribute
creative ideas, pool wisdom and build consensus, to ensure that the Internet will bring even greater benefit to
mankind." By name, the conference's theme aligns with Western conceptions of Internet governance, but China's
underlying motivation for holding the conference was quite different. On the last night before the end of the
conference, organizers distributed a draft Wuzhen Declaration that was to be released at the closing ceremony
several hours later the next morning, giving attendees few hours to object to the content or submit revisions. The
declaration provided nine recommendations for Internet governance, including one to "respect Internet sovereignty
of all countries. We should respect each country's rights to the development, use and governance of the Internet,
refrain from abusing resources and technological strengths to violate other countries' Internet sovereignty." As soon
as news broke of China's intentions with the declaration, the conference organizers omitted any mention of it during
the closing ceremony. Yet, Internet sovereignty is only one aspect of China's cybersecurity strategy, and its
realization may impede or contradict with other priorities, such as economic growth or expanding Internet access to
citizens. In light of these competing objectives, it will be difficult for China to sustain this model of "Internet with
Chinese characteristics." EXPAND OR CONTROL? Expanding Internet access will increase the number of citizens
whose Internet activity China will have to monitor or control, potentially straining the central government's
resources. Further, limiting information access and could negatively impact Chinese domestic company aspirations
enter to international markets or limit information that would assist economic growth. Lastly, a tightly regulated
Internet has deterred some companies -- such as Google, which left China in 2010 over Internet censorship
pursue this counter narrative and will continue to attempt to convince the
international community to conform to the concept of Internet
sovereignty. Despite this undertaking , both domestic and international
audiences have noted China's limitations and obstacles, and the
countervailing voices promoting Internet freedom are equally potent.
culture magazine-21.09 open vs. closed politics FOLLOW WIRED Twitter Facebook
RSS
Censorship Doesnt Just Stifle Speech It Can Spread Disease
The wall of silence around what came to be known as SARS (severe acute
respiratory syndrome) cracked only by chance . An anonymous man in a chat room,
describing himself as a teacher in Guangdong Province, made the acquaintance of a teacher in
California. On February 9, 2003, he asked her if she had heard of the illness ravaging his city. She forwarded
his message to an epidemiologist she knew, and on February 10 he posted it to ProMED, a listserv that disease
experts use as an informal surveillance system.
By mid-March there were already 150 cases of the new disease in seven countries.
SARS wound up sickening more than 8,000 people and killing almost 800 in just nine months.
Luckily, the
disease was quelled in China and Canada (where travelers from Hong Kong touched off an
outbreak in Toronto) before it had a chance to evolve into a more efficiently
spreading strain . Many experts believe that given time to mutate in
humans, SARS might have become a deadly pandemic. EVEN IN THE
INTERNET AGE ONE RESTRICTIVE GOVERNMENT CAN PUT THE WORLD
AT RISK. With more warning, SARS might not even have gained a foothold
outside of China. In Canada the virus quickly infected 251 people, killing 43. By contrast, the US had time
to write new quarantine regulations, which made a difference: America had just 27 SARS cases, with no deaths and
no hospital spread. To health authorities who lived through SARS, MERS feels unnervingly familiar. The two
organisms are cousins: Both are coronaviruses, named for their crown-shaped profile visible with an electron
microscope. For this disease too, the first notice was a posting to ProMEDthis time by a doctor working in Jeddah,
Saudi Arabia, describing a patient who had died several months before. That September 2012 communiqu, which
cost the doctor his job, helped physicians in London realize that a Qatari man they were treating was part of the
same outbreak. From there, MERS unspooled. People also fell ill in the United Arab Emirates, France, Germany, Italy,
and Tunisia. But Saudi Arabia, home to the vast majority of confirmed cases, remained far from forthcoming about
what it knew. Announcements from the Ministry of Health supplied little useful detail and discussed illnesses and
deaths that happened some indeterminate time in the pastpossibly days, possibly even weeks. So far the number
of MERS cases is just a fraction of the toll from SARS, but health officials fear that the real count could be higher.
Especially worrisome is the death rate among the afflicted: While SARS has been estimated to kill roughly 10
percent of its victims, MERS so far has killed 56 percent. No One Thought It Would Happen Again Certainly
censorship about the spread of disease is nothing new. The largest well-documented pandemic, the great flu of
1918, is called the Spanish Influenza in old accounts not because it started in Spain (it may have begun in Kansas)
but because Spain, as a neutral nation during World War I, had no wartime curbs on news reports of deaths. To this
day, no one is sure how many people died in the 1918 flu; the best guess hovers around 50 million worldwide.
Regardless, since the virus took 11 months to circle the planet, some of those millions might have lived had the
later-infected countries been warned to prepare. After SARS, no one thought that it would happen again. In 2005
the 194 nations that vote in WHOs governing body promised not to conceal outbreaks. And beyond that promise,
public-health researchers have believed that Internet chatterpatterns of online discussion about diseasewould
undercut any attempts at secrecy. But theyve been disappointed to see that their web-scraping tools have picked
up remarkably little from the Middle East: While Saudi residents certainly use the Internet, what they can access is
stifled, and what they are willing to say appears muted.
it turns out that old-fashioned censorship can still stymie the world in its
ability to prepare for a pandemic.
effect. A WHO team was finally allowed into Saudi Arabia in June, and the Saudi government has announced limits
on the number of visas it will issue for this years hajj. Meanwhile, governments and transnational health agencies
have already taken the steps that they can, warning hospitals and readying labs. With luck, the disease will stay
contained: In July, WHO declined to elevate MERS to a public health emergency of international concern. But the
organization warned it might change its mind laterand if it does, we should fear the worst, because our medical
resources are few. At present there is no rapid-detection method, no vaccine, and no cure. While we wait to see the
full extent of MERS, the one thing the world can do is to relearn the lesson of SARS: Just as diseases will always
cross borders, governments will always try to evade blame. That problem cant be solved with better devices or
through a more sophisticated public-health dragnet. The solution lies in something public health has failed to
accomplish despite centuries of trying: persuading governments that transparency needs to trump concerns about
York City, which has one of the largest Chinese immigrant groups in the United States, also has the highest rate of
tuberculosis in this nation. According to the Department of Health, the percentage of new tuberculosis cases among
foreign-born New Yorkers rose from 18 percent in 1992 to 64 percent in 2001.228 Since February 2003, a form of
atypical pneumonia called SARS (Severe Acute Respiratory Syndrome) has spread at the speed of a jet to Southeast
Asia, Europe, and North America, prompting WHO to declare the ailment a worldwide health threat. According to
WHO, as of 29 March 29 2003, a cumulative total of 1550 cases and 54 deaths have been reported from 13
countries. Most scientists believe that the new disease first emerged in Guangdong of Southern China, where the
As
immigrants from China and other developing countries are perceived as
creating further demands on the public health system and other public
services, the issue of minorities and immigration could become a sensitive
domestic political issue. The 2002 presidential election in France highlights the danger of such an
issue being exploited by political extremists to challenge a countrys political system. While the potential
dangers in this scenario should not be exaggerated, the U.S. commitment
to antiterrorist wars could create an anti-immigrant public mood, which
might be exploited by the politically ambitious to fan xenophobia and
racism and influence election outcomes. Moreover, the increased burden of
disease diminishes the governments capacity to address broader political
and social demands. Inability to meet these demands can then produce
massive population movements, which not only facilitate the spread of
diseases, but also lead to heightened regional-wide tensions and
cumulative SARS cases from 16 November 2002 to 31 March 2003 stand at 1153 cases and 40 deaths.
Among the developing countries, China has been the largest recipient of foreign investment, averaging about $40
billion per year during the late 1990s. As foreign companies are shifting manufacturing to China, the country is
becoming a workshop for the world. As demonstrated in the 1998 Asian financial crisis,
Chinas robust
economy can be the anchor of global economic stability . China also has
the potential to replace Japan as the engine of economic growth in Asia. The
rising market demand in China has been the main factor behind the recent increase of exports in Taiwan, South
Korea, and Singapore. Only one quarter of the size of Japanese economy, China is now the market to $40 billion
worth of Asian export goods, which is half of the size of the Japanese market.233 A world economy that is so
dependent on China as an industrial lifeline can become increasingly vulnerable to a major supply disruption caused
by war, terrorism, social unrest, or a natural disaster.234 Last but not least,
partner of the United States, while the United States is the second largest in trading, the largest exporting market,
and the biggest investor for China. With economic interdependence that high, any major upheaval in China is likely
addition, China is listed by the U.S. government as one of the countries of greatest concern regarding biological
weapons (BW) proliferation. 238 This led former U.S. President Bill Clinton to conclude: The weakness of great
nations can pose as big a challenge to America as their strengths.239 While the rise of China as a belligerent
superpower is not in the interest of the international community, the collapse of China into a messy state or
failed state can be equally dangerous, given the sheer size and the strategic importance of this country.240 In
growing health problems in China will not only harm the economic,
social, political, and military structure in China, but will also undermine
short,
still
the
created a
Foreign companies
are clearly poised to benefit from growing fears about the security
ramifications of keeping data in the United States. In a survey of 300
British and Canadian businesses released by PEER 1 in January 2014,36 25
percent of respondents indicated that they were moving data outside of
a liability, especially in Europe.45 In a follow up to the ITIF study, Forrester Research analyst
James Staten argued that the think tanks estimates were low, suggesting
that the actual figure could be as high as $180 billion over three years .46
Staten highlighted two additional impacts not considered in the ITIF study .
The first is that U.S. customers not just foreign companies would also avoid US cloud
providers , especially for international and overseas business. The ITIF study
predicted that American companies would retain their domestic market share, but Staten argued that the economic
impact on how companies around the world think about ICT and cloud
computing in particular .51 According to the data from NTT Communications, 88 percent of
decision-makers are changing their purchasing behavior when it comes to
the cloud, with the vast majority indicating that the location of the data is
very important. The results do not bode well for recruitment of new
customers, either62 percent of those currently not storing data in the
cloud indicated that the revelations have since prevented them from
moving their ICT systems there. And finally, 82 percent suggested that
they agree with proposals made by German Chancellor Angela Merkel in February
2014 to have separate data networks for Europe, which will be discussed in further detail in
Part III of this report. Providing direct evidence of this trend, Servint, a Virginiabased webhosting company, reported in June 2014 that international
clients have declined by as much as half, dropping from approximately 60
percent of its business to 30 percent since the leaks began.52 With faith in
U.S. companies on the decline, foreign companies are stepping in to take
advantage of shifting public perceptions . As Georg Mascolo and Ben Scott predicted in a
joint paper published by the Wilson Center and the New America Foundation in October 2013, Major commercial
actors on both continents are preparing offensive and defensive strategies to battle in the market for a competitive
both individual and commercial customers, promising that it will never disclose any user data unauthorized, track
in Norway as a competitive advantage. Being firmly located in Norway, the Runbox email
service is governed by strict privacy regulations and is a safe alternative to American email services as well as
cloud-based services that move data across borders and jurisdictions, company representatives wrote on its blog
in early 2014.56 F-Secure, a Finnish cloud storage company, similarly emphasizes the fact that its roots [are] in
Finland, where privacy is a fiercely guarded value.57
companies and analysts say, is economic .59 In the past year, a number of
American companies have reported declining sales in overseas markets
like China
disclosures),
(where, it must be noted, suspicion of the American government was already high before the NSA
of a new focus on encouraging users and companies to harden their systems against NSA surveillance, and the strategy appears to be working. Almost immediately, Comcast announced
its plans to work with Google to encrypt all email traffic exchanged with Gmail after the cable company was described as one of the worst offenders in the new report.91
Meanwhile, Microsoft has been publicizing its policy that allows customers to store their data in Microsoft data centers in specific countries.92 John E. Frank, deputy general counsel at
Microsoft, told The New York Times, Were hearing from customers, especially global enterprise customers, that they care more than ever about where their content is stored and how it
is used and secured.93 IBM is reportedly spending over a billion dollars to build overseas data centers in an effort to reassure foreign customers that their data is protected from U.S.
surveillance.94 In reference to foreign customers asking about whether their data is protected from government snooping, an IBM executive said, My response is protect your data
against any third party whether its the NSA, other governments, hackers, terrorists, whatever, adding that it is time to start talking about encryption and VPNs and all the ways you
can protect yourself.95
Finally, faced with an impossible choice between maintaining user trust and complying with government requests, a handful of American companies that provide secure email services
have had to shut down their operations altogether. Lavabit, a secure email service provider that experienced a 1,900 percent increase in account registrations after the Snowden
revelations, shuttered its business after it became clear that user data could not be protected from government surveillance. When the NSA could not read Lavibits communications
directly by breaking its encryption, the agency obtained orders compelling the company to hand over information related to its encryption keys, which would have given the NSA the
ability to decrypt the communications of all 400,000 of Lavabits customers.96 Silent Circle, a secure communications provider that saw a 400 percent revenue increase following the
Snowden revelations, followed Lavabits lead and shut down its secure mail service, explaining that the decision was made because we see the writing on the wall.97
Counsel Brad Smith at a recent conference. In June of 2014, it is clear it is getting worse, not better.98
Keynes, writing after WWI, warned in his seminal tract The Economic Consequences of the Peace that Germanys economic
humiliation could have a radicalizing effect on the nations political culture (Keynes 1919). Given later events, his warning seems
prescient. In the years since the Second World War, however, the European continent has not relapsed into armed conflict. What was
different after the second global conflagration? Crucially, the United States was in a far more powerful position than Britain was after
WWI. As the tables above show, Britains economic strength after the First World War was about 13% of the total in strength in the
international system. In contrast, the United States possessed about 53% of relative economic power in the international system in
the years immediately following WWII. The U.S. helped rebuild Europes economic strength with billions of dollars in investment
through the Marshall Plan, assistance that was never available to the defeated powers after the First World War (Kindleberger 1973).
The interwar years were also marked by a series of debilitating trade wars that likely worsened the Great Depression (Ibid.). In
contrast, when Britain was more powerful, it was able to facilitate greater free trade, and after World War II, the United States played
a leading role in creating institutions like the GATT that had an essential role in facilitating global trade (Organski 1958). The
possibility that economic stability is an important factor in the overall security environment should not be discounted, especially
more sense to challenge a weaker hegemon than a stronger one. This simple yet powerful theory can help explain the puzzlingly
strong positive correlation between military conflicts engaged in by the hegemon and conflict overall. It is not necessarily that
military involvement by the hegemon instigates further conflict in the international system. Rather, this military involvement could
be a function of the hegemons weaker position, which is the true cause of the higher levels of conflict in the international system .
Additionally, it is important to note that military power is, in the long run,
dependent on economic strength. Thus, it is possible that as hegemons lose relative
economic power, other nations are tempted to challenge them even if their shortterm military capabilities are still strong. This would help explain some of the variation found between the economic
and military data. The results of this analysis are of clear importance beyond the realm of theory. As the debate rages over the role
of the United States in the world, hegemonic stability theory has some useful insights to bring to the table. What this research
makes clear is that a strong hegemon can exert a positive influence on stability in the international system. However, this should not
give policymakers a justification to engage in conflict or escalate military budgets purely for the sake of international stability.
If
the global
distribution of power is shifting, and the inevitable result will be a world
that is less peaceful, liberal and prosperous, burdened by a dearth of
effective conflict regulation. Over the past two decades, no other state has
had the ability to seriously challenge the US military. Under these
circumstances, motivated by both opportunity and fear, many actors have
bandwagoned with US hegemony and accepted a subordinate role. Canada, most
once seemingly indomitable chasm that separated America from anyone else is narrowing. Thus,
of Western Europe, India, Japan, South Korea, Australia, Singapore and the Philippines have all joined the US, creating a status quo
launch its first overseas war of conquest towards Spain. By the turn of the 20th century, accompanying the increase in US power
and waning of British power, the American Navy had begun to challenge the notion that Britain rules the waves. Such a notion
would eventually see the US attain the status of sole guardians of the Western Hemispheres security to become the order-creating
Leviathan shaping the international system with democracy and rule of law. Defining this US-centred system are three key
characteristics: enforcement of property rights, constraints on the actions of powerful individuals and groups and some degree of
equal opportunities for broad segments of society.
declined relative to the rise of the Japanese and Western European economies, with the US dollar also becoming less attractive. And,
A world without
American hegemony is one where great power wars re-emerge , the liberal international
system is supplanted by an authoritarian one, and trade protectionism
devolves into restrictive, anti-globalisation barriers. This, at least, is one possibility we can
as American power eroded, so did international regimes (such as the Bretton Woods System in 1973).
EXTInternal Link
AT: No Retal
Escalates to nuclear war
Fritz, Bond University IR masters, 2009
If
access to command and control centres is obtained, terrorists could fake or actually cause one
Computers which
operate on a closed network may also be compromised by various hacker methods, such as
computers which are connected to the internet are susceptible to infiltration and remote control.
privilege escalation, roaming notebooks, wireless access points, embedded exploits in software and hardware, and
maintenance entry points. For example, e-mail spoofing targeted at individuals who have access to a closed network,
could lead to the installation of a virus on an open network. This virus could then be carelessly transported on removable
data storage between the open and closed network. Information found on the internet may also reveal how to access these
closed networks directly. Efforts by militaries to place increasing reliance on computer
networks, including experimental technology such as autonomous systems, and their desire
to have multiple launch options, such as nuclear triad capability, enables multiple entry
points for terrorists. For example, if a terrestrial command centre is impenetrable, perhaps isolating one nuclear
armed submarine would prove an easier task. There is evidence to suggest multiple attempts
have been made by hackers to compromise the extremely low radio frequency once used by the US Navy to send
nuclear launch approval to submerged submarines. Additionally, the alleged Soviet system known as Perimetr was designed to
automatically launch nuclear weapons if it was unable to establish communications with Soviet leadership. This was intended as a
retaliatory response in the event that nuclear weapons had decapitated Soviet leadership; however it did not account for the
possibility of cyber terrorists blocking communications through computer network operations in an attempt to engage the system.
Should a warhead be launched, damage could be further enhanced through additional computer network operations. By using
proxies, multi-layered attacks could be engineered. Terrorists could remotely commandeer computers in China and use them to
launch a US nuclear attack against Russia. Thus Russia would believe it was under attack from the US and the US would believe
China was responsible. Further, emergency response communications could be disrupted, transportation could be shut down, and
disinformation, such as misdirection, could be planted, thereby hindering the disaster relief effort and maximizing destruction.
military response. These false claims could be posted directly on Presidential, military, and government websites. Emails could also be sent to the media and foreign governments using the IP addresses and e-mail accounts of government officials .
A sophisticated and all encompassing combination of traditional terrorism and cyber terrorism could
be enough to launch nuclear weapons on its own, without the need for
compromising command and control centres directly.
Impact Extension
Its on par with nuclear war existential threat
DSB 12
Defense Science Board, a Federal Advisory Committee established to provide
independent advice to the Secretary of Defense, TASK FORCE REPORT:
Resilient Military Systems and the Advanced Cyber Threat, October 10, 2012.
http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf
The benefits to an attacker using cyber exploits are potentially spectacular .
Should the United States find itself in a full-scale conflict with a peer adversary, attacks would be expected to
include denial of service, data corruption, supply chain corruption, traitorous
insiders, kinetic and related non-kinetic attacks at all altitudes from underwater to space.
U.S. guns, missiles, and bombs may not fire, or may be directed against
our own troops. Resupply, including food, water, ammunition, and fuel may not arrive
when or where needed . Military Commanders may rapidly lose trust in the
information and ability to control U.S. systems and forces. Once lost, that
trust is very difficult to regain.
The impact of a destructive cyber attack on the civilian population would
be even greater with no electricity, money, communications, TV, radio, or
fuel (electrically pumped). In a short time, food and medicine distribution systems would
be ineffective; transportation would fail or become so chaotic as to be useless. Law enforcement,
medical staff, and emergency personnel capabilities could be expected to
be barely functional in the short term and dysfunctional over sustained periods. If the attacks effects
were reversible, damage could be limited to an impact equivalent to a power outage lasting a few days. If an
attacks effects cause physical damage to control systems, pumps, engines, generators,
controllers, etc., the unavailability of parts and manufacturing capacity could
mean months to years are required to rebuild and reestablish basic
infrastructure operation.
The DoD should expect cyber attacks to be part of all conflicts in the future, and should not expect competitors to
play by our version of the rules, but instead apply their rules (e.g. using surrogates for exploitation and offense
operations, sharing IP with local industries for economic gain, etc.).
Based upon the societal dependence on these systems, and the interdependence of
the various services and capabilities, the Task Force believes that the integrated impact
of a cyber attack has the potential of existential consequence. While the
manifestation of a nuclear and cyber attack are very different, in the end,
the existential impact
is the same.
AT: Deterrence
Cyber-attacks hollow out US deterrence capabilities,
encourages aggression and risks nuclear first use
Colby 13
Thus, while the Task Force wisely advocated for having more discriminate cyber and other non-nuclear
options to provide steps on the escalatory ladder, it rightly argued that at the top of that ladder resides the U.S.
nuclear deterrentthe ultimate reminder that, even if a major cyber attack could emasculate our conventional
forces, our resilient nuclear forces would still pose a devastating threat that would make such an assault patently
foolhardy. (The Task Force also rightly advocated ensuring the absolute effectiveness of our nuclear forces even
under highly sophisticated cyber assault.) Now these kinds of scenarios might seem fantastically remoteand
worst cases can happen , and what else are our most powerful
More likely, however, is the danger that
adversaries would derive coercive leverage if both we and they know that
military forces for, if not for warding off the worst cases?
they have the upper hand on the escalatory ladder. Advantages at the top
of the escalatory ladder can cast a dark shadow. For instance, during the 1950s, the United
States used its huge advantages at the level of nuclear warfare to try to coerce Maoist China, with at least some
success. So, if China or Russia knows that we would never consider using nuclear weapons in response to even a
massive cyber attack, then that gives them a strong incentive to try to exploit that advantageeven implicitlyby
using cyber as a way to deter and even coerce the United States and our allies. Low-level versions of this problem
are apparent today. But what if the United States and China squared off over one of the territorial maritime disputes
in the Western Pacific or South China Sea? Or if the United States and Russia faced off over instability in a NATO
Baltic state?
The U nited S tates does not want to find itself in a situation in which
AT: No Capability
Cyberwarfare threat is realsmaller states/non-state entities
spilloverserious intrusions are occurringcyber>traditional
weps
Brecht, former Information Technician in the military, 15
Daniel, holds a graduate Certificate in Information Assurance and a Master of
Science in Information Technology, "Cyber Warfare and Cyber Weapons, a Real and
Growing Threat", Jan 15 2015, Infosec Institute,
resources.infosecinstitute.com/cyber-warfare-cyber-weapons-real-growing-threat/
Is a Cyber World War a Concern? A 2013 report by Director of National Intelligence James R. Clapper explained that
Turkey was cyber attacked and exploded in 2008. The pipeline was super-pressurized and alarms were shut off. By
hacking security cameras, attackers (allegedly Russian) were able to hide the blast from the control room that,
unaware, was unable to respond promptly. Another attack to a German steel company demonstrated how, by simply
infiltrating the information systems running the plant, hackers could cause major damage. Although not a single
Internet successful attack has been recognized as directed by a foreign terror organization against the United
Amy Chang, research associate at the Center for a New American Security,
Cyber warfare is a great alternative to conventional weapons. [] It is
cheaper for and far more accessible to these small nation-states. It allows
these countries to pull off attacks without as much risk of getting caught
and without the repercussions when they are.
Law and Policy, Enabling or Disabling? 15 March 2012, Civilian Research Project;
U.S. Army War College)
As Al-Qaida and its affiliates and adherents have evolved into much more
technically savvy terrorist organizations, their ability to threaten to U. S.
National Security has likewise increased. The divergence between American
national strategies, laws, and policies that govern counterterrorism (CT) operations
within cyberspace has hampered the efforts of U. S. CT professionals to keep
pace with the transformation of transnational terrorist organizations into more
cyber-enabled threats.
Counterterrorism is defined as, Actions taken directly against terrorist networks and indirectly to influence and
necessarily
In 2010 General David Petraeus, then Commander of United States Central Command (USCENTCOM) accurately described the
degree to which al-Qaida was operating with impunity in cyberspace to finance, command, and recruit its forces.3 The tactical and
operational commanders subordinate to General Petraeus in Iraq and Afghanistan often lamented that they were permitted to drop
two-thousand pound bombs on terrorists homes, but were forced to request from USCENTCOM Headquarters, or even the Secretary
of Defense, the approval to attack or manipulate terrorists computer networks.4 This dichotomous situation flies in the face of logic
and is caused by a trifurcated divergence between: what is expected of military CT professionals in order kill or capture terrorists;
what is permissible under current CT cyber law; and the current policies that actually govern offensive CT operations in cyberspace.
This work will analyze the current threat posed by international terrorist organizations from within cyberspace, as well as the
inconsistencies between current national security, CT and cyber strategies, and the laws, and policies that permit CT professionals
to disrupt and degrade international terrorist organizations through the use of the internet. The results of this analysis reveal that
current cyber-related counterterrorism policies constrain military CT professionals, and that before CT cyber strategies can be
effectively implemented, they must be in holistic alignment with cyber policies and existing statutes. Furthermore, this work proffers
several recommendations concerning adjustments to current CT cyber policies that are intended to better enable more efficient CT
operations, and ultimately prevent future attacks on America and its interests.
The Nature of the Cyber-terror Threat
other being the Russian nuclear threat.7 Additionally, the intelligence community (IC) writ large considers cyber
attacks as the most prominent, long-term threat to the country.8 Deputy Secretary of Defense William J. Lynn III
similarly suggests that terrorists are seeking to effectively weaponize cyberspace in order to achieve kinetic effects
against key U. S. infrastructure.9
these potential threats may seem far-fetched to some, but so did the
concept of crashing jet airliners into the World Trade Center and the
Pentagon prior to September 11th, 2001. These and other cyber-enabled terror plots are
unfortunately far from fiction , as their perpetrators were caught in the acts of
planning or executing them. The cyber terror threats which emanate from the various international
Today
terrorist organizations around the globe are of a seminal concern to U. S. national decision-makers. Though
significant, the task of countering these terrorists threats within cyberspace is anything but insurmountable,
provided that those who are charged with exposing and attacking these networks are given the latitude to act
effectively. The concerns of national leaders and their desires to exploit terrorist organizations in cyberspace are
clearly evident in the content of numerous past, and current national security strategy documents.
AT: No Blackout
Attacks collapse the gridcritical infrastructure is vulnerable
Savenjie 14
Davide and Ethan Howland, senior editors at Industry Dive, "Could terrorists really
black out the power grid?", Utility Dive, March 24 2014,
www.utilitydive.com/news/could-terrorists-really-black-out-the-power-grid/241192/
The possibility of a terrorist attack knocking out the power grid makes for
a good headline, but could it really happen? The U.S. Federal Energy
Regulatory Commission (FERC) says yes. If terrorists are ever able to
knock out nine of the nation's 55,000 substations, the U.S. power grid
could suffer coast-to-coast blackouts lasting 18 months or more, according
to leaked excerpts from a FERC report. There are 30 substations in the U.S. that play a critical
role in the nation's grid operations, the report said. If any nine of them were taken offline, there could be
widespread blackouts for weeks or far longer. Just because a crippling grid attack is possible, doesn't mean it's
terrorist attacks on the power grid don't just make for good
headlines they're already happening. Is the grid vulnerable to terrorist attacks? It's no
going to happen. But
surprise to see headlines warning that the grid is susceptible to attack. But why all the concern now? Well, it doesn't
a Pacific Gas & Electric substation that feeds Silicon Valley was shot
by snipers last year. And it's not the only such incident. A man tried to
take down the power grid in central Arkansas by bringing down several
power lines (with a stolen tractor and a passing train) and setting a substation on fire,
causing $2 million worth of damage. These attacks show the grid is
vulnerable to terrorism, a finding confirmed by a previously classified
report sponsored by the U.S. Department of Homeland Security. Leaked
portions of the FERC report paint a dark picture. "Destroy nine
interconnection substations and a transformer manufacturer and the
entire United States grid would be down for at least 18 months, probably
longer," a summary of the report reads. Perhaps most disturbingly, the California
substation attack, in which snipers destroyed 17 transformers,
"demonstrates that it does not require sophistication to do significant
damage to the U.S. grid," according to FERC. And it's not just physical
attacks. Despite the recent focus on physical security, some say
cyberattacks present an even greater threat to the grid. A "sophisticated,
targeted cyberattack" could knock out large portions of the U.S. power
grid for 9 to 18 months, cybersecurity consultant Joe Weiss told Utility
Dive. Such an attack would be "irrecoverable," he said. More than a
decade after 9/11, experts believe the U.S. has failed to adequately
safeguard critical infrastructure, including grid operations, from
cyberattacks. "We've been led down the path to believe that: one, these systems are secure; and two, other
help that
countries don't have the capability to effectively attack the U.S. electric grid," Weiss said. "Both of those
hundreds of miles, and many key facilities are unguarded, the report prepared for Homeland Security found.
"Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple
components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or
interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a
Cascade effect
Plumer 14
Brad, senior editor at Vox.com, where he oversees the site's science, energy, and
environmental coverage, "It's way too easy to cause a massive blackout in the US",
April 14 2014, Vox, www.vox.com/2014/4/14/5604992/us-power-grid-vulnerability
Back in 2012, the National Research Council worried that a well-coordinated
attack on the grid "could deny large regions of the country access to bulk
system power for weeks or even months. If such large extended outages were to occur
during times of extreme weather, they could also result in hundreds or even thousands of deaths due to heat stress
or extended exposure to extreme cold." How would that work? It's worth walking through the
mechanics of how a truly massive blackout like the 2003 Northeast blackout that left 50 million people without
Power
grids are, by their nature, extremely complex. It's hard to store electricity for
any extended period. That means that the output from power plants has
to be equal to the use of electricity at all times. Otherwise, power lines
can get overloaded or generators underloaded, causing damage to the
equipment. Usually, the grid has protective devices that switch off a piece
of equipment if there's a problem. So if, say, a sagging power line hits a tree causing it to
overheat that line will get disconnected. The problem is that all the other lines now
have to carry excess current. If they start overheating and have to switch
off, you can get cascading failures. So power grid operators have to
constantly monitor the system to make sure that power generation and
power use are matched up and that a single fault can't cause the entire
grid to fail. They're usually very good at this. But it's a difficult task and if, the grid is
already running at capacity or a major piece of equipment falters, it can
be hard to prevent "cascading failure s." The National Research Council was worried about an
power can happen. REALLY BIG BLACKOUTS ARE OFTEN CAUSED BY CASCADING FAILURES IN THE GRID
yet, as we've already established, these facilities typically have only a few hours of battery power available,
followed by perhaps a few days worth of diesel fuel to run their generators (or propane, in some cases). Did I also
mention that half the people who work at nuclear power facilities have no idea what they're doing in the first place?
Most of the veterans who really know the facilities inside and out have been forced into retirement due to reaching
lifetime limits of on-the-job radiation exposure, so most of the workers at nuclear facilities right now
There are 440 nuclear power plants
operating across 30 countries around the world today. There are an additional 250 socalled "research reactors" in existence, making a total of roughly 700 nuclear reactors to be
dealt with (http://www.world-nuclear.org/info/i...). Now imagine the scenario: You've got a
their
massive solar flare that knocks out the world power grid and destroys the majority of the power grid transformers,
thrusting the world into darkness. Cities collapse into chaos and rioting, martial law is quickly declared (but it hardly
matters), and every nation in the world is on full emergency. But that doesn't solve the really big problem, which is
you've got 700 nuclear reactors that can't feed power into the grid (because
and yet simultaneously have to be fed a steady
stream of emergency fuels to run the generators the keep the coolant
pumps functioning. How long does the coolant need to circulate in these facilities to cool the nuclear fuel?
Months. This is also the lesson of Fukushima: You can't cool nuclear fuel in mere hours or days. It takes
months to bring these nuclear facilities to a state of cold shutdown. And that means in order to avoid a
multitude of Fukushima-style meltdowns from occurring around the world,
you need to truck diesel fuel, generator parts and nuclear plant workers to
every nuclear facility on the planet, ON TIME, every time, without fail, for
months on end. Now remember, this must be done in the middle of the total
chaos breakdown of modern civilization, where there is no power, where law enforcement and
that
emergency services are totally overrun, where people are starving because food deliveries have been disrupted,
and when looting and violent crime runs rampant in the streets of every major city in the world. Somehow, despite
all this, you have to run these diesel fuel caravans to the nuclear power plants and keep the pumps running. Except
there's a problem in all this, even if you assume you can somehow work a logistical miracle and actually deliver the
Where do you
get diesel fuel? Why refineries will be shut down, too from petroleum refineries. Most people
don't realize it, but petroleum refineries run on electricity. Without the power grid,
the refineries don't produce a drop of diesel. With no diesel, there are no generators keeping the
diesel fuel to the backup generators on time (which you probably can't). The problem is this:
coolant running in the nuclear power facilities. But wait, you say: Maybe we could just acquire diesel from all the
gas stations in the world. Pump it out of the ground, load it into trucks and use that to power the generators, right?
Except there are other problems here: How do you pump all that fuel without electricity? How do you acquire all the
tires and spare parts needed to keep trucks running if there's no electricity to keep the supply businesses running?
How do you maintain a truck delivery infrastructure when the electrical infrastructure is totally wiped out? Some
countries might be able to pull it off with some degree of success .
power facilities in the world, remember? Let's suppose that in the aftermath of a massive solar flare, the nations of
the world are somehow able to control half of those facilities and nurse them into cold shutdown status. That still
leaves roughly 350 nuclear facilities at risk. Now let's suppose half of those are somehow luckily offline and not
even functioning when the solar flare hits, so they need no special attention. This is a very optimistic assumption,
but that still leaves 175 nuclear power plants where all attempts fail. Let's be outrageously optimistic
and suppose that a third of those somehow don't go into a total meltdown by some miracle of God, or some bizarre
the planet, permeates the topsoil, irradiates everything that breathes and delivers the final crushing blow to human
many people can survive an entire year with no food from the farms? Not one in a hundred people. Even beyond
that, how many people can essentially live underground and be safe enough from the radiation that they
can have viable children and repopulate the planet? It's a very, very small fraction of the total population.
AT: Backups
Backups dont solve meltdowns.
AP 11 (Associated Press 3-29, Nuclear power plants in U.S. vulnerable to power
outages, study shows,
http://www.pennlive.com/midstate/index.ssf/2011/03/nuclear_power_plants_in_us_v
ul.html)
Long before the nuclear emergency in Japan, U.S. regulators knew that a power failure lasting for days at
an American nuclear plant, whatever the cause, could lead to a radioactive leak. Even so, they have
required the nation's 104 nuclear reactors only to develop plans for
dealing with much shorter blackouts on the assumption that power would
be restored quickly. In one simulation presented by the N uclear R egulatory
C ommission in 2009, it would take less than a day for radiation to escape from a
reactor at a Pennsylvania nuclear power plant after an earthquake, flood or fire knocked
out all electrical power and there was no way to keep the reactors cool after
backup battery power ran out. That plant, the Peach Bottom Atomic Power Station outside
Lancaster, has reactors of the same older make and model as those releasing radiation at Japan's Fukushima Daiichi plant, which is using other means to try to cool the reactors. And like Fukushima Dai-ichi, the Peach Bottom
plant has enough battery power on site to power emergency cooling systems for eight hours. In Japan, that wasn't
enough time for power to be restored. The risk of a blackout leading to core damage, while extremely remote,
exists at all U.S. nuclear power plants, and some are more susceptible than others, according to an Associated Press
Elizabeth, works in USA Today's San Francisco bureau, "Experts: Major cyberattack
will hit in next 11 years", Oct 29 2014, USA Today,
www.usatoday.com/story/tech/2014/10/29/pew-survey-cyber-attack/18114719/
SAN FRANCISCO Almost two-third of technology experts expect a "major" cyber
attack somewhere in the world that will cause significant loss of life or property losses in the tens of billions of
dollars by 2025. A survey released Wednesday by the Pew Research Center found that many of
analysts expect disruption of online systems like banking, energy and
health care to become a pillar of warfare and terrorism. The survey asked
over 1,600 technology experts whether a major attack that would cause
"widespread harm to a nation's security and capacity to defend itself"
would be launched within the next 11 years. Sixty-one percent said yes.
The probability of a major cyber attack is not 'if' but 'when .' Oliver CrepinLeblond, Global Information Highway, United Kingdom It's already beginning to happen, several of
the researchers noted. One recent example given was an attack on Apple's iCloud
data storage system earlier this month, which some security experts
believe was linked to the Chinese government. Another was the the July
attack on JPMorgan. Some some in the White House wonder if it was
orchestrated by the Putin regime in Russia in retaliation for U.S. support
of Ukraine, the New York Times reported. As critical infrastructure moves online,
cyber attacks could take out financial systems, the power grid and health
systems, wreaking as much damage as bombs, the experts said. There's already
been "a Pearl Harbor event," said Jason Pontin, editor of the MIT Technology Review. He
cited the 2009 Stuxnet computer worm that disabled Iranian nuclear plant
centrifuges. Many in the defense world believe the attack was launched by the United States and Israel.
"Cyberware just plain makes sense. Attacking the power grid or other
industrial control systems is asymmetrical and deniable and devilishly
effective," said Stewart Baker, a partner at Steptoe & Johnson, a Washington D.C. law firm. Futurist Jamais
Cascio thinks cyber attacks will become part of military engagements . "Cyber is
a force-multiplier," he said. "We'll likely see a major attack that has a cyber
component, but less likely to see a major cyber-attack only. Part of the problem is
that security tends to be an add-on. Building resiliency into systems is crucial , said futurist
David Brin.
because thats vanishingly unlikely. But if the first couple events make the
next events more likely, then those events happen and make the next
ones more likely then you get those rare events happening. This is the
typical way that large complicated systems have catastrophic failures, and
it is not really a perfect storm.
Cascading failure is difficult to analyze because of the huge number of unanticipated
variables. In other words, researchers dont know what they dont know. In addition, the
dependence of individual failures on previous failures and their effect on
subsequent failures creates an incredibly complex system of dependent
variables. Large blackouts involve the failure of many interconnected
variables, each of which affect how variables down the line interact with
each other. Imagine youre very, very tightly scheduled on a certain day ,
Dobson says. Then, things start getting delayed in the morning and things get worse and worse throughout the
Because your first appointment was delayed, Its more likely that the
next one will be delayed. Pretty soon you start missing appointments
altogether in the afternoon. Thats a very small example of cascading
failure. There are a few common attributes, like critical loading, that researchers can look for when studying
cases of cascading failure. A power grids critical loading can be defined as a point
somewhere between a very low load and a very high load where the risk of
a blackout increases sharply. If the amount of electricity flowing through
the system is higher than the power grid critical load, the likelihood of a
blackout spikes. The power grids critical load acts as a reference point for cascading failure; stay below it
and the system will likely be fine. Go above it, and the risk of a blackout is more severe. If a transmission
line carrying its usual load fails, other lines can pick up the slack without
much trouble, he says. But if the power grid as a whole is carrying a
load that is above its critical loading, its burden has a much greater effect
on the other lines. Thats something we look for.
day.
AT: Resiliant
Their defense doesnt assume the scenario of a nuclear
meltdown with a grid blackoutmakes containtment
impossible
Stein 12
Matthew, Matthew Stein is a design engineer, green builder and author of two
bestselling books, "When Disaster Strikes: A Comprehensive Guide to Emergency
Planning and Crisis Survival" (Chelsea Green 2011), and "When Technology Fails: A
Manual for Self-Reliance, Sustainability, and Surviving the Long Emergency"
(Chelsea Green 2008). Stein is a graduate of the Massachusetts Institute of
Technology (MIT), where he majored in mechanical engineering. Stein has appeared
on numerous radio and television programs and is a repeat guest on Fox News,
Lionel, Coast-to-Coast AM and the Thom Hartmann Show, "Four Hundred
Chernobyls: Solar Flares, Electromagnetic Pulses and Nuclear Armageddon",
Truthout, truth-out.org/news/item/7301-400-chernobyls-solar-flares-electromagneticpulses-and-nuclear-armageddon
What do extended grid blackouts have to do with potential nuclear
catastrophes? Nuclear power plants are designed to disconnect
automatically from the grid in the event of a local power failure or major
grid anomaly; once disconnected, they begin the process of shutting down
the reactor's core. In the event of the loss of coolant flow to an active
nuclear reactor's core, the reactor will start to melt down and fail
catastrophically within a matter of a few hours, at most. In an extreme GMD,
nearly every reactor in the world could be affected. It was a short-term cooling-system
failure that caused the partial reactor core meltdown in March 1979 at Three Mile Island, Pennsylvania. Similarly,
Reactor fuel
rods have a protective zirconium cladding, which, if superheated while
exposed to air, will burn with intense, self-generating heat, much like a
magnesium fire, releasing highly radioactive aerosols and smoke . According to
nuclear whistleblower and former senior vice president for Nuclear Engineering Services Arnie Gundersen, once
a zirconium fire has started, due to its extreme temperatures and high
reactivity, contact with water will result in the water dissociating into
hydrogen and oxygen gases, which will almost certainly lead to violent
explosions. Gundersen says that once a zirconium fuel rod fire has started, the
worst thing you could do is to try to quench the fire with water streams,
which would cause violent explosions. Gundersen believes the massive explosion that blew the
nuclear reactor and how recently its latest batch of fuel rods had been decommissioned.[9]
roof off the spent fuel pond at Fukushima was caused by zirconium-induced hydrogen dissociation.[10] Had it not
been for heroic efforts on the part of Japan's nuclear workers to replenish waters in the spent fuel pool at
Fukushima, those spent fuel rods would have melted down and ignited their zirconium cladding, which most likely
would have released far more radioactive contamination than what came from the three reactor core meltdowns.
Japanese officials have estimated that Fukushima Daiichi has already released just
over half as much total radioactive contamination as was released by Chernobyl into the local environment, but
Bill, a national security columnist for The Washington Times and senior editor at The
Washington Free Beacon, "Inside the Ring: U.S. power grid defenseless from
physical and cyber attacks", April 16 2014, The Washington Times,
www.washingtontimes.com/news/2014/apr/16/inside-the-ring-us-power-griddefenseless-from-att/?page=all
The U.S. electrical power grid is vulnerable to cyber and physical attacks
that could cause devastating disruptions throughout the country, federal
and industry officials told Congress recently. Gerry Cauley, president of the North
American Electric Reliability Corp., said that several if not all other critical U.S.
infrastructures depend on electricity, and that he is deeply concerned
about attacks, extreme weather and equipment failures causing power outages. I am most concerned
about coordinated physical and cyber attacks intended to disable
elements of the power grid or deny electricity to specific targets, such as
government or business centers, military installations, or other
infrastructures, Mr. Cauley told the Senate Energy and Natural Resources Committee last Thursday. Mr.
Cauley said the April 2013 attack on a California electrical power substation by unidentified gunmen did not result
in power outages, but highlighted the vulnerability of the countrys three-sector power grid. The incident at the
Metcalf substation in Northern California demonstrates that attacks are possible and have the potential to cause
significant damage to assets and disrupt customer service, he said. Cheryl A. LaFleur, acting chairman of the
Federal Energy Regulatory Commission who testified at the Senate hearing, said the Metcalf attack led federal
LaFleur said
cyber threats to electrical infrastructure are fast-changing, as she called for
authorities to conduct a 13-city campaign to warn utilities about the need for better security. Ms.
better information-sharing about threats between government and industry. Sue Kelly, head of the American Public
Power Association of more than 2,000 U.S. electric utilities, testified about the growing danger of cyberattacks
study Electric Sector Failure Scenarios and Impact Analyses was published in September by the National Electric
A
malicious software cyberattack on the power grids Distributed Energy
Resource Management System (DERMS), which manages requests and
commands for the power system, would damage transformers that are
costly and difficult to replace. Cyberattacks against computers that
distribute electrical power over wide areas could be jammed or disrupted
through wireless signals. And cyber attackers could cause widespread
power outages or cascading power failures by gaining access to
distribution systems and equipment via remote hacking. After gaining
the required access, the threat agent manufactures an artificial cascade
through sequential tripping of select critical feeders and components,
causing automated tripping of generation sources due to power and
voltage fluctuations, the report said. A blackout of varying degree and
potential equipment damage ensues. According to the report, nation state threats to the grid
include China, North Korea and Cuba. Among the cyber terrorist threats listed: al Qaeda
and the Afghan Taliban, the Pakistani group Lashkar-e-Taibi, and the
Palestinian group Hamas. Domestic threats include lone wolf
extremists, ecoterrorists among Earth First and Greenpeace, U.S.
separatist groups, and militias and hate groups, the report said.
Sector Cybersecurity Organization Resource, a non-government group of industry and security specialists.
Solvency
Tom, "The NSA Is Screwing Up The Fight Against Cybercrime", March 7 2014,
Business Insider, www.businessinsider.com/nsa-screwing-up-fight-againstcybercrime-2014-3
Criminals learning from NSA Intelligence agency hacking techniques will
also be adopted by criminals, according to security luminaries speaking with The Guardian. This
has been seen in other nations in recent history. The spear-phishing tricks we saw the
Chinese secret police using against the Dalai Lama in 2008 were being used by Russian crooks to steal money from
US companies by 2010. We predicted as much in 2009, said Ross Anderson, professor of security engineering at
Cryptography
expert and author Bruce Schneier said some of the techniques the NSA
used to hack routers are starting to be seen in criminal cases, amongst
other attack types. Indeed, from compromises of much used but vulnerable
mobile applications, to spying on people through their web cams, dark
web dealers were already using the same methods as the NSA. Todays
the University of Cambridge. A lot more people have become aware of what can be done.
secret NSA programs are tomorrows PHD theses and the next days
hacker tools, he added. The US has done an enormous amount of damage
here. There is a basic level of trust that has been lost There is a lot of
international mistrust right now because the US was supposed to be a
trusted keeper of everything, but it turned out they were subverting it
with every chance they got. And the NSA keeps saying its not as bad as you think, but who the hell
believes that? The zero-day race Purposeful backdoors in security products another revelation from leaked security agency documents - benefit all
hackers. If firms have allowed for weaknesses in their product sets, they
dont just open up holes for agents to exploit, but criminals too. Organized
crime groups are pumping money into hunting for such vulnerabilities,
placing the everyday user at ever greater risk. Those crooks and the NSA
are racing to uncover and use zero-day flaws - previously-unknown,
unpatched weaknesses in software and hardware. After governments buy,
discover or use these vulnerabilities, they often filter down into the wider
criminal community, says Jason Steer, director of technology strategy at FireEye. We know that
governments purchase undisclosed zero-day vulnerabilities, and the
providers of such zero-days such as Vupen openly acknowledge that
government are big buyers of their research in text on their website, Steer
said. All exploits have an inevitable lifecycle - from highly targeted usage to APT [advanced persistent threat]
AT: No US Leadership
The US can make up for past cyber-hypocrisy with leadership
now
Weigant 13 Chris, is a political commentator, author, and blogger, We Need a
Geneva Convention on Cyber Warfare, http://www.huffingtonpost.com/chrisweigant/we-need-a-geneva-conventi_b_4171853.html
Preventing any or all of this by means of international diplomacy might at first glance seem to
be a fool's errand. But it's certainly worth a try , considering what could be avoided if it
were successful. Hammering out exactly what will and will not be allowed in
cyberwarfare will be a tough task -- made even more tough by the
knowledge that any such agreement would almost certainly have to be
updated (at a minimum) every decade or so, to keep up with new technological
developments.
America has lost a lot of its moral standing in the world, since 9/11. This is not a partisan
problem, either. Both Republicans and Democrats alike have given their consent to practices which we used to
consider not only illegal, but downright abhorrent and inhumane. This includes waterboarding and all the other
Orwellian-named "enhanced interrogation techniques" (which we used to consider ourselves morally above using),
to dropping bombs from remotely-controlled airplanes to assassinate people we consider fair targets (how would we
feel if people in Peoria were being assassinated in this fashion?).
But while this might leave the U.S. open to cries of "hypocrisy" from other
countries, leading the effort to define allowable cyberwarfare techniques would go a long
way towards regaining some of that moral standing. America could make
the case: "OK, look, we may have crossed a few lines in our war on terror,
but a lot of this stuff is brand-new, so we just had the opportunity before
other countries were faced with similar choices -- and now that we've had
time to consider, we think there ought to be some rules to cover futuristic
battlefields, both real and virtual."
America should be the one to call for another Geneva Convention in the
cyberwar realm . "Let's lay down some rules" we could say to the rest of
the world, and then we could all start creating a few definitions and
banning certain tactics (like, for instance, a cyber attack on hospital management software -- which
could grind hospitals' capacity to deal with emergencies to an absolute standstill). American politicians -after secrets are revealed by leakers, of course -- always say "we welcome this
conversation," from President Obama on down. But this conversation needs
to include the whole world.
The whole effort could be doomed to failure, of course -- but this is always true
of diplomacy. It could take a century to actually have any effect, as just the dates of the chemical weapons
bans of 1899 and 1997 prove. But that doesn't mean that banning chemical weapons wasn't a worthwhile thing to
attempt. We could indeed have to see a future cyber disaster of "World War I mustard gas" proportions before the
nations of the world even begin to take such a thing seriously. In fact, it is very easy to be pessimistic about the
chances for success.
Communications spying and drone attacks are only the precursors for what could be eventually deployed against
If we don't take the lead now in calling for some definition of what is humanely
allowable even by countries at war with each other, we may seriously regret not doing so
later.
the United States.
EXT-Solves Cybersecurity
Trust between the government and the private sector is key to
ensure cybersecurity
Kelly, reporter @ USA Today, 15
Erin, "Tech companies leery of sharing cyber threats with feds", April 2 2015,
www.usatoday.com/story/news/politics/2015/04/02/phyllis-schneck-cybersecuritytechnology-summit/70838226/
WASHINGTON U.S. tech companies still don't trust the federal government
Summit hosted by the Washington, D.C. chapter of the Armed Forces Communications and Electronics
Association ."But
Obama announced an
executive order in February to create a process for information-sharing . Last
public sectors can help one another detect and thwart cyber criminals. President
month, both the Senate and House intelligence committees passed bills that would give companies protection from
lawsuits when they share cyber threat information with the government. William Evanina, head of national
counterintelligence for the U.S. government, said the government is working to be able to provide companies with
information beyond just who is hacking them. "We want to put context on what they (the hackers) are doing," he
That
information will help the government and private companies do a better
job of figuring out how to thwart cyber criminals, Evanina said. He said many
hackers laugh at how easy it is to get victims to click on a link that allows
the criminals to get around a company's cybersecurity system.
said. "What's the intent of the person who is doing it? Who else is being hit the same way?"
Kudos to the President for visiting Silicon Valley last month and drawing the attention of the nation to a new world
to cross the cybersecurity trust chasm to make sharing really work . Today,
this trust has been broken in the system due to incessant hacking of
employee/customer confidential data stored in private sector enterprises.
Multiple allegations of excessive snooping against the private sector and
the government have only complicated matters. We need to (re)build
trust :
between the government and the public; between a company and its employees; between a company
and its customers; between different private sector companies; and finally
and the private sector . The traditional cybersecurity debate has been
portrayed as a security vs. privacy dialog. Trust has largely been ignored.
But, trust and only trust can bring together the repelling poles of security
& privacy.
School who specializes in European economic history, 7/2/14, Debate: Is 2014, like
1914, a prelude to world war?, http://www.theglobeandmail.com/globedebate/read-and-vote-is-2014-like-1914-a-prelude-to-world-war/article19325504/
As we get closer to the centenary of Gavrilo Princips act of terrorism in Sarajevo, there is an ever more vivid fear:
it could happen again . The approach of the hundredth anniversary of 1914 has
put a spotlight on the fragility of the worlds political and economic security
systems .
At the beginning of 2013, Luxembourgs Prime Minister Jean-Claude Juncker was widely ridiculed for evoking the
the interdependency of
the increasingly complex global economy made war impossible. But a
quite opposite conclusion was possible and equally plausible and proved
to be the case . Given the extent of fragility, a clever twist to the control
levers might make war easily winnable by the economic hegemon.
In the wake of an epochal financial crisis that almost brought a complete
global collapse, in 1907, several countries started to think of finance as
primarily an instrument of raw power, one that could and should be turned to national
In the influential view of Norman Angell in his 1910 book The Great Illusion,
advantage.
The 1907 panic emanated from the United States but affected the rest of the world and demonstrated the fragility
of the whole international financial order. The aftermath of the 1907 crash drove the then hegemonic power Great
Britain - to reflect on how it could use its financial power.
Between 1905 and 1908, the British Admiralty evolved the broad outlines of a plan for financial and economic
warfare that would wreck the financial system of its major European rival, Germany, and destroy its fighting
capacity.
Britain used its extensive networks to gather information about opponents. London banks financed most of the
worlds trade. Lloyds provided insurance for the shipping not just of Britain, but of the world. Financial networks
provided the information that allowed the British government to find the sensitive strategic vulnerabilities of the
opposing alliance.
What pre-1914 Britain did anticipated the private-public partnership that today links technology giants such as
Google, Apple or Verizon to U.S. intelligence gathering. Since last year, the Edward Snowden leaks about the NSA
have shed a light on the way that global networks are used as a source of intelligence and power.
For Britains rivals, the financial panic of 1907 showed the necessity of mobilizing financial powers themselves. The
United States realized that it needed a central bank analogous to the Bank of England. American financiers thought
that New York needed to develop its own commercial trading system that could handle bills of exchange in the
same way as the London market.
In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major weakness,
and required the provision of large swap lines by the Federal Reserve. The United States provided that support to
some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates in his new
book on the Dollar Trap.
Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to
acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian
trade finance. Chinese banks are being pushed to expand their role in global commerce. After the financial crisis,
China started to build up the renminbi as a major international currency. Russia and China have just proposed to
create a new credit rating agency to avoid what they regard as the political bias of the existing (American-based)
agencies.
The next stage in this logic is to think about how financial power can be directed to national advantage in the case
of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the pressure applied to rogue
states such as Iran and North Korea. But financial pressure can be much more powerfully applied to countries that
are deeply embedded in the world economy.
The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putins
calculation in response is that the European Union and the United States cannot possibly be serious about the
financial war. It would turn into a boomerang: Russia would be less affected than the more developed and complex
financial markets of Europe and America.
Balkanization Now
The Snowden leaks have destroyed international trust in the
US as a responsible steward of the internetcountries are
pushing for a Balkanized internet
Cooper, vice president of research and emerging issues at the
U.S. Chamber of Commerce Foundation, 15
Rich, "Say No to the Balkanization of the Internet", March 30 2015, US Chamber of
Commerce Foundation, www.uschamberfoundation.org/blog/post/say-nobalkanization-internet/42923
Motivations for Balkanization Currently, the United States is the worlds
undisputed Internet hub. America invented and built the Internet (in terms of infrastructure and
software), and by consequence, the United States is at the center of the World Wide Web. Even as wireless
connect to different nodes across the world (hence the term Web),
fosters the free flow of ideas and data; the latter achieves the opposite. (Fortunately, Brazilian lawmakers realized
the folly of isolating their data and their networks and removed a portion of a proposed law, Marco Civil da
Internet, that would have required foreign Internet providers to store data about Brazilians in country.) Yet,
Brazil has not been alone in calling for a change in Internet stewardship.
Countries like Indonesia and India have discussed the possibility of an
international framework for Internet governance, something that is currently decided by
the United States (because we invented and built it). Meanwhile, countries in the European Union
have considered terminating data-sharing agreements with the United
States, also in response to the Snowden revelations. Totalitarian regimes
in China, Iran, and elsewhere have realized a potential benefit of a
cloistered, country-specific Internet: the capacity to monitor everything
their citizens say and do online, making it easier to identify and quell
dissent. Something that each of those named countries has done in various forms. These motivations for
changing how data is accessed and transferred come at a time when cloud computing is raising real questions
about the applicability of national laws to a virtual environment in which geopolitical borders are irrelevant. If data,
much like the cloud transcends nationality and long-held geographic borders, how do nations decide whose laws
apply to that data? The answer to this still-unanswered question will have consequences for all Internet
technologies have become easier to build and implement, allowing any country with means to build their own
Internet. Its not just that some countries want to Balkanize the Internet; its that now they actually can.
Marc, "On International Privacy: A Path Forward for the US and Europe", June 15
2014, Harvard International Review, hir.harvard.edu/archives/5815The US Response
President Obamas initial response to the Snowden disclosures mirrored the
statements of his intelligence advisors but they were not sufficient to address concerns in the
United States and Europe. Obama appeared to think that if there was more
openness and explanation for the program activities, public support would
follow. But it became clear that substantive changes were needed to
address opposition in the United States and the criticism of its allies. At a
Obama took the first steps toward reform.
He said he would revise the controversial section 215 program that permitted the bulk
news conference about a month after the initial disclosures, President
collection of American telephone records. The President announced that he would take steps to put in place
move favored by civil liberties advocates and former judges on the secretive court, but one that would not actually
limit the scope of the surveillance program. The President further said that he would disclose more of the activities
of the secretive Foreign Intelligence Surveillance Court, appoint a privacy officer for the agency, and create a
recommendations for changes in intelligence gathering activities. That expert group would eventually produce a
report with far more sweeping recommendations. The Presidents speech was intended to set out concrete steps for
reform and to address criticisms about the scope of the NSA programs that were known at the time.
But there
also
also support our bill. Just last week, many of these organizations joined
together to urge the Senate to pass ECPA reform. In a letter to the Judiciary Committee,
these organizations said that not only would ECPA legislation "allow law
enforcement officials to obtain electronic communications in all
appropriate cases while protecting Americans' constitutional rights," but it
also would "provide certainty for American businesses developing
innovative new services and competing in a global marketplace."
companies,
Balkanization ImpactX!
Preserving global internet stability is key to solve existential
crisis
DeNardis, 2014 Laura, tenured Professor and Associate Dean in the School of Communication at
American University, The Global War for Internet Governance, pg 15-18
You see
various countries demanding (or forcing) certain websites get blocked. But
those solutions are truly only temporary . Because the overall internet is
too important to block , and because some sites are necessary (like Github)
there are always holes in the system . Add in a useful dose of encryption
(yay!) and the ability to control everything that's read in one particular
country becomes increasingly difficult. You might hope the response would be to give up
suggest an interesting escalation in questions about the increasing attempts to fragment the internet.
attempts to censor, but China isn't likely to give up just like that. So, instead, it's basically trying to censor the
global internet, by launching a high powered attack on the site that is the problem, while basically saying "get rid of
these projects and we'll stop the attack."
are real cracks in China's attempts to censor the inte rnet. We're basically
realizing the limits of the Great Firewall of China , and useful services
allowed a way to tunnel through. China is responding by trying to make life difficult for Github, but as long as Github
and others can figure out ways to resist, censorship attempts like the Great Firewall will increasingly be useless.
(Jennifer Brown, RAND S&T policy analyst, Ph.D. in public health from Harvard
University and Peter, RAND senior political scientist, Ph.D. in political science from
the University of British Columbia, The Global Threat of New and Reemerging
Infectious Diseases; Reconciling U.S. National Security and Public Health Policy,
www.rand.org/pubs/monograph_reports/MR1602.html)
The argument that the transnational spread of disease poses a threat to human security
rests on the simple proposition that it seriously threatens both the individual and the quality of life that a person is able to attain
within a given society, polity or state. Specifically, this occurs in at least six ways. First and most fundamental, disease killsfar
surpassing war as a threat to human life. AIDS alone is expected to have killed over 80 million people by the year 2011, while
tuberculosis (TB), one of the viruss main opportunistic diseases, accounts for three million deaths every year, including 100,000
children. 2 1 In general, a staggering 1,500 people die each hour from infectious ailments, the vast bulk of which are caused by just
six groups of disease: HIV/AIDS, malaria, measles, pneumonia, TB, and dysentery and other gastrointestinal disorders. 22 Second, if
the state itself to function. When large-scale outbreaks occur, such effects can become particularly acute as the ranks of first
responders and medical personnel are decimated, making it doubly difficult for an already stressed government to respond
adequately. During the initial weeks of the anthrax attacks in fall 2001, the lack of coordination at the federal level, especially with
regard to communication, led to a loss of confidence by some citizens, especially postal workers in Washington, D.C. Potentially
exposed individuals were given conflicting advice on antibiotic treatment and the efficacy of the anthrax vaccine. The general
public, largely because of inconsistent information enunciated by government officials, bought Cipro, the antibiotic approved for the
treatment of anthrax, in large numbers. Similarly, in 1996, Japan suffered a severe food poisoning epidemic caused by Escherichia
coli O157. Over the course of two months, eight people died and thousands of others were sickened. The perceived inability of the
Tokyo government to enact an appropriate response generated widespread public criticism, compounding popular dissatisfaction
with an administration that was still reeling from the effects of the previous years Kobe earthquake. As one commentator remarked
at the height of the crisis, The cries against government authorities are growing louder by the day. . . . The impression here [in
Japan] is too much talk and not enough action has led to yet another situation that has spun out of control. 23 Third, disease
adversely affects the economic foundation upon which both human and state security depends. The fiscal burden imposed by the
HIV/AIDS epidemic provides a case in point. Twenty-five million people are currently HIV-positive in subSaharan Africa, costing already
impoverished governments billions of dollars in direct economic costs and loss of productivity. Treating HIV-related illnesses in South Africa, the worst-hit
country on the continent, is expected to generate annual increases in healthcare costs in excess of US$500 million by 2009 (see Chapter Three). 2 4 South
demographic
widely destabilize countries with fragile economies
and Southeast Asia are expected to surpass Africa in terms of infections by the year 2010. If this in fact occurs,
upheaval could
tax and
them to take nuclear conflict seriously. Thus, in a real sense, nuclear weapons have succeeded in abolishing the concept of a
winnable war.
however,
namely North Korea and Iran. If these two nations appear to be prospering that is, if their nuclear
threats are winning them attention and respect, financial bribes in the form of aid and all the other goodies by which petty dictators
count successother
Censorship ScenarioSolvency
A credible internet freedom agenda is key to avoiding
balkanizationcurtailing surveillance promotes cooperation
and accountability
(Castro 2015, Daniel Castro, Director for the Center for Data Innovation at ITIF,
Vice President of ITIF, member of the Federal Commerce Data Advisory Council, June
2015, Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness, Information Technology and Innovation Foundation,
http://www2.itif.org/2015-beyond-usa-freedom-act.pdf?
_ga=1.114044933.369159037.1433787396)
The ability of companiesboth tech and traditionalto easily share data across
borders has brought a vast array of benefits to countries, companies, consumers, and
economies through increased efficiency, decreased costs, and improved
services.26 And yet nations have continued to erect barriers to cloud computing and cross-border data flows,
much to their own detriment.27 While some defenders of these policies have asserted that they are designed to
increase the privacy or security of their citizens data, it is clear that they are also motivated by misguided selfinterest. By creating rules that advantage domestic firms over foreign firms, many countries believe they will build a
stronger domestic tech industry or gain short-term economic value, such as jobs in domestic data centers. In
reality, these policies unwittingly limit the ability of a countrys own firms to innovate by shielding them from
international competition.28 These policies not only limit the number of services that a countrys citizens and
businesses can enjoy, but also harm that countrys productivity and competitiveness. Some countries used U.S.
surveillance laws to justify data protectionism even before Snowdens NSA revelations. For example, when
Rackspace built data centers in Australia in 2012, an Australian competitor stirred up fears that the United States
would use the Patriot Act to track Australian citizens as a means to force Rackspace out of Australia.29 In addition,
this same Australian company funded a report calling on Australian policymakers to impose additional regulations
for European providers, and even a Schengen area for dataa system that keeps as much data in Europe as
France
and Germany have even started to create dedicated national networks:
possibleas ways to promote deployment of cloud services entirely focused on the European market.31
Schlandnet for the former and the Sovereign Cloud for the latter. 32 The French government has gone so far as
to put 150 million ($200 million) into two start-ups, Numergy and Cloudwatt, to create a domestic infrastructure
independent of U.S. tech giants.33 Furthermore, some groups have invoked U.S. cyberespionage to argue that
European citizens are not adequately protected and are calling for the removal of the safe harbor agreementan
agreement that allows Internet companies to store data outside of the European Union. Yet if this were removed it
U.S. tech giants, such Apple and Salesforce, have already started to build their data centers abroad to appease
foreign watchdogs and privacy advocates.36 For example, Amazon started running Internet services and holding
data in Germany for its European business partners in an effort to downplay threats of online spying.37
Protectionist policies in China have further strained the U.S. tech industry.
In January 2015, the Chinese government adopted new regulations that forced companies that
sold equipment to Chinese banks to turn over secret source code , submit to
aggressive audits, and build encryption keys into their products.38 While ostensibly an attempt to strengthen
Oracle and EMC to convince its state-owned banks to stop buying from these U.S. tech giants. 39 To be sure, the
Chinese government recently halted this policy under U.S. pressure.40 However, the halted policy can be seen as a
part of a larger clash between China and the United States over trade and cybersecurity. Indeed, these proposed
barriers were in part a quid pro quo from China, after the United States barred Huawei, a major Chinese computer
maker, from selling its products in the United States due to the fear that this equipment had back doors for the
Chinese government.41 Since the Snowden revelations essentially gave them cover, Chinese lawmakers have
openly called for the use of domestic tech products over foreign goods both to boost the Chinese economy and in
response to U.S. surveillance tactics. This system of retaliation has not only led to a degradation of business
interests for U.S. tech companies in China, but also disrupted the dialogue between the U.S. government and China
Cloud-ComputingNSA Bad
Surveillance leaks have blanketed the tech industry with
concern over data privacythe government needs to take
significant steps in order to avoid losing hundreds of billions of
dollars
Miller, reporter @ NYT, 14
It is impossible to see
now the full economic ramifications of the spying disclosures in part
because most companies are locked in multiyear contracts but the
pieces are beginning to add up as businesses question the trustworthiness
of American technology products. The confirmation hearing last week for the new N.S.A. chief,
they went to the White House on Friday for a meeting with President Obama.
the video appearance of Mr. Snowden at a technology conference in Texas and the drip of new details about
government spying have kept attention focused on an issue that many tech executives hoped would go away.
Forrester Research, a
technology research firm, said the losses could be as high as $180 billion,
the United States cloud computing industry could lose $35 billion by 2016.
businesses are being left off some requests for proposals from foreign
customers that previously would have included them, said James Staten, a cloud
computing analyst at Forrester who has read clients requests for proposals. There are German companies, Mr.
Staten said, explicitly not inviting certain American companies to join. He added, Its like, Well, the very best
Brazil also announced plans to abandon Microsoft Outlook for its own email system that uses Brazilian data centers.
an antiAmerican attitude took root after the passage of the Patriot Act , the
counterterrorism law passed after 9/11 that expanded the governments surveillance powers. But the
volume of the discussion has risen significantly post-Snowden, he said. For
Mark J. Barrenechea, chief executive of OpenText, Canadas largest software company, said
instance, after the N.S.A. surveillance was revealed, one of OpenTexts clients, a global steel manufacturer based in
in
the name of security, we're trading away not only privacy, but also the U.S. tech
economy, Internet openness, America's foreign policy interests and
cybersecurity." The report says U.S.-based cloud computing companies are
already starting to lose market share and stand to lose more over the
coming years if the government doesn't institute reforms. The report
backs a study done by the Information Technology and Innovation
Foundation that says U.S. cloud companies could lose $22 billion to $35
billion in foreign market share over the next three years due to the
scandal. OTI points to a number of surveys saying global IT professionals
have changed their purchasing behavior or are currently not storing data
in the cloud due to NSA's actions. "Not only do people have initial
concerns about deceiving U.S. technology, but we've seen a lot of
countries take steps to put policies in place that would really give an
advantage to domestic or block U.S. firms out of their market," Daniel Castro,
Danielle Kehl, a policy analyst at OTI, said in a statement. "But if you look closer, the more accurate story is that
Cloud-ComputingFragmentation IL
Fragmentation destroys cloud computing
McDowell, 12
(5/31, FCC Chair, Comm'r. McDowell's Congressional Testimony,
http://www.fcc.gov/document/commr-mcdowells-congressional-testimony-5-312012)
It is a pleasure and an honor to testify beside my friend, Ambassador Phil Verveer. First, please allow me to dispense
quickly and emphatically any doubts about the bipartisan resolve of the United States to resist efforts to expand
the International Telecommunication Unions (ITU) authority over Internet matters. Some ITU officials have
dismissed our concern over this issue as mere election year politics. Nothing could be further from the truth as
evidenced by Ambassador Verveers testimony today as well as recent statements from the White House, Executive
Branch agencies, Democratic and Republican Members of Congress and my friend and colleague, FCC Chairman
it is
important to define the challenge before us. The threats are real and not imagined,
although they admittedly sound like works of fiction at times. For many years now,
scores of countries led by China, Russia, Iran, Saudi Arabia, and many others, have
pushed for, as then-Russian Prime Minister Vladimir Putin said almost a year ago, international control
of the Internet through the ITU.1 I have tried to find a more concise way to express this issue, but I
Julius Genachowski. We are unified on the substantive arguments and have always been so. Second,
cant seem to improve upon now-President Putins crystallization of the effort that has been afoot for quite some
time. More importantly, I think we should take President Putin very seriously. 1 Vladimir Putin, Prime Minister of the
Russian Federation, Working Day, GOVT OF THE RUSSIAN FEDN, http://premier.gov.ru/eng/events/news/15601/
(June 15, 2011) (last visited May 14, 2012). Six months separate us from the renegotiation of the 1988 treaty that
Member States have put forth proposals calling for overt legal expansions of United Nations or ITU authority over
the Net, ITU officials have publicly declared that the ITU does not intend to regulate Internet governance while also
saying that any regulations should be of the light-touch variety.2 But which is it? It is not possible to insulate the
Internet from new rules while also establishing a new light touch regulatory regime. Either a new legal paradigm
will emerge in December or it wont. The choice is binary. Additionally, as a threshold matter, it is curious that ITU
officials have been opining on the outcome of the treaty negotiation. The ITUs Member States determine the fate of
any new rules, not ITU leadership and staff. I remain hopeful that the diplomatic process will not be subverted in
this regard. As a matter of process and substance, patient and persistent incrementalism is the Nets most
dangerous enemy and it is the hallmark of many countries that are pushing the proregulation agenda. Specifically,
some ITU officials and Member States have been discussing an alleged worldwide phone numbering crisis. It
seems that the world may be running out of phone numbers, over which the ITU does have some jurisdiction. 2
Speech by ITU Secretary-General Tour, The Challenges of Extending the Benefits of Mobile (May 1,
2012),http://www.itu.int/net/pressoffice/press_releases/index.aspx?lang=en (last visited May 29, 2012). 2 Today,
many phone numbers are used for voice over Internet protocol services such as Skype or Google Voice. To function
properly, the software supporting these services translate traditional phone numbers into IP addresses. The Russian
Federation has proposed that the ITU be given jurisdiction over IP addresses to remedy the phone number
shortage.3 What is left unsaid, however, is that potential ITU jurisdiction over IP addresses would enable it to
regulate Internet services and devices with abandon. IP addresses are a fundamental and essential component to
the inner workings of the Net. Taking their administration away from the bottomup, non-governmental, multistakeholder model and placing it into the hands of international bureaucrats would be a grave mistake. Other
efforts to expand the ITUs reach into the Internet are seemingly small but are tectonic in scope. Take for example
the Arab States submission from February that would change the rules definition of telecommunications to
include processing or computer functions.4 This change would essentially swallow the Internets functions with
only a tiny edit to existing rules.5 When ITU leadership claims that no Member States have proposed absorbing
Internet governance into the ITU or other intergovernmental entities, the Arab States submission demonstrates
that nothing could be further from the truth. An infinite number of avenues exist to 3 Further Directions for Revision
of the ITRs, Russian Federation, CWG-WCIT12 Contribution 40, at 3 (2011), http://www.itu.int/md/T09-CWG.WCIT12C-0040/en (last visited May 29, 2012) (To oblige ITU to allocate/distribute some part of IPv6 addresses (as same
way/principle as for telephone numbering, simultaneously existing of many operators/numbers distributors inside
unified numbers space for both fixed and mobile phone services) and determination of necessary requirements.). 4
Proposed Revisions, Arab States, CWG-WCIT12 Contribution 67, at 3 (2012), http://www.itu.int/md/T09CWG.WCIT12C-0067/en (last visited May 29, 2012). 5 And Iran argues that the current definition already includes the Internet.
Contribution from Iran, The Islamic Republic of Iran, CWG-WCIT12 Contribution 48, Attachment 2 (2011),
http://www.itu.int/md/T09-CWG.WCIT12C-0048/en (last visited May 29, 2012). 3 accomplish the same goal and it is
camouflaged subterfuge that proponents of Internet freedom should watch for most vigilantly. Other examples
come from China. China would like to see the creation of a system whereby Internet users are registered using their
IP addresses. In fact, last year, China teamed up with Russia, Tajikistan and Uzbekistan to propose to the UN
General Assembly that it create an International Code of Conduct for Information Security to mandate
international norms and rules standardizing the behavior of countries concerning information and cyberspace.6
Does anyone here today believe that these countries proposals would encourage the continued proliferation of an
open and freedom-enhancing Internet? Or would such constructs make it easier for authoritarian regimes to identify
and silence political dissidents? These proposals may not technically be part of the WCIT negotiations, but they give
a sense of where some of the ITUs Member States would like to go. Still other proposals that have been made
personally to me by foreign government officials include the creation of an international universal service fund of
sorts whereby foreign usually state-owned telecom companies would use international mandates to charge
certain Web destinations on a per-click basis to fund the build-out of broadband infrastructure across the globe.
the U.S.
and like-minded proponents of Internet freedom and prosperity across the globe
should resist efforts to expand the powers of intergovernmental bodies over the
Internet 6 Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian
Google, iTunes, Facebook and Netflix are mentioned most often as prime sources of funding. In short,
Federation, Tajikistan, and Uzbekistan to the United Nations addressed to the Secretary-General, Item 93 of the
provisional agenda - Developments in the field of information and telecommunications in the context of
international security, 66th Session of the United Nations General Assembly, Annex (Sep. 14, 2011),
http://www.cs.brown.edu/courses/csci1800/sources/2012_UN_Russia_and_China_Code_o_Conduct.pdf (last visited
May 29, 2012). even in the smallest of ways. As my supplemental statement and analysis explains in more detail
before you today and I look forward to your questions. Thank you, Chairman Walden and Ranking Member Eshoo,
for holding this hearing. Its topic is among the most important public policy issues affecting global commerce and
political freedom: namely, whether the International Telecommunication Union (ITU), or any other
intergovernmental body, should be allowed to expand its jurisdiction into the operational and economic affairs of
the Internet. As we head toward the treaty negotiations at the World Conference on International
Telecommunications (WCIT) in Dubai in December, I urge governments around the world to avoid the temptation to
organization under the auspices of the United Nations.1 Dont take my word for it, however. As Russian Prime
Minister Vladimir Putin said almost one year ago, the goal of this well-organized and energetic effort is to establish
international control over the Internet using the monitoring and supervisory capabilities of the [ITU].2 Motivations
of some ITU Member states vary. Some of the arguments in support of such actions may stem from frustrations with
the operations of Internet Corporation for Assigned Names and Numbers (ICANN). Any concerns regarding ICANN,
however, should not be used as a pretext to end the multi-stakeholder model that has served all nations
especially the developing world so well. Any reforms to ICANN should take place through the bottom-up multistakeholder process and should not arise through the WCITs examination of the International Telecommunication
Regulations (ITR)s. Constructive reform of the ITRs may be needed. If so, the scope of any review should be limited
to traditional telecommunications services and not expanded to include information services or any form of Internet
services. Modification of the current multistakeholder Internet governance model may be necessary as well, but we
should all work together to ensure no intergovernmental regulatory overlays are placed into this sphere. Not only
would nations surrender some of their national sovereignty in such a pursuit, but they would suffocate their own
economies as well, while politically paralyzing engineering and business decisions within a global regulatory body. 1
History, IThttp://www.itu.int/en/about/Pages/history.aspx">U, http://www.itu.int/en/about/Pages/history.aspx (last
visited May 14, 2012). 2 Vladimir Putin, Prime Minister of the Russian Federation, Working Day, GOVT OF THE
RUSSIAN FEDN, http://premier.gov.ru/eng/events/news/15601/ (June 15, 2011) (last visited May 14, 2012). Every
day headlines tell us about industrialized and developing nations alike that are awash in debt, facing flat growth
the Internets future. One path holds great promise, while the other path is fraught
with peril. The promise, of course, lies with keeping what works, namely maintaining
a freedom-enhancing and open Internet while insulating it from legacy regulations .
The peril lies with changes that would ultimately sweep up Internet services into
decades-old ITU paradigms. If successful, these efforts would merely imprison the
future in the regulatory dungeon of the past. The future of global growth and
political freedom lies with an unfettered Internet. Shortly after the Internet was
privatized in 1995, a mere 16 million people were online worldwide.3 As of early 2012, approximately 2.3 billion
examined the Nets effect on the developing world, or aspiring countries.5 In 30 specific aspiring countries
studied, including Malaysia, Mexico, Morocco, Nigeria, Turkey and Vietnam,6 Internet penetration has grown 25
percent per year for the past five years, compared to only five percent per year in developed nations.7 Obviously,
broadband penetration is lower in aspiring countries than in the developed world, but that is quickly changing
thanks to mobile Internet access technologies. Mobile subscriptions in developing countries have risen from 53
percent of the global market in 2005 to 73 percent in 2010.8 In fact, Cisco estimates that the number of mobileconnected devices will exceed the worlds population sometime this year.9 Increasingly, Internet users in these
countries use only mobile devices for their Internet access.10 This trend has resulted in developing countries
growing their global share of Internet users from 33 percent in 2005, to 52 percent in 2010, with a projected 61
percent share by 2015.11 The 30 aspiring countries discussed earlier are home to one billion Internet users, half of
countries, the Internet creates 2.6 new jobs for each job it disrupts.16 I expect that we would all agree that these
The best path forward is the one that has served the global
economy so well, that of a multi-stakeholder governed Internet. One potential
outcome that could develop if pro-regulation nations are successful in granting the
ITU authority over Internet governance would be a partitioned Internet. In particular,
positive trends must continue.
fault lines could be drawn between countries that will choose to continue to live under the current successful model
and those Member States who decide to opt out to place themselves under an intergovernmental regulatory
A balkanized Internet would not promote global free trade or increase living
standards. At a minimum, it would create extreme uncertainty and raise costs for all
users across the globe by rendering an engineering, operational and financial
morass. For instance, Harvard and the Massachusetts Institute of Technology (MIT) recently announced placing
many of their courses online for free for anyone to use. The uncertainty and economic and
engineering chaos associated with a newly politicized intergovernmental legal
regime would inevitably drive up costs as cross border traffic and cloud
computing become more complicated and vulnerable to regulatory
arbitrage. Such costs are always passed on to the end user consumers and may very well negate the ability of
regime.
content and application providers such as Harvard and MIT to offer first-rate educational content for free.
Nations that value freedom and prosperity should draw a line in the sand
against new regulations while welcoming reform that could include a nonregulatory role for the ITU. Venturing into the uncertainty of a new regulatory
quagmire will only undermine developing nations the most.
Cloud-ComputingK2 Econ
Advancing the American cloud-computing industry is necessary
to save the economythe information economy affects all
organizations and is ripe for innovation
Coviello, Executive Vice President, EMC Corporation, 11
Art, "Can Cloud Computing Save The American Economy?", March 13 2011, Forbes,
www.forbes.com/sites/ciocentral/2011/03/13/can-cloud-computing-save-theamerican-economy/
The American dream is in peril from the confluence of sky rocketing
deficits, high unemployment, and the ticking time bomb of an aging baby
boomer generation, with its coincident increase in the burden of
entitlements as a percentage of GDP. For the first time, the next generation of Americans, our
grandchildren, risk having a lower standard of living than we enjoyed. It is not a problem that can be remedied with
the last 150 years, Americans have always responded well in a crisis and yet again, we are well positioned to lead
the world out of this one. Want proof? American businesses systemically and culturally react fast. Two years after
the economic downturn began the United States was generating 97% of its economic output with only 90% of the
labor. This sort of gain in productivity ultimately translates into increased economic activity, the ability to pay down
debt and a higher standard of living for those of us who are employed. Unfortunately it does not directly address
anywhere in the world. Think of the efficiencies in hospital supply chains, the delivery of prescription drugs, the
processing of billing and insurance claims, reductions in fraud, and the application of best practices for cost
controls. The capacity for improvement is endless. As a matter of fact, these innovations are already being applied
respond well in a crisis. It is the nature of our society: egalitarian, free, open and competitive that make us the most
adaptive, inventive and resilient country in the world. Time again for us to lead.
Cloud-ComputingK2 Competitiveness
Cloud computing has incredible economic potential and would
make the US more competitive in the global marketplace
Pincus, a Student Volunteer at the White House Office of
Science and Technology Policy, 11
Erica, "Cloud Computing and American Competitiveness", America and the Global
Economy, Wilscon Center, June 24 2011,
https://americaandtheglobaleconomy.wordpress.com/2011/06/24/cloud-computingand-american-competitiveness/
In todays economy, an effective information technology (IT)
infrastructure is essential to the proper functioning of almost every
organization. Cloud computing expands the potential of this effectiveness
by facilitating automatic syncing of a users devices and by creating
borderless IT networks. In 2008, The Economist cited cloud computing as
possibly being the ultimate form of globalization . It allows users to rent
virtual storage space for their information on an off-site multi-tenant
server and access that information externally through the internet. In this
way, cloud computing conserves time and money and has the potential to
revolutionize the organization, syncing, storage and sharing of filesall
tasks that increase productivity and operational efficiency, which can help
to make America more competitive in the global market. Cloud computing can also
act as a facilitator for entrepreneurship by lowering barriers to entry such as those associated with financing an IT
cloud computing
provides start-up companies with access to enterprise-class servers and
systems without [the] excessive up-front costs associated with traditional
hardware and software licenses. The article also asserts that cloud computing
infrastructure. According to an article published in The MIT Entrepreneurship Review,
the U.S.
cloud
Richard Duncan, former World Bank specialist and chief economist in Blackhorse
Asset Management, in 2012 (Richard, chief economist at Singapore-based
Blackhorse Asset Management, former financial sector specialist at the World Bank
and global head of investment strategy at ABN AMRO Asset Management, studied
literature and economics at Vanderbilt University (1983) and international finance at
Babson College (1986), The New Depression: The Breakdown of the Paper Money
Economy, http://www.amazon.com/The-New-Depression-Breakdownebook/dp/B007GZOYI6, 2/24/12)
The consequences of a New Great Depression would extend far beyond the realm of
economics. Hungry people will fight to survive . Governments will use force to maintain internal order
at home. This section considers the geopolitical repercussion of economic collapse, beginning with the United States. First, the
U.S. governments tax revenues would collapse with the depression. Second, because
global trade would shrivel up , other countries would no longer help finance
the U.S. budget deficit by buying government bonds because they would no longer
have the money to do so. At present, the rest of the world has a $500 billion annual trade surplus with the United States.
The central banks of the United States trading partners accumulate that surplus as foreign exchange reserves and invest most of
Domestically, social programs for the old, the sick, and the unemployed would have to be slashed. Government spending on
income inequality going into the crisis, the hungry have-nots would substantially outnumber the remaining wealthy. On the one
hand, a hard swing to the left would be the outcome most likely to result from democratic elections. In that case, the tax rates on
the top income brackets could be raised to 80 percent or more, a level last seen in 1963. On the other hand, the possibility of a
right-wing putsch could not be ruled out. During the Great Depression, the U.S. military was tiny in comparison with what it became
affairs would also confront the United States with enormous challenges. During the Great Depression, the United States did not have
a global empire. Now it does. The United States maintains hundreds of military bases
across dozens of countries around the world. Added to this is a fleet of 11 aircraft carriers and 18 nuclear-armed submarines. The
more than $650 billion a year on its military. If the U.S. economy
collapses into a New Great Depression, the United States could not afford to maintain
its worldwide military presence or to continue in its role as global peacekeeper. Or, at least, it could
not finance its military in the same way it does at present . Therefore, either the United
country spends
States would have to find an alternative funding method for its global military presence or else it would have to radically scale it
back. Historically, empires were financed with plunder and territorial expropriation. The estates of the vanquished ruling classes
those places that were of vital economic interests to the United States. The Middle East oil fields would be at the top of that list. The
United States would have to maintain control over them whatever the price. In this global depression scenario,
the price of
oil could collapse to $3 per barrel . Oil consumption would fall by half and there
would be no speculators left to manipulate prices higher. Oil at that level would impoverish the oilproducing nations, with extremely destabilizing political consequences.
Maintaining control over the Middle East oil fields would become much more
difficult for the United States. It would require a much larger military presence than it does now. On the one hand, it
might become necessary for the United States to reinstate the draft (which
would possibly meet with violent resistance from draftees, as it did during the Vietnam War). On the other hand, Americas all-
The
army might have to be employed to keep order at home, given that mass unemployment would
volunteer army might find it had more than enough volunteers with the national unemployment rate in excess of 20 percent.
inevitably lead to a sharp spike in crime. Only after the Middle East oil was secured would the country know how much more of its
global military presence it could afford to maintain. If international trade had broken down, would there be any reason for the United
In a global
depression, the United States allies in Asia would most likely be unwilling
or unable to finance Americas military bases there or to pay for the upkeep of the U.S. Pacific
fleet. Nor would the United States have the strength to force them to pay for U.S.
States to keep a military presence in Asia when there was no obvious way to finance that presence?
protection. Retreat from Asia might become unavoidable. And Europe? What would a costbenefit analysis conclude about the
wisdom of the United States maintaining military bases there? What valued added does Europe provide to the United States?
dangerous place . When the Great Depression began, Japan was the rising industrial power in Asia. It invaded
Manchuria in 1931 and conquered much of the rest of Asia in the early 1940s. Would China, Asias new rising power, behave the
same way in the event of a new global economic collapse? Possibly. China is the only nuclear power in Asia east of India (other than
North Korea, which is largely a Chinese satellite state). However, in this disaster scenario ,
The Communist Party could lose its grip on power, in which case
the country could break apart , as it has numerous times in the past. It was less than 100 years ago that
cities and in the countryside.
Chinas provinces, ruled by warlords, were at war with one another. United or divided, Chinas nuclear arsenal would make it Asias
undisputed superpower if the United States were to withdraw from the region. From Korea and Japan in the North to New Zealand in
fact, the central government might not be able to prevent mass migration southward, even if it wanted to. In Europe, severe
economic hardship would revive the centuries-old struggle between the left and the right. During the 1930s, the Fascists movement
arose and imposed a police state on most of Western Europe. In the East, the Soviet Union had become a communist police state
It is difficult to judge
whether Europes democratic institutions would hold up better this time
even earlier. The far right and the far left of the political spectrum converge in totalitarianism.
that they did last time. England had an empire during the Great Depression. Now it only has banks. In a severe worldwide
nearly demilitarized today when compared with the late 1930s. Lacking a nuclear deterrent of its own, it could be subject to Russian
intimidation. While Germany could appeal for protection from England and France, who do have nuclear capabilities, it is uncertain
that would buy Germany enough time to remilitarize before it became a victim of Eastern aggression. As for the rest of the world, its
prospects in this disaster scenario can be summed up in only a couple of sentences. Global economic output could fall by as much
as half, from $60 trillion to $30 trillion. Not all of the worlds seven billion people would survive in a $30 trillion global economy.
Starvation would be widespread.
Food riots would provoke political upheaval and myriad big and small
conflicts around the world. It would be a humanitarian catastrophe so extreme as to be unimaginable for the
current generation, who, at least in the industrialized world, has known only prosperity. Nor would there be reason to hope that the
New Great Depression would end quickly. The Great Depression was only ended by an even more calamitous global war that killed
approximately 60 million people.
(Zbigniew, Strategic Vision: America and the Crisis of Global Power, google books,
ldg)
An American decline would impact the nuclear domain most profoundly by inciting a crisis of
confidence in the credibility of the American nuclear umbrella. Countries like South Korea, Taiwan, Japan, Turkey, and even Israel,
among others, rely on the United States extended nuclear deterrence for security . If they were to see the United
States slowly retreat from certain regions, forced by circumstances to pull back its
guarantees, or even if they were to lose confidence in standing US guarantees, because
of the financial, political, military, and diplomatic consequences of an American decline, then they will have to seek security
elsewhere. That elsewhere security could originate from only two sources: from nuclear weapons of ones own or from
the extended deterrence of another powermost likely Russia, China, or India. It is possible that countries that feel threatened by
the ambition of existing nuclear weapon states, the addition of new nuclear weapon states, or the decline in the reliability of
American power would develop their own nuclear capabilities. For crypto-nuclear powers like Germany and Japan, the path to
nuclear weapons would be easy and fairly quick, given their extensive civilian nuclear industry, their financial success, and their
technological acumen. Furthermore, the continued existence of nuclear weapons in North Korea and the potentiality of a nuclearcapable Iran could prompt American allies in the Persian Gulf or East Asia to build their own nuclear deterrents. Given North Koreas
increasingly aggressive and erratic behavior, the failure of the six-party talks, and the widely held distrust of Irans megalomaniacal
leadership, the guarantees offered by a declining Americas nuclear umbrella might not stave off a regional nuclear arms race
nuclear assurances to their respective client states. Not only could this signal a renewed regional nuclear arms race between these
three aspiring powers but it could also create new and antagonistic spheres of influence in Eurasia
driven by competitive nuclear deterrence. The decline of the United States would thus precipitate drastic changes to the nuclear
An increase in proliferation among insecure American allies and/or an arms race between the emerging
Asian powers are among the more likely outcomes. This ripple effect of proliferation would
undermine the transparent management of the nuclear domain and increase the likelihood of interstate rivalry,
miscalculation, and eventually even perhaps of international nuclear terror. In addition to the foregoing, in the course
domain.
of this century the world will face a series of novel geopolitical challenges brought about by significant changes in the physical
environment. The management of those changing environmental commonsthe growing scarcity of fresh water, the opening of the
Arctic, and global warmingwill require global consensus and mutual sacrifice. American leadership alone is not enough to secure
The latter is likely to be the case especially in regard to the increasingly scarce water resources in many countries. According to the
United States Agency for International Development (USAID), by 2025 more than 2.8 billion people will be living in either waterscarce or water-stressed regions, as global demand for water will double every twenty years.9 While much of the Southern
Hemisphere is threatened by potential water scarcity, interstate conflictsthe geopolitical consequences of cross-border water
scarcityare most likely to occur in Central and South Asia, the Middle East, and northeastern Africa, regions where limited water
resources are shared across borders and political stability is transient. The combination of political insecurity and resource scarcity
is a menacing geopolitical combination. The threat of water conflicts is likely to intensify as the economic growth and increasing
demand for water in emerging powers like Turkey and India collides with instability and resource scarcity in rival countries like Iraq
and Pakistan. Water scarcity will also test Chinas internal stability as its burgeoning population and growing industrial complex
combine to increase demand for and decrease supply of usable water.
scale conflicts. The slow thawing of the Arctic will also change the face of the international competition for important resources.
With the Arctic becoming increasingly accessible to human endeavor, the five Arctic littoral statesthe United States, Canada,
Russia, Denmark, and Norwaymay rush to lay claim to its bounty of oil, gas, and metals. This run on the Arctic has the potential to
cause severe shifts in the geopolitical landscape, particularly to Russias advantage. As Vladimir Radyuhin points out in his article
entitled The Arctics Strategic Value for Russia, Russia has the most to gain from access to the Arctic while simultaneously being
the target of far north containment by the other four Arctic states, all of which are members of NATO. In many respects this new
great game will be determined by who moves first with the most legitimacy, since very few agreements on the Arctic exist. The first
Russian supertanker sailed from Europe to Asia via the North Sea in the summer of 2010.10 Russia has an immense amount of land
and resource potential in the Arctic. Its territory within the Arctic Circle is 3.1 million square kilometersaround the size of India
and the Arctic accounts for 91% of Russias natural gas production, 80% of its explored natural gas reserves, 90% of its offshore
hydrocarbon reserves, and a large store of metals.11 Russia is also attempting to increase its claim on the territory by asserting that
its continental shelf continues deeper into the Arctic, which could qualify Russia for a 150-mile extension of its Exclusive Economic
Zone and add another 1.2 million square kilometers of resource-rich territory. Its first attempt at this extension was denied by the
UN Commission on the Continental Shelf, but it is planning to reapply in 2013. Russia considers the Arctic a true extension of its
northern border and in a 2008 strategy paper President Medvedev stated that the Arctic would become Russias main strategic
resource base by 2020.12 Despite recent conciliatory summits between Europe and Russia over European security architecture, a
large amount of uncertainty and distrust stains the Wests relationship with Russia. The United States itself has always maintained a
strong claim on the Arctic and has continued patrolling the area since the end of the Cold War. This was reinforced during the last
month of President Bushs second term when he released a national security directive stipulating that America should preserve the
global mobility of the United States military and civilian vessels and aircraft throughout the Arctic region. The potentiality of an
American decline could embolden Russia to more forcefully assert its control of the Arctic and over Europe via energy politics;
though much depends on Russias political orientation after the 2012 presidential elections. All five Arctic littoral states will benefit
from a peaceful and cooperative agreement on the Arcticsimilar to Norways and Russias 2010 agreement over the Barents Strait
and the geopolitical stability it would provide. Nevertheless, political circumstances could rapidly change in an environment where
environmental commons and the one with the greatest potential geopolitical impact.
the Northeast and South. Furthermore, any legitimate action inhibiting global climate change will require unprecedented levels of
self-sacrifice and international cooperation. The United States does consider climate change a serious concern, but its lack of both
long-term strategy and political commitment, evidenced in its refusal to ratify the Kyoto Protocol of 1997 and the repeated defeat of
climate-change legislation in Congress, deters other countries from participating in a global agreement. The United States is the
second-largest global emitter of carbon dioxide, after China, with 20% of the worlds share. The United States is the number one per
capita emitter of carbon dioxide and the global leader in per capita energy demand. Therefore,
US leadership is
The protection
and good faith management of the global commonssea, space, cyberspace, nuclear
proliferation, water security, the Arctic, and the environment itselfare imperative to the
long-term growth of the global economy and the continuation of basic
geopolitical stability. But in almost every case, the potential absence of constructive and
influential US leadership would fatally undermine the essential communality of the
global commons. The argument that Americas decline would generate global insecurity, endanger some vulnerable
growth, Indias relatively low emissions rate, and Chinas current reluctance to assume global responsibility.
states, produce a more troubled North American neighborhood, and make cooperative management of the global commons more
difficult is not an argument for US global supremacy. In fact, the strategic complexities of the world in the twenty-first century
resulting from the rise of a politically self-assertive global population and from the dispersal of global powermake such supremacy
unattainable. But in this increasingly complicated geopolitical environment, an America in pursuit of a new, timely strategic vision is
crucial to helping the world avoid a dangerous slide into international turmoil.
EXT: Solvency
ECPA reform key to rebuild consumer trust- need to solve
immediately
Cris DeBiase, 15, Government Affairs Assistant for the Direct Marketing
Association, Data Privacy Day: ECPA Isnt Vintage, Its Out-of-Style, 1/28/15,
http://thedma.org/advance/capitol-matters-advocacy-compliance/data-privacy-dayecpa-isnt-vintage-style/
customer trust is the key to building the relationships
that grow your brand. Consumer confidence is the bedrock of the entire
Data-Driven Marketing Economy, so marketers have every incentive to earn and safeguard that
Any good marketer knows that
trust. It is for just that reason that DMAs Guidelines for Ethical Business Practice have provided a clear path for
of the diverse Digital Due Process Coalition, continues the push today to update the law. As one of DMAs Five
Fundamentals for the Future, the upcoming ECPA reform bills sponsored by Representatives Jared Polis (D-CO) and
Kevin Yoder (R-KS) in the House and by Senators Patrick Leahy (D-VT) and Mike Lee (R-UT) in the Senate are of high
priority in our legislative efforts around data policy. Whats the Hold Up?
John P. Mello Jr., "US Snooping Costs High-Tech Sector $35B and Counting", June 10
2015, E-Commerce Times, www.ecommercetimes.com/story/82160.html
Other countries' concerns over U.S. government surveillance programs
likely will cost American businesses more than US$35 billion, according to
a report released Tuesday by the Information Technology & Innovation
Foundation. Originally it was thought that the fallout from Edward Snowden's
revelations of U.S. mass surveillance programs would be limited to cloud service providers,
but the impact has reached beyond that sector, the ITIF found. "Since then, it has become
clear that the U.S. tech industry as a whole , not just the cloud computing
sector, has underperformed as a result of the Snowden revelations,"
report.
says the
likely far exceed ITIF's initial $35 billion estimate." Opportunity Strikes
Surveillance concerns have been used in effective marketing campaigns in
other countries to grab business from U.S. companies. Moreover, those
concerns have been used as a pretext to put into place protectionist laws
that put U.S. tech firms at a competitive disadvantage. "While some defenders of
these policies have asserted that they are designed to increase the privacy or security of their citizens' data, it is
limit the ability of a country's own firms to innovate," the report maintains, "by shielding them from international
they're not addressing this issue head-on," said ITIF Senior Analyst Daniel Castro, coauthor
of the report. American companies have taken some measures -- such as
investing in data encryption and overseas data centers -- to build trust for
their wares in foreign markets, but more is needed from government , the
report says. "We really need to see top-level U.S. government leadership
coming in saying a balanced approach to this is needed . It's not just about
surveillance and law enforcement. It's also about the economic consequences," Castro told the E-Commerce Times.
"Until that happens, industry can do a lot, but they're not going to solve
this problem on their own,"
tech industry learns to play the Washington game, noted IT Harvest Chief Research Analyst Richard Stiennon, who
was among the first to predict the economic consequences of Snowden's revelations. "It's pretty typical for
government not to recognize players in the economy until they've got significant money in lobbying," he told the ECommerce Times.
The report would reveal: (i) the number of times in the last five years that law enforcement officers obtained
communications content, transactional information and subscriber information under ECPA, (ii) the average length
of time it takes for providers to respond to law enforcement demands as well as the number of times a judge
required a provider to appear and explain any failure to comply with a warrant, (iii) the number of times in the last
five years law enforcement officers requested delayed notification to a subscriber or customer; and (iv) whether
requiring a warrant for content triggers an increase in emergency disclosures to law enforcement that providers
have discretion to make. This report will shed light on law enforcements use of the authority it has under ECPA and
will help the public understand the extent of government surveillance of stored communications.
ECPA literally
predates the Internet, so it predates the widespread use of home
computers, email, and social media. It predates cloud storage . Almost any
30 year-old law probably requires updating, but ECPA is so out-of-date
that it demands it. Because ECPA is so outdated, right now virtually all of your electronic
life is subject to warrantless search and seizure. In the strange kind of twist of law that
electronically, including email, business data, your photographs, social media, etc. But
arises when laws are written before we understand what were regulating, ECPA currently gives protection to
and actually get something done that the American people would almost universally see as beneficial to their daily
lives.
A new source of US soft power has come from the recent innovations in
technology, many of which have emerged from Silicon Valley in California.
Millions of people want a smartphone or access to Google. Social media
has given a voice to ordinary people and has been co-opted into fuelling
revolutions and uprisings, even if the aims do not always chime with "American" values. Lt Colonel
Steven Cole Lt Col Steven Cole says his aim is education Facebook and Twitter are
global brands with American origins, burnishing the country's reputation
for creativity and transformation and possibly creating more space for
free speech along the way. Twitter insists that it is only a conduit for its users and not a tool of soft
power or anything else. But Luis Villa of Wikipedia thinks US soft power is integral to
the internet: "It's sometimes difficult to disentangle the values of the
internet and the values of the US, particularly, freedom of speech, but
that does sometimes clash with how people think of speech in the rest of
the world." Soft power, via the internet or the cinema, is one way to
persuade people that your values are universal values.
1AR Ext
Soft Power Solves War key to solving the threats hard power
cant
Kristin Lord 12/23/14 (Kristin M. Lord is President and CEO of IREX, a global
education and development NGO Soft Power Outage
http://foreignpolicy.com/2014/12/23/soft-power-outage/ accessed 7/27/15 BP)
To be clear, investing in soft power does not negate the need for military
force or investments in hard power. Indeed, some applications of soft power
must be backed by hard power, the way bank loans must be backed by underlying
financial solvency, and there are objectives (defeating the Islamic State comes to
mind) that are nearly impossible to achieve without at least some use of force.
However, hard power is not appropriate to every mission, and in some
cases, it may even be counterproductive, generating a backlash that
multiplies the severity of the threat. Countering violent extremism is a case in
point: Force has a role, but its overuse can draw more recruits to the cause.
Meanwhile, undercutting the appeal of extremist ideologies can be
accomplished most effectively through non-military means. Most military
leaders would agree, and I find them, as a general rule, to be among the
strongest backers of soft power. It was not so long ago that a U.S. defense
secretary, Robert Gates, proved one of the most persuasive voices appealing,
alongside then-Secretary of State Hillary Clinton, for more resources for diplomacy
and development. Ret. Gen. James Mattis put it even more bluntly in a statement to
the Senate Armed Services Committee in March, 2013: If you dont fund the
State Department [foreign operations] fully, then I need to buy more
ammunition. Is a reinvigorated soft power strategy possible at a time of
fiscal pressure and extreme partisan division? I think the answer is yes .
Though conventional wisdom suggests that a Republican-dominated Congress will
slash funding, my experience suggests otherwise. Party leaders with deep expertise
in foreign policy Senators John McCain and Lindsey Graham (R-SC),
Representatives Mac Thornberry (R-TX) and Kay Granger (R-TX) in the House, to give
just a few examples are thoughtful and committed internationalists who
understand soft power. And many fiscal conservatives grasp that nonmilitary
strategies can be cost-effective ways of promoting U.S. national security objectives
and obviating the need to deploy ground forces, even as they demand proof that
such strategies deliver a return on investment. A focus on soft power is well
matched to the national security challenges of our time, which will require
the United States and its allies to counter rapidly evolving ideological
challenges and build coalitions of like-minded partners. Whether the
threat is countering violent extremism or reversing the trend of rising
authoritarianism, such efforts require moral purpose, a strong sense of
shared values, and broad networks of relationships that span sectors and
issue areas all of which should be the United States strong suits. But
they will require the United States to strengthen its soft power arsenal
with the same diligence applied to hard power. It will require the United
States to protect its moral authority.
AT: Terror DA
2AC
UQ CT Failing
Counter-terrorism ineffective now
David Fidler 6/18, James Louis Calamaras Professor of Law at Indiana University
Maurer School of Law, "ISILs Online Offensive: Challenges in Countering ISIL in
Cyberspace," 6/18/15, justsecurity.org/24017/isils-online-offensive-challengescountering-isil-cyberspace/?print
The US-led campaign against ISIL is going well in neither the terrestrial
nor cyber realms. ISILs successful offensives against Ramadi in Iraq and Palmyra in
Syria in late May triggered controversies that the Paris meeting of the anti-ISIL coalition in early June did little to
resolve. The State Department followed this bad news with an unflattering post-Paris
assessment of US and coalition efforts against ISILs online offensive. The New
York Times described this document as painting a dismal picture of the efforts by the
Obama administration and its foreign allies to combat the Islamic States message
machine, portraying a fractured coalition that cannot get its own
message straight . This perspective reinforced a Washington Post article from early May
about problems with US counter-militant messaging in the Bush and Obama
administrations.
No Link ECPA
Counter-terrorism is not dependent on metadata
Peterson 13 [Andrea Peterson covers technology policy for The Washington
Post, with an emphasis on cybersecurity, consumer privacy, transparency,
surveillance and open government. She also delves into the societal impacts of
technology access and how innovation is intertwined with cultural development.
December 23, 2013 https://www.washingtonpost.com/blogs/theswitch/wp/2013/12/23/obama-cant-point-to-a-single-time-the-nsa-call-recordsprogram-prevented-a-terrorist-attack/ Obama cant point to a single time the NSA
call records program prevented a terrorist attack] (Vaibhav)
National Security Agency defenders, including President Obama, continue to cite the terrorist attack on Sept. 11,
if
he could identify a time when that program stopped a similar attack , President
Obama couldn't. That's because the program hasn't prevented a second 9/11. At
2001 when defending the program that scoops up domestic call records in bulk. But asked specifically, on Friday,
the end of the year news conference, Reuters's Mark Felsenthal asked: As you review how to rein in the National
Security Agency, a federal judge says that, for example, the government has failed to cite a single instance in which
the past continues to be the case, which is that the NSA, in executing this program, believed, based on experiences
from 9/11, that it was important for us to be able to track, if there was a phone number of a known terrorist outside
of the United States calling into the United States, where that call might have gone and that having that data in one
place and retained for a certain period of time allowed them to be confident in pursuing various investigations of
terrorist threats. The president's reliance on a 9/11 narrative is expected. The terrorist attack was a defining
moment for a generation and now serves as a tragic reminder of a time when the U.S. government failed to protect
its citizens. It's understandable that any president would want to be seen as vigilant in preventing another such
But the reason the president can't cite a specific time the phone
meta-data program stopped a similar tragedy is because it hasn't. Law
professor Geoffrey Stone, a member of the presidential task force charged
with reviewing NSA programs, told NBC News the group specifically looked
for times when the program may have helped prevent a terrorist attack,
but "found none." The task force's final report reflects that, saying: Our review suggests that the
information contributed to terrorist investigations by the use of section 215 telephony meta-data
was not essential to preventing attacks and could readily have been
obtained in a timely manner using conventional section 215 orders. But the
attack.
lack of evidence that the program is effective will probably not prevent the NSA's defenders from continuing to
invoke 9/11 to protect the program. Another member of the task force, former acting CIA Director Michael Morell, on
CBS's "Face the Nation" on Sunday, admitted the group had found that " the
nonprofit group. Analysis revealed that much of the evidence it did find could readily have
been obtained in a timely manner using conventional [court] orders. The
study, to be released on Monday, echoes that of a White House-appointed study concluded
last month that the NSA program was not essential to preventing
attacks. President Obama on Friday will deliver his recommendations on the program, which has turned into a
political lightning rod. John McCain, the Republican senator, has called for a congressional inquiry into Americas
broken National Security Agency. There has been overreach, it seems to me, he said. Sometimes these
agencies have done things just because they can. I think we need a select committee in Congress to go over this
whole scenario, because it does overlap many committees. The NSA counterterrorism program, which amasses the
call details number called, time and length of the communications - of nearly every American, has come under
harsh public and political scrutiny since former NSA contractor, Edward Snowden, blew the whistle on the program
last summer. The backlash from the NSA revelations has been international in scale, with even close political allies
of the United States enraged that their private communications were being scooped up in the vast intelligence net.
Intelligence officials, meanwhile, have argued on behalf of the program, saying it helps to unearth terrorist plots,
giving what the Director of National Intelligence, James R. Clapper, called the peace of mind metric. Michael
Morell, a former acting CIA director and a member of the panel, said the program needs to be successful only once
to be invaluable. Incidentally, that was the exact number of cases the NSA program successfully intercepted.
Analysts at the New America Foundation said the massive collection of American citizens telephone metadata
resulted in a single lead when it was discovered that Basaaly Moalin, a San Diego cabdriver who in 2007 and 2008
provided $8,500 to al-Shabaab, Al-Qaedas affiliate in Somalia. The incident involved no risk of attack against the
United States. Moreover, according to the report, the FBI waited two full months to begin an investigation against
America and holds a master's degree from Georgetowns Center for Security
Studies. His work focuses on homegrown extremism and the maintenance of New
America's datasets on terrorism inside the United States and the relative roles of
NSA surveillance and traditional investigative tools in preventing such terrorism.
Prior to working at New America, Mr. Sterman was a contributing editor at Southern
Pulse, and he interned at the Israel Palestine Center for Research and Information in
Jerusalem. He continues to work as a research assistant for Dr. Gary Shiffman on
issues related to sub-state violence and economics. He graduated cum laude from
Dartmouth College in 2012.https://www.newamerica.org/international-security/donsas-bulk-surveillance-programs-stop-terrorists/ DO NSA'S BULK SURVEILLANCE
PROGRAMS STOP TERRORISTS?] (Vaibhav)
However, our review of the governments claims about the role that NSA bulk
surveillance of phone and email communications records has had in
keeping the United States safe from terrorism shows that these claims are
overblown and even misleading. An in-depth analysis of 225 individuals recruited
by al-Qaeda or a like-minded group or inspired by al-Qaedas ideology , and
charged in the United States with an act of terrorism since 9/11, demonstrates that traditional
investigative methods, such as the use of informants, tips from local communities, and targeted
intelligence operations, provided the initial impetus for investigations in the majority of cases, while the
contribution of NSAs bulk surveillance programs to these cases was
minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the
telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content,
under Section 702 of the FISA Amendments Act played a role in 4.4
percent of the terrorism cases we examined, and NSA surveillance under
an unidentified authority played a role in 1.3 percent of the cases we
examined. Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the
traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at,
although its unclear whether these warrants played an initiating role or were used at a later point in the
investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about
them and the governments investigations of these cases: http://natsec.newamerica.net/nsa/analysis).
retraction from NSA Director Alexander in October, 2013: "Would you agree that the 54 cases that keep getting
elaborating. But that didnt stop the apologists. We keep hearing the 54 plots line to this day. As for 9/11, sadly,
the same is true. The government did not need additional mass collection capabilities, like the mass phone records
programs, to find al Mihdhar in San Diego. As ProPublica noted, quoting Bob Graham, the former chair of the Senate
Intelligence Committee: U.S. intelligence agencies knew the identity of the hijacker in question, Saudi national
Khalid al Mihdhar, long before 9/11 and had the ability find him, but they failed to do so. "There were plenty of
opportunities without having to rely on this metadata system for the FBI and intelligence agencies to have located
Mihdhar," says former Senator Bob Graham, the Florida Democrat who extensively investigated 9/11 as chairman of
the capture of Zazi, the so-called New York subway bomber. However, in that case, the Associated Press reported
that the government could have easily stopped the plot without the NSA program, under authorities that comply
with the Constitution. Sens. Ron Wyden and Mark Udall have been saying this for a long time. Both of the
Presidents hand-picked advisors on mass surveillance concur about the telephone records collection. The
Presidents Review Board issued a report in which it stated the information contributed to terrorist investigations
by the use of section 215 telephony meta-data was not essential to preventing attacks, The Privacy and Civil
Liberties Oversight Board (PCLOB) also issued a report in which it stated, we
case First Unitarian Church of Los Angeles v. the NSA case, Sens. Ron Wyden, Mark Udall, and Martin Heinrich stated
that, while the administration has claimed that bulk collection is necessary to prevent terrorism, they have
reviewed the bulk-collection program extensively, and none of the claims appears to hold up to scrutiny. Even
former top NSA official John Inglis admitted that the phone records program has not stopped any terrorist attacks
aimed at the US and at most, helped catch one guy who shipped about $8,000 to a Somalian group that the US has
designated as a terrorist group but that has never even remotely been involved in any attacks aimed at the US.
You cannot
fix any of this by treating the entire population as suspects and then
engaging in suspicionless, blanket collection and processing of personal data. Mass data
collectors can dig deeply into anyones digital persona but dont have the
resources to do so with everyone. Surveillance of the entire population, the
vast majority of whom are innocent, leads to the diversion of limited intelligence
resources in pursuit of huge numbers of false leads . Terrorists are comparatively rare,
so finding one is a needle-in-a-haystack problem. You dont make it easier by throwing more needleless hay on the
move with the times, using modern digital technologies intelligently and through targeted data preservationnot a
mass surveillance regimeto engage in court-supervised technological surveillance of individuals whom they have
reasonable cause to suspect. That is not, however, the same as building an infrastructure of mass surveillance.
Mass surveillance makes the job of the security services more difficult
and the rest of us less secure.
who walks among us, as though Al Qaeda were a fifth column, capable of camouflaging itself within civil society.
Patrick Skinner, a former C.I.A. case officer who works with the Soufan Group, a security company, told me that this
Mass
surveillance, he continued, gives a false sense of security. It sounds great when you say
youre monitoring every phone call in the United States. You can put that in a PowerPoint. But, actually, you
have no idea whats going on. By flooding the system with false
positives, big-data approaches to counterterrorism might actually make it
harder to identify real terrorists before they act. Two years before the Boston Marathon
bombing, Tamerlan Tsarnaev, the older of the two brothers alleged to have committed the attack, was
assessed by the citys Joint Terrorism Task Force. They determined that he
was not a threat. This was one of about a thousand assessments that the
Boston J.T.T.F. conducted that year, a number that had nearly doubled in the previous two years,
image is wrong. We knew about these networks, he said, speaking of the Charlie Hebdo attacks.
according to the Boston F.B.I. As of 2013, the Justice Department has trained nearly three hundred thousand lawenforcement officers in how to file suspicious-activity reports. In 2010, a central database held about three
thousand of these reports; by 2012 it had grown to almost twenty-eight thousand. The bigger haystack makes it
harder to find the needle, Sensenbrenner told me. Thomas Drake, a former N.S.A. executive and whistle-blower
who has become one of the agencys most vocal critics, told me, If
bin Laden may have his finger on the trigger, his grandchildren
may have their fingers on the computer mouse , remarked Frank Cilluffo of the Office of
Future terrorists may indeed see
greater potential for cyberterrorism than do the terrorists of today. Furthermore, as Denning
argues, the next generation of terrorists is now growing up in a digital world, one in which hacking tools
are sure to become more powerful, simpler to use, and easier to access.
Cyberterrorism may also become more attractive as the real and virtual
worlds become more closely coupled. For instance, a terrorist group might
simultaneously explode a bomb at a train station and launch a
Homeland Security in a statement that has been widely cited.
"I believe with every fiber of my being that in the long run we cannot keep
this country safe unless we enlist the power of our most fundamental
values... My administration will make all information available to the
American people so that they can make informed judgments and hold us
accountable." The president's inability to live up to this ideal is
particularly jarring as he defends PRISM. Following the leaks, he's said he is pushing the intelligence
community to release what it can, and rightly insists that the NSA is not listening in on Americans' phone calls.
Those are helpful steps, but should have been raised during the National Archives speech just months into his
security of truly dangerous operatives. Second, Obama stated as recently as late May that the threat from al
Qaeda's core operatives has decreased significantly, shifting to less deadly cells scattered throughout the Middle
East and North Africa.
protection commissioner said the program would "not be legal" in his country. British Foreign Minister William Hague
came under fire in Parliament for his government's participation. If Americans supported these programs, our
adversaries and allies would have no argument. As it is, the next time the United States asks others for help in
tracking terrorists, it's more likely than not that they will question Washington's motives. It's not too late. The
PATRIOT Act is up for reauthorization in 2015. In the context of a diminished threat ,
Obama has said Americans can't have 100 percent security and 100 percent privacy. But you can have an honest
general of the Departments of Defense and Justice and the CIA, NSA, and Office of DNI, mandated by Congress
as part of the Fisa Amendments Act of 2008. That report provides the most detailed official
assessment of the effectiveness of bulk collection, from inception as the President's
Surveillance Program (PSP) in the fall of 2001 until 2007. It is revealing about both the NSA and its bulk collection
program. The NSA's inspector general only reported the agency's top brass beliefs; his report merely quoted then
NSA Director Michael Hayden in his view that there were "no communications more important to NSA efforts to
counterterrorism efforts ". The CIA reported: [W]orking-level CIA analysts and targeting
officers who were read into the PSP had too many competing priorities, and too
many other information sources and analytic tools available to them, to fully
utilize PSP reporting. Officials also stated that much of the PSP reporting was vague or
without context, which led analysts and targeting officers to rely more
heavily on other information sources and analytic tools, which were more easily
accessed and timely than the PSP. The inspector general of the DNI reported that "National
Counterterrorism Center analysts characterized the PSP information as
being a useful tool, but noted that the information was only one of several valuable sources of information available
to them", and " not
bulk collection
to pursue Somali Americans for doing essentially what some Irish Americans did to help the IRA; perhaps not. But
picturing Inspector Clouseau: I did not know the bank was being robbed because I was engaged in my sworn duty
as a police officer.
CT Bad
Counter-terrorism bolsters homegrown terrorism and
devastates international credibility
Alice LoCicero 15, faculty member at Center for Multicultural Training in
Psychology at the Boston Medical Center and adjunct professor at Lesley University,
"Domestic Consequences of US Counter-Terrorism Efforts: Making it Harder to
Prevent Homegrown Terrorism," The Open Psychology Journal 8(32-37),
benthamopen.com/contents/pdf/TOPSYJ/TOPSYJ-8-32.pdf
The effects of counterterrorism policies , especially taken together, appear to have deeply
scarred the American reputation and psyche . Prisoners of war--who were, in a transparent and
ultimately unsuccessful attempt to skirt international treatiescalled enemy combatants, were detained, often with little or no evidence, and with no
had stated clearly in 2009 that he believed it likely that the military had violated the Geneva Conventions in the post 9/11 era. (Soon thereafter,
there. He is now at risk of having his Navy career terminated resulting from his refusal to obey orders that he was convinced were unlawful [16]. This risk
is despite the ratified international principle that following orders is not an acceptable defense for engaging in unlawful behavior, such as cruel and
experience of terror, will have a brutalizing effect similar to that seen in communities that have experienced trauma and violence firsthand [18].
one
cannot avoid being concerned about the potential emergence of new
Considering the medias focus and sometimes idealization of government-sanctioned violence, such as war and brutal treatment of detainees,
values and new norms. Such new norms are likely to be driven
No Terror Impact
No impact the magnitude is empirically tiny
Micah Zenko 6/19, Douglas Dillon fellow in the Center for Preventive Action at
the Council on Foreign Relations, "Terrorism Is Booming Almost Everywhere But in
the United States," 6/19/15, https://foreignpolicy.com/2015/06/19/terrorism-isbooming-almost-everywhere-but-in-the-united-states-state-department-report/
Third, even with these worsening trends, terrorism still represents only a
small fraction of overall violent deaths . The annual number of violent deaths worldwide is
508,000, according to the Global Burden of Armed Violence 2015: Every Body Counts report. In other words,
less
than 7 percent of violent deaths are a result of acts of terrorism. Compare the
32,727 terrorist fatalities to the estimated 377,000 people who were killed, collectively, in
interpersonal violence, gang violence, or economically motived crimes.
Citizens of several Central American and Caribbean countries are still more likely to be the victim of homicide than
there
have always been disagreements with the methodologies employed . In
2003, under the leadership of its then-director John Brennan, the Terrorist Threat Integration
Center (TTIC) provided wildly inaccurate data to the CIA, which was then
incorporated into the State Department report. The TTIC found there had been 307
Iraqis or Syrians are from terrorism. Fourth, readers of the State Department report should know that
fatalities, but after Secretary of State Colin Powell directed an exhaustive re-examination of the evidence, the total
amount grew by 104 percent to 725. More recently, the Chicago Project on Security and Terrorism charged that the
current compilers of the State Departments statistics, the University of Marylands National Consortium for the
Study of Terrorism and Responses to Terrorism, undercounted the violence during the Iraq war, which subsequently
terrorism continues to
pose an extremely small threat to the United States and its citizens. The number
of Americans killed by international terrorism grew over the past year from 16 to 24.
However, this is still fewer than the average number that has tragically been killed
each year since 9/11, which is 28. Moreover, not one U.S. citizen died from
terrorism within the United States last year. Rather, as has been consistent with previous
years, Americans die from terrorism when they travel to war zones, or areas
makes the recent increase in violence more extreme than it really is. Finally,
marked by violent instability: of the 24 deaths last year, 10 were in Afghanistan, 5 in Israel or the Occupied
Territories, 3 in Somali, 3 in Syria, and 1 a piece in Egypt and the United Arab Emirates. See the chart below to
visualize how relatively safe Americans are from terrorism when compared to the rest of the world. At todays press
briefing on the findings of the report, Ambassador-at-Large and Coordinator for Counterterrorism at the State
Department Tina Kaidanow pointed out that numbers
No Nuke Terror
No nuclear terror
John J. Mearsheimer 14, R. Wendell Harrison Distinguished Service Professor of
Political Science at the University of Chicago, America Unhinged, January 2,
nationalinterest.org/article/america-unhinged-9639?page=show
Am I overlooking the obvious threat that strikes fear into the hearts of so many Americans, which is terrorism?
Not at all. Sure, the United States has a terrorism problem . But it is a minor
threat . There is no question we fell victim to a spectacular attack on September 11, but it did not cripple
the United States in any meaningful way and another attack of that magnitude
is highly unlikely in the foreseeable future. Indeed, there has not been a single instance
over the past twelve years of a terrorist organization exploding a primitive
bomb on American soil, much less striking a major blow. Terrorismmost of it arising from domestic groups
was a much bigger problem in the United States during the 1970s than it has been since the
Twin Towers were toppled. What about the possibility that a terrorist group might
obtain a nuclear weapon? Such an occurrence would be a game changer, but the chances of that
happening are virtually nil . No nuclear-armed state is going to supply
terrorists with a nuclear weapon because it would have no control over how the
recipients might use that weapon. Political turmoil in a nuclear-armed state could in
theory allow terrorists to grab a loose nuclear weapon, but the United States
already has detailed plans to deal with that highly unlikely contingency.
Terrorists might also try to acquire fissile material and build their own bomb.
But that scenario is extremely unlikely as well : there are significant
obstacles to getting enough material and even bigger obstacles to
building a bomb and then delivering it. More generally, virtually every country has a
profound interest in making sure no terrorist group acquires a nuclear
weapon, because they cannot be sure they will not be the target of a nuclear
attack, either by the terrorists or another country the terrorists strike. Nuclear terrorism, in short, is not
a serious threat . And to the extent that we should worry about it, the main remedy is to encourage and help other
states to place nuclear materials in highly secure custody.
1AR
Ext. CT Failing
US counter-terrorism is failing after successful ISIL offensives
in Iraq and Syria military alliances are fragmented and recent
State Department reports show weak counter-militant
messaging thats Fidler
Forces are insufficient and targeted killing is ineffective
Chad Groening 6/18, military and political correspondent, "Analyst: Obama's
anti-ISIS approach futile," 6/18/15, www.onenewsnow.com/nationalsecurity/2015/06/18/analyst-obamas-anti-isis-approach-futile
During Wednesday's testimony before the House Armed Services Committee, Defense Secretary Ash Carter
strategy of providing air support for U.S. trained ground troops from
other countries. The Pentagon had initially envisioned training 24,000 Iraqi security forces. But according
to Secretary Carter, the U.S. has received only enough recruits to be able to train about 7,000 in addition to about
2,000 counterterrorism service personnel. Maginnis also
really that
effective
terrorist organization. "I would argue that the strategy itself, if we were only after a few people, that would be
now that all those people that we kill are back-filled by two
it's
obviously failing ." The retired Army officer says the president must articulate
or three people standing in line to take their place or other groups standing in line to take their place,
Bulk data
collection creates false leads, ties up investigative resources and , essentially,
evidence that Section 215 has done little to protect Americans and should be put to rest, said American Civil Liberties Union Staff Attorney Alex Abdo.
undermines national security , said Stephen Kohn, an attorney at Kohn, Kohn & Colapinto,
FBI dependency on that bulk data collection
indicates that the agency is lacking the appropriate resources for
LLP and advocate for government whistleblowers. Also, increased
Ext. CT Bad
Counter-terrorism causes widespread violations of
international treaties devastates US credibility and strengths
terrorist recruitment initiatives thats LoCicero
Counter-terrorism fails and bolsters terrorist recruitment
Alice LoCicero 15, faculty member at Center for Multicultural Training in
Psychology at the Boston Medical Center and adjunct professor at Lesley University,
"Domestic Consequences of US Counter-Terrorism Efforts: Making it Harder to
Prevent Homegrown Terrorism," The Open Psychology Journal 8(32-37),
benthamopen.com/contents/pdf/TOPSYJ/TOPSYJ-8-32.pdf
After the APA withdrew support for their work, task force members published the reports in the 2006
book, Collateral Damage [4]. They wrote about specific likely ill effects of policies such
as the use of color-coded designations to signal levels of terrorism threat .
In the foreword to the book, psychologist Phil Zimbardo argues that these threat
level changes generate fear of an undefined danger without providing
suggestions for possible actions . This omission inadvertently enhances the
intended effects of terrorist actions : psychological terror, crippling
anxiety, and difficulty in making decisions on a rational basis. In short,
Americans were even more likely to respond to terrorism with panic than
with reasonable actions. This panic was a result of being told to be afraid of a
vague threat by an unknowable enemy and not being told how to cope or how to reduce the threat [5]. Such
unproductive fear of terrorism has been shown to have measurable
consequences, such as psychological distress and constriction of activities [6]. Other effects of
US counterterrorism policies accurately predicted by the APA task force
include increases in hate crimes against
marginalized groups; intolerance for antiwar perspectives; acceptance of measures
favoring security over freedom; and enhanced recruitment by terrorist groups , who
use negative reactions to US policies as a recruiting tool. The collective
adverse impacts of the ongoing counter terrorism policies have had the
have also come to pass. These effects
Ext. No Impact
The impact is tiny recent analysis shows terrorism causes
under 7% of violent deaths, and the vast majority of casualties
arent domestic thats Zenko
No impact threats are decreasing and current enforcement is
sufficient
Brian Michael Jenkins 14, MA in History from University of California, Los Angeles,
Andrew Liepman, Henry H. Willis, "Identifying Enemies Among Us Evolving Terrorist
Threats and the Continuing Challenges of Domestic Intelligence Collection and
Information Sharing," 2014,
www.rand.org/content/dam/rand/pubs/conf_proceedings/CF300/CF317/RAND_CF317.
pdf
Todays threat environment is more diffuse. Al Qaeda is more decentralized, more dependent
on its affiliates and allies, and reliant on its ability to inspire homegrown recruits to carry out terrorist
attacks. It is still unquestionably a dangerous organization, but its ability to launch a 9/11-scale
spectacular has been substantially lessened, if not eliminated . Al Qaedas
international plotting persists, but fewer of the plots are core-connected. Al Qaeda
affiliates and homegrown terrorist plots now constitute a bigger part of the threat. While al Qaeda remains
committed to ambitious strategic attacks, it also has embraced do-it-yourself terrorism, exhorting followers to do
whatever they can, wherever they are. Thus far, however, its
terrorists have achieved only limited success . Al Qaeda has exploited the turmoil created
by the political upheavals in Libya, Tunisia, Egypt, Yemen, and Syria. The distraction of established security
mechanisms in the region has created a more permissive environment for militants and extremistsboth those with
links to al Qaeda and like-minded, locally focused groups across the region, including in the Sahara, the Sahel, the
Sinai Peninsula, Yemen, and Syria. In Afghanistan, al Qaeda, although weakened, remains well positioned to benefit
from Taliban advances as U.S. and allied forces withdraw. And as evidenced by recent revelations, al Qaedas
presence and abilities overseas remain active, especially in the Arabian Peninsula. The
the kind of
traction
threat of
years ago, when authorities became aware of a number of Somali-Americans who were returning to Mogadishu to
fight alongside al Qaeda affiliate al Shabaab. (There is now concern about Western recruits going to fight in Syrias
civil war.) Despite more than 200 arrests in the United States since 9/11 for
providing material support to jihadist groups or, more seriously, for plotting terrorist attacks in the United States,
Affairs and International Trade Canada, Evaluating the Threat of Nuclear Terrorism:
Cutting Through the Rhetoric,
http://www.ruor.uottawa.ca/fr/bitstream/handle/10393/30520/KWOK,%20Augustine
%2020139.pdf?sequence=1
Furthermore, if terrorists were able to purchase fissile materials, they would
still have to find a way to transport the materials from point of purchase,
to assembly point, to destination point. There are a number of initiatives set up in
order to prevent such transit from being possible . Through the Global Initiative to Combat
Nuclear Terrorism (GICNT), the Global Partnership Against the Spread of Weapons and Materials of Mass Destruction
countries
identified with major transshipment points have had their transport and
maritime security infrastructure upgraded and supplemented with
(GP), the US National Nuclear Security Administrations (NNSA) Megaports initiative and INTERPOL;
of material.
2AC Frontline
Talent shortages will restrict growth of the big data sector
regardless of the plan
Manyika et al 11 (May 2011. McKinsey Global Institute is a research contracting firm. This project was
led by James Manyika, the director of McKinsey Global Institute and a former leader within technology companies
where he focused on innovation, growth, and strategy. Michael Chui also assisted in leading the research. Chui is a
partner of McKinsey Global Institute where he specializes in research on the impact of information tech and
innovation on businesses, the econ, and society. Big Data: The Next Frontier for Innovation, Competition, and
Productivity McKinsey Global Institute.
http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation //HS)
data-bad-science
If Star Trek: The Next Generation were to return to TV in the 21st century, Lt.
Commander Datas nickname would be Big. Big Data, after all, is the
biggest buzzword of the new millennium. Its everywhere, from genomics,
biomics and a bunch of other omics to the NSAs database on writers who
mention NSA in their blogs. Social networks, financial networks, ecological
networks all contain vast amounts of data that no longer overwhelm computer hard
drive storage capabilities. Scientists are now swimming in a superocean of endless
information, fulfilling their wildest dreams of data nirvana. What a nightmare. You
see, scientists usually celebrate the availability of a lot of data. Most of them
have been extolling all the research opportunities that massive databases
offer. But perhaps thats because everybody isnt seeing the big data
picture. Here and there you can find warnings from some experts that Big
Data has its downsides. Scientific advances are becoming more and more
data-driven, write statistician Jianqing Fan of Princeton University and
colleagues. The massive amounts of data bring both opportunities and new
challenges to data analysis. For one thing, huge datasets are seductive. They
invite aggressive analyses with the hope of extracting prizewinning scientific
findings. But sometimes Big Data In means Bad Data Out. Wringing intelligent
insights from Big Data poses formidable challenges for computer science,
statistical inference methods and even the scientific method itself.
Computer scientists, of course, have made the accumulation of all this big
data possible by developing exceptional computing power and information
storage technologies. But collecting data and storing information is not
the same as understanding it. Figuring out what Big Data means isnt the
same as interpreting little data, just as understanding flocking behavior in
birds doesnt explain the squawks of a lone seagull. Standard statistical tests
and computing procedures for drawing scientific inferences were designed to
analyze small samples taken from large populations. But Big Data provides
extremely large samples that sometimes include all or most of a
population. The magnitude of the task can pose problems for
implementing computing processes to do the tests. Many statistical
procedures either have unknown runtimes or runtimes that render the
procedure unusable on large-scale data, writes Michael Jordan of the
University of California, Berkeley. Faced with this situation, gatherers of
large-scale data are often forced to turn to ad hoc procedures that may
have poor or even disastrous statistical properties. Sounds bad. But it gets
worse. Not only do Big Data samples take more time to analyze, they also typically
contain lots of different information about every individual that gets sampled
which means, in statistics-speak, they are high dimensional. More dimensions
raises the risk of finding spurious correlations apparently important links
that are actually just flukes.
2AC Retail
Decline in retail sector doesnt signal economic collapse
Craig Adeyanju, Contributor to the Street, 7/22, Bad Retail Sales Data Doesn't
Necessarily Mean Economic Growth Is Coming to an End,
http://www.thestreet.com/story/13221445/2/bad-retail-sales-data-doesntnecessarily-mean-economic-growth-is-coming-to-an-end.html
Don't panic when you see retail sales slipping -- it doesn't necessarily mean
that the economic expansion is coming to an end. In June, retail sales
declined 0.3% from the May level, coming in at a seasonally adjusted $442
billion. This decline, coupled with the downward retail sales revision for
the previous two months might make you think that economic growth is
tapering. You wouldn't be the first to make that assumption. Comparing this
economic expansion to the last, looking at retail sales, we see that this
isn't necessarily the case. There was an economic expansion between November
2001 and December 2007 -- the fourth longest economic expansion period since
October 1945. That's a good basis for comparison since it's close to the current
economic climate. The economic realities, such as technological advancement and
the dominant sectors of the economy, are somewhat similar. Let's take a look at the
data: There is no major difference between retail sales trends during the
previous expansion and now. In fact, of the 72 months between 2002 and 2007,
retail sales went up 48 months, dipped 22 months and remained unchanged two
months. Of the 72 months between 2009 and 2014, retail sales went up 52 months,
dipped 17 months and remained unchanged three months. Another thing to note
in the data is that the percentage retail sales decline during the economic
expansion period was worse than the current recovery. On average, retail
sales dipped 0.756% between 2002 and 2007, while the dip was just 0.595%
between 2009 and 2014. Decreases in retail sales often follow months of impressive
retail sales -- mostly the months that had over 1% increase. While the trend is not
true for every dip, it is the case for about 80% of the dips. And, as the data shows,
this was exactly the case for the dip in June -- following a large increase in May. The
most probable explanation for this is that, having spent so much in a given month,
consumers actually have less need to spend so much the following month
to build on the prior month's increased spending. And perhaps this is the
ultimate takeaway from historical data. Dips in retail sales don't necessarily
mean the economy is struggling. It could simply mean consumers have
purchased so much in a given month that there is no pressing need to
spend even more in following month. Moreover, the fact that it is rare to find
consecutive months of declines further strengthens the argument that dip
in retail sales is more of a sign that consumers don't have as much need
as the month before.
companies in their use of big data understand that their IT initiatives will be a crucial source of competitive
also actively seek out and implement big-data-based innovations that will give them longterm competitive
tells a cautionary tale. RFID held the promise of providing a source of supply chain data that could be exploited
using big data techniques. In the early days, RFID reader reliability was far worse than originally expected,
necessitating manual inputs to correct for reader errors. This destroyed the productivity gains expected from
deploying this technology. Adoption slowed, RFID tags were in lower demand, and per-tag costs did not decline as
quickly as anticipated, as economies of scale were muted. Higher tag prices hurt the business case for further RFID
deployment, reinforcing a negative cycle in which the application of big data levers based on this technology has
hire big data talent in sufficient numbers and then involve these hires in strategic decisions and planning will take
the fullest advantage of value-creation opportunities at the expense of their less nimble competitors.
(Samuel, Economic Shocks and Conflict: The (Absence of?) Evidence from
Commodity Prices, November,
http://www.chrisblattman.com/documents/research/2011.EconomicShocksAndConfli
ct.pdf?9d7bd4, ldg)
VI. Discussion and conclusions A. Implications for our theories of political instability and conflict The state is not a prize?Warlord
politics and the state prize logic lie at the center of the most influential models of conflict, state development, and political
Perhaps
shocks are the wrong test. Stocks of resources could matter more than price shocks (especially if shocks are transitory). But
combined with emerging evidence that war onset is no more likely even with rapid increases in known oil reserves (Humphreys
2005; Cotet and Tsui 2010) we regard the state prize logic of war with skepticism.17 Our main political economy models may need a
new engine. Naturally, an absence of evidence cannot be taken for evidence of absence. Many of our conflict onset and ending
results include sizeable positive and negative effects.18 Even so, commodity price shocks are highly influential in income and should
provide a rich source of identifiable variation in instability. It is difficult to find a better-measured, more abundant, and plausibly
resource revenues drive state capacity?State prize models assume that rising revenues raise the value of the capturing the state,
but have ignored or downplayed the effect of revenues on self-defense. We saw that a growing empirical political science literature
takes just such a revenue-centered approach, illustrating that resource boom times permit both payoffs and repression, and that
stocks of lootable or extractive resources can bring political order and stability. This countervailing effect is most likely with
transitory shocks, as current revenues are affected while long term value is not. Our findings are partly consistent with this state
capacity effect. For example, conflict intensity is most sensitive to changes in the extractive commodities rather than the annual
agricultural crops that affect household incomes more directly. The relationship only holds for conflict intensity, however, and is
somewhat fragile. We do not see a large, consistent or robust decline in conflict or coup risk when prices fall. A reasonable
interpretation is that the state prize and state capacity effects are either small or tend to cancel one another out. Opportunity cost:
Victory by default?Finally, the inverse relationship between prices and war intensity is consistent with opportunity cost accounts,
but not exclusively so. As we noted above, the relationship between intensity and extractive commodity prices is more consistent
with the state capacity view. Moreover, we shouldnt mistake an inverse relation between individual aggression and incomes as
evidence for the opportunity cost mechanism. The same correlation is consistent with psychological theories of stress and
aggression (Berkowitz 1993) and sociological and political theories of relative deprivation and anomie (Merton 1938; Gurr 1971).
Microempirical work will be needed to distinguish between these mechanisms. Other reasons for a null result. Ultimately,
however, the fact that commodity
onsets , but some effect on ongoing conflict, suggests that political stability might be less
sensitive to income or temporary shocks than generally believed. One possibility
is that successfully mounting an insurgency is no easy task. It comes with considerable risk, costs, and coordination challenges.
Another possibility is that the counterfactual is still conflict onset. In poor and fragile nations, income shocks of one type or another
are ubiquitous.
then other shocks may trigger war even in the absence of a price shock.
The same argument has been made in debunking the myth that price shocks led to fiscal collapse and low growth in developing
Sambanis (2006) have shown that the majority of published conflict results are fragile, though they focus on timeinvariant
regressors and not the time-varying shocks that have grown in popularity. We are also concerned there is a file drawer problem
(Rosenthal 1979). Consider this decision rule: scholars that discover robust results that fit a theoretical intuition pursue the results;
but if results are not robust the scholar (or referees) worry about problems with the data or empirical strategy, and identify
additional work to be done. If further analysis produces a robust result, it is published. If not, back to the file drawer. In the
2AC Disease
Disease doesnt cause species extinction- alt causes
Michael Hood and Amanda Gibson, 10, Associate Professor of Biology; Chair of
Biology @Amherst and PhD candidate at Indiana University's Evolution, Ecology and
Behavior Program, Disease Likely Not a Common Cause of Species Extinction, New
Amherst Study Finds,
https://www.amherst.edu/aboutamherst/news/faculty/node/222637
Challenging the widespread belief that rare and endangered plants and animals
are unhealthy, a new study has found they in fact harbor a lower number and
diversity of disease-causing parasites than non-threatened, close relatives
of the same family, according to Amherst College biology professor Michael Hood
and his research team. We still have much more to study to fully understand this
discovery, but this certainly contradicts the widely held notion that disease is a
major accelerant of species decline, said Hood of the groups findings, which were
published by the journal Oikos on its website. Combined with the loss of
habitat, it is probably other extinction vortex factorssuch as loss of
genetic diversity or disruption of reproduction processesthat cause
many species to die out, not disease. Using information from the collections in
natural history museums around the world, the U.S. Department of Agriculture
databases and their own field work, Hood, former student Amanda K. Gibson 08
and postdoctoral fellow Jorge Mena-Ali analyzed data from more than 42,000
flowering plants in the Silene genus for the destructive anther smut fungus.
Anther smut, said Hood, is a model disease to study, because it is easy to seeit
replaces the plants pollen with dark fungal sporesand because it is widely
distributed in natural plant communities. In addition, it is harmless to humans and
agriculture and safe for Hood and his team to handle. The groups major finding was
surprising: Naturally occurring anther smut disease was significantly less
frequent in threatened species than in non-threatened species of Silene.
Whats more, looking across all endangered U.S. plant species, the team
found fewer pathogens and parasites, making endangered species as a
group less diseased overall. Hood hypothesizes that this could be because
endangered species tend to have smaller, fragmented, physically isolated
populations that make the maintenance and transmission of diseases
more difficult.
AT: CPs
Cyber Transparency
Chinese secret police using against the Dalai Lama in 2008 were being used by Russian crooks to steal money from
US companies by 2010. We predicted as much in 2009, said Ross Anderson, professor of security engineering at
Cryptography
expert and author Bruce Schneier said some of the techniques the NSA
used to hack routers are starting to be seen in criminal cases, amongst
other attack types. Indeed, from compromises of much used but vulnerable
mobile applications, to spying on people through their web cams, dark
web dealers were already using the same methods as the NSA. Todays
the University of Cambridge. A lot more people have become aware of what can be done.
secret NSA programs are tomorrows PHD theses and the next days
hacker tools, he added. The US has done an enormous amount of damage
here. There is a basic level of trust that has been lost There is a lot of
international mistrust right now because the US was supposed to be a
trusted keeper of everything, but it turned out they were subverting it
with every chance they got. And the NSA keeps saying its not as bad as you think, but who the hell
believes that? The zero-day race Purposeful backdoors in security products another revelation from leaked security agency documents - benefit all
hackers. If firms have allowed for weaknesses in their product sets, they
dont just open up holes for agents to exploit, but criminals too. Organized
crime groups are pumping money into hunting for such vulnerabilities,
placing the everyday user at ever greater risk. Those crooks and the NSA
are racing to uncover and use zero-day flaws - previously-unknown,
unpatched weaknesses in software and hardware. After governments buy,
discover or use these vulnerabilities, they often filter down into the wider
criminal community, says Jason Steer, director of technology strategy at FireEye. We know that
governments purchase undisclosed zero-day vulnerabilities, and the
providers of such zero-days such as Vupen openly acknowledge that
government are big buyers of their research in text on their website, Steer
said. All exploits have an inevitable lifecycle - from highly targeted usage to APT [advanced persistent threat]
rhetoric can build on itself and reduce the number of politically acceptable options short of the use of force.47 In
contrast to many liberal arguments, such rhetoric comes not just from leaders who will benefit from war, but also
from mass publics. War can be popular and several cases, such as the Spanish-American War, illustrate that the
general public can desire war even more than leaders and can pressure reluctant governments to fight.
When
These possibilities have raised hopes that transparency will usher in an era of unprecedented justice and peace.12
Yet greater
transparency is not an unmitigated good . In all likelihood, the trend toward greater
More information about other societies
may reveal conflicting values and interests as well as shared ones. More
information about the military capabilities of other states may show
vulnerability and encourage aggression by the strong against the weak.
Greater transparency can highlight hostility and fuel vicious cycles of
belligerent words and deeds. It can highlight widespread prejudice and
hatred, encourage the victimization of out-groups and by showing broad
acceptance of such behavior without repercussions, legitimize it. Greater
transparency can undermine efforts at conflict resolution and, when
conflicts do break out, it can discourage intervention by third parties.
Transparency sometimes can make conflicts worse.
transparency will be at once positive and pernicious.
Kristin M., "The Perils and Promise of Global Transparency", State University of New
York Press, 2006, cryptome.org/2013/01/aaron-swartz/Global-Transparency-PerilsPromise.pdf
Unfortunately, transparency is a double-edged sword . Though transparency
does reduce uncertainty, less uncertainty will not always mean more
security or peace. Rather, the effects of greater transparency depend on
what it shows and how states react. We cannot assume that transparency
will show behavior that supports peace and cooperation or that states will
react to information in ways that will lead to a more just or peaceful
world. Greater transparency can indeed enhance international peace and security if it shows that other states
Gambling Internet
quick implementation will be difficult if not impossible. Even after the domestic rules have been changed to conform
with the WTO agreement, firms wanting to do business in other countries will still need to confront foreign
regulatory agencies that can be expected to be particularly creative in their tactics to delay or impede
interconnection. The telecommunication rules under the WTO include regulator rights-loopholes that permit
access conditions to be imposed to safeguard public service responsibilities such as universal service or to protect
the technical integrity of the public telecommunications system. When and how such restrictions could be
attacked as an illegitimate nontariff trade barrier will have to be resolved through the WTO dispute settlement
process. The settlement process itself will be time-consuming. Because of the government-to-government nature of
the WTO process, companies must first convince their own governments to champion their case. If the United
States accepts a case, it will need to prove that a foreign regulatory agency finding on an interconnection ruling, for
example, is inconsistent with the law and spirit of the WTO agreement. Even if the U.S. wins its case, the firm may
gain little. If the foreign government is unable or unwilling to change the offending practice, the United States may
choose to retaliate under the WTO by taking away benefits in an area unrelated to telecommunications, leaving the
original dispute unresolved. Technology push and consumer pull Given the institutional limits of the WTO, we should
not expect too much too soon from its rulemaking revolution, but this does not mean that consumers will not
The
savings from increased innovation and lower prices over the near term do
not hinge on the new WTO rules, lawyers, or even U.S. strong-arm negotiating tactics. The
most powerful forces pushing for liberalization did not even have seats at
receive any of the promised $1 trillion in benefits that is supposed to accompany restructuring of the industry.
as trade barriers.
The WTO is a set of rules delineating how firms can trade and how policymakers can protect producers and
consumers from injurious imports. But it is much more; it also serves as a forum for trade negotiations and settles
trade disputes through a binding system. In the internet arena, the WTO acts to promote market access, to preserve
open telecommunication networks, and to harmonize telecommunications policies that can affect international
trade. 19 Although the WTO does not explicitly regulate Internet services per se, it regulates trade in the goods and
services that comprise e-commerce.20 Some 74 members of the WTO have agreed to implement the Information
Technology Agreement. The signatories have eliminated tariffs on many of the products that make the Internet
possible such as semiconductors; set top boxes, digital printers, and computers.21 Since 1998, the members of the
WTO have agreed not to place tariffs on data flows. But members have also disagreed on how the WTO should
human right under international human rights law, and hence governments have a responsibility to ensure that
their citizens have access to information through transparency mechanisms.27 The WTO does have clear rules on
the WTO moves slowly (as decisions are made by consensus), and thus
cannot keep up with the development of new technologies . Fourth, many new
online activities will require cooperative global regulation on issues that transcend market access -- the traditional
turf of the WTO. These issues will require policymakers to think less about ensuring that their model of regulation is
Because
members have made little progress in trade talks at the WTO , the US, EU, and
adopted globally but more about achieving interoperability among different governance approaches.3
other
fracture the one global Internet . Given that countries have different
priorities for privacy, free speech, national security etc, international
harmonization of strategies to advance the open Internet is unlikely . Thus, when they negotiate
bilateral, regional or multilateral trade agreements, policymakers should use language that encourages
interoperability among signatories privacy, online piracy, and security policies.
same users also oppose efforts by their own governments to regulate activity on the Internet).
to
extend it to newer sectors " and these negotiations have not been entirely
forthcoming.14 Moreover, real concerns remain regarding the ability of the WTO
to interpret the GATS Agreement , an Agreement drafted when the
Internet was in its infancy, in a consistent and meaningful manner given
the extensive technological change that has taken place since the mid90s.15 Hence, companies doing business on the Internet negatively
affected by Internet filtering practices may be better served by looking
beyond the WTO's d ispute s ettlement m echanism, to common law tort doctrines
for legal remedies.
S tates has been debating this step for more than two decades, most of the
other WTO members are just getting started . The lawyers will be busy. Even after
the domestic rules have been changed to conform with the WTO agreement,
firms wanting to do business in other countries will still need to confront
foreign regulatory agencies that can be expected to be particularly creative in
their tactics to delay or impede interconnection. The telecommunication
rules under the WTO include regulator rights- loopholes that permit access
conditions to be imposed
process itself will be time-consuming . Because of the government-togovernment nature of the WTO process, companies must first convince their own
governments to champion their case. If the United States accepts a case, it will need to prove
that a foreign regulatory agency finding on an interconnection ruling, for example, is inconsistent with the law and
Even if the U.S. wins its case, the firm may gain little . If the
foreign government is unable or unwilling to change the offending practice, the
U nited S tates may choose to retaliate under the WTO by taking away benefits in an area
spirit of the WTO agreement.
unrelated to telecommunications,
1NC No OG Precedent
Plan wont set a precedent for regulation doesnt address
classification issues means that restrictions can still in place.
McKinnon, former Head of Trade in Services at the United Kingdoms Department
for Trade and Industry, 2013 Malcom, mobilizing Business for trade in services
file:///C:/Users/UK%20Debate/Downloads/H-OEDPublic
%20InformationPublications2013%20books.pdf
An important and complex WTO dispute settlement case under the GATS, known as the United
States Gambling case (see also chapter 6, box 22), touched on this issue, albeit briefly .
The case concerned a dispute over United States restrictions on online gambling services. The WTO
Dispute Panel noted that the WTO Council for Trade in Services had reported
a particular difficulty in making a distinction between supply under Modes 1 and 2. Neither
the WTO Panel nor the subsequent Appellate Body report carried out an
analysis as this distinction was not at issue in the dispute .4 The
distinction therefore remains blurred.
it does matter if
trade restrictions apply to one mode and not another. In the case of
insurance services, it also matters to business if the law applicable to the
contract is different depending on the mode of supply . The important point is that
the trade rules are not always clear-cut, but it is in the interest of business
to have the rules made as clear and simple as possible. In the case of Internet-based
much after all, trade continues regardless of how other people try to classify it. But
services, business has argued for making market access conditions under both modes of supply the same.
2NC No OG Precedent
GATS was drafted before internet innovations cant be
utilized because its inconsistent and uncertain.
Knapp, J.D., Cum Laude, Northwestern University School of Law, 2010 Kristen,
Internet Filtering: The Ineffectiveness of WTO Remedies and the Availability of
Alternative Tort Remedies http://repository.jmls.edu/cgi/viewcontent.cgi?
article=1689&context=jitpl
The GATS Agreement, specifically Articles XIV and XVI in combination with an individual country's
Schedule of market access commitments, provides the basic legal text governing
commitments applicable to the Internet and e-commerce. When the WTO
Agreements were drafted there was no Internet as we know it today. Thus none
of the WTOs legal instruments, including
the
GATS
Agreement
were drafted
U.S.
LEADS CP
LEADS Act fails- laundry list
Greg Nojeim, 14, Senior Counsel and Director of the Freedom, Security, and
Technology Project at the Center for Democracy & Technology, LEADS Act Extends
Important Privacy Protections, Raises Concerns, https://cdt.org/blog/leads-actextends-important-privacy-protections-raises-concerns/
Also, we have to consider how foreign governments will react. Some adverse
consequences would be mitigated because the LEADS Act would make it clear that data stored in the U.S. could be disclosed only
NCPAA CP
2AC
CP fails- doesnt stop agencies from imposing separate
requirements
Susan B. Cassidy,7/10, partner of the National Law Review and a member of the
Government Contracts Practice Group, Competing Bills Focus on Cybersecurity
Information Sharing But Final Language and Ultimate Passage Remain Unknown,
http://www.natlawreview.com/article/competing-bills-focus-cybersecurityinformation-sharing-final-language-and-ultimate-
Information sharing under these bills is intended as a voluntary process. All three bills contain an anti-tasking restriction, which
prevents the federal government from requiring private entities to share information about cybersecurity threats. The bills also
prohibit the government from conditioning the award of the contract on the provision of information about cyber threat indicators by
However, it is
unclear that the information sharing legislation would have stopped any of
these attacks. For example, the Target attack seemed to result from bad security practices, and most
successful attacks can be stopped by basic security measures , such as frequently
substantial these large scale and highly publicized attacks threaten to chill use of online services.
changing passwords, patching servers, detecting insider attacks, and educating employees about risks. Moreover, an influential
All of this
conduct monitoring, information sharing, and countermeasures is
authorized notwithstanding any law, so if an existing privacy or security
law would prohibit a particular action, it wouldnt matter. Monitoring and
information sharing conduct is given strong liability protection, but
countermeasures because they can harm others are not given specific
liability protection. Proponents of the legislation argue that it is needed to respond to and prevent cyber attacks.
they are shared. The bills also authorize countermeasures against cybersecurity threats, risks, or incidents.
solution itself has quite a few downsides. Indeed, while digital technologies have helped the success of social and
revolutionary movements, they also tremendously enhance the effectiveness of state surveillance. Due to the
of certain users or even tracking and imprisoning dissidents, e.g. in China and Iran. Recent revelations by the
from tapping online communications and phone calls, to extorting user data from private companies such as
Google, Apple and Microsoft, and to archiving billions of bits of personal information into secret data centres, all in
the name of security. Let's be clear on one thing: it is still preferable to be a political dissident in the USA than it is
to be in a country like China. But the level of surveillance achieved by democratic governments, in clear violation of
their own constitutional provisions, privacy rules and without public debate is a matter of real concern. Similarly,
the pressure exerted against whistleblowers and journalists who stand up against it, is unsettling. Admittedly, these
practices seem more characteristic of those of Beijing or Tehran than those of Washington, DC or London. It would
be wrong to assume that digital technologies have some kind of built-in effect that will necessarily result in a more
technologies
are only as good as the use we make of them. As citizens and activists, we
must recognise this and act accordingly. Good practices include: Know what you publicise.
transparent and democratic society. History tells us that such assumptions are inaccurate;
There are no secrets on the internet. All digital information is accessible for those who really want it. Educate
yourself. Some organisations such as Mozilla, the Electronic Frontier Foundation or the Tactical Technology Collective
are working hard to keep the Internet open and secure for ordinary citizens and human rights activists. They
provide a lot of tools and information on how the Internet technology works and what it entails for our freedoms.
Encrypt, encrypt, encrypt. Get used to GPG software to encrypt and sign your data and communications. Support
anonymity and privacy online. Install the Onion Router for surfing the web and prefer search engines that protect
your privacy, e.g. Duck Duck Go. Be critical of official information channels and mainstream media when they try
to justify the maintenance of uncontrolled state surveillance to protect us from criminal behaviour .
Creeping
surveillance is not solely a threat to privacy; it has consequences on
human dignity, freedom of expression and information and freedom of
association. For these reasons, state surveillance practices need to be
framed by the adoption of a regulatory framework that is flexible enough
to respond to a fast-evolving sector and strong enough to keep us secure
from abuses . Over the past year, 300 organisations have come together to support the International
Principles on the Application of Human Rights to Communication Surveillance. Today, citizens and
activists have an opportunity to join this global movement by endorsing
the Necessary and Proportionate Principles, and stand for the protection
of human rights in the information society. What are we waiting for?
Plan Popular
ECPA popular- has bipartisan support in both the House and
Senate
Katie McAuliffe, 15, federal affairs manager and executive director of Digital
Liberty at Americans for Tax Reform, A bipartisan fix for our email privacy laws,
3/4/15, http://www.deseretnews.com/article/865623379/A-bipartisan-fix-for-ouremail-privacy-laws.html?pg=all
In this era of gridlock, protecting our right to keep private the things we communicate and store online is one of the
Legislation to reform
ECPA, sponsored in the Senate by Sens. Mike Lee and Pat Leahy, and in the House by Reps. Kevin Yoder and
Jared Polis, could pass both chambers with overwhelming majorities . Their
reforms defy the usual partisan divisions and enjoy widespread support
from Republicans and Democrats, conservatives, moderates and
progressives, business and labor, former prosecutors and civil libertarians.
Even the White House has made encouraging statements about the need for reform. ECPA reform has
more than 240 co-sponsors in the House and 15 in the Senate. Congress
has a rare opportunity for a bipartisan accomplishment that would have a
profound impact on the prosperity and liberty of the American people . It
few issues that seems to unite people of all political leanings and interests.