Vous êtes sur la page 1sur 9

==1AC==

==Contention 1 is CYBER SECURITY:==

====Attacks exploiting surveillance backdoors on critical infrastructure are


imminent and inevitable the plan is key to any effective defense====
**Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer
science and associate professor at UPenn, giving expert testimony in
Congress, designed backdoors FOR the government and reviewed original
designs for backdoors, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15,
HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docvie
w/t39.d40.04292903.d94?accountid=14667)//EM
I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR
NATIONAL AND CRITICAL INFRASTRUCTURE
AND
these risks as a significant threat to our economy and to national security.

====Skeptics are wrong - cyber attacks in particular are empirical and


increasing success is inevitable. Every attack increases the risk of
existential catastrophe. ====
**Nolan 15** Andrew Nolan, Legislative Attorney at the Congressional
Research Service, former Trial Attorney at the United States Department of
Justice, holds a J.D. from George Washington University, 2015 ("Cybersecurity
and Information Sharing: Legal Challenges and Solutions," CRS Report to
Congress, March 16^^th^^, Available Online at
http://fas.org/sgp/crs/intel/R43941.pdf, Accessed 07-05-2015, p. 1-3)
Over the course of the last year, a host of cyberattacks^^1^^ have been
perpetrated
AND
the words of one prominent cybersecurity expert"vulnerabilities of
staggering proportions."^^26^^

====Only strong encryption can preserve cybersecurity. ====


**Kehl et al. 15** Danielle Kehl, Senior Policy Analyst at the Open
Technology Institute at the New America Foundation, holds a B.A. in History
from Yale University, with Andi Wilson, Policy Program Associate at the Open
Technology Institute at the New America Foundation, holds a Master of Global
Affairs degree from the Munk School at the University of Toronto, and Kevin
Bankston, Policy Director at the Open Technology Institute at the New
America Foundation, former Senior Counsel and Director of the Free
Expression Project at the Center for Democracy & Technology, former Senior
Staff Attorney at the Electronic Frontier Foundation, former Justice William
Brennan First Amendment Fellow at the American Civil Liberties Union, holds
a J.D. from the University of Southern California Law School, 2015 ("Doomed
To Repeat History? Lessons From The Crypto Wars of the 1990s," Report by
the Open Technology Institute at the New America Foundation, June, Available
Online at https://static.newamerica.org/attachments/3407125/Lessons
%20From%20the%20Crypto%20Wars%20of%20the
%201990s.882d6156dc194187a5fa51b14d55234f.pdf, Accessed 07-06-2015,
p. 19)
Strong Encryption Has Become A Bedrock Technology That Protects The
Security Of The Internet The
AND
transit, at rest, in the cloud, and in storage.179

====Successful grid attacks cause retaliation and escalation to nuclear


war====
**Tilford, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army,
graduate of the U.S. Army Airborne School, studied ethics at Phoenix College,
"Cyber attackers could shut down the electric grid for the entire east coast,"
Wichita Military Affairs Examiner, 7-27-2012,
http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-theelectric-grid-for-the-entire-east-coa)KMM
To make matters worse a cyber attack that can take out a civilian power grid
AND
include the use of "nuclear weapons", if authorized by the President.

====Closing backdoors instead of using them for surveillance prevents


arms races - builds legitimacy to negotiate international cyberdefense
agreements ====
**Schneier 14** (Bruce Schneier is an internationally renowned security
technologist, called a "security guru" by The Economist. Schneier is a fellow
at the Berkman Center for Internet and Society at Harvard Law School and a
program fellow at the New America Foundation's Open Technology Institute.
"Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?", May 19,
2014, http://www.theatlantic.com/technology/archive/2014/05/shouldhackers-fix-cybersecurity-holes-or-exploit-them/371197/)//CLi
The implications of U.S. policy can be felt on a variety of
AND
fix almost all the vulnerabilities we find. But not all, yet.

====That spurs international coop and mitigates offensive use ====


**Clark et. al. 9 **(David Clark, Senior Research Scientist at the MIT Computer
Science and Artificial Intelligence Laboratory, Whitfield Diffie, Internet
Corporation for Assigned Names and Numbers, Abraham Sofaer, former
federal judge for the United States District Court for the Southern District of
New York, and then a Legal Adviser to the United States State Department,
"Cyber Security and International Agreements",
http://cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf)//CLi
The potential utility of international cybersecurity agreements deserves to be
carefully examined. International agreements
AND
more secure cyber environment through measures that go beyond
conventional forms of deterrence.

====But absent the plan, increasing Chinese cyber-ops and OCO


capabilities escalates to cyber arms racing====
**Swaine 13** (Micheal D. Swaine, expert in China and East Asian security
studies and a Senior Associate in the Asia Program at the Carnegie
Endowment for International Peace. "Chinese views on cybersecurity in
Foreign relations." Carnegie Endowment

http://carnegieendowment.org/files/CLM42MS.pdf page 1-2 September 24,


2013)\\mwang
During the past few years, cybersecurity has become a major concern among
many countries
AND
general? The article concludes with a summary and some implications for the
future

====Cyber arms race goes nuclear - command hacking, crisis instability,


and fracturing nuclear agreements ====
**Austin 13** ~~[Director of Policy Innovation at the EastWest Institute,
"Costs of American Cyber Superiority," 8/6,
http://www.chinausfocus.com/peace-security/costs-of-american-cybersuperiority/~~] //khirn
The United States is racing for the technological frontier in military and
intelligence uses of
AND
be every bit as reasonable given their anxiety about unconstrained American
cyber superiority.

====That risks extinction via nuclear winter====


**Wittner, 11 professor of history emeritus at SUNY Albany(**Lawrence, "Is
A Nuclear War with China Possible?", Huffington Post, 11/30,
http://www.huffingtonpost.com/lawrence-wittner/nuclear-warchina_b_1116556.html)//VP
Surely the United States would "win" any nuclear war with China. But
AND
destroying agriculture, creating worldwide famine, and generating chaos
and destruction.

==Contention 2 is ECONOMY:==

====Encryption backdoors collapse the economy 2 internal links: ====

====a. they directly risk financial attacks AND collapse foreign perception of
US companies====
**Clark, 14** (Thomas G. Clark, economics scholar, blogger on economics,
politics, and philosophy, university level English tutor, former administrator in
public and private industries, "How NSA overreach has done more damage to
the US economy that Osama Bin Laden could ever have dreamed of", Thomas
G. Clark, Another Angry Voice Blog,
http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-thanterrorism.html)//chiragjain
Ever since the Edward Snowden leaks started it has become more and more
obvious that
AND
disaster. It is going to require a lot of leadership and investment.

====Collapse of banking sector independently causes extinction====


LaRouche, 12 (Helga, founder, Schiller Institute, chairwoman, Civil Rights
Solidarity Movement, "Dialogue With Spain and Portugal on the Global Crisis
and the Future of Europe," April 27, 2012,
http:/www.schillerinstitute.org/lar_related/2012/0427_hzl_webcast_xscript.ht
ml)
Now, I want to put this on the agenda, because we have only
AND
years to come (but that is probably the underestimation of the century).

====b. Backdoors cause data localization ====


Adhikari 15 ~~[Richard Adhikari, writer and editor for Ecommerce Times
which is one of the largest e-business and technology news publishers in the
United States. Our network of business and technology news publications
attracts a targeted audience of buyers and decision-makers who need timely
industry news and reliable analysis. "The Fallout From the NSA's Backdoors

Mandate", http://www.ecommercetimes.com/story/81530.html, January


13^^th^^, 2015//Rahul~~]
The United States National Security Agency (NSA) is widely believed to have
mandated
AND
that represent thousands of companies," New America's Open Technology
Institute's Greene added.

====Data localization will destroy global economic growth====


Chandler and Le, 15 - * Director, California International Law Center, Professor
of Law and Martin Luther King, Jr. Hall Research Scholar, University of
California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free
Speech and Technology Fellow, California International Law Center; A.B., Yale
College; J.D., University of California, Davis School of Law (Anupam and Uyen,
"DATA NATIONALISM" 64 Emory L.J. 677, lexis)
C. Economic Development Many governments believe that by forcing
companies to localize data within
AND
aggregating data across borders. We discuss the impacts on these trends
below.

====Strong US growth is key to promoting an American economic model


the alternative is mercantilism, which destroys economic cooperation====
Atkinson 12 (ROBERT D. ATKINSON, President Information Technology and
Innovation Foundation a public policy think tank based in Washington, D.C,
nonresident senior fellow of the Brookings Institution's Metropolitan Policy
Program. "Enough is Enough: Confronting Chinese Innovation Mercantilism"
FEBRUARY 2012 http://www2.itif.org/2012-enough-enough-chinesemercantilism.pdf)//kyan
Chinese officials are clearly aware of the damage their mercantilist policies
have had on the
AND
they look at the respective economic performances of the United States and
China.

====And, U.S. economic supremacy prevents several scenarios for nuclear


war transition wars====
Friedberg and Schoenfeld, 2008 ~~[Aaron, Prof. Politics. And IR @ Princeton's
Woodrow Wilson School and Visiting Scholar @ Witherspoon Institute, and
Gabriel, Senior Editor of Commentary and Wall Street Journal, "The Dangers
of a Diminished America", 10-28,
http://online.wsj.com/article/SB122455074012352571.html~~]
Then there are the dolorous consequences of a potential collapse of the
world's financial architecture
AND
leaders of these countries seek to divert attention from internal travails with
external adventures

===1ac plan===

====Plan: The United States federal government should curtail its


surveillance of encryption backdoors. ====

==Contention 3 is SOLVENCY==

====Only the plan solves vital to security and economy====


**McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology
and Innovation Foundation,
Former telecommunications fellow for Congresswoman Anna Eshoo, former
Archer Fellow, University of Texas at Austin, interned for the Office of
Legislative Affairs, Federal Communications Commission, B.S. Public Relations
and Political Communications, University of Texas at Austin, "The Secure Data
Act could help law enforcement protect against cybercrime," The Hill, 12-19-

2014, http://thehill.com/blogs/congress-blog/technology/227594-the-securedata-act-could-help-law-enforcement-protect-against)ML
Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op
AND
cyber vulnerabilities and allow electronics manufacturers to produce the most
secure devices imaginable.

====AND, it's net better for law enforcement consensus of experts and
empirics====
**Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology
Institute and Co-Director of Cybersecurity Initiative, New America, Security
Fellow with the Truman National Security Project, serves on the board of the
First Amendment Coalition, former Senior Counsel and the Director of the
Free Expression Project at the Center for Democracy & Technology, former
nonresidential fellow with the Stanford Law School's Center for Internet &
Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis
First Amendment Fellow at Electronic Frontier Foundation, former Justice
William Brennan First Amendment Fellow, litigated Internet-related free
speech cases at the American Civil Liberties Union, J.D. University of Southern
California Law School, B.A. University of Texas at Austin, statement before the
U.S. House of Representatives, Subcommittee on Information Technology of
the Committee on Oversight and Government Reform, Hearing on "Encryption
Technology and Possible U.S. Policy Responses," 4-29-2015,
http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-ITSubcommittee-Hearing-on-Encryption-Bankston.pdf)KMM
Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee:
Thank you for
AND
America. Thank you, and I welcome your questions on this important matter

====Companies won't comply with informal encryption backdoor mandates


empirics prove ====
Golumbic '7 (Charles Martin, University of Haifa, Professor of Computer
Science, and Director of the Caesarea Rothschild Institute for Interdisciplinary
Applications of Computer Science, "Fighting Terror Online: the Convergence of
Security, Technology, and the Law")//MP

Those involved in the private sector have a clear interest in developing their
products in
AND
restrictions were affecting the ability of American companies to compete
effectively in world markets

====End to end encryption solves people can't give government data


even if they wanted circumvention impossible====
**Seemann 15,**
Michael Seemann studied Applied Cultural Studies in Lnebur, Now he blogs
at mspr0.de and writes for various media like Rolling Stone, TIME online,
SPEX, Spiegel Online, c't and the DU magazine " Digital Tailspin Ten Rules for
the Internet After Snowden" The Network Notebooks series March 2015
http://networkcultures.org/wpcontent/uploads/2015/03/NN09_Digital_Tailspin_SP.pdf
ENCRYPTION AS HOSPITALITY
Encrypted communication also obeys end-to-end principles.
AND
: providing a public key is an act of hospitality towards the Other.

Vous aimerez peut-être aussi