wikify shit for wingel

11
==1AC== ==Contention 1 is CYBER SECURITY:== ====Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense==== **Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, giving expert testimony in Congress, designed backdoors FOR the government and reviewed original designs for backdoors, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congression al/docview/t39.d40.04292903.d94?accountid=14667)//EM I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security. ====Skeptics are wrong - cyber attacks in particular are empirical and increasing – success is inevitable. Every attack increases the risk of existential catastrophe. ==== **Nolan 15** — Andrew Nolan, Legislative Attorney at the Congressional Research Service, former Trial Attorney at the United States Department of Justice, holds a J.D. from George Washington University, 2015 ("Cybersecurity and Information

Upload: chiragjain

Post on 20-Feb-2016

226 views

Category:

Documents


0 download

DESCRIPTION

saoidjfa'lkdjfalksjdf;laskdjf;alskjdfa;lskdjfl;skdjfal;skdjf;alskdjf;laksdjfl;askdf

TRANSCRIPT

Page 1: Wikify Shit for Wingel

==1AC==

==Contention 1 is CYBER SECURITY:==

====Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense====

**Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, giving expert testimony in Congress, designed backdoors FOR the government and reviewed original designs for backdoors, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE

AND

these risks as a significant threat to our economy and to national security.

====Skeptics are wrong - cyber attacks in particular are empirical and increasing – success is inevitable. Every attack increases the risk of existential catastrophe. ====

**Nolan 15** — Andrew Nolan, Legislative Attorney at the Congressional Research Service, former Trial Attorney at the United States Department of Justice, holds a J.D. from George Washington University, 2015 ("Cybersecurity and Information Sharing: Legal Challenges and Solutions," CRS Report to Congress, March 16^^th^^, Available Online at http://fas.org/sgp/crs/intel/R43941.pdf, Accessed 07-05-2015, p. 1-3)

Over the course of the last year, a host of cyberattacks^^1^^ have been perpetrated

AND

the words of one prominent cybersecurity expert—"vulnerabilities of staggering proportions."^^26^^

Page 2: Wikify Shit for Wingel

====Only strong encryption can preserve cybersecurity. ====

**Kehl et al. 15** — Danielle Kehl, Senior Policy Analyst at the Open Technology Institute at the New America Foundation, holds a B.A. in History from Yale University, with Andi Wilson, Policy Program Associate at the Open Technology Institute at the New America Foundation, holds a Master of Global Affairs degree from the Munk School at the University of Toronto, and Kevin Bankston, Policy Director at the Open Technology Institute at the New America Foundation, former Senior Counsel and Director of the Free Expression Project at the Center for Democracy & Technology, former Senior Staff Attorney at the Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow at the American Civil Liberties Union, holds a J.D. from the University of Southern California Law School, 2015 ("Doomed To Repeat History? Lessons From The Crypto Wars of the 1990s," Report by the Open Technology Institute at the New America Foundation, June, Available Online at https://static.newamerica.org/attachments/3407—125/Lessons%20From%20the%20Crypto%20Wars%20of%20the%201990s.882d6156dc194187a5fa51b14d55234f.pdf, Accessed 07-06-2015, p. 19)

Strong Encryption Has Become A Bedrock Technology That Protects The Security Of The Internet The

AND

transit, at rest, in the cloud, and in storage.179

====Successful grid attacks cause retaliation and escalation to nuclear war====

**Tilford, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM

To make matters worse a cyber attack that can take out a civilian power grid

AND

include the use of "nuclear weapons", if authorized by the President.

====Closing backdoors instead of using them for surveillance prevents arms races —- builds legitimacy to negotiate international cyberdefense agreements ====

Page 3: Wikify Shit for Wingel

**Schneier 14** (Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School and a program fellow at the New America Foundation's Open Technology Institute. "Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?", May 19, 2014, http://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/)//CLi

The implications of U.S. policy can be felt on a variety of

AND

fix almost all the vulnerabilities we find. But not all, yet.

====That spurs international coop and mitigates offensive use ====

**Clark et. al. 9 **(David Clark, Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, Whitfield Diffie, Internet Corporation for Assigned Names and Numbers, Abraham Sofaer, former federal judge for the United States District Court for the Southern District of New York, and then a Legal Adviser to the United States State Department, "Cyber Security and International Agreements", http://cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf)//CLi

The potential utility of international cybersecurity agreements deserves to be carefully examined. International agreements

AND

more secure cyber environment through measures that go beyond conventional forms of deterrence.

====But absent the plan, increasing Chinese cyber-ops and OCO capabilities escalates to cyber arms racing====

**Swaine 13** (Micheal D. Swaine, expert in China and East Asian security studies and a Senior Associate in the Asia Program at the Carnegie Endowment for International Peace. "Chinese views on cybersecurity in Foreign relations." Carnegie Endowment http://carnegieendowment.org/files/CLM42MS.pdf page 1-2 September 24, 2013)\\mwang

During the past few years, cybersecurity has become a major concern among many countries

AND

general? The article concludes with a summary and some implications for the future

Page 4: Wikify Shit for Wingel

====Cyber arms race goes nuclear - command hacking, crisis instability, and fracturing nuclear agreements ====

**Austin 13** ~~[Director of Policy Innovation at the EastWest Institute, "Costs of American Cyber Superiority," 8/6, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/~~] //khirn

The United States is racing for the technological frontier in military and intelligence uses of

AND

be every bit as reasonable given their anxiety about unconstrained American cyber superiority.

====That risks extinction via nuclear winter====

**Wittner, 11 – professor of history emeritus at SUNY Albany(**Lawrence, "Is A Nuclear War with China Possible?", Huffington Post, 11/30, http://www.huffingtonpost.com/lawrence-wittner/nuclear-war-china_b_1116556.html)//VP

Surely the United States would "win" any nuclear war with China. But

AND

— destroying agriculture, creating worldwide famine, and generating chaos and destruction.

==Contention 2 is ECONOMY:==

====Encryption backdoors collapse the economy – 2 internal links: ====

====a. they directly risk financial attacks AND collapse foreign perception of US companies====

**Clark, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog,

Page 5: Wikify Shit for Wingel

http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Ever since the Edward Snowden leaks started it has become more and more obvious that

AND

disaster. It is going to require a lot of leadership and investment.

====Collapse of banking sector independently causes extinction====

LaRouche, 12 (Helga, founder, Schiller Institute, chairwoman, Civil Rights Solidarity Movement, "Dialogue With Spain and Portugal on the Global Crisis and the Future of Europe," April 27, 2012, http:/www.schillerinstitute.org/lar_related/2012/0427_hzl_webcast_xscript.html)

Now, I want to put this on the agenda, because we have only

AND

years to come (but that is probably the underestimation of the century).

====b. Backdoors cause data localization ====

Adhikari 15 ~~[Richard Adhikari, writer and editor for Ecommerce Times which is one of the largest e-business and technology news publishers in the United States. Our network of business and technology news publications attracts a targeted audience of buyers and decision-makers who need timely industry news and reliable analysis. "The Fallout From the NSA's Backdoors Mandate", http://www.ecommercetimes.com/story/81530.html, January 13^^th^^, 2015//Rahul~~]

The United States National Security Agency (NSA) is widely believed to have mandated

AND

that represent thousands of companies," New America's Open Technology Institute's Greene added.

====Data localization will destroy global economic growth====

Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California

Page 6: Wikify Shit for Wingel

International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, "DATA NATIONALISM" 64 Emory L.J. 677, lexis)

C. Economic Development Many governments believe that by forcing companies to localize data within

AND

aggregating data across borders. We discuss the impacts on these trends below.

====Strong US growth is key to promoting an American economic model – the alternative is mercantilism, which destroys economic cooperation====

Atkinson 12 (ROBERT D. ATKINSON, President Information Technology and Innovation Foundation a public policy think tank based in Washington, D.C, nonresident senior fellow of the Brookings Institution's Metropolitan Policy Program. "Enough is Enough: Confronting Chinese Innovation Mercantilism" FEBRUARY 2012 http://www2.itif.org/2012-enough-enough-chinese-mercantilism.pdf)//kyan

Chinese officials are clearly aware of the damage their mercantilist policies have had on the

AND

they look at the respective economic performances of the United States and China.

====And, U.S. economic supremacy prevents several scenarios for nuclear war – transition wars====

Friedberg and Schoenfeld, 2008 ~~[Aaron, Prof. Politics. And IR @ Princeton's Woodrow Wilson School and Visiting Scholar @ Witherspoon Institute, and Gabriel, Senior Editor of Commentary and Wall Street Journal, "The Dangers of a Diminished America", 10-28, http://online.wsj.com/article/SB122455074012352571.html~~]

Then there are the dolorous consequences of a potential collapse of the world's financial architecture

AND

leaders of these countries seek to divert attention from internal travails with external adventures

Page 7: Wikify Shit for Wingel

===1ac plan===

====Plan: The United States federal government should curtail its surveillance of encryption backdoors. ====

==Contention 3 is SOLVENCY==

====Only the plan solves – vital to security and economy====

**McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML

Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op

AND

cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable.

====AND, it's net better for law enforcement – consensus of experts and empirics====

**Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School's Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University

Page 8: Wikify Shit for Wingel

of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM

Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for

AND

America. Thank you, and I welcome your questions on this important matter

====Companies won't comply with informal encryption backdoor mandates – empirics prove ====

Golumbic '7 – (Charles Martin, University of Haifa, Professor of Computer Science, and Director of the Caesarea Rothschild Institute for Interdisciplinary Applications of Computer Science, "Fighting Terror Online: the Convergence of Security, Technology, and the Law")//MP

Those involved in the private sector have a clear interest in developing their products in

AND

restrictions were affecting the ability of American companies to compete effectively in world markets

====End to end encryption solves – people can't give government data even if they wanted – circumvention impossible====

**Seemann 15,** Michael Seemann studied Applied Cultural Studies in Lünebur, Now he blogs at mspr0.de and writes for various media like Rolling Stone, TIME online, SPEX, Spiegel Online, c't and the DU magazine " Digital Tailspin Ten Rules for the Internet After Snowden" The Network Notebooks series March 2015 http://networkcultures.org/wp-content/uploads/2015/03/NN09_Digital_Tailspin_SP.pdf

ENCRYPTION AS HOSPITALITY

Encrypted communication also obeys end-to-end principles.

AND

: providing a public key is an act of hospitality towards the Other.