Documente Academic
Documente Profesional
Documente Cultură
Cyber Security
1NC Frontline
Laundry list of alt causes to FBI hiring policy
Zelidon 14 (Elizabeth, writer for the State Hornet, Federal Bureau seeks Sac State students for
service, The State Hornet, 10/8/14, http://www.statehornet.com/news/federal-bureau-seeks-sac-statestudents-for-service/article_4f14150e-4f21-11e4-a30e-001a4bcf6878.html)//kjz
Sacramento State students
with limited leadership positions, language skills or who download content off
the Internet may not be eligible for the FBIs recruitment standards. On Monday, Sac States Career Center
welcomed the FBI for an informational on its paid internship program where applications are now being accepted . One of the highly discussed
topics in the presentation was the list of potential traits that disqualify applicants. This list included failure
to register with selective services, illegal drug use including steroids, criminal activity, default on
student loans, falsifying information on an application and illegal downloading music, movies and
books. FBI employee Steve Dupre received questions ranging from the use of cell phone apps to download free music , to Spotify
and other means of retrieving music. If youre doing that, stop doing it. Dupree said. He explained how the FBI will ask
people during interviews how many songs, movies and books they have downloaded because the
FBI considers it to be stealing. During the first two phases of interviews, everything is recorded and
then turned into a report. This report is then passed along to a polygraph technician to be used
during the applicant's exam, which consists of a 55-page questionnaire. If an applicant is caught
lying, they can no longer apply for an FBI agent position. If you are accepted to intern at FBI and
fail the polygraph you can no longer apply to FBI again. Dupre said. Dupre listed law, accounting, computer
science, engineering and languages as the types of leadership positions and majors that are specifically sought out for. Grades are not an end all
but get a 3.0 and get involved in campus. Hold a position in a club, community service, and be careful with your social media, Dupre said. These
are the leadership skills that distinguish an applicant from most competitive to least. Students must also demonstrate experience in oral and
written communication, initiative and motivation, adaptability and flexibility, and organizing, planning and prioritizing. Dupre ended the
presentation by mentioning how two Sac State students, whose identities could not be released, were recently hired into the program. One was a
psychology major and the other government. Although it is a long process into the FBI, Dupre encouraged students to apply to the internship
program and start changing their actions now so it can benefit them in the future.
Caucus, the National Bar Association and the National Society of Hispanic MBAs. Im trying everything I possibly can, Turgal said, to get
minority candidates in the door.
company is one of several in the industry whom weve requested meetings with in
order to keep pace with rapid technological advancements in the private sector.
same time, were seeing more and more companies using technology, pushing everything they own to the
network their corporate strategy, intellectual property. The value of the information there is really
immeasurable and the adversaries know it. As for terrorists, they trying to disrupt the power grid,
trying to have same impact on the Western world as they did on 9/11, wanting to wreak havoc and calling
for electronic jihad, Mr. Henry notes. Although terrorists' own cyber skills have not been shown to be
terribly sophisticated, the reality of it is that this capability can be purchased, it can be rented, he says.
You can go to an underground chat room and find someone willing to sell their skills. Recent successes
show the bureau is gaining some ground on cybercriminals, he and others say. In 2011, for instance,
the FBI took down Rove Digital, a company founded by a ring of Estonian and Russian hackers to
commit massive fraud over the Internet. By infecting more than 4 million computers in at least 100
countries with malware that secretly altered those computers' settings, the Rove hackers were able to
digitally hijack Internet searches, rerouting those computers to certain websites and ads. The company
received fees when users clicked on those websites or ads some $14 million in fraudulent income, the
FBI reported.
Attackers are becoming increasingly adept at using all the information they can collect from social
media to coerce people into co-operating with them, he said. Mitigating the cyber threat from malicious insiders In other
cases, Codling said the FBI saw how cyber criminals used mobile sniffing tools that cost just 150 to monitor everything their targets do on their
device; or pay hackers just 400 to get access to the accounts of someone negotiating a deal with 1.2bn. Despite
to cyber threat intelligence feeds, he said, so they know who is likely to target them; what they are likely to target and why; and how they are
likely to do it.
even less remarkable. Take the attacks on Estonia in April 2007, which came
energy supply from Bratsk dropped, authorities remotely increased the burden on
the Sayano-Shushenskaya plant. The sudden spike overwhelmed the turbine, which
was two months shy of reaching the end of its 30-year life cycle, sparking the
catastrophe. If anything, the Sayano-Shushenskaya incident highlights how
difficult a devastating attack would be to mount . The plant's washout was an
accident at the end of a complicated and unique chain of events.
Anticipating such vulnerabilities in advance is extraordinarily difficult even for
insiders; creating comparable coincidences from cyberspace would be a
daunting challenge at best for outsiders. If this is the most drastic incident Cyber
Command can conjure up, perhaps it's time for everyone to take a deep breath.
"Cyberattacks Are Becoming Easier." Just the opposite. U.S. Director of National
Intelligence James R. Clapper warned last year that the volume of malicious
software on American networks had more than tripled since 2009 and that
more than 60,000 pieces of malware are now discovered every day. The United
States, he said, is undergoing "a phenomenon known as 'convergence,'
which amplifies the opportunity for disruptive cyberattacks, including
against physical infrastructures." ("Digital convergence" is a snazzy term for a
simple thing: more and more devices able to talk to each other, and formerly
separate industries and activities able to work together.) Just because there's
more malware, however, doesn't mean that attacks are becoming easier. In fact,
potentially damaging or life-threatening cyberattacks should be more
difficult to pull off. Why? Sensitive systems generally have built-in redundancy
and safety systems, meaning an attacker's likely objective will not be to shut
down a system, since merely forcing the shutdown of one control system,
say a power plant, could trigger a backup and cause operators to start
looking for the bug. To work as an effective weapon, malware would have
to influence an active process -- but not bring it to a screeching halt. If the
malicious activity extends over a lengthy period, it has to remain stealthy.
That's a more difficult trick than hitting the virtual off-button. Take
Stuxnet, the worm that sabotaged Iran's nuclear program in 2010. It didn't just
crudely shut down the centrifuges at the Natanz nuclear facility; rather, the
worm subtly manipulated the system. Stuxnet stealthily infiltrated the plant's
networks, then hopped onto the protected control systems, intercepted input values
from sensors, recorded these data, and then provided the legitimate controller code
with pre-recorded fake input signals, according to researchers who have studied the
worm. Its objective was not just to fool operators in a control room, but also to
circumvent digital safety and monitoring systems so it could secretly manipulate
the actual processes. Building and deploying Stuxnet required extremely
detailed intelligence about the systems it was supposed to compromise, and
the same will be true for other dangerous cyberweapons. Yes,
"convergence," standardization, and sloppy defense of control-systems
software could increase the risk of generic attacks, but the same trend
has also caused defenses against the most coveted targets to improve steadily
and has made reprogramming highly specific installations on legacy systems more
complex, not less.
SEC officials say, since it lets investigators track cash flows and see whether firms are actually
investing the cash.
ruling elites responded to crises by increasing repression (thereby using one form of violence to abort another).
But the pursuit of cybercriminals abroad is still problematic. The problem is that they can only enforce
the law in places that agree to enforce the law, says the CSIS's Mr. Lewis. If youre in the US, theyll
catch you. In Russia and China, they dont have a chance. What they need is for the Russians to
cooperate and the Russians wont do that. The cyber ramp-up that the FBI's Comey says is coming
makes sense, say many analysts. Just as bank robber Willie Sutton was reputed to say he robbed banks
because thats where the money is, so, too, the FBI must follow criminals into their cyber lairs.
Key findings: Sudden demand creates scarcity, competition, and crisis Whenever rapid
demand increases hit a profession with nontrivial skill and/or education requirements,
economic theory suggests that rapidly rising compensation packages and strong competition for
workers can be expected. Educational initiatives are already addressing the
cybersecurity demand In response to earlier indications of burgeoning demand for
cybersecurity professionals , there has already been a large increase in education,
notably government-supported education, but also an increase in the number of
computer science majors. It's normal for the labor market to lag demand and education
initiatives Theory suggests and experience confirms that the market may take a long time
to respond to unexpected increases in demand. In the short term, many large
organizations have found innovative ways of meeting the demand for
cybersecurity professionals through internal recruitment and training, as our
interviews have found. Theory suggests and our interviews confirm that even
organizations that can meet most of their needs internally still face difficulties in
recruiting or retaining cybersecurity professionals in the upper tier. The best steps
may already have been taken The difficulty in finding qualified cybersecurity
candidates is likely to solve itself, as the supply of cyberprofessionals currently in
the educational pipeline increases , and the market reaches a stable, long-run equilibrium.
Even if the plan passes, FBI still cant fight cybercrime effectively
Kenyon 11 (Henry, a staff writer covering enterprise applications for Government Computer News,
FBI goes international to fight cyber criminals on their home turf, GCN, 12/12/11,
http://gcn.com/Articles/2011/12/12/FBI-international-cyber-crime-partnerships.aspx?Page=2)//kjz
But despite the bureaus efforts, there
are many challenges, including security flaws dating from the birth
of the Internet that favor criminals. He challenged industry to develop alternate technology
environments with built-in authentication and other defenses because new steps are necessary to
counter cyber crime. They want our money, property, information, and some even want to physically harm us, he said.
2NC Cyber ! D
Defenses are improving and the threat is decreasing
Libicki 13
MARTIN C. LIBICKI is a Senior Management Scientist at the RAND Corporation and a
Visiting Professor at the U.S. Naval Academy, Foreign Affairs, August 16, 2013,
"Don't Buy the Cyberhype: How to Prevent Cyberwars From Becoming Real Ones",
http://www.foreignaffairs.com/articles/139819/martin-c-libicki/dont-buy-thecyberhype
These days, most of Washington seems to believe that a major cyberattack on U.S.
critical infrastructure is inevitable. In March, James Clapper, U.S. director of national
intelligence, ranked cyberattacks as the greatest short-term threat to U.S. national
security. General Keith Alexander, the head of the U.S. Cyber Command, recently
characterized cyber exploitation of U.S. corporate computer systems as the
greatest transfer of wealth in world history. And in January, a report by the
Pentagons Defense Science Board argued that cyber risks should be managed with
improved defenses and deterrence, including a nuclear response in the most
extreme case. Although the risk of a debilitating cyberattack is real, the
perception of that risk is far greater than it actually is . No person has ever
died from a cyberattack, and only one alleged cyberattack has ever crippled a piece
of critical infrastructure, causing a series of local power outages in Brazil. In fact, a
major cyberattack of the kind intelligence officials fear has not taken place in the 21
years since the Internet became accessible to the public. Thus, while a cyberattack
could theoretically disable infrastructure or endanger civilian lives, its effects would
unlikely reach the scale U.S. officials have warned of. The immediate and direct
damage from a major cyberattack on the United States could range anywhere from
zero to tens of billions of dollars, but the latter would require a broad outage of
electric power or something of comparable damage. Direct casualties would most
likely be limited, and indirect causalities would depend on a variety of factors such
as whether the attack disabled emergency 911 dispatch services. Even in that case,
there would have to be no alternative means of reaching first responders for such
an attack to cause casualties. The indirect effects might be greater if a cyberattack
caused a large loss of confidence, particularly in the banking system. Yet scrambled
records would probably prove insufficient to incite a run on the banks. Officials also
warn that the United States might not be able to identify the source of a
cyberattack as it happens or in its immediate aftermath. Cyberattacks have neither
fingerprints nor the smell of gunpowder, and hackers can make an intrusion appear
legitimate or as if it came from somewhere else. Iran, for example, may not have
known why its centrifuges were breaking down prematurely before its officials read
about the covert cyber-sabotage campaign against the countrys nuclear program in
The New York Times. Victims of advanced persistent threats -- extended intrusions
into organization networks for the purpose of espionage -- are often unaware for
months, or even years, that their servers have been penetrated. The reason that
such attacks go undetected is because the removal of information does not affect
the information in the system, so nothing seems amiss. The exfiltration of
information can also be easily hidden, such as in the daily flow of web traffic from
an organization. But since everything is becoming increasingly dependent on
computers, could levels of damage impossible today become inevitable tomorrow?
As it happens, all of the trend lines -- good and bad -- in cyberspace are rising
simultaneously: the sophistication of attackers, but also that of the defenders; the
salience of cyberattacks as weapons, but also the awareness of the threat they
pose; the bandwidth available for organizing larger attacks, but also the resources
to ward them off. It is bad news that Iran is beginning to see cyberwar as a deniable
means of exploiting easy targets. And it is good news that software companies are
now rethinking the architectural features of their systems that permit such
vulnerabilities to exist in the first place.
Countermeasures solve
Bailey, science correspondent Reason Magazine, 1/18/ 11
(Ronald, http://reason.com/archives/2011/01/18/cyberwar-is-harder-than-it)
Brown and Sommer observe that the Internet and the physical
telecommunications infrastructure were designed to be robust and selfhealing, so that failures in one part are routed around. You have to be
cautious when hearing from people engaging in fear-mongering about huge
blackouts and collapses of critical infrastructures via the Internet, says
University of Toronto cyberwarfare expert Ronald Deibert in the January/February
2011 issue of the Bulletin of the Atomic Scientists. There is a lot of redundancy
in the networks; its not a simple thing to turn off the power grid. In
addition, our experience with current forms of malware is somewhat
reassuring. Responses to new malware have generally been found and made
available within days and few denial of service attacks have lasted more
than a day. In addition, many critical networks such as those carrying financial
transactions are not connected to the Internet requiring insider information
to make them vulnerable.
Stuxnet therefore suggests that the asymmetry argument of the Cyber Revolution
thesis has it backward. Cyber warfare is not a weapon of the weak . Weaker
actors face steep barriers to weaponization for causing meaningful damage, and
One of the reasons offered for the argument that pure cyberterrorism constitutes
a relatively less significant risk is that cyberattacks are comparatively
unattractive to terrorists. In addition to the fact that they lack
theatricality,35 Giacomello, for example, offers a cost/benefit analysis of
cyberterrorism to argue that traditional methods of terrorism and weapons
remain more effective at killing people, and thereby growing the desired
political capital.36 These accounts frequently contrast the possibility of
cyberattack with other terrorist uses of information technology that are regarded as
a pressing and largely overlooked threat. Attention, then, should be given to the
wider use of the Internet by terrorists, including for recruitment,
financing, networking information gathering [and] sharing information37 all of
which enhance the efficiency and reach of terrorist groups.38 On this view, the
nightmare scenarios associated with cyberterrorism should be replaced by
a focus on this broad spectrum of activities, with a range of political, policing,
and civil society stakeholders having a role in countering them.39
On January 30, 2012, technological experts from around the globe were surveyed
by McAfee and the Security and Defense Agenda (SDA) about the issue of cyberwar.
Fifty-seven percent of these practitioners believe that states are currently engaged
in a cyber arms race. It is unclear what a cyber arms race really is in this
context (the raw data from the survey is not online) but the general idea is that
capabilities and the threat from this issue area are increasing at all levels. Other
findings in the survey are just as troubling and mystifying. Forty-three percent
believe the worst case scenario, damage and disruption to a states critical
infrastructure is also the most likely. A further forty five percent believe that cybersecurity is just as pressing an issue as border security. Apparently, the great powers
such as the US, UK, and Germany are lacking in their cyber-readiness when
compared to smaller states such as Israel and Sweden mainly because they fail to
share information internally rather than having any specific deterrent capabilities, at
least according to the McAfee report.
With these opinions in mind, the SDA asked respondents which actions should be
taken to curb this newest threat to international security. Opinions on the next
course of action are just as troubling as the survey results. Apparently, a global
information sharing network should be established by states. This is an odd
perspective in that cyber threats are not uniform across states and centralizing the
network could put states in a more vulnerable position. The next idea is to provide
financial incentives for improvements in security in both the private and public
sectors. An interesting proposal advocating bribery to improve networks much in
the same way a parent bribes a child to do their homework. Finally, diplomats need
to start addressing this issue with more urgency, with the help of cyber security
experts (the subjects of the survey) of course. I would guess the next step is for a
color coded cyber terror warning indicator (I suggest the highest threat be the color
of Mountain Dew in order to honor the true cyber warriors teenage hackers and
computer programmers).
Why would the majority of cyber security practitioners argue for such
expensive, expansive, and urgent measures when the biggest attack,
arguably Stuxnet, required a physical injection of software to take effect?
Clearly there is an interest to promote this threat in the cyber security
community.
In contrast, the TRIP survey asked a sample of academics from U.S. universities
What are the top foreign policy problems facing the United States? They were
pitted against practitioners within the U.S. government who work within the national
security apparatus (PDF). Academics deemed cybersecurity the least pressing
foreign policy problem with only eight percent suggesting it is a top problem. This
falls right behind the fear of oil reliance (12%) and global poverty (12%).
Policymakers rank cybersecurity nearly as low as academics with 17 percent finding
this a top foreign policy problem right above the issue of climate change (eight
percent), global poverty (three percent), and oil reliance (four percent).
Academics find cybersecurity one of the least pressing threats in the system and
policymakers tend to agree generally. So why is cybersecurity such a pressing issue
according to the news media and cyber security practitioners? One might argue that
cyber security practitioners know the reality better than academics and
policymakers; suggesting their warnings about the coming cyber threat is just a
harbinger to the future. Using the bureaucratic politics model, others might
conclude that the cyber security industry is a biased party whose interests
lie in promoting the cyber threat. The news media just parrots these
perspectives because the quotes come easy and the news stories prey on
the fear the average citizen holds towards technology. The danger in
declaring cyberwar a top threat comes from distracting our attention
from more pressing problems like collapsing states, human rights abuses,
the proliferation of terrorism and WMDs, and internal violence in the form of civil
war. Cyberwar is a dangerous issue in contemporary security politics, but it is
nowhere near the top threat facing the United States.
LONDON The White House likes a bit of threat. In his State of the Union address,
Barack Obama wanted to nudge Congress yet again into passing meaningful
legislation. The president emphasized that America's enemies are "seeking the
ability to sabotage our power grid, our financial institutions and our air traffic
control systems." After two failed attempts to pass a cybersecurity act in the past
two years, he added swiftly: "We cannot look back years from now and wonder why
we did nothing in the face of real threats to our security and our economy."
Fair enough. A bit of threat to prompt needed action is one thing. Fear-mongering is
something else: counterproductive. Yet too many a participant in the cybersecurity
debate reckon that puffery pays off.
The Pentagon, no doubt, is the master of razzmatazz. Leon Panetta set the tone by
warning again and again of an impending "cyber Pearl Harbor." Just before he left
the Pentagon, the Defense Science Board delivered a remarkable report, "Resilient
Military Systems and the Advanced Cyber Threat." The paper seemed obsessed with
making yet more drastic historical comparisons: "The cyber threat is serious," the
task force wrote, "with potential consequences similar to the nuclear threat of the
Cold War." The manifestations of an all-out nuclear war would be different from
cyberattack, the Pentagon scientists helpfully acknowledged. But then they added,
gravely, that "in the end, the existential impact on the United States is the same." A
reminder is in order : The world has yet to witness a single casualty, let alone
fatality, as a result of a computer attack. Such statements are a plain insult to
survivors of Hiroshima. After all, a bit of fear helps to claim or keep scarce
resources when austerity and cutting seems out-of-control. The report
recommended allocating the stout sum of $2.5 billion for its top two priorities alone,
protecting nuclear weapons against cyberattacks and determining the mix of
weapons necessary to punish all-out cyber-aggressors.
Then there are private computer security companies. Such firms, naturally, are
keen to pocket some of the government's money earmarked for cybersecurity. And
hype is the means to that end . Which leads to the next point: The media want to
sell copy through threat inflation. "In Cyberspace, New Cold War," the headline
writers at the Times intoned in late February. "The U.S. is not ready for a cyberwar,"
shrieked the Washington Post earlier this week. Instead of calling out the abovementioned Pentagon report, the paper actually published two supportive articles on
it and pointed out that a major offensive cyber capability now seemed essential "in
a world awash in cyber-espionage, theft and disruption."
The Post should have reminded its readers that the only military-style cyberattack
that has actually created physical damage Stuxnet was actually executed by the
United States government.
Finally, the intelligence community tags along with the hype because the NSA and
CIA are still traumatized by missing 9/11. Missing a "cyber 9/11" would be truly
catastrophic for America's spies, so erring on the side of caution seems the rational
choice.
This means that the quality of the public debate suffers, as experts as well as
journalists have no choice but to rely on industry reports of sometimes
questionable quality or anonymous informants whose veracity is hard to
assess.
and remove the virus, upgrade to more effective security software, or reconfigure
their network architectures. Ensuring that deployed cyber weapons are poised for
wars that will start at an unspecified time in the future would require consistent
surveillance.
task force, which replaces the Corporate Fraud Task Force established in 2002, will
build upon efforts already underway to combat mortgage, securities and corporate fraud by
increasing coordination and fully utilizing the resources and expertise of the government's law
enforcement and regulatory apparatus. The attorney general will convene the first meeting of the Task Force in the next 30
days. "This task force's mission is not just to hold accountable those who helped bring about the last financial meltdown, but to prevent another
meltdown from happening," Attorney General Eric Holder said. "We will be relentless in our investigation of corporate and financial wrongdoing,
and will not hesitate to bring charges, where appropriate, for criminal misconduct on the part of businesses and business executives." "Through
the Financial Fraud Task Force,
seeking comprehensive financial reform to create a more stable, safer financial system and stepping
up our enforcement strategy. Doing so will help to stop emerging trends in financial fraud before they're able to cause extensive,
system-wide damage to our economy." "To give American families the protection and peace-of-mind they need, it's clear the federal response
must be as interconnected and multi-dimensional as the challenges we face," said HUD Secretary Shaun Donovan. "No one agency is going to be
able to stop financial fraud. This Task force will build upon many of the inter-agency collaborations already underway to protect consumers and
restore confidence." "Many
SQ solvesFINCEN
FINCEN no date (What We Do, no date, United States Department of Treasury Financial Crimes
Enforcement Network, http://www.fincen.gov/about_fincen/wwd/)//kjz
FinCEN is a bureau of the U.S. Department of the Treasury. The Director of FinCEN is appointed by the Secretary of
the Treasury and reports to the Treasury Under Secretary for Terrorism and Financial Intelligence . FinCENs mission is to
safeguard the financial system from illicit use and combat money laundering and promote national
security through the collection, analysis, and dissemination of financial intelligence and strategic
use of financial authorities. FinCEN carries out its mission by receiving and maintaining financial
transactions data; analyzing and disseminating that data for law enforcement purposes; and
building global cooperation with counterpart organizations in other countries and with
international bodies. FinCEN exercises regulatory functions primarily under the Currency and Financial Transactions Reporting Act of
1970, as amended by Title III of the USA PATRIOT Act of 2001 and other legislation, which legislative framework is commonly referred to as
the "Bank Secrecy Act" (BSA). The BSA is the nation's first and most comprehensive Federal anti-money laundering and counter-terrorism
financing (AML/CFT) statute. In brief, the BSA authorizes the Secretary of the Treasury to issue regulations requiring banks and other financial
institutions to take a number of precautions against financial crime, including the establishment of AML programs and the filing of reports that
have been determined to have a high degree of usefulness in criminal, tax, and regulatory investigations and proceedings, and certain intelligence
and counter-terrorism matters. The Secretary of the Treasury has delegated to the Director of FinCEN the authority to implement, administer, and
enforce compliance with the BSA and associated regulations. Congress has given FinCEN certain duties and responsibilities for the central
collection, analysis, and dissemination of data reported under FinCEN's regulations and other related data in support of government and financial
industry partners at the Federal, State, local, and international levels. To fulfill its responsibilities toward the detection and deterrence of financial
crime, FinCEN: Issues and interprets regulations authorized by statute; Supports and enforces compliance with those regulations; Supports,
coordinates, and analyzes data regarding compliance examination functions delegated to other Federal regulators; Manages the collection,
processing, storage, dissemination, and protection of data filed under FinCEN's reporting requirements; Maintains a government-wide access
service to FinCEN's data, and networks users with overlapping interests; Supports law enforcement investigations and prosecutions; Synthesizes
data to recommend internal and external allocation of resources to areas of greatest financial crime risk; Shares information and coordinates with
foreign financial intelligence unit (FIU) counterparts on AML/CFT efforts; and Conducts analysis to support policymakers; law enforcement,
regulatory, and intelligence agencies; FIUs; and the financial industry. FinCEN serves as the FIU for the United States and is one of more than
100 FIUs making up the Egmont Group, an international entity focused on information sharing and cooperation among FIUs. An FIU is a central,
national agency responsible for receiving (and, as permitted, requesting), analyzing, and disseminating to the competent authorities disclosures of
financial information: concerning suspected proceeds of crime and potential financing of terrorism or required by national legislation or
regulation in order to combat money laundering and terrorism financing. As one of the world's leading FIUs ,
FinCEN exchanges
financial information with FIU counterparts around the world in support of U.S. and foreign
financial crime investigations. The basic concept underlying FinCEN's core activities is "follow the money." The primary motive of
criminals is financial gain, and they leave financial trails as they try to launder the proceeds of crimes or attempt to spend their ill-gotten profits .
FinCEN partners with law enforcement at all levels of government and supports the nation's
foreign policy and national security objectives. Law enforcement agencies successfully use similar techniques, including
searching information collected by FinCEN from the financial industry, to investigate and hold accountable a broad range of criminals, including
perpetrators of fraud, tax evaders, and narcotics traffickers. More
2NC Econ ! D
No chance of war from economic decline---best and most recent data
Daniel W. Drezner 12, Professor, The Fletcher School of Law and Diplomacy, Tufts University,
October 2012, The Irony of Global Economic Governance: The System Worked,
http://www.globaleconomicgovernance.org/wp-content/uploads/IR-Colloquium-MT12-Week-5_TheIrony-of-Global-Economic-Governance.pdf
The final outcome addresses a dog that hasnt barked: the effect of the Great Recession on cross-border
conflict and violence. During the initial stages of the crisis, multiple analysts asserted that the financial crisis would lead
states to increase their use of force as a tool for staying in power.37 Whether through greater internal repression,
diversionary wars, arms races, or a ratcheting up of great power conflict , there were genuine concerns that the global
economic downturn would lead to an increase in conflict. Violence in the Middle East, border disputes in the South China Sea, and even the
disruptions of the Occupy movement fuel impressions of surge in global public disorder. The aggregate data suggests otherwise ,
however. The Institute for Economics and Peace has constructed a Global Peace Index annually since 2007. A key conclusion they draw from
the 2012 report is that The
Given the severity, reach and depth of the 2008 financial crisis, the proper comparison is with Great
Depression. And by that standard, the outcome variables look impressive . As Carmen Reinhart and Kenneth
Rogoff concluded in This Time is Different: that its macroeconomic outcome has been only the most severe global recession since World War II
and not even worse must be regarded as fortunate.42
No escalation of conflicts
Robert Jervis 11, Professor in the Department of Political Science and School of International and
Public Affairs at Columbia University, December 2011, Force in Our Times, Survival, Vol. 25, No. 4, p.
403-425
Even if war is still seen as evil, the security community could be dissolved if severe conflicts of interest were to arise. Could the more peaceful
world generate new interests that would bring the members of the community into sharp disputes? 45 A zero-sum sense of status would be one
example, perhaps linked to a steep rise in nationalism. More likely would be a
anyone suggesting that force of arms is the solution shows that even if bad times bring about greater
economic conflict , it will not make war thinkable .
When the global financial crisis struck roughly a year ago, the blogosphere was ablaze with all sorts of scary
predictions of, and commentary regarding, ensuing conflict and wars -- a rerun of the Great Depression leading to
world war, as it were. Now, as global economic news brightens and recovery -- surprisingly led by China and emerging markets
-- is the talk of the day, it's interesting to look back over the past year and realize how globalization's first truly
worldwide recession has had virtually no impact whatsoever on the international security landscape. None of the
more than three-dozen ongoing conflicts listed by GlobalSecurity.org can be clearly attributed to the global
recession. Indeed, the last new entry (civil conflict between Hamas and Fatah in the Palestine) predates the
economic crisis by a year, and three quarters of the chronic struggles began in the last century. Ditto for the 15 low-intensity conflicts
listed by Wikipedia (where the latest entry is the Mexican "drug war" begun in 2006). Certainly, the Russia-Georgia conflict last August
was specifically timed, but by most accounts the opening ceremony of the Beijing Olympics was the most
important external trigger (followed by the U.S. presidential campaign) for that sudden spike in an almost two-decade long
struggle between Georgia and its two breakaway regions. Looking over the various databases, then, we see a most familiar
picture: the usual mix of civil conflicts, insurgencies, and liberation-themed terrorist movements. Besides the
recent Russia-Georgia dust-up, the only two potential state-on-state wars (North v. South Korea, Israel v. Iran) are both tied to
one side acquiring a nuclear weapon capacity -- a process wholly unrelated to global economic trends. And with the
United States effectively tied down by its two ongoing major interventions (Iraq and Afghanistan-bleeding-into-Pakistan), our
involvement elsewhere around the planet has been quite modest, both leading up to and following the onset of the
economic crisis: e.g., the usual counter-drug efforts in Latin America, the usual military exercises with allies across Asia, mixing it up with
pirates off Somalia's coast). Everywhere else we find serious instability we pretty much let it burn, occasionally
pressing the Chinese -- unsuccessfully -- to do something. Our new Africa Command, for example, hasn't led us to anything beyond
advising and training local forces.
critique is that
leaders go to war for domestic political reasons, such that a war-avoiding bargain might not be
reachable even when both sides knew who would win, as lighting itself provides domestic political benefits from a war to
both win- ner and loser.4 Under some conditions, especially if a state is undergoing democratization or if a national leader is
experiencing domestic political problems such as unrest or economic downturn, a state may see war
as a way to rally the public around the leader and stave off domestic political challenges .5 The
proposition that leaders go to war when facing domestic difficulties is often called the
"diversionary" hypothesis.
However, the evidence that leaders choose war to solve internal political problems is thin . The underlying assumption
is that going to war en- genders a rally round the flag effect that boosts the popularity of leaders,
but leaders reap this benefit only under very narrow conditions (which often cannot be controlled by the attacking
state), and even the biggest rallies are short-lived .6 Importantly, there is almost no smoking gun historical
evidence of a leader launching a war primarily as a means of solving domestic political problems. At
most, politicians have occasionally speculated about diversionary action, such as Secretary of State William Seward's (ignored) April 1861
suggestion to President Abraham Lincoln that the United States provoke crises with European powers as a means of staving off civil war between
the Union and the seceding southern states.7 A Russian minister is famously thought to have declared just after the outbreak ofthe 1904-O5
Russo-japanese War that, "We need a little, victorious war to stem the tide of revolution," but the story is likely too good to be true.8 Leaders
sometimes see indirect relationships between starting war and reaping domestic political benefits, such as the possibility that Lyndon Johnson
escalated the Vietnam War in 1965 to protect his Great Society program from domestic political attack.9 Some
quantitative studies
have found that the presence of internal problems like declining economic growth, rising inflation,
partial democratization, or declining leader popularity are correlated with a n (often slightly) increased
likelihood in the use of force. However, these relationships are often limited in scope, occurring only
under certain economic or political conditions.10 Any possible diversionary effects might in turn be
moderated by the tendency of states to avoid provoking other states that might have diversionary
incentives.11
behavior.
any diversionary
There is, however, another trend at play. Economic crises tend to fragment regimes and divide polities. A decrease in
cohesion at the political leadership level and at the electorate level reduces the ability of the state to coalesce a
sufficiently strong political base required to undertake costly balancing measures such as economic costly signals.
Schweller (2006)builds on earlier studies (sec, e.g., Christensen, 1996; Snyder, 2000) that link political fragmentation with
decisions not to balance against rising threats or to balance only in minimal and ineffective ways to demonstrate a tendency for
states to 'underbalance'.Where political and social cohesion is strong, states are more likely to balance against rising threats
in effective and costly ways. However, 'unstable and fragmented regimes that rule over divided polities will be significantly
constrained in their ability to adapt to systemic incentives ; they will be least likely to enact bold and costly
policies even when their nation's survival is at stake and they are needed most' (Schweller, 2006, p. 130).
PTX Links
1NC
Marijuana policy is a divisive issue
Hudak 3/22 (John, a fellow in Governance Studies and Managing Editor of the FixGov blog, 2016
Will Be the Marijuana Election, Newsweek, 3/22/15, http://www.newsweek.com/2016-will-bemarijuana-election-315472)//kjz
Why Republicans want to talk about marijuana There are a variety of substantive reasons marijuana policy is an appealing topic for someif not
allRepublican hopefuls. However, there is a central political basis for it: presidential primaries. In many ways, the GOP is in lock-step on a
variety of major issues: health care, budget deficits, taxes, executive power, international trade, etc. As a result, it is hard to find daylight between
the candidates. For evidence of this, re-watch some of the 2012 GOP presidential debates. At times, they looked more like a church choir eager to
find harmony than a group of adversaries trying to win a race. Marijuana
marijuana offers voters the ability to distinguish positions. As a result, candidates must have positions on the topic.
Beyond political necessity, there are substantive policy reasons why this issue matters to the GOP. Federalism is often popular
with the GOP base, and hailing states rights is often times a safe bet on uncomfortable issues.
Criminal justice reform has its staunch GOP supporters, particularly among the libertarian wing, and Rand Paul has both taken up
that torch within the party and even outside the party to connect with voters on the issue of
marijuana. On the flip side, values voters still have a loud voice within the partyparticularly in the primary electorateand some
Republicans have carved out firm opposition to marijuana , suggesting that for pot policy their administrations
position will be simple: Just say no.
2NC
Only medical marijuana is popular in Congressthe plan needs to change
recreational policy
Angell 3/24 (Tom, founded Marijuana Majority to help more people understand that marijuana
legalization is a mainstream, majority-supported issue and that no one who wants to end prohibition
should be afraid to say so, Medical Marijuana Gains Momentum in Congress, Marijuana, 3/24/15,
http://www.marijuana.com/blog/news/2015/03/medical-marijuana-gains-momentum-in-congress/)//kjz
Bipartisan medical marijuana legislation is picking up steam on Capitol Hill. On Monday, Rep. Steve
Cohen (D-TN), joined by Rep. Don Young (R-AK), introduced a bill that would effectively end the federal
governments war on medical marijuana. The legislation, dubbed the Compassionate Access, Research Expansion, and
Respect States Act of 2015 or CARERS Act, is identical to a Senate bill of the same name that was introduced by a bipartisan trio of lawmakers
earlier this month. The proposal would reschedule marijuana, allow banks to provide financial services to state-legal cannabis businesses, lift
restrictions on marijuana research, allow for the interstate importation of CBD-rich strains and allow V.A. doctors to recommend medical
cannabis to military veterans, among other changes. In remarks submitted for the Congressional Record, Cohen
referred to polls
showing that an overwhelming majority of Americans supports medical marijuana. 86 percent of
Americans rarely agree on anything It is long overdue for our federal law to reflect the common sense views of 86 percent of Americans and
stop adding to the suffering of those with horrible illnesses. In a press release, Young said, The topic of medical and recreational marijuana has
always been an issue of states rights for me, a position based upon a strong belief in the 10th Amendment and the principals of federalism
established by our Founders. Since the Senate bills introduction by Sens. Cory Booker (D-NJ), Kirsten Gillibrand (D-NY) and Rand Paul (RKY), it has picked up two additional sponsors, Sens. Dean Heller (R-NV) and Barbara Boxer (D-CA). There were at least 15 separate pieces of
marijuana reform legislation introduced in the U.S. House during the last Congressional session, and many of those bills narrowed in on one
Funding CP
1NC
Text: The FBI should reallocate funding to substantially increase the salary of cyber
security employees. The FBI should end its fitness test requirement and polygraph
testing.
Solves the aff better Majority of hackers are weed free and salaries are the key internal link
Brewster 14 (Thomas; May 23, 2014; Motherboard; Money Is the Reason the Government Can't
Hire Decent Hackers, Not Weed; http://motherboard.vice.com/read/money-is-the-reason-thegovernment-cant-hire-decent-hackers-not-weed)//CC
Comeys comments, though apparently a joke, oddly revived a stereotype that many thought was
dead: that of the pot-head, hoody-wearing, pale-faced social outcast sitting in a dark room whacking
away at the keyboard. That stereotype is long gone. There are some like that but those involved get
their kicks more out of what they do rather than drugs. That's not to say a certain number dont
partake in drug taking but it's not a majority, Brian Honan, who set up Irelands first Computer
Emergency Response Team (CERT), told me. The persistence of the clich may just be a problem at
the FBI, according to security consultant and co-founder of Xiphos Research Labs, Michael Kemp. The
FBI have always considered things in stereotypes, he said. He thinks that the public perception of
hackers has shifted, however, because of high-profile surveillance operations, like those being carried
out by the US and China. People with cyber skills are no longer caricatures. Honan said the real
problem around luring talented hackers into law enforcement largely comes down to one thing. And
thats money. The problem faced by law enforcement agencies, including the FBI, is the salaries
that are on offer. Many talented hackers can demand high salaries in the private sector or indeed
even more from criminal gangs, he said. A sub-100k ($170k) per annum salary isnt worth bothering
with for many, given a hacker can make that kind of money in one go by selling a zero-day exploit (code
that targets unpatched, unknown vulnerabilities in software). Its down to them whether they want to hand
their zero-day to a legitimate exploit broker, who tend to have big contracts with governments and law
enforcement anyway, or to a criminal organisation, which could use it for nefarious purposes like stealing
money from internet users. If the government cant increase their salaries, they may be better off boosting
training and resources to improve skills amongst the existing workforce, whilst trying their best to
convince technically gifted youngsters that law enforcement is the place to be, added Honan.
reason to assert that they were inaccurately and unfairly labeled liars. I was called a lazy, lying, drug dealing
junkie by a man who doesnt know me , my stellar background or my societal contributions, wrote one black applicant in Baltimore, who said he
was told he qualified for a job except for his polygraph test failure. Just because I am young and black does not automatically denote that I have
ever used any illegal drugs. Government agencies use polygraph testing not only to weed out job applicants but also to question criminal
polygraph testing
is controversial, many scientists are highly critical of its use in job screening, saying its especially prone to inaccuracies
because the questions are often more vague than they are in criminal investigations and therefore
theyre more likely to provoke reactions from the innocent that might seem like deception. Adding to
suspects and to determine whether sex offenders are complying with psychological treatment or probation. Although all
the skepticism, polygraphers have documented problems with the measurement of sweat by the LX4000, a polygraph that the FBI and many other
federal agencies and police departments across the country have used, McClatchy found. Polygraphers also interpret measurements of respiration
and blood pressure for their decisions on whether someone is lying, but many see the sweat measurement as especially indicative of deception.
The manufacturer of the LX4000, Lafayette Instrument Co. Inc., describes the problem as rare but it isnt able to specify what that means. The
company also points out that other polygraphs that use the same technology might have the problem as well. The potential for occasional
differences to be observed was already clearly described in the published literature, not limited to the Lafayette polygraph system, and anecdotal
experience confirms it is an occasional occurrence, the company said in a statement to McClatchy. But Gene Iredale, a San Diego lawyer, said
the problem could mean that agencies such as the FBI are making decisions in criminal cases and are taking away security clearances on the
basis of completely inaccurate information. The polygraph is speculative to begin with; thats why its not admissible in court. A spokeswoman
said the bureau, which has polygraphed applicants since 1994, continues to find it a relevant and necessary tool in both employment and
operational related matters. The spokeswoman, Kathleen Wright, said the bureau wouldnt respond to questions about the LX4000 nor reveal the
number of people who failed each year, although she acknowledged that if an applicant doesnt pass a polygraph then the applicant is normally
not hired. Records obtained by McClatchy show the FBI polygraphs about13,000 people a year for job screening, criminal investigations and
national security inquiries. According
to records, the bureau has at least a 30 percent failure rate in its job
screening. As many as 40 percent of special agent applicants dont get the job because of their
polygraph test results.
Links to the NB
No the CP reallocates money the spending links do not apply because there is no
increase in spending
students were informed that if they had illegally downloaded content in the past, that could rule
them out of a position at the FBI. It appears that to the agency, downloading is tantamount to
stealing. The student-run State Hornet spoke with an FBI representative, Steve Dupre, who says there's no point in lying about
it: During the first two phases of interviews, everything is recorded and then turned into a report.
This report is then passed along to a polygraph technician to be used during the applicant's exam,
which consists of a 55-page questionnaire. If an applicant is caught lying, they can no longer apply
for an FBI agent position. "If you are accepted to intern at FBI and fail the polygraph you can no longer apply to FBI again." Dupre
said. This policy isn't terribly surprising, since the FBI has gone after high-profile file-sharing sites
like MegaUpload. Though, that doesn't mean it's a policy that makes much sense. While the agency considers piracy "a growing threat,"
several studies have shown that musicians and entertainers actually benefit from the illicit distribution of their art. A 2012 survey found that 46
By barring young
people who participate in an increasingly common activity, the FBI is limiting its own pool of
technologically curious and savvy potential employeesjust as it's doing by not hiring marijuana users. Whether the
percent of all Americans illegally download copyrighted material, and among people aged 18-29, it's 70 percent.
policy even works is up for debate, since it's been documented just how much members of the FBI (and Congress and the Department of Justice)
like to snatch free copies of their favorite shows and movies, too.
T Substantial
1NC
Interpretation:
Substantial must be at least 2%
Words & Phrases 60
'Substantial" means "of real worth and importance; of considerable value; valuable." Bequest to charitable institution, making
1/48 of expenditures in state, held exempt from taxation; such expenditures constituting "substantial" part of its activities. Tax
Commission of Ohio v. American Humane Education Soc., 181 N.E. 557, 42 Ohio App. 4.
70,000 people seek positions in a normal year. Video Watch the applications pile up at the FBI
The US population is three hundred and eighteen million eight hundred and fifty
seven thousand and fifty-six people
U.S. Census Bureau15 (US Census Bureau derived data from: Population Estimates, American
Community Survey, Census of Population and Housing, State and County Housing Unit Estimates,
County Business Patterns, Nonemployer Statistics, Economic Census, Survey of Business Owners,
Building Permits, Last updated: 6/8/15, USA http://quickfacts.census.gov/qfd/states/00000.html) CW
(from graph below)
People QuickFacts
USA
318,857,056
Violation: At best, the aff affects .033% of the people who are surveilled in the US
T is a voter:
1. Neg Ground the affirmative will always no link out of all the DA because of
the minimal people affected this takes out specific DAs and core neg ground
like politic and terror which kills argument innovation and clash
2. Limits moves out of predictable literature making the negative have an
unfair research burden because they must search for every small aff like the
presidents dentist should stop being surveilled
Advantage Counterplan
1NC
Text: The United States federal government should update the Computer Fraud and
Abuse Act, adopt Data Breach Notifications, and increase information sharing with
the private sector.
The counterplan solves the cyber security advantage
Cooney 14 (Internally cites Joseph Demarest the assistant director of the FBIs Cyber Division;
Michael; December 11, 2014; Networld; FBI: The top 3 ways Congress could help fight tenacious cyber
threats; http://www.networkworld.com/article/2858651/malware-cybercrime/fbi-the-top-3-wayscongress-could-help-fight-tenacious-cyber-threats.html)//CC
Demarest suggested three ways Congress could help evolve with that cyber threat. In particular:
Update the Computer Fraud and Abuse Act. The Computer Fraud and Abuse Act (CFAA) constitutes
the primary federal law against hacking, protecting the public against criminals who hack into computers
to steal information, install malicious software, and delete files. The CFAA was first enacted in 1986, at a
time when the problem of cyber crime was still in its infancy. Over the years, a series of measured,
modest changes have been made to the CFAA to reflect new technologies and means of committing
crimes and to equip law enforcement with the tools to respond to changing threats. The CFAA has not
been amended since 2008, however, and the intervening years have again created the need for the
enactment of modest, incremental changes. The Administration has proposed several such revisions to
keep federal criminal law uptodate with rapidlyevolving technologies . Cyber threats adapt and
evolve at the speed of light, and we need laws on the books that reflect the most current means by
which cyber actors are committing crimes. Updating the CFAA to reflect these changes would help
strengthen our ability to punish, and therefore to deter, the crimes we seek to prevent. Data Breach
Notifications. We believe there is a strong need for a uniform federal standard holding certain types
of businesses accountable for data breaches and theft of electronic personally identifiable
information. Businesses should, for example, be required to provide prompt notice to consumers in
the wake of a certain cyber attacks. Such a standard would not only hold businesses accountable for
breaches, but would also assist in FBI and other law enforcement efforts to identify, pursue, and
defeat the perpetrators of cyber attacks. Information Sharing. Although the government and the
private sector already share cyber threat information on a daily basis, legislation can enhance the value
and benefit of these information sharing relationships. The government and the private sector both
have critical and unique insights into the cyber threats we face, and sharing these insights is
necessary to enhance our mutual understanding of the threat. Similarly, the operational collaboration
required to identify cyber threat indicators and to mitigate intrusions requires the exact type of sharing we
seek in the first place. As such, the FBI supports legislation that would establish a clear framework
for sharing and reduce risk in the process, in addition to providing strong and straightforward
safeguards for the privacy and civil liberties of Americans. U.S. citizens must have confidence that
threat information is being shared appropriately, and we in the law enforcement and intelligence
communities must be as transparent as possible. We also want to ensure that all the relevant federal
partners receive the information in real time.
CISA Pltx NB
Counterplan doesnt link to politics CISA has bipart support
Robinson 6/12 (Teri Robinson; June 12, 2015; SC Magazine; Senate vote falls short of approving
defense act with CISA amendment; http://www.scmagazine.com/democrats-chided-for-not-supportingdefense-authorization-act/article/420500/)//CC
Calling Senate Democrats out for a 56-40 vote Thursday that failed to garner enough support to more the
Defense Authorization Bill forward, and with it the Cybersecurity Information Sharing Act (CISA), that
Republicans had attached to the bill, Senate Majority Whip John Cornyn, R-Texas, said the refusal
to move forward with this legislation, particularly the cybersecurity part of this discussion, is just
unconscionable. CISA had enjoyed bipartisan support, easily passing the Senate Intelligence
Committee in a 14-1 vote in March, although it continued to draw criticism from privacy groups. After
the Office of Personnel Management (OPM) revealed a data breach that is now believed to have
exposed the social security numbers and personnel information on every federal worker, Senate Majority
Leader Mitch McConnell, R-Ky., tried to attached CISA to the Defense Authorization Bill and fast
track its passage. Prior to the vote and amid Republican criticism, Senate Minority Leader Harry Reid
noted that Democrats had been trying for five years to pass a cybersecurity bill but it was
consistently blocked by Republicans.