Documente Academic
Documente Profesional
Documente Cultură
1accybersecurity
A cyberattack is coming
Macri, 14
(Giuseppe, staff writer for the Daily Caller, citing NSA head Michael Rogers,
NSA Chief: US Will Suffer A Catastrophic Cyberattack In The Next Ten Years,
http://dailycaller.com/2014/11/21/nsa-chief-us-will-suffer-a-catastrophiccyberattack-in-the-next-ten-years/, BC)
N ational S ecurity A gency and U.S. Cyber Command head Adm. Michael Rogers warned
lawmakers during a congressional briefing this week that
it would likely come from statesponsored hackers with ties to China, Russia or several other countries,
as head of NSA the U.S. militarys cyber-war branch, and that
many of whom have already successfully breached the systems of critical U.S. industries. There are
multiple nation-states that have the capability and have been on the systems, Rogers told the committee,
adding that many were engaged in reconnaissance activities to surveil specific schematics of most of
our control systems. There shouldnt be any doubt in our minds that there are nation-states and groups
out there that have the capability to shut down, forestall our ability to operate our basic infrastructure,
whether its generating power across this nation, whether its moving water and fuel, Rogers said,
Rogers also
predicted that in the coming years, cyber criminals previously engaged in stealing bank,
credit card and other financial data would start to be co-opted by nation-states
warning China and one or two others had already broken into the U.S. power grid.
current discussions with respect to weakening standards, or altering commercial products and services for
intelligence, or law enforcement. Any policy that seeks to weaken technology sold on the commercial
market has many serious downsides, even if it temporarily advances the intelligence and law enforcement
missions of facilitating legal and authorized government surveillance. Specifically,
we define and
technology, and more information is available for law enforcement purposes. On the surface, it would
appear these motivations would be reasonable. However,
technology is equally advanced and ubiquitous in the United States, and the locales of many of our
adversaries. Vulnerable products should be corrected , as needed, based on this
assessment. The next section briefly describes some of the government policies and technical strategies
that might have the undesired side effect of reducing security. The following section discusses why the
Government policies
can affect greatly the security of commercial products, either positively or
effect of these practices may be a decrease, not an increase, in security.
negatively. There are a number of methods by which a government might affect security negatively as a
means of facilitating legal government surveillance. One inexpensive method is to exploit pre-existing
weaknesses that are already present in commercial software, while keeping these weaknesses a secret.
Another method is to motivate the designer of a computer or communications system to make those
systems easier for government agencies to access. Motivation may come from direct mandate or financial
incentives. There are many ways that a designer can facilitate government access once so motivated. For
spread widely. The backdoors in that case were a set of secrets then known only by a small, highly
technical community. A single, putatively innocent error resulted in a largescale attack that disabled many systems. In recent years, Barracuda had a
completely undocumented backdoor that allowed high levels of
access from the Internet addresses assigned to Barracuda. However, when it was publicized, as almost
inevitably happens, it became extremely unsafe, and Barracudas
customers rejected it. One example of how attackers can subvert
backdoors placed into systems for benign reasons occurred in the network of the largest
commercial cellular operator in Greece. Switches deployed in the system came
equipped with built-in wiretapping features, intended only for
authorized law enforcement agencies. Some unknown attacker was
able to install software, and made use of these embedded wiretapping features to
surreptitiously and illegally eavesdrop on calls from many cell
phones including phones belonging to the Prime Minister of Greece, a hundred
high-ranking Greek dignitaries, and an employee of the U.S. Embassy in
Greece before the security breach finally was discovered. In essence, a backdoor created to
fight crime was used to commit crime.
the
University of Cambridge Centre for Risk Studies and the Lloyd's of London
insurance market outlines a scenario of an electricity blackout that leaves 93 million people in New York
City and Washington DC without power.
technologically possible
"The total impact to the U.S. economy is estimated at $243 billion, rising to more
than $1 trillion in the most extreme version of the scenario," the report said. The losses come from
damage to infrastructure and business supply chains, and are estimated over a five-year time period. The
extreme scenario is built on the greatest loss of power, with 100 generators taken offline, and would lead
report said, citing U.S. energy department data. The U.S. Industrial Control System Cyber Emergency
Response Team said that 32 percent of its responses last year to cyber security threats to critical
infrastructure occurred in the energy sector. "The evidence of major attacks during 2014 suggests that
attackers were often able to exploit vulnerabilities faster than defenders could remedy them," Tom Bolt,
director of performance management at Lloyd's, said in the report.
(Michiko Kakutani, Pulitzer Prize winning book reviewer, citing Richard Clarke,
former National Coordinator for Security, Infrastructure Protection, and
Counter-terrorism for the United States, 4-27-10,
http://www.nytimes.com/2010/04/27/books/27book.html?pagewanted=all,
BC)
Blackouts hit New York, Los Angeles, Washington and more than
100 other American cities. Subways crash. Trains derail. Airplanes
fall from the sky. Gas pipelines explode. Chemical plants release
clouds of toxic chlorine. Banks lose all their data. Weather and
communication satellites spin out of their orbits. And the
Pentagons classified networks grind to a halt, blinding the
greatest military power in the world.
This might sound like a takeoff on the 2007 Bruce Willis Die Hard movie, in
which a group of cyberterrorists attempts to stage what it calls a fire sale: a systematic shutdown of the nations vital communication and utilities infrastructure.
than are minor states like North Korea. We may even be at risk some day from nations or nonstate actors lacking cyberwar capabilities, but who can hire teams of highly
capable hackers. Lest this sound like the augury of an alarmist, the reader might recall that Mr. Clarke, counterterrorism chief in both the Bill Clinton and George W. Bush
administrations, repeatedly warned his superiors about the need for an aggressive plan to combat al Qaeda with only a pallid response before 9/11. He recounted this
campaign in his controversial 2004 book, Against All Enemies. Once again,
various arms of the military and various committees in Congress
government agencies and private companies in charge of civilian infrastructure are ill prepared to handle a possible disaster. In these pages Mr. Clarke uses his insiders
knowledge of national security policy to create a harrowing and persuasive picture of the cyberthreat the United States faces today. Mr. Clarke is hardly a lone wolf on
the subject: Mike McConnell, the former director of national intelligence, told a Senate committee in February that
if we were in a
cyberwar today, the United States would lose . And last November, Steven Chabinsky, deputy
assistant director for the Federal Bureau of Investigations cyber division, noted that the F.B.I. was looking into Qaeda sympathizers who want to develop their hacking
skills and appear to want to target the United States infrastructure. Mr. Clarke who wrote this book with Robert K. Knake, an international affairs fellow at the Council
on Foreign Relations argues that
history may be more instructive than ever. While we continue to believe that the Great
Depression is not likely to be repeated, the lessons to be drawn from that period include the harmful
effects on fledgling democracies and multiethnic societies (think Central Europe in 1920s and
1930s) and on the sustainability of multilateral institutions (think League of Nations in the same
period). There is no reason to think that this would not be true in the twenty-first as
much as in the twentieth century. For that reason, the ways in which the potential for greater
conflict could grow would seem to be even more apt in a constantly volatile economic
environment as they would be if change would be steadier. In surveying those risks, the report stressed the
likelihood that terrorism and nonproliferation will remain priorities even as resource issues move up on the
2025, however, the diffusion of technologies and scientific knowledge will place some of the worlds most dangerous
capabilities within their reach. Terrorist groups in 2025 will likely be a combination of descendants of long
established groups_inheriting organizational structures, command and control processes, and training procedures
necessary to conduct sophisticated attacks_and newly emergent collections of the angry and disenfranchised that
conflict and terrorism taking place under a nuclear umbrella could lead to an unintended
escalation and broader conflict if clear red lines between those states involved are not well established.
The close proximity of potential nuclear rivals combined with underdeveloped surveillance
capabilities and mobile dual-capable Iranian missile systems also will produce inherent difficulties in
intensity
concerns are providing a rationale for naval buildups and modernization efforts, such as Chinas and Indias
by an earthquake or tornado
In Japan, it was a one-two punch: first the earthquake, then the tsunami. Tokyo Electric Power Co., the operator of the crippled
plant, found other ways to cool the reactor core and so far avert a full-scale meltdown without electricity. "Clearly the coping duration is an issue on the table now," said Biff Bradley, director of risk assessment for
the Nuclear Energy Institute. "The industry and the Nuclear Regulatory Commission will have to go back in light of what we just observed and rethink station blackout duration." David Lochbaum, a former plant
engineer and nuclear safety director at the advocacy group Union of Concerned Scientists, put it another way: "
." Lochbaum plans to use the Japan disaster to press lawmakers and the nuclear power industry to do more when
. An analysis of
individual plant risks released in 2003 by the NRC shows that for 39 of the 104 nuclear reactors, the risk of core damage from a blackout was greater than 1 in 100,000. At 45 other plants the risk is greater than 1 in
1 million, the threshold NRC is using to determine which severe accidents should be evaluated in its latest analysis. The Beaver Valley Power Station, Unit 1, in Pennsylvania had the greatest risk of core melt 6.5 in
100,000, according to the analysis. But that risk may have been reduced in subsequent years as NRC regulations required plants to do more to cope with blackouts. Todd Schneider, a spokesman for FirstEnergy
Nuclear Operating Co., which runs Beaver Creek, told the AP that batteries on site would last less than a week. In 1988, eight years after labeling blackouts "an unresolved safety issue," the NRC required nuclear
power plants to improve the reliability of their diesel generators, have more backup generators on site, and better train personnel to restore power. These steps would allow them to keep the core cool for four to
eight hours if they lost all electrical power. By contrast, the newest generation of nuclear power plant, which is still awaiting approval, can last 72 hours without taking any action, and a minimum of seven days if
water is supplied by other means to cooling pools. Despite the added safety measures, a 1997 report found that blackouts the loss of on-site and off-site electrical power remained "a dominant contributor to the
risk of core melt at some plants." The events of Sept. 11, 2001, further solidified that nuclear reactors might have to keep the core cool for a longer period without power. After 9/11, the commission issued
regulations requiring that plants have portable power supplies for relief valves and be able to manually operate an emergency reactor cooling system when batteries go out. The NRC says these steps, and others,
have reduced the risk of core melt from station blackouts from the current fleet of nuclear plants. For instance, preliminary results of the latest analysis of the risks to the Peach Bottom plant show that any release
caused by a blackout there would be far less rapid and would release less radiation than previously thought, even without any actions being taken. With more time, people can be evacuated. The NRC says improved
computer models, coupled with up-to-date information about the plant, resulted in the rosier outlook. "When you simplify, you always err towards the worst possible circumstance," Scott Burnell, a spokesman for
the Nuclear Regulatory Commission, said of the earlier studies. The latest work shows that "even in situations where everything is broken and you can't do anything else, these events take a long time to play out,"
he said. "Even when you get to releasing into environment, much less of it is released than actually thought." Exelon Corp., the operator of the Peach Bottom plant, referred all detailed questions about its
." Other people, looking at the crisis unfolding in Japan, aren't so sure. In the worst-case scenario, the NRC's 1990
said Richard Denning, a professor of nuclear engineering at Ohio State University, referring to the steps NRC has taken to prevent
incidents. Denning had done work as a contractor on severe accident analyses for the NRC since 1975. He retired from Battelle Memorial Institute in 1995. "They certainly could have made all the difference in this
particular case," he said, referring to Japan. "That's assuming you have stored these things in a place that would not have been swept away by tsunami."
"
(Japan's strongest ever) set off a devastating tsunami that sent walls of water (six meters
high) washing over coastal cities in the north." According to Japan's Meteorological Survey, it was 9.0. The Sendai port city and other areas experienced heavy damage.
"Thousands of homes were destroyed, many roads were impassable, trains and buses (stopped) running, and power and cellphones remained down. On Saturday morning,
, under a worst case core meltdown, all bets are off as the entire
region and beyond will be threatened with permanent
contamination, making the most affected areas unsafe to live in. On March
Moreover
12, Stratfor Global Intelligence issued a "Red Alert: Nuclear Meltdown at Quake-Damaged Japanese Plant," saying: Fukushima Daiichi "nuclear power plant in Okuma, Japan,
appears to have caused a reactor meltdown." Stratfor downplayed its seriousness, adding that such an event "does not necessarily mean a nuclear disaster," that already
may have happened - the ultimate nightmare short of nuclear winter. According to Stratfor, "(A)s long as the reactor core, which is specifically designed to contain high
levels of heat, pressure and radiation, remains intact, the melted fuel can be dealt with. If the (core's) breached but the containment facility built around (it) remains intact,
can't be discounted.
Moreover, independent nuclear safety analyst John Large told Al Jazeera that by venting radioactive steam from the
inner reactor to the outer dome, a reaction may have occurred, causing the explosion. "When I look at the size of the explosion," he said, "it is my opinion that there could
be a very large leak (because) fuel continues to generate heat." Already, Fukushima way exceeds Three Mile Island that experienced a partial core meltdown in Unit 2.
Finally it was brought under control, but coverup and denial concealed full details until much later. According to anti-nuclear activist Harvey Wasserman, Japan's quake
The reactor could blow." If so, Russia, China, Korea and most parts of Western Asia will be affected. Many thousands will die, potentially millions under a
worse case scenario, including far outside East Asia. Moreover, at least five reactors are at risk. Already, a 20-mile wide radius was evacuated. What happened in Japan can
occur anywhere. Yet Obama's proposed budget includes $36 billion for new reactors, a shocking disregard for global safety. Calling Fukushima an "apocalyptic event,"
Wasserman said "(t)hese nuclear plants have to be shut," let alone budget billions for new ones. It's unthinkable, he said. If a similar disaster struck California, nuclear
fallout would affect all America, Canada, Mexico, Central America, and parts of South America. Nuclear Power: A Technology from Hell Nuclear expert Helen Caldicott
agrees, telling this writer by phone that a potential regional catastrophe is unfolding. Over 30 years ago, she warned of its inevitability. Her 2006 book titled, "Nuclear
Power is Not the Answer" explained that contrary to government and industry propaganda, even during normal operations, nuclear power generation causes significant
discharges of greenhouse gas emissions, as well as hundreds of thousands of curies of deadly radioactive gases and other radioactive elements into the environment every
Second is retaliation
Cyberterror leads to nuclear exchanges traditional
defense doesnt apply
Fritz 9 (Jason, Master in International Relations from Bond, BS from St.
isolating one nuclear armed submarine would prove an easier task. There is evidence to suggest multiple
attempts have been made by hackers to compromise the extremely low radio frequency once used by the
US Navy to send nuclear launch approval to submerged submarines. Additionally, the alleged Soviet
system known as Perimetr was designed to automatically launch nuclear weapons if it was unable to
establish communications with Soviet leadership. This was intended as a retaliatory response in the event
that nuclear weapons had decapitated Soviet leadership; however it did not account for the possibility of
cyber terrorists blocking communications through computer network operations in an attempt to engage
Should a warhead be launched, damage could be further
enhanced through additional computer network operations. By using
proxies, multi-layered attacks could be engineered . Terrorists could remotely
the system.
commandeer computers in China and use them to launch a US nuclear attack against Russia. Thus Russia
would believe it was under attack from the US and the US would believe China was responsible. Further,
coordinated with Distributed Denial of Service attacks against key networks, so they would have further
difficulty in identifying what happened and be forced to respond quickly. Terrorists could also knock out
amidst the
confusion of a traditional large-scale terrorist attack, claims of
responsibility and declarations of war could be falsified in an
communications between these states so they cannot discuss the situation. Alternatively,
1acheg
Backdoors destroy US tech innovation and
competitiveness
Kohn 14
(Cindy, writer for the Electronic Freedom Foundation, 9-26-14, Nine Epic
Failures of Regulating Cryptography,
https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulatingcryptography, BC)
For those who weren't following digital civil liberties issues in 1995, or for those who have forgotten, here's a
refresher list of why forcing companies to break their own privacy
and security measures by installing a back door was a bad idea 15 years
ago: It will create security risks. Don't take our word for it. Computer security
expert Steven Bellovin has explained some of the problems. First, it's hard to secure
communications properly even between two parties. Cryptography with a back door adds a
third party, requiring a more complex protocol, and as Bellovin puts it: "Many previous attempts to add such
features have resulted in new, easily exploited security flaws rather than better law enforcement access." It doesn't end
there. Bellovin notes: Complexity in the protocols isn't the only problem; protocols require computer programs to
implement them, and more complex code generally creates more exploitable bugs. In the most notorious incident of this
type, a cell phone switch in Greece was hacked by an unknown party. The so-called 'lawful intercept' mechanisms in the
switch that is, the features designed to permit the police to wiretap calls easily was abused by the attacker to
monitor at least a hundred cell phones, up to and including the prime minister's. This attack would not have been possible
if the vendor hadn't written the lawful intercept code. More recently, as security researcher Susan Landau explains, "an
IBM researcher found that a Cisco wiretapping architecture designed to accommodate law-enforcement requirements a
system already in use by major carriers had numerous security holes in its design. This would have made it easy to
break into the communications network and surreptitiously wiretap private communications." The same is true for
Google, which had its "compliance" technologies hacked by China. This isn't just a problem for you and me and millions
of companies that need secure communications. What will the government itself use for secure communications? The FBI
and other government agencies currently use many commercial products the same ones they want to force to have a
back door. How will the FBI stop people from un-backdooring their deployments? Or does the government plan to stop
using commercial communications technologies altogether? It won't stop the bad guys. Users who want strong
encryption will be able to get it from Germany, Finland, Israel, and many other places in the world where it's offered for
sale and for free. In 1996, the National Research Council did a study called "Cryptography's Role in Securing the
Information Society," nicknamed CRISIS. Here's what they said: Products using unescrowed encryption are in use today
by millions of users, and such products are available from many difficult-to-censor Internet sites abroad. Users could preencrypt their data, using whatever means were available, before their data were accepted by an escrowed encryption
device or system. Users could store their data on remote computers, accessible through the click of a mouse but
otherwise unknown to anyone but the data owner, such practices could occur quite legally even with a ban on the use of
unescrowed encryption. Knowledge of strong encryption techniques is available from official U.S. government publications
and other sources worldwide, and experts understanding how to use such knowledge might well be in high demand from
criminal elements. CRISIS Report at 303 None of that has changed. And of course, more encryption technology is more
readily available today than it was in 1996. So unless the goverment wants to mandate that you are forbidden to run
anything that is not U.S. government approved on your devices, they won't stop bad guys from getting access to strong
Data proves
Bloomberg, 13
(Allan Holmes, staff writer, 9-10-13, NSA Spying Seen Risking Billions in U.S.
Technology Sales, http://www.bloomberg.com/news/articles/2013-09-10/nsaspying-seen-risking-billions-in-u-s-technology-sales, BC)
the National Security Agency persuaded some U.S. technology
companies to build so-called backdoors into security products, networks and devices to
Reports that
allow easier surveillance are similar to how the House Intelligence Committee described the threat posed
by China through Huawei. Just as the Shenzhen, China-based Huawei lost business after the report urged
reputation of the entire U.S. tech industry , said Daniel Castro, the reports author
and an analyst with the non-partisan research group in Washington, in an e-mail. I suspect many foreign
customers are going to be shopping elsewhere for their hardware and software.
The
percentage of patents issued to and science journal articles
published by scientists in China, Singapore, South Korea, and Taiwan
is rising. Indian companies are quickly becoming the second-largest producers of application services
improving the quality of their science and ensuring the exploitation of future innovations.
in the world, developing, supplying, and managing database and other types of software for clients around
of research and development is exerting considerable pressures on the American system. Indeed, as the
United States is learning, globalization cuts both ways: it is both a potent catalyst of U.S. technological
to keep its
privileged position in the world, the U nited S tates must get better at
fostering technological entrepreneurship at home.
Technological innovation is of central importance to the study of international relations (IR), affecting almost every
aspect of the sub-field.2 First and foremost, a nations technological capability has a significant effect on its
economic growth, industrial might, and military prowess; therefore relative national technological capabilities
necessarily influence the balance of power between states, and hence have a role in calculations
of war and alliance formation. Second, technology and innovative capacity also determine a nations
trade profile, affecting which products it will import and export, as well as where multinational
corporations will base their production facilities.3 Third, insofar as innovation-driven economic growth both attracts investment and
produces surplus capital, a nations technological ability will also affect international financial flows
and who has power over them.4 Thus, in broad theoretical terms, technological change is important to the study of IR because of its
overall implications for both the relative and absolute power of states. And if theory alone does not convince, then history also tells us that
nations on the technological ascent generally experience a corresponding and dramatic
change in their global stature and influence, such as Britain during the first industrial revolution, the United States and
Germany during the second industrial revolution, and Japan during the twentieth century.5 Conversely, great powers which fail to
maintain their place at the technological frontier generally drift and fade from influence on
international scene.6 This is not to suggest that technological innovation alone determines international politics, but rather that shifts in
both relative and absolute technological capability have a major impact on international
relations, and therefore need to be better understood by IR scholars indirect source of military doctrine. And for some, like Gilpin
quoted above, technology is the very cornerstone of great power domination, and its
transfer the main vehicle by which war and change occur in world politics.8 Jervis tells us
that the balance of offensive and defensive military technology affects the incentives for war.9 Walt
agrees, arguing that technological change can alter a states aggregate power, and thereby
affect both alliance formation and the international balance of threats .10 Liberals are less directly
concerned with technological change, but they must admit that by raising or lowering the costs of using force,
technological progress affects the rational attractiveness of international cooperation and
regimes.11 Technology also lowers information & transactions costs and thus increases the applicability of international institutions, a cornerstone of
Liberal IR theory.12 And in fostering flows of trade, finance, and information, technological change can lead to Keohanes interdependence13 or Thomas
Friedman et als globalization.14 Meanwhile, over at the third debate, Constructivists cover the causal spectrum on the issue, from Katzensteins
cultural norms which shape security concerns and thereby affect technological innovation;15 to Wendts stripped down technological determinism in
which technology inevitably drives nations to form a world state.16 However most Constructivists seem to favor Wendt, arguing that new technology
changes peoples identities within society, and sometimes even creates new cross-national constituencies, thereby affecting international politics.17 Of
course, Marxists tend to see technology as determining all social relations and the entire course of history, though they describe mankinds major fault
lines as running between economic classes rather than nation-states.18 Finally, Buzan & Little remind us that without advances in the technologies of
transportation, communication, production, and war, international systems would not exist in the first place.19
Unipolarity thus generates far fewer incentives than either bipolarity or multipolarity for
direct great power positional competition over status. Elites in the other major powers continue to
prefer higher status, but in a unipolar system they face comparatively weak incentives to translate that preference into
ways decision makers identify with the states they represent may prompt
them to frame issues as positional disputes over status in a social hierarchy. I
develop hypotheses that tailor this scholarship to the domain of great power politics, showing how the probability
of status competition is likely to be linked to polarity . The rest of the article investigates
whether there is sufficient evidence for these hypotheses to warrant further refinement and testing. I pursue this in three
30] demonstrating that the causal mechanisms it identifies did drive relatively secure major powers to military conflict in
the past (and therefore that they might do so again if the world were bipolar or multipolar); and by showing that
observable evidence concerning the major powers identity politics and grand strategies under unipolarity are consistent
with the theorys expectations. Puzzles of Power and War Recent research on the connection between the distribution of
capabilities and war has concentrated on a hypothesis long central to systemic theories of power transition or hegemonic
10
they have garnered substantial empirical support, these theories have yet to solve two intertwined empirical and
theoretical puzzleseach of which might be explained by positional concerns for status. First, if the material costs and
benefits of a given status quo are what matters, why would a state be dissatisfied with the very status quo that had
abetted its rise? The rise of China today naturally prompts this question, but it is hardly a novel situation. Most of the best
known and most consequential power transitions in history featured rising challengers that were prospering mightily
under the status quo. In case after case, historians argue that these revisionist powers sought recognition and standing
rather than specific alterations to the existing rules and practices that constituted the order of the day. In each
paradigmatic case of hegemonic war, the claims of the rising power are hard to reduce to instrumental adjustment of the
status quo. In R. Ned Lebows reading, for example, Thucydides account tells us that the rise of Athens posed
unacceptable threats not to the security or welfare of Sparta but rather to its identity as leader of the Greek world, which
was an important cause of the Spartan assemblys vote for war.11 The issues that inspired Louis XIVs and Napoleons
dissatisfaction with the status quo were many and varied, but most accounts accord [End Page 31] independent
importance to the drive for a position of unparalleled primacy. In these and other hegemonic struggles among leading
states in post-Westphalian Europe, the rising challengers dissatisfaction is often difficult to connect to the material costs
and benefits of the status quo, and much contemporary evidence revolves around issues of recognition and status. 12
Wilhemine Germany is a fateful case in point. As Paul Kennedy has argued, underlying material trends as of 1914 were set
to propel Germanys continued rise indefinitely, so long as Europe remained at peace.13 Yet Germany chafed under the
very status quo that abetted this rise and its elite focused resentment on its chief trading partnerthe great power that
presented the least plausible threat to its security: Great Britain. At fantastic cost, it built a battleship fleet with no
plausible strategic purpose other than to stake a claim on global power status. 14 Recent historical studies present strong
evidence that, far from fearing attacks from Russia and France, German leaders sought to provoke them, knowing that this
would lead to a long, expensive, and sanguinary war that Britain was certain to join. 15 And of all the motivations swirling
round these momentous decisions, no serious historical account fails to register German leaders oft-expressed yearning
for a place in the sun. The second puzzle is bargaining failure. Hegemonic theories tend to model war as a conflict over
the status quo without specifying precisely what the status quo is and what flows of benefits it provides to states. 16
Scholars generally follow Robert Gilpin in positing that the underlying issue concerns a desire to redraft the rules by
which relations among nations work, the nature and governance of the system, and the distribution of territory among
the states in the system.17 If these are the [End Page 32] issues at stake, then systemic theories of hegemonic war and
power transition confront the puzzle brought to the fore in a seminal article by James Fearon: what prevents states from
striking a bargain that avoids the costs of war? 18 Why cant states renegotiate the international order as underlying
capabilities distributions shift their relative bargaining power? Fearon proposed that one answer consistent with strict
rational choice assumptions is that such bargains are infeasible when the issue at stake is indivisible and cannot readily
states negotiate and the availability of linkages and side-payments suggest that intermediate bargains typically will
exist.19 Thus, most scholars have assumed that the indivisibility problem is trivial, focusing on two other rational choice
explanations for bargaining failure: uncertainty and the commitment problem. 20 In the view of many scholars, it is these
problems, rather than indivisibility, that likely explain leaders inability to avail themselves of such intermediate bargains.
feasible divisions of the matter in dispute even when failing to do so imposes high
costs; demands on the part of states for observable evidence to confirm their estimate of an improved position in the
hierarchy; the inability of private bargains to resolve issues; a frequently observed compulsion for the
public attainment of concessions from a higher ranked state; and stubborn resistance on the part of states to
which such demands are addressed even when acquiescence entails limited material cost .
The literature on bargaining failure in the context of power shifts remains inconclusive, and it is premature to take any
empirical pattern as necessarily probative. Indeed, Robert Powell has recently proposed that indivisibility is not a
rationalistic explanation for war after all: fully rational leaders with perfect information should prefer to settle a dispute
over an indivisible issue by resorting to a lottery rather than a war certain to destroy some of the goods in dispute. What
might prevent such bargaining solutions is not indivisibility itself, he argues, but rather the parties inability to commit to
abide by any agreement in the future if they expect their relative capabilities to continue to shift.22 This is the credible
commitment problem to which many theorists are now turning their attention. But how it relates to the information
problem that until recently dominated the formal literature remains to be seen. 23 The larger point is that positional
concerns for status may help account for the puzzle of bargaining failure. In the rational choice bargaining literature, war
is puzzling because it destroys some of the benefits or flows of benefits in dispute between the bargainers, who would be
better off dividing the spoils without war. Yet what happens to these models if what matters for states is less the flows of
material benefits themselves than their implications for relative status? The salience of this question depends on the
Mainstream
theories generally posit that states come to blows over an international status quo
only when it has implications for their security or material well-being. The guiding
relative importance of positional concern for status among states. Do Great Powers Care about Status?
assumption is that a states satisfaction [End Page 34] with its place in the existing order is a function of
the material costs and benefits implied by that status.24 By that assumption, once a states status in an
international order ceases to affect its material wellbeing, its relative standing will have no bearing on
retrenchment, in any of its guises, must be avoided. If the United States adopted such
would lead to far greater instability and
war in the world, imperil American security and deny the United States and its allies the benefits of primacy. There
are two critical issues in any discussion of America's grand strategy: Can America remain the dominant state? Should
it strive to do this? America can remain dominant due to its prodigious military, economic and soft power capabilities.
The totality of that equation of power answers the first issue. The United States has overwhelming military capabilities
and wealth in comparison to other states or likely potential alliances. Barring some disaster or tremendous folly, that
will remain the case for the foreseeable future. With few exceptions, even those who advocate retrenchment
acknowledge this. So the debate revolves around the desirability of maintaining American primacy. Proponents of
retrenchment focus a great deal on the costs of U.S. action but they fall to realize what is good about American
primacy. The price and risks of primacy are reported in newspapers every day; the benefits that stem from it are not.
A GRAND strategy of ensuring
the U.S. homeland and American global interests. These interests include ensuring that critical resources like
oil
flow around the world, that the global trade and monetary regimes flourish and that
Washington's worldwide network of allies is reassured and protected. Allies are a great asset to the United States, in
part because they shoulder some of its burdens. Thus, it is no surprise to see NATO in Afghanistan or the Australians
in East Timor. In contrast, a strategy based on retrenchment will not be able to achieve these fundamental objectives
of the United States. Indeed,
retrenchment will make the United States less secure than the
threats will exist no matter what role America
chooses to play in international politics. Washington cannot call a "time out", and it cannot hide from threats.
Whether they are terrorists, rogue states or rising powers, history shows that threats
must be confronted. Simply by declaring that the United States is "going home", thus abandoning its
commitments or making unconvincing half-pledges to defend its interests and allies, does not mean
that others will respect American wishes to retreat. To make such a declaration implies weakness and emboldens aggression. In the anarchic world of the animal kingdom, predators prefer to
eat the weak rather than confront the strong. The same is true of the anarchic world of international politics. If there is no diplomatic solution to the threats that confront the United States, then the conventional
and strategic military power of the United States is what protects the country from such threats. And when enemies
must be confronted, a strategy based on primacy focuses on engaging enemies overseas, away from .American soil.
Indeed, a key tenet of the Bush Doctrine is to attack terrorists far from America's shores and not to wait while they
use bases in other countries to plan and train for attacks against the United States itself. This requires a physical,
on-the-ground presence that cannot be achieved by offshore balancing. Indeed, as Barry Posen has noted, U.S.
primacy is secured because America, at present, commands the "global common"--the oceans, the world's airspace
and outer space-allowing the United States to project its power far from its borders, while denying those common
avenues to its enemies. As a consequence, the costs of power projection for the United States and its allies are
reduced, and the robustness of the United States' conventional and strategic deterrent capabilities is increased.' This
is not an advantage that should be relinquished lightly. A remarkable fact about international politics today--in
a
world where American primacy is clearly and unambiguously on display--is that countries
want to align themselves with the United States. Of course, this is not out of any sense of
altruism, in most cases, but because doing so allows them to use the power of the U nited
States for their own purposes, their own protection, or to gain greater influence. Of 192 countries, 84 are
allied with America--their security is tied to the United States through treaties and other informal arrangements-and
they include almost all of the major economic and military powers. That is a ratio of almost 17 to one (85 to five), and
a big change from the Cold War when the ratio was about 1.8 to one of states aligned with the United States versus
U.S. primacy-and the bandwagoning effect-has also given us extensive influence in international
the Soviet Union. Never before in its history has this country, or any country, had so many allies.
politics, allowing the United States to shape the behavior of states and international institutions. Such influence
comes in many forms, one of which is America's ability to create coalitions of like-minded states to
free Kosovo, stabilize Afghanistan, invade Iraq or to stop proliferation through the Proliferation Security Initiative (PSI).
Doing so allows the United States to operate with allies outside of the where it can be stymied by opponents.
American-led wars in Kosovo, Afghanistan and Iraq stand in contrast to the UN's inability to save the people of Darfur
or even to conduct any military campaign to realize the goals of its charter. The quiet effectiveness of the PSI in
dismantling Libya's WMD programs and unraveling the A. Q. Khan proliferation network are in sharp relief to the
typically toothless attempts by the UN to halt proliferation. You can count with one hand countries opposed to the
United States. They are the "Gang of Five": China, Cuba, Iran, North Korea and Venezeula. Of course, countries like
India, for example, do not agree with all policy choices made by the United States, such as toward Iran, but New Delhi
is friendly to Washington. Only the "Gang of Five" may be expected to consistently resist the agenda and actions of
the United States. China is clearly the most important of these states because it is a rising great power. But even
Beijing is intimidated by the United States and refrains from openly challenging U.S. power. China proclaims that it
will, if necessary, resort to other mechanisms of challenging the United States, including asymmetric strategies such
as targeting communication and intelligence satellites upon which the United States depends. But China may not be
confident those strategies would work, and so it is likely to refrain from testing the United States directly for the
foreseeable future because China's power benefits, as we shall see, from the international order U.S. primacy creates.
The other states are far weaker than China. For three of the "Gang of Five" cases--Venezuela, Iran, Cuba-it is an
anti-U.S. regime that is the source of the problem; the country itself is not intrinsically anti-American. Indeed, a
change of regime in Caracas, Tehran or Havana could very well reorient relations. THROUGHOUT HISTORY, peace and
stability have been great benefits of an era where there was a dominant power--Rome, Britain or the United States
today. Scholars and statesmen have long recognized the irenic effect of power on the anarchic world of international
maintained without the current amount of U.S. power behind it. In that they are dead wrong and need to be reminded
you lose it)." Consequently, it is important to note what those good things are. In addition to ensuring the security of
the United States and its allies, American
outcomes for Washington and the world. The first has been
U.S. leadership reduced friction among many states that were historical antagonists, most
to say it fulfills Woodrow Wilson's vision of ending all war. Wars still occur where Washington's interests are not
source of much good for the countries concerned as well as the United States because, as John Owen noted on these
pages in the Spring 2006 issue, liberal democracies are more likely to align with the United States and be sympathetic
well as for advancing the interests of the United States. Critics have faulted the Bush Administration for attempting to
spread democracy in the Middle East, labeling such an effort a modern form of tilting at windmills. It is the obligation
of Bush's critics to explain why democracy is good enough for Western states but not for the rest, and, one gathers
from the argument, should not even be attempted. Of course, whether democracy in the Middle East will have a
peaceful or stabilizing influence on America's interests in the short run is open to question. Perhaps democratic Arab
states would be more opposed to Israel, but nonetheless, their people would be better off. The United States has
brought democracy to Afghanistan, where 8.5 million Afghans, 40 percent of them women, voted in a critical October
2004 election, even though remnant Taliban forces threatened them. The first free elections were held in Iraq in
January 2005. It was the military power of the United States that put Iraq on the path to democracy. Washington
fostered democratic governments in Europe, Latin America, Asia and the Caucasus. Now even the Middle East is
increasingly democratic. They may not yet look like Western-style democracies, but democratic progress has been
made in Algeria, Morocco, Lebanon, Iraq, Kuwait, the Palestinian Authority and Egypt. By all accounts, the march of
democracy has been impressive. Third, along with the growth in the number of democratic states around the world
has been the growth of the global economy. With its allies, the United States has labored to create an economically
liberal worldwide network characterized by free trade and commerce, respect for international property rights, and
mobility of capital and labor markets. The economic stability and prosperity that stems from this
economic order is a global public good from which all states benefit, particularly the poorest states in the Third World.
The United States created this network not out of altruism but for the benefit and the economic well-being of America.
This economic order forces American industries to be competitive, maximizes efficiencies and growth, and benefits
defense as well because the size of the economy makes the defense burden manageable. Economic spin-offs foster
the development of military technology, helping to ensure military prowess. Perhaps the greatest testament to the
benefits of the economic network comes from Deepak Lal, a former Indian foreign service diplomat and researcher at
the World Bank, who started his career confident in the socialist ideology of post-independence India. Abandoning the
positions of his youth, Lal now recognizes that the only way to bring relief to desperately poor countries of the Third
one of the strongest academic proponents of American primacy due to the economic prosperity it provides.
1acplan
The United States federal government should ban the
creation and surveillance of backdoors as outlined in the
Secure Data Act of 2015.
1acsolvency
The plan bans backdoors entirelythat strengthens
cybersecurity and revitalizes tech competitiveness
McQuinn, 14
the cloud. So, the purported law enforcement need is even less
compelling than it was in the 90s . Meanwhile, the security implications of trying to
mandate backdoors throughout the vast ecosystem of digital communications services have only gotten
more dire in the intervening years, as laid out in an exhaustive new report issued just this morning by over
a dozen heavy-hitting security experts. Yesterday, Comey conceded that after a meaningful debate, it may
be that we as a people decide that the benefits of widespread encryption outweigh the costs and that
theres no sensible, technically feasible way to guarantee government access to encrypted data. But the
fact is that we had that debate 20 years ago, and weve been having it again for nearly a year. We are not
talking past each other; a wide range of advocates, industry stakeholders, policymakers, and experts has
been speaking directly to Comeys arguments since last fall. Hopefully he will soon start listening, rather
than dooming us to repeat the mistakes of the past and dragging us into another round of Crypto Wars.
We have already had the debate that Comey says he wants. All
thats left is for him to admit that hes lost.
Misc
National Security Agency's ability to spy on Americans' communications data, a day after the measure was
their devices or software. Sen. Ron Wyden, also a Democrat, introduced a similar version of the bill earlier
Thursday. A Lofgren aide said the bill is expected to be introduced later Thursday with Republican
cosponsors.
the House in June with bipartisan support on a 293-123 vote, in the form
of an amendment tacked on to a defense appropriations bill. That previous bill additionally would have
prevented intelligence agencies from engaging in content surveillance of Americans' communications data
without a warrant. But the language was left out of ongoing negotiations between both chambers over a
spending package that would fund most government agencies into next year. The House has additionally
30 civil-liberties
groups of both liberal and conservative leanings wrote to House
leadership to urge it to retain the proposal as part of its funding
package. "Failing to include this amendment in the forthcoming FY15 omnibus will send a clear
barred amendments to that omnibus measure, a common practice. On Thursday,
message to Americans that Congress does not care if the NSA searches their stored communications or if
the government pressures American technology companies to build vulnerabilities into their products that
assist in NSA surveillance," read the letter, whose signatories include the Electronic Frontier Foundation
and TechFreedom.
(Megan, writer for Ars Technica, 6-20-14, House votes 293-123 to cut funding
for NSA spying on Americans, http://arstechnica.com/techpolicy/2014/06/house-votes-293-123-to-cut-funding-for-nsa-spying-onamericans-building-backdoors/, BC)
In a surprising vote late Thursday night, a strong majority of the House of
Representatives voted to cut funding to NSA operations that involve
warrantless spying on Americans or involve putting hardware or software "backdoors"
into various products. The amendment to a defense appropriations bill, offered by
Reps. James Sensenbrenner (R-WI), Zoe Lofgren (D-CA), and Thomas Massie (R-KY), passed 293 to
123. The amendment specifies that, with a few exceptions, none of the funds made available by this
Act may be used by an officer or employee of the United States to query a collection of foreign intelligence
information acquired under section 702 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1881a) using a United States person as an identifier. In addition, none of the funds made available by
this Act may be used by the National Security Agency or the Central Intelligence Agency to mandate or
request that a person...alter its product or service to permit the electronic surveillance...of any user of said
product or service for said agencies. Since Edward Snowden began leaking documents about the NSA's
tactics in June of last year, security experts have worried about reports of intentional weaknesses left in
widely used cryptography specifications. The amendment is a contrast to the USA Freedom Act passed
last month. That bill was initially intended to reform the NSA but, in its final form, still permitted the spy
agency to access its vast trove of phone call metadata. Because the item passed tonight was an
amendment to an appropriations bill, it went to the floor without being scrutinized by the intelligence
committee, which is "basically a proxy for the intelligence community, as Julian Sanchez of the Cato
solvency shit
UN experts agree bruh
Kaye, prof law, 15
(David, UN Special Rapporteur on the promotion and protection of the right to
freedom of opinion and expression, clinical professor of law at the University
of California, Irvine, School of Law. Report of the Special Rapporteur on the
promotion and protection of the right to freedom of opinion and expression,
5-22-15, http://justsecurity.org/wp-content/uploads/2015/06/Kaye-HRC-ReportEncryption-Anonymity.pdf)
57. States should revise or establish, as appropriate, national laws and regulations to promote and protect
the rights to privacy and freedom of opinion and expression. With respect to encryption and anonymity,
States should adopt policies of non-restriction or comprehensive protection, only adopt restrictions on a
case-specific basis and that meet the requirements of legality, necessity, proportionality and legitimacy in
objective, require court orders for any specific limitation, and promote security and privacy online through
public education. 58. Discussions of encryption and anonymity have all too often focused only on their
restrictions on individual security online should be subject to public debate and adopted according to
regular, public, informed and transparent legislative process. States must promote effective participation
of a wide variety of civil society actors and minority groups in such debate and processes and avoid
adopting such legislation under accelerated legislative procedures. General debate should highlight the
protection that encryption and anonymity provide, especially to the groups most at risk of unlawful
interferences. Any such debate must also take into account that restrictions are subject to strict tests: if
they interfere with the right to hold opinions, restrictions must not be adopted. Restrictions on privacy that
limit freedom of expression for purposes of the present report, restrictions on encryption and anonymity
must be provided by law and be necessary and proportionate to achieve one of a small number of
National laws
should recognize that individuals are free to protect the privacy of
their digital communications by using encryption technology and
tools that allow anonymity online. Legislation and regulations
protecting human rights defenders and journalists should also
include provisions enabling access and providing support to use the
technologies to secure their communications. 60. States should not
restrict encryption and anonymity, which facilitate and often enable the rights to
freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States
legitimate objectives. 59. States should promote strong encryption and anonymity.
should avoid all measures that weaken the security that individuals
may enjoy online, such as backdoors , weak encryption standards and key escrows. In
addition, States should refrain from making the identification of users a
condition for access to digital communications and online services
and requiring SIM card registration for mobile users. Corporate actors should
likewise consider their own policies that restrict encryption and anonymity (including through the use of
pseudonyms). Court-ordered decryption, subject to domestic and international law, may only be
permissible when it results from transparent and publicly accessible laws applied solely on a targeted,
case-by-case basis to individuals (i.e., not to a mass of people) and subject to judicial warrant and the
protection of due process rights of individuals.
(Bruce, cybersecurity expert, fellow at the Berkman Center for Internet and
Society at Harvard Law School, a program fellow at the New America
Foundation's Open Technology Institute, Stop the hysteria over Apple
encryption, http://www.cnn.com/2014/10/03/opinion/schneier-appleencryption-hysteria/, BC)
Law enforcement has been complaining about "going dark" for decades
now. In the 1990s, they convinced Congress to pass a law requiring phone companies to ensure that phone
protects people in totalitarian governments from arrest and detention. This isn't just me talking: The FBI
which the FBI can still get a warrant for. It truly is the golden age of
surveillance.
Impacts
Cyber-terror causes accidental nuclear war
Jason Fritz 9, Former Captain of the U.S. Army, July, Hacking Nuclear
Command and Control,
www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.doc
The US uses the two-man rule to achieve a higher level of security in nuclear affairs. Under this rule two authorized
personnel must be present and in agreement during critical stages of nuclear command and control. The President must
jointly issue a launch order with the Secretary of Defense; Minuteman missile operators must agree that the launch order
is valid; and on a submarine, both the commanding officer and executive officer must agree that the order to launch is
valid. In the US, in order to execute a nuclear launch, an Emergency Action Message (EAM) is needed. This is a
preformatted message that directs nuclear forces to execute a specific attack. The contents of an EAM change daily and
consist of a complex code read by a human voice. Regular monitoring by shortwave listeners and videos posted to
YouTube provide insight into how these work. These are issued from the NMCC, or in the event of destruction, from the
designated hierarchy of command and control centres. Once a command centre has confirmed the EAM, using the twoman rule, the Permissive Action Link (PAL) codes are entered to arm the weapons and the message is sent out. These
messages are sent in digital format via the secure Automatic Digital Network and then relayed to aircraft via singlesideband radio transmitters of the High Frequency Global Communications System, and, at least in the past, sent to
nuclear capable submarines via Very Low Frequency (Greenemeier 2008, Hardisty 1985). The technical details of VLF
submarine communication methods can be found online, including PC-based VLF reception. Some reports have noted a
instructions for validating launch orders (Blair 2003). Adding further to the concern of cyber terrorists seizing control over
submarine launched nuclear missiles; The Royal Navy announced in 2008 that it would be installing a Microsoft Windows
operating system on its nuclear submarines (Page 2008). The choice of operating system, apparently based on Windows
unlikely that the operating system would play a direct role in the signal to launch, although this is far from certain.
at underground facilities, such as those reported to be located at Yamantau and Kosvinksy mountains in the central
southern Urals (Rosenbaum 2007, Blair 2008) Indirect Control of Launch
These systems are designed to protect against the worlds most powerful and well funded militaries. Yet, there are
recurring gaffes, and the very nature of asymmetric warfare is to bypass complexities by finding simple loopholes. For
example, commercially available software for voice-morphing could be used to capture voice commands within the
command and control structure, cut these sound bytes into phonemes, and splice it back together in order to issue false
voice commands (Andersen 2001, Chapter 16). Spoofing could also be used to escalate a volatile situation in the hopes of
starting a nuclear war. [they cut off the paragraph] In June 1998, a group of international hackers calling themselves
Milw0rm hacked the web site of Indias Bhabha Atomic Research Center (BARC) and put up a spoofed web page showing a
mushroom cloud and the text If
a nuclear war does start , you will be the first to scream (Denning
1999). Hacker web-page defacements like these are often derided by critics of cyber terrorism as simply being a nuisance
which causes no significant harm. However, web-page defacements are becoming more common, and they point towards
alarming possibilities in subversion. During the 2007 cyber attacks against Estonia, a counterfeit letter of apology from
Prime Minister Andrus Ansip was planted on his political party website (Grant 2007). This took place amid the confusion of
mass DDoS attacks, real world protests, and accusations between governments.
"Resilient Military Systems and the Advanced Cyber Threat," was prepared by the Department of Defense's
if China ever
hacks us, "Protect the Nuclear Strike as a Deterrent." The phrase is repeated
Defense Science Board, and over the course of 138 pages makes one very clear point:
again and againthe word "nuclear" appears 113 times in a report ostensibly dealing with computer
warfare. The entire thing is riddled with jargon, euphemism, and rosy military metaphorclimbing the
ladder of deterrence!but
is unequivocal . Let's put it plainly: China should know that we have nukes,
tons of 'em, and if China's stellar hacker platoons ever tried to, say, bring down
an American satellite, destabilize a dam, or switch off an enormous
chunk of the power grid as part of an open military attack, they
electronic disruption)
the United States as 'extreme circumstances.'"Waitwhat's a Tier V-VI adversary cyber attack? That's
simple: "States with the ability to successfully execute full spectrum (cyber capabilities in combination with
all of their military and intelligence capabilities) operations to achieve a specific outcome in political,
military, economic, etc. domains."
a cyber attack that can take out a civilian power grid, for
could also cripple the U.S. military . The senator notes that is that the same
power grids that supply cities and towns, stores and gas stations, cell
towers and heart monitors also power every military base in our country. Although
bases would be prepared to weather a short power outage with backup diesel
generators, within hours, not days, fuel supplies would run out, he said. Which means
military c ommand and c ontrol centers could go dark . Radar
systems that detect air threats to our country would shut Down completely.
Communication between commanders and their troop s would also go
silent. And many weapons systems would be left without either fuel or
electric power, said Senator Grassley. So in a few short hours or days,
the mightiest military in the world would be left scrambling to
maintain base functions, he said. We contacted the Pentagon and
officials confirmed the threat of a cyber attack is something very
example
real . Top national security officialsincluding the Chairman of the Joint Chiefs, the Director of
have said, preventing a
cyber attack and improving the nations electric grids is among the most urgent priorities
the National Security Agency, the Secretary of Defense, and the CIA Director
of our country (source: Congressional Record). So how serious is the Pentagon taking all this? Enough to start, or end a
war over it, for sure.
if authorized by