Eugenia+and+Matt

Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense
I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security.
 * Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable
US energy infrastructure is vast, aging, and in need of an overhaul, AND infrastructure, but it ain't for lack of people trying," Moniz said.
 * Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL

Successful grid attacks cause retaliation and escalation to nuclear war
To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.
 * Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM

Even absent retaliation, grid failure triggers nuclear meltdowns and extinction
If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.
 * Huff, staff writer @ Natural News, 14** (Ethan A. Huff, staff writer and news analyst for Naturalnews.com and writer for AlignLife.com, Natural News is a credible news source reporting on natural events, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429'nuclear'power'electric'grid'global'extinction.html#)//chiragjain

US economy is in decline – Trade deficit at a 6½ year high
The U.S. economy shrank at an annualized pace of 0.7 AND back debt or rebuild savings, according to government and credit card data.
 * Harlan 5/29 [Chico, covers economics for the Washington Post, Works for several other acclaimed magazines, "U.S. economy shrinks in first quarter, raising questions about underlying strength", Washington Post, May 29, 2015,** http://www.washingtonpost.com/blogs/wonkblog/wp/2015/05/29/analysts-expect-decline-in-u-s-gdp-in-first-quarter/**, July 17, 2015] KL**

Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth
Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.
 * Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Exceptional access is bad – tech companies will not update their software which hinders innovation and market growth. Customers will also be driven away due to faulty security
Designing exceptional access into today’s information services and applications will give rise to a range AND secure Internet for law enforcement gains that are at best minor and tactical.
 * Schneier et al 15 – Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography. Other authors are all security experts from all places. Most are from MIT("Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications"; 2015-07-06;** http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8**; Page 15-17)//pk**

Growth is vital to prevent multiple scenarios for conflict escalation and extinction
"The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM Let me posit a radical idea: The most critical threat facing the United States AND just for Americans, but for the vast majority of the planet’s inhabitants.
 * Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University.

Economic decline causes war and miscalculation
Less intuitive is how periods of economic decline may increase the likelihood of external conflict AND such, the view presented here should be considered ancillary to those views.
 * Royal 10** — Jedidiah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, M.Phil. Candidate at the University of New South Wales, 2010 ("Economic Integration, Economic Signalling and the Problem of Economic Crises," Economics of War and Peace: Economic, Legal and Political Perspectives, Edited by Ben Goldsmith and Jurgen Brauer, Published by Emerald Group Publishing, ISBN 0857240048, p. 213-215)

Capability and effectiveness are collapsing now due to overreliance on encryption backdoors – only the plan solves
Last fall, when Apple and Google announced they were cleaning up their operating systems AND of fighting the modern encryption revolution, the government should be embracing it.
 * Eddington, Security Prof @ Georgetown, 15** (Patrick G. Eddington, assistant professor in the Security Studies Program at Georgetown University, policy analyst in Homeland Security and Civil Liberties at the Cato Institute, former military imagery analyst at the CIA’s National Photographic Interpretation Center, former communications director and senior policy advisor to Rep. Rush Holt (D-NJ), spent 11 years in the U.S. Army Reserve and the National Guard in both enlisted and commissioned service, M.A. National Security Studies, Georgetown University, B.A. International Affairs, Missouri State University, "US wants to hack your phone because it doesn’t have real spies it needs". Reuters. 2/23/15. http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-before-it-was-against-it/)//ET

HUMINT works – prefer empirics
 December 9 2014 ) \\mwang The most incredible and false claim in the Senate intelligence committee’s report on the CIA AND deep responsibility for ensuring they could not do it again. We succeeded.
 * McLaughlin 14** (John McLaughlin, the CIA’s acting director in 2004 and deputy director from 2000 to 2004. His CIA career lasted more than 30 years. Deputy Director and Director of the Office of European Analysis from 1985 to 1989 Deputy Director for Intelligence, Vice Chairman for Estimates of the National Intelligence Council, and Acting Chairman of the National Intelligence Council from 1995 to 1997. "Senate Interrogation report distorts the CIA’s successes at foiling terrorist Plots" The Washington Post

Studies prove Humint is empirically successful— key to solve terror, narcotics and prolif
Loch Johnson ‘9—— Loch has a PhD, Political Science, University of California at Riverside. He is Regents Professor of Political Science in the Department of International Affairs at the University of Georgia. Dr Johnson was Special Assistant to the Chair of the Senate Select Committee House Sub-committee on Intelligence Oversight. He was a Visiting Scholar at Yale University in 2005. Johnson edits the Praeger Security International Series Intelligence and the Quest for Security and is co-editor of the journal Intelligence and National Security. (Lock, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p'mla'apa'research'citation/3/1/0/6/6/pages310665/p310665-14.php)//ET Deutch, they argued, failed to understand the Hobbesian nature of international affairs; AND was "unsurpassed as a source of critical intelligence to the national policymaker."

Prolif spirals out of control – states engage in preemptive nuclear war with biological weapons
Further, the large number of states that became capable of building nuclear weapons over AND building other types of weapons of mass destruction, such as biological weapons.
 * Utgoff 02** – Deputy Director of the Strategy, Forces, and Resources Division of the Institute for Defense Analysis (Victor, "Survival: Proliferation, Missile Defense and American Ambitions," p. 87-88, tony)

HUMINT filters the probability and magnitude of all existential threats – prefer consensus of experts and empirics
Abstract Intelligence is considered the first line of defense in U.S. security AND with an overall judgment about the value of agents for a nation’s security.
 * Johnson, Poli Sci Prof @ Georgia, 9** (Loch Johnson, Regents Professor of Political Science, University of Georgia, former special assistant to the chair of the Senate Select Committee House Subcommittee on Intelligence Oversight, former staff director of the House Subcommittee on Intelligence Oversight, former visiting scholar at Yale University, won the Josiah Meigs Prize, the highest teaching honor at the University of Georgia in addition to the Owens Award, its highest honor for research, editor of Intelligence and National Security, Ph.D. political science, University of California at Riverside, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p'mla'apa'research'citation/3/1/0/6/6/pages310665/p310665-14.php)//ET

Plan
====The United States federal government should implement subsection A of the Secure Data Agency with the added provision that no agency can coerce or provide financial incentives to companies or organizations for implementing backdoors into encryption.====

NSA cannot break strong encryption- no circumvention possible
Williams 14 (Lauren C. Williams, tech reporter for ThinkProgress with an affinity for consumer privacy, cybersecurity, tech culture, and the intersection of civil liberties and tech policy, previous writer for B2B publications, Master’s degree from the University of Michigan and a bachelor’s degree from the University of Delaware, ThinkProgress, "New Snowden Documents Reveal that the NSA Can’t Hack Everyone, 12/29/14 http://thinkprogress.org/world/2014/12/29/3607160/new-snowden-documents-show-nsa-proof-encryption-exists/) A new wave of U.S. National Security Agency (NSA) document AND and store consumer data, if they want to do business in Europe.

Companies won’t comply to backdoors regardless – empirics prove
Golumbic ‘7 – (Charles Martin, University of Haifa, Professor of Computer Science, and Director of the Caesarea Rothschild Institute for Interdisciplinary Applications of Computer Science, "Fighting Terror Online: the Convergence of Security, Technology, and the Law")//MP Those involved in the private sector have a clear interest in developing their products in AND restrictions were affecting the ability of American companies to compete effectively in world markets

End to end encryption solves – companies can’t give government data even if they wanted
Here's an important question to ask when assessing if a service or app that uses AND the service provider cannot look at your communications even if they wanted to.
 * Lee 13** (Micah Lee is a technologist that works on operational security, source protection, privacy, and cryptography for The Intercept. He is a founder and board member of Freedom of the Press Foundation and the author of the "Encryption Works" handbook. He develops open source security tools including OnionShare, SecureDrop, and Tor Browser Launcher, https://freedom.press/encryption-works) BJ

Only the plan solves – vital to security and economy
Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op AND cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable.
 * McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

AND, it’s net better for law enforcement – consensus of experts and empirics
Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for AND America. Thank you, and I welcome your questions on this important matter
 * Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School’s Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM

The Secure Data Act is an important step to rebuilding trust – prevents backdoor mandates
Bipartisan lawmakers today reintroduced the Secure Data Act to protect Americans’ privacy and data security AND requesting or compelling backdoors in services and products to assist with electronic surveillance.
 * Whippy 15** (Peter, Communications Director for the House of Representatives, "Sensenbrenner, Massie & Lofgren Introduce Secure Data Act", 2/4/15, https://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873) WZ