Emmiee-Charlee

=\\1AC\\= toc

Plan:
//**The United States federal government should implement subsection(a) of the Secure Data Act with the added provision that no agency may coerce or provide financial incentives to domestic companies or organizations for implementing backdoors into encryption**//

__Contention 1- Cybersecurity__

 * Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense**
 * Blaze, Comp Sci Prof @ Penn, 15 ** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, “ENCRYPTION TECHNOLOGY POLICY ISSUES”, 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

I. ROBUST DIGITAL SECURITY TECHNOLOGIES __** AND **__ to our economy and to national security.


 * Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable **
 * Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15 ** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, “Climate change, cyberattacks are growing threats to grid, says US energy chief,” 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL

US energy infrastructure is vast __** AND **__ ain't for lack of people trying, " Moniz said.


 * Successful grid attacks cause retaliation and escalation to nuclear war**
 * Tilford, military affairs expert, 12 ** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, “Cyber attackers could shut down the electric grid for the entire east coast,” Wichita Military Affairs Examiner, 7-27-2012, [] )KMM

To make matters worse __** AND **__ if authorized by the President.


 * Even absent retaliation, grid failure triggers nuclear meltdowns and extinction**
 * Huff, staff writer @ Natural News, 14 ** (Ethan A. Huff, staff writer and news analyst for Naturalnews.com and writer for AlignLife.com, Natural News is a credible news source reporting on natural events, “Nuclear power + grid down event = global extinction for humanity,” Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#)//chiragjain)//

// If you think the Fukushima situation is bad // //__** AND **__// // everywhere prone to meltdowns. //

//**Terrorists lack the motivation to get bombs – even if they did, they’d never pull off an attack**// //** Weiss 2015 ** (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf)//

// A recent paper // //__** AND **__// // the probability of a successful effort. //

__**Contention 2- Economy**__
//**Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth**// //** Clark, economic scholar, 14 ** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, “How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of”, Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Ever since the Edward Snowden leaks __** AND **__ US technology sector simply by telling the truth.

“The World Without America,” 4-30-2013, [])KMM
 * Growth is vital to prevent multiple scenarios for conflict escalation and extinction**
 * Haass, President of CFR and former Director of Policy Planning @ State, 13 ** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University.

Let me posit a radical idea: __** AND **__ the vast majority of the planet’s inhabitants.


 * Economic collapse causes competition for resources and instability that escalates and goes nuclear **
 * Harris and Burrows 9 ** [counselor in the National Intelligence Council, the principal drafter of Global Trends 2025, **member of the NIC’s Long Range Analysis Unit “Revisiting the Future: Geopolitical Effects of the Financial Crisis”, Washington Quarterly, 04/09/2009, [], 5/22/15] KL**

Of course, the report encompasses __** AND **__ states in a more dog-eat-dog world.


 * Tech Industry Specifically k2 economy**
 * Kvochko 13 ** [Elena, Manager in Information Technology Industry at World Economic Forum, “Five ways technology can help the economy”, World Economic Forum, Publisher of stories about the world economy, April 11, 2013, [], July 18, 2015] KL

At a time of slowed growth __** AND **__ businesses to serve their customers.

__**Contention 3- Solvency**__
Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, “The Secure Data Act could help law enforcement protect against cybercrime,” The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML
 * Only the plan solves – vital to security and economy**
 * McQuinn 14 ** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

Last Sunday, Sen. Ron Wyden (D-Ore.) __** AND **__ the most secure devices imaginable.


 * It’s net better for law enforcement – consensus of experts and empirics**
 * Bankston 15 ** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School’s Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on “Encryption Technology and Possible U.S. Policy Responses,” 4-29-2015, [])KMM

Chairman Hurd, Ranking Member Kelly __** AND **__ I welcome your questions on this important matter


 * Absent backdoors, Proper encryption is unbreakable**
 * Lee 13 ** (Micah Lee is a technologist that works on operational security, source protection, privacy, and cryptography for The Intercept. He is a founder and board member of Freedom of the Press Foundation and the author of the "Encryption Works" handbook. He develops open source security tools including OnionShare, SecureDrop, and Tor Browser Launcher, []) BJ

To encrypt something __** AND **__ trusted to be secure.


 * Fights over surveillance are inevitable in the squo **
 * Hattem ** **6/3**/15 (Julian, “Spy critics eye next targets”, //The Hill//, [])

Critics of government surveillance hope __** AND **__ detect terrorist activity before it occurs.”


 * Our technical policy literacy is vital to provide a understanding of encryption policy to successfully engineer individual responses- try or die to influence global institutions **
 * Schneier 13 ** (Bruce Schneier, cryptographer, security technologist, fellow at the Berkman Center for Internet and Society at Harvard Law School, program fellow at the New America Foundation's Open Technology Institute, founder and chief technology officer, BT Managed Security Solutions, contributing writer to the Guardian, author of 12 books, honorary Ph.D., University of Westminster, M.S. computer science, American University, B.S. physics, University of Rochester, “The US government has betrayed the internet. We need to take it back,” The Guardian (UK), 9-5-2013, http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying)KMM

Government and industry have betrayed the internet __** AND **__ those of us who love liberty have to fix it.

= \\Neg\\ =

PRISM- 702 and PPD28
1nc: Foucault K, Ex Post CP, Terror DA, T- Domestic, T-Curtail, Solvency- Circumvention turns, Econ Decline ≠ War 2nr: Foucault K

1nc: Foucault K, T-Domestic, T-Curtail, Solvency- Circumvention turns, Econ Decline ≠ War, a2 Cloud Computing 2nr: Foucault K

Body Scanners
1nc: Framework, Neolib K, No Uniqueness 2nr: Neolib K