Rajeev+&+Hyunsik

1ac inherency
====Obama announced that the US would disclose zero-day vulnerabilities, or unknown software flaws, to their vendors —- but loopholes allow the NSA to stockpile zero-days and jeopardize widespread cybersecurity==== Federal agencies served with a Freedom of Information Act request are refusing to release documents AND documents like the ones we have requested, this debate cannot take place.
 * Soghoian and Roubini **20**15** (Chris Soghoian, Principal Technologist and Senior Policy Analyst, American Civil Liberties Union Speech, Privacy, and Technology Project & Sonia Roubini, ACLU Speech, Privacy, and Technology Project, "Feds Refuse to Release Documents on "Zero-Day" Security Exploits", March 3, 2015, https://www.aclu.org/blog/feds-refuse-release-documents-zero-day-security-exploits)//CLi

Additionally, loopholes let the NSA stockpile zero-days purchased from the grey market
Zetter 14 [Kim, award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired, "Obama: NSA must reveal bugs like Heartbleed, unless they help the NSA," Wired, http://www.wired.com/2014/04/obama-zero-day/] //khirn Healey notes that the public statements on the new policy leave a lot of questions AND or to the arsenal of zero-day vulnerabilities the government already possesses.

Intellectual property theft is expanding on a massive scale —- disclosing zero-days builds trust with companies —- info-sharing legislation is key
Jaffer 15 [Jamil N., Adjunct Professor of Law and Director, Security Law Program, George Mason University Law School, Occasional Papers Series, published by the Dean Rusk Center for International Law and Policy, 4-1-2015, "Cybersecurity and National Defense: Building a Public-Private Partnership," http://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1008&context=rusk_oc] //khirn JAMIL N. JAFFER: Thank you Dr. Johnson. Well, I'll actually AND trust between the government and private sector to share that kind of information.

IP theft destroys military operations —- the impact is primacy
4.1 Intellectual Property (IP) Protection and Enforcement Intellectual Property or IP AND China's hackers that cost $1 billion and 20 years to develop.36
 * Warikoo 13** professor of Himalayan and Central Asian Studies at the University of Colorado (Arun, "CYBER WARFARE: CHINA'S ROLE AND CHALLENGE TO THE UNITED STATES" p. 67-8, Jul-Dec 2013, ProQuest) ~| js

That solves great power conflict
Kagan, 2/19/2015 (Robert, Senior fellow with the Project on International Order and Strategy in the Foreign Policy program at Brookings, Ph.D. in American history from American University, "The United States must resist a return to spheres of interest in the international system", Brookings, http://www.brookings.edu/blogs/order-from-chaos/posts/2015/02/19-united-states-must-resist-return-to-spheres-of-interest-international-system-kagan)//JBS Great power competition has returned. Or rather, it has reminded us that it AND , the system will buckle under the unrestrained military competition of regional powers.

Russian IP theft now —- they can't be deterred —- bolstering cyberdefense is key
Russia has ramped up cyber attacks against the United States to an unprecedented level since AND future," he said. "So we've got some work to do."
 * Bennett 4/12**/15 cybersecurity reporter for The Hill (Cory, "Russia's cyberattacks grow more brazen" 4/12/15, http://thehill.com/policy/cybersecurity/238518-russias-cyberattacks-grow-more-brazen) ~| js

That's crucial to Russian modernization efforts
Booz Allen Hamilton 13 [Leading provider of management and technology consulting services to the U.S. government, Economist Intelligence Unit, The Economist, "Cyber Theft of Corporate Intellectual Property: The Nature of the Threat," July 2013, http://www.boozallen.com/insights/2013/07/Cyber-Theft-of-Corporate-Intellectual-Property] //khirn Russia's own espionage effort is also driven by a desire to diversify its economy and AND industry and government networks could give China and Russia military advantages worth billions.

That causes Russian aggression
Isachenov 15 [Vladimir Isachenkov, Associated Press, Business Insider, Feb. 4, 2015, "Russia continues massive military modernization despite economic woes," http://www.businessinsider.com/russia-continues-massive-military-modernization-despite-economic-woes-2015-2#ixzz3eVw3maaO] //khirn MOSCOW (AP) — Hundreds of new Russian aircraft, tanks and missiles are AND the massive military buildup will stretch the nation's economic potential beyond the limit.

That escalates—we're already on the brink of nuclear war
In waging such a limited war, furthermore, Putin would rely not on ICBMs AND must make sure such threats do not emanate again from a world leader.
 * Reid 15** Professor of Law at University of St. Thomas School of Law (Charles J., University of St. Thomas Journal of Law and Public Policy, "VLADIMIR PUTIN'S CULTURE OF TERROR: WHAT IS TO BE DONE?" p. 53–5) ~| js

Effective information sharing makes cyberdefense effective and prevents devastating attacks on critical infrastructure —- status quo legal framework works, but government action is key
Bush 15 [Wes, Chairman, Chief Executive Officer and President, Northrop Grumman Corporation, "Cyber Security: The New Threat; The New Normal," April 22, 2015, address to the Metropolitan Club, http://www.northropgrumman.com/MediaResources/Presentations/2015/Pages/04222015WesBushAtMetropolitanClub.aspx] //khirn Right now, many organizations are facing cyber threats alone. Currently, as soon AND the framework is being used as an industry baseline for cyber insurance underwriting.

Zero-days are key —- inadequate cooperation risks multiple critical sectors —- like electricity and water
Øday exploits are dual-use.24 They can be deployed by good- AND authority to require private companies to implement stronger protections against cyber intrusions.37
 * Stockton and Golabek-Goldman 13 **[Paul and Michele, " Curbing the market for cyber weapons," Yale Law & Policy Review, Forthcoming, pg. 108-109 ] /eugchen

Grid attacks take out command and control —-causes retaliation and nuclear war
Tilford 12 [Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, "Cyber attackers could shut down the electric grid for the entire east coast" 2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa] //khirn To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.

Cyber arms race now —- the US is rapidly expanding offensive capabilities under the guise of surveillance
Correa 15 [Gordon, security correspondent, BBC News, "Rapid escalation of the cyber arms race," 29 April 2015, http://www.bbc.com/news/uk-32493516] //khirn Rapid proliferation What surprised cyber-experts is the speed with which cyber-attack AND long before the Chinese had also not just caught up but moved ahead.

That goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements
Austin 13 [Director of Policy Innovation at the EastWest Institute, "Costs of American Cyber Superiority," 8/6, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/] //khirn The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.

Independently risks miscalc —- hair-trigger status causes nuclear war
Japan Times 15 [May 1, 2015, "U.S., Russian 'hair-trigger' nuclear alert urged ended, especially in age of cyberattack," http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp] //khirn WASHINGTON – Former U.S. and Russian commanders Thursday called for scrapping " AND systems are subject to false alarms," Cartwright said at a news conference.

Eliminating offensive cyberattacks allows the US to set global norms in cyberspace —- that's key to prevent cyber arms races
Goldsmith 10 [Jack, teaches at Harvard Law School and is a visiting fellow at the Hoover Institution at Stanford University, "Can we stop the Cyber Arms Race," Washington Post, February 1, 2010, http://articles.washingtonpost.com/2010-02-01/opinions/36895669_1_botnets-cyber-attacks-computer-attacks] //khirn In a speech this month on "Internet freedom," Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.

Contention 5 is solvency
====The plan solves effective information sharing between the government and private sector —- a signal of clear commitment and a steady flow of actionable disclosure is key to cooperative cyberdefense —- overcomes legal barriers ==== Rosenzweig 12 [Paul, leading cybersecurity expert, founder of Red Branch Consulting PLLC, a homeland security consulting company, and a Senior Advisor to The Chertoff Group, "Cybersecurity and Public Goods: The Public/Private "Partnership," An Emerging Threats Essay, Hoover Institution, Stanford] //khirn Information Sharing, Public Goods, and the Law This economic understanding of cybersecurity suggests AND problems are not likely to be ones of law, but of commitment.

Disclosing zero-days disarms cyberattackers globally
Masnick 14 [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, "Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite," Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml] //khirn However, the NY Times had a story this weekend about how this move has AND do that. Because they're not about protecting anyone — other than themselves.

US is the lynchpin of the zero-days market—-that sustains the arms race and global cyberattacks—the plan reverses that and reduces the market drastically
Now, the market for information about computer vulnerabilities has turned into a gold rush AND regulate a market in which government agencies are some of the biggest participants.
 * Perlroth and Sanger 13** (Nicole Perlroth covers cyberattacks, hackers and the cybersecurity industry for The Times's business news section. She is a graduate of Princeton University, Stanford University's Graduate School of Journalism and is a guest lecturer at Stanford's graduate schools of business and communications. David Sanger is the chief Washington correspondent of The New York Times. "Nations Buying as Hackers Sell Flaws in Computer Code", July 13, 2013, http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html)//CLi

The equities process is not transparent
To help fix this, the review board recommended that the National Security Council have AND process is and how much is there when the rubber meets the road."
 * Zetter '15** [Kim, award-winning journalist who covers cybercrime and security for Wired, 'US Used Zero-Day Exploits Before It Had Policies For Them'. WIRED. Accessed July 24 2015. http://www.wired.com/2015/03/us-used-zero-day-exploits-policies/.

Preventing extinction is the most ethical outcome
Some other ethical perspectives We have thus far considered existential risk from the perspective of AND stronger moral reason to prevent catastrophes that would kill the entire human population.
 * Bostrom 13 **(Nick, Professor at Oxford University, Faculty of Philosophy & Oxford Martin School, Director, Future of Humanity Institute, Director, Oxford Martin Programme on the Impacts of Future Technology University of Oxford, "Existential Risk Prevention as Global Priority", Global Policy Volume 4, Issue 1, February 2013 // AKONG)