Ben+&+Wingel

1AC
====Plan: The United States federal government should exclusively implement subsection (a) of the Secure Data Act with the added provision that no agency may coerce or provide financial incentives to companies or organizations for implementing backdoors into encryption.====

Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense
I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security.
 * Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable
US energy infrastructure is vast, aging, and in need of an overhaul, AND infrastructure, but it ain't for lack of people trying," Moniz said.
 * Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL

Successful grid attacks cause retaliation and escalation to nuclear war
To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.
 * Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM

Even absent retaliation, grid failure triggers nuclear meltdowns and extinction
If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.
 * Huff 14** (Ethan A. Huff, staff writer and news analyst for NaturalNews - Natural News is an international news website reporting on science, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#)//chiragjain

US economy is in decline
The U.S. economy shrank at an annualized pace of 0.7 AND back debt or rebuild savings, according to government and credit card data.
 * Harlan 5/29 [Chico, covers economics for the Washington Post, Works for several other acclaimed magazines, "U.S. economy shrinks in first quarter, raising questions about underlying strength", Washington Post, May 29, 2015,** http://www.washingtonpost.com/blogs/wonkblog/wp/2015/05/29/analysts-expect-decline-in-u-s-gdp-in-first-quarter/**, July 17, 2015] KL**

Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth
Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.
 * Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Growth is vital to prevent multiple scenarios for conflict escalation and extinction
"The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM Let me posit a radical idea: The most critical threat facing the United States AND just for Americans, but for the vast majority of the planet's inhabitants.
 * Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University.

Economic decline leads to war – robust studies prove
(Jedidiah, "Economic Integration, Economic Signalling and the Problem of Economic Crises", chapter in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215)//BB First, on the systemic level, Pollins (2008) advances Modelski and Thompson's AND popularity, are statistically linked to an increase in the use of force.
 * Royal 10** – Director of Cooperative Threat Reduction at the US Department of Defense

Capability and effectiveness are collapsing now due to overreliance on encryption backdoors – only the plan solves
Last fall, when Apple and Google announced they were cleaning up their operating systems AND of fighting the modern encryption revolution, the government should be embracing it.
 * Eddington, Security Prof @ Georgetown, 15** (Patrick G. Eddington, assistant professor in the Security Studies Program at Georgetown University, policy analyst in Homeland Security and Civil Liberties at the Cato Institute, former military imagery analyst at the CIA's National Photographic Interpretation Center, former communications director and senior policy advisor to Rep. Rush Holt (D-NJ), spent 11 years in the U.S. Army Reserve and the National Guard in both enlisted and commissioned service, M.A. National Security Studies, Georgetown University, B.A. International Affairs, Missouri State University, "US wants to hack your phone because it doesn't have real spies it needs". Reuters. 2/23/15. http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-before-it-was-against-it/)//ET

HUMINT works – prefer empirics
 December 9 2014 ) \\mwang The most incredible and false claim in the Senate intelligence committee's report on the CIA AND deep responsibility for ensuring they could not do it again. We succeeded.
 * McLaughlin 14** (John McLaughlin, the CIA's acting director in 2004 and deputy director from 2000 to 2004. His CIA career lasted more than 30 years. Deputy Director and Director of the Office of European Analysis from 1985 to 1989 Deputy Director for Intelligence, Vice Chairman for Estimates of the National Intelligence Council, and Acting Chairman of the National Intelligence Council from 1995 to 1997. "Senate Interrogation report distorts the CIA's successes at foiling terrorist Plots" The Washington Post

HUMINT filters the probability and magnitude of all existential threats – prefer consensus of experts and empirics
Abstract Intelligence is considered the first line of defense in U.S. security AND with an overall judgment about the value of agents for a nation's security.
 * Johnson, Poli Sci Prof @ Georgia, 9** (Loch Johnson, Regents Professor of Political Science, University of Georgia, former special assistant to the chair of the Senate Select Committee House Subcommittee on Intelligence Oversight, former staff director of the House Subcommittee on Intelligence Oversight, former visiting scholar at Yale University, won the Josiah Meigs Prize, the highest teaching honor at the University of Georgia in addition to the Owens Award, its highest honor for research, editor of Intelligence and National Security, Ph.D. political science, University of California at Riverside, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p_mla_apa_research_citation/3/1/0/6/6/pages310665/p310665-14.php)//ET

Only the plan solves – vital to security and economy
Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op AND cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable.
 * McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

AND, it's net better for law enforcement – consensus of experts and empirics
Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for AND America. Thank you, and I welcome your questions on this important matter
 * Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School's Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM

Put away your circumvention disads – the Secure Data Act prevents backdoor mandates
Bipartisan lawmakers today reintroduced the Secure Data Act to protect Americans' privacy and data security AND requesting or compelling backdoors in services and products to assist with electronic surveillance.
 * Whippy 15** (Peter, Communications Director for the House of Representatives, "Sensenbrenner, Massie & Lofgren Introduce Secure Data Act", 2/4/15, https://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873) WZ

NSA cannot break strong encryption- no circumvention possible
Williams 14 (Lauren C. Williams, tech reporter for ThinkProgress with an affinity for consumer privacy, cybersecurity, tech culture, and the intersection of civil liberties and tech policy, previous writer for B2B publications, Master's degree from the University of Michigan and a bachelor's degree from the University of Delaware, ThinkProgress, "New Snowden Documents Reveal that the NSA Can't Hack Everyone, 12/29/14 http://thinkprogress.org/world/2014/12/29/3607160/new-snowden-documents-show-nsa-proof-encryption-exists/) A new wave of U.S. National Security Agency (NSA) document AND and store consumer data, if they want to do business in Europe.

Companies won't comply with informal encryption backdoor mandates – empirics prove
Golumbic '7 – (Charles Martin, University of Haifa, Professor of Computer Science, and Director of the Caesarea Rothschild Institute for Interdisciplinary Applications of Computer Science, "Fighting Terror Online: the Convergence of Security, Technology, and the Law")//MP Those involved in the private sector have a clear interest in developing their products in AND restrictions were affecting the ability of American companies to compete effectively in world markets

End to end encryption solves – companies can't give government data even if they wanted
Here's an important question to ask when assessing if a service or app that uses AND the service provider cannot look at your communications even if they wanted to.
 * Lee 13** (Micah Lee is a technologist that works on operational security, source protection, privacy, and cryptography for The Intercept. He is a founder and board member of Freedom of the Press Foundation and the author of the "Encryption Works" handbook. He develops open source security tools including OnionShare, SecureDrop, and Tor Browser Launcher, https://freedom.press/encryption-works) BJ


 * Past 2NRs:**

McNeal CP Iran Politics DA T-curtail - budget State PIC