Aff-+BEFJR+LW

Despite claims that the government discloses software backdoors, loopholes allow the USFG to purchase them as tools for surveillance
Healey notes that the public statements on the new policy leave a lot of questions AND or to the arsenal of zero-day vulnerabilities the government already possesses.
 * Zetter, 2014** [Kim, award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired, "Obama: NSA must reveal bugs like Heartbleed, unless they help the NSA," Wired, http://www.wired.com/2014/04/obama-zero-day/] //khirn

IP theft is expanding- keeping zero-days secret kills all hope of effective cybersecurity
JAMIL N. JAFFER: Thank you Dr. Johnson. Well, I'll actually AND trust between the government and private sector to share that kind of information.
 * Jaffer, 2015** [Jamil N., Adjunct Professor of Law and Director, Security Law Program, George Mason University Law School, Occasional Papers Series, published by the Dean Rusk Center for International Law and Policy, 4-1-2015, "Cybersecurity and National Defense: Building a Public-Private Partnership," http://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1008&context=rusk_oc] //khirn

Russian IP theft rapidly escalating now- bolstering cyberdefense is key- they won't be deterred
Russia has ramped up cyber attacks AND future," he said. "So we've got some work to do."
 * Bennett 4/12**/15 cybersecurity reporter for The Hill (Cory, "Russia's cyberattacks grow more brazen" 4/12/15, http://thehill.com/policy/cybersecurity/238518-russias-cyberattacks-grow-more-brazen) ~| js
 * cites Director of National Intelligence James Clapper

Russian IP theft motivated by need for economic and military development
Unsurprisingly, Russia's diplomatic activities on the cyber front reflect its policies on information warfare AND And that, alone, may make it the number one cyber threat.
 * Smith 12** Director of the Potomac Institute Cyber Center; former US Ambassador at the US-Soviet Defense and Space talks, Chief Operating Officer of the National Institute for Public Policy, President of Global Horizons, Inc. consulting on defense and international security, Chief of Staff for Arizona Congressman Jon Kyl, Assistant for Strategic Policy and Arms Control to Senate Republican Leader Bob Dole, professional staff for the Senate Committee on Foreign Relations, staff of the Joint Chiefs of Staff (David J., Defense Dossier, "How Russia Harnesses Cyberwarfare" p. 14, Aug. 2012, http://www.afpc.org/files/august2012.pdf) ~| js

Modernization is the pre-condition for Russian militarization
MOSCOW (AP) — Hundreds of new Russian aircraft, tanks and missiles are AND the massive military buildup will stretch the nation's economic potential beyond the limit.
 * Isachenov, 2015** [Vladimir Isachenkov, Associated Press, Business Insider, Feb. 4, 2015, "Russia continues massive military modernization despite economic woes," http://www.businessinsider.com/russia-continues-massive-military-modernization-despite-economic-woes-2015-2#ixzz3eVw3maaO] //khirn

Buying and selling zero-days exposes multiple holes in critical infrastructure
Both Flame and Stuxnet reportedly contain multiple zero-day exploits (ZDEs) which AND originally intended for use by law enforcement is already starting to take place.
 * Wilson, 2014** [Clay, Program Director for Cybersecurity graduate studies at the American Public University, past Program Director for Cybersecurity Policy at the University of Maryland University College (UMUC), former analyst for national defense policy at the Congressional Research Service, member of the Landau Network Centro Volta, International Working Group, an organization that studies issues for non-proliferation of CBRN and Cyber Weapons. Cyber Threats to Critical Information Infrastructure, Cyberterrorism 2014, pp 123-136. 26 May 2014]

That collapses critical infrastructure
Øday exploits are dual-use.24 They can be deployed by good- AND authority to require private companies to implement stronger protections against cyber intrusions.37
 * Stockton and Golabek-Goldman, 2013 **[Paul and Michele, " Curbing the market for cyber weapons," Yale Law & Policy Review, Forthcoming, pg. 108-109 ] /eugchen

Grid attacks eliminate the ability for the US military to function and wreck primacy
To make matters worse a cyber attack that can take AND include the use of "nuclear weapons", if authorized by the President.
 * Tilford, 2012 **[Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, "Cyber attackers could shut down the electric grid for the entire east coast" 2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa] //khirn
 * ableist language modified

That massively increases the propensity for great power wars
(Yuhan, "America's decline: A harbinger of conflict and rivalry", 1-22, http://www.eastasiaforum.org/2011/01/22/americas-decline-a-harbinger-of-conflict-and-rivalry/, ldg) This does not necessarily mean that the US is in systemic decline, but it AND forecast in a future that will inevitably be devoid of unrivalled US primacy.
 * Zhang et al., Carnegie Endowment researcher, 2011**

International IP Theft causes economic decline in the U.S.
AND the quality of life. The threat of IP theft diminishes that incentive.
 * The National Bureau of Asian Research, 2013** (The IP Commission Report, http://www.ipcommission.org/report/ip_commission_report_052213.pdf) // JRW
 * Cites the Commander of the United States Cyber Command and Director of the National

Status quo growth trends lead to recession
"It is hard to imagine any time in history when such rampant pessimism about AND is supposed to be raising short-term interest rates sometime this year.
 * Gula 5/18** (Alan [Chief Income Analyst @ Wall St Daily]; U.S. Economy Edges Closer to Recession; www.wallstreetdaily.com/2015/05/18/u-s-economy-recession/; kdf)

Economic crisis massively increases the propensity for war
Less intuitive is how periods of economic decline may increase the likelihood of external conflict AND such, the view presented here should be considered ancillary to those views.
 * Royal, 2010** (Jedediah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, "Economic Integration, Economic Signaling and the Problem of Economic Crises," Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215 https://books.google.com/books?hl=en&lr=&id=HmcwrzBU6dsC&oi=fnd&pg=PA205&dq=Economic+Integration,+Economic+Signaling+and+the+Problem+of+Economic+Crisis&ots=aZ0lgMVudZ&sig=6Asm0R-CJGcjnSniv5sYOpNYLUE#v=onepage&q=Economic%20Integration%2C%20Economic%20Signaling%20and%20the%20Problem%20of%20Economic%20Crisis&f=false ) //JRW

And, Russia's aggression and nuclear policy exceed anything else in history- absent de-escalation, world war is almost guaranteed
The Western side believes it is playing a game where the rules are clear enough AND outs that could kill up to 1 billion people in a global famine.
 * Fisher 6/29 **[foreign affairs editor for Vox: "How World War III became possible" 6/29/15, http://www.vox.com/2015/6/29/8845913/russia-war]

US collection and usage of zero-days creates offensive cyberattack capabilities that spur an arms race
AND arms race in an arena where the offense already has a natural advantage.
 * Goldsmith, 2010 **[Jack, teaches at Harvard Law School and is a visiting fellow at the Hoover Institution at Stanford University, "Can we stop the Cyber Arms Race," Washington Post, February 1, 2010, http://articles.washingtonpost.com/2010-02-01/opinions/36895669_1_botnets-cyber-attacks-computer-attacks] //khirn
 * Cites Bob Gourley, the former chief technology officer for the Defense Intelligence Agency

Escalation causes misperceptions which spur aggression- an attack will happen
Offensive dominance creates a great risk of cyber arms races. State and non- AND it came from a third party, could also ignite a conflict.124
 * Rosenzweig, 2009 **[Paul, founder of Reid Branch Consulting, specializing in homeland security, senior advisor to the Chertoff Group, Carnegie Fellow at Northwestern, professor at National Defense University, Editorial board at the Journal of National Security Law & Policy, deputy assistant secretary for policy at the US Department of Homeland Security, "National Security Threatsin Cyberspace" merican Bar Association Standing Committee on Law and National Security And National Strategy Forum, September 2009, www.utexas.edu/law/journals/tlr/sources/Issue%2088.7/Jensen/fn137.Rosenwieg.pdf] //khirn

Uniquely dangerous focused and powerful attacks by major nations are increasing now
We are in the early years of a cyber war arms race, security guru AND seem to under-estimate costs and further charges will likely follow. ®
 * Leyden, 6/4 **(John, 6/4/15, We stand on the brink of global cyber war, warns encryption guru, http://www.theregister.co.uk/2015/06/04/schneier_global_cyber_war_warns/) /AMarb

Attacks collapse satellites- most probable existential threat
In September 2014, hackers from China broke into the U.S. National AND standards and regulations regarding multinational and commercial activities in space technology and exploration.‏
 * Paikowsky and Baram,** **2015** (Deganit [post-doctoral fellow at the Davis Institute for International Relations at Hebrew University in Jerusalem and a senior researcher at the Yuval Nee'man Workshop for Science, Technology, and Security at Tel-Aviv University, also a research associate at the Space Policy Institute at George Washington University and a consultant to the space committee of Israel's National Council for Research and Development] and Gil [Ph.D. candidate in the department of political science at Tel-Aviv University, and a researcher at the Yuval Nee'man workshop for Science, Technology, and Security at Tel-Aviv University]; Space Wars; Jan 7; www.foreignaffairs.com/articles/142690/deganit-paikowsky-and-gil-baram/space-wars?cid=rss-rss_xml-space_wars-000000; kdf)

Independently, cyberweapons decrease the threshold for hair-trigger alters
WASHINGTON – Former U.S. and Russian commanders Thursday called for scrapping " AND systems are subject to false alarms," Cartwright said at a news conference.
 * Japan Times 5/1** [May 1, 2015, "U.S., Russian 'hair-trigger' nuclear alert urged ended, especially in age of cyberattack," http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp] //khirn

Also confuses nuclear management systems- kills accurate risk assessment
What are the implications of potential overlap between concepts or practices for cyber war and AND remotely piloted aircraft, space, and cyber-power projection capabilities."12
 * Cimbala, 2014** Distinguished Professor of Political Science, Penn State Brandywine, author of numerous books and articles in the fields of international security studies, defense policy, nuclear weapons and arms control, intelligence (Stephen J., Air & Space Power Journal 28.2, "Nuclear Deterrence and Cyber: The Quest for Concept" p. 88 – 90, Mar/Apr 2014, ProQuest) ~| js

US foreign policy guarantees nuclear lashout against cyber attacks
[5/13, Dr. Sean Lawson is an assistant professor in the Department of Communication at the University of Utah, "Cross-Domain Response to Cyber Attacks and the Threat of Conflict Escalation," Transformation Tracker, http://www.seanlawson.net/?p=477 ] At a time when it seems impossible to avoid the seemingly growing hysteria over the AND deny that nuclear retaliation remains an option for response to a massive cyberattack:
 * Lawson, 2009 **

Zero-days are run through the "vulnerabilities equities process" and are either used for surveillance or disclosed- plan would cause all zero-days to be disclosed
When the NSA or another agency discovers a software vulnerability, they use the Equities AND table will be as loud and respected as the law-enforcement voices."
 * Zetter, 6/26** [Kim, award-winning journalist who covers cybercrime and security for Wired, 'Turns Out The US Launched Its Zero-Day Policy In Feb 2010'. WIRED. Accessed July 24 2015. http://www.wired.com/2015/06/turns-us-launched-zero-day-policy-feb-2010/.

Disclosing zero-days disarms hackers globally- only way to provide effective cybersecurity
However, the NY Times had a story this weekend about how this move has AND do that. Because they're not about protecting anyone — other than themselves.
 * Masnick, 2014** [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, "Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite," Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml] //khirn

Revising NSA vulnerability policy builds legitimacy to negotiate international cyberdefense agreements
The implications of U.S. policy can be felt on a variety of AND fix almost all the vulnerabilities we find. But not all, yet.
 * Schneier, 2014** (Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School and a program fellow at the New America Foundation's Open Technology Institute. "Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?", May 19, 2014, http://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/)//CLi

US involvement keeps the global market thriving- guarantees international zero-day proliferation
Governments, and in particular US one, are principal buyers of zero-day AND source code to compose new malicious agent to use against the same authors.
 * Paganini, 2013** (Pierluigi Paganini, Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", "Zero-day Market, the Government are the Main Buyers", http://securityaffairs.co/wordpress/14561/malware/zero-day-market-governments-main-buyers.html)