Elizabeth+and+Maggie

=Classic KM Lab - Elizabeth Mathy and Maggie Wang - Zero Days= toc

1ac inherency
Obama announced that the US would disclose zero-day vulnerabilities, or unknown software flaws, to their vendors --- but loopholes allow the NSA to stockpile zero-days and jeopardize widespread cybersecurity Soghoian and Roubini 20 15 ( [|Chris Soghoian], Principal Technologist and Senior Policy Analyst, American Civil Liberties Union Speech, Privacy, and Technology Project & [|Sonia Roubini] , ACLU Speech, Privacy, and Technology Project, “Feds Refuse to Release Documents on “Zero-Day” Security Exploits”, March 3, 2015, [])//CLi// // Federal agencies served with a Freedom of Information Act request are refusing to release documents // // AND // // documents like the ones we have requested, this debate cannot take place. //

//Additionally, loopholes let the NSA stockpile zero-days purchased from the grey market// //**Zetter 14** [Kim, award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired, “Obama: NSA must reveal bugs like Heartbleed, unless they help the NSA,”// Wired//, []]// khirn Healey notes that the public statements on the new policy leave a //lot of questions// //AND// or to the //arsenal of zero-day vulnerabilities// the government //already possesses//.

Plan
The United States federal government should substantially curtail its domestic surveillance using computer software vulnerabilities or exploits unknown to relevant vendors.

1ac ip theft advantage
Intellectual property theft is expanding on a massive scale --- disclosing zero-days __ builds trust __ with companies --- __ info-sharing legislation __ is key // JAMIL N. JAFFER: Thank you Dr. Johnson. Well, I’ll actually // // AND // trust// between the //government// and //private sector// to //share that kind ofinformation//. //
 * Jaffer 15** [Jamil N., Adjunct Professor of Law and Director, Security Law Program, George Mason University Law School, Occasional Papers Series, published by the Dean Rusk Center for International Law and Policy, 4-1-2015, “Cybersecurity and National Defense: Building a Public-Private Partnership,” []] //khirn//

//IP theft destroys military operations --- the impact is primacy// // Warikoo 13 professor of Himalayan and Central Asian Studies at the University of Colorado (Arun, “CYBER WARFARE: CHINA'S ROLE AND CHALLENGE TO THE UNITED STATES” p. 67-8, Jul-Dec 2013,// ProQuest//) | js// // 4.1 Intellectual Property (IP) Protection and Enforcement Intellectual Property or IP // // AND // // China's hackers that cost $1 billion and 20 years to develop.36 //

//That solves great power conflict// //**Kagan, 2/19**/2015 (Robert, Senior fellow with the Project on International Order and Strategy in the Foreign Policy program at Brookings, Ph.D. in American history from American University, “The United States must resist a return to spheres of interest in the international system”, Brookings, [|http://www.brookings.edu/blogs/order-from-chaos/posts/2015/02/19-united-states-must-resist-return-to-spheres-of-interest-international-system-kagan)//JBS]// Great power competition has returned// . Or rather, it has reminded us that it // // AND // //, the system will //buckle// under the unrestrained military competition of regional powers . //

//Russian IP theft now --- they can’t be deterred --- bolstering cyberdefense is key// // Bennett 4/12 /15 cybersecurity reporter for The Hill (Cory, “Russia’s cyberattacks grow more brazen” 4/12/15, []) | js// // Russia has ramped up cyber attacks against the U nited S tates to an unprecedented level since // // AND // // future,” he said. “So we’ve got some work to do.” //

//That’s crucial to Russian modernization efforts// //**Booz Allen Hamilton 13** [Leading provider of management and technology consulting services to the U.S. government, Economist Intelligence Unit,// The Economist//, “Cyber Theft of Corporate Intellectual Property: The Nature of the Threat,” July 2013, []]// khirn Russia’s own espionage effort is also driven by a desire to diversify its economy and AND //industry////and government networks// could give //China// and //Russia military advantages worth billions//.

That causes Russian aggression // MOSCOW (AP) — Hundreds of new Russian aircraft, tanks and missiles are // // AND // // the massive military buildup will stretch the nation's economic potential beyond the limit. //
 * Isachenov 15** [Vladimir Isachenkov, Associated Press, Business Insider, Feb. 4, 2015, “Russia continues massive military modernization despite economic woes,” [|http://www.businessinsider.com/russia-continues-massive-military-modernization-despite-economic-woes-2015-2#ixzz3eVw3maaO]] //khirn//

//That escalates—we’re already on the brink of nuclear war// // Reid 15 Professor of Law at University of St. Thomas School of Law (Charles J.,// University of St. Thomas Journal of Law and Public Policy//, “VLADIMIR PUTIN’S CULTURE OF TERROR: WHAT IS TO BE DONE?” p. 53–5) | js In waging such a limited war, furthermore, Putinwouldrely not on ICBMs AND must make sure such threats do not emanate again from a world leader.

1ac critical infrastructure advantage
Effective information sharing makes cyberdefense effective and prevents devastating attacks on critical infrastructure --- status quo legal framework works, but government action is key // Right now, many organizations are facing cyber threats alone. Currently, as soon // // AND // // the framework is being used as an industry baseline for cyber insurance underwriting. //
 * Bush 15** [Wes, Chairman, Chief Executive Officer and President, Northrop Grumman Corporation, “Cyber Security: The New Threat; The New Normal,” April 22, 2015, address to the Metropolitan Club, http://www.northropgrumman.com/MediaResources/Presentations/2015/Pages/04222015WesBushAtMetropolitanClub.aspx] //khirn//

//Zero-days are key --- inadequate cooperation risks multiple critical sectors --- like electricity and water// // Stockton and Golabek-Goldman 13 [Paul and Michele, " Curbing the market for cyber weapons," //Yale Law & Policy Review//,// Forthcoming//, pg. 108-109 ] /eugchen// // Øday exploits are dual-use. 24 They can be deployed by good- // // AND // // authority to require private companies to implement stronger protections against cyber intrusions.37 //

//Grid attacks take out command and control ---causes retaliation and nuclear war// //**Tilford 12** [Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, “Cyber attackers could shut down the electric grid for the entire east coast” 2012, []]// khirn To make matters worse __a cyber attack that can take out a civilian power grid__ __AND__ include the use //of “nuclear weapons// ”, if authorized by the President.

US water security on the brink now Dimick 14 (Dennis Dimick is National Geographic's Executive Editor for the Environment. //National Geographic:// “If You Think the Water Crisis Can't Get Worse, Wait Until the Aquifers Are Drained” published August 21st, 2014. Accessed June 25th, 2015. [|http://news.nationalgeographic.com/news/2014/08/140819-groundwater-california-drought-aquifers-hidden-crisis/#]) KalM

This coincides with a nationwide trend of groundwater declines. A 2013 study of 40 AND relying instead on imported wheat to feed the people of this arid land.

Water supplies are uniquely vulnerable to cyber-attacks Ginter 15 (Andrew Ginter is the vice president of industrial security at Waterfall Security Solutions, a provider of Unidirectional Security Gateways for industrial control networks and critical infrastructures. //WaterWorld.com:// “High-Tech Threats: Top Cybersecurity Issues Facing Water Utility Control Systems.” Copyright date is 2015. Accessed June 25th, 2015. []) KalM

Recent Department of Homeland Security reports have highlighted poor security among the nation's water utilities AND of risk is unacceptably high, and water utilities must compensate for it.

Water insecurity risks __global war__
 * Aleem 3/6/15** ---Zeeshan Aleem is a reporter and editor at the The Huffington Post, Politico, The Atlantic Wire, and BBC News. He was educated at the Sidwell Friends School, Oxford University, George Washington, and the University of Chicago. (“Zeeshan Aleem”; Why Water Shortages Are the Greatest Threat to Global Security; [|http://mic.com/articles/111644/why-water-shortages-are-the-greatest-threat-to-global-security)\\pranav/KalM]

According to a United Nations [|report] presented at U.N. headquarters in AND water than it does today, according to the New Yorker.

1ac solvency
The plan solves effective information sharing between the government and private sector --- a signal of clear commitment and a steady flow of actionable disclosure is key to cooperative cyberdefense --- overcomes legal barriers // Information Sharing, Public Goods, and the Law This economic understanding of cybersecurity suggests // // AND // // problems are not likely to be ones of law, but of //commitment//. //
 * Rosenzweig 12** [Paul, leading cybersecurity expert, founder of Red Branch Consulting PLLC, a homeland security consulting company, and a Senior Advisor to The Chertoff Group, “Cybersecurity and Public Goods: The Public/Private “Partnership,” An Emerging Threats Essay, Hoover Institution, Stanford] //khirn//

//Disclosing zero-days __disarms__ cyberattackers globally// //**Masnick 14** [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, “Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite,” Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml]// khirn However, the NY Times had a story this weekend about how this move has AND do that. Because they're not about protecting anyone -- other than themselves.

US is the lynchpin of the zero-days market---that sustains the arms race and global cyberattacks—the plan reverses that and reduces the market drastically Perlroth and Sanger 13 (Nicole Perlroth covers cyberattacks, hackers and the cybersecurity industry for The Times’s business news section. She is a graduate of Princeton University, Stanford University’s Graduate School of Journalism and is a guest lecturer at Stanford’s graduate schools of business and communications. David Sanger is the chief Washington correspondent of The New York Times. “Nations Buying as Hackers Sell Flaws in Computer Code”, July 13, 2013, [] )//CLi Now, themarket for information about computer vulnerabilities has turned into a gold rush regulate a market in which government agencies are some of the biggest participants.
 * AND **

=Neg Strategies= T-curtail, Foucault, Iran politics, investment DA, Ex-post CP, Terrorism