Pranav+&+Charlie

=**Past 2NRs**= PTX + case, Psychoanalysis +case = = =Cybersecurity=

Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense
I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security.
 * Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable US energy infrastructure is vast, aging, and in need of an overhaul, AND infrastructure, but it ain't for lack of people trying," Moniz said.
 * Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL

Successful grid attacks cause retaliation and escalation to nuclear war
To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.
 * Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM

Even absent retaliation, grid failure triggers nuclear meltdowns and extinction
If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.
 * Huff 14** (Ethan A. Huff, staff writer and news analyst for NaturalNews - Natural News is an international news website reporting on science, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#)//chiragjain

Exceptional access is bad – economy and cybersecurity
Designing exceptional access into today's information services and applications will give rise to a range AND secure Internet for law enforcement gains that are at best minor and tactical.
 * Schneier et al 15 – Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography. Other authors are all security experts from all places. Most are from MIT("Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications"; 2015-07-06;** http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8**; Page 15-17)//pk**

Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth
Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.
 * Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Growth is vital to prevent multiple scenarios for conflict escalation and extinction
"The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM Let me posit a radical idea: The most critical threat facing the United States AND just for Americans, but for the vast majority of the planet's inhabitants.
 * Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University.

=Humint=

Capability and effectiveness are collapsing now due to overreliance on encryption backdoors – only the plan solves
Last fall, when Apple and Google announced they were cleaning up their operating systems AND of fighting the modern encryption revolution, the government should be embracing it.
 * Eddington, Security Prof @ Georgetown, 15** (Patrick G. Eddington, assistant professor in the Security Studies Program at Georgetown University, policy analyst in Homeland Security and Civil Liberties at the Cato Institute, former military imagery analyst at the CIA's National Photographic Interpretation Center, former communications director and senior policy advisor to Rep. Rush Holt (D-NJ), spent 11 years in the U.S. Army Reserve and the National Guard in both enlisted and commissioned service, M.A. National Security Studies, Georgetown University, B.A. International Affairs, Missouri State University, "US wants to hack your phone because it doesn't have real spies it needs". Reuters. 2/23/15. http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-before-it-was-against-it/)//ET

Humint Key to Broader collection
Many observers believe that intelligence required for the campaign against terrorism will require significant changes AND may be involved in religious indoctrination or various criminal fund-raising activities.
 * Best, 2 (Richard A. Best Jr., Specialist in National Defense Foreign Affairs, Defense, and Trade Division, CRS report for congress, Wrote The National Intelligence Council: Issues and Options for Congress and published in Library of Congress. Pages 8-9 February 21, 2002.)\\mwang**

HUMINT filters the probability and magnitude of all existential threats – prefer consensus of experts and empirics
Abstract Intelligence is considered the first line of defense in U.S. security AND with an overall judgment about the value of agents for a nation's security.
 * Johnson, Poli Sci Prof @ Georgia, 9** (Loch Johnson, Regents Professor of Political Science, University of Georgia, former special assistant to the chair of the Senate Select Committee House Subcommittee on Intelligence Oversight, former staff director of the House Subcommittee on Intelligence Oversight, former visiting scholar at Yale University, won the Josiah Meigs Prize, the highest teaching honor at the University of Georgia in addition to the Owens Award, its highest honor for research, editor of Intelligence and National Security, Ph.D. political science, University of California at Riverside, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p_mla_apa_research_citation/3/1/0/6/6/pages310665/p310665-14.php)//ET

=Plan=

Plan:
====The United States federal government should implement exclusively subsection (a) of the Secure Data Act with the added provision that no agency may coerce or provide financial incentives to companies or organizations for implementing backdoors into encryption.====

=Solvency=

Only the plan solves – vital to security and economy
Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op AND cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable.
 * McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

AND, it's net better for law enforcement – consensus of experts and empirics
Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for AND America. Thank you, and I welcome your questions on this important matter
 * Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School's Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM