Mason+W+&+Paul

Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense
I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security.
 * Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM

Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable
US energy infrastructure is vast, aging, and in need of an overhaul, AND infrastructure, but it ain't for lack of people trying," Moniz said.
 * Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL

Successful grid attacks cause retaliation and escalation to nuclear war
To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.
 * Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM

Even absent retaliation, grid failure triggers nuclear meltdowns and extinction
If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.
 * Huff 14** (Ethan A. Huff, staff writer and news analyst for NaturalNews - Natural News is an international news website reporting on science, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#)//chiragjain

A cyber-attack destroys all U.S. critical infrastructure
Daly 2/21/13: Michael Daly, Special Correspondant for the Daily Beast, columnist with New York Daily News, staff write for New York magazine, finalist for 2002 Pulitzer Prize, numerous awards. Cites the Defense Secretary Leon Panetta – quotes are basis for evidence. ("U.S. Not Ready for Cyberwar Hostile Hackers Could Launch", Michael Daly, Daily Beast, February 21, 2013, http://www.thedailybeast.com/articles/2013/02/21/u-s-not-ready-for-cyber-war-hostile-hackers-could-launch.html)//chiragjain If hackers shut down much of the electrical grid and the rest of the critical AND Shamoon to wreck 30,000 computers at the Saudi oil company Aramco.

Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth
Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.
 * Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain

Growth is vital to prevent multiple scenarios for conflict escalation and extinction
"The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM Let me posit a radical idea: The most critical threat facing the United States AND just for Americans, but for the vast majority of the planet's inhabitants.
 * Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University.

Robust studies prove
(Jedidiah, "Economic Integration, Economic Signalling and the Problem of Economic Crises", chapter in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215)//BB First, on the systemic level, Pollins (2008) advances Modelski and Thompson's AND popularity, are statistically linked to an increase in the use of force.
 * Royal 10** – Director of Cooperative Threat Reduction at the US Department of Defense

Capability and effectiveness are collapsing now due to overreliance on encryption backdoors – only the plan solves
Last fall, when Apple and Google announced they were cleaning up their operating systems AND of fighting the modern encryption revolution, the government should be embracing it.
 * Eddington, Security Prof @ Georgetown, 15** (Patrick G. Eddington, assistant professor in the Security Studies Program at Georgetown University, policy analyst in Homeland Security and Civil Liberties at the Cato Institute, former military imagery analyst at the CIA's National Photographic Interpretation Center, former communications director and senior policy advisor to Rep. Rush Holt (D-NJ), spent 11 years in the U.S. Army Reserve and the National Guard in both enlisted and commissioned service, M.A. National Security Studies, Georgetown University, B.A. International Affairs, Missouri State University, "US wants to hack your phone because it doesn't have real spies it needs". Reuters. 2/23/15. http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-before-it-was-against-it/)//ET

HUMINT filters the probability and magnitude of all existential threats – prefer consensus of experts and empirics
Abstract Intelligence is considered the first line of defense in U.S. security AND with an overall judgment about the value of agents for a nation's security.
 * Johnson, Poli Sci Prof @ Georgia, 9** (Loch Johnson, Regents Professor of Political Science, University of Georgia, former special assistant to the chair of the Senate Select Committee House Subcommittee on Intelligence Oversight, former staff director of the House Subcommittee on Intelligence Oversight, former visiting scholar at Yale University, won the Josiah Meigs Prize, the highest teaching honor at the University of Georgia in addition to the Owens Award, its highest honor for research, editor of Intelligence and National Security, Ph.D. political science, University of California at Riverside, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p_mla_apa_research_citation/3/1/0/6/6/pages310665/p310665-14.php)//ET

====Plan: The United States federal government should exclusively implement subsection (a) of the Secure Data Act and curtail surveillance by getting rid of backdoors with the provision that no agency may coerce or provide financial incentives to companies or organizations for implementing backdoors into encryption.====

Only the plan solves – vital to security and economy
Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op AND cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable.
 * McQuinn 14** (Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,

AND, it's net better for law enforcement – consensus of experts and empirics
Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for AND America. Thank you, and I welcome your questions on this important matter
 * Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School's Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM

No circumvention – the Secure Data Act prevents backdoor mandates
Bipartisan lawmakers today reintroduced the Secure Data Act to protect Americans' privacy and data security AND requesting or compelling backdoors in services and products to assist with electronic surveillance.
 * Whippy 15** (Peter, Communications Director for the House of Representatives, "Sensenbrenner, Massie & Lofgren Introduce Secure Data Act", 2/4/15, https://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873) WZ

End to end encryption solves – companies can't give government data even if they wanted
Here's an important question to ask when assessing if a service or app that uses AND the service provider cannot look at your communications even if they wanted to.
 * Lee 13** (Micah Lee is a technologist that works on operational security, source protection, privacy, and cryptography for The Intercept. He is a founder and board member of Freedom of the Press Foundation and the author of the "Encryption Works" handbook. He develops open source security tools including OnionShare, SecureDrop, and Tor Browser Launcher, https://freedom.press/encryption-works) BJ

NSLs can't compel backdoors
Following recent reports in the Wall Street Journal and Ars Technica, there's been new AND of All Writs Act in the unlocking cases. *Edited for easier flow
 * Crocker, attorney at the Electronic Frontier Foundation, 14** (Andrew Crocker, Graduate of Harvard Law and attorney at the Electronic Frontier Foundation in civil liberties, "Sifting Fact from Fiction with All Writs and Encryption: No Backdoors", 12/3/14, https://www.eff.org/deeplinks/2014/12/sifting-fact-fiction-all-writs-and-encryption-no-backdoors)//EM