Elaine+and+Jerry

= Classic KM Lab - Elaine Wong and Jerry Wong - Zero Days Aff = toc

**__ Contention 1 Inherency __**
// Healey notes that the //public statements// on the new policy //leave a lot of questions AND or to the arsenal of zero-day vulnerabilities the government already possesses.
 * Obama announced that the US would disclose zero-day vulnerabilities, or unknown software flaws, to their vendors --- but loopholes let the NSA stockpile zero-days purchased from the grey market **
 * Zetter 14** [Kim, award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired, “Obama: NSA must reveal bugs like Heartbleed, unless they help the NSA,” //Wired//, [] ] //khirn//

**__ Contention 2 Critical Infrastructure Advantage __**
//** Advantage: Critical Infrastructure **// //** Effective information sharing makes cyberdefense effective and prevents devastating attacks on critical infrastructure --- status quo legal framework works, but government action is key **// //**Bush 15** [Wes, Chairman, Chief Executive Officer and President, Northrop Grumman Corporation, “Cyber Security: The New Threat; The New Normal,” April 22, 2015, address to the Metropolitan Club, http://www.northropgrumman.com/MediaResources/Presentations/2015/Pages/04222015WesBushAtMetropolitanClub.aspx]// khirn Right now, __many organizations are facing cyber threats alone__. Currently, as soon AND //the framework is being used as an industry baseline for cyber insurance underwriting.//

__Øday exploits are dual-use.__ 24 //They can be deployed by good-// //AND// authority to require private companies to implement stronger protections against cyber intrusions.37
 * Zero-days are key --- inadequate cooperation risks multiple critical sectors --- like electricity and water **
 * Stockton and Golabek-Goldman 13 ** [Paul and Michele, " Curbing the market for cyber weapons," //Yale Law & Policy Review//, //Forthcoming//, pg. 108-109 ] /eugchen


 * Water insecurity risks __global war__ **
 * Aleem 3/6/15** ---Zeeshan Aleem is a reporter and editor at the The Huffington Post, Politico, The Atlantic Wire, and BBC News. He was educated at the Sidwell Friends School, Oxford University, George Washington, and the University of Chicago. (“Zeeshan Aleem”; Why Water Shortages Are the Greatest Threat to Global Security; [|http://mic.com/articles/111644/why-water-shortages-are-the-greatest-threat-to-global-security)\\pranav/KalM]

According to a United Nations [|report] presented at U.N. headquarters in AND water than it does today, according to the New Yorker.

// To make matters worse __a cyber attack that can take out a civilian power grid__// //__AND__// // include the use **__of “nuclear weapons__** ”, if authorized by the President. //
 * Grid attacks take out command and control ---causes retaliation and nuclear war **
 * Tilford 12** [Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, “Cyber attackers could shut down the electric grid for the entire east coast” 2012, [] ] //khirn//

**__ Contention 3 Oco’s Advantage __**
//** Advantage: Offensive Cyber Operations **// //** Cyber arms race now --- the US is rapidly expanding offensive capabilities under the guise of surveillance **// //**Correa 15** [Gordon, security correspondent, BBC News, “Rapid escalation of the cyber arms race,” 29 April 2015, [] ]// khirn Rapid proliferation //What surprised cyber-experts is the speed with which cyber-attack// //AND// __long before the **Chinese** had also not just caught up but **moved ahead**__.

//__The U__ nited __S__ tates __is racing for the technological frontier in military__ __and intelligence uses of__// //__AND__// // be every bit as reasonable given their anxiety about unconstrained American cyber superiority. //
 * That goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements **
 * Austin 13** [Director of Policy Innovation at the EastWest Institute, “Costs of American Cyber Superiority,” 8/6, [] ] //khirn//

//**Independently risks miscalc --- hair-trigger status causes nuclear war**// //**Japan Times 15** [May 1, 2015, “U.S., Russian ‘hair-trigger’ nuclear alert urged ended, especially in age of cyberattack,” [|http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp] ]// khirn WASHINGTON – __Former__ //__U.S. and Russian commanders Thursday called for scrapping “__// //AND//
 * __systems__** __are subject to **false alarms**__ ,” Cartwright said at a news conference.

// In other ways, //cyber weapons are critically different from their nuclear counterparts.// For // // AND // // before launching a counterstrike, if that were U.S. policy. //
 * And, low response times means there’s a greater timeframe and probability than traditional nuclear escalation**
 * Dycus 10** [Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, “Congress’ Role in Cyber Warfare,” Journal of National Security Law & Policy, 4(1), 2010, p.161-164, [] ] //khirn//

// ** Disclosing vulnerabilities instead of using them ** ** for surveillance **** prevents arms races --- builds legitimacy to negotiate international cyber defense agreements **// //** Schneier 14 ** (Bruce Schneier is an internationally renowned security technologist, called a "security guru" by//The Economist. //Schneier is a fellow at the [|Berkman Center for Internet and Society] at Harvard Law School and a program fellow at the New America Foundation's [|Open Technology Institute] . “Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?”, May 19, 2014, http://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/)//CLi __The implications of U.S. policy can be felt on a variety of__ __AND__ fix almost all the vulnerabilities we find. But not all, yet.

__The potential utility of international cybersecurity agreements deserves to be carefully examined. **International agreements**__ AND //more secure cyber environment through measures that go beyond conventional forms of deterrence.//
 * That spurs international coop and mitigates offensive use **
 * Clark et. al. 9 **(David Clark, Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, Whitfield Diffie, Internet Corporation for Assigned Names and Numbers, Abraham Sofaer, former federal judge for the [|United States District Court for the Southern District of New York], and then a Legal Adviser to the [|United States State Department] , “Cyber Security and International Agreements”, [|http://cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf)//CLi]

// In a speech this month on "Internet freedom," Secretary of State Hillary __Clinton__// //__AND__// arms race in an arena where the offense already has a natural advantage.
 * Eliminating offensive cyberattacks allows the US to set global norms in cyberspace --- that’s key to prevent cyber arms races **
 * Goldsmith 10** [Jack, teaches at Harvard Law School and is a visiting fellow at the Hoover Institution at Stanford University, “Can we stop the Cyber Arms Race,” //Washington Post//, February 1, 2010, [] ] //khirn//

**__ 1ac plan __**
//** The United States federal government should substantially curtail its domestic surveillance using computer software vulnerabilities or exploits unknown to relevant vendors. **//

**__ Contention 4 Solvency __**
//** The plan solves effective information sharing between the government and private sector --- a signal of clear commitment and a steady flow of actionable disclosure is key to cooperative cyberdefense --- overcomes legal barriers **// //**Rosenzweig 12** [Paul, leading cybersecurity expert, founder of Red Branch Consulting PLLC, a homeland security consulting company, and a Senior Advisor to The Chertoff Group, “Cybersecurity and Public Goods: The Public/Private “Partnership,” An Emerging Threats Essay, Hoover Institution, Stanford]// khirn Information Sharing, Public Goods, and the Law This economic understanding of cybersecurity suggests AND __problems are not likely to be ones of law, but of **commitment**__.

// However, the NY Times had a story this weekend about how this move has // // AND // //__do that. Because they're not about protecting anyone -- other than themselves__. //
 * Disclosing zero-days __disarms__ cyberattackers globally **
 * Masnick 14** [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, “Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite,” Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml] //khirn//

//** US is the lynchpin of the zero-days market---that sustains the arms race and global cyberattacks—the plan reverses that and reduces the market drastically **// //** Perlroth and Sanger 13 ** (Nicole Perlroth covers cyberattacks, hackers and the cybersecurity industry for The Times’s business news section. She is a graduate of Princeton University, Stanford University’s Graduate School of Journalism and is a guest lecturer at Stanford’s graduate schools of business and communications. David Sanger is the chief Washington correspondent of The New York Times. “Nations Buying as Hackers Sell Flaws in Computer Code”, July 13, 2013, [] ) //CLi Now __, //the market for information about computer vulnerabilities has turned into a gold rush//__ //regulate a market in which government agencies are some of the biggest participants.//
 * AND **

// In April 2014, Bloomberg reported that the NSA had known for at least two // // AND // // are documented, subject to full analysis, and acted upon promptly.”296 //
 * Disclosing vulnerabilities amounts to disarming the NSA --- zero-days are key **
 * Kehl et al. 14** [Danielle Kehl is a Policy Analyst at New America’sOpen Technology Institute (OTI). Kevin Bankstonis the Policy Director at OTI, Robyn Greene is aPolicy Counsel at OTI, and Robert Morgus is aResearch Associate at OTI, New America is a nonprofit, nonpartisan publicpolicy institute that invests in new thinkers andnew ideas to address the next generation ofchallenges facing the United States, Policy Paper, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July 2014, [] ] //khirn//

//** The status quo provides incentives for writing software with vulnerabilities --- the signal of the plan is crucial to long-term cybersecurity **// //**Schneier 12** [Bruce, security expert with 13 books, fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute and the CTO of Resilient Systems, “The Vulnerabilities Market and the Future of Security,” Forbes, 5/30/2012, [] ]// khirn Recently, there have been several articles about the new market in zero-day AND //for the 1%.” And it makes the rest of us less safe.//

=Neg Disclosure= Topicality- Curtail Politics- Iran Deal K- Foucault Link Turns- Hegemony is Bad States Counterplan against Fusion Centers