Charles+&+Chirag

1ac plan
====Plan: The United States Federal Government should implement exclusively subsection (a) of the Secure Data Act with the added provision that no agency may coerce or provide financial incentives to companies or organizations for implementing backdoors into encryption.====

==1ac cybersec (short)==

====Contention 1 is CYBER SECURITY:====

====Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense==== **Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP://congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE AND these risks as a significant threat to our economy and to national security.

====Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable==== **Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL US energy infrastructure is vast, aging, and in need of an overhaul, AND infrastructure, but it ain't for lack of people trying," Moniz said.

====More susceptible to attacks now more than ever- OPM breach proves==== **Johnson 15** (Steve Johnson, graduate from Auburn, reporter for WHNT news, WHNT news "O.P.M. data breach affects thousands of workers in north Alabama" 7/22/15 http://whnt.com/2015/07/22/o-p-m-data-breach-affects-thousands-of-workers-in-north-alabama/) REDSTONE ARSENAL, Ala. – On any given weekday, some 40,000 AND recommendations on action you can take, visit opm.gov/cybersecurity.

====A cyber-attack destroys all U.S. critical infrastructure==== Daly 2/21/13: Michael Daly, Special Correspondant for the Daily Beast, columnist with New York Daily News, staff write for New York magazine, finalist for 2002 Pulitzer Prize, numerous awards. Cites the Defense Secretary Leon Panetta – quotes are basis for evidence. ("U.S. Not Ready for Cyberwar Hostile Hackers Could Launch", Michael Daly, Daily Beast, February 21, 2013, http://www.thedailybeast.com/articles/2013/02/21/u-s-not-ready-for-cyber-war-hostile-hackers-could-launch.html)//chiragjain// // If hackers shut down much of the electrical grid and the rest of the critical // // AND // // Shamoon to wreck 30,000 computers at the Saudi oil company Aramco. //

// ====Successful grid attacks cause retaliation and escalation to nuclear war==== // // **Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM // // To make matters worse a cyber attack that can take out a civilian power grid // // AND // // include the use of "nuclear weapons", if authorized by the President. //

// ====Even absent retaliation, grid failure triggers nuclear meltdowns and extinction==== // // **Huff 14** (Ethan A. Huff, staff writer and news analyst for NaturalNews - Natural News is an international news website reporting on science, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#) //chiragjain If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.

==1ac cybersec (long)==

====Contention 1 is CYBER SECURITY:====

====Current encryption policies allow vulnerabilities, posing a threat to national security – makes the US turn away from best solutions, increases system complexity, and makes it easier for attackers==== **Swire 7/8** //wx// // The technological hopes of law enforcement were expressed in House testimony this April by Amy // // ANDs // // is asking for the impossible. CALEA II-style proposals hurt security. //

// ====Attacks exploiting surveillance backdoors on critical infrastructure are imminent and inevitable – the plan is key to any effective defense==== // // **Blaze, Comp Sci Prof @ Penn, 15** (Matthew Blaze, Ph. D in computer science and associate professor at UPenn, "ENCRYPTION TECHNOLOGY POLICY ISSUES", 4/29/15, HTTP: //congressional.proquest.com.proxy.lib.umich.edu/congressional/docview/t39.d40.04292903.d94?accountid=14667)//EM// // I. ROBUST DIGITAL SECURITY TECHNOLOGIES ARE VITAL TO PROTECTING OUR NATIONAL AND CRITICAL INFRASTRUCTURE // // AND // // these risks as a significant threat to our economy and to national security. //

// ====Skeptics are wrong – grid attacks in particular are empirical and increasing – success is inevitable==== // // **Gilmour, researcher @ CSM, and Moniz, US Energy Secretary, 15** (Jared Gilmour, energy and politics researcher and staff writer, Christian Science Monitor, citing Ernest Moniz, U.S. Energy Secretary, "Climate change, cyberattacks are growing threats to grid, says US energy chief," 4/27/15, http://www.csmonitor.com/Environment/Energy/2015/0427/Climate-change-cyberattacks-are-growing-threats-to-grid-says-US-energy-chief)RL // // US energy infrastructure is vast, aging, and in need of an overhaul, // // AND // // infrastructure, but it ain't for lack of people trying," Moniz said. //

// ====More susceptible to attacks now more than ever- OPM breach proves==== // // **Johnson 15** (Steve Johnson, graduate from Auburn, reporter for WHNT news, WHNT news "O.P.M. data breach affects thousands of workers in north Alabama" 7/22/15 http://whnt.com/2015/07/22/o-p-m-data-breach-affects-thousands-of-workers-in-north-alabama/) // // REDSTONE ARSENAL, Ala. – On any given weekday, some 40,000 // // AND // // recommendations on action you can take, visit opm.gov/cybersecurity. //

// ====A cyber-attack destroys all U.S. critical infrastructure==== // // Daly 2/21/13: Michael Daly, Special Correspondant for the Daily Beast, columnist with New York Daily News, staff write for New York magazine, finalist for 2002 Pulitzer Prize, numerous awards. Cites the Defense Secretary Leon Panetta – quotes are basis for evidence. ("U.S. Not Ready for Cyberwar Hostile Hackers Could Launch", Michael Daly, Daily Beast, February 21, 2013, http://www.thedailybeast.com/articles/2013/02/21/u-s-not-ready-for-cyber-war-hostile-hackers-could-launch.html) //chiragjain If hackers shut down much of the electrical grid and the rest of the critical AND Shamoon to wreck 30,000 computers at the Saudi oil company Aramco.

====Successful grid attacks cause retaliation and escalation to nuclear war==== **Tilford, military affairs expert, 12** (Robert Tilford, military affairs expert, Private (ret.), U.S. Army, graduate of the U.S. Army Airborne School, studied ethics at Phoenix College, "Cyber attackers could shut down the electric grid for the entire east coast," Wichita Military Affairs Examiner, 7-27-2012, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)KMM To make matters worse a cyber attack that can take out a civilian power grid AND include the use of "nuclear weapons", if authorized by the President.

====NATO military response to cyber-attack on U.S.==== Hardy 3/25/15: News Editor, Sightline Media Group (formerly Gannett Government Media) - The Federal Times, C4ISR & Networks, Freelance Writer/Editor; Previous: 1105 Government Information Group, Potomac Tech Journal, United Communications Group. News Editor at multiple locations. BA Communication Arts at University of West Florida, Associate of Arts (AA), Liberal Arts and Sciences, General Studies and Humanities at Pensacola Junior College. ("Cyber attack could draw military response from NATO", Michael Hardy, C4ISR Networks, March 25, 2015, http://www.c4isrnet.com/story/military-tech/cyber/2015/03/25/nato-cyber-article-5/70455026/)//chiragjain// // A cyber attack could draw a military response from NATO, leaders of the organization // // AND // // you exactly how I'm going to do that ... that's the main message." //

// ====Even absent retaliation, grid failure triggers nuclear meltdowns and extinction==== // // **Huff 14** (Ethan A. Huff, staff writer and news analyst for NaturalNews - Natural News is an international news website reporting on science, "Nuclear power + grid down event = global extinction for humanity," Natural News, August 12, 2014, http://www.naturalnews.com/046429_nuclear_power_electric_grid_global_extinction.html#) //chiragjain If you think the Fukushima situation is bad, consider the fact that the United AND already run out of fuel, leaving nuclear reactors everywhere prone to meltdowns.

====Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth==== **Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html)//chiragjain// // Ever since the Edward Snowden leaks started it has become more and more obvious that // // AND // // off the value of the US technology sector simply by telling the truth. //

// ====Cyberattacks collapse global economy- cost market 3 trillion dollars==== // // **Taylor 14** (Brian Taylor, degree from University of Illinois at Urbana-Champaign, Bachelor of Science, Biology, Russian degree from Indiana University Bloomington, Writer at TechRepublic, TechRepublic "Cyberattacks fallout could cost the global economy $3 trillion by 2020 http://www.techrepublic.com/article/cyberattacks-fallout-could-cost-the-global-economy-3-trillion-by-2020/)NF // // The global risk of cyberattacks is a real and growing threat, and could carry // // AND // // practices for cyberresiliency, and that cybersecurity is a CEO-level issue. //

// ====Growth is vital to prevent multiple scenarios for conflict escalation and extinction==== // // **Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University. // // "The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM // // Let me posit a radical idea: The most critical threat facing the United States // // AND // // just for Americans, but for the vast majority of the planet's inhabitants. //

// ==1ac econ (short)== //

// ====Contention 2 is ECONOMY:==== //

// ====Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth==== // // **Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html) //chiragjain Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.

====Growth is vital to prevent multiple scenarios for conflict escalation and extinction==== **Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University. "The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM Let me posit a radical idea: The most critical threat facing the United States AND just for Americans, but for the vast majority of the planet's inhabitants.

==1ac econ (long)==

====Contention 2 is ECONOMY:====

====US economy is in decline – Trade deficit at a 6½ year high==== **Harlan 5/29 [Chico, covers economics for the Washington Post, Works for several other acclaimed magazines, "U.S. economy shrinks in first quarter, raising questions about underlying strength", Washington Post, May 29, 2015,** http://www.washingtonpost.com/blogs/wonkblog/wp/2015/05/29/analysts-expect-decline-in-u-s-gdp-in-first-quarter/**, July 17, 2015] KL** The U.S. economy shrank at an annualized pace of 0.7 AND back debt or rebuild savings, according to government and credit card data.

====Backdoors ensure growth slowdown==== **Bankston 15** ** - Kevin S. Bankston: Policy Director of New America's Open Technology Institute & Co-Director of New America's Cybersecurity Initiative. Kevin was a Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology. He is the Director of New America's Open Technology Institute. Masters from the **University of Southern California Law School **("Before the U.S. House of Representatives Subcommittee on Information Technology of the Committee on Oversight and Government Reform: Hearing on 'Encryption Technology and Possible U.S. Policy Responses'.", Kevin S. Bankston, April 29, 2015,** https://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain// // It would cost the American economy untold billions of dollars. Experts estimated during the // // AND // // sources outside of the United States, which is a major reason why… //

// ====Encryption backdoors directly risk financial attacks AND collapse the U.S. technology industry – plan is key to overall growth==== // // **Clark, economic scholar, 14** (Thomas G. Clark, economics scholar, blogger on economics, politics, and philosophy, university level English tutor, former administrator in public and private industries, "How NSA overreach has done more damage to the US economy that Osama Bin Laden could ever have dreamed of", Thomas G. Clark, Another Angry Voice Blog, http://anotherangryvoice.blogspot.com/2014/01/nsa-overreach-worse-than-terrorism.html) //chiragjain Ever since the Edward Snowden leaks started it has become more and more obvious that AND off the value of the US technology sector simply by telling the truth.

====Encryption backdoors kills US tech leadership – decks consumer trust==== **Swire 7/8** //wx// // Mandated vulnerabilities are bad industrial policy – they threaten U.S. technological leadership // // AND // // cryptographic backdoors and secure apps, the United States would inevitably lose." 30 //

// ====Growth is vital to prevent multiple scenarios for conflict escalation and extinction==== // // **Haass, President of CFR and former Director of Policy Planning @ State, 13** (Richard N. Haass, President of the Council on Foreign Relations, former director of policy planning for the Department of State and a principal adviser to Secretary of State Colin Powell, former US Ambassador and coordinator for policy toward Afghanistan, former vice president and director of foreign policy studies at the Brookings Institution, former lecturer in public policy at Harvard University's John F. Kennedy School of Government, and a research associate at the International Institute for Strategic Studies. A Rhodes scholar, Dr. Haass holds a BA from Oberlin College and Master and Doctor of Philosophy degrees from Oxford University. // // "The World Without America," 4-30-2013, http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n—haass)KMM // // Let me posit a radical idea: The most critical threat facing the United States // // AND // // just for Americans, but for the vast majority of the planet's inhabitants. //

// ====Economic collapse causes competition for resources and instability that escalates and goes nuclear ==== // // Harris and Burrows 9 [counselor in the National Intelligence Council, the principal drafter of Global Trends 2025, **member of the NIC's Long Range Analysis Unit "Revisiting the Future: Geopolitical Effects of the Financial Crisis", Washington Quarterly, 04/09/2009, http://www.twq.com/09april/docs/09apr_burrows.pdf, 5/22/15] KL** // //** Of course, the report encompasses more than economics and indeed believes the future is **// //** AND **// //** within and between states in a more dog-eat-dog world. **//

//** ==1ac humint (short)== **//

//** ====Contention 3 is HUMAN INTELLIGENCE:==== **//

//** ====Capability and effectiveness are collapsing now due to overreliance on encryption backdoors – only the plan solves==== **// //Eddington, Security Prof @ Georgetown, 15 **(Patrick G. Eddington, assistant professor in the Security Studies Program at Georgetown University, policy analyst in Homeland Security and Civil Liberties at the Cato Institute, former military imagery analyst at the CIA's National Photographic Interpretation Center, former communications director and senior policy advisor to Rep. Rush Holt (D-NJ), spent 11 years in the U.S. Army Reserve and the National Guard in both enlisted and commissioned service, M.A. National Security Studies, Georgetown University, B.A. International Affairs, Missouri State University, "US wants to hack your phone because it doesn't have real spies it needs". Reuters. 2/23/15. http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-before-it-was-against-it/) **//**ET**
 * Last fall, when Apple and Google announced they were cleaning up their operating systems **
 * AND **
 * of fighting the modern encryption revolution, the government should be embracing it. **

Johnson, Poli Sci Prof @ Georgia, 9 **(Loch Johnson, Regents Professor of Political Science, University of Georgia, former special assistant to the chair of the Senate Select Committee House Subcommittee on Intelligence Oversight, former staff director of the House Subcommittee on Intelligence Oversight, former visiting scholar at Yale University, won the Josiah Meigs Prize, the highest teaching honor at the University of Georgia in addition to the Owens Award, its highest honor for research, editor of Intelligence and National Security, Ph.D. political science, University of California at Riverside, "Evaluating "Humint": The Role of Foreign Agents in U.S. Security", Peer reviewed conference paper. 2/15/9. http://citation.allacademic.com//meta/p_mla_apa_research_citation/3/1/0/6/6/pages310665/p310665-14.php)//ET**
 * ====HUMINT filters the probability and magnitude of all existential threats – prefer consensus of experts and empirics==== **
 * Abstract Intelligence is considered the first line of defense in U.S. security **
 * AND **
 * with an overall judgment about the value of agents for a nation's security. **


 * ==1ac china== **

Goldman 15 **(Jeff Goldman, writer for esecurity planet, worked for Edgell's communications magazine, Mobile Enterprise Magazine, Northwestern University, Bachelor or Science. "China to Require Backdoors in Foreign Hardware, Software. eSecurity Planet  January 30, 2015)\\mwang** The **Chinese government recently implemented new rules requiring foreign companies** that sell computer equipment to AND ," adding, "There are no backdoors in any of Huawei's equipment."
 * ====Backdoors empower Chinese offensive cyber-ops==== **

Swaine 13 **(Micheal D. Swaine, expert in China and East Asian security studies and a Senior Associate in the Asia Program at the Carnegie Endowment for International Peace. "Chinese views on cybersecurity in Foreign relations." Carnegie Endowment http://carnegieendowment.org/files/CLM42MS.pdf page 1-2 September 24, 2013)\\mwang**
 * ====That escalates cyber arms racing==== **
 * During the past few years, cybersecurity has become a major concern among many countries **
 * AND **
 * general? The article concludes with a summary and some implications for the future **

Austin 13 **[Director of Policy Innovation at the EastWest Institute, "Costs of American Cyber Superiority," 8/6, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/] //khirn//**
 * ====That goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements ==== **
 * // The United States is racing for the technological frontier in military and intelligence uses of //**
 * // AND //**
 * // be every bit as reasonable given their anxiety about unconstrained American cyber superiority. //**

//Japan Times 15 **[May 1, 2015, "U.S., Russian 'hair-trigger' nuclear alert urged ended, especially in age of cyberattack," http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp]**// **khirn**
 * // ====Independently risks miscalc —- hair-trigger status causes nuclear war==== //**
 * WASHINGTON – Former U.S. and Russian commanders Thursday called for scrapping " **
 * AND **
 * systems are subject to false alarms," Cartwright said at a news conference. **


 * ==1ac solvency== **


 * ====Contention 4 is SOLVENCY:==== **

McQuinn 14 **(Alan McQuinn, Research Assistant, Information Technology and Innovation Foundation,**
 * ====Only the plan solves – vital to security and economy==== **
 * Former telecommunications fellow for Congresswoman Anna Eshoo, former Archer Fellow, University of Texas at Austin, interned for the Office of Legislative Affairs, Federal Communications Commission, B.S. Public Relations and Political Communications, University of Texas at Austin, "The Secure Data Act could help law enforcement protect against cybercrime," The Hill, 12-19-2014, http://thehill.com/blogs/congress-blog/technology/227594-the-secure-data-act-could-help-law-enforcement-protect-against)ML **
 * Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op **
 * AND **
 * cyber vulnerabilities and allow electronics manufacturers to produce the most secure devices imaginable. **

Wyden 14 **(Ron, Senior Senator of Oregon, Member of the Congressional Internet Caucus and United States Senate Select Committee on Intelligence, from a press conference, "Wyden Introduces Bill To Ban Government-Mandated Backdoors Into Americans' Cellphones and Computers", 12/4/14 http://www.wyden.senate.gov/news/press-releases/wyden-introduces-bill-to-ban-government-mandated-backdoors-into-americans-cellphones-and-computers)ML**
 * ====The Secure Data Act is the best way to keep data safe==== **
 * Washington, D.C. – U.S. Senator Ron Wyden, **
 * AND **
 * prohibit electronic vulnerability mandates on a 293-123 vote in June 2014. **

Sensenbrenner 15 **( James, Representative for Wisconsin, Chairman of the Crime, Terrorism, Homeland Security and Oversight Subcommittee, "Sensenbrenner, Massie & Lofgren Introduce Secure Data Act", news release, 2/4/2015, http://search.proquest.com.proxy.lib.umich.edu/pqrl/docview/1651527976/BFCE0D85596F4F28PQ/3?accountid=14667)ML**
 * ====SDA solves for US jobs by rebuilding international trust==== **
 * "Congress has allowed the Administration's surveillance authorities to go unchecked by failing to enact **
 * AND **
 * requesting or compelling backdoors in services and products to assist with electronic surveillance. **

Bankston 15** (Kevin S. Bankston, Policy Director of the Open Technology Institute and Co-Director of Cybersecurity Initiative, New America, Security Fellow with the Truman National Security Project, serves on the board of the First Amendment Coalition, former Senior Counsel and the Director of the Free Expression Project at the Center for Democracy & Technology, former nonresidential fellow with the Stanford Law School's Center for Internet & Society, former Senior Staff Attorney and Equal Justice Works/Bruce J. Ennis First Amendment Fellow at Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow, litigated Internet-related free speech cases at the American Civil Liberties Union, J.D. University of Southern California Law School, B.A. University of Texas at Austin, statement before the U.S. House of Representatives, Subcommittee on Information Technology of the Committee on Oversight and Government Reform, Hearing on "Encryption Technology and Possible U.S. Policy Responses," 4-29-2015, http://oversight.house.gov/wp-content/uploads/2015/04/4-29-2015-IT-Subcommittee-Hearing-on-Encryption-Bankston.pdf)KMM Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for AND America. Thank you, and I welcome your questions on this important matter
 * ====AND, it's net better for law enforcement – consensus of experts and empirics==== **

= Neg Disclosure = T - Zero Days T - Insider Threats