1ac Decryption - DDI 2015 KQ

download 1ac Decryption - DDI 2015 KQ

of 14

Transcript of 1ac Decryption - DDI 2015 KQ

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    1/32

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    2/32

    1ac—cybersecurity

    A cyberattack is comingMacri, 14

    (Giuseppe, staf writer or the Daily Caller, citing NSA head Michael Rogers,“NSA Chie !S "ill Sufer A Catastrophic Cy#erattac$ %n &he Ne't &en ears,)http**dailycaller+co*-./0*//*-/*nsa1chie1us1will1sufer1a1catastrophic1cy#erattac$1in1the1ne't1ten1years*, 2C3

    N ational S ecurity A gency and !+S+ Cy#er Coand head Ad+ Michael Rogers warned 

    lawa$ers during a congressional #rie4ng this wee$ that the U.S. woud su!er a severe

    cyberattack against critica in"rastructure  ike #ower or "ue grids inthe not1too1distant uture+5 “% ully e'pect that during y tie as a coander, we are going to #e tas$edwith deending critical inrastructure in the !nited States,) Rogers said while citing 4ndings ro an

    6cto#er 7ew Research Center report+ “ $t%s ony a matter o" the when, not the i" , that

    we%re going to see something dramatic 8 % #et it happens be"ore &'&( +)5

    Rogers told the 9ouse %ntelligence Coittee &hursday he e'pected the attac$ to occur during his tenureas head o NSA the !+S+ ilitary:s cy#er1war #ranch, and that it woud li$ely come "rom state)s#onsored hackers with ties to *hina, Russia or se;eral other countries,any o who ha;e already successully #reached the systes o critical !+S+ industries+5 “&here areultiple nation1states that ha;e the capa#ility and ha;e #een on the systes,) Rogers told the coittee,adding that any were engaged in “reconnaissance) acti;ities to sur;eil “speci4c scheatics o ost oour control systes+)5 “&here shouldn:t #e any dou#t in our inds that there are nation1states and groupsout there that ha;e the capa#ility8 to shut down, orestall our a#ility to operate our #asic inrastructure,whether it:s generating power across this nation, whether it:s o;ing water and uel,) Rogers said,

    warning China and “one or two others) had already #ro$en into the !+S+ power grid+5 Rogers aso#redicted that in the coing years, cyber criminas pre;iously engaged in stealing #an$,

    credit card and other 4nancial data woud start to be co)o#ted by nation)states

    to act as +surrogates ,) o#scuring countries: 4ngerprints in the in4ltration and thet oinoration ;alua#le to planning attac$s+5 &he adiral added that such criinal groups, which are otenRussian1spea$ing, ha;e already #een using state1de;eloped cy#er tools+

    ackdoors creates vunerabiities that threatencyberin"rastructure - makes attacks ikeyurger et a 14 (ean Cap,Associate proessor at the %ndiana !ni;ersity School o %noration andCoputing, Dan =u#ar, onM 7esha, Carnegie Mellon !ni;ersity, &erry Da;is, MicroSystes AutoationGroup, “Ris$ing %t All !nloc$ing the 2ac$door to the Nation:s Cy#ersecurity,)%

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    3/32

    address the risks o" instaing backdoors in commercia #roducts,introducing maware and s#yware into #roducts, and weakeningstandards. /e iustrate that these are #ractices that harm

    America%s cybersecurity #osture and #ut the resiience o" American

    cyberin"rastructure at risk . "e write as a technical society to clariy the potential har

    should these strategies #e adopted+ "hether or not these strategies e;er ha;e #een used in practice isoutside the scope o this paper+5 $ndividua com#uter users, large corporations andgo;ernent agencies all de#end on security "eatures buit into in"ormationtechnoogy #roducts and services they buy on the commerciamarket. $" the security "eatures o" these widey avaiabe #roductsand services are weak, everyone is in greater danger . here recentyhave been aegations that U.S. government agencies (and soe pri;ateentities3 have engaged in a nu#er o activities deiberatey intended toweaken ass ar$et, widely used technoogy+ /eakening coercial #roducts andser;ices does have the bene0t that it becomes easier "or U.S.inteigence agencies to conduct surveiance on targets that use the wea$enedtechnology, and ore inoration is a;aila#le or law enorceent purposes+ 6n the surace, it would

    appear these oti;ations would #e reasona#le+ 9owe;er, such strategies aso inevitabymake it easier "or "oreign #owers, criminas and terrorists to

    in0trate these systems "or their own #ur#oses .  Moreo;er, everyone

    who uses backdoor technoogies may be vunerabe, and not Iust the handulo sur;eillance targets or !+S+ intelligence agencies+ %t is the opinion o %

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    4/32

    s#read widey+ &he #ac$doors in that case were a set o secrets then $nown only #y a sall, highlytechnical counity+ A singe, #utativey innocent error resuted in a arge)scae attack that disabed many systems+ %n recent years, arracuda had acom#etey undocumented backdoor that aowed high eves o"access ro the %nternet addresses assigned to 2arracuda+ 9owe;er, when it was pu#liciHed, as alostine;ita#ly happens, it became e6tremey unsa"e, and arracuda%s

    customers re9ected it.: ;ne e6am#e o" how attackers can subvertbackdoors placed into systes or #enign reasons occurred in the networ$ o the largestcoercial cellular operator in 2reece+ Switches de#oyed in the system camee3ui##ed with buit)in wireta##ing "eatures, intended ony "orauthorimbassy inGreece #eore the security #reach 4nally was disco;ered+ %n essence, a backdoor created to0ght crime was used to commit crime.

    wo scenarios to a cyberattack—

    ?irst is the grid —a cyberattack causes coa#seReuters 1((Carolyn Cohn, reporter, ?1F1/@, “Cy#er attac$ on !+S+ power grid could costeconoy L/ trillion report,) http**www+reuters+co*article*-./@*.?*.F*us1cy#erattac$1power1sur;ey1id!SCN.7%.S-./@.?.F, 2C3

    A cyber attack  which shuts down #arts o" the !nited StatesO power grid coud

    cost as uch as L 1 triion  to the !+S+ econoy, according to a re#ort pu#lished on"ednesday+5 Copany e'ecuti;es are worried a#out security #reaches, #ut recent sur;eys suggest they

    are not con;inced a#out the ;alue or efecti;eness o cy#er insurance+5 &he report ro

    theUniversity o" *ambridge *entre "or Risk Studies and the =loydOs o =ondoninsurance ar$et outlines a scenario o an electricity #lac$out that lea;es P illion people in New or$

    City and "ashington DC without power+5  he scenario , deveo#ed by *ambridge, is

    technoogicay #ossibe  and is assessed to #e within the once1in1-..1year pro#a#ility or

    which insurers should #e prepared, the report said+5  he hy#othetica attack causes a

    rise in mortaity rates as heath and sa"ety systems "ai  , a dro# in

    trade as #orts shut down and disru#tion to trans#ort and

    in"rastructure .5  Q&he total ipact to the !+S+ econoy is estiated at L-0 #illion, rising to orethan L/ trillion in the ost e'tree ;ersion o the scenario,Q the report said+ &he losses coe rodaage to inrastructure and #usiness supply chains, and are estiated o;er a 4;e1year tie period+5 &he

    e'tree scenario is #uilt on the greatest loss o power, with /.. generators ta$en oine, and would leadto insurance industry losses o ore than L?. #illion, the report added+5 here have been 1(sus#ected cyber attacks on the U.S. eectricity grid since &''', thereport said, citing !+S+ energy departent data+5 &he !+S+ %ndustrial Control Syste Cy#er

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    5/32

    An attack decimates US in"rastructure within 1( minutesN@ 1'(Michi$o a$utani, 7ulitHer 7riHe winning #oo$ re;iewer, citing Richard Clar$e,orer National Coordinator or Security, %nrastructure 7rotection, andCounter1terroris or the !nited States, 01-?1/.,

    http**www+nyties+co*-./.*.0*-?*#oo$s*-?#oo$+htlBpagewantedall,2C3

    ackouts hit  New @ork, os Angees, /ashington and more than

    1'' other  American cities . Subways crash. rains derai. Air#anes

    "a  "rom the sky.5   2as #i#eines e6#ode. *hemica #ants reease

    couds o" to6ic chorine . anks ose a their data. /eather and

    communication sateites s#in out  o" their orbits. And the

    =entagon%s cassi0ed networks grind to a hat  , binding the

    greatest miitary #ower in the word.5  &his ight sound li$e a ta$eof on the -..? 2ruce "illis “Die 9ard) o;ie, inwhich a group o cy#erterrorists attepts to stage what it calls a “4re sale) a systeatic shutdown o the nation:s ;ital counication and utilities inrastructure+

    According to the orer

    counterterrorism c

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    6/32

    history ay #e ore instructi;e than e;er+ "hile we continue to #elie;e that the GreatDepression is not li$ely to #e repeated, the lessons to #e drawn ro that period include the harulefects on edgling deocracies and ultiethnic societies (thin$ Central

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    7/32

    to #revent core metdown .E %n >apan, it was a one1two punch 4rst the earthJua$e, then the tsunai+ &o$yo apan, arenOt so sure+ %n the worst1case scenario, the NRCOs /PP.ris$ assessent predicted that a core met at =each ottom coud begin in one hour i"eectrica #ower on) and o!)site were ost, the diese generators -the main back)u# source o" #ower "or the #um#s that kee# the corecoo with water - "aied to work and other mitigating ste#s werenIt

    taken. E$t is not a 3uestion that those things are de0nitey e!ectivein this kind o" scenario,E said Richard Denning, a proessor o nuclear engineering at 6hio State !ni;ersity, reerring to the steps NRC has ta$en to pre;entincidents+ Denning had done wor$ as a contractor on se;ere accident analyses or the NRC since /P?@+ 9e retired ro 2attelle Meorial %nstitute in /PP@+ Q&hey certainly could ha;e ade all the diference in thisparticular case,Q he said, reerring to >apan+ Q&hatOs assuing you ha;e stored these things in a place that would not ha;e #een swept away #y tsunai+Q

    Nucear metdowns cause e6tinctionendman */*11 V 2A ro 9ar;ard !ni;ersity and M2A ro "hartonSchool at the !ni;ersity o 7ennsyl;ania (Stephen, “Nuclear Meltdown in

     >apan) Rense, http**rense+co*generalP*nucelt+ht3

    Kor years, 9elen Caldicott warned itOs coing+ %n her /P?F #oo$, QNuclear Madness,Q she said QAs a physician, % contend that nucear

    technoogy threatens i"e on our #anet with e6tinction . $" #resent

    trends continue, theair we breathe, the "ood we eat, and the water

    we drink wi soon becontaminated with enough radioactive#outants to #ose a #otentia heath ha

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    8/32

    metdown, its #otentia catastro#hic e!ects "ar e6ceeding 3uake andtsunami devastation, amost minor by com#arison under a worstcase scenario. 6n March /-, &ies wri ter Matthew "ald headlined, Q

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    9/32

    his #a#er wi anayse the threat o" cyber terrorism in regard tonucear wea#ons. Speci4cally, this research will use open source $nowledge to identiy thestructure o nuclear coand and control centres, how those structures ight #e coproised throughcoputer networ$ operations, and how doing so would 4t within esta#lished cy#er terrorists: capa#ilities,

    strategies, and tactics+ $" access to command and contro centres is obtained,

    terrorists coud "ake or actuay cause one nucear  )armed state to

    attack another  , thus #rovoking a nucear res#onse "rom another

    nucear #ower.  his may be an easier aternative "or terrorist grou#s

    than buiding or ac3uiring a nucear wea#on or dirty bombthemseves. his woud aso act as a "orce e3uaiser, and #rovideterrorists with the asymmetric bene0ts o" high s#eed, remova o"geogra#hica distance, and a reativey ow cost. Continuing diHcuties indeveo#ing com#uter tracking technoogies which coud trace theidentity o" intruders, and diHcuties in estabishing an internationally agreedupon ega "ramework to guide res#onses to coputer networ$ operations, #ointtowards an inherent weakness in using com#uter networks tomanage nucear wea#onry+ his is #articuary reevant to reducing

    the hair trigger #osture o" e6isting nucear arsenas .L A com#uterswhich are connected to the internet are susce#tibe to in0trationand remote contro. Coputers which operate on a closed networ$ ay also #e coproised#y ;arious hac$er ethods, such as pri;ilege escalation, roaing note#oo$s, wireless access points,e#edded e'ploits in sotware and hardware, and aintenance entry points+ Kor e'aple, e1ail spoo4ngtargeted at indi;iduals who ha;e access to a closed networ$, could lead to the installation o a ;irus on anopen networ$+ &his ;irus could then #e carelessly transported on reo;a#le data storage #etween theopen and closed networ$+ %noration ound on the internet ay also re;eal how to access these closed

    networ$s directly+ >!orts by miitaries to #ace increasing reiance oncom#uter networks , incuding e6#erimenta technoogy such asautonomous systems, and their desire to have muti#e auncho#tions, such as nucear triad ca#abiity, enabes muti#e entry#oints "or terrorists+ Kor e'aple, i a terrestrial coand centre is ipenetra#le, perhaps

    isolating one nuclear ared su#arine would pro;e an easier tas$+ &here is e;idence to suggest ultipleattepts ha;e #een ade #y hac$ers to coproise the e'treely low radio reJuency once used #y the!S Na;y to send nuclear launch appro;al to su#erged su#arines+ Additionally, the alleged So;ietsyste $nown as 7erietr was designed to autoatically launch nuclear weapons i it was una#le toesta#lish counications with So;iet leadership+ &his was intended as a retaliatory response in the e;entthat nuclear weapons had decapitated So;iet leadershipX howe;er it did not account or the possi#ility ocy#er terrorists #loc$ing counications through coputer networ$ operations in an attept to engage

    the syste+ Y Shoud a warhead be aunched, damage coud be "urtherenhanced through additiona com#uter network o#erations. 2y usingpro'ies, muti)ayered attacks coud be engineered . &errorists could reotelycoandeer coputers in China and use the to launch a !S nuclear attac$ against Russia+ &hus Russiawould #elie;e it was under attac$ ro the !S and the !S would #elie;e China was responsi#le+ Kurther,

    emergency res#onse communications coud be disru#ted,trans#ortation coud be shut down , and disin"ormation , such asmisdirection, coud be #anted, thereby hindering the disaster reie"

    e!ort and ma6imi

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    10/32

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    11/32

    1ac—heg

    ackdoors destroy US tech innovation andcom#etitiveness

    ohn 14(Cindy, writer or the

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    12/32

    weIre 9ust handing business over to "oreign com#anies who donIt

    have such imitations + Nokia, Siemens, and >ricsson woud a be

    ha##y to take a hea#ing share o" the communications technoogybusiness "rom US com#anies+ And itOs not Iust teleco carriers and W6%7 pro;iders at ris$+ Manygame consoes that #eo#e can use to #ay over the $nternet, such as

    the Pbo6, aow gamers to chat with each other whie they #ay.heyId have to be ta##abe, too.

    ata #rovesoomberg, 1C(Allan 9oles, staf writer, P1/.1/, “NSA Spying Seen Ris$ing 2illions in !+S+

     &echnology Sales,) http**www+#loo#erg+co*news*articles*-./1.P1/.*nsa1spying1seen1ris$ing1#illions1in1u1s1technology1sales, 2C3

    Reports that the National Security Agency #ersuaded soe !+S+ technoogy

    com#anies to buid so1called backdoors into security products, networ$s and de;ices toallow easier sur;eillance are siilar to how the 9ouse %ntelligence Coittee descri#ed the threat posed

    #y China through 9uawei+5 >ust as the ShenHhen, China1#ased 9uawei lost #usiness ater the report urged!+S+ copanies not to use its eJuipent, the NSA discosures may reduce !+S+technoogy saes overseas by as much as Q18' biion, or &( #ercent o" in"ormation technoogy services, #y -./E, according to ?orrester

    Research $nc+, a research group in Ca#ridge, Massachusetts+5 “ he Nationa Security

    Agency wi ki the U.S. technoogy industry singehandedy ,) Ro#

    >ndere, a technoogy anayst in San >ose, Caliornia, said in an inter;iew+ “&hesecopanies ay #e Iust dealing with the diUculty in eeting our nu#ers through the end o the decade+)5%nternet copanies, networ$ eJuipent anuacturers and encryption tool a$ers recei;e signi4cantshares o their re;enue ro o;erseas copanies and go;ernents+5 Cisco Systes %nc+, the world:s#iggest networ$ing eJuipent a$er, recei;ed 0- percent o its L0E+/ #illion in 4scal -./- re;enue rooutside the !+S+, according to data copiled #y 2loo#erg+ Syantec Corp+, the #iggest a$er ocoputer1security sotware #ased in Mountain Wiew, Caliornia, reported 0E percent o its 4scal -./

    re;enue o LE+P #illion ro ar$ets other than the !+S+, Canada and =atin Aerica+5 %ntel Corp+, theworld:s largest seiconductor a$er, reported F0 percent o its L@+ #illion in 4scal -./- re;enue caero outside the !+S+, according to data copiled #y 2loo#erg+5 Z

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    13/32

    ech eadershi# in the #rivate sector is uni3uey key tohegSega 4(Ada, director o the 7rogra on Digital and Cy#erspace 7olicy at theCouncil on Koreign Relations (CKR3, An e'pert on security issues, technology

    de;elopent, No;e#er*Dece#er -..0 %ssue, “%s Aerica =osing %ts

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    14/32

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    15/32

    ways decision a$ers identiy with the states they represent ay proptthe to rae issues as positional disputes o;er status in a social hierarchy+ %de;elop hypotheses that tailor this scholarship to the doain o great power politics, showing how the pro#a#ilityo status copetition is li$ely to #e lin$ed to polarity+ &he rest o the article in;estigateswhether there is suUcient e;idence or these hypotheses to warrant urther re4neent and testing+ % pursue this in three

    ways #y showing that the theory ad;anced here is consistent with what we $now a#out 

    arge)scae #atterns o" great #ower conict through history X #y ]

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    16/32

    easi#le di;isions o the atter in dispute e;en when ailing to do so iposes highcostsX deands on the part o states or o#ser;a#le e;idence to con4r their estiate o an ipro;ed position in thehierarchyX the ina#ility o pri;ate #argains to resol;e issuesX a reJuently o#ser;ed copulsion or thepu#lic attainent o concessions ro a higher ran$ed stateX and stu##orn resistance on the part o states towhich such deands are addressed e;en when acJuiescence entails liited aterial cost+

     &he literature on #argaining ailure in the conte't o power shits reains inconclusi;e, and it is preature to ta$e anyepirical pattern as necessarily pro#ati;e+ %ndeed, Ro#ert 7owell has recently proposed that indi;isi#ility is not arationalistic e'planation or war ater all ully rational leaders with perect inoration should preer to settle a disputeo;er an indi;isi#le issue #y resorting to a lottery rather than a war certain to destroy soe o the goods in dispute+ "hatight pre;ent such #argaining solutions is not indi;isi#ility itsel, he argues, #ut rather the parties: ina#ility to coit toa#ide #y any agreeent in the uture i they e'pect their relati;e capa#ilities to continue to shit+-- &his is the credi#lecoitent pro#le to which any theorists are now turning their attention+ 2ut how it relates to the inorationpro#le that until recently doinated the oral literature reains to #e seen+-  &he larger point is that positionalconcerns or status ay help account or the puHHle o #argaining ailure+ %n the rational choice #argaining literature, waris puHHling #ecause it destroys soe o the #ene4ts or ows o #ene4ts in dispute #etween the #argainers, who would #e#etter of di;iding the spoils without war+ et what happens to these odels i what atters or states is less the ows oaterial #ene4ts thesel;es than their iplications or relati;e statusB &he salience o this Juestion depends on the

    relati;e iportance o positional concern or status aong states+ Do Great 7owers Care a#out StatusB Mainstreatheories generally posit that states coe to #lows o;er an international status Juoonly when it has iplications or their security or aterial well1#eing+ &he guidingassuption is that a state:s satisaction ]

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    17/32

    the !+S+ hoeland and Aerican glo#al interests+ &hese interests include ensuring that critical resources li$e oil ow around the world, that the glo#al trade and onetary regies ourish and that"ashingtonOs worldwide networ$ o allies is reassured and protected+ Allies are a great asset to the !nited States, inpart #ecause they shoulder soe o its #urdens+ &hus, it is no surprise to see NA&6 in Aghanistan or the Australiansin

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    18/32

    !+S+ leadership reduced riction aong any states that were historical antagonists, ost

    nota#ly Krance and "est Gerany+ &oday, Aerican priacy helps $eep a nu#er ocoplicated rela tionships aligned 1 1#etween Greece  and &ur$ey, %srael  andapan, %ndia  and 7a$istan , %ndonesia and Australia+ &his is notto say it ul4lls "oodrow "ilsonOs ;ision o ending all war+ "ars still occur where "ashingtonOs interests are not

    seriously threatened, such as in Darur, #ut a 7a' Aericana does reduce warOs li$elihood,

    particularly warOs worst or great power wars+  Second, Aerican power gi;es the !nitedStates the a#ility to spread deocracy and other eleents o its ideology o li#eralis+ Doing so is asource o uch good or the countries concerned as well as the !nited States #ecause, as >ohn 6wen noted on thesepages in the Spring -..E issue, li#eral deocracies are ore li$ely to align with the !nited States and #e sypathetic

    to the Aerican world;iew+ So, spreading deocracy helps aintain !+S+ priacy+ %n addition, once states arego;erned deocratic ally, the li$elihood o any type o conict is signi4cantlyreduced+ &his is not #ecause deocracies do not ha;e clashing interests+ %ndeed they do+ Rather, it is #ecausethey are ore open, ore transparent and ore li$ely to want to resol;e things aica#ly inconcurrence with !+S+ lead ership+ And so, in general, deocratic states are good or their citiHens aswell as or ad;ancing the interests o the !nited States+ Critics ha;e aulted the 2ush Adinistration or attepting tospread deocracy in the Middle

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    19/32

    1ac—#an

    he United States "edera government shoud ban thecreation and surveiance o" backdoors as outined in the

    Secure ata Act o" &'1(.

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    20/32

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    21/32

    announced !+S+ Departent o >ustice Cy#ersecurity !nita unit designedsolely to “deter, in;estigate, and prosecute cy#er criinals,) should wor$ incooperation with the pri;ate sector to create a saer en;ironent online+ Achange o" course is aso necessary to restore the abiity o" U.S. tech

    com#anies to com#ete gobay , where istrust has run rapant

    ollowing the re;elations o ass go;ernent sur;eillance+5

     "ith the //thCongress at an end, "yden has proised to reintroduce the Data Secure Actagain in the ne't Congress+ Congress should o;e e'pediently to ad;anceSenator "yden:s #ill to proote security and pri;acy in !+S+ de;ices andsotware+ Kurtherore, as Congress ar$s up the legislation and considersaendents, it should restrict not Iust go;ernent access to de;ices, #utalso go;ernent control o those de;ices+ &hese eforts will o;e the efortso our law enorceent agencies away ro creating cy#er ;ulnera#ilities andallow electronics anuacturers to produce the ost secure de;icesiagina#le+

    *osing backdoors strengthens digita security—thatdoesn%t trade o! with aw en"orcement #rioritiesankston 1((e;in 2an$ston is the Director o New Aerica:s 6pen &echnology %nstituteand Co1Director o New Aerica:s Cy#ersecurity %nitiati;e, ?1?1/@, “%t:s &ieto

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    22/32

    the coud. So, the #ur#orted aw en"orcement need is even ess

    com#eing than it was in the 7's + Meanwhile, the security iplications o trying toandate #ac$doors throughout the ;ast ecosyste o digital counications ser;ices ha;e only gottenore dire in the inter;ening years, as laid out in an e'hausti;e new report issued Iust this orning #y o;era doHen hea;y1hitting security e'perts+5 esterday, Coey conceded that ater a eaningul de#ate, it ay#e that we as a people decide that the #ene4ts o widespread encryption outweigh the costs and that

    there:s no sensi#le, technically easi#le way to guarantee go;ernent access to encrypted data+ 2ut theact is that we had that de#ate -. years ago, and we:;e #een ha;ing it again or nearly a year+ "e are nottal$ing past each otherX a wide range o ad;ocates, industry sta$eholders, policya$ers, and e'perts has#een spea$ing directly to Coey:s arguents since last all+ 9opeully he will soon start listening, ratherthan dooing us to repeat the ista$es o the past and dragging us into another round o Crypto "ars+5 

    /e have aready had the debate that *omey says he wants. Athat%s e"t is "or him to admit that he%s ost.

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    23/32

    Misc

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    24/32

    #oitics ink turns

    he Secure ata Act is overwhemingy bi#artisanoournal, /-101/0, “9ouse =awa$ers toReintroduce 2ill to =iit NSA O2ac$doorO Spying,)http**www+nationalIournal+co*tech*house1lawa$ers1to1reintroduce1#ill1to1end1nsa1#ac$door1e'ploits1-./0/-.0, 2C35ouse awmakers are attem#ting to revive a popular #ill that would liit theNational Security AgencyOs a#ility to spy on AericansO counications data, a day ater the easure was

    let out ro ongoing go;ernent unding negotiations+5 &he easure, du##ed the Secure ataAct and spearheaded #y Deocratic Rep+ `oe =ogren, woud bock  the NSA and other intelligenceagencies ro copelling tech copanies to create so1called backdoor vunerabiities intotheir de;ices or sotware+ Sen+ Ron "yden, also a Deocrat, introduced a siilar ;ersion o the #ill earlier

     &hursday+5 A =ogren aide said the #ill is e'pected to #e introduced later &hursday with Repu#lican

    cosponsors+5 A broader "orm o" the egisation overwhemingy #assed

    the 5ouse in Fune with bi#artisan su##ort  on a &7C)1&C vote, in the oro an aendent tac$ed on to a deense appropriations #ill+ &hat pre;ious #ill additionally would ha;epre;ented intelligence agencies ro engaging in content sur;eillance o AericansO counications datawithout a warrant+5 2ut the language was let out o ongoing negotiations #etween #oth cha#ers o;er aspending pac$age that would und ost go;ernent agencies into ne't year+ &he 9ouse has additionally

    #arred aendents to that oni#us easure, a coon practice+5 6n &hursday, C' civi)ibertiesgrou#s o" both ibera and conservative eanings wrote to 5ouseeadershi# to urge it to retain the #ro#osa  as #art o" its "unding#ackage.5 QKailing to include this aendent in the orthcoing K/@ oni#us will send a clearessage to Aericans that Congress does not care i the NSA searches their stored counications or ithe go;ernent pressures Aerican technology copanies to #uild ;ulnera#ilities into their products thatassist in NSA sur;eillance,Q read the letter, whose signatories include the

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    25/32

    coittee, which is Q#asically a pro'y or the intelligence counity,) as >ulian SancheH o the Cato

    %nstitute e'plained to "ired+5 he amendment sti has to be a##roved by theSenate in order to take e!ect in &'1(.

    he Secure ata Act is bi#artisan>??, 14

    (

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    26/32

    sovency shit

    UN e6#erts agree bruhaye, #ro" aw, 1(

    (Da;id, !N Special Rapporteur on the prootion and protection o the right toreedo o opinion and e'pression, clinical proessor o law at the !ni;ersityo Caliornia, %r;ine, School o =aw+ “Report o the Special Rapporteur on theprootion and5 protection o the right to reedo o opinion and e'pression,)@1--1/@, http**Iustsecurity+org*wp1content*uploads*-./@*.E*aye19RC1Report1

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    27/32

    (2ruce, cy#ersecurity e'pert, ellow at the 2er$an Center or %nternet andSociety at 9ar;ard =aw School, a progra ellow at the New AericaKoundationOs 6pen &echnology %nstitute, “Stop the hysteria o;er Appleencryption,) http**www+cnn+co*-./0*/.*.*opinion*schneier1apple1encryption1hysteria*, 2C3

    aw en"orcement has been com#aining about Egoing dark Q or decadesnow+ %n the /PP.s, they con;inced Congress to pass a law reJuiring phone copanies to ensure that phone

    calls would reain tappa#le e;en as they #ecae digital+ hey tried and ailed to #an strongencryption and mandate back doors or their use+ &he K2% tried and ailed again to #an strong

    encryption in -./.+ Now, in the post1Snowden era, theyOre a#out to try again+5  /e need to 0ght

    this. Strong encry#tion #rotects us "rom  a panoply o threats+ %t protects us ro

    hackers and criminas+ %t protects our #usinesses ro copetitors and oreign spies+ %tprotects people in totalitarian go;ernents ro arrest and detention+ &his isnOt Iust e tal$ing &he K2%

    also recoends you encrypt your data or security+5 As "or aw en"orcement W herecent decades have given them an un#recedented abiity to #ut usunder surveiance and access our data+ ;ur ce #hones #rovide them with adetaied history o our o;eents. ;ur ca records, e)mai history, buddyists, and ?acebook #ages te them who we associate with . hehundreds o" com#anies that track us on the $nternet te them whatweIre thinking about. Ubi3uitous cameras ca#ture our "aces

    everywhere . And most o" us back u# our  i=hone data on i*oud,

    which the ?$ can sti get a warrant "or. $t truy is the goden age o" 

    surveiance.

    &'1( Secure ata Act coses backdoors

    Nichos &D( (-*@*/@ Shaun Nichols “!S anti1#ac$door #ill % at 4rst youOreshot down in aes V try, try againSecond Secure Data Act #id hopes to $eep !ncle Sa ro tappingo#es, gadgets,etc)http**www+theregister+co+u$*-./@*.-*.@*uslawa$ersta$eanothershotat#ac$door#usting#ill*3

    awmakers in the US are making an e!ort to revive egisationthat woud ban government agencies "rom demanding backdooraccess to hardware, websites and so"tware+Y Under the #ro#osedSecure ata Act, deveo#ers cannot be "orced to insert securityhoes into devices and code . he ?$, or one, woud ike to usesuch aws to hiIac$ phones and other gadgets, view their contentsand snoo# on their owners - hackers woud ike to use thesevunerabiities, too .L &he #ill is sponsored #y >i Sensen#renner (R1"%3, `oe =ogren (D1CA3 and &hoas Massie (R13, and wasreintroduced into the 9ouse o Representati;es on "ednesday+ =astyearOs attept, which died at the su#coittee stage, can #e oundhere, and sought to Qprohi#it ederal agencies ro andating thedeployent o ;ulnera#ilities in data security technologies+QY Q*ongresshas aowed the administration%s surveiance authorities to gounchecked by "aiing to enact ade3uate re"orm,Q the trio said in a

    http://www.theregister.co.uk/2015/01/29/china_pushes_mandatory_backdoors/http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873http://www.theregister.co.uk/2015/01/29/china_pushes_mandatory_backdoors/http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    28/32

    stateent this wee$, announcing the reintroduction o the #ill to the9ouse+Y Q"ith threats to our hoeland e;er pre;alent, we should not tiethe hands o the intelligence counity+ 2ut unwarranted, backdoorsurveiance is inde"ensibe.L E he Secure ata Act is anim#ortant ste# in rebuiding #ubic trust in our inteigenceagencies and striking the a##ro#riate baance between nationa

    security and civi iberty.E

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    29/32

    $m#acts

    *yber)terror causes accidenta nucear war >ason ?rit< 7, Korer Captain o the !+S+ Ary, >uly, 9ac$ing Nuclear

    Coand and Control,www+icnnd+org*Docuents*>asonKritH9ac$ingNC-+doc

     &he !S uses the two1an rule to achie;e a higher le;el o security in nuclear afairs+ !nder this rule two authoriHedpersonnel ust #e present and in agreeent during critical stages o nuclear coand and control+ &he 7resident ust

     Iointly issue a launch order with the Secretary o DeenseX Minutean issile operators ust agree that the launch orderis ;alidX and on a su#arine, #oth the coanding oUcer and e'ecuti;e oUcer ust agree that the order to launch is;alid+ %n the !S, in order to e'ecute a nuclear launch, an

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    30/32

    incorrect inoration to #e transitted , recei;ed, or displayed at nuclear

    c  oand and  c  ontrol  centres , or shut down these centres: coputer

    networ$s copletely . $n 177(, a Norwegian scienti0c sounding rocketwas mistaken by Russian eary warning systems as a nucear missieaunched "rom a US submarine+ A radar operator used ro$us to notiy a general on duty whodecided to alert the highest le;els+ a;$aH was ipleented, all three chegets acti;ated, and

    the countdown"or a nucear decision began+ %t too$ eight inutes #eore the issile was properly identi4edaconsidera#le aount o tie considering the speed with which a nuclear response ust #e decided upon (Atergood

    -...3+Y Creating a alse signal  in these early warning systes would #e

    reativey easy  using coputer networ$ operations+ &he real diUculty would #e gaining

    access to these systes as they are ost li$ely on a closed networ$+ 9owe;er, i they are transittingwirelessly, that ay pro;ide an entry point, and inoration gained throughthe internet ay re;eal the details, such as passwords and sotware, orgaining entrance to the closed networ$+ % access was o#tained, a alse alar could #eollowed #y soething li$e a DDoS attac$, so the operators #elie;e an attac$ ay #e iinent,

    yet they can no longer ;eriy it+ &his could add #ressure to the decision making

    #rocess, and i" coordinated #recisey, coud a##ear as a 0rst round

    >M= burst. errorist grou#s coud aso attem#t  to launch a non1nuclearissile, such as the one used #y Norway, in an attept to "oo the system + he

    number o" states who #ossess such technoogy is "ar greater thanthe number o" states who #ossess nucear wea#ons. ;btaining them

    woud be consideraby easier  , es#eciay when enhancing o#erations

    through com#uter network o#erations. Co#ining traditional terroristethods with cy#er techniJues opens opportunities neither could accoplishon their own+ Kor e'aple, radar stations ight #e ore ;ulnera#le to a coputerattac$, while satellites are ore ;ulnera#le to Iaing ro a laser #ea,thus together they deny dual phenoenology+ Mapping counicationsnetwor$s through cy#er reconnaissance ay e'pose wea$nesses, and

    autoated scanning de;ices created #y ore e'perienced hac$ers can #ereadily ound on the internet+Y %ntercepting or spoo4ng counications is a highly cople' science+ &hese systes are designed to protect against the world:s ost powerul and well unded ilitaries+ et, there arerecurring gafes, and the ;ery nature o asyetric warare is to #ypass cople'ities #y 4nding siple loopholes+ Kore'aple, coercially a;aila#le sotware or ;oice1orphing could #e used to capture ;oice coands within thecoand and control structure, cut these sound #ytes into phonees, and splice it #ac$ together in order to issue alse;oice coands (Andersen -../, Chapter /E3+ Spoo4ng could also #e used to escalate a ;olatile situation in the hopes ostarting a nuclear war+ “ Xthey cut o! the #aragra#hY “%n >une /PPF, a group o international hac$ers calling thesel;esMilw.r hac$ed the we# site o %ndia:s 2ha#ha Atoic Research Center (2ARC3 and put up a spooed we# page showing a

    ushroo cloud and the te't “% a nucear war does start , you will #e the 4rst to screa) (Denning/PPP3+ 9ac$er we#1page deaceents li$e these are oten derided #y critics o cy#er terroris as siply #eing a nuisancewhich causes no signi4cant har+ 9owe;er, we#1page deaceents are #ecoing ore coon, and they point towardsalaring possi#ilities in su#;ersion+ During the -..? cy#er attac$s against

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    31/32

    a study commissioned by the $nternationa *ommission on NucearNon)#roi"eration and isarmament (%CNND3, which suggests that underthe right circumstances, terrorists coud break into com#uter

    systems and aunch an attack on a nucear state - triggering a

    catastro#hic chain o" events that woud have a goba im#act  .  L

    /ithout better #rotection o" com#uter and in"ormation systems, thepaper suggests, governments around the word are eaving o#en the#ossibiity that a we)coordinated cyberwar coud 3uicky eevate to

    nucear eves  . L %n act, says the study, Qthis may be an easier aternative "or

    terrorist grou#s than buiding or ac3uiring a nucear wea#on or dirtybomb themsevesQ+Y &hough the paper adits that the edia and entertainent industries otenconuse and e'aggerate the ris$ o cy#erterroris, it also outlines a nu#er o potential threats and

    situations in which dedicated hackers coud use in"ormation war"aretechni3ues to make a nucear attack more ikey. L "hile the possi#ility o aradical group gaining access to actual launch systes is reote, the study suggests thathackers coud "ocus on "eeding in "ase in"ormation "urther down thechain - or s#reading "ake in"ormation to oHcias in a care"uy

    orchestrated strike. L QDespite clais that nuclear launch orders can only coe ro the highestauthorities, numerous e6am#es #oint towards an abiity to sideste# thechain o" command and insert orders at ower eves,Q said >ason KritH, theauthor o the paper+ Q*yber)terrorists coud aso #rovoke a nucear aunch bys#oo0ng eary warning and identi0cation systems or by degradingcommunications networks.E

    *yberattacks on the US trigger nucear retaiationidde, 1C(Sa, writer or GiHodo and citing the 7entagon, “7entagon =etOs &hreatenNu$e Stri$e Against 9ac$ers,) 1E1/, http**giHodo+co*@PFFP/0*pentagon1lets1threaten1nu$e1stri$e1against1hac$ers, 2C3

    Most o us are content $eeping hac$ers away with a 4rewall and decent password+ 2ut the=entagon isnOt nearly content, and in a new re#ort, insists we shoud kee# ournucear arsena ready "or $nternet retaiation+ "hat could go wrongB5 &he report,QResilient Military Systes and the Ad;anced Cy#er &hreat,Q was prepared #y the Departent o DeenseOs

    Deense Science 2oard, and o;er the course o /F pages a$es one ;ery clear point i" *hina everhacks us, Q=rotect the Nucear Strike as a eterrent+Q &he phrase is repeatedagain and againthe word QnuclearQ appears // ties in a report ostensi#ly dealing with coputerwarare+ &he entire thing is riddled with Iargon, eupheis, and rosy ilitary etaphorcli#ing the

    ladder o deterrence_#ut the notion that American nukes coud  ( and

    shoudZK be #art o" the Ecyber warE e3uation  (and insulated against any

    electronic disruption3 is une3uivoca + =etOs put it plainly China should $now that we ha;e nu$es,

    tons o Oe, and i" *hinaIs stellar hacker #atoons ever tried to , say, bring downan American sateite, destabii

  • 8/19/2019 1ac Decryption - DDI 2015 KQ

    32/32

    the !nited States as Oe'tree circustances+OQ"aitwhatOs a &ier W1W% ad;ersary cy#er attac$B &hatOssiple QStates with the a#ility to successully e'ecute ull spectru (cy#er capa#ilities in co#ination withall o their ilitary and intelligence capa#ilities3 operations to achie;e a speci4c outcoe in political,ilitary, econoic, etc+ doains+Q

    *yber attacks wi#e)out the US miitary)))causes nucearwarRo#ert i"ord 1&, Graduate !S Ary Air#orne School, Kt+ 2enning,Georgia, “Cy#er attac$ers could shut down the electric grid or the entire eastcoast) -./-, http**www+e'ainer+co*article*cy#er1attac$ers1could1easily1shut1down1the1electric1grid1or1the1entire1east1coa we don:t agree with thea#leist language

     &o a$e atters worse a cyber attack that can take out a civiian #ower grid, or

    e'aple coud also cri##e the U.S. miitary +Y &he senator notes that is that the sae

    #ower grids that su##y cities and towns, stores and gas stations, cell

    towers and heart onitors also #ower “ every miitary base in our country+)Y “Although

    bases woud be #re#ared to weather a short  power outage with backu# dieselgenerators, within hours, not days, uel su##ies woud run out), he said+Y "hich eans

    miitary   c ommand and c ontro centers coud go dark +Y Radar

    systems that detect air threats to our country woud shut own copletely+Y “*ommunication between commanders and their troo#s woud also gosient+ And many wea#ons systems woud be e"t without either uel or

    eectric #ower), said Senator 2rassey+Y “So in a "ew short hours  or days,

    the mightiest miitary in the word woud be e"t scrambing tomaintain base "unctions), he said+Y /e contacted the =entagon and

    oHcias con0rmed the threat o" a cyber attack is something very

    rea +Y o# nationa security oHciasincluding the Chairan o the >oint Chies, the Director o

    the National Security Agency, the Secretary o Deense, and the C%A Director have said, “#reventing acyber attack  and ipro;ing the nation:s electric grids is aong the most urgent #riorities o our country) (source Congressional Record3+Y So how serious is the 7entagon ta$ing all thisBY