Beruflich Dokumente
Kultur Dokumente
1AC
Plan
Plan: The USFG should prohibit creation of backdoors and use
of backdoors from companies in the US.
Economy Advantage
Backdoors Crush US Economy 2 Internal Links:
1. Kills legitimacy of US Tech Markets abroad which spills over
to the rest of the economy
Holmes 13 [Allan Holmes is Director of Technology and Telecommunications with Bloomberg Government. He
was editor of Nextgov, a website affiliated with Government Executive covering federal technology policy, and
editor-in-chief of Federal Computer Week. He received his B.A. in journalism from the University of North Carolina at
Chapel Hill and a masters in public policy from Duke University. NSA Spying Seen Risking Billions in U.S.
Technology Sales, http://www.bloomberg.com/news/articles/2013-09-10/nsa-spying-seen-risking-billions-in-u-stechnology-sales, September 10th, 2013//Rahul]
Reports that the National Security Agency persuaded some U.S. technology companies
to build so-called backdoors into security products, networks and devices to allow
easier surveillance are similar to how the House Intelligence Committee described the threat posed by
China through Huawei. Just as the Shenzhen, China-based Huawei lost business after the report urged U.S. companies not to use its equipment, the
NSA disclosures may reduce U.S. technology sales overseas by as much as 180
billion dollars, or 25 percent of information technology services, by 2016, according to
Forrester Research Inc., a research group in Cambridge, Massachusetts. The National Security Agency will kill the U.S. technology industry
revenue from outside the U.S., according to data compiled by Bloomberg. Symantec Corp., the biggest maker of computer-security software based in
Mountain View, California, reported 46 percent of its fiscal 2013 revenue of $6.9 billion from markets other than the U.S., Canada and Latin America. Intel
Corp., the worlds largest semiconductor maker, reported 84 percent of its $53.3 billion in fiscal 2012 revenue came from outside the U.S., according to
Forrester, said in an interview. Now this is the exact flipping of that circumstance. Tarnished Reputations An Information Technology and Innovation
Foundation report in August found U.S. providers of cloud services -- which manage the networks, storage, applications and computing power for
companies -- stand to lose as much as $35 billion a year as foreign companies, spooked by the NSAs surveillance, seek non-U.S. offerings.
Customers buy products and services based on a companys reputation, and the
NSA has single-handedly tarnished the reputation of the entire U.S. tech industry , said
Daniel Castro, the reports author and an analyst with the non-partisan research group in Washington, in an e-mail. I suspect many foreign customers are
going to be shopping elsewhere for their hardware and software. Chips, Devices The latest disclosures were based on documents provided by Edward
Snowden, the former NSA contractor accused of espionage by the U.S. whos now in Russia under temporary asylum. While the NSA mentioned no
Spiegel separately reported the NSA cracked encryption codes to listen in on the 1.4 billion smartphones in use worldwide, including Apple Inc.s iPhone.
Google, Facebook Inc. and Yahoo yesterday petitioned the U.S. Foreign Intelligence Surveillance Court, which rules on warrants for domestic data, for
permission to publish the types of requests theyve received from the NSA. The three companies were among 22 that sent a letter in July to President
Barack Obama and congressional leaders urging that the companies be allowed to say more about their dealings with the agency. Companies Defense
Cisco said it doesnt customize equipment to enable surveillance. Ciscos product development practices specifically prohibit any intentional behaviors or
product features which are designed to allow unauthorized device or network access, exposure of sensitive device information, or a bypass of security
features or restrictions, John Earnhardt, spokesman for the San Jose, California-based company, said in a statement. Symantec said in a statement that it
learned of the NSAs encryption cracking in the media. We had no prior knowledge about this program, said Anna Zvagelskaya, of public relations firm
Weber Shandwick, which represents Symantec. We have long held that Intel does not participate in alleged government efforts to decrease security in
technology, Lisa Malloy, an Intel spokeswoman, said in an e-mail. Congress, Huawei While foreign firms may be more suspicious of some U.S.- made
what a nation-state is doing, The market-leading gear is often market-leading because its the best. Weve gone past being able to source everything
within a country. The NSA revelations also may undermine congressional efforts to block U.S. sales of networking equipment made by Huawei and ZTE
Corp., Chinas second-largest phone-equipment maker, also based in Shenzhen. A House Intelligence Committee report released in October 2012 said the
companies close ties to the Chinese government and its ability to build backdoors into U.S. computer networks might allow China to disrupt power grids,
financial networks or other critical infrastructure. That suspicion applies to almost every government and technology company, William Plummer, a Huawei
leave political games behind and pursue real solutions to more secure networks and data.
The need for economic renewal in the United States remains urgent. Years of disappointing
job growth and stagnant incomes for the majority of workers have left the nation
shaken and frustrated. At the same time, astonishing new technologiesranging from advanced robotics and
3-D printing to the digitization of everythingare provoking genuine excitement even as they make it
hard to see where things are going. Hence this paper: At a critical moment, this report asserts the
special importance to Americas future of what the paper calls Americas advanced
industries sector. Characterized by its deep involvement with technology research and development (R&D) and
STEM (science, technology, engineering, and math) workers, the sector encompasses 50 industries ranging from manufacturing industries such as
automaking and aerospace to energy industries such as oil and gas extraction to high-tech services such as computer software and computer system
role in American prosperity, assesses key trends, and maps its metropolitan and global competitive standing before outlining high-level strategies to
advanced industries (see nearby box for selection criteria) employed 12.3 million U.S. workers. That amounts to about 9 percent of total U.S. employment.
nations engineers; performs 90 percent of private-sector R&D; generates approximately 85 percent of all U.S. patents; and accounts for 60 percent of U.S.
exports. Advanced industries also support unusually extensive supply chains and other forms of ancillary economic activity. On a per worker basis,
advanced industries purchase $236,000 in goods and services from other businesses annually, compared with $67,000 in purchasing by other industries.
This spending sustains and creates more jobs. In fact, 2.2 jobs are created
domestically for every new advanced industry job 0.8 locally and 1.4 outside of the region. This means that in
addition to the 12.3 million workers employed by advanced industries, another 27.1 million U.S. workers owe their jobs to economic activity supported by
the sector supports almost 39 million jobsnearly onefourth of all U.S. employment. In terms of the sectors growth and change, the total number of jobs in the sector has remained
advanced industries. Directly and indirectly, then,
mostly flat since 1980 but its output has soared. From 1980 to 2013 advanced industries expanded at a rate of 5.4 percent annually30 percent faster
than the economy as a whole. Since the Great Recession, moreover, both employment and output have risen dramatically. The sector has added nearly
one million jobs since 2010, with employment and output growth rates 1.9 and 2.3 times higher, respectively, than in the rest of the economy. Advanced
services led this post-recession surge, and created 65 percent of the new jobs. Computer systems design alone generated 250,000 new jobs. Certain
advanced manufacturing industriesespecially those involved in transportation equipmenthave also added thousands of jobs after decades of losses.
Advanced industries also provide extremely high-quality economic opportunities for workers. Workers in advanced industries are extraordinarily productive
and generate some $210,000 in annual value added per worker compared with $101,000, on average, outside advanced industries. Because of this,
advanced industries compensate their workers handsomely and, in contrast to the rest of the economy, wages are rising sharply. In 2013, the average
advanced industries worker earned $90,000 in total compensation, nearly twice as much as the average worker outside of the sector. Over time, absolute
earnings in advanced industries grew by 63 percent from 1975 to 2013, after adjusting for inflation. This compares with 17 percent gains outside the
sector. Even workers with lower levels of education can earn salaries in advanced industries that far exceed their peers in other industries. In this regard,
the sector is in fact accessible: More than half of the sectors workers possess less than a bachelors degree. 2. The advanced industries sector is highly
metropolitan and varies considerably in its composition and depth across regions. Advanced industries are present in nearly every U.S. region, but the
sectors geography is uneven. Advanced industries tend to cluster in large metropolitan areas. Looking across the country, the 100 largest metro areas
contain 70 percent of all U.S. advanced industries jobs. In terms of the sectors local clustering, San Jose is the nations leading advanced industry hub
with 30.0 percent of its workforce employed in the sector. Seattle follows with 16.0 percent of its local jobs in advanced industries. Wichita (15.5 percent);
Detroit (14.8 percent), and San Francisco (14.0 percent) follow. Overall, advanced industries account for more than one in 10 jobs in nearly one-quarter of
the countrys major metro areas. This clustering occurs in a variety of configurations. Some metropolitan areassuch as Grand Rapids, MI; Portland, OR;
and Wichitafocus heavily on advanced manufacturing pursuits such as automotive, semiconductor, or aerospace manufacturing, respectively, while
metros like Bakersfield and Oklahoma City exhibit strong energy specializations. By contrast, services such as computer systems design, software, and
research and development predominate in metropolitan areas like Boston, San Francisco, and Washington. For their part, San Jose, Detroit, and Seattle
exhibit depth and balance across multiple advanced industry categories. Overall, the number of extremely dense concentrations of advanced industry
actually has declined. In 1980, 59 of the countrys 100 largest metropolitan areas had at least 10 percent of their workforce in advanced industries. By
share of the total U.S. economy has shrunk. The nations standing on these measures now lags world leaders. Equally worrisome is the balance of trade in
the sector. Although advanced industries export $1.1 trillion worth of goods and services each year and account for roughly 60 percent of total U.S.
exports, the United States ran a $632 billion trade deficit in the sector in 2012, in line with similar yearly balances since 1999. To be sure, a handful of
individual advanced industries such as royalties and other intellectual property and aerospace manufacturing enjoy trade surpluses that exceeded $60
billion and $80 billion in 2012. However, numerous areas of historical strength such as communications equipment, computer equipment, motor vehicles,
Notwithstanding
the nations strong innovation enterprise the United States advantage on this front
is slipping. For certain the advanced industry sector remains the key site of U.S.
technology gains. However, the United States is losing ground relative to other countries on measures of innovation performance and
and pharmaceuticals now run sizeable deficits, as do high-value R&D services and computer and information services.
capacity. For example, the U.S. share of global R&D and patenting is falling much faster than its share of global GDP and population, meaning that U.S.
slippage cannot simply be attributed to demography or macroeconomic convergence. Likewise, Americas research dominance looks less impressive after
adjusting for the size of its working age population. Turning to the nations critical regional innovation ecosystems, surprisingly few U.S. metropolitan areas
rank among the worlds most innovativeas measured by patent cooperation treaty applications per capita. Among the nations most patent-intensive
regions, just twoSan Diego and the San Jose-San Francisco combined arearank in the global top 20 and just two more (Boston and Rochester) score in
the top 50.
[Richard N. Haass, President of the Council on Foreign Relations, previously served as Director of
Policy Planning for the US State Department (2001-2003), and was President George W. Bush's special envoy to
Northern Ireland and Coordinator for the Future of Afghanistan. The World Without Americahttps://www.projectsyndicate.org/commentary/repairing-the-roots-of-american-power-by-richard-n--haass, April 30th, 2013//Rahul]
The most critical threat facing the United States now and for the
foreseeable future is not a rising China, a reckless North Korea, a nuclear Iran, modern terrorism, or
climate change. Although all of these constitute potential or actual threats, the biggest challenges facing the
US are its burgeoning debt, crumbling infrastructure, second-rate primary and secondary schools, outdated immigration system,
Let me posit a radical idea:
and slow economic growth in short, --the domestic foundations of American power.
Readers in other countries may be tempted to react to this judgment with a dose of schadenfreude, finding more than a little satisfaction in Americas
provoke charges of hypocrisy. When America does not adhere to the principles that it preaches to others, it breeds resentment.
But, like most temptations, the urge to gloat at Americas imperfections and struggles ought to be resisted . People around the globe
should be careful what they wish for. Americas failure to deal with its internal
challenges would come at a steep price. Indeed, the rest of the worlds stake in
American success is nearly as large as that of the US itself. Part of the reason is economic. The US
economy still accounts for about one-quarter of global output. If US growth
accelerates, Americas capacity to consume other countries goods and services will
increase, thereby boosting growth around the world . At a time when Europe is drifting
and Asia is slowing, only the US (or, more broadly, North America) has the potential to drive global
economic recovery. The US remains a unique source of innovation. Most of the worlds citizens communicate with mobile devices based
on technology developed in Silicon Valley; likewise, the Internet was made in America. More recently, new technologies developed in the US greatly
increase the ability to extract oil and natural gas from underground formations. This technology is now making its way around the globe, allowing other
societies to increase their energy production and decrease both their reliance on costly imports and their carbon emissions. The US is also an invaluable
world of geopolitics. Order requires the visible hand of leadership to formulate and realize global responses to global challenges. Dont get me wrong:
None of this is meant to suggest that the US can deal effectively with the worlds problems on its own. Unilateralism rarely works. It is not just that the US
lacks the means; the very nature of contemporary global problems suggests that only collective responses stand a good chance of succeeding. But
No other
country has the necessary combination of capability and outlook. This brings me back to the
argument that the US must put its house in order economically , physically, socially, and politically if it is
to have the resources needed to promote order in the world. Everyone should hope that it does: The
alternative to a world led by the US is not a world led by China, Europe, Russia, Japan, India, or any other country, but rather
a world that is not led at all. Such a world would almost certainly be characterized by chronic crisis and
conflict. That would be bad not just for Americans, but for the vast majority of the
planets inhabitants.
multilateralism is much easier to advocate than to design and implement. Right now there is only one candidate for this role: the US.
security and defence behaviour of interdependent states. Research in this vein has been considered at systemic, dyadic and
national levels. Several notable contributions follow. First, on the systemic level, Pollins (2008) advances Modelski and Thompson's
(Werner. 1999). Separately, Pollins (1996) also shows that global economic cycles combined with parallel leadership cycles impact
the likelihood of conflict among major, medium and small powers, although he suggests that the causes and connections between
global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland's (1996, 2000) theory of
interdependent states are likely to gain pacific benefits from trade so long as they have an optimistic view of future trade relations.
if the expectations of future trade decline, particularly for difficult to replace items such
as energy resources, the likelihood for conflict increases, as states will be inclined to use
force to gain access to those resources. Crises could potentially be the trigger for
decreased trade expectations either on its own or because it triggers protectionist moves by interdependent
states.4 Third, others have considered the link between economic decline and
external armed conflict at a national level. Blomberg and Hess (2002) find a
strong correlation between internal conflict and external conflict, particularly during
periods of economic downturn. They write: The linkages between internal and external conflict and prosperity are
However,
strong and mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn returns the favour. Moreover, the
economic scholarship positively correlates economic integration with an increase in the frequency of economic crises, whereas
the US Director of
National Intelligence has ranked cybercrime as the top national security threat,
higher than that of terrorism, espionage, and weapons of mass destruction .1
strategic assets and information. It is a threat that is nothing short of formidable. In fact,
Underscoring the threat, the FBI last year notified 3,000 US companiesranging from small banks, major defense
hackers engineered a new round of distributed denial of service (DDoS) attacks that can generate traffic rated at a
staggering 400 gigabits per second, the most powerful DDoS assaults to date.
we write to comment on current discussions with respect to weakening standards, or altering commercial products
and services for intelligence, or law enforcement. Any policy that seeks to weaken technology sold on the
commercial market has many serious downsides, even if it temporarily advances the intelligence and law
we define and
address the risks of installing backdoors in commercial products, introducing
malware and spyware into products, and weaken ing standards. We illustrate that
these are practices that harm Americas cybersecurity posture and put the
resilience of American cyberinfrastructure at risk. We write as a technical society to
enforcement missions of facilitating legal and authorized government surveillance. Specifically,
clarify the potential harm should these strategies be adopted. Whether or not these strategies ever have been used
surveillance targets for U.S. intelligence agencies. It is the opinion of IEEE-USAs Committee on Communications
Policy that no entity should act to reduce the security of a product or service sold on the commercial market without
first conducting a careful and methodical risk assessment. A complete risk assessment would consider the interests
A
methodical risk assessment would give proper weight to the asymmetric nature of
cyberthreats, given that technology is equally advanced and ubiquitous in the United States, and the locales of
many of our adversaries. Vulnerable products should be corrected , as needed, based on this
of the large swath of users of the technology who are not the intended targets of government surveillance.
assessment. The next section briefly describes some of the government policies and technical strategies that might
have the undesired side effect of reducing security. The following section discusses why the effect of these practices
may be a decrease, not an increase, in security.
security of commercial products, either positively or negatively. There are a number of methods by
which a government might affect security negatively as a means of facilitating legal government surveillance. One
inexpensive method is to exploit pre-existing weaknesses that are already present in commercial software, while
keeping these weaknesses a secret. Another method is to motivate the designer of a computer or communications
system to make those systems easier for government agencies to access. Motivation may come from direct
mandate or financial incentives. There are many ways that a designer can facilitate government access once so
Two scenarios:
First is retaliation
Cyber-attacks wipe-out the US military---causes nuclear war
Robert Tilford 12, Graduate US Army Airborne School, Ft. Benning, Georgia,
Cyber attackers could shut down the electric grid for the entire east coast 2012,
http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-theelectric-grid-for-the-entire-east-coa
**we reject ableist and offensive language
a cyber attack that can take out a civilian power grid, for example could
cripple (destroy) the U.S. military. The senator notes that is that the same power grids
that supply cities and towns, stores and gas stations, cell towers and heart monitors also power
every military base in our country. Although bases would be prepared to weather a
short power outage with backup diesel generators, within hours, not days, fuel supplies would run out,
he said. Which means military command and control centers could go dark. Radar
systems that detect air threats to our country would shut Down completely. Communication
between commanders and their troops would also go silent. And many weapons systems
would be left without either fuel or electric power, said Senator Grassley. So in a few
short hours or days, the mightiest military in the world would be left scrambling to
maintain base functions, he said. We contacted the Pentagon and officials confirmed
the threat of a cyber attack is something very real. Top national security officials
To make matters worse
also
including the Chairman of the Joint Chiefs, the Director of the National Security Agency, the Secretary of Defense, and the CIA
have said, preventing a cyber attack and improving the nations electric grids is among the
most urgent priorities of our country (source: Congressional Record). So how serious is the Pentagon taking all this?
Enough to start, or end a war over it, for sure. A cyber attack today against the US could very well be
Director
seen as an Act of War and could be met with a full scale US military
response. That could include the use of nuclear weapons, if authorized by the President.
The cyber threat is real. America had better wake up to the need to defend the
cogwheels of our economy from the electronic reconnaissance attacking our
industrial control systems. Public opinion needs to be aroused by the media and
security officials into a threat that no one can see as it is invisible. It is not Soviet
missiles we fear, but inroads by nation states and criminal elements fronting for
them. Our cyber command capabilities are as crucial as our Special Forces in
beating back ISIS and other Islamic terrorists.
to the technology research firm Gartner Inc. (NYSE:IT), the industry is expected to grow 18.5 percent to $131 billion this year. By 2016, consumers will
Microsoft Corp. (NASDAQ:MSFT) just as Windows was taking off as the dominant operating system. Instead of having Microsoft as one of these leaders,
thered be a French company there, or German or Japanese company, he said. It would just be a loss to the economy and a loss to all the types of
product development and innovation weve seen overall. And in some ways, the extent to which the government is or isnt violating our privacy is beside
found a severed finger in a bowl of chili at a Wendys restaurant. Wendys Company (NASDAQ:WEN) later said that it lost $2.5 million in sales due to all the
bad publicity. It didnt matter that it didnt happen, Castro said. It was the visual. It was the image. Snooped Out Of Business In fact,
there is
evidence that Castros doomsday scenario is already starting to unfold . On Aug. 8, the private
email service Lavabit abruptly shut down. The service, which allowed subscribers to send encrypted email messages, was believed to have been used by
the NSA leaker Edward Snowden. Its shutdown was, presumably, the result of a legal skirmish in which the U.S. government attempted to force the
company to hand over private data about its users. In an interview with Democracy Now, Lavabits founder, Ladar Levison, said he is under a gag order,
and cannot share further details. On the Lavabit website, however, he was quite blunt about his feelings: This experience has taught me one very
important lesson: Without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a
company with physical ties to the United States. In other words, if you care about your privacy, forget U.S. tech companies. Go somewhere else. Its a
strong statement but one that didnt surprise Katherine Albrecht, a longtime privacy advocate and co-founder of StartMail, a private email service that is
currently in beta testing. I think this is a terrible thing, she told International Business Times. We have entrepreneurs creating viable and thriving
businesses who are being forced to shut down because of this climate were operating in. Ironically, Albrecht takes that position as someone who stands
to gain a competitive edge from the demise of U.S.-based cloud services. StartMail is owned by Surfboard Holding BV, a privately held company based in
the Netherlands, and Albrecht has long touted its overseas location as a selling point for privacy-conscious consumers. Long before Edward Snowden
became a household name, she and her StartMail colleagues set out to develop an encrypted email service that would be truly safe. But they understood
that it needed to be safe not just from the prying eyes of data-collecting behemoths like Google Inc. (NASADAQ:GOOG) and Yahoo Inc. (NASDAQ:YHOO),
but from the U.S. government, which, under the Patriot Act, can force American companies to hand over data. That said, it should come as no surprise that
Levisons decision to shutter Lavabit rather than compromise its users privacy has garnered praise from its marketplace competitors. I was truly grateful
to him for taking that position, Albrecht said, likening Levison to Snowden. Here is the second person now who has fallen on his sword, sacrificing himself
for the rest of us. And Levison and Snowden are not alone with their swords. Following Lavabits abrupt closure, Silent Circle, a rival company that offered
encrypted communications, made the drastic decision to preemptively shut down its own private email service. Speaking to the MIT Technology Review,
Mike Janke, the companys chief executive, admitted that email can never be truly private. Why? Because metadata -- information about when messages
are sent and where theyre sent to -- cant be encrypted. The basic mechanisms of the Internet prohibit it. Albrecht compares it to sending a piece of snail
mail thought the U.S. Postal Service, which operates under the basic premise that all mail must be properly labeled. I can have a sealed envelope and
encase it in lead and lock it up really tight, but somehow I have to tell the postman where its going, she said. Encrypted email works the same way.
Encryption only seals the contents. Backdoor Men The U.S. government has never been a fan of private encryption services. On its website, the research
group Electronic Privacy Information Center (EPIC) has cataloged more than two decades worth of efforts by the government to restrict and even ban
encryption. One report, dated May 1995, outlines an attempt by then-FBI Director Louis Freeh, who wanted to require companies to provide a trap door
that would allow the government to access private encrypted information if it needed to. The proposal was a response to the bombing of the federal
More recently, the FBI has been pushing for updates to the
Communications Assistance for Law Enforcement Act of 1994, or CALEA. The current
law requires telephone companies to make their lines accessible to interception by
the U.S. government. But if the FBI gets its way, that requirement will extend to electronic communications, and tech companies would
building in Oklahoma City.
then need to provide a backdoor that the government could access. It would essentially prevent services like what Lavabit was trying to provide from
existing in the United States, said Amie Stepanovich, an attorney with EPIC who specializes in privacy and domestic surveillance. So what exactly is the
governments beef with encryption? For one thing, private email services -- like Albrechts StartMail -- put users in control of their own passwords. That
means companies that offer such services couldnt access their users data even if they wanted to, which also means that if the FBI, NSA or any
government agency came knocking, there would be nothing for them to find. Were not law enforcement, said Albrecht. If they came and asked us for a
users password, wed say, you have to take it up with them. We dont have it. That is a far cry from services provided by companies such as Gmail. In a
Google court filing posted just this month by Consumer Watchdog, attorneys for the tech giant said Gmail users have no legitimate expectation of
privacy when they use the service, which automatically scans messages for the purpose of placing relevant ads. Google likened the practice to a
secretary screening a bosss snail mail before delivering it, an analogy that Albrecht doesnt buy. Ill tell you this, she said. If the secretary were opening
That the
FBI is looking to squelch private email services doesnt bode well for the alreadytarnished reputation of U.S. tech companies , which took much heat for reportedly complying with the Prism program
despite their denials to the contrary. European firms are seeing the scandal as an opportunity to gain
a competitive advantage, with hopes that such initiatives as Cloud Services Made In Germany and the Sovereign Cloud project in
it and photocopying it and sticking it in her briefcase and taking it home, Id have a real problem with that secretary. If Not Here, Where?
France could lure customers away from snooping U.S. spies. But Stepanovich said such ambitions may not be so easy to realize. You also have to ask
yourself if you trust [European] governments as well, she said. The U.K., for example, has been coming out against any revelations about their own
surveillance activities. Castro agrees, saying it will be an uphill climb for any one country to establish itself as being fundamentally different from the U.S.
in terms of national security and domestic surveillance. The question becomes: Will one country emerge as the digital Switzerland or the digital Cayman
Islands? he said. Will they set up a regulatory regime that is specifically intended to give their country a domestic advantage for cloud computing? But
just the possibility that the U.S. could lose its cloud-computing dominance should
concern lawmakers far more than it seems to be , Castro said. One reason he released the ITIF report on the
potential economic effects of Prism was to spark a conversation that he believed not enough people are having. (He said President Obama fell short during
a recent speech in which he vowed surveillance reform.) Sure, weve heard plenty about privacy, our civil rights and debates over the Fourth Amendment.
that Snowden leaked to the Washington Post. According to one of those slides, operating costs for the Prism program are just $20 million a year.
There is no doubt that economics alone will not determine the balance of global
power, but there is no doubt either that economics has come to matter for
more.The management of the economy, and of the treasury, has been a vital
late 19th century Americas emergence as a regional power saw it launch its first overseas war of conquest towards Spain. By the
turn of the 20th century, accompanying the increase in US power and waning of British power, the American Navy had begun to
challenge the notion that Britain rules the waves. Such a notion would eventually see the US attain the status of sole guardians of
the Western Hemispheres security to become the order-creating Leviathan shaping the international system with democracy and
rule of law. Defining this US-centred system are three key characteristics: enforcement of property rights, constraints on the actions
of powerful individuals and groups and some degree of equal opportunities for broad segments of society.
As a result of
such political stability, free markets, liberal trade and flexible financial mechanisms
have appeared. And, with this, many countries have sought opportunities to enter
this system, proliferating stable and cooperative relations. However, what will happen to these
advances as Americas influence declines? Given that Americas authority, although sullied at times, has benefited people across
much of Latin America, Central and Eastern Europe, the Balkans, as well as parts of Africa and, quite extensively, Asia, the answer to
the Japanese and Western European economies, with the US dollar also becoming less attractive. And, as American power eroded,
Solvency
Prohibiting the use and mandate of backdoors by the US solves
security for the government and privacy for individuals
Wyden 15 [Ron Wyden, the senior United States Senator for Oregon, serving since 1996, and a member of
the Democratic Party. He previously served in the United States House of Representatives from 1981 to 1996. Stop
FBI Backdoors for Tech Products, http://readersupportednews.org/opinion2/277-75/27858-stop-fbi-backdoors-fortech-products, January 3rd, 2015//Rahul]
Hardly a week goes by without a new report of some massive data theft that has put
financial information, trade secrets or government records into the hands of computer hackers. The best
defense against these attacks is clear: strong data encryption and more secure
technology systems . The leaders of U.S. intelligence agencies hold a different view.
Most prominently, James Comey, the FBI director, is lobbying Congress to require that electronics
manufacturers create intentional security holes so-called back doors that would
enable the government to access data on every American's cellphone and computer, even if it is protected by
encryption. Unfortunately, there are no magic keys that can be used only by good guys for legitimate reasons.
There is only strong security or weak security . Americans are demanding strong security for their
personal data. Comey and others are suggesting that security features shouldn't be too strong, because this could
you going invest in locks and barbed wire? What these officials are proposing would be bad for personal data
security and bad for business and must be opposed by Congress. In Silicon Valley several weeks ago I convened a
roundtable of executives from America's most innovative tech companies. They made it clear that widespread
availability of data encryption technology is what consumers are demanding. Unfortunately, there are no magic
keys that can be used only by good guys for legitimate reasons. There is only strong security or weak security. It is
also good public policy. For years, officials of intelligence agencies like the NSA, as well as the Department of
Justice, made misleading and outright inaccurate statements to Congress about data surveillance programs not
once, but repeatedly for over a decade. These agencies spied on huge numbers of law-abiding Americans, and their
dragnet surveillance of Americans' data did not make our country safer. Most Americans accept that there are times
their government needs to rely on clandestine methods of intelligence gathering to protect national security and
ensure public safety. But they also expect government agencies and officials to operate within the boundaries of the
law, and they now know how egregiously intelligence agencies abused their trust.
also hurting U.S. technology companies' bottom line, particularly when trying to sell services and
devices in foreign markets. The president's own surveillance review group noted that
concern about U.S. surveillance policies can directly reduce the market share of
U.S. companies. One industry estimate suggests that lost market share will cost just the U.S. cloud
computing sector $21 billion to $35 billion over the next three years. Tech firms are now investing heavily in new
systems, including encryption, to protect consumers from cyber attacks and rebuild the trust of their customers. As
one participant at my roundtable put it, I'd be shocked if anyone in the industry takes the foot off the pedal in
terms of building security and encryption into their products. Was Apple's FairPlay worse for the record labels than
vulnerability. A report last year by a leading cyber security company identified more than 100 intrusions in U.S.
networks from a single cyber espionage unit in Shanghai. As another tech company leader told me, Why
would
we leave a back door lying around? Why indeed. The U.S. House of Representatives
accomplish the same goal, and will again at the start of the next session. Technology is a tool that can be put to
legitimate or illegitimate use. And advances in technology always pose a new challenge to law enforcement
agencies.
Wydens introduction of the the Secure Data Act, which would prohibit the government from
mandating that U.S. companies build backdoors in their products for the purpose of
surveillance. This legislation responds directly to recent comments by U.S. officials, most notably the Federal
Bureau of Investigation (FBI) Director James Comey, chastising Apple and Google for creating encrypted devices to
which law enforcement cannot gain access. Comey and others have argued that U.S. tech companies should design
a way for law enforcement officials to access consumer data stored on those devices. In this environment, the
Secure Data Act is a homerun for security and privacy and is a good step towards reasserting U.S. competitiveness
in building secure systems for a global market. By adopting its position on the issue the FBI is working against its
own goal of preventing cybercrime as well as broader government efforts to improve cybersecurity. Just a few years
Creating
backdoor access for law enforcement fundamentally weakens IT systems because it
creates a new pathway for malicious hackers, foreign governments, and other
unauthorized parties to gain illicit access. Requiring backdoors is a step backwards for companies
ago, the Bureau was counseling people to better encrypt their data to safeguard it from hackers.
actively working to eliminate security vulnerabilities in their products. In this way, security is a lot like a ship at sea,
The better
solution is to patch up all the holes in the system and work to prevent any new
ones. Rather than decreasing security to suit its appetite for surveillance, the FBI should recognize that better
the more holes you put in the systemgovernment mandated or notthe faster it will sink.
security is needed to bolster U.S. defenses against online threats. The Secure Data Act is an important step in that
because it will stop U.S. law enforcement agencies from requiring companies to
introduce vulnerabilities in their products. If this bill is enacted, law enforcement will be forced
to use other means to solve crimes, such as by using metadata from cellular providers, call records,
text messages, and even old-fashioned detective work. This will also allow U.S. tech companies, with
the help of law enforcement, to continue to strengthen their systems, better detect
intrusions, and identify emerging threats . Law enforcement, such as the recently announced U.S.
direction
Department of Justice Cybersecurity Unita unit designed solely to deter, investigate, and prosecute cyber
A change of
course is also necessary to restore the ability of U.S. tech companies to compete
globally, where mistrust has run rampant following the revelations of mass government surveillance. With the
criminals, should work in cooperation with the private sector to create a safer environment online.
113th Congress at an end, Wyden has promised to reintroduce the Data Secure Act again in the next Congress.
Congress should move expediently to advance Senator Wydens bill to promote security and privacy in U.S. devices
and software. Furthermore, as Congress marks up the legislation and considers amendments, it should restrict not
just government access to devices, but also government control of those devices. These efforts will move the efforts
of our law enforcement agencies away from creating cyber vulnerabilities and allow electronics manufacturers to
produce the most secure devices imaginable.