Tournament: GSU | Round: 1 | Opponent: na | Judge: na
CONTENTION 1 IS CYBER ATTACKS
First Scenario is the Grid
Gjelten 8/15/13 ~Tom, The Next Disaster Scenario Power Companies Are Preparing For, http://www.npr.org/blogs/alltechconsidered/2013/08/15/212079908/the-next-disaster-scenario-power-companies-are-preparing-for, nrb~
article cites Michael Assante – chief executive of the National Board of Information Security Examiners and an expert on grid security
In the 10 years since sagging power lines in Ohio sparked a blackout across much
AND
the power grid against a threat they had not actually experienced. Yet.
Krepinevich, PhD @ Harvard, 12 ~Andrew, PhD 26 MPA at Harvard, West Point graduate, served 25 years in the Army, worked in the DOD Office of Net Assessment for 3 defense secretaries, president of the Center for Strategic and Budgetary Assessments, http://www.csbaonline.org/publications/2012/08/cyber-warfare-a-nuclear-option/, pp 53-58, nrb~
The Power Grid A WORLD OF POWER DISRUPTIONS? Most Americans are used to the
AND
opportunities these efforts are likely to create for acts of cyber espionage.206
Andres 11 ~Richard B. – Professor of National Security Strategy at the National War College and a Senior Fellow and Energy and Environmental Security and Policy Chair in the Center for Strategic Research, Institute for National Strategic Studies, at the National Defense University, Hanna L. Breetz – Doctoral candidate in the Department of Political Science at The Massachusetts Institute of Technology, Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications, Strategic Forum, National Defense University, Institute for National Strategic Studies, February 2011, http://www.ndu.edu/press/lib/pdf/StrForum/SF-262.pdf~~
Grid Vulnerability. DOD is unable to provide its bases with electricity when the civilian
AND
however, may not share this fear or be deterred by this possibility.
Loudermilk 11 ~Micah, Research Associate for the Energy 26 Environmental Security Policy program with the Institute for National Strategic Studies at National Defense University, Small Nuclear Reactors: Enabling Energy Security for Warfighters, Small Wars Journal, March 27th 2011, http://smallwarsjournal.com/blog/small-nuclear-reactors-enabling-energy-security-for-warfighters~~
Especially on the domestic front, the need for energy security on military bases is
AND
blackout would impair the ability of troops to operate in forward operating areas.
US conventional war fighting is inevitable —- ineffectiveness leads to regional aggression and violent competition among major powers
Horowitz 9 ~Michael C. Horowitz and Dan A. Shalmon, Professor of Political Science @ University of Pennsylvania 26 Senior Analyst @ Lincoln Group, LLC. The Future of War and American Military Strategy, Orbis, Spring 2009~
It is important to recognize at the outset two key points about United States strategy
AND
in which any debate about defense strategy occurs. Pg. 307-308
Felzenberg 11 (*Alvin S. Felzenberg, Professorial Lecturer at The Elliott School of International Affairs at George Washington University, Presidential Historian and Adjunct Faculty Member at the Annenberg School for Communication at the University of Pennsylvania, former Fellow at the Institute of Politics at the John F. Kennedy School of Government at Harvard University, served as Principal Spokesman for the 9/11 Commission, holds a Ph.D. in Politics from Princeton University, Alexander B. Gray, Student at the Elliott School of International Affairs at George Washington University and the War Studies Department of King’s College, London, The New Isolationism, The National Review, January 3rd 2011, http://www.nationalreview.com/articles/print/256150)
Anything Reps. Ron Paul (R., Tex.) and Barney Frank (D
AND
American military presence on land, at sea, and in the air.
Chisholm 5 ~Paul K. Chisholm, foreign policy and international relations scholar based in Kenya, holds a University Degree in Sociology and Diploma in Human Resources, Terrorism, the Threat in Perspective and Great Power Conflict, Free World Syndicate, April, 2005, http://www.synd.org/opinion-columns-chisholm/terrorism.html~~
We’ve heard much about terrorism since the 9/11 attacks. It has become
AND
head off a full scale arms race and potential conflicts between nuclear parties.
Goldman 1/9/13 ~David, Hacker hits on U.S. power and nuclear targets spiked in 2012, http://money.cnn.com/2013/01/09/technology/security/infrastructure-cyberattacks/index.html, nrb~
America’s power, water, and nuclear systems are increasingly being targeted by cybercriminals seeking
AND
the quantity of attacks that matters. It’s the small handful that succeed.
Kesler 11 ~Brent, managing editor of Strategic Insights at Naval Postgraduate School, MA Middlebury in international policy 26 terrorism studies, The Vulnerability of Nuclear Facilities to Cyber Attack, Strategy Insights, Spring 2011, http://edocs.nps.edu/npspubs/institutional/newsletters/strategic20insight/2011/SI-v10-I1_Kesler.pdf, nrb~
The United States has 104 nuclear power plants generating 98,000 megawatts of electricity
AND
cyber attacks more precise, supplementing their methods with intelligence from other sources.
Lendman 11 ~Stephen, MBA @ Wharton, "Nuclear Meltdown in Japan," 3-13, http://www.thepeoplesvoice.org/TPV3/Voices.php/2011/03/13/nuclear-meltdown-in-japan~~
On March 12, Times writer Matthew Wald headlined, "Explosion Seen at Damaged
AND
, Canada, Mexico, Central America, and parts of South America.
USA TODAY 12/12/11 ~Editorial: Japan’s nuke meltdown shouldn’t close U.S. plants, http://usatoday30.usatoday.com/news/opinion/editorials/story/2011-12-12/Japan-Nuclear-Regulatory-Commission/51850082/1, nrbontha~
There’s never a shortage of things for Americans to worry about — housing foreclosures,
AND
reminder that, in nuclear power, there’s zero margin for major error.
Loudermilk 11 ~Micah J., Research Associate for the Energy 26 Environmental Security Policy program with the Institute for National Strategic Studies at National Defense University, Contracted through ASE Inc, Small Nuclear Reactors and US Energy Security: Concepts, Capabilities, and Costs, May 31st, http://www.ensec.org/index.php?option=com_content26view=article26id=314:small-nuclear-reactors-and-us-energy-security-concepts-capabilities-and-costs26catid=116:content041126Itemid=375~~
Nuclear vs. Alternatives: a realistic picture When discussing the energy security contributions offered
AND
US would benefit from diversification and expansion of the nation’s nuclear energy portfolio.
Banerjee 4/15/13 ~Neela, EPA: U.S. greenhouse gases drop 1.6 from 2010 to 2011, http://articles.latimes.com/2013/apr/15/news/la-pn-us-greenhouse-gases-decrease-20130415, nrb~
The Environmental Protection Agency says greenhouse gas emissions in the United States showed a 1
AND
the administration would have to take further steps to meet the 2020 goal.
Warming is real and anthropogenic
Prothero, prof of Geology, 12 ~Donald R. Prothero, Professor of Geology at Occidental College and Lecturer in Geobiology at the California Institute of Technology, 3-1-2012, "How We Know Global Warming is Real and Human Caused," Skeptic, 17.2, EBSCO~
How do we know that global warming is real and primarily human caused? There
AND
change when it threatens their survival. Neither can we as a society.
Bushnell 10 ~Dennis, chief scientist at the NASA Langley Research Center, MS in mechanical engineering, recipient of the Lawrence A. Sperry Award, AIAA Fluid and Plasma Dynamics Award, the AIAA Dryden Lectureship, and is the recipient of many NASA Medals for outstanding Scientific Achievement and Leadership.) "Conquering Climate Change," The Futurist, May-June, 2010~
During the Permian extinction, a number of chain reaction events, or "positive
AND
as the forecasts sound, they’re actually conservative. Pg. 7-8
Plan solves —- establishing prior notifications requirements gives the president political cover and legitimacy for launching more offensive cyber operations —- statutory restrictions are key
Brecher 12 ~Aaron P, J.D. Candidate (May 2013), recipient of Howard B. Coblentz award for outstanding contributions to the Michigan Law Review, University of Michigan Law School, Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations, December, 2012, Michigan Law Review, 111 Mich. L. Rev. 423~
I. The Covert Action and Military Regimes Explored
It is first useful to delineate the detailed statutory requirements for carrying out covert actions
AND
place substantive limits on the scope of hostilities and the initiation of conflicts.
And, the plan facilitates counterstrike operations and attacks that would bolster cyber deterrence
Kesan, prof of law, 12 ~Jay P. 26 Carol M., *Professor, H. Ross 26 Helen Workman Research Scholar, and Director of the Program in Intellectual Property 26 Technology Law, University of Illinois College of Law, Research Fellow, University of Illinois College of Law, Mitigative Counterstriking: Self-defense and deterrence in cyberspace, Spring, 2012, Harvard Journal of Law 26 Technology, 25 Harv. J. Law 26 Tec 415~
Ideas, computers, and intellectual property have become extremely important in the modern Information
AND
approaches in order to afford these private parties more protection against these threats.
Goldsmith, prof of law @ Harvard, 12 ~Jack, Henry L. Shattuck Professor @ Harvard Law School, where he teaches and writes about national security law, presidential power, cybersecurity, international law, internet law, foreign relations law, and conflict of laws, served as Assistant Attorney General, Office of Legal Counsel from 2003–2004, and Special Counsel to the Department of Defense from 2002–2003, member of the Hoover Institution Task Force on National Security and Law, 10/15, "The Significance of Panetta’s Cyber Speech and the Persistent Difficulty of Deterring Cyberattacks," Lawfare, http://www.lawfareblog.com/2012/10/the-significance-of-panettas-cyber-speech-and-the-persistent-difficulty-of-deterring-cyberattacks/~~
Secretary of Defense Leon Panetta’s speech last week on cyber is more significant than has
AND
reportedly inflicted "modest damage," do not by themselves belie this claim.)
Kramer 12 ~Franklin D. Kramer is a distinguished research fellow in the Center
AND
National Defense University., "Cyberpower and National Security", p. 318~
No cyber deterrence strategy can hope to be airtight to prevent all minor attacks.
AND
-preservation, nor because the logic of deterrence had lost its relevance.
Defensive measures against cyber attacks are ineffective and can’t solve
Krepinevich, PhD @ Harvard, 12 ~Andrew, PhD 26 MPA at Harvard, West Point graduate, served 25 years in the Army, worked in the DOD Office of Net Assessment for 3 defense secretaries, president of the Center for Strategic and Budgetary Assessments, http://www.csbaonline.org/publications/2012/08/cyber-warfare-a-nuclear-option/, pp 45-47, nrb~
As the cyber competition appears to favor the offense, and potentially by
AND
of yet no effective means to prevent such an attack from occurring.159