Tournament: Gsu | Round: 2 | Opponent: Wake Forest Cronin-Harris | Judge: Ryan
Advantage 1: International Law
Cyber tensions between the US and China are escalating rapidly. The brink is now.
Yi 13 Xiaoxiong Yi is the director of Marietta College's China Program. June 22, 2013 “The coming of China-U.S. cyber war” http://www.mariettatimes.com/page/content.detail/id/552547.html
The cyber warfare … dominate this planet for decades."
Even innocent data collection can be misinterpreted as an attack, only a matter of time
Williams 11 (Robert D. Williams, J.D. Harvard Law School… “(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action”… June 2011… The George Washington Law Review… LexisNexis… 8/1/13… RTV)
A cyber intrusion may … lose than any other nation. n129
Oversight solves escalation
Lin 10 “Offensive Cyber Operations and the Use of Force”; 4 J. Nat'l Sec. L. and Pol'y pg63 (2010) Lin, Herbert S. (chief scientist at the Computer Science and Telecommunications Board, National
Research Council of the National Academies)
If the United States launches … and intense time pressure.
Cyber espionage would be misread as an attack – US or China would respond with nukes
Clarke 13(Richard Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council's staff director for defense policy and arms control from 1993 to 2001…. “The perils of linking cyberwar to nuclear war”… 6/16/2013 … The Washington Post… LexisNexis Academic… 8/13/13… RTV)
"We will reduce the role of nuclear … nuclear launch, would also probably stall.
Title 50 framework clarifies Cyber ops and forces compliance with the LOAC
Williams 11
(Robert D. Williams, J.D. Harvard Law School… “(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action”… June 2011… The George Washington Law Review… LexisNexis… 8/1/13. AJM
Many of the same concerns … or military conditions abroad.
LOAC doesn’t cover cyber ops in the squo
Kodar 12 (Erki Kodar is a professor of law at the University of Tartu, and also the Director of the Legal Department of the Estonian Ministry… “APPLYING THE LAW OF ARMEDCONFLICT TO CYBER ATTACKS:FROM THE MARTENS CLAUSE TOADDITIONAL PROTOCOL I”… http://www.ksk.edu.ee/wp-content/uploads/2012/12/KVUOA_Toimetised_15_5_Kodar.pdf ... 9/1/13… RTV)
Applying LOAC norms to … attacker but the hard-drive would still exist unharmed in itsphysical state.
LOAC has worked, and is key to stop collapse of society
IOLD 12
(The International and Operational Law Department is part of the Library of Congress’s graduate studies program, specializing in the Law of Armed Conflict… 2012… “Law or Armed Conflict Deskbook”… The Judge Advocate General’s Legal Center and School… http://www.loc.gov/rr/frd/Military_Law/pdf/LOAC-Deskbook-2012.pdf ... 9/15/13… RTV)
Validity. Although critics of the regulation … rallying cry against difficult
odds.
The development of international law is based on modeling – comes before treaties and conventions
Brown and Poellet 12 (Colonel Gary Brown, JD Senior Legal Counsel for U.S. Cyber Command, Fort Meade, Maryland and Keira Pollet, JD and LLM Judge Advocate General and former Operations Law Attorney at US CYBERCOM, Strategic Studies Quarterly, Fall 2012, The Customary International Law of Cyberspace, Accessed 8/30/13) (www.au.af.mil/au/ssq/2012/fall/brown-poellet.pdf?) /ejc\
The first thing to know about international law … Court of Justice decision in which it was established.4
The US has the authority to establish precedent as a member of the U.N. Security Council
Melnitzky 12 (Alexander B. Melnitzky, Associate at The Serbagi Law Firm, P.C. Former Associate Editor of Cardozo Journal of International and Comparative Law. He earned his J.D. from Benjamin N. Cardozo School of Law at Yeshiva University and a B.A. in History from NYU.) /ejc\ (https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplayandcrawlid=1anddoctype=citeanddocid=20+Cardozo+J.+Int27l+26+Comp.+L.+537andsrctype=smiandsrcid=3B15andkey=e30e49aa22650c3c135d44854f)
A strict textualist may not be persuaded … prevent and deter cyber espionage.
De-militarizing cyber ops key to soft power
Belk and Noyes ‘12
(Robert (Naval aviator and Politico-Military Fellow, studying international and global affairs at the Harvard Kennedy School) and Matthew (studies international security policy and is a senior associate with the cybersecurity practice at Good Harbor Consulting), “On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy”, 3-20-12, Office of Naval Research, RSR)
Revised by JM
Over the past decade … affects American soft power.
Soft power prevents extinction, disease, climate change, terrorism and great power war
Joseph Nye 8 is professor of international relations at Harvard University, “American Power After the Financial Crises,” http://www.foresightproject.net/publications/articles/article.asp?p=3533, Date Accessed: 9-15-13 Revised by JM
Power always depends on context, … achieve its aims without the help of others.
Advantage 2: Turf War
Interagency turf wars have blocked reorganization of cyber policies
Biggs 12
(Zachary Fryer-Biggs is a Washington Staff Writer for DefenseSystems, a news source focusing on national security matters… 5/7/12… http://www.defensenews.com/article/20120507/DEFREG02/305070004 “Debate Slows New U.S. Cyber Rules” … 9/17/13)
Despite the ongoing concern … what is military and what is civilian.”
Interagency convergence disrupts the decision making process and kills response time to cyber attacks
Chesney 2012. “Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate” (Charles I. Francis Professor in Law, University of Texas School of Law) http://jnslp.com/wp- content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf
The first way in which … the CIA and the military.
Non-state actors are targeting the US now – these attacks risk nuclear meltdowns and stock market crashes
Sharp 2010. “National Leadership, Individual Responsibility: The Past, Present, and Future of Cybersecurity” (Walter Gary Sharp Sr. Senior Associate Deputy General Counsel for Intelligence, Office of the General Counsel, U.S. Department of Defense; Adjunct Professor of Law, Georgetown University Law Center) 4 J. Nat'l Security L. and Pol'y 13. AMon
The cyber threat to U.S. … already described in popular media.
Cyber attack shuts down the grid – Syria makes timeframe KEY
Dykes and Melton 13
(Aaron Dykes is a co-founder of TruthstreamMedia.com. As a writer, researcher and video producer who has worked on numerous documentaries and investigative reports, he uses history as a guide to decode current events, uncover obscure agendas and contrast them with the dignity afforded individuals as recognized in documents like the Bill of Rights” Big Sis Says Cyber Attack WILL Bring Down Power Grid: ‘When Not If’” – Quoting Homeland Security Chief Janet Napolitanbo. http://truthstreammedia.com/big-sis-says-cyber-attack-will-bring-down-power-grid-when-not-if/ 9/5 kjl)
Outgoing Homeland Security chief … Microwave Advanced Missile Project (CHAMP).
DoD bases are vulnerable to grid disruptions
Robitaille 12
(George, Department of Army Civilian, United States Army War College, “Small Modular Reactors: The Army’s Secure Source of Energy?” 21-03-2012, Strategy Research Project)
In recent years, the … natural gas fired power plants on the environment.
Grid failure shuts down US military operations
Paul Stockton 11, assistant secretary of defense for Homeland Defense and Americas’ Security Affairs, “Ten Years After 9/11: Challenges for the Decade to Come”, http://www.hsaj.org/?fullarticle=7.2.11
The cyber threat to the … never will – exercise control.
Global War
Frederick Kagan and Michael O’Hanlon 7, Fred’s a resident scholar at AEI, Michael is a senior fellow in foreign policy at Brookings, “The Case for Larger Ground Forces”, April, http://www.aei.org/files/2007/04/24/20070424_Kagan20070424.pdf
We live at a time when … it is also badly overdue.
Response time is key – a cyber attack could shut down the US economy
AAP 13 AAP (Australian Associated Press) 06/12/13, Cyber wars would cripple economies: experts, http://www.businessspectator.com.au/news/2013/6/12/global-news/cyber-wars-would-cripple-economies-experts, (08/13/13)#HBK
Cyber attackers have the … it's similar destruction."
Even the possibility of cyber-attack has the potential to shake business confidence and destroy the economy
Cornish 11 Paul Cornish(Professor of Strategic Studies at the University of Exeter. He was educated at the London School of Economics (MSc Econ, International Relations). He completed his PhD at the University of Cambridge, Lecturer in Defence Studies at the UK Defence Academy (King’s College London) and then Lecturer in International Security at the University of Cambridge, Cornish also spent several years as Director of the Centre for Defence Studies at King’s College London.) June 2011, The Velnerabilities of Developed States to Economic Cyber Warfare, http://www.chathamhouse.org/sites/default/files/0611wp_cornish.pdf, (p. 12) (08/13/13)#HBK
In a world of interconnected and interdependent … national economy depends.
US economic decline triggers global decline, that escalates to conflict
Tilford 2008 – PhD in history from George Washington University, served for 32 years as a military officer and analyst with the Air Force and Army (Earl, “Critical mass: economic leadership or dictatorship”, Cedartown Standard, lexis)
Could it happen again? … to that point very quickly.
PLAN:
United States Congress should enact legislation requiring offensive cyber operations be funded, conducted, and/or directed pursuant to Title 50 United States Code § 413b.
Solvency
Prefer Covert Action Statute of Title 50, agencies are more careful with ops
Brecher 12 “Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations” by Aaron P. Brecher (J.D. Candidate, May 2013, University of Michigan Law School), December 2012 – Michigan Law Review VED
There are reasons beyond … to the congressional committees.
Clarifying cyber operations under covert action under a framework of congressional notification solves.
Chesney 12 Robert M. Chesney is an American lawyer and the Charles I. Francis Professor in Law at The University of Texas School of Law, where he serves as the Associate Dean for Academic Affairs and teaches courses relating to U.S. national security and constitutional law.1 Chesney addresses issues involving national security and law, including matters relating to military detention, the use of force, terrorism-related prosecutions, the role of the courts in national security affairs, and the relationship between military and intelligence community activities.2 He is a co-founder and contributor to the Lawfare Blog February 2012 “Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate” http://jnslp.com/wp-content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf date accessed 8-13-2013 NNF
Operations constituting “covert … significant operational domain.
Congressional oversight is key – but congress has to take the lead (on policymaking)
Dycus 10 J. Nat'l Sec. L. and Pol'y 4 pg155 (2010) Congress's Role in Cyber Warfare; Dycus, Stephen (Professor, Vermont Law School.)
Congress obviously cannot act … policy – particularly unwise.
In cyberspace, magnitude outweighs probability
Lin 12 (I/S: A Journal of Law and Policy for the Information Society – by Herbert Lin (Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.) VED
Section I pointed to influences … to reconstitute them quickly.