Tournament: UMKC | Round: 1 | Opponent: Mo State HR | Judge: Aaron Hardy
*1AC*
Advantage 1: Iran
Obama is ramping up the Bush era offensive cyber operations in the direction of Iran – attacks continue to ramp up towards Iran’s facilities to slow their advancement towards nuclear power.
Sanger 2013; David, June 1; “Obama Order Sped Up Wave of Cyberattacks Against Iran,” http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all; David E. Sanger is chief Washington correspondent of The New York Times. Mr. Sanger has reported from New York, Tokyo and Washington, covering a wide variety of issues surrounding foreign policy, globalization, nuclear proliferation and Asian affairs. Twice he has been a member of Times reporting teams that won the Pulitzer Prize.
WASHINGTON — From his first months in office, … with additional enrichment.
No chance of effectiveness – preemptive attacks result in backlash by both state-sponsored and private retaliatory cyber groups
Waterman 2013; Shaun, August 28; “Obama hits pause on U.S. action in face of crippling cyber strikes from Syria, Iran,” Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003.
Syria and its ally Iran …which they announce in advance.
Continued retaliation from Iran due to US cyber offense creates political posturing in US and Israel for calls to move beyond cyber-attacks, and escalate the brewing conflict.
Slavin and Healey 2013; Barabara Slavin and Jason Healey; Jason Healey is director of the Atlantic Council’s Cyber Statecraft Initiative. Barbara Slavin is a senior fellow at the Atlantic Council’s South Asia Center, a journalist, and author of a 2007 book on Iran entitled Bitter Friends, Bosom Enemies: Iran, the U.S. and the Twisted Path to Confrontation (St. Martin’s Press, 2007). “Iran: How a Third Tier Cyber Power Can Still Threaten the United States,” http://www.acus.org/images/publications/iran_third_tier_cyber_power.pdf
While the cyber …international cyber behavior.
Escalatory conflict with Iran draws in every major alliance – independently this causes nuclear war. Even if it doesn’t escalate guarantees US economic collapse
Kahlili, April 2013 Reza Kahlili, author of the award-winning book "A Time to Betray," served in CIA Directorate of Operations, as a spy in the Iranian Revolutionary Guard, counterterrorism expert; currently serves on the Task Force on National and Homeland Security, an advisory board to Congress and the advisory board of the Foundation for Democracy in Iran (FDI). He regularly appears in national and international media as an expert on Iran and counterterrorism in the Middle East. (Kahlili, Reza. N.p.. Web. 26 Aug 2013. http://mobile.wnd.com/2013/04/iran-warns-of-world-war-iii/.)
Iran ratcheted up its vitriol … work conducted deep within the mountain.
Collapse destabilizes the entire international system –
Burrows and Harris 9- Mathew J. Burrows is a counselor in the National Intelligence Council (NIC), the principal drafter of Global Trends 2025: A Transformed World, Jennifer Harris is a member of the NIC’s Long Range Analysis Unit, “Revisiting the Future: Geopolitical Effects of the Financial Crisis”, The Washington Quarterly, April, http://www.ciaonet.org/journals/twq/v32i2/f_0016178_13952.pdf
Increased Potential for Global Conflict Of course, … globalizing world turn negative.
Advantage 2: China
Preemptive cyber attack focus trades off with defensive efforts, undermines credibility, and encourages norms of attack that quickly escalate
Healey ’13 (Jason – director of the Cyber Statecraft Initiative of the Atlantic Council) “Obama's Cyberwarfare Strategy Will Backfire” http://www.usnews.com/opinion/blogs/world-report/2013/03/08/clandestine-american-strategy-on-cyberwarfare-will-backfire
America's generals … driving U.S. policy, sadly, to that very end.
US diplomatic efforts to curb Chinese aggression through preemptive policies fail – encourages escalatory cyber attacks by both
Gonzalves ’13 (Antone - journalist for more than 25 years, writing for security central) “Obama's preemptive cyber attack disclosure a warning to China” http://images.infoworld.com/d/security/obamas-preemptive-cyber-attack-disclosure-warning-china-212371?source=rss_security
The Obama administration’s …signal our disapproval, the PLA Daily may be right,” he said.
Multiple scenarios for conflict -
First, is Infrastructure
Low defensive measures means US would be ineffective in deterring escalation with China
Clarke and Knake ’10 (Richard - served in the White House for Presidents Ronald Reagan, George H. W. Bush, George W. Bush, and Bill Clinton, who appointed him as National Coordinator for Security, Infrastructure Protection, and Counterterrorism and Robert - international affairs fellow at the Council on Foreign Relations) “Cyber War The Next Threat to National Security and What to Do About It” http://indianstrategicknowledgeonline.com/web/Cyber20War20-20The20Next20Threat20to20National20Security20and20What20to20Do20About20It20(Richard20A20Clarke)20(2010).pdf
The results are revelatory. China has a … a look at how we might do that.
That means total war – Chinese attacks would devastate infrastructure and degrade the US engage in effective retaliatory attacks
Mazanec ‘9 (Brian - senior intelligence analyst at SRA International who has supported various agencies within the Intelligence Community, the Joint Staff, the Office of the Secretary of Defense, the Defense Threat Reduction Agency, and the Department of Homeland Security) “The Art of (Cyber) War” http://www.securityaffairs.org/issues/2009/16/mazanec.php
Total war The most severe … the U.S. through covert means.
Independently causes extinction
Kessler, 2009 (Ronald, chief Washington correspondent @ Newsmax, 9-9, p. http://www.newsmax.com/RonaldKessler/emp-attack/2009/09/09/id/334894)
In the ensuing chaos, … the electric power grid.”
Second is Conventional Deterrence –
Chinese cyber warfare targets military commands and undermine US conventional forces
Washington Times ’12 “Report: U.S. forces vulnerable to Chinese cyberattack” http://www.washingtontimes.com/news/2012/mar/8/report-us-forces-vulnerable-chinese-cyberattack/
In a future war with the … Chinese hackers, the report says.
Independently, that’s key to deter nuclear conflict and deescalate regional agression
Gerson 9 – Michael S. Gerson, Research analyst @ Center for Naval Analyses, a federally funded research center, where he focuses on deterrence, nuclear strategy, counterproliferation, and arms control, Autumn 2009, “Conventional Deterrence in the Second Nuclear Age,” Parameters
Conventional deterrence also … conventional aggression and coercion.
Plan Text
The United States congress should ban the authorization of preemptive strikes by the president.
Solvency
Must begin to develop a strict legal framework for presidential authority over cyber warfare – this determines international norms and checks expanding presidential authority over warfare
Huston ’11 (Warner –journalist and opinion writer) “WE NEED RULES FOR CYBERWARFARE BEFORE A PRESIDENT STEALS THAT POWER, TOO” http://www.conservativecrusader.com/articles/we-need-rules-for-cyberwarfare-before-a-president-steals-that-power-too
A recent New York Times article revealed that … the line should be drawn, even in cyberspace.
Clear declaratory policy solves – sends clear signal to government and private actors
Owens et al ’13 (William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences) “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities” http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf
A clear statement of policy in this area … spectrum of national interests.
Perceptual shift to defensive policies through declaratory policies deters attack
Clarke and Knake ’10 (Richard - served in the White House for Presidents Ronald Reagan, George H. W. Bush, George W. Bush, and Bill Clinton, who appointed him as National Coordinator for Security, Infrastructure Protection, and Counterterrorism and Robert - international affairs fellow at the Council on Foreign Relations) “Cyber War The Next Threat to National Security and What to Do About It” http://indianstrategicknowledgeonline.com/web/Cyber20War20-20The20Next20Threat20to20National20Security20and20What20to20Do20About20It20(Richard20A20Clarke)20(2010).pdf
Defending the U.S. from … another phrase from nuclear strategy, a “triad.”
Prefer aff cyber war scenarios —causes miscalculation and is faster then other war scenarios
Clarke 9 (Richard, special adviser to the president for cybersecurity in the George W. Bush administration. He is now chairman of Good Harbor Consulting "War from Cyberspace," The National Interest, December 22, http://nationalinterest.org/article/war-from-cyberspace-3278)
As in the 1960s, the speed of war is rapidly … re- spond with “kinetic activity.”
The US has to take the lead – we can shape norms in our favor.
Beidleman ‘9 (Scott, Lieutenant Colonel with the US Air Force, “Defining and Deterring Cyber War”, Strategic Research Project, 2009, RSR)
The U.S. is uniquely suited to lead … related to this new warfare.”121
Evaluating ontology requires a focus on state actions
Krolikowski 2008 (Alanna is a doctoral student in International Relations at the Department of Political Science of the University of Toronto. She completed an MA in International Relations at the Munk Centre for International Relations of the University of Toronto in August 2006; State Personhood in Ontological Security Theories of International Relations and Chinese Nationalism: A Sceptical View: http://www.utoronto.ca/ethnicstudies/Krolikowski_2008.pdf)
Thus, a different interpretation …examine the variation in this feature across actors.
Historical analysis supports our theory
Ye 2002 (Jiang, Visting Professor at College of International Relations, Ritsumeikan University, Japan, Professeor, Humanity College, Shanghai Normal University, China; Will China be a “Threat” to Its Neighbors and the World in the Twenty First Century?: http://www.ritsumei.ac.jp/acd/cg/ir/college/bulletin/e-vol1/1-4jiang.pdf)
According to those scholars, … status quo in the East Asia region.