Cdl core Files 2015-2016 cdl core Files


AC- CISA DISADVANTAGE- Impact Turn Strategy



Download 1.69 Mb.
Page75/75
Date18.10.2016
Size1.69 Mb.
#2993
1   ...   67   68   69   70   71   72   73   74   75

2AC- CISA DISADVANTAGE- Impact Turn Strategy

  1. Non-unique- CISA will pass in the status quo- it has just enough votes


The Hill 2015- “GOP senator: Cyber bill has real shot in chamber” June 25, http://thehill.com/policy/cybersecurity/246111-gop-sen-leaders-still-want-to-move-cyber-bill

Sen. Deb Fischer (R-Neb.) expressed optimism Thursday about the chances of moving a stalled cybersecurity bill through the Senate. “The leader wants to be able to get a bill out,” Fischer said an event hosted by The Hill and sponsored by Visa, referring to Senate Majority Leader Mitch McConnell (R-Ky.). “I think he has the support of the majority of members in our conference and I would hope the American people would continue to push all members to say we need to get this done.” ADVERTISEMENT Cybersecurity is “at the forefront of discussions that we’ve had in leadership since the beginning of the session,” she added. In the wake of the recent blistering cyberattack on federal networks, the upper chamber tried to attach a major cyber bill — intended to bolster the public-private exchange of data on hackers — to a defense authorization measure. Democrats rebelled, angry they would not be able to offer privacy-enhancing amendments to the bill, known as the Cybersecurity Information Sharing Act (CISA). With the help of a few Republicans, they blocked the maneuver. Civil liberties advocates have argued CISA could shuttle sensitive data to the National Security Agency (NSA), empowering the spy agency weeks after Congress voted to rein in its authority. CISA’s prospects have been uncertain since. Senate leaders have indicated there is no set timeline to bring the measure up as a standalone bill. And House Homeland Security Committee Chairman Michael McCaul (R-Texas) said on Wednesday that the Senate bill in its current form would be a nonstarter in the House, which has already passed its two complementary companion bills. CISA supporters — including a bipartisan group of lawmakers, most industry groups and potentially the White House — believe the measure is necessary to better thwart cyberattackers. By knowing more about our enemies, we can better repel them, they reason. “If we don’t allow companies to be able to share information when they see something, the American people are not going to be protected,” Fischer said. The bill would also help in the wake of massive data breaches, such as the one that has felled the Office of Personnel Management (OPM), Fischer believes. If the public and private sector are swapping more data, both sides can know sooner exactly what has happened, she said. That “will get consumers more involved, I think, at an earlier time so that they know that their information has been compromised,” Fischer said.
  1. Extend the 1NC link evidence- the plan causes the passage of CISA

  2. That’s good- CISA is key to prevent a cyber attack


National Journal 2015-Here’s What Is in the Senate’s Cybersecurity Bill” http://www.nationaljournal.com/tech/here-s-what-is-in-the-senate-s-cybersecurity-bill-20150318, March 18

The Cybersecurity Information Sharing Act is intended to help forestall cyberattacks like the one that crippled Sony Pictures last year, but concerns about government surveillance prevented a similar measure from earning a vote on the Senate floor in the last Congress. The legislation creates a voluntary framework for the private sector to share more computer data with the government by offering companies expanded legal liability if they choose to participate.¶ "This legislation protects the privacy rights of Americans while also minimizing our vulnerability to cyber-attacks," Senate Intelligence Committee Chairman Richard Burr said in a statement Wednesday. "Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes."¶ ADVERTISEMENT ¶ Thanks to an extended spate of high-profile hacks, the bipartisan measure could earn an expedited review and land on the Senate floor as soon as April. In the House, Homeland Security Committee Chairman Michael McCaul signaled on Tuesday he plans to introduce his own information-sharing bill this week.¶ The White House has identified information-sharing as a key priority this year, although it has yet to say if it supports the current CISA language. President Obama issued a veto threat for a similar measure that passed the House a few years ago, partly because of privacy concerns.¶ "We are committed to working with Congress to craft legislation that reflects that balance, and can pass both houses," a senior administration official said in a statement. "In that spirit, we thank the committee for working with us to address some of the administration's most significant concerns with the committee's bill, and look forward to reviewing the legislation."¶ Among the nuanced changes, the latest iteration of CISA grants liability protection for companies that share information related to "defensive measures" used to fend off hacks, a term substituted for the more controversial "countermeasures." The bill further clarifies that "defensive measures" does not include data that "destroys, renders unusable, or substantially harms an information system."
  1. A cyber attack would cause a nuclear war


Tilford 2012 (Robert Tilford, Wichita Military Affairs Examiner, Former soldier US Army, infantry, July 27, 2012, Cyber attackers could shut down the electric grid for the entire east coast, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)

To make matters worse a cyber attack that can take out a civilian power grid, for example could also cripple the U.S. military.¶ The senator notes that is that the same power grids that supply cities and towns, stores and gas stations, cell towers and heart monitors also power “every military base in our country.”¶ “Although bases would be prepared to weather a short power outage with backup diesel generators, within hours, not days, fuel supplies would run out”, he said.¶ Which means military command and control centers could go dark.¶ Radar systems that detect air threats to our country would shut Down completely.¶ “Communication between commanders and their troops would also go silent. And many weapons systems would be left without either fuel or electric power”, said Senator Grassley.¶ “So in a few short hours or days, the mightiest military in the world would be left scrambling to maintain base functions”, he said.¶ We contacted the Pentagon and officials confirmed the threat of a cyber attack is something very real.¶ Top national security officials—including the Chairman of the Joint Chiefs, the Director of the National Security Agency, the Secretary of Defense, and the CIA Director— have said, “preventing a cyber attack and improving the nation’s electric grids is among the most urgent priorities of our country” (source: Congressional Record).¶ So how serious is the Pentagon taking all this?¶ Enough to start, or end a war over it, for sure. A cyber attack today against the US could very well be seen as an “Act of War” and could be met with a “full scale” US military response. That could include the use of “nuclear weapons”, if authorized by the President.



2AC- CISA DISADVANTAGE- Drone Affirmative- No Link/Link Turn

Congress is on board with armed drone surveillance- restriction unpopular- this prevents passage


Hill 2012 (Kashmir Hill, Forbes, “Congress Welcomes The Drones”, http://www.forbes.com/sites/kashmirhill/2012/02/07/congress-welcomes-the-drones/, February 7, 2012)

Congress Welcomes The Drones Congress says, 'Bring in the drones!' The Senate passed a $63 billion bill Monday to provide four years of funding for the Federal Aviation Administration. One of the provisions of the Reauthorization Act is that the FAA clear the path for wider spread use of drones (a.k.a. unmanned aircraft) for governmental and commercial purposes. Within 90 days, the FAA has to speed up the process by which government agencies and law enforcement can get permission to use drones, and by 2015, it has to start allowing commercial use of drones: The FAA is also required under the bill to provide military, commercial and privately-owned drones with expanded access to U.S. airspace currently reserved for manned aircraft by Sept. 30, 2015. That means permitting unmanned drones controlled by remote operators on the ground to fly in the same airspace as airliners, cargo planes, business jets and private aircraft. via Congress OKs FAA bill allowing drones in U.S., GPS air traffic control – chicagotribune.com. Currently, private use of drones is basically limited to hobbyists, and they have to keep the drones under 400 feet and within their line of sight. Once the FAA changes the rules, a company such as Google for example could finally buy drones and use them for mapping purposes. Yes, we may finally have Google Street Drone View. Currently, the FAA restricts drone use primarily to segregated blocks of military airspace, border patrols and about 300 public agencies and their private partners. Those public agencies are mainly restricted to flying small unmanned aircraft at low altitudes away from airports and urban centers. Within nine months of the bill’s passage, the FAA is required to submit a plan on how to safely provide drones with expanded access. via Congress OKs FAA bill allowing drones in U.S., GPS air traffic control – chicagotribune.com. Drones are already being used to patrol our borders (and occasionally to catch cattle rustlers), but their use beyond that is very limited. This Act will change that. “We are looking at border security using UAV (unmanned aerial vehicles) research, law enforcement, firefighting, just to name a few,” said Texas Senator Kay Bailey Hutchison. “There are going to be more and more uses for unmanned aerial vehicles to be able to do the surveillance and photographing that have taken helicopter pilots and small general aviation and even large aircraft to do in the past.”



Drone surveillance is popular with republicans- the plan is perceived as a loss


Jones 2013 (Trahern Jones, Cronkite Borderlands Initiative, “U.S. Set to Deploy More Drones Along U.S. Borders, Despite Concerns about Effectiveness and Cost”, http://cronkite.asu.edu/buffett/canada/drones.html

CORPUS CHRISTI, Texas — Despite critical reports saying that the use of drones to patrol the nation’s borders is inefficient and costly, the leading Congressional proposal for immigration reform would drastically expand their use. In fact, the compromise bill would have U.S. Customs and Border Protection, which currently has a fleet of 10 Predator drones, using the unmanned aircraft to patrol the southern border with Mexico 24 hours a day, seven days a week. An expanded drone program is also sure to draw the ire of privacy advocates who already worry that increasing use of unmanned aircraft will result in intrusive surveillance of U.S. citizens. The proposal for around-the-clock drone use flies in the face of recent reports from the Government Accountability Office and the Office of the Inspector General. In a 2012 report, the OIG estimated that the agency only used its current Predator fleet about 40 percent of time the time it had projected for use of the crafts. The same report criticized CBP for failing “to obtain reimbursement for missions flown on stakeholders’ behalf,” such as U.S. Border Patrol, local law enforcement or emergency organizations, like FEMA. Criticism of the program also came in 2012 GAO report that said drone program staff frequently had to be relocated from other regions to support Predator operations on the southwestern border. In spite of such measures, the report noted that air support requests were more often left unfulfilled in this high-priority region when compared to lower-priority areas like the Canadian border. Initiated in 2005 at a cost of nearly $18 million for each of the 10 drones and their support systems, the use of unmanned aircraft is a relatively new tool for the Custom and Border Protection’s Office of Air and Marine. While agency officials say that the program is useful in border surveillance, Predator aircraft cannot be launched on a 24/7 basis due to weather conditions and safety regulations. Unmanned aerial vehicles are usually restricted to regions and altitudes where other aircraft do not share the same airspace in order to prevent mid-air collisions. That’s why CBP’s Predator fleet almost always flies at night, further limiting potential operational hours. During an April visit to the National Air Security Operations Center in Corpus Christi, Texas, which controls Predator flights over the Rio Grande, Cronkite student reporters observed that high winds deterred launches for four days. A tire-puncturing device used by drug smugglers to evade Border Patrol agents. Known as 'caltrops,' such devices are made from steel nails welded together. Photo by Trahern W. Jones. SLIDESHOW: A tire-puncturing device used by drug smugglers to evade Border Patrol agents. Known as "caltrops," such devices are made from steel nails welded together. Photo by Trahern W. Jones A pilot for the program, who requested to be unnamed for security reasons, described some of the challenges the agency has had in learning the new systems. “We’re bringing our people up and getting more experience,” he said. “The technology changes; they can change the software. They can give us new payloads. Things come pretty fast in the unmanned aircraft world as opposed to the manned aviation world.” The drones fly for an average of seven to nine hours a mission, often covering many miles of uninhabited deserts, rivers and forests. CBP’s Predator aircraft are equipped with high-tech cameras and communications equipment to coordinate with Border Patrol and first responder agencies on the ground. Unlike the Predator program used in overseas military missions, CBP’s fleet does not carry weapons payloads. The aircraft often provide useful information for agents in complex situations or difficult-to-reach areas, according to Hector Black, border patrol associate Chief, and the agency’s liaison with CBP’s Office of Air and Marine at the Corpus Christi Predator Operations Center. “When we come across something, we’ll contact the guys on the ground,” Black said in a phone interview. “Rather than sending agents in their vehicle, where it may take an hour and a half or two hours to get out and look at these areas, we can cover it in five or ten minutes with this aircraft.” The camera equipment aboard CBP Predators is sophisticated enough, according to Black, that even from an altitude of many thousands of feet, “you can actually zoom in and get street names.” While the same camera equipment can be found on the agency’s manned aircraft, the Predator’s longer flying time allows for increased surveillance and more immediate responsiveness to situations on the ground, according to CBP officials. In attempting to measure the successes or failures of the program, Black cautioned that metrics like apprehensions, seizures or flight hours might not be appropriate. Predator missions are often used for intelligence-gathering purposes, alongside interceptions of illegal crossings. A more subtle measure of drones’ effectiveness is how they impact smuggling patterns in areas they patrol, Black said. “First we’ll see a spike in apprehensions in those zones, and then the spikes will start to show a direct downward trend,” he noted. Not everyone is convinced of their effectiveness, however. The perceived shortfalls noted by the GAO and OIG represent a systemic problem, according to Ed Herlik, a researcher with Market Info Group, an aviation and defense analysis firm. “They already don’t fly their Predators much at all,” Herlik said in a phone interview. “We ran the numbers. Part of the time there are no Predators in the air anywhere in the nation and most of the time there might be one.” “Now, of course they can launch two or three or five if they want to,” he added, “but they almost never do, just by running the averages from what they report from flight times.” The reason for the program’s existence in the first place may have had more to do with the politics of border security than actual need, according to Herlik. “The Predators were forced on them” he said. Herlik explained that such systems were adapted from their wartime purposes in Iraq and Afghanistan for domestic use. “Congress wanted Predators over the border, therefore it happened,” Herlik said. “The fact that they’re not tremendously useful is not helpful.”

Plan reignites turf battles about Congressional oversight- distracts from bill passage


Munoz, 2013 -- The Hill staff writer, covering Defense and National Security

[Carlo, "Turf battle builds quietly in Congress over control of armed drone program," The Hill, 4-9-13, thehill.com/homenews/administration/292501-turf-battle-builds-quietly-over-control-of-armed-drone-program-, accessed 5-23-13,]



The fight is a typical battle over who on Capitol Hill will retain power over the program, according to several analysts, who described it as predictable. ¶ “There is always going to be a turf battle” when dealing with congressional oversight, said Lawrence Korb, a former DOD official and defense analyst at the liberal-leaning Center for American Progress. ¶ But that battle could become particularly heated, given the high-profile nature of the drone program, which since the Sept. 11, 2001, attacks has become a huge factor in shaping counterterrorism policy, given its success, Korb said. ¶ For congressional panels, the fight over who will control the drone program will have a say in the relevancy of the two committees. ¶




Download 1.69 Mb.

Share with your friends:
1   ...   67   68   69   70   71   72   73   74   75




The database is protected by copyright ©ininet.org 2024
send message

    Main page