Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1AC
FBI drug testing policy creates a private brain drain that undermines
cybersecurity.
Tracy 14 Sam Tracy, Activism Director for Tech Freedom, Former Board Member of the ACLU, M.A. in Sociology
and Political Science from the University of Connecticut, 2014 (The FBI Isn't Updating Its Drug-Related Hiring Policies,
But It Should Be, Huffington Post, May 27th, accessible online at http://www.huffingtonpost.com/sam-tracy/the-fbi-isntupdating-its_b_5394775.html, accessed on 7-6-15)
Last week, the Internet erupted in praise, skepticism, and played-out puns following reports that the FBI was
reconsidering its hiring restrictions on marijuana use. FBI Director James B. Comey
It
is certainly true that many talented young hackers use marijuana. 14 percent of
18-29 year olds told the latest Gallup poll they were current marijuana users, and 36 percent
reported trying it at some point in their lives -- and hackers are one of many subcultures well-known for their cannabis
use. The
already-nonsensical policy is all the more ridiculous when you consider our last three presidents -- each the ultimate head
of the FBI -- has admitted to past illegal drug use. If having used cocaine doesn't disqualify one from being Commander in
Chief, why should it take you out of the running to be an entry-level security analyst? The
policy change wouldn't just affect young hackers who use marijuana
recreationally. The FBI employs over 35,000 people, from hackers to secretaries
to spies to janitors. When a young hacker who enjoys marijuana is turned away from an FBI job for her pasttime, she can probably find a better-paying, drug-test-free job at Google, Microsoft, or one of the countless startups
hoping to be listed along with those giants one day. But a medical marijuana patient in one of the 21 states (and the
nation's capital) where it's legal may not have as many options, and current
many federal
Drug testing prevents the FBI from hiring vital cybersecurity experts
Mottl 14 (Judy, Tech Times, FBI: Finding cybersecurity gurus is tough as many are pot heads, May 21, 2014,
http://www.techtimes.com/articles/7352/20140521/feds-finding-cyber-security-gurus-tough-pot-heads.htm, JZG)
The FBI is mulling revamping its hiring rules regarding drug use, specifically
marijuana, as it's getting tough to hire on cybersecurity gurus given the potsmoking habit many seem to have these days. FBI Director James B. Comey said the federal
enforcement agency may have to change up its regulations regarding employee
drug rules to hire on needed IT talent in its quest to fight cybersecurity threats . The
FBI has the approval of Congress to add 2,000 staffers and most will be focused
on cybersecurity. But finding that many gurus who don't have a pot habit may be
tough, said Comey, during a conference Monday in New York. "I have to hire a great work force to
compete with those cyber criminals and some of those kids want to smoke weed
on the way to the interview," Comey said. Right now the FBI can't hire anyone who may
be users of marijuana but Comey said publicly that those who do have a habit and are cybersecurity experts
should apply for a job if interested.
Over the course of the last year, a host of cyberattacks have been
perpetrated on a number of high profile American companies. In
January 2014, Target announced that hackers, using malware, had
digitally impersonated one of the retail giants contractors, stealing
vast amounts of dataincluding the names, mailing addresses, phone numbers or email
1
addresses for up to 70 million individuals and the credit card information of 40 million shoppers. 4
10
12
13
15
16
17
19
20
21
22
23
25
26
could fake or actually cause one nuclear-armed state to attack another, thus
provoking a nuclear response from another nuclear power. This may be an easier
alternative for terrorist groups than building or acquiring a nuclear weapon or dirty bomb themselves. This would also act
as a force equaliser, and provide terrorists with the asymmetric benefits of high speed, removal of geographical distance,
and a relatively low cost. Continuing difficulties in developing computer tracking technologies which could trace the
identity of intruders, and difficulties in establishing an internationally agreed upon legal framework to guide responses to
computer network operations, point towards an inherent weakness in using computer networks to manage nuclear
weaponry. This is particularly relevant to reducing the hair trigger posture of existing nuclear arsenals. All computers
on removable data storage between the open and closed network. Information
reveal how to access these closed networks directly. Efforts by militaries to place increasing
capability, enables multiple entry points for terrorists. For example, if a terrestrial command
centre is impenetrable, perhaps isolating one nuclear armed submarine would prove an easier task. There
is
evidence to suggest multiple attempts have been made by hackers to compromise the
extremely low radio frequency once used by the US Navy to send nuclear launch approval to submerged submarines.
Additionally, the alleged Soviet system known as Perimetr was designed to automatically launch nuclear weapons if it was
unable to establish communications with Soviet leadership. This was intended as a retaliatory response in the event that
nuclear weapons had decapitated Soviet leadership; however it did not account for the possibility of cyber terrorists
blocking communications through computer network operations in an attempt to engage the system. Should a warhead be
launched, damage could be further enhanced through additional computer network operations. By using proxies, multilayered attacks could be engineered. Terrorists could remotely commandeer computers in China and use them to launch a
US nuclear attack against Russia. Thus Russia would believe it was under attack from the US and the US would believe
China was responsible. Further, emergency response communications could be disrupted, transportation could be shut
down, and disinformation, such as misdirection, could be planted, thereby hindering the disaster relief effort and
maximizing destruction. Disruptions
also be used to provoke uninformed responses. For example, a nuclear strike between India and
Pakistan could be coordinated with Distributed Denial of Service attacks against key networks, so they would have further
difficulty in identifying what happened and be forced to respond quickly. Terrorists could also knock out communications
between these states so they cannot discuss the situation. Alternatively, amidst
falsified in an attempt to instigate a hasty military response. These false claims could be posted
directly on Presidential, military, and government websites. E-mails could also be sent to the media and foreign
governments using the IP addresses and e-mail accounts of government officials .
terrorism could be
enough to launch nuclear weapons on its own, without the need for
compromising command and control centres directly.
scams, and other financial frauds perpetrated by organized crime groups who
cause billions of dollars in losses to companies and consumers. CIRFU logo Cyber
Takedowns The FBI has conducted a number of major cyber takedowns with the help
of the Cyber Initiative and Resource Fusion Unit (CIRFU)the cyber unit attached to the NCFTA. Here is a brief look
at a three of those cases: Dark Market: Fifty-six individuals were arrested worldwide and $70
million in potential loss was prevented. A CIRFU undercover agent posing as a
cyber crook infiltrated a criminal Internet forum at its highest level. More Coreflood:
Investigators disrupted an international cyber fraud operation by seizing the
servers that had infected as many as two million computers with malicious
software. More Trident Breach: This major bust targeted a theft ring that used a Trojan
horse virus to steal millions of dollars from victims bank accounts . More The
NCFTA essentially works as an early-warning system. If investigators for a major
banking institution, for example, notice a new kind of malware attacking their
network, they immediately pass that information to other NCFTA members.
Alliance membersmany have staff permanently located at the NCFTAthen develop strategies to
mitigate the threat. FBI agents and analysts from CIRFU, also located at NCFTA headquarters, use that
information to open or further existing FBI investigations, often in concert with law enforcement partners around the
world. Cyber crime has changed so much since those early days of spamming, Strom said. And the threat continues to
evolve globally, which is why the NCFTAs work is so critical to both business and law enforcement. The organization
draws its intelligence from hundreds of private-sector members, Carnegie Mellon Universitys Computer Emergency
Response Team (CERT), and the FBIs Internet Crime Complaint Center (IC3). That extensive knowledge base has helped
CIRFU play a key role in some of the FBIs most significant cyber cases in the past several years. (See sidebar.) Training is
another important role of the NCFTA. Last year, an international internship program was held in which cyber
investigators from Germany, Great Britain, Australia, the Netherlands, Lithuania, and the Ukraine came to the alliance
headquarters for 90 days to share knowledge, build relationships, and help with each others investigations. Working
with CIRFU and the NCFTA makes our cooperation very direct, said Mirko Manske, a cyber investigator for the German
Federal Criminal Police. We can work in real time, sharing information and moving our cases forward. That is one of the
biggest gains for us. Manske added, If I need a contact in the U.S., I reach out to CIRFU, and they help me immediately.
And we do the same for them. Basically we are opening doors for each other. When it comes to the global reach of cyber
crime, Manske said, The FBI gets it. They realize that no one organization can succeed by itself. CIRFU started all of this,
he added. The unit is one of the reasons the FBI is recognized as one of the worldwide leaders in the fight against cyber
crime.
resources below will introduce you to the more common forms of financial crimes, such as forgery, credit card fraud,
embezzlement and money laundering. Bribery Brief explanation of bribery, which is
The large spike in illicit outflows following the implementation of NAFTA would imply
that much of those outflows were indeed headed for the United States. This
suggests that U.S. policymakers have a significant role to play in
curtailing the flow of illicit money out of their southern neighbor. In addition to
the U.S., tax havens in the Caribbean and Europe were the second and third largest recipients of Mexican capital
outflows. Drug Cartels and National Security Risk A
such, the organization believes that this has serious implications for national
security. "The ease with which money can be laundered across the U.S.-Mexico
border via trade mispricing poses a major national security risk to both the
United States and Mexico," said Mr. Baker. "Drug traffickers, like kleptocrats, terrorists and
tax dodgers, all gain from anonymous shell companies, tax haven secrecy, and
nefarious trade mispricing tactics. Taking steps to address these issues would
curtail a number of societal ills."
The Norway-sponsored Task Force on the Development Impact of Illicit Financial Flows
(2008) has stressed the negative development impacts of IFF and particularly those
coming from natural resource sectors in developing countries . The Task Force observes that
IFF undermine health, development, and government legitimacy, while
increasing debt, aid dependence, and the risk of economic crises. Quantitative studies specifically
testing for these impacts are lacking, largely because of the relative novelty and persistent uncertainty of IFF data.
However, it is estimated that developing countries experienced approximately US$1.2 trillion in illicit flows during 2008,
10 times the amount of overseas development assistance provided by members of the OECD Development Assistance
Committee that year (Kar and Curcio 2011). A
conflict. Political science literature has contributed a moderate degree of attention to the impact of economic decline
and the security and defence behaviour of interdependent states. Research in this vein has been considered at systemic,
dyadic and national levels. Several notable contributions follow. First, on the systemic level, Pollins (2008) advances
Modelski and Thompson's (1996) work on leadership cycle theory, finding that rhythms
in the global
economy are associated with the rise and fall of a pre-eminent power and the
often bloody transition from one pre-eminent leader to the next. As such, exogenous
shocks such as economic crises could usher in a redistribution of relative power (see also
Gilpin. 1981) that leads to uncertainty about power balances, increasing the risk of miscalculation
(Feaver, 1995). Alternatively, even a relatively certain redistribution of power could lead to
a permissive environment for conflict as a rising power may seek to challenge a declining power
(Werner. 1999). Separately, Pollins (1996) also shows that global economic cycles combined with
parallel leadership cycles impact the likelihood of conflict among major , medium and small
powers, although he suggests that the causes and connections between global economic conditions and security
conditions remain unknown. Second, on a dyadic level, Copeland's (1996, 2000) theory of trade expectations suggests that
the
tendency towards diversionary tactics are greater for democratic states than autocratic
states, due to the fact that democratic leaders are generally more susceptible to being removed from office due to lack of
domestic support. DeRouen (2000) has provided evidence showing that periods
of weak economic
performance in the United States, and thus weak Presidential popularity, are
statistically linked to an increase in the use of force. In summary, recent economic scholarship
positively correlates economic integration with an increase in the frequency of economic crises, whereas political
science scholarship links economic decline with external conflict at systemic,
dyadic and national levels.5 This implied connection between integration, crises and armed conflict has not
featured prominently in the economic-security debate and deserves more attention.
1AC Plan
The Federal Bureau of Investigation should cease drug testing
its job applicants for marijuana.
1AC Solvency
The plan solves now is key to amend the policy
Levinson 14
(Charles, reporter for the Wall Street Journal, Comey: FBI Grappling With Hiring
Policy Concerning Marijuana, Wall Street Journal, 5/20/14, http://blogs.wsj.com/law/2014/05/20/directorcomey-fbi-grappling-with-hiring-policy-concerning-marijuana/)//kjz
Monday was a big day for the nations cyber police. The Justice Department charged five Chinese military
officials with hacking, and brought charges against the creators of powerful hacking software. But FBI
Director James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals,
the organization may have to loosen up its no-tolerance policy for hiring those who like to smoke
Congress has authorized the FBI to add 2,000 personnel to its rolls this
year, and many of those new recruits will be assigned to tackle cyber crimes, a
growing priority for the agency. And thats a problem, Mr. Comey told the White Collar Crime
Institute, an annual conference held at the New York City Bar Association in Manhattan. A lot of the
nations top computer programmers and hacking gurus are also fond of
marijuana. I have to hire a great work force to compete with those cyber
criminals and some of those kids want to smoke weed on the way to the
interview, Mr. Comey said. Mr. Comey said that the agency was grappling with
the question right now of how to amend the agencys marijuana policie s, which
marijuana.
excludes from consideration anyone who has smoked marijuana in the previous three years, according to
the FBIs Web site. One conference goer asked Mr. Comey about a friend who had shied away from
applying because of the policy. He should go ahead and apply, despite the marijuana use, Mr. Comey
said.
The aff is unique Comeys dead set against hiring those who use
marijuana
Huffington Post 14 (written by Sam Tracy, civil rights activist focused on drug policy reform, technological
law, and criminal justice, The FBI Isn't Updating Its Drug-Related Hiring Policies, But It Should Be
http://www.huffingtonpost.com/sam-tracy/the-fbi-isnt-updating-its_b_5394775.html) aj
Last week, the Internet erupted in praise, skepticism, and played-out puns following reports that the FBI was
reconsidering its hiring restrictions on marijuana use. FBI Director James B. Comey
applicants can't have used marijuana within the past three years, any other illegal
drug in the past 10, or ever sold or transported any illegal drug.
People with high IQs are more likely to smoke marijuana and take other illegal
drugs, compared with those who score lower on intelligence tests , according to a new
study from the U.K. Its counterintuitive, says lead author James White of the Center for the Development and
Evaluation of Complex Interventions for Public Health Improvement at Cardiff University in Wales. Its not what we
thought we would find. The research was based on interviews with some 7,900 British people born in early April 1970.
Researchers measured the participants IQs at ages 5 and 10, then followed up with them at ages 16 and 30, asking about
symptoms of psychological distress and drug use as part of a larger survey. MORE: Are Stoners Really Dumb, or Do They
Just Think They Are? At
age 30, about 35% of men and 16% of women said they had
smoked marijuana at least once in the previous year ; over the same time period, 9% of men and
4% of women said they had taken cocaine. Previous-year drug users tended to have scored
higher on IQ tests than non-users. The IQ effect was larger in women: women in the top third of the IQ
range at age 5 were more than twice as likely to have taken marijuana or cocaine by age 30, compared with those scoring
in the bottom third. The men with the highest IQs were nearly 50% more likely to have taken amphetamines and 65%
more likely to have taken ecstasy, compared to those with lower scores. And
occasional drug use as particularly harmful, White says, both because there is little data to suggest
great risk of harm from such use and because evidence of harm is rare among their peers. With smoking, the evidence
[about its dangers] is overwhelming, says White, whereas when you look at things like cannabis use, since they are more
likely to associate with people who are similar to them, they are likely to see that smoking cannabis relatively infrequently
doesnt have huge impact. In contrast, drug
use remains independent of psychological distress, that cant be all thats going on. It rules out the argument that the only
reason people take illegal drugs is to self medicate, says White. The research was published in the Journal of
Epidemiology and Community Health.
General Case
Inherency
The government still enforces drug testing laws on federal employees
even in states where it is legal OPM statements
Veksler 15
(Marie, LEGAL CANNABIS OFF LIMITS TO FEDERAL EMPLOYEES, June 8, 2015, https://www.whaxy.com/news/canfederal-employees-use-marijuana, JZG)
The government issued a warning to federal employees that the use of legal
cannabis is not sanctioned activity under any circumstance. Regardless of
whether employees live in states where cannabis use has been legalized or not, in the eyes
of a federal employer, marijuana is still an illegal substance. The federal government issued a formal,
written guidance to all 4.1 million federal workers all across the globe to make its
warning loud and clear. The warning came straight from Katherine Archuleta, director of
the United States Office of Personnel Management (OPM). In the guidance, the fact that cannabis remains illegal under
federal law was clearly communicated. The plant is still classified as a Schedule I controlled
substance under the Controlled Substances Act. Any employee that knowingly or
intentionally engages in the possession of cannabis, regardless of intent is
breaking the law and the rules regarding their employment. Any employee caught
in possession of the plant is subject to be prosecuted , even in states where it has been legalized.
All federal employees are subject to a higher standard that supersedes recent legislative changes regarding marijuana,
according to the issued statement. Federal
a single use or
exposure to the substance can linger in the body in traceable amounts for several
weeks. This could be problematic for many federal workers who are required to
undergo routine drug testing.
Current drug policies are an impediment to hiring skilled hackers
Cherney 14 (MAX CHERNEY - San Francisco-based author who contributes to news items and feature stories to
Bay Area, national, and international publications in VICE, San Francisco Magazine, and The Economist, San Francisco
Examiner, SF Weekly, The Bold Italic, and San Francisco Appeal, IndieWire, Ghost write speeches and opinion pieces for
CEOs in the technology industry, Vice, The FBI Says It Can't Find Hackers to Hire Because They All Smoke Pot
http://motherboard.vice.com/read/the-fbi-cant-find-hackers-that-dont-smoke-pot) CW
Its no secret that the federal government is having a hard time hiring
cybersecurity experts, largely because many hackers can find more lucrative deals that don't involve working for
the feds. But there's another wrinkle: the FBI now says that its drug-testing policies are
keeping experts off the payroll. According to the Wall Street Journal, FBI Director James Comey said
that in order to pursue so-called cyber criminals, the government would pretty
much have to let government hackers get stonedbecause who's going to quit the
habit just to work for the FBI? I have to hire a great work force to compete with
those cyber criminals and some of those kids want to smoke weed on the way to
the interview, Comey said, clearly not pandering to stereotypes. The reason for the FBIs
unorthodox approach is that Congress has told the agency it needs to hire 2,000
more people this year, and many of those new recruits are going to fight
computer-related crime. And as it turns out, those that know computer crime best aren't often the Men's
Wearhouse set. The agency's current regs say that the lawmen wont hire someone who has smoked marijuana in the last
three years. (No word on dabs, edibles and other forms of marijuana consumption.) In theory, relaxing
hiring
restrictions for marijuana does make sense. Earlier this year, the feds admitted
that the government isnt very good at internet securitydespite the fact that the NSA is
basically a Philip K. Dick characters worst nightmare and that various agencies need to take a
long, hard look at hiring practices across the board. "[We have] the government hiring practices
of the 1940s and 50s in the 21st century," Gregory Wilshusen, director of information at the General Accountability Office,
told InformationWeek. Also, despite the federal governments mixed approach to marijuana enforcement, the majority of
Americans believe that its about time to legalize the drug, which remains classified as a Schedule I drug in the US, which
is reserved for the most dangerous and addictive intoxicants known to humanity. Regardless of the federal
governments stance, the FBI will apparently consider the issue, and is encouraging anyone who has recently got stoned to
apply for a job.
Comey was
"grappling" with lifting marijuana-use ban on hiring. The director's comments
come one day after five members of the Chinese military were indicted in the US
on allegations of hacking into major US corporations and stealing trade secrets "I
have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the
The FBI
seeks highly talented, technically trained individuals who are motivated by the
FBIs mission to protect our nation and the American people from the rapidly
digital forensics, and ethical hacking, according to a job posting issued recently which remains open until 20 January. That reveals the salary cyber special agents can expect is anywhere from $59,340 to $76,568.
t, said Robert Anderson Jr, executive assistant director for the Bureaus Criminal, Cyber, Response, and Services Branch. What we want are people who are going to come and be part
of a team that is working different very complex types of investigations and to utilize their skillsets in that team environment. He added that successful applicants would be integrated into the FBIs team of special agents, leading their own cases.
Anderson. Although the US government and its law enforcement agencies are increasingly reaching out to the broader cyber community to recruit
. Director James
even
. Some
The federal government faces a shortage of cyber security experts . Thats according to an
article published in FCW, a technology-focused publication. FCW interviewed federal officials
regarding the governments ability to effectively beef up its cyber security
program and found a unsettling trend: the government needs more tech experts .
In some cases, according to a Department of Defense official, the government hasnt even figured out what to hire for:
We dont have all the capacity and the right sets of skills that we need to do all
thats required. In the department we are still struggling to fully define and
empower the cyber workforce. Its a big challenge, just to define the techniques. In July, a State
Department official gave an estimate of the shortage to Reuters: The numbers Ive seen look like
shortages in the 20,000s to 40,000s for years to come. Why is there a shortage? According to
Cynthia Dion-Schwarz from the National Science Foundation, its a pipeline problem. In short, the government cant
find the people with the right skills sets to just have the entry-level skills needed in order to make progress in
cybersecurity, Schwarz told FCW. Others, like John Arguila,
Janet Napolitano,
the head of Homeland Security, said: There is a lack of expertise and there are a lot of
people clamoring for people who know the internet wellWe need analysts. We need people who are engineers . We
need people who are experienced in intelligence as it relates to the cybermonths, federal officials and cyber security experts have been warning about this. In April,
universe. Its not just federal officials who have connected the shortage to national security; Enrique Salem, an
executive at Symantec, a cyber security organization and software maker, told Reuters in June: What I would tell you is
its going to be a bigger issue from a national security perspective than people realize. Earlier this month, Leon
Panetta, the secretary of defense, said cyber security was at a pre-9/11 moment .
Cybersecurity is vulnerable now skilled government workers are
key
Booz Allen Hamilton 15 (Booz Allen Hamilton is a leading provider of management consulting,
technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major
corporations and not-for-profit organizations; April, 2015; Cyber Insecurity II Closing the Federal Talent Gap; 27;
http://ourpublicservice.org/publications/download.php?id=504)//CC
Internal Links
Weed-smoking hackers key to FBI cyber missions
The Wire 14 (Atlantic News reporting service, written by Connor Simpson, journalist for The Wire and Business
Insider, FBI Director: Don't Let Weed Stop You from Applying to the FBI,
http://www.thewire.com/national/2014/05/fbi-director-dont-let-weed-stop-you-from-applying-to-the-fbi/371279/) aj
Law enforcement agencies generally don't hire stoners and slackers. But
Comey's
comments clearly signal the FBI at least wants to move on from the
increasingly outdated anti-marijuana policy that is complicating its
efforts to fight cyber crime. Bongs are everywhere in the fictionalized hacker hangout on HBO's
Silicon Valley. Heck, two weeks ago police accidentally busted Erlich, one of the main characters, for his grow-op hidden
in their garage. Weed is baked into the tech culture at this point, and many
hasn't smoked in the last hour is hard enough. I have to hire a great work force to compete with
those cyber criminals and some of those kids want to smoke weed on the way to the interview, Comey told the conference
attendees. The
FBI could possibly amend those strict rules soon. Comey told the
conference the bureau is grappling with the question right now of how to
change the drug policy without scaring off the cream of the hacking
crop
Pre-plan drug testing policies turn away the most skilled workers- key
to prevent cyber attacks
Noble 15 (Danica, coordinator of the National Organization for the Reform of Marijuana Law (NORML) Women of
Washington. She lives in the Pacific Northwest where she practices competition law. You can find her TEDx on womens
role in ending prohibition here. Let Federal Employees Toke Up. Its Good for Everyone 7/9/15
http://www.wired.com/2015/07/let-federal-employees-toke-good-everyone/)lg
**edited for ableist language
MARIJUANA MAY BE legal in your state, but if you partake, you cant work for the government. Katherine Archuleta, the Executive Director of the Office of Personal Management, recently sent notice to the heads of every federal agency
announcing a policy under which any federal employee who uses marijuana, or even possesses it for a sick child off duty, is not suited to work for the federal government. This policy remains in place even if the employee resides in a state where
such use is legal under state law. The Office of Personnel Management, or OPM, is essentially the human resources department for the 4.1 million federal employees. Under the detailed guidance issued by Archuleta, even off-the-job, statesanctioned doctor-supervised marijuana use by federal employees adversely impacts the efficiency, credibility, and productivity of the federal government. The letter relied heavily on an executive order from 1986, signed by President Reagan,
calling for a Drug Free Federal Work Place. That executive orders number one concern: funding cartels. Hard to see the direct relevance to the state taxed and regulated systems at issue. The guidance from Archuleta was unusually detailed. It
explained disciplinary procedures and clearly declared that a federal employee is unfit for their job if they use marijuana for any reason, at any place, or at any time. The letter firmly plants the government on the wrong side of history. I myself am
lots of wonderfully
successful, productive, creative, responsible adults consume marijuana. Support
nationwide for medical use of marijuana regularly polls above 80 percent. It
turns out that the war on drugs, and its largest component, the prohibition of
marijuana, is really terrible for American families, communities, and democracy.
The U.S. spends $3.6 billion a year on marijuana prohibition and it has been a
total failure; over 40 years neither demand nor supply has been reduced. Instead,
success is measured by the number of people arrested, which is more than one
per minute, and more than all violent crimes combined. We spend far more
building prisons than schools and on prisoners than students.
the untenable federal
definition of marijuana as an exceptionally dangerous drug with no medical
value, has virtually eliminated opportunities for scientific research. We are left
without the information we need to make smart choices as citizens and
government
Marijuana prohibition is unquestionably
based in unscientific propaganda. So why, when the paradigm is clearly shifting,
spend so much effort to double down on policies that cannot be justified in
science, reason, or justice?
a federal employee of almost 10 years. Ive also been researching and advocating for reasonable marijuana policy since I was in law school. What Ive learned in that time is that
and the US holds 1 in 3 of the worlds incarcerated women. And while prohibition hasnt stopped anyone from using marijuananearly half of the country tries it
. In fact, scientists sometimes seem like the only ones who struggle to access pot.
I am all for improving the efficiency and reputation of the federal government. It would make my life easier! But shouldnt we look at actual productivity,
impairment, capabilities, and effort? OPMs approach is the equivalent to firing anyone who ever broke the law by exceeding the speed limit. Meanwhile, if you are wondering why OPM and Katherine Archuleta sounds familiar, maybe it is
because while she was busy digging up an outdated executive order from the failed drug war, hackers were steeling the social security, addresses, names, and 127 page security background checks for every single federal employee right under
Katherine Archuletas watch. In fact, the news reports keep getting worse. OPM was under the worst hack in history, it did not detect the breach and it affected every single federal employee and an additional 10 million people? Fail. There is a
FBI Director James Comey said that the OPM policy against
hiring anyone who has smoked marijuana in the last five years has
hindered our ability to prepare for cyber-attacks all the best
candidates are disqualified by this policy.
Gerry Connolly
offered an amendment that would require a congressional report on how
marijuanas status as a Schedule 1 drug is affecting our nations security,
specifically whether it disqualifies the most efficient, productive, and suitable
candidates.
. In the
face of
concerns and mainstream support for marijuana law reform across
the country
Archuleta spent resources calling for people, who are good at
their jobs, to be fired under the banner of the morally expired, criminal
marijuana prohibition. Archuleta perpetuated the injustice of the drug war
despite a conspicuous lack of any evidence to suggest that responsible, off-duty,
marijuana use negatively affects job performance.
Archuleta was too worried about what federal employees do in the privacy
of their own homes to realize that her flat-Earth priorities actually
contribute to our governments vulnerability to defend against data
breaches and deter cyber attacks. Is perpetuating marijuana prohibition
worth sacrificing national security? Of course not. When will the government
recover from reefer madness?
connection here. Last May,
. He said
of Virginia
As a Schedule 1 drug, marijuana is officially defined as having no medical uses, a high potential for abuse and being too dangerous for use even in a hospital under a doctors supervision
these recurring
, Katherine
good
At the same time, the countrys largest employer failed to notice it was the target of the largest
In general, we support
the use of market forces (and preexisting government programs) to address the
strong demand for cybersecurity professionals in the longer run. Increases in
educational opportunities and compensation packages will draw
more workers into the profession over time. Cybersecurity professionals take time to
reach their potential; drastic steps taken today to increase their quantity and
quality would not bear fruit for another five to ten years. By then, the current
concern over cybersecurity could easily abate, driven by new technology and more secure architectures. Pushing too
many people into the profession now could leave an overabundance of highly
trained and narrowly skilled individuals who could better be serving national
needs in other vocations.
of "cybersecurity professionals" to unearth skills differentiation as relevant to this study.
lots of wonderfully
successful, productive, creative, responsible adults consume marijuana. Support
nationwide for medical use of marijuana regularly polls above 80 percent. It
a federal employee of almost 10 years. Ive also been researching and advocating for reasonable marijuana policy since I was in law school. What Ive learned in that time is that
turns out that the war on drugs, and its largest component, the prohibition of
marijuana, is really terrible for American families, communities, and democracy.
The U.S. spends $3.6 billion a year on marijuana prohibition and it has been a
total failure; over 40 years neither demand nor supply has been reduced. Instead,
success is measured by the number of people arrested, which is more than one
per minute, and more than all violent crimes combined. We spend far more
building prisons than schools and on prisoners than students.
the untenable federal
definition of marijuana as an exceptionally dangerous drug with no medical
value, has virtually eliminated opportunities for scientific research. We are left
without the information we need to make smart choices as citizens and
government
Marijuana prohibition is unquestionably
based in unscientific propaganda. So why, when the paradigm is clearly shifting,
spend so much effort to double down on policies that cannot be justified in
science, reason, or justice?
Our prisons are bursting: 1 in 28 kids has a parent in jail
and the US holds 1 in 3 of the worlds incarcerated women. And while prohibition hasnt stopped anyone from using marijuananearly half of the country tries it
. In fact, scientists sometimes seem like the only ones who struggle to access pot.
I am all for improving the efficiency and reputation of the federal government. It would make my life easier! But shouldnt we look at actual productivity,
impairment, capabilities, and effort? OPMs approach is the equivalent to firing anyone who ever broke the law by exceeding the speed limit. Meanwhile, if you are wondering why OPM and Katherine Archuleta sounds familiar, maybe it is
because while she was busy digging up an outdated executive order from the failed drug war, hackers were steeling the social security, addresses, names, and 127 page security background checks for every single federal employee right under
Katherine Archuletas watch. In fact, the news reports keep getting worse. OPM was under the worst hack in history, it did not detect the breach and it affected every single federal employee and an additional 10 million people? Fail. There is a
FBI Director James Comey said that the OPM policy against
hiring anyone who has smoked marijuana in the last five years has
hindered our ability to prepare for cyber-attacks all the best
candidates are disqualified by this policy.
Gerry Connolly
offered an amendment that would require a congressional report on how
marijuanas status as a Schedule 1 drug is affecting our nations security,
specifically whether it disqualifies the most efficient, productive, and suitable
candidates.
. In the
face of
concerns and mainstream support for marijuana law reform across
the country
Archuleta spent resources calling for people, who are good at
their jobs, to be fired under the banner of the morally expired, criminal
marijuana prohibition. Archuleta perpetuated the injustice of the drug war
despite a conspicuous lack of any evidence to suggest that responsible, off-duty,
marijuana use negatively affects job performance.
Archuleta was too worried about what federal employees do in the privacy
of their own homes to realize that her flat-Earth priorities actually
contribute to our governments vulnerability to defend against data
breaches and deter cyber attacks. Is perpetuating marijuana prohibition
worth sacrificing national security? Of course not. When will the government
recover from reefer madness?
connection here. Last May,
. He said
of Virginia
As a Schedule 1 drug, marijuana is officially defined as having no medical uses, a high potential for abuse and being too dangerous for use even in a hospital under a doctors supervision
these recurring
, Katherine
good
At the same time, the countrys largest employer failed to notice it was the target of the largest
opinion columns from industry experts. FBI on the Hunt for Cyber Special Agents 1/2/15 http://www.infosecuritymagazine.com/news/fbi-on-the-hunt-for-cyber-special/)lg
The FBI has asked cyber security experts to consider a career as a special agent, in a recruitment drive designed to ensure the agency stays on top of evolving online threats. In a lengthy release on Monday, the Feds stated that potential candidates
must be between 23 ad 37-years-old, and will be required to pass a rigorous background check and fitness test. Some of the preferred backgrounds noted include computer programming and security, database administration, malware analysis,
The FBI
seeks highly talented, technically trained individuals who are motivated by the
FBIs mission to protect our nation and the American people from the rapidly
evolving cyber threa
digital forensics, and ethical hacking, according to a job posting issued recently which remains open until 20 January. That reveals the salary cyber special agents can expect is anywhere from $59,340 to $76,568.
t, said Robert Anderson Jr, executive assistant director for the Bureaus Criminal, Cyber, Response, and Services Branch. What we want are people who are going to come and be part
of a team that is working different very complex types of investigations and to utilize their skillsets in that team environment. He added that successful applicants would be integrated into the FBIs team of special agents, leading their own cases.
, said Anderson. Although the US government and its law enforcement agencies are increasingly reaching
metric
tons Thats Colorados annual demand for marijuana equal to 36.8 million eighths of
cannabis flower. Makes you wonder how many Coloradans use cannabis regularly 2. 485,000 Thats the number of
adults who are 21 and older using marijuana regularly (at least once a month), and its about 9
percent of the states population. And what about those using more often than that 3. 23 percent Thats the amount
of Colorados user population that consumes cannabis near daily . But what about the outof-state tourists visiting Colorado and purchasing legal weed 4. 90 percent Thats the amount of
recreational pot sales out-of-state tourists are responsible for at shops in
mountain resort communities. But how much of Colorados annual demand are these tourists actually
buying 5. 7 percent Thats the amount of Colorados annual pot demand purchased by
out-of-state tourists. But has Colorado pot gotten more or less expensive since the sales first began on Jan. 1
6. -9 percent Thats the price drop on a recreational eighth of marijuana flower at a dozen prominent Colorado pot shops
from January 2014 ($53.88) to December 2014 ($48.95). But how much did Colorado sell in recreational cannabis 7.
$246,810,599.03 Thats the states total recreational marijuana sales, as counted from January to October (November and
December data isnt yet available from the Colorado Department of Revenue). And what about total medical sales 8.
$326,716,273.59 Thats Colorados total medical marijuana sales, also from January to October. (Yep, thats
$573,526,872.62 in 10 months for both recreational and medical pot sales in Colorado.) And what are the majority of the
states medical marijuana patients claiming as their need for medicinal pot 9. 103,918 Thats the number
of
is the most
commonly used illicit drug in the United States (SAMHSA, 2014). Its use is widespread
among young people. According to a yearly survey of middle and high school students, rates
of marijuana use have steadied in the past few years after several years of
increase. However, the number of young people who believe marijuana use is risky is
decreasing (Johnston, 2014). Legalization of marijuana for medical use or adult
recreational use in a growing number of states may affect these views.
Cybersecurity Impacts
yes extinction
Extinction
Guterl 12 Guterl, executive editor Scientific American, 11/28/12 (Fred, Armageddon 2.0, Bulletin of the Atomic
Scientists)
The world lived for half a century with the constant specter of nuclear war and its
potentially devastating consequences. The end of the Cold War took the potency
out of this Armageddon scenario, yet the existential dangers have only
multiplied. Today the technologies that pose some of the biggest problems are not so much
military as commercial. They come from biology, energy production, and the information sciences
-- and are the very technologies that have fueled our prodigious growth as a species. They are far more
seductive than nuclear weapons, and more difficult to extricate ourselves from. The
technologies we worry about today form the basis of our global civilization and
are essential to our survival. The mistake many of us make about the darker aspects of our high-tech
civilization is in thinking that we have plenty of time to address them. We may, if we're lucky. But it's more likely that we
have less time than we think. There
begun to exert
control in virtually every sphere of our lives. Cars, for instance, can now take action to avoid
collisions. To do this, a car has to make decisions: When does it take control? How much braking power should be applied,
and to which wheels? And when should the car allow its reflex-challenged driver to regain control? Cars that drive
themselves, currently being field tested, could hit dealer showrooms in a few years. Autonomous
computers
can make our lives easier and safer, but they can also make them more dangerous. A case in point is
Stuxnet, the computer worm designed by the US and Israel to attack Iran's nuclear fuel program. It is a
watershed in the brief history of malware -- the Jason Bourne of computer code, designed for maximum autonomy
and effectiveness. Stuxnet's creators gave their program the best training possible: they stocked it with detailed technical
knowledge that would come in handy for whatever situation Stuxnet could conceivably encounter. Although the software
included rendezvous procedures and communication codes for reporting back to headquarters, Stuxnet
was built
to survive and carry out its mission even if it found itself cut off. The uranium
centrifuges that Stuxnet attacked are very similar in principle to the generators that
power the US electrical grid. Both are monitored and controlled by programmable-logic computer chips.
Stuxnet cleverly caused the uranium centrifuges to throw themselves off-balance, inflicting enough damage to set the
Iranian nuclear industry back by 18 months or more. A
economy would virtually cease, and if power failed over a large enough portion of the
country, simply trucking in supplies from elsewhere would not be adequate to cover the needs
of hundreds of millions of people. People would start to die by the thousands, then by the
tens of thousands, and eventually the millions. The loss of the power grid would put nuclear plants on
backup, but how many of those systems would fail, causing meltdowns , as we saw at Fukushima? The
loss in human life would quickly reach, and perhaps exceed, After eight to 10 days,
about 72 percent of all economic activity, as measured by GDP, would shut down, according to
an analysis by Scott Borg, a cybersecurity expert.
readers, commerce would immediately grind to a halt. My daughter, who lives here in the DC area,
lost power when the storm hit. They waited for a number of hours, and then they took all the food out of their freezer, they
gave away what they could, and they threw the rest away. And that was the way it was all over. Their power was out for
about a week, and it made it very difficult. They are fortunate enough to have a basement, and the heat wasnt oppressive
down there. Without
cyber attack that can take out a civilian power grid, for example could also
cripple the U.S. military. The senator notes that is that the same power grids that
supply cities and towns, stores and gas stations, cell towers and heart monitors
also power every military base in our country. Although bases would be
prepared to weather a short power outage with backup diesel generators, within hours, not
days, fuel supplies would run out, he said. Which means military command and
control centers could go dark. Radar systems that detect air threats to our
country would shut Down completely. Communication between commanders and their troops would
also go silent. And many weapons systems would be left without either fuel or electric power, said Senator Grassley. So
in a few short hours or days, the mightiest military in the world would be left
scrambling to maintain base functions, he said. We contacted the Pentagon and officials
confirmed the threat of a cyber attack is something very real. Top national
security officialsincluding the Chairman of the Joint Chiefs, the Director of the
National Security Agency, the Secretary of Defense, and the CIA Director have
said, preventing a cyber attack and improving the nations electric grids is among the most
urgent priorities of our country (source: Congressional Record). So how serious is the
Pentagon taking all this? Enough to start, or end a war over it, for sure (see
video: Pentagon declares war on cyber attacks http://www.youtube.com/watch?v=_kVQrp_D0kY&feature=relmfu ). A
cyber attack today against the US could very well be seen as an Act of War and could be
met with a full scale US military response. That could include the use of
nuclear weapons, if authorized by the President.
destroyed, or disrupted
communications could prevent top leaders from knowing that military
commanders perceived a situation to be far more desperate, and thus permissive
of nuclear initiative, than it really was. During the Cold War, for example, disrupted
communications between the US National Command Authority and ballistic
missile submarines, once the latter came under attack, could have resulted in a
joint decision by submarine officers to launch in the absence of contrary
instructions. Second, information warfare during a crisis will almost certainly increase
the time pressure under which political leaders operate. It may do this literally, or
it may affect the perceived timelines within which the policymaking process can make its decisions.
Once either side sees parts of its command, control, and communications (C3) system being
subverted by phony information or extraneous cyber noise, its sense of panic at the possible loss of military
options will be enormous. In the case of US Cold War nuclear war plans , for example,
disruption of even portions of the strategic C3 system could have prevented competent
execution of parts of the SIOP (the strategic nuclear war plan). The SIOP depended upon finely
orchestrated time-on-target estimates and precise damage expectancies against various classes of targets. Partially
misinformed or disinformed
attacks against the same target sets and, quite possibly, unplanned attacks on
friendly military or civilian installations. A third potentially disruptive effect of
infowar on nuclear crisis management is that it may reduce the search for available
alternatives to the few and desperate. Policymakers searching for escapes from
crisis denouements need flexible options and creative problem solving. Victims of
information warfare may have a diminished ability to solve problems routinely,
let alone creatively, once information networks are filled with flotsam and jetsam. Questions to operators will be
poorly posed, and responses (if available at all) will be driven toward the least common denominator of previously
programmed standard operating procedures. Retaliatory
systems that depend on launch-onwarning instead of survival after riding out an attack are especially vulnerable to reduced time
cycles and restricted alternatives: A well-designed warning system cannot save commanders from
misjudging the situation under the constraints of time and information imposed by a posture of launch on warning. Such a
posture truncates the decision process too early for iterative estimates to converge on reality. Rapid reaction is inherently
unstable because it cuts short the learning time needed to match perception with reality.20 The propensity to search for
the first available alternative that meets minimum satisfactory conditions of goal attainment is strong enough under
normal conditions in nonmilitary bureaucratic organizations. 21
Despite the best efforts of crisis participants, the dispute may degenerate into a
nuclear first use or first strike by one side and retaliation by the other . In that situation,
information operations by either, or both, sides might make it more difficult to
limit the war and bring it to a conclusion before catastrophic destruction and loss
of life had taken place. Although there are no such things as small nuclear wars, compared to conventional
wars, there can be different kinds of nuclear wars in terms of their proximate causes and consequences.24
there is
also the possibility of backsliding in political conditions, as between the United
States and Russia, or Russia and China, or China and India (among current nuclear weapons
states). Politically unthinkable conflicts of one decade have a way of evolving into
the politically unavoidable wars of anotherWorld War I is instructive in this
regard. The war between Russia and Georgia in August 2008 was a reminder that local
conflicts on regional fault lines between blocs or major powers have the potential
to expand into worse.
planners and fiction writers. In addition to the worlds worst characters engaged in nuclear threat of first use,
magnitude of the cyber problem, combined with declining budgets, will challenge the
nation for years to come," said Vago Muradian, the editor of Defense News. It's not the first
time cyber has ranked at or near the top of a list of security concerns. Seventy percent of
Americans called a cyberattack from another country a major threat in a Pew Research Center
survey released last month. Defense Department officials, for their part, have warned about the
increasing threat. FBI Director James Comey, Rand Beers, the then-acting secretary for
the Homeland Security Department, and Gen. Keith Alexander, director of the
National Security Agency, each voiced their concerns before Congress last year. And House
Intelligence Committee Chairman Mike Rogers, R-Mich., called it the "largest
national security threat to the face the U.S. that we are not even close to being prepared to
handle as a country."
of restraint in
cyber weapons might arguably affect (destabilize) pre-existing agreements that
constrain nuclear weapons deployment and possible use. The cyber superiority of the
United States, while legal and understandable, is now a cause of strategic instability between nuclear armed powers. This
is similar to the situation that persisted with nuclear weapons themselves until 1969 when the USSR first proposed an end
of the race for the technological frontier of potential planetary devastation. After achieving initial capability, the U.S.
nuclear missile build up was not a rational military response to each step increase in Soviet military capability. It was a
race for the technological frontier by both sides with insufficient recognition of the consequences. This conclusion was
borne out by a remarkable Top Secret study commissioned in 1974 by the U.S. Secretary of Defense, Dr James Schlesinger.
By the time it was completed and submitted in 1981, it assessed that the nuclear arms build-up by both sides was driven
not by a supposed tit for tat escalation in capability of deployed military systems but rather by an unconstrained race for
the technological limits of each sides military potential and by its own military doctrinal preferences. The decisions of
each side were not for the most part, according to this now declassified study, a direct response to particular systems that
the other side was building. In 1969, the USSR acted first to propose an end to the race for the technological frontier of
nuclear weapons because it knew it was losing the contest and because it knew there was political sentiment in the United
States and in its Allied countries that supported limitations on the unbridled nuclear fetish. As we ponder the American
cyber industrial complex of today, we see a similar constellation of opposition to its power emerging. This constellation
includes not just the political rivals who see they are losing in cyber space (China and Russia), but nervous allies who see
themselves as the likely biggest victims of the American race for cyber superiority, and loyal American military
commanders who can see the risks and dangers of that quest. It is time for the United States to take stock of the collateral
damage that its quest for cyber military power, including its understandable quest for intelligence superiority over the
terrorist enemy, has caused amongst its allies. The loss has not yet been seen at the high political level among allies, in
spite of several pro forma requests for information from countries such as Germany. The loss of U.S. credibility has
happened more at the popular level. Around the world, once loyal supporters of the United States in its war on terrorism
had a reasonable expectation to be treated as faithful allies. They had the expectation, perhaps nave, that privacy was a
value the Americans shared with them. They did not expect to be subject to such a crude distinction (you are all nonAmericans now). They did not want to know that their entire personal lives in cyber space are now recoverable should
someone so decide by the running of a bit of software in the NSA. After the Prism revelations, so many of these foreign
citizens with an internationalist persuasion and solidarity for the United States now feel a little betrayed. Yet, in the long
run, the most influential voice to end the American quest for cyber military superiority may come from its own armed
forces. There are military figures in the United States who have had responsibility for nuclear weapons command and
control systems and who, in private, counsel caution. They advocate the need to abandon the quest for cyber dominance
and pursue a strategy of mutual security in cyber space though that has yet to be defined. They
cite military exercises where the Blue team gets little or no warning of Red team disruptive cyber attack on systems that
might affect critical nuclear command and control or wider war mobilization functions . Strategic nuclear
stability may be at risk because of uncertainty about innovations in cyber attack capability. This question is worth much
more attention.
at: defenses
Defenses are insufficient
Pew 14 Pew Research Center, citing a slew of experts, October 29, 2014, Cyber Attacks Likely to Increase,
http://www.pewinternet.org/2014/10/29/cyber-attacks-likely-to-increase/
Yes respondents theme 2) Security is generally not the first concern in the design of Internet applications. It
seems
analysis has
found that these systems suffer from 25 different security vulnerabilities. Thats bad
enough, but then consider how human error and incompetence makes these
common systems even less secure. Many of the IT managers that use these
systems havent changed the manufacturer-installed security codes. As writers Indu B.
Singh and Joseph N. Pelton have pointed out in The Futurist magazine, that failure to take even the most
basic security precautions leaves these systems open to remote hacking. Stuart
Umpleby, a systems theory expert and professor at George Washington University wrote, In addition to cyber attacks
there are threats from individuals who have access (e.g., Manning, Snowden, Bernie Madoff, Steven Cohen). Digital
equipment is vulnerable to solar flares and EMP (electromagnetic pulse). There can be overlooked or underestimated
design flaws (e.g., the Y2K bug, Long Term Capital Management, financial derivatives, or the change in the Glass-Steagall
Act). Possible solutions: 1. Decentralization can stop cascade effects. However, decentralization plus connection can lead
to vulnerabilities since no one is in charge. 2. Oversight and regulation. However, technical regulation requires highly
skilled people and the private sector pays higher salaries. Firms also try to keep secrets. In finance the banks are now in a
position to write the rules that regulate them. Big banks are getting bigger. So far losses in the billions have been due to
financial and political design flaws more than technical design flaws. Elena Kvochko, manager for IT industry at an
international organization based in New York, noted, The
likely-to-increase/ Yes respondents theme 1) Internet-connected systems are inviting targets. The
Internet is a critical infrastructure for national defense activities, energy resources, banking/finance, transportation, and
essential daily-life pursuits for billions of people. The
is the battlefield
of now. Dont kid yourself. Battlefields in Sudan, Afghanistan, and Syria are real, but there is a new battlefield and
every day wars are won and lost between individuals, businesses, and countries. The Pentagon and Chinas military are
regularly engaged in digital spats. We really have no idea how deep this goes, but we are much closer to William Gibsons
vision in the seminal cyberpunk novel Neuromancer than any of us would like to admit. Herb Lin, chief scientist for the
Computer Science and Telecommunications Board at the National Research Council of the US National Academies of
Science, replied, More likely is cyber sabotage of individual enterprises. On a large scale, cyber
attacks may be
combined with kinetic attacks and the combination may cause large-scale
damage. Christian Huitema, a distinguished engineer with Microsoft, observed, We are already witnessing the theft
of trade secrets, with impact well worth tens of billions of dollars. We are also seeing active development of cyber weapons
by many world powers. Historically, such new weapons are always used at least once or twice before nations realize it is
too dangerous and start relying on diplomacy. Stewart Baker, a partner at Steptoe & Johnson, a Washington law firm,
wrote, Cyberwar
nuclear capabilities. Do
at: rid
Rid is wrong --- lack of bureaucratic friction increases the risk
Junio 13 (Tim, Cybersecurity predoctoral fellow at the Center for International Security and Cooperationat Stanford
University and PhD Candidate in Polisci @ UPenn and MA in IR from Johns Hopkins and develops new cyber capabilities
at the Defense Advanced Research Projects Agency, How Probable is Cyber War? Bringing IR Theory Back In to the
Cyber Conflict Debate 06 Feb 2013, Journal of Strategic Studies Volume 36, Issue 1, pages 125-133)
Two recent articles in the pages of this journal contribute to an important debate about how information technology (IT)
influences international politics.1 Thomas Rid and Adam Liff argue that cyber war has never happened and probably will
not happen. A fundamental problem with these articles is that Rid and Liff do not commit to a theoretical framework
regarding the causes of war. Doing so yields an opposite conclusion: international relations theory
identifies many mechanisms that may cause violent escalation with cyber weapons. This brief response
article explains why cyber war is sufficiently probable to merit serious attention from scholars and practitioners, and
proposes a theoretical research agenda. First, domestic political factors such as states' command and control over cyber
operations must be problematized. The principal-agent approach demonstrates how variation in incentives and
preferences may make militaries more likely to favor cyber attack than other kinds of bureaucracies. This matters in
societies with poor civilian control over the military. Second, the unique material qualities of IT must
be evaluated alongside traditional mechanisms that cause war. For instance, the attribution problem and computational
complexity in modeling cyber operations may increase the odds of inadvertent cyber war by causing states to retaliate
against the wrong targets or miscalculate the potential costs and gains of attacking. What is Cyber War? (Again) Rid and
Liff do not define cyber war the same way, and there is no disciplinary consensus. Rid, Liff, and this author at least agree
on the following: cyber war is a coercive act involving computer network attack. Network attack means information is
disrupted, degraded, or destroyed. Coercive means using force to change or preserve a political status quo. A point of
contention is lethality, which Rid believes is necessary for cyber war.2 This is an extreme and undesirable requirement,
particularly because (as Rid himself points out) non-lethal cyber attacks may be more costly than conventional warfare.3
It is important to note that Rid focuses on network attack, whereas Liff considers a broader conflict process. This response
addresses both. The central point of Rid's article is that it is difficult to cause lethal effects with cyber weapons, and that
politically motivated, instrumental cyber attack has never killed anyone.4 While the empirics of his article are sound he
describes recent cyber attacks accurately Rid never explains what causes war or makes war more or less likely. The
arguments in his article are exclusively definitional, and do not directly support his title's assertion that Cyber
War Will Not Take Place. Liff does better from a theoretical point of view; he links his article to the bargaining
approach to war.5 He does an excellent job of offering counterpoints to four arguments about why cyber attack may
increase the probability of war. However, Liff never establishes why his reasonable views are more plausible than their
alternatives. This is because he is not explicit about assumptions that are necessary for his arguments to hold, nor about
the circumstances under which those assumptions break down. For example, Liff argues that private information may
make war less likely because states poorly estimate the gains from cyber attack.6 Although Liff is right to point out that
ambiguity in cyber operations is important, he is wrong to assume the causal arrow points in one direction. Ambiguity can
make war more or less likely, because it may lead states to overestimate their potential gains, overestimate their stealth,
and/or underestimate their adversary's skill. Finally, it must be recognized that any future war is a low probability event.
Crafting claims that particular conflict scenarios are improbable is rather unimpressive; what is important to understand
is the potential cost and probability of cyber war relative to other kinds of conflict. Causes of Cyber War The noted
problems in the Rid and Liff articles could have been avoided by drawing on structured theoretical approaches that are
common to the study of the causes of all kinds of warfare. What would such an approach look like? This response lacks the
space to fully develop one, but recommends a way forward. Literally dozens of arguments have been advanced in the
political science discipline regarding the causes of war, and very many of these offer reasons to believe cyber war is
plausible or even probable.7 An approach, advanced in James Fearon's modern classic Rationalist Explanations for War,
is to list assumptions that create an ideal condition in which war should never happen.8 One way to structure scientific
inquiry regarding the probability of cyber war is to examine how the unique material qualities of IT affect each of the
assumptions. Table 1 offers a cursory version of such an analysis to identify priority areas for further study. Among a large
number of revealed paths to cyber war, one principal-agent problems involving the bureaucracies that conduct cyber
operations is detailed here to demonstrate the plausibility of specific mechanisms and what follow-on empirical work
should look like. Principal-Agent Problems Rid and Liff appear to assume that states are unitary rational actors (URAs),
and do not explain the domestic political processes whereby states make foreign policy choices. Empirically and
theoretically, it
is important to relax the URA assumption and problematize who has formal
and actual release authority over cyber weapons. The principal-agent approach, for instance, works
from the premise that individuals and organizations often vary in their incentives and preferences, which could make war
beneficial for some at the cost of others.9 This and related thinking inform how scholars study other military technologies,
such as nuclear weapons. Scott Sagan points out that although unauthorized nuclear war is improbable, it is sufficiently
probable that people should worry a great deal about command and control (C2) issues.10 Many anecdotes echo Sagan's
work. For example, a Russian general was asked during the Cold War about his backup plan in the event he could not open
the safe containing his nuclear launch codes. His answer was that he would bash the safe open with a sledgehammer he
kept nearby!11 Consideration of how bureaucracies do what they do like keeping emergency nuclear war sledgehammers
is of critical importance to the cyber C2 question. Although controlling large organizations is a core function of
militaries, the conduct of cyber operations is different from other kinds of activity in a way that greatly magnifies the
strategic corporal problem. This is because constant cyber operations other than war decrease the bureaucratic friction
that normally alerts superiors to aberrant behavior. In the case of nuclear weapons, a long chain of events is
required before unauthorized activities occur. Someone probably would notice a crazed general using his
sledgehammer on the launch codes safe, turning keys, fueling missiles, and so on. In contrast, it is a core function of cyber
bureaucrats to access adversary networks constantly, and to develop push-button solutions to minimize lags during war.
Furthermore, if the perception that cyber weapons are non-lethal comes to be widely perceived (as Rid would prefer), it is
reasonable to conclude that the threshold for their use will be lower than other kinds of weapons even if the cost of cyber
attacks is greater.
the security sector often involve somewhat overlapping responsibilities, and can be broad or specialized depending on the
size and special needs of the organization. Typical
and assesses
vulnerabilities in the infrastructure (software, hardware, networks), investigates available
tools and countermeasures to remedy the detected vulnerabilities, and
recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure
as a result of security incidents, examines available recovery tools and processes, and
recommends solutions. Tests for compliance with security policies and procedures.
May assist in the creation, implementation, and/or management of security solutions. Security Engineer:
Performs security monitoring, security and data/logs analysis, and forensic
analysis, to detect security incidents, and mounts incident response. Investigates
and utilizes new technologies and processes to enhance security capabilities and
implement improvements Security Architect: Designs a security system or major
components of a security system, and may head a security design team building a
new security system. Security Administrator: Installs and manages organization-wide
security systems. May also take on some of the tasks of a security analyst in
smaller organizations. Security Software Developer: Develops security software, including
tools for monitoring, traffic analysis, intrusion detection, virus/spyware/malware
detection, anti-virus software, and so on. Also integrates/implements security
into applications software. Cryptographer/Cryptologist: Uses encryption to secure
information or to build security software. Also works as researcher to develop
stronger encryption algorithms. Cryptanalyst: Analyzes encrypted information to
break the code/cipher or to determine the purpose of malicious software . Chief
Information Security Officer: a high-level management position responsible for the entire
information security division/staff. The position may include hands-on technical
work. Security Consultant/Specialist: Broad titles that encompass any one or all of the other
roles/titles, tasked with protecting computers, networks, software, data, and/or
information systems against viruses, worms, spyware, malware, intrusion
detection, unauthorized access, denial-of-service attacks, and an ever increasing
list of attacks by hackers acting as individuals or as part of organized crime or
foreign governments. Very Specialized Roles: Intrusion Detection Specialist: Monitors networks,
computers, and applications in large organizations, looking for events and traffic
indicators that signal intrusion. Determines the damage caused by detected
Africa
IFFs cripple relief efforts in Africa breeding political and economic
instability in the region
Kar et al 10 [DevKar; Lead Economist at Global Financial Integrity, Former Economist at IMF
(Dev, Global Financial Integrity, Illicit Financial Flows from Africa: Hidden Resource for Development, January 2010,
http://www.gfintegrity.org/content/view/300/154/]
The enormity of such a huge outflow of illicit capital explains why donor-driven
efforts to spur economicdevelopment and reduce poverty have been underachieving in
Africa. Policy measures must be taken to addressthe factors underlying illicit
outflows and also to impress upon the G-20 the need for better transparency
andtighter oversight of international banks and offshore financial centers that absorb these
flows.Research at Global Financial Integrity shows that the massive outflows of
illicitcapital are not just dueto suboptimal policiesin individual developing
countries butratherthatsuch policies find synergy in deep flawswithin the global
financial system. Take for example a simple indicator of aid effectiveness. According to recent studies by GFI and
other researchers, developing countries lose at least $10 through illegal flight capital for every $1 they receive in external
assistance. The comparable ratios for African countries are misleadingly low not only because of data deficiencies but also
due to the fact that they receive a disproportional share of development assistance provided to developing countries.So
long as illicit capital continues to hemorrhage out of poor African countries over
the long term at a rapidpace, efforts to reduce poverty and boost economic
growth will be thwarted as income distribution becomes evermoreskewed
leading to economic and political instability.The current global financial crisis,
which has generated a world-wide public backlash against the lack
oftransparency and excesses of financial institutions, offers both African and rich
donor countries an historicopportunity to address the problem of illicit flows and
absorption of such flows in the worlds shadow financial system. The existing global financial system shaped by
liberalization and deregulation of financial markets have instead ended up generating ever-rising illicit flows and loss in
government revenues. As several researchers have noted, economic
economic
policies also need to be complemented by strengthened institutions, the rule of
law, and better governanceif policymakers areto curtail illicit financial flows on a lasting basis.
Africa instability coming now, escalates to war
MACP 12
Military Fusion Centre, "Al Qaeda and the African Arc of Instability," and CNA Strategic Studies, "Security Challenges in Libya and the Sahel" also cite or link to
evidence of ties to al-Qaeda groups by members from the Polisario-run refugee camps near Tindouf, Algeria. The CNA Strategic Studies report, by Sarah Vogler,
the situation in Mali remains a veritable powder keg." Regionally, the Mali crisis and flood of arms
from Libya has fed the formation of "a network of jihadists from Africa to Asia," and relocation of Al-Qaeda's
"center of gravity" to North Africa, extending an "Arc of Instability" across the region . Locally, the report warns
"the infiltration by AQIM and the political destabilization of the country pose an acute threat to Mali's
neighbors." Of particular concern "is evidence that AQIM has infiltrated the Sahrawi refugee camps in Tindouf, Algeria, as well as indications that
says "
Sahrawi from the camps have joined terrorist groups based in Mali." This poses "immediate concerns for the security of Western Sahara, Mauritania, Morocco, and
US Secretary of State Condoleezza Rice introduced a new venue for her superficial and destructive stewardship of US foreign policy during her lightning visit to the
and Kenya. Eritrea, which gained independence from Ethiopia in 1993 after a 30-year civil war, is a major source of regional conflict. Eritrea has a nagging border
dispute with Ethiopia which could easily ignite. The two countries fought a bloody border war from 1998-2000 over control of the town of Badme. Although a UN
mandated body determined in 2002 that the disputed town belonged to Eritrea, Ethiopia has rejected the finding and so the conflict festers.Eritrea also fights a
proxy war against Ethiopia in Somalia and in Ethiopia's rebellious Ogaden region. In Somalia, Eritrea is the primary sponsor of the al-Qaida-linked Islamic Courts
Union which took control of Somalia in June, 2006. In November 2006, the ICU government declared jihad against Ethiopia and Kenya. Backed by the US,
Ethiopia invaded Somalia last December to restore the recognized Transitional Federal Government to power which the ICU had deposed.Although the Ethiopian
army successfully ousted the ICU from power in less than a week, backed by massive military and financial assistance from Eritrea, as well as Egypt and Libya, the
ICU has waged a brutal insurgency against the TFG and the Ethiopian military for the past year.The senior ICU leadership, including Sheikh Hassan DahirAweys
and Sheikh Sharif Ahmed have received safe haven in Eritrea. In September, the exiled ICU leadership held a nine-day conference in the Eritrean capital of Asmara
where they formed the Alliance for the Re-Liberation of Somalia headed by Ahmed.Eritrean President-for-life IsaiasAfwerki declared his country's support for the
insurgents stating, "The Eritrean people's support to the Somali people is consistent and historical, as well as a legal and moral obligation."Although touted in the
West as a moderate, Ahmed has openly supported jihad and terrorism against Ethiopia, Kenya and the West. Aweys, for his part, is wanted by the FBI in
connection with his role in the bombing of the US embassies in Kenya and Tanzania in 1998.Then there is Eritrea's support for the Ogaden separatists in Ethiopia.
The Ogaden rebels are Somali ethnics who live in the region bordering Somalia and Kenya. The rebellion is run by the Ogaden National Liberation Front (ONLF)
which uses terror and sabotage as its preferred methods of warfare. It targets not only Ethiopian forces and military installations, but locals who wish to maintain
their allegiance to Ethiopia or reach a negotiated resolution of the conflict. In their most sensationalist attack to date, in April ONLF terror forces attacked a
Chinese-run oil installation in April killing nine Chinese and 65 Ethiopians.Ethiopia, for its part has fought a brutal counter-insurgency to restore its control over
the region. Human rights organizations have accused Ethiopia of massive human rights abuses of civilians in Ogaden.Then there is Sudan. As Eric Reeves wrote in
the Boston Globe on Saturday, "The brutal regime in Khartoum, the capital of Sudan, has orchestrated genocidal counter-insurgency war in Darfur for five years,
and is now poised for victory in its ghastly assault on the region's African populations."The Islamist government of Omar Hasan Ahmad al-Bashir is refusing to
accept non-African states as members of the hybrid UN-African Union peacekeeping mission to Darfur that is due to replace the undermanned and demoralized
African Union peacekeeping force whose mandate ends on December 31. Without its UN component of non-African states, the UN Security Council mandated force
will be unable to operate effectively. Khartoum's veto led Jean-Marie Guehenno, the UN undersecretary for peacekeeping to warn last month that the entire
peacekeeping mission may have to be aborted.And the Darfur region is not the only one at risk. Due to Khartoum's refusal to carry out the terms of its 2005 peace
treaty with the Southern Sudanese that ended Khartoum's 20-year war and genocide against the region's Christian and animist population, the unsteady peace may
be undone. Given Khartoum's apparent sprint to victory over the international community regarding Darfur, there is little reason to doubt that once victory is
regional
and global
dimensions. Regionally, Egypt has played a central role in sponsoring and fomenting conflicts. Egypt's meddling advances its interest of preventing the
African nations from mounting a unified challenge to Egypt's colonial legacy of extraordinary rights to the waters of the Nile River which flows through all
countries of the region.
warming
Solving IFFs is key to raising domestic climate change financing
solves warming
Tax Justice Network 09 (Stop Illicit Capital Flows to Tackle the Climate Crisis, December 11,
http://taxjustice.blogspot.com/2009/12/stop-illicit-capital-fligh-to-solve.html)//SEP
What about mitigation, i.e. reversing the trend of increasing CO2 and other greehouse gas (GHG)
emissions in the atmosphere? Estimates vary even more here: the UNFCCC estimates US$ 52.4 billion,
while the World Bank says US $140-175 billion -- with cost of financing even higher if
that money has to be borrowed and then repaid (financing cost is estimated anywhere between
US$ 265-565 billion), hence the figure of US$ 400 billion to bring the level of CO2 in the climate down to a safer level of
450 parts per million (ppm) of CO2 in the climate. Meanwhile there is a petition on the 'safe' level actually being 350 ppm,
requiring a lot more climate financing. Whatever the 'magic figure', the demand for climate change finance is huge .
One
solution is this: tackle illicit financial flows from developing countries, estimated by
Global Financial Integrity (GFI), our colleagues in Washington D.C. annually between US$ 858.6-1060 billion annually
for the years 2002-2006. This
point was completely lost in the United Nations Climate Change Conference
2009 in Copenhagen (COP15) -- the 15th climate conference since the first one in Rio de Janeiro in 1992. If we
want to adapt to climate change, and further mitigate it, we need to look at the
capacity of especially the developing countries in raising domestic climate change
financing. Alongside tax evasion, illicit flows, and avoidance, there are questions such as low royalties and
imbalanced mineral contracts, sources of large losses. Ghana, for instance, in a report titled 'Breaking the Curse' says the
state could have raised further US$ 54.46-163.39 million due in mining royalties if a range of 6-12 per cent were applied
instead of the current minimum rate of 3 per cent, that all mining companies pay due to low reported profits from gold,
diamonds, manganese and bauxite mining. Meanwhile, in Sierra Leone, it is estimated in another report titled 'Sierra
Leone at Cross-Roads' that US$ 110 million more could be raised annually by 2020 in the future from the mining sector.
This potential for mobilising further domestic resources is there. Indeed, just as we argued at the Doha Financing for
Development (UNFfD) conference in Doha in November-December 2008, involving pledges to reinforce international tax
co-operation, to tackle illicit financial flows and to work towards a multilateral framework of automatic information
exchange. These will be productive ways of tackling the financial costs of the climate crisis.
poverty
We solve poverty IFFs are the root cause of poverty
Reuter 12 Professor in the School of Public Policy and the Department of Criminology, University of Maryland,
Senior Researcher at RAND, PhD in Economics from Yale University
(Peter, Draining Development: Controlling Flows of Illicit Funds From Developing Countries, World Bank,
https://openknowledge.worldbank.org/handle/10986/2242)
root cause argu- ment, then, is that one should focus on ways of reducing the
underlying problems: corruption, tax evasion, and so forth. The international
ows are only a manifestation of these problems. Cut down on corruption, tax evasion, and the rest,
and the IFFs will take care of themselves. The argument for focusing on causes rather than
symptoms is a com- mon one in many domains of policy. For example, many analysts argue
that crime is a manifestation less of individual failings or moral turpi- tude than of social failure (Sykes, Cullen, and
Merton 1992). Thus, they say, the most effective way of responding to crime is not detection and punishment of offenders,
which treat only the symptom, but elimina- tion of social inequality, improving the conditions in which the poor live, and
better schools and social programs, which treat the true causes of crime. In fact, there is evidence that society can usefully
do both. Police and prison do reduce crime, at least through incapacitation, and social programs such as early childhood
interventions also reduce the propensity to crime (Spelman 2000; Greenwood et al. 1998). There are other domains in
which policy focuses on root causes, but with little attention to amelioration of harms. For example, the cur- rent debate
about nancial regulation, in the wake of the global scal crisis, emphasizes rules to correct fundamentals rather than
postfailure remedies. There is thus no general approach. For some problems, ameliorative programs have a minimal role;
focusing on the root causes is, indeed, the only path to reduction of the problem.
For others, treating the symptom is also useful. What may be said about illicit ows in this respect? A distinctive
feature of the IFF issue is that the illicit ows may them- selves exacerbate the
underlying harms, that is, even if the tax evasion, corruption, and criminal
markets continued unabated and all that one accomplished was to prevent the
resulting funds leaving the home coun- try, the result would appear to be welfare
enhancing. Assuming that the owners of the illicit funds want to do more than hide their assets under mattresses,
there would be more money for domestic investment and, perhaps, also a stronger tax base. Mick Moore takes this up in
chapter 14. It
is also possible that trapping funds in the source countries reduces the
AT: T-Substantial
2AC T-Substantial
W/M: Substantially is modifying the curtailment; not the
number of people. Resolution basis is best it doesnt say
anything about domestic surveillance of the population. We
are a substantial curtailment of domestic surveillance.
C/I: "Substantial" means of real worth or considerable value --this is the USUAL and CUSTOMARY meaning of the term
Words and Phrases 2 (Volume 40A, p. 458)
D.S.C. 1966. The word substantial within Civil Rights Act providing that a place is a
public accommodation if a substantial portion of food which is served has moved in
commerce must be construed in light of its usual and customary meaning,
that is, something of real worth and importance; of considerable value; valuable,
something worthwhile as distinguished from something without value or merely
nominal
Not all forms of surveillance are the same. The negative takes
a flawed approach to the topic some methods of surveillance
are more important. FBI drug testing is one of them.
Takash 7/8
(Budget and Tax Policy Intern at the Cato Institute, Applied Mathematics & Statistics and
Political Science major at JHU, Winners of Provost's Undergraduate Research Award, Young Voices
Advocates Advocate specializing in drug policy) aj
Drug testing also makes it harder for firms to maximize profit.
to reconsider testing applicants because its so difficult to find good hackers who dont use
marijuana or other drugs. If this means less qualified hackers are working for the government, the
federal governments drug testing policies are literally a threat
to national security.
surveillance and total crime prevention. While privacy and autonomy are obvious casualties of such a
system social control policy holds out the possibility of securing almost
total compliance with the law in
drug use welfare administration, and
,
taxation. Another view of employee drug testing is less about testing than about political and legal battles
over implementation. Drug
surveillance hegemony, and the law. The social construction of the drug crisis is examined; consent
,
and resistance in a unionized work force are considered; and constitutional issues associated with privacy,
due process, and the fourth amendment are explored. Supplemental information on employee drug testing
is provided in two appendixes. References, tables, and figures
1AR T-Substantial
Substantial means considerable or to a large degree --- this
common meaning is preferable because the word is not a term
of art
Arkush 2 (David, JD Candidate Harvard University, Preserving "Catalyst" Attorneys' Fees Under the
Freedom of Information Act in the Wake of Buckhannon Board and Care Home v. West Virginia Department
of Health and Human Resources, Harvard Civil Rights-Civil Liberties Law Review, Winter,
37 Harv. C.R.-C.L. L. Rev. 131)
Plaintiffs should argue that the term "substantially prevail" is not a term of art because if considered a
term of art, resort to Black's 7th produces a definition of "prevail" that could be interpreted adversely to
plaintiffs. 99 It is commonly accepted that
words that are not legal terms of art should be accorded their
ordinary, not their legal, meaning, 100 and ordinary-usage dictionaries provide FOIA fee claimants with
helpful arguments. The Supreme Court has already found favorable, temporally relevant definitions of the
word "substantially" in ordinary dictionaries: "Substantially" suggests "considerable" or "specified to a
large degree." See Webster's Third New International Dictionary 2280 (1976) (defining "substantially" as "in
a substantial manner" and "substantial" as "considerable in amount, value, or worth" and "being that
specified to a large degree or in the main"); see also 17 Oxford English Dictionary 66-67 (2d ed. 1989)
("substantial": "relating to or proceeding from the essence of a thing; essential"; "of ample or considerable
amount, quantity or dimensions"). 101
there is
regulations alter the terms of a legislative enactment or frustrate the policy embodied in the statute. If a
regulation is plainly at odds with the statute, the court must set it aside. As we have repeatedly stated, the
judicial role is to ensure that an agency's action does not violate express and implied legislative intent.
[*377] Thus, the meaning of enabling legislation is pivotal to any analysis of the legitimacy of a rule.
[T.H. v. Div. of Developmental Disabilities, 189 N.J. 478, 490-91, 916 A.2d 1025 (2007) (citations, internal
quotation marks and editing marks omitted).]
And, in determining the [***67] validity of challenged administrative regulations, our point of departure is
the statute's meaning and, "[o]rdinarily, we derive a statute's meaning from
at 491, 916 A.2d 1025 (citing State v. Sutton, 132 N.J. 471, 625 A.2d 1132 (1993)).
Nothing in this record provides any basis whatsoever for the Department of Labor's
adoption of what clearly is a totally arbitrary "80% rule" to define a
"stoppage of work." Indeed, in its own answers to the public comments on this regulation, the
Department of Labor boldly asserted that "[t]he rules provide that only those individuals involved in the
labor dispute will be disqualified for benefits." Comments of the Department of Labor, Division of
Employment Security and Job Training to the proposed adoption of N.J.A.C. 12:17-12.2, 29 N.J.R. 5162 (Dec.
15, 1997) (emphasis supplied). Repeatedly, the Department of Labor claimed that it "recognizes
unemployment insurance as an insurance program and not an entitlement program . . . [and, therefore,
i]ndividuals must contribute to the unemployment system and must meet eligibility requirements in order
to receive unemployment benefits." Ibid. Yet, despite those clear statements of intent, nothing--absolutely
nothing [***68] --in the published history of the adoption of this regulation supports the arbitrary "80%
rule" [**313] adopted by the Department of Labor and on which the majority relies.