Backdoor Encryptions Aff

Embed Size (px)

Citation preview

  • 7/23/2019 Backdoor Encryptions Aff

    1/23

    PlanThe United States federal government should substantially

    curtail its domestic surveillance through backdoors that

    bypass encryption technology.

  • 7/23/2019 Backdoor Encryptions Aff

    2/23

    1AC Cyber AdvNSA backdoors in encryption standards destroys cybersecurity

    makes the US vulnerable to hackers

    Sasso, technology correspondent for National Journal,1! (Brendan, "The NSA

    Isn't Just Spying on Us, It's Also Undermining Internet Security", April ! #$,National Journal, %%%&nationalournal&comdailythe)nsa)isn)t)ust)spying)on)us)it)s)also)undermining)internet)security)#$$!*

    Bolstering the nation+s defenses against hacers has -een one of the .-amaadministration+s top goals& ./cials ha0e %arned for years that a sophisticatedcy-erattac could cripple (decimate * critical infrastructure or allo% thie0es to maeo1 %ith the 2nancial information of millions of Americans&3resident .-ama pushed 4ongressto enact cy-ersecurity legislation, and %hen it didn+t, he issued his o%n e5ecuti0e order in #6& 7The cy-erthreat to our nation is one of the most serious economic and national securitychallenges %e face,8.-ama %rote in a # op)ed in The 9all Street Journal& Butcritics argue that theN ational S ecurity A gency has actually undermined cybersecurity and made

    the U nited S tates more vulnerable to hackers& At its core, the pro-lem is theNSA+s dual mission& .n one hand, the agency is tased %ith securing U&S& net%orsand information& .n the other hand, the agency must gather intelligence on foreignthreats to national security& 4ollecting intelligence often means hacing encryptedcommunications& That+s nothing ne% for the NSA: the agency traces its roots -ac to code)-reaersdeciphering Na;i messages during 9orld 9ar II& So in many %ays, strong Internet securityactually maes the NSA+s o- harder& 7This is an administration that is a 0igorous defender ofsur0eillance,8 said 4hristopher Soghoian, the head technologist for the American 4i0il

  • 7/23/2019 Backdoor Encryptions Aff

    3/23

    du--ed 7Stu5net,8 to cripple Iranian nuclear centrifuges& But the %orm, %hiche5ploited four pre0iously unno%n a%s in icrosoft 9indo%s, escaped the Iraniannuclear plant and ?uicly -egan damaging computers around the %orld& The NSA andIsraeli o/cials ha0e also -een tied to 7Clame,8 a 0irus that impersonated a icrosoft update to spy on Iranian

    computers& Danee Dines, an NSA spoes%oman, said the U&S& go0ernment 7is as concerned as the pu-lic is %ith the

    security of these products&8 7The United States pursues its intell igence mission %ith care to ensure that innocent

    users of those same technologies are not a1ected,8 she said& According to Dines, the NSA relies on thesame encryption standards it recommends to the pu-lic to protect its o%n classi2ednet%ors& 79e do not mae recommendations that %e cannot stand -ehind for protecting national securitysystems and data,8 she said& 7The acti0ity of NSA in setting standards has made the Internet a far safer place to

    communicate and do -usiness&8 But due to concern o0er the NSA damaging Internetsecurity, the president+s re0ie% group on sur0eillance issues recommended that theU&S& go0ernment promise not to 7in any %ay su-0ert, undermine, %eaen, or mae0ulnera-le generally a0aila-le commercial encryption&8 7=ncryption is an essential-asis for trust on the Internet : %ithout such trust, 0alua-le communications %ouldnot -e possi-le,8the group %rote in its report, %hich %as released in >ecem-er& 7)or the entiresystem to #ork* encryption soft#are itself must be trust#orthy&8 The 9hiteEouse+s cy-ersecurity coordinator said that disclosing security a%s "usually maes sense&" In response to the

    report, the administration adopted a ne% policy on %hether the NSA can e5ploit 7;ero)days8F0ulnera-ilities thatha0en+t -een disco0ered -y anyone else yet& According to the 9hite Eouse, there is a 7-ias8 to%ard pu-liclydisclosing a%s in security unless 7there is a clear national security or la% enforcement need&8 In a -log post

    onday, ichael >aniel, the 9hite Eouse+s cy-ersecurity coordinator, said thatdisclosing security a%s 7usually maes sense&87Building up a huge stocpile of undisclosed0ulnera-ilities %hile lea0ing the Internet 0ulnera-le and the American people unprotected %ould not -e in our

    national security interest,8 he said& But >aniel added that, in some cases, disclosing a0ulnera-ility means that the U&S& %ould 7forego an opportunity to collect crucialintelligence that could th%art a terrorist attac, stop the theft of our nation+sintellectual property, or e0en disco0er more dangerous 0ulnera-ilities&8 Ee said that thego0ernment %eighs a 0ariety of factors, such as the ris of lea0ing the 0ulnera-ility un)patched, the lielihood that

    anyone else %ould disco0er it, and ho% important the potential intelligence is& +ut privacy advocates

    and many business groups are still uncomfortable #ith the U.S. keeping

    security ,a#s secret. And many don-t trust that the NSA %ill only e5ploit the0ulnera-ilities %ith the most potential for intelligence and least opportunity forother hacers& 7The sur0eillance -ureaucracy really doesn+t ha0e a lot of self)imposed limits& They %ant to get e0erything,8 said =d Blac, the 4=. of the4omputer G 4ommunications Industry Association, %hich represents companiesincluding Hoogle, icrosoft, @ahoo, and Sprint& 7No% I thin people dealing %ith that -ureaucracyha0e to understand they can+t tae anything for granted&8 ost computer net%ors are run -ypri0ate companies, and the government must #ork closely #ith the privatesector to improve cybersecurity. +ut companies have become reluctant to

    share security information #ith the U.S. government* fear ing the NSA

    could use any information to hack into their systems&79hen you %ant to go

    into partnership %ith some-ody and %or on serious issuesFsuch as cy-ersecurityFyou %ant to no% you+re -eing told the truth,8 Blac said& Hoogleand one othercy-ersecurity 2rm disco0ered 7Eeart-leed8Fa critical a% in a %idely used Internetencryption toolFin arch& The companies noti2ed a fe% other pri0ate)sector groupsa-out the pro-lem, -ut no one told the U&S& go0ernment until April& 7Information youshare %ith the NSA might -e used to hurt you as a company,8 %arned Ashan Soltani, atechnical consultant %ho has %ored %ith tech companies and helped The 9ashington 3ost %ith its co0erage of the

    Sno%den documents& Ee said that company o/cials ha0e historically discussed cy-ersecurity

  • 7/23/2019 Backdoor Encryptions Aff

    4/23

    issues %ith the NSA, -ut that he %ouldn+t -e surprised if those relationships are no%strained& Ee pointed to ne%s that the NSA posed as Cace-oo to infect computers%ith mal%are& 7That does a lot of harm to companies+ -rands,8Soltani said& The NSA-sactions have also made it dicult for the U.S. to set international norms

    for cybercon,ict. Cor se0eral years, the U&S& has tried to pressure 4hina to scale

    -ac its cy-erspying operations, %hich allegedly steal trade secrets from U&S&-usinesses& Jason Eealey, the director of the 4y-er Statecraft Initiati0e at theAtlantic 4ouncil, said the U&S& has 7militari;ed cy-er policy&8 "The U nited S tateshas been saying that the #orld needs to operate according to certain

    norms* %he said& "'t is dicult to get the norms that #e #ant because it

    appears to the rest of the #orld that #e only #ant to follo# the norms

    that #e think are important.%Dines, the NSA spoes%oman, emphasi;ed that the NSA %ould ne0erhac into foreign net%ors to gi0e domestic companies a competiti0e edge (as 4hina is accused of doing*& 79e do

    not use foreign intelligence capa-ilities to steal the trade secrets of foreign companies on -ehalf ofFor gi0e

    intelligence %e collect toFU&S& companies to enhance their international competiti0eness or increase their -ottomline,8 she said& Jim

  • 7/23/2019 Backdoor Encryptions Aff

    5/23

    strategic assets and information& It is a threat that is nothing short of formida-le& In fact, the US >irector ofNational Intelligence has raned cy-ercrime as the top national security threat,higher than that of terrorism, espionage, and %eapons of mass destructionUnderscoring the threat, the CBI last year noti2ed 6, US companiesFranging from small -ans, maor defense

    contractors, and leading retailersFthat they had -een 0ictims of cy-er intrusions& "The U nited S tates

    faces real 5cybersecurity6 threats from criminals, terrorists, spies, and malicious

    cy-er actors ,8 said CBI >irector James B& 4omeyat a recent security conference& 7Theplayground is a 0ery dangerous place right no%&8 Nation&state actors pose a particularly

    pernicious threat, according to Sean Joyce, a 3%4 principal and former CBI deputydirector%ho fre?uently testi2ed -efore the US Eouse and Senate Intelligence committees& 77e areseeing increased activity from nation&state actors* #hich could escalate

    due to unrest in Syria* 'ran* and 8ussia,8he said& 7These groups may target2nancial ser0ices and other critical infrastructure entities&8In today+s 0olatilecy-ercrime en0ironment, nation)states and other criminals continually and rapidlyupdate their tactics to maintain an ad0antage against ad0ances in securitysafeguards implemented -y -usinesses and go0ernment agencies& ecently, for instance,hacers engineered a ne% round of distri-uted denial of ser0ice (>>oS* attacs that can generate tra/c rated at a

    staggering $ giga-its per second, the most po%erful >>oS assaults to date&

    Cyber&attack causes military lash out and leads to nuclear #ar

    o-ert Tilford 19, Hraduate US Army Air-orne School, Ct& Benning, Heorgia,74y-er attacers could shut do%n the electric grid for the entire east coast8 #,http%%%&e5aminer&comarticlecy-er)attacers)could)easily)shut)do%n)the)electric)grid)for)the)entire)east)coaLLL%e don+t agree %ith the a-leist language

    To mae matters %orse a cyber attack that can tae out a ci0ilian po%er grid, for e5ample couldalsocripple :decimate; the U.S. military&M The senator notes that is that thesame po%er gridsthatsupply cities and to%ns, stores and gas stations, cell to%ers and heart monitors also po%er7every

    military base inour country&8M 7Although -ases %ould -e prepared to %eather a shortpo%eroutage %ith -acupdiesel generators, %ithin hours, not days, fuel supplies %ould run out8, he said&M 9hichmeans militarycommand and control centers could go dark&M adar systems thatdetectair threatsto our country %ould shut >o%ncompletely&M 74ommunication-et%eencommanders and their troops%ouldalso go silent& And many%eapons systems %ould -eleft %ithouteither fuel or electric po%er8, said Senator Hrassley&M 7So in a fe# short hoursordays, themightiestmilitaryin the %orld%ould -e left scram-ling to maintain -asefunctions8, he said&M 9e contacted the 3entagon and o/cials con2rmed the threat of acy-er attac is something very real&MTop national security o/cialsFincluding the 4hairman of theJoint 4hiefs, the >irector of the National Security Agency, the Secretary of >efense, and the 4IA >irectorF ha0e said, 7pre0enting acy-er attacand impro0ing the nation+s electric grids isamong the most urgent prioritiesof our country8 (source

    4ongressional ecord*&M So ho% serious is the 3entagon taing all thisM =nough to start, or end a %ar o0er it, for sure&M A cy-er attactodayagainst the US could0ery %ell -e seen as an "Act of 7ar% and could -e met %ith a7full scale8 US military response&MThat could include the use of "nuclear#eapons%*if authori;ed -y the 3resident&

    Cyber&attacks could shut do#n the po#er grid for years

  • 7/23/2019 Backdoor Encryptions Aff

    6/23

    ichael, "U&S& Not eady for 4y-er%ar Eostile Eacers 4ould

  • 7/23/2019 Backdoor Encryptions Aff

    7/23

    programmes to get @ahoo and Hoogle user data& This sho%s that they try to get the same data from multiplemechanisms&66 9ith the H4EQ under the US4U

  • 7/23/2019 Backdoor Encryptions Aff

    8/23

    madethe United States more 0ulnera-le to hacers& At its core, the pro-lem is the NSA+s dualmission& .n one hand, the agency is tased %ith securing U&S& net%ors and information& .n the other hand, the

    agency must gather intelligence on foreign threats to national security& 4ollecting intelligence oftenmeans hacing encrypted communications& That+s nothing ne% for the NSA: the agency traces itsroots -ac to code)-reaers deciphering Na;i messages during 9orld 9ar II& So in many %ays, strong Internet

    security actually maes the NSA+s o- harder& 7This is an administration that is a 0igorous defender of sur0eillance,8

    said 4hristopher Soghoian, the head technologist for the American 4i0il epartment agency,sets scienti2c and technical standards that are %idely used -y -oth the go0ernment and the pri0ate sector& The

    agency has said it %ould ne0er 7deli-erately %eaen a cryptographic standard,8 -ut it remains unclear %hether the

    agency %as a%are of the -ac door or %hether the NSA triced NIST into adopting the compromised standard& NIST

    is re?uired -y la% to consult %ith the NSA for its technical e5pertise on cy-ersecurity& The re0elation thatNSA someho% got NIST to -uild a -ac door into an encryption standard hasseriously damaged NIST+s reputation%ith security e5perts& 7NIST is operating %ith a trust de2cit rightno%,8 Soghoian said& 7Anything that NIST has touched is no% tainted&8 It+s a particularly -ad time for NIST to ha0e

    lost the support of the cy-ersecurity community& In his e5ecuti0e order, .-ama tased NIST %ithdrafting the cy-ersecurity guidelines for critical infrastructure such as po%er plants andphone companies& Because it+s an e5ecuti0e order instead of a la%, the cy-ersecurity standards are entirely

    0oluntary, and the U&S& go0ernment %ill ha0e to con0ince the pri0ate sector to comply& The Sno%den leas%eren+t the 2rst to indicate that the NSA is in0ol0ed in e5ploiting commercialsecurity& According to a # Ne% @or Times report, the NSA de0eloped a %orm, du--ed 7Stu5net,8 to crippleIranian nuclear centrifuges& But the %orm, %hich e5ploited four pre0iously unno%n a%s in icrosoft 9indo%s,

    escaped the Iranian nuclear plant and ?uicly -egan damaging computers around the %orld&The NSAand Israelio/cials ha0e also -een tied to7Clame,8 a 0irus that impersonated a icrosoft update to spy onIranian computers& Danee Dines, an NSA spoes%oman, said the U&S& go0ernment 7is as concerned as thepu-lic is %ith the security of these products&8 7The United States pursues its intelligence mission

    %ith care to ensure that innocent users of those same technologies are nota1ected,8 she said& According to Dines, the NSA relies on the same encryption standards it recommends to thepu-lic to protect its o%n classi2ed net%ors& 79e do not mae recommendations that %e cannot stand -ehind for

    protecting national security systems and data,8 she said& 7The acti0ity of NSA in setting standards hasmade the Internet a far safer place to communicate and do -usiness&8 But due to concerno0er the NSA damaging Internet security, the president+s re0ie% group on sur0eillance issues recommended thatthe U&S& go0ernment promise not to 7in any %ay su-0ert, undermine, %eaen, or mae 0ulnera-le generally

    a0aila-le commercial encryption&8 7=ncryption is an essential -asis for trust on the Internet: %ithout such trust,

    0alua-le communications %ould not -e possi-le,8 the group %rote in its report, %hich %as released in >ecem-er&

    7Cor the entire system to %or, encryption soft%are itself must -e trust%orthy&8 In response to the report, the

    administration adopted a ne% policy on %hether the NSA can e5ploit 7;ero)days8F0ulnera-ilitiesthat ha0en+t -een disco0ered -y anyone else yet& According to the 9hite Eouse, there is a 7-ias8to%ard pu-licly disclosing a%s in security unless 7there is a clear national security or la% enforcement need&8 In a

    -log post onday, ichael >aniel, the 9hite Eouse+s cy-ersecurity coordinator, said that disclosing security a%s

    7usually maes sense&8 7Building up a huge stocpile of undisclosed 0ulnera-ilities %hile lea0ing the Internet0ulnera-le and the American people unprotected %ould not -e in our national security interest,8 he said& But >anieladded that, in some cases, disclosing a 0ulnera-ility means that the U&S& %ould 7forego an opportunity to collect

    crucial intelligence that could th%art a terrorist attac, stop the theft of our nation+s intellectual property, or e0en

    disco0er more dangerous 0ulnera-ilities&8 Ee said that the go0ernment %eighs a 0ariety of factors, such as the risof lea0ing the 0ulnera-ility un)patched, the lielihood that anyone else %ould disco0er it, and ho% important the

    potential intelligence is& But pri0acy ad0ocates and many -usiness groups are still uncomforta-le %ith the U&S&

    eeping security a%s secret& And many don+t trust that the NSA %ill only e5ploit the 0ulnera-ilities %ith the mostpotential for intelligence and least opportunity for other hacers& 7The sur0eillance -ureaucracy really doesn+t ha0e

    a lot of self)imposed limits& They %ant to get e0erything,8 said =d Blac, the 4=. of the 4omputer G

    4ommunications Industry Association, %hich represents companies including Hoogle, icrosoft, @ahoo, and Sprint&

  • 7/23/2019 Backdoor Encryptions Aff

    9/23

    7No% I thin people dealing %ith that -ureaucracy ha0e to understand they can+t tae anything for granted&8 ostcomputer net%ors are run -y pri0ate companies, and the go0ernment must %or closely %ith the pri0ate sector to

    impro0e cy-ersecurity& But companies ha0e -ecome reluctant to share security information %ith the U&S&

    go0ernment, fearing the NSA could use any information to hac into their systems& 79hen you %ant to go intopartnership %ith some-ody and %or on serious issuesFsuch as cy-ersecurityFyou %ant to no% you+re -eing told

    the truth,8 Blac said& Hoogle and one other cy-ersecurity 2rm disco0ered 7Eeart-leed8Fa critical a% in a %idely

    used Internet encryption toolFin arch& The companies noti2ed a fe% other pri0ate)sector groups a-out thepro-lem, -ut no one told the U&S& go0ernment until April& 7Information you share %ith the NSA might -e used to hurt

    you as a company,8 %arned Ashan Soltani, a technical consultant %ho has %ored %ith tech companies and helped

    The 9ashington 3ost %ith its co0erage of the Sno%den documents& Ee said that company o/cials ha0e historicallydiscussed cy-ersecurity issues %ith the NSA, -ut that he %ouldn+t -e surprised if those relationships are no%

    strained& Ee pointed to ne%s that the NSA posed as Cace-oo to infect computers %ith mal%are& 7That does a lot of

    harm to companies+ -rands,8 Soltani said&The NSA+s actions ha0e also made it di/cult for theU&S& to set international norms for cy-erconic t& Cor se0eral years, the U&S& has tried topressure 4hina to scale -ac its cy-erspying operations, %hich allegedly steal trade secretsfrom U&S& -usinesses& Jason Eealey, the director of the 4y-er Statecraft Initiati0e at the Atlantic 4ouncil, said the

    U&S& has 7militari;ed cy-er policy&8 7The U nited S tates has -een saying that the %orld needsto operate according to certain norms,8 he said& 7It is di/cult to get the norms that %e%ant -ecause it appears to the rest of the %orld that %e only %ant to follo% thenorms that %e thin are important&8 Dines, the NSA spoes%oman, emphasi;ed that the NSA %ould

    ne0er hac into foreign net%ors to gi0e domestic companies a competiti0e edge (as 4hina is accused of doing*&79e do not use foreign intelligence capa-ilities to steal the trade secrets of foreign companies on -ehalf ofFor gi0e

    intelligence %e collect toFU&S& companies to enhance their international competiti0eness or increase their -ottomline,8 she said& Jim

  • 7/23/2019 Backdoor Encryptions Aff

    10/23

    information as true partners*B he said& aster4ard chief e5ecuti0e Aay Bangapraised .-ama+s e5ecuti0e action -ut said that eventually "#e need a reallegislative solution& An e5ecuti0e action can only tae you this far&8 7ather than 2ghtthis in indi0iduali;ed groups, there+s some merit in oining hands and doing it together,8 Banga said& .-ama'sorder is part of a -roader 9hite Eouse e1ort to -eef up the nation's cy-ersecurity

    infrastructure, something the administration %ants to push on 4apitol Eill&epot& Both pri0acy groups and Silicon Dalleycompanies ha0e said they %ould oppose the legislation .-ama proposed last monthunless reforms are (rst made to the NSAEs surveillance program . In an inter0ie%

    %ith e4ode, .-ama acno%ledged tensions %ith Silicon Dalley after the NSA disclosures& "The Sno#dendisclosures ... #ere really harmful in terms of the trust bet#een the

    government and many of these companies, in part -ecause it had an impacton their -ottom lines ,".-ama said& The president also said that there should -e a "pu-lic con0ersation"a-out encryption and said he liely leans more to%ard strong data encryption than la% enforcement, -ut is

    sympathetic to them -ecause of the pressure they are under to eep people safe& U&S& go0ernmentsur0eillance acti0ities ha0e -een seen as a potential lia-ility for tech companies thatoperate glo-ally& 7Se0enty to percent of the user -ases for a lot of these companies are the foreigners %hoget 0ery little protection under our system,8 e5plained Julian Sanche;, a senior fello% focused on technology and

    ci0il li-erties at the 4ato Institute& 7If they don+t display some push -ac, they no% they %on+t do 0ery %ell %ith

    those marets&8 In >ecem-er of #6, maor tech companies including Apple, Hoogle,T%itter, Cace-oo, icrosoft and @ahoo oined together in the eform Ho0ernmentSur0eillance coalition, urging the 3resident and 4ongress to impose restrictions ando0ersight measures on U&S& spying programs& The 3resident agreed in principle tosome limits on spying programs, including the -ul collection of domestic phone records, during aspeech last year& But progress on reforms has been too slo# for some pri0acyad0ocates, as the administration urged for legislati0e action that has yet tosucceed&Tech companies , mean%hile, ha0e taen some measures into their o%nhands -y strengthening and epanding their deployment of encryption tosecure users' online acti0ities P setting up a con,ict bet#een the companiesand la# enforcement #ho #arn that such actions may make it harder for

    them to pursue crime and terrorism %hich increasingly includes a digitalcomponent& 7I thin it+s fair to say that changes on the technology front ha0e outpaced go0ernmental andlegislati0e e1orts,8 said Andre% 4rocer, a legal fello% at ci0il li-erties group the =lectronic Crontier Coundation&

  • 7/23/2019 Backdoor Encryptions Aff

    11/23

    1AC Tech Adv

    The NSA is compelling US tech companies to build backdoors

    into their encryption standardsbecause consumers #on-t

    purchase insecure products* they-re s#itching to foreignmarkets

    Clark* economic scholar* 1!(Thomas H& 4lar, economics scholar, -loggeron economics, politics, and philosophy, uni0ersity le0el =nglish tutor, formeradministrator in pu-lic and pri0ate industries, 7Eo% NSA o0erreach has done moredamage to the US economy that .sama Bin

  • 7/23/2019 Backdoor Encryptions Aff

    12/23

    So0iet KHB& 3erhaps the most damning elementof all (from an American perspecti0e* is theetraordinary amount of damage the NSA ha0e done to the reputation of UStechnology companies, -y compelling them to -reech the pri0acy of their o%ncustomers and infecting their products %ith spy%are&This trashing of the reputationof countless US -ased technology companies comes %ith an enormous price tag & It

    has -een estimated that the reputational damage inicted on US technologycompanies -y their o%n go0ernment could amount to Y# -illion, as millions ofcustomers are turned oF the idea of investing in -uggy, insecure and spy%areladen products from US companies& If you add the estimated Y# -illion in reputational damage toAmerican companies to the staggering cost of running the NSA and employing an army of O, spoos, the cost

    of this folly is a-solutely enormous& .ne of the %orst things a-out ha0ing trashed thereputation of their o%n technology sector, is the fact that the tech nology sector isone of the fe# parts of the US economy that is healthy and productive& TheUS (nancial sector is a gigantic, 0irtually unregulated and desperately unsta-lehot-ed of corruption and recless gam-ling and US manufacturing po%er has-een in decline since theneoli-erals came to po%er in the #!s and allo%ed short)termpro2teers to asset strip US producti0ity&The US economy is in decline, -ut that

    decline has -een oFset by a remara-le period of eponential gro#th in the UStechnology sector& Any American %ith a reasona-ly comprehensi0e 0ie% of ho% their economy isstructured must -e a-solutely aghast at the damage inicted on the technology sector -y the po%er cra;ed spoos

    that considered their mission to infect e0erything they could %ith spy%are as far more important than the long term

    success of the US technology sector& Not only does it loo lie the NSA's o0erreach is going tocost the US economy 0astly more than any terrorist attac e0er has, it also loos setto crush US ambition of controlling the 'nternet, as e0er more people realisethat the Americans can no longer be trusted to control the fundamentalinfrastructure of the Internet& Any non)US corporation %ith the slightest regard fordata security is going to move a#ay from reliance upon the US technologysector as soon as possible, and any nation that 0alues its o%n industries is surelygoing to appro0e of e1orts to #rest control of the 'nternet a#ay from the US&

    The sheer scale of NSA data theft is dri0ing the de0elopment of ne% highlyencrypted technology& It is only a matter of time -efore spoo proof -ro%sers andencrypted communications -ecome commonplace, -ecause there is an undeniablemarket demand for such things& The most terri-le thing from a US perspecti0e isthat US technology companies #ill be completely cut oF from entry into thisne% maret -ecause everyone is no# a#are of ho% the US intelligence agenciesha0e forced US technology companies to infect their o%n products %ith spy%areand in0ade the pri0acy of their o%n customers& No-ody is e0er going to -elie0e UStechnology companies %hen they gi0e assurances a-out pri0acy, meaning that thenet #ave of secure communications tech nology is going to arise outside the US&

    The NSA ha0e -een using their sur0eillance po%ers to engage in industrial espionage in order to -ene2t US

    corporations& This is a clear demonstration that they see it as their mission to help US corporations -y fair means orfoul& Hi0en that this is one of their core o-ecti0es, the fact that they ha0e inicted such ane5traordinary amount of damage on the most 0i-rant sector of the US economymustgo do%n as one of the most spectacular o%n goals in history& They -uilt a 0ast data stealing operation in order to

    help US corporations, -ut in doing so inicted more damage on the US economy than .sama Bin

  • 7/23/2019 Backdoor Encryptions Aff

    13/23

    Soft#are&de(ned net#orks are key to future net#ork

    infrastructure generationbut surveillance means

    organi4ations and individuals #on-t adopt US tech

    G'U, Ce-ruary 1!, "3olitics, cy-er)security, trade and the future of I4T supplychains", The =conomist Intelligence Unit, http%%%&ma5feel&orgmaga;ines)listthe)economist)intelligence)unit)politics)cy-er)security)trade)and)the)future)of)ict)supply)chains)fe-ruary)#$Zgsgo&html

    The promise of soft%are)de2ned net%ors (S>Ns *is usually e5pressed in similar terms to mostinno0ations in net%or technology that is, they %ill allo% net%or operators to impro0e speedand e/ciencyR In traditional net%ors, s%itches and routers are pre)set %ith instructions on ho% to for%arddata tra/c, and must -e manually altered or upgraded: in S>Ns: -y contrast, the instructions controlling tra/c can

    -e altered through soft%are administered from a remote location& A parallel to the S>N is the soft%are)de2ned radio(S>*, %hich performs a similar function for radio transcei0ers: remotely deli0ered soft%are instructions can set, or

    alter, its operations, including its fre?uency range or po%er output& S>Nand S> areconsidered critical toany future net#ork infrastructure generation, such asthe discussions around OH-road-and mo-ile technology& The performance of a communications net%or in years to come %ill -edetermined not ust during the physical construction of its infrastructure, -ut %ill -e managed throughout its

    operational lifecycle -y an ongoing connecti0ity to soft%are instructions&The potential -ene2ts of theS>N stem from its increased le0els of automation and e5i-ility , %hich %ill allo%net%ors to cope much more easily %ith uctuations in tra/c 0olumes, increasing-and%idth as and %hen re?uired& It is considered a disrupti0e technologicalad0ance, and the main potential economic ris is to those companies that manufacture proprietary net%orgear, such as 4isco and Eua%ei& any industry commentators no% e5pect the commoditisation of net%or gear and

    increased use of generic, standardised hard%are, %hile 0alue increasingly accrues to soft%are and ser0icepro0iders& As %ell as amplifying the e5isting need to suppress hard%are costs, this %ill force many0endors of net%or infrastructure to mo0e into soft%are de0elopment& N technology in .cto-er #6 Net atri5, part of the Soft4om net%or

    architecture& ean%hile, 4isco has announced its .pen Net%or =n0ironment (.N=* S>N strategy&The industryhas not yet de0eloped a full set of standardised protocols, so proprietary protocols are still inuse in these S>N trial runs& Eo%e0er, it is 0ery liely that such standards #ill bedeveloped over the net fe# years, representing a signi(cant shift in thetelecoms sector & The ad0ent of soft%are)de2ned net%ors %ill -ring ne% cy-er)security challenges &There are ad0antages, including the possi-ility of responding faster and more e5i-ly tosoft%are)-ased attacs& @et, the standardisation of net%or gear %ill also mae it easier for mal%are, such as

    %orms, to na0igate across multiple net%ors, facing fe%er -arriers lie those currently posed -y the di1ering

    speci2cations of proprietary gear&Just as legitimate alterations to routers and s%itches can-e remotely administered, so can an attac -e managed from any location& Huch#ork #ill need to be done to guarantee net#ork security so that

    organisations and individuals feel comfortable adopting SNs %ill not fundamentally change the riss hard%are could -e compromised during design or at 0arious points inthe manufacturing process, and those in charge of 2nal testing, as %ell as procurement of gear, %ill need to

    impro0e their a-ility to detect 0ulnera-ilities and defend against attacs& 3olicy responses to S>Ns are liely to

    focus on similar issues faced in cloud computing data and communications pri0acy, standards and interopera-ility,

    and rules on cross)-order data o%s& As in cloud computing, there %ill -e sensiti0ities around

    http://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.htmlhttp://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.htmlhttp://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.htmlhttp://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.htmlhttp://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.htmlhttp://www.maxfeel.org/magazines-list/the-economist-intelligence-unit-politics-cyber-security-trade-and-the-future-of-ict-supply-chains-february-2014_2gsgo.html
  • 7/23/2019 Backdoor Encryptions Aff

    14/23

    cross)-order remote management through soft%are, and ho% this relates todi1erent countries+ legal intelligence acti0ities&

    Scenario 1 @ Gcon

    Tech sector innovation is necessary for economic gro#th

    cloud&computing aFects all organi4ations

    Coviello* Gecutive Iice President* GHC Corporation* 11

    Art, "4an 4loud 4omputing Sa0e The American =conomy", arch #6 ##, Cor-es,%%%&for-es&comsitesciocentral##6#6can)cloud)computing)sa0e)the)american)economy

    The America n dream is in peril from the conuence of sy roceting de2cits , highunemployment, and the ticing time -om- of an aging -a-y -oomer generation ,%ith its coincident increase in the -urden of entitlements as a percentage of H>3& Corthe 2rst time, the ne5t generation of Americans, our grandchildren, ris ha0ing a lo%er standard of li0ing than %e

    enoyed& It is not a pro-lem that can -e remedied %ith ta5 increases and -udget reductions& 9e %ill not sa0eor cut our %ay -ac to economic prosperity& The #ay for#ard is innovation&America must inno0ate its %ay out of economic stagnation and -ac to economicgro%th& As has -een the case for the last #O years, Americans ha0e al%ays responded %ell in a crisis and yetagain, %e are %ell positioned to lead the %orld out of this one& 9ant proof American -usinesses systemically andculturally react fast& T%o years after the economic do%nturn -egan the United States %as generating !X of its

    economic output %ith only !X of the la-or& This sort of gain in producti0ity ultimately translates into increased

    economic acti0ity, the a-ility to pay do%n de-t and a higher standard of li0ing for those of us %ho are employed&

    Unfortunately it does not directly address the issue of unemployment& The fact is that producti0ity gains

    from %oring harder can only tae us so far& Inno0ation and tech nology can andmust tae us the rest of the %ay, creat ing ne% o-s and ne% industries& Jur 7socalled8 information economy, for e5ample, is ripe for innovation& Today, allorgani4ations are dependent on info rmation tech nology.9hat maes meoptimistic a-out the future is that %e ha0e not e0en -egun to scratch the surface ofall that can -e accomplished -y actually applying information technologyper0asi0ely& 9e ha0e spent trillions of dollars %orld%ide for the computers to createand process information, net%ors to mo0e it around and the hard%are to store it&But %e are at a point %here %e spend R to X of 7IT8 -udgets ust to maintainthose systems and infrastructures& No %onder progress in applying IT is so slo%&This is thetechnology e?ui0alent of e0ery organi;ation in the %orld, -ig or small, in0esting the

    capital and human resources to -uild and operate their o%n electricity producingpo%er plants& But instead, picture a %orld %here soft%are platforms are a0aila-leonline and easily customi;a-le& 3icture a %orld %here compute po%er is generatedo1 site, a0aila-le in ?uantities %hen and %here you need it& And picture a %orld%here information is safely stored, e/ciently managed and accessi-le, %hen and%here you need it& These are cloud infrastructures& The economies of scale,e5i-ility and e/ciency they o1er %ill not only sa0e organi;ations massi0e amountsof capital and maintenance costs -ut emancipate them to apply and use

  • 7/23/2019 Backdoor Encryptions Aff

    15/23

    information as ne0er -efore& An un-elie0a-le opportunity to raise producti0ity %hilecreating unprecedented opportunities for -usinesses and %orers& No% picture a health)care system %here a doctor has medical records at his 2ngertips, can see 5)rays %ith the clic of a mouse, is a-le to

    learn and apply the latest diagnostic and surgical techni?ue from any%here in the %orld& Thin of the e/ciencies in

    hospital supply chains, the deli0ery of prescription drugs, the processing of -illing and insurance claims, reductionsin fraud, and the application of -est practices for cost controls& The capacity for impro0ement is endless& As a

    matter of fact, these inno0ations are already -eing applied in isolated pocets& But for us to sei;e theopportunity -efore us it+s imperati0e that %e mo0e from isolated centers ofe5cellence to connected systems of e5cellence& 3ic any industry and systemic impro0ements liethese are a0aila-le& A ne% age of inno0ation and technology ad0ancement is %ithin ourgrasp P an opportunity for o- creation, greater producti0ity and economic gro%th&

    The time for cloud computing is no%& 9e need go0ernment and industry toaccelerate -road scale adoption of cloud infrastructures so %e can reap the re%ardsof a true information -ased economy & As I said at the outset, Americans respond %ell in a crisis& It isthe nature of our society egalitarian, free, open and competiti0e that mae us the most adapti0e, in0enti0e and

    resilient country in the %orld&Time again for us to lead&

    US economic gro#th is vital to prevent multiple scenarios forcon,ict escalation and etinctionKaas* C)8 president* 931>

    (ichard, 7The 9orld 9ithout America8, $)6)#6, http%%%&proect)syndicate&orgcommentaryrepairing)the)roots)of)american)po%er)-y)richard)n))haass*

  • 7/23/2019 Backdoor Encryptions Aff

    16/23

    the need to halt the spread of #eapons of mass destruction, 2ght climate change, andmaintain a functioning %orld economic order that promotes trade and in0estment toregulatingpractices in cy-erspace, impro0ing glo-al health, and pre0enting armed

    con,icts&These pro-lems %ill not simply go a%ay or sort themsel0es out& 9hile Adam

    Smith+s 7in0isi-le hand8 may ensure the success of free marets, it ispo%erless in the %orld of

    geopolitics& .rder re?uires the 0isi-le hand of leadershipto formulate and reali;eglobal responses to glo-al challenges& >on+t get me %rong None of this is meant to suggest that the UScan deal e1ecti0ely %ith the %orld+s pro-lems on its o%n& Unilateralism rarely %ors& It is not ust that the US lacs the means: the

    0ery nature of contemporary glo-al pro-lems suggests that only collecti0e responses stand a good chance of succeeding& But

    multilateralism is much easier to ad0ocate thanto design and implement& ight no% there

    is only one candidate for this rolethe US& No other countryhas the necessary

    com-ination of capa-ility and outloo& This -rings me -ac to the argument that the US must put itshouse in orderP economically, physically, socially, and politically P if it is to ha0e theresourcesneeded to promote order in the #orld& =0eryone should hope that it doesThe alternati0eto a%orld led -y the US is not a %orld led -y 4hina, =urope, ussia, Japan, India, or any other

    country, -utrather a %orld that is not led at all& Such a %orld %ould almost certainly -e characteri;ed

    -ychronic crisis and con,ict& That %ould -e -ad not ust for Americans, -ut for the0ast maority of the

    planet+s inha-itants&

    Scenario 9 @ 7arming

    US broadband leadership is (ne no#* but eroding

    competitiveness #ill stagnate innovation@ that collapse the

    economy and the internet of things

    7ilson et al L1!

    3hil, >irector, Technology, edia and Telecommunications [ >eloitte, 7UnitedStates e5pands glo-al lead in mo-ile -road-and Eo% policy actions could enhanceor imperil America+s mo-ile -road-and competiti0eness,8http%%%&deloitte&comassets>com)UnitedStatesocumentsTTZusZtmtusZtmtZmo-ileZinde5XZ!#$&pdf

    3ast performance is no guarantee of future successThus far, theUnited States has -ene2tedtremendously from its leadership position in mo-ile -road-and& Eo%e0er, the futurecould -edi1erent from the past F for -etter or %orse& >eloitte+s o-ile 4ommunications NationalAchie0ement Inde5 can ser0e as a useful tool for estimating future ranings under di1erent policy scenarios&

    Although the o-ile 4ommunications National Achie0ement Inde5 demonstrates a nation+s past and presentpositioning in mo-ile -road-and, it can also -e used on a for%ard)looing -asis to help policymaers understand

    ho% mo-ile -road-and performance might e0ol0e under di1erent policy scenarios& As illustrated in =5hi-it $,

    di1erent policies are liely to a1ect U&S& performance in distinct %ays, resulting in shifting ey performanceindicator (K3I* 0alues that collecti0ely result in a di1erent inde5 score& Cor e5ample, policies that a1ect -road-and

    supply %ill indirectly ha0e an impact on pricing, a1orda-ility, and usage& Supply restrictions %illnecessarily lead to higher e?uili-rium pricing per unit of use and lo%er e?uili-rium usage& This in turna1ects the potential for industry returns, reducing in0estment le0els and inno0ation& T%o contrasting inde5

    scenarios pro0ide a useful picture of ho% U&S& supply policy can a1ect America+s a-ility to defend its mo-ile

    -road-and leadership position By considering t%o supply scenarios F a 7fa0ora-le8 scenario in %hich U&S& policy

    actions and timing are su/cient and supporti0e to meet America+s supply needs and an 7unfa0ora-le8 scenario in%hich policy actions are insu/cient or unsupporti0e F %e can proect plausi-le outcomes in U&S& mo-ile -road-and

    glo-al competiti0eness o0er the coming decade&! A gro%ing inde5 score edge fa0oring the United

  • 7/23/2019 Backdoor Encryptions Aff

    17/23

    States o0er other countries %ould indicate the United States is achie0ing e5ceptional glo-alperformance gro%th -y inno0ating and capturing 0alue from the gro%ing consumer and -usiness usesof mo-ile -road-and& A declining edge %ould indicate ust the opposite, reducing themoti0ation and incenti0e for mo-ile -road-and in0estment to o% into the UnitedStates and into the mo-ile -road-and industry& Gven ifAmerica+s lead is reduced -ut not lost,

    other countries might -e a-le to o0ertae the United States in certain mo-ile-road-and segments -y capitali;ing on their inherent ad0antages&Cor e5ample, a country%ith a strong pu-lic health system could use that ad0antage to lead inno0ation in the area of mEealth and capture

    a disproportionate share of performance gro%th in that segment& These t%o di0ergent policy directions %ould ha0esu-stantial -ut opposite e1ects on the industry+s a-ility to meet demand F e1ects that can -e ?uanti2ed using the

    mo-ile -road-and ey performance indicators& By assuming other countries continue their current mo-ile

    -road-and actions and trends, %e can isolate the inuence of U&S& policy actions and estimate America+s a-ility tofend o1 glo-al competitors in mo-ile -road-and under -oth scenarios& Scenario # A fa0ora-le and supporti0e policy

    approach ena-les su/cient mo-ile -road-and supply In this 2rst scenario, spectrum of suita-le ?uantityand ?uality is made a0aila-le to %ireless carriers in a timely manne r \ uch or alla0aila-le spectrum is auctioned o1 %ithin the ne5t three to 20e years, helping to ensure that the total amount of

    spectrum is su/cient to consistently meet demand o0er the decade& \ Spectrum -ands are of su/cient ?uality,

    accounting for factors such as fre?uency range, -loc si;e, national co0erage, and international alignment& \ Sharedspectrum contri-ution to supply is properly accounted for, factoring in impairments from sharing constraints& \

    Terms and conditions for spectrum access and use are maret)oriented, %ith limited regulatory restrictions&

    .utcome o-ile -road-and spectrum supply matches demand, ena-ling the United States to strengthen and

    e5tend its mo-ile -road-and lead Under these conditions , U&S& policy pro0ides spectrum thatresponds tomo-ile -road-and supply needs , creatingcommercial incenti0es andin0estment returnsthat promotecontinued inno0ationand e5pansion in the use of mo-ile-road-and& The additional supply allo%s %ireless carriers to continue o1ering ro-ust and compelling ser0ice to

    consumers and -usinesses& \ A0aila-le performance le0els (e&g&, data speeds, capacity, relia-ility, co0erage, and

    latency* spur additional in0estment and inno0ation -y %ireless carriers and across the -roader mo-ile ecosystem& \

    any mo-ile ecosystem companies participate in and contri-ute to this gro%th opportunity, spanning areas such asnet%or infrastructure and operational support systems, de0ices, operating systems, and applications& \

    4onsumer and -usiness uses gro% as ser0ice performance remains strong andecosystem inno0ation creates compelling ne% o1erings , manifested in ne% de0ices ,applications, and ser0ices& The %ireless ecosystem and industries %ith em-edded

    %ireless solutions (e&g&, automoti0e telematics, mKealth, and m4ommerce* gain fromthe strong home 2eld ad0antage of U&S& mo-ile -road-and leadership&The U nitedS tates enoys e5port ad0antages from the resulting inno0ations and ne% -usinessmodels and is a-le to capture a gro%ing share of glo-al 0alue in therespecti0e maretsegments& As illustrated in =5hi-it O, these com-ined performance impro0ements %ould liely position the UnitedStates to sustain its lead in the near term and %ithin a decade e0en e5tend its lead to nearly match the le0els of the

    early s& Scenario An unfa0ora-le or insu/cient policy approach results in the mo-ile -road-and maret

    -eing throttled -y supply shortages In this second scenario, su/cient spectrum is not madea0aila-leto %ireless carriers in a timely manner \The total amount of spectrum lags demandF auctions are further delayed and allocated spectrum is insu/cient& \ Spectrum -ands are of lesser ?uality (e&g&,

    higher fre?uencies, smaller -locs, limited national co0erage, and less international alignment than in scenario #*& \

    A su-stantial amount of ne% spectrum is shared, and the shared spectrumis incorrectly assumed to-oost supplynearly as much as e5clusi0e spectrum& \ Terms and conditions for spectrum access and use are

    restricti0e and prescripti0e, limiting the a-ility of maret mechanisms to alle0iate supply shortages& .utcome>emand e5ceeds supply, mo-ile -road-andperformance su1ers, and the U&S& leadershipposition erodesIn this scenario, the policies enacted and e5ecuted in the United States are not su/cient to meetmo-ile -road-and supply needs, leading to a shortfall relati0e to rising demand& \ o-ile -road-and -ecomes less

    ro-ust and relia-le as locali;ed performance issues (e&g&, reduced speeds, increased latency and outages* increase

    in -oth geography and time& \ 9ireless carriers must focus their e1orts and resources on alle0iating the spectrum

    and supply shortfalls, siphoning in0estments a%ay from ne% products and ser0ices& \ 3rices rise in order to eepdemand from e5ceeding supply, dampening consumer and -usiness use of mo-ile -road-and and limiting

    purchases of the latest generation de0ices and applications& \ =cosystem in0estment and inno0ation in the United

    States are reduced as in0estors pursue opportunities in more attracti0e countries and industries& \ 9ireless

  • 7/23/2019 Backdoor Encryptions Aff

    18/23

    ecosystems and mo-ile)ena-led industries in other countries gain ad0antages o0er U&S& companies in inno0ationand e5ports& U&S& e5ports su1er& As sho%n in =5hi-it R, the United States %ould liely maintain its leadership

    position for the ne5t fe% years thans to momentum from current capa-ilities and performance le0els& Eo%e0er,

    mo-ile -road-and supply and performance shortfalls %ould soon -egin to tae their toll, causing the U&S& lead toshrin o0er the latter half of this decade& By the U&S& lead %ould -e modest at -est, %ith increasing challenges

    from competing countries that are gaining ground %ith positi0e trends in their mo-ile -road-and performance& The

    United States %ould -ecome ust one of se0eral targets for glo-al in0estment in mo-ile -road-and and %ould ris

    losing its leadership position to other countries& Supply shortagesleading to the Scenario outlooare plausi-le, as U&S& go0ernment actions to a0oid a shortage appear to -e falling-ehind Signi2cant progress has -een made -y the U&S& go0ernment to a0oid a supply shortage, -ut the collecti0eset of completed and planned actions appears to -e falling -ehind relati0e tothe o-ecti0es and timeta-leesta-lished in the # National Broad-and 3lan&6 The C44 and NTIA continue to pursue a 0ariety of initiati0es tore)allocate commercial or federal spectrum on an e5clusi0e or shared -asis, %ith the most nota-le action -eing the

    pending auction to re)allocate -roadcast TD spectrum& Eo%e0er, the United States appears to -e su-stantially

    -ehind schedule in achie0ing the stated #O o-ecti0e& As il lustrated in =5hi-it , current plans indicate that

    appro5imately OPRO E; of spectrum %ill -e ne%ly classi2ed, auctioned, or planned for auction for mo-ile-road-and use through #O, %hich at the lo%er range estimate is roughly three)fourths of the National Broad-and

    3lan #O goal& As important, # E; of spectrum or appro5imately one)fourth of the total 6!OP$6O E; planned

    or identi2ed to date is stipulated as shared)use, %hich due to the inherent nature of sharing %ill not -e e?ui0alent insupply 0alue to e5clusi0ely licensed spectrum& It is also %orth emphasi;ing the comple5ity of U&S& spectrum

    allocations, most of %hich reect decisions made during the t%entieth century, and the time delays that can result

    in maing spectrum a0aila-le after it has -een designated for commercial use& eclaiming or sharing spectrum formo-ile use is especially di/cult and time)consuming, %ith some federal agencies indicating that it %ill tae up to a

    decade to mo0e their operations out of the designated -ands&6 >e0eloping economies ha0e fe%er challenges in

    this regard, and thus ha0e the potential to mae progress at the e5pense of the United States& 9hether 0ie%edfrom the U&S& or glo-al perspecti0e, Scenario is a disconcerting yet plausi-le outloo& U&S& mo-ile -road-and

    leadership is -y no means assured&Eo% policy actions could enhance or imperil America+s mo-ile -road-and

    competiti0eness # If the U&S& leadinmo-ile -road-and is erodedor lost, it could result insubstantial damage to U.S. economic development and tech nology

    leadershipApplying industry)speci2c multipliers to estimate the U&S& economicimpact of reduced capital e5penditure -y carriers, a mo-ile -road-and spectrum supplyshortage could resultin a direct loss of MO billion in 0

    !!*333 ?obsthrough &6 Eo%e0er, the indirect and induced impacts of a mo-ile -road-and supplyshortage on other industries might -e more signi(cant& o-ile -usiness

    applications are already used e5tensi0ely in nearly e0ery industry and are -ecomingincreasingly indispensa-le for standard -usiness acti0ities& Curther, e0en as human useof mo-ile data continues to e5pand, it pales in comparison to anticipated gro%th inthe "Internet of Things 8F much of %hich %ill -e %irelessly ena-led& Bullish industryforecasts include an estimate of R -illion installed Internet of things units -y , impacting the glo-al supply

    chain, and a prediction of $ -illion connected de0ices glo-ally -y #R, resulting in a Y#& trillion impact to NorthAmerican economies from re0enues, cost reductions, or ser0ice impro0ements&6! If the United States mo-ile

    -road-and position -ecomes diminished and %ea, it could create opportunities for other countries to gain traction

    in areas of the mo-ile)ena-led Internet of Things& .ther countries, -y tapping into their uni?ue assets orcharacteristics F such as a higher population density or a leading pu-lic infrastructure F could o0ertae the United

    States in speci2c industries or applications such as telematics& mEealth, m4ommerce, or m

  • 7/23/2019 Backdoor Encryptions Aff

    19/23

    'nternet innovation is key to solve climate change @ better than

    any kind of energy production

    Cro#e -1!

    Taylor, %rites for The otley Cool focusing on the energy industry, 7The 'nternet of

    Things Jur 0reatest Shot at +attling Climate Change,8 Ce-& #O, #$,http%%%&fool&comin0estinggeneral#$#Othis)technology)is)our)only)real)shot)at)addressin&asp5

    achine to machine communication, or the internet of things, ison the precipice of taingthe %orld -y storm& At its 0ery core, machine to machine communication is the a-ility to connecte0erything,I mean e0erything, through a 0ast net%or of sensors and de0ices %hich can communicate %itheach other& The possi-ilities of this technological e0olution span an immensely %ide spectrum: ranging from

    monitoring your health through your smartphone, to your house no%ing %here you are to adust lighting andheating&

    The %ay that the internet of things could re0olutioni;e our li0es can -e hard to conceptuali;e all at once&So today let+s focus on one place %here machine to machine communication could have an immense

    impact Gnergy consumption& Not only could this technology mae turning the lightson easier, -ut it could -e the key to us eFectively managing anthropogeniccarbon emissions .

    egardless of your thoughts and opinions on climate change and the scope of ho% much car-on emissions a1ects

    the glo-al atmosphere, %e all can agree on one thing =mitting less car-on is a good thing, especially if it can -e

    done %ithout impeding economic gro%th& Cor years, the -attleground for the climate change de-ate has -een onthe energy generation side, pitting alternati0e energy options lie %ind and solar against fossil fuels& The pro-lem

    %ith 25ating on this side of the argument, though, is that e0en under the most am-itious outloosfor alternati0e energy gro%th, %e %ill never -e a-le to get car-on emissions -elo%the threshold many thin is re$uired to pre0ent signi(cant temperaturechanges o0er the ne5t century&

    >oes that mean there's no shotat signi2cantly reducing car-on emissions No)) #eEre ?ustfocusing on the #rong sideof the energy e?uation, and that is %here machine to machinecommunications comes into play&

  • 7/23/2019 Backdoor Encryptions Aff

    20/23

    estimatesthat the incorporation of machine)to)machine communicationin the energy,transportation, -uilt en0ironment (its fancy term for -uildings*, and agriculture sectors could reduceglo-algreenhouse gas emissionsby Q.1 gigatons of CJ9 e$uivalent annually& ThatEs 1R.9

    trillion pounds, or e$uivalent to eliminating all of theUnited States' and 'ndiaEs

    totalgreenhouse gasemissions combined, and more than triple the reductions %e can

    e5pect %ith an e5tremely am-itious alternati0e energy con0ersion program&Eo% is this possi-le Increased communication -et%een e0erything)) engines, appliances,generators, automo-iles )) allo%s for instant feed-ac for more e/cient tra0el routes,optimi;ed fertili;er and %ater consumption to reduce deforestation, real&timemonitoringof electricity consumption and instant feedback to generators, andfully integrated heating, cooling, and lighting systems that can adust for human occupancy&

    There are lots of proections and estimates related to car-on emissions and climate change, -ut the one that hasemerged as the standard -earer is the amount of car-on emissions it %ould tae to increase glo-al temperatures -y

    degrees 4entigrade& According to the UN's =n0ironment 3rogramme, annual anthropological greenhouse gas

    emissions %ould need to decrease -y #OX from recent le0els to eep us under the car-on atmospheric le0els&Based on current emissions and the ! gigaton estimate from 4ar-on 9ar oom'sreport, it #ould be enough to reduce global emissions by 1R.*%ell #ithinthe range of the UNEs pro?ections .

    7arming is real* anthropogenic* and threatens etinction

    ichard SchiFman Q9O1>, en0ironmental %riter [ The Atlantic citing the CifthIntergo0ernmental 3anel on 4limate 4hange, 79hat 4* -ased in Boulder %ould lead %ith "I344 #6, Similar Corecasts, Better 4ertainty&" 9hile the report,%hich is issued e0ery si5 to se0en years, o1ers no radically ne% or alarming ne%s, Scam-os told me, it puts an e5clamation pointon %hat %e already no%, and re2nes our e0ol0ing understanding of glo-al%arming&MThe I344 ,the indisputa-le roc star of UN documents, ser0es as the -asis for glo-al climate negotiations, lie the ones thattoo place in Kyoto, io, and, more recently, 4openhagen& (The ne5t -ig international climate meeting is scheduled for #O in 3aris&* It isalso argua-lythe most elaborately vetted and ehaustively researched scienti(c paper in

  • 7/23/2019 Backdoor Encryptions Aff

    21/23

    eistence.Counded in #! -y the United Nations and the 9orld eteorological .rgani;ation, the I344 represents thedistilled %isdom of o0er R climate researchers in 6 countrieson changes in the =arth+satmosphere, ice and seas& It endea0ors to ans%er the late Ne% @or mayor =d Koch+s famous ?uestion 7Eo% am I doing8 for all of us& The ans%er, %hich

    %on+t surprise anyone %ho has -een follo%ing the climate change story, is not 0ery %ell at all& M It is no% Q2 percent likelythat human spe%ed heat)trapping gases F rather than natural 0aria-ility F are themain cause of climate change, according to today+s report& In the I344+s con2dence le0el %as ! percent, and in # it%as RR percent, and ust o0er O percent in #!!O& M 9hat+s more, things are getting %orse more $uickly thanalmost anyone thought %ould happen a fe% years -ac&M 7If you loo at the early I344 predictions -acfrom #!! and %hat has taen place since, climate change is proceeding faster than %e e5pected,8 ann told me -y email& ann helped de0elop thefamous hocey)stic graph, %hich Al Hore used in his 2lm 7An Incon0enient Truth8 to dramati;e the sharp rise in temperatures in recent times& M ann

    cites the decline of Arctic sea ice to e5plain 7Hi0en the current traectory, %e're on trac for ice)freesummer conditions in the Arctic in a matter of a decade or t%o&&& There is a similar story %ith thecontinental ice sheets, %hich are losing ice F and contri-uting to sea le0el rise F at a faster rate than the earlier I344V models had predicted&8M But thereis a lot that %e still don+t understand& euters noted in a snea pre0ie% of I344 draft %hich %as leaed in August that, %hile the -road glo-al trends areclear, climate scientists %ere 72nding it harder than e5pected to predict the impact in speci2c regions in coming decades&8M Crom year to year, the %orld+s

    hotspotsare not consistent, -ut mo0e erratically around the globe&The same has -een true of heat %a0es,mega)storms and catastrophic oods, lie the recent ones that ra0aged the 4olorado Cront ange&There is -road agreement thatclimate change is increasing the se0erity of e5treme %eather e0ents,-ut %e+re not yet a-le topredict %here and %hen these %ill sho% up& M 7It is lie %atching a pot -oil,8>anish astrophysicist and climate scientist 3eter

    Thell told me& 79eunderstand %hy it -oils -ut cannot predict %here the ne5t -u--le %ill -e&8M There is alsouncertainty a-out an apparent slo%do%n o0er the last decade in the rate of air temperature increase& 9hile some critics claim thatglo-al %arming has 7stalled,8others point out that, %hen rising ocean temperatures arefactored in, the =arth is actually gaining heat faster than pre0iouslyanticipated&M 7Temperatures measuredo0er the short term are ust one parameter,8 said >r TimBarnett of the Scripps Institute of .ceanography in an inter0ie%& 7There are far more critical things going on: theacidi2cation of the ocean is happening a lot faster than any-ody thought that it%ould, it+s sucing up more 4., planton, the basic food chain of the planet,are dying, it+s such a hugely important signal& 9hy aren+t people using that as a measure of %hat is going on8MBarnett thins that recent increases in 0olcanic acti0ity, %hich spe%s smog)forming aerosols into the air that deect solar radiationand cool the atmosphere, mighthelp account for the temporary slo%ing of glo-al temperaturerise&But he says %e shouldn+t let short term uctuations cause us to lose sight of the -ig picture&M The dispute o0er temperatures underscores ustho% formida-le the I344+s tas of modeling the comple5ity of climate change is& Issued in three parts (the ne5t t%o installments are due out in the spring*,the full 0ersion of the I344 %ill end up se0eral times the length of &4& told me in an email& 79hat I344 has achie0ed is

    remara-le (and %hy it merited the No-el 3eace 3ri;e granted in *&8M Not surprisingly, the I344+s conclusions tend to -e7conservative -y design ,8Ken 4aldeira, an atmospheric scientist %ith the 4arnegie Institution+s >epartment of Hlo-al =cology toldme 7The I344 is not supposed to represent the contro0ersial forefront of climatescience& It is supposed to represents %hat nearly all scientists agree on, and it doesthat ?uite e1ecti0ely&8M Ne0ertheless, e0en these understated 2ndings are ine0ita-ly contro0ersial& oger 3iele Jr&, the >irector of the4enter for Science and Technology 3olicy esearch at the Uni0ersity of 4olorado, Boulder suggested a headline that focuses on the cat 2ght that today+sreport is sure to re0i0e "Cresh ed eat .1ered Up in the 4limate >e-ate, Acti0ists and Septics 4ontinue Cighting .0er It&" 3iele should no%& A critic ofAl Hore, %ho has called his o%n detractors "climate c4arthyists," 3iele has -een a lightning rod for the political contro0ersy %hich continues to s%irlaround the ?uestion of glo-al %arming, and %hat, if anything, %e should do a-out it& M The pu-lic+s septicism of climate change too a di0e after

    Eurricane Sandy& Cifty)four percent of Americans are no% saying that the e1ects of glo-al %arming ha0e already -egun& But $# percent sur0eyed in thesame Hallup poll -elie0e ne%s a-out glo-al %arming is generally e5aggerated, and there is a smaller -ut highly passionate minority that continues to

    -elie0e the %hole thing is a hoa5& M Cor most climate e5perts, ho%e0er, the -attle is long o0er F at least%hen it comes to the science& 9hat remains in dispute is not %hether climate change is happening, -ut ho% fast things are goingto get %orse&M There are some possi-ilities that are deli-erately left out of the I344 proections, -ecause %e simply don+t ha0e enough data yet to model

    them& Jason Bo5, a 0isiting scholar at the Byrd 3olar esearch 4enter told me in an email inter0ie% that 7The scary elephant in thecloset isterrestrial and oceanic methane releasetriggered -y %arming&8 The I344 proections don+t include the possi-ilityF some scientists say lielihood F that huge ?uantities of methane (a greenhouse gas thirty times as potent as 4.* %ill e0entually -e released from

    tha%ing permafrost and undersea methane hydrate reser0es& Bo5 said that the threshhold 7%hen humans lose controlof potential management of the pro-lem, may -e sooner than e5pected&8M Bo5, %hose %or

  • 7/23/2019 Backdoor Encryptions Aff

    22/23

    has -een instrumental in documenting the rapid deterioration of the Hreenland ice sheet, also -elie0es that the latest I344predictions(of a ma5imum ust under three foot ocean rise -y the end of the century* may turn out to -e %ildlyoptimistic, if the Hreenland ice sheet -reas up& 79e are heading into uncharted territory8he said& 77eare creating a diFerent climate than the Garth has ever seen.8 M The head of the I344,aendra 3achauri, speas for the scienti2c consensus %hen he says that time is fast running out to a0oid the

    catastrophic collapse of the natural systems on #hich human life depends .9hat

    he recently told a group of climate scientist could -e the most chilling headline of all for the U&N& report M B7e have (ve minutes

    before midnight.B

    The plan restores trust in U.S. companies by prohibiting

    attacks on encryption.

    Vehl et al. 1!F >anielle Kehl, Senior 3olicy Analyst at the .pen TechnologyInstitute at the Ne% America Coundation, holds a B&A& in Eistory from @ale

    Uni0ersity, %ith Ke0in Banston, 3olicy >irector at the .pen Technology Institute atthe Ne% America Coundation, former Senior 4ounsel and >irector of the Cree=5pression 3roect at the 4enter for >emocracy G Technology, former Senior Sta1Attorney at the =lectronic Crontier Coundation, former Justice 9illiam Brennan CirstAmendment Cello% at the American 4i0il & from theUni0ersity of Southern 4alifornia & from Eofstra Uni0ersity School of emocracy and Technologyon the riss of %iretap modi2cations to endpoints concludes that 7deployment of an intercept capa-ility in&&&communications ser0ices, systems and applications poses serious security riss&86OR The authors add that 7on

    -alance mandating that endpoint soft%are 0endors -uild intercept functionality into their products %ill -e much

    more costly to personal, economic and go0ernmental security o0erall than the riss associated %ith not -eing a-le

    to %iretap all communications&86O 9hile NSA programssuch as SIHINT =na-lingFmuch lie proposals fromdomestic la% enforcement agencies to update the 4ommunications Assistance for

  • 7/23/2019 Backdoor Encryptions Aff

    23/23

    agencies ha0e the a-ility to intercept Internet communications, they do so at ahuge cost to online security overall& Because of the associated security riss,the U&S& go0ernment should not mandate or re?uest the creation of sur0eillance-acdoors in products , %hether through legislation, court order, or theleveraging industry relationships to con0ince companies to 0oluntarily insert

    0ulnera-ilities& As Bello0in et al& e5plain,

    complying %ith these types of re?uirements %ould

    also hinder innovation and impose a 7ta8 on soft%are de0elopment in addition tocreating a #hole ne# class of vulnerabilities in hard%are and soft%are thatundermines the overall security of the products&6O! An amendment o1ered to the N>AA forCiscal @ear #O (E&& $$6O* -y epresentati0es Woe )4A* and ush Eolt (>)NJ* %ould ha0e prohi-ited

    inserting these inds of 0ulnera-ilities outright&6RThe AA, a similar amendment sponsored -y

    )9I* and Thomas assie ()K@*, did mae it into theEouse)appro0ed 0ersion of the N>AAF%ith the support of Internet companies and pri0acy organi;ations6RF

    passing on an o0er%helming 0ote of !6 to #6&6R6