Академический Документы
Профессиональный Документы
Культура Документы
Neg
A2: Tyranny.............................................................................................. 57
DA Links...................................................................................................... 58
CMR......................................................................................................... 59
Terrorism.................................................................................................. 61
UN CP.......................................................................................................... 63
1NC.......................................................................................................... 64
2NC Solvency Cards.................................................................................65
Solvency Answers
This Article will expand the Symposiums dialogue on law, information technology, and national security
in two ways: first, by examining the intersection of those three subjects through the optic of public
international law versus domestic statutes, regulations, or case law; and second, by providing broader
A
global perspective on these issues is essential because no single nations
declaratory policy or legal interpretations will be binding on the
international community. Moreover, law will be but one factor in
determining how nation-states ultimately manage cyber conflicts
among themselves in the future.
context for the related legal and policy challenges that are simultaneously confronting many countries.
and punishment.
susceptible to cost-imposing measures. Defense in cyber conflict is a critical part of cyber deterrence. It
includes strategic and tactical warning, situation awareness, cyber order-of-battle, and the collection,
retention, and analysis of cyber incident forensics. Cyber force is quite unlike conventional and nuclear
force. It can be soft in its effects, extended in time, and cumulative in its impact. Cyber attacks are not
simply to be seen as the equivalent of strategic bombing without aircraft or missiles. An important
element of cyber defense will be real-time control of network connectivity. The cyber security problem
arises from connectivity. Control of connectivity will be part of the solution. Shared voluntary private
efforts can contribute to cyber situation awareness and can provide a useful element of real-time cyber
No Effective Check
Congress cannot effectively enforce the declaration
cant appropriately check the executive.
Lorber 2013(Eric, J.D. Candidate at the University of Pennsylvania Law
School, and Ph. D candidate at Duke University, January, "Executive
Warmaking Authority and Offensive Cyber Operations: Can Existing
Legislation Successfully Constrain Presidential Power?, Journal of
Constitutional Law, Vol. 15:3)
even if the
President had to report offensive cyber operations to Congress, it is
unclear he would have to do so in a way that gave Congress an
effective check, as these reports would be made only to a small group of Congressmen (who would
is undefined) and only to a small number of Congressmen (at most eight).235 Thus
not be able to share the information, because of its classified nature, with other members of the
The resulting
picture is one of increased presidential flexibility; the War Powers
Resolution and the Intelligence Authorization Actwhile arguably
ineffective in many circumstancesprovide increased congressional
oversight of presidential war-making actions such as troop
deployments and covert actions. Yet these statutes do not cover
offensive cyber operations, giving the President an increasingly
powerful foreign policy tool outside congressional reach.
legislature) and could be done well after the employment of these capabilities.
existing laws of
already
provided the necessary framework for protecting civilians, even
though the line between civilian and military infrastructure is
blurred.
civilian targets. In response, a CSIS participant reverted to the view that the
armed conflict, including the need for proportionate response and discrimination in targeting,
Zendia may
be seen by the Zendian government as a cyber first strike against it. Yet another
as planning to strike those targets; for many years, the Pentagon maintained worst-case-scenario plans for
resemblance to Obamas case for the use of drone strikes, which he articulated in a recent speech. Drones,
he argues, are justified on the one hand by the need to remove impending national security threats and,
on the other, by the fact that all other options would be much costlier. Of course, as with drone strikes,
preemptive cyber attacks risk collateral damage and mistakenly targeting someone who was not actually a
threat. The document does not appear to reference any planned or recent attacks. But the most famous
U.S. cyber attack is of course Stuxnet, the virus developed and deployed in conjunction with Israel to set
back Irans nuclear program. The virus was a remarkable success, sending Iranian centrifuges spinning out
of control, before it began spreading across the Internet by mistake, ultimately outing the program.
Stuxnet appears consistent with the contours of a cyber doctrine hinted at in these documents. It was
meant to preempt an impending national security threat Irans nuclear program worked in secret and
was certainly offensive. It was part of a larger effort that included diplomacy, sanctions and the threat of
physical strikes. Its also worth noting what Stuxnet was not: a revenge attack meant to punish Iran. The
virus was meant to work in secret; ideally, the Iranians were not even to know it had been deployed.
Similarly, the Obama administration has insisted that it deploys drone strikes only against people who pose
an ongoing threat to the U.S. rather than as revenge strikes. (Many critics of the drone program doubt
would counter the growing threat of foreign hackers by, essentially, scaring them away from even trying.
This would mean developing offensive cyber capabilities that could be used to hit back at hackers who
attempt to breach U.S. systems and then making sure that foreign hackers understand theyre putting
themselves at risk by even trying. In this way, offensive cyber capabilities would be kind of like nuclear
weapons, which exist primarily to deter adversaries from using their weapons first. After all, preemptive
cyber attacks might be able to slow Iranian centrifuges but theyre much less suited to, say, shutting down
Chinese military hackers. Nor are simple cyber defenses up to that task; because foreign hackers risk little
in trying to tap into sensitive U.S. servers; merely building more protections is only going to extend the
time it takes them to finally succeed. This is why many U.S. companies already want to develop hacking
back capabilities, something that is forbidden under U.S. law.
tool. Rather, they are an integral part of the coordinated national security effort that includes diplomatic,
economic and traditional military measures. Offensive cyber actions, outside of war
zones, would still require a higher level of scrutiny from relevant
agencies and generally White House permission.
http://www.washingtonpost.com/world/national-security/obama-signs-secretcybersecurity-directive-allowing-more-aggressive-militaryrole/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html)
repeated efforts by officials to ensure that the Cyber Command
has that flexibility have met with resistance sometimes from within the
Pentagon itself over concerns that enabling the military to move
too freely outside its own networks could pose unacceptable risks . A
But
major concern has always been that an action may have a harmful unintended consequence, such as
That might include a cyberattack that wipes data from tens of thousands of computers in a major industrial
administration officials said. We always want to be taking the least action necessary to mitigate the
threat, said one of the senior administration officials. We dont want to have more consequences than we
intend.
operations include the full gamut of digital command and control arrangements for strategic nuclear
forces, we probably could use some explanation form Panetta whether this pre-emptive capacity and policy
affects the nuclear deterrence calculation of potential adversaries of the United States, such as China, or a
country like Russia, which while less likely to be an adversary, still maintains a large military nuclear force.
China will be looking to Panetta to offer some clarifications on this in the talks he discussed in his speech.
Panetta said he underscored the need to increase communication and transparency on both sides.
can ignore the rules and sayhell, they are sayingWere not carrying out cyber attacks.
Were victims, too. Maybe youre the attacker. Or maybe its Anonymous.
Wheres your proof? Even if all sides were genuinely committed to
limiting cyberwar, as all sides were in 1939, weve seen that the logic of airpower
eventually drove all sides to the horror they had originally recoiled
from. Each side felt that it had observed the limits longer than the
other. Each had lawyerly justifications for what it did, and neither understood or gave credence to the
others justifications. In that climate, all it took was a single error to break the
legal limits irreparably. And error was inevitable. Bombs dropped by desperate
pilots under fire go astray. But so do cyber weapons. Stuxnet infected thousands of
networks as it searched blindly for Natanz. The infections lasted far longer than intended. Should
we expect fewer errors from code drafted in the heat of battle and
flung at hazard toward the enemy? Of course not. But the lesson for the lawyers and
the diplomats is stark: Their effort to impose limits on cyberwar is almost
certainly doomed. No one can welcome this conclusion, at least not in the United States. We
have advantages in traditional war that we lack in cyberwar. We are not used to the idea that launching
even small wars on distant continents may cause death and suffering here at home. That is what drives
we want
to defend against the horrors of cyberwar, we need first to face
them, with the candor of a Stanley Baldwin. Then we need to charge our military
strategists, not our lawyers, with constructing a cyberwar strategy for the
world we live in, not the world wed like to live in . That strategy
needs both an offense and a defense. The offense must be powerful
enough to deter every adversary with something to lose in
cyberspace, and so it must include a way to identify our attacker
with certainty. The defense, too, must be realistic, making successful cyber attacks more difficult
and less effective because we have built resilience and redundancy into our infrastructure. Once we
have a strategy for winning a cyberwar, we can ask the lawyers for
their thoughts. We cant do it the other way around.
the lawyers. They hope to maintain the old world. But theyre driving down a dead end. If
We tend to believe them. To those of us who grew up in the early decades of the Internet, reading William
Gibson and watching Tron, the idea of a distinct and tangible cyberspace, as Mr. Gibson coined it, seems
believable. If war is hell in meatspace, then imagine what it will be like when it moves into the online
world, where all our communications and private data are stored, where the machines that control our
online virus was used by Israel and the United States to disable a uranium-enrichment facility in Iran.
China uses a facility to steal data from the West. France, Britain and the United
States, as weve recently learned, are mass-harvesting the online communications and phone calls of
foreigners (and possibly their own citizens), and the man who revealed this, Edward Snowden, is in the
midst of a globe-trotting flight across the settings of vintage James Bond movies. If this is what cyber cold
war looks like, how horrid would real cyberwars be? We can imagine them, and make movies about them,
but the reality is far more mundane and less threatening. Thats the
model were to be something like the treaties signed between the United StatesNATO and the Soviet
Union Warsaw Pact, which limited certain classes of weapons and banned others, there is little basis for
hope. 1 If, instead, the goal were a framework of international agreements and norms that could raise the
diffi- culty of certain types of cyberattacks, some progress can be made. Why is it nearly impossible to limit
is inherently impossible (like making advanced mathematics illegal). The same holds for banning
knowledge about vulnerabilities. Third, banning attack code is next to impossible .
Such code has many legitimate purposes, not least of which is in building defenses against attack from
storage capacity is immense; much of it is legitimately encrypted; and besides, bad code does not emit
telltale odors. If an enforcement entity could search out, read, and decrypt the entire database of the
Exhuming digital
informa- tion from everyone elses systems is hard enough when the
authorities with arrest powers try it; it may be virtually impossible
when outsiders try. The only barely feasible approach is to ban the activity of writing attack
world, it would doubtless find far more interesting material than malware.
code, then hope that the fear of being betrayed by an insider who goes running to international authorities
prevents governments from organizing small groups of elite hackers from engaging in such nefarious
hospitals).
capability to cross these norms would be problematic.
If so, brandishing a
states have little knowledge of exactly what weapons, as such, are in the arsenal of their rivals. 13 Indeed,
if they actually knew precisely what weapons their foes had, they
might well know what vulnerabilities such weapons targeted and
would fix such vulnerabilities, thereby nullify-ing these weapons. Second, as noted, the
best response to an offensive weapon is a defensive weapon, not
another offensive weapon. Third, the whole notion of offense-versusoffense requires that the underlying dynamic of attack and
retaliation actually makes sense as a warfight-ing and wartermination strategy. Were that so, deterrence would be primary. But
deterrence is a very difficult notion in cyberspace. 14 States wanting to hide their own
tracks in a cyberattack have a wealth of ways to do so and, often,
more than enough motive. Incidentally, it is hard to imagine how an
arms race in cyberspace could come close to having a major
economic impact. The intellectual skills required to compete in this
contest are so specialized that states will run out of such people well
before they run out of money paying them.
Looking
powerful is the more efficient option. It induces caution in actual or
potential opponents. The demonstration does not have to be
repeated for each one. Looking large also serves to deflect potential
attackers away from one state toward others. Finally, there is glory in it;
success reflects well on other sources of national power. But concentrating
instead on exposing another states weaknesses also has its virtues. It serves to deter
troublesome states by reminding them of their vulnerabilities . It also
communications campaign, it may help to decide what to emphasize in such a campaign.
deflects the accusations of self-promotion (look at how powerful I am) by turning the focus toward
others. After all, a state shown to be vulnerable to one attacker in cyberspace may be presumed
vulnerable to others. Even if the state retaliates, its systems will still be vulnerable and perceived as such.
making the result obvious beforehand is unnecessary. In fact, it may be unwise if the first demonstration
makes the next one harder to accomplish. Thus, proving a system was, is, and will stay hacked may be
impossible. However, the hint of an attack leaves no specific trace and hence no specific fix. Even if
system owners react to rumors by making general fixes, such as selective disconnection or the installation
of anti-malware guards, there will be nothing that suggests which of these general fixes worked.
never reveal the techniques of this or that manipulation but just ensure there are enough hints out there
there is no good idea how the attack was carried out or at least what vulnerability was exploited to enable
Even if the targets of the attack (e.g., the Iranians) cannot figure out what was done or how it was done
(e.g., Stuxnet), there may be others who can (e.g., the Belarus firm, VirusBlokAda). The number of
prominent attacks whose workings, notably penetration and propagation methods, remain a mystery is
small, perhaps zero. To be sure, certain attack methods, notably distributed denial of service, contain no
prospective, let alone retrospective, mystery as to how they work; they rely primarily on brute force.
Furthermore, anyone who follows the news will understand the ubiquity of hack-ing. It is no great
exaggeration to posit that any information of interest to a sophisticated state sitting on a system
connected to the Internet has long ago escaped. At this juncture, there are too many vulnerabilities
associated with web scripting (e.g., Java) and document-presentation programs to feel very secure.
systems to show their fragility (claiming responsibility is unnecessary; the point is to emphasize not U.S.
power but the vulnerability of the enemys network-centric systems). In other circumstances, making what
is vulnerable clear may be unnecessary, perhaps unwise. Every hack leads to fixes that make the next
exploitation much harder. But the hint of an attack that leaves no specific trace leaves nothing specific to
will throw up their hands, though. Some may reason that, because the effects of cyberattacks are
temporary and difficult, their systems can survive the initial exchange and recover for subsequent rounds.
So, they pursue high technology and ignore the demonstrated possibility that high-technology military
campaigns might last days rather than months or years. A subtler counterstrategy is to network
warfighting machines (configured not to touch the Internet) and forget about networking people; isolation
avoids some of the pesky vulnerabilities arising from human error (notably those associated with
authentication, such as pass words and tokens). Or they simply renounce network-centric warfare and
conclude that they avoided the pitfalls of depending on technology.
A2: CyberwarHype
Cyber war doesnt happentheir evidence is all hype
Gartzke 2012(Erik, University of California, San Diego, December 7, "The
Myth of Cyberwar: Bringing War on the Internet Back Down to Earth",
http://dss.ucsd.edu/~egartzke/papers/cyberwar_12062012.pdf)
A blitz of media, punditry and public pronouncements inform
interested observers and policy makers that the next war is likely to
be won or lost on the internet. Indeed, events such as the coordinated
cyber attacks on Estonia and the Stuxnet worm seem to indicate
that cyberwar has already begun. The sense of urgency surrounding cyberwar appears
to be tied to perceptions that internet conflict is the newest phase in the ongoing revolution in military
affairs, only this time the threat is directed at the sophisticated technological civilizations of the West,
To
believe a growing number of pundits and practitioners, cyberwar
threatens to render existing military advantages impotent , exposing those
rather than at poor developing states or the recipients of inferior second-world military hardware. 1
way, advocates have yet to work out how cyberwar actually accomplishes the objectives that typically
sponsor terrestrial military violence. Absent a logic of consequences, it is di cult to believe that cyberwar
will prove as devastating for world affairs and for developed nations in particular as many seem to believe.
limitations of cyberwar. No event in the twentieth century did more to realign U.S. public opinion,
mobilizing the nation psychologically for entry into the Second World War. The analogy may in fact be apt,
but almost certainly not in the manner imagined by the Secretary. The situation in 1941 actually serves as
assumption among many cyber-pessimists that the potential for creating harm is sufficient to make cyber
space a suitable substitute for, or at least an alternative to, terrestrial conflict is simply incorrect.
and with comparatively modest investment of tangible resources. Regardless, damage of this
type is sunk. Losses experienced over a given time interval cannot be recovered whatever one's reactions
and so should not have much direct impact on subsequent policy behavior. Harm inflicted over the internet
or through any other medium will matter politically when it involves changes to the subsequent balance of
power, or when it indicates enemy capabilities that must be taken into account in future plans.
even strategic, advantages. An opponent that cannot shoot, move, resupply or communicate will be easier
themselves prove pivotal in future war are reminiscent of World War I artillery barrages that cleared enemy
Whether an
actor can benefit from cyberwar depends almost entirely on whether
the actor is willing and able to combine a cyber attack with some
other methodtypically kinetic warfarethat can convert temporary
advantages achieved over the internet into a lasting blow. Internet attacks
trenches, but which still required the infantry and other arms to achieve a breakout.
thus other an assailant a soft kill that is valuable only when attackers intend and prosecute follow-on
attacks with traditional military force to permanently weaken an enemy.
nations would respond in an obliging manner. Few could doubt in retrospect that citizens and leaders on
both sides of the iron curtain felt vulnerable, especially during the early years of the post-World War II
period. It does not follow, however, that a heightened sense of insecurity was reflected in actual behavioral
conflict. Whether warfare in the cyber era will depart radically from previous patterns, or will mimic, in part
or in whole, conflictual politics from earlier eras, will depend on the degree to which the strategic logic of
cyberwar accommodates the objectives of political actors in contemplating or exercising coercion. Nor do
The
threatened use of force in this, and most other instances, is
intended to alter behavior through the prospect of long-term
damage. To the degree that harm can be quickly and easily repaired, there is not much leverage in
students of cyberwar seem much concerned with implications of Nixon's Hanoi bombing campaign.
such threats. Conversely, details injurious to attackers or to the effectiveness or potency of an attack are
typically concealed from an opponent, even when this information would significantly increase the
credibility of coercive threats. Flight plans, bomb loads and electronic countermeasures used by U.S. B-52s,
for example, were not shared with Hanoi, since this would have deeply compromised the capacity of U.S.
mechanisms. Force, or the threat of force, is useful as punishment to the degree that the harm imposed is
substantial and durable. Damage that can be quickly or easily undone will not do much to deter or compel,
but it will alert an enemy to vulnerabilities, and also antagonize an opponent, increasing the danger of
traditional modes of diplomatic, economic, and military competition ensure that these actors are exposed
A2: Cyberterror
No risk of cyberterroranonymity makes it useless
Gartzke 2012(Erik, University of California, San Diego, December 7, "The
Myth of Cyberwar: Bringing War on the Internet Back Down to Earth",
http://dss.ucsd.edu/~egartzke/papers/cyberwar_12062012.pdf)
the focus is on the potential for harm, while ignoring the
motives and operational logic of perpetrators. If internet anonymity
is awkward for targets of attacks, it is certainly also a problem for
initiators. Terrorists spend as much time trying to market their
exploits as they do fighting, bombing, assassinating, etc. Where anonymity
protects an aggressor from retribution, it also dilutes credit for the
deed. Vandals often tag their handiworkcreating an identity where none need existprecisely
Again
because anonymity has both advantages and drawbacks. Internet vandals also brand their exploits,
source that did not, or even was not capable of, mounting a cyber attack. As with the use of identifying
in cyber space also reflects a subtle but telling shift in framing. Libicki's simple calculus of deterrence, for
example, involves getting caught, something more often characteristic of crime than war. Some aspects
of international relations involve anonymity. Espionage, covert operations and certain kinds of political
theft or murder function most effectively when the perpetrators are unknown, or indeed when the
operations themselves remain undisclosed. Strategic or tactical advantage can also stem from anonymity
and surprise in terrestrial military missions, though nations and groups often sacrifice surprise and
advertise their role in contests in order to exercise advantages in the form of foreign concessions or tacit
or formal admission of defeat. How does one surrender to no one in particular? The advantage of
anonymity will persist for peripheral forms of warfare on the internet, just as it has played a role in
terrestrial competition and conflict. But most forms of warfare or potential warfare actually invite
disclosure of an initiator's identity. As I have already noted, coercion requires attribution, not of the target
but by the initiator. Similarly, threats designed to elicit concessions or deter aggression are already
problematic in physical space (Powell 1990, Nalebu 1991). This credibility problem mirrors the attribution
problem and is likely to make internet aggression all the more problematic for initiators.
play the lottery implies that the odds of winning are inversely tied to one's income. Indeed, the rise of
cyberterrorism may say more about the impotence of both agent and structure than about either in
latter activities as separate from national security, not because they are unimportant or fail to harm
is a form of compellence. Lacking the ability to impose their will on others, terrorists rely on the prospect of
harm to influence a target's behavior. Indeed, because their ability to harm is quite limited, the terrorist
relies on psychology (fear and uncertainty) to multiply the impact of relatively finite capabilities on
How terrifying is a cyber attack? No one will be happy when the power goes out or when one's bank
account is locked down, However, attacks of this type evoke feelings if anger, frustration, even resignation,
not terror. Terrorism relies on generating a particularly visceral emotion (the terror in terrorist), one that
is not often effected through the actions of cyber warriors, at least (again) not directly. The old journalistic
adage that if it bleeds, it leads, implies the need for graphic trauma and lurid imagery. The very
attributes that make cyberwar appealing in abstractthe sanitary nature of interaction, the lack of
exposure to direct harm, striking from a remote locationall conspire to make cyber terrorism less than
terrifying. White collar terrorists are unlikely to prove any more effective, perhaps less, at shaping hearts
and minds than the traditional model. This is even more the case with long-duration, low-intensity conflicts
that are a key component of both non-western attempts at resistance and western e orts to protect the
status quo international order. From the perspective of the insurgent, asymmetric warfare has never been
about attacking to diminish an opponent's strengths, but is instead focused on maximizing one's own
strengths by targeting the enemy's weaknesses (Mao 1961). Insurgency seeks out kinetic close physical
combat where sophisticated technology is at its least effective (and decisive). Damaging the technology
may draw an enemy into direct contact, but it might also cause that enemy to withdraw and reschedule
operations. Mobility dominates every battle field for this very reason. Internet attacks in the midst of close
contact make little sense as it is here that the comparative advantage of cyberwar (distance and
asymmetry) are least potent. The ability of internet-dependent armies to perform in superior ways on
existing dimensions means that this is generally a process of leveling, not revolution.
again enlarged, with congressional "revisionists" as "players on virtually every key issue of the day, in a
bipartisan foreign policy where formal and informal powers seamlessly intersected." n17 Because of strong
sentiments from the Republican leadership (and a relatively ineffectual Democratic leadership), several
factions of the Republican [*4] Party were permitted to continue their ideological goals to limit the spread
Congress
again reasserted its power in the mid-1970s. n19 The "new
internationalists," who had coalesced years earlier as critics of foreign aid policies that supported
anti-Communist regimes in the 1960s, challenged presidential supremacy during
the Vietnam War. n20 Stalwart Senators, including Stuart Symington, Edward Kennedy, John
of Communism, both at home and abroad. Riding in the wake of the "imperial presidency,"
Tunney, Dick Clark, Frank Church and members of the "Watergate class of 1974," led the charge with
legislation limiting covert assistance, convening hearings on human rights abuses and cutting off aid to
governments deemed reckless with power. n21 These idealistic changes prompted many to argue for more
transparency in national security affairs and the justification of American international actions to the
public, culminating in the War Powers Act of 1974 n22 that ostensibly limited formal presidential warmaking power. n23 The most dramatic of these post-Watergate moments, and central for purposes of
intelligence agencies) from 1975 to 1976 through the Senate Select Committee to Study Governmental
Operations with Respect to Intelligence Activity. The "Church Committee" (as it came to be known)
Intelligence Surveillance Act). n25 The Ford White House largely viewed the Committee as resultant from
the [*5] power shift during Watergate, suggesting emerging political energy (even if temporary) in the
legislative branch on foreign policy. n26 As is clear from these examples, this power-sharing relationship is
Republicans questioned the White House's blanket authority to detain prisoners, negotiated a compromise
on rules for trials for "enemy combatants." Under new rules, detainees have some expanded rights to fair
trials where the President is able to establish military tribunals without potential review from federal
courts. n27 In addition, while these legislative determinations give the executive more power to classify
military detainees,
we have witnessed this pattern of interbranch tension in similar past dramatic events: the Civil War, the
Great Depression, and Pearl Harbor (and now 9/11). All have pushed
the pressure points of political power. However, because of Constitutional design,
political energy among these American political institutions cannot be destroyed-only displaced. In truth ,
one branch can only absorb so much of this energy before the other
branches demand redistribution of these important shared powers.
Concerns over these inter-branch tensions are not new and distinct
patterns emerge governing how the relationship evolves over time;
scholars for generations have labored to describe the complicated
and tenuous relationship between the executive and legislative
branches. Woodrow Wilson, the most famous scholar and practitioner of the science, suggested in
branches of government. Interestingly,
Congressional Government that Congress was ill-equipped to legislate and the president must have a more
significant and formal role. n1 Corwin's prescient description of the separated powers as an invitation to
struggle, framed scholars' thinking about the Constitutional interaction between the presidency and
Congress. n2 Neustadt's concept of the president and the legislature as "separated institutions sharing
powers" intellectually echoed Corwin's [*2] finding. n3 He argued separated but shared powers sets the
stage for "that great game" where both sides must lobby and bargain with each other "much like collective
bargaining, in which each seeks to profit from the other's needs and fears."
that
without
providing Congress with a powerful tool to govern presidential use of force, bringing OCOs under the
War Powers Resolutions statutory umbrella likely would not provide the possibility of such oversight.
However, insofar as the President has increasingly turned to covert action since the passage of the War
Powers Resolution to avoid its reporting requirements,233 offensive cyber operations provide the
President another means by which to continue this trend .
number of
organizations,
order the launch of a Stuxnet-style attack against Iran to degrade its nuclear enrichment capability, such
an activity wouldassuming it was done with the Secretary of Defenses consent necessarily
constitute approval by the National Command Authority. In addition, because the definition of operational
planninganother element required in fulfilling the TMA exception to the definition of covert action is
so broad, such an attack would likely fall within its purview. The President would simply argue that
approval has been given for operational planning of future combat operations with Iran (which it almost
certainly has in the U.S. military)232 and therefore the activity was taking place in the context where
overt hostilities are anticipated. Indeed, only in a situation where no contingency planning has occurred
such as with an ally or a country that the United States takes little interestwould this exception not
apply. As a result, it becomes evident that even a Stuxnet-type of attack likely will not trigger the
requirements set forth in the Intelligence Authorization Act. Given the dual-hatted nature of many NSA
and CYBERCOM personnel, as well as the fact that action approved by the President and the Secretary of
Defense necessarily constitutes approval by the National Command Authority, all the executive branch
must realistically show is that it undertook the operation in a context where operational planning had
occurred for potential hostilities at some undefined point in the future. This hurdle is very low and the
executive should have little problem clearing it.
d States in the past. Now, however, due to proliferation of nuclear weapons and missile technology, they
can inflict damage at considerably higher levels and magnitudes than in the past. In addition, these
regimes may pursue proliferation of nuclear weapons and missile technology to other nations and to allied
terrorist organizations.
The threat of nuclear terrorism looms much larger in the publics mind than the threat of
a full-scale nuclear war, yet this article focuses primarily on the latter. An explanation is therefore in order
Station on a typical work day would likely kill some half a million people, and inflict over a trillion dollars in
direct economic damage. America and its way of life would be changed forever. [Bunn 2003, pages viii-ix].
weapons inspector in Iraq, estimates those odds at less than one percent, but notes, We would never
accept a situation where the chance of a major nuclear accident like Chernobyl would be anywhere near
1% .... A nuclear terrorism attack is a low-probability event, but we cant live in a world where its anything
proposed herein will include estimating the risk of nuclear terrorism as one component of the overall risk.
If that risk, the overall risk, or both are found to be unacceptable, then the proposed remedies would be
directed to reduce which- ever risk(s) warrant attention. Similar remarks apply to a number of other
threats (e.g., nuclear war between the U.S. and China over Taiwan). his article would be incomplete if it
only dealt with the threat of nuclear terrorism and neglected the threat of full- scale nuclear war. If both
risks are unacceptable, an effort to reduce only the terrorist component would leave humanity in great
World War iii The danger associated with nuclear deterrence depends on both the cost of a failure and
the failure rate.3 This section explores the cost of a failure of nuclear deterrence, and the next section is
concerned with the failure rate. While other definitions are possible, this article defines a failure of
deterrence to mean a full-scale exchange of all nuclear weapons available to the U.S. and Russia, an event
that will be termed World War III. Approximately 20 million people died as a result of the first World War.
World War IIs fatalities were double or triple that numberchaos prevented a more precise determination. In both cases humanity recovered, and the world today bears few scars that attest to the horror
of those two wars. Many people therefore implicitly believe that a third World War would be horrible but
survivable, an extrapola- tion of the effects of the first two global wars. In that view, World War III, while
horrible, is something that humanity may just have to face and from which it will then have to recover. In
contrast, some of those most qualified to assess the situation hold a very different view. In a 1961 speech
to a joint session of the Philippine Con- gress, General Douglas MacArthur, stated, Global war has
become a Frankenstein to destroy both sides. If you lose, you are annihilated. If you win, you stand
Defense Robert McNamara ex- pressed a similar view: If deterrence fails and conflict develops, the
present U.S. and NATO strategy carries with it a high risk that
destroyed
[McNamara 1986, page 6]. More recently, George Shultz, William Perry, Henry Kissinger,
and Sam Nunn4 echoed those concerns when they quoted President Reagans belief that nuclear
weapons were totally irrational, totally inhu- mane, good for nothing but killing, possibly destructive of
life on earth and civilization. [Shultz 2007] Official studies, while couched in less emotional terms, still
convey the horrendous toll that World War III would exact: The
35 to 77 percent (i.e., 79-160 million dead) a change in targeting could kill somewhere between 20
million and 30 million additional people on each side .... These calculations reflect only deaths during the
first 30 days. Additional millions would be injured, and many would eventually die from lack of adequate
medical care millions of people might starve or freeze during the follow- ing winter, but it is not
possible to estimate how many. further millions might eventually die of latent radiation effects.
[OTA 1979, page 8] This OTA report also noted the possibility of serious ecological damage [OTA 1979,
page 9], a concern that as- sumed a new potentiality when the TTAPS report [TTAPS 1983] proposed that
nuclear explosions and their resultant firestorms could usher in a nuclear winter that might erase homo sapiens
from the face of the earth, much as many scientists now believe the K-T Extinction that wiped
the ash and dust from so many nearly simultaneous
out the dinosaurs resulted from an impact winter caused by ash and dust from a large asteroid or comet
striking Earth. The TTAPS report produced a heated debate, and there is still no scientific consensus on
whether a nuclear winter would follow a full-scale nuclear war. Recent work [Robock 2007, Toon 2007]
megacities. While it is uncertain how destructive World War III would be, prudence dictates that we apply
the same engi- neering conservatism that saved the Golden Gate Bridge from collapsing on its 50th
anniversary and assume that
option.
extremist
desired by the Framers for the new country, today's United States is an international power targeted by
John Boyd, constitutional decision-making in the realm of war powers in the fourth generation should
In the era
of fourth-generational warfare, quick reactions, proceeding through
the OODA Loop rapidly, and disrupting the enemy's OODA loop are
the keys to victory. "In order to win," Colonel Boyd suggested, "we should operate at a faster
[*399] consider the implications of the OODA Loop: Observe, Orient, Decide, and Act. n144
tempo or rhythm than our adversaries." n145 In the words of Professor Creveld, "[b]oth organizationally
and in terms of the equipment at their disposal, the armed forces of the world will have to adjust
themselves to this situation by changing their doctrine, doing away with much of their heavy equipment
because the President is the leader of his or her political party, the
President can expect greater loyalty and discipline from party
members than occurred in previous eras. The result of this is that when the
Presidents party controls the Congress, he or she can proceed
virtually uncontested.84 Consequently, in an era of highly polarized
parties, there no longer exists the constitutional balance
purportedly fostered by separation of powers. Rather, the constitutional balance
becomes what Daryl Levinson and Richard Pildes term a separation
often are
SOP Fails
SOP fails- cant contain presidential power
Mansfield 11
[Harvey Mansfield is a professor of government at Harvard and a senior fellow at the Hoover Institution at
Stanford. http://www.nytimes.com/2011/03/13/books/review/book-review-the-executive-unbound-by-eric-aposner-and-adrian-vermeule.html?pagewanted=all ETB]
*Eric Andrew Posner is Kirkland and Ellis Professor of Law at the University of Chicago Law School
** Adrian Vermeule, John H. Watson, Jr. Professor of Law @ Harvard
has created a level of mutual disregard that would have been essentially unthinkable at any prior moment
It is not unprecedented
for one branch of government to chafe against restraints imposed by
others or even to undertake initiatives pressing the edges of its
constitutional prerogatives. The overall system has some capacity to
self-correct for such tensions. If, however, one looks at the historic points of greatest
in modern times. It is important to be clear on what is new about this.
tension among the branchesAndrew Jacksons battle against the National Bank, the impeachment of
Andrew Johnson, or the attempted court-packing of President Franklin Rooseveltthey have generally been
characterized by an impulse that is absent from the current trend. In refusing to sign legislation that would
recharter the Bank, Jackson was standing fast against an institution widely regarded as supporting the
interests of creditors against the interests of the more numerous, but less moneyed classes. Congress
enacted the Tenure in Office Act hoping to provoke Andrew Johnson into a violation of law that would
provide formal grounds for impeachment, but its plain motivation was Johnsons opposition to
Reconstruction, which Congress had helped impose in order to end white caste rule in the South. Roosevelt
proposed court-packing, an obvious challenge to the political independence of the Supreme Court, in
response to what he regarded as the Courts unwillingness to legitimate legislative and executive
measures designed to relieve the Depression and for which the elected branches enjoyed a popular
mandate. Thus, each of these earlier assaults on conventional ways of doing business was arguably in the
attempted service of more democracy. Even though checks and balances were compromised by such
earlier interbranch battles, the challenges to business as usual tended to be supportive of the very
aspirations for democratic legitimacy that checks and balances are also supposed to advance.
and courses at the intersection of law, democracy, and new media. Madisons Nightmare: How Executive
Power Threatens American Democracy. http://press.uchicago.edu/Misc/Chicago/749396.html ETB]
votes to override presidential vetoes would be automaticthat all members of Congress, on pain of
expulsion, would agree to override any presidential veto, irrespective of which members actually voted for
the original bill. Such a custom would have all but eliminated the Presidents capacity to influence the
design of legislation. Likewise, what if Presidents automatically pardoned all criminal defendants of their
particular party or Congress decided that judges who rendered unpopular decisions were, for that reason
alone, guilty of a high crime or misdemeanor, warranting removal from office? Such practices would
have enervated what we now think of as judicial independence. When we bring these possibilities to mind,
Constitution that gives life to the documents underlying purposes. We can call this web of attitudes,
beliefs, and practices our constitutional culture.
Affairs, Jan/Feb)
Finally, some will object that the weakness of the presidency as an institution is
not the main explanation for the inadequacies of American
diplomacy, even if it is a secondary one. The ad hominem school of thought argues
instead that Bill Clinton and his advisers have simply been incompetent. Others make various sociological
claims that isolationism or multiculturalism lies at the root of America's diplomatic troubles. All of these
arguments may have merit.
commentators, notably Samuel Huntington and Garry Wills in these pages, have attacked the arrogance of
America's presumption to offer moral leadership to the world. But American leaders resort to moral
rhetoric largely out of weakness. They fear that their policy will be blocked unless they generate moral
momentum powerful enough to overcome domestic opponents. Likewise, critics point to the hypocrisy of
the United States on the world stage. America seeks U.N. endorsement when convenient but is slow to pay
its U.N. dues; America practices legal abortion at home but denies funds to organizations that do the same
abroad. Again, this hypocrisy has everything to do with the weak executive .
Burton sanctions on Cuba even though he knew that these would do disproportionate harm to U.S.
relations with Canada and Europe. What if America's nonexecutive presidency is indeed at the root of its
diplomatic inadequacy? First, it follows that it is too optimistic to blame America's foreign policy drift on the
weak character of the current president.
Those arguing against primacy claim that the U nited S tates should
retrench, either because the U nited S tates lacks the power to maintain its
primacy and should withdraw from its global commitments, or because the maintenance of primacy will lead the United
States into the trap of "imperial overstretch." In the previous issue of The National Interest, Christopher Layne warned of these
dangers of primacy and called for retrenchment.(FN1) Those arguing for a grand strategy of retrenchment
are a diverse lot. They include isolationists , who want no foreign military commitments; selective
engagers , who want U.S. military commitments to centers of economic might; and offshore balancers ,
who want a modified form of selective engagement that would have the United States abandon its landpower presence abroad in favor of
relying on airpower and seapower to defend its interests.
must be avoided . If the United States adopted such a strategy, it would be a profound
strategic mistake that would lead to far greater instability and war in
the world, imperil American security and deny the United States and its allies the benefits of primacy. There are two critical
issues in any discussion of America's grand strategy: Can America remain the dominant state? Should it strive to do this? America can remain
dominant due to its prodigious military, economic and soft power capabilities. The totality of that equation of power answers the first issue.
The United States has overwhelming military capabilities and wealth in comparison to other states or likely potential alliances. Barring some
disaster or tremendous folly, that will remain the case for the foreseeable future. With few exceptions, even those who advocate retrenchment
Proponents of
retrenchment focus a great deal on the costs of U.S. action--but they fail to realize what is good
about American primacy. The price and risks of primacy are reported in
acknowledge this. So the debate revolves around the desirability of maintaining American primacy.
newspapers every day; the benefits that stem from it are not.
A GRAND
strategy of ensuring American primacy takes as its starting point the protection of the U.S. homeland and American global interests. These
Thus, it is no surprise to see NATO in Afghanistan or the Australians in East Timor. In contrast, a strategy based on retrenchment will not be
able to achieve these fundamental objectives of the United States. Indeed,
S tates less secure than the present grand strategy of primacy. This is because threats
will exist no matter what role America chooses to play in
international politics . Washington cannot call a "time out",
and
it
cannot hide from threats. Whether they are terrorists , rogue states
or rising powers , history shows that threats must be confronted .
Simply by declaring that the United States is "going home", thus abandoning its
commitments or making unconvincing half-pledges to defend its interests and
allies, does not mean that others will respect American wishes to retreat . To
make such a declaration implies weakness and emboldens
aggression . In the anarchic world of the animal kingdom, predators prefer to eat
the weak rather than confront the strong. The same is true of the anarchic world of international
politics. If there is no diplomatic solution to the threats that confront the United States, then the conventional and strategic military power of
enemies overseas , away from American soil. Indeed, a key tenet of the Bush Doctrine is to attack terrorists far from
America's shores and not to wait while they use bases in other countries to plan and train for attacks against the United States itself. This
requires a physical, on-the-ground presence that cannot be
achieved by offshore balancing .
primacy is
all of the major economic and military powers. That is a ratio of almost 17 to one
(85 to five), and a big change from the Cold War when the ratio was about 1.8 to one of states aligned with the United States versus the Soviet
through the
in contrast to the UN's inability to save the people of Darfur or even to conduct any military campaign to realize the goals of its charter. The
quiet effectiveness of the PSI in dismantling Libya's WMD programs and unraveling the A. Q. Khan proliferation network are in sharp relief to
the typically toothless attempts by the UN to halt proliferation. You can count with one hand countries opposed to the United States. They
are the "Gang of Five": China, Cuba, Iran, North Korea and Venezuela. Of course, countries like India, for example, do not agree with all policy
choices made by the United States, such as toward Iran, but New Delhi is friendly to Washington. Only the "Gang of Five" may be expected
and refrains from openly challenging U.S. power . China proclaims that it will, if necessary,
resort to other mechanisms of challenging the United States, including asymmetric strategies such as targeting communication and
than China. For three of the "Gang of Five" cases--Venezuela, Iran, Cuba--it is an anti-U.S. regime that is the source of the problem; the country
itself is not intrinsically anti-American. Indeed, a change of regime in Caracas, Tehran or Havana could very well reorient relations.
been a more peaceful world . During the Cold War, U.S. leadership reduced
friction among many states that were historical antagonists, most notably France and West Germany.
Today, American primacy helps keep a number of complicated relationships
aligned-- between Greece and Turkey, Israel and Egypt, South Korea
and Japan, India and Pakistan, Indonesia and Australia . This is not to say it fulfills
Woodrow Wilson's vision of ending all war. Wars still occur where Washington's interests
are not seriously threatened, such as in Darfur, but a Pax Americana does
reduce war's likelihood , particularly war's worst form : great power
wars. Second, American power gives the United States the ability to spread
democracy and other elements of its ideology of liberalism. Doing so is a source of much good for the countries
concerned as well as the United States because, as John Owen noted on these pages in the Spring 2006 issue, liberal
democracies are more likely to align with the U nited S tates and be
sympathetic to the American worldview.(FN3) So, spreading democracy helps maintain U.S. primacy.
In addition, once states are governed democratically , the likelihood of any
type of conflict is significantly reduced. This is not because democracies do not have clashing
interests. Indeed they do. Rather, it is because they are more open, more transparent and
more likely to want to resolve things amicably in concurrence with
U.S. leadership. And so, in general, democratic states are good for their citizens as well as for advancing the interests of the
United States. Critics have faulted the Bush Administration for attempting to spread democracy in the Middle East, labeling such an effort a
modern form of tilting at windmills. It is the obligation of Bush's critics to explain why democracy is good enough for Western states but not for
the rest, and, one gathers from the argument, should not even be attempted. Of course, whether democracy in the Middle East will have a
peaceful or stabilizing influence on America's interests in the short run is open to question. Perhaps democratic Arab states would be more
opposed to Israel, but nonetheless, their people would be better off.
democracy to Afghanistan, where 8.5 million Afghans, 40 percent of them women, voted in a critical October 2004
election, even though remnant Taliban forces threatened them. The first free elections were held in
Iraq in January 2005. It was the military power of the United States that put Iraq on the path to democracy. Washington
fostered democratic governments in Europe, Latin America, Asia and
the Caucasus. Now even the Middle East is increasingly democratic. They may not
yet look like Western-style democracies, but democratic progress has been made in Algeria, Morocco,
Lebanon, Iraq, Kuwait, the Palestinian Authority and Egypt. By all accounts, the march of democracy has been impressive. Third, along with
growth in the number of democratic states around the world has been the
growth of the global economy . With its allies, the U nited S tates has labored to
the
witness to the failed alternative economic systems, Lal is one of the strongest academic proponents of American primacy due to the economic
prosperity it provides. Fourth and finally, the United States, in seeking primacy, has been willing to use its power not only to advance its
makers a sharp focus and prudence concerning how they wield American power. Equally, all Americans should be aware of the benefits that
the
scholars who are proclaiming that the sky is falling, primacy is
doomed and America must retrench have to confront the reality of
U.S. power. The world is a long way from seeing the end of American
flow from primacy and that they enjoy. While primacy's advantages and costs must be weighed objectively and solemnly,
It seems
impossible to explain the forbearance of the elected branches from
substantially curtailing federal jurisdiction in such controversial
areas as abortion, school prayer, or desegregation unless we regard
that self-restraint as a sign of our elected officials allegiance to the
near inviolability of the judicial function as conveyed by Article III of
the Constitution. This is what I mean by a habit or a norm of
deference. A second factor is a common belief in the legitimacy and
necessity of active, problem-solving government. Frequently, even amid
deep policy disagreement between the executive and legislative
branches, public policy compromises emerge in the solution of public
problems because both elected branches are committed to
demonstrating their capacity to respond in some constructive way to
public challenges. Powerful examples from the 1990s include tax and budget reform under President George
a category of cases in which Congress, for a political standpoint, would probably prefer judicial silence.
H. W. Bush and welfare reform under President Clinton. In each case, an ideologically reluctant President went along with
congressional initiative out of a felt imperative to respond to a widely perceived public problem and to share in the credit
significantly evident in President Clintons judicial nominating strategy, in which he worked with a Republican-controlled
Senate to confirm potential judges who were notably centrist in their views, and in the Republican Congresss 1996
enactment of line-item veto authority, which threatened to empower a Democratic President, but which was perceived to
example, is divided into two houses, which must concur in a legislative proposal in order that it be enacted. The length of
terms and the geographical basis of representation is different in the two houses, which, originally, were also selected by
different methods. The judiciary consists of a Supreme Court and lower courts through which legal interpretation evolves
in a highly formal, multivocal way. Article III of the Constitution gives those judges who officiate over the courts authorized
by that article lifetime tenure, insuring that, at any given moment, the judiciary is populated by judges whose prejudicial
careers exhibit a variety of ideological and political predispositions. Even the constitutional text describing the executive
branch, the most unitary of the three branches, contemplates that the President may seek advice from the heads of
departments. Deliberation was an intended feature of the new government through and through.
Government
lawyers, if they perform their jobs well, play a central role in maintaining the ethos
of deliberation that was the Framers hope. Decision making is most effectively
deliberative if it involves a wide variety of perspectives, each shedding light on whatever issue is under discussion. In
formal deliberative settings, such as an argument before the Supreme Court or debates on the floor of Congress,
contending perspectives are literally embodied in different human beings, all physically present and asserting their
various points of view. Decisions within the executive branch, however, are most frequently made in a potentially more
insulated environment. The only voices literally present in a particular policy conversation may be those of a high-level
presidential appointee, some lower-level presidential appointees, and civil servants who are most directly accountable to
these presidential appointees. In such settings, it would require some form of special self-discipline for those immediately
involved in the decision to actually concern themselves with perspectives and interests other than the partisan agenda
they likely all share. This is especially so for the vast majority of decisions that will never be reviewed in Congress because
they are too low-visibility and that will never be reviewed in court because they do not affect the specific interests of
identifiable individuals in a way that would ordinarily entitle them to call those decisions into question through litigation.
critical function of the law in operation the law as embodied for the
to make
manifest the range of interests and concerns that would not
otherwise be vigorously articulated when key decisions are made. It
is precisely in this way that the rule of law is a fundamental day-today check on the spirit of faction in government affairs . Executive branch
Seen in this light, a
executive branch in judicial opinions rendered by the courts and statutes enacted by Congressis
lawyers, residing in every agency of government, make this check real because they advise on virtually every important
administrative decision and focus decision makers attention on whatever law is relevant. When the executive branch in
2009 attends, for example, to the Voting Rights Act of 1965 or the 1969 National Environmental Policy Act or the Supreme
Courts 1974 decision in United States v. Nixon, the Administration can, in a sense, hear the multiple voices of earlier
times that themselves had to reach consensus in order to create binding public policy. These voices are virtually, even if
not physically present, and their recognition can serve as a buffer against the more immediate passions of partisanship or
she]argued against a rigidly pure separation of powers, prefering instead some intermixing of powers to
legislative authority requires that it should be thus divided, the weakness of the executive may require, on
the other hand, that it should be fortified." Madison defended this in Federalist No. 51 by arguing in favor
of giving the President a qualified veto, i.e., a veto that Congress can override.
http://www.geocities.com/kidhistory/ja/nucsex.htm
The nation "turns inward" during this depressed phase of the cycle.
Empirical studies have clearly demonstrated that major economic
downswings are accompanied by "introverted" foreign policy moods,
characterized by fewer armed expeditions, less interest in foreign
affairs in the speeches of leaders, reduced military expenditures,
etc. (Klingberg, 1952; Holmes, 1985). Just as depressed people experience little conscious rage--feeling "I deserve to be killed" rather
than "I want to kill others" (Fenichel, 1945, p. 393)--interest in military adventures during the
depressed phase wanes, arms expeditures decrease and peace
treaties multiply.
entry (civil conflict between Hamas and Fatah in the Palestine) predates the economic crisis by a year, and three quarters of the chronic
struggles began in the last century. Ditto for the 15 low-intensity conflicts listed by Wikipedia (where the latest entry is the Mexican "drug war"
begun in 2006). Certainly, the Russia-Georgia conflict last August was specifically timed, but by most accounts the opening ceremony of the
Beijing Olympics was the most important external trigger (followed by the U.S. presidential campaign) for that sudden spike in an almost two-
and Afghanistan-bleeding-into-Pakistan), our involvement elsewhere around the planet has been quite modest, both leading up to and
following the onset of the economic crisis: e.g., the usual counter-drug efforts in Latin America, the usual military exercises with allies across
the emergence of new nuclear powers (despite all that diplomacy); * A modest scaling back of international policing efforts by the system's
things we can cite are Moscow's occasional deployments of strategic assets to the Western hemisphere and its weak efforts to outbid the
United States on basing rights in Kyrgyzstan; but the best include China and India stepping up their aid and investments in Afghanistan and
Iraq.) Sure, we've finally seen global defense spending surpass the previous world record set in the late 1980s, but even that's likely to wane
given the stress on public budgets created by all this unprecedented "stimulus" spending. If anything, the friendly cooperation on such
stimulus packaging was the most notable great-power dynamic caused by the crisis. Can we say that the world has suffered a distinct shift to
political radicalism as a result of the economic crisis? Indeed, no. The world's major economies remain governed by center-left or center-right
political factions that remain decidedly friendly to both markets and trade. In the short run, there were attempts across the board to insulate
there was no
great slide into "trade wars." Instead, the World Trade Organization is functioning as it was designed to
economies from immediate damage (in effect, as much protectionism as allowed under current trade rules), but
function, and regional efforts toward free-trade agreements have not slowed. Can we say Islamic radicalism was inflamed by the economic
crisis? If it was, that shift was clearly overwhelmed by the Islamic world's growing disenchantment with the brutality displayed by violent
extremist groups such as al-Qaida. And looking forward, austere economic times are just as likely to breed connecting evangelicalism as
establishing global regulatory schemes, even as it has sparked a spirited -- and much needed, as I argued last week -- discussion of the
Frankly, I don't welcome a world in which America's fiscal profligacy goes undisciplined, so bring it on -- please! Add it all up and it's fair to say
that this global financial crisis has proven the great resilience of America's post-World War II international liberal trade order. Do I expect to
read any analyses along those lines in the blogosphere any time soon? Absolutely not. I expect the fantastic fear-mongering to proceed apace.
That's what the Internet is for.
Would these concessions to executive interpretive autonomy leave us naked before a Chief Executive
prone to self-aggrandizement? Do we jeopardize the Rule of Law once we allow the President this leeway to
apply the Constitution as he, not the Court, sees it? I think not. Protection would come from several
immunities, Article I bodies - were created or endorsed by courts. Similar patterns of presidPresidents
ential deference should be encouraged. n342 [*848] For instance, might proceed cautiously in areas
where no other institution is likely to review their interpretation. It may be appropriate to expect Presidents
A2: Tyranny
Democratic checks prevent their impact from escalating
OKane 1997 (Modernity, the Holocaust, and politics, Economy and Society, February, ebsco)
Chosen policies cannot be relegated to the position of immediate condition (Nazis in power) in the
play the greatest part, whether in effecting bureaucratic secrecy, organizing forced labour, implementing a
system of terror, harnessing science and technology or introducing extermination policies, as means and
the history of each case plays an important part in explaining where and how genocidal governments
come to power and analysis of political institutions and structures also helps towards an understanding of
independent firms, each with their own independent bureaucracies, exist in competition with state-
capacity for people to move between organizations whether economic, political, scientific or social,
Bauman overlooks crucial but also very ordinary and common attributes of truly modern societies.
It is
allows ample opportunity for correction of judicial mistakes and arrogance. Although it is true that under
the representational principle Congress ought never be forced to correct the courts except in rare cases of
good-faith judicial error, Professor Redish has not demonstrated that an active judicial role in interpreting
and applying statutes violates separation of powers.
DA Links
CMR
The military has empirically backlashed to encroachment
upon the ability to conduct offensive cyber operations.
Gjelten 13 (Tom, Correspondent for NPR, First Strike: US Cyber Warriors
Pentagon rolled out its defensive cyber strategy, Schwartz was clearly suggesting an offensive
domain of warfare , alongside land, air, sea, and space. As the 2011 cyber strategy noted,
that designation allows DoD to organize, train, and equip for cyberspace as we do in air, land, maritime,
and space to support national security interests. That statement by itself contradicted any notion that the
parameters of conventional
my adversary with great impact ," Mills declared. "I was able to get inside his nets, infect
his command and control, and in fact defend myself against his almost constant incursions to get inside
matured.
civilians, Lord said. This will require new core competencies, new ways to acquire stuff at the speed of
Terrorism
U.S. cyber operation mobility is key to solve terrorism
Brennan 2012(John, Lieutenant Cololel, March 15, "United States Counter
Terrorism Cyber Law and Policy, Enabling or Disabling?",
http://nsfp.web.unc.edu/files/2012/09/Brennan_UNITED-STATES-COUNTERTERRORISM-CYBER-LAW-AND-POLICY.pdf)
Even at the onset of the war against terrorism during the early days
of the Bush Administration, the threats posed from cyberspace were
duly recognized--and the responses to cyber threats to U. S. National
Security were publicly stated. In his 2003 National Strategy to Secure Cyberspace,
President Bush proclaimed that, When a nation, terrorist group, or other adversary attacks the United
States through cyberspace, the U. S. response need not be limited to criminal prosecution. The United
States reserves the right to respond in an appropriate manner.17 As time has passed, the same tact can
be seen in President Obamas International Strategy for Cyberspace, where he similarly refers to Article 51
states
have an inherent right to self defense that may be triggered by
certain aggressive acts in cyberspace.18 One would assume that this declaration
of the U. N. Charter in the cyber realm by stating, Consistent with the United Nations Charter,
applies to international terrorists who use the internet for malevolent purposes. Both strategies clearly
imply that an attack on the United States from cyberspace could lead to a wide range of responses-- not
excluding kinetic military operations. Additionally, in his 2011 National Strategy for Counterterrorism,
President Obama states that, together with our partners, we will degrade the capabilities of alQaidas
local and regional affiliates and adherents, monitor their communications with al-Qaida leaders, drive
fissures between these groups and their bases of support, and isolate al-Qaida from local and regional
Given that alQaida and its adherents communicate voluminously from within
cyberspace, it is inferred that in order to disrupt their
communications and isolate the organizations, the U. S. Government
should exercise its inherent right to self-defense as stated in Article 51 of the
United Nations Charter, and attack al-Qaida from within cyberspace.20 The
opportunities to adversely impact terrorist organizations through
the use of cyber operations are limited only by the imaginations of
its executors, and they can be accomplished with only a few key strokes. Classic military doctrine
affiliates and adherents who can augment its capabilities and further its agenda. 19
would label such activities as deception, defined by DoD as: Actions executed to deliberately mislead
adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby
causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of
the friendly mission. 21 Intercepting al Qaida digital communications and modifying them in order to
obtain possible locations of its members is potentially a highly effective CT tactic. Unfortunately, due to the
current state of play that is promulgated by current cyber policies, executing this type of action in
Afghanistan requires the approval of a major general.22 Although most international terrorists do not
typically disclose their personal information on social media sites, they do, however; use social media
(albeit using pirated or anonymous accounts) and thereby leave their digital fingerprints in cyberspace.
http://nsfp.web.unc.edu/files/2012/09/Brennan_UNITED-STATES-COUNTERTERRORISM-CYBER-LAW-AND-POLICY.pdf)
Although indentifying international terrorists in cyberspace is critical to successful counterterrorism
Monitoring terrorists
electronic communications is extremely important, but further work
is required by the CT community to isolate, and eventually kill or
capture the terrorists overseas. Manipulation or disruption of a
terrorist organizations computer networks is a potential means to
this end, and it is also a possible tactic that is employed to preempt a
cyber or kinetic terrorist attack. 37 The laws that govern the actual
manipulation of terrorists electronic accounts and devices in order
to make them more targetable, are not explicit or simply do not
exist. The primary document that gives the President of the United States the authority to conduct
operations, it is only half of the battle in bringing them to justice.
offensive CT cyber operations overseas is the 2001 Authorization of the Use of Military Force, which gives
the president the authority to use all necessary and appropriate force to protect the country for further
al Awlaki (an American citizen) in Yemen, and was invoked in permitting the planned (but not executed)
computer network attack against his online magazine, Inspire. 39
UN CP
1NC
The United Nations should pass a resolution banning the
preemptive use of large-scale offensive cyber operations.
International agreements are the best way to deter
cyberwar fosters norms that constrain conduct.
Beidleman 9 (Scott, Lieutenant Colonel with the US Air Force, Defining
international law builds the framework that guides how and when
states employ offensive and defensive cyber capabilities and forms
the foundation of cyber deterrence . International law adds
certainty to punitive actions and amplifies the costs of cyber attack by
engendering a negative response from the international community ,
not just from the attacked state. Moreover, it adds credibility to the threat of
reprisal by providing legitimacy to retaliatory actions and by
increasing the potential to isolate the aggressive state . Also,
international law provides a measure of protection to states that
lack robust defensive and offensive cyber capabilities and serves as
their first and possibly only line of deterrence.
The U.S. should lead a multilateral effort in conjunction with the UN to adapt the existing international
regime of laws and norms governing warfare to address aggression in cyberspace, or build a new regime
United Nations effort to establish an institution to serve as a clearinghouse and coordination center
them.116
and paves the way to peace . And even if they're breached, the world
is safer because the treaties exist .