encryption affirmative - michiganclassic 2015.docx
TRANSCRIPT
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
1/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
2/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
3/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
4/209
http://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Era
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
5/209
http://www.theguardian.com/commentisfree/2015/jul/05/encryption-humans-weakest-linkhttps://en.wikipedia.org/wiki/Clipper_chiphttp://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isishttp://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terrorhttp://catless.ncl.ac.uk/Risks/28.75.html#subj1http://catless.ncl.ac.uk/Risks/28.75.html#subj1http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html?_r=0http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.htmlhttp://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=allhttp://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=allhttp://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-datahttp://outlook.com/http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.htmlhttp://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
6/209
http://beta.congress.gov/bill/113th-congress/house-bill/2818?q=surveillance+state+repealhttp://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?pagewanted=allhttp://articles.washingtonpost.com/2013-09-06/business/41831756_1_encryption-data-centers-intelligence-agencieshttp://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?pagewanted=all&_r=0#p%5BFalFal%5Dhttp://www.wired.com/2013/09/nsa-backdoored-and-stole-keys/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
7/209
https://www.bestvpn.com/blog/7521/nsa-breaks-undermines-many-kinds-encryption-mean-vpn/http://www.ecommercetimes.com/story/81530.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
8/209
https://www.aclu.org/blog/washington-markup/should-companies-be-forced-enable-surveillance-and-compromise-securityhttps://www.aclu.org/blog/washington-markup/should-companies-be-forced-enable-surveillance-and-compromise-securityhttp://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
9/209
https://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trusthttps://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trust
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
10/209
http://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htmhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htmhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
11/209
http://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
12/209
http://www.reed.edu/http://www.ox.ac.uk/http://www.wadham.ox.ac.uk/http://www.arstechnica.com/http://www.lexisnexis.com/https://www.nytimes.com/2013/05/08/us/politics/obama-may-back-fbi-plan-to-wiretap-web-users.html?ref=charliesavage&gwh=1377579C1399D3E4F15415DAEA8AF52Bhttps://www.eff.org/issues/caleahttps://en.wikipedia.org/wiki/Voice_over_IPhttps://action.eff.org/o/9042/p/dia/action3/common/public/?action_KEY=9252https://pressfreedomfoundation.org/http://www.theguardian.com/commentisfree/2014/oct/17/government-internet-backdoor-surveillance-fbi
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
13/209
http://insidersurveillance.com/will-apple-ios8-encryption-spur-demand-lawful-intercept/http://insidersurveillance.com/will-apple-ios8-encryption-spur-demand-lawful-intercept/http://dailycaller.com/2014/10/20/fbi-asks-congress-for-backdoor-access-to-all-cellphones-for-surveillance/http://dailycaller.com/2014/10/20/fbi-asks-congress-for-backdoor-access-to-all-cellphones-for-surveillance/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
14/209
http://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
15/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
16/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
17/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
18/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
19/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
20/209
http://www.broadcastingcable.com/news/washington/bill-would-prevent-surveillance-back-doors/137722
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
21/209
http://go.galegroup.com.proxy.lib.umich.edu/ps/i.do?p=ITOF&u=lom_umichanna&id=GALE%7CA402050594&v=2.1&it=r&userGroup=lom_umichanna&authCount=1http://go.galegroup.com.proxy.lib.umich.edu/ps/i.do?p=ITOF&u=lom_umichanna&id=GALE%7CA402050594&v=2.1&it=r&userGroup=lom_umichanna&authCount=1https://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
22/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
23/209
http://www.thedailybeast.com/articles/2014/07/03/it-s-time-to-shut-the-nsa-s-backdoor-used-to-spy-on-americans.htmlhttp://www.thedailybeast.com/articles/2014/07/03/it-s-time-to-shut-the-nsa-s-backdoor-used-to-spy-on-americans.htmlhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
24/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
25/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
26/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
27/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
28/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
29/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
30/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
31/209
http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
32/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
33/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
34/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
35/209
http://dspace.mit.edu/handle/1721.1/97690http://dspace.mit.edu/handle/1721.1/97690http://www.infoworld.com/article/2897302/security/security-guru-bruce-schneier-your-privacy-is-already-gone.htmlhttp://www.infoworld.com/article/2609941/encryption/welcome-to-the-era-of-encryption-by-default.htmlhttp://www.infoworld.com/article/2667414/security/crypto-stars-sound-off-on-e-voting--drm.htmlhttp://www.infoworld.com/article/2619425/endpoint-protection/cryptography-pioneer--we-need-good-code.htmlhttps://en.wikipedia.org/wiki/Clipper_chip
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
36/209
http://www.infoworld.com/article/2609307/encryption/report-on-nsa--secret--payments-to-rsa-fuels-encryption-controversy.htmlhttp://www.cio.com/article/2944913/fbi-chief-warns-that-terrorists-hide-behind-encrypted-communications.htmlhttp://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
37/209
http://www.ibtimes.com/us-suffers-massive-data-breach-hackers-take-information-millions-federal-workers-1953526http://www.ibtimes.com/us-suffers-massive-data-breach-hackers-take-information-millions-federal-workers-1953526
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
38/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
39/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
40/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
41/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
42/209
https://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjainhttps://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
43/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
44/209
http://www.latimes.com/opinion/opinion-la/la-ol-fbi-encryption-apple-google-smartphones-20141017-story.htmlhttp://www.latimes.com/opinion/opinion-la/la-ol-apple-ipod-lawsuit-drm-competition-20141205-story.htmlhttp://www.latimes.com/opinion/opinion-la/la-ol-apple-ipod-lawsuit-drm-competition-20141205-story.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
45/209
http://www.dailydot.com/tags/police/http://www.dailydot.com/politics/opm-fbi-hack-files/http://www.dailydot.com/politics/ron-wyden-profile-senate-privacy-surveillance-reform/http://www.dailydot.com/tags/ron-wyden/http://www.dailydot.com/tags/china/http://www.dailydot.com/tags/cyberattacks/http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/http://spectrum.ieee.org/telecom/security/the-athens-affairhttp://news.bbc.co.uk/2/hi/business/5367754.stmhttps://en.wikipedia.org/wiki/Clipper_chiphttp://www.crypto.com/papers/eesproto.pdfhttp://www.dailydot.com/tags/avengers/http://www.dailydot.com/tags/age-of-ultron/http://www.dailydot.com/politics/opm-hack-house-hearing/http://engineering.jhu.edu/magazine/2014/05/guru-cyber-cryptography/http://wayback.archive.org/web/20110320172800/http:/www.rsa.com/node.aspx?id=3872http://www.nytimes.com/2011/06/04/technology/04security.htmlhttp://www.juancole.com/2013/12/encryption-companies-install.htmlhttp://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
46/209
http://www.juancole.com/2014/02/exploits-paying-hackers.htmlhttp://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryptionhttp://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
47/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
48/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
49/209
https://www.opm.gov/cybersecurity/http://whnt.com/2015/07/10/opm-director-katherine-archuleta-to-step-down-day-after-revealing-recent-data-breach/http://whnt.com/2015/07/10/opm-director-katherine-archuleta-to-step-down-day-after-revealing-recent-data-breach/https://www.opm.gov/cybersecurity/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
50/209
http://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/http://en.wikipedia.org/wiki/Aurora_Generator_Testhttp://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
51/209
http://www.pewinternet.org/2014/05/14/internet-of-things/http://energy.gov/articles/energy-department-releases-new-guidance-strengthening-cybersecurity-grid-s-supply-chainhttps://www.us-cert.gov/nccichttp://www.nist.gov/smartgrid/https://theconversation.com/www.stratcom.mil/factsheets/2/Cyber_Command/%0Ahttp:/en.wikipedia.org/wiki/United_States_Cyber_Commandhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdfhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Department_of_Defense_Cyber_Strategy_Fact_Sheet.pdfhttp://www.latimes.com/opinion/op-ed/la-oe-bolton-chinese-hack-response-20150610-story.html)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
52/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
53/209
http://thehill.com/policy/cybersecurity/229473-investigators-tie-military-twitter-hack-to-individualhttp://thehill.com/policy/cybersecurity/229274-military-twitter-hack-a-new-era-of-cyber-vandalismhttp://www.washingtonexaminer.com/article/2558532
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
54/209
http://www.myidcare/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
55/209
http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?_r=1&adxnnl=1&pagewanted=all&adxnnlx=1415980980-D6998HGcY+FTMLG/c0zcCghttps://www.congress.gov/bill/113th-congress/house-bill/3696https://www.congress.gov/bill/113th-congress/house-bill/3696
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
56/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
57/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
58/209
http://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
59/209
https://www.thepresidency.org/sites/default/files/Grid%20Report%20July%2015%20First%20Edition.pdfhttp://energy.gov/articles/hurricane-sandy-noreaster-situation-reportshttp://energy.gov/sites/prod/files/2015/04/f22/QER-ALL%20FINAL_0.pdfhttp://www.mercurynews.com/business/ci_26419083/pg-e-substation-san-jose-that-suffered-sniperhttp://www.nap.edu/catalog/12050/terrorism-and-the-electric-power-delivery-systemhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
60/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
61/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
62/209
http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
63/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
64/209
http://www.reuters.com/article/2015/04/23/us-usa-pentagon-cyber-idUSKBN0NE0AS20150423)//chiragjainhttp://www.reuters.com/article/2014/09/05/us-nato-cybersecurity-idUSKBN0H013P20140905)//chiragjainhttp://www.c4isrnet.com/story/military-tech/cyber/2015/03/25/nato-cyber-article-5/70455026/http://www.c4isrnet.com/story/military-tech/cyber/2015/03/25/nato-cyber-article-5/70455026/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
65/209
http://www.reuters.com/places/russiahttp://www.reuters.com/people/barack-obamahttp://www.reuters.com/finance/stocks/overview?symbol=LMThttp://www.reuters.com/finance/stocks/overview?symbol=LMT
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
66/209
http://www.reuters.com/places/china
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
67/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
68/209
http://www.mckinsey.com/http://www.mckinsey.com/insights/business_technology/risk_and_responsibility_in_a_hyperconnected_world_implications_for_enterpriseshttp://www.mckinsey.com/insights/business_technology/risk_and_responsibility_in_a_hyperconnected_world_implications_for_enterpriseshttp://www.weforum.org/reports/risk-and-responsibility-hyperconnected-world
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
69/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
70/209
http://money.cnn.com/2014/11/12/technology/security/weather-system-hacked/http://www.washingtonpost.com/local/chinese-hack-us-weather-systems-satellite-network/2014/11/12/bef1206a-68e9-11e4-b053-65cea7903f2e_story.htmlhttp://money.cnn.com/2014/09/04/technology/security/age-of-the-hack/?iid=ELhttp://climate.rutgers.edu/snowcover/http://money.cnn.com/2014/10/29/technology/security/white-house-hack/?iid=ELhttp://money.cnn.com/2014/10/29/technology/security/white-house-hack/?iid=ELhttp://www.cnn.com/2014/08/06/tech/hackers-security-contractor-usis/?iid=ELhttp://money.cnn.com/2014/10/31/technology/security/russia-hackers/?iid=ELhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://spaceflightnow.com/atlas/av044/#.Uz8Xqccow8Fhttp://www.space.com/25344-atlas5-rocket-launch-photos-military-satellite-dmsp19.htmlhttp://www.space.com/25344-atlas5-rocket-launch-photos-military-satellite-dmsp19.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://spaceflightnow.com/atlas/http://www.space.com/25316-military-weather-satellite-launch.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
71/209
http://spaceflightnow.com/atlas/av044/payload.html#.Uz8bDMcow8Ehttp://www.spaceflightnow.com/news/n1102/07weathersat/http://www.space.com/24839-satellites.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://www.heritage.org/Research/MissileDefense/BG1394.cfm
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
72/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
73/209
http://www.washingtonpost.com/blogs/capital-weather-gang/wp/2014/11/12/weather-satellite-data-hack-and-outage-why-this-matters-for-forecasting/http://www.nasa.gov/directorates/heo/home/CubeSats_initiative.htmlhttp://www.chathamhouse.org/http://www.oig.doc.gov/OIGPublications/OIG-14-025-A.pdfhttp://www.oig.doc.gov/OIGPublications/OIG-14-025-A.pdf
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
74/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
75/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
76/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
77/209
http://fas.org/irp/eprint/cnci.pdfhttp://fas.org/sgp/congress/2008/sasc-cyber.htmlhttp://fas.org/sgp/congress/2008/sasc-cyber.htmlhttp://www.nap.edu/catalog.php?record_id=12651http://www.nap.edu/catalog.php?record_id=12651http://fas.org/irp/congress/2008_rpt/hrpt110-665.htmlhttp://epic.org/foia/NSPD54_complaint.pdfhttp://fas.org/irp/eprint/cnci.pdfhttp://fas.org/irp/news/2010/03/wh-cyber.htmlhttp://fas.org/irp/congress/2008_rpt/hrpt110-665.htmlhttp://www.defendingdissent.org/pdf/pclobletter.pdfhttp://fas.org/sgp/crs/misc/RL34385.pdfhttp://www.defendingdissent.org/pdf/pclobletter.pdf
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
78/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
79/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
80/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
81/209
http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
82/209
https://creatavist.com/cms/story/30257/chapter/inlineContent/211350https://creatavist.com/cms/story/30257/chapter/inlineContent/211350https://creatavist.com/cms/story/30257/chapter/inlineContent/211332
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
83/209
https://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
84/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
85/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
86/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
87/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
88/209
http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
89/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
90/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
91/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
92/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
93/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
94/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
95/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
96/209
http://ieet.org/index.php/IEET/more/pellissier20120220http://www.gfi.com/blog/a-cringe-worthy-analysis-of-the-us-computer-biz/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
97/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
98/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
99/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
100/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
101/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
102/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
103/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
104/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
105/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
106/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
107/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
108/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
109/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
110/209
http://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energy
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
111/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
112/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
113/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
114/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
115/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
116/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
117/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
118/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
119/209
http://www.henley-putnam.edu/articles/sigint-and-humint.aspxhttp://www.henley-putnam.edu/articles/sigint-and-humint.aspx
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
120/209
mailto:[email protected]
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
121/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
122/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
123/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
124/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
125/209
http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdfhttp://www.brookings.edu/research/articles/2013/06/17-drones-obama-weapon-choice-us-counterterrorism-bymanhttp://www.brookings.edu/research/articles/2013/06/17-drones-obama-weapon-choice-us-counterterrorism-byman
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
126/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
127/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
128/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
129/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
130/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
131/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
132/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
133/209
http://www.cbsnews.com/news/nsa-spying-ally-anger-justified/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
134/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
135/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
136/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
137/209
http://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//EThttp://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//ET
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
138/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
139/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
140/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
141/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
142/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
143/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
144/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
145/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
146/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
147/209
https://www.resilientsystems.com/http://berkman.harvard.edu/https://www.eff.org/https://www.privacyinternational.org/?q=node/599https://www.schneier.com/blog/archives/2015/05/un_report_on_th.htmlhttps://www.privacyinternational.org/?q=node/600https://www.privacyinternational.org/?q=node/600https://www.privacyinternational.org/sites/default/files/Securing%20Safe%20Spaces%20Online_0.pdf
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
148/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
149/209
http://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//EThttp://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//ET
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
150/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
151/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
152/209
http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryptionhttp://www.theguardian.com/commentisfree/2015/jan/17/cameron-obama-ban-encryption-improve-cybersecurityhttp://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/23/heres-how-the-clash-between-the-nsa-director-and-a-senior-yahoo-executive-went-down/http://www.theguardian.com/commentisfree/2015/feb/21/sim-card-hacking-gemalto-nsahttp://www.theguardian.com/commentisfree/2015/feb/21/sim-card-hacking-gemalto-nsahttp://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/23/heres-how-the-clash-between-the-nsa-director-and-a-senior-yahoo-executive-went-down/http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.htmlhttp://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryptionhttp://www.usatoday.com/story/tech/2014/02/27/nsa-resistant-products-obama-tech-companies-encryption-overseas/5290553/http://www.nytimes.com/2015/02/13/business/obama-heads-to-security-talks-amid-tensions.html?_r=2http://www.nytimes.com/2015/02/13/business/obama-heads-to-security-talks-amid-tensions.html?_r=2
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
153/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
154/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
155/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
156/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
157/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
158/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
159/209
http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprof
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
160/209
http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
161/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
162/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
163/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
164/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
165/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
166/209
https://www.eff.org/deeplinks/2014/12/sifting-fact-fiction-all-writs-and-encryption-no-backdoorshttps://www.eff.org/deeplinks/2014/12/sifting-fact-fiction-all-writs-and-encryption-no-backdoors
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
167/209
http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.htmlhttp://www.spiegel.de/international/germany/bild-1010361-793528.htmlhttp://www.spiegel.de/international/germany/bild-1010361-793528.htmlhttp://www.theverge.com/2014/12/28/7458159/encryption-standards-the-nsa-cant-crack-pgp-tor-otr-snowdenhttp://thinkprogress.org/justice/2014/12/26/3606958/nsa-violations-christmas-eve-dump/http://thinkprogress.org/justice/2014/12/26/3606958/nsa-violations-christmas-eve-dump/http://thinkprogress.org/world/2014/07/06/3456733/snowden-emails-report/http://thinkprogress.org/world/2014/07/06/3456733/snowden-emails-report/http://thinkprogress.org/media/2014/03/10/3384291/snowden-sxsw/http://thinkprogress.org/world/2014/05/17/3438919/more-people-turn-to-encryption-after-snowden-leaks/https://www.eff.org/deeplinks/2014/12/2014-web-encryption-rounduphttp://thinkprogress.org/world/2014/07/15/3460244/typewriters-nsa/http://thinkprogress.org/world/2014/09/25/3572142/australia-government-surveillance-laws/http://thinkprogress.org/world/2014/07/22/3462593/google-faces-tougher-privacy-regulations-in-italy-has-18-months-to-comply/http://www.theverge.com/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
168/209
http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.htmlhttp://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://freedom.press/encryption-works
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
169/209
https://freedom.press/encryption-works
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
170/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
171/209
http://thehill.com/blogs/congress-blog/246796-not-going-dark-the-fbis-misguided-war-on-encryptionhttp://www.judiciary.senate.gov/meetings/going-dark-encryption-technology-and-the-balance-between-public-safety-and-privacyhttp://www.cnet.com/news/6-1-trillion-text-messages-to-be-sent-in-2010/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
172/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
173/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
174/209
http://www.npr.org/sections/thetwo-way/2015/07/08/421251662/fbi-director-says-agents-need-access-to-encrypted-data-to-preserve-public-safetyhttp://www.cnn.com/2015/07/08/politics/fbi-comey-isis-encryption-recruitment/http://www.govtech.com/dc/articles/Securing-the-Intellectual-Property-of-Cybersecurity-.htmlhttp://www.govtech.com/dc/articles/Securing-the-Intellectual-Property-of-Cybersecurity-.htmlhttp://webcasts.business2community.com/events/successful-customer-experiences-are-identity-centric?utm_source=B2C&utm_medium=Article-Promo&utm_campaign=Webcast07212015http://www.theinquirer.net/inquirer/news/2102435/aes-encryption-crackedhttp://searchsecurity.techtarget.com/definition/Data-Encryption-Standardhttp://www.securityweek.com/nist-pulls-dualecdrbg-algorithm-random-number-generator-recommendationshttp://www.securityweek.com/nist-pulls-dualecdrbg-algorithm-random-number-generator-recommendationshttp://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenethttp://www.itworld.com/article/2945095/former-attorney-general-calls-snowden-deal-possible.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
175/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
176/209
http://motherboard.vice.com/read/fbi-director-if-apple-and-google-wont-decrypt-phones-well-force-them-tohttps://static.newamerica.org/attachments/3138--113/Encryption_Letter_to_Obama_final_051915.pdfhttps://www.apple.com/privacy/privacy-built-in/http://motherboard.vice.com/read/the-fbi-keeps-demanding-impossible-solutions-to-its-encryption-problemhttp://www.newamerica.org/oti/massive-coalition-of-security-experts-tech-companies-and-privacy-advocates-presses-obama-to-oppose-surveillance-backdoors/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
177/209
http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.htmlhttp://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.htmlhttp://justsecurity.org/15903/smartphone-backdoors-open-computing/https://www.schneier.com/paper-key-escrow.htmlhttp://www.wired.com/2014/01/how-the-us-almost-killed-the-internet/all/http://www.washingtonpost.com/opinions/compromise-needed-on-smartphone-encryption/2014/10/03/96680bf8-4a77-11e4-891d-713f052086a0_story.htmlhttp://www.wired.com/2014/02/gotofail/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
178/209
http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
179/209
http://recode.net/2015/02/15/white-house-red-chair-obama-meets-swisher/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
180/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
181/209
http://observable.net/solution/http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
182/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
183/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
184/209
http://www.csmonitor.com/World/Passcode/Passcode-Influencers/2015/0311/Influencers-Stronger-encryption-on-consumer-devices-won-t-hurt-national-security-videohttp://www.csmonitor.com/World/Passcode/Passcode-Influencers/2015/0311/Influencers-Stronger-encryption-on-consumer-devices-won-t-hurt-national-security-video
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
185/209
http://www.co3sys.com/http://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.uscourts.gov/uscourts/Statistics/WiretapReports/2013/Table3.pdfhttp://www.wired.com/2014/07/rising-use-of-encryption-foiled-the-cops-a-record-9-times-in-2013/http://www.washingtonpost.com/posteverything/wp/2014/09/23/i-helped-save-a-kidnapped-man-from-murder-with-apples-new-encryption-rules-we-never-wouldve-found-him/https://twitter.com/xor/status/514582730126790656http://archive.wired.com/wired/archive/1.02/crypto.rebels_pr.htmlhttp://www.csmonitor.com/1997/1006/100697.opin.opin.2.htmlhttps://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypsehttps://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypsehttp://support.apple.com/kb/HT4790https://en.wikipedia.org/wiki/BitLockerhttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttps://otr.cypherpunks.ca/https://www.eff.org/https-everywherehttps://source.android.com/devices/tech/encryption/android_crypto_implementation.html
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
186/209
https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Acthttp://www.eff.org/deeplinks/2010/09/government-seeks
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
187/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
188/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
189/209
http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
190/209
http://www.csmonitor.com/World/Passcode/2015/0417/Senator-Wyden-Congress-may-block-government-access-to-encrypted-consumer-devices-videohttp://www.csmonitor.com/World/Passcode/2015/0417/Senator-Wyden-Congress-may-block-government-access-to-encrypted-consumer-devices-videohttps://www.newamerica.org/oti/at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/https://www.newamerica.org/oti/at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
191/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
192/209
http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.newsy.com/videos/eff-scorecard-spotlights-recent-evolutions-in-data-privacy/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
193/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
194/209
http://www.theguardian.com/us-news/2015/jun/02/congress-surveillance-reform-edward-snowden%20//http://www.usatoday.com/story/news/politics/2015/04/02/encryption-bill-tech-companies-federal-law-enforcement/70734646/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
195/209
https://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html%20//https://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html%20//
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
196/209
http://www.nextgov.com/defense/2015/01/obama-says-too-strong-encryption-could-be-problem/103224/http://www.slate.com/blogs/future_tense/2015/01/19/obama_wants_backdoors_in_encrypted_messaging_to_allow_government_spying.html%20//
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
197/209
http://mashable.com/2015/02/03/obama-new-nsa-reforms/https://www.washingtonpost.com/blogs/the-switch/wp/2015/02/19/what-president-obama-is-getting-wrong-about-encryption/http://www.pbs.org/newshour/rundown/obama-seeks-public-conversation-data-encryption/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
198/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
199/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
200/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
201/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
202/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
203/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
204/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
205/209
http://dcinno.streetwise.co/author/cbousquet17/http://dcinno.streetwise.co/2015/06/30/washington-post-encryption-to-stop-government-surveillance/http://www.computing.co.uk/author/profile/2485/danny-palmer
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
206/209
http://www.salon.com/http://www.salon.com/
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
207/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
208/209
-
8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx
209/209
http://www.techrepublic.com/search/?a=michael+kassner