encryption affirmative - michiganclassic 2015.docx

Upload: isaiah2ortiz8560

Post on 07-Jul-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    1/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    2/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    3/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    4/209

    http://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Erahttp://www.researchgate.net/publication/228365094_Privacy_And_Law_Enforcement_Caught_In_The_Cloud_Privacy_Encryption_And_Government_Back_Doors_In_The_Web_2.0_Era

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    5/209

    http://www.theguardian.com/commentisfree/2015/jul/05/encryption-humans-weakest-linkhttps://en.wikipedia.org/wiki/Clipper_chiphttp://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isishttp://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terrorhttp://catless.ncl.ac.uk/Risks/28.75.html#subj1http://catless.ncl.ac.uk/Risks/28.75.html#subj1http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html?_r=0http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.htmlhttp://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=allhttp://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=allhttp://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-datahttp://outlook.com/http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.htmlhttp://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    6/209

    http://beta.congress.gov/bill/113th-congress/house-bill/2818?q=surveillance+state+repealhttp://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?pagewanted=allhttp://articles.washingtonpost.com/2013-09-06/business/41831756_1_encryption-data-centers-intelligence-agencieshttp://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?pagewanted=all&_r=0#p%5BFalFal%5Dhttp://www.wired.com/2013/09/nsa-backdoored-and-stole-keys/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    7/209

    https://www.bestvpn.com/blog/7521/nsa-breaks-undermines-many-kinds-encryption-mean-vpn/http://www.ecommercetimes.com/story/81530.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    8/209

    https://www.aclu.org/blog/washington-markup/should-companies-be-forced-enable-surveillance-and-compromise-securityhttps://www.aclu.org/blog/washington-markup/should-companies-be-forced-enable-surveillance-and-compromise-securityhttp://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    9/209

    https://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trusthttps://www.eff.org/deeplinks/2014/01/after-nsa-backdoors-security-experts-leave-rsa-conference-they-can-trust

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    10/209

    http://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htmhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htmhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    11/209

    http://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    12/209

    http://www.reed.edu/http://www.ox.ac.uk/http://www.wadham.ox.ac.uk/http://www.arstechnica.com/http://www.lexisnexis.com/https://www.nytimes.com/2013/05/08/us/politics/obama-may-back-fbi-plan-to-wiretap-web-users.html?ref=charliesavage&gwh=1377579C1399D3E4F15415DAEA8AF52Bhttps://www.eff.org/issues/caleahttps://en.wikipedia.org/wiki/Voice_over_IPhttps://action.eff.org/o/9042/p/dia/action3/common/public/?action_KEY=9252https://pressfreedomfoundation.org/http://www.theguardian.com/commentisfree/2014/oct/17/government-internet-backdoor-surveillance-fbi

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    13/209

    http://insidersurveillance.com/will-apple-ios8-encryption-spur-demand-lawful-intercept/http://insidersurveillance.com/will-apple-ios8-encryption-spur-demand-lawful-intercept/http://dailycaller.com/2014/10/20/fbi-asks-congress-for-backdoor-access-to-all-cellphones-for-surveillance/http://dailycaller.com/2014/10/20/fbi-asks-congress-for-backdoor-access-to-all-cellphones-for-surveillance/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    14/209

    http://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    15/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    16/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    17/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    18/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    19/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    20/209

    http://www.broadcastingcable.com/news/washington/bill-would-prevent-surveillance-back-doors/137722

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    21/209

    http://go.galegroup.com.proxy.lib.umich.edu/ps/i.do?p=ITOF&u=lom_umichanna&id=GALE%7CA402050594&v=2.1&it=r&userGroup=lom_umichanna&authCount=1http://go.galegroup.com.proxy.lib.umich.edu/ps/i.do?p=ITOF&u=lom_umichanna&id=GALE%7CA402050594&v=2.1&it=r&userGroup=lom_umichanna&authCount=1https://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    22/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    23/209

    http://www.thedailybeast.com/articles/2014/07/03/it-s-time-to-shut-the-nsa-s-backdoor-used-to-spy-on-americans.htmlhttp://www.thedailybeast.com/articles/2014/07/03/it-s-time-to-shut-the-nsa-s-backdoor-used-to-spy-on-americans.htmlhttp://www.aclu.org/http://www.aclu.org/http://www.law.yale.edu/intellectuallife/ISPpeople.htmhttp://www.law.yale.edu/intellectuallife/informationsocietyproject.htm

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    24/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    25/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    26/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    27/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    28/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    29/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    30/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    31/209

    http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    32/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    33/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    34/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    35/209

    http://dspace.mit.edu/handle/1721.1/97690http://dspace.mit.edu/handle/1721.1/97690http://www.infoworld.com/article/2897302/security/security-guru-bruce-schneier-your-privacy-is-already-gone.htmlhttp://www.infoworld.com/article/2609941/encryption/welcome-to-the-era-of-encryption-by-default.htmlhttp://www.infoworld.com/article/2667414/security/crypto-stars-sound-off-on-e-voting--drm.htmlhttp://www.infoworld.com/article/2619425/endpoint-protection/cryptography-pioneer--we-need-good-code.htmlhttps://en.wikipedia.org/wiki/Clipper_chip

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    36/209

    http://www.infoworld.com/article/2609307/encryption/report-on-nsa--secret--payments-to-rsa-fuels-encryption-controversy.htmlhttp://www.cio.com/article/2944913/fbi-chief-warns-that-terrorists-hide-behind-encrypted-communications.htmlhttp://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    37/209

    http://www.ibtimes.com/us-suffers-massive-data-breach-hackers-take-information-millions-federal-workers-1953526http://www.ibtimes.com/us-suffers-massive-data-breach-hackers-take-information-millions-federal-workers-1953526

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    38/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    39/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    40/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    41/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    42/209

    https://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjainhttps://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    43/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    44/209

    http://www.latimes.com/opinion/opinion-la/la-ol-fbi-encryption-apple-google-smartphones-20141017-story.htmlhttp://www.latimes.com/opinion/opinion-la/la-ol-apple-ipod-lawsuit-drm-competition-20141205-story.htmlhttp://www.latimes.com/opinion/opinion-la/la-ol-apple-ipod-lawsuit-drm-competition-20141205-story.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    45/209

    http://www.dailydot.com/tags/police/http://www.dailydot.com/politics/opm-fbi-hack-files/http://www.dailydot.com/politics/ron-wyden-profile-senate-privacy-surveillance-reform/http://www.dailydot.com/tags/ron-wyden/http://www.dailydot.com/tags/china/http://www.dailydot.com/tags/cyberattacks/http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/http://spectrum.ieee.org/telecom/security/the-athens-affairhttp://news.bbc.co.uk/2/hi/business/5367754.stmhttps://en.wikipedia.org/wiki/Clipper_chiphttp://www.crypto.com/papers/eesproto.pdfhttp://www.dailydot.com/tags/avengers/http://www.dailydot.com/tags/age-of-ultron/http://www.dailydot.com/politics/opm-hack-house-hearing/http://engineering.jhu.edu/magazine/2014/05/guru-cyber-cryptography/http://wayback.archive.org/web/20110320172800/http:/www.rsa.com/node.aspx?id=3872http://www.nytimes.com/2011/06/04/technology/04security.htmlhttp://www.juancole.com/2013/12/encryption-companies-install.htmlhttp://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    46/209

    http://www.juancole.com/2014/02/exploits-paying-hackers.htmlhttp://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryptionhttp://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    47/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    48/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    49/209

    https://www.opm.gov/cybersecurity/http://whnt.com/2015/07/10/opm-director-katherine-archuleta-to-step-down-day-after-revealing-recent-data-breach/http://whnt.com/2015/07/10/opm-director-katherine-archuleta-to-step-down-day-after-revealing-recent-data-breach/https://www.opm.gov/cybersecurity/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    50/209

    http://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/http://en.wikipedia.org/wiki/Aurora_Generator_Testhttp://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    51/209

    http://www.pewinternet.org/2014/05/14/internet-of-things/http://energy.gov/articles/energy-department-releases-new-guidance-strengthening-cybersecurity-grid-s-supply-chainhttps://www.us-cert.gov/nccichttp://www.nist.gov/smartgrid/https://theconversation.com/www.stratcom.mil/factsheets/2/Cyber_Command/%0Ahttp:/en.wikipedia.org/wiki/United_States_Cyber_Commandhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdfhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Department_of_Defense_Cyber_Strategy_Fact_Sheet.pdfhttp://www.latimes.com/opinion/op-ed/la-oe-bolton-chinese-hack-response-20150610-story.html)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    52/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    53/209

    http://thehill.com/policy/cybersecurity/229473-investigators-tie-military-twitter-hack-to-individualhttp://thehill.com/policy/cybersecurity/229274-military-twitter-hack-a-new-era-of-cyber-vandalismhttp://www.washingtonexaminer.com/article/2558532

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    54/209

    http://www.myidcare/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    55/209

    http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?_r=1&adxnnl=1&pagewanted=all&adxnnlx=1415980980-D6998HGcY+FTMLG/c0zcCghttps://www.congress.gov/bill/113th-congress/house-bill/3696https://www.congress.gov/bill/113th-congress/house-bill/3696

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    56/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    57/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    58/209

    http://www.scientificamerican.com/article/power-grid-cyber-attacks-keep-the-pentagon-up-at-night/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    59/209

    https://www.thepresidency.org/sites/default/files/Grid%20Report%20July%2015%20First%20Edition.pdfhttp://energy.gov/articles/hurricane-sandy-noreaster-situation-reportshttp://energy.gov/sites/prod/files/2015/04/f22/QER-ALL%20FINAL_0.pdfhttp://www.mercurynews.com/business/ci_26419083/pg-e-substation-san-jose-that-suffered-sniperhttp://www.nap.edu/catalog/12050/terrorism-and-the-electric-power-delivery-systemhttp://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    60/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    61/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    62/209

    http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    63/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    64/209

    http://www.reuters.com/article/2015/04/23/us-usa-pentagon-cyber-idUSKBN0NE0AS20150423)//chiragjainhttp://www.reuters.com/article/2014/09/05/us-nato-cybersecurity-idUSKBN0H013P20140905)//chiragjainhttp://www.c4isrnet.com/story/military-tech/cyber/2015/03/25/nato-cyber-article-5/70455026/http://www.c4isrnet.com/story/military-tech/cyber/2015/03/25/nato-cyber-article-5/70455026/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    65/209

    http://www.reuters.com/places/russiahttp://www.reuters.com/people/barack-obamahttp://www.reuters.com/finance/stocks/overview?symbol=LMThttp://www.reuters.com/finance/stocks/overview?symbol=LMT

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    66/209

    http://www.reuters.com/places/china

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    67/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    68/209

    http://www.mckinsey.com/http://www.mckinsey.com/insights/business_technology/risk_and_responsibility_in_a_hyperconnected_world_implications_for_enterpriseshttp://www.mckinsey.com/insights/business_technology/risk_and_responsibility_in_a_hyperconnected_world_implications_for_enterpriseshttp://www.weforum.org/reports/risk-and-responsibility-hyperconnected-world

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    69/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    70/209

    http://money.cnn.com/2014/11/12/technology/security/weather-system-hacked/http://www.washingtonpost.com/local/chinese-hack-us-weather-systems-satellite-network/2014/11/12/bef1206a-68e9-11e4-b053-65cea7903f2e_story.htmlhttp://money.cnn.com/2014/09/04/technology/security/age-of-the-hack/?iid=ELhttp://climate.rutgers.edu/snowcover/http://money.cnn.com/2014/10/29/technology/security/white-house-hack/?iid=ELhttp://money.cnn.com/2014/10/29/technology/security/white-house-hack/?iid=ELhttp://www.cnn.com/2014/08/06/tech/hackers-security-contractor-usis/?iid=ELhttp://money.cnn.com/2014/10/31/technology/security/russia-hackers/?iid=ELhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://spaceflightnow.com/atlas/av044/#.Uz8Xqccow8Fhttp://www.space.com/25344-atlas5-rocket-launch-photos-military-satellite-dmsp19.htmlhttp://www.space.com/25344-atlas5-rocket-launch-photos-military-satellite-dmsp19.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://spaceflightnow.com/atlas/http://www.space.com/25316-military-weather-satellite-launch.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    71/209

    http://spaceflightnow.com/atlas/av044/payload.html#.Uz8bDMcow8Ehttp://www.spaceflightnow.com/news/n1102/07weathersat/http://www.space.com/24839-satellites.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://www.space.com/25368-military-weather-satellite-rocket-launch.htmlhttp://www.heritage.org/Research/MissileDefense/BG1394.cfm

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    72/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    73/209

    http://www.washingtonpost.com/blogs/capital-weather-gang/wp/2014/11/12/weather-satellite-data-hack-and-outage-why-this-matters-for-forecasting/http://www.nasa.gov/directorates/heo/home/CubeSats_initiative.htmlhttp://www.chathamhouse.org/http://www.oig.doc.gov/OIGPublications/OIG-14-025-A.pdfhttp://www.oig.doc.gov/OIGPublications/OIG-14-025-A.pdf

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    74/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    75/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    76/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    77/209

    http://fas.org/irp/eprint/cnci.pdfhttp://fas.org/sgp/congress/2008/sasc-cyber.htmlhttp://fas.org/sgp/congress/2008/sasc-cyber.htmlhttp://www.nap.edu/catalog.php?record_id=12651http://www.nap.edu/catalog.php?record_id=12651http://fas.org/irp/congress/2008_rpt/hrpt110-665.htmlhttp://epic.org/foia/NSPD54_complaint.pdfhttp://fas.org/irp/eprint/cnci.pdfhttp://fas.org/irp/news/2010/03/wh-cyber.htmlhttp://fas.org/irp/congress/2008_rpt/hrpt110-665.htmlhttp://www.defendingdissent.org/pdf/pclobletter.pdfhttp://fas.org/sgp/crs/misc/RL34385.pdfhttp://www.defendingdissent.org/pdf/pclobletter.pdf

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    78/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    79/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    80/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    81/209

    http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    82/209

    https://creatavist.com/cms/story/30257/chapter/inlineContent/211350https://creatavist.com/cms/story/30257/chapter/inlineContent/211350https://creatavist.com/cms/story/30257/chapter/inlineContent/211332

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    83/209

    https://oversight.house.gov/hearing/encryption-technology-and-potential-u-s-policy-responses/)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    84/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    85/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    86/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    87/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    88/209

    http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    89/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    90/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    91/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    92/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    93/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    94/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    95/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    96/209

    http://ieet.org/index.php/IEET/more/pellissier20120220http://www.gfi.com/blog/a-cringe-worthy-analysis-of-the-us-computer-biz/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    97/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    98/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    99/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    100/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    101/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    102/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    103/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    104/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    105/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    106/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    107/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    108/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    109/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    110/209

    http://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energyhttp://mercatus.org/publication/subsidies-are-problem-not-solution-innovation-energy

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    111/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    112/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    113/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    114/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    115/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    116/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    117/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    118/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    119/209

    http://www.henley-putnam.edu/articles/sigint-and-humint.aspxhttp://www.henley-putnam.edu/articles/sigint-and-humint.aspx

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    120/209

    mailto:[email protected]

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    121/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    122/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    123/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    124/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    125/209

    http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdfhttp://www.brookings.edu/research/articles/2013/06/17-drones-obama-weapon-choice-us-counterterrorism-bymanhttp://www.brookings.edu/research/articles/2013/06/17-drones-obama-weapon-choice-us-counterterrorism-byman

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    126/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    127/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    128/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    129/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    130/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    131/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    132/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    133/209

    http://www.cbsnews.com/news/nsa-spying-ally-anger-justified/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    134/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    135/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    136/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    137/209

    http://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//EThttp://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//ET

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    138/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    139/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    140/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    141/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    142/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    143/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    144/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    145/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    146/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    147/209

    https://www.resilientsystems.com/http://berkman.harvard.edu/https://www.eff.org/https://www.privacyinternational.org/?q=node/599https://www.schneier.com/blog/archives/2015/05/un_report_on_th.htmlhttps://www.privacyinternational.org/?q=node/600https://www.privacyinternational.org/?q=node/600https://www.privacyinternational.org/sites/default/files/Securing%20Safe%20Spaces%20Online_0.pdf

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    148/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    149/209

    http://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//EThttp://hrp.law.harvard.edu/wp-content/uploads/2015/06/Securing-Safe-Spaces-Online-2.pdf)//ET

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    150/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    151/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    152/209

    http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryptionhttp://www.theguardian.com/commentisfree/2015/jan/17/cameron-obama-ban-encryption-improve-cybersecurityhttp://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/23/heres-how-the-clash-between-the-nsa-director-and-a-senior-yahoo-executive-went-down/http://www.theguardian.com/commentisfree/2015/feb/21/sim-card-hacking-gemalto-nsahttp://www.theguardian.com/commentisfree/2015/feb/21/sim-card-hacking-gemalto-nsahttp://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/23/heres-how-the-clash-between-the-nsa-director-and-a-senior-yahoo-executive-went-down/http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.htmlhttp://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryptionhttp://www.usatoday.com/story/tech/2014/02/27/nsa-resistant-products-obama-tech-companies-encryption-overseas/5290553/http://www.nytimes.com/2015/02/13/business/obama-heads-to-security-talks-amid-tensions.html?_r=2http://www.nytimes.com/2015/02/13/business/obama-heads-to-security-talks-amid-tensions.html?_r=2

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    153/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    154/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    155/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    156/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    157/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    158/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    159/209

    http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprof

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    160/209

    http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    161/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    162/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    163/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    164/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    165/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    166/209

    https://www.eff.org/deeplinks/2014/12/sifting-fact-fiction-all-writs-and-encryption-no-backdoorshttps://www.eff.org/deeplinks/2014/12/sifting-fact-fiction-all-writs-and-encryption-no-backdoors

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    167/209

    http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.htmlhttp://www.spiegel.de/international/germany/bild-1010361-793528.htmlhttp://www.spiegel.de/international/germany/bild-1010361-793528.htmlhttp://www.theverge.com/2014/12/28/7458159/encryption-standards-the-nsa-cant-crack-pgp-tor-otr-snowdenhttp://thinkprogress.org/justice/2014/12/26/3606958/nsa-violations-christmas-eve-dump/http://thinkprogress.org/justice/2014/12/26/3606958/nsa-violations-christmas-eve-dump/http://thinkprogress.org/world/2014/07/06/3456733/snowden-emails-report/http://thinkprogress.org/world/2014/07/06/3456733/snowden-emails-report/http://thinkprogress.org/media/2014/03/10/3384291/snowden-sxsw/http://thinkprogress.org/world/2014/05/17/3438919/more-people-turn-to-encryption-after-snowden-leaks/https://www.eff.org/deeplinks/2014/12/2014-web-encryption-rounduphttp://thinkprogress.org/world/2014/07/15/3460244/typewriters-nsa/http://thinkprogress.org/world/2014/09/25/3572142/australia-government-surveillance-laws/http://thinkprogress.org/world/2014/07/22/3462593/google-faces-tougher-privacy-regulations-in-italy-has-18-months-to-comply/http://www.theverge.com/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    168/209

    http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.htmlhttp://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://freedom.press/encryption-works

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    169/209

    https://freedom.press/encryption-works

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    170/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    171/209

    http://thehill.com/blogs/congress-blog/246796-not-going-dark-the-fbis-misguided-war-on-encryptionhttp://www.judiciary.senate.gov/meetings/going-dark-encryption-technology-and-the-balance-between-public-safety-and-privacyhttp://www.cnet.com/news/6-1-trillion-text-messages-to-be-sent-in-2010/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    172/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    173/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    174/209

    http://www.npr.org/sections/thetwo-way/2015/07/08/421251662/fbi-director-says-agents-need-access-to-encrypted-data-to-preserve-public-safetyhttp://www.cnn.com/2015/07/08/politics/fbi-comey-isis-encryption-recruitment/http://www.govtech.com/dc/articles/Securing-the-Intellectual-Property-of-Cybersecurity-.htmlhttp://www.govtech.com/dc/articles/Securing-the-Intellectual-Property-of-Cybersecurity-.htmlhttp://webcasts.business2community.com/events/successful-customer-experiences-are-identity-centric?utm_source=B2C&utm_medium=Article-Promo&utm_campaign=Webcast07212015http://www.theinquirer.net/inquirer/news/2102435/aes-encryption-crackedhttp://searchsecurity.techtarget.com/definition/Data-Encryption-Standardhttp://www.securityweek.com/nist-pulls-dualecdrbg-algorithm-random-number-generator-recommendationshttp://www.securityweek.com/nist-pulls-dualecdrbg-algorithm-random-number-generator-recommendationshttp://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenethttp://www.itworld.com/article/2945095/former-attorney-general-calls-snowden-deal-possible.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    175/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    176/209

    http://motherboard.vice.com/read/fbi-director-if-apple-and-google-wont-decrypt-phones-well-force-them-tohttps://static.newamerica.org/attachments/3138--113/Encryption_Letter_to_Obama_final_051915.pdfhttps://www.apple.com/privacy/privacy-built-in/http://motherboard.vice.com/read/the-fbi-keeps-demanding-impossible-solutions-to-its-encryption-problemhttp://www.newamerica.org/oti/massive-coalition-of-security-experts-tech-companies-and-privacy-advocates-presses-obama-to-oppose-surveillance-backdoors/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    177/209

    http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.htmlhttp://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.htmlhttp://justsecurity.org/15903/smartphone-backdoors-open-computing/https://www.schneier.com/paper-key-escrow.htmlhttp://www.wired.com/2014/01/how-the-us-almost-killed-the-internet/all/http://www.washingtonpost.com/opinions/compromise-needed-on-smartphone-encryption/2014/10/03/96680bf8-4a77-11e4-891d-713f052086a0_story.htmlhttp://www.wired.com/2014/02/gotofail/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    178/209

    http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    179/209

    http://recode.net/2015/02/15/white-house-red-chair-obama-meets-swisher/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    180/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    181/209

    http://observable.net/solution/http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    182/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    183/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    184/209

    http://www.csmonitor.com/World/Passcode/Passcode-Influencers/2015/0311/Influencers-Stronger-encryption-on-consumer-devices-won-t-hurt-national-security-videohttp://www.csmonitor.com/World/Passcode/Passcode-Influencers/2015/0311/Influencers-Stronger-encryption-on-consumer-devices-won-t-hurt-national-security-video

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    185/209

    http://www.co3sys.com/http://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/http://www.uscourts.gov/uscourts/Statistics/WiretapReports/2013/Table3.pdfhttp://www.wired.com/2014/07/rising-use-of-encryption-foiled-the-cops-a-record-9-times-in-2013/http://www.washingtonpost.com/posteverything/wp/2014/09/23/i-helped-save-a-kidnapped-man-from-murder-with-apples-new-encryption-rules-we-never-wouldve-found-him/https://twitter.com/xor/status/514582730126790656http://archive.wired.com/wired/archive/1.02/crypto.rebels_pr.htmlhttp://www.csmonitor.com/1997/1006/100697.opin.opin.2.htmlhttps://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypsehttps://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypsehttp://support.apple.com/kb/HT4790https://en.wikipedia.org/wiki/BitLockerhttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttps://otr.cypherpunks.ca/https://www.eff.org/https-everywherehttps://source.android.com/devices/tech/encryption/android_crypto_implementation.html

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    186/209

    https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Acthttp://www.eff.org/deeplinks/2010/09/government-seeks

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    187/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    188/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    189/209

    http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjain

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    190/209

    http://www.csmonitor.com/World/Passcode/2015/0417/Senator-Wyden-Congress-may-block-government-access-to-encrypted-consumer-devices-videohttp://www.csmonitor.com/World/Passcode/2015/0417/Senator-Wyden-Congress-may-block-government-access-to-encrypted-consumer-devices-videohttps://www.newamerica.org/oti/at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/https://www.newamerica.org/oti/at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    191/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    192/209

    http://www.cdt.org/http://www.cdt.org/http://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttp://www.linkedin.com/edu/school?id=17973&trk=ppro_sprofhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttps://static.newamerica.org/attachments/2982-at-crypto-hearing-best-arguments-against-backdoor-mandates-come-from-members-of-congress-themselves/Bankston_Oral_Testimony.ffdedda50c6149309d6d6da935795ed7.pdf)//chiragjainhttp://www.newsy.com/videos/eff-scorecard-spotlights-recent-evolutions-in-data-privacy/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    193/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    194/209

    http://www.theguardian.com/us-news/2015/jun/02/congress-surveillance-reform-edward-snowden%20//http://www.usatoday.com/story/news/politics/2015/04/02/encryption-bill-tech-companies-federal-law-enforcement/70734646/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    195/209

    https://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html%20//https://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html%20//

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    196/209

    http://www.nextgov.com/defense/2015/01/obama-says-too-strong-encryption-could-be-problem/103224/http://www.slate.com/blogs/future_tense/2015/01/19/obama_wants_backdoors_in_encrypted_messaging_to_allow_government_spying.html%20//

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    197/209

    http://mashable.com/2015/02/03/obama-new-nsa-reforms/https://www.washingtonpost.com/blogs/the-switch/wp/2015/02/19/what-president-obama-is-getting-wrong-about-encryption/http://www.pbs.org/newshour/rundown/obama-seeks-public-conversation-data-encryption/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    198/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    199/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    200/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    201/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    202/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    203/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    204/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    205/209

    http://dcinno.streetwise.co/author/cbousquet17/http://dcinno.streetwise.co/2015/06/30/washington-post-encryption-to-stop-government-surveillance/http://www.computing.co.uk/author/profile/2485/danny-palmer

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    206/209

    http://www.salon.com/http://www.salon.com/

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    207/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    208/209

  • 8/19/2019 Encryption Affirmative - MichiganClassic 2015.docx

    209/209

    http://www.techrepublic.com/search/?a=michael+kassner