CybersecurityNeg-BHN-SDI2016-Paper - Cybersecurity Neg BHN...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Cybersecurity Neg BHN 3 Week SDI 2016 Cybersecurity Neg Inherency ..................................................................................................................................................... 3 Attacks Decreasing Now ...................................................................................................................... 4 Solvency ...................................................................................................................................................... 7 China Says No ...................................................................................................................................... 8 China Will Pocket ................................................................................................................................. 9 No Enforcement ................................................................................................................................. 10 Competitiveness Advantage ...................................................................................................................... 11 Internals ................................................................................................................................................. 12 Doesn’t Hurt Econ—General .............................................................................................................. 13 Alt Cause—Russia .............................................................................................................................. 16 AT: Stock Prices .................................................................................................................................. 17 AT: IP Thef ......................................................................................................................................... 19 AT: Grid Attacks .................................................................................................................................. 20 Impact Defense ...................................................................................................................................... 21 AT: Econ ............................................................................................................................................. 22 AT: Heg ............................................................................................................................................... 23 AT: Grid .............................................................................................................................................. 25 Relations Advantage .................................................................................................................................. 27 Internals ................................................................................................................................................. 28 Relations Up ....................................................................................................................................... 29 Alt Causes—Taiwan ............................................................................................................................ 31 Alt Causes—Pivot ............................................................................................................................... 33 Trade War Alt Cause .......................................................................................................................... 34 Impacts .................................................................................................................................................. 36 Relations Resilient—Interdependence ............................................................................................... 37 Relations Can’t Solve—General ......................................................................................................... 38 No Warming Impact ........................................................................................................................... 39 No Trade War Impact ......................................................................................................................... 40 Miscalc Advantage ..................................................................................................................................... 42 Internals ................................................................................................................................................. 43 Cyber Conflict Won’t Escalate ............................................................................................................ 44 Interdependence Prevents Escalation ................................................................................................ 45 1
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cybersecurity Neg BHN 3 Week SDI 2016 Deterrence Checks ............................................................................................................................. 46 Low Probability .................................................................................................................................. 47 Impacts .................................................................................................................................................. 48 AT: Cyberwar General ........................................................................................................................ 49 AT: South China Sea ........................................................................................................................... 53 2
Image of page 2
Cybersecurity Neg BHN 3 Week SDI 2016 Inherency 3
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cybersecurity Neg BHN 3 Week SDI 2016 Attacks Decreasing Now US- Sino Relations already check cyber attacks Katie Bo Williams , 6-21- 16 Chinese hacking sharply declining: report National Security Reporter for The Hill, The Hill Chinese hacking of U.S. government and corporate networks has sharply declined since 2014 , according to a new report from a prominent cybersecurity firm. FireEye observed only a handful of network intrusions attributed to Chinese groups in April of this year, down from more than 60 in February of 2013. The shif is likely the result of a confluence of factors, including actions taken by the U.S. government — but it is not solely the result of a September anti-hacking pledge struck by President Obama and Chinese President Xi Jinping , FireEye said. When China’s expansive hacking operations began to come into the public eye, according to the report, the U.S. was able to muster the political support to confront China directly on its cyber espionage tactics — indicting five Chinese military officers in 2014 and striking the anti-hacking pledge. Lawmakers and others have repeatedly pressed the Obama administration on whether the September deal — which prohibits hacking commercial firms for economic gain — has lead to a drop in intrusions. “Although many in the U.S. initially doubted that these actions would have any effect, they may have prompted Beijing to reconsider the execution of its network operations ,” the report said. But the decline in hacking attempts started prior to the September deal, and FireEye stops short of suggesting that the anti-hacking pledge are solely responsible for the decrease. “The problem with the question, ‘is it working?’ is that it’s a yes-or-no answer, and there’s really no yes-or-no answer. You’ve got a really complex system behind China’s cyber activity,” Jordan Berry, FireEye’s principal threat intelligence analyst, told The Hill. “It’s more a confluence of events that caused this decline.” Military reforms within the Chinese government also played a role, Berry said. Since taking power in late 2012, Xi has implemented a series of significant military reforms aimed at centralizing China’s cyber elements that may also be a factor. FireEye also noted that
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern