Nato Topic Paper
Nato Topic Paper
Nato Topic Paper
Submitted
Updated
Luke Brinker-Lev
Tel-Aviv, Former Debater, Topeka HS, KS
Peter Crevoiserat
Wichita Northwest HS, KS
Michael Harris
Wichita Southeast HS, KS
Pam McComas
Retired, Director of Forensics, Topeka HS, KS
0
Table of Contents
I. Introduction .................................................................................................................................. 2
V. Scope ..........................................................................................................................................42
X. Interest..........................................................................................................................................68
1
Global Geo-Political Crisis: Emerging Technologies
As the world awaits Daniel Craig’s next and final film as 007 (No Time to Die), everyone
is excited for the next crisis facing this enigmatic character and Q’s new gadgets to be unveiled
to determine the best opportunity to de-escalate the situation(s). Throughout Ian Fleming’s long
time Bond series of fictional thrillers and espionage, the author would immerse the reader into a
sci-fi glimpse of new tech for the main character to utilize in overcoming numerous threats to the
not fiction, but real and impose perilous situations to all nations. Just like Bond facing endless
conflicts, in President Biden’s 100-day speech, he speaks about “crisis and opportunity”
(“Biden’s Speech to Congress: Full Transcript,” The New York Times.com). Bond and Biden
are of the same mindset: “turning peril into possibility, crisis into opportunity, setbacks to
Times.com). Foremost among the crises confronting the U.S. and the world is the threat posed
technologies. As Rachel Ellehuus and Pierre Morcos of the Center for Strategic and International
2
Studies argue, now is the time for NATO to be “ambitious” in meeting this challenge and to
Ellehuus, Rachel (Deputy Director, Europe, Russia, and Eurasia Program) and Morcos,
Pierre (Visiting Fellow, Europe, Russia, and Eurasia Program), “‘Lifting Up Our Values
at Home’: How to Revitalize NATO’s Political Cohesion,” Center for Strategic and
International Studies, March 12, 2021, accessed online June 18, 2021.
https://www.csis.org/analysis/lifting-our-values-home-how-revitalize-natos-political-
cohesion
First, an inattention to the principles of democracy, individual liberty, and the rule of law
in a member country creates societal vulnerabilities that competitors can exploit. Russia,
for example, preys on the grievances of racial and ethnic minorities in NATO member
countries in order to weaken national-level governance and cohesion. Likewise, a
compromised media environment allows disinformation campaigns to flourish, while
corruption opens space for Russian networks to operate and gain influence. Even allies
with strong democratic institutions, such as Germany, are increasingly targets of Russian
disinformation campaigns. In these ways, a deficit in internal values quickly becomes an
external security threat.
....
Yet however difficult, NATO can no longer afford to turn a blind eye on these internal
strains. From its founding, it has been more than just a military alliance. NATO has
embraced a political role built on a shared democratic identity. As the alliance seeks to
exercise more fully the power of this political dimension, shoring up its values is vital to
realizing the full benefits of collective security. A lack of response from NATO on these
issues would ultimately undermine its reputation and credibility, most notably toward
accession candidates and partners.
With NATO in the midst of an adaptation process and a new U.S. administration
committed to defending democratic values and restoring the transatlantic alliance, the
time is right for tackling this issue. Washington has the political sway to act as a “first
among equals” within NATO and push allies to seriously address this challenge.
However, a mere declaration of good intentions is not enough. If allies want to uplift
NATO’s political cohesion, they will need to be ambitious.
As James Bond would often partner with Felix Leiter, CIA operative, to conquer these
challenges, the U.S. must now have a global partnership to successfully overcome various threat
levels to resolve crises. This is why the authors contend a U.S. and NATO cooperative offers the
best geopolitical defense against formidable threats, such as China and Russia.
3
Clearly, the last four years created a geopolitical climate that makes cooperation a more
cumbersome sell for Biden. But, with Trump’s eye on 2024, now may be the time for Biden to
act decisively to partner with international groups as a way of proving their legitimacy, thus
making the case for international engagement rather than isolationism. While current terrorist
threats appear from domestic origins and gun violence, AI, biotechnology, and cybersecurity
may pose a more dangerous threat to the United States and its allies which requires an
international solution.
With experts predicting that whichever country leads in emerging technology by 2030
will be the dominant power for the remainder of this century, the time to counter the threat posed
A couple of years ago, Vladimir Putin warned Russians that the country that led in
technologies using artificial intelligence will dominate the globe. He was right to be
worried. Russia is now a minor player, and the race seems now to be mainly between the
United States and China. But don’t count out the European Union just yet; the EU is still
a fifth of the world economy, and it has underappreciated strengths. Technological
leadership will require big digital investments, rapid business process innovation,
and efficient tax and transfer systems. China appears to have the edge in the first,
the U.S. in the second, and Western Europe in the third. One out of three won’t do,
and even two out three will not be enough; whoever does all three best will dominate
the rest.
We are on the cusp of colossal changes. But you don’t have to take Mr. Putin’s word
for it, nor mine. This is what Erik Brynjolfsson, director of the MIT Initiative on the
Digital Economy and a serious student of the effects of digital technologies, says:
“This is a moment of choice and opportunity. It could be the best 10 years ahead of
us that we have ever had in human history or one of the worst, because we have
more power than we have ever had before.”
Why should the U.S. partner with NATO? As Brynjolfsson notes, this is indeed “a
moment of choice and opportunity,” and given that the 2020s will be decisive in determining
4
which global powers lead the world in emerging technologies for foreseeable future, now is the
time -- with a sufficient but rapidly shrinking window of opportunity -- to debate NATO as the
appropriate mechanism for cementing the transatlantic alliance’s technological and geopolitical
leadership, lest China and Russia gain supremacy. Just like the CIA, NATO is in a unique
position to create an innovation pipeline to maintain security worldwide. Rob Murray, the head
of NATO innovation unit, contends in the NATO Review, September 1, 2020, NATO is key in
Murray, Rob (head of the Innovation Unit, NATO’s Emerging Security Challenges
Division). “Building a Resilient Innovation Pipeline for the Alliance.” NATO Review, 1
Sept. 2020, accessed online, February 15, 2021.
www.nato.int/docu/review/articles/2020/09/01/building-a-resilient-innovation-pipeline-
for-the-alliance/index.html .
Today, NATO’s competition is a global one and the race is one of technological
adoption – that is, the acceptance, integration and use of new technology in society.
From artificial intelligence to quantum and everything in between, governments are
in a race to leverage these technologies at scale and speed – the first adopter
advantage for emerging disruptive tech could not be more prevalent in the world of
geopolitics and deterrence. Indeed, the nations that win this race may be those with
the most agile bureaucracy rather those with the best technology.
In contrast to the Cold War, the United States and its NATO Allies are unlikely to
simply outspend others. In a post-Covid-19 world, rebalancing public finances could see further
financial pressure placed on Allied defence budgets. We now need a different advantage, one which will
deliver in the short term and build resilience over the longer term – more defence at less cost with least
delay. This starts with our people, their creativity, education and access to funding. It ends with a robust
pipeline of new dual-use (civil and military) technologies constantly being created, commercialised and
capitalised upon.
The Alliance’s transatlantic nature places it in a unique position within the
international order to provide both demand-side policies and supply-side resources
that can genuinely build such a pipeline, creating not only innovations but entirely
new markets – as Eisenhower noted: the foundation of military strength is economic strength. Recent
history would suggest, the model of democracy and Allied governments’ willingness to make big bets on
mission-oriented technology does indeed create new markets and it is this model, underpinned by
shared values, which will be key to NATO’s longer term success.
But what about now? In the short term, NATO innovation
needs to lay the
foundations for Allies to realize those benefits of an Alliance-wide approach.
Answers may lay in focusing on two core areas: [1] addressing the fragmentation of
researchers, academia, start-ups and government at the beginning of this pipeline –
that is, managing uncertainty. [2] being able to adopt and scale these new
technologies as and when they are ready – meaning the necessity of nimble, agile
5
investment and acquisition entities across both public and private sectors, all of
which need to be equally incentivized to take significant levels of risk.
These activities are difficult in their own right but combining them into an Alliance
innovation pipeline, while attempting to make use of the comparative advantage each Ally brings to
the table, leaves the Alliance with a “wicked problem”. It is wicked because it demands a
combination of both sustained and disruptive innovation (which seeks to radically
change the status-quo) occurring simultaneously across NATO.
In addition, European leaders now view this as a critical time to develop the types of alliances
Erlanger, Steven (chief diplomatic correspondent) and Michael D. Shear (White House
correspondent), “Shifting Focus, NATO Views China as a Global Security Challenge,”
The New York Times, June 14, 2021, accessed online June 24, 2021,
https://www.nytimes.com/2021/06/14/world/europe/biden-nato-china-russia.html
This NATO meeting was mostly a warm embrace of President Biden, who in
contrast to his predecessor has expressed deep belief in the alliance and in the
importance of American participation in the multilateral institutions Washington
established after the horrors of World War II.
The contrast to Mr. Trump’s May 2017 NATO summit was remarked on by many
other leaders. Then, Mr. Trump was particularly angered by the expense and lavish use
of glass in NATO’s new $1.2 billion headquarters. Mr. Trump also defied the
expectations of even his own aides and refused to announce support for NATO’s Article
5, a central tenet of collective defense.
Mr. Biden quickly declared Monday that the alliance is “critically important for
U.S. interests” and called Article 5 a “sacred obligation.” He added: “I just want all
of Europe to know that the United States is there.”
Prime Minister Mario Draghi of Italy spoke for many when he connected this
summit with the Group of 7 summit meeting just concluded in Britain and
compared them unfavorably with the period of Mr. Trump. “This summit is part of
the process of reaffirming, rebuilding the fundamental alliances of the United
States,” which were “weakened by the previous administration,” Mr. Draghi said.
6
With a new administration taking the reins, now could be the key opportunity of moving
We must shape the rules that will govern the advance of technology and the norms of
behavior in cyberspace, artificial intelligence, biotechnology so that they are used to lift
people up, not used to pin them down. We must stand up for the democratic values that
make it possible for us to accomplish any of this, pushing back against those who would
monopolize and normalize repression.
In a recent Brookings Institute report, Lindsey Ford, a David M. Rubenstein Fellow, and James
Ford, Lindsey W. (David M. Rubenstein Fellow-Foreign Policy, Ctr. For East Asia
Policy Studies) and James Goldgeier (Sr. Visiting Fellow-Foreign Policy, Ctr on US and
Europe), “Retooling America’s Alliances to Manage the China Challenge.” The
Brookings Institute, Jan. 25, 2021, online accessed 02/15/2021,
https://www.brookings.edu/research/retooling-americas-alliances-to-manage-the-china-
challenge/
The first step in creating more capable 21st century alliances is to return to basics:
focusing on the defense of allied sovereignty. While allies can and should play important roles
addressing violent extremism in the Middle East or engaging in partner capacity-building efforts in Africa,
the principal focus of U.S. alliances in Europe and Asia should be to maintain a
credible deterrence and self-defense capability. This will require greater
investments by U.S. allies in their own defense, but it will also require a greater
willingness in Washington to allow allies to take the lead in their own regions.
Despite Europe’s continued dependence on the United States, it is time for a
reconceptualization of the trans-Atlantic relationship. NATO’s continuation after the end of
the Cold War was a way of keeping America in charge of European security during an uncertain period
after the Soviet collapse. Europe’s failure to stop genocide in the former Yugoslavia in the early 1990s was
another reminder of the continent’s dependence on Washington, which finally put an end to the killings.
Moving forward, NATO’s success should be measured by its ability to shift from
serving as a vehicle for U.S. dominance over European security to an entity that
enables the U.S. to assist European-led defense efforts in a more balanced
partnership.
7
sea surveillance… We stay dependent, but at the same time, we must come into our
own.”
If the U.S. is going to succeed in rebalancing its defense posture toward Asia, it needs a stronger Europe
able to take the lead in its broader neighborhood. Fears that European efforts to build greater capacity will
undermine NATO are overblown and only relevant in a world in which U.S. dominance over European
security — rather than the capacity of European allies to manage their own security challenges with less
reliance on the United States — is the primary goal.
The U.S. needs to continue encouraging its allies to move out of a supporting role in the Indo-Pacific as
well. In light of the rapidly advancing military threat from both China and North Korea, U.S. allies will
need to play a larger role in not only their own self-defense, but also in the region. An increasing tempo of
allied air and maritime presence operations will be particularly valuable in the coming decade as the United
States looks to address needed modernization requirements that may reduce its bandwidth for steady state
operations. If the U.S. wants to “shift” the defense burden and credibly deter Beijing, it should also explore
new ways to make it easier for U.S. allies to obtain the capabilities they need. This should include breaking
down outdated bureaucratic hurdles, export control rules, and technology transfer restrictions that can make
it difficult for U.S. allies to compete more effectively with Beijing. Equally important, many of these
restrictions often incentivize U.S. allies to pursue autonomous capabilities outside of the alliance, rather
than in tandem with Washington.
Finally, focusing on domestic resilience in space, cyberspace, and technological
systems will create additional incentives for allies to work together. The threat
China poses in these arenas as it seeks to take the lead in 5G and artificial
intelligence (AI) is becoming more apparent to allies in Asia and Europe: this is one
area that can foster greater consensus despite allied disagreement on the political
and economic challenges that Beijing poses.
To be sure, NATO has already signaled its willingness to act on the threat posed by emerging
technology. At the alliance’s June 2021 summit, member states agreed to launch a defense
Tucker, Patrick (technology editor), “NATO Members Agree to Broad Tech Agenda,
Environmental Agenda,” Defense One, June 16, 2021, accessed online June 18, 2021.
https://www.defenseone.com/threats/2021/06/nato-members-agree-broad-tech-agenda-
environmental-agenda/174767/
NATO members will determine the best way to identify and minimize cyber threats, as
they always have, but the members agreed to a more active advisory role for NATO.
They also agreed to start the process of sharing more information with each other about
the status of their resilience efforts.
“There is a political commitment to develop this whole process, so to create...a system for
monitoring, to come together regularly with high-level officials from all countries to
monitor progress and then, of course, on the basis of these objectives…each ally will
work with us advising to develop their own national approach. It’s an expansion.”
NATO members will launch a defense innovation accelerator to help fund startups
develop technology that could help collective defense.
8
“Concretely, this will be a center designed to foster greater transatlantic cooperation, to
promote interoperability and that will have a series of...offices to staff centers across the
alliance,” she said. The accelerator will allow NATO to better “experiment, validate,
integrate, [and] adopt new and emerging technologies, together.”
Members have also agreed to launch a defense innovation fund focused on startups that
make technology for both defense and civilian organizations. The fund will be opt-in and
will look for new, non-traditional players making technologies “that answer problems we
have for our common defense and security,” Berti said, describing it as a recognition that
the next generation of companies making defense products will largely be software
companies.
But, while NATO’s pledges to increase technology cooperation are a step in the right direction,
defense scholars including Jamie Shea and Michael John Williams contend that this is just the
beginning, and in “a world full of competition for attention,” more will need to be done to
Shea, Jamie (president at the Centre for War Studies at the University of Southern
Denmark and a former NATO deputy assistant secretary general for emerging security
challenges) and Williams, Michael John (nonresident senior fellow with the Scowcroft
Center’s Transatlantic Security Initiative and an associate professor of international
affairs at Syracuse University), “The secret to NATO’s survival: Get political,” Atlantic
Council, June 17, 2021, accessed online June 18, 2021.
https://www.atlanticcouncil.org/blogs/new-atlanticist/the-secret-to-natos-survival-get-
political/
As Americans memorialized their dead and sat down for barbecues with family and
friends over Memorial Day weekend, little did they know that one of the country’s largest
meat producers was being hacked with ransomware. The matter hit home again when
summer travel plans were upended for thousands as the Steamship Authority in
Massachusetts succumbed to a cyberattack. Such attacks against public and private
entities will only become more common, and NATO needs to be the forum where
transatlantic strategy on tech sovereignty and innovation occurs. What norms and
standards are required for a stable and productive future? The focus needs to be not just
on disruptive technologies (and resilience, see above), but also on how to open US and
European defense markets to foster multinational cooperation in research and
development and to develop industry partnerships. The announcements in the summit
communiqué on establishing a Defence Innovation Accelerator for the North
Atlantic and a NATO Innovation Fund are welcome developments, but more is
needed. NATO needs to be the forum where a doctrine of cyber responsibility is
developed and deployed.
9
Developing the Alliance as a political actor via these six action points will not be
easy, but if there is an administration that could do it, it is Joe Biden’s. Biden is the
first US president since George H.W. Bush with an inherent tendency toward
Atlanticism. Since 2000, the transatlantic space has endured reproach, apathy, and most
recently hostility and neglect from the White House, all of which have been highly
detrimental to transatlantic relations and greatly contributed to the decline of NATO as a
political actor. But Biden is a natural trans-Atlanticist and is the last president of a
generation that looked instinctively to Europe. One of his chief legacies could be setting
a foundation for younger Americans to see Europeans, in a world full of competition
for attention, as the allies they turn to first.
In the 65 years since computer scientist, John McCarthy, coined the term “artificial
intelligence,” AI has alternately captivated, enthralled, inspired, confused, terrified, and troubled
scientists, philosophers, political commentators, and the public. In fact, global Bond enthusiasts
Depending on one’s vantage point, AI may represent an opportunity to either hope for a
future in which human beings are liberated from mundane jobs and tasks and free to pursue their
own creative and leisurely interests, or an existential threat to livelihoods and the dignity of work
for all, but a narrow technocratic elite. It may be an enabler of unprecedented efficiency, or yet
another tool for flattening, and thereby impoverishing the human experience. One could see AI
hi-tech means of replicating deeply ingrained societal biases, but with even less accountability.
Where some see a resource for building smarter cities and safer streets, others fear that AI will
serve as a weapon for making the modern surveillance state even more intrusive. Whereas many
AI enthusiasts hail the technology as a way of facilitating connections among people with shared
values, interests, and ideas, more skeptical minds may consider the technology a leading culprit
behind the Balkanization of 21 -century social and political life. For every champion of AI as a
st
10
solution for making modern warfare more precise, with fewer civilian casualties, there are likely
applications and use cases; indeed, it is a term that “refers to any human-like intelligence
exhibited by a computer, robot, or other machine. In popular usage, artificial intelligence refers
to the ability of a computer or machine to mimic the capabilities of the human mind” (IBM). AI
systems rely on data inputs to generate insights that can then be wielded by human beings to
make decisions. For instance, AI can be utilized to forecast electoral outcomes based on diverse
inputs like social media sentiment analysis, demographic and economic conditions, polling data,
AI can be as simple and mundane as the auto-fill that predicts and suggests words and
phrases for our text messages and email communications (usually with uncanny accuracy, based
and controversial as the algorithms that some experts suggest will help guide foreign policy
To the extent that AI provokes unease and debate, it is less because of what people think
of AI as a “concept” and has much more to do with what people think of specific applications of
the technology. And, when it comes to the role AI will play in international affairs and security,
already a prominent factor in one of the central animating realities of global geopolitics: the great
power competition, verging on a global crisis, between the United States and the People’s
Republic of China.
11
For all that President Joe Biden has done to roll back key elements of former President
Donald Trump’s domestic and foreign policies, the 46th president and his administration have
signaled that they will continue his predecessor’s tough line against China (Lee, 2021). The
bipartisan consensus that China is, at best, a strategic competitor stems in large part from a clear-
eyed assessment of the country’s vast geostrategic ambitions, which has led many to the
conclusion that the U.S. was misguided in its turn-of-the-century gamble that liberalizing
economic and trade relations with China would foster greater political liberalization in the
country and encourage “peace and security” on the global stage (Clinton, 2000).
Evidence against former President Clinton’s assessment can be found from China’s
actions in the South China Sea, its close ties with adversarial regimes like Iran and North Korea,
and its alleged theft of intellectual property. In the realm of AI, President Xi Jinping has been
clear that he sees Chinese supremacy as a core foreign policy and national security objective and
12
Then, President Trump sought to assert U.S. leadership in the field with a 2019 executive order
“The National Intelligence Research and Development Strategic Plan: 2019 Update.”
Select Committee of Artificial Intelligence of the National Science & Technology
Council, June 2019. https://www.nitrd.gov/pubs/National-AI-RD-Strategy-2019.pdf
On February 11, 2019, the President signed Executive Order 13859, Maintaining
American Leadership in Artificial Intelligence. 7 This order launched the American AI
Initiative, a concerted effort to promote and protect AI technology and innovation in the United States .
The Initiative implements a whole-of-government strategy in collaboration and
engagement with the private sector, academia, the public, and like-minded
international partners. Among other actions, key directives in the Initiative call for
Federal agencies to prioritize AI R&D investments, enhance access to high-quality
cyberinfrastructure and data, ensure that the Nation leads in the development of
technical standards for AI, and provide education and training opportunities to
prepare the American workforce for the new era of AI.
But, critics suggest Trump’s executive order fell short of what would be needed to promote U.S.
AI leadership.
President Trump signed an executive order Monday meant to spur the development
and regulation of artificial intelligence, technology that many experts believe will define
the future of everything from consumer products to health care to warfare.
A.I. experts across industry, academia and government have long called on the
Trump administration to make the development of artificial intelligence a major
priority. Last spring, worried that the United States was not keeping pace with China and other
countries, Jim Mattis, then the defense secretary, sent a memo to the White House imploring the
president to create a national strategy on A.I.
Now, Mr. Trump has taken that step, though this “American A.I. Initiative” might not be
as bold as some had hoped.
The executive order aimed to better educate workers in the field, improve access to
the cloud computing services and data needed to build A.I. systems, and promote
cooperation with foreign powers. But the order did not set aside funds for A.I.
research and development, and the administration provided few details on how it
planned [to] put its new policies into effect.
13
The Biden administration plans to continue the previous administration’s efforts to counter
China’s AI ambitions and may take additional steps, including on U.S. manufacturing policy, to
Finally, Biden’s new secretary of state made clear that technology will still be an important geopolitical
force. During his Senate confirmation hearing, Antony Blinken remarked that there is “an
increasing divide between techno democracies and techno autocracies. Whether
techno democracies or techno autocracies are the ones who get to define how tech is
used…will go a long way toward shaping the next decades.” As pointed out by Politico,
this most clearly is an allusion to China, and the idea that the US is in a race with
the country to develop emerging technologies like AI and 5G. OneZero’s Dave
Gershgorn reported in 2019 that this had become a rallying cry at the Pentagon. Speaking at an AI
conference in Washington, Trump’s Secretary of Defense Mark Esper, framed the technological
race “in dramatic terms,” wrote Gershgorn: “A future of global authoritarianism or global
democracy.”
Blinken’s comments suggest to me that the Biden administration will likely continue this
thread from the Trump administration. That means it may continue putting export
controls on sensitive AI technologies and placing bans on Chinese tech giants to do
business with American entities. It’s possible the administration may also invest
more in building up the US’s high-tech manufacturing capabilities in an attempt to
disentangle its AI chip supply chain from China.
At stake in the AI competition is much more than bragging rights. Economic leadership and
Levine, Steve (Future Editor at Axios. I am a Senior Fellow at The Atlantic Council, and
teach energy security at Georgetown University). “The stakes for who wins the AI race,”
Axios. March 21, 2018. https://www.axios.com/the-stakes-for-who-wins-the-ai-race-
0363d9cd-0d97-4a5a-9ee6-36a7fb03ff44.html
Robert Work, a former deputy secretary of defense in the Obama Administration, tells Axios that that
dichotomy — the difference between democratic and authoritarian systems — mean that "how we use AI
will be different."
In September, for instance, Vladimir Putin said that whoever leads AI "will become
the ruler of the world.” Given Putin's effort to "attack the cohesion of democratic
countries" the last two years, if he did have sophisticated AI, he "would be able to
probe divisions of the entire society," Work said. "Russia looks at this as 'active
14
measures,'" meaning as part of its longstanding system of clandestine attack on
other countries.
Russia is behind in AI research but ahead on robotic warfare, said Work, who is a
board member at Govini, an analytics firm.
With China, the AI race is likelier to have an economic texture, said Andrew Moore,
dean of computer science at Carnegie Mellon University. "It will be the economic
question of who will be the Googles, Amazons and Apples in 2030. There is a good
chance they are more likely to come out of China than the U.S.," Moore tells Axios.
The main reason is human capital: Moore estimates that China produces ten times the number of university
graduates specializing in AI as the U.S.
While China is the United States’ primary geopolitical rival in AI, Russia has substantially
increased its strategic initiatives in AI in recent years, particularly in the commercial realm.
Russia’s leaders have been paying close attention to artificial intelligence (AI) technologies for several
years now. President Vladimir Putin has said on numerous occasions that the leader in
the field of AI would become “the master of the world.” Until recently, however,
Russia remained virtually the only large country without its own AI development
strategy.
That changed in October 2019, when the country adopted a long-discussed National
Strategy for the Development of Artificial Intelligence Through 2030. One of the driving
forces behind the strategy was Sberbank president German Gref. The state-owned bank has also
developed a road map for developing AI in Russia and coordinated the creation of
Russia’s AI development strategy, which is largely corporate, involving the internet giants
Yandex and Mail.ru Group, along with Gazprom Neft energy company .
Russian businesses are willing to put AI technology into practice, giving Russia a competitive advantage.
Microsoft has named Russia the world leader in the active implementation of AI in
business. According to its research, 30 percent of Russian companies actively
implement AI: the highest number among all countries studied, compared with an
average of 22.3 percent.
Recognizing that AI’s role in international security will only grow more prominent in the coming
years, NATO aims to develop a set of common AI standards by the summer of 2021. The precise
15
form these standards will take remains to be seen, but they may provide a useful framework for
On paper, NATO is the ideal organization to go about setting standards for military
applications of artificial intelligence. But the widely divergent priorities and budgets of its 30
members could get in the way. The Western military alliance has identified artificial
intelligence as a key technology needed to maintain an edge over adversaries, and it
wants to lead the way in establishing common ground rules for its use.
“We need each other more than ever. No country alone or no continent alone can
compete in this era of great power competition,” NATO Deputy Secretary-General Mircea
Geoană, the alliance’s second in command, said in an interview with POLITICO. The standard-
setting effort comes as China is pressing ahead with AI applications in the military
largely free of democratic oversight. David van Weel, NATO’s assistant secretary
general for emerging security challenges, said Beijing's lack of concern with the tech's
ethical implications has sped along the integration of AI into the military apparatus.
"I'm ... not sure that they're having the same debates on principles of responsible
use or they're definitely not applying our democratic values to these technologies,”
he said. Meanwhile, the EU — which has pledged to roll out the world's first binding rules on AI in
coming weeks — is seeking closer collaboration with Washington to oversee emerging technologies,
including artificial intelligence. But those efforts have been slow in getting off the ground. For Geoană, that
collaboration will happen at NATO, which is working closely with the European
Union as it prepares AI regulation focusing on “high risk” applications.
…
NATO does not regulate, but “once NATO sets a standard, it becomes in terms of
defensive security the gold standard in that respective field,” Geoană said. The alliance's
own AI strategy, to be released before the summer, will identify ways to operate AI systems responsibly,
identify military applications for the technology, and provide a “platform for allies to test their AI to see
whether it's up to NATO standards,” van Weel said.
Biotechnology
Biotechnology has been a part of human society for as long as documented history. Early
forms of biotechnology include the use of yeast to leaven bread, as well as the use of algae to
make cakes. These ancient forms of biotechnology may have been emerging technologies at one
point in human history, but today, the use of biological organisms or their byproducts for
mundane matters like making cheese and yogurt are not what comes to mind when the term
16
biotechnology is used. The term was first documented in 1919 by a Hungarian engineer, but this
was not the real beginning of biotechnology’s importance or development. There are clear phases
classical developments during the 19 century, and finally extending to today’s modern period of
th
exponential development (Verma, et al, 2011). Modern biotechnology has even taken on an air
of science fiction. As readers and viewers of the Bond series, Q introduces the audience to
biotechnology with “smart blood” used in Spectre to track 007, which is no longer far off the
mark of realized science as DNA databases grow in size and scope. Again, another opportunity
health defines the modern iteration of biotechnology and certainly gains the most attention. In
the last two decades, CRISPR technology, a relatively esoteric niche, has been widely discussed
and debated. It is a gene editing tool with the potential to revolutionize the treatment of disease at
the genetic level (Ledford, 2020). It also offers prospects for the development of agriculture and
energy through the creation of disease resistant crops and biofuels (Weiss, 2016). However,
biotechnology is not without risks. As with any technology, the potential for misuse exists. This
is particularly true for technologies described as “dual-use,” where the innovation can be
employed to benefit or harm society. These possibilities include but are not limited to the
following:
Galatas, Ioannis. “The misuse and malicious uses of the new biotechnologies”, Annales
des Mines - Réalités industrielles, vol. février 2017, no. 1, 2017, pp. 103-108.
17
knowledge of the molecular basis of antigens led to antibody reagents of
improved specificity.
• Mechanism of action of micro-organisms: Using molecular biology,
mechanisms of virulence and infection have been identified, raising fears for
deliberate manipulation of these mechanisms (e.g. via transferring genetic
traits into naturally infectious micro-organisms or via altering their
immunogenicity thus invalidating both vaccines and diagnostic methodologies).
• Micro-biological developments: Better knowledge of protein synthesis and
assembly led to production and isolation of various proteins (e.g. Escherichia coli;
Yersinia spp.).
• Human Genome Project (HGP): Identification and localization of genes causing
hereditary diseases and simplification of the development of pharmaceutical drugs
for treatment of hereditary diseases. HGP provides sufficient data on ethnic
genetic differences between population groups, raising fears for future
“ethnic bombs” (micro-organisms attacking known receptor sites or
targeting DNA sequences inside cells by viral vectors). A study in the US on
the Y-chromosome and mitochondrial DNA in populations from different regions
has suggested that the data generated could be used for developing methods to
selectively disturb cellular respiration and energy exchange, sexual reproduction
and a number of other important functions connected with the Y-chromosome. A
recent study in Taiwan has discovered that Severe Acute Respiratory Syndrome
(SARS) can be associated with specific genetic profiles. Human Genome Project
(HGP) – completed in 2003 – discovered all the estimated 20,000-25,000 human
genes and determined the complete sequence of the three billion DNA subunits
bases in the human genome.
• Toxins and Regulators: Large-scale extraction and production (lower
cost/shorter time) of potent toxins, which until now were available only in minute
quantities from immense amounts of natural biological materials. Understanding
of bio-regulators and their effects, when present in abnormal concentrations. The
possibility to manipulate toxins or bio-regulators or to produce them in pure
form in large quantities opens up new perspectives that have to be considered
with implications for BTWC. Bio-regulators are considered to pose a serious
threat of being used for illicit purposes due to the increased understanding of
inter- and intra- cellular processes and control of central biological processes
of mammalian systems, including human. Much interest these days has been
generated in identification and purification of toxins from marine resources
having therapeutic potential. Though isolated in small quantities, they have
already been shown to have potential of exploitation for generating significant
amounts of bioactive substances of both therapeutic and harmful effects. Recently
a bioactive peptide, a synthetic conotoxin compound produced by cone snails, has
been licensed for use in the treatment of severe chronic pain. Botulinum toxin is a
therapeutic for a number of disease conditions. The catalytically active and toxic
A-subunit portion of these toxins conjugated with antibodies raised against
specific antigens found on the surface of tumour cells is used for site-directed
anticancer therapy. B-subunit toxins are being exploited to study intracellular
delivery mechanisms like delivery of therapeutic agents to neural cells for the
18
treatment of neural dysfunctions. It is also well known that botulinum toxin is a
potential bio-agent for military use.
environmental protection, and even energy. In each of these areas, potential cases could act to
improve cooperation to benefit innovation or manage risk. Avenues for the employment of
biotechnology seem limitless. For example, biotechnology has made it possible to create edible
vaccines. Innovations of this type are exciting as they have the potential to prevent common
Kurup, Vrinda M, and Jaya Thomas. “Edible Vaccines: Promises and Challenges.”
Molecular biotechnology vol. 62,2 (2020): 79-90. doi:10.1007/s12033-019-00222-1
Examples such as this, demonstrate biotechnology’s broad range of utilization. The opportunities
for international cooperation across a host of issues makes biotechnology a rich source of policy
In addition, biotechnology is a prime example of how domestic action may not go far
enough to influence the path of technology innovation and use. While the U.S. may be able to
control where innovation occurs for domestic entities, there is growing concern that it will not be
able to exert as much influence in the future. When considering international competition, one
potential risk for US security is China’s aggressive development of biotechnology. While the
19
U.S. is still dominant in this area, indications show that China is a growing threat. Furthermore,
there are mutual risks to both countries from unregulated use of biotechnology and its potential
misuse by terrorist groups. This highlights China as an important adversary and counterpart in
The certainty that China will play an increasingly important role in the global
biotechnology sector poses several issues for U.S. policymakers. The gravest of these
pertain to national security. Though there is presently no sign that China’s capabilities exceed those
of the United States, some researchers have noted that biotechnology is a focus of increasing
attention by the People’s Liberation Army. U.S. policymakers and security analysts have also
raised concerns that the dominant market position of Chinese firms in producing active
pharmaceutical ingredients might allow Beijing to disrupt U.S. access to lifesaving
drugs in the event of a conflict. On the other hand, the use of tools like CRISPR, which is
increasingly inexpensive and easy to use, by terrorists and non-state actors to
potentially create novel bioweapons poses severe security threats to both the United
States and China. It would seem to be in the interest of all states, including China, to
strengthen efforts, currently led mostly by the private sector, to prevent dangerous
actors from gaining access to DNA templates and other relevant materials
Biotechnology also converges with the other areas of the topic in important ways. This
offers debaters the opportunity to address multiple concerns within a debate round. A synergy
between topic areas allows affirmative teams to explore unique solvency options and advantages
while providing negative teams ground to explore gaps in solvency for potential cases.
20
powerful technologies (Pauwels, 2018). These issues are not new, as bioinformatics and
digitization have created a potential target; however, the popularization of AI has refreshed these concerns
in the modern zeitgeist. There is a renewed opportunity for life science and cybersecurity
professionals to design and implement frameworks to facilitate responsible
application of AI techniques to biology.
debate. Can the international community afford not to act to prevent the potential harms of
creativity in the field of biotechnology? Will the global community be prepared to respond to
biological threats both naturally occurring or man-made in the future? These questions are
central to the debate over US international cooperation on emerging technologies in the field of
biotechnology.
Cybersecurity
threat designed to wreak havoc on M16, Bond, and the world. But, in the real world, the United
States faces the biggest risk during the Trump administration, and now, the current
administration, as well. Currently, the U.S. confronts a similar crisis from Russian and Chinese
hackers who want to gain access to U.S. servers. Cyberspace creates a unique vulnerability for
attack in the United States as laws block the ability of intelligence agencies to use domestic
Lawmakers are being tasked, by the NSA and our nation’s leading cybersecurity experts,
to create solutions preventing hackers’ access to U.S. servers. The recent exploitation of
Microsoft Exchange servers, by the Russian and Chinese governments, left the U.S. blind to the
cyber intrusion. On May 8, 2021, DarkSide (alleged Russian hackers) breached the Colonial
Pipeline, part of U.S. energy infrastructure, to create chaos. Whether this is in response to
21
President Biden’s sanctions on Russia, is unknown. However, NSA can only monitor foreign
internet traffic. NSA would have to request lawmakers to expand their domestic cyber authority
for limited circumstances. This is a concern for lawmakers because of watchdog and 4 th
Amendment privacy rights’ groups, as the U.S. has a long and documented history of using
broad surveillance authority to collect information about its citizens. However, a failure to take
action means ceding Russian, Chinese, North Korean, Iranian, and other non-state hackers’
access to critical public and private systems in the U.S. The Council of Foreign Relations
counters this pressure by reminding decision makers that there is no indication that expanding
the scope of NSA authority would have resulted in discovering the recent Solar Wind
attacks. Tonya Riley, technology and cybersecurity researcher for the Washington Post, argues:
National Security Agency Director Gen. Paul Nakasone stressed that foreign hackers are taking
advantage of the intelligence community's “blind spot” – domestic Internet activity. “Our
adversaries understand that they can come into the United States and rapidly utilize an
Internet service provider, come up and do their activities, and then take that down before a
warrant can be issued, before we can actually have surveillance by a civilian authority here
in the United States,” he told the Senate Armed Services Committee in a rare hearing.
Washington is scrambling for solutions in light of two major recent hacks in which
attackers used U.S. internet infrastructure. In a sweeping Russian hack of at least nine
government agencies and 100 companies, hackers used Amazon cloud services and
GoDaddy domains to launch malicious software used in the attack. Those hackers went
unnoticed by the government for almost nine months. Chinese hackers that compromised
thousands of Microsoft Exchange servers also used U.S. based servers. “It’s not the fact that
we can’t connect the dots. We can’t see all of the dots,” Nakasone told lawmakers. The NSA
only has authorization to monitor foreign Internet traffic. And although the FBI and the
Department of Homeland Security have some authority over Internet traffic within the
United States, the authorities require a warrant. It's against this backdrop that some
experts want to expand NSA authorities to monitor domestic Internet traffic under limited
circumstances.
Instead, the Council recommends the U.S. should focus on creating public-private partnerships
(PPP’s) to combine cyber intelligence and coordinate more effective responses to threats. These
22
PPP’s do not come without their own concerns. Private industry is reluctant to share discovery
of software vulnerabilities with the U.S. government and the National Security Agency (NSA).
These organizations consistently refuse to fix vulnerabilities and instead engage in a policy of
leaving “Backdoors” for future Offensive Cyber Operations (OCO’s). Regardless of concerns,
lawmakers are currently drafting legislation requiring private companies to disclose these
Analysis of the recent Solar Winds attacks by private cyber security firms carrying out
the ongoing attacks on the U.S., European governments, and private businesses confirm the
impact of this breach. The examination of the servers reveals the groups responsible for the
attack, the scope and breadth of the attacks, and the far-reaching nature of their exploitation of a
vast array of targets, Covid-19 test manufacturers, and defense and aerospace
Lepido, Daniele (senior reporter for Bloomberg News). “Swiss Cyber Security Firm
Says It Accessed Servers of a SolarWinds Hacking Group.” Insurance Journal, 3-23-
2021,
https://amp-insurancejournal-
com.cdn.ampproject.org/v/s/amp.insurancejournal.com/news/international/2021/03/23/60
6548.htm?amp_gsa=1&_js_v=a6&usqp=mq331AQFKAGwASA%3D -
amp_tf=From%20%251%24s&aoh=16166058694112&csi=0&referrer=https%3A%2F%
2Fwww.google.com&share=https%3A%2F%2Fwww.insurancejournal.com%2Fnew
s%2Finternational%2F2021%2F03%2F23%2F606548.htm
A Swiss cyber-security firm says it has accessed servers used by a hacking group
tied to the SolarWinds breach, revealing details about who the attackers targeted
and how they carried out their operation. The firm, PRODAFT, also said the hackers have
continued with their campaign through this month. PRODAFT researchers said they were able
to break into the hackers’ computer infrastructure and review evidence of a massive
campaign between August and March, which targeted thousands of companies and
government organizations across Europe and the U.S. The aim of the hacking group, dubbed
SilverFish by the researchers, was to spy on victims and steal data, according to PRODAFT’s report.
SilverFish carried out an “extremely sophisticated” cyber-attack on at least 4,720
targets, including government institutions, global IT providers, dozens of banking
institutions in the U.S. and EU, major auditing/consulting firms, one of the world’s
leading COVID-19 test kit manufacturers and aviation and defense companies,
according to the report. “[The] hackers maintained regular working hours and were most active Monday to
23
The hackers operated servers in
Friday between the hours of 8 a.m. and 8 p.m., the report said.
Russia and Ukraine, and shared some of the same servers as a notorious Russian
criminal hacking group known as Evil Corp.”
The concerns from private industry reflect the history of the NSA paying for and collecting
software exploits and code vulnerabilities to exploit in their own cyber-attacks against our
nation’s enemies. Unfortunately, the U.S. guided the world in cyberspace since the 1990’s, but
the recent theft of NSA hacking tools and espionage against the U.S. led to the release of “Zero
Day” exploits to transnational criminals, state actors, and the public on the Dark Web. The most
dangerous cyber weapons have been turned and pointed against our country. The Biden
administration remains committed to regulation of the technology industry and forcing software
companies to disclose and share all known vulnerabilities with their products to the
government. The motivation for this forced sharing is to create more effective “resiliency” in
networks that control our critical infrastructure by creating new coding standards for the tech
industry.
A judge rejected a request by an ex-CIA employee to dismiss charges of leaking hacking tools. A
judge
denied former CIA employee Joshua Schulte’s bid to dismiss espionage charges on
the grounds that the grand jury that indicted him did not have enough Hispanic or Black individuals, Larry
Neumeister of the Associated Press reports. A trial for Schulte, who is accused of leaking CIA hacking
tools to WikiLeaks and has pleaded not guilty to all charges, is expected to begin in October after a jury
deadlocked last year. WikiLeaks’ 2017 release of the hacking tools was one of the most
significant leaks in the CIA’s decades-long history and laid bare the agency’s
hacking and surveillance methods. The Biden administration is readying an
executive order to require companies to disclose breaches to U.S. government
clients. A draft version of the order would also require companies to keep more
records for investigations of the breaches and work with federal agencies as they
respond, according to Reuters’s Christopher Bing, Nandita Bose and Joseph Menn. The order could be
made public as early as next week, they write. The executive order comes as the Biden
administration plans its responses to the devastating SolarWinds and Microsoft
24
Exchange hacks. A National Security Council spokeswoman told Reuters no decision has been made
on the final content of the executive order. Anne Neuberger, the deputy national security adviser for cyber
and emerging technology, previewed the executive order earlier this month, when the government was still
primarily grappling with SolarWinds. Neuberger said at the time that the executive order would
“focus on building in standards for software, particularly software that’s used in
critical areas.”
In response to the Solar Winds attacks, the U.S. must act to create new protections to its
networks and critical infrastructure. Private companies, including Microsoft, are calling on the
government to assist in creating more robust defenses to cyber-attacks, instead of only focusing
U.S. cyber policy on the development and use of OCO’s against our enemies. An example is the
recent electricity grid collapse in Texas demonstrates the weaknesses inherent in much of the
critical infrastructure of our nation, and the vulnerability of citizens to the effects of a cyber-
attack. A second failed cyber-attack on water treatment facilities in Florida creates a new
nightmare for America. Every part of the public and private sector is currently vulnerable to
The question is not should we act, it is how we should act in response to this growing
threat. Congress needs to create a better system of intelligence sharing between the government
and private technology companies, to help identify and neutralize coding errors and system
vulnerabilities that our adversaries could exploit. The disorganized nature of our government’s
response to the latest attacks creates a need for swift action and new partnerships. The threat of
Russian and Chinese cyber-attacks calls for bipartisan support that would strengthen U.S. cyber
defenses. As it becomes evident, the current capabilities and bureaucracies within our
Russia as of April 15, 2021. In addition, our European allies and the U.S. are in joint agreement
of deterring Russia’s military presence in Crimea and Ukraine (Sanger, David E., and Andrew E.
25
Kramer, 2021). The question becomes when and how will Russia respond to these bilateral and
multilateral reprimands?
II. Resolutions
1. The USFG should substantially increase its security cooperation with NATO in one or more
of the following: artificial intelligence, biotechnology, cybersecurity.
2. NATO should substantially increase its security cooperation in one or more of the
following: artificial intelligence, biotechnology, cybersecurity.
3. The USFG and NATO should substantially increase their security cooperation for one or
more of the following: artificial intelligence, biotechnology, cybersecurity.
4. The USFG and NATO should substantially increase their policy cooperation in one or
more of the following: artificial intelligence, biotechnology, cybersecurity.
5. The USFG and NATO should substantially increase their engagement in one or more of
the following: artificial intelligence, biotechnology, cybersecurity.
6. The USFG and NATO should substantially increase their technology cooperation for one
or more of the following: artificial intelligence, biotechnology, cybersecurity.
26
III. Definitions
Artificial Intelligence
The FY2019 National Defense Authorization Act (via Congressional Research Service,
https://fas.org/sgp/crs/natsec/R45178.pdf) defines “artificial intelligence” as:
In computer science, the term artificial intelligence (AI) refers to any human-like intelligence
exhibited by a computer, robot, or other machine. In popular usage, artificial
intelligence refers to the ability of a computer or machine to mimic the capabilities
of the human mind—learning from examples and experience, recognizing objects, understanding and
responding to language, making decisions, solving problems—and combining these and other capabilities
to perform functions a human might perform, such as greeting a hotel guest or driving a car .
General AI
27
General AI,
Experts generally agree that it will be many decades before the field advances to develop
which refers to systems capable of human-level intelligence across a broad range of
tasks.10 Nevertheless, the rapid advancements in Narrow AI have sparked a wave of investment, with
U.S. venture capitalists raising an estimated $18.5 billion for AI research in 2019 alone. 11 Similarly,
DOD’s unclassified investments in AI have grown from just over $600 million in FY2016 to $2.5 billion in
FY2021 (including investments in autonomy), with the Department reportedly maintaining over 600 active
AI projects. 12
Narrow AI
The field of AI research began in the 1940s, but an explosion of interest in AI began around 2010 due to
the convergence of three enabling developments: (1) the availability of “big data” sources, (2)
improvements to machine learning approaches, and (3) increases in computer processing power.8 This
growth has advanced the state of Narrow AI, which refers to algorithms that address
specific problem sets like game playing, image recognition, and navigation. All
current AI systems fall into the Narrow AI category. The most prevalent approach
to Narrow AI is machine learning, which involves statistical algorithms that
replicate human cognitive tasks by deriving their own procedures through analysis
of large training data sets. 9 During the training process, the computer system creates its own
statistical model to accomplish the specified task in situations it has not previously encountered.
Enterprise AI
NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html) defines “Enterprise AI” as:
Operational AI
NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html) defines “Operational AI” as:
Mission Support AI
NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html) defines “Mission Support AI” as:
28
Mission Support AI, an intermediate category in terms of environment control and failure
implications, includes a diverse set of applications, e.g. logistics and maintenance, or
intelligence-related applications.
Machine Learning
NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html) defines “Machine Learning” as:
The contemporary wave of AI, or Second Wave AI, is centered on Machine Learning
(ML). ML involves the development and use of statistical algorithms to find patterns in
data. For example, a classification algorithm can be trained on a large set of correctly
labelled examples to determine to which previously encountered category a newly
observed object belongs.
Deep Learning
NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html) defines “Deep Learning” as:
Deep Learning is a subset of ML, which uses multiple computational layers (Artificial
Neural Networks with multiple layers) for the handling of computationally demanding
pattern recognition or prediction problems, e.g. Convolutional Neural Networks for
object detection within images.
Biotechnology
Biotechnology, the use of biology to solve problems and make useful products. The most
prominent area of biotechnology is the production of therapeutic proteins and other drugs
through genetic engineering.
29
Biotechnology is an umbrella term for an ever expanding area of research
Hilgartner, Stephen. “Biotechnology.” International Encyclopedia of the Social and Behavioral
Sciences. 2001. https://www.sciencedirect.com/science/article/pii/B0080430767031478
Defining biotechnology poses challenges, for the word is less a tightly-defined,
technical term than a loose umbrella category, or even a slogan, that conveys—
sometimes simultaneously—visions of unbounded progress and unregulated tampering
with nature. Many authors have tried to capture biotechnology within their own
well-crafted definitions, but these attempts cannot neatly contain this expanding
network of activities and its increasingly dense connections to diverse social worlds.
Although the word has a long history (Bud 1993), in most contemporary contexts
biotechnology refers to a novel and growing collection of techniques, grounded in
molecular and cell biology, for analyzing and manipulating the molecular building
blocks of life. The term also designates products, such as pharmaceuticals or genetically-
modified foods, created using these techniques. At times, it refers not to products or
techniques but to an economic sector or area of research.
30
Latin America, six are in Africa, two in North America, two in Europe, and nine are in Asia and
International acceptance will continue to grow as science-based, risk-proportionate regulations are
developed regarding the cultivation and trade of biotech crops and people experience the benefits.
However, widespread misunderstanding persists about this technology, its safety, and
the breadth of its potential. Foods derived through advanced agricultural technology undergo
extensive risk assessment procedures by a variety of national bodies such as the Environmental Protection
Agency, the United States Department of Agriculture, and the Food and Drug Administration. Biotech
crops also undergo analysis by international entities such as the European Food
Safety Agency. Any biotech crops approved by these bodies have been designated as safe for both
people and the environment. International acceptance will continue to grow as science-
based regulations are developed regarding the cultivation and trade of biotech crops
and people experience the benefits.
Cybersecurity
https://digitalguardian.com/blog/what-cyber-security
Cyber security refers to the body of technologies, processes, and practices designed
to protect networks, devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be referred to as information
technology security.Oct 5, 2020
https://csrc.nist.gov/glossary/term/cybersecurity
https://www.merriam-webster.com/dictionary/cybersecurity
Definition of cybersecurity
: measures taken to protect a computer or computer system (as on the Internet) against
unauthorized access or attack
https://searchsecurity.techtarget.com/definition/cybersecurity
31
https://www.forcepoint.com/cyber-edu/cybersecurity
Engagement
https://www.collinsdictionary.com/dictionary/english/engagement
https://www.oxfordlearnersdictionaries.com/us/definition/english/engagement
https://www.definitions.net/definition/military+engagement
military engagement
Routine contact and interaction between individuals or elements of the Armed Forces of
the United States and those of another nation
https://www.collinsdictionary.com/dictionary/english/engagement
NATO
https://kevtellier.substack.com/p/march-29-2021-reading-notes-ryan
https://www.thebalance.com/nato-purpose-history-members-and-alliances-3306116
most European Union members, the United Kingdom, Canada, and Turkey.
https://www.collinsdictionary.com/us/dictionary/english/nato
32
NATO is an international organization which consists of the U.S., Canada, Britain, and
other European countries, all of whom have agreed to support one another if they are
attacked. NATO is an abbreviation for 'North Atlantic Treaty Organization.'
Policy
https://www.dictionary.com/browse/policy
a course of action adopted and pursued by a government, ruler, political party, etc.:our
nation's foreign policy.
https://legal-dictionary.thefreedictionary.com/Policy
Cooperation
https://link.springer.com/chapter/10.1057/9780230372214_2
https://www.merriam-webster.com/dictionary/cooperation
: the actions of someone who is being helpful by doing what is wanted or asked
for : common effort. We are asking for your full cooperation.
https://link.springer.com/chapter/10.1057/9780230372214_2
https://www.britannica.com/topic/foreign-policy
Foreign policy, general objectives that guide the activities and relationships of one state
in its interactions with other states. The development of foreign policy is influenced by
domestic considerations, the policies or behaviour of other states, or plans to advance
specific geopolitical designs.
33
“The Emergence of Foreign Policy Halvard Leira.” International Studies Quarterly, Volume 63,
Issue 1, March 2019, Pages 187–198, accessed on 05 February
2019 https://academic.oup.com/isq/issue/63/1
two different takes on “foreign policy.” First, it
The discipline of international relations offers
sees foreign policy as carrying a self-evident meaning: as an abstract expression of
relations between political entities: “Broadly interpreted, foreign policy is about the
fundamental issue of how organized groups, at least in part strangers to each other,
interrelate” (Hill 2003, xvii). Such definitions render foreign policy as an analytic
concept that transcends particular historical periods or kinds of political
communities. It is always distinct, and essentially different, from other forms of policy . Second,
critics of this account suggest that foreign policy provides one of the key ways in
which the political Self is differentiated from the Other: “Foreign policy was not a
bridge between two distinct realms, but something that both divided and joined the
inside and the outside, the state and the interstate system” (Campbell 1998, 60). In this
understanding, foreign policy emerged sometime during the seventeenth century. It was producer,
and the product, of the modern state and state system.
https://study.com/academy/lesson/cooperation-among-states-political-military-economic-
alliances.html#:~:text=Being%20more%20of%20a%20concept,the%20deciding%20of%20territ
orial%20boundaries.
Being more of a concept than a term, political cooperation broadly denotes the
governments of differing states working together toward a common goal. This
cooperation can occur in areas like military alliances, economic affairs, and the deciding
of territorial boundaries.
Probably one of the most famous examples of political cooperation is the United Nations.
Formed after World War II, the United Nations is an intergovernmental organization
tasked with the job of promoting and maintaining political cooperation among the world's
nations.
https://oxfordre.com/internationalstudies/internationalstudies/abstract/10.1093/acrefore/9780190
846626.001.0001/acrefore-9780190846626-e-93
The study of international cooperation has emerged and evolved over the past few
decades as a cornerstone of international relations research. Our strategy for reviewing
such a large literature is to focus primarily on the rational choice and game theoretic
approaches that instigated it and have subsequently guided its advance. Without these
theoretical efforts, the study of international cooperation could not have made nearly as
much progress—and it certainly would not have taken the form it does in the 21st
century. Through this lens, we identify major themes in this literature and highlight key
challenges for future research.
This definition of international cooperation is general in terms of both actors and issues.
Cooperation occurs not only among individuals but also among collective entities,
including firms, political parties, ethnic organizations, terrorist groups, and nation-states.
Although ICT often defines international cooperation in terms of states, it can also
involve other actors, especially intergovernmental organizations (IGOs) and
34
nongovernmental organizations (NGOs). These diverse actors cooperate for different
objectives across a wide range of issue areas: IGOs work with states to combat global
environmental problems, firms collude to monopolize markets, NGOs campaign to save
the whales, and so on. Finally, international cooperation is not always a good thing, at
least from the perspective of those excluded or targeted. For example, international
sanctions involve cooperation against target countries (Martin, 1992a; Drezner, 1999),
and commodity cartels often harm consumer states.
Cooperation is supported in repeated settings because of the possibility of reciprocity: if
you cooperate with me, then I will cooperate with you in the future; but if you do not
cooperate, then neither will I. If both actors take this position—as in the famous tit-for-tat
strategy pairing—then ongoing cooperation is supported against current defection
incentives by actors’ interest in maintaining cooperation into the future. This analysis
opens up the possibility of cooperation and raises interesting questions regarding the
conditions under which strategies of reciprocity promote cooperation. Parallel empirical
work (e.g., Goldstein, 1991; Ward & Rajmaira, 1992; Goldstein & Pevehouse, 1997) has
shed important light on these conditions.
Foreign Policy
https://marketbusinessnews.com/financial-glossary/foreign-policy/
foreign policy or foreign relations refers to how a government deals with other
countries. ... The government chooses its foreign affairs policy to safeguard the interests
of the nation and its citizens. 'Trade,' in this context, means 'international trade,' i.e.,
imports, exports, tariffs, exemptions, etc.
https://www.britannica.com/topic/foreign-policy
Foreign policy, general objectives that guide the activities and relationships of one state
in its interactions with other states. The development of foreign policy is influenced by
domestic considerations, the policies or behaviour of other states, or plans to advance
specific geopolitical designs. Leopold von Ranke emphasized the primacy of geography
and external threats in shaping foreign policy, but later writers emphasized domestic
factors. Diplomacy is the tool of foreign policy, and war, alliances, and international
trade may all be manifestations of it.
https://www.dictionary.com/browse/foreign-policy
noun
a policy pursued by a nation in its dealings with other nations, designed to achieve
national objectives.
Engagement
https://www.merriam-webster.com/dictionary/engagement
Definition of engagement
35
1a
: an arrangement to meet or be present at a specified time and place
https://www.weforum.org/agenda/2015/04/why-engagement-is-the-key-to-us-foreign-policy/
From the beginning, however, the Obama administration has made clear that engagement
is not an end in itself, but a means to various goals, both bilateral and regional.
Another source of doubt about America’s enduring influence lies in the fact that
multilateral engagement is still needed, and this is always more difficult than bilateral
engagement. Indeed, multilateral leadership requires not only clearer and bolder rules, but
also a demonstrated willingness to bear the costs of those rules, whether by creating safe
zones to uphold the “responsibility to protect” civilians or taking concrete steps to reduce
– and eventually eliminate – nuclear arsenals.
https://www.state.gov/a-foreign-policy-for-the-american-people/
Over the decades, these commitments have created new markets for our products, new
allies to deter aggression, and new partners to help meet global challenges. We had a
name for it: “enlightened self-interest.” We’ll be clear that real partnership means
carrying burdens together, everyone doing their part – not just us. And whenever we can,
we will choose engagement. Wherever the rules for international security and the global
economy are being written, America will be there, and the interests of the American
people will be front and center.
Security
https://globalsecurityreview.com/what-is-security-everything/
36
Third, and finally, “security” can be employed as an analytical concept to identify,
define, conceptualize, explain, or forecast societal developments such as security policy,
institutions, and governance structures.
https://www.researchgate.net/publication/303899299_Concept_of_Security
Fundamentally, security has to do with the presence of peace, safety, gladness and. the
protection of human and physical resources or absence of crisis or threats to. human
dignity, all of which facilitate development and progress of any human. society. The
concept of security has become a preoccupation for the decades.
https://www.peacepalacelibrary.nl/ebooks/files/370659244.pdf
Until fairly recently, the term ‘security’ was almost monopolized by the academic
discipline of International Relations (IR). IR theorists employed it in a rather narrow
sense which happened to correspond to the way politicians tended to use the word, i.e. as
almost synonymous with military power. The more military power, or rather the more
favourable the military balance, the more security. Surprisingly little was, however,
written about security by the IR theoreticians, in the works of whom ‘national interest’
and/or ‘power’ were preferred, sometimes as alleged synonyms of security. In his seminal
work on Realism, Hans Morgenthau thus hardly bothered to define ‘security’ii. Arnold
Wolfers was one of the few who ventured a definition of the term: ‘security, in an
objective sense, measures the absence of threats to acquired values, in a subjective sense,
the absence of fear that such values will be attacked.’iii
Security Cooperation
https://www.defense.gov/Explore/News/Article/Article/2048832/defense-department-begins-
security-cooperation-workforce-program/
Security cooperation is the effort to advance U.S. national security and foreign policy
interests by building the capacity of foreign security forces to respond to shared
challenges.
https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_20_20172305.pdf
https://www.dscu.mil/documents/publications/greenbook/01_Chapter.pdf?id=1
37
https://www.dau.edu/cop/iam/Pages/Topics/Security%20Cooperation.aspx
DoD Security Cooperation is defined in Joint Pub 1-02: All DoD interactions with
foreign defense establishments to build defense relationships that promote specific US
security interests, develop allied and friendly military capabilities for self-defense and
multinational operations, and provide US forces with peacetime and contingency access
to a host nation. DoD Directive 5132.03 provides DoD-wide policy and describes DoD
organizational responsibilities regarding Security Cooperation activities.
DoD Security Cooperation includes International Armaments Cooperation (IAC)
activities as well as the various elements of Security Assistance, including Foreign
Military Sales (FMS) and Building Partner Capacity (BPC). Most DoD Security
Cooperation policy, organization, and activities (other than IAC) are led and managed
by USD(Policy) rather than USD(Acquisition & Sustainment) and USD(Research &
Engineering), but many U.S. Government/DoD Security Cooperation activities are
implemented through USD(A&S), USD(R&E), and DoD Component acquisition-related
IA&E efforts.
The primary source of day-to-day guidance on Security Assistance and BPC policies and
practices is the Defense Security Cooperation Agency (DSCA)-issued Security
Assistance Management Manual (eSAMM). FMS transactions are implemented through
FMS Letters of Offer and Acceptance (LOAs), often referred to as "FMS cases." BPC
transactions are normally referred to as "pseudo-FMS cases."
https://www.thefreedictionary.com/security+cooperation
All Department of Defense interactions with foreign defense establishments to build
defense relationships that promote specific US security interests, develop allied and
friendly military capabilities for self-defense and multinational operations, and provide
US forces with peacetime and contingency access to a host nation. See also security
assistance; security assistance organization.
policy cooperation
Cœuré, Benoît (Member of the Executive Board of the ECB, at the Global Research Forum on
International Macroeconomics and Finance, Washington D.C.), European Central Bank, S14
November 2014
https://www.ecb.europa.eu/press/key/date/2014/html/sp141114.en.html
For a central banker from the euro area, the notion of policy coordination and cooperation has a
somewhat different meaning than it does for policymakers from other advanced economies.
On the one hand, it has a global dimension capturing the difficult questions of whether and how
to align monetary policies so as to achieve an optimal international policy mix. But on the other
hand, it has a meaning as well in our domestic environment: within the euro area we are also
involved, in a sense, in international policy cooperation. We have to achieve price stability in an
environment of different national fiscal and structural policies.
technology
https://languages.oup.com/google-dictionary-en/
38
noun
https://www.britannica.com/technology/technology
Technology, the application of scientific knowledge to the practical aims of human life
or, as it is sometimes phrased, to the change and manipulation of the human environment.
https://www.merriam-webster.com/dictionary/technology
Technology (noun):
Hughes, Thomas. Human-Built World: How to Think about Technology and Culture. 2004.
https://techliberation.com/2014/04/29/defining-technology/
Arthur, W. Brian. The Nature of Technology: What It Is and How It Evolves. 2009.
https://techliberation.com/2014/04/29/defining-technology/
1) “The first and most basic one is a technology is a means to fulfill a human purpose. …
As a means, a technology may be a method or process or device… Or it may be
complicated… Or it may be material… Or it may be nonmaterial. Whichever it is, it is
always a means to carry out a human purpose.”
39
2) “The second definition is a plural one: technology as an assemblage of practices and
components.”
3) “I will also allow a third meaning. This technology as the entire collection of devices
and engineering practices available to a culture.” (p. 28, emphasis in original.)
https://brainly.com/question/1406047
The best definition of technology is the study and transformation of techniques, tools, and
machines created by humans. Technology allows humans to study and evolve the
physical elements that are present in their lives.
https://www.researchgate.net/publication/320571654_A_Comprehensive_Definition_of_Techn
ology_from_an_Ethological_Perspective
Definitions, uses, and understanding of technology have varied tremendously since Jacob Bigelow’s
Elements of Technology in 1829. In addition to providing a frame of reference for understanding
technology, the purpose of this study was to define or describe it conceptually. A determination of
dimensions comprising technology was made by critiquing historical and contemporary examples of
definition by Bigelow and Volti. An analytic-synthetic method was employed to deconstruct both
definitions spanning two centuries to derive aspects of technology. Definitions relying on an
anthropocentric “how humans use technology” viewpoint failed to account for different perspectives that
were found when an ethological perspective inquiring “how technology is used” served as a framework.
Findings support qualification of insulin as technology according to the following
comprehensive definition: something inherently intelligent enough to either
function, be used to function, or be interpreted as having a function that intelligent
beings—human or otherwise—can appreciate, something devised, designed (by
primary intention), or discovered (by secondary intention) serving particular
purposes from a secular standpoint without humankind creating it, or a significant
beneficiary of rationally derived knowledge that is “used for” a purpose without
itself necessarily being translated into something material that “does”
autonomously, or dependently when used.
technology cooperation
“All countries are interested in being leaders in technology development – if not for
protecting the climate, at least for competitive concerns. Therefore, one may think of
technology cooperation as a way to engage more countries into action (or into more
action).”
Arranz, Nieves (Faculty of Economics and Business Administration) and Juan C. Fdez. de
Arroyabe (ESIC Business & Marketing School). “Technological Cooperation:
A New Type of Relations in the Progress of National Innovation Systems.” The Innovation
Journal: The Public Sector Innovation Journal. 2009.
https://www.innovation.cc › scholarly-style › 2009_14_2…
40
We can define technological cooperation as the agreement between two or more
independent agents who, by joining or sharing their skills and/or resources, develop and
carry out a technological process with the aim of increasing their competitive
advantages. The resulting type of agreement will depend on the contingencies of the
environment, the characteristics of the item to be transferred, the qualities and behaviour
of the contracting agents, etc. and therefore numerous contractual arrangements will exist
(Gulati, 1998).
United Nations Industrial Development Organization and the World Business Council for
Sustainable Development. “Developing Countries and Technology Development.” 2002.
https://www.wbcsd.org/contentwbc/download/2337/29341
IV. Timeliness
For most of 2020, U.S. citizens were consumed with the pandemic, election fraud,
and police tactics. However, with the new Biden administration, our lens is trained on not just
domestic problems, but geopolitical relationships and daunting hotspots or potential crises. For
example, with the recent AI creation of humanlike robots, use of biotechnology for vaccines, and
cybersecurity breach of Colonial Pipelines and SolarWinds, our government is facing threats
from Russia and China to become the leaders of emerging technologies. President Biden
visualizes opportunities to reaffirm, to our allies, our commitment to stave off potential
crises. He is now attempting to correct the foreign policy mistakes of the former administration
and hold foreign countries accountable for their actions. But, this administration must repair its
rapport with allies to be able to exert collaborative efforts in maintaining world peace regarding
41
V. Scope
Artificial intelligence, biotechnology, and cybersecurity impact the daily lives of every
American. Thus, the threats posed by each of these dual-use technologies is of critical
significance in all sectors of the country. Artificial intelligence has the power to make our work
more efficient and empower our enemies. Improved biotechnology capability could revolutionize
medicine and at the same time could be used to devastate crops or directly attack the health of
the American public with an engineered biological agent. Cybersecurity experts must constantly
balance how to develop countermeasures toward other countries while also shoring up potential
risks to our own systems. Protecting the ability of science to mature in a way that enables
innovation, encourages economic growth, maintains security, and encourages diplomacy is vital
VI. Range
Artificial Intelligence--AI
Affirmative Ground
In making the case that the U.S. and NATO should cooperate on AI against the backdrop
Specifically, experts have pointed to the digital, physical, and political security issues posed by
Kasapoglu, Can (the director of the defense and security program at the Istanbul-based
think-tank EDAM. D) and Baris Kirdemir (edam non-resident fellow).
“Artificial Intelligence and the Future of Conflict.” Carnegie Europe, November 28,
2019, https://carnegieeurope.eu/2019/11/28/artificial-intelligence-and-future-of-conflict-
pub-80421
42
consortium of U.S. and European experts from industry, civil society, and research institutions published a
report that outlined three areas of concern.12 The first is the digital security domain, in which
the report warned of potential AI vulnerabilities that would allow adversaries to
stage large-scale, diversified attacks on physical, human, and software targets.
NATO leaders themselves have signaled that they’re open to more cooperation on AI.
“Cooperation on Artificial Intelligence will boost security and prosperity on both sides
of the Atlantic, NATO Deputy Secretary General says.” NATO, October 28, 2020,
https://www.nato.int/cps/en/natohq/news_179231.htm
Moreover, NATO is uniquely positioned to address the complex challenges posed by emerging
Stavridis, James (ADM James G. Stavridis, former Commander, EUCOM, and NATO
Supreme Allied Commander Europe). “Why NATO Is Essential For World Peace,
According to Its Former Commander.” Time, April 4, 2019,
https://time.com/5564171/why-nato-is-essential-world-peace/
43
For all those harbingers of trouble, though, by many traditional measures, NATO remains extremely
healthy.
The 29 nations of NATO produce more than 50% of the world’s gross
It is powerful.
domestic product, have well over 3 million troops on duty, operate massive
combined naval fleets and air forces and together spend over $1 trillion on defense.
Indeed, even with all the frustration over European defense spending not hitting the 2% of GDP goal, the
collective European defense budget is the second largest in the world after the U.S.’s and is ahead of
China’s and Russia’s–combined.
It is smart. U.S. and European defense innovation and production provides a
formidable military research and development capacity. Particularly in
cybersecurity, unmanned vehicles, space operations, special-forces technologies,
maritime and anti-submarine capability, and air and missile defense, NATO is a
technology and education superpower.
It is capable. The alliance boasts a large command structure of highly qualified teams
of military officers from all of the 29 nations. Throughout Europe and the East
Coast of the U.S., those teams prepare war plans, conduct training exercises,
monitor readiness of allied units, gather intelligence about potential adversaries and
run complex operations centers that cover the entire geographic range of NATO.
These standing staffs, which we rationalized by reducing them 35% while I was NATO commander, can
conduct prompt and sustained combat operations in a coalition structure on short notice.
In terms of advantages, affirmatives have much fertile ground to plow. On the economy,
for example, teams can point to analyses that international competition can act as a great
accelerant for economic innovation and growth (much as the U.S. competition with the Soviet
Union for space supremacy spurred a wide range of technological advances beyond the space
race itself).
First, Americans must wake up to the challenge. Recognition that that the United States faces a serious
competitor in a contest in which the outcome will be decisive for our future is necessary to get our
competitive juices flowing. The Olympics offers an instructive analogy for thinking about a competitive
strategy for AI. It also reminds us that competition is inherently a good thing. Competition produces
superior performance. Participants in a marathon run faster than they do when
running alone. Indeed, competition is a core American value. Free markets organize
a competitive process that produces better products at cheaper prices. Science and
its applications advance as research teams compete to better understand the world.
44
Additionally, affirmatives can argue advantages such as U.S. hegemony/global leadership,
international cooperation, nuclear war prevention – some experts have warned that unchecked AI
could pave the way to automated nuclear attacks (Straub, 2018) – national security, and more.
Negative Ground
Negative teams would have a rich array of options for countering the affirmative.
For example, experts have pointed to divergent U.S. and European interests on AI policy, which
Second, this suggests that a significant structural shift in the partnership is emerging.
As President Macron has argued, the challenge in this technological competition is
tied to sovereignty: ‘The battle we’re fighting [on AI] is one of sovereignty … If we
don’t build our own champions in all new areas – digital, artificial intelligence – our
choices... will be dictated by others.’34 The implication is that Europe’s digital
vulnerability is becoming a geopolitical security problem, reinforced by pre-existing
European dependencies, not least in defence. The expectation is that the US should
help its European partners remain strategically relevant in the arena of great power
competition in the new digital era.
U.S. and European perspectives also differ on China, suggesting that it may be difficult for the
U.S. to rally its NATO allies behind an AI policy that will at least implicitly challenge China.
Germany, for example, has been a force for increased economic ties with China.
45
Vela, Jakob Hanke (trade reporter for POLITICO), Giorgio Leali (policy reporter for
POLITICO), and Barbara Moens (Trade Reporter at POLITICO), “Germany’s drive for
EU-China deal draws criticism from other EU countries.” Politico, January 1, 2021,
https://www.politico.eu/article/germanys-drive-for-eu-china-deal-draws-criticism-from-
other-eu-countries/
German Chancellor Angela Merkel's strong push to conclude the EU-China deal in the last days of the year
has left a bad aftertaste among a group of EU countries who said they felt ignored.
Officials from Italy, Poland, Belgium and Spain criticized the way Germany pushed
through the investment agreement with China in the final days of the German
presidency of the Council of the EU, despite their warnings that the timing was tone
deaf to slave labor concerns in China and risked alienating incoming U.S. President
Joe Biden.
The officials said they felt steamrolled by Merkel and the "German engine" inside the European
Commission, in particular Commission President Ursula von der Leyen and trade department director
Sabine Weyand, who are both German.
“There’s a lot of frustration among smaller countries about the way the Commission
has been used to push through one of Merkel’s pet projects at the end of her term
and the end of her legacy,” said one EU diplomat.
“Is this the way the EU will work post-Brexit? The Brits are just out and we’re already missing their open
market-oriented approach," the diplomat said. "If Germany weighs in too much, smaller EU countries have
nothing to say."
But the critics worried that the deal was a political win for Chinese President Xi
Jinping and came just as his government cracked down on democracy in Hong
Kong, ethnic minorities in Xinjiang and journalists reporting on the origins of the
coronavirus pandemic.
Disparate capabilities and interoperability challenges among member-states could also make a
Pepe, Erica (Recruitment Evangelist with the Employer Insights Team), “NATO and
collective thinking on AI.” IISS Blog, November 13, 2020,
https://www.iiss.org/blogs/military-balance/2020/11/nato-artificial-intelligence
In some ways NATO might seem a natural forum for these deliberations, not least in
a transatlantic context. It also has a lot of experience, going back to the Cold War, in working
towards standardisation and interoperability among allies. However, the results achieved have
been mixed, which underscores the challenges the Alliance now faces: not only 30
46
members with disparate levels of capability, but also a backdrop of rapid
technological advances where some of its competitors and potential adversaries may
hold significant advantages. Interoperability issues may be thorny, but they need to
be resolved if AI-dependent capability gaps between members are not to widen.
Early discussions regarding the establishment of common technical standards on the
design and development of military-applicable AI would at least reduce this risk.
Given NATO’s potential pitfalls, negatives can offer alternative agent counterplans, including,
but not limited to a unilateral U.S. approach; the United Nations; a bilateral agreement between
What is more, negative teams can point to the issue of non-state actors exploiting AI,
which underscores how a state-based approach to AI won’t solve all concerns arising from its
security implications.
Straub, Jeremy (Assistant Professor in the Department of Computer Science at the North
Dakota State University). “Artificial intelligence is the weapon of the next Cold War.”
The Conversation, January 29, 2018, https://theconversation.com/artificial-intelligence-
is-the-weapon-of-the-next-cold-war-86086
An alternative would be to argue that the discourse around AI as a security threat is overblown.
Fears of killer robots, for example, have been dismissed by many experts.
Berlatsky, Noah (Blog Editor at Prostasia Foundation). “Is AI dangerous? Why our fears
of killer computers or sentient 'Westworld' robots are overblown.” NBC News,
December 6, 2018, https://www.nbcnews.com/think/opinion/ai-dangerous-why-our-
fears-killer-computers-or-sentient-westworld-ncna943111
Malevolent robots are fun monsters, like vampires or aliens. But, like vampires and aliens, they're not real,
according to "The AI Delusion," a new book by Pomona College Economics professor Gary
Smith. According to Smith, computers aren't smart enough to threaten us — and
won’t be for the foreseeable future. But if we think computers are smart, we may
end up harming ourselves not in the far future, but right now.
Computers seem more intelligent than us because they can perform certain tasks much better than we can.
"People see computers do amazing things, like make complicated mathematical calculations and provide
47
directions to the nearest Starbucks, and they think computers are really smart," Smith told me in a phone
interview. Computers can memorize huge amounts of information — a computer has effectively solved the
game checkers, calculating every possible move, so that it is unbeatable. If computers can beat humans in
games of skill and intelligence, then computers must be more intelligent than humans are. And if they are
more intelligent than us, it follows that they pose a danger to us. Right?
This reasoning is not right, according to Smith. Computers can calculate and
memorize, but that doesn't mean they're smarter than humans. In fact, computers
are, in most respects, no smarter than a chair. They don't have wisdom or common
sense. "They have no understanding of the real world," Smith says.
Additionally, negatives can put forward disadvantages including the economy, by pointing to
research indicating that excessive state involvement in technology policy could constrain
innovation and undermine U.S. economic competitiveness; China relations, arguing that an
aggressive, security-based approach to countering China on AI could make greater conflict a fait
accompli; and numerous tradeoff disadvantages, given that increased international cooperation
on AI could detract focus from other critical challenges, including climate change, food
There is also an abundance of Kritik ground for negatives to explore. Negatives can attack
the securitized rhetoric employed to discuss AI in the global arena; argue Kritiks including
racism or Orientalism; make Capitalism Kritiks, given how much of what is at stake in the global
AI competition are profits for major technology companies and government contracts for tech
Biotechnology
Affirmative Ground
In the early 2000’s, bioterrorism was a hot topic. The images of the 9/11 attacks were
fresh in the minds of Americans when purported anthrax attacks began appearing in the news the
week after the World Trade Center towers were hit. This incident made the idea of a biological
attack on American soil tangible. Since that time, scientific advances in biotechnology have
48
evolved. Gene editing presents the possibility that terrorists could design a deadly pathogen from
West, Rachel M. (Postdoctoral Associate at the Johns Hopkins Center for Health Security
and the Johns Hopkins Bloomberg School of Public Health), and Gigi Kwik Gronvall
(Senior Scholar at the Johns Hopkins Center for Health Security and an Associate
Professor in the Department of EHE), “CRISPR Cautions: Biosecurity Implications of
Gene Editing.” Perspectives in Biology and Medicine, vol. 63, no. 1, 2020, pp. 73–92.,
doi:10.1353/pbm.2020.0006.
The potential for CRISPR to revolutionize genetic engineering also raises concerns
that it could increase biosecurity threats by lowering barriers for the development
of biological weapons. The ability to rapidly modify a genome at relatively low cost compared to
previous methods could make CRISPR systems attractive for nefarious actors at all levels, from individuals
through nation states. In the realm of biosecurity threats, CRISPR may be misused to
create increased-virulence pathogens, neurotoxins, and even de novo organisms
(DiEuliis, Berger, and Gronvall 2017; DiEuliis and Giordano 2017). A de novo
organism would be completely synthetic, although it may have the same genome as
an existing pathogen like smallpox. Creating a completely novel organism using synthesis is
theoretically possible, but it is likely to require extensive training, funding, and time for research and
development, which is less possible for some types of actors (Gibson et al. 2010). A recent National
Academies of Sciences, Engineering, and Medicine study, Biodefense in the Age of
Synthetic Biology (2018), was undertaken to develop guidance on evaluating
biosecurity risks associated with new biotechnology. The authors categorized potential
threats by level of concern and offered potential solutions or safety measures that could reduce the risk of a
certain technology. The authors recommend that the US Department of Defense, who
requested this study, continue to innovate and engage in biotechnology, but that an
assessment framework should also be used to examine novel biotechnology and its
potential broader applications in the scientific and public spheres. The authors also
categorized potential risks by relative concern, identifying the re-creation of known pathogens, such as
smallpox, as among the highest of concern, while rating the creation of a novel pathogen as a lower risk.
CRISPR could allow for rapid, efficient editing of a pathogen to possess the virulence factors of another
pathogen, or it could allow a researcher to recreate a known pathogen whose genome is published. Given
these biotechnology areas of concern, the misuse of CRISPR warrants recognition as
a potential biosecurity threat.
The gene drive technology that promises benefits to health and agriculture could also be
engineered to create devastation for crops or directly used against human populations. The
technology can be very unpredictable and this poses a wide array of threats to the United States.
Scudellari, Megan (freelance science writer and journalist based in Durham, North
Carolina, specializing in the life and environmental sciences). “Self-Destructing
Mosquitoes and Sterilized Rodents: the Promise of Gene Drives.” Nature News, Nature
Publishing Group, 9 July 2019, www.nature.com/articles/d41586-019-02087-5.
49
Another concern is that gene drives have the potential to alter entire populations
and therefore entire ecosystems. They could also, in theory, negatively affect human
health by causing the malaria parasite to evolve to be more virulent or to be carried
by another host, says molecular biologist and bioethicist Natalie Kofler. She is the founding director of
the Editing Nature group at Yale University in New Haven, Connecticut, which aims to address
environmental genetic technologies worldwide. “This technology has the potential to be
immensely powerful and to change the course of things that we may not be able to
predict,” says Kofler.
Another threat the U.S. faces is biotech espionage from competing nations like China. While this
type of threat may not result in an attack, it could harm the United States in economic ways.
These threats are uniquely difficult to prevent since eliminating the threat could also remove
The U.S. biotechnology sector also faces other threats, not least growing espionage
and intellectual property theft by foreign actors, especially those linked to China.
Several high-profile cases brought by the U.S. Department of Justice’s China Initiative have involved
biotechnology researchers, and American biotech firms have been top targets for cyber theft and intrusion.
Sustained outreach to researchers and research institutions is critical to preventing such theft. But efforts
to clamp down on the threats posed by espionage and intellectual property theft can
easily go too far and must preserve the researcher mobility and data-sharing that is
essential to doing cutting-edge science.
Therefore, it may be critical that the international community act in multiple ways to
address this threat. One way to address these threats is through the development of a framework
Dieuliis, Diane (Sr. Research fellow at National Defense University), and James
Giordano (Prof. of Neurology and Biochemistry, and Chief of the Neuroethics Studies
Program of the Pellegrino Center for Clinical Bioethics at Georgetown University).
“Gene Editing Using CRISPR/Cas9: Implications for Dual-Use and Biosecurity.” Protein
& Cell, vol. 9, no. 3, 2017, pp. 239–240., doi:10.1007/s13238-017-0493-4.
50
international ethical standards and guidelines, and also note the need for more
engaged discourse to define the needs, values and ethical system(s) and principles to
be employed (Palchik, Chen, and Giordano, 2017; Lanzilao, Shook, Benedikter, and
Giordano, 2013) Furthermore, in recognition of the potential risk/threat posed by genetic modification,
we strongly endorse involvement of the Biological Toxins and Weapons Convention (BTWC), in order to
ensure inclusion of biosafety and biosecurity communities in any such deliberation and determination of
standards. Templates may exist and could be consulted for the development of
international norms and best practices through engagement of expertise in technical
aspects of emergent technology and security fields (Talinn Manual, NATO,
Carnegie Endowment 2017). Expanding the scope and platform of international
dialogue can be instrumental to ensuring that all aspects of emerging
biotechnological tools and methods are evaluated for their potential to be
weaponized or used in other ways that threaten public safety (Gerstein and
Giordano, 2017).
Another route for dealing with biotech threats is the development of countermeasures. For
example, DARPA is currently involved in developing gene drives to counter possible damaging
West, Rachel M., and Gigi Kwik Gronvall. “CRISPR Cautions: Biosecurity Implications
of Gene Editing.” Perspectives in Biology and Medicine, vol. 63, no. 1, 2020, pp. 73–
92., doi:10.1353/pbm.2020.0006.
Attempts to use gene drives to decimate crops or impact local resources could
present a biosecurity threat that could have a wide range of consequences. Keeping
this in mind, the Defense Advanced Research Products Agency (DARPA) created the Safe Genes
Project to not only address potential issues in gene drive technology and biosecurity,
but to also promote defensive research to create countermeasures (DARPA 2017). Seven
research teams are funded by the project, with each having an overall goal of (1) developing genetic tools
to provide better control of gene drives; (2) creating drug-based treatments to reverse or prevent effects of
gene drives; or (3) identifying ways to mediate gene drive impacts on ecosystems . This cooperative
effort between government and scientists is an excellent example of forward-
thinking research that helps support gene drive research by making it safer and
more responsible.
Also, the United States could develop better export controls to manage the materials transported
Moore, Scott. “In Biotech, the Industry of the Future, the U.S. Is Way Ahead of China.”
Lawfare, 17 Feb. 2021, www.lawfareblog.com/biotech-industry-future-us-way-ahead-
china.
51
gain—especially DNA templates. Many forms of genetic material and synthetic
biology products are already subject to U.S. export controls, but gaps remain, and
screening for genetic sequence orders relies primarily on voluntary regulation by biotech firms . Better
coordinating export controls among major economies and U.S. allies can
dramatically reduce the risk of sophisticated bioweapons development in the
decades to come. When it comes to biotechnology, the industry of the future, the
U.S. remains well ahead of its rivals, including China. That’s something Americans can, and
should, take pride in. But the U.S. must make proactive investments and undertake
significant reforms now to ensure that things stay that way.
Indeed, there is a growing consensus that emerging technologies like gene editing must be a part
Sherman, Justin (nonresident fellow at the Atlantic Council’s Cyber Statecraft Initiative.
He is also an op-ed contributor at WIRED and researches at the Tech, Law, & Security
Program at American University Washington College of Law and at Lawfare’s
Trustworthy Hardware and Software Working Group) and Evanna Hu. “How the next
National Defense Strategy Can Get Serious about Emerging Technologies.” Atlantic
Council, 19 Feb. 2021, www.atlanticcouncil.org/blogs/new-atlanticist/how-the-next-
national-defense-strategy-can-get-serious-about-emerging-technologies/.
The next NDS should include sophisticated, nuanced strategies for emerging
technologies based on the maturity of the technologies along a spectrum. It should
feature distinct strategies for already-emergent technologies such as AI, and for
emerging technologies such as CRISPR gene editing and quantum computing. It
should take an inclusive approach that integrates the perspectives of the commercial sector and civil society
from the start, as opposed to the government outlining strategies and values before engaging with other
sectors. And it should involve collaboration with international institutions on
standards, ethics, and frameworks to ensure that US values governing these
technologies align with the values of democracy and the international community,
and that US technological capabilities are interoperable with those of its partners
and allies.
This leads to the question of what international institution would be best equipped to deal
with the challenges of emerging biotechnology. One possibility is the North Atlantic Treaty
Organization. As their 2018 “Framework for Future Alliance Operations” suggests, they are
52
The future will likely bring a wide range of new threats coming from emerging
technology or from new, creative, and innovative tactics, techniques, procedures, capabilities, or
doctrine. Without incurring the cost of research and development, hostile actors can capitalise on
technological advancements and translate them into capabilities that threaten the Alliance. Examples of
areas where technology could revolutionise warfare are sub-surface and subterranean
operations, swarm techniques, space based weapons, directed energy, autonomous systems and sensors,
quantum computing, unmanned systems, electromagnetically launched projectiles, renewable energy ,
artificial intelligence, additive manufacturing/3D printing, biotechnology and nanotechnology.
Forces must be able to identify, monitor and understand these new threats, and
develop protective measures.
NATO as a security organization might be in the best position to partner with the United States
on the security threats presented by emerging technologies. They are in many ways uniquely
situated to help negotiate the limits of the technologies and simultaneously initiate the
cooperation needed to stay on the cutting edge needed for leadership and security.
Murray, Rob. “Building a Resilient Innovation Pipeline for the Alliance.” NATO
Review, 1 Sept. 2020, www.nato.int/docu/review/articles/2020/09/01/building-a-resilient-
innovation-pipeline-for-the-alliance/index.html.
Today, NATO’s competition is a global one and the race is one of technological
adoption – that is, the acceptance, integration and use of new technology in society.
From artificial intelligence to quantum and everything in between, governments are
in a race to leverage these technologies at scale and speed – first adopter advantage
for emerging disruptive tech could not be more prevalent in the world of geopolitics
and deterrence. Indeed, the nations that win this race may be those with the most
agile bureaucracy rather those with the best technology. In contrast to the Cold
War, the United States and its NATO Allies are unlikely to simply outspend others.
In a post-Covid-19 world, rebalancing public finances could see further financial
pressure placed on Allied defence budgets. We now need a different advantage, one
which will deliver in the short term and build resilience over the longer term – more
defence at less cost with least delay. This starts with our people, their creativity,
education and access to funding. It ends with a robust pipeline of new dual-use (civil
and military) technologies constantly being created, commercialised and capitalised
upon. The Alliance’s transatlantic nature places it in a unique position within the
international order to provide both demand-side policies and supply-side resources
that can genuinely build such a pipeline, creating not only innovations but entirely
new markets – as Eisenhower noted: the foundation of military strength is economic strength. Recent
history would suggest, the model of democracy and Allied governments’ willingness to make big bets on
mission-oriented technology does indeed create new markets and it is this model, underpinned by shared
values, which will be key to NATO’s longer term success.
53
With the US, NATO could play a vital role in reacting to biological threats in the future. As the
Coronavirus pandemic has shown, biological threats found in nature are just as likely to decimate
countries as man-made pathogens. There is clearly a need for more international cooperation and
alignment in dealing with biological threats and this could be achieved through a US-NATO
Paun, Carmen (writer, Politico), and Ryan Heath (Sr. editor, Politico). “How the
Coronavirus Can Prepare Us for Bioterrorism.” POLITICO, 24 July 2020,
www.politico.com/news/2020/07/24/how-to-prepare-for-bioterrorism-courtesy-of-
coronavirus-380689.
Whether it comes from natural causes or from an enemy, the crippling effects of a
new virus are the same, said Stefano Stefanini, a former Italian ambassador to NATO, now head of
the Brussels office of Project Associates, a consultancy. Stefanini thinks NATO should have reacted
to coronavirus in the same way it would react to a biological attack, he said. In the
future, the defense alliance should consider how to help its members better prepare
for this kind of emergencies, maybe as part of their defense spending budget, he said.
When a vaccine would be approved, NATO could play a significant role by using its
logistics to help deploy it to member countries and maybe to other countries, as well,
Stefanini said. NATO Spokeswoman Oana Lungescu rejected this criticism, saying the organization is not
the first responder in these situations. That’s up to nations, but NATO can use its capabilities to
support them, she said.
Vaccine diplomacy from the US has lagged, so far during the pandemic, but a new NATO
Prasad, Kislaya (research professor at Smith School and a guest scholar at the Brookings
Institution). “Unless the U.S. changes its vaccine policy, the world will look at us like
hoarders.” Fortune.com 4/4/2021
But even if one were to discount the importance of soft-power diplomacy, the
Western response is incomprehensible for at least three reasons. First, the hoarding
of vaccines does not help the West fight COVID-19. So long as the pandemic continues to
rage around the world, new coronavirus variants resistant to existing vaccines are likely to arise and spread
globally. Second, vaccine nationalism has adverse economic effects. In an interconnected
global economy, if large parts of the world remain devastated by the pandemic, the impacts are felt
elsewhere. Finally, the pandemic has elevated global public perceptions of the Chinese
and Indian pharmaceutical sectors’ capabilities, possibly at the expense of U.S.
pharma companies. Moreover, less-developed countries now know that in the event of another global
health crisis, they are essentially on their own, and need to invest in domestic capabilities. U.S.
leadership during past global crises has cemented its standing and influence in the
world, and furthered its geopolitical and economic interests. It is past time for the
54
U.S. to do the same in its vaccine diplomacy. Vaccinating the world’s population must become
an American priority.
Negative Ground
more difficult to actualize that event. While affirmative teams will have the ability to describe
the magnitude of potential impacts from biological attacks they are also under the burden to
prove their probable use which will be a greater challenge. This will help level the playing field
With all of the foregoing said, however, let us assume that one is able to reliably and accurately mutate a
pathogen using CRISPR or one of its gene-editing variants. This does not mean that one
automatically has a biological weapon. Creating a mass-casualty biological weapon
requires more than mere access to a pathogen, a particular technique, or a piece of
biotech equipment — although all of these are important components. To create a potent bioweapons
capability, there are a variety of technical issues that must be addressed. First, one must acquire access to a
virulent pathogen or toxin — CRISPR may allow one to create a lethal, or more lethal,
variant of a pathogen or toxin, but this is not without problems. As noted earlier, the
Soviet Union learned the hard way that even though they created a highly antibiotic-resistant strain of
tularemia bacteria, it was so environmentally sensitive that it could not survive in the environment.
Therefore, merely being able to genetically engineer a pathogen did not ensure a
viable bioweapons capability. Also, one still has to overcome other hurdles. Unless
one creates a highly infectious agent, a would-be terrorist would have to determine
how to produce larger quantities of the agent. Production in larger batches is not as trivial as
growth of an agent in a petri dish. The former Soviet Union experienced difficulties in scaling up its
bioweapons agents in new facilities. Along with production, one also has to think about how to protect the
116
agents to survive in the environment, as many biological agents and toxins can be
environmentally sensitive. The processing of agents is a key challenge in developing a bioweapons
capability — the United States, Russia, and Iraq all encountered problems in creating special formulations
to stabilize their bioweapons agents. One then has to find an appropriate delivery form of the material (e.g.,
117
liquid or dry), which can also pose challenges for viability, and then employ an appropriate delivery device
under the right conditions. Former U.S. bioweaponeer Bill Patrick has noted, “You can have the best
agent in the world, but the physics of dissemination mean that unless you have good
conditions and with a good delivery system to get that improved agent on target,
you’re going to fail.” Past state and nonstate bioweapons programs have shown that addressing these
118
factors requires knowledge, specialized skills, and management and organizational expertise, as well as
materials, infrastructure, and equipment. Therefore, the important takeaway here is that gene editing is only
55
one small component of an entire process required to produce lethal biological weapons. Unless gene
editing (or other science and technology developments) can be shown empirically to
alter the other factors of bioweapons development, technical hurdles will remain.
This also points to the need to look not only at gene manipulation but also at all of the other factors shaping
production, processing, and delivery of bioweapons agents in threat assessments.
Also, the regulation of biotechnology could have unforeseen impacts on innovation and
economic development. Groups that invest in emerging technologies in the biotech industry may
see a foreign policy aimed at controlling biotech use as hostile to free market capitalism.
56
The last four years of America First has made many countries wary of relying on the
United States. While Biden may be ready to initiate conversations around partnership that does
not mean our allies will so easily fall back in line. For example, France’s president signaled
Europe must build its own defense capabilities to avoid its security dependence on the US:
But Mr.Macron, speaking in English to answer a question, also argued that Europe could
not count on the United States as much as it had in past decades. “We must take more
of the burden of our own protection,” he said. In practice, it will take many years for Europe to build up
a defense arm that would make it more self-reliant. But Mr. Macron is determined to start now, just as
he is determined to increase the European Union’s technological capacities so
that it can become less dependent on American and Chinese supply chains. Mr.
Biden, in contrast, wants to deepen those supply chains — of both hardware and
software — among like-minded Western allies in an effort to lessen Chinese
influence. He is preparing to propose a new joint project for European and
American technology companies in areas like semiconductors and the kinds of software that
Russia exploited in the SolarWinds hacking.
If anything, the last four years taught our partners they must be ready for anything come 2024
and if that is a second term for Trump or Trump 2.0, a U.S. partnership may not be worth the
In addition, there are ample avenues outside of a NATO partnership for negative teams to
access benefits. The U.S. could partner with the World Health Organization, the United Nations,
The International Monetary Fund, or any international organization to support or regulate biotech
development or use. Also, the negative team could propose a bilateral partnership with an
individual country to form a biotech alliance. This would provide a clear contrast to the
Negative teams could argue that there are substantial disadvantages to cooperating with
NATO on biotechnology. One disadvantage would be the potential backlash from countries like
57
China and Russia. While the policy would certainly be designed to contain these two countries, it
could create a more dangerous situation if China and/or Russia view the policy as aimed directly
at them. This may result in an escalation of tensions between the West and Russia and/or China.
These countries are currently cooperating on a Space Program. What if the U.S. cooperation with
technological front? China is also still aggressively seeking control of the South China Sea. Will
this policy make it more difficult for the US to address issues with China on other matters like
Cybersecurity
Affirmative Ground
responding to, and recovering from a cyber-attack make it nearly impossible for any single
country to develop an effective unilateral approach to cybersecurity. While the U.S. has long
been a global leader in cybersecurity, a decades’ long policy focusing on Offensive Cyber
comprehensive national security policy focused on defensive cyber security, left our government
criminal organizations, and those supported by national governments. Post-Trump, the hacking
and release of CIA hacking tools by Wikileaks eliminated any offensive advantage of U.S.
government hackers and left the Biden Administration scrambling to create new digital security
solutions.
Riley, Tonya."The Cybersecurity 202: NSA director says intelligence has a big[PM1] blind
spot: domestic Internet activity." Washington Post, 3-26-2021.
https://www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-
58
says-intelligence-has-big-blind-spot-domestic-internet-
activity/#click=https://t.co/kg8XkfRoXH
A judge rejected a request by an ex-CIA employee to dismiss charges of leaking hacking tools.
A judge
denied former CIA employee Joshua Schulte’s bid to dismiss espionage charges on
the grounds that the grand jury that indicted him did not have enough Hispanic or Black individuals, Larry
Neumeister of the Associated Press reports. A trial for Schulte, who is accused of leaking CIA
hacking tools to WikiLeaks and has pleaded not guilty to all charges, is expected to begin in
October after a jury deadlocked last year. WikiLeaks’ 2017 release of the hacking tools
was one of the most significant leaks in the CIA’s decades-long history and laid bare
the agency’s hacking and surveillance methods. The Biden administration is
readying an executive order to require companies to disclose breaches to U.S.
government clients. A draft version of the order would also require companies to
keep more records for investigations of the breaches and work with federal agencies
as they respond, according to Reuters’s Christopher Bing, Nandita Bose and Joseph Menn. The order
could be made public as early as next week, they write. The executive order comes as the Biden
administration plans its responses to the devastating SolarWinds and Microsoft
Exchange hacks. A National Security Council spokeswoman told Reuters no decision has been
made on the final content of the executive order. Anne Neuberger, the deputy national
security adviser for cyber and emerging technology, previewed the executive order earlier this month, when
the government was still primarily grappling with SolarWinds. Neuberger said at the time that the
executive order would “focus on building in standards for software, particularly
software that’s used in critical areas.”
Additionally, the U.S. is confronting a more pressing challenge regarding the SolarWinds hack
of the Microsoft Exchange servers, and the recent cyber-attack on our energy infrastructure,
Colonial Pipeline. Our adversaries are using our own weapons against us. Unfortunately, the
U.S. did not catch this attack, and a global cyber-security firm alerted the world to the attack .
The Advanced Persistent Threats (APT) to global computer networks left vulnerable the
most critical infrastructure systems: supply chains, providing the public with everyday goods
and resources, electrical grid systems, medical facilities, global financial systems, and command
and control (C2) weapons systems, the backbone of militaries across the world. APT’s are
typically carried out by individuals with ties to or working directly with nation states, although
A failure of the U.S. to act in response to these threats could indicate the danger of falling
woefully behind other developed nations in the areas of technology and emerging threats facing
59
the world. The fear of failure is driving the Biden administration to draft aggressive executive
actions to confront the challenges, and to propose significant funding increases for the U.S.
Cybersecurity and Infrastructure Agency (CISA), decimated by the previous administration and
John Bolton, NSA advisor. Biden spoke directly to the involvement of the Russian
government. Senate members, including ranking Democrats, echo Biden’s call for action, and
indicate Russia must bear the consequences of their cyber belligerence, and the global
community must establish better rules of conduct and consequences in cyberspace. It is crucial
the American public understand this growing threat, so they will support political changes
Because the threats are not unique to the U.S., and because our government does not have
the ability to resolve cybersecurity threats without cooperation from allies and members of the
global community, international actions are warranted and required. NATO is stepping up to
take the lead to create global solutions to protect all citizens across the globe. Since 2016,
NATO has taken steps to create frameworks for its members to prevent global conflict and
resolve cyber threats from both state and non-state actors. NATO is committed to examining the
specific challenges brought by cyber threats. The cooperative framework that exists within
NATO provides the international community with the tools and resources to address cyber
NATO. "Joint press conference by NATO Secretary General Jens Stoltenberg with the
EU High Representative for Foreign Affairs, Federica Mogherini." NATO, 12-6-2016.
https://www.nato.int/cps/en/natohq/opinions_138729.htm
Good afternoon. We have just finished a meeting where we addressed the cooperation between NATO and
the EU. And the meeting was attended by High Representative / Vice President Federica Mogherini and
with the Minister from Sweden and the Ambassador of Finland, so in addition to the 28 members of the
Alliance and Montenegro, we also had representatives of the European Union present at the meeting. And
it’s always a good pleasure to welcome you to NATO, Federica, especially when we are able to agree on
such a substantial list of measures to take our cooperation forward. And we have been working
together on how to strengthen and how to enhance the cooperation between NATO
and EU for a long time, so therefore I think today we really mark a milestone in our
60
efforts to build our cooperation and to strengthen the partnership between NATO
and the EU. The security of Europe and North America is interconnected. A stronger NATO is
good for the EU and a stronger EU is good for NATO. And strengthening our
strategic partnership is more important than ever. First, we all face new threats and
new security challenges, which combine military and non-military means of
aggression. Such as hybrid, cyber, terrorism. And neither NATO nor the EU has the
full range of tools to respond to these challenges, so therefore we have to cooperate.
Second, the EU is taking steps in strengthening European defence, which we welcome. It is important that these steps
are complementary with NATO efforts. And third, the strength of the transatlantic bond is vital to our security .
Strong ties between NATO and the EU bring North America and Europe closer
together. In Warsaw in July, I signed a Joint Declaration with Presidents Tusk and Juncker. We said at the time that
we had never done so much together. Now we are going to do even more together. We have identified over forty
proposals in several key areas. They are pragmatic, but they are ambitious . On hybrid, we agreed on
concrete measures to increase situational awareness. And to bolster our nations’
resilience. On maritime, we enhanced cooperation between Operations Sea Guardian and Sophia in the
Mediterranean. Through logistical support and information sharing. On cyber, we will strengthen our
mutual participation in exercises, and foster research. NATO and the EU will also
work more closely together to build the capacities of our partners.
Through the development of effective policies to create new cyber defenses and an
internationally agreed upon framework for conduct and conflict in cyberspace, the NATO actor,
in this resolution, creates a discussion of advantage areas that give affirmative teams a diversity
of options to debate. Intrinsic to this topic will be discussions of the changing relationship of the
global superpowers, as well as nations whose extensive cyber capabilities create new power
dynamics in a globalized world. The relationships between the U.S., Russia, China, and the EU
are central to this topic and allow the affirmative to look at specific avenues to create cooperation
Stoltenberg, Jens (NATO Sec. General). "NATO and Cyber: Time to Raise our Game."
Defense News, 7-28-2016, https://www.defensenews.com/smr/road-to-
warsaw/2016/07/08/nato-and-cyber-time-to-raise-our-game/
We may not see it but, in the realm of cyberspace, our countries are under attack
every single day. A few years ago it was cyber-attacks on financial institutions that
made the headlines. Today, it is attacks on critical networks and infrastructures –
disrupting services and, in some cases, bringing modern life to a grinding halt. In fact, what was once a
nuisance has become a strategic challenge. Two years ago, a cyber-attack temporarily
blocked access to NATO headquarters' website. Recently, a series of cyber-attacks was
launched against German state computer systems, including to gather intelligence on
critical infrastructure such as power plants. And in Ukraine, cyber-attacks have been used
as a weapon of so-called "hybrid" warfare. States and non-state actors are increasingly
61
using cyber-attacks to achieve their diplomatic and military objectives. So two years
ago, NATO allies acknowledged that the impact of cyber-attacks could be as harmful
to our societies as a conventional attack and made clear that cyber defense is part of
the alliance's core task of collective defense. Cyber-attacks can also seriously
undermine NATO's missions around the world. Our forces are increasingly likely to
operate in environments where adversaries use cyber-tools to disrupt our decision-making.
To ensure that NATO can do its job of protecting its citizens and territory against
any threats, we have to be just as effective in the cyber domain as we already are on
land, in the air and at sea.
At the heart of this discussion is the crucial issues of evolving power dynamics as the world
transitions from a post-cold-war alignment to a world of emerging powers whose fates seemed
destined for conflict. The affirmative can access an ever-growing body of literature that explores
cooperation in this new multilateral world, and the manner in which the U.S. and other actors
should engage with each other as alliances transition and shift with the reality of a changing
world. NATO is a defensive alliance committed to its mission of protecting its member nations’
citizens and their territory. NATO is the appropriate actor because of its commitment to strict
adherence to international law. NATO’s values ensure the coalition is best suited to create a
Stoltenberg, Jens. "NATO and Cyber: Time to Raise our Game." Defense News, 7-28-
2016. https://www.defensenews.com/smr/road-to-warsaw/2016/07/08/nato-and-cyber-time-to-
raise-our-game/
For all that NATO is doing to adapt to a changing world, one thing will never change: we
are a defensive alliance, whose mission is to protect NATO's citizens and territory, and
whose actions will always be proportionate and in strict accordance with international law.
That, in turn, means that we strongly support efforts to foster a more transparent and
secure cyberspace, through the development of voluntary norms of behavior by individual
states and related confidence-building measures. NATO is founded on the shared values of
liberty, democracy, human rights and the rule of law. That is why we are determined to
ensure that cyberspace remains the place for peaceful, open communication and debate that
we all need it to be.
Within this discussion, affirmatives have the ability to take theoretical positions to
support the resolution to create strong debates, including the role of U.S. hegemony in a post-
62
Trump global world, the role of the NATO alliance in the modern world, the effectiveness of
deterrence in cyberspace, and the effectiveness of offensive versus defensive cyber policies.
Within the broader discussion of NATO and geopolitics that this resolution brings, is the manner
in which our global economy functions interdependently, and the vulnerabilities of multiple
industries to cyber-attacks threatening the safety and security of populations across the
world. At the heart of this topic, the affirmative has access to explore the specific effects of
cyber-attacks on key areas of the global economy including: banking and finance, health care,
energy security, transportation infrastructure (ports and shipping), military and defense,
aerospace, and the emerging technology industry. Regardless of enemy provocations, NATO is
the appropriate leader in cyber defense because it is committed to creating peaceful outcomes
with adversaries by avoiding conflict. NATO has the ability to create the environment for
Negative Ground
While at first glance, this topic may look daunting for the negative; a closer examination
allows teams a diverse set of strategy options encompassing both policy and kritikal
63
argumentation. Regardless of stylistic norms within all debate circuits, this resolution will allow
students, at all levels, the ability to easily access both literature and arguments for this
resolution. As the community moves towards “case lists” for novices, the unique nature of this
resolution for case areas allows students to develop a broad range of debate skills and knowledge
The harm areas create broad emphasis for case debate at almost all levels. The impact
areas allow both offensive and defensive arguments to be researched and advocated by the
negative as part of a broader in-round strategy. More importantly, there should be a strong set of
arguments as to the ability of NATO to resolve the specific cyber threats involving the U.S. A
robust case debate engaging both the harms’ areas and solvency can be accessed and made by
teams. In addition, a discussion of the Biden administration and the U.S. government's ongoing
response to cyber threats can be argued. A powerful literature base exists to support arguments
Because of the diversity of harms areas, the negative gains access to a various set of case
specific disadvantage links related to arguments concerning the foreign relations and the
outcome of policy changes, the effect of these policies on specific industries and the economy,
and arguments relating to the political nature of the changes affirmatives will be
arguments.
with these topics, all supported by robust literature. Affirmatives must carefully choose their
solvency evidence as literature supports a number of negative counterplan approaches testing the
efficacy of the affirmatives plan. Key negative ground will include a discussion of which actor
64
is right to resolve the central concerns being discussed. Negatives can retrieve evidence to
support arguments of the U.S., as a solitary actor, would be better suited to solve the
harms. Other international organizations are better equipped, through their membership and
structure, to resolve the concerns, or that public/private partnerships involving non-state actors
(technology companies and business) and government would be most appropriate. Probably the
States CP, for this topic, is not an option. For the kritik debater, access to the literature
examining the underlying epistemological and ontological realities, will be an asset to debating
the topic. The authors believe of the importance that teams have access to specific links to a
diverse set of kritikal argumentation lending itself to check the breadth of affirmative
argumentation. Kritikal teams should have ingress to links to critical arguments including: Anti-
Blackness, Queer Theory, Bio-power, Capitalism, International Relations Theory and Security
As the consequences of the recent Solar Winds hack become more apparent, the private
and government sectors of the world are faced with creating an effective cyber strategy to
combat looming challenges involving hybrid warfare. In the 21st century, it becomes crucial to
consider the most effective global actors who can resolve the issue of these emerging
threats. While the United States’ role in this pressing crisis is debatable, what is not in question
is the need of the international community to collaborate in creating solutions suitable to the
complex cyberspace environment. As the U.S. and Russia continue playing a cat and mouse
diplomacy game, Putin tries to adjust to the Biden administration’s sanctions related to cyber-
attacks. However, NATO continues to press forward to coordinate and build a global
cybersecurity framework to protect private and public sectors from the dangers of the ongoing
low-intensity cyber war being fought on our global networks every day.
65
VII. Quality
Winston Churchill is noted to claim, “Never let a good opportunity go to waste.” Now, with the
recent ongoing NATO deliberations regarding AI, human gene editing, and Colonial Pipeline
and SolarWinds attacks, the U.S. must take these crises and seize the opportunity to forge a
domestic. However, the U.S. is facing daunting threats from Russia, China, and others on
multiple fronts. This topic will continue to be highly discussed with a steady stream of new
relevant research. In an increasingly untenable global world, the next crisis will be like no other
with the use of emerging technologies on the battlefield. This topic will encourage discussions of
international relations, the STEM field, and the role of international organizations in foreign
Therefore, it is imperative that debaters interact with issues centered around both technology and
international policy. Due to the breadth and depth of the concerns outlined in this paper, the
authors feel assured that debates will not become stale. Rather, the argumentation will grow
VIII. Material
Recent topic selection meetings have made it clear that equity in resources and
opportunity are both important considerations for our coaches and community. Through the
collection of research and the discussion of this topic, these authors believe there is a plethora of
material discussing emerging technologies, as well as the threats and opportunities they pose to
the world. Access to topical, relevant, and contemporary commentary and analysis of artificial
intelligence, bio-technology, and cybersecurity is easily attainable for all debaters. The focus on
66
NATO and U.S. government policies creates a set of research without the need for expensive
academic databases. As the world responds to the real threats and opportunities of emerging
technologies, both U.S. and global experts are weighing in daily creating an enormous database
of evidence.
These authors are confident this topic will enable students to access quality research and
analysis by global experts, which allows them to cross over into multiple disciplines and
curricula creating life-long learners. Students in Urban Debate Leagues, rural, and small school
communities, as well as the “National Circuit,” can debate at all levels. Students will be able to
engage in discussion of international relations from a perspective other than the U.S.; the topic
allows students to explore the latest trends in science and technology, information that is often
not found in other classes. Debates on this topic will not be limited to certain policy perspectives,
but should allow and foster properly scaffolded skills’ development to enhance
argumentation. While we feel that the topic is broad, the strength in it is the balance of
International Relations (IR) Theory. Students will have the opportunity to work with coaches to
explore multiple genres of kritikal literature including Critical Race Studies, Queer Theory,
expanded availability of free access to online academic research, and through the efforts of file
IX. Balance
This topic proposal was crafted with meticulous attention to the need for a robust
exchange of ideas. The topic of emerging technologies generally, and the resolutions the authors
67
have proposed specifically, do not inherently advantage either the affirmative or the negative. As
outlined in this paper, there is an ample research base for both sides to create their arguments –
from the utility of NATO or another entity as the agent of action; to the specific use cases of
advantages and disadvantages in light of the important international affairs, security, economic,
involve complex issues of public policy, technological development, and global security.
Debaters will come away from this experience with a well-rounded understanding of how these
technologies are reshaping society, the advantages and disadvantages of different policy
approaches to addressing the challenges and seizing the opportunities these technologies present,
and how the issues surrounding emerging technologies will shape the global security agenda for
decades to come. Students will gain knowledge of how crisis and opportunity must be met with
X. Interest
emerging technology in popular culture goes beyond its use in film and television, though. The
industries which creates an increased interest in these technologies for the layperson. Artificial
intelligence may seem like science fiction to a non-technical crowd, but it is finding greater
relevance yearly. The ubiquity of Amazon Alexa and smart home devices prove the topical
nature of artificial intelligence’s role in most Americans’ lives. Yet, not as many may be aware
of the real threats posed by AI’s use in military operations. Rural communities know well the
68
impact of biotechnology on the expansion of agricultural products to enhance yield. As
technology progresses, there could be threats to crops from groups bent on disrupting the
American system of agriculture using a synthesized biological weapon. Millions know the
personal information onto online databases. Will the next hack involve your bank information,
your social security number, or perhaps your medical records? Of even greater concern to many
Americans is the security of our critical infrastructure. If hackers are able to compromise the
power grid, water treatment facilities, or satellite communications, our country could be brought
to the brink of collapse. Emerging technologies and their dual-use require the delicate balance
between policies which allow for innovation and those that regulate misuse. Students, judges,
and community members will have much to learn during a round and possibly even more to
Aff Cases
69
End Offensive Cyber Operations (OCO’s)
International Legal Frameworks for Cyberspace - Military & Non- Military
NATO Cyberspace Operations Center Cooperation
NATO Industry Cyber Partnerships
Neg Positions
UN Counterplan
AI Partnership for Defense Counterplan
Bilateral Counterplans (i.e. Cooperate with China)
Unilateral Counterplan (i.e. USFG as sole agent of action)
Private Sector Counterplans
Public/Private Partnership Counterplan
Multipolarity Bad
NATO Bad
Innovation Turns
China Backlash
Technology Arms Race
Hegemony Bad
Offensive Cyber Operations Good
Cyber Deterrence Bad
Military PIC
Tech Industry Econ DA
Tech Innovation DA
Transnational Crime DA
70
XII. References
Allison, G. & Schmidt, E. (2020, August). Is China beating the U.S. to AI supremacy? Retrieved
from https://www.belfercenter.org/publication/china-beating-us-ai-supremacy
American Society of Mechanical Engineers. (2020, October 19). National Security Commission
security-commission-on-artificial-intelligence-releases-2020-interim-report-and-
recommendations
Barnett, J. (2020, April 24). Why the Pentagon can’t go it alone on AI. Retrieved from
https://www.fedscoop.com/experts-urge-us-nato-not-to-go-it-alone-on-developing-
artificial-intelligence/
Berlatsky, N. (2018, December 06). Is AI dangerous? Why our fears of killer computers or
https://www.nbcnews.com/think/opinion/ai-dangerous-why-our-fears-killer-computers-
or-sentient-westworld-ncna943111
reimagined-us-eu-partnership
Castellanos, S. (2020, November 02). AI, quantum R&D funding to remain a priority under
priority-under-biden-11604944800
71
Choi, E. C. (2019, December 17). Will algorithms make safe decisions in foreign affairs?
foreign-affairs
https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-
dynamic-adoption-responsible-use/index.html
https://www.americanprogress.org/issues/security/reports/2021/01/13/494605/natos-
financing-gap/
Clinton, W. J. (2000, March 09). Full text of Clinton’s speech on China trade bill. Retrieved
from
https://www.iatp.org/sites/default/files/Full_Text_of_Clintons_Speech_on_China_Trade_
Bi.htm
The collection edge: Harnessing emerging technologies for intelligence collection. (2020, July
technologies-intelligence-
collection?gclid=Cj0KCQiAvP6ABhCjARIsAH37rbTnOphDY0r6LlhaXyHYI9bbuQUF
3vKVa-NRS_xQantBhjfPJiiDSNQaAuAlEALw_wcB
Congressional Research Service. (2020, November 10). Artificial intelligence and national
https://www.britannica.com/technology/artificial-intelligence
72
Cyber defence: Reports. (n.d.). Retrieved from https://natolibguides.info/cybersecurity/reports
DIGITALEUROPE Director General to advise NATO on emerging technologies. (2020, July 8).
advise-nato-on-emerging-technologies/
Ellehuus, R. Morcos, P. “‘Lifting Up Our Values at Home’: How to Revitalize NATO’s Political
Cohesion,” Center for Strategic and International Studies, March 12, 2021, accessed online
June 18, 2021. https://www.csis.org/analysis/lifting-our-values-home-how-revitalize-natos-
political-cohesion
Emerging technologies and national security. (2020, December 31). American Foreign Policy
technologies-and-national-security
Emerging technologies and national security: Russia, NATO, & the European theater. (2019,
and-national-security-russia-nato-european-theater
Emerging technology definition must protect American innovation (n.d.) National Venture
definition-must-protect-american-innovation/
https://www.ospi.es/export/sites/ospi/documents/documentos/Tecnologias-
habilitantes/US_ACUS_Gov-by-Algorithm-report.pdf
73
Erlanger, S. (2020, November 30). NATO needs to adapt quickly to stay relevant for 2030,
2030-russia-china.html
Erlanger, S., & Michael. (2021, June 14). Shifting Focus, NATO Views China as a Global
nato-china-russia.html
European defence & transatlantic security cooperation. (2019, June 12). Retrieved from
https://www.gmfus.org/events/european-defence-transatlantic-security-cooperation
Fishman, E. & Simakovsky M. (2021, March 05). A three-step plan for reviving the transatlantic
step-plan-for-reviving-the-transatlantic-alliance/.
Ford, C. A. (2020, April 20). Al, human-machine interaction, and autonomous weapons:
https://www.state.gov/wp-content/uploads/2020/06/T-Paper-Series-2-LAWS-FINAL-
508.pdf
Ford, L. W., & Goldgeier, J. (2021, January 25). Retooling America's alliances to manage the
alliances-to-manage-the-china-challenge/
Fried, I. (2021, March 02). China will dominate AI unless U.S. invests more, commission warns.
commission-warns-addaee06-cc72-4c46-98ad-2962c5f919e0.html
74
The future of warfare and the role of new and emerging technologies: Recap. (2021, February
Galatas, I. (2017). The misuse and malicious uses of the new biotechnologies. Annales des Mines
Gill, I. (2020, January 31). Whoever leads in artificial intelligence in 2030 will rule the world
development/2020/01/17/whoever-leads-in-artificial-intelligence-in-2030-will-rule-the-
world-until-2100/
project.org/projects/global-futures-intelligence-
system/?gclid=Cj0KCQiAvP6ABhCjARIsAH37rbT9fdD3kOoY1jLgaQnJlsie8R3OwSp
Ldzg8Sf3IcSwJLvrnTOhsy6UaAty2EALw_wcB
Gordon, M. R., & Marson, J. (2020, December 01). NATO should expand its focus to include
focus-to-include-china-report-says-11606820403
Gould, J. (2021, February 23). After SolarWinds, US needs to toughen cyber defenses, says
solarwinds-us-needs-to-toughen-cyber-defenses-says-microsoft-president/
Hanke Vela, J., Leali, G. & Moens, B. (2021, January 01). Germany’s drive for EU-China deal
https://www.politico.eu/article/germanys-drive-for-eu-china-deal-draws-criticism-from-
other-eu-countries/
75
Hao, K. (2021, January 22). The Biden administration’s AI plans: what we might expect.
from https://www.technologyreview.com/2021/01/22/1016652/biden-administration-ai-
plans-what-to-expect/
Hass, R. & Balin, Z. (2019, January 10). US-China relations in the age of artificial intelligence.
artificial-intelligence/
Heikkila, M. (2021, March 29). NATO wants to set AI standards. If only its members agreed on
standards-priorities/
Hill, S. (2020, April 27). AI's impact on multilateral military cooperation: Experience from
international-law/article/ais-impact-on-multilateral-military-cooperation-experience-
from-nato/3AEF22AA22550A10B75DD74A806D4D18
is-artificial-intelligence
Kamarck, E. (2018, November 29). Malevolent soft power, AI, and the threat to democracy.
threat-to-democracy/
Kasapoglu, C. & Kirdemir, B. (2019, November 28). Artificial intelligence and the future of
future-of-conflict-pub-80421
76
Key takeaways from the launch of e-volume on cyber threats and NATO 2030. (n.d.). The NATO
https://ccdcoe.org/news/2021/key-takeaways-from-the-launch-of-e-volume-on-cyber-
threats-and-nato-2030/
Koblentz, G. D. (2020, June 16). Emerging technologies and the future of CBRN terrorism. The
https://www.tandfonline.com/doi/abs/10.1080/0163660X.2020.1770969?journalCode=rw
aq20
Kosal, M. E. (2020, January 13). NATO and emerging technologies. Retrieved from
https://www.europeanleadershipnetwork.org/commentary/nato-and-emerging-
technologies/
Kurup, V. M., & Thomas, J. (2020). Edible vaccines: Promises and challenges. Molecular
Lawrence, C. & Cordey, S. (2020, August). The case for increased transatlantic cooperation on
increased-transatlantic-cooperation-artificial-intelligence
Ledford, H. (2020, January 06). Quest to use CRISPR against disease gains ground. Retrieved
from https://www.nature.com/articles/d41586-019-03919-0
Lee, M. (2021, March 03). Biden brings no relief to tensions between US and China. Retrieved
from https://apnews.com/article/joe-biden-donald-trump-biden-cabinet-beijing-
coronavirus-pandemic-060ee406fe2e488e524552c43083ddad
https://www.enterpriseai.news/2020/11/02/nato-targets-ai-interoperability/
77
Lepido, D. (2021, March 23). Swiss Cyber Security Firm Says It Accessed Servers of a
https://www.insurancejournal.com/news/international/2021/03/23/606548.htm#:~:text=A
%20Swiss%20cyber%2Dsecurity%20firm,their%20campaign%20through%20this%20m
onth
LeVine, S. (2018, March 21). The stakes for who wins the AI race. Retrieved from
https://www.axios.com/the-stakes-for-who-wins-the-ai-race-0363d9cd-0d97-4a5a-9ee6-
36a7fb03ff44.html
Lin-Greenberg, E. (2020, March). Allies and artificial intelligence: Obstacles to operations and
intelligence-obstacles-to-operations-and-decision-making/
Lomas, N. (2020, December 02). Europe will push to work with the US on tech governance,
work-with-the-us-on-tech-governance-post-trump/
Mattox, G. (2020, February 27) The future of transatlantic security cooperation: Past successes
and emerging threats. American Institute for Contemporary German Studies. Retrieved
from https://www.aicgs.org/2020/02/the-future-of-transatlantic-security-cooperation-
past-successes-and-emerging-threats/
Morcos, P. (2020, December 3). NATO in 2030: Charting a new path for the transatlantic
https://www.csis.org/analysis/nato-2030-charting-new-path-transatlantic-alliance
Markotkin, N. & Chernenko, E. (2020, August 05). Developing artificial intelligence in Russia:
78
Martinez, D. et al. (2019, January). Artificial intelligence: Short history, present developments,
https://www.ll.mit.edu/sites/default/files/publication/doc/2019-
09/Artificial%20Intelligence%20Short%20History%2C%20Present%20Developments%
2C%20and%20Future%20Outlook%20-%20Final%20Report%20-%20Martinez.pdf
Metz, C. (2019, February 11). Trump signs executive order promoting artificial intelligence.
trump.html
Moore, S. (2020, April). China’s role in the global biotechnology sector and implications for US
content/uploads/2020/04/FP_20200427_china_biotechnology_moore.pdf
Moore, S. (2021, February 17). In biotech, the industry of the future, the U.S. is way ahead of
ahead-china.
Murphy, C., Stebbing, E. F., Pascal Kalume Kambale and Mvemba Phezo Dizolele, Takeyh, R.,
Segal, A., Wodu, N., . . . Editors, C. (2020, April 21). How to Understand Technology
understand-technology-and-geopolitics
Murray, R. (2020, September 01). Building a resilient innovation pipeline for the alliance.
resilient-innovation-pipeline-for-the-alliance/index.html
79
The National Intelligence Research and Development Strategic Plan: 2019 Update. (2019,
June). Select Committee of Artificial Intelligence of the National Science & Technology
NATO technology innovation conference is coming to Prague. (2020, February 11). Retrieved
from https://spendmatters.com/uk/nato-innovation-conference-comes-to-prague/
command-transformation-act-adl/
NATO. November 16, 2020. (n.d.), NATO readies for cyber threats.
www.nato.int/cps/en/natohq/news_179481.htm?selectedLocale=en.
NATO and Europe in the 21st century: New roles for a changing partnership. (n.d.). Retrieved
from https://www.wilsoncenter.org/publication/nato-and-europe-the-21st-century-new-
roles-for-changing-partnership
atlantic-treaty-organization.html
https://operationalsupport.un.org/en/partnership-technology-peacekeeping
Paun, C., & Heath, R. (2020, July 24). How the coronavirus can prepare us for bioterrorism.
bioterrorism-courtesy-of-coronavirus-380689
Pepe, E. (2020, November 13). NATO and collective thinking on AI. Retrieved from
https://www.iiss.org/blogs/military-balance/2020/11/nato-artificial-intelligence
Pomerleau, M., & Eversden, A. (2020, March 11). Congressional report outlines new American
80
https://www.fifthdomain.com/congress/2020/03/11/congressional-report-outlines-new-
american-cyber-strategy/
Prasad, K. (2021, April 05). Commentary: Unless the U.S. changes its vaccine policy, the world
hoarding-nationalism-diplomacy-china-russia-india/
Remarks by President Biden at the 2021 Virtual Munich Security Conference. (2021, February
remarks/2021/02/19/remarks-by-president-biden-at-the-2021-virtual-munich-security-
conference/
Reynolds, J. & Lightfoot, J.. (2020, October 14). Digitalize the enterprise. Retrieved from
https://www.atlanticcouncil.org/content-series/nato20-2020/digitalize-the-enterprise/
Richardson, L. C. et al. (2019, Jun 6). Cyberbiosecurity: A call for cooperation in a new threat
doi:10.3389/fbioe.2019.00099
Riley, T. (2021, Match 26). Analysis | The Cybersecurity 202: NSA Director Says Intelligence
Has a Big Blind Spot: Domestic Internet Activity. The Washington Post, Retrieved from
www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelli
gence-has-big-blind-spot-domestic-internet-activity/#click=t.co/kg8XkfRoXH.
Sanger, D. E., Erlanger, S., & Cohen, R. (2021, February 20). Biden Tells Allies 'America Is
https://www.nytimes.com/2021/02/19/us/politics/biden-munich-conference.html
81
Sanger, D. E. & Kramer, A. E. (2021, April 16). U.S. imposes stiff sanctions on Russia, blaming
http://www.nytimes.com/2021/04/15/world/europe/us-russia-sanctions.html
Schwartz, O. (2018, July 25). 'The discourse is unhinged': how the media gets AI alarmingly
https://www.theguardian.com/technology/2018/jul/25/ai-artificial-intelligence-social-
media-bots-wrong
Select committee on artificial intelligence of the National Science & Technology Council. (2019,
Shalal, A. (2018, November 13). NATO looks to startups, disruptive tech to conquer emerging
startups-disruptive-tech-to-conquer-emerging-threats-idUSKCN1NI2NW
https://www.cnas.org/publications/commentary/sharper-americas-alliances-and-
partnerships
Shea, J. and Williams, M. The secret to NATO's survival: Get political. (2021, June 17).
survival-get-political/
Shead, S. (2021, March 02). U.S. is ‘not prepared to defend or compete in the A.I. era,’ says
https://www.cnbc.com/2021/03/02/us-not-prepared-to-defend-or-compete-in-ai-era-says-
eric-schmidt-group.html
82
Sherman, J. & Hu, E. (2021, February 19). How the next National Defense Strategy can get
www.atlanticcouncil.org/blogs/new-atlanticist/how-the-next-national-defense-strategy-
can-get-serious-about-emerging-technologies/.
https://www.europarl.europa.eu/RegData/etudes/IDAN/2018/614547/EPRS_IDA(2018)6
14547_EN.pdf
https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%203%20AI_0.pdf
Speranza, L. (2020, November 9). An agenda for NATO's next generation. Retrieved from
https://cepa.org/an-agenda-for-natos-next-generation/
Speranza, L., & Nelson, N. (2020, December 08). NATO needs a strategy for emerging and
https://www.defensenews.com/opinion/2020/12/08/nato-needs-a-strategy-for-emerging-
and-disruptive-technologies/
Stavridis, J. (2019, April 04). Why NATO is essential for world peace, according to its former
peace/
Straub, J. (2018, January 29). Artificial intelligence is the weapon of the next Cold War.
next-cold-war-86086
83
Swejis, T. & Osinga, F. (2020, April 04). Maintaining NATO's technological edge. Retrieved
from
https://www.tandfonline.com/doi/abs/10.1080/02681307.2019.1731216?scroll=top&need
Access=true&journalCode=rwhi20
Tadjdeh, Y. (2020, March 03). DoD seeks AI alliance to counter China, Russia. Retrieved from
https://www.nationaldefensemagazine.org/articles/2020/3/3/algorithmic-warfare-dod-
seeks-ai-alliance-to-counter-china-russia
Tellier, K. (2021, March 29). March 29, 2021: Reading notes: Ryan Hass's 'competitive
reading-notes-ryan
Tucker, P. (2021, June 22). NATO Members Agree to Broad Tech, Environmental Agenda.
tech-agenda-environmental-agenda/174767/
U.S. body on artificial intelligence calls for creating India-US strategic tech alliance. (2020,
artificial-intelligence-calls-for-creating-india-us-strategic-tech-
alliance/articleshow/78659333.cms?from=mdr
U.S. security cooperation with Finland. (2021, January 20). United States Department of State
Ventura, T. (2021, January 10). How NATO's emerging culture of innovation is reshaping the
innovation-is-reshaping-the-alliance-1b7f8023f393
84
Verma, A. S., Agrahari, S., Rastogi, S., & Singh, A. (2011). Biotechnology in the realm of
https://doi.org/10.4103/0975-7406.84430
threats: A case study of CRISPR. Politics and the Life Sciences, 37(2), 203-219.
https://doi.org/10.1017/pls.2018.21
Walla, K. et al. (2020, October 29). The transatlantic alliance needs to work together to gain
https://www.atlanticcouncil.org/blogs/new-atlanticist/the-transatlantic-alliance-needs-to-
work-together-to-gain-technological-edge/
Webinar: How do emergent and disruptive technologies shape the security agenda in the South?
and-disruptive-technologies-shape-the-security-agenda-in-the-south
Biotechnology-A-Practical-Guide.pdf
West, R. M., & Gronvall, G. K. (2020). CRISPR cautions: Biosecurity implications of gene
doi:10.1353/pbm.2020.0006
Wiggers, K. (2020, November 06). How AI predictions fared against pollsters in the 2020 U.S.
against-pollsters-in-the-2020-u-s-election/
Wright, N. (2018, July 10). How artificial intelligence will reshape the global order.
85
Retrieved from https://www.foreignaffairs.com/articles/world/2018-07-10/how-artificial-
intelligence-will-reshape-global-
order?utm_medium=email_notifications&utm_source=reg_confirmation&utm_campaign
=reg_guestpass
Zandee, D. (n.d.) The future of NATO: Strategic monitor 2018-2019. Clingendael. Retrieved
from https://www.clingendael.org/pub/2018/strategic-monitor-2018-2019/the-future-of-
nato/
86