Professional Documents
Culture Documents
1AC
Plan: The United States federal government should substantially increase
competitive grants for primary and secondary afterschool science, technology,
engineering, and mathematics education programs.
Advantage 1Industry
Scenario 1Econ.
Afterschool strengthens STEMits the only way to ensure American
competitiveness.
AA 12. (Afterschool Alliance. The Afterschool Alliance is a policy organization working to ensure
that all children have access to affordable, quality afterschool programs. Know Your Funders: A
Guide to STEM Funding for Afterschool. 2012. http://www.afterschoolalliance.org/STEM-
Funding-Brief-10182012.pdf)
The need for competency in science, technology, engineering and math (STEM) skills is not only
increasingly important for success in the workforce but also to navigate the modern world and
to make decisions that will inform public policy. In response to this need and to maintain the
United States global competitiveness, the federal government as well as private philanthropies
and corporations are increasingly investing in a variety of STEM education initiatives. Informal
learning settings, such as afterschool programs1 , provide excellent opportunities to get children
and youth engaged and interested in STEM activities. High quality afterschool programs provide
an environment for hands-on, inquiry-based learning where students can experiment with
science and technology under the guidance of a supportive adult. Afterschool program
evaluations have shown that participating in STEM-focused afterschool programs leads to
increased interest, knowledge and skill, and in some cases improved high school graduation
rates and pursuit of STEM careers among participants2 . Research has also shown that an early
interest in STEM careers is a strong predictor of who will go on to actually pursue STEM careers3
. Studies have also shown that increased access to STEM education opportunities results in a
higher likelihood of success in STEM fields4 . Afterschool programs are an ideal vehicle to realize
these outcomes. Even though the research is clear on the benefits of exposing students to STEM
activities, both within and out of school, funding can be challenging in the current fiscal
environment. There are a number of possible public and private funding streams available for
afterschool STEM activities, but these funding streams are often targeted to certain populations
or specific activities and can be highly competitive. This guide is a tool for afterschool program
leaders to navigate various funding streams and consider effective strategies to acquire funding
for afterschool STEM programs.
Americans are always looking for an edge. Whether at work, at school or even on the road, an
element of individual competition and achievement is woven throughout our society. Yet today
the countrys ability to compete in a global economy, attract the worlds brightest and
nurture a functional political system is slipping. This weakness is now at a point where it
threatens to erode the pillars upon which Americas national security rests. Evaluating
Americas strength is not a question of raw might. The U.S. military remains unmatched
even after more than a decade of conflict in Central Asia and the Middle East. That
cornerstone of American power is assured. Other crucial elements such as the national
debt, an efficient and responsive political process, productive education system and viable
defense industrial base are not. Worry about each of these elements is not new. That focus,
however, has not stopped decline. Yet a sense of alarm is already not enough to prompt action.
What is needed is to reconsider the interconnectedness of this deterioration in order
to determine a viable path to returning Americas competitive edge. This reveals a
true risk to the nation and leads to a reframing of how we evaluate Americas national
security. Doing so will help address what have been seen as disparate elements, that are, in
practice, closely linked in both problem and solution. To start, Americas political and business
leaders need a consensus that improving our nations competitiveness is an urgent priority with
much higher stakes than acknowledged today. This does not mean simply seeing every problem
as a security issue for easy attention. There is already enough of that. We need to
acknowledge that current policies and objectives in the public and private sector,
taken together, dangerously undercut Americas current and future global position
through instability, inefficiency and risk. Amid what can be seen as a period of troubling
decline is opportunity. In a simple sense, things are bad enough that there is a unique
opportunity to reframe one of the fundamental questions our country faces: What makes us
strong and safe? This usually falls back on military might. That provides an incomplete picture
and leads to poor policy decisions, such as raising defense spending at a time of historic deficits.
A more complete view of Americas strength starts with defining national competitiveness. A
countrys medium to long-term competitiveness is defined by a nations ability to lead
globally on the strength of its actions and ideas, to support a vibrant free-market
system, to nurture a responsive democratic political system and to uphold a social
contract that honors economic and social progress for its citizens. This is a subjective
assessment of factors, yet these elements can be reasonably agreed upon as being critical
indicators of national success. Importantly, they encompass some of the toughest challenges
faced by everyone from White House policymakers to households across America. Others may
have additional elements of national competitiveness; their analysis is welcome as it will only
improve the quality and depth of this needed debate. This paper will show how each of these
elements influences Americas national security, interacts with the other elements, and
identifies possible solutions that can improve Americas competitiveness.
In the study of American progress, you consistently find a trail of teamwork. The modern
approach to fulfilling the United States long-term economic needs is no exception, as a coalition
advancing knowledge in science, technology, engineering and math is proving. This network of
governmental, commercial, educational, and research organizations is vital to the acceleration
of scientific and technological innovations that will secure the health and longevity of the
economy -- and, consequently, the American economy, said Ross DeVol, Chief Research Officer
at the Milken Institute, an independent economic think tank. The United States must utilize
the knowledge assets in their possession such as universities, research centers, and most
importantly, the talent that they create or attract to fuel economic growth, DeVol said.
Companies like Chevron recognize the important role that a robust American STEM-skilled
workforce will play in the increasingly competitive global marketplace and theyre using
partnerships with schools and nonprofits to make it happen. Blair Blackwell, the Manager of Education and Corporate
Programs at Chevron, explained that building educational networks is an important part of the companys greater strategy. On a daily basis in our business, we have to
collaborate across a number of different functions to implement projects of great scale and complexity, said Blackwell. In many ways, we bring that same approach to our
social investments in education. We recognize that expertise and resources are needed from a variety of different partners to make STEM education reform a success.
Chevrons measured, long-term investment in American STEM education reflects that commitment. The company has devoted nearly $100 million to support education
initiatives over the past three years. But while massive financial investment is important to facilitate the process, it is the partnership these investments foster -- relationships
that enable hundreds of thousands of students, thousands of teachers, and dozens of nonprofit organizations and practitioners to connect with one another -- that Blackwell
believes is what really makes a positive impact. We engage in a number of ways and have moved far beyond just writing a check, explains Blackwell. We also bring to bear our
knowledge of workforce needs and our employees regularly act as mentors to students. The encouragement of partnerships between a wide variety of organizations will, over
the long term, help build large pools of indigenous engineering talent. Edie Fraser, the CEO of STEMConnector, is one of the people who make these types of connections
possible. Less than two years ago, Fraser took on the herculean task of finding a new way of connecting the thousands of people, organizations and companies that have a
vested interest in advancing STEM with each other -- and has largely succeeded, especially when it comes to the business world. The demand side is where weve got to build
the action, said Fraser. The jobs are in STEM whats so exciting now is to see the companies step up in their communities and collaborate. STEMConnector is an organization
headquartered in Washington, D.C. that supplies corporations and other organizations with the information they need to strategically invest in STEM initiatives. The organization
works with more than 6,500 business, research and education stakeholders to disseminate data through networking events, newsletters, research reports and several other
products. The key, Fraser says, is ensuring that the pipeline of STEM talent is moving it up and making sure it is geared to careers. At California State Polytechnic University,
Pomona, such focus on building bridges that connect education to careers is working. Cal Poly Pomona houses one of the largest colleges of engineering in the United States. Cal
Poly Pomona, which, according to U.S. News and World Report, graduates about 1 of every 14 engineers in the state of California, would not be quite as prominent if it was not
bolstered through partnerships on all sides. To achieve such success, Associate Dean of the College of Engineering Dr. Cordelia Ontiveros works with other schools and
organizations to secure a strong pipeline of STEM students, molding them into the STEM workers who will continue the American tradition of innovation. Dr. Ontiveros calls the
philosophy of her university and organizations that develop interest in science and math like Project Lead The Way perfectly aligned. We think its a great framework for
That need for progress has never been stronger, according to Blackwell,
making a lot of progress, Ontiveros said.
who has worked on social investment projects on multiple continents. As you go out and travel
the world, you find that other countries are innovating, she said. If we dont continue to
invest in education and invest in ensuring our students are ready to move from the education
system into employment, then were simply going to fall behind. "Everybody gets that
education leads to employment which leads to economic development, she said.
Growth solves peacerobust statistical research proves its the most important
factor.
Cortright 15, (Director of Policy Studies at the Kroc Institute for International Peace Studies,
Linking Development and Peace: The Empirical Evidence,
https://peacepolicy.nd.edu/2016/05/18/linking-development-and-peace-the-empirical-
evidence/)
The connections between development and peace are firmly supported by social
science research. All the standard indicators of economic development, including per
capita income, economic growth rates, levels of trade and investment, and degree of market
openness, are significantly correlated with peace. Virtually every study on the causes of war
finds a strong connection between low income and the likelihood of armed conflict.
Economist Edward Miguel describes this link as one of the most robust empirical
relationships in the economic literature. Irrespective of all other variables and
indicators, poverty as measured by low income bears a strong and statistically significant
relationship to increased risk of civil conflict. No one has made this point more convincingly
over the years than Paul Collier. He and his colleagues have shown that civil conflict is heavily
concentrated in the poorest countries. The risk of civil war is strongly associated with
joblessness, poverty and a general lack of development. They famously conclude, The key root
cause of conflict is the failure of economic development . They also make the reverse
point. Raising economic growth rates and levels of per capita income may be the single
most important step that can be taken to reduce the likelihood of armed conflict.
Econonmic decline and even the Perception of such triggers lashout and global
wareconomic institutions wont check
Harold James 14, Professor of history at Princeton Universitys Woodrow Wilson School who
specializes in European economic history, 7/2/14, Debate: Is 2014, like 1914, a prelude to world
war?, http://www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-
prelude-to-world-war/article19325504/
As we get closer to the centenary of Gavrilo Princips act of terrorism in Sarajevo, there is an
ever more vivid fear: it could happen again. The approach of the hundredth anniversary of
1914 has put a spotlight on the fragility of the worlds political and economic security
systems. At the beginning of 2013, Luxembourgs Prime Minister Jean-Claude Juncker was
widely ridiculed for evoking the shades of 1913. By now he is looking like a prophet. By 2014, as
the security situation in the South China Sea deteriorated, Japanese Prime Minister
Shinzo Abe cast China as the equivalent to Kaiser Wilhelms Germany; and the fighting in
Ukraine and in Iraq is a sharp reminder of the dangers of escalation . Lessons of 1914 are
about more than simply the dangers of national and sectarian animosities. The main story of
today as then is the precariousness of financial globalization, and the consequences that
political leaders draw from it. In the influential view of Norman Angell in his 1910 book The
Great Illusion, the interdependency of the increasingly complex global economy made
war impossible. But a quite opposite conclusion was possible and equally plausible
and proved to be the case. Given the extent of fragility, a clever twist to the control
levers might make war easily winnable by the economic hegemon. In the wake of an
epochal financial crisis that almost brought a complete global collapse, in 1907,
several countries started to think of finance as primarily an instrument of raw power ,
one that could and should be turned to national advantage. The 1907 panic emanated from the
United States but affected the rest of the world and demonstrated the fragility of the whole
international financial order. The aftermath of the 1907 crash drove the then hegemonic power
Great Britain - to reflect on how it could use its financial power. Between 1905 and 1908, the
British Admiralty evolved the broad outlines of a plan for financial and economic warfare that
would wreck the financial system of its major European rival, Germany, and destroy its fighting
capacity. Britain used its extensive networks to gather information about opponents. London
banks financed most of the worlds trade. Lloyds provided insurance for the shipping not just of
Britain, but of the world. Financial networks provided the information that allowed the British
government to find the sensitive strategic vulnerabilities of the opposing alliance. What pre-
1914 Britain did anticipated the private-public partnership that today links technology giants
such as Google, Apple or Verizon to U.S. intelligence gathering. Since last year, the Edward
Snowden leaks about the NSA have shed a light on the way that global networks are used as a
source of intelligence and power. For Britains rivals, the financial panic of 1907 showed the
necessity of mobilizing financial powers themselves. The United States realized that it needed a
central bank analogous to the Bank of England. American financiers thought that New York
needed to develop its own commercial trading system that could handle bills of exchange in the
same way as the London market. Some of the dynamics of the pre-1914 financial world are
now re-emerging. Then an economically declining power, Britain, wanted to use
finance as a weapon against its larger and faster growing competitors, Germany and the
United States. Now America is in turn obsessed by being overtaken by China according
to some calculations, set to become the worlds largest economy in 2014. In the aftermath of
the 2008 financial crisis, financial institutions appear both as dangerous weapons of
mass destruction, but also as potential instruments for the application of national power. In
managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a
major weakness, and required the provision of large swap lines by the Federal Reserve. The
United States provided that support to some countries, but not others, on the basis of an
explicitly political logic, as Eswar Prasad demonstrates in his new book on the Dollar Trap.
Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian
banks were trying to acquire assets in Central and Eastern Europe. European and U.S. banks are
playing a much reduced role in Asian trade finance. Chinese banks are being pushed to expand
their role in global commerce. After the financial crisis, China started to build up the renminbi as
a major international currency. Russia and China have just proposed to create a new credit
rating agency to avoid what they regard as the political bias of the existing (American-based)
agencies. The next stage in this logic is to think about how financial power can be directed to
national advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly
successful) part of the pressure applied to rogue states such as Iran and North Korea. But
financial pressure can be much more powerfully applied to countries that are deeply embedded
in the world economy. The test is in the Western imposition of sanctions after the Russian
annexation of Crimea. President Vladimir Putins calculation in response is that the European
Union and the United States cannot possibly be serious about the financial war. It would turn
into a boomerang: Russia would be less affected than the more developed and complex financial
markets of Europe and America. The threat of systemic disruption generates a new sort of
uncertainty, one that mirrors the decisive feature of the crisis of the summer of 1914 .
At that time, no one could really know whether clashes would escalate or not . That
feature contrasts remarkably with almost the entirety of the Cold War, especially since the
1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt that
any superpower conflict would inevitably escalate. The idea of network disruption relies
on the ability to achieve advantage by surprise, and to win at no or low cost. But it is inevitably a
gamble, and raises prospect that others might, but also might not be able to, mount the same
sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice, even
though the game may be fatal.
Scenario 2Deterrence.
Stem revitalizes American manufacturingis supercharges the broader
education system.
MATRIC 14. (Mid-Atlantic Technology, Research & Innovation Center. The Future of U.S.
Manufacturing and the Importance of STEM Education The Future of U.S. Manufacturing and
the Importance of STEM Education. April 28, 2014. www.matricinnovates.com/education/the-
future-of-u-s-manufacturing-and-the-importance-of-stem-education/)
STEM stands for science, technology, engineering and math, and the future of the U.S.
manufacturing industry is heavily dependent upon todays STEM education. But why should a
nation that has been so wonderfully successful and leading worldwide innovation based on
STEM skills be concerned? Part of the reason may be that the strategic importance that was
once placed on STEM education decades ago isnt recognized the same way today.
Additionally, the term strategic may not be viewed the same way, either. Too often, we think
about today, this week, or even five years from now. And in truth, this is only the tactical future.
Strategic discussions need to focus on what our great country, and our companies, will need
across the next 30 years, not the next five years. We must continue to make STEM education a
priority as it relates to our local and national education curricula. And STEM isnt just about
producing chemical or mechanical engineers. Were talking about a STEM-literate citizenry:
lawmakers who have a sound understanding of science; citizens who expect actions will be
taken by government and business based in sound science, not emotion; teachers who teach
science in a way that keeps young students interested; and journalists who understand STEM
and can accurately report on STEM-related issues. For example, according to a study done by
Georgetown University, America isnt producing enough students trained in the STEM fields to
fill jobs in the future. If the nation is to keep up with the growing number of STEM jobs in order
to keep pace with our global competitors. We need to invest in strengthening STEM education
programs and our STEM pipeline throughout the country. There is no time like right now for
STEM education to be the most important driver for our education system today.
The current wave of defense cuts is also different than past defense budget reductions in their
likely industrial impact, as the U.S. d efense i ndustrial b ase is in a much different place
than it was in the past. D efense industrial issues are too often viewed through the lens
of jobs and pet projects to protect in congressional districts. But the overall health of the
firms that supply the technologies our armed forces utilize does have national security
resonance. Qualitative superiority in weaponry and other key military technology has
become an essential element of American military power in the modern eranot only for
winning wars but for deterring them. That requires world-class scientific and manufacturing
capabilities which in turn can also generate civilian and military export opportunities
for the United States in a globalized marketplace.
One of the few core responsibilities of the federal government mandated by the Constitution of
the United States is to provide for the common defence.2 Upon commissioning, every
American military officer swears an oath to support and defend this Constitution.3
Accordingly, the core mission of the American military is to protect and defend our
nation. This means deterring potential aggressors and, if deterrence fails, fighting and
winning wars. Any consideration of the militarys role and American defense policy
must start with that foundational principle. Yet if the need for a strong military begins
with the mission to fight and win wars, it does not end there. As the quote from
Theodore Roosevelt at the beginning of this essay illustrates, American leaders have long
appreciated that a formidable military can produce abundant diplomatic and economic
dividends, evenespeciallywhen not wielded in wartime. The United States military
capability supported our nations rise to global greatness over the past century, but
this was often because of the increased influence and credibility produced by this
capability rather than the overt use of force. Along the way, there developed an American
strategic tradition that integrated military strength with diplomatic acumen, economic growth,
and international influence.4 It is an historic tradition with an impressive heritage and
continuing salience today. Drawing on the historical record, there are many ways beyond the
kinetic use of force that a strong national defense bolsters our national power and global
influence. A robust defense budget and defense policy also strengthens our nation in manifest
other ways. A well-equipped defense enhances our capabilities and influence across
virtually all other elements of national power: our economy, our diplomacy, our
alliances, and our credibility and influence in the world . Conversely, an underresourced
national defense threatens to diminish our national power across all of these other
dimensions. A strong national defense is thus indispensable for a peaceful, successful,
and free Americaeven if a shot is never fired. The diplomatic successes in building
and maintaining a stable and peaceful international order achieved by the United
States over the past century have been enabled by Americas military dominance.
Conversely, the calamitous defense budget cuts and corresponding rise of potential peer
competitors in the present day are already undermining Americas diplomatic and economic
influence. A well-appointed military improves diplomacy with adversaries, strengthens
our alliances, signals credibility and resolve, deters aggression, and enhances national
morale. Yet this is not to disregard the manifest other dividends that a strong military can pay.
There are multiple pathways by which investments in military hard power produce economic
benefits. For example, the militarys role in protecting a stable international
environment also creates predictable and secure conditions in which economic growth
can flourish. The American security umbrella facilitated Western Europes postwar
reconstruction and economic revival, and Asias half-century economic boom has been
partly a function of Americas treaty alliances in the region maintaining peace and
stability, exemplified by the United States Navys Seventh Fleet protecting an open
maritime order, freedom of navigation, and secure sea lanes.
Advantage 2Cyber.
Effective STEM education key to cybersecurityits a massive threat.
Hayden 16. (Gen. Michael Hayden is a former director of the CIA and the National Security
Agency. Cyberspace is the new frontier, but where is our resolve for STEM education? August 4,
2016. www.washingtontimes.com/news/2016/aug/4/cyberthreat-reaction-lacks-resolve-for-
stem-educat/)
With the theft and leaking of Democratic National Committee data, dramatic headlines are
filling the pages of our newspapers. Calls for action are heard daily. Whatever we might do in
direct response, though, the best reaction over the long term might simply be quiet and
sustained investment in STEM (science, technology, engineering, mathematics) education. Im
old enough to remember how, in October 1957, Americans awoke to a new symbol of
insecurity: the metronomic beeps from the Sputnik satellite launched by the Soviet Union. The
nation saw it as a threat to American security and a challenge to our sense of technological and
intellectual superiority and ultimately our economic well-being. Our reaction was swift and
decisive. Within a month, President Eisenhower was telling the American people: According to
my scientific friends, one of our greatest, and most glaring, deficiencies is the failure of us in this
country to give high enough priority to scientific education and to the place of science in our
national life. Eisenhower also recognized that education requires time, incentive and skilled
teachers. Just a few years later, President Kennedy challenged the nation to reach for the
moon and, in a famous speech at Rice University, said: We set sail on this new sea because
there is new knowledge to be gained and new rights to be won. He added that space science,
like all technology, has no conscience of its own. Whether it will become a force for good or ill
depends on man. He then called on the United States to occupy a position of preeminence in
space to help decide whether this new ocean will be a sea of peace or a new terrifying theater
of war. Like Kennedy, we are in a new environment: the cyber domain. The same question
pertains: Will it be a zone of peace or a theater of war? Like Eisenhower, we face a significant
threat to national security from the increasing cyber vulnerability of our military forces and
our critical infrastructure. So far, though, we have not evidenced the determination and resolve
with which we faced the Sputnik challenge. Perhaps its because there has not been a real
triggering crisis, at least not yet. And, unlike the space race, the cyber conflict is characterized by
the diversity and distributed nature of our opponents. They range from other nations like China
and Russia to cybermilitias working for states like Syria, to powerful criminal enterprises, to
anonymous hacker groups with a variety of ideological agendas. Still, wholesale penetration of
U.S. military computers in 2008 (an operation dubbed Buckshot Yankee) should have served as a
wake-up call for American cyberdefenders. If that wasnt enough, we should have taken notice
seven years later with the massive breach of the Office of Personnel Management and the theft
of information on all of our employees who carry security clearances. These circumstances
should call for greater determination since we are increasingly dependent on technology to
operate and manage our critical infrastructure (i.e. finance, transportation, energy). We need
an educated and skilled workforce to protect these systems from criminals, renegade states
and other malicious actors. If our cyber enemies are numerous and more difficult to identify,
and their targets more diverse, then the potential threat to our well-being and safety is
higher, not lower. Faced with the Soviet expansion into space, America made significant
investments in science and technology. Kennedys 1963 budget provided training for 36,000
high school teachers, instituted similar efforts for college instructors and provided $61.5 million
in grants to our colleges and universities for basic research. During the 14 years of the Apollo
program, we spent in excess of $19 billion not all of it on science education, of course, but
much of it directly related to the development of American scientific and engineering expertise.
Today, by contrast, our reaction to the cyberthreat has been tepid. President Obama has
recognized the need for more training. As he said in announcing his computer science for all
initiative: Providing access to CS is a critical step for ensuring that our nation remains
competitive in the global economy and strengthens its cybersecurity. He then went on to
elaborate that there were over 600,000 tech jobs open across the United States and in a few
years more than half of them will be computer-related. So cyberdevelopment is about more
than just security. Its about economic development and, most important, its about human
opportunity. But we have yet to make the financial investment needed to improve our
computer science skills. Only one in four K-12 schools teach any computer science at all. Our
universities graduate only 40,000 computer science students annually plainly inadequate with
the roughly 600,000 jobs that go begging. Progress is within reach. One activist group, the
Computer Science Education Coalition, has called for the relatively modest investment of $250
million to support more than 50,000 classrooms and to reach more than 3.5 million students.
That we have yet to make such an investment suggests we do not take the threat or
opportunity as seriously as we should. Its time for that to change.
Primary and secondary STEM education is our only line of defense against
cyberattacks.
Francis 14. (David Francis for The Week. Why we need to prepare our kids for cyber-jobs
and cyber-warfare. September 5, 2014. theweek.com/articles/444328/why-need-prepare-kids-
cyberjobscyberwarfare)
These local efforts to improve cyber education at the high school level come at a time when the
United States is falling behind in STEM education. According to the World Economic Forum, the
United States is 52nd in the world in the quality of science and math education, and its overall
competitiveness with other countries in on the decline. Among developed nations, American
ranks 27th in the percentage of college students who get degrees in science or engineering.
Some two-thirds of students who receive PhDs in engineering at U.S universities are not from
the United States. It also comes as the United States continues to wage an unseen cyber-war
with China and other rivals, with the United States playing catch-up. American businesses are
also under assault from hackers who recently stole millions of credit card numbers from Target
and other business customers. Tamara Kenworthy, program director at HyperStream, said the
Olympics and other attempts to develop STEM skills at a young age are an attempt to close the
cyber gap. "About seven years ago, the number of students going into technology careers was
dropping," Kenworthy said. "The lack of opportunity for kids getting involved in this [STEM] was
very scary." Iowa's first IT Olympics were held in 2009. In the 2014 competition, students
competed in four disciplines cyber-defense, robotics, game design, and multimedia. Students
were split into teams of 10, and over a two-day period, competed in challenges designed to test
their skills in each discipline. Doug Jacobson, an Iowa State University professor and director of
the university's Information Assurance Center, says the competition tests basic defensive cyber-
skills needed to study STEM at the collegiate level. "We're more of an intramural sport,"
Jacobson said. "We follow an inquiry based learning model where our students set up their own
networks and have to defend them. They have to set up servers; they have to defend their
servers." Some 1,700 students at 110 clubs across Iowa participate in HyperStream. Of those,
about 700 competed in the Olympics. "We really expanded the student base and we are getting
a lot more students into the program because we need to get more kids excited about this.
Right now, we're about 75 percent boys, 25 percent girls. One of our goals is to get more girls
involved," Kenworthy said. Similar programs At the national level, students can compete in the
CyberPatriot competition, which brings together clubs from around the country. However, there
are a number of local programs that simply aim to introduce students to STEM. For instance,
Illinois State University sponsors the Central Illinois High School Cyber Defense Competition.
"The college level has been doing the collegiate cyber defense competition for about 10 years.
We had participated in the competition as a university for a couple of years," said Doug
Twitchell, assistant professor at Illinois State University who helped to organize the Illinois'
competition. We thought, 'Why couldn't we do something similar at the high school level?' High
schools within 100 miles can bring the students in and take part." Unlike Iowa, Illinois does not
have a formal high school infrastructure to prepare students for the competition. He said that
any student who is interested in STEM was welcome to attend, even if they hadn't been taught
coding before. "The biggest problem we found at the high school level is that students are
intimidated. There is so little curriculum in K through 12," he said. "They don't teach them
programming. If there is, it's usually once every couple of years." "We say that you don't have to
take a computer class before," Twitchell added. "We try to show them some stuff and teach
them some of the basics." At the very least, Twitchell said the goal of the competition is to
expose students to a possible line of work that they had not considered. "We want to get them
excited about this," he said. "Everyone is looking for the best and brightest students. This is one
of the ways to help those who have a talent for this to find this field and see it as something
they would want to do for a living."
Barack Obama just became the first U.S. president to write a line of computer code. The gesture
is part of a national push for computer science education. In fact, the White House recently
announced a $4 billion "Computer Science for All" initiative that will help educate the next
generation of coders. It couldn't have come soon enough. In addition to playing an increasingly
central role in business, computer science know-how is vital to America's economic and
national security. 2015 was the worst year ever for cybercrime, with nearly 1,000 major data
breaches. These attacks included the theft of 21.5 million records from the federal
government's Office of Personnel Management and a T-Mobile breach that exposed
the names, addresses, and Social Security numbers of 15 million customers.
Meanwhile, major global enemies, including the Islamic State and North Korea, have
developed sophisticated hacking operations to disrupt both commerce and
governance. Efforts to bolster cybersecurity all face the same obstacle: a shortage of
talent. Protecting our citizens requires a large-scale effort to attract talented people to
the cyber workforce and then train them to meet and thwart modern, unexpected
threats. There are currently 209,000 unfilled positions for cybersecurity workers in the United
States, according to a Stanford University report. Worldwide, the figure totals roughly 1 million.
That shortfall is expected to get worse. Global demand for cybersecurity expertise is on track to
reach 6 million positions by 2019. With cybercriminals growing more sophisticated each
day, we need a long-term strategy to close the cybersecurity talent gap. To start,
computer science must become a central component of our education system. According
to a recent Gallup survey commissioned by Google, less than one third of K-12 teachers and
administrators say that computer science is a top priority for their school . In a survey
commissioned by defense contractor Raytheon, 82 percent of millennials reported that no
teacher or guidance counselor had ever mentioned the possibility of a job in cybersecurity.
Thankfully, some policymakers are attempting to change the status quo. On top of President
Obama's national initiative, New York Mayor Bill de Blasio has committed his city's school
system to offering computer science classes to all students within 10 years. Efforts to ignite a
passion for cybersecurity careers should give special attention to young women. According to
that same Raytheon survey, men are five times more likely to consider a career in cybersecurity
than women. Research from a study I'm conducting with colleagues from Cisco and the wider
tech community for an upcoming book called The Internet of Women supports Raytheon's
findings. Another valuable step would be the creation of a cybersecurity scholarship program.
The National Science Foundation already offers funding for degrees related to cybersecurity,
provided recipients work for the government upon graduation. What's needed is a more
ambitious scholarship program, similar in scope to the GI Bill. All American students should
know that if they become qualified cybersecurity professionals, the government will help pay for
their education. Private-sector businesses such as technology firms and military contractors
should establish related initiatives, offering to pay off education loans for students who accept
in-house cybersecurity positions. But it won't be enough to simply encourage more Americans
to earn degrees in computer science. Students also need access to tech immersion
programs to see the practical implications of their studies. My own university, New York
Institute of Technology, has worked with industry leaders to create internships and other real-
world experiences and opportunities. And we've dramatically increased our cybersecurity
course offerings, hiring expert faculty in biometrics, swarm intelligence, cryptography, data
mining and forensics, and network security. We've even added a cybersecurity concentration for
undergraduates and a master's program. America faces mounting cyber threats. And the
shortage of professionals who can fend off the hackers is growing. Only through better
funding incentives and hands-on immersive training can we hope to attract more
young people to the cybersecurity field.
Cyberattacks causes grid collapse and nuclear war.
Robert Tilford 12, Graduate US Army Airborne School, Ft. Benning, Georgia, Cyber attackers
could shut down the electric grid for the entire east coast 2012,
http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-
the-entire-east-coa *
To make matters worse a cyber attack that can take out a civilian power grid, for example could
also cripple the U.S. military. The senator notes that is that the same power grids that supply
cities and towns, stores and gas stations, cell towers and heart monitors also power every
military base in our country. Although bases would be prepared to weather a short power
outage with backup diesel generators, within hours, not days, fuel supplies would run out, he
said. Which means military command and control centers could go dark. Radar systems that
detect air threats to our country would shut Down completely. Communication between
commanders and their troops would also go silent. And many weapons systems would be left
without either fuel or electric power, said Senator Grassley. So in a few short hours or days,
the mightiest military in the world would be left scrambling to maintain base functions, he
said. We contacted the Pentagon and officials confirmed the threat of a cyber attack is
something very real. Top national security officialsincluding the Chairman of the Joint Chiefs,
the Director of the National Security Agency, the Secretary of Defense, and the CIA Director
have said, preventing a cyber attack and improving the nations electric grids is among the
most urgent priorities of our country (source: Congressional Record). So how serious is the
Pentagon taking all this? Enough to start, or end a war over it, for sure. A cyber attack today
against the US could very well be seen as an Act of War and could be met with a full scale US
military response. That could include the use of nuclear weapons, if authorized by the
President.
Four main pathways exist for cyber terrorist to detonate a nuclear weapon: 16
direct control of a launch, provoking a nuclear state to launch a nuclear strike on
its own, obtaining a nuclear weapon from a nuclear state, or acquiring the means
to build a nuclear or dirty bomb themselves. Direct control of launch The US uses the
two-man rule to achieve a higher level of security in nuclear affairs. Under this rule two
authorized personnel must be present and in agreement during critical stages of nuclear
command and control. The President must jointly issue a launch order with the Secretary of
Defense; Minuteman missile operators must agree that the launch order is valid; and on a
submarine, both the commanding officer and executive officer must agree that the order to
launch is valid. In the US, in order to execute a nuclear launch, an Emergency Action
Message (EAM) is needed. This is a preformatted message that directs nuclear forces to
execute a specific attack. The contents of an EAM change daily and consist of a complex
code read by a human voice. Regular monitoring by shortwave listeners and videos posted
to YouTube provide insight into how these work. These are issued from the NMCC, or in the
event of destruction, from the designated hierarchy of command and control centres. Once
a command centre has confirmed the EAM, using the two-man rule, the Permissive Action
Link (PAL) codes are entered to arm the weapons and the message is sent out. These
messages are sent in digital format via the secure Automatic Digital Network and then
relayed to aircraft via single-sideband radio transmitters of the High Frequency Global
Communications System, and, at least in the past, sent to nuclear capable submarines via
Very Low Frequency (Greenemeier 2008, Hardisty 1985). The technical details of VLF
submarine communication methods can be found online, including PC-based VLF reception.
Some reports have noted a Pentagon review, which showed a potential electronic
back door into the US Navys system for broadcasting nuclear launch orders to
Trident submarines (Peterson 2004). The investigation showed that cyber terrorists
could potentially infiltrate this network and insert false orders for launch. The
investigation led to elaborate new instructions for validating launch orders (Blair 2003).
Adding further to the concern of cyber terrorists seizing control over submarine launched
nuclear missiles; The Royal Navy announced in 2008 that it would be installing a Microsoft
Windows operating system on its nuclear submarines (Page 2008). The choice of operating
system, apparently based on Windows XP, is not as alarming as the advertising of such a
system is. This may attract hackers and narrow the necessary reconnaissance to learning its
details and potential exploits. It is unlikely that the operating system would play a direct
role in the signal to launch, although this is far from certain. Knowledge of the operating
system may lead to the insertion of malicious code, which could be used to gain
accelerating privileges, tracking, valuable information, and deception that could
subsequently be used to initiate a launch. Remember from Chapter 2 that the UKs nuclear
submarines have the authority to launch if they believe the central command has been
destroyed. Attempts by cyber terrorists to create the illusion of a decapitating
strike could also be used to engage fail-deadly systems. Open source knowledge is
scarce as to whether Russia continues to operate such a system. However evidence
suggests that they have in the past. Perimetr, also known as Dead Hand, was an automated
system set to 17 launch a mass scale nuclear attack in the event of a decapitation strike
against Soviet leadership and military. In a crisis, military officials would send a coded
message to the bunkers, switching on the dead hand. If nearby ground-level sensors
detected a nuclear attack on Moscow, and if a break was detected in communications links
with top military commanders, the system would send low-frequency signals over
underground antennas to special rockets. Flying high over missile fields and other military
sites, these rockets in turn would broadcast attack orders to missiles, bombers and, via
radio relays, submarines at sea. Contrary to some Western beliefs, Dr. Blair says, many of
Russia's nuclear-armed missiles in underground silos and on mobile launchers can
be fired automatically. (Broad 1993) Assuming such a system is still active, cyber
terrorists would need to create a crisis situation in order to activate Perimetr, and then
fool it into believing a decapitating strike had taken place. While this is not an easy task,
the information age makes it easier. Cyber reconnaissance could help locate the machine
and learn its inner workings. This could be done by targeting the computers high of level
officialsanyone who has reportedly worked on such a project, or individuals involved in
military operations at underground facilities, such as those reported to be located at
Yamantau and Kosvinksy mountains in the central southern Urals (Rosenbaum 2007, Blair
2008) Indirect Control of Launch Cyber terrorists could cause incorrect information to be
transmitted, received, or displayed at nuclear command and control centres, or shut down
these centres computer networks completely. In 1995, a Norwegian scientific sounding
rocket was mistaken by Russian early warning systems as a nuclear missile launched from a
US submarine. A radar operator used Krokus to notify a general on duty who decided to
alert the highest levels. Kavkaz was implemented, all three chegets activated, and the
countdown for a nuclear decision began. It took eight minutes before the missile was
properly identifieda considerable amount of time considering the speed with which a
nuclear response must be decided upon (Aftergood 2000). Creating a false signal in
these early warning systems would be relatively easy using computer network
operations. The real difficulty would be gaining access to these systems as they are most
likely on a closed network. However, if they are transmitting wirelessly, that may provide
an entry point, and information gained through the internet may reveal the details, such as
passwords and software, for gaining entrance to the closed network. If access was
obtained, a false alarm could be followed by something like a DDoS attack, so the operators
believe an attack may be imminent, yet they can no longer verify it. This could add pressure
to the decision making process, and if coordinated precisely, could appear as a first round
EMP burst. Terrorist groups could also attempt to launch a non-nuclear missile,
such as the one used by Norway, in an attempt to fool the system. The number of
states who possess such technology is far greater than the number of states who possess
nuclear weapons. Obtaining them would be considerably easier, especially when enhancing
operations through computer network operations. Combining traditional terrorist methods
with cyber techniques opens opportunities neither could accomplish on their own. For 18
example, radar stations might be more vulnerable to a computer attack, while satellites are
more vulnerable to jamming from a laser beam, thus together they deny dual
phenomenology. Mapping communications networks through cyber reconnaissance may
expose weaknesses, and automated scanning devices created by more experienced hackers
can be readily found on the internet. Intercepting or spoofing communications is a highly
complex science. These systems are designed to protect against the worlds most powerful
and well funded militaries. Yet, there are recurring gaffes, and the very nature of
asymmetric warfare is to bypass complexities by finding simple loopholes. For example,
commercially available software for voice-morphing could be used to capture voice
commands within the command and control structure, cut these sound bytes into
phonemes, and splice it back together in order to issue false voice commands (Andersen
2001, Chapter 16). Spoofing could also be used to escalate a volatile situation in the
hopes of starting a nuclear war.
Afterschool programs can and should play a key role in supporting the future of the countrys
STEM workforce. Education policies should support that role. According to the Bureau of Labor
Statistics, by the year 2020 there will be 9.2 million jobs in the STEM (science, technology,
engineering and mathematics) fieldsthats up from 7.9 million in 2010. These fields provide
tremendous opportunities for those who pursue them, and they are essential for the economic
well-being of the United States. Not only will there be more openings in the STEM fields, but
many other jobs will require STEM-related skills. To meet the needs of industry and ensure a
scientifically literate public, the countrys education system must foster equitable access to
and success in these fields. This means engaging young people male and femaleof every
economic status and ethnicity in multiple and varied learning environments. The before-school,
afterschool and summer settings (known collectively as afterschool) play a valuable role in
closing the opportunity gap facing many children and youth from underserved and
underrepresented communities. Of the 8.4 million children currently in afterschool programs,
ethnic minority children are more likely than others to participate.i Twenty-five percent of
Asian, 24 percent of African-American, 21 percent of Hispanic and 16 percent of Native
American children attend afterschool programs, compared to the national average of 15
percent. Girls attend afterschool programs in equal numbers to boys. Afterschool is the ideal
setting to reach the populations the country needs to widen the STEM-pipeline through
experiences that supplement and complement the school day. Afterschool programs are
engaging children and youth in STEM learning, including children and youth who may not
otherwise be selected to, or choose to, participate in STEM programs. They provide a different
mode of interventionone that allows matching learning experiences to students interests and
facilitates project-based learning that drives home the relevance and importance of STEM in our
daily lives. They give young people the opportunity to learn through solving problems and
through failing an element crucial to research, experimentation and innovation; science and
engineering fields require persistence in the face of failure to solve the worlds problems.
Additionally, mentoring and exposure to role modelskey components of afterschoolare
particularly effective in engaging youth of color. High-quality afterschool STEM learning
programs are having significant impact on the young people who participate. A recent study
showed participants had improved attitudes toward STEM fields and careers, increased STEM
knowledge and skills, and a higher likelihood of graduating school and pursuing a STEM major in
college. ii Policies that seize on the attributes of afterschool and its ability to cultivate effective
STEM education will allow afterschool programs to become even more effective and integral
partners in improving the quality of STEM education. 1. Establish a pilot program during the
hours after school that brings STEM education to populations who are currently
underrepresented in the STEM fields. A recent PCAST report iii recommended developing an
initiative for a wide range of high-quality STEM-based afterschool programs spanning several
agencies and focused on creating opportunities for inspiration through experiences outside the
classroom. Congress should authorize a competitive grant program, based on best practices,
that supports afterschool STEM programs and utilizes appropriate outcome and quality
indicators. This program should reflect efforts to maximize federal investments in STEM
education across federal agenciesan undertaking that Capitol Hill, the White House, and the
STEM and afterschool communities support. Student populations that need the most help
should be served by the initiative, and it should build on the successes of other federal
afterschool investments, such as the 21st Century Community Learning Center initiative. The
effort should also support professional development for providers, and be subject to evaluation
and research to inform strategies for encouraging more traditionally underrepresented
populations to pursue study and careers in the STEM fields. 2. Policy makers should recognize
the role afterschool programs play in STEM education and explicitly support them in K-12 STEM
education initiatives and legislation. Likewise, federal and state funding streams for afterschool
programs should support STEM education programs. Many public STEM education initiatives,
funding streams and legislative initiatives target only the formal K- 12 school setting and
classroom teachers. While these settings and programs play a central role in effective STEM
education, afterschool and summer learning programs can foster increased interest and success
in STEM disciplines and build STEM literacy. School and classroom resources that support STEM
education should be also accessible to afterschool program providers and staff, and federal and
state STEM education initiatives should explicitly cite afterschool as a strategy to improve the
teaching and learning of STEM disciplines in legislative and regulatory guidance. These public
funds should be invested in promoting stronger partnerships between classroom teachers and
afterschool providers; joint professional development with afterschool educators; and teacher
training programs that recognize the value of the afterschool setting by allowing practicum,
placements, etc. in afterschool/summer programs. A number of existing federally-funded
afterschool programs could provide some level of support for STEM education. While the 21st
Century Community Learning Centers program is the only exclusive and substantial federal
funding source for afterschool, before-school and summer learning programs, other agencies
such as the Department of Justice, the Corporation for National and Community Service, and the
Department of Housing and Urban Developmentinvest in afterschool programs that could
help support STEM learning. Given the call to grow and sustain a STEM workforce, these
agencies should consider how their investments in afterschool can also support better STEM
education, and their guidance to employees and the field should embrace afterschool as a
setting to teach and learn these disciplines.
Federal competitive grants are keysquo policies like RTT fail because of their
broad applicationtargeting specific areas for improvement and rewarding
precious successes ensures reform.
West 15. (Martin R. West Former Nonresident Senior Fellow - Economic Studies, Center on
Children and Families, Brookings Institute. Preserving the federal role in encouraging and
evaluating education innovation. February 19, 2015.
https://www.brookings.edu/research/preserving-the-federal-role-in-encouraging-and-
evaluating-education-innovation/)
With both houses of Congress moving apace to reauthorize the Elementary and Secondary
Education Act (ESEA), the question is not whether the new legislation will reduce the federal
governments footprint in K-12 education; it assuredly will. The question is whether, in their
understandable efforts to rein in Washingtons influence, legislators can preserve those
elements of federal policy that stand to benefit students and taxpayersparticularly those that
fulfill functions that would otherwise go unaddressed within our multi-layered system of
education governance. One key unresolved issue involves the status of competitive grant
programs, through which the Department of Education invites states and school districts to
apply for funds to support programs that address federally identified priorities. In the current
environment, Congress may be tempted to eschew all programs structured in this way,
preferring to rely on formulas to ensure that schools receive their fair share of federal funds.
That would be a mistake. Flexible competitive grant programs that encourage innovations in
policy and practice and ensure that they are subjected to rigorous evaluation should remain a
part of ESEA going forward. In particular, the Investing in Innovation (i3) fund, a program
created through the American Reinvestment and Recovery Act that is not a part of the
reauthorization bills now moving through Congress, deserves a second look. Increased reliance
on competitive grants has been arguably the defining feature of the Obama administrations K-
12 education policy. Its signature Race to the Top program (RTT) asked states to compete for
$4.35 billion in federal grants based on their commitment to implement a 19-item reform
agenda. Expansive in its scope, RTT quickly became a symbol of what Senate Health, Education,
Labor and Pensions Committee chairman Lamar Alexander has characterized as the
Departments efforts to dictate to states and school districts the details of how best to improve
local schools. Congressional discontent with RTT-style policies is not limited to Republicans,
however. Most legislators prefer to claim credit for funds allocated by formula rather than risk
the ire of constituents whose applications are rejected, and rural members in particular often
feel as if their districts are at a disadvantage when funding is competitive. Perhaps because of
this discontent, President Obamas 2016 budget proposal did not include funds for a new RTT
competition. But rather than paint all competitive grants with a broad brush, it is useful to
consider differences in their structure. The table below shows that competitive grant programs
can vary on at least two dimensions. First, the programs can be broad, aiming to incentivize
policy changes in multiple areas in one fell swoop, or narrowly focused on a specific challenge
facing most school systems. Second, grants can be awarded based on applicants willingness to
commit to a detailed set of policy changes and program requirements prescribed by
Washington, or they can be awarded based on past success, with funding levels tied to the
strength of the evidence the applicant is able to present of their programs effectiveness. RTT
epitomized the broad, prescriptive approach to competitive grants. Although presented by
supporters as an opportunity for states to put forward their best and most innovative ideas, in
fact the selection criteria amounted to a detailed list of commitments in areas ranging from
state standards and data systems to teacher evaluation systems and strategies to turn around
low-performing schools. Because funding was based primarily on future commitments, the
program did little to alter the compliance-oriented relationship between federal officials and
state and local educators once grants were awarded. As Rick Hess of the American Enterprise
Institute has written, the aftermath entailed years of invasive federal monitoringduring
which junior staff at the U.S. Department of Education exerted remarkable influence over the
states that received RTT funds. While it is too soon to know whether states awarded RTT
grants will see improvements in student outcomes, there is little hope that their efforts will be
a source of rigorous evidence on the merits of specific policies they pursued . The sheer
number of policies states were required to implement simultaneously makes it all but
impossible to isolate the impact of any one. Yet RTT was the exception, not the rule. Its scale
reflected the unique circumstances of the post-financial crisis stimulus package, and maintaining
a single competitive grant program at this scale has already proven to be politically infeasible.
Other competitive grant programs are structured quite differently, with a narrow focus tied to
a distinct federal purpose. For example, the Teacher Incentive Fund created by the second Bush
administration asks school districts and charter schools to commit to implementing
performance-based teacher compensation systems. The rationale is that local officials will be
more likely to adopt politically controversial changes to how teachers are compensated when
outside resources are available to support their efforts. For the past few years, the Department
of Education has also offered grants directly to Charter Management Organizations seeking to
expand or replicate high-quality schools. Those schools need not adhere to a particular
pedagogical model but must instead document a track record of improving student outcomes.
The Teacher Incentive Fund and grants to expand and replicate high-quality charter schools have
been included in both the House committees bill and in Senator Alexanders initial discussion
draft. Those bills do not, however, include the Investing in Innovation fund (i3), the second
major competitive grant program created through the stimulus package. Initially funded at $650
million, i3 allowed school districts, charter schools, and non-profit organizations working in
partnership with one of those entities to apply for grants to support innovative programs
aligned with one of four broadly defined federal priorities (e.g., supporting effective teachers
and principals or improving the use of data). In other words, i3 was broad in its focus but
avoided prescription with respect to the design of the programs eligible for federal support. The
origins and implementation of i3 have been ably chronicled by Ron Haskins and Greg Margolis,
who present the program as a cornerstone of the Obama administrations broader efforts to
base spending on social programs on rigorous evidence. Two specific aspects of the design of i3
are especially noteworthy. First, the competition used a tiered evidence model to align the
amount of funding a program could receive to the strength of the evidence to support its
effectiveness. Second, grant winners were required to conduct rigorous evaluations and were
selected in part based on the quality of their proposed evaluation design. Across the first four
funding cohorts, i3 supported 53 randomized-control trialsthe gold-standard design for
evaluations of program effectiveness and one that until recently was virtually unknown in the
education sector. (Full disclosure: my primary employer, the Harvard Graduate School of
Education, has benefited from i3 as a direct grantee and through evaluation contracts; I am the
principal investigator on two of those contracts.) A competitive grant program that includes
these design elements need not be called i3. Indeed, it need not be drafted as a standalone
program at all. The Coalition for Evidence-Based Policy has proposed language that would
simply allow the Department of Education to reserve up to one percent of funding of all ESEA
programs (except Title I) to award grants for innovation and research, with grant amounts
based on the tiered evidence model used in i3. The proposal is modeled on the Small Business
Innovation Research program under which 11 federal agencies since 1982 have set aside a small
percentage of their budgets to award grants to small companies engaged in the development
and evaluation of new technologies. As the Coalition notes, both the Government Accountability
office and the National Academy of Sciences have offered consistently positive assessments of
the programs success. Importantly, the proposal like SBIR would include small businesses as
eligible grantees, addressing a shortcoming of the original i3 program that arguably limited the
types of innovations proposed. The Coalitions proposal could be strengthened by giving the
Institute of Education Sciences the lead role in assessing the strength of applicants evidence of
effectiveness and in supporting required evaluation activities. The risk with these competitions
when carried out by the Office of the Secretary is that they become politicized, that they are
judged by review panels without methodological competence, and that they are overseen, once
awarded, by career staff in program offices that do not have the background to monitor what is,
at root, a program evaluation grant. These risks could be substantially reduced if the
competition were funded as a line item in the IES budget, with statutory language requiring that
review panels include both practitioners and researchers. Properly designed competitive grant
programs provide an opportunity for Congress to target resources at federal priorities and
encourage innovative problem-solving while avoiding federal mandates. They should avoid
prescription and both reward and produce rigorous evidence, thus increasing the share of
education dollars spent on evidence-based programs while at the same time fulfilling the federal
governments unique responsibility for producing and disseminating high-quality evidence on
the best ways to improve American schools. The i3 program was a promising step in this
direction. It would be unfortunate if Congress were to miss the opportunity to make something
similar a permanent feature of ESEA.
The federal government currently funds a wide range of K12 education initiatives (see
Table 1). The task force has identified just four functions that are essential to its role in
education: creating and disseminating information on school performance in each classroom and program
effectiveness, including information on individual student performance ; enforcing civil rights