General Actions:
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
D3 | 7 | K-State KM | Box |
| ||||
Kentucky | 1 | George Washington AS | Al Hiland |
| ||||
Kentucky | 4 | Northwestern WW | Matt Munday |
| ||||
Kentucky | 6 | Michigan CP | Katie Frederick |
| ||||
Kentucky | 8 | Wichita State DS | Caleb Edwards |
| ||||
UMKC | 1 | Washburn | Scott Elliot |
| ||||
UNT | 4 | UCO VY | Ermo |
| ||||
UTD | 5 | Kansas KS | Matt Moore |
|
Tournament | Round | Report |
---|---|---|
D3 | 7 | Opponent: K-State KM | Judge: Box 1AC War on Drugs |
Kentucky | 1 | Opponent: George Washington AS | Judge: Al Hiland T - Defense |
Kentucky | 4 | Opponent: Northwestern WW | Judge: Matt Munday 1AC - Cyber |
Kentucky | 6 | Opponent: Michigan CP | Judge: Katie Frederick aff - cyber with alliances and arms races |
Kentucky | 8 | Opponent: Wichita State DS | Judge: Caleb Edwards aff - cyber with alliances and arms race |
UNT | 4 | Opponent: UCO VY | Judge: Ermo 1AC Cyber 20 |
UTD | 5 | Opponent: Kansas KS | Judge: Matt Moore 1AC Amend the AUMF |
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1AC Amend the AUMFTournament: UTD | Round: 5 | Opponent: Kansas KS | Judge: Matt Moore The war against al Qaeda is not going well. Afghanistan has seen the most The September 2001 AUMF provides for the use of force against the entity ¶ responsible It has recently become clear, however, that the Al Qaeda threat that occupied Turning the tide is critical – al-Qaeda affiliates pose a high risk of nuclear and biological terrorism Allison, IR Director @ Harvard, 12 Forty years ago this week at the Munich Olympics of 1972, Palestinian terrorists conducted Nuclear terrorism causes nuclear escalation –retaliation goes global, it’s highly likely and rapid Morgan 09 In a remarkable website on nuclear war, Carol Moore asks the question “Is High risk of nuke terror Bioattack causes extinction Steinbrenner 97 Although human pathogens are often lumped with nuclear explosives and lethal chemicals as potential weapons New gene manipulation takes out their defense MSNBC 2011 GENEVA — New gene assembly technology that offers great benefits for scientific research could also Adv. 2 Firebreaks Barnes ‘12 The AUMF must inevitably expire because it is expressly linked to the September 11, The biggest international news in the quiet months before 9/11 was the collision The United States must abide by the rigorous standards set out above that are meant Only a single failure of nuclear deterrence is required to start a nuclear war, So does China-Taiwan THE DOOMSDAY SCENARIO THE high-intensity scenario postulates a cross-strait war escalating Solvency The AUMF must be updated. In 2001, the AUMF authorized force to ¶ Obama will adhere to the plan- wants to rely on congressional authority WSJ ‘12 Obama administration officials, concerned about the legal justifications behind counterterrorism operations, have preferred to rely on congressional authority for the use of force against al Qaeda, seeing such authority as more defensible and acceptable to allies. | 1/6/14 |
1AC Kentucky - CyberTournament: Kentucky | Round: 1 | Opponent: George Washington AS | Judge: Al Hiland 1AC - Arms RacesContention 1 is Arms RacesThe cyber arms race is accelerating — major attacks are inevitable this year — the best data provesGoldman 13 Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — Specifically, OCOs drive arms races and retaliationMoss 13 Although setting up a cybersecurity working group with China, Washington has also signaled it Cyber arms race causes world warthere are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves The new cyber arms race Tomorrow’s wars will be fought not just with guns, Congressional constraints of OCOs are key to solve nuclear wararms-racing, command and control hacking, crisis instability, and fracturing nuclear agreements The United States is racing for the technological frontier in military and intelligence uses of Cyberwar escalates:A) Speed, scope, and spoofingClarke and Knake ’12 In our hypothetical exercise, the Chinese response aimed at four U.S. b) Pressure to retaliateOwens et al 9 But in many kinds of cyberattack, the magnitude of the impact of the ¶ 1AC - AlliancesContention 2 is AlliancesCongressional restrictions necessary for allied cooperation— restoring legitimacy to OCOs is key to cyber coalitionsDunlap 12 Military commanders have seen the no-legal-limits movie before and they do The small concession of the plan is key — it increases key flexibility and secures cyberspaceLord et al 11 The United States should lead a broad, multi-stakeholder international cyber security coalition Status quo cyber doctrine undermines US credibilityLawson ’10 What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and Alliances prevent nuclear war—-key to burden sharingDouglas Ross 99 is professor of political science at Simon Fraser University, Winter 1998/1999, Canada’s functional ¶ isolationism and the future of weapons of mass destruction, International Journal, p. lexis Coalition building key to solve extinctionJoseph Nye 8 is professor of international relations at Harvard University, "American Power After the Financial Crises," http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Legitimacy is key to band-wagonLee 10 This book examines US hegemony and international legitimacy in the post-Cold War era Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter themKazianis 12 In Pacific Forum’s PacNet ~#41 issue, Mihoko Matsubara correctly asserts that "countering China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputesRTT 13 A new report of the U.S. Defense Department says that China is PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capabilityYoshihara 10 In recent years, defense analysts in the United States have substantially revised their estimates Taiwan crisis is imminent and causes nuclear warColby et al 13 Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict So does conflict over the South China SeaRehman 13 Despite America’s best efforts to construct stronger ties with China, relations in-between Their defense doesn’t applyChinese fear of US cyber unilateralism means escalation is probableVornDick 7/30/12 Yet, Chinese media reports have filled some of the void with regards to ROE Cyber stimulates risk taking and lowers conflict inhibitionDobbins et al. ’11 The difficulties of direct defense could be greatly accelerated by Chinese development and ¶ use 1AC – PlanThe United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.1AC – SolvencyContention 3 is solvencyFirst, norm-setting — all eyes are on the U.S. —other countries model our use of OCOs — clear restrictions on use are essentialBradbury 11 Evolving customary law. This approach also accommodates the reality that how the U. Norms are essential to solve — they can’t be created unless OCOs are addressedGoldsmith 10 In a speech this month on "Internet freedom," Secretary of State Hillary Clinton It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is keyLewis 11 Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting Second it solves perception — Congressionally initiated restriction is necessary to reverse the signal of independent presidential authority— now is keyDycus 10 In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that Congressional restrictions on OCOs send a global signal of cyber leadership that solves reckless use of OCOsBastby 12 Perhaps more important than being out of the cyber coordination loop, is the how Congress must initiate the restriction — anything else is perceived as abdicationHansen and Friedman 9 The problem, of course, is that much of this congressional involvement has come | 10/5/13 |
1AC UMKC - Cyber Aff - Round 1Tournament: UMKC | Round: 1 | Opponent: Washburn | Judge: Scott Elliot 1ACPlanThe United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of congressionally authorized United States military operations.Adv 1 - PreemptionAdvantage 1 is PreemptionStatus quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. Cyber prolif will be rapid- low barriers of entry and use of proxies Walsh 11 The United States might not be quite as far ahead of other nations in terms Proliferation of cyber weapons to terrorists causes nuclear great power wars Fritz 9 This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. And independently, cyber preemption escalates to warClarke 2009 Plan solves- A) It provides international credibility that creates stables norms for deterring preemptive useClarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) B) US norms against preemptive cyberattacks reverses cyber weapons prolif Goldsmith 10 In a speech this month on "Internet freedom," Secretary of State Hillary Clinton Adv 2 - TradeoffAdvantage 2 is TradeoffCyber attack is highly like in the squo- actors are probing grid weaknesses Reed ’12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, "U.S. energy companies victims of potentially destructive cyber intrusions", 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks Current preemptive OCO policy creates priority confusion and drains cyber-defense resources America’s generals and spymasters have decided they can secure a better future in cyberspace through Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilitiesRid 2/4 But the rhetoric of war doesn’t accurately describe much of what happened. There was Military focus on offense spills over the private sector Gjelten, 13 2 impacts:First, cyberwar:Overconcentration on offense is destabilizing- makes cyberwar inevitable That causes nuclear miscalc due to hair-trigger response Clark and Andreasen 13 President Obama is expected to unveil a new nuclear policy initiative this week in Berlin Link is linear- every investment in offensive capabilities fuels a cyber-arms race that risks escalation Gjelten, 13 Second, cyber crimeDefense solves it McGraw 13 Gary McGraw-http://www.tandfonline.com/action/doSearch?action=runSearch26type=advanced26searchType=journal26result=true26prevSearch=2Bauthorsfield3A(McGraw2C+G), PhD is Chief Technology Of?cer of Cigital, and author of¶ Software Security (AWL 2006) along with ten other software security¶ books. He also produces the monthly Silver Bullet Security Podcast for¶ IEEE Security 26 Privacy Magazine (syndicated by SearchSecurity), Cyber War is Inevitable (Unless We Build Security In), Journal of Strategic Studies - Volume 36, Issue 1, 2013, pages 109-119, http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013-http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013~~23SPS The conceptual con?ation of cyber war, cyber espionage, and cyber¶ crime into Major cyber crime crushes the global economy via ripple effectsPanda, Sani, Rao, 12 Hemraj, Associate Professor 26 Head, Department of Computer Science 26 Engineering, Alwar Institute of Engineering 26 Technology, Yerra Shankar, PhD Student, Department of Mathematics Shiksha ?O’ Anusandhan University, T.C. Principal, Orissa Engineering College, "Cyber-Crimes and their Impacts: A Review," Vol. 2, Issue 2,Mar-Apr 2012, http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf-http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf~~23SPS Decline trigger multiple nuclear conflictsHarris and Burrows, 9 Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics Adv 3 – Separation of PowersAdvantage 3 is Seperation of PowersCongressional restrictions on executive cyberwar power is critical to maintain SOPLorber 13 Yet addressing these questions is increasingly important for two reasons. ¶ First, as Strong separation of powers key to heg First, America’s mature political institutions organized around the rule of law have made it Heg solves great power wars Events in Libya are a further reminder for Americans that we stand at a crossroads Keeping strong SoP is a drule Early SOP key to prevent escalation of prez powers and massive inter-branch conflict Interbranch conflict causes extinction Indeed there are very few domestic issues that do not have strong international implications, Dycus 10 If Congress now fails to enact guidelines for cyber warfare, it might ¶ be Unfettered presidential powers cause nuclear war On the basis of this report, the startling fact is that one man ~ SolvencyNext is SolvencyCongressional action is critical to cyber expertise and preserves presidential flexibilityDycus ’10 Congress’s active role in the development and implementation of cyber ¶ warfare policy is no XO can’t solve- binding precedent is key to norm building and check expansion of prez powersHuston ’11 Presidents have had certain restrictions for war-making ever since because the founders wanted Renouncing use of large-scale attacks reduces the risk of cyberattack Owens et al. ’9 No first use of large-scale cyberattacks. Although weapons for cyberattack are valid Military will adhere to the lawDunlap ’12 This raises an important question: Should America wage war— cyber or Owens et al 9 Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between | 9/17/13 |
1AC UNT - CyberTournament: UNT | Round: 4 | Opponent: UCO VY | Judge: Ermo PlanThe United States federal government should statutorily prohibit the authority of the President of the United States to authorize the preemptive use of offensive cyber-attacks.Adv- CyberWarThe first internal link is arms racing-Squo offensive cyber posture attacks risk retaliatory cycles and arms racesMoss 13 Although setting up a cybersecurity working group with China, Washington has also signaled it Cyber arms race causes world war — there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solvesCSM 11 The new cyber arms race Tomorrow’s wars will be fought not just with guns, It goes nuclear — we don’t even have to win escalation — command and control hacking, crisis instability, and fracturing nuclear agreements all ensure independent nuclear response- congressional restrictions are key to solveAustin, 8/6 The United States is racing for the technological frontier in military and intelligence uses of Plan solves- other countries model our use of OCOs — clear restrictions on use are essentialBradbury 11 Evolving customary law. This approach also accommodates the reality that how the U. Second internal link is preemption-The US preparing to initiate a preemptive cyberwar nowMartin ’13 The US government is developing detailed plans to attack other countries using cyberwarfare techniques, Cyber preemption escalates to shooting warClarke 2009 As in the 1960s, the speed of war is rapidly accelerating. Then, Third Internal link is defenseCyber-attack is likely in the squo - actors are mapping out vulnerable infrastructureFrancis ’13 But experts warn these kinds of service breaks are just a small symptom of the Current preemptive OCO policy backfires- creates priority confusion and drains cyber-defense resourcesHealey ’13 America’s generals and spymasters have decided they can secure a better future in cyberspace through Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilitiesRid 2/4 But the rhetoric of war doesn’t accurately describe much of what happened. There was Military focus on offense spills over the private sectorGjelten, 13 When the Pentagon launched its much-anticipated "Strategy for Operating in Cyberspace" Overconcentration on offense is uniquely destabilizing- makes cyberwar inevitableMcGraw 13 Also of note is the balancing effect that extreme cyber vulnerability¶ has on power That causes nuclear miscalc due to hair-trigger responseClark and Andreasen 13 President Obama is expected to unveil a new nuclear policy initiative this week in Berlin Criticizing the probability of our impacts is meaningless – all wars are low probability, what matters is that cyberwar is more likely to escalate than other conflicts, which uniquely warrants academic attentionJunio ’13 Two recent articles in the pages of this journal contribute to an¶ important debate Understanding the risks of current US posture reduces the chances of cyber war escalation- worst case assessments are the best preparationClarke and Knake ’10 In the seminal 1983 movie about computers and war, War Games, ¶ starring Arguing against the practices of the USFG in the context of war powers allows for an engaged public that can expose the hypocrisy of the federal government – only focus on specific policy questions can actualize change by making it relevant to policy-makers –Mellor 13 This section of the paper considers more generally the need for just war theorists to Debate about the repercussions of cyber preemption is good- it generates a broader literature base that encourages restraintMagnuson ’9 ¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of War fuels structural violenceGoldstein 2001 First, peace activists face a dilemma in thinking about causes of war and working Escalation is rapid and globalVOA News ’12 That said, the battles might actually begin small. Think online skirmishes between angry | 1/9/14 |
Drug War 1AC - DistrictsTournament: D3 | Round: 7 | Opponent: K-State KM | Judge: Box What are two hundred Marines doing in Guatemala fighting a drug war? Adam Williams The news broke in the United States during the lazy summer days of late August http://www.newrepublic.com/article/116076/uruguays-pot-legalization-bad-americas-war-drugs While there were economic motivations for Canadian policy in Central America, security considerations were Risks authoritarian takeover in large parts of the region Best data indicates that is the root cause and biggest internal link to terrorism To be sure, terrorists are motivated by other factors besides repression¶ or lack Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences Unless the United States curtails its consumption of petroleum, these military greybeards caution, Less intuitive is how periods of economic decline may increase the likelihood of external conflict FARC trades weapons to Russian organized crime groups due to the drug war WASHINGTON, April 9, 2000 — Russian crime syndicates and military officers are supplying That includes nukes and fissile material Al-Watan al-Arabi goes on to say that Western security agencies are South America drug war is the biggest internal link That seizure marked the first time radioactive material has been linked to farc. It The real issue in terms of imminent danger, both then and now, is CENTRAL AMERICA. The hottest debates during the Reagan Administration regarding the WPR focused on WPR application ensures the creation of norms through its statutory procedures that constrain Executive actions and prevent bad foreign policy outcomes—Executive Restraint CP doesn’t solve *24 In the first 150 years of our country, numerous instances of WPR application ensures Presidential Flex while still constraining the worst abuses of drug war interventions by forcing the Executive to debate intervention and creating norms beyond the legal restrictions—All other approaches fail Plan is key to increase accountability and stop Presidential overreach | 3/10/14 |
Kentucky Round 4 - Aff v Northwestern WWTournament: Kentucky | Round: 4 | Opponent: Northwestern WW | Judge: Matt Munday 1AC vs Northwestern WW1AC - Arms RacesContention 1 is Arms RacesThe cyber arms race is accelerating — major attacks are inevitable this year — the best data provesGoldman 13 Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — Specifically, OCOs drive arms races and retaliationMoss 13 Although setting up a cybersecurity working group with China, Washington has also signaled it Cyber arms race causes world warthere are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves The new cyber arms race Tomorrow’s wars will be fought not just with guns, Congressional constraints of OCOs are key to solve nuclear wararms-racing, command and control hacking, crisis instability, and fracturing nuclear agreements The United States is racing for the technological frontier in military and intelligence uses of Cyberwar escalates:A) Speed, scope, and spoofingClarke and Knake ’12 In our hypothetical exercise, the Chinese response aimed at four U.S. b) Pressure to retaliateOwens et al 9 But in many kinds of cyberattack, the magnitude of the impact of the ¶ 1AC - AlliancesContention 2 is AlliancesCongressional restrictions necessary for allied cooperation— restoring legitimacy to OCOs is key to cyber coalitionsDunlap 12 Military commanders have seen the no-legal-limits movie before and they do The small concession of the plan is key — it increases key flexibility and secures cyberspaceLord et al 11 The United States should lead a broad, multi-stakeholder international cyber security coalition Status quo cyber doctrine undermines US credibilityLawson ’10 What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and Alliances prevent nuclear war—-key to burden sharingDouglas Ross 99 is professor of political science at Simon Fraser University, Winter 1998/1999, Canada’s functional ¶ isolationism and the future of weapons of mass destruction, International Journal, p. lexis Coalition building key to solve extinctionJoseph Nye 8 is professor of international relations at Harvard University, and#34;American Power After the Financial Crises,and#34; http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Legitimacy is key to band-wagonLee 10 This book examines US hegemony and international legitimacy in the post-Cold War era Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter themKazianis 12 In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that and#34;countering China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputesRTT 13 A new report of the U.S. Defense Department says that China is PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capabilityYoshihara 10 In recent years, defense analysts in the United States have substantially revised their estimates Taiwan crisis is imminent and causes nuclear warColby et al 13 Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict So does conflict over the South China SeaRehman 13 Despite America’s best efforts to construct stronger ties with China, relations in-between Their defense doesn’t applyChinese fear of US cyber unilateralism means escalation is probableVornDick 7/30/12 Yet, Chinese media reports have filled some of the void with regards to ROE Cyber stimulates risk taking and lowers conflict inhibitionDobbins et al. ’11 The difficulties of direct defense could be greatly accelerated by Chinese development and ¶ use 1AC – PlanThe United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.1AC – SolvencyContention 3 is solvencyFirst, norm-setting — all eyes are on the U.S. —other countries model our use of OCOs — clear restrictions on use are essentialBradbury 11 Evolving customary law. This approach also accommodates the reality that how the U. Norms are essential to solve — they can’t be created unless OCOs are addressedGoldsmith 10 In a speech this month on and#34;Internet freedom,and#34; Secretary of State Hillary Clinton It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is keyLewis 11 Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting Second it solves perception — Congressionally initiated restriction is necessary to reverse the signal of independent presidential authority— now is keyDycus 10 In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that Congressional restrictions on OCOs send a global signal of cyber leadership that solves reckless use of OCOsBastby 12 Perhaps more important than being out of the cyber coordination loop, is the how Congress must initiate the restriction — anything else is perceived as abdicationHansen 26 Friedman 9 The problem, of course, is that much of this congressional involvement has come 2ACTRestrict and prohibit are synonymousPaust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Counter-interp: Statutory restrictions are legislative limitsLaw dictionary No Date Neg interp impossible: Congress CANNOT prohibitColella ’88 Because the subsequent versions of the amendment sought to deny the executive any latitude in Arms RacesThey say prolif of weapons is inevitable but No capability for cyber attack nowEconomist 12 Cyber-disruption has nuisance value and may be costly to repair, but it Banning preemptive attacks solves normsClarke and Knake ’10 In nuclear war strategy, the Soviet Union proposed that we and ¶ they agree ====Norms solve completely – Bradbury 11 says Congressional restrictions uniquely send an international symbol that is modeled==== DAWon’t pass - election fears and Obama’s approach prolongs Republican backlashKaplan 10-3 As the government shutdown enters its third day, Democrats and Republicans seem no closer The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a dealTodd 10-3 and#34;We have to get something out of thisand#34;: This is where Rep. FERC thumpsDixon 10/1 President Barack Obama’s nominee to lead the Federal Energy Regulatory Commission abandoned his quest Tuesday No link — the plan’s not controversialPerera 6/26, SACS calls for new oversight of Cyber Command, David Perera is executive editor of the FierceMarkets Government Group, which includes FierceGovernment, FierceGovernmentIT, FierceHomelandSecurity, and FierceMobileGovernment. He has reported on all things federal since January 2004 and is co-author of Inside Guide to the Federal IT Market-http://store.brightkey.net/mconcepts_ebiz/OnlineStore/ProductDetail.aspx?ProductId=201530, a book published in October 2012., http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26-http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26 It’s super popularBradbury 11, Steven G. Bradbury is an attorney at the Washington, D.C office of Dechert LLP-http://en.wikipedia.org/wiki/Dechert_LLP. PC isn’t key and Obama isn’t spending itAllen, 9/27 The White House’s distance diplomacy with Republicans is an approach that tacitly acknowledges three inescapable No impact – multiple factors checkFXStreet.com, 9/25 The U.S. debt ceiling deadline may be looming like dark clouds over XO solvesWeisenyhal 9/30 With no movement on either side and the debt ceiling fast approaching, there’s increasing No impact to econ declineMiller 2k The question may be reformulated. Do wars spring from a popular reaction to a PC is low and decreasingSteinhauser, 9/26 As he battles with congressional Republicans over the budget and the debt ceiling, and XODoesn’t solve modelingRothschild 13 (Matthew, Feb 4, and#34;The Danger’s of Obama’s Cyber War Power Grab,and#34; www.progressive.org/dangers-of-obama-cyber-war-power-grab-http://www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to Perm — do both — Congressional involvement makes the plan popular — the CP links to politicsCorcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, and#34;Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change,and#34; 9 U.N.H. L. Rev. 207)) Links to politics – congress wants to be involvedSasso 2012 Future presidents roll backHarvard Law Review 12, and#34;Developments in the Law: Presidential Authority,and#34; Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf Congressional failure to act leads to massive expansion in prez power - now keyDycus 10 If Congress now fails to enact guidelines for cyber warfare, it might ¶ be Unfettered presidential powers cause nuclear warForrester 89 On the basis of this report, the startling fact is that one man ~ K5. Threats are real – we can’t ignore themOlav. F. Knudsen, Prof @ Södertörn Univ College, 01 ~Security Dialogue 32.3, and#34;Post-Copenhagen Security Studies: Desecuritizing Securitization,and#34; p. 360~ In the post-Cold War period, agenda-setting has been much easier 6. Security ensures emancipation – key to value to lifeKen Booth, Prof. of IR @ Wales, ’5 ~Critical Security Studies and World Politics, p. 22~ The best starting point for conceptualizing security lies in the real conditions of insecurity suffered 8. Realism is inevitable - rejecting it makes it more dangerousStefano Guzzini, Assistant Professor at Central European Univ., Realism in International Relations and International Political Economy, 1998, p. 212 Therefore, in a third step, this chapter also claims that it is impossible 9. Monolithic rejection of security fails – precludes positive changeRoe 2012 (Paul Roe, Associate Professor in the Department of International Relations and European Studies at Central European University, Budapest, and#34;Is securitization a ’negative’ concept? Revisiting the normative debate over normal versus extraordinary politics,and#34; Security Dialogue vol. 43 no. 3, June 2012) Although for Aradau, the solution to security’s barred universality lies not in desecuritization – 10. Infinite number of ’root causes’ means only threat analysis solvesMoore 4 Walter L. Brown Professor of Law at the University of Virginia School of Law (John Norton Moore, and#34;Solving the War Puzzle: beyond the democratic peace,and#34; pg 41-43) If major interstate war is predominantly a product of a synergy between a potential nondemocratic 1ARDANo link uniqueness – Obama’s political capital is down nowO’Brien 10-1 The fiscal fight is a double-edged sword for Obama. Yes, the Obama PC Low- Syria and ObamacareNational Review 9-30 — For the Obama administration, big speeches are like the morning-after pill History provesFerguson 6 Nor can economic crises explain the bloodshed. What may be the most familiar causal Econ collapse saps resources from military aggressionBennett 2k Conflict settlement is also a distinct route to dealing with internal problems that leaders in | 10/5/13 |
Kentucky Round 6 - Aff v Michigan CPTournament: Kentucky | Round: 6 | Opponent: Michigan CP | Judge: Katie Frederick 1AC1AC - Arms RacesContention 1 is Arms RacesThe cyber arms race is accelerating — major attacks are inevitable this year — the best data provesGoldman 13 Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — Specifically, OCOs drive arms races and retaliationMoss 13 Although setting up a cybersecurity working group with China, Washington has also signaled it Cyber arms race causes world warthere are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves The new cyber arms race Tomorrow’s wars will be fought not just with guns, Congressional constraints of OCOs are key to solve nuclear wararms-racing, command and control hacking, crisis instability, and fracturing nuclear agreements The United States is racing for the technological frontier in military and intelligence uses of Cyberwar escalates:A) Speed, scope, and spoofingClarke and Knake ’12 In our hypothetical exercise, the Chinese response aimed at four U.S. b) Pressure to retaliateOwens et al 9 But in many kinds of cyberattack, the magnitude of the impact of the ¶ 1AC - AlliancesContention 2 is AlliancesCongressional restrictions necessary for allied cooperation— restoring legitimacy to OCOs is key to cyber coalitionsDunlap 12 Military commanders have seen the no-legal-limits movie before and they do The small concession of the plan is key — it increases key flexibility and secures cyberspaceLord et al 11 The United States should lead a broad, multi-stakeholder international cyber security coalition Status quo cyber doctrine undermines US credibilityLawson ’10 What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and Alliances prevent nuclear war—-key to burden sharingDouglas Ross 99 is professor of political science at Simon Fraser University, Winter 1998/1999, Canada’s functional ¶ isolationism and the future of weapons of mass destruction, International Journal, p. lexis Coalition building key to solve extinctionJoseph Nye 8 is professor of international relations at Harvard University, "American Power After the Financial Crises," http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Legitimacy is key to band-wagonLee 10 This book examines US hegemony and international legitimacy in the post-Cold War era Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter themKazianis 12 In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputesRTT 13 A new report of the U.S. Defense Department says that China is PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capabilityYoshihara 10 In recent years, defense analysts in the United States have substantially revised their estimates Taiwan crisis is imminent and causes nuclear warColby et al 13 Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict So does conflict over the South China SeaRehman 13 Despite America’s best efforts to construct stronger ties with China, relations in-between Their defense doesn’t applyChinese fear of US cyber unilateralism means escalation is probableVornDick 7/30/12 Yet, Chinese media reports have filled some of the void with regards to ROE Cyber stimulates risk taking and lowers conflict inhibitionDobbins et al. ’11 The difficulties of direct defense could be greatly accelerated by Chinese development and ¶ use 1AC - PlanThe United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.1AC - SolvencyContention 3 is solvencyFirst, norm-setting — all eyes are on the U.S. —other countries model our use of OCOs — clear restrictions on use are essentialBradbury 11 Evolving customary law. This approach also accommodates the reality that how the U. Norms are essential to solve — they can’t be created unless OCOs are addressedGoldsmith 10 In a speech this month on "Internet freedom," Secretary of State Hillary Clinton It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is keyLewis 11 Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting Second it solves perception — Congressionally initiated restriction is necessary to reverse the signal of independent presidential authority— now is keyDycus 10 In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that Congressional restrictions on OCOs send a global signal of cyber leadership that solves reckless use of OCOsBastby 12 Perhaps more important than being out of the cyber coordination loop, is the how Congress must initiate the restriction — anything else is perceived as abdicationHansen 26 Friedman 9 The problem, of course, is that much of this congressional involvement has come 2ACArms Racesa) Probability – attribution, prolif, and absence of firebreakKrepinevich 12 This assessment finds that we are far more likely to experience major cyber attacks than b) Timeframe - shorter response times and great risk of miscalcDycus 10 (Stephen, Professor, Vermont Law School, "Congress’s Role in Cyber Warfare", Journal of National Security Law and Privacy, Vol. 4, 2010, RSR) Cyber weapons bear a striking resemblance to nuclear weapons in some ¶ important ways. AlliancesAdherence to rule of law is key to international co-op on cyberDunlap ’13 Adherence to the rule of law is especially important in the cyber realm because ¶ International Actors trust congressPlanet Washington 8/23/13 Obama said the latest revelation of NSA survellience showed that "NSA had inadvertently, SolvencyPrez will adhere to congressional constraints- fear of political costsBradley and Morrison ’13 In addition to the constraining influence arising from the internalization of legal norms by executive No capability for hacker cyber attack now- state sponsorship keyEconomist 12 Cyber-disruption has nuisance value and may be costly to repair, but it OLC/XODoesn’t solve modelingRothschild 13 (Matthew, Feb 4, "The Danger’s of Obama’s Cyber War Power Grab," www.progressive.org/dangers-of-obama-cyber-war-power-grab-http://www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to Perm — do both — Congressional involvement makes the plan popular — the CP links to politicsCorcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Links to politics – congress wants to be involvedSasso 2012 Future presidents roll backHarvard Law Review 12, "Developments in the Law: Presidential Authority," Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf Triggers litigation, OLC can’t speak to statutes, and White House Counsel CircumventsBruce Ackerman 11, Sterling Professor of Law and Political Science at Yale University, "LOST INSIDE THE BELTWAY: A REPLY TO PROFESSOR MORRISON," Harvard Law Review Forum Vol 124:13, http://www.harvardlawreview.org/media/pdf/vol124forum_ackerman.pdf OLC Links to PoliticsEric Posner 11, the Kirkland 26 Ellis Professor, University of Chicago Law School. "DEFERENCE TO THE EXECUTIVE IN THE UNITED STATES AFTER 9/11 CONGRESS, THE COURTS AND THE OFFICE OF LEGAL COUNSEL" available at http://www.law.uchicago.edu/academics/publiclaw/index.html. Congressional failure to act leads to massive expansion in prez power - now keyDycus 10 If Congress now fails to enact guidelines for cyber warfare, it might ¶ be Unfettered presidential powers cause nuclear warForrester 89 On the basis of this report, the startling fact is that one man ~ TerrorNo threat – weak leadership and no recent attacksZenko and Cohen 12, *Fellow in the Center for Preventive Action at the Council on Foreign Relations, *Fellow at the Century Foundation, (Micah and Michael, "Clear and Present Safety," March/April, Foreign Affairs, www.foreignaffairs.com/articles/137279/micah-zenko-and-michael-a-cohen/clear-and-present-safety NONE OF this is meant to suggest that the United States faces no major challenges Terror risk down – foreign aid has reduced safe heavens in PakistanPTI ’13 WASHINGTON: The US assistance to Pakistan has helped in reducing the conditions that foment Obama weak now- Syria dealMaloof 9/13 If Kerry and Lavrov come up with a plan, it will further consolidate Putin’s Massive alt causes to flexRozell 12 A substantial portion of Goldsmith’s book presents in detail his case that various forces outside ====No impact to prez powers==== Legal checks "have been relaxed largely because of the need for centralized, relatively efficient government under the complex conditions of a modern dynamic economy and a highly interrelated international order." What’s more, the authors insist, America needs the legally unconstrained presidency both at home (given an increasingly complex economy) and abroad (given the shrinking of global distances). Over the course of time, such essentially delusionary thinking has been internalized and institutionalized PTXWon’t pass - election fears and Obama’s approach prolongs Republican backlashKaplan 10-3 As the government shutdown enters its third day, Democrats and Republicans seem no closer The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a dealTodd 10-3 "We have to get something out of this": This is where Rep. FERC thumpsDixon 10/1 President Barack Obama’s nominee to lead the Federal Energy Regulatory Commission abandoned his quest Tuesday No link — the plan’s not controversialPerera 6/26, SACS calls for new oversight of Cyber Command, David Perera is executive editor of the FierceMarkets Government Group, which includes FierceGovernment, FierceGovernmentIT, FierceHomelandSecurity, and FierceMobileGovernment. He has reported on all things federal since January 2004 and is co-author of Inside Guide to the Federal IT Market-http://store.brightkey.net/mconcepts_ebiz/OnlineStore/ProductDetail.aspx?ProductId=201530, a book published in October 2012., http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26-http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26 It’s super popularBradbury 11, Steven G. Bradbury is an attorney at the Washington, D.C office of Dechert LLP-http://en.wikipedia.org/wiki/Dechert_LLP. PC isn’t key and Obama isn’t spending itAllen, 9/27 The White House’s distance diplomacy with Republicans is an approach that tacitly acknowledges three inescapable No impact – multiple factors checkFXStreet.com, 9/25 The U.S. debt ceiling deadline may be looming like dark clouds over XO solvesWeisenyhal 9/30 With no movement on either side and the debt ceiling fast approaching, there’s increasing No impact to econ declineMiller 2k The question may be reformulated. Do wars spring from a popular reaction to a Best data provesGlobe and Mail ’10 Even at the height of the remarkable rebound of 2009 that brought stocks back from PC is low and decreasingSteinhauser, 9/26 As he battles with congressional Republicans over the budget and the debt ceiling, and | 10/6/13 |
Kentucky Round 8 - Aff v Wichita State DSTournament: Kentucky | Round: 8 | Opponent: Wichita State DS | Judge: Caleb Edwards 2ACTRestrict and regulate are synonymousPaust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Counter-interp: Statutory restrictions are legislative limitsLaw dictionary No Date Neg interp impossible: Congress CANNOT prohibitColella ’88 Because the subsequent versions of the amendment sought to deny the executive any latitude in Arms RacesCyber deterrence low now and failsClarke and Knake ’10 No deterrent value to OCO’sLewis ’13 While the deterrent value of offensive cyber-capabilities is practically nonexistent, cyber- They say CW inev but Banning preemptive attacks solvesClarke and Knake ’10 In nuclear war strategy, the Soviet Union proposed that we and ¶ they agree CPC. The counterplans covert action ensures unilateralism – prevents coalitions and fuels suspicion and cyberwar 2. Perm do both — only the perm solves legitimacy — their authorBrecher 12 (Aaron P., , JD candidate at Michigan Law, Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations, www.michiganlawreview.org/assets/pdfs/111/3/Brecher.pdf-http://www.michiganlawreview.org/assets/pdfs/111/3/Brecher.pdf) It has become axiomatic of American constitutional doctrine that presidential decisions gain greater constitutional legitimacy 4. Links to politics – congress wants to be involvedSasso 2012 5. Covert designation fuels suspicion and can’t solve cyber war — also removes international pressure from Chinese hackingWright 11, Executive director of studies at The Chicago Council on Global Affairs Nuclear war 6. Congressional involvement makes the plan popular — the CP links to politicsCorcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Cyber SupremacyOffenses trade off with defense- leads to prolif- game theory provesMoore et al 10 Tyler Moore, Allan Friedman and Ariel D. Procaccia, Center for Research on Computation 26 Society, Harvard University, Would a ’Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems, http://www.nspw.org/papers/2010/nspw2010-moore.pdf-http://www.nspw.org/papers/2010/nspw2010-moore.pdf~~23SPS The militarization of cyberspace represents a substantial¶ change in our understanding of information security Cyber war inevitable unless we build in DEFENSEMcGraw 13 Gary McGraw-http://www.tandfonline.com/action/doSearch?action=runSearch26type=advanced26searchType=journal26result=true26prevSearch=2Bauthorsfield3A(McGraw2C+G), PhD is Chief Technology Of?cer of Cigital, and author of¶ Software Security (AWL 2006) along with ten other software security¶ books. He also produces the monthly Silver Bullet Security Podcast for¶ IEEE Security 26 Privacy Magazine (syndicated by SearchSecurity), Cyber War is Inevitable (Unless We Build Security In), Journal of Strategic Studies - Volume 36, Issue 1, 2013, pages 109-119, http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013-http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013~~23SPS Inevitable¶ The inevitable slide towards cyber war is accelerated by the systemic¶ vulnerability Defense key to cyber deterrencePrisco 12 Nicholas, Maj. U.S. Army, The Criticality of Cyber Defense to Operational Commanders, 05-04-12, www.hsdl.org/?view26did=726655?~23SPS Operational commanders should consider the criticality of defense in deterring ¶ adversaries from attacking their Defense outweighs offense when it comes to cyberDrezner ’13 There’s a lot going on in this story, but distilled to its elements, ====Cyber defense key to deterrence- checks sub-state actors==== Sub-state actors are not subject to deterrence based on threats of retaliation. ====No limits approach guts alliances==== Rejection of legal limits carries other, real-world consequences that are not in No chance of naval competitors – The US is far ahead and more capable nowThe American Prospect 11 The United States Navy currently operates eleven aircraft carriers. The oldest and least capable Navy can’t de-escalate crises - bureaucratic reluctance to deploy, delayed responseWatts 12 The inherent mobility of sea power means largely what it does in the traditional role Naval forces are resilient – US will continue to outpace competitorsGates 9 But it is also important to keep some perspective. As much as the U PTXWon’t pass - election fears and Obama’s approach prolongs Republican backlashKaplan 10-3 As the government shutdown enters its third day, Democrats and Republicans seem no closer The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a dealTodd 10-3 "We have to get something out of this": This is where Rep. Shutdown thumpsCBS News 10/5/13, "Government shutdown drags on; Congress to take Sunday off," http://www.cbsnews.com/8301-250_162-57606174/government-shutdown-drags-on-congress-to-take-sunday-off/ FERC thumpsDixon 10/1 President Barack Obama’s nominee to lead the Federal Energy Regulatory Commission abandoned his quest Tuesday No link — the plan’s not controversialPerera 6/26, SACS calls for new oversight of Cyber Command, David Perera is executive editor of the FierceMarkets Government Group, which includes FierceGovernment, FierceGovernmentIT, FierceHomelandSecurity, and FierceMobileGovernment. He has reported on all things federal since January 2004 and is co-author of Inside Guide to the Federal IT Market-http://store.brightkey.net/mconcepts_ebiz/OnlineStore/ProductDetail.aspx?ProductId=201530, a book published in October 2012., http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26-http://www.fiercegovernmentit.com/story/sasc-calls-new-oversight-cyber-command/2013-06-26 It’s super popularBradbury 11, Steven G. Bradbury is an attorney at the Washington, D.C office of Dechert LLP-http://en.wikipedia.org/wiki/Dechert_LLP. Obama weak nowNPR 9/21, "Have Obama’s Troubles Weakened Him For Fall’s Fiscal Fights?" http://www.ideastream.org/news/npr/224494760 If their PC internal link is true, Obama won’t fight the planCarlo Munoz 5/23/13, staff writer for defense and national security for the Hill, "Obama seeks to ramp down 9/11-era rules for war on terror," http://thehill.com/blogs/defcon-hill/policy-and-strategy/301737-obama-seeks-to-ramp-down-911-rules-for-war-on-terror PC low now—-plan’s a winJill Lawrence 9-17, national correspondent at National Journal, September 17th, 2013, "Obama Says He’s Not Worried About Style Points. He Should Be," National Journal, http://www.nationaljournal.com/whitehouse/obama-says-he-s-not-worried-about-style-points-he-should-be-20130917-http://www.nationaljournal.com/whitehouse/obama-says-he-s-not-worried-about-style-points-he-should-be-20130917 No impact – multiple factors checkFXStreet.com, 9/25 The U.S. debt ceiling deadline may be looming like dark clouds over XO solvesWeisenyhal 9/30 With no movement on either side and the debt ceiling fast approaching, there’s increasing No impact to econ declineMiller 2k The question may be reformulated. Do wars spring from a popular reaction to a Global economy’s resilient—-learned lessons from ’08Daniel W. Drezner 12, Professor, The Fletcher School of Law and Diplomacy, Tufts University, October 2012, "The Irony of Global Economic Governance: The System Worked," http://www.globaleconomicgovernance.org/wp-content/uploads/IR-Colloquium-MT12-Week-5_The-Irony-of-Global-Economic-Governance.pdf-http://www.globaleconomicgovernance.org/wp-content/uploads/IR-Colloquium-MT12-Week-5_The-Irony-of-Global-Economic-Governance.pdf PC is low and decreasingSteinhauser, 9/26 As he battles with congressional Republicans over the budget and the debt ceiling, and 1ARDeterrence DA1. Hegemony unsustainable—3 reasonsChristopher Layne is a Research Fellow with the Center on Peace and Liberty at The Independent Institute and Mary Julia and George R. Jordan Professorship of International Affairs at the George Bush School of Government and Public Service at Texas A26M University, July 26th 2011, http://www.tandfonline.com/doi/pdf/10.1080/09557571.2011.55849, "The unipolar exit: beyond the Pax American"; hhs-ab In this article I challenge Brooks and Wohlforth. I show that the unipolar era 2. Heg doesn’t solve warBenjamin H. Friedman, Research Fellow in Defense and Homeland Security Studies @ Cato Institute, July 20, 2010, http://www.cato.org/testimony/ct-bf-07202010.html, "Military Restraint and Defense Savings" Another argument for high military spending is that U.S. military hegemony underlies Causes prolifJervis 9 – Professor of international politics at Columbia University, Robert, World Politics, 61.1, Jan, MUSE extinctionVictor A Utgoff, Deputy Director of Strategy, Forces, and Resources Division of Institute for Defense Analysis, Summer 2002, Survival, p.87-90 Hegemony causes terrorismChristopher Layne 06 Research Fellow @ the Independent Institute, Visiting Fellow in Foreign Policy Studies @ the Cato Institute (The Peace of Illusions: American Grand Strategy from 1940 to the Present, p. 190-1) Terrorism causes extinctionAlexander, professor and director of the Inter-University for Terrorism Studies 2003 (Yonah Last week’s brutal suicide bombings in Baghdad and Jerusalem have once again illustrated dramatically that 6. Sustaining hegemony causes war with ChinaChristopher Layne 07 Research Fellow @ the Independent Institute, Visiting Fellow in Foreign Policy Studies @ the Cato Institute (American Empire: A Debate, p. 72-4) China War causes ExtinctionStraits Times, 2k (6/25, "Regional Fallout: No one gains in war over Taiwan," lexis) THE high-intensity scenario postulates a cross-strait war escalating into a full PoliticsWon’t pass—-GOP spending cuts strategyBloomberg 10-3 – Bloomberg News, 12:43PM ET, 10/3/13, "Republicans Said to Plan Debt-Limit Measure Amid Shutdown," http://www.bloomberg.com/news/2013-10-03/republicans-said-to-plan-debt-limit-measure-amid-shutdown.html GOP would view the plan as a concession – guarantees a dealShane 13 The Republicans are divided between "military hawks" and "neo-isolationists." | 10/6/13 |
Filename | Date | Uploaded By | Delete |
---|---|---|---|
10/5/13 | barronandrew1@gmailcom | ||
10/5/13 | blakers19@gmailcom | ||
10/6/13 | blakers19@gmailcom | ||
10/6/13 | blakers19@gmailcom | ||
9/17/13 | barronandrew1@gmailcom |
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming