1AC - cyber aff with defense tradeoff preemption and SOP advantages
1NC - debt ceiling da prez flex da xo cp cyber deterrence da t - authority china strikes cp heg impact turns
2AC - impact turned china strikes
2NC - case t cyberdeterrence da china strikes cp
1NR - debt ceiling da
2NR - china strikes cp
2AR - condo
UMKC
6
Opponent: UNT OS | Judge: Ben Warner
1AC - cyber aff with tradeoff SOP and preemption advantages
1NC - t-authority xoUN treaties cp prez flex da debt ceiling da
2NC - xo cp and case
1NR - debt ceiling da
2NR - xo cp case and debt ceiling da
2AR - went for conceded perm do the counterplan
UMKC
7
Opponent: UTSA CM | Judge: William Smelko
1AC - cyber aff with defense tradeoff preemption and SOP advantages
1NC - 1 off modernity K (anthro impact) analytic case defense
2NC - analytic case defense K overview human rights impact addon K turned into a floating PIK
1NR - took framework and perm
2AR - extinction outweighs and perm double bind
UNLV
1
Opponent: California EM | Judge: Jamie Cheek
aff - cyber with arms race and alliances
1NC immigration DA Brecher CP Warfighting DA Peace K
Block immigration DA warfighting DA Brecher CP case
1AR critique of "Genie in the Bottle" metaphor
2NR Brecher CP Immigration DA
2AR genie in the bottle K
UNLV
3
Opponent: Wyoming MP | Judge: Grace Saez
AFF cyber with alliance and arms race
1NC XO CP with 3 planks -covert -declaratory policy -president adheres T prohibit Warfighting DA Iran Sanctions Politics DA
Block CP(kicked the covert plank) OCOs Good DA Warfighting DA T
2NR CP and DA
2AR condo
UNLV
6
Opponent: Trinity RS | Judge: Tom Gliniecki
AFF cyber with alliance and arms race
1NC T - prohibit Legalism K Paranoia K
2NC Paranoia K extended solvency deficits from Legalism K but kicked the alt
1NR case
1AR kicked case went for turns on the Paranoia K
2NR case
UNLV
7
Opponent: USC HS | Judge: Abi Williams
AFF cyber with alliances and arms race
1NC T - prohibit Exec v Exec CP Legalism K Immigration DA
2NC Exec v Exec CP Legalism K
1NR Case Immigration DA
2NR CP and DA
UTD
2
Opponent: OklahomaRochester AH | Judge: Erik Mathis
1AC aumf with firebreak and WOT 1NC first priority 1AR "Fuck" K 2NR first priority 2AR case outweighs and "Fuck" K
UTD
3
Opponent: Texas CM | Judge: Matt Moore
1AC AUMF with firebreak and WOT 1NC Afropessimism K Apocalyptic Reps K Block Both 2NR Afropessimism K
UTD
6
Opponent: Wyoming DM | Judge: Natalie Pennington
1AC AUMF with firebreaks and WOT 1NC T Immigration DA XO CP Militarism K Block Militarism K Immigration DA T 2NR T
To modify or delete round reports, edit the associated round.
Cites
Entry
Date
UCO Round 1 - Aff v Kansas GP
Tournament: UCO | Round: 1 | Opponent: Kansas GP | Judge: Scott Elliott
2AC
T
Restrict and regulate are synonymous
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
Brecher CP
C. The counterplans covert action ensures unilateralism – prevents coalitions and fuels suspicion and cyberwar Rishikof 11, Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf) Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
2. Perm do both — only the perm solves legitimacy — their author
It has become axiomatic of American constitutional doctrine that presidential decisions gain greater constitutional legitimacy AND place substantive limits on the scope of hostilities and the initiation of conflicts.
4. Links to politics – congress wants to be involved
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
5. Covert designation fuels suspicion and can’t solve cyber war — also removes international pressure from Chinese hacking
Wright 11, Executive director of studies at The Chicago Council on Global Affairs (Thomas, 6/26, America has double standards in fighting cyberwar, www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html~23axzz1QYnW3i1w-http://www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html) While it has several advantages, treating American cyber-destruction as a covert operation will severely undermine the new cyber-strategy. Suspicion that the US uses cyberweapons whenever convenient will hamper its attempts to press other states to be transparent about their intentions. In particular, it takes the pressure off China, widely believed to be the leading state source of cyberattacks. It may also dissuade the US from developing the technology to trace the source of an attack.
6. Congressional involvement makes the plan popular — the CP links to politics
Corcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President’s future controversial policy changes.
Future presidents roll back
Harvard Law Review 12, "Developments in the Law: Presidential Authority," Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf The recent history of signing statements demonstrates how public opinion can effectively check presidential expansions AND practices. 147 Only time, and perhaps public opinion, will tell.
Not everybody shares his optimism. Immigration has long divided House Republicans and the rest AND not to have entered over the border but to have overstayed their visas.
The developments come as time runs short on supporters’ goal of action on immigration reform AND voting for what they consider to be "amnesty" for undocumented immigrants.
President Obama can – and will – take steps on immigration reform in the event AND reporters this week. "He’s ready to move forward if we’re not."
The plan’s not perceived
Schmitt 13, co-director of the Marilyn Ware Center for Security Studies at AEI and the director of AEI’s Program on American Citizenship. Mr. Schmitt is a former staff director of the Senate Select Committee on Intelligence. He was executive director of the President’s Foreign Intelligence Advisory Board during President Ronald Reagan’s second term. Mr. Schmitt’s security work focuses on longer-term strategic issues that will affect America’s security at home and its ability to lead abroad, while his work in the area of citizenship focuses on challenges to maintaining and sustaining a strong civic culture. His books include Of Men and Materiel: The Crisis in Military Resources (AEI Press, 2007), to which he was a contributing author and editor with Tom Donnelly; Silent Warfare: Understanding the World of Intelligence (Brassey’s, 2002), coauthored with Abram Shulsky and now in its third edition; and U.S. Intelligence at the Crossroads: Agendas for Reform (Brassey’s, 1995), a coedited volume to which he is a contributing author. His two most recent books, to which he is also editor and contributing author, are The Rise of China: Essays on the Future Competition (Encounter Books, May 2009) and Safety, Liberty and Islamist Terrorism: American and European Approaches to Domestic Counterterrorism (AEI Press, 2010), http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/-http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/
The press (and the White House) has been obsessed by the detention provision in the recently agreed upon FY2012 Defense Authorization bill, but one of the items that slipped under the radar is language authorizing the American military to engage in offensive operations in cyberspace. Under Sec. 954,
====PC not key==== Hirsh, 2/16/2013 Feb. 16, 2013 (chief correspondent , political analyst) NATIONAL JOURNAL news.yahoo.com/no-thing-political-capital-201002390—politics.html;_ylt=A2KJ3CRyFSBRwTEAoV3QtDMD
Meanwhile, the Republican members of the Senate’s so-called Gang of Eight are AND do with Obama’s political capital or, indeed, Obama¶ at all.
PC fails on CIR – Obama has zero relationship with House Republicans
1. No Link – plan allows flexibility while still solving our internal links
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
2. Congressional statue that clarifies the legal limit of Cyber-war is key to warfighting – generals think that executive planning causes battlefield incoherence
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
4. It’s impossible for the president to remain adequately flexible on cyber
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND attacks may be much more consequential than the¶ direct and immediate ones.
====5. No link – we only limit out LARGE SCALE, PRE_EMPTIVE attacks – we can still respond quickly====
====6. No impact to prez powers==== Healy 11 Gene Healy is a vice president at the Cato Institute and the author of The Cult of the Presidency, The CATO Institute, June 2011, "Book Review: Hail to the Tyrant", http://www.cato.org/publications/commentary/book-review-hail-tyrant
Legal checks "have been relaxed largely because of the need for centralized, relatively AND observed archly, "polls do not reveal the opinions of dead Iraqis."
7. Mission failure is inevitable without Congressional deliberation
Griffin 12 – Professor of Constitutional Law @ Tulane University ~Stephen Griffin, "The Tragedy of the War Power: Presidential Decisionmaking from Truman to Obama," APSA 2012 Annual Meeting Paper, July 15, 2012, Pg. http://ssrn.com/abstract=2107467 As a comparison of the relative ability of the executive and legislative branches to make AND in 1947 to establish the NSC to coordinate policy within the executive branch. During the Cold War and after, the pre-Pearl Harbor constitutional order was AND or not, it introduced deep tensions into the American system of governance. The case studies presented above show that the interagency process taking place inside the executive AND Congress escaped both a valuable learning experience and the blame for the war. In addition, the case studies show that there is considerable evidence that the executive AND future is whether such a process is possible. Pg. 31-37
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
3. Cyber operates in a realist framework
Dawson ’13 ~Ashley Dawson, M.A. Candidate in Policy Sci @ University of British Columbia. "Addressing Cyber Warfare: Bolstering Deterrence through developing norms." Master’s Thesis. Etb~
RDT is centered around two central strategies with the goal of dissuading an ¶ adversary AND a stronger ¶ adversary can thus be expected to make war more likely.
4. IR theory proves cyberwar is probable- multiple mechanisms
Junio ’13 ~Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB~
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
6. Securitizing cyber space is the ONLY way to prevent large scale cyber war – the alt can’t solve fast enough or change US doctrine – vulnerability creates a Unique need for it
In evaluating whether securitization of cyberspace is a problem, it is very clear that AND issue is de-securitized, for now securitization is a necessary evil.
7. Their engagement in solely theory of cyberwar will never create change – only the permutation can resolve that.
Eriksson and Giacomello ’6 ~Johan Eriksson and Giampiero Giacomello. International Political Science Review 27.3 (Jul., 2006), pp. 221-244. "The Information Revolution, Security, and International Relations: (IR) Relevant Theory?" ETB~
The foregoing analysis has shown that there are two interrelated problems in ¶ past efforts AND on middle-range theory and on ¶ conditional rather than universal generalizations.
8. Cyber threats are real – cyberspace is organized transnationally, not governed centrally, constantly changes, and is difficult to regulate
Deibert and Rohozinski 2010 (Ronald J, professor of Political Science and Director of the Canada Centre for AND Sociology, vol. 4, p. 15-16, BS)
Globalization is generating new security challenges. Modern societies confront a myriad of risks that AND , can only limit, but not entirely contain the ?ow of ideas.
10. The alt results in more securitization and intervention
Tara McCormack, 2010, is Lecturer in International Politics at the University of Leicester and has a PhD in International Relations from the University of Westminster. 2010, (Critique, Security and Power: The political limits to emancipatory approaches, page 127-129)
The following section will briefly raise some questions about the rejection of the old security AND the political limits of the framework proposed by critical and emancipatory theoretical approaches.
11. Lack of empirical ground isn’t sufficient reason to reject the aff- the 1ac contributes to a better understanding of cyber war even without data
Liff ’12 ~Adam P. Liff, Doctoral Candidate, Department of Politics,¶ Princeton University, USA. "Cyberwar: A New ’Absolute Weapon’? The¶ Proliferation of Cyberwarfare Capabilities and Interstate War," Journal of Strategic¶ Studies, 35:3, 401-428. ETB~
Theorizing about a kind of warfare that has not occurred necessitates¶ a major caveat AND implications of the¶ proliferation of cyberwarfare capabilities for interactions between¶ states. ~continues in footnote~ 5 The data that would be necessary for an empirical study either do not exist or are¶ highly classi?ed. Governments, militaries, and private corporations have strong¶ incentives not to reveal information about attacks. Furthermore, as will become clear¶ in the ’de?ning cyberwarfare’ section below, there is no example of an event in the real¶ world that can indisputably be cited as an occurrence of cyberwarfare.
After the government shutdown ended, President Obama said he wanted Congress again to take AND which is to destroy the Republican Party and not to get good policies."
Plan boosts Obama’s capital without triggering a fight over authority
Kriner 10 Douglas Kriner, Assistant Profess of Political Science at Boston University, 2010, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60
Presidents and politicos alike have long recognized Congress’s ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36
"We’re not going to have an immigration reform bill this year, or next year, that doesn’t deal with the 11 million," Fitz predicted. "People are hungering for a solution. These piecemeal measures may step in the right direction for some, but they’re clearly not going to solve the whole problem."
President Obama can – and will – take steps on immigration reform in the event AND reporters this week. "He’s ready to move forward if we’re not."
Disad isn’t intrinsic to the aff – it’s within the agential ambit of the USFG to do the plan and pass debt ceiling
Plan boosts Obama’s capital without triggering a fight over authority
Kriner 10 Douglas Kriner, Assistant Profess of Political Science at Boston University, 2010, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60
Presidents and politicos alike have long recognized Congress’s ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36
Plan breaks the GOP – ensures passage
Dickerson 1/18 (John, Chief Political Correspondent at the Slate, Political Director of CBS News, Covered Politics for Time Magazine for 12 Years, Previous White House Correspondent, Go for the Throat21, http://tinyurl.com/b7zvv4d)
Schmitt 13, co-director of the Marilyn Ware Center for Security Studies at AEI and the director of AEI’s Program on American Citizenship. Mr. Schmitt is a former staff director of the Senate Select Committee on Intelligence. He was executive director of the President’s Foreign Intelligence Advisory Board during President Ronald Reagan’s second term. Mr. Schmitt’s security work focuses on longer-term strategic issues that will affect America’s security at home and its ability to lead abroad, while his work in the area of citizenship focuses on challenges to maintaining and sustaining a strong civic culture. His books include Of Men and Materiel: The Crisis in Military Resources (AEI Press, 2007), to which he was a contributing author and editor with Tom Donnelly; Silent Warfare: Understanding the World of Intelligence (Brassey’s, 2002), coauthored with Abram Shulsky and now in its third edition; and U.S. Intelligence at the Crossroads: Agendas for Reform (Brassey’s, 1995), a coedited volume to which he is a contributing author. His two most recent books, to which he is also editor and contributing author, are The Rise of China: Essays on the Future Competition (Encounter Books, May 2009) and Safety, Liberty and Islamist Terrorism: American and European Approaches to Domestic Counterterrorism (AEI Press, 2010), http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/-http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/
The press (and the White House) has been obsessed by the detention provision in the recently agreed upon FY2012 Defense Authorization bill, but one of the items that slipped under the radar is language authorizing the American military to engage in offensive operations in cyberspace. Under Sec. 954,
Iran DA
3. No link – Clear counterstrike legitimacy maintains deterrence
Kesan, prof of law, 12 ~Jay P. 26 Carol M., *Professor, H. Ross 26 Helen Workman Research Scholar, and Director of the Program in Intellectual Property 26 Technology Law, University of Illinois College of Law, Research Fellow, University of Illinois College of Law, Mitigative Counterstriking: Self-defense and deterrence in cyberspace, Spring, 2012, Harvard Journal of Law 26 Technology, 25 Harv. J. Law 26 Tec 415~ Ideas, computers, and intellectual property have become extremely important in the modern Information AND approaches in order to afford these private parties more protection against these threats.
Fem K
They are fundamentally wrong—gendered binaries don’t organize the world
Hooper 1 Charlotte (University of Bristol research associate in politics), Manly States: Masculinities, International Relations, and Gender Politics pp 45-46.
Spike Peterson and Anne Sisson Runyan (1993), in their discussion of gendered dichotomies AND it as performing only an ideological or propagandistic role is also too simplistic.
Conflating sexual difference and patriarchy ontologizes sexual difference, obscuring women’s complicity in gender violence
Bibi Bakare-Yusuf, 2005. PhD Interdisciplinary Women and Gender Studies, "Beyond Determinism: The Phenomenology of African Female Existence," http://www.feministafrica.org/fa202/02-2003/bibi.html~~ Despite the contributions to understanding oppressive power relations made by theorists who focus emphatically on AND female genital mutilation, which is both defended and practised by many women.
This essentialism of sexual identity makes true resistance to patriarchy impossible
Bibi Bakare-Yusuf, 2005 ,PhD Interdisciplinary Women and Gender Studies, "Beyond Determinism: The Phenomenology of African Female Existence," http://www.feministafrica.org/fa202/02-2003/bibi.html ACCESSED 8-3-07~ An emphasis on crushing patriarchal dominance can also lead us to ignore women’s power and AND fixed positions in inevitable hierarchies, but stresses transformation and productive forms of contesta
Gender is not the root cause of war—war causes gender oppression
Joshua S. Goldstein 2002. Professor Emeritus of International Relations, American University (Washington, DC) Research Scholar, University of Massachusetts and Nonresident Sadat Senior Fellow, CIDCM, University of Maryland, War and Gender , P. 412 First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
Perm — do both — Congressional involvement makes the plan popular — the CP links to politics
Corcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President’s future controversial policy changes.
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
¶ America’s spending on development and diplomacy and security aid — the so-called AND from key nations abroad whose future stability is central to our own security:
Abandoning rational epistemology ensures massive violence, destruction of debate, and death of political participation.
Sherry 96 – Suzanna, "The Sleep of Reason", Georgetown Law Journal, Feb, lexis Some, however, have suggested that the historical era of the Enlightenment was unique AND is the only possible consequence of speaking such a truth to power. 145
An epistemology based on rationality is humanity’s only hope – it prevents massive violence and ensures good policymaking.
Sherry 96 – Suzanna, "The Sleep of Reason", Georgetown Law Journal, Feb, lexis The primary problem with epistemological pluralism is that there is no way to resolve disputes AND adaptive usefulness of various beliefs — can allow us to draw such distinctions.
T – Prohibit
Restrict and regulate are synonymous
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
Biopolitics K
No prior questions
Cochran 99 Molly Cochran 99, Assistant Professor of International Affairs at Georgia Institute for Technology, "Normative Theory in International Relations", 1999, pg. 272
To conclude this chapter, while modernist and postmodernist debates continue, while we are AND pragmatic critique can be a useful ally to feminist and normative theorists generally.
Congress checks on exec terror policy prevents state of exception
Mitzen 11 Dr. Jennifer, Associate Professor of Political Science at Ohio State University and Michael Newell, PhD student in Political Science at the Maxwell School of Citizenship and Public Affairs, "Crisis Authority, the War on Terror and the Future of Constitutional Democracy," JUROS Arts 26 Humanities Vol. 2, http://libeas01.it.ohio-state.edu/ojs/index.php/juros/article/download/1265/1791
As Benjamin Wittes notes, the "presidential power model has failed," and " AND structures to novel threats, and to not rely on executive mandate alone.
The state’s inevitable—-reform is key
Passavant 7 Paul A. Passavant 7, Hobart and William Smith Colleges in New York, "The Contradictory State of Giorgio Agamben", Political Theory Volume 35, Number 2, April, SAGE
Third, any social formation is constituted by elements of both contingency and determination. AND defend this state of due process and equal protection against its ruinous other.
Alt fails
Sinnerbrink 5 Robert Sinnerbrink 5, Professor of Philosophy at Macquarie University, Critical Horizons, Vol. 6, No. 1, p. 258-259
Foucault and Agamben leave us with a stark alternative: either to take the ethical AND articulate political responses to biopower that go beyond ethical acquiescence and metaphysical longing.
Democracy checks biopower impact
Dickinson 4 Edward Ross Dickinson 4, Associate Professor, History Ph.D., U.C. Berkeley, Central European History, Vol. 37 No. 1, p. 34-36
And it is, of course, embedded in a broader discursive complex (institutions AND create "multiple modernities," modern societies with quite radically differing potentials.91
Status quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties
With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. AND officials ... have given speeches and spoken at conferences and other public events.and#34;
Cyber prolif will be rapid – low barriers of entry and use of proxies
The United States might not be quite as far ahead of other nations in terms AND number of potential targets is almost infinite and not limited by geography.’
Proliferation of cyber weapons to terrorists causes nuclear great power wars
This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.
No defense- deterrence fails vs 3rd parties, making escalation likely
Owens et al 9 (William A. Owens, as an Admiral in the United States Navy and later Vice Chairman of the Joint Chiefs of Staff, Kenneth W. Dam, served as Deputy Secretary of the Treasury from 2001 to 2003, where he specialized in international economic development, Herbert S. Lin, Senior Scientist and Study, and#34;Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilitiesand#34; 4/27/2009, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf-http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf, KB)
Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between AND might thus choose just such a time to conduct a catalytic ¶ cyberattack.
And independently, cyber preemption escalates to shooting war
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with and#34;kinetic activity.and#34;
Plan solves-
A) It provides international credibility that creates stables norms for deterring preemptive use
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
B) US norms against preemptive cyberattacks reverses cyber weapons prolif
In a speech this month on and#34;Internet freedom,and#34; Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.
Advantage 2 is Defense
Cyber attack is highly like in the squo- actors are probing grid weaknesses
Reed ’12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, and#34;U.S. energy companies victims of potentially destructive cyber intrusionsand#34;, 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks
Foreign actors are probing the networks of key American companies in an attempt to gain AND power plants infected by Stuxnet very far away from Iran,and#34; Kaspersky said.
Current preemptive OCO policy backfires – creates priority confusion and drains cyber-defense resources
America’s generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn’t accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
When the Pentagon launched its much-anticipated and#34;Strategy for Operating in Cyberspaceand#34; AND governments, courts, and business groups have barely begun to consider them.
2 impacts:
First, cyberwar – Overconcentration on offense is destabilizing – makes cyberwar inevitable
Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
Link is linear – every investment in offensive capabilities fuels a cyber-arms race that risks escalation
In addition, there are policy questions raised by the escalating government investment in offensive AND regulate the Internet in ways that would harm freedom of expression and information.
The conceptual con?ation of cyber war, cyber espionage, and cyber¶ crime into AND cyber¶ crime, and deter cyber espionage all at the same time.
Major cyber crime crushes the global economy via ripple effects
Sani et al 12 Hemraj, Associate Professor 26 Head, Department of Computer Science 26 Engineering, Alwar Institute of Engineering 26 Technology, Yerra Shankar, PhD Student, Department of Mathematics Shiksha ?O’ Anusandhan University, T.C. Principal, Orissa Engineering College, and#34;Cyber-Crimes and their Impacts: A Review,and#34; Vol. 2, Issue 2,Mar-Apr 2012, http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf~~23SPS-http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf3e
.1. Potential Economic Impact ¶ The 2011 Norton Cyber crime disclosed that over AND consumer trust issues could have serious repercussions and bear going into more ¶ detail
Economic collapse causes nuclear conflicts
Burrows and Harris 9 Mathew J. Burrows counselor in the National Intelligence Council and Jennifer Harris a member of the NIC’s Long Range Analysis Unit and#34;Revisiting the Future: Geopolitical Effects of the Financial Crisisand#34; The Washington Quarterly 32:2 https://csis.org/files/publication/twq09aprilburrowsharris.pdf
Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics AND and between states in a more¶ dog-eat-dog world.¶
Advantage 3 is Separation of Powers
Congressional restrictions on executive power is critical to maintain SOP
Yet addressing these questions is increasingly important for two reasons. ¶ First, as AND -in-chief power15 and Congress’s war-making ¶ authority.16
Strong separation of powers key to heg
Ikenberry 1 (G. John, Professor @ Georgetown University, Spring, The National Interest)
First, America’s mature political institutions organized around the rule of law have made it AND , to return to the corporate metaphor, to invest in ongoing partnerships.
Heg solves great power wars
Barnett 11 (Thomas P.M. Former Senior Strategic Researcher and Professor in the Warfare Analysis 26 Research Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist and Chief Analyst at Wikistrat., worked as the Assistant for Strategic Futures in the Office of Force Transformation in the Department of Defense, and#34;The New Rules: Leadership Fatigue Puts U.S., and Globalization, at Crossroads,and#34; March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadership-fatigue-puts-u-s-and-globalization-at-crossroads)
Events in Libya are a further reminder for Americans that we stand at a crossroads AND the 20th century, setting the stage for the Pacific Century now unfolding.
Interbranch conflict causes war
Jamison 93 Linda S. Jamison, Deputy Director of Governmental Relations @ CSIS, Spring 1993, Executive-Legislative Relations after the Cold War, Washington Quarterly, v.16, n.2, p. 189
Indeed there are very few domestic issues that do not have strong international implications, AND that goes beyond the executive branch (Mann 1990, 28-29).
Congressional failure to act leads to massive expansion in prez power- now key
If Congress now fails to enact guidelines for cyber warfare, it might ¶ be AND order to be able to ¶ participate in the formulation of national policy.
Unfettered presidential powers cause nuclear war; ev is gender modified
Forrester 89 Professor, Hastings College of the Law (Ray, August 1989, ESSAY: Presidential Wars in the Nuclear Age: An Unresolved Problem, 57 Geo. Wash. L. Rev. 1636)
On the basis of this report, the startling fact is that one man ~ AND , indeed, humanity in general, probably would be unable to survive.
Plan
Plan: The United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of congressionally authorized United States military operations.
Solvency
Congressional action is critical to cyber expertise and preserves presidential flexibility
Congress’s active role in the development and implementation of cyber ¶ warfare policy is no AND to work together to meet these challenges, as the ¶ Framers intended.
XO can’t solve- binding precedent is key to norm building and check expansion of prez powers
Presidents have had certain restrictions for war-making ever since because the founders wanted AND them, and where the line should be drawn, even in cyberspace.
NFU for large-scale attacks reduces the risk of cyberattack
No first use of large-scale cyberattacks. Although weapons for cyberattack are valid AND would be a lower likelihood that it would experience such an ¶ attack.
Military will adhere to the law – fear the consequences
This raises an important question: Should America wage war— cyber or otherwise— AND because they have hard experience with the consequences of failing to do so.
2AC
2AC T - Subsets Bad
1. We meet substantial – the aff restricts the ENTIRE area of cyberattack – it bans most of it and requires congressional approval for the rest
2. Counterinterps - Subsets is topical
A. In means within the limits of
Merriam Webster Online Dictionary, 2006 (p. http://www.m-w.com/cgi-bin/dictionary?book=Dictionary26va=in (PDNS3565)) Main Entry: 1in Pronunciation: ’in, 26n, 26n Function: preposition Etymology: Middle English, from Old English; akin to Old High German in in, Latin in, Greek en 1 a — used as a function word to indicate inclusion, location, or position within limits in the lake wounded in the leg in the summer
4. Offense –
A. Reasonability – limiting out our aff leads to a race to the most limiting interpretation, allows butchering of the literature base, which means we can justify any aff as topical, internal link turns all of their limits claims
B. Their interp uniquely invites hundreds of tiny PICs—restrict OCOs except for espionage vs. allies, terrorist groups, etc. PICs steal all aff ground and make it impossible to be aff, voter for fairness.
C. Topic education: OCOs are discussed as an entire class, cyber attack and espionage are very different.
D. Overlimits: Neg interp reduces the topic to 4 affs.
5. Defense
A. Heart of the topic. No U. to neg’s predictable ground loss claims, lots of teams reading the aff.
Speaking candidly at the Aspen Security Forum, one defense department official expressed great concern AND , the critical infrastructure that is not owned by the Department of Defense.and#34;
CP
2AC
International distrust of the president dooms the signal and solvency
Rothschild 13 (Matthew, Feb 4, and#34;The Danger’s of Obama’s Cyber War Power Grab,and#34; www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
Links to politics – immense opposition to bypassing debate
and#34;In an era of polarized parties and a fragmented Congress, the opportunities to AND a partisan content, with contemporary complaints coming from the incumbent president’s opponents.and#34;
2AC Debt Ceiling
Water infrastructure thumps – it will trigger huge partisan fights
Lawmakers in the House of Representatives introduced their version of a bill Wednesday to move AND business, including the farm bill, immigration reform and the debt limit.
Congress opposed to offensive Cyber ops—- they like the plan, AND Obama will issue other controversial XOs that drain PC
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act.and#34;¶
No agreement on debt deal – partisanship is too high
In meetings with Democratic and Republican congressional leaders on Thursday after a session with Treasury AND some Republican leadership aides questioned how any could get to the president’s desk.
Winners win
Marshall and Prins ’11 Bryan W. MARSHALL AND PRINS 11, Miami University, Department of Political Science AND Brandon C. PRINS, University of Tennessee 26 Howard H. Baker, Jr. Center for Public Policy, September 2011 and#34;Power or Posturing? Policy Availability and Congressional In?uence on U.S. Presidential Decisions to Use Forceand#34;, Presidential Studies Quarterly, http://onlinelibrary.wiley.com/doi/10.1111/j.1741-5705.2011.03885.x/pdf, ~Stolarski~
Presidents rely heavily on Congress in converting their political capital into real policy success. AND made with an eye toward managing political capital at home (Fordham 2002).
PC fails – only our evidence assumes recent developments
Cillizza 6/25 (Chris Cillizza, and#34;Is the presidential bully pulpit dead?; Driving a narrative is almost impossible these days — even for the president of the United States.and#34; June 25, 2013, Washington Post Blogs, LexisNexis, KB)
While you can debate the relative bad-ness of each of the stories for AND to diminish as a dominating message delivery system in the years to come.
Obama capital is low – Syria debacle
The Irish Times 9/14/2013 (and#34;Obama Agonistes,and#34; Lexis – Kurr) After the worst two weeks of his presidency, Barack Obama’s authority is diminished at AND misadventures over Syria may have ensured that his twilight will come much earlier.
2AC Soft Power Add-On
Constraining a militarized cyberwar policy is key to soft power.
Belk and Noyes ’12 (Robert (Naval aviator and Politico-Military Fellow, studying international and global affairs at the Harvard Kennedy School) and Matthew (studies international security policy and is a senior associate with the cybersecurity practice at Good Harbor Consulting), and#34;On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policyand#34;, 3-20-12, Office of Naval Research, RSR)
Over the past decade, hard power has dominated U.S. foreign policy AND ¶ abroad and hence the way such an operation affects American soft power.
Soft power prevents extinction – disease, climate change, terrorism, and great power war
Status quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties
With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. AND officials ... have given speeches and spoken at conferences and other public events."
Cyber prolif will be rapid – low barriers of entry and use of proxies
The United States might not be quite as far ahead of other nations in terms AND number of potential targets is almost infinite and not limited by geography.’
Proliferation of cyber weapons to terrorists causes nuclear great power wars
This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.
No defense- deterrence fails vs 3rd parties, making escalation likely
Owens et al 9 (William A. Owens, as an Admiral in the United States Navy and later Vice Chairman of the Joint Chiefs of Staff, Kenneth W. Dam, served as Deputy Secretary of the Treasury from 2001 to 2003, where he specialized in international economic development, Herbert S. Lin, Senior Scientist and Study, "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities" 4/27/2009, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf-http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf, KB)
Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between AND might thus choose just such a time to conduct a catalytic ¶ cyberattack.
And independently, cyber preemption escalates to shooting war
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with "kinetic activity."
Plan solves-
A) It provides international credibility that creates stables norms for deterring preemptive use
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
B) US norms against preemptive cyberattacks reverses cyber weapons prolif
In a speech this month on "Internet freedom," Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.
Advantage 2 is Defense
Cyber attack is highly like in the squo- actors are probing grid weaknesses
Reed ’12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, "U.S. energy companies victims of potentially destructive cyber intrusions", 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks
Foreign actors are probing the networks of key American companies in an attempt to gain AND power plants infected by Stuxnet very far away from Iran," Kaspersky said.
Current preemptive OCO policy backfires – creates priority confusion and drains cyber-defense resources
America’s generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn’t accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
When the Pentagon launched its much-anticipated "Strategy for Operating in Cyberspace" AND governments, courts, and business groups have barely begun to consider them.
2 impacts:
First, cyberwar – Overconcentration on offense is destabilizing – makes cyberwar inevitable
Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
Link is linear – every investment in offensive capabilities fuels a cyber-arms race that risks escalation
In addition, there are policy questions raised by the escalating government investment in offensive AND regulate the Internet in ways that would harm freedom of expression and information.
.1. Potential Economic Impact ¶ The 2011 Norton Cyber crime disclosed that over AND consumer trust issues could have serious repercussions and bear going into more ¶ detail
Economic collapse causes nuclear conflicts
Burrows and Harris 9 Mathew J. Burrows counselor in the National Intelligence Council and Jennifer Harris a member of the NIC’s Long Range Analysis Unit "Revisiting the Future: Geopolitical Effects of the Financial Crisis" The Washington Quarterly 32:2 https://csis.org/files/publication/twq09aprilburrowsharris.pdf
Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics AND and between states in a more¶ dog-eat-dog world.¶
Advantage 3 is Separation of Powers
Congressional restrictions on executive power is critical to maintain SOP
Yet addressing these questions is increasingly important for two reasons. ¶ First, as AND -in-chief power15 and Congress’s war-making ¶ authority.16
Strong separation of powers key to heg
Ikenberry 1 (G. John, Professor @ Georgetown University, Spring, The National Interest)
First, America’s mature political institutions organized around the rule of law have made it AND , to return to the corporate metaphor, to invest in ongoing partnerships.
Heg solves great power wars
Barnett 11 (Thomas P.M. Former Senior Strategic Researcher and Professor in the Warfare Analysis 26 Research Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist and Chief Analyst at Wikistrat., worked as the Assistant for Strategic Futures in the Office of Force Transformation in the Department of Defense, "The New Rules: Leadership Fatigue Puts U.S., and Globalization, at Crossroads," March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadership-fatigue-puts-u-s-and-globalization-at-crossroads)
Events in Libya are a further reminder for Americans that we stand at a crossroads AND the 20th century, setting the stage for the Pacific Century now unfolding.
Interbranch conflict causes war
Jamison 93 Linda S. Jamison, Deputy Director of Governmental Relations @ CSIS, Spring 1993, Executive-Legislative Relations after the Cold War, Washington Quarterly, v.16, n.2, p. 189
Indeed there are very few domestic issues that do not have strong international implications, AND that goes beyond the executive branch (Mann 1990, 28-29).
Congressional failure to act leads to massive expansion in prez power- now key
If Congress now fails to enact guidelines for cyber warfare, it might ¶ be AND order to be able to ¶ participate in the formulation of national policy.
Unfettered presidential powers cause nuclear war; ev is gender modified
Forrester 89 Professor, Hastings College of the Law (Ray, August 1989, ESSAY: Presidential Wars in the Nuclear Age: An Unresolved Problem, 57 Geo. Wash. L. Rev. 1636)
On the basis of this report, the startling fact is that one man ~ AND , indeed, humanity in general, probably would be unable to survive.
Plan
Plan: The United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of congressionally authorized United States military operations.
Solvency
Congressional action is critical to cyber expertise and preserves presidential flexibility
Congress’s active role in the development and implementation of cyber ¶ warfare policy is no AND to work together to meet these challenges, as the ¶ Framers intended.
XO can’t solve- binding precedent is key to norm building and check expansion of prez powers
Presidents have had certain restrictions for war-making ever since because the founders wanted AND them, and where the line should be drawn, even in cyberspace.
NFU for large-scale attacks reduces the risk of cyberattack
This raises an important question: Should America wage war— cyber or otherwise— AND because they have hard experience with the consequences of failing to do so.
2AC
Preempt Advantage
1. War is inevitable
A. Pentagon studies
Ergas 06 ~Ergas, Dec 5, ’6 Zeki, visiting scholar for three years at the Institute of International Studies of the University of California, at Berkeley, and for four years at the at the African Studies Program of the School of Foreign Service, at Georgetown University, presently Secretary General of PEN International’s Swiss Romand Center and lives in Geneva, "Introduction: The Neo-con Project for a New American Century and its Implications"~
As its title indicates, according to the larger study, America’s ’manifest destiny’ AND heads of state or of government of the 43 African countries that participated.
State Council think-tank member Tong Gang saw the conflict as the first salvo AND when prices were much lower," said a Beijing-based party source.
2. We’d win in a war now – eliminate the Chinese arsenal
Lieber and Press 09 ~Keir A., Associate Professor @ Georgetown University, Daryl G., Associate Professor of Government, Dartmouth College, Foreign Affairs, Nov/Dec~
Today, a multiple-warhead attack on a single silo using a Trident II AND the capabilities that would give a U.S. president real options.
B. Technological gap is too large for China to win a war in the short term, now key
Moreover, China’s "armed forces continue to develop and field disruptive military technologies, AND to spend years to build a modest force simply capable of deterring America.
3. War now good – Naval Power
A. China’s DF-21D ballistic missiles means war now is key – saves naval power projection in the Pacific
The U.S. Department of Defense explained in its annual report to Congress AND —to counter growing challenges to U.S. freedom of action."
B. Naval power key to solve multiple scenarios for conflict
CONWAY ET AL 07 ~James T., General, U.S. Marine Corps, Gary Roughead, Admiral, U.S. Navy, Thad W. Allen, Admiral, U.S. Coast Guard, "A Cooperative Strategy for 21st Century Seapower," October, http://www.navy.mil/maritime/MaritimeStrategy.pdf)~~
We will employ the global reach, persistent presence, and operational flexibility inherent in AND projecting power ashore, and protecting friendly forces and civilian populations from attack.
2AC XO CP
4. International distrust of the president dooms the signal and solvency
Rothschild 13 (Matthew, Feb 4, "The Danger’s of Obama’s Cyber War Power Grab," www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
5. Links to politics – immense opposition to bypassing debate
"In an era of polarized parties and a fragmented Congress, the opportunities to AND a partisan content, with contemporary complaints coming from the incumbent president’s opponents."
2AC Debt Ceiling DA
1. Water infrastructure thumps – it will trigger huge partisan fights
Lawmakers in the House of Representatives introduced their version of a bill Wednesday to move AND business, including the farm bill, immigration reform and the debt limit.
3. Congress opposed to offensive Cyber ops—- they like the plan, AND Obama will issue other controversial XOs that drain PC
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act."¶
4. No agreement on debt deal – partisanship is too high
IHT 9/14/2013 (Jonathan Weisman, "U.S. lawmakers resume fiscal standoff," International Herald Tribune, Lexis – Kurr)
In meetings with Democratic and Republican congressional leaders on Thursday after a session with Treasury AND some Republican leadership aides questioned how any could get to the president’s desk.
5. Winners win
Marshall and Prins ’11 Bryan W. MARSHALL AND PRINS 11, Miami University, Department of Political Science AND Brandon C. PRINS, University of Tennessee 26 Howard H. Baker, Jr. Center for Public Policy, September 2011 "Power or Posturing? Policy Availability and Congressional In?uence on U.S. Presidential Decisions to Use Force", Presidential Studies Quarterly, http://onlinelibrary.wiley.com/doi/10.1111/j.1741-5705.2011.03885.x/pdf, ~Stolarski~
Presidents rely heavily on Congress in converting their political capital into real policy success. AND made with an eye toward managing political capital at home (Fordham 2002).
6. PC fails – only our evidence assumes recent developments
Cillizza 6/25 (Chris Cillizza, "Is the presidential bully pulpit dead?; Driving a narrative is almost impossible these days — even for the president of the United States." June 25, 2013, Washington Post Blogs, LexisNexis, KB)
While you can debate the relative bad-ness of each of the stories for AND to diminish as a dominating message delivery system in the years to come.
7. Obama capital is low – Syria debacle
The Irish Times 9/14/2013 ("Obama Agonistes," Lexis – Kurr) After the worst two weeks of his presidency, Barack Obama’s authority is diminished at AND misadventures over Syria may have ensured that his twilight will come much earlier.
2AC Flexibility DA
2. It’s impossible for the president to remain adequately flexible on cyber
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND may be much more consequential than the¶ direct and immediate ones.74
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
a.lack of resources, expertise, facilities, and certainty
However, the most competent and well-financed terrorists groups would face difficulty in AND enormous technical and financial obstacles a terrorist group faces would serve to deter.
b. Empirics and studies prove
Mauroni ’12 (Al, senior policy analyst with the Air Force. A former Army officer, he has over twenty-five years experience in military chemical, biological, nuclear, and radiological (CBRN) defense policy and program development. He is a graduate of Carnegie-Mellon University and has a master’s of science in administration from Central Michigan University. He is the author of six books and more than two-dozen articles on the topic. His latest book is Where Are the WMDs? (Naval Press Institute, 2006), Volume VIII, "Nuclear Terrorism: Are We Prepared?" http://www.hsaj.org/?fullarticle=8.1.9)**
The source of the threat is important to this discussion, even more so than AND discussion: to understand how effectively the USG is performing in this case.
2AC Cyber Deterrence DA
2. Cyber deterrence is low now and fails
Clarke and Knake ’10 ~Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB~ ’ With a nuclear detonation, one could be fairly certain about ¶ what would happen AND prevention, plays no significant role in stop¬¶ ping cyber war today.
4. Cyber defense key to deterrence- checks sub-state actors
Lukasik ’10 ~Stephen J. Lukasik, georgia institute of technology. A" Framework for Thinking About Cyber ¶ Conflict and Cyber Deterrence with Possible ¶ Declaratory Policies for These Domains." In Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. ETB~
Sub-state actors are not subject to deterrence based on threats of retaliation. AND , and the collection, retention, and analysis of cyber incident forensics.
5. Preemptive attacks are irrelevant to deterrence- limited opponents
Experts say cyber warfare could cause serious damage to attack targets such as the U AND vigilant instead of granting the president even more power than he already has.
While the deterrent value of offensive cyber-capabilities is practically nonexistent, cyber- AND of these issues must be addressed for any collective cyberdefense to be effective.
T
C/I: Congressional standards for Presidential policymaking are restrictions on the war powers authority of the President
Ides 84 Associate Professor, Loyola University of LA Law School (Allan, "Congress, Constitutional Responsibility, and the War Power," Loyola of LA Law Review, v. 17, pp. 623) Of course, there is nothing wrong with Congress granting to the President a mandate AND , to articulate the policy to be followed by the executive branch.74
9/17/13
UMKC Round 6 - Aff v UNT OS
Tournament: UMKC | Round: 6 | Opponent: UNT OS | Judge: Ben Warner
1AC
Plan
Plan: The United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of congressionally authorized United States military operations.
Advantage 1 is Preemption
Status quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties
With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. AND officials ... have given speeches and spoken at conferences and other public events.and#34;
Cyber prolif will be rapid – low barriers of entry and use of proxies
The United States might not be quite as far ahead of other nations in terms AND number of potential targets is almost infinite and not limited by geography.’
Proliferation of cyber weapons to terrorists causes nuclear great power wars
This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.
No defense- deterrence fails vs 3rd parties, making escalation likely
Owens et al 9 (William A. Owens, as an Admiral in the United States Navy and later Vice Chairman of the Joint Chiefs of Staff, Kenneth W. Dam, served as Deputy Secretary of the Treasury from 2001 to 2003, where he specialized in international economic development, Herbert S. Lin, Senior Scientist and Study, and#34;Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilitiesand#34; 4/27/2009, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf-http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf, KB)
Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between AND might thus choose just such a time to conduct a catalytic ¶ cyberattack.
And independently, cyber preemption escalates to shooting war
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with and#34;kinetic activity.and#34;
Plan solves-
A) It provides international credibility that creates stables norms for deterring preemptive use
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
B) US norms against preemptive cyberattacks reverses cyber weapons prolif
In a speech this month on and#34;Internet freedom,and#34; Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.
Advantage 2 is Defense
Cyber attack is highly like in the squo- actors are probing grid weaknesses
Reed ’12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, and#34;U.S. energy companies victims of potentially destructive cyber intrusionsand#34;, 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks
Foreign actors are probing the networks of key American companies in an attempt to gain AND power plants infected by Stuxnet very far away from Iran,and#34; Kaspersky said.
Current preemptive OCO policy backfires – creates priority confusion and drains cyber-defense resources
America’s generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn’t accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
When the Pentagon launched its much-anticipated and#34;Strategy for Operating in Cyberspaceand#34; AND governments, courts, and business groups have barely begun to consider them.
2 impacts:
First, cyberwar – Overconcentration on offense is destabilizing – makes cyberwar inevitable
Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
Air gapping empirically fails
Cobos ‘12 Major Mark A. Cobos, United States Army, School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas. “Nodes and Codes: The Reality of Cyber Warfare.” ETB
In the fall of 2010, at the same time the Symantec Trio and Ralph Langner described Stuxnet’s AND the article by declaring
Link is linear – every investment in offensive capabilities fuels a cyber-arms race that risks escalation
In addition, there are policy questions raised by the escalating government investment in offensive AND regulate the Internet in ways that would harm freedom of expression and information.
The conceptual con?ation of cyber war, cyber espionage, and cyber¶ crime into AND cyber¶ crime, and deter cyber espionage all at the same time.
Major cyber crime crushes the global economy via ripple effects
Sani et al 12 Hemraj, Associate Professor 26 Head, Department of Computer Science 26 Engineering, Alwar Institute of Engineering 26 Technology, Yerra Shankar, PhD Student, Department of Mathematics Shiksha ?O’ Anusandhan University, T.C. Principal, Orissa Engineering College, and#34;Cyber-Crimes and their Impacts: A Review,and#34; Vol. 2, Issue 2,Mar-Apr 2012, http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf~~23SPS-http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf3e
.1. Potential Economic Impact ¶ The 2011 Norton Cyber crime disclosed that over AND consumer trust issues could have serious repercussions and bear going into more ¶ detail
Economic collapse causes nuclear conflicts
Burrows and Harris 9 Mathew J. Burrows counselor in the National Intelligence Council and Jennifer Harris a member of the NIC’s Long Range Analysis Unit and#34;Revisiting the Future: Geopolitical Effects of the Financial Crisisand#34; The Washington Quarterly 32:2 https://csis.org/files/publication/twq09aprilburrowsharris.pdf
Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics AND and between states in a more¶ dog-eat-dog world.¶
The best and most qualified studies agree
Royal 2010 (Jedediah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, “Economic Integration, Economic Signaling and the Problem of Economic Crises,” in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-214)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict. AND economic-security debate and deserves more attention.
Advantage 3 is Separation of Powers
Congressional restrictions on executive power is critical to maintain SOP
Yet addressing these questions is increasingly important for two reasons. ¶ First, as AND -in-chief power15 and Congress’s war-making ¶ authority.16
Strong separation of powers key to heg
Ikenberry 1 (G. John, Professor @ Georgetown University, Spring, The National Interest)
First, America’s mature political institutions organized around the rule of law have made it AND , to return to the corporate metaphor, to invest in ongoing partnerships.
Heg solves great power wars
Barnett 11 (Thomas P.M. Former Senior Strategic Researcher and Professor in the Warfare Analysis 26 Research Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist and Chief Analyst at Wikistrat., worked as the Assistant for Strategic Futures in the Office of Force Transformation in the Department of Defense, and#34;The New Rules: Leadership Fatigue Puts U.S., and Globalization, at Crossroads,and#34; March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadership-fatigue-puts-u-s-and-globalization-at-crossroads)
Events in Libya are a further reminder for Americans that we stand at a crossroads AND the 20th century, setting the stage for the Pacific Century now unfolding.
Even small violations of separation of powers must be avoided like nuclear war risks
Redish and Cisar 91 professor of law at Northwestern and Law Clerk to Chief Judge William Bauer, United States Court of Appeals, Seventh Circuit Martin H. and Elizabeth J., December 1991, IF ANGELS WERE TO GOVERNand#34; *: THE NEED FOR PRAGMATIC FORMALISM IN SEPARATION OF POWERS THEORY ,1992 Duke Law Journal, 41 Duke L.J. 449, p. 474 In summary, no defender of separation of powers can prove with certitude that, but for the existence AND position of saying, “I told you so.”
Interbranch conflict causes war
Jamison 93 Linda S. Jamison, Deputy Director of Governmental Relations @ CSIS, Spring 1993, Executive-Legislative Relations after the Cold War, Washington Quarterly, v.16, n.2, p. 189
Indeed there are very few domestic issues that do not have strong international implications, AND that goes beyond the executive branch (Mann 1990, 28-29).
Congressional failure to act leads to massive expansion in prez power- now key
If Congress now fails to enact guidelines for cyber warfare, it might ¶ be AND order to be able to ¶ participate in the formulation of national policy.
Unfettered presidential powers cause nuclear war; ev is gender modified
Forrester 89 Professor, Hastings College of the Law (Ray, August 1989, ESSAY: Presidential Wars in the Nuclear Age: An Unresolved Problem, 57 Geo. Wash. L. Rev. 1636)
On the basis of this report, the startling fact is that one man ~ AND , indeed, humanity in general, probably would be unable to survive.
Solvency
Congressional action is critical to cyber expertise and preserves presidential flexibility
Congress’s active role in the development and implementation of cyber ¶ warfare policy is no AND to work together to meet these challenges, as the ¶ Framers intended.
XO can’t solve- binding precedent is key to norm building and check expansion of prez powers
Presidents have had certain restrictions for war-making ever since because the founders wanted AND them, and where the line should be drawn, even in cyberspace.
NFU for large-scale attacks reduces the risk of cyberattack
This raises an important question: Should America wage war— cyber or otherwise— AND because they have hard experience with the consequences of failing to do so.
2AC
Preempt Advantage
1. War is inevitable
A. Pentagon studies
Ergas 06 ~Ergas, Dec 5, ’6 Zeki, visiting scholar for three years at the Institute of International Studies of the University of California, at Berkeley, and for four years at the at the African Studies Program of the School of Foreign Service, at Georgetown University, presently Secretary General of PEN International’s Swiss Romand Center and lives in Geneva, and#34;Introduction: The Neo-con Project for a New American Century and its Implicationsand#34;~
As its title indicates, according to the larger study, America’s ’manifest destiny’ AND heads of state or of government of the 43 African countries that participated.
State Council think-tank member Tong Gang saw the conflict as the first salvo AND when prices were much lower,and#34; said a Beijing-based party source.
2. We’d win in a war now – eliminate the Chinese arsenal
Lieber and Press 09 ~Keir A., Associate Professor @ Georgetown University, Daryl G., Associate Professor of Government, Dartmouth College, Foreign Affairs, Nov/Dec~
Today, a multiple-warhead attack on a single silo using a Trident II AND the capabilities that would give a U.S. president real options.
B. Technological gap is too large for China to win a war in the short term, now key
Moreover, China’s and#34;armed forces continue to develop and field disruptive military technologies, AND to spend years to build a modest force simply capable of deterring America.
3. War now good – Naval Power
A. China’s DF-21D ballistic missiles means war now is key – saves naval power projection in the Pacific
The U.S. Department of Defense explained in its annual report to Congress AND —to counter growing challenges to U.S. freedom of action.and#34;
B. Naval power key to solve multiple scenarios for conflict
CONWAY ET AL 07 ~James T., General, U.S. Marine Corps, Gary Roughead, Admiral, U.S. Navy, Thad W. Allen, Admiral, U.S. Coast Guard, and#34;A Cooperative Strategy for 21st Century Seapower,and#34; October, http://www.navy.mil/maritime/MaritimeStrategy.pdf)~~
We will employ the global reach, persistent presence, and operational flexibility inherent in AND projecting power ashore, and protecting friendly forces and civilian populations from attack.
2AC XO CP
4. International distrust of the president dooms the signal and solvency
Rothschild 13 (Matthew, Feb 4, and#34;The Danger’s of Obama’s Cyber War Power Grab,and#34; www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
5. Links to politics – immense opposition to bypassing debate
and#34;In an era of polarized parties and a fragmented Congress, the opportunities to AND a partisan content, with contemporary complaints coming from the incumbent president’s opponents.and#34;
8. States would never agree and treaties are un-enforceable
Dawson ’13 ~Ashley Dawson, M.A. Candidate in Policy Sci @ University of British Columbia. and#34;Addressing Cyber Warfare: Bolstering Deterrence through developing norms.and#34; Master’s Thesis. Etb~
There is less evidence of international cooperation prohibiting offensive cyber ¶ tactics due to legal AND frameworks to address the issue of ¶ ongoing limited-aims cyber attacks.
9. US must clarify rules for OCO’s prior to engaging in NFU
The GOP platform acknowledges the need for government to do a better job of protecting AND Iranian nuclear facilities. The administration has not acknowledged its involvement with Stuxnet.¶
1. Water infrastructure thumps – it will trigger huge partisan fights
Lawmakers in the House of Representatives introduced their version of a bill Wednesday to move AND business, including the farm bill, immigration reform and the debt limit.
3. No agreement on debt deal – partisanship is too high
In meetings with Democratic and Republican congressional leaders on Thursday after a session with Treasury AND some Republican leadership aides questioned how any could get to the president’s desk.
4. PC fails – only our evidence assumes recent developments
Cillizza 6/25 (Chris Cillizza, and#34;Is the presidential bully pulpit dead?; Driving a narrative is almost impossible these days — even for the president of the United States.and#34; June 25, 2013, Washington Post Blogs, LexisNexis, KB)
While you can debate the relative bad-ness of each of the stories for AND to diminish as a dominating message delivery system in the years to come.
5. Obama capital is low – Syria debacle
The Irish Times 9/14/2013 (and#34;Obama Agonistes,and#34; Lexis – Kurr) After the worst two weeks of his presidency, Barack Obama’s authority is diminished at AND misadventures over Syria may have ensured that his twilight will come much earlier.
2AC Flexibility DA
2. It’s impossible for the president to remain adequately flexible on cyber
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND may be much more consequential than the¶ direct and immediate ones.74
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
2AC T - Subsets Bad
Authority is the permission to act delegated from another agent.
Law.com, no date (http://dictionary.law.com/Default.aspx?selected=2478) authority n. permission, a right coupled with the power to do an act or AND and#34;general authority,and#34; which is the broad power to act for another.
9/17/13
UMKC Round 7 - Aff v UTSA CM
Tournament: UMKC | Round: 7 | Opponent: UTSA CM | Judge: William Smelko
1AC
Plan
Plan: The United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of congressionally authorized United States military operations.
Advantage 1 is Preemption
Status quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties
With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. AND officials ... have given speeches and spoken at conferences and other public events.and#34;
Cyber prolif will be rapid – low barriers of entry and use of proxies
The United States might not be quite as far ahead of other nations in terms AND number of potential targets is almost infinite and not limited by geography.’
Proliferation of cyber weapons to terrorists causes nuclear great power wars
This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.
No defense- deterrence fails vs 3rd parties, making escalation likely
Owens et al 9 (William A. Owens, as an Admiral in the United States Navy and later Vice Chairman of the Joint Chiefs of Staff, Kenneth W. Dam, served as Deputy Secretary of the Treasury from 2001 to 2003, where he specialized in international economic development, Herbert S. Lin, Senior Scientist and Study, and#34;Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilitiesand#34; 4/27/2009, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf-http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf, KB)
Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between AND might thus choose just such a time to conduct a catalytic ¶ cyberattack.
And independently, cyber preemption escalates to shooting war
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with and#34;kinetic activity.and#34;
Plan solves-
A) It provides international credibility that creates stables norms for deterring preemptive use
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
B) US norms against preemptive cyberattacks reverses cyber weapons prolif
In a speech this month on and#34;Internet freedom,and#34; Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.
Advantage 2 is Defense
Cyber attack is highly like in the squo- actors are probing grid weaknesses
Reed ’12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, and#34;U.S. energy companies victims of potentially destructive cyber intrusionsand#34;, 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks
Foreign actors are probing the networks of key American companies in an attempt to gain AND power plants infected by Stuxnet very far away from Iran,and#34; Kaspersky said.
Current preemptive OCO policy backfires – creates priority confusion and drains cyber-defense resources
America’s generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn’t accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
When the Pentagon launched its much-anticipated and#34;Strategy for Operating in Cyberspaceand#34; AND governments, courts, and business groups have barely begun to consider them.
2 impacts:
First, cyberwar – Overconcentration on offense is destabilizing – makes cyberwar inevitable
Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
Air gapping empirically fails
Cobos ‘12 Major Mark A. Cobos, United States Army, School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas. “Nodes and Codes: The Reality of Cyber Warfare.” ETB
In the fall of 2010, at the same time the Symantec Trio and Ralph Langner described Stuxnet’s AND the article by declaring
Link is linear – every investment in offensive capabilities fuels a cyber-arms race that risks escalation
In addition, there are policy questions raised by the escalating government investment in offensive AND regulate the Internet in ways that would harm freedom of expression and information.
The conceptual con?ation of cyber war, cyber espionage, and cyber¶ crime into AND cyber¶ crime, and deter cyber espionage all at the same time.
Major cyber crime crushes the global economy via ripple effects
Sani et al 12 Hemraj, Associate Professor 26 Head, Department of Computer Science 26 Engineering, Alwar Institute of Engineering 26 Technology, Yerra Shankar, PhD Student, Department of Mathematics Shiksha ?O’ Anusandhan University, T.C. Principal, Orissa Engineering College, and#34;Cyber-Crimes and their Impacts: A Review,and#34; Vol. 2, Issue 2,Mar-Apr 2012, http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf~~23SPS-http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf3e
.1. Potential Economic Impact ¶ The 2011 Norton Cyber crime disclosed that over AND consumer trust issues could have serious repercussions and bear going into more ¶ detail
Economic collapse causes nuclear conflicts
Burrows and Harris 9 Mathew J. Burrows counselor in the National Intelligence Council and Jennifer Harris a member of the NIC’s Long Range Analysis Unit and#34;Revisiting the Future: Geopolitical Effects of the Financial Crisisand#34; The Washington Quarterly 32:2 https://csis.org/files/publication/twq09aprilburrowsharris.pdf
Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics AND and between states in a more¶ dog-eat-dog world.¶
The best and most qualified studies agree
Royal 2010 (Jedediah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, “Economic Integration, Economic Signaling and the Problem of Economic Crises,” in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-214)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict. AND economic-security debate and deserves more attention.
Advantage 3 is Separation of Powers
Congressional restrictions on executive power is critical to maintain SOP
Yet addressing these questions is increasingly important for two reasons. ¶ First, as AND -in-chief power15 and Congress’s war-making ¶ authority.16
Strong separation of powers key to heg
Ikenberry 1 (G. John, Professor @ Georgetown University, Spring, The National Interest)
First, America’s mature political institutions organized around the rule of law have made it AND , to return to the corporate metaphor, to invest in ongoing partnerships.
Heg solves great power wars
Barnett 11 (Thomas P.M. Former Senior Strategic Researcher and Professor in the Warfare Analysis 26 Research Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist and Chief Analyst at Wikistrat., worked as the Assistant for Strategic Futures in the Office of Force Transformation in the Department of Defense, and#34;The New Rules: Leadership Fatigue Puts U.S., and Globalization, at Crossroads,and#34; March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadership-fatigue-puts-u-s-and-globalization-at-crossroads)
Events in Libya are a further reminder for Americans that we stand at a crossroads AND the 20th century, setting the stage for the Pacific Century now unfolding.
Even small violations of separation of powers must be avoided like nuclear war risks
Redish and Cisar 91 professor of law at Northwestern and Law Clerk to Chief Judge William Bauer, United States Court of Appeals, Seventh Circuit Martin H. and Elizabeth J., December 1991, IF ANGELS WERE TO GOVERNand#34; *: THE NEED FOR PRAGMATIC FORMALISM IN SEPARATION OF POWERS THEORY ,1992 Duke Law Journal, 41 Duke L.J. 449, p. 474 In summary, no defender of separation of powers can prove with certitude that, but for the existence AND position of saying, “I told you so.”
Interbranch conflict causes war
Jamison 93 Linda S. Jamison, Deputy Director of Governmental Relations @ CSIS, Spring 1993, Executive-Legislative Relations after the Cold War, Washington Quarterly, v.16, n.2, p. 189
Indeed there are very few domestic issues that do not have strong international implications, AND that goes beyond the executive branch (Mann 1990, 28-29).
Congressional failure to act leads to massive expansion in prez power- now key
If Congress now fails to enact guidelines for cyber warfare, it might ¶ be AND order to be able to ¶ participate in the formulation of national policy.
Unfettered presidential powers cause nuclear war; ev is gender modified
Forrester 89 Professor, Hastings College of the Law (Ray, August 1989, ESSAY: Presidential Wars in the Nuclear Age: An Unresolved Problem, 57 Geo. Wash. L. Rev. 1636)
On the basis of this report, the startling fact is that one man ~ AND , indeed, humanity in general, probably would be unable to survive.
Solvency
Congressional action is critical to cyber expertise and preserves presidential flexibility
Congress’s active role in the development and implementation of cyber ¶ warfare policy is no AND to work together to meet these challenges, as the ¶ Framers intended.
XO can’t solve- binding precedent is key to norm building and check expansion of prez powers
Presidents have had certain restrictions for war-making ever since because the founders wanted AND them, and where the line should be drawn, even in cyberspace.
NFU for large-scale attacks reduces the risk of cyberattack
This raises an important question: Should America wage war— cyber or otherwise— AND because they have hard experience with the consequences of failing to do so.
2AC
Modernity K
3. Prefer pragmatic reform over the utopianism of the alt
Erik Olin Wright 2007, Vilas Distinguished Professor of Sociology at the University of Wisconsin, and#34;Guidelines for Envisioning Real Utopiasand#34;, Soundings, April, www.ssc.wisc.edu/~wright/Published20writing/Guidelines-soundings.pdf 5. Waystations The final guideline for discussions of envisioning real utopias concerns the importance of waystations. AND of a UBI, and therefore might not function as a stepping stone. What we ideally want, therefore, are intermediate reforms that have two main properties AND empowering people in ways which enlarge their scope of action in the future.
4. Policy focused debates are necessary to promote more accountable policymaking and increase the educational value of debate – radical activism results in social disengagement and failed intervention
David Chandler. 2007. Professor of International Relations at the Department of Politics and International Relations, University of Westminster – and#34;The Attraction of Post-Territorial Politics: Ethics and Activism in the International Sphereand#34; – Inaugural Lecture – May – available at: http://www.davidchandler.org/pdf/short_articles/Inaugural20lecture.pdf) However, politics is no less important to many of us today. Politics still AND about how theory might be used to understand and engage with the world.
5. Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills
David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent. b. Ontology has no political impact Srnicek 09 ~Nick, Ph.D Candidate in International Relations @ the London School of Economics, and#34;Notes on Ontology and Politics,and#34; http://accursedshare.blogspot.com/2009/01/some-notes-on-ontology-and-politics.html~~
It seems to me that one of the most contentious and unremarked upon effects of AND an ontological category, its political content is entirely underdetermined by ontological reasoning.)
c.Ontology first is bogus – no warrant
Jackson 10 Patrick Thaddeus Jackson, 2010. Associate Professor of International Relations in the School of International Service at the American University in Washington, DC. and#34;The Conduct of Inquiry in International Relations: Philosophy of Science and its Implications for the Study of World Politics,and#34; p 27-8.
However, I do not think that putting ontology first in the panacea that many AND answer will always, and necessarily, assert the persistence of the state.
8. a. Life should be valued as apriori – it precedes the ability to value anything else
Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of and#34;Lifeand#34;, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
b. Existence precedes the ability to ascribe value ~and respect the other~
Paul Wapner. 2003. Associate Prof. and Dir. Global Env’t. Policy Prog. – American U., Dissent, and#34;Leftist criticism of and#34;natureand#34;and#34;, Winter, 50:1. All attempts to listen to nature are social constructions—except one. Even the AND , they deny their own intellectual insights and compromise their fundamental moral commitment.
c. Give people the choice to live
Paterson 3 Craig, Department of Philosophy, Providence College, Rhode Island and#34;A Life Not Worth Living?and#34;, Studies in Christian Ethics, http://sce.sagepub.com-http:sce.sagepub.com/
In determining whether a life is worth living or not, attention should be focused AND is essentially left up to the individual to determine for himself or herself.
d. Life has intrinsic and objective value achieved through subjective pleasures—-its preservation should be an a priori goal
Amien Kacou 8 WHY EVEN MIND? On The A Priori Value Of and#34;Lifeand#34;, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND priori value—what gives us pleasure is a matter for empirical investigation. Thus, we can see now that, in general, something primitively valuable is AND at least for the sake of preserving the possibility of finding that good. However, this platitude about the value that can be found in life turns out AND and desire. Perhaps, our inquiry should be a bit more complex.
f. Extinction outweighs ethics
Bok 88 (Sissela Bok, Professor of Philosophy @ Brandeis University, 1988, Applied Ethical Theory, ed. Rosenthal and Shehadi, pg. 203) The same argument can be made for Kant’s other formulations of the Categorical Imperative: AND to go against even the strictest moral duty precisely because of the consequences.
Human life has inherent value – arguing otherwise is a slippery slope to slavery and eugenics
Melinda Penner (Director of Operations – STR, Stand To Reason) 2005 and#34;End of Life Ethics: A Primerand#34;, Stand to Reason, http://www.str.org/site/News2?page=NewsArticle26id=5223 Intrinsic value is very different. Things with intrinsic value are valued for their own AND . Dutch doctors euthanize severely ill newborns and their society has accepted it.
1AR
Their human rights claims are just a Kantian modification of the Westphalian model of legitimate war which masks the species war in order to achieve its idea of the good life
KOCHI 2K9 ~tarik, lecturer in law and international security @ U of Sussex, Doctorate in Law from Griffith, and#34;species war: law, violence, and animalsand#34;, ’law, culture, and the humanities’, 353-359~
Modern international humanitarian law both inherits aspects of the Westphalian system and moves beyond it AND are conceptualized and expected to act as if they are moral persons.33
9/17/13
UNLV Round 1 - Aff v California EM
Tournament: UNLV | Round: 1 | Opponent: California EM | Judge: Jamie Cheek
1AC
Plan
The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Adv 1: Arms Race
The cyber arms race is accelerating — major attacks are inevitable this year — the best data proves
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war
— there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves CSM 11 (Christian Science Monitor, 3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow’s wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain."
Congressional constraints of OCOs are key to solve
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
The plan is key to secure cyberspace
Lord et al 11 Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf)
The United States should lead a broad, multi-stakeholder international cyber security coalition AND in a way that defends the nation without subverting what it stands for.
Squo offensive cyber policy creates perception of US weakness
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war
Power always depends on context, and in today’s world, it is distributed in AND even the largest country cannot achieve its aims without the help of others.
This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them
In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering AND create a strong force multiplier effect and should be considered a top priority.
China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability
Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, "Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing," Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html-http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war
Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Solvency
First, norm-setting other countries model our use of OCOs
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key
Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key
Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, "Congress’ Role in Cyber Warfare," Journal of National Security Law 26 Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf-http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Congressional restrictions on OCOs send a global signal of cyber leadership
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication
Hansen 26 Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
Overt action is key – covert prevents coalitions and fuels suspicion
Rishikof 11 Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf)
Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
2AC
Immigration DA
The GOP is literally laughing at the prospect of immigration – it won’t pass
CNN’s Dana Bash asked several House GOP lawmakers yesterday about the prospect for passing a AND don’t see how he would in good faith negotiate with us on immigration."
With the shutdown crisis lifted for now, President Obama urged Congress to get working AND year politics make it less likely House Republicans will want to do something.
A new legal and political foundation for stealth warfare cannot succeed without the initiative and AND — at home and globally — of unilateral, lethal, secret warfare.
The counterplans covert action ensures unilateralism – prevents coalitions and fuels suspicion and cyberwar
Rishikof 11, Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf) Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
Covert designation fuels suspicion and can’t solve cyber war — also removes international pressure from Chinese hacking
Wright 11, Executive director of studies at The Chicago Council on Global Affairs (Thomas, 6/26, America has double standards in fighting cyberwar, www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html~23axzz1QYnW3i1w-http://www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html) While it has several advantages, treating American cyber-destruction as a covert operation will severely undermine the new cyber-strategy. Suspicion that the US uses cyberweapons whenever convenient will hamper its attempts to press other states to be transparent about their intentions. In particular, it takes the pressure off China, widely believed to be the leading state source of cyberattacks. It may also dissuade the US from developing the technology to trace the source of an attack.
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
Stronger statutory checks on Presidential war powers increase credibility
Matthew C. Waxman 13, Professor of Law at Columbia Law School; Adjunct Senior Fellow for Law and Foreign Policy, Council on Foreign Relations, "The Constitutional Power to Threaten War", Forthcoming in Yale Law Journal, vol. 123 (2014), 8/25/2013, PDF
A second argument, this one advanced by some congressionalists, is that stronger legislative AND by pointing foreign actors to the appropriate institution or process for reading them.
It’s impossible for the president to remain adequately flexible on cyber
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND attacks may be much more consequential than the¶ direct and immediate ones.
====No impact to prez powers==== Healy 11 Gene Healy is a vice president at the Cato Institute and the author of The Cult of the Presidency, The CATO Institute, June 2011, "Book Review: Hail to the Tyrant", http://www.cato.org/publications/commentary/book-review-hail-tyrant
Legal checks "have been relaxed largely because of the need for centralized, relatively efficient government under the complex conditions of a modern dynamic economy and a highly interrelated international order." What’s more, the authors insist, America needs the legally unconstrained presidency both at home (given an increasingly complex economy) and abroad (given the shrinking of global distances). These are disputed points, to say the least. If Friedrich Hayek was at AND means that other players have a stake in protecting the global trading system. Posner and Vermuele coin the term "tyrannophobia," which stands for unjustified fear of AND to cede more power to the president even when more power is needed. Fair enough in the abstract — but Posner and Vermuele fail to provide a single AND executive power is what stood between us and a much larger death toll. Posner and Vermuele argue that only the executive unbound can address modernity’s myriad crises. AND device," according to Paul Wolfowitz — and perhaps no 9/11. Posner and Vermuele are slightly more perceptive when it comes to the home front, letting drop as an aside the observation that because of the easy-money policy that helped inflate the housing bubble, "the Fed is at least partly responsible for both the financial crisis of 2008-2009 and for its resolution." Oh, well — I guess we’re even, then. Sometimes, the authors are so enamored with the elegant economic models they construct that AND off and probably worse off than she would be under the unitary system." But the government-as-firm metaphor is daffy. In the Madisonian vision AND to "consume" them — he might well favor constraints on production. From Franklin Roosevelt onward, we’ve had something close to vertical integration under presidential command AND observed archly, "polls do not reveal the opinions of dead Iraqis."
Peace K
Threats are real
Ravenal ’9 ~Earl C. Ravenal, distinguished senior fellow in foreign policy studies @ Cato, is professor emeritus of the Georgetown University School of Foreign Service. He is an expert on NATO, defense strategy, and the defense budget. He is the author of Designing Defense for a New World Order. What’s Empire Got to Do with It? The Derivation of America’s Foreign Policy." Critical Review: An Interdisciplinary Journal of Politics and Society 21.1 (2009) 21-75~
Quite expectedly, the more doctrinaire of the non-interventionists take pains to deny AND or to a lack of sufficient imagination to exploit opportunities for personal profit.
Perm do plan then alternative
The world is realist – we need to engage it.
Mearsheimer, ’95 (Chicago Poli Sci Prof, Winter, International Security, p. 44-5) Three points are in order regarding the critical theorists’ interpretation of history. First, AND best to explain international politics in the five centuries of the feudal era.
1AR
Alliances
Use of the "genie in the bottle" metaphor is racist towards people of Arabic descent—- these stereotypes should be rejected in every instance
The depiction of Muslims as a singular embodiment of ’terror’ and ’menace’ by AND of a phenomenon that is, unfortunately, larger than the British context.
The inseparability of covert action and clandestine collection is not universally assumed. Covert action tends to be the most controversial element of the intelligence community. Often public hostility toward the entire intelligence community is based solely on the public’s anger over covert action.
Politics
Won’t pass – amnesty, border security and visa reform
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
A new legal and political foundation for stealth warfare cannot succeed without the initiative and AND — at home and globally — of unilateral, lethal, secret warfare.
The counterplans covert action ensures unilateralism – prevents coalitions and fuels suspicion and cyberwar
Rishikof 11, Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf) Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
Covert designation fuels suspicion and can’t solve cyber war — also removes international pressure from Chinese hacking
Wright 11, Executive director of studies at The Chicago Council on Global Affairs (Thomas, 6/26, America has double standards in fighting cyberwar, www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html~23axzz1QYnW3i1w-http://www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html) While it has several advantages, treating American cyber-destruction as a covert operation will severely undermine the new cyber-strategy. Suspicion that the US uses cyberweapons whenever convenient will hamper its attempts to press other states to be transparent about their intentions. In particular, it takes the pressure off China, widely believed to be the leading state source of cyberattacks. It may also dissuade the US from developing the technology to trace the source of an attack.
Scheuerman 12 – William E. Scheuerman, Professor of Political Science and West European Studies at Indiana University, "Review Essay: Emergencies, Executive Power, and the Uncertain Future of US Presidential Democracy", Law and Social Inquiry, Summer, 37 Law 26 Soc. Inquiry 743, Lexis Posner and Vermeule rely on two main claims. First, even if the president AND seems like a pale replacement for liberal legalism and the separation of powers.
3. Plan’s way more credible Pildes 12 – Richard H. Pildes, Sudler Family Professor of Constitutional Law at the NYU School of Law and Co-Director of the NYU Center on Law and Security, "Book Review: Law and the President", Harvard Law Review, April, 125 Harv. L. Rev. 1381, Lexis
That Posner and Vermeule miss the role of legal compliance as a ¶ powerful signal AND political culture, is probably the ¶ President’s willingness to comply with law.
4. Links to politics – congress wants to be involved
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
OCOs Good DA
Non-unique — cyber arms race and use is inevitable now — I did that analysis on case — it’s try or die for a restrained strategy — active defense causes Cyberwar
McGraw 12, Member of the IEEE Computer Society Board of Governors, Gary McGraw AND , Gary McGraw has served on the IEEE Computer Society-http://en.wikipedia.org/wiki/IEEE_Computer_Society Board of Governors. Creating a cyber-rock is cheap. Buying a cyber-rock is even AND that exploits are sexy and engineering is, well, not so sexy.
GAO 11, Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, http://www.gao.gov/assets/330/321824.html-http://www.gao.gov/assets/330/321824.html DOD has assigned authorities and responsibilities for implementing cyberspace operations among combatant commands, military AND forces globally and in building unity of effort for carrying out cyberspace operations.
Turn — Miscalc — only the plan solves deterrence failures
Lord et al 11, Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf) The Department of Defense, the intelligence community, the Department of Justice, AND attributed to them, which will help deter them in the first place.
Turn — organization confusion dooms OCOs now — only statutory legislation solves
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND thrust into the mix, having to decide critical national security law controversies,
even when the judges themselves have little direct knowledge or expertise on the topics brought before them; attorneys within the executive branch itself advising against actions based on often narrow legal interpretations and with little understanding of the broader implications of tying down the president with legalisms.
1AR
Case
Prez will adhere to congressional constraints- fear of political costs
In addition to the constraining influence arising from the internalization of legal norms by executive AND ¶ do not see any normative significance in the legal rule in question.
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
Legalism K
2. a. Life should be valued as apriori – it precedes the ability to value anything else
Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of "Life", Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
b. Our impacts o/w the K, cross apply my analysis done on case.
3. Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills
David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent.
4. Perm – do both. Social movements must work with and along-side legal institutions. Rejection of the law kills solvency.
Peter Gabel, former President and Professor of Law at New College of California, 2009 ("LAW AND ECONOMICS, CRITICAL LEGAL STUDIES, AND THE HIGHER LAW: CRITICAL LEGAL STUDIES AS A SPIRITUAL PRACTICE." 36 Pepp. L. Rev. 515. Lexis ) This calls not for a rejection of past CLS work, but for a reclaiming AND new, more spiritually confident work yet to be written by the young.
5. Critical legal philosophy is non-empirical, cherry-picked garbage
John Stick 86, Assistant Professor of Law at Tulane University School of Law, "Can Nihilism Be Pragmatic?", Harvard Law Review, Vol. 100, No. 2 (Dec., 1986), pp. 332-401, JSTOR This Article examines the relationship between the critical legal nihilists and the philosophers they rely AND then a fortiori Singer is too much of an irrationalist for the others.
Paranoia K
5. Our impacts aren’t constructed until they prove it.
Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
6. Even if predictions in the abstract are wrong, policy debates is productive, improves predictive accuracy, and solves cession of the debate to cloistered experts
Tetlock and Gardner 2011 (Philip Tetlock is a professor of organizational behavior at the Haas Business School at the University of California-Berkeley, AND Dan Gardner is a columnist and senior writer for the Ottawa Citizen and the author of The Science of Fear, received numerous awards for his writing, including the Michener Award, M.A. History from York, "OVERCOMING OUR AVERSION TO ACKNOWLEDGING OUR IGNORANCE" July 11 www.cato-unbound.org/2011/07/11/dan-gardner-and-philip-tetlock/overcoming-our-aversion-to-acknowledging-our-ignorance/) The optimists are right that there is much we can do at a cost that AND you affix more realistic odds than your competitors on policy bets panning out.
7. Our risk assessment critical to transforming the public sphere—leads to democratic decision making
Borraz, 2007 ~OLIVIER BORRAZ Centre de Sociologie des Organisations, Sciences Po-CNRS, Paris, "Risk and Public Problems," Journal of Risk Research, 10, 7, Oct 2007, 941-957~ These studies seem to suggest that risk is a way of framing a public problem AND rifts stemming from antagonistic views of science, democracy and the world order.
8. Depicting scenarios for nuclear war creates a fear that drives people to action and arouses anger at injustices – the alternative creates irresponsibility and inaction
Grinspoon 1986 ~Lester, Professor of Psychiatry, Harvard Medical School, (The Long Darkness: Psychological and Moral Perspectives on Nuclear Winter) p. 3-4~ The late Archibald MacLeish wrote, "Knowledge without feelings is not knowledge, and AND out of numbness or self-delusion and into confrontation of the reality.
9. Fear of nuclear weapons is key to space, solves extinction
Bainbridge 1985 (William, phd national science foundation, "beyond bureaucratic policy," people in space mysite.verizon.net/william.bainbridge/dl/beyond.htm)
At present, the public spaceflight organizations are inoffensive and practically impotent. The profusion AND those cataclysmic social conditions which might be exploited in a new rush forward.
1AR
Paranoia K
14. Ignoring the threat causes panic – worse than fear, stops solvency, turns their state power arguments
Sandman and Lanard, 2003 Peter M. PhD in Communications and Professor at Rutgers specializing in crisis communication; Jody, Psychiatrist, 28 April, "Fear Is Spreading Faster than SARS — And So It Should21" China is universally condemned for covering up SARS and putting the world at risk. AND minimizing the risk than if they have been acknowledging it candidly and compassionately.
10/20/13
UNLV Round 7 - Aff v USC HS
Tournament: UNLV | Round: 7 | Opponent: USC HS | Judge: Abi Williams
1AC
Same as rounds 1, 3, and 6
Cyber with arms race and alliance
2AC
T - Prohibit
Restrict and regulate are synonymous
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
3. CP is a rubber stamp – only the aff can solve perception
Somin, George Mason Law Prof, 13 (Ilya, 4-23-13, "Hearing on ’Drone Wars: The Constitutional and Counterterrorism Implications of Targeted Killing’: Testimony before the United States Senate Judiciary Subcommittee on the Constitution, Civil Rights, and Human Rights," accessed 10-2-13,http://www.law.gmu.edu/assets/files/faculty/Somin_DroneWarfare_April2013.pdf-http://www.law.gmu.edu/assets/files/faculty/Somin_DroneWarfare_April2013.pdf, hec) Alternatively, one can envision some kind of more extensive due process within the executive AND -selection process with informed opinion both in the United States and abroad.
4. Links to politics – congress wants to be involved
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
Immigration DA
The GOP is literally laughing at the prospect of immigration – it won’t pass
CNN’s Dana Bash asked several House GOP lawmakers yesterday about the prospect for passing a AND don’t see how he would in good faith negotiate with us on immigration."
With the shutdown crisis lifted for now, President Obama urged Congress to get working AND year politics make it less likely House Republicans will want to do something.
Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, "Poverty as a cause of wars?" p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
Legalism K
2. a. Life should be valued as apriori – it precedes the ability to value anything else
Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of "Life", Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
b. Our impacts o/w the K, cross apply my analysis done on case.
3. Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills
David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent.
4. Perm – do both. Social movements must work with and along-side legal institutions. Rejection of the law kills solvency.
Peter Gabel, former President and Professor of Law at New College of California, 2009 ("LAW AND ECONOMICS, CRITICAL LEGAL STUDIES, AND THE HIGHER LAW: CRITICAL LEGAL STUDIES AS A SPIRITUAL PRACTICE." 36 Pepp. L. Rev. 515. Lexis ) This calls not for a rejection of past CLS work, but for a reclaiming AND new, more spiritually confident work yet to be written by the young.
5. Critical legal philosophy is non-empirical, cherry-picked garbage
John Stick 86, Assistant Professor of Law at Tulane University School of Law, "Can Nihilism Be Pragmatic?", Harvard Law Review, Vol. 100, No. 2 (Dec., 1986), pp. 332-401, JSTOR This Article examines the relationship between the critical legal nihilists and the philosophers they rely AND then a fortiori Singer is too much of an irrationalist for the others.
The war against al Qaeda is not going well. Afghanistan has seen the most AND former while observing the latter to ensure that they do not change course.
Current AUMF ambiguity is the culprit – it undermines effective counter-terrorism efforts against affiliates
Chesney et al. ’13 ~Robert Chesney is a professor at the University of Texas School of Law, a nonresident senior fellow of the Brookings Institution, and a distinguished scholar at the Robert S. Strauss Center for International Security and Law. He is a cofounder and contributor to the Lawfare Blog and writes frequently on topics relating to US counterterrorism policy and law. Jack Goldsmith is the Henry L. Shattuck Professor of Law at Harvard Law School and a member of the Hoover Institution’s Jean Perkins Task Force on National Security and Law. He served in the Bush administration as assistant attorney general, Office of Legal Counsel, from 2003 to 2004 and as special counsel to the general counsel from 2002 to 2003. Matthew C. Waxman is a professor of law at Columbia Law School, an adjunct senior fellow at the Council on Foreign Relations, and a member of the Hoover Institution’s Jean Perkins Task Force on National Security and Law. He previously served in senior positions at the State Department, Defense Department, and National Security Council. Benjamin Wittes is a senior fellow in governance studies at the Brookings Institution, a member of the Hoover Institution’s Jean Perkins Task Force on National Security and Law, and the editor in chief of the Lawfare Blog. Jean Perkins Task Force on National Security and Law. http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf-http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf ETB~
The September 2001 AUMF provides for the use of force against the entity responsible for AND Congress should do anything about this situation, and if so precisely what.
Clarifying "associated forces" is key – allows the US to effectively fight the War on Terror
The failure to define al Qaeda properly has confused American policy and strategy. The AND only occasional battleground victories, but no real prospect of winning the war.
We’re at a turning point - the US must pivot to address the threat from al Qaeda affiliates - Congressional action is key because it provides legitimacy that induces public support for counter terrorism and international cooperation against terrorism
It has recently become clear, however, that the Al Qaeda threat that occupied AND is so critical to the success of our combined efforts against international terrorism.
Turning the tide is critical – al-Qaeda affiliates pose a high risk of nuclear and biological terrorism
Morgan 09 (Professor of Foreign Studies at Hankuk University, Dennis Ray, December, "World on fire: two scenarios of the destruction of human civilization and possible extinction of the human race" Futures, Vol 41 Issue 10, p 683-693, ScienceDirect)
In a remarkable website on nuclear war, Carol Moore asks the question "Is AND those steps and start through the accidental or reckless use of strategic weapons.
Bioattack causes extinction
Steinbrenner 97 (John D. Steinbrenner, Brookings Senior Fellow, 1997, Foreign Policy, "Biological weapons: a plague upon all houses," Winter, InfoTrac)
Although human pathogens are often lumped with nuclear explosives and lethal chemicals as potential weapons AND this might be, since there is no way to measure it reliably.
New gene manipulation takes out their defense
MSNBC 2011 ("Clinton warns of bioweapon threat from gene tech," pg online @ http://www.msnbc.msn.com/id/45584359/ns/… "For an international verification system — akin to that for nuclear weapons — saying it is too complicated to monitor every lab’s activities.")
GENEVA — New gene assembly technology that offers great benefits for scientific research could also AND saying it is too complicated to monitor every lab’s activities around the world.
Ambiguity will force a collapse of operations in Yemen 26 Somalia
The drawdown in Afghanistan, combined with the expansion of the shadow war model, AND provides a useful illustration, or perhaps more accurately, a cautionary tale.
Defeating AQAP in Yemen is key—prevents regional attacks on nearby waterways
Terrill 13 ~Dr. W. Andrew Terrill, Research Professor of National Security Affairs, retired Lt. Col., Strategic Studies Institute and U.S. Army War College Press, June, "THE STRUGGLE FOR YEMEN AND THE CHALLENGE OF AL-QAEDA IN THE ARABIAN PENINSULA" http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1157~~
U.S. support for Yemen remains important, and the United States must AND indicated by repeated AQAP efforts to attack the U.S. homeland.
New AQ merger proves a risk of waterway attack is high
The Horn of Africa is one of the most strategically critical regions in the world AND worlds lone superpower and it’s control of the world as we know it.
Triggers immediate global economic collapse
Korin 26 Luft 4 Anne Korin, Director of Policy and Strategic Planning at IAGS and Editor of Energy Security, and Gal Luft, Institute for the Analysis of Global Security, Nov/Dec Foreign Affairs, "Terrorism Goes to Sea" http://www.cfr.org/world/terrorism-goes-sea/p7545
Such experts, however, fail to realize that the popular perception that the international AND that pass through it each year are tankers carrying Russian and Caspian oil.
Economic collapse causes nuclear war
Kemp 10 Geoffrey Kemp, Director of Regional Strategic Programs at The Nixon Center, served in the White House under Ronald Reagan, special assistant to the president for national security affairs and senior director for Near East and South Asian affairs on the National Security Council Staff, Former Director, Middle East Arms Control Project at the Carnegie Endowment for International Peace, 2010, The East Moves West: India, China, and Asia’s Growing Presence in the Middle East, p. 233-4
The second scenario, called Mayhem and Chaos, is the opposite of the first AND expected, with dire consequences for two-thirds of the planet’s population.
Global trading stability solves great power wars- collapse causes conflict
Hillebrand ’10 ~Evan E., Senior Economist for the Central Intelligence Agency and Professor of Diplomacy AND for more fractious relations among states and the probability for interstate war rises.
Advantage 2 - Firebreak
The AUMF will inevitably expire in the squo – updating the authorization is key to prevent a limitless War on Terror based on article 2 and self-defense justifications that undermine US legitimacy and erode the global firebreak against use of force
The AUMF must inevitably expire because it is expressly linked to the September 11, AND the continued successful targeting of Al Qaeda members, is rapidly approaching zero.
We control terminal impact uniqueness - war taboo strong and effective now. Norms prevents miscalc and escalation
Beehner, 12 Council on Foreign Relations senior writer; Truman National Security Project fellow ~Lionel, "Is There An Emerging ’Taboo’ Against Retaliation?" The Smoke Filled Room, 7-13-12, thesmokefilledroomblog.com/2012/07/13/is-there-an-emerging-taboo-against-retaliation/, accessed 9-22-13, ~
The biggest international news in the quiet months before 9/11 was the collision AND hostilities. To do otherwise would be a violation of this existing norm.
Specifically, erosion of the use of force taboo triggers nuclear conflict between India and Pakistan and China and Taiwan
Obayemi, 6 East Bay Law School professor ~Olumide, admitted to the Bars of Federal Republic of Nigeria and the State of California, Golden Gate University School of Law, "Article: Legal Standards Governing Pre-Emptive Strikes and Forcible Measures of Anticipatory Self-Defense Under the U.N. Charter and General International Law," 12 Ann. Surv. Int’l 26 Comp. L. 19, l/n, accessed 9-19-13, ~
The United States must abide by the rigorous standards set out above that are meant AND . This is the essence of the preamble to the United Nations Charter.
Indo-Pak nuclear war causes extinction
Starr ’11 (Consequences of a Single Failure of Nuclear Deterrence by Steven Starr February 07, 2011 * Associate member of the Nuclear Age Peace Foundation * Senior Scientist for PSR)
Only a single failure of nuclear deterrence is required to start a nuclear war, AND the currently operational and deployed U.S. and Russian nuclear forces.
So does China-Taiwan
Straits Times 2k (6-25, Lexis, No one gains in war over Taiwan)
THE DOOMSDAY SCENARIO THE high-intensity scenario postulates a cross-strait war escalating AND cannot be ruled out entirely, for China puts sovereignty above everything else.
Plan
The United States Congress should increase statutory restrictions on the targeted killing and indefinite detention authorities granted by the 2001 Authorization for Use of Military Force and modified by the 2012 National Defense Authorization Act by limiting the targets of those authorities to al-Qaeda, the Taliban, or those nations, organizations, or persons who enjoy close and well-established collaboration with al-Qaeda or the Taliban.
Solvency
Action to clearly define the enemy restricts the executive scope of the AUMF while preserving presidential flexibility and the joint decision-making capabilities
Cronogue ’12 ~Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. 26 Int’l L. 377 2011-2012. ETB~
The AUMF must be updated. In 2001, the AUMF authorized force to fight AND against those nations that present the greatest threat to the United States today.
Obama will adhere to the plan - wants to rely on congressional authority
Obama administration officials, concerned about the legal justifications behind counterterrorism operations, have preferred to rely on congressional authority for the use of force against al Qaeda, seeing such authority as more defensible and acceptable to allies.
2AC
First Priority
Policy focused debates are necessary to promote more accountable policymaking and increase the educational value of debate – radical activism results in social disengagement and failed intervention
David Chandler. 2007. Professor of International Relations at the Department of Politics and International Relations, University of Westminster – "The Attraction of Post-Territorial Politics: Ethics and Activism in the International Sphere" – Inaugural Lecture – May – available at: http://www.davidchandler.org/pdf/short_articles/Inaugural20lecture.pdf) However, politics is no less important to many of us today. Politics still AND about how theory might be used to understand and engage with the world.
Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills
David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent.
Life should be valued as apriori – it precedes the ability to value anything else
Kacou 8 Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of "Life", Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184
Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
War fuels structural violence, not the other way around
Goldstein 2001 IR professor at American University (Joshua, War and Gender, p. 412, Google Books)
First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
War facilitates racism and xenophobia that would not escalate otherwise
Rangelov and Kaldor 12 Iavor Rangelov and Mary Kaldor. 2012. Global Security Research Fellow at the Civil Society and Huamn Security Research Unit, Dept of Int’l Development at the Loncon School of Economics and Political Science; Professor of Global Governance and Director of the Civil Society and Human Security Research Unit. Persistent Conflict. Conflict, Security 26 Development 12:3.
One problem with the literature is the preoccupation with the term ’con?ict’. The AND , excitement, adventure and perversion, are given free rein in violent contexts
C. Being a "high priority" is good enough – Churchill concedes
Churchill 2 (Ward, Neg Author, Struggle for the Land: Native North American Resistance to Genocide, Ecocide and Colonization, p. 278)
Ultimately, stopping the processes of uranium extraction in Indian Country and consequent nuclear proliferation AND agenda for and defining the priorities of radical social change on this continent.
And, pragmatic action mobilizes effective action – it’s key to negotiating a future for Native America.
Porter, ’97 (Associate Law Professor — Kansas 26 Attorney — General of the Seneca Nation of Indians, Winter, 28 Colum. Human Rights L. Rev. 235)
The fourth step toward revitalizing peacemaking is to address the problems of its implementation in AND their procedures to accommodate a desire to revitalize tradition to the desired extent.
the continued existence of the USFG is desirable. And, the alt fails to account for the intersections of colonialism and creates fragmentation that prevents effective political action
Andrea Smith. 2012. "Indigeneity, Settler Colonialism, White Supremacy" in Racial Formation in the Twenty-First Century. p 77. As mentioned previously, many Native studies scholars have refused engagement with ethnic studies or AND of decolonization have articulated indigeneity as an expansive rather than an exclusive category.)
Turn –decolonization makes natives vulnerable to ethnic cleansing. Colonization has eliminated any defense against external threats.
Porter 98 (Robert B., Associate Professor of Law and Director of the Tribal Law and Government Center – University of Kansas, "A Proposal to the Hanodaganyas to Decolonize Federal Indian Control Law", University of Michigan Journal of Law Reform, Summer, 31 U. Mich. J.L. Reform 899, Lexis)
Finally, the Self-Governance Act does not adequately address the reality that not AND those most assimilated and least equipped to administer their own territory and affairs.
Turn – infighting –
A) Decolonization splits native nations – some fight it
Porter 98 (Robert B., Associate Professor of Law and Director of the Tribal Law and Government Center – University of Kansas, "A Proposal to the Hanodaganyas to Decolonize Federal Indian Control Law", University of Michigan Journal of Law Reform, Summer, 31 U. Mich. J.L. Reform 899, Lexis)
Much of the difficulty in implementing a federal Indian Decolonization Policy will arise because many AND no idea what it means to assume greater authority over their own affairs.
B) That causes native extinction
Porter 97 (Robert B., Associate Professor of Law and Director of the Tribal Law and Government Center – University of Kansas, "Strengthening Tribal Sovereignty Through Government Reform: What are the Issues", Kansas Journal of Law 26 Public Policy, Winter, 7 Kan. J.L. 26 Pub. Pol’y 72, Lexis)
Against this backdrop, infighting can be a matter of life or death for tribal AND , then we simply cannot expect to survive very long as sovereign nations.
— Turn – backlash –
Returning land to natives causes a violent backlash from the majority and inter-racial fighting
Bradford 3 (William, LLM – Harvard Law School and Assistant Professor of Law – Indiana University, ""With a Very Great Blame on Our Hearts": Reparations, Reconciliation, and an American Indian Plea for Peace with Justice", American Indian Law Review, 27 Am. Indian L. Rev. 1, Lexis)
Masotti 69 (Louis H. Professor of Political Science – Case Western Reserve University, et al., A Time to Burn?, p. x-xi)
To a very great extent, riots are a cry of utter despair, pleading AND peace between the nuclear powers and plunge the whole world into nuclear holocaust.
We should not forget the racist past of the state, but fixating on inevitable flaws entrenches hopelessness
Daniel Farber 98, law prof, U Minnesota, Thomas M. Cooley Law Review, 15 T.M. Cooley L. Rev. 361 And finally, what I fear the most is the response that seemed to be AND able to unite our society in a quest toward attacking those serious problems.
Privileging ontology and epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments.
Owen 2 ~David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7~
Commenting on the ’philosophical turn’ in IR, Wæver remarks that ’~a~ AND the first and second dangers, and so a potentially vicious circle arises.
1AR
"Fuck" K
Their use of the ’f’ word is an independent reason to vote
There’s a pause at this point. Here’s the problem: long before most kids AND part of building a more pleasurable, safe, just and egalitarian world.
First Priority
Existence precedes the ability to ascribe value ~and respect the other~
Wapner 3 Paul Wapner. 2003. Associate Prof. and Dir. Global Env’t. Policy Prog. – American U., Dissent, "Leftist criticism of "nature"", Winter, 50:1.
All attempts to listen to nature are social constructions—except one. Even the AND , they deny their own intellectual insights and compromise their fundamental moral commitment.
1/8/14
UTD Round 3 - Aff v Texas CM
Tournament: UTD | Round: 3 | Opponent: Texas CM | Judge: Matt Moore
2AC
Afropessimism K
Policy focused debates are necessary to promote more accountable policymaking and increase the educational value of debate – radical activism results in social disengagement and failed intervention
David Chandler. 2007. Professor of International Relations at the Department of Politics and International Relations, University of Westminster – "The Attraction of Post-Territorial Politics: Ethics and Activism in the International Sphere" – Inaugural Lecture – May – available at: http://www.davidchandler.org/pdf/short_articles/Inaugural20lecture.pdf) However, politics is no less important to many of us today. Politics still AND about how theory might be used to understand and engage with the world.
Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills
David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent.
Life should be valued as apriori – it precedes the ability to value anything else
Kacou 8 Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of "Life", Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184
Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
War fuels structural violence, not the other way around
Goldstein 2001 IR professor at American University (Joshua, War and Gender, p. 412, Google Books)
First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
War facilitates racism and xenophobia that would not escalate otherwise
Rangelov and Kaldor 12 Iavor Rangelov and Mary Kaldor. 2012. Global Security Research Fellow at the Civil Society and Huamn Security Research Unit, Dept of Int’l Development at the Loncon School of Economics and Political Science; Professor of Global Governance and Director of the Civil Society and Human Security Research Unit. Persistent Conflict. Conflict, Security 26 Development 12:3.
One problem with the literature is the preoccupation with the term ’con?ict’. The AND , excitement, adventure and perversion, are given free rein in violent contexts
Apoc Reps K
There is likely a near-zero chance of nuclear war, but protective and defensive counter-measures like the aff are still necessary
Matheny, ’7 ~Jason G. Matheny, "Reducing the Risk of Human Extinction" Risk Analysis, Vol. 27, No. 5, 2007~ It is possible for humanity (or its descendents) to survive a million years AND stakes are high, it could be wise to invest in extinction countermeasures.
The K’s rejection of realism allows a more oppressive form to fill in.
Guzzini, ’98 (Assistant International Affairs Professor – CEU, Realism in International Relations and the International Political Economy. Pg. 205
On the other hand, to dispose of realism because some of its versions have AND , it might be the best way to tacitly and uncritically reproduce it.
Prefer specific scenarios – even if we invoke some security logic, the fact that others will securitize means that we have to make worst-case assessments to avoid escalation
Ole Waever, Senior Research Fellow – Copenhagen Peace Research Inst., 2K (I. R. Theory 26 the Politics of European Integration, ed Kelstrup/Williams p. 282-285)
The other main possibility is to stress responsibility. Particularly in a field like security AND that could lead to security dilemmas and escalations, violence and mutual vilification.
Our impacts aren’t constructed until they prove it.
Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
Permutation: do the alternative – justified because floating PIKs moot the 1AC and constantly shift through the debate making it impossible for the aff to generate offense.
Risk framing motivates new social movements and re-democratizes politics
Borraz, ’7 ~Olivier Borraz, Centre de Sociologie des Organisations, Sciences Po-CNRS, Paris, Risk and Public Problems, Journal of Risk Research Vol. 10, No. 7, 941–957, October 2007, p. 951~ These studies seem to suggest that risk is a way of framing a public problem AND rifts stemming from antagonistic views of science, democracy and the world order.
Ignoring the threat causes panic – worse than fear, stops solvency, turns their state power arguments
Sandman and Lanard, 2003 Peter M. PhD in Communications and Professor at Rutgers specializing in crisis communication; Jody, Psychiatrist, 28 April, "Fear Is Spreading Faster than SARS — And So It Should21" China is universally condemned for covering up SARS and putting the world at risk. AND minimizing the risk than if they have been acknowledging it candidly and compassionately.
Privileging ontology and epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments.
Owen 2 (university of Southampton, David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7) Commenting on the ’philosophical turn’ in IR, Wæver remarks that ’~a~ AND the first and second dangers, and so a potentially vicious circle arises.
There’s no one root cause of war
Sharp 8 – senior associate deputy general counsel for intelligence at the US Department of Defense, Dr. Walter, "Democracy and Deterrence", Air Force University Press, May, http://aupress.maxwell.af.mil/Books/sharp/Sharp.pdf While classical liberals focused on political structures, socialists analyzed the socioeconomic system of states AND to serve as a central paradigm for explaining the cause of war.37
W/M – We limit the president’s authority to determine those responsible for 9/11 in the AUMF.
Bradley 26 Goldsmith 2005 ~- Curtis 26 - Jack, Professors at University of Virginia and Harvard Law Schools Respectively, CONGRESSIONAL AUTHORIZATION AND THE WAR ON TERRORISM, Harvard Law Review, Volume 118, May 2005~
The AUMF is arguably more restrictive in one respect, and argua-bly broader AND of facts related to the exercise of his authority under the AUMF.147
Counter interp- increase can be a positive change from zero
WORDS AND PHRASES, 2007 CUMULATIVE SUPPLEMENTARY PAMPHLET, Vol. 20A, 07, 76. Increase: Salary change of from zero to 2412,000 and 241,200 annually for mayor and councilmen respectively was an "increase" in salary and not merely the fixing of salary. King v. Herron, 243 S.E.2d36, 241 Ga. 5.
My general conclusions are that the President should have a great deal of ¶ discretion AND when Congress has authorized ¶ the President to protect the nation’s security.8
PTX
Won’t pass—-Boehner irrelevant
Adam O’Neal 12-23, December 23rd, 2013, "Immigration reform in 2014? Not so fast," https://www.humanevents.com/2013/12/23/immigration-reform-in-2014-not-so-fast/ A California-based immigration reform activist, who spoke to CalWatchdog.com on AND his tune. But that doesn’t mean he’ll change his strategy just yet.
Plan boosts Obama’s capital
Douglas Kriner 10, Assistant Profess of Political Science at Boston University, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60 Presidents and politicos alike have long recognized Congress’s ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36
President Obama kicked off the long Memorial Day weekend with a speech which had a AND power for the federal legislative branch to review and restrain the president’s actions.
PC not key
Greg Sargent 13, "Syria won’t make GOP’s immigration problem go "poof" and disappear ; Syria or no Syria, Republicans will still pay the same price among Latinos if they kill reform," 9/12, Washington Post, Factiva But when it comes to immigration — as with this fall’s fiscal fights — that AND Beltway-generated ideas about Obama’s "standing" — as mitigating factors?
Obama’s PC is dead and he’s not using it anyway—-and minimum wage, education, and climate change thump
In 2013, Obama’s critics doubled down. Fractured Republicans, swore off compromise. AND dismal standings in the polls suggest he can’t count on a public groundswell.
No impact—threat overestimated and global warming is solved by adaptation and mitigation.
Mendelsohn 9, (Robert O. the Edwin Weyerhaeuser Davis Professor, Yale School of¶ Forestry and Environmental Studies, Yale University, June 2009, "Climate Change and¶ Economic Growth," online: http://www.growthcommission.org/storage/cgdev/documents/¶ gcwp060web.pdf
The heart of the debate about climate change comes from a number of warnings from AND range climate risks. What is needed are long-run balanced responses.
CP
Perm- do the plan and the counterplan- solves the link to politics
Corcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President’s future controversial policy changes.
CP doesn’t solve terrorism or legitimacy and links to politics
Having the intelligence committees publicly on board helps, but what the administration really needs AND at that point the administration will wish it had gone to Congress sooner.
K
No root causes of war; and war fuels structural violence, no the other way around
Goldstein ’1 IR professor at American University (Joshua, War and Gender, p. 412, Google Books)
First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
Hardline militarism key to check war and terrorism. Alt uniquely trigger thems
Epstein 2 (alex, fellow at ayn rand institute, "Peacenik Warmongers," online)
If dropping bombs won’t work, what should the United States do to obtain a AND favor of the wish that laying down our arms will achieve peace somehow.
Hardline militarism is good - prevents greater casualties
The twentieth century should have taught the citizens of liberal democracies the catastrophic consequences of AND promised the Western and Christian Iberians ruin for the Crusades and the Reconquista.
A revised AUMF can certainly reference the 9/11 attacks. But my view AND year-old AUMF, then it is likely to happen very soon.
SQ is unrestricted, aff restricts
Hedges ’12 (American journalist specializing in American politics and society) Chris http://www.truth-out.org/news/item/6123:why-iE28099m-suing-barack-obama Attorneys Carl J. Mayer and Bruce I. Afran filed a complaint Friday in AND no longer use the word "democracy" to describe our political system.
Congress could instead authorize the president to use force against specified¶ terrorist groups and AND one that, among our three options, most restricts presidential¶ discretion.