1AC - Ban OCOs Arms Race Alliances 1NC - XO Debt Ceiling T-Prohibit Case 2NR - Debt Ceiling Case
Kentucky
4
Opponent: James Madison GP | Judge: Sean Kennedy
aff - cyber with arms race and alliances 1NC - Taoism K Brecher CP debt ceiling DA case block - everything 2NR - Taoism 2AR - condo
Kentucky
5
Opponent: Lakeland LL | Judge: Scott Elliott
aff - cyber with arms race and alliances 1NC - Risk K Baudrillard Case Block - Risk K and Baudrillard 2NR - Risk K
Kentucky
7
Opponent: Missouri State PR | Judge: Al Hiland
Aff - cyber with alliances and arms race 1NC - OLC CP Debt Ceiling DA Flex DA Case Block - everything 2NR - OLC CP Debt Ceiling DA Case
MAC
1
Opponent: Texas SJ | Judge: Wes Dwyer
1AC AUMF 40 1NC Risk K Anthro On Case Terror Reps China Reps Indo Pak Reps 2NC Risk K Reps Ks 1NR Anthro K 2NR Risk K Anthro K
MAC
3
Opponent: Texas HM | Judge: Colin Roark
1AC Cyber - UT 1NC Risk K Nietzsche 2NC Nietzsche 1NR Risk K 2NR Risk K
MAC
6
Opponent: TexasUCO | Judge: Justin Stanley
1AC Cyber - UT 1NC Anthro Cap Abelist Language On Case Chaloupka Pan K Cyber Reps 2NC Cap Chaloupka 1NR Anthro 2NR Anthro 2AR 4 Condo Worlds is a voting issue
UCO
1
Opponent: Kansas KR | Judge: Hageney
1AC - OCOs - Arms Race Allies 1NC - Nietzsche Security Politics EU Soft Power DA Appropriations CP 2NR Appropriations Politics
UCO
3
Opponent: Dartmouth CM | Judge: JKirk
1AC 1AC UCO 1NC Iran PIC XO CP Cred DA Nietzsche Security Case 2NC Iran PIC Case 1NR Cred DA 2NR Iran PIC Case
UCO
6
Opponent: UTSA CR | Judge: Phil Samuels
1AC 1AC UCO 1NC Heidigger Case D 2NC Heidigger 1NR Case D 2NR Heidigger
UMKC
2
Opponent: Whitman LT | Judge: Sarah Topp
1AC - OCO 1NC - XO Debt Ceiling (Iran Strikes Impact) Security K Flex DA 2NR - XOPTX
UMKC
5
Opponent: Oklahoma LS | Judge: Heather Walters
1AC - OCOs 1NC - Heg Bad (On Case) Nietzsche 2NR - Nietzsche
UMKC
7
Opponent: UCO VY | Judge: Matt Munday
1AC 1AC UMKC 1NC Nietzsche T-Ban Death J Case Terror Talk K Heg K Norms K Cybersecurity K Apoc Reps K Nuke Reps K 2NR Nietzche Terror Talk Nuke Reps K
UNLV
1
Opponent: UNLV JS | Judge: Omar Gueverra
1AC - Ban OCOs Arms Race Alliances 1NC - T-Restrict CIR PTX XO CP Cyberdeterrence DA 2NR - PTX Case
UNLV
3
Opponent: Oklahoma YR | Judge: Michael Einstadt
1AC 1AC UNLV - Ban OCOs Arms Race Alliances 1NC Natives K 2NR Natives K
UNLV
5
Opponent: Trinity VR | Judge: Brian McBride
1AC 1AC UNLV Ban OCOs Arms Race Alliances 1NC Anthro Legalism Case Pan K Apoc Rhetoric K 2NR Legalism K
UNT
1
Opponent: Wyoming BC | Judge: Shelby Pryor
1AC AUMF 1NC T-Prohibit Nietzsche Case 2NC Case Nietzsche 1NR More Nietzsche 2NR Nietzsche
UNT
6
Opponent: Indiana FH | Judge: Natalie Pennington
1AC AUMF 1NC T-Prohibit Security K Abelism K 2NC Security K 1NR Case 2NR Security Case
UNT
Doubles
Opponent: Georgia State FF | Judge: Kearny, Haynal, Tomik
1AC OCOs - K 1NC Soldier K Title 50 T 2NC Soldier K 1NR Title 50 T 2NR Soldier K
UT
2
Opponent: Texas KS | Judge: Erik Mathis
1AC Cyber - Texas 1NC Death K Risk K T-Prohibit Case 2NC Death K Case 1NR Risk K 2NR Death K
UT
3
Opponent: Whitman BM | Judge: Ozzy
1AC AUMF 40 1NC Security K TPA DA T-Prohibit XO CP Case 2NC Security K Case 1NR Case 2NR Security K Case
UTD
1
Opponent: UNI AE | Judge: Natalie Pennington
1AC - Ammend the AUMF 1NC - Anthro "Indefinite" PIC Case 2NC - Anthro Case 1NR - Anthro 2NR - Anthro
UTD
6
Opponent: KState KM | Judge: Kearny, Mike
1AC AUMF 1NC Farm Bill PTX T-Prohibit Flex DA Legalism AUMF Repeal DA Case
UTD
3
Opponent: Wyoming MP | Judge: Rob Burns
1AC AUMF 1NC XO CP CIR PTX Flex DA Irigiray K Case 2NC Irigiray 1NR Case 2NR Irigiray
Wake Forest
1
Opponent: UNT KA | Judge: Kyla Sommers
1AC - OCOs Arms Race Alliances 1NC - Cap K Chow K Case 2NC - Cap K Case 1NR - Chow K 2NR - Cap K Apoc Rhetoric K
Wake Forest
3
Opponent: George Washington NS | Judge: Mikaela Maslin
1AC - OCOS Arms Race Alliances 1NC - Security K T-Prohibit CIR Iran DA XO CP Case 2NC - Security K 1NR - Case 2NR - Security K Case
Wake Forest
5
Opponent: KCKCC FG | Judge: Steiner, Rebecca
1AC OCOs Arms Allies 1NC First Response to Harvard K 2NC First Response Case 1NR First Response 2NR First Response Case
Wake Forest
7
Opponent: NYU DD | Judge: D Stout
1AC- OCOs Arms Race Allies 1NC Politics (Iran) DoD Shift CP Psychoanalysis K T-Restrict Flex DA 2NC Flex DA T-Restrict Case 1NR Politics DoD Shift CP 2NR Case DoD Shift CP Politics
Wichita State
1
Opponent: Kansas BC | Judge: Dan Stout
1AC AUMF 40 1NC Iran PTX QDR CP T-Increase Death K Legalism K 2NC Legalism 1NR Death K Case 2NR Legalism Death K Case
Wichita State
4
Opponent: UTD LO | Judge: Ermo
1AC AUMF 40 1NC T-Prohibit Iran Politics Legalism SunsetConsult CP Flex DA Case 2NC Flex DA SunsetConsult CP Case 1NR Politics Case 2NR Sunset Consult CP Flex DA Politics
Wichita State
6
Opponent: MoState HP | Judge: Kelly Winfrey
1AC AUMF 40 1NC OLC CP Iran PTX Security K Case 2NC OLC CP Security K 1NR Case
Wichita State
7
Opponent: Kansas MR | Judge: Corey Stone
1AC AUMF 40 1NC T-Increase TPA politics QDR CP Security K Case 2NC T-Increase Case 1NR TPA Politics Case 2NR T-Increase
1AC AUMF - Octos 1NC QDR CP TPA Politics Security K T-Increase 2NC Security K 1NR Case 2NR Security K Case
To modify or delete round reports, edit the associated round.
Cites
Entry
Date
1AC - AUMF - 40
Tournament: Wichita State | Round: 1 | Opponent: Kansas BC | Judge: Dan Stout Adv. 1 Terrorism US is losing the War on Terrorism due to the proliferation of extra-AUMF Al Qaeda affiliates Kagan, 13 Frederick W., Christopher DeMuth Chair and Director, Critical Threats Project, American Enterprise Institute, “The Continued Expansion of Al Qaeda Affiliates and their Capabilities”, Statement before the House Committee on Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade On “Global al-Qaeda: Affiliates, Objectives, and Future Challenges”, 7/18/13, http://www.criticalthreats.org/al-qaeda/kagan-continued-expansion-al-qaeda-affiliates-capabilities-july-18-2013, BJM
The war against al Qaeda is not going well. Afghanistan has seen the most AND former while observing the latter to ensure that they do not change course. Current AUMF ambiguity undermines effective counter-terrorism efforts against affiliates Chesney et al. ‘13 Robert Chesney is a ¶ professor at the University ¶ of Texas School of Law, a ¶ nonresident senior fellow ¶ of the Brookings Institution, ¶ and a distinguished scholar ¶ at the Robert S. Strauss ¶ Center for International ¶ Security and Law. He is a ¶ cofounder and contributor to ¶ the Lawfare Blog and writes ¶ frequently on topics relating ¶ to US counterterrorism ¶ policy and law. Jack Goldsmith is the Henry ¶ L. Shattuck Professor of ¶ Law at Harvard Law School ¶ and a member of the Hoover ¶ Institution’s Jean Perkins ¶ Task Force on National ¶ Security and Law. He served ¶ in the Bush administration as ¶ assistant attorney general, ¶ Office of Legal Counsel, from ¶ 2003 to 2004 and as special ¶ counsel to the general ¶ counsel from 2002 to 2003. Matthew C. Waxman ¶ is a professor of law at ¶ Columbia Law School, ¶ an adjunct senior fellow ¶ at the Council on Foreign ¶ Relations, and a member ¶ of the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law. He previously served ¶ in senior positions at the ¶ State Department, Defense ¶ Department, and National ¶ Security Council. Benjamin Wittes is a senior ¶ fellow in governance ¶ studies at the Brookings ¶ Institution, a member of ¶ the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law, and the editor in chief ¶ of the Lawfare Blog. Jean Perkins Task Force on National Security and Law. http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf ETB
The September 2001 AUMF provides for the use of force against the entity ¶ responsible AND should ¶ do anything about this situation, and if so precisely what. We’re at a turning point- the US must pivot to address the threat from al Qaeda affiliates. Congressional action is key because it provides legitimacy that induces public support for counter terrorism and international cooperation against terrorism Wainstein ‘13 STATEMENT OF ¶ KENNETH L. WAINSTEIN, PARTNER ¶ CADWALADER, WICKERSHAM and TAFT LLP ¶ BEFORE THE ¶ COMMITTEE ON FOREIGN RELATIONS ¶ UNITED STATES SENATE ¶ CONCERNING ¶ COUNTERTERRORISM POLICIES AND PRIORITIES: ¶ ADDRESSING THE EVOLVING THREAT ¶ PRESENTED ON ¶ MARCH 20, 2013. http://www.foreign.senate.gov/imo/media/doc/Wainstein_Testimony.pdf ETB
It has recently become clear, however, that the Al Qaeda threat that occupied AND is so critical to the success of our combined efforts against international terrorism.
We control the uniqueness- executive terror fatigue is creating sluggish responses and gutting info-sharing and cooperation- updating the AUMF is critical to revitalizing the executive and defeating afiliates
Leiter ‘13 The Honorable Michael E. Leiter ¶ Director, National Counterterrorism Center (2007-2011) ¶ Senior Counselor to the Chief Executive Officer, Palantir Technologies ¶ ?????¶ Testimony before the United States Senate ¶ Committee on Foreign Relations ¶ Counterterrorism Policies and Priorities: Addressing the Evolving Threat ¶ March 20, 2013. ETB
Today al?Qa‘ida and its allies in Pakistan are at their weakest AND biological weapons in places where they would do the most ¶ harm. Turning the tide is critical – al-Qaeda affiliates pose a high risk of nuclear and biological terrorism
Morgan 09 (Professor of Foreign Studies at Hankuk University, Dennis Ray, December, “World on fire: two scenarios of the destruction of human civilization and possible extinction of the human race” Futures, Vol 41 Issue 10, p 683-693, ScienceDirect)
In a remarkable website on nuclear war, Carol Moore asks the question “Is AND those steps and start through the accidental or reckless use of strategic weapons.
High risk of nuke terror Vladimir Z. Dvorkin ‘12 Major General (retired), doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences AND a common understanding of these threats and develop a strategy to combat them.
Of all the weapons of mass destruction, the genetically engineered biological weapons, many AND Can we imagine hundreds of such plagues? HUMAN EXTINCTION IS NOW POSSIBLE.
New gene manipulation takes out their defense
MSNBC 2011 (“Clinton warns of bioweapon threat from gene tech,” pg online @ http://www.msnbc.msn.com/id/45584359/ns/… “For an international verification system — akin to that for nuclear weapons — saying it is too complicated to monitor every lab's activities.”)
GENEVA — New gene assembly technology that offers great benefits for scientific research could also AND saying it is too complicated to monitor every lab's activities around the world.
Adv. 2 Firebreaks The AUMF will inevitably expire in the squo – updating the authorization is key to prevent a limitless War on Terror based on article 2 and self-defense justifications that undermine US legitimacy and erode the global firebreak against use of force
The AUMF must inevitably expire because it is expressly linked to the September 11, AND the continued successful targeting of Al Qaeda members, is rapidly approaching zero. We control terminal impact uniqueness - war taboo strong and effective now. Norms prevents miscalc and escalation Beehner, 12 Council on Foreign Relations senior writer; Truman National Security Project fellow Lionel, "Is There An Emerging ‘Taboo’ Against Retaliation?" The Smoke Filled Room, 7-13-12, thesmokefilledroomblog.com/2012/07/13/is-there-an-emerging-taboo-against-retaliation/, accessed 9-22-13,
The biggest international news in the quiet months before 9/11 was the collision AND hostilities. To do otherwise would be a violation of this existing norm. Specifically, erosion of the use of force taboo triggers nuclear conflict between India and Pakistan and China and Taiwan Obayemi, 6 East Bay Law School professor Olumide, admitted to the Bars of Federal Republic of Nigeria and the State of California, Golden Gate University School of Law, "Article: Legal Standards Governing Pre-Emptive Strikes and Forcible Measures of Anticipatory Self-Defense Under the U.N. Charter and General International Law," 12 Ann. Surv. Int'l and Comp. L. 19, l/n, accessed 9-19-13,
The United States must abide by the rigorous standards set out above that are meant AND . This is the essence of the preamble to the United Nations Charter. Indo-Pak nuclear war causes extinction Starr ’11 (Consequences of a Single Failure of Nuclear Deterrence by Steven Starr February 07, 2011 * Associate member of the Nuclear Age Peace Foundation * Senior Scientist for PSR)
Only a single failure of nuclear deterrence is required to start a nuclear war, AND the currently operational and deployed U.S. and Russian nuclear forces.
So does China-Taiwan Straits Times 2k (6-25, Lexis, No one gains in war over Taiwan)
THE DOOMSDAY SCENARIO THE high-intensity scenario postulates a cross-strait war escalating AND cannot be ruled out entirely, for China puts sovereignty above everything else. Plan The United States federal government should increase restrictions on the targeted killing and indefinite detention war powers authorities granted to the President of the United States by Public Law 107-40 and modified by the 2012 National Defense Authorization Act by limiting the targets of those authorities to al-Qaeda, the Taliban, or those nations, organizations, or persons who enjoy close and well-established collaboration with al-Qaeda or the Taliban. Solvency Action to clearly define the enemy restricts the executive scope of the AUMF while preserving presidential flexibility and the joint decision-making capabilities Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
The AUMF must be updated. In 2001, the AUMF authorized force to ¶ AND those nations that present the greatest threat to the United States ¶ today.
Obama will adhere to the plan- wants to rely on congressional authority
Congress has moved to block President Obama’s plan to shift control of the U. AND focus to traditional intelligence gathering and possibly bringing more transparency to drone strikes.
1/25/14
1AC - AUMF - Octos WSU
Tournament: Wichita State | Round: Octas | Opponent: Kansas KS | Judge: Tews, Munday, Ziegler Adv 1 – Terrorism US is losing the War on Terrorism due to the proliferation of extra-AUMF Al Qaeda affiliates Kagan, 13 Frederick W., Christopher DeMuth Chair and Director, Critical Threats Project, American Enterprise Institute, “The Continued Expansion of Al Qaeda Affiliates and their Capabilities”, Statement before the House Committee on Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade On “Global al-Qaeda: Affiliates, Objectives, and Future Challenges”, 7/18/13, http://www.criticalthreats.org/al-qaeda/kagan-continued-expansion-al-qaeda-affiliates-capabilities-july-18-2013, BJM
The war against al Qaeda is not going well. Afghanistan has seen the most AND former while observing the latter to ensure that they do not change course.
The president must use the AUMF to define who he can strike Bradley and Goldsmith ‘5 - Curtis and - Jack, Professors at University of Virginia and Harvard Law Schools Respectively, CONGRESSIONAL AUTHORIZATION AND THE WAR ON TERRORISM, Harvard Law Review, Volume 118, May 2005
The AUMF is arguably more restrictive in one respect, and argua-bly broader AND of facts related to the exercise of his authority under the AUMF.147
Current AUMF ambiguity undermines effective counter-terrorism efforts against affiliates Chesney et al. ‘13 Robert Chesney is a ¶ professor at the University ¶ of Texas School of Law, a ¶ nonresident senior fellow ¶ of the Brookings Institution, ¶ and a distinguished scholar ¶ at the Robert S. Strauss ¶ Center for International ¶ Security and Law. He is a ¶ cofounder and contributor to ¶ the Lawfare Blog and writes ¶ frequently on topics relating ¶ to US counterterrorism ¶ policy and law. Jack Goldsmith is the Henry ¶ L. Shattuck Professor of ¶ Law at Harvard Law School ¶ and a member of the Hoover ¶ Institution’s Jean Perkins ¶ Task Force on National ¶ Security and Law. He served ¶ in the Bush administration as ¶ assistant attorney general, ¶ Office of Legal Counsel, from ¶ 2003 to 2004 and as special ¶ counsel to the general ¶ counsel from 2002 to 2003. Matthew C. Waxman ¶ is a professor of law at ¶ Columbia Law School, ¶ an adjunct senior fellow ¶ at the Council on Foreign ¶ Relations, and a member ¶ of the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law. He previously served ¶ in senior positions at the ¶ State Department, Defense ¶ Department, and National ¶ Security Council. Benjamin Wittes is a senior ¶ fellow in governance ¶ studies at the Brookings ¶ Institution, a member of ¶ the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law, and the editor in chief ¶ of the Lawfare Blog. Jean Perkins Task Force on National Security and Law. http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf ETB
The September 2001 AUMF provides for the use of force against the entity ¶ responsible AND should ¶ do anything about this situation, and if so precisely what. We’re at a turning point- the US must pivot to address the threat from al Qaeda affiliates. Congressional action is key because it provides legitimacy that induces public support for counter terrorism and international cooperation against terrorism Wainstein ‘13 STATEMENT OF ¶ KENNETH L. WAINSTEIN, PARTNER ¶ CADWALADER, WICKERSHAM and TAFT LLP ¶ BEFORE THE ¶ COMMITTEE ON FOREIGN RELATIONS ¶ UNITED STATES SENATE ¶ CONCERNING ¶ COUNTERTERRORISM POLICIES AND PRIORITIES: ¶ ADDRESSING THE EVOLVING THREAT ¶ PRESENTED ON ¶ MARCH 20, 2013. http://www.foreign.senate.gov/imo/media/doc/Wainstein_Testimony.pdf ETB
It has recently become clear, however, that the Al Qaeda threat that occupied AND is so critical to the success of our combined efforts against international terrorism.
Turning the tide is critical – al-Qaeda affiliates pose a high risk of nuclear and biological terrorism
Morgan 09 (Professor of Foreign Studies at Hankuk University, Dennis Ray, December, “World on fire: two scenarios of the destruction of human civilization and possible extinction of the human race” Futures, Vol 41 Issue 10, p 683-693, ScienceDirect)
In a remarkable website on nuclear war, Carol Moore asks the question “Is AND those steps and start through the accidental or reckless use of strategic weapons.
High risk of nuke terror Vladimir Z. Dvorkin ‘12 Major General (retired), doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences AND a common understanding of these threats and develop a strategy to combat them. Bioweapons are imminent and cause extinction – they’re easily obtainable and overwhelm the best defenses Myhrvold 13 Myhrvold, July 2013 Nathan, formerly Chief Technology Officer at Microsoft, is co-founder of Intellectual Ventures—one of the largest patent holding companies in the world, “Strategic Terrorism: A Call to Action”, The Lawfare Research Paper Series Research paper NO . 2, http://www.lawfareblog.com/wp-content/uploads/2013/07/Strategic-Terrorism-Myhrvold-7-3-2013.pdf, BJM
Biotechnology is advancing so rapidly that it is hard to keep track of all the AND cause compares with that of other calamities that the human race has faced.
Adv 2 – NEW ADV
Failure to clarify the targeting authority of the AUMF leads to proliferation of destabilizing interpretations of international law
Barnes ‘12 Beau, J.D., Boston University School of Law (expected May 2013); M.A. in Law and ¶ Diplomacy (expected May 2013), The Fletcher School of Law and Diplomacy at Tufts ¶ University; B.A., 2006, Lewis and Clark College. Military law Review vol. 221. https://www.jagcnet.army.mil/DOCLIBS/MILITARYLAWREVIEW.NSF/0/b7396120928e9d5e85257a700042abb5/$FILE/By20Beau20D.20Barnes.pdf ETB ¶ A new AUMF is the best option available to U.S. policymakers AND interpretations that sap American democracy and diminish U.S. national security.
Ambiguity of the AUMF’s targeting spills over to major violations of international law abroad
The Obama administration has offered several possible legal rationales for drone strikes, but with AND a way that is likely to lead to serious violations of international law. One possible rationale for drone strikes comes from international humanitarian law governing armed hostilities. AND summary killing if the target were walking the streets of London or Paris. John Brennan has said that as a matter of policy the administration has an “ AND that are less respectful than we would want of the fundamental rights involved. Moreover, away from a traditional battlefield, international human rights law requires the capture AND China recently considered using a drone to kill a drug trafficker in Burma.
Absent effective international law – nuclear war is inevitable Damrosch and Mullerson 95 (Lori Fisler Damrosch, Henry L Moses Professor of International Law and Organization Columbia, Rein Müllerson, Professor of International Law, Columbia, 1995, “King’s, Beyond Confrontation, International Law for the Post-Cold War Era,” p. 2-3MRG) The contemporary world has an ever increasing need for an international legal system that can AND with the U.N. Charter and other norms of international law.
ILAW is inevitable but US engagement is critical to its effectiveness Deller 02 (Nicole Deller, J.D., has a law degree from New York University School of Law. She is program advisor for the World Federalist Movement and chairs the Committee on International Security Affairs for the Association of the Bar of the City of New York. She is editor of ‘Rule of Power or Rule of Law?’ research associate and consultant for the Lawyers’ Committee on Nuclear, “Rule of Power or Rule of Law?” 2002, http://lcnp.org/pubs/exesummary.pdf//MRG) The evolution of international law …state has followed the U.S. example and opted out of compliance.
Global cooperation solves multiple existential threats Joseph Nye 8 is professor of international relations at Harvard University, “American Power After the Financial Crises,” http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Power always depends on context, and in today's world, it is distributed in AND even the largest country cannot achieve its aims without the help of others. Independently, adhering the targeting of the AUMF to international law norms is critical to allied relations
Chesney et al. ‘13 Robert Chesney is a ¶ professor at the University ¶ of Texas School of Law, a ¶ nonresident senior fellow ¶ of the Brookings Institution, ¶ and a distinguished scholar ¶ at the Robert S. Strauss ¶ Center for International ¶ Security and Law. He is a ¶ cofounder and contributor to ¶ the Lawfare Blog and writes ¶ frequently on topics relating ¶ to US counterterrorism ¶ policy and law. Jack Goldsmith is the Henry ¶ L. Shattuck Professor of ¶ Law at Harvard Law School ¶ and a member of the Hoover ¶ Institution’s Jean Perkins ¶ Task Force on National ¶ Security and Law. He served ¶ in the Bush administration as ¶ assistant attorney general, ¶ Office of Legal Counsel, from ¶ 2003 to 2004 and as special ¶ counsel to the general ¶ counsel from 2002 to 2003. Matthew C. Waxman ¶ is a professor of law at ¶ Columbia Law School, ¶ an adjunct senior fellow ¶ at the Council on Foreign ¶ Relations, and a member ¶ of the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law. He previously served ¶ in senior positions at the ¶ State Department, Defense ¶ Department, and National ¶ Security Council. Benjamin Wittes is a senior ¶ fellow in governance ¶ studies at the Brookings ¶ Institution, a member of ¶ the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law, and the editor in chief ¶ of the Lawfare Blog. Jean Perkins Task Force on National Security and Law. http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf ETB
Third are the international costs of a renewed AUMF. This is a complex issue AND persuading allies that the U.S. position is a reasonable one.
Alliances prevent nuclear war---key to burden sharing Douglas Ross 99 is professor of political science at Simon Fraser University, Winter 1998/1999, Canada’s functional ¶ isolationism and the future of weapons of mass destruction, International Journal, p. lexis Thus, an easily accessible tax base has long been available for spending much more AND world community have any plausible hope of avoiding warfare involving nuclear or other WMD
The United States federal government should statutorily prohibit the president from using indefinite detention and targeted killing war powers authorities granted to the President of the United States by Public Law 107-40 and modified by the 2012 National Defense Authorization Act, except on members of al-Qaeda, the Taliban, or those nations, organizations, or persons who enjoy close and well-established collaboration with al-Qaeda or the Taliban. Solvency
Action to clearly define the enemy restricts the executive scope of the AUMF while preserving presidential flexibility and the joint decision-making capabilities Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
The AUMF must be updated. In 2001, the AUMF authorized force to ¶ AND those nations that present the greatest threat to the United States ¶ today.
Obama will adhere to the plan- wants to rely on congressional authority
Congress has moved to block President Obama’s plan to shift control of the U. AND focus to traditional intelligence gathering and possibly bringing more transparency to drone strikes.
Courts does interpret and will interpret Associated Forces broadly now, based on the NDAA Elsea and Garcia 13 Jennifer K, Legislative Attorney, Michael J, Legislative Attorney, CRS Report, The National Defense Authorization Act for FY2012 and Beyond: Detainee Matters, August 7th, 2013 https://www.fas.org/sgp/crs/natsec/R42143.pdf#SPS
In its 2009 brief, the government indicated that the definition of “associated forces AND have in the past in order to comport with the plain text meaning.
No formal definition is assumed to be a broad definition Elsea and Garcia 13 Jennifer K, Legislative Attorney, Michael J, Legislative Attorney, CRS Report, The National Defense Authorization Act for FY2012 and Beyond: Detainee Matters, August 7th, 2013 https://www.fas.org/sgp/crs/natsec/R42143.pdf#SPS
In restating the definitional standard the Administration uses to characterize its detention ¶ authority, AND associated forces” or a description of what constitutes “substantial support.”
NDAA Section 1022 provides a definition – definitely bigger than our “Associated Forces” Elsea and Garcia 13 Jennifer K, Legislative Attorney, Michael J, Legislative Attorney, CRS Report, The National Defense Authorization Act for FY2012 and Beyond: Detainee Matters, August 7th, 2013 https://www.fas.org/sgp/crs/natsec/R42143.pdf#SPS Section 1022 applies both to members of Al Qaeda and “associated forces.”87 AND terrorist with no ties to Al Qaeda or any ¶ associated force. Military will adhere to the plan Dunlap ‘12 Maj. Gen. Charles J. Dunlap Jr. (Ret.), Professor of the Practice of Law¶ Executive Director, Center on Law, Ethics and National Security @ Duke. In Patriot Debates: Contemporary Issues in National Security Law. http://www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html ETB
This raises an important question: Should America wage war— cyber or otherwise AND because they have hard experience with the consequences of failing to do so.
1/27/14
1AC - Amend The AUMF
Tournament: UTD | Round: 1 | Opponent: UNI AE | Judge: Natalie Pennington 1AC Adv. 1 Terrorism US is losing the War on Terrorism due to the proliferation of extra-AUMF Al Qaeda affiliates Kagan, 13 Frederick W., Christopher DeMuth Chair and Director, Critical Threats Project, American Enterprise Institute, “The Continued Expansion of Al Qaeda Affiliates and their Capabilities”, Statement before the House Committee on Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade On “Global al-Qaeda: Affiliates, Objectives, and Future Challenges”, 7/18/13, http://www.criticalthreats.org/al-qaeda/kagan-continued-expansion-al-qaeda-affiliates-capabilities-july-18-2013, BJM
The war against al Qaeda is not going well. Afghanistan has seen the most AND former while observing the latter to ensure that they do not change course. Current AUMF ambiguity undermines effective counter-terrorism efforts against affiliates Chesney et al. ‘13 Robert Chesney is a ¶ professor at the University ¶ of Texas School of Law, a ¶ nonresident senior fellow ¶ of the Brookings Institution, ¶ and a distinguished scholar ¶ at the Robert S. Strauss ¶ Center for International ¶ Security and Law. He is a ¶ cofounder and contributor to ¶ the Lawfare Blog and writes ¶ frequently on topics relating ¶ to US counterterrorism ¶ policy and law. Jack Goldsmith is the Henry ¶ L. Shattuck Professor of ¶ Law at Harvard Law School ¶ and a member of the Hoover ¶ Institution’s Jean Perkins ¶ Task Force on National ¶ Security and Law. He served ¶ in the Bush administration as ¶ assistant attorney general, ¶ Office of Legal Counsel, from ¶ 2003 to 2004 and as special ¶ counsel to the general ¶ counsel from 2002 to 2003. Matthew C. Waxman ¶ is a professor of law at ¶ Columbia Law School, ¶ an adjunct senior fellow ¶ at the Council on Foreign ¶ Relations, and a member ¶ of the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law. He previously served ¶ in senior positions at the ¶ State Department, Defense ¶ Department, and National ¶ Security Council. Benjamin Wittes is a senior ¶ fellow in governance ¶ studies at the Brookings ¶ Institution, a member of ¶ the Hoover Institution’s ¶ Jean Perkins Task Force ¶ on National Security and ¶ Law, and the editor in chief ¶ of the Lawfare Blog. Jean Perkins Task Force on National Security and Law. http://media.hoover.org/sites/default/files/documents/Statutory-Framework-for-Next-Generation-Terrorist-Threats.pdf ETB
The September 2001 AUMF provides for the use of force against the entity ¶ responsible AND should ¶ do anything about this situation, and if so precisely what. We’re at a turning point- the US must pivot to address the threat from al Qaeda affiliates. Congressional action is key because it provides legitimacy that induces public support for counter terrorism and international cooperation against terrorism Wainstein ‘13 STATEMENT OF ¶ KENNETH L. WAINSTEIN, PARTNER ¶ CADWALADER, WICKERSHAM and TAFT LLP ¶ BEFORE THE ¶ COMMITTEE ON FOREIGN RELATIONS ¶ UNITED STATES SENATE ¶ CONCERNING ¶ COUNTERTERRORISM POLICIES AND PRIORITIES: ¶ ADDRESSING THE EVOLVING THREAT ¶ PRESENTED ON ¶ MARCH 20, 2013. http://www.foreign.senate.gov/imo/media/doc/Wainstein_Testimony.pdf ETB
It has recently become clear, however, that the Al Qaeda threat that occupied AND is so critical to the success of our combined efforts against international terrorism.
Turning the tide is critical – al-Qaeda affiliates pose a high risk of nuclear and biological terrorism
Morgan 09 (Professor of Foreign Studies at Hankuk University, Dennis Ray, December, “World on fire: two scenarios of the destruction of human civilization and possible extinction of the human race” Futures, Vol 41 Issue 10, p 683-693, ScienceDirect)
In a remarkable website on nuclear war, Carol Moore asks the question “Is AND those steps and start through the accidental or reckless use of strategic weapons.
High risk of nuke terror Vladimir Z. Dvorkin ‘12 Major General (retired), doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences AND a common understanding of these threats and develop a strategy to combat them.
Bioattack causes extinction
Steinbrenner 97 (John D. Steinbrenner, Brookings Senior Fellow, 1997, Foreign Policy, "Biological weapons: a plague upon all houses," Winter, InfoTrac)
Although human pathogens are often lumped with nuclear explosives and lethal chemicals as potential weapons AND this might be, since there is no way to measure it reliably.
New gene manipulation takes out their defense
MSNBC 2011 (“Clinton warns of bioweapon threat from gene tech,” pg online @ http://www.msnbc.msn.com/id/45584359/ns/… “For an international verification system — akin to that for nuclear weapons — saying it is too complicated to monitor every lab's activities.”)
GENEVA — New gene assembly technology that offers great benefits for scientific research could also AND saying it is too complicated to monitor every lab's activities around the world.
Adv. 2 Firebreaks The AUMF will inevitably expire in the squo – updating the authorization is key to prevent a limitless War on Terror based on article 2 and self-defense justifications that undermine US legitimacy and erode the global firebreak against use of force
The AUMF must inevitably expire because it is expressly linked to the September 11, AND the continued successful targeting of Al Qaeda members, is rapidly approaching zero. We control terminal impact uniqueness - war taboo strong and effective now. Norms prevents miscalc and escalation Beehner, 12 Council on Foreign Relations senior writer; Truman National Security Project fellow Lionel, "Is There An Emerging ‘Taboo’ Against Retaliation?" The Smoke Filled Room, 7-13-12, thesmokefilledroomblog.com/2012/07/13/is-there-an-emerging-taboo-against-retaliation/, accessed 9-22-13,
The biggest international news in the quiet months before 9/11 was the collision AND hostilities. To do otherwise would be a violation of this existing norm. Specifically, erosion of the use of force taboo triggers nuclear conflict between India and Pakistan and China and Taiwan Obayemi, 6 East Bay Law School professor Olumide, admitted to the Bars of Federal Republic of Nigeria and the State of California, Golden Gate University School of Law, "Article: Legal Standards Governing Pre-Emptive Strikes and Forcible Measures of Anticipatory Self-Defense Under the U.N. Charter and General International Law," 12 Ann. Surv. Int'l and Comp. L. 19, l/n, accessed 9-19-13,
The United States must abide by the rigorous standards set out above that are meant AND . This is the essence of the preamble to the United Nations Charter. Indo-Pak nuclear war causes extinction Starr ’11 (Consequences of a Single Failure of Nuclear Deterrence by Steven Starr February 07, 2011 * Associate member of the Nuclear Age Peace Foundation * Senior Scientist for PSR)
Only a single failure of nuclear deterrence is required to start a nuclear war, AND the currently operational and deployed U.S. and Russian nuclear forces.
So does China-Taiwan Straits Times 2k (6-25, Lexis, No one gains in war over Taiwan)
THE DOOMSDAY SCENARIO THE high-intensity scenario postulates a cross-strait war escalating AND cannot be ruled out entirely, for China puts sovereignty above everything else. Plan The United States federal government should increase restrictions on the targeted killing and indefinite detention war powers authorities granted to the President of the United States by Public Law 107-40 and modified by the 2012 National Defense Authorization Act by limiting the targets of those authorities to al-Qaeda, the Taliban, or those nations, organizations, or persons who enjoy close and well-established collaboration with al-Qaeda or the Taliban.
Solvency Action to clearly define the enemy restricts the executive scope of the AUMF while preserving presidential flexibility and the joint decision-making capabilities Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
The AUMF must be updated. In 2001, the AUMF authorized force to ¶ AND those nations that present the greatest threat to the United States ¶ today.
Obama will adhere to the plan- wants to rely on congressional authority
Obama administration officials, concerned about the legal justifications behind counterterrorism operations, have preferred to rely on congressional authority for the use of force against al Qaeda, seeing such authority as more defensible and acceptable to allies.
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war — there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves
CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow’s wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain."
Congressional constraints of OCOs are key to solve — otherwise nuclear war is inevitable from arms-racing, command and control hacking, crisis instability, and fracturing nuclear agreements
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation— restoring legitimacy to OCOs is key to cyber coalitions
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
The plan is key — it increases key flexibility and secures cyberspace
Lord et al 11 Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf)
The United States should lead a broad, multi-stakeholder international cyber security coalition AND in a way that defends the nation without subverting what it stands for.
Squo offensive cyber doctrine creates a credibility gap that contributes to a perception of US weakness and undermines credibility
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war
Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. "US Hegemony and International Legitimacy," 1-25-10, http://www.routledge.com/books/details/9780415552363/-http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them
In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering AND create a strong force multiplier effect and should be considered a top priority.
China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability
Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, "Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing," Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html-http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war
Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Plan
The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Solvency
First, norm-setting — all eyes are on the U.S. —other countries model our use of OCOs — clear restrictions on use are essential
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key
Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congressionally initiated restriction is necessary to reverse the signal of independent presidential authority— now is key
Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, "Congress’ Role in Cyber Warfare," Journal of National Security Law 26 Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf-http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Congressional restrictions on OCOs send a global signal of cyber leadership that solves reckless use of OCOs
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication
Hansen 26 Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
10/5/13
1AC - Cyber - UT
Tournament: UT | Round: 2 | Opponent: Texas KS | Judge: Erik Mathis Plan The United States federal government should statutorily prohibit the authority of the President of the United States to authorize the preemptive use of offensive cyber-attacks.
Adv- CyberWar
The Squo offensive cyber posture attacks risk retaliatory cycles and arms races Moss 13 Columnist at The Diplomat Trefor Moss is an independent journalist based in Hong Kong. He covers Asian politics, defence and security, and was Asia-Pacific Editor at Jane’s Defence Weekly until 2009, Is Cyber War the New Cold War?, 4/19/13, http://thediplomat.com/2013/04/19/is-cyber-war-the-new-cold-war/2/
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
New rules change the restrained conduct of cyberwar up to this point – grant Obama unfettered power do define the threat – makes a cyber aggression inevitable RT 13 Hacker in chief: Obama given right to launch 'preemptive' cyberattacks, Published time: February 04, 2013 18:39, http://rt.com/usa/obama-us-administration-cyber-435/#SPS
¶ A secret review has concluded that US President Obama has the authority to launch AND now be concluded based on vague intelligence analysis of a 'potential' cyber attack.
It goes nuclear we don’t even have to win escalation -- command and control hacking, crisis instability, and fracturing nuclear agreements all ensure independent nuclear response- congressional restrictions are key to solve Austin, 8/6 Director of Policy Innovation at the EastWest Institute, Costs of American Cyber Superiority, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority. Cyber preemption escalates to a shooting war Clarke 2009 (Richard Clarke, special adviser to the president for cybersecurity in the George W. Bush administration and chairman of Good Harbor Consulting, November/December 2009, “War from Cyberspace,” The National Interest, http://web.clas.ufl.edu/users/zselden/coursereading2011/Clarkecyber.pdf)
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with “kinetic activity.”
That also causes miscalculation of nuclear forces Clark and Andreasen 13 (Richard A. Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001, “Cyberwar’s threat does not justify a new policy of nuclear deterrence” June 14, 2013, http://articles.washingtonpost.com/2013-06-14/opinions/39977598_1_nuclear-weapons-cyber-attack-cyberattacks, KB)
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
Criticizing the probability of our impacts is meaningless – all wars are low probability, what matters is that cyberwar is more likely to escalate than other conflicts, which uniquely warrants academic attention Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND prerequisite to reducing the incidence of cyber¶ con?ict and avoiding cyber war.
Understanding the risks of current US posture reduces the chances of cyber war escalation- worst case assessments are the best preparation
Clarke and Knake ‘10 Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB
In the seminal 1983 movie about computers and war, War Games, ¶ starring AND period of rising ¶ tensions between the U.S. and China.
Arguing against the practices of the USFG in the context of war powers allows for an engaged public that can expose the hypocrisy of the federal government – only focus on specific policy questions can actualize change by making it relevant to policy-makers – Mellor 13 The Australian National University, ANU College of Asia and the Pacific, Department Of International Relations, “Why policy relevance is a moral necessity: Just war theory, impact, and UAVs,” European University Institute, Paper Prepared for BISA Conference 2013, DOA: 8-14-13
This section of the paper considers more generally the need for just war theorists to AND the public engagement and political activism that are necessary for democratic politics.52
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
War fuels structural violence Goldstein 2001 IR professor at American University (Joshua, War and Gender, p. 412, Google Books)
First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
Finally, like with the drone program, President Barack Obama is presiding over the AND The policy itself, the rules for cyber war, will remain concealed.
Our discussion raises awareness of cyber militarism and spills over to policy Owens et al. 09 (WILLIAM A. OWENS, AEA Holdings, Inc AND Regarding U.S. Acquisition and Use of Cyberattack Capabilities”, pdf)
A historical analogy might be drawn to the study of nuclear issues. In many AND in providing education and background is in our view its most important function.
War facilitates racism and xenophobia Rangelov and Kaldor 12 Iavor Rangelov and Mary Kaldor. 2012. Global Security Research Fellow at the Civil Society and Huamn Security Research Unit, Dept of Int’l Development at the Loncon School of Economics and Political Science; Professor of Global Governance and Director of the Civil Society and Human Security Research Unit. Persistent Conflict. Conflict, Security and Development 12:3.
One problem with the literature is the preoccupation with the term ‘con?ict’. The AND , excitement, adventure and perversion, are given free rein in violent contexts
The state must be engaged---action can be reoriented away from past abuses, the alt goes too far Williams and Krause 97 Michael, assistant professor of political science at the University of Southern Maine and Keith, professor of political science at the Graduate Institute of International Studies, associate professor of political science at York University, Critical Security Studies: Concepts and Cases, edited by Krause and Williams, p. xvi
Many of the chapters in this volume thus retain a concern with the centrality of AND of influencing what remains the most structurally capable actor in contemporary world politics. Simulated national security law debates preserve agency and enhance decision-making---avoids cooption Donohue 13 Laura K. Donohue 13, Associate Professor of Law, Georgetown Law, 4/11, “National Security Law Pedagogy and the Role of Simulations”, http://jnslp.com/wp-content/uploads/2013/04/National-Security-Law-Pedagogy-and-the-Role-of-Simulations.pdf
The concept of simulations as an aspect of higher education, or in the law AND undoubtedly necessary, it suggests one potential direction for the years to come.
Thinking about worst-case cyber scenarios is good- key to preparedness and reduces chances of cyber war
Clarke and Knake ‘10 Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB
In the seminal 1983 movie about computers and war, War Games, ¶ starring AND period of rising ¶ tensions between the U.S. and China. Lack of empirical ground isn’t sufficient reason to reject the aff- the 1ac contributes to a better understanding of cyber war even without data
Liff ‘12 Adam P. Liff, Doctoral Candidate, Department of Politics,¶ Princeton University, USA. “Cyberwar: A New ‘Absolute Weapon’? The¶ Proliferation of Cyberwarfare Capabilities and Interstate War,” Journal of Strategic¶ Studies, 35:3, 401-428. ETB
Theorizing about a kind of warfare that has not occurred necessitates¶ a major caveat AND implications of the¶ proliferation of cyberwarfare capabilities for interactions between¶ states. continues in footnote 5 The data that would be necessary for an empirical study either do not exist or are¶ highly classi?ed. Governments, militaries, and private corporations have strong¶ incentives not to reveal information about attacks. Furthermore, as will become clear¶ in the ‘de?ning cyberwarfare’ section below, there is no example of an event in the real¶ world that can indisputably be cited as an occurrence of cyberwarfare.
Solvency Fear of political costs generates complicance
In addition to the constraining influence arising from the internalization of legal norms by executive AND ¶ do not see any normative significance in the legal rule in question.
2/8/14
1AC - OCOs UMKC
Tournament: UMKC | Round: 2 | Opponent: Whitman LT | Judge: Sarah Topp Adv 1- Preemption Status quo offensive cyber operations by the US has set a precedent that is being modeled by other countries – leads to prolif and diffusion of cyber weapons to third parties Gjelten 13 (Tom Gjelten, correspondent for NPR, “Pentagon Goes On The Offensive Against Cyberattacks” February 11, 2013, http://www.npr.org/2013/02/11/171677247/pentagon-goes-on-the-offensive-against-cyber-attacks, KB)
With the Pentagon now officially recognizing cyberspace as a domain of warfare, U. AND officials ... have given speeches and spoken at conferences and other public events."
Cyber prolif will be rapid- low barriers of entry and use of proxies
The United States might not be quite as far ahead of other nations in terms AND number of potential targets is almost infinite and not limited by geography.’
Proliferation of cyber weapons to terrorists causes nuclear great power wars Fritz 9 Researcher for International Commission o n Nuclear Nonproliferation and Disarmament Jason, researcher for International Commission on Nuclear Nonproliferation and Disarmament, former Army officer and consultant, and has a master of international relations at Bond University, “Hacking Nuclear Command and Control,” July, http://www.icnnd.org/latest/research/Jason_Fritz_Hacking_NC2.pdf
This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.
No defense- deterrence fails vs 3rd parties, making escalation likely
Owens et al 9 (William A. Owens, as an Admiral in the United States Navy and later Vice Chairman of the Joint Chiefs of Staff, Kenneth W. Dam, served as Deputy Secretary of the Treasury from 2001 to 2003, where he specialized in international economic development, Herbert S. Lin, Senior Scientist and Study, “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities” 4/27/2009, http://www.lawfareblog.com/wp-content/uploads/2013/01/NRC-Report.pdf, KB)
Catalytic conflict refers to the phenomenon in which a third party ¶ instigates conflict between AND might thus choose just such a time to conduct a catalytic ¶ cyberattack.
And independently, cyber preemption escalates to shooting war
Clarke 2009 (Richard Clarke, special adviser to the president for cybersecurity in the George W. Bush administration and chairman of Good Harbor Consulting, November/December 2009, “War from Cyberspace,” The National Interest, http://web.clas.ufl.edu/users/zselden/coursereading2011/Clarkecyber.pdf) As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with “kinetic activity.”
Plan solves- A) It provides international credibility that creates stables norms for deterring preemptive use
Clarke and Knake ‘12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
B) US norms against preemptive cyberattacks reverses cyber weapons prolif
In a speech this month on "Internet freedom," Secretary of State Hillary Clinton AND it might clamp down on in exchange for reciprocal concessions by our adversaries. Adv 2- Trade-off
Cyber attack is highly like in the squo- actors are probing grid weaknesses
Reed ‘12 John, Reports on the frontiers of cyber war and the latest in military technology for Killer Apps at Foreign Policy, "U.S. energy companies victims of potentially destructive cyber intrusions", 2012, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks Foreign actors are probing the networks of key American companies in an attempt to gain AND power plants infected by Stuxnet very far away from Iran," Kaspersky said.
Current preemptive OCO policy backfires- creates priority confusion and drains cyber-defense resources
America's generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn't accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
Gjelten, 13 (Tom, correspondent for NPR, "First Strike: US Cyber Warriors Seize the Offensive", Jan/Feb, www.worldaffairsjournal.org/article/first-strike-us-cyber-warriors-seize-offensive NL) When the Pentagon launched its much-anticipated “Strategy for Operating in Cyberspace” AND governments, courts, and business groups have barely begun to consider them.
2 impacts:
First, cyberwar: Overconcentration on offense is destabilizing- makes cyberwar inevitable McGraw 13 Gary McGraw, PhD is Chief Technology Of?cer of Cigital, and author of¶ Software Security (AWL 2006) along with ten other software security¶ books. He also produces the monthly Silver Bullet Security Podcast for¶ IEEE Security and Privacy Magazine (syndicated by SearchSecurity), Cyber War is Inevitable (Unless We Build Security In), Journal of Strategic Studies - Volume 36, Issue 1, 2013, pages 109-119, http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013#SPS Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response
Clark and Andreasen 13 (Richard A. Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001, “Cyberwar’s threat does not justify a new policy of nuclear deterrence” June 14, 2013, http://articles.washingtonpost.com/2013-06-14/opinions/39977598_1_nuclear-weapons-cyber-attack-cyberattacks, KB)
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar. Link is linear- every investment in offensive capabilities fuels a cyber-arms race that risks escalation
Gjelten, 13 (Tom, correspondent for NPR, "First Strike: US Cyber Warriors Seize the Offensive", Jan/Feb, www.worldaffairsjournal.org/article/first-strike-us-cyber-warriors-seize-offensive NL) In addition, there are policy questions raised by the escalating government investment in offensive AND regulate the Internet in ways that would harm freedom of expression and information. Second, cyber crime Defense solves it
McGraw 13 Gary McGraw, PhD is Chief Technology Of?cer of Cigital, and author of¶ Software Security (AWL 2006) along with ten other software security¶ books. He also produces the monthly Silver Bullet Security Podcast for¶ IEEE Security and Privacy Magazine (syndicated by SearchSecurity), Cyber War is Inevitable (Unless We Build Security In), Journal of Strategic Studies - Volume 36, Issue 1, 2013, pages 109-119, http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013#SPS
The conceptual con?ation of cyber war, cyber espionage, and cyber¶ crime into AND cyber¶ crime, and deter cyber espionage all at the same time.
Major cyber crime crushes the global economy via ripple effects Sani et al 12 Hemraj, Associate Professor and Head, Department of Computer Science and Engineering, Alwar Institute of Engineering and Technology, Yerra Shankar, PhD Student, Department of Mathematics Shiksha ?O‘ Anusandhan University, T.C. Principal, Orissa Engineering College, “Cyber-Crimes and their Impacts: A Review,” Vol. 2, Issue 2,Mar-Apr 2012, http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf#SPS .1. Potential Economic Impact ¶ The 2011 Norton Cyber crime disclosed that over AND consumer trust issues could have serious repercussions and bear going into more ¶ detail
Economic collapse causes nuclear conflicts Burrows and Harris 9 Mathew J. Burrows counselor in the National Intelligence Council and Jennifer Harris a member of the NIC’s Long Range Analysis Unit “Revisiting the Future: Geopolitical Effects of the Financial Crisis” The Washington Quarterly 32:2 https://csis.org/files/publication/twq09aprilburrowsharris.pdf
Increased Potential for Global Conflict¶ Of course, the report encompasses more than economics AND and between states in a more¶ dog-eat-dog world.¶ Adv 3 SOP Congressional restrictions on executive cyberwar power is critical to maintain SOP
Yet addressing these questions is increasingly important for two reasons. ¶ First, as AND -in-chief power15 and Congress’s war-making ¶ authority.16
Strong separation of powers key to heg Ikenberry 1 (G. John, Professor @ Georgetown University, Spring, The National Interest)
First, America's mature political institutions organized around the rule of law have made it AND , to return to the corporate metaphor, to invest in ongoing partnerships.
Heg solves great power wars Barnett 11 (Thomas P.M. Former Senior Strategic Researcher and Professor in the Warfare Analysis and Research Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist and Chief Analyst at Wikistrat., worked as the Assistant for Strategic Futures in the Office of Force Transformation in the Department of Defense, “The New Rules: Leadership Fatigue Puts U.S., and Globalization, at Crossroads,” March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadership-fatigue-puts-u-s-and-globalization-at-crossroads)
Events in Libya are a further reminder for Americans that we stand at a crossroads AND the 20th century, setting the stage for the Pacific Century now unfolding.
Early SOP key to prevent escalation of prez powers and massive inter-branch conflict Taylor- Robinson and Ura 12 (Michelle M, Joseph, "Public opinion and conflict in the separation of powers: Understanding the Honduran coup of 2009," Journal of Theoretical Politics, Oct 9, jtp.sagepub.com/content/early/2012/10/07/0951629812453216.full.pdf) Finally, our model shows that once inter-institutional con?ict has emerged within the AND force may be critical to resolving a con?ict¶ once it has emerged.
Interbranch conflict causes extinction Linda S. Jamison, Deputy Director of Governmental Relations @ CSIS, Spring 1993, Executive-Legislative Relations after the Cold War, Washington Quarterly, v.16, n.2, p. 189
Indeed there are very few domestic issues that do not have strong international implications, AND that goes beyond the executive branch (Mann 1990, 28-29). Congressional failure to act leads to massive expansion in prez power- now key
If Congress now fails to enact guidelines for cyber warfare, it might ¶ be AND order to be able to ¶ participate in the formulation of national policy. Unfettered presidential powers cause nuclear war; ev is gender modified Forrester 89 - Professor, Hastings College of the Law (Ray, August 1989, ESSAY: Presidential Wars in the Nuclear Age: An Unresolved Problem, 57 Geo. Wash. L. Rev. 1636) On the basis of this report, the startling fact is that one man AND , indeed, humanity in general, probably would be unable to survive.
Plans
The United States federal government should substantially increase statutory restrictions on the war powers authority of the President of the United States by banning the preemptive use of large-scale cyber-attacks, except in direct support of Congressionally authorized United States military operations. Solvency
Congressional action is critical to cyber expertise and preserves presidential flexibility
Congress’s active role in the development and implementation of cyber ¶ warfare policy is no AND to work together to meet these challenges, as the ¶ Framers intended.
XO can’t solve- binding precedent is key to norm building and check expansion of prez powers
Presidents have had certain restrictions for war-making ever since because the founders wanted AND them, and where the line should be drawn, even in cyberspace.
Renouncing use of large-scale attacks reduces the risk of cyberattack
No first use of large-scale cyberattacks. Although weapons for cyberattack are valid AND would be a lower likelihood that it would experience such an ¶ attack. Military will adhere to the law- fear the consequences Dunlap ‘12 Maj. Gen. Charles J. Dunlap Jr. (Ret.), Professor of the Practice of Law¶ Executive Director, Center on Law, Ethics and National Security @ Duke. In Patriot Debates: Contemporary Issues in National Security Law. http://www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html ETB
This raises an important question: Should America wage war— cyber or AND because they have hard experience with the consequences of failing to do so.
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream -- AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races Moss 13 Columnist at The Diplomat Trefor Moss is an independent journalist based in Hong Kong. He covers Asian politics, defence and security, and was Asia-Pacific Editor at Jane’s Defence Weekly until 2009, Is Cyber War the New Cold War?, 4/19/13, http://thediplomat.com/2013/04/19/is-cyber-war-the-new-cold-war/2/
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow's wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain.”
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing Clarke and Knake ‘12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation Dunlap 12 Major General and Former Deputy Judge Advocate General (Lawless Cyberwar? Not If You Want to Win, www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html)
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
U.S. must take the lead to create international norms for a cyber world Negroponte and Palmisano 13 Chairs of the Independent Task Force #70, Council on Foreign Relations, Defending an Open,¶ Global, Secure, and¶ Resilient Internet, 2013, http://www.cfr.org/cybersecurity/defending-open-global-secure-resilient-internet/p30836#SPS However, as more people are connected in cyberspace and more critical¶ services such AND are unlikely to completely disappear no matter how well¶ policy is crafted.
Squo offensive cyber policy creates perception of US weakness Lawson ‘10 Sean Lawson is an assistant professor in the Department of Communication at the University of Utah. His research focuses on the relationships among science, technology, and the development of military theory and discourse, in particular the intersections of national security and military thought with new media, information, and communication technologies.¶ http://www.forbes.com/sites/firewall/2010/05/13/offensive-cyberwar-operations-as-communication/ ETB
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war Joseph Nye 8 is professor of international relations at Harvard University, “American Power After the Financial Crises,” http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Power always depends on context, and in today's world, it is distributed in AND even the largest country cannot achieve its aims without the help of others.
Legitimacy is key to band-wagon Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. “US Hegemony and International Legitimacy,” 1-25-10, http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
In Pacific Forum’s PacNet #41 issue, Mihoko Matsubara correctly asserts that “countering AND create a strong force multiplier effect and should be considered a top priority.
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, “Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing,” Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
So does conflict over the South China Sea Rehman 13 Stanton Nuclear Security Fellow, Iskander Rehman was an associate in the Nuclear Policy Program at the Carnegie Endowment and a Stanton Nuclear Security Fellow. His research focuses on security and crisis stability in Asia, specifically the geopolitical ramifications of naval nuclearization in the Indian Ocean, 3/9/13, Dragon in a Bathtub: Chinese Nuclear Submarines and the South China Sea, http://carnegieendowment.org/2013/03/09/dragon-in-bathtub-chinese-nuclear-submarines-and-south-china-sea/fpjl
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Plan The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Evolving customary law. This approach also accommodates the reality that how the U. AND norms. I think that’s the way we should want it to work.
Norms are essential to solve — they can’t be created unless OCOs are addressed Goldsmith 10 , Professor of Law at Harvard, Can we stop the Cyber Arms Race, Jack Goldsmith teaches at Harvard Law School and is on the Hoover Institution's Task Force on National Security and Law. He was a member of a 2009 National Academies committee that issued the report "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities.", http://articles.washingtonpost.com/2010-02-01/opinions/36895669_1_botnets-cyber-attacks-computer-attacks
In a speech this month on "Internet freedom," Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage.
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, “Congress’ Role in Cyber Warfare,” Journal of National Security Law and Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication Hansen and Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
10/22/13
1AC - Wake Forest
Tournament: Wake Forest | Round: 1 | Opponent: UNT KA | Judge: Kyla Sommers Adv 1 Cyberwar coming now – only policy precedent solves Jackson 11-8 William Jackson, cyber correspondent for GCN, “Can't the United States and China just get along in cyberspace?,” 11/8/13, http://gcn.com/blogs/cybereye/2013/11/us-china-cyber-diplomacy.aspx SJE
The relationship between the United States and China in cyberspace has been anything but chummy AND , but basics to date have been neglected, creating a crisis environment.
US posture invites escalating cycles of attacks Moss 13 Columnist at The Diplomat Trefor Moss is an independent journalist based in Hong Kong. He covers Asian politics, defence and security, and was Asia-Pacific Editor at Jane’s Defence Weekly until 2009, Is Cyber War the New Cold War?, 4/19/13, http://thediplomat.com/2013/04/19/is-cyber-war-the-new-cold-war/2/
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow. Cyber arms race causes world war CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow's wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain.” Congressional constraints of OCOs are key to solve Austin, 8/6 Director of Policy Innovation at the EastWest Institute, Costs of American Cyber Superiority, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Independent of other countries, the US is picking fights Seitz 13 Dan, writer for UPROXX, quoting Bruce Scneiner, American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, Cybersecurity Expert Fears The US Is Starting A Cyber War, 6/20/13, http://www.uproxx.com/technology/2013/06/cybersecurity-expert-fears-the-us-is-starting-a-cyber-war/#ixzz2kl7Vi62u
Bruce Schneier is one of the most respected computer security experts in the world. AND almost everyone is convinced are state-sponsored by the US and Israel.
That independently escalates Greenwald and MacAskill 6-7 (Glen (American political commentator, lawyer, columnist, blogger, and author) and Ewan (Staff Writer for the Guardian), “Obama orders US to draw up overseas target list for cyber-attacks”, The Guardian, 6-7-13, http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas, RSR)
Obama's move to establish a potentially aggressive cyber warfare doctrine will heighten fears over the AND likely that those attacks will escalate into physical, kinetic uses of force."
Adv 2 Congressional restrictions necessary for allied cooperation Dunlap 12 Major General and Former Deputy Judge Advocate General (Lawless Cyberwar? Not If You Want to Win, www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html)
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
U.S. must take the lead to create international norms for a cyber world Negroponte and Palmisano 13 Chairs of the Independent Task Force #70, Council on Foreign Relations, Defending an Open,¶ Global, Secure, and¶ Resilient Internet, 2013, http://www.cfr.org/cybersecurity/defending-open-global-secure-resilient-internet/p30836#SPS However, as more people are connected in cyberspace and more critical¶ services such AND are unlikely to completely disappear no matter how well¶ policy is crafted. Squo offensive cyber policy creates perception of US weakness Lawson ‘10 Sean Lawson is an assistant professor in the Department of Communication at the University of Utah. His research focuses on the relationships among science, technology, and the development of military theory and discourse, in particular the intersections of national security and military thought with new media, information, and communication technologies.¶ http://www.forbes.com/sites/firewall/2010/05/13/offensive-cyberwar-operations-as-communication/ ETB
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc. Coalition building key to solve extinction – disease, climate change, terrorism, and great power war Joseph Nye 8 is professor of international relations at Harvard University, “American Power After the Financial Crises,” http://www.foresightproject.net/publications/articles/article.asp?p=3533, DOA: 7-23-13, y2k Power always depends on context, and in today's world, it is distributed in AND even the largest country cannot achieve its aims without the help of others. Legitimacy is key to band-wagon Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. “US Hegemony and International Legitimacy,” 1-25-10, http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration. Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them Kazianis 12 Assistant Editor for The Diplomat and a non-resident fellow at the Pacific Forum (Harry, “A Plea for an Alliance-Based ‘AirSeaCyber’ Joint Operational Concept” July 17, 2012, http://rpdefense.over-blog.com/article-a-plea-for-an-alliance-based-airseacyber-joint-operational-concept-108240342.html)
In Pacific Forum’s PacNet #41 issue, Mihoko Matsubara correctly asserts that “countering AND create a strong force multiplier effect and should be considered a top priority. China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes RTT 13 China’s Anti-access And Area-denial Capabilities Bolstered: Pentagon Report, http://www.rttnews.com/2111200/china-s-anti-access-and-area-denial-capabilities-bolstered-pentagon-report.aspx
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea. PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, “Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing,” Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43 Taiwan crisis is imminent and causes nuclear war Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region. So does conflict over the South China Sea Rehman 13 Stanton Nuclear Security Fellow, Iskander Rehman was an associate in the Nuclear Policy Program at the Carnegie Endowment and a Stanton Nuclear Security Fellow. His research focuses on security and crisis stability in Asia, specifically the geopolitical ramifications of naval nuclearization in the Indian Ocean, 3/9/13, Dragon in a Bathtub: Chinese Nuclear Submarines and the South China Sea, http://carnegieendowment.org/2013/03/09/dragon-in-bathtub-chinese-nuclear-submarines-and-south-china-sea/fpjl
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots. Plan The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations. Solvency First, norm-setting other countries model our use of OCOs Bradbury 11 Assistant Attorney General for the Office of Legal Counsel (Steven, The Developing Legal Framework for Defensive and Offensive Cyber Operations, http://harvardnsj.org/wp-content/uploads/2011/02/Vol.-2_Bradbury_Final1.pdf)
Evolving customary law. This approach also accommodates the reality that how the U. AND norms. I think that’s the way we should want it to work. Norms are essential to solve — they can’t be created unless OCOs are addressed Goldsmith 10 , Professor of Law at Harvard, Can we stop the Cyber Arms Race, Jack Goldsmith teaches at Harvard Law School and is on the Hoover Institution's Task Force on National Security and Law. He was a member of a 2009 National Academies committee that issued the report "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities.", http://articles.washingtonpost.com/2010-02-01/opinions/36895669_1_botnets-cyber-attacks-computer-attacks
In a speech this month on "Internet freedom," Secretary of State Hillary Clinton AND arms race in an arena where the offense already has a natural advantage. It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security. Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, “Congress’ Role in Cyber Warfare,” Journal of National Security Law and Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy. Congressional restrictions on OCOs send a global signal of cyber leadership Bastby 12 Chairwoman of the American Bar Association’s Privacy and Computer Crime Committee (Judy, CEO of Global Cyber Risk, “U.S. Administration's Reckless Cyber Policy Puts Nation at Risk” June 4, 2012, http://www.forbes.com/sites/jodywestby/2012/06/04/u-s-administrations-reckless-cyber-policy-puts-nation-at-risk/2/)
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership. Prez will adhere to congressional constraints- fear of political costs Bradley and Morrison ‘13 Curtis A., William Van Alstyne Professor of Law, Duke Law School. Trevor W., Liviu Librescu Professor of Law, Columbia Law School. Columbia Law Review 113. http://www.columbialawreview.org/wp-content/uploads/2013/05/Bradley-Morrison.pdf ETB
In addition to the constraining influence arising from the internalization of legal norms by executive AND ¶ do not see any normative significance in the legal rule in question. Focusing on the transcendent political discourse surrounding OCOs is necessary - we must begin with pragmatic solutions to state-centered problems. Mellor 13 The Australian National University, ANU College of Asia and the Pacific, Department Of International Relations, “Why policy relevance is a moral necessity: Just war theory, impact, and UAVs,” European University Institute, Paper Prepared for BISA Conference 2013, DOA: 8-14-13
This section of the paper considers more generally the need for just war theorists to AND the public engagement and political activism that are necessary for democratic politics.52
11/16/13
1AC OCOs - K Version
Tournament: UNT | Round: Doubles | Opponent: Georgia State FF | Judge: Kearny, Haynal, Tomik Plan The United States federal government should substantially increase statutory restrictions on the war powers authority of the president of the United States by statutorily removing the President’s authority to authorize the preemptive use of large-scale cyber-attacks.
The first internal link is arms racing- Squo offensive cyber posture attacks risk retaliatory cycles and arms races Moss 13 Columnist at The Diplomat Trefor Moss is an independent journalist based in Hong Kong. He covers Asian politics, defence and security, and was Asia-Pacific Editor at Jane’s Defence Weekly until 2009, Is Cyber War the New Cold War?, 4/19/13, http://thediplomat.com/2013/04/19/is-cyber-war-the-new-cold-war/2/
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow. Cyber arms race causes world war — there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow's wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain.” It goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements- congressional restrictions are key to solve Austin, 8/6 Director of Policy Innovation at the EastWest Institute, Costs of American Cyber Superiority, http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Plan solves- other countries model our use of OCOs — clear restrictions on use are essential Bradbury 11 Assistant Attorney General for the Office of Legal Counsel (Steven, The Developing Legal Framework for Defensive and Offensive Cyber Operations, http://harvardnsj.org/wp-content/uploads/2011/02/Vol.-2_Bradbury_Final1.pdf)
Evolving customary law. This approach also accommodates the reality that how the U. AND norms. I think that’s the way we should want it to work.
Second internal link is preemption- The US preparing to initiate a preemptive cyberwar now
The US government is developing detailed plans to attack other countries using cyberwarfare techniques, AND at any time in the future—a formula for unlimited worldwide aggression.
Cyber preemption escalates to shooting war Clarke 2009 (Richard Clarke, special adviser to the president for cybersecurity in the George W. Bush administration and chairman of Good Harbor Consulting, November/December 2009, “War from Cyberspace,” The National Interest, http://web.clas.ufl.edu/users/zselden/coursereading2011/Clarkecyber.pdf)
As in the 1960s, the speed of war is rapidly accelerating. Then, AND . Thus, the nation attacked might well respond with “kinetic activity.”
Third Internal link is defense Cyber-attack is likely in the squo - actors are mapping out vulnerable infrastructure
Francis ‘13 David Francis is a reporter based in Berlin and Washington, DC. In addition to repoting for the Fiscal Times, David is a correspondent of the Christian Science Monitor, Financial Times Deutschland, and Deutsche Welle. He is a contributing writer to World Politics Review, SportsIllustrated.com, and the Pittsburgh Post-Gazette, among others. He has reported from all over the world on a number of topics, from transatlantic relations, to sports, to border security, to local news, to finance.In 2010, David was named to the prestigious Atlantik-Brueke association, created to promote transatlantic relations. In 2009, he was awarded the Arthur Burns Fellowship from the International Center for Journalists. He has been a John McCloy Fellow, awarded by the American Council of Germany, and an Arizona State Media Fellow. David has spoken about his reporting at the Georgetown University School of Foreign Service, the Johns Hopkins School for Advanced International Studies, and the World Affairs Council of Pittsburgh. He an undergraduate degree from the University of Chicago, and a master’s degree from Georgetown University. http://www.thefiscaltimes.com/Articles/2013/03/11/The-Coming-Cyber-Attack-that-Could-Ruin-Your-Life#sthash.UO07zhTu.dpuf ETB
But experts warn these kinds of service breaks are just a small symptom of the AND does, I would stuff my cash in a mattress under my bed."
Current preemptive OCO policy backfires- creates priority confusion and drains cyber-defense resources
America's generals and spymasters have decided they can secure a better future in cyberspace through AND not only reduces resources dedicated for defense but overtakes other priorities as well.
Focus on preemptive cyber-attack capability trades off with fixing critical cyber vulnerabilities
But the rhetoric of war doesn't accurately describe much of what happened. There was AND , the Cybersecurity Act of 2012, has stalled indefinitely in the Senate.
Military focus on offense spills over the private sector
Gjelten, 13 (Tom, correspondent for NPR, "First Strike: US Cyber Warriors Seize the Offensive", Jan/Feb, www.worldaffairsjournal.org/article/first-strike-us-cyber-warriors-seize-offensive NL)
When the Pentagon launched its much-anticipated “Strategy for Operating in Cyberspace” AND governments, courts, and business groups have barely begun to consider them. Overconcentration on offense is uniquely destabilizing- makes cyberwar inevitable McGraw 13 Gary McGraw, PhD is Chief Technology Of?cer of Cigital, and author of¶ Software Security (AWL 2006) along with ten other software security¶ books. He also produces the monthly Silver Bullet Security Podcast for¶ IEEE Security and Privacy Magazine (syndicated by SearchSecurity), Cyber War is Inevitable (Unless We Build Security In), Journal of Strategic Studies - Volume 36, Issue 1, 2013, pages 109-119, http://www.tandfonline.com.proxy.library.cornell.edu/doi/pdf/10.1080/01402390.2012.742013#SPS
Also of note is the balancing effect that extreme cyber vulnerability¶ has on power AND real cyber defense by building security in, cyber war will be inevitable.¶
That causes nuclear miscalc due to hair-trigger response Clark and Andreasen 13 (Richard A. Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001, “Cyberwar’s threat does not justify a new policy of nuclear deterrence” June 14, 2013, http://articles.washingtonpost.com/2013-06-14/opinions/39977598_1_nuclear-weapons-cyber-attack-cyberattacks, KB)
President Obama is expected to unveil a new nuclear policy initiative this week in Berlin AND lead to shared approaches to cybersecurity, including agreements related to limiting cyberwar.
That said, the battles might actually begin small. Think online skirmishes between angry AND , says Lawson, is how quickly it could spread around the globe.
Criticizing the probability of our impacts is meaningless – all wars are low probability, what matters is that cyberwar is more likely to escalate than other conflicts, which uniquely warrants academic attention
Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND prerequisite to reducing the incidence of cyber¶ con?ict and avoiding cyber war.
We have an objective definition of war and expanding it causes miscalculation Hooker 2005 Commands the XVIII Airborne Corps Combat Support Brigade ("Dragon Brigade") now deployed to AND . "Beyond Vom Kriege: the character and conduct of modern war" Clausewitz described war as "nothing more than a duel on a larger scale ... AND of policy, only to be astounded when it fails and war erupts.
War fuels structural violence
Goldstein 2001 IR professor at American University (Joshua, War and Gender, p. 412, Google Books)
First, peace activists face a dilemma in thinking about causes of war and working AND on injustice as the main cause of war seems to be empirically inadequate.
Understanding the risks of current US posture reduces the chances of cyber war escalation- worst case assessments are the best preparation
Clarke and Knake ‘10 Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB
In the seminal 1983 movie about computers and war, War Games, ¶ starring AND period of rising ¶ tensions between the U.S. and China.
Arguing against the practices of the USFG in the context of war powers allows for an engaged public that can expose the hypocrisy of the federal government – only focus on specific policy questions can actualize change by making it relevant to policy-makers – Mellor 13 The Australian National University, ANU College of Asia and the Pacific, Department Of International Relations, “Why policy relevance is a moral necessity: Just war theory, impact, and UAVs,” European University Institute, Paper Prepared for BISA Conference 2013, DOA: 8-14-13
This section of the paper considers more generally the need for just war theorists to AND the public engagement and political activism that are necessary for democratic politics.52
Debate about the repercussions of cyber preemption is good- it generates a broader literature base that encourages restraint
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
Privileging ontology and epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments. Owen 2 (university of Southampton, David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7) Commenting on the ‘philosophical turn’ in IR, Wæver remarks that ‘a AND the first and second dangers, and so a potentially vicious circle arises.
In their first meeting since a budget impasse shuttered many federal operations, President Obama AND out their threat to withhold approval for an increase in the debt ceiling.
President Obama held a press event in which he accused Republicans of pursuing "an AND getting to such a "principled" compromise any time all that soon.
The argument goes something like this: The cast-iron conservatives were going to AND , it’s that assuming that normal political math works is a fool’s errand.
There’s no question that Democrats are in a stronger position today, at least as AND brief. Once that changes, the economic impact will change with it.
We have various laws that require the federal government to disburse money. However, AND . It’s long past time for the business community to stage an intervention.
Obama said the latest revelation of NSA survellience showed that "NSA had inadvertently, AND hostile folks out there that potentially are trying to do us harm."¶ -
Links to politics – immense opposition to bypassing debate
"In an era of polarized parties and a fragmented Congress, the opportunities to AND a partisan content, with contemporary complaints coming from the incumbent president’s opponents."
No sooner had the President delivered his speech, than superficial narratives on Obama not AND -East – while his administration aggressively confronts the undeniable reality of terrorism.
Congress key to democratic legitimacy and preventing future vacillation in executive policy
Benjamin Wittes 9, senior fellow and research director in public law at the Brookings Institution, Stuart Taylor, an American journalist, graduated from Princeton University and Harvard Law School, "Legislating the War on Terror: An Agenda for Reform", November 3, Book, p. 329-330 While President Obama’s policy makes a clean break with the Bush record, it actually AND past without giving up what the United States will need in the future.
10/5/13
2AC - Cap K - Wake
Tournament: Wake Forest | Round: 1 | Opponent: UNT KA | Judge: Kyla Sommers 2AC Cap K
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Extend the 1AC Mellor evidence – a focus on the political ramifications of a policy is critical to ensure that the political does not take unfettered power and attack with impunity d. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block 2. Cap isn’t the root cause of anything; greed is – shift away turns the alt. Aberdeen 3 (Richard, Political Activist, Philosopher, Hippie, He Doesn’t Link to Your Epistemology Arguments, “The Way: A Theory of Root Cause and Solution,” http://freedomtracks.com/uncommonsense/theway.html) A view shared by many modern activists is that capitalism, free enterprise, multi AND national corporation avarice, thus the root problem obviously goes deeper than this.
3. Perm: do the plan and the alternative in every other instance. - Representations of capitalism as hegemonically dominant preclude the realization of actual social change. Changing this view is a pre-requisite to the alt. Gibson-Graham 06 – J.K., pen name shared by feminist economic geographers Julie Graham and Katherine Gibson (“The End of Capitalism (As We Knew It): A Feminist Critique of Political Economy”, pg 2-5)
The End of Capitalism (As We Knew It) problematizes "capitalism" as AND take root and flourish. A long shot perhaps but one worth pursuing.
The sort of capitalism they critique is a neoliberal form rooted in the aggressive drive to attack the other. This is the status quo, where rather than establish robust computer systems, we use offensive cyber operations to attack the other before they can attack us. The alternative is a shift from this combative, monopolistic form of capitalism to a more cooperative system. We have the only specific evidence, we shift company’s focus to improving their own computer systems, making them better, so that they can improve their own products and serve their consumer better. All their links presume the status quo. Only we can make capitalism more benign. 4. The desire for freedom and growth is innate – moving away risks totalitarianism, violence, poverty and war Aligica ‘3 (Paul Aligica, Fellow at the Mercatus Center at George Mason University and Adjunct Fellow at the Hudson Institute, “The Great Transition and the Social Limits to Growth: Herman Kahn on Social Change and Global Economic Development”, April 21, http://www.hudson.org/index.cfm?fuseaction=publication_detailsandid=2827) Stopping things would mean if not to engage in an experiment to change the human AND are trying to avoid" (Kahn, 1976, 210; 1984).
5. And, they need a concrete alternative or else capitalism will initiate a counter-revolution to crush their alternative – economic viability is key Kliman, 6 Andrew Kliman, professor of economics, Pace University, 2006“Not by Politics Alone,” Presentation at Left Forum Conference, March 11, http://209.85.165.104/search?q=cache:W7WV0BP2LGoJ:akliman.squar espace.com/writings/not2520by2520politics2520alone25204.2.06.doc+alternative+to+capitalismandhl=enandct=clnkandcd=128andgl=us There are several different issues that I’m thinking of when I use the term “ AND through suppression of mass opposition, so it would turn into its opposite.
6. Perm: Do both This is the only alternative to the defeatism of the negative. Even Zizek doesn’t think we should act.
How then, does such a fight take place? Not, Žižek, argues AND , insistent, presence. It’s a withdrawal that produces an empty space. Such a politics of withdrawal, of doing nothing at all, could have disruptive AND with its other side, the side involved in constructing a new order.
They say that capitalism is destroying the planet, then merely say that we should do nothing to address it. This is a little like waiting for Godot. Marx predicted capitalism would collapse in the the 18th century. Then we were told capitalism would collapse in the early 19th century, then again, then again, then again. With the rise of the USSR, people were certain capitalism was dead. May ’68, the cultural revolution, we’ve heard this again and again. Ask yourself, how much longer do we have to wait?
7. Cap key to space access Garmong, 5 – PhD in philosophy (Richard, Cap Mag, “Privatize Space Exploration,” http://www.capmag.com/article.asp?ID=4327) There is a contradiction at the heart of the space program: space exploration, AND NASA’s rockets would have been trivial, the space agency elected to stick with the politically correct foam. It is impossible to integrate the contradictory. To whatever AND must unleash its best minds, as only the free market can do.
Key to solve multiple extinction scenarios Baum 9 (2009, Seth, visiting scholar at Columbia University's Center for Research on Environmental Decisions, PhD candidate in Geography with a focus on risk analysis, “Cost–benefit analysis of space exploration: Some ethical considerations,” Space Policy Volume 25, Issue 2, May 2009, Pages 75-80, science direct) Another non-market benefit of space exploration is reduction in the risk of the AND -effective means of increasing the probability of long-term human survival.
11/16/13
2AC - Chow K
Tournament: Wake Forest | Round: 1 | Opponent: UNT KA | Judge: Kyla Sommers Zero risk of their Chow impact---instrumental knowledge production doesn’t cause violence and discursive criticism could never solve it anyway Ken Hirschkop 7, Professor of English and Rhetoric at the University of Waterloo, July 25, 2007, “On Being Difficult,” Electronic Book Review, online: http://www.electronicbookreview.com/thread/criticalecologies/transitive This defect - not being art - is one that theory should prolong and celebrate AND to more Sisyphean frustration. In fact, there are several good reasons.
Key to Resolve Holes in Their Advocacy and Effectuate Political Change. Kellner, 3 – critical theorist in the Frankfurt Institute for Social Research, George Kneller Chair in the Philosophy of Education in the GSEI at UCLA (Douglas, “Virilio, War, and Technology: Some Critical Reflections”, illuminations: the critical theory project, http://pages.gseis.ucla.edu/faculty/kellner/Illumina20Folder/kell29.htm)BZ By eschewing critical social theory, Virilio does not have the resources to theorize the AND abstains from developing the normative perspective from which he carries out his critique.
Link turn outweighs the link – policy simulation is more likely to increase agency than cause spectatorship Joyner ‘99 Professor of International Law in the Government Department at Georgetown University (Christopher C., Spring, 199, 5 ILSA J Int'l and Comp L 377)
Use of the debate can be an effective pedagogical tool for education in the social AND the real world of policy analysis, political critique, and legal defense.
Privileging ontology and epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments. Owen 2 David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7
Commenting on the ‘philosophical turn’ in IR, Wæver remarks that ‘a AND the first and second dangers, and so a potentially vicious circle arises.
Representations of nuclear war are key to understand and prevent nuclear war Martin 2 (Brian, Professor of Social Sciences at the University of Wollongong, Australia, “Activism after nuclear war?,” 9/3/02, Transnational Foundation for Peace and Future Research, http://www.bmartin.cc/pubs/02tff.html)//PC In the event of nuclear war, as well as death and destruction there will AND to be prepared for the aftermath. That means preparing organisationally and psychologically.
Debate about the repercussions of cyber preemption is good- key to generating literature on dangers of cyber war, which checks its use
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
Cyberwar is probable- multiple IR theories prove
Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
Cyberwar is plausible enough to merit academic attention
Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
So, how much should scholars and practitioners care about cyber war?¶ A belief AND prerequisite to reducing the incidence of cyber¶ con?ict and avoiding cyber war.
11/16/13
2AC - Nietzsche Security - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
Alt cant result in plan action- otherwise it moots the 1ac, forces us to debate against ourselves, and kills clash- voter for fairness and education
perm do both
Permutation: do the alternative – justified because floating PIKs moot the 1AC and constantly shift through the debate making it impossible for the aff to generate offense.
Case impacts prove why security logic is good- key to prevent multiple scenarios for extinction- aff is an impact turn to the K. Outweighs- prefer proximate short-term extinction scenarios over their vacuous impact claims.
Life should be valued as apriori – it precedes the ability to value anything else Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of “Life”, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
Cyberwar is probable- multiple IR theories prove Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
Nietzsche requires that we act to change the world in ways that we find personally life-affirming. For us, that means the aff. Alenka Zupancic and Friedrich Nietzsche. The Shortest Shadow. 2003. Page 134-136.
To put it differently: the logic of a possible change or break-through AND it in the chapter “On the Spirit of Gravity” in Zarathustra: Verily, I also do not like those who consider everything good and this world AND that only the ass has learned, and whoever is of his spirit. This, indeed, is passive nihilism, and Nietzsche's description of it in this AND of negation, while the only form of affirmation is a reactive one. This is why one of the major fronts of Nietzsche's philosophy is a fight AND of Nothing(ness) as interval or minimal difference of the same.
Only the plan affirms life – embracing the struggle against our genetic predisposition towards violence through resisting nuclear war is key Barash and Lipton, 1985 David P., Professor of Psychology at the University of Washington (Seattle) and Judith Eve, psychiatrist at the Swedish Medical Center in Washington, “The Caveman and the Bomb” p.261-267 Fortunately, whatever genetic imperatives operate in Homo sapiens, they are unlikely to extend AND Neanderthal mentality and thereby transcend, if not overcome, our biology itself.
Even though the universe probably will not accept our attempts at control, there is beauty in the struggle to shape our small part of it Dienstag 4 Joshua Foa, Associate Professor of Politics at the University of Virginia. Tragedy, Pessimism, Nietzsche. New Literary History 34:1 Project Muse Tragic art is the organization of a small portion of an otherwise meaningless world that AND and sensibility would be given" (KGW 8.2.121).
10/22/13
2AC - T-Increase - Octos WSU
Tournament: Wichita State | Round: Octas | Opponent: Kansas KS | Judge: Tews, Munday, Ziegler 5. Authority is the legal right to take action, power is the ability to do so –We Meet –Obama has the authority now, not the ability – that’s the Cronogue evidence Forsythe and Hendrickson 96 David P. Forsythe, Professor and Chair of Political Science University of Nebraska-Lincoln, Ryan C. Hendrickson, Ph.D. Candidate University of Nebraska-Lincoln. “U.S. Use of Force Abroad: What Law for the President?” Presidential Studies Quarterly, Vol. 26, No. 4 The crisis is most …the proper under ¶ standing of authority.
Other points on which we think Steve and Jennifer misinterpret or mischaracterize or misunderstand our AND and of unilateral executive decisions deciding who can be targeted, are better.
7. Counter-interp: Statutory restrictions are legislative limits Law dictionary No Date http://thelawdictionary.org/statutory-restriction/ STATUTORY RESTRICTION?1 Limits or controls that have been place on activities by its ruling legislation 8. Increase means augment in size BALLENTINE'S LAW DICTIONARY ‘10 TERM: increase. TEXT: Verb: Deriving from the Latin "crescere"; to grow. To augment in size or in value. Anno: 32 ALR 854. Noun: Growth or augmentation; amount of growth.
1/27/14
2AC 1-Off Heidigger Death K
Tournament: UCO | Round: 6 | Opponent: UTSA CR | Judge: Phil Samuels Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage
Perm do the plan and the alt - nothing about our plan precludes “embracing anxiety and authenticity” Their link framing precludes us from using anxiety to motivate political action – that is bad because apocalyptic framing is necessary to ensure survival JL Schatz. 2012. Professor of English and Feminist Evolutionary Studies and Director of Debate at Binghamton University. The Importance of Apocalypse: The Value of End-Of-The-World Politics While Advancing Ecocriticism. Journal of Ecocriticism: A New Journal of Nature, Society and Literature. 4(2)
There are three things ecocriticism must keep in mind to retain its effectiveness in the AND the world that we will be able to envision how to save it. Perm do the alt – it in no way repudiates the plan or the thesis of the 1ac. Justifies severance because the alt. is not an opportunity/cost on our prescription. Nuclear war makes the alt impossible- can’t rethink relationship to nature while nuclear war is occurring, societies would focus on protecting themselves World War II proves that attempting to predict the impact of a particular ontology is futile – it cannot explain why modernity produced varying responses to the conflict within the same population from genocidal nationalist militarism to pacifism. Prior focus on ontology causes paralysis – having “good enough knowledge” is a sufficient condition for action
Kratochwil 8 Kratochwil, professor of international relations – European University Institute, ‘8 (Friedrich, “The Puzzles of Politics,” pg. 200-213)
The lesson seems clear. Even at the danger of “fuzzy boundaries”, when AND Besides, “timing” seems to be quite recalcitrant to analytical treatment. Case outweighs and turns the case – the material destruction of the body is the cessation of life. Even if their relationship to death is good, it can only come about as a result of dwelling in the material world long enough to reflect on these questions – our impact timeframe is much faster than their vague alt. solvency claims meaning all lives will be snuffed out before their alt can ever be embraced. Life should be valued as apriori – it precedes the ability to value anything else
Kacou 8 Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of “Life”, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184
Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
Nuke war kills all types of organic, alive beings – our impacts aren’t exclusively about human death meaning their analysis only accounts for a small fraction of our impacts – these other deaths have no pre-meditation meaning their alt can’t access them but the plan can save them. Try or die for the aff or perm.
Krieger 4/30/12 (David, holds MA and Ph.D. degrees in ¶ political science from the University of Hawaii as well as a J.D. from the Santa Barbara ¶ College of Law, Assistant professor at University of Hawaii, founder of the Nuclear Age Peace Foundation and has served as its ¶ president since 1982. He is a councilor on the World Future Council, chair of the Executive ¶ Committee of the International Network of Engineers and Scientists for Global Responsibility, ¶ and a member of the Executive Committee of the Middle Powers Initiative. “NUCLEAR WEAPONS¶ AND A¶ SUSTAINABLE FUTURE” Nuclear Peace Foundation, http://www.wagingpeace.org/menu/resources/publications/2012_prepcom.pdf, SEH)
Nuclear war would preclude a sustainable future. It would destroy the global environment, AND states fulfill their obligations for good faith negotiations ¶ for complete nuclear disarmament.
Double bind – either the alt does the aff so they link to all of their tech bad arguments, or they don’t which means there are multiple extinction scenarios to the alternative
Value to life is subjective- we are determine our own values - their emphasis on existential “authenticity” denies this right to choose for others. Their competition framing and alt result in existential relativism – causes slavery, economic exploitation and poverty, and mass slaughter. Graham ‘99 (Phil, Graduate School of Management, University of Queensland, Heidegger’s Hippies: A dissenting voice on the “problem of the subject” in cyberspace, Identities in Action! 1999, http://www.philgraham.net/HH_conf.pdf)
Societies should get worried when Wagner’s music becomes popular because it usually means that distorted AND which “subjective death” and ontology are the least of all worries. Worst-case scenarios calculate for the sake of responsibility – mobilization is key to effective to political movements that prevent the worst forms of their impact. Michael Williams, Professor of International Politics – U. Wales, Aberystwyth, ‘5 (The Realist Tradition and the Limits of International Relations p. 165-7)
Moreover, the links between sceptical realism and prevalent post-modern themes go more AND addressed by retreating yet again into further reversals of the same old dicohotomies.
Ignoring the threat causes panic – worse than fear, stops solvency, turns their state power arguments Sandman and Lanard, 2003 Peter M. PhD in Communications and Professor at Rutgers specializing in crisis communication; Jody, Psychiatrist, 28 April, “Fear Is Spreading Faster than SARS — And So It Should!” China is universally condemned for covering up SARS and putting the world at risk. AND minimizing the risk than if they have been acknowledging it candidly and compassionately.
The alt is vague and is a voting issue A) Skews 2AC strategy because it will become more defined in the block or 2nr B) Makes aff offense impossible because we can never know what the alt is – it’s a voter for fairness and education – at least we should get extreme latitude in evaluating our impact turns to their link without letting their vague alt moot all of our offense.
Privileging ontology and epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments. Owen 2 David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7
Commenting on the ‘philosophical turn’ in IR, Wæver remarks that ‘a AND the first and second dangers, and so a potentially vicious circle arises.
Value to life should be individually determined – their impact claims invalidate personal autonomy SCHWARTZ, HENDRY, and PREECE 2004 Professional Metaphysician, Senior Lecturer, General Practicianer Professor, Academic Surgeon “Medical Ethics: A case based approach,” Lisa, Paul, and Robert
Those who choose to reason on this basis hope that if the quality of a AND imperative that we must treat persons as rational and as ends in themselves.
Yet another related issue is whether another nation should believe ¶ a nation’s declaratory policy AND its leaders decide to act in violation of ¶ the stated declaratory policy.
In addition to the constraining influence arising from the internalization of legal norms by executive AND ¶ do not see any normative significance in the legal rule in question.
10/5/13
2AC Abelism K
Tournament: UNT | Round: 6 | Opponent: Indiana FH | Judge: Natalie Pennington Ableism is not always negative and is inevitable Gregor Wolbring. 2011. Dept. of Community Health Sciences at the University of Calgary, Alberta, Canada. Ableism and Energy Security and Insecurity. Studies in Ethics, Law, and Technology. Vol. 5. Issue 1. Article 3.
However, the favoritism for abilities and ableism is a much broader phenomenon. Every AND have certain abilities; the unwillingness to adapt to the needs of others.
No link---it’s just a link of omission Rorty ‘2 (Professor of Comparative Literature @ Stanford, `02 (Richard, Peace Review, vol. 14, no. 2, p. 152-153) I have no quarrel with Cornell's and Spivak's claim that "what is missing in AND have been told, and should be told, in many other ways.
Turn – Making it a voting issue only exacerbates the power relations they claim to resist – commodifying the lived experiences of PWD for their own academic gain Kitchin, Prof of Geography, Nat’l Univ of Ireland, 2000 Rob, “The Researched Opinions on Research: Disabled People and Disability Research,” Disability and Geography, v15, #1, pp25-47
Many disabled academics, such as Oliver (1992), are unhappy at the widespread AND researchers are compounding the oppression of disabled respondents through exploitation for academic gain.
Perm do both - Government action can help support the fight against disablism Paul Miller, Sophia Parker and Sarah Gillinson. 2004. Disablism: How to Tackle the Last Prejudice. Demos. 12-13. As with racism and sexism, disablism is the concern of everybody – and everybody AND broader vision of the change in society that we want to bring about.
1/10/14
2AC Abelist Language - MAC
Tournament: MAC | Round: 6 | Opponent: TexasUCO | Judge: Justin Stanley The introduction of their critique of ableist language is a voting issue—calling us out for using an unintentionally offensive term might make them feel better for embarrassing us, but it doesn’t do anything to address ableist oppression and prevents constructive activism. Rejecting their “call out” strategy is crucial to constructive activism—vote against them to facilitate productive dialogue about ableist language. Kinzel 11 Lesley Kinzel, blogger and social justice writer, has written for Newsweek and Marie Claire, was named one of the Feminist Press’s “40 Feminists Under 40,” 2011 (“On our difficult language, and the calling-out of,” Two Whole Cakes—a blog about body politics, social justice activism, and pop-cultural criticism from a feminist perspective, March 30th, Available Online at http://blog.twowholecakes.com/2011/03/on-our-difficult-language-and-the-calling-out-of-same)
We throw “that’s ableist” or “that’s racist” or “that’s fatphobic AND . These are the things that put us here in the first place.
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
2. There is no coherent link to this argument – the impact claims of the 1AC are against nuclear war. Two arguments A. Their link argument is survivalism, survival is not a 1AC argument, we just think that mass death is bad B. Nuclear war would kill other species as well, the fact that we didn’t say humans in the 1AC means the link of omission makes no sense
3. Reject systematic or all-encompassing “root cause” claims for human action Bleiker, 3 (Roland, 2003, “Discourse and Human Agency,” Contemporary Political Theory, No. 2, Professor at School of Political Science, University of Queensland, pg. 25, JPL) A conceptualization of human agency cannot be based on a parsimonious proposition, a one AND voice F to the benefit of a polyphonic array of whispers and shouts.
4. Perm– Do both. At best their link is one of omission, the permutation resolves it
5. The critique is anthropocentric – it assumes knowledge for nature Bobertz 97 Bobertz Ass’t Prof of Law, Nebraska College of Law, 1997, Bradley Columbia Journal of Environmental Law,Lexis Apart from the political dangers Ferry associates with deep ecology, he believes the AND mountain" are metaphorical and heuristic, not literal and agenda-setting.
6. Their impact claims are anthropocentric – belief that humans can cause such harm replicates the problem Fox, 5 (Russel, 11/22/5, “The Real Anthropocentrism,” In Medias Res, Ph.D, Assistant Professor of Political Science Division of Social and Behavioral Sciences Friends University, JPL) In the end, I think the attempt to purge the human, to reduce AND the equation, and call what remains to be conserved truly "natural."
7. Perm, do the plan and all non-mutually exclusive parts of the alt. We can recognize the need for environmentally sustainable practices without resorting to dangerous biocentrism Hwang, 3 (Kyung-Sig, 2003, “Apology for Environmental Anthropocentrism,” Eubios Ethics Institute, Professor in Department of Philosophy at Seoul National University, JPL) *Gender modified While our ability to affect the future is immense, our ability to foresee the AND identity with the future generations is essential in the process of human evolution.
8. Preventing human extinction is necessary in an eco-centric framework Baum 9 – PhD @ Penn State University Sean Baum, PhD @ Penn State University, 2009, “Costebenefit analysis of space exploration: Some ethical considerations,” Space Policy, Vol. 25, Science Direct It is of note that the priority of reducing the risk of human extinction persists AND , and thus human survival is necessary for Earth life to transcend oblivion.
9. Alt fails – people will inevitably be ethnocentric Lee, 9, Philosophy Professor at Bloomsburg, ‘9 (Wendy, Spring, “Restoring Human-Centerednes to Environmental Conscience: The Ecocentrist's Dilemma, the Role of Heterosexualized Anthropomorphizing, and the Significance of Language to Ecological Feminism” Ethics and the Environment, Vol 14 No 1, Project Muse) Bender undertakes this task in the course of promoting his specific version of ecocen trism AND anything but an argument for nondualism—and this Bender does not provide.
10. Given that inevitability, the attempt of the alternative causes us to give up and abandon all ethical engagement with the environment Lee, 9, Philosophy Professor at Bloomsburg, ‘9 (Wendy, Spring, “Restoring Human-Centerednes to Environmental Conscience: The Ecocentrist's Dilemma, the Role of Heterosexualized Anthropomorphizing, and the Significance of Language to Ecological Feminism” Ethics and the Environment, Vol 14 No 1, Project Muse) A second difficulty is that if Bender is correct that the centeredness of human consciousness AND presumably egoistic self and permanently redirect consciousness towards the eco-centric.3
Rejecting anthropocentrism prevents the environmental movement from effectuating political change Martin W. Lewis, 1992. Associate Research Professor of Geography, Duke University. Green Delusions: An Environmentalist Critique of Radical Environmentalism, 22 It is widely accepted that environmental thinkers can be divided into two camps: those AND of the anthropocentric versus nonanthropocentric dichotomy, see Norton 1987, chapter II.)
10/22/13
2AC Anthro K - MAC
Tournament: MAC | Round: 1 | Opponent: Texas SJ | Judge: Wes Dwyer Permutation: do both the plan and the alternative. We should attempt to limit suffering of all beings human and non-human. The massive wars the plan prevents would destroy countless lives.
The permutation solves the impacts – the 1AC doesn’t increase factory farms which means the plan is not mutually exclusive with the alternative and the links don’t assume the inclusion of the alternative into the ethics of the 1AC.
The alt alone can’t solve - Some amount of human centeredness is inevitable – we can never fully understand the non-human Parker 1996, Kelly A., Associate Professor and Chair of philosophy at Grand valley state Pragmatism and Environmental Thought, Environmental Pragmatism edited by Andrew Light and Eric Katz,
I have spoken of the experience of organisms in environments as centrally AND shameful. It is, after all, the only way to go.
We have to recognize our position- you cannot think like an owl because you are not one. Instead we should utilize our agency in a manner productive for animal rights Harvey, 1999 (David, Distinguished Professor at the City University of New York, Global Ethics and Environment, Edited by Nicholas Low, “Considerations on the environment of justice,” , Page 123) This conception is species-centred and thereby commits me resolutely to a particular form AND of thought and action that relate across self and others in particular ways.
There are three main problems with this narrative. First, deep ecology's insistence on AND an incidental by-product of the process of connecting with the whole.
The alternative makes moral culpability impossible – if all beings are equal than any human action is justified as natural Grey ‘93 William, “Anthropocentrism and Deep Ecology” Australian Journal of Philosophy, Vol 71, No 4 (1993), pp. 463-475
There is an obvious tension which arises when attempting to rectify the first two worries AND the natural world, then these evaluations will be transmitted to the world.
In a pertinent criticism, Michael Northcott suggests that this notion of cosmological identification requires AND earlier: deep ecology lacks a political theory and lapses unwittingly into authoritarianism.
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block 2. THEIR CRITICAL, PARTIAL ACCEPTANCE OF HEIDEGGER IS INSUFFICIENT AND ONLY STRENGTHENS THE DISTINCTION BETWEEN HUMAN AND NONHUMANS, PUSHING POPULATIONS TOWARDS GENOCIDE - KILLING BEINGS WITH INAUTHENTIC VIEWS OF DEATH IS ACCEPTABLE BECAUSE THEY DO NOT DIE – ONLY PERISH. Calarco 2k3 matthew, PHD Suny-Binghamton, "on the borders of language and death: derrida and the question of the animal", angelaki Now it might seem that by attempting to disrupt the strict binaries that separate the AND analyses of how animals (and not “The Animal”) also die.
3. Perm– Do both. At best their link is one of omission, the permutation resolves it
4. The critique is anthropocentric – it assumes knowledge for nature Bobertz 97 Bobertz Ass’t Prof of Law, Nebraska College of Law, 1997, Bradley Columbia Journal of Environmental Law,Lexis Apart from the political dangers Ferry associates with deep ecology, he believes the AND mountain" are metaphorical and heuristic, not literal and agenda-setting.
5. Their impact claims are anthropocentric – belief that humans can cause such harm replicates the problem Fox, 5 (Russel, 11/22/5, “The Real Anthropocentrism,” In Medias Res, Ph.D, Assistant Professor of Political Science Division of Social and Behavioral Sciences Friends University, JPL) In the end, I think the attempt to purge the human, to reduce AND the equation, and call what remains to be conserved truly "natural."
6. Perm, do the plan and all non-mutually exclusive parts of the alt. We can recognize the need for environmentally sustainable practices without resorting to dangerous biocentrism Hwang, 3 (Kyung-Sig, 2003, “Apology for Environmental Anthropocentrism,” Eubios Ethics Institute, Professor in Department of Philosophy at Seoul National University, JPL) *Gender modified While our ability to affect the future is immense, our ability to foresee the AND identity with the future generations is essential in the process of human evolution.
7. Reject systematic or all-encompassing “root cause” claims for human action Bleiker, 3 (Roland, 2003, “Discourse and Human Agency,” Contemporary Political Theory, No. 2, Professor at School of Political Science, University of Queensland, pg. 25, JPL) A conceptualization of human agency cannot be based on a parsimonious proposition, a one AND voice F to the benefit of a polyphonic array of whispers and shouts.
8. Preventing human extinction is necessary in an eco-centric framework Baum 9 – PhD @ Penn State University Sean Baum, PhD @ Penn State University, 2009, “Costebenefit analysis of space exploration: Some ethical considerations,” Space Policy, Vol. 25, Science Direct It is of note that the priority of reducing the risk of human extinction persists AND , and thus human survival is necessary for Earth life to transcend oblivion.
9. Alt fails – people will inevitably be ethnocentric Lee, 9, Philosophy Professor at Bloomsburg, ‘9 (Wendy, Spring, “Restoring Human-Centerednes to Environmental Conscience: The Ecocentrist's Dilemma, the Role of Heterosexualized Anthropomorphizing, and the Significance of Language to Ecological Feminism” Ethics and the Environment, Vol 14 No 1, Project Muse) Bender undertakes this task in the course of promoting his specific version of ecocen trism AND anything but an argument for nondualism—and this Bender does not provide.
1/5/14
2AC Apocalyptic Rhetoric - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday Cyberwar is probable- multiple IR theories prove Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
There is likely a near-zero chance of nuclear war, but protective and defensive counter-measures like the aff are still necessary Matheny, ‘7 Jason G. Matheny, “Reducing the Risk of Human Extinction” Risk Analysis, Vol. 27, No. 5, 2007 It is possible for humanity (or its descendents) to survive a million years AND stakes are high, it could be wise to invest in extinction countermeasures.
Our impacts aren’t constructed until they prove it. Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
10/22/13
2AC Apocalyptic Rhetoric - UNLV
Tournament: UNLV | Round: 5 | Opponent: Trinity VR | Judge: Brian McBride 5. Our impacts aren’t constructed until they prove it. Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
6. Even if predictions in the abstract are wrong, policy debates is productive, improves predictive accuracy, and solves cession of the debate to cloistered experts Tetlock and Gardner 2011 (Philip Tetlock is a professor of organizational behavior at the Haas Business School at the University of California-Berkeley, AND Dan Gardner is a columnist and senior writer for the Ottawa Citizen and the author of The Science of Fear, received numerous awards for his writing, including the Michener Award, M.A. History from York, "OVERCOMING OUR AVERSION TO ACKNOWLEDGING OUR IGNORANCE" July 11 www.cato-unbound.org/2011/07/11/dan-gardner-and-philip-tetlock/overcoming-our-aversion-to-acknowledging-our-ignorance/) The optimists are right that there is much we can do at a cost that AND you affix more realistic odds than your competitors on policy bets panning out.
10/22/13
2AC Appropriations CP
Tournament: UCO | Round: 1 | Opponent: Kansas KR | Judge: Hageney Perm- do the plan and the counterplan Perm- do the counterplan Non- intrinsic counterplans are a voting issue- they are unpredictable making impossible to garner 2ac offense while artificially inflating neg benefits- skews the debate too far in favor of the neg Doesn’t solve any advantage a) Norms won’t be created by complete abdication, we have to create checks and balances – that’s Bradbury and Goldsmith Links to politics Kimery 12 Anthony, ¶ Online Editor and Manager of KMD Media's Online Media Division, Anthony "Tony" Kimery is one of the founding editors of Homeland Security Today. A respected award-winning editor and journalist, he's covered homeland, national and global security, intelligence and defense issues for three decades., Senate Cybersecurity Bill Shot Down Amid Partisan Acrimony, US Chamber Opposition, 08/02/2012, http://www.hstoday.us/single-article/senate-cybersecurity-bill-shot-down-amid-partisan-acrimony-us-chamber-opposition/338eb768f7b3094acaa7b6ef21ffdeba.html#SPS
In a 52-46 vote Thursday, the Senate chose to cut off debate AND five co-sponsors of the legislation indicating its support for the bill. CP ends all OCO’s, that’s bad: OCO’s key to airpower Shaud and Lowther 11 John A., PhD, USAF, retired, is director, Air Force Research Institute, Maxwell AFB, Alabama, where he directs an 80-person organization charged with conducting independent research, outreach, and engagement to enhance national security and assure the effectiveness of the US Air Force; Adam B., PhD, is a faculty researcher and defense analyst at the Air Force Research Institute, Maxwell AFB, An Air Force Strategic Vision for 2020–2030, Spring 2011, http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA537570#SPS For the Air Force, power projection can take many forms—as either ¶ AND second- and third-order ¶ effects of initial strikes manifest themselves.¶ Solves global conflict escalation Khalilzad and Lesser, 1 (PhD from the University of Chicago, counselor at CSIS, permanent representative to the UN, Senior Transatlantic Fellow at the US German Marshall Fund, former Vice President and Director of Studies at the Pacific Council on International Policy, RAND, “Sources of Conflict in the 21st Century”, p.164-5, http://www.rand.org/pubs/monograph_reports/MR897/MR897.chap3.pdf)
This subsection attempts to synthesize some of the key operational implications distilled from the analyses AND , China-Taiwan, India-Pakistan, and the Persian Gulf.
11/11/13
2AC Baudriallard Psychoanalysis - Wake
Tournament: Wake Forest | Round: 7 | Opponent: NYU DD | Judge: D Stout
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. C. Policy simulation key to creativity and decisionmaking—the detachment that they criticize is key to its revolutionary benefits Eijkman 12 The role of simulations in the authentic learning for national security policy development: Implications for Practice / Dr. Henk Simon Eijkman. electronic resource http://nsc.anu.edu.au/test/documents/Sims_in_authentic_learning_report.pdf. Dr Henk Eijkman is currently an independent consultant as well as visiting fellow at the University of New South Wales at the Australian Defence Force Academy and is Visiting Professor of Academic Development, Annasaheb Dange College of Engineering and Technology in India. As a sociologist he developed an active interest in tertiary learning and teaching with a focus on socially inclusive innovation and culture change. He has taught at various institutions in the social sciences and his work as an adult learning specialist has taken him to South Africa, Malaysia, Palestine, and India. He publishes widely in international journals, serves on Conference Committees and editorial boards of edited books and international journal
Policy simulations stimulate Creativity Participation in policy games has proved to be a highly effective AND set of meanings and beliefs to guide the policy process in the desired direction
2. Even if there is no objective truth, rationality can provide justified belief, and we should still act as if there were. Sherry 96 – Suzanna, “The Sleep of Reason”, Georgetown Law Journal, Feb, lexis In order to make even such a limited defense, however, I must first AND as if there were. It remains only to give that epistemology content.
3. Aff answers their deterrence arguments – cyber weapons break down deterrence, making nuclear war actually possible,
4. Permutation – do the plan and break the mental chains of deterrence. No reason these two actions are mutually exclusive. 5. Images of nuclear apocalypse are necessary to problematize their usage James Foard. 1997. Associate Professor of Religion, Arizona State, “Imagining Nuclear Weapons: Hiroshima, Armageddon, and the Annihilation of the Students of Ichijo School,” Journal of the American Academy of Religion, http://jaar.oxfordjournals.org/cgi/reprint/LXV/1/1.pdf TBC 7/1/10) This ambivalence about Hiroshima has been partially ameliorated by displacing it with Armageddon in our AND to use the most famous phrase, "fabulously textual" (Derrida'23).
6. Living in the simulation does not mean we believe the simulation – we live in a world full of simulations from video-games to mock interviews, that doesn’t cause their impact. 7. IR theory proves cyberwar is probable- multiple mechanisms Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking. 8. Perm do the plan and non-mutually exclusive parts of the alternative. 9. Thinking about worst-case cyber scenarios is good- key to preparedness and reduces chances of cyber war Clarke and Knake ‘10 Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB
In the seminal 1983 movie about computers and war, War Games, ¶ starring AND period of rising ¶ tensions between the U.S. and China.
“We’re not going to have an immigration reform bill this year, or next year, that doesn’t deal with the 11 million,” Fitz predicted. “People are hungering for a solution. These piecemeal measures may step in the right direction for some, but they’re clearly not going to solve the whole problem.”
President Obama can – and will – take steps on immigration reform in the event AND reporters this week. "He's ready to move forward if we're not." Disad isn’t intrinsic to the aff – it’s within the agential ambit of the USFG to do the plan and pass debt ceiling Plan boosts Obama’s capital without triggering a fight over authority Kriner 10 Douglas Kriner, Assistant Profess of Political Science at Boston University, 2010, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60
Presidents and politicos alike have long recognized Congress's ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36
Obama won’t fight the plan Howell and Pevehouse 7 William Howell and Jon Pevehouse, Associate Professors at the Harris School of Public Policy at the University of Chicago, 2007, When Congress Stops Wars, Foreign Affairs, EBSCO
After all, when presidents anticipate congressional resistance they will not be able to overcome AND Pace, so as to avoid a clash with Congress over his reappointment.
No impact to econ decline Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, “Poverty as a cause of wars?” p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
House Republicans don't want to do President Obama any favors, but he's asking for AND as bad as the alternative of action, you’re going to take inaction." Plan boosts Obama’s capital without triggering a fight over authority Kriner 10 Douglas Kriner, Assistant Profess of Political Science at Boston University, 2010, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60
Presidents and politicos alike have long recognized Congress's ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36 Disad isn’t intrinsic – it’s within the agential ambit of the USFG to do the plan and pass CIR Impact isn’t reverse casual – won’t collapse absent reform 2AC Econ Immigration not key to economy Flynn 13 Mike Flynn 13, Breitbart reporter, July 13, "White House Oversells Economic Benefits of Immigration Reform," www.breitbart.com/Big-Government/2013/07/13/white-house-oversells-economic-benefits-of-immigration-reform
On Saturday, President Obama used his weekly radio address to tout the economic benefits AND immigration reform. Economic growth, however, seems a very weak one.
11/16/13
2AC CIR DA - AUMF Aff - UTD
Tournament: UTD | Round: 3 | Opponent: Wyoming MP | Judge: Rob Burns Won’t pass---Boehner irrelevant Adam O'Neal 12-23, December 23rd, 2013, "Immigration reform in 2014? Not so fast," https://www.humanevents.com/2013/12/23/immigration-reform-in-2014-not-so-fast/ A California-based immigration reform activist, who spoke to CalWatchdog.com on AND his tune. But that doesn’t mean he’ll change his strategy just yet. The DA is not intrinsic – it’s within the agential ambit of the USFG to do the plan and pass immigration Plan boosts Obama’s capital Douglas Kriner 10, Assistant Profess of Political Science at Boston University, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60 Presidents and politicos alike have long recognized Congress's ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36 No fight-back link - No fight back – Obama asked for the plan – that’s WSJ
President Obama kicked off the long Memorial Day weekend with a speech which had a AND power for the federal legislative branch to review and restrain the president's actions.
PC not key Greg Sargent 13, "Syria won't make GOP's immigration problem go "poof" and disappear ; Syria or no Syria, Republicans will still pay the same price among Latinos if they kill reform," 9/12, Washington Post, Factiva But when it comes to immigration -- as with this fall's fiscal fights -- that AND Beltway-generated ideas about Obama's "standing" -- as mitigating factors? Economic benefits are overstated Mike Flynn 13, Breitbart reporter, July 13, "White House Oversells Economic Benefits of Immigration Reform," www.breitbart.com/Big-Government/2013/07/13/white-house-oversells-economic-benefits-of-immigration-reform On Saturday, President Obama used his weekly radio address to tout the economic benefits AND immigration reform. Economic growth, however, seems a very weak one. Obama’s PC is dead and he’s not using it anyway---and minimum wage, education, and climate change thump Benac and Pace 1-1 Nancy Benac AND* Julie Pace 1-1, AP writers, January 1st, 2014, "Obama’s presidency, beset by fits, starts new year," Wisconsin Gazette, www.wisconsingazette.com/breaking-news/obamas-presidency-beset-by-fits-starts-year-5.html
In 2013, Obama’s critics doubled down. Fractured Republicans, swore off compromise. AND dismal standings in the polls suggest he can’t count on a public groundswell.
1/14/14
2AC CIR Politics - AUMF - UTD
Tournament: UTD | Round: 3 | Opponent: Wyoming MP | Judge: Rob Burns Won’t pass---Boehner irrelevant Adam O'Neal 12-23, December 23rd, 2013, "Immigration reform in 2014? Not so fast," https://www.humanevents.com/2013/12/23/immigration-reform-in-2014-not-so-fast/ A California-based immigration reform activist, who spoke to CalWatchdog.com on AND his tune. But that doesn’t mean he’ll change his strategy just yet. The DA is not intrinsic – it’s within the agential ambit of the USFG to do the plan and pass immigration Plan boosts Obama’s capital Douglas Kriner 10, Assistant Profess of Political Science at Boston University, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60 Presidents and politicos alike have long recognized Congress's ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36 No fight-back link - No fight back – Obama asked for the plan – that’s WSJ
President Obama kicked off the long Memorial Day weekend with a speech which had a AND power for the federal legislative branch to review and restrain the president's actions.
PC not key Greg Sargent 13, "Syria won't make GOP's immigration problem go "poof" and disappear ; Syria or no Syria, Republicans will still pay the same price among Latinos if they kill reform," 9/12, Washington Post, Factiva But when it comes to immigration -- as with this fall's fiscal fights -- that AND Beltway-generated ideas about Obama's "standing" -- as mitigating factors? Economic benefits are overstated Mike Flynn 13, Breitbart reporter, July 13, "White House Oversells Economic Benefits of Immigration Reform," www.breitbart.com/Big-Government/2013/07/13/white-house-oversells-economic-benefits-of-immigration-reform On Saturday, President Obama used his weekly radio address to tout the economic benefits AND immigration reform. Economic growth, however, seems a very weak one.
No impact to econ decline Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, “Poverty as a cause of wars?” p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
The chances of the House passing amnesty are less than zero. This leaves both AND just looks like too many moving parts for the two sides to manage.
2. Don’t evaluate the disadvantage, it’s not an opportunity cost to the plan since the judge has the ability to vote for both. Opportunity cost is the basis for all decision making and the only way you should evaluate the round.
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act.”¶
4. Winners win Marshall and Prins ‘11 Bryan W. MARSHALL AND PRINS 11, Miami University, Department of Political Science AND Brandon C. PRINS, University of Tennessee and Howard H. Baker, Jr. Center for Public Policy, September 2011 “Power or Posturing? Policy Availability and Congressional In?uence on U.S. Presidential Decisions to Use Force”, Presidential Studies Quarterly, http://onlinelibrary.wiley.com/doi/10.1111/j.1741-5705.2011.03885.x/pdf, Stolarski
Presidents rely heavily on Congress in converting their political capital into real policy success. AND made with an eye toward managing political capital at home (Fordham 2002).
President Obama says he’s ready to renew the push for immigration reform immediately after the AND body that seems incapable of handling a bill that requires compromise to pass.
6. PC fails on CIR – Obama has zero relationship with House Republicans Linda Feldmann, 10/16/2013 (staff writer, “Debt limit deal: Obama may have won, but victory is hardly lasting,” http://www.csmonitor.com/USA/Politics/2013/1016/Debt-limit-deal-Obama-may-have-won-but-victory-is-hardly-lasting, Accessed 10/16/2013, rwg) And yet Obama is talking as if he can pick up with his domestic policy AND crisis helped him build any relations that will move other legislative priorities forward.”
Obama losing immigration still results in high-skill reform Matthew Yglesias, Slate, 1/15/13, How the GOP Can Roll Obama on Immigration, www.slate.com/blogs/moneybox/2013/01/15/immigration_reform_will_obama_get_rolled.html, CMR Of the major policy issues under discussion in Washington, "immigration reform" stands AND kind of fanaticism that is the exact opposite of Obama's approach to politics. High-skilled workers will slide through Ferenstein 1/28 (Gregory, “A Congress That Does Things? Immigration Reform Makes Huge Bipartisan Progress”, 2013, http://techcrunch.com/2013/01/28/a-congress-that-does-things-immigration-reform-makes-huge-bipartisan-progress/, CMR)
The new Congress is showing signs that it may finally leave behind its old habit AND So, there’s good reason to believe that immigration reform may happen soon.
Tournament: Wake Forest | Round: 3 | Opponent: George Washington NS | Judge: Mikaela Maslin 2AC
No Link – plan allows flexibility while still solving our internal links Clarke and Knake ‘12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased. Sanctions increase will pass now – negotiations are failing Landler 11-13 (MARK LANDLER, “Obama Tells Lawmakers to Give Iran Sanctions More Time” November 14, 2013, http://www.nytimes.com/2013/11/15/us/politics/obama-iran.html, KB)
Negotiators plan to meet again with Iran next week in Geneva. But the diplomatic AND that we are reducing sanctions while Iran is not reducing its nuclear capabilities.”
Most analyses of what happened in Geneva last week have centered on what the failure AND irrevocable manner last week. In so doing, he destroyed US credibility.
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
Thinking about worst-case cyber scenarios is good- key to preparedness and reduces chances of cyber war Clarke and Knake ‘10 Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Robert K. Knake, Former international affairs fellow in residence @ CFR. Cyber War. ETB
In the seminal 1983 movie about computers and war, War Games, ¶ starring AND period of rising ¶ tensions between the U.S. and China.
Escalations of a US-China cyberwar is unlikely, but the magnitude means the scenario warrant consideration
Mazanec ‘9 Brian M. Mazanec is a senior intelligence analyst at SRA International who has supported various agencies within the Intelligence Community, the Joint Staff, the Office of the Secretary of Defense, the Defense Threat Reduction Agency, and the Department of Homeland Security. The Journal of International Security Affairs #16. http://www.securityaffairs.org/issues/2009/16/mazanec.php ETB
The most severe application of PRC cyberwarfare would, for obvious reasons, occur in AND such a confrontation suggest that, however remote, the scenario warrants examination.
Keeping the metaphor of cyber war alive is key to recognizing its deceptive potential Rid ‘13 Dr Thomas Rid is a Reader in War Studies at King's College London., International Studies Today, April/May 2013. http://www.bisa.ac.uk/files/Permanent20Files/IST20AprilMay202013.pdf
Metaphors and analogies, philosophers ¶ of language know, may die. They die AND keen interest to keep some metaphors alive - long live ‘cyber war’.
Cyberwar is probable- multiple IR theories prove
Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
Cyber threats are real – they facilitate dangerous armed social movements Deibert and Rohozinski 2010 (Ronald J, professor of Political Science and Director of the Canada Centre for AND International Political Sociology, vol. 4, p. 22, BS)
Even among democratic states, the explosion of civic networks has presented serious challenges, AND a 14-year-old living in a refugee camp in Lebanon.
Nonunique – Cyber war is coming right now A. Goldsmith 10 – U.S. broke the taboo with Stuxnet, now every country is scrambling for OCOs B. Moss 13 – Low level attacks happening now, U.S. is planning to escalate C. CSM 12 – No precedent difficulty in applying status quo norms D. Austin 8/6 – complete military control means there is no stabilizing force
2. Deterrence doesn’t apply to cyberspace Weiner 12, research intern for the Project on Nuclear Issues, Boss, Internally cites Dr. Lewis who is the director of the Center for Homeland Security and Defense, https://www.hsdl.org/hslog/?q=node/9216Note: Sarah Weiner is Cal debate coach, however this evidence relies upon Dr. Lewis’s findings and was written before the announcement of the topic Others vehemently disagree with this presupposition. Jim Lewis, for example, argued earlier AND is an unexpected attack, and that does nothing for signaling or deterrence.
3. No link – Clear counterstrike legitimacy maintains deterrence Kesan, prof of law, 12 Jay P. and Carol M., *Professor, H. Ross and Helen Workman Research Scholar, and Director of the Program in Intellectual Property and Technology Law, University of Illinois College of Law, Research Fellow, University of Illinois College of Law, Mitigative Counterstriking: Self-defense and deterrence in cyberspace, Spring, 2012, Harvard Journal of Law and Technology, 25 Harv. J. Law and Tec 415 Ideas, computers, and intellectual property have become extremely important in the modern Information AND approaches in order to afford these private parties more protection against these threats.
4. Turn — norms make deterrence stable — only the plan solves — that’s CSM
5. Deterrence is impossible in cyber space – Attriibution, Identity, Proxies, Escalation incentive Owens et al. 09 (WILLIAM A. OWENS, AEA Holdings, Inc AND Regarding U.S. Acquisition and Use of Cyberattack Capabilities”, pdf)
It remains an open question as to whether the concepts of deterrence are relevant when AND the conflict more overt), this point is discussed in more detail below.
10/22/13
2AC Death K
Tournament: Wichita State | Round: 1 | Opponent: Kansas BC | Judge: Dan Stout Fear of extinction is a legitimate and productive response to the modern condition---working through it by validating our representations is the only way to create an authentic relationship to the world and death Macy 2K Joanna Macy, adjunct professor at the California Institute of Integral Studies, 2000, Environmental Discourse and Practice: A Reader, p. 243
The move to a wider ecological sense of self is in large part a function AND as a species – be immune to what we do to other beings.
Thinking about death is necessary to enjoy life Christine Overall, Associate Dean of Arts and Sciences at Queen’s University, Kingston, PhD in Philosophy from the University of Toronto, 2003, Aging, Death and Human Longevity: A Philosophical Inquiry, p. 2-3 I believe it is neither immature nor irresponsible to dwell on human mortality. Indeed AND may give new life to perennial philosophical questions about human purposes and values. Risk framing motivates new social movements and re-democratizes politics Borraz, ‘7 Olivier Borraz, Centre de Sociologie des Organisations, Sciences Po-CNRS, Paris, Risk and Public Problems, Journal of Risk Research Vol. 10, No. 7, 941–957, October 2007, p. 951 These studies seem to suggest that risk is a way of framing a public problem AND rifts stemming from antagonistic views of science, democracy and the world order.
1/25/14
2AC Death K
Tournament: UT | Round: 2 | Opponent: Texas KS | Judge: Erik Mathis
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
Their refusal to engage in politics is the ultimate form of ressentiment. Saul Newman (postdoctoral fellow at Macquarie University). “Anarchism and the Politics of Ressentiment.” Theory and Event 4:3. 2000.
Can this paradoxical relationship of reflection and opposition be seen as a form of ressentiment AND 'evil'. Nietzsche would see in this an attitude of ressentiment par excellence.
Our impacts aren’t constructed until they prove it. Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
Permutation: do both The interdependency between political action and personal thought is unavoidable in reaching the goals of both projects. Criticisms that try to deny our attempts to correct social injustices traps theory in the exclusions it attempts to cure. And the perm solves the resentiment and oppression impacts. William Connolly. Identity/Difference. 1991. Page 33-34.
The most general (and idealistic) idea is to subdue the politics of generalized AND This more or less reverses the emphasis I have followed in the past. The thinking that refuses to engage the second front can often be identified through its AND ideal so that I can dream my dream of a world without injustice?
The best perm card ever written
The interdependency between political action and critical theory is unavoidable in reaching the goals of both projects. Criticisms that try to deny our attempts to correct social injustices traps theory in the exclusions it attempts to cure.
William Connolly. Identity/Difference. 1991. Page 33-34.
The most general (and idealistic) idea is to subdue the politics of generalized AND ideal so that I can dream my dream of a world without injustice?
Only the plan affirms life – embracing the struggle against our genetic predisposition towards violence through resisting nuclear war is key Barash and Lipton, 1985 David P., Professor of Psychology at the University of Washington (Seattle) and Judith Eve, psychiatrist at the Swedish Medical Center in Washington, “The Caveman and the Bomb” p.261-267 Fortunately, whatever genetic imperatives operate in Homo sapiens, they are unlikely to extend AND Neanderthal mentality and thereby transcend, if not overcome, our biology itself.
Perm do the alternative- It literally is us – Stefan Ramaekers. “Teaching to Lie and Obey: Nietzsche and Education.” Journal of Philosophy of Education 35.2, 2001.
In Beyond Good and Evil, Nietzsche says about education: Parents involuntarily make something like themselves out of their children – they call that “education”; no mother doubts at the bottom of her heart that the child she has borne is thereby her property, no father hesitates about his right to subject it to his own ideas and notions of worth. In view of the importance Nietzsche attaches to obedience, to being embedded, one AND human being is molded into a particular shape that he cannot do without. My understanding of Nietzsche is consequently at variance with any understanding which arguments for AND in the rich sense. In consequence education becomes essentially self-education.
Link turn – focusing on preventable death solves the link Kadampa Meditation Center. No Date. International Meditation Center and Temple for World Peace. http://www.meditateinla.org/temple/dealing-with-fear/ A healthy fear of death would be the fear of dying unprepared, as this AND our life to engage purely in spiritual practice we can do the same. Rejecting ethical norms means the will-to-power reigns supreme – guarantees extinction Fasching 1993 (Darrell J., Professor of Religious Studies at University of South Florida, The Ethical Challenge of Auschwitz and Hiroshima, Pp. 28-29) Our modern technological civilization offers us seemingly infi¬nite utopian opportunities to recreate ourselves (e AND us that a normless world will inevitably end in apocalyptic self-destruction.
As the government shutdown enters its third day, Democrats and Republicans seem no closer AND said, will give Republicans more areas where they can look for victory.
The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a deal
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act."¶
The White House’s distance diplomacy with Republicans is an approach that tacitly acknowledges three inescapable AND the president’s always had a "laissez-faire" approach to Congress.
The U.S. debt ceiling deadline may be looming like dark clouds over AND has gone relatively smoothly since early this year despite the onslaught of criticism.
With no movement on either side and the debt ceiling fast approaching, there’s increasing AND around, again, Clinton is advising Obama to call the GOP’s bluff.
No impact to econ decline
Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, "Poverty as a cause of wars?" p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
No impact to econ decline
Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, "Poverty as a cause of wars?" p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
President Barack Obama’s nominee to lead the Federal Energy Regulatory Commission abandoned his quest Tuesday AND , while his supporters lamented that partisan bickering had defeated a qualified candidate.
As he battles with congressional Republicans over the budget and the debt ceiling, and AND will not negotiate with the GOP in Congress over extending the debt ceiling.
This president just dialed back the power of his own office.¶ Obama has reversed AND the imperial presidency than anything his predecessors or Congress have done for decades.¶
Unfortunately, there is much more to this vote than a President forcing the Congress AND and confuse settlement of the budget question, and exacerbate existing budget tensions. Winners win Marshall and Prins ‘11 Bryan W. MARSHALL AND PRINS 11, Miami University, Department of Political Science AND Brandon C. PRINS, University of Tennessee and Howard H. Baker, Jr. Center for Public Policy, September 2011 “Power or Posturing? Policy Availability and Congressional In?uence on U.S. Presidential Decisions to Use Force”, Presidential Studies Quarterly, http://onlinelibrary.wiley.com/doi/10.1111/j.1741-5705.2011.03885.x/pdf, Stolarski
Presidents rely heavily on Congress in converting their political capital into real policy success. AND made with an eye toward managing political capital at home (Fordham 2002).
PC fails – only our evidence assumes recent developments Cillizza 6/25 (Chris Cillizza, “Is the presidential bully pulpit dead?; Driving a narrative is almost impossible these days -- even for the president of the United States.” June 25, 2013, Washington Post Blogs, LexisNexis, KB)
While you can debate the relative bad-ness of each of the stories for AND to diminish as a dominating message delivery system in the years to come. No proliferation Cook 12 4/2, *Steven A. Cook is the Hasib J. Sabbagh Senior Fellow for Middle Eastern Studies at the Council on Foreign Relations, “Don't Fear a Nuclear Arms Race in the Middle East,” http://www.foreignpolicy.com/articles/2012/04/02/don_t_fear_a_nuclear_arms_race?page=0,0, AJ The conventional wisdom has it wrong: Iran’s development of a nuclear weapon won’t spur AND reason to believe these countries represent a proliferation risk in the first place.
9/22/13
2AC DoD Shift CP
Tournament: Wake Forest | Round: 7 | Opponent: NYU DD | Judge: D Stout
Perm do both
2. Austin 8/6
Perm- do the plan and the counterplan
Perm- do the counterplan Doesn’t solve any advantage- no internal link ev specific to merely shifting authority being sufficient to remedy our internal links- solvency burden is on the neg
Doesn’t solve modeling Rothschild 13 (Matthew, Feb 4, "The Danger's of Obama's Cyber War Power Grab," www.progressive.org/dangers-of-obama-cyber-war-power-grab)
When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
CP is a rubber stamp – only the aff can solve perception Somin, George Mason Law Prof, 13 (Ilya, 4-23-13, “Hearing on ‘Drone Wars: The Constitutional and Counterterrorism Implications of Targeted Killing’: Testimony before the United States Senate Judiciary Subcommittee on the Constitution, Civil Rights, and Human Rights,” accessed 10-2-13,http://www.law.gmu.edu/assets/files/faculty/Somin_DroneWarfare_April2013.pdf, hec) Alternatively, one can envision some kind of more extensive due process within the executive AND -selection process with informed opinion both in the United States and abroad.
Many strategic experts still believe Europe's current financial crisis is just an aberration which will AND EU sanctions against those it does not like — is no longer credible. US and EU influence don’t trade off Grant 03 Charles Grant, director of the Center for European Reform, 03 april/may, cer bulletin, issue 29, “The Decline of American Power” http://www.cer.org.uk/articles/29_grant.html, accessed 7-17-07 When the war is over, the western allies will have a strong interest in AND countries with more power hard and soft on both sides of the Atlantic. No tradeoff Nye 04 Joseph Nye, Dean of the Kennedy School at Harvard, SOFT POWER 2004, p 82. Not only can European soft power be used to counter American soft power and raise the price of unilateral actions, but it can also be a source of assistance and reinforcement for American soft power and increase the likelihood of the United States’ achieving its objectives. Soft power can be shared and used in a cooperative fashion. European promotion of democracy and human rights helps advance shared values that are consistent with American objectives. The Islamist extremists of Al Qaeda are fighting against Western values, not just American values, and European public diplomacy that counters their appeal is benefi
11/11/13
2AC Economic Rationality K - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday Economic rationality is ethical and solves war – self-interest motivates individuals to sacrifice some autonomy to produce security and protect the rights of others Aasland ‘9 (Dag, Prof. of Economics @ U of Agder, Norway, Ethics and Economy: After Levinas, pgs. 65-66)
Business ethics, in the sense of ethics for business, illustrates this: its AND by politics and economic rationality, people may unfold their freedom within the laws
10/22/13
2AC Exec Restraint - AUMF Aff
Tournament: UTD | Round: 3 | Opponent: Wyoming MP | Judge: Rob Burns Perm- do the plan and the counterplan- solves the link to politics Corcoran 11 --- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, “Obama's Failed Attempt to Close Gitmo: Why Executive Orders Can't Bring About Systemic Change,” 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President's future controversial policy changes. Perm- do the counterplan- CP doesn’t pose an opportunity cost to the aff because the net benefit is generated through fiat
CP doesn’t solve: a) terrorism- lack of legal clarity prevents effective prosecution of WOT- and unilateral executive action can’t generate the public support and international cooperation necessary for sustainable counter terror operations- and executive action can’t solve interbranch fatigue that is decimating response times and info sharing- that’s Chesney, Wainstein, and Leiter b) firebreaks- reliance on executive authority causes shift to article two justifications, which guts global non-use of force norms and erodes US legitimacy- that’s Barnes CP doesn’t solve terrorism or legitimacy and links to politics
Consider first the option of Congress doing nothing. This is, at bottom, AND to the interests of the ¶ individual in question (for obvious reasons). CP links to politics but the aff doesn’t
Having the intelligence committees publicly on board helps, but what the administration really needs AND at that point the administration will wish it had gone to Congress sooner.
CP Links to flex/warfighting/prez powers but the aff doesn’t
Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
Though the President's inherent authority to act in times of emergency¶ and war can AND the future and prevents the "gloss" that comes from congressional acquiescence.¶
When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
Perm — do both — Congressional involvement makes the plan popular — the CP links to politics
Corcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President’s future controversial policy changes.
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
Congressional power of the purse rolls back the CP
Fisher 4, Senior Specialist in Separation of Powers with the Congressional Research Service, LOC ~Louis, Presidential War Power: Second Edition, Revised, p. 274-277~ Statutory Restrictions Instead of relying on unpredictable court decisions, Congress must learn to invoke the powerful weapons at its command. Through its prerogative to¶ authorize programs and appropriate funds, it can define and limit presidential power. In domestic as well as in foreign affairs, Congress can withhold all or part of an appropriation and may attach riders to appropriations measures to proscribe certain actions.44¶ Some claim that the power of the purse is ineffective in restraining presidential wars. Senator Jacob Javits (R-N.Y.) said that Congress "can hardly cut off appropriations when 500,000 American troops are fighting for their lives, as in Vietnam."45 The short answer is that Congress can, and has, used the power of the purse to restrict presidential war power. If members of Congress are worried about American troops fighting for their lives in a futile war, those lives are not protected by voting for continued funding. The proper and responsible action is to terminate appropriations and bring the troops home. Members need to make that case to their constituents. It can be done.¶ The Supreme Court has held that the President as Commander in Chief "is authorized to direct the movements of the naval and military forces placed by law at his command, and to employ them in the manner he may deem most effectual to harass and conquer and subdue the enemy."46 The power to move forces "placed by law" at his command implies that Congress can, by statute, control the scope of the commander-in-chief powers. Many such restrictions have been enacted. Following are some contemporary examples.¶ In 1973, Congress used the power of the purse to end the war in Vietnam. Three years later it prohibited the CIA from operating in Angola other than to gather intelligence. Legislation also prohibited the Agency from conducting military or paramilitary operations in Angola and denied any appropriated funds to finance directly or indirectly any type of military assistance to Angola.47¶ In 1984, Congress adopted the Boland Amendment to prohibit assistance of any kind by the Reagan administration to support the Contras in Nicaragua. The all-embracing language read: "During fiscal year 1985, no funds available to the Central Intelligence Agency, the Department of¶ Defense, or any other agency or entity of the United States involved in intelligence activities may be obligated or expended for the purpose or which would have the effect of supporting, directly or indirectly, military or paramilitary operations in Nicaragua by any nation, group, organization, movement, or individual." 48 No constitutional objection to this provision was ever voiced publicly by President Reagan, the White House, the Justice Department, or any other agency of the executive branch.¶ Two years later, Congress restricted the President’s military role in Central America by stipulating that U.S. personnel "may not provide any training or other service, or otherwise participate directly or indirectly in the provision of any assistance, to the Nicaraguan democratic resistance pursuant to this title within those land areas of Honduras and Costa Rica which are within 20 miles of the border with Nicaragua."9 The statute defined U.S. personnel to mean "any member of the United States Armed Forces who is on active duty or is performing inactive duty training" and any employee of any department, agency, or other component of the executive branch.50 The clear purpose was to prevent military activities in Honduras and Costa Rica from spilling over into Nicaragua. The Reagan administration never offered any constitutional objections to this statutory restriction.¶ Also in 1986, Congress passed this prohibition on placing U.S. personnel in Nicaragua: "No member of the United States Armed Forces or employee of any department, agency, or other component of the United States Government may enter Nicaragua to provide military advice, training, or logistical support to paramilitary groups operating inside that country. Nothing in this title shall be construed as authorizing any member or unit of the Armed Forces of the United States to engage in combat against the government of Nicaragua."51¶ In 1991, when Congress authorized President Bush to use military force against Iraq, the authority was explicitly linked to UN Security Council Resolution 678, which was adopted to expel Iraq from Kuwait.52 Thus, the legislation did not authorize any wider action, such as using U.S. forces to invade and occupy Iraq. In 1993, Congress established a deadline for troops to leave Somalia. No funds could be used for military action after March 31, 1994, unless the President requested an extension from Congress and received legislative authority
Future presidents roll back
Harvard Law Review 12, "Developments in the Law: Presidential Authority," Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf The recent history of signing statements demonstrates how public opinion can effectively check presidential expansions AND practices. 147 Only time, and perhaps public opinion, will tell.
10/5/13
2AC Executive Order CP UMKC
Tournament: UMKC | Round: 2 | Opponent: Whitman LT | Judge: Sarah Topp International distrust of the president dooms the signal and solvency Rothschild 13 (Matthew, Feb 4, "The Danger's of Obama's Cyber War Power Grab," www.progressive.org/dangers-of-obama-cyber-war-power-grab) When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
“In an era of polarized parties and a fragmented Congress, the opportunities to AND a partisan content, with contemporary complaints coming from the incumbent president’s opponents.”
9/22/13
2AC Farm Bill DA - UTD
Tournament: UTD | Round: 6 | Opponent: KState KM | Judge: Kearny, Mike Farm Bill is third in line on Cantor’s agenda; health care and spending bills come first, the plan wouldn’t trade off with Farm Bill American Banker 1-7-14 Nexis, mg
House leaders are unlikely to take up housing finance reform on the chamber floor this AND conservative bill to unwind Fannie Mae and Freddie Mac before the August recess.¶
No new legislation will pass, Farm Bill not on near-term agenda Washington Post 1-6-13 Paul Kane, Nexis, mg
Expectations are already being lowered for the new year. When Sen. Max Baucus AND and over again, eventually you're going to wind up with big problems."¶ Won’t pass---partisan divisions and earmark rule Amy Mayer 12/30, "One thing that didn't happen in 2013: a Farm Bill", 2013, hppr.org/post/one-thing-didn-t-happen-2013-farm-bill If it seems like Congress just can’t get the farm bill done, well… AND get there.”¶ Now Christmas and New Year’s Day are out, too. Disad isn’t intrinsic to the aff – it’s within the agential ambit of the USFG to do the plan and pass the farm bill
Framework – The affirmative is a normative statement. Vote aff if the plan is a good idea, neg if it is not.
A. Aff Choice - Without a negative strategy that engages the aff, we are robbed on 9 minutes of speech time and given no chance to engage the negative. B. Limits – Their discussion explodes the limits in which we are able to debate – response to individualized events in the debate community means that literally every single debate, discussion, and event that has ever happened in the debate community suddenly becomes something the aff is expected to defend.
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
Let’s be clear – WE DO NOT REJECT A DISCUSSION OF STRUCTURAL VIOLENCE and/or RACISM. We just believe that it must respond directly to the affirmative. We don’t say you have to read a DA or a CP. We don’t say that your discussion is inherently bad, we just believe that the affirmative had the plan and the 1AC and some of that should be relevant in the debate 2. Permutation – do both. The lack of a link to the affirmative means that their discussion is not exclusive with the plan. We can respond to the events of the Harvard debate tournament and enact the affirmative plan. 3. WE PROBLEMATIZE THEIR CONCEPT OF the debate COMMUNITY AS A GIVEN TRUTH, AN UNDERSTOOD SITE OF THE POLITICAL. THIS IS THE SAME CONCEPTUALIZATION THAT GIVES WAY TO THE CLOSING OF THE COMMUNITY WE BOTH CRITICIZE. BY GIVING THE COMMUNITY MEANING AND PURPOSE, THEY REPLACE ONE FORM OF VIOLENCE WITH ANOTHER. THE VIOLENCE OF IMMANENCE, OF GOAL-ORIENTED POLITICS, OF PERFERCTION, REPLICATES THE EXCLUSION THEY CITE. THEIR UNWILLINGNESS TO CONFRONT OUR ARGUMENTS IS TESTAMENT TO THE ESSENTIAL NATURE OF OUR ARGUMENT TO THE VERY IDEA OF COMMUNITY.
NOYS 2K0 benjamin, “georges bataille”, p. 53-56
He does not offer us a distanced ‘safe’ Nietzsche, but offers us a AND makes community possible and as that which makes it impossible to achieve communion.
4. THEIR ATTEMPT TO OPERATE WITHIN A SINGULAR POLITICAL SITE (THEIR UNIQUE EXPERIENCES WITH COMMUNITY, YOUR PARTICULAR BALLOT, ETC.) ONLY MIRRORS THE SACRIFICAL LOGIC OF EXCLUSIONARY PRACTICES.
ISSEKS 2K3 fred, european graduate school candidate for the degree of doctorate of philosophy, “media courage: impossible pedagogy in an artificial community, a dissertation submitted to the division of media and communications, june 2003
Wernick traces Bataille’s history through the Surrealists and his quest for an “experience of AND the individual partakes in community, without having his or her freedom negated.
5. Our discussions are good even in their role of the ballot - role playing overcomes preconceived ideological notions and breaks out of traditional pedagogical frameworks by positing students as agents of decision-making Esberg and Sagan 12 *Jane Esberg is special assistant to the director at New York University's Center on. International Cooperation. She was the winner of 2009 Firestone Medal, AND Scott Sagan is a professor of political science and director of Stanford's Center for International Security and Cooperation “NEGOTIATING NONPROLIFERATION: Scholarship, Pedagogy, and Nuclear Weapons Policy,” 2/17 The Nonproliferation Review, 19:1, 95-108
These government or quasi-government think tank simulations often provide very similar lessons for AND quickly; simulations teach students how to contextualize and act on information.14
6. The call for the judge to evaluate the debate with a specific “role of the ballot” ignores the complexity of decision-making and demands the judge ignore his/her life experiences and agency Wordlaw 10 (Wardlaw, Kim McLane, Circuit Judge, United States Court of Appeals for the Ninth Circuit, 2010, “Umpires, Empathy, and Activism: Lessons from Judge Cardozo”, Notre Dame Law Review) FS Judge Cardozo recognized that the law is not always a strike zone; that the AND when those life experiences facilitate one’s ability to understand the circumstances of others.
7. Removing the judge’s personal agency prevents empathy so perspective-taking becomes impossible Nielson and Weinberg 12 (Nielson, Laura Beth, Associate Professor of Sociology and Law and Director of Legal Studies at Northwestern, and Weinberg, Jill D., MA from U. Chicago and PhD candidate at Northwestern, 2012, “EXAMINING EMPATHY: DISCRIMINATION, EXPERIENCE, AND JUDICIAL DECISIONMAKING”, Southern California Law Review, Vol. 85:313, http://weblaw.usc.edu/why/students/orgs/lawreview/documents/SCalLRev85_Weinberg.pdf) FS Although judges may decide cases mechanically or politically, the empathetic perspective suggests that judges AND group.40 Often these differences are based on race41 and gender42 categories.
8. Permutation – do the kritik as a first response and then enact the plan. There must come a time where the first response is done, at which point our discussions can continue.
9. Our model of debate is still good - effective deliberation is crucial to the activation of personal agency and is only possible in a switch-side debate format where debaters divorce themselves from ideology to engage in political contestation Roberts-Miller 3 Patricia Roberts-Miller 3 is Associate Professor of Rhetoric at the University of Texas "Fighting Without Hatred:Hannah Ar endt ' s Agonistic Rhetoric" JAC 22.2 2003
Totalitarianism and the Competitive Space of Agonism¶ Arendt is probably most famous for her AND not relativist, adversarial but not violent, independent but not expressivist rhetoric.
10. Permutation – do the plan and then begin our discussion of a first response.
We need not address concerns like prescribing a new metaphysics, politics, set of standards, whatever; our flea from their WILL TO ORDER IS PROFICIENT.
STRYSICK 97 michael, “the end of community and the politic of grammar”, cultural critique, p.195-215
Community gains nothing from attempting to build and rebuild immanent, avowable empires. Violence AND to realize that all are "other" and none are the same.
12Now, their argument is that we must discuss our relationship to the events at Harvard. There is no brightline for how much we must do that. Personally, Thayer and I were not at Harvard, we were only able to keep up on what was happening via the NDT/CEDA facebook page. Of course, that doesn’t mean that we weren’t affected by it. Myself, as a freshman, it was the first big thing that I experienced. I was confused, sad, angry, and nervous. I was upset that the community I love so much was so angry.
Obama’s actions are reducing prez powers now Yoo ‘13 -John, WSJ, John Yoo: Diminishing the Presidency online.wsj.com/article/SB10001424127887323375204578271681410646810.html A year ago this month, President Obama bypassed the Senate's advice-and- AND unfortunately, will prove to be his historical legacy unless he changes course.
2. Plan is critical to making prez powers effective- a clear congressional authorization is key to quick and decisive executive action during crisis- and it’s crucial to allow the president to fight emerging threats by clearly defining targets- that’s Cronogue and Chesney
4. No internal link- decreasing prez powers in one area doesn’t spillover- restrictions on Gitmo transfers proves
5. No impact to prez powers Healy 11 Gene Healy is a vice president at the Cato Institute and the author of The Cult of the Presidency, The CATO Institute, June 2011, "Book Review: Hail to the Tyrant", http://www.cato.org/publications/commentary/book-review-hail-tyrant
Legal checks “have been relaxed largely because of the need for centralized, relatively AND observed archly, “polls do not reveal the opinions of dead Iraqis.”
1/5/14
2AC Flex DA - UNLV
Tournament: UNLV | Round: 1 | Opponent: UNLV JS | Judge: Omar Gueverra No Link – plan allows flexibility while still solving our internal links Clarke and Knake ‘12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased.
10/22/13
2AC Flex DA - Wake Forest
Tournament: Wake Forest | Round: 7 | Opponent: NYU DD | Judge: D Stout
No Link – plan allows flexibility while still solving our internal links Clarke and Knake ‘12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR) Balancing our desire for military flexibility with the need to address the fact that cyber AND the conflict might thus be undermined and the potential for international sanctions increased. 2. Congressional statue that clarifies the legal limit of Cyber-war is key to warfighting – generals think that executive planning causes battlefield incoherence Dunlap 12 (Major General and Former Deputy Judge Advocate General , “Lawless Cyberwar? Not If You Want to Win”, www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html-http://www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess2.html) Military commanders have seen the no-legal-limits movie before and they do AND domains of conflict where difficult decisions frequently must be made on imperfect information. 4. It’s impossible for the president to remain adequately flexible on cyber Waxman ‘11 Associate Professor, Columbia Law School; Adjunct Senior Fellow, Council on Foreign Relations; Member of the Hoover Institution Task Force on National Security and Law. THE YALE JOURNAL OF INTERNATIONAL LAW 36:421. http://www.yjil.org/docs/pub/36-2-waxman-cyber-attacks-and-the-use-of-force.pdf ETB
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND attacks may be much more consequential than the¶ direct and immediate ones.
5. No link – we only limit out LARGE SCALE, PRE_EMPTIVE attacks – we can still respond quickly
11/17/13
2AC Flexibility DA UMKC
Tournament: UMKC | Round: 2 | Opponent: Whitman LT | Judge: Sarah Topp It’s impossible for the president to remain adequately flexible on cyber Waxman ‘11 Associate Professor, Columbia Law School; Adjunct Senior Fellow, Council on Foreign Relations; Member of the Hoover Institution Task Force on National Security and Law. THE YALE JOURNAL OF INTERNATIONAL LAW 36:421. http://www.yjil.org/docs/pub/36-2-waxman-cyber-attacks-and-the-use-of-force.pdf ETB
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND may be much more consequential than the¶ direct and immediate ones.74 Massive alt causes Rozell 12 (Mark Rozell, Professor of Public Policy, George Mason University, “From Idealism to Power: The Presidency in the Age of Obama” 2012, http://www.libertylawsite.org/book-review/from-idealism-to-power-the-presidency-in-the-age-of-obama/, KB)
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
9/22/13
2AC Heg Bad UMKC
Tournament: UMKC | Round: 5 | Opponent: Oklahoma LS | Judge: Heather Walters Hegemonic strategy inevitable Calleo ‘10 Calleo, Director – European Studies Program and Professor @ SAIS, ‘10¶ (David P, “American Decline Revisited,” Survival, 52:4, 215 – 227)
The history of the past two decades suggests that adjusting to a plural world is AND turns the dollar into an imperial instrument that threatens the world with inflation. Transition wars Goldstein ‘07 (Avery, Professor of Global Politics and International Relations @ University of Pennsylvania, “Power transitions, institutions, and China's rise in East Asia: Theoretical expectations and evidence,” Journal of Strategic Studies, Volume 30, Issue 4 and 5 August)
Two closely related, though distinct, theoretical arguments focus explicitly on the consequences for AND provides grounds for concern about the period prior to the possible crossover.19
Among these crosscurrents, my thesis is simple: The question of whether America is AND its dominance. Decline--or continued ascendancy--is in our hands. Buffers check their warrants Norrlof 10 Carla Norrlof (an Associate Professor in the Department of Political Science at the University of Toronto) 2010 “ America’s Global Advantage US Hegemony and International Cooperation” p. 1-2
The United States has been the most powerful country in the world for more than AND States from the extreme consequences that a sustained deficit policy would otherwise have.
9/22/13
2AC Heg K - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday Only reforming hegemony can overcome the legacy of empire – it is necessary to create a new form of cosmopolitanism and stop ethnic conflict, poverty and the death of all planetary life – resistance alone fails Michael J. Thompson, 2003 – Founder and Editor of Logos and Teaches Political Theory @ Hunter College (CUNY, Fall 2003 (“Iraq, Hegemony, and the Question of American Empire” – Logos, Vol. 2, Issue 4) http://www.logosjournal.com/thompson_iraq.htm It is rare that political debates typically confined to the left will burst into the AND can have about his predicament and which cannot be thought of without enthusiasm."
Us intervention is inevitable – the plan prevents ineffective forms of engagement Robert Kagan 2011. Contributing editor to The Weekly Standard and a senior fellow in foreign policy at the Brookings Institution. "The Price of Power" Jan 24 Vol 16 No18 www.weeklystandard.com/articles/price-power_533696.html?page=3 In theory, the United States could refrain from intervening abroad. But, in AND in the kind of international system that American power has built and defended.
10/22/13
2AC Indefinite PIC
Tournament: UTD | Round: 1 | Opponent: UNI AE | Judge: Natalie Pennington Perm- do the counterplan
Resolved means by vote Webster’s 1998 Webster’s Revised Unabridged Dictionary, 1998 (dictionary.com)
Resolved: 5. To express, as an opinion or determination, by resolution and vote; to declare or decide by a formal vote; -- followed by a clause; as, the house resolved (or, it was resolved by the house) that no money should be apropriated (or, to appropriate no money). Colon doesn’t matter – means resolved is irrelevant Should means ought Howard 5 Taylor and Howard, 05 - Resources for the Future, Partnership to Cut Hunger and Poverty in Africa (Michael and Julie, “Investing in Africa's future: U.S. Agricultural development assistance for Sub-Saharan Africa”, 9/12, http://www.sarpn.org.za/documents/d0001784/5-US-agric_Sept2005_Chap2.pdf) Other legislated DA earmarks in the FY2005 appropriations bill are smaller and more targeted: plant biotechnology research and development ($25 million), the American Schools and Hospitals Abroad program ($20 million), women’s leadership capacity ($15 million), the International Fertilizer Development Center ($2.3 million), and clean water treatment ($2 million). Interestingly, in the wording of the bill, Congress uses the term shall in connection with only two of these eight earmarks; the others say that USAID should make the prescribed amount available. The difference between shall and should may have legal significance—one is clearly mandatory while the other is a strong admonition—but it makes little practical difference in USAID’s need to comply with the congressional directive to the best of its ability.
Our interp is that counterplans must be textually and functionally competitive: Counterplan isn’t because Functionally only is bad A. Steals 9 minutes of 1AC offense B. Unpredictable- there is an infinite number of subsets to pick out of and can always find an arbitrary reason to delay- they justify cp’s like ‘do plan after the election’ which are impossible to get offense against C. Education- wrecks larger discussion of policy, skirts debate about topic implementation, and leads to a race to the bottom of finding the most obscure act to PIC out of D) artificially inflates net benefits- can’t just win defense against stupid net benefits because they’ll say CP solves and offense/defense paradigm
Perm – do both – the things that their evidence are talking about are NOT large scale
2. Their only evidence is about Stuxnet, which ALREAD happened – no evidenc that we have to do much
We don’t restrict espianoge Lin, Chief Scientist, Computer Science and Telecommunications Board, National Research Council of the National Academies, 2010 (Herbert S., former staff member and scientist for the House Armed Services Committee, “Offensive Cyber Operations and the Use of Force,” Journal of National Security Law and Policy, http://jnslp.com/2010/08/13/offensive-cyber-operations-and-the-use-of-force/)
Hostile actions against a computer system or network can take two forms.1 One AND networks to be unavailable or untrustworthy and therefore less useful to the adversary. The second form – cyberexploitation – is nondestructive. An example is a computer virus AND view, and the best cyberexploitation is one that a user never notices. For purposes of this article, the term “offensive cyber operations” will include military operations and activities in cyberspace for cyber attack against and (or) cyberexploitation of adversary information systems and networks. When greater specificity is needed, the terms “cyber attack” and “cyberexploitation” will be used.4 Although the objectives and the legal and policy constructs relevant to cyber attack and cyberexploitation are quite different (see the table in the Appendix to this article), the technological underpinnings and associated operational considerations of both are quite similar. Cyber attacks and cyberexploitation require a vulnerability, access to that vulnerability, and a AND the papers inside, or alter some of the information in those papers.
That’s suffecient Albright et al. 12 David Albright, chairperson of ISIS, Paul Brannan, senior analyst at ISIS who has done extensive research and analysis on the international nuclear black market, Andrea Stricker, research analyst, Christina Walrond, and Houston Wood, “PREVENTING IRAN FROM GETTING NUCLEAR WEAPONS: CONSTRAINING ITS FUTURE NUCLEAR OPTIONS,” The Institute for Science and International Security, March 5, http://w.isis-online.org/uploads/isis-reports/documents/USIP_Template_5March2012-1.pdf
Iran’s efforts to build covert nuclear sites, which it could operate out of sight AND a secret enrichment site able to¶ produce weapon¶ -¶ grade uranium.¶
No impact to nuclear Iran – doesn’t snowball or cause aggression Layne 9 – Int’l Affairs Prof, Texas AandM, Visiting Fellow in Foreign Policy Studies, Cato Institute (Christopher, America’s Middle East grand strategy after Iraq, Review of International Studies 35, Cambridge Journals)
Of course, hard-line US neoconservatives reject this approach and argue that a AND intolerable’, because it could be contained and deterred successfully by the US.
11/11/13
2AC Iran Politics - Wichita State
Tournament: Wichita State | Round: 1 | Opponent: Kansas BC | Judge: Dan Stout No pass – momentum and AIPAC isn’t working Ditz 1/22 Jason, AntiWar.com, http://news.antiwar.com/2014/01/22/more-senate-leaders-oppose-iran-sanctions-vote/#SPS More key Senate Democrats are coming out against an immediate vote on Iran sanctions today AND lobbying groups like AIPAC, those last votes don’t seem to be materializing.
The other proposal will force the Pentagon and White House to review all groups or AND are consistent with the United States Constitution," Thornberry said at the time.
President Obama has had a tough year. He failed to pass gun legislation. AND by the president's recent troubles, says former GOP leadership aide Ron Bonjean.
No US strike Anne Applebaum 10, Washington Post, “Prepare for war with Iran -- in case Israel strikes”, 2-23, http://www.washingtonpost.com/wp-dyn/content/article/2010/02/22/AR2010022203528.html Let's be serious for a moment: Barack Obama will not bomb Iran. This is not because he is a liberal, or because he is a peacenik, or because he doesn't have the guts to try and "save his presidency" in this time-honored manner, as Daniel Pipes has urged and Sarah Palin said she would like him to do. The president will not bomb Iran's nuclear installations for precisely the same reasons that George AND and no American president could expect public support for more than a nanosecond.
1/25/14
2AC Iran Politics DA - Wake Forest
Tournament: Wake Forest | Round: 7 | Opponent: NYU DD | Judge: D Stout
Biden and Kerry are pushing the deal, negotiatons fail in the status quo AND Congress will just put them into the defense bill which Obama can’t block Gardner 11/13 (Timothy, Reuters writer, http://www.huffingtonpost.com/2013/11/13/congress-iran-sanctions_n_4270351.html, “Members Of Congress Question Obama's Plea For Iran Sanctions Hold”, AB)
Vice President Joe Biden, Secretary of State John Kerry and other top officials visited AND . He dismissed Kerry's assertion that new sanctions would torpedo the Geneva talks.
2. DA not intrinsic – it’s in the agenterial ambit of the US to do both
3. If easing sanctions do pass, they won’t be enough to do anything—only small relief will go through Gardner and Zengerle 10/16 10/16/13, Timothy Gardner and Patricia Zengerle, “Any U.S. sanctions relief on Iran likely to start slowly”, http://www.reuters.com/article/2013/10/16/us-usa-iran-relief-idUSBRE99F14P20131016 Any easing by Washington of sanctions on Iran in exchange for Tehran taking steps to AND Control Association, and a former top intelligence official at the State Department.
4. Deal will be ineffective and wont solve stability Rafizadeh 11/15 (Dr. Majid Rafizadeh, an Iranian-American political scientist and scholar, is president of the International American Council and he serves on the board of Harvard International Review at Harvard University. Rafizadeh is also a senior fellow at Nonviolence International Organization based in Washington DC and a member of the Gulf project at Columbia University. He served as ambassador for the National Iranian-American Council, conducted research at Woodrow Wilson International Center for Scholars, and taught at University of California Santa Barbara, “Iran has never been ready for a nuclear deal”, http://english.alarabiya.net/en/views/news/middle-east/2013/11/15/Iran-has-never-been-ready-for-a-nuclear-deal.html, AB)
One of the crucial repercussions and negative consequences of the Obama administration’s rush to make AND time to reach the nuclear breakaway capacity and become the region’s nuclear power.
The main issue Bolling raised was whether the Obamacare rollout trainwreck is proof positive of the absolute collapse, or at least remission, of liberalism. Michelle Fields pointed out that people used to be so confident Obama would be “liberalism’s reviver and savior,” and now he’s just “digging its grave.” Guilfoyle contended Obama has “no political capital or goodwill left,” and it’s shown the American people what kind of sickness big government really brings.
6. Obama will just veto the bill if he doesn’t like it
A letter urging the Senate to pass further sanctions on Iran’s nuclear program failed to AND more than a quarter of the House’s total membership, including 16 Republicans.
11/17/13
2AC Irigary K
Tournament: UTD | Round: 3 | Opponent: Wyoming MP | Judge: Rob Burns Link turn – Their Fermon 98 evidence is about US law generically - The plan equally decreases the ability of the executive to use targeted killings against all people which hedges against the type of politics that only recognizes and works for male citizens – their evidence doesn’t assume the plan. Perm: do the affirmative and all non-competitive parts of the alternative.
The permutation allows you to read the affirmative and negative texts as plastic and mutable—this overcomes the potential to essentialize sexual difference and erase other vectors of oppression Ada S. Jaarsma. 2003. doctoral student in the Philosophy and Literature program at Purdue, “Irigaray's To Be Two: The Problem of Evil and the Plasticity of Incarnation,” Hypatia 18.1. How do we read Irigaray's words, which themselves invoke a continual process of relationality AND for the Irigarayan texts themselves to be healed through careful and critical readings.
and, their link claims perpetuate the logic they critique - turns the K¶ by asserting women cannot participate in law is to claim that all women currently¶ working in what they would consider the legal field are essentially agentless dupes who have¶ too naive to avoid the deception that so oft befalls women. this regressive position is the necessary outcome of their link framing and precludes any alternative solvency
and, their link framing is bad for debate:
silences are infinite - the 1ac remains silent on virtually everything (except the content) - they repeat this same error but the ground is infinite and unpredictable bad for debate 2. destroys education - this plus conditionality ensures the negative has so much flexibility to destory the aff 3. destorys predictability 4. destorys limits 5. moots 1ac
Perm: do the affirmative and the alternative in all other instances.
The alternative privileges sexual difference at the expense of all other power relations—creates a violent worldview that must be rejected.
Butler ‘93
(Judith, Bodies That Matter, p. 167-168)
A number of theoretical questions have been raised by the effort to think the relationship AND is not be understood as articulated through or as other vectors of power. What would it mean, on the other hand to consider the assumption of sexual AND the convergent modalities of power by which sexual difference is articulated and assumed?
Alt can’t produce political change - Alison Martin, Leverhulme Special Fellow in the Department of French, University of Nottingham, 2004 (“A European Initiative: Irigaray, Marx, and Citizenship” Hypatia 19.3 (2004)) Project Muse
The stakes and aims of Irigaray's political project are clearly idealistic and ambitious. It AND that difference is an issue, seem bound to the ideal of equality.
1/14/14
2AC J-PIC - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday Human life has inherent value – arguing otherwise is a slippery slope to slavery and eugenics Melinda Penner (Director of Operations – STR, Stand To Reason) 2005 “End of Life Ethics: A Primer”, Stand to Reason, http://www.str.org/site/News2?page=NewsArticleandid=5223 Intrinsic value is very different. Things with intrinsic value are valued for their own AND . Dutch doctors euthanize severely ill newborns and their society has accepted it.
Preventing the extinction of future generations is a moral imperative – human extinction is normatively bad Cohen and Lee 1986. Avner, Professor of International Law and Practice – Princeton University and Steven, Professor of Philosophy – Hobart and William Smith Colleges, Nuclear Weapons and the Future of Humanity: The Fundamental Questions, p. 332-333
I shall reinforce this conclusion with several arguments for the claim that, while preventing AND There could be cases in which this would be better for existing people.
Humanism is key to ethics, and rejecting secular humanism leads to fill-in by religious humanism and moral relativism. CHS – 2011, Council for Secular Humanism, What Are Secular Humanist Values?, 2011 http://www.secularhumanism.org/index.php?section=mainandpage=values “… the moral consequences of believing the universe not to be guided by a personal AND rich intellectually, ethically, and emotionally, without reliance on religious faith.
Preventing human extinction is key to ethics. Nick Bostrom, Professor in the Faculty of Philosophy and Oxford Martin School, Director of the Future of Humanity Institute, and Director of the Programme on the Impacts of Future Technology at the University of Oxford, recipient of the 2009 Eugene R. Gannon Award for the Continued Pursuit of Human Advancement, holds a Ph.D. in Philosophy from the London School of Economics, 2011 (“The Concept of Existential Risk,” Draft of a Paper published on ExistentialRisk.com, Available Online at http://www.existentialrisk.com/concept.html, Accessed 07-04-2011)
We have thus far considered existential risk from the perspective of utilitarianism (combined with AND or hubris, we allowed it to come to irreparable harm).25
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
2. Posner and Vermeule are wrong---external checks are effective Aziz Z. Huq 12, Assistant Professor of Law, University of Chicago Law School, "Binding the Executive (by Law or by Politics)", May 25, www.law.uchicago.edu/files/file/400-ah-binding.pdf Paulson ’ s genuflection and Obama ’ s reticence, I will contend here, AND political actors’ exertions and legal rules will prove effective in limiting such discretion.
2. Permutation do both – resolves the link to the kritik
3. Debating about specific policies is essential to promote more ethical and accountable policymaking – their abstract politics promotes disengagement and poor argumentation skills David Chandler. 2007. Centre for the Study of Democracy, Westminster, Area, Vol. 39, No. 1, p. 118-119 This disjunction between the human/ethical/global causes of post-territorial political AND organize opposition, the ephemeral and incoherent character of protest is immediately apparent.
Legal grey holes not inevitable Philip Alston 11, John Norton Pomeroy Professor of Law at the NYU School of Law, UN Special Rapporteur on extrajudicial, summary or arbitrary executions from 2004 until 2010, “The CIA and Targeted Killings Beyond Borders,” 2011, 2 Harv. Nat'l Sec. J. 283, lexis nexis The second problem with Vermeule's approach is the extent to which it blurs empirical conclusions AND also ensure that the public will be much more involved in the process.
4. No alt to the legal system---causes more abuse Jerold S. Auerbach 83, Professor of History at Wellesley, “Justice Without Law?”, 1983, p. 144-146 As cynicism about the legal system increases, so does enthusiasm for alternative dispute- AND of justice without law does incalculable harm to the prospect of equal justice.
5. Biopower does not result in genocide – it must be combined with racism and sovereign exceptionalism Mika Ojakangas, 2005 - PhD in Social Science and Academy research fellow @ the Helsinki Collegium for Advanced Studies @ University of Helsinki, “The Impossible Dialogue on Biopower: Foucault and Agamben,” May, Foucault Studies, No. 2, http://wlt-studies.com/no2/ojakangas1.pdf It is the logic of racism, according to Foucault, that makes killing acceptable AND is the one with respect to whom all men act as sovereigns.”97
10/22/13
2AC Legalism K - UTD
Tournament: UTD | Round: 6 | Opponent: KState KM | Judge: Kearny, Mike FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. VA
UT Their evidence is descriptive of the status quo which only the affirmative can solve. The AUMF allows the executive to identify any group as a potential terrorist group and strike them. Only the affirmative defines a specific, concrete enemy. This is the key internal link to constructing them as legitimate enemies rather than absolute, evil, others. Critical legal philosophy is non-empirical, cherry-picked garbage John Stick 86, Assistant Professor of Law at Tulane University School of Law, “Can Nihilism Be Pragmatic?”, Harvard Law Review, Vol. 100, No. 2 (Dec., 1986), pp. 332-401, JSTOR This Article examines the relationship between the critical legal nihilists and the philosophers they rely AND then a fortiori Singer is too much of an irrationalist for the others.
The success of anti-state and anti-imperialism efforts relies on working with the state and legal institutions, the alternative is war and genocide. Shaw, Professor of International Relations and Politics at the University of Sussex, ’99 (Martin, November 9, “The unfinished global revolution: Intellectuals and the new politics of international relations” The new politics of international relations require us, therefore, to go beyond the AND and analytical challenges for students of international relations and politics, are intertwined.
Perm – do both. Social movements must work with and along-side legal institutions. Rejection of the law kills solvency. Peter Gabel, former President and Professor of Law at New College of California, 2009 (“LAW AND ECONOMICS, CRITICAL LEGAL STUDIES, AND THE HIGHER LAW: CRITICAL LEGAL STUDIES AS A SPIRITUAL PRACTICE.” 36 Pepp. L. Rev. 515. Lexis ) This calls not for a rejection of past CLS work, but for a reclaiming AND new, more spiritually confident work yet to be written by the young.
Adopting a legal framework doesn’t entail a commitment to legalism. But it provides a framework which is necessary to solve.
Altman, Professor of Philosophy; Georgia State University, 90 (Andrew, Critical Legal Studies: A Liberal Critique, page 8) In addition, it would be a distortion of liberal theory to suggest that it AND demand or prohibiting antilegalism from going so far as to destroy all legal institution
1/6/14
2AC Legalism K - WSU
Tournament: Wichita State | Round: 4 | Opponent: UTD LO | Judge: Ermo Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage Debating the law teaches us how to make it better – rejection is worse Hedrick 12 Todd Hedrick, Assistant Professor of Philosophy at Michigan State University, Sept 2012, Democratic Constitutionalism as Mediation: The Decline and Recovery of an Idea in Critical Social Theory, Constellations Volume 19, Issue 3, pages 382–400
Habermas’ alleged abandonment of immanent critique, however, is belied by the role that AND , without the triumphalist pretension of ever being able to fully do so.
No impact - legal checks work Scheuerman 6 William E. Scheuerman 6, Professor of Political Science at Indiana University, Constellations, Vol. 13, No. 1. p. 116
Schmitt offers three reasons in support of this view. First, he implicitly relies AND such conflicts before an international court or tribunal probably would have failed.22 PERM DO BOTH - legal reforms can utilized to protect vulnerable populations if we remain conscious of its dangers—the alternative leaves groups stranded Lobel 7 February, 2007; Orly Lobel is an Assistant Professor of Law, University of San Diego. LL.M. 2000 (waived), Harvard Law School; LL.B. 1998, Tel-Aviv University, “THE PARADOX OF EXTRALEGAL ACTIVISM: CRITICAL LEGAL CONSCIOUSNESS AND TRANSFORMATIVE POLITICS”, 120 Harv. L. Rev. 937
B. Conceptual Boundaries: When the Dichotomies of Exit Are Unchecked At first glance AND develop tools to increase fair practices and knowledge building within the new market.
Posner and Vermeule are wrong - external checks are effective Huq 12 Aziz Z. Huq 12, Assistant Professor of Law, University of Chicago Law School, "Binding the Executive (by Law or by Politics)", May 25, www.law.uchicago.edu/files/file/400-ah-binding.pdf
Paulson ’ s genuflection and Obama ’ s reticence, I will contend here, AND political actors’ exertions and legal rules will prove effective in limiting such discretion.
1/25/14
2AC Natives K
Tournament: UNLV | Round: 3 | Opponent: Oklahoma YR | Judge: Michael Einstadt
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
2. Their narrative approach to debate and identity is neurophysiologically fallacious and ethically undesirable. Strawson 2k4 galen, chair philosophy, university of texas, against narrativity, Ratio, XVII, 4, Dec., 420-460
On the strong form of Schechtman’s view, I am not really a person. AND basketful of understandings, not a narrative – an almost inevitably falsifying narrative.
THEIR FRAMEWORK ONLY MAKES SENSE WHEN ONE ASSUMES PEOPLE UNIVERSALLY CONCIEVE OF IDENTITY OR EXPERIENCE AS NARRATIVE, SOMETHING THAT COULD BE EXPLAINED IN A COHERENT WAY IN A DEBATE. THIS EXCLUDES NON-NARRATIVE CULTURES AND IDENTITIES. Strawson 2k4 galen, chair philosophy, university of texas, against narrativity, Ratio, XVII, 4, Dec., 420-460 The descriptive thesis and the normative thesis have four main combinations. One may, AND do not fit their model, and are potentially destructive in psychotherapeutic contexts.
And, their narrative framework doesn’t make sense – whatever is meant by the word “I” cannot convey my identity through discussion of the past because my past life did not happen to the I before you now. Strawson 2k4 galen, chair philosophy, university of texas, against narrativity, Ratio, XVII, 4, Dec., 420-460
I need to say more about the Episodic life, and since I find myself AND strictly,literally correct in thinking that they did not happen to me*
2. Problem-solution impact is backwards---acting with a flawed epistemology allows us to change that epistemology. Harris 7 (Graham, Adjunct Prf. @ Centre for Environment University of Tasmania, Seeking Sustainability in an age of complexity p. 9-10)
1 am not going to address the global 'litany' at length here. The arguments AND see themselves more as agents in relationships with society and less as observers.
3. Permutation – delink the affirmative from any western epistemology – doesn’t disprove the desirability of the plan
4. Kritiks of western imperialism and hegemony justify violence and genocide. This is a reason why the epistemology of liberal democratic is a good one. Reiff 99 David Reiff, Famous Author and Columnist, Summer 99 http://www.worldpolicy.org/journal/rieff2.html, WPJ, XVI, No. 2
The conclusion is inescapable. At the present time, only the West has both AND to paraphrase Che Guevara, one, two, three, many Kosovos.
5. Perm do both – the alternative should overcome any link to the plan
6. The alt fails to account for the intersections of colonialism and creates fragmentation that prevents effective political action Andrea Smith. 2012. “Indigeneity, Settler Colonialism, White Supremacy” in Racial Formation in the Twenty-First Century. p 77. As mentioned previously, many Native studies scholars have refused engagement with ethnic studies or AND of decolonization have articulated indigeneity as an expansive rather than an exclusive category.)
7. The alt would necessarily result in the removal of the US as a stabilizing force - Without it the globe would collapse into violence, nuclear war, and disease Niall Ferguson, Professor, History, School of Business, New York University and Senior Fellow, Hoover Institution, Stanford University, September-October 2004 (“A World Without Power” – Foreign Policy) http://www.hoover.org/publications/digest/3009996.html
So what is left? Waning empires. Religious revivals. Incipient anarchy. A AND powers would benefit from such a not-so-new world disorder.
8. Link of omission at best – we do not preclude the inclusion of other epistomologys, even if they win we are inherently western
9. Criticizing Western “coloniality” obscures more insidious practices by regional powers Shaw 2 – Sussex IR Professor (Martin, The Problem of the Quasi-Imperial State, www.martinshaw.org/empire.htm) Nor have many considered the possibility that if the concept of imperialism has a relevance AND many of them there are far more real and dangerous enemies closer to.
10. Wholesale rejection of imperialism justifies genocide and denies the capacity of indigenous people Ray Kiely. 1995 Lecturer in Development Studies, University of East London. “Third Worldist Relativism: A New Form Of Imperialism” Journal of Contemporary Asia, Vol. 25 No. 2 (1995) Nevertheless, the point remains that conflict exists within the Third World, and this AND (Stork and Lesch 1990; Bromley 1991; Brenner 1991: 134).
Epistemology focus causes endless paradigm wars. Wendt,1998. professor of international security – Ohio State University, (Alexander, “On Constitution and Causation in International Relations,” British International Studies Association)
As a community, we in the academic study of international politics spend too much AND sparring over epistemology is often one-sided, intolerant caricatures of science.
12. It isn’t a question of whether or not the US will be colonialistic, but the ways that is deployed. The inevitable intervention is still better than none at all. Kagan 11 (Robert Kagan 11 is a contributing editor to The Weekly Standard and a senior fellow in foreign policy at the Brookings Institution. "The Price of Power" Jan 24 Vol 16 No18 www.weeklystandard.com/articles/price-power_533696.html?page=3)
In theory, the United States could refrain from intervening abroad. But, in AND 1973. Dominican Republic, 1965. Grenada, 1983. Panama, 1989 First Persian Gulf war, 1991. Somalia, 1992. Haiti, 1994. AND in the kind of international system that American power has built and defended.
13. Responsibility for survival of the human community should be prioritized over building alliances with Indigenous communities Harsha Walia. 2012.“Moving Beyond a Politics of Solidarity toward a Practice of Decolonization” Organize!: Building from the Local for Global Justice. P. 252 Striving toward decolonization requires us to challenge a dehumanizing social organization that perpetuates our isolation AND identities do not prevent us from walking together toward transformation and mutual respect.
14. Life should be valued as apriori – it precedes the ability to value anything else Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of “Life”, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
15. Policies should be evaluated via cost benefit analysis Earl C. Ravenal. 2009. Distinguished senior fellow in foreign policy studies @ Cato, is professor emeritus of the Georgetown University School of Foreign Service. He is an expert on NATO, defense strategy, and the defense budget. He is the author of Designing Defense for a New World Order. What's Empire Got to Do with It? The Derivation of America's Foreign Policy.” Critical Review: An Interdisciplinary Journal of Politics and Society 21.1 (2009) 21-75
These large-scale and generic objectives—national security and hegemonic order—translate AND motive factors in what I have called a nation’s “propensity to intervene.”
10/22/13
2AC Nietzsche - MAC
Tournament: MAC | Round: 3 | Opponent: Texas HM | Judge: Colin Roark 2AC Nietzsche
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage.
Their refusal to engage in politics is the ultimate form of ressentiment. Saul Newman (postdoctoral fellow at Macquarie University). “Anarchism and the Politics of Ressentiment.” Theory and Event 4:3. 2000.
Can this paradoxical relationship of reflection and opposition be seen as a form of ressentiment AND 'evil'. Nietzsche would see in this an attitude of ressentiment par excellence.
Their link evidence says that blaming it on the other bad – we blame it on the US president, no reason we will enact violence against him.
Permutation: do both The interdependency between political action and personal thought is unavoidable in reaching the goals of both projects. Criticisms that try to deny our attempts to correct social injustices traps theory in the exclusions it attempts to cure. And the perm solves the resentiment and oppression impacts. William Connolly. Identity/Difference. 1991. Page 33-34.
The most general (and idealistic) idea is to subdue the politics of generalized AND This more or less reverses the emphasis I have followed in the past. The thinking that refuses to engage the second front can often be identified through its AND ideal so that I can dream my dream of a world without injustice?
The best perm card ever written
The interdependency between political action and critical theory is unavoidable in reaching the goals of both projects. Criticisms that try to deny our attempts to correct social injustices traps theory in the exclusions it attempts to cure.
William Connolly. Identity/Difference. 1991. Page 33-34.
The most general (and idealistic) idea is to subdue the politics of generalized AND ideal so that I can dream my dream of a world without injustice?
Only the plan affirms life – embracing the struggle against our genetic predisposition towards violence through resisting nuclear war is key Barash and Lipton, 1985 David P., Professor of Psychology at the University of Washington (Seattle) and Judith Eve, psychiatrist at the Swedish Medical Center in Washington, “The Caveman and the Bomb” p.261-267 Fortunately, whatever genetic imperatives operate in Homo sapiens, they are unlikely to extend AND Neanderthal mentality and thereby transcend, if not overcome, our biology itself.
Perm do the alternative- It literally is us – Stefan Ramaekers. “Teaching to Lie and Obey: Nietzsche and Education.” Journal of Philosophy of Education 35.2, 2001.
In Beyond Good and Evil, Nietzsche says about education: Parents involuntarily make something like themselves out of their children – they call that “education”; no mother doubts at the bottom of her heart that the child she has borne is thereby her property, no father hesitates about his right to subject it to his own ideas and notions of worth. In view of the importance Nietzsche attaches to obedience, to being embedded, one AND human being is molded into a particular shape that he cannot do without. My understanding of Nietzsche is consequently at variance with any understanding which arguments for AND in the rich sense. In consequence education becomes essentially self-education.
Rejecting ethical norms means the will-to-power reigns supreme – guarantees extinction Fasching 1993 (Darrell J., Professor of Religious Studies at University of South Florida, The Ethical Challenge of Auschwitz and Hiroshima, Pp. 28-29) Our modern technological civilization offers us seemingly infi¬nite utopian opportunities to recreate ourselves (e AND us that a normless world will inevitably end in apocalyptic self-destruction.
3/4/14
2AC Nietzsche K - UNT
Tournament: UNT | Round: 1 | Opponent: Wyoming BC | Judge: Shelby Pryor Critical legal philosophy is non-empirical, cherry-picked garbage John Stick 86, Assistant Professor of Law at Tulane University School of Law, “Can Nihilism Be Pragmatic?”, Harvard Law Review, Vol. 100, No. 2 (Dec., 1986), pp. 332-401, JSTOR This Article examines the relationship between the critical legal nihilists and the philosophers they rely AND then a fortiori Singer is too much of an irrationalist for the others.
The success of anti-state and anti-imperialism efforts relies on working with the state and legal institutions, the alternative is war and genocide. Shaw, Professor of International Relations and Politics at the University of Sussex, ’99 (Martin, November 9, “The unfinished global revolution: Intellectuals and the new politics of international relations” The new politics of international relations require us, therefore, to go beyond the AND and analytical challenges for students of international relations and politics, are intertwined.
We have an objective definition of war and expanding it causes miscalculation Hooker 2005 Commands the XVIII Airborne Corps Combat Support Brigade ("Dragon Brigade") now deployed to AND . "Beyond Vom Kriege: the character and conduct of modern war"
Clausewitz described war as "nothing more than a duel on a larger scale ... AND of policy, only to be astounded when it fails and war erupts. Security studies should be limited – other things are important, but they're also different. Studying them at the same time is useless Walt 91 Stephen, Professor @ University of Chicago, International Studies Quarterly, 35
Because nonmilitary phenomena can also threaten states and individuals, some writers have suggested broadening AND make it more difficult to devise solutions to any of these important problems.
Only the plan affirms life – embracing the struggle against our genetic predisposition towards violence through resisting nuclear war is key Barash and Lipton, 1985 David P., Professor of Psychology at the University of Washington (Seattle) and Judith Eve, psychiatrist at the Swedish Medical Center in Washington, “The Caveman and the Bomb” p.261-267 Fortunately, whatever genetic imperatives operate in Homo sapiens, they are unlikely to extend AND Neanderthal mentality and thereby transcend, if not overcome, our biology itself.
Predictions are good Kurasawa, Assistant Professor of Sociology at York University, Toronto, and a Faculty Associate of the Center for Cultural Sociology at Yale, 2004 (Fuyuki, “Cautionary Tales,” Constellations Volume 4 No. 11, December) When engaging in the labor of preventive foresight, the first obstacle that one is AND anticipate and prepare for possible and avoidable sources of harm to our successors.
Rejecting ethical norms means the will-to-power reigns supreme – guarantees extinction Fasching 1993 (Darrell J., Professor of Religious Studies at University of South Florida, The Ethical Challenge of Auschwitz and Hiroshima, Pp. 28-29) Our modern technological civilization offers us seemingly infi¬nite utopian opportunities to recreate ourselves (e AND us that a normless world will inevitably end in apocalyptic self-destruction.
This solves best – we have to both accept the world and attempt to change it – best way to affirm life May 5 – Todd, Clemson University, “To change the world, to celebrate life”, Philosophy Social Criticism 2005; 31; 517, sagepub For those among us who seek in philosophy a way to grapple with our lives AND The question then becomes one of how to choose both sides at once.
1/9/14
2AC Nietzsche K UMKC
Tournament: UMKC | Round: 5 | Opponent: Oklahoma LS | Judge: Heather Walters Only the plan affirms life – embracing the struggle against our genetic predisposition towards violence through resisting nuclear war is key Barash and Lipton, 1985 David P., Professor of Psychology at the University of Washington (Seattle) and Judith Eve, psychiatrist at the Swedish Medical Center in Washington, “The Caveman and the Bomb” p.261-267 Fortunately, whatever genetic imperatives operate in Homo sapiens, they are unlikely to extend AND Neanderthal mentality and thereby transcend, if not overcome, our biology itself.
Perm – do the plan and all non-mutually exclusive parts of the alternative This solves best – we have to both accept the world and attempt to change it – best way to affirm life May 5 – Todd, Clemson University, “To change the world, to celebrate life”, Philosophy Social Criticism 2005; 31; 517, sagepub For those among us who seek in philosophy a way to grapple with our lives AND The question then becomes one of how to choose both sides at once.
Even though the universe probably will not accept our attempts at control, there is beauty in the struggle to shape our small part of it Dienstag 4 Joshua Foa, Associate Professor of Politics at the University of Virginia. Tragedy, Pessimism, Nietzsche. New Literary History 34:1 Project Muse Tragic art is the organization of a small portion of an otherwise meaningless world that AND and sensibility would be given" (KGW 8.2.121).
Threats are real and securitization theory is outdated – applies more to the Cold War era than today Knudsen 1 (Olav F., Soderton University College, Huddinge, Sweden, “Post-Copenhagen Security Studies: Desecuritizing Securitization”, jstor, accessed 7/5/12)AMV
During the Cold War, peace research was struggling to gain the status of social AND perceptions and in terms of the phenomena which are perceived to be threatening.
Nietzsche views compassion itself as the most difficult test – embrace it as a tool to overcome what is most difficult and then employ it in a new ethics Fraser 6 (The Review of Politics (2006), 68: 49-78 AND in the Political Theory Project at Brown University. Assistant professor – HARVARD) This conventional interpretation of the close of Nietzsche's epic, however, is surely incorrect AND his strength, and be put to service in the advancement of life.
Nietzschean/Heideggarian philosophies asymmetrically privilege transcendent concerns over experience, precluding any involvement or explanation from the human community. Matthews 2k7 richard, “the limits of transcendence”, phaenex 2, no. 1, spring/summer 2007 Since it is a central concept of this paper, I want to briefly define AND Heidegger, Schelling's Treatise on the Essence of Human Freedom 15-16).
Democratic legal institutions preserve struggle necessary to affirm life Hatab 2002 (professor at Old Dominion University, The Journal of Nietzsche Studies 24 (2002) 132-147, Prospects For A Democratic Agon: Why We Can Still Be Nietzscheans, Project Muse) How can we begin to apply the notion of agonistics to politics in general and AND specific configurations of power, of domination and submission in democratic politics. 12
9/22/13
2AC Nuclear Reps K - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday Images of nuclear apocalypse are necessary to problematize their usage James Foard. 1997. Associate Professor of Religion, Arizona State, “Imagining Nuclear Weapons: Hiroshima, Armageddon, and the Annihilation of the Students of Ichijo School,” Journal of the American Academy of Religion, http://jaar.oxfordjournals.org/cgi/reprint/LXV/1/1.pdf TBC 7/1/10) This ambivalence about Hiroshima has been partially ameliorated by displacing it with Armageddon in our AND to use the most famous phrase, "fabulously textual" (Derrida'23).
Only representing the devastation of nuclear war can we challenge nuclearism James Foard. 1997. Associate Professor of Religion, Arizona State, “Imagining Nuclear Weapons: Hiroshima, Armageddon, and the Annihilation of the Students of Ichijo School,” Journal of the American Academy of Religion, http://jaar.oxfordjournals.org/cgi/reprint/LXV/1/1.pdf TBC 7/1/10) Despite their deep suspicion of the adequacy of any expressions, the survivors relate their AND only so that it can be refused a permanent place in human history.
10/22/13
2AC Pan K - UNLV
Tournament: UNLV | Round: 5 | Opponent: Trinity VR | Judge: Brian McBride 2. Cycles of hostility have already begun even if they are constructed. Their K ignores real threats that are entrenched by past representations Pan ‘4 (Chengxin, Australian National University, DISCOURSES OF ‘CHINA’ IN INTERNATIONAL RELATIONS: A STUDY IN WESTERN THEORY AS (IR) PRACTICE, Doctoral Thesis, p. 240-241) Thus understood, these Chinese reactions, hostile as they might be, can no AND strategic thinking and IR studies, to which my analysis will now turn.
Obama’s actions are reducing prez powers now Yoo ‘13 -John, WSJ, John Yoo: Diminishing the Presidency online.wsj.com/article/SB10001424127887323375204578271681410646810.html A year ago this month, President Obama bypassed the Senate's advice-and- AND unfortunately, will prove to be his historical legacy unless he changes course. 2. Plan is critical to making prez powers effective- a clear congressional authorization is key to quick and decisive executive action during crisis- and it’s crucial to allow the president to fight emerging threats by clearly defining targets- that’s Cronogue and Chesney
Don’t read with XO More evidence *plan is key to making prez powers effective – solves flex
Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
Though the President's inherent authority to act in times of emergency¶ and war can AND the future and prevents the "gloss" that comes from congressional acquiescence.¶
4. No internal link- decreasing prez powers in one area doesn’t spillover- restrictions on Gitmo transfers proves 5. No impact to prez powers Healy 11 Gene Healy is a vice president at the Cato Institute and the author of The Cult of the Presidency, The CATO Institute, June 2011, "Book Review: Hail to the Tyrant", http://www.cato.org/publications/commentary/book-review-hail-tyrant
Legal checks “have been relaxed largely because of the need for centralized, relatively AND observed archly, “polls do not reveal the opinions of dead Iraqis.”
1/14/14
2AC QDR CP
Tournament: Wichita State | Round: 1 | Opponent: Kansas BC | Judge: Dan Stout The counterplan is not competitive: it does the mandates of the plan after the addition of a QDR a. “Should” means desirable --- this does not have to be a mandate Atlas Collaboration 99 (“Use of Shall, Should, May Can,” http://rd13doc.cern.ch/Atlas/DaqSoft/sde/inspect/shall.html)
shall 'shall' describes something that is mandatory. If a requirement uses 'shall', then that AND ." This is a bad example. Using 'shall' here is too strong. should 'should' is weaker. It describes something that might not be satisfied in the final AND to be stated anywhere (to say nothing of defining what 'thoroughly' means). b. “Should” doesn’t require certainty Black’s Law 79 (Black’s Law Dictionary – Fifth Edition, p. 1237)
Should. The past tense of shall; ordinarily implying duty or obligation; although usually no more than an obligation of propriety or expediency, or a moral obligation, thereby distinguishing it from “ought.” It is not normally synonymous with “may,” and although often interchangeable with the word “would,” it does not ordinarily express certainty as “will” sometimes does.
c. Uncertainty is inevitable on this topic because the executive can say no – certainty is a solvency issue, not a competition one Perm Cp makes it impossible to be aff because it is plan plus – there is alwayssomething more you can add onto the plan to make it better that is not topical. The aff can never make the plan peprfect because we are tied to the resolution. Link and impact of this goes conceded – they moot the whole 1AC
They say reject the arg not the team, that makes us read theory just to get back to square one, reject the team or it’s a no risk option. No warrant for the “RANT” argument
Immediacy and Certainty are bad standards for competition – justifies any plan plus counterplan by putting the “plus” before the mandates of the plan – CPs like “feed Africa and then do the plan if they are fed” are competitive under their framework because it is both delay and not unconditional. They moot the entirety of the 1AC and negate our ability to use 1AC solvency evidence as offense, voting issue otherwise the CP is a no-risk option. Can’t solve international perception takes years to know adherence and circumvented JACOBSON ‘12 (LOUIS JACOBSON “REVIEWS UNDERTAKEN; HARD SLOG OF SHIFTING MILITARY PRIORITIES IS A WORK IN PROGRESS” Tampa Bay Times¶ December 19, 2012 Wednesday Lexis, TSW)
"The major programs have certainly been reevaluated, but not exactly in the way AND counter-insurgency operations" -- has been deemphasized in the strategic reviews. Their author concedes the counterplan definitely doesn’t solve, links to politics and is net worse for the military Brimley 13 - Vice President and Director of Studies at the Center for a New American Security, served as Special Advisor to the Under Secretary of Defense for Policy at the Pentagon from 2009 to 2011 (Shawn, “The Next QDR Is the Last Chance for Sanity,” http://www.defenseone.com/ideas/2013/07/next-qdr-last-chance-sanity/66629/, AB) The next nine months will be the most important period for United States defense strategy AND , but history suggests they’ll have trouble. They could use some help. Links to politics DESAI 13 (Jul. 14, 2013, http://www.defensenews.com/article/20130714/DEFFEAT05/307140008/2014-QDR-Must-Follow-Congressional-Guidance, “2014 QDR Must Follow Congressional Guidance”, AB)
As the US Department of Defense prepares for the 2014 Quadrennial Defense Review (QDR AND followed to ensure the 2014 QDR process delivers what Congress intended and needs.
1/25/14
2AC Risk K
Tournament: UT | Round: 2 | Opponent: Texas KS | Judge: Erik Mathis Perm do both Permutation do the plan and all non-competitive parts of the alternative
The alt alone is worthless to policy making – only coupling with the method of the 1AC can solve Cairney 10 (Paul, Chair in Politics and Public Policy¶ BA (Hons), MSc, PhD at Aberdeen University, “Complexity Theory in Public Policy” http://www.psa.ac.uk/journals/pdf/5/2010/121_665.pdf, SEH)
Why has Complexity Theory Struggled for Attention?¶ The first difficulty with complexity theory is AND service). But is there¶ anything more to complexity theory than this?
Risk framing motivates new social movements and re-democratizes politics Borraz, ‘7 Olivier Borraz, Centre de Sociologie des Organisations, Sciences Po-CNRS, Paris, Risk and Public Problems, Journal of Risk Research Vol. 10, No. 7, 941–957, October 2007, p. 951
These studies seem to suggest that risk is a way of framing a public problem AND rifts stemming from antagonistic views of science, democracy and the world order.
If read Junio The low likelihood of our impacts isn’t a reason to vote negative – all war is unlikely but discussing the details of cyber warfare policy is key to defensive measures that prevent irrational lash out and conservative takeover.
The burden of proof is on the negative to prove we are wrong – simply pointing out the 1AC seems fishy is poor scholarship and doesn’t rise to an sufficient reason to reject us. Yudkowsky 6 Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006.
Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
The aff solves the security paradox the 1NC criticizes by restricting the ability of the president to unilaterally strike out against other countries - the plan establishes norms to ensure deliberative decision making which precludes errors like Iraq No impact Gray 7 Director of the Centre for Strategic Studies and Professor of International Relations and Strategic Studies at the University of Reading, graduate of the Universities of Manchester and Oxford, Founder and Senior Associate to the National Institute for Public Policy, formerly with the International Institute for Strategic Studies and the Hudson Institute (Colin, July, “The Implications of Preemptive and Preventive War Doctrines: A Reconsideration”, http://www.ciaonet.org/wps/ssi10561/ssi10561.pdf)
7. A policy that favors preventive warfare expresses a futile quest for absolute security AND strategy, though not always policy, must be nothing if not pragmatic. Linearity might not be true but complexity isn’t 100 true either Gorka et al 12 Dr. Sebastian L. V. Gorka et al 12, Director of the Homeland Defense Fellows Program at the College of International Security Affairs, National Defense University, teaches Irregular Warfare and US National Security at NDU and Georgetown, et al., Spring 2012, “The Complexity Trap,” Parameters, http://www.carlisle.army.mil/USAWC/parameters/Articles/2012spring/Gallagher_Geltzer_Gorka.pdf
These competing views of America’s national security concerns indicate an important and distinctive characteristic of AND in which everything is potentially relevant is a model in which nothing is.
2/8/14
2AC Risk K - MAC
Tournament: MAC | Round: 1 | Opponent: Texas SJ | Judge: Wes Dwyer 2AC Complexity Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage Extinction 1st - Perm do both Permutation do the plan and all non-competitive parts of the alternative
The alt alone is worthless to policy making – only coupling with the method of the 1AC can solve Cairney 10 (Paul, Chair in Politics and Public Policy¶ BA (Hons), MSc, PhD at Aberdeen University, “Complexity Theory in Public Policy” http://www.psa.ac.uk/journals/pdf/5/2010/121_665.pdf, SEH)
Why has Complexity Theory Struggled for Attention?¶ The first difficulty with complexity theory is AND service). But is there¶ anything more to complexity theory than this?
Risk framing motivates new social movements and re-democratizes politics Borraz, ‘7 Olivier Borraz, Centre de Sociologie des Organisations, Sciences Po-CNRS, Paris, Risk and Public Problems, Journal of Risk Research Vol. 10, No. 7, 941–957, October 2007, p. 951
These studies seem to suggest that risk is a way of framing a public problem AND rifts stemming from antagonistic views of science, democracy and the world order.
If read Junio The low likelihood of our impacts isn’t a reason to vote negative – all war is unlikely but discussing the details of cyber warfare policy is key to defensive measures that prevent irrational lash out and conservative takeover.
The burden of proof is on the negative to prove we are wrong – simply pointing out the 1AC seems fishy is poor scholarship and doesn’t rise to an sufficient reason to reject us. Yudkowsky 6 Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006.
Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
Hardline militarism key to check war and terrorism. Alt uniquely trigger thems Epstein 2 (alex, fellow at ayn rand institute, “Peacenik Warmongers,” online)
If dropping bombs won't work, what should the United States do to obtain a AND favor of the wish that laying down our arms will achieve peace somehow.
The twentieth century should have taught the citizens of liberal democracies the catastrophic consequences of AND promised the Western and Christian Iberians ruin for the Crusades and the Reconquista.
3/4/14
2AC Security K - UNT
Tournament: UNT | Round: 6 | Opponent: Indiana FH | Judge: Natalie Pennington Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage
Perm- do the alt
Case impacts prove why security logic is good- key to prevent multiple scenarios for extinction- aff is an impact turn to the K. Outweighs- prefer proximate short-term extinction scenarios over their vacuous impact claims.
Life should be valued as apriori – it precedes the ability to value anything else Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of “Life”, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
Threats are real Ravenal ‘9 Earl C. Ravenal, distinguished senior fellow in foreign policy studies @ Cato, is professor emeritus of the Georgetown University School of Foreign Service. He is an expert on NATO, defense strategy, and the defense budget. He is the author of Designing Defense for a New World Order. What's Empire Got to Do with It? The Derivation of America's Foreign Policy.” Critical Review: An Interdisciplinary Journal of Politics and Society 21.1 (2009) 21-75
The underlying notion of “the security bureaucracies . . . looking for new enemies AND or to a lack of sufficient imagination to exploit opportunities for personal profit.
Privileging epistemology guarantees policy failure because of theoretical reductionism, and isn’t relevant to the truth value of our arguments. Owen 2 David Owen, Reader of Political Theory at the Univ. of Southampton, Millennium Vol 31 No 3 2002 p. 655-7
Commenting on the ‘philosophical turn’ in IR, Wæver remarks that ‘a AND the first and second dangers, and so a potentially vicious circle arises.
Perm - do the plan and all non-mutually exclusive parts of the alternative Problem-solution impact is backwards---acting with a flawed epistemology allows us to change that epistemology. Harris 7 (Graham, Adjunct Prf. @ Centre for Environment University of Tasmania, Seeking Sustainability in an age of complexity p. 9-10)
1 am not going to address the global 'litany' at length here. The arguments AND see themselves more as agents in relationships with society and less as observers.
War makes alt impossible- policy makers would default to security paradigm because it’s the most familiar
The alt results in more securitization and intervention McCormack 10 Tara McCormack, 2010, is Lecturer in International Politics at the University of Leicester and has a PhD in International Relations from the University of Westminster. 2010, (Critique, Security and Power: The political limits to emancipatory approaches, page 127-129)
The following section will briefly raise some questions about the rejection of the old security AND the political limits of the framework proposed by critical and emancipatory theoretical approaches.
Perm- do plan and the alt
Prefer specific scenarios – even if we invoke some security logic, the fact that others will securitize means that we have to make worst-case assessments to avoid escalation Ole Waever, Senior Research Fellow – Copenhagen Peace Research Inst., 2K (I. R. Theory and the Politics of European Integration, ed Kelstrup/Williams p. 282-285)
The other main possibility is to stress responsibility. Particularly in a field like security AND that could lead to security dilemmas and escalations, violence and mutual vilification.
Security sustains a form of democratic citizenship necessary to enhance standards of living and ensure rights Loader and Walker 07 Ian and Neil, professor of criminology and Director of the center for Criminology at Oxford Professor of European Law European University Institute Florence , Civilizing Security, pg 7-8
By invoking this phrase we have in mind two ideas, both of which we AND shall argue, indispensable to cultivating and sustaining the civilizing effects of security.
1/10/14
2AC Security K - WSU
Tournament: Wichita State | Round: 6 | Opponent: MoState HP | Judge: Kelly Winfrey 2AC Security K Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage Perm- do plan and the alt
Perm- do the alt
Case impacts prove why security logic is good- key to prevent multiple scenarios for extinction- aff is an impact turn to the K. Outweighs- prefer proximate short-term extinction scenarios over their vacuous impact claims.
Life should be valued as apriori – it precedes the ability to value anything else Amien Kacou. 2008. WHY EVEN MIND? On The A Priori Value Of “Life”, Cosmos and History: The Journal of Natural and Social Philosophy, Vol 4, No 1-2 (2008) cosmosandhistory.org/index.php/journal/article/view/92/184 Furthermore, that manner of finding things good that is in pleasure can certainly not AND and desire. Perhaps, our inquiry should be a bit more complex.
War makes alt impossible- policy makers would default to security paradigm because it’s the most familiar
The alt results in more securitization and intervention
McCormack 10 Tara McCormack, 2010, is Lecturer in International Politics at the University of Leicester and has a PhD in International Relations from the University of Westminster. 2010, (Critique, Security and Power: The political limits to emancipatory approaches, page 127-129)
The following section will briefly raise some questions about the rejection of the old security AND the political limits of the framework proposed by critical and emancipatory theoretical approaches.
Prefer specific scenarios – even if we invoke some security logic, the fact that others will securitize means that we have to make worst-case assessments to avoid escalation
Ole Waever, Senior Research Fellow – Copenhagen Peace Research Inst., 2K (I. R. Theory and the Politics of European Integration, ed Kelstrup/Williams p. 282-285)
The other main possibility is to stress responsibility. Particularly in a field like security AND that could lead to security dilemmas and escalations, violence and mutual vilification.
Threats are real Ravenal ‘9 Earl C. Ravenal, distinguished senior fellow in foreign policy studies @ Cato, is professor emeritus of the Georgetown University School of Foreign Service. He is an expert on NATO, defense strategy, and the defense budget. He is the author of Designing Defense for a New World Order. What's Empire Got to Do with It? The Derivation of America's Foreign Policy.” Critical Review: An Interdisciplinary Journal of Politics and Society 21.1 (2009) 21-75
The underlying notion of “the security bureaucracies . . . looking for new enemies AND or to a lack of sufficient imagination to exploit opportunities for personal profit.
Rejecting security allows private forces to fill in the security vacuum left by the state resulting in more violent forms of securitization Loader and Walker 07 Ian and Neil, professor of criminology and Director of the center for Criminology at Oxford Professor of European Law European University Institute Florence , Civilizing Security, pg 22-25
Today it cannot be assumed that the state remains pre-eminent in either authorizing AND the autonomy of human society. (Bauman and Tester 2001: 139)
Security sustains a form of democratic citizenship necessary to enhance standards of living and ensure rights Loader and Walker 07 Ian and Neil, professor of criminology and Director of the center for Criminology at Oxford Professor of European Law European University Institute Florence , Civilizing Security, pg 7-8
By invoking this phrase we have in mind two ideas, both of which we AND shall argue, indispensable to cultivating and sustaining the civilizing effects of security.
1/26/14
2AC Security K - Wake
Tournament: Wake Forest | Round: 3 | Opponent: George Washington NS | Judge: Mikaela Maslin 2AC Security K
FRAMEWORK—The aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense –the impact of the K is a reason the aff is bad. B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage. c. Vague alts are a voting issue – skews 2AC offense and creates a form of sandbagging which unfairly privileges the time benefits of the block
Perm- do plan and the alt
Perm- do the alt
Case impacts prove why security logic is good- key to prevent multiple scenarios for extinction- aff is an impact turn to the K. Outweighs- prefer proximate short-term extinction scenarios over their vacuous impact claims.
Debating the law teaches us how to make it better – rejection is worse Hedrick 12 Todd Hedrick, Assistant Professor of Philosophy at Michigan State University, Sept 2012, Democratic Constitutionalism as Mediation: The Decline and Recovery of an Idea in Critical Social Theory, Constellations Volume 19, Issue 3, pages 382–400
Habermas’ alleged abandonment of immanent critique, however, is belied by the role that AND , without the triumphalist pretension of ever being able to fully do so.
War makes alt impossible- policy makers would default to security paradigm because it’s the most familiar
The alt results in more securitization and intervention
McCormack 10 Tara McCormack, 2010, is Lecturer in International Politics at the University of Leicester and has a PhD in International Relations from the University of Westminster. 2010, (Critique, Security and Power: The political limits to emancipatory approaches, page 127-129)
The following section will briefly raise some questions about the rejection of the old security AND the political limits of the framework proposed by critical and emancipatory theoretical approaches. Debate about the repercussions of cyber preemption is good- key to generating literature on dangers of cyber war, which checks its use
¶ Retired Adm. William Owen, former vice chairman of the Joint Chiefs of AND That just isn’t happening in this new kind of warfare, Dam added.
Cyberwar is probable- multiple IR theories prove
Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
11/16/13
2AC Security K UMKC
Tournament: UMKC | Round: 2 | Opponent: Whitman LT | Judge: Sarah Topp Cyber threats are real – they facilitate dangerous armed social movements Deibert and Rohozinski 2010 (Ronald J, professor of Political Science and Director of the Canada Centre for AND International Political Sociology, vol. 4, p. 22, BS)
Even among democratic states, the explosion of civic networks has presented serious challenges, AND a 14-year-old living in a refugee camp in Lebanon.
Cyber operates in a realist framework Dawson ‘13 Ashley Dawson, M.A. Candidate in Policy Sci @ University of British Columbia. “Addressing Cyber Warfare: Bolstering Deterrence through developing norms.” Master’s Thesis. Etb
RDT is centered around two central strategies with the goal of dissuading an ¶ adversary AND /capabilities gap between it and a stronger ¶ adversary can thus be expected IR theory proves cyberwar is probable- multiple mechanisms Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking. What is Cyber War? (Again. . .) Their engagement in solely theory of cyberwar will never create change – only the permutation can resolve that. Eriksson and Giacomello ‘6 Johan Eriksson and Giampiero Giacomello. International Political Science Review 27.3 (Jul., 2006), pp. 221-244. “The Information Revolution, Security, and International Relations: (IR) Relevant Theory?” ETB
The foregoing analysis has shown that there are two interrelated problems in ¶ past efforts AND on middle-range theory and on ¶ conditional rather than universal generalizations.
9/22/13
2AC Soldier K
Tournament: UNT | Round: Doubles | Opponent: Georgia State FF | Judge: Kearny, Haynal, Tomik
Framework - the aff is a normative statement. Vote aff if plan is a good idea, neg if it isn’t. A. Solves their offense – the impact of the K is a reason the aff is bad B. Aff choice – they arbitrarily steal 9 minutes of offense, destroys the aff’s only advantage C. Our model of education doesn’t trade off with personal convictions, but it does make debaters stronger advocates Hodson 9 Hodson, professor of education – Ontario Institute for Studies @ University of Toronto, ‘9¶ (Derek, “Towards an Action-oriented Science Curriculum,” Journal for Activist Science and Technology Education, Vol. 1, No. 1)¶ note: SSI = socioscientific issues
Politicization of science education can be achieved by giving students the opportunity to confront real AND assist students in reaching tentative solutions about where they stand on key SSI.
Doesn’t trade off with personal values—debate makes students more able to advocate for them Jiménez-Aleixandre 2 professor of education – University of Santiago de Compostela, and Pereiro-Muñoz High School Castelao, Vigo (Spain), ‘2¶ (Maria-Pilar and Cristina, “Knowledge producers or knowledge consumers? Argumentation and decision making about environmental management,” International Journal of Science Education Vol. 24, No. 11, p. 1171–1190)
Attitudes and values have a paramount role in environmental education. The importance accorded to AND concordance in the content, supporting the claim that they were not just passive Making debate SOLELY about personal narratives is self-destructive---making the judges choose between whose personal experiences are more meaningful is VIOLENT and denies the intensity of our individual experiences Subotnik 98 Professor of Law, Touro College, Jacob D. Fuchsberg Law Center. 7 Cornell J. L. and Pub. Pol'y 681, Lexis
Having traced a major strand in the development of CRT, we turn now to AND do they not have greater influence on public policy? Discouraging white legal scholars
The premise of their response to framework is that issues of identity/race/culture should be protected from exposure to reason-giving debate---this impedes the culture of democratic debate that’s key to effective decisionmaking in a pluralistic society---it’s also simply wrong to claim that framework oppresses identity or alternate styles---our argument is style-neutral---it simply asks that narrative/experience/etc be used to support a policy conclusion which solves their offense as well as ours Anderson 6 Amanda Anderson 6, Andrew W. Mellon Professor of Humanities and English at Brown University, Spring 2006, “Reply to My Critic(s),” Criticism, Vol. 48, No. 2, p. 281-290
MY RECENT BOOK, The Way We Argue Now, has in a sense two AND communicated and also can be used to justify political positions and legislative agendas.
7. Cyberwar is probable- multiple IR theories prove Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
Cyberwar is an accurate linguistic description- their arg masks the reality of the coming conflict
The dichotomy between Eastern and Western conceptions of war seem to drive a significant portion AND of the terminology used, the era of digital conflict is upon us.
8. Cyberwar is plausible enough to merit academic attention Junio ‘13 Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB
So, how much should scholars and practitioners care about cyber war?¶ A belief AND prerequisite to reducing the incidence of cyber¶ con?ict and avoiding cyber war.
9. We do not preclude the inclusion of veterans, means that the permutation resolves any residual link to actual plan action.
10. We do not ignore the individual soldier – we recognize that war is changing – that is not to say that soldiers are not still engaged, but rather it is a reason why we should specifically investigate the causes of cyberwars that lead us into the conflicts in which they are deployed.
Our discussion raises awareness of cyber militarism and spills over to policy Owens et al. 09 (WILLIAM A. OWENS, AEA Holdings, Inc AND Regarding U.S. Acquisition and Use of Cyberattack Capabilities”, pdf)
A historical analogy might be drawn to the study of nuclear issues. In many AND in providing education and background is in our view its most important function.
12. Perm: do the affirmative and welcome military veterans into the debate space. 13. Making debate SOLELY about personal narratives is self-destructive---making the judges choose between whose personal experiences are more meaningful is VIOLENT and denies the intensity of our individual experiences Subotnik 98 Professor of Law, Touro College, Jacob D. Fuchsberg Law Center. 7 Cornell J. L. and Pub. Pol'y 681, Lexis
Having traced a major strand in the development of CRT, we turn now to AND to faculty offices and, more generally, the streets and the airwaves.
14. Perm: do the affirmative and all non-mutually exclusive parts of the alternative. 15. We have offense to our construction of war scenarios. The alt, by failing to emphasize the horrors of nuclear war, silences protest and promotes the very nuclear militarism they critique Clair James. 1994 (Doctoral student in English Literature at the University of Iowa, “Book Reviews,” Configurations, 2.2, 367-371) Chaloupka first analyzes the politics of the antinuclear movement, arguing that it has failed AND asked us all, but especially children, to become automatic message machines.
16. Reality outweighs representations Alexander Wendt, 1999. Professor of International Security at Ohio State University, 1999, “Social theory of international politics,” The effects of holding a relational theory of meaning on theorizing about world politics are AND is also regulated by a mind-independent, extra-linguistic world. 16. Trauma specifically elides empirical complexity through a completely non-falsifiable methodology Radstone 7 Author(s): Radstone, Susannah.¶ Article title: Trauma theory: Contexts, Politics, Ethics¶ Year of publication: 2007¶ Citation: Radstone, S. (2007) ‘Trauma theory: Contexts, Politics, Ethics’, Paragraph¶ 30 (1) 9-29.¶ Link to published version: http://dx.doi.org/10.3366/prg.2007.0015¶ DOI: 10.3366/prg.2007.0015 ¶ PROFESSOR UNIOVERSITY OF EAST LONDON¶ fter completing a PhD (Film and Literature) titled 'The Women's Room: Women and the Confessional Mode' at the University of Warwick and a period teaching film and literature at Keele University, I arrived back at UEL, where I did my undergraduate degree in Cultural Studies, in 1994. I lecture in film, media, cultural studies and memory studies at undergraduate and masters level, have had a number of roles in the research management of the School, and supervise PhDs.
This is problematic since, to put things at their most stark, trauma AND via traumatic sufferings can be forged and those from whom such identifications are withheld
16. The theory of trauma leads to a problematic biological determinism - even on the social level James Berger Prof. of English @ Hofstra, Contemporary Literature, Vol. 38, No. 3 (Autumn, 1997), pp. 569-582 "Unclaimed Experience: Trauma, Narrative, and History by Cathy Caruth; Representing the Holocaust: History, Theory, Trauma by Dominick LaCapra; Worlds of Hurt: Reading the Literatures of Trauma by Kali? Tal" University of Wisconsin Press Trauma and Literary Theory http://www.jstor.org/stable/1208980
Freud's earliest idea, in Studiesin Hysteria, concerned the dynamics of trauma, repression AND , in favor of some all-encompassing instinctual- biological determination.2
1/10/14
2AC SunsetConsult CP
Tournament: Wichita State | Round: 4 | Opponent: UTD LO | Judge: Ermo Perm- do the plan and the counterplan Perm- do the counterplan, its not textually competitive, they only add a plank that includes a sunset in _ years
No solvency- a) CP makes counter terrorism policy unsustainable- recent gridlock proves congress won’t be able to pass a new aumf every years- CP removes the authorization for the WOT, making nuclear/biological attack inevitable b) CP wrecks legitimacy because it merely pushes the legal uncertainty regarding detention and targeted killing back years- that’s Chesney c) If plan is unpopular it proves the AUMF won’t get renewed Perm- do the plan and insert a sunset provision but continue doing the plan regardless of its recommendations
Double Bind- Either A. The plan will be rolled back later and the case outweighs politics OR. B. Theres no Net Benefit- Congresspeople will still fight the counterplan if they know it wont be rolled back Deseret Morning News, 2/16/7’ Seat-belt measure stumbles by 6 votes in House, Nexis Sen. Pat Jones, D-Salt Lake, sponsored the bill and helped AND . "Once it's enacted it's not really ever going to go away."
Sunset provisions are unpopular- tax cuts proves Guinto, Investor’s Business Daily, ’03 (Joseph, May 5, “House Nearing Final Tax-Cut Package That Trims Cap Gains, Dividend Levies; Senate Limits Still A Hurdle” lexis) The idea would be to hold down long-term estimates of costs to the AND and Frist does not back Thomas' plan to tax dividends as capital gains. Drones don’t cause U.S adventurism---their ev is baseless speculation Amitai Etzioni 13, professor of international relations at George Washington University, March/April 2013, “The Great Drone Debate,” Military Review, http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20130430_art004.pdf Mary Dudziak of the University of Southern California’s Gould School of Law opines that “drones are a technological step that further isolates the American people from military action, undermining political checks on . . . endless war.” Similarly, Noel Sharkey, in The Guardian, worries that drones represent “the ?nal step in the industrial revolution of war—a clean factory of slaughter with no physical blood on our hands and none of our own side killed.” This kind of cocktail-party sociology does not stand up to even the most AND —traumatic experiences that turn some of them into psychopath-like killers? Perhaps if all or most ?ghting were done in a cold-blooded, push AND , a choice which would greatly increase our casualties and zones of warfare. Italics in original
As the U.S. begins to withdraw troops from Afghanistan, Russia and AND United States should embrace the transformation of a new era in Eurasia's heartland.
Paust ’08 (Mike 26 Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int’l L. 26 Pol’y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
Main Entry: 1in Pronunciation: ’in, 26n, 26n Function: preposition Etymology: Middle English, from Old English; akin to Old High German in in, Latin in, Greek en 1 a — used as a function word to indicate inclusion, location, or position within limits in the lake wounded in the leg in the summer
Counter-interp: Statutory restrictions are legislative limits
Colella ’88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president’s policy objectives.
W/M- aff restricts president’s authority to use preemptive OCO’s.
2. Restrict and regulate are synonymous Paust ’08 (Mike and Teresa Baker Law Center Professor, University of Houston) Jordan 14 U.C. Davis J. Int'l L. and Pol'y 205 The primacy of customary international law is also evident in an opinion by Justice Chase AND of war recognizably had a higher, "more general" absorbing effect.
3. Counter-interp: Statutory restrictions are legislative limits Law dictionary No Date http://thelawdictionary.org/statutory-restriction/ STATUTORY RESTRICTION? Limits or controls that have been place on activities by its ruling legislation
4. Prefer our interp: a)Their interp limits out heart of the topic affs like amending the War Powers Resolution, which undercuts education and means there are functionally zero aff’s because prohibitions are solved by the XO- lack of solvency means the topic is already tiny and neg biased, and it limits the proliferation of smaller affs b)Only 1 aff exists on the topic means no limits explosion and no ground loss.
5. No extra T – we don’t allow the authorization of new force.
5. Neg interp impossible: Congress CANNOT prohibit Colella ‘88 Frank SPRING, 1988 54 Brooklyn L. Rev. 131
Because the subsequent versions of the amendment sought to deny the executive any latitude in AND make it apparent that Congress prevented effective execution of the president's policy objectives.
6. Counter-interp- the plan text is a restriction
7. Default to reasonability to prevent a race to the most limiting interp.
10/22/13
2AC T-Increase - WSU
Tournament: Wichita State | Round: 7 | Opponent: Kansas MR | Judge: Corey Stone Counter-interp: Statutory restrictions are legislative limits
W/M – We limit the president’s authority to determine those responsible for 9/11 in the AUMF. Bradley and Goldsmith ‘5 - Curtis and - Jack, Professors at University of Virginia and Harvard Law Schools Respectively, CONGRESSIONAL AUTHORIZATION AND THE WAR ON TERRORISM, Harvard Law Review, Volume 118, May 2005
The AUMF is arguably more restrictive in one respect, and argua-bly broader AND of facts related to the exercise of his authority under the AUMF.147 NDAA Section 1022 provides a definition – definitely bigger than our “Associated Forces” Elsea and Garcia 13 Jennifer K, Legislative Attorney, Michael J, Legislative Attorney, CRS Report, The National Defense Authorization Act for FY2012 and Beyond: Detainee Matters, August 7th, 2013 https://www.fas.org/sgp/crs/natsec/R42143.pdf#SPS Section 1022 applies both to members of Al Qaeda and “associated forces.”87 AND terrorist with no ties to Al Qaeda or any ¶ associated force. SQ limits on authority mean whatever Obama says, plan increases restrictions Estes ‘13 Adam Clarke http://www.theatlanticwire.com/politics/2013/02/take-rare-look-how-obama-decides-send-drones-kill-americans/61794/ Human-rights advocates were floored on Monday night when NBC News AND Again, the documents are very vague about where to draw the line.
1/26/14
2AC T-Prohibit - AUMF Aff - UTD
Tournament: UTD | Round: 6 | Opponent: KState KM | Judge: Kearny, Mike W/M- plan prohibits use of force against individuals and groups that fall outside of the plan’s narrow definition of “associated force”- tht’s Cronogue
W/M- Ambiguity of “associated forces” gives Obama carte blanche to target and detain in the squo- plan restricts that authority. Counter-interp: Statutory restrictions are legislative limits
W/M – We limit the president’s authority to determine those responsible for 9/11 in the AUMF. Bradley and Goldsmith ‘5 - Curtis and - Jack, Professors at University of Virginia and Harvard Law Schools Respectively, CONGRESSIONAL AUTHORIZATION AND THE WAR ON TERRORISM, Harvard Law Review, Volume 118, May 2005
The AUMF is arguably more restrictive in one respect, and argua-bly broader AND of facts related to the exercise of his authority under the AUMF.147
In the area of refers to a certain scope Elizabeth Miura 12, China Presentation, prezi.com/tccgenlw25so/chin165a-final-presentation/ "in the area of" refers to a certain scope
Substantial means important. We Meet. The aff prevents unlimited presidential WOT authority—that’s an important restriction of war power authority Merriam-Webster’s Collegiate Dictionary 02 Merriam-Webster’s Collegiate Dictionary Tenth Edition 2002 http://www.m-w.com/cgi-bin/dictionary Considerable in importance, value, degree, amount, or extent
1/6/14
2AC T-Restrict
Tournament: Wake Forest | Round: 7 | Opponent: NYU DD | Judge: D Stout NOTE: I'm honestly still not really sure what argument they were trying to make, so this 2AC is probably useless to you.
We meet – the president can use OCOs right now
No framework for OCO use now Lorber ‘13 Eric, J.D. Candidate, University of Pennsylvania Law School, Ph.D Candidate, Duke University Department of Political Science. Journal Of Constitutional Law 15.3 https://www.law.upenn.edu/live/files/1773-lorber15upajconstl9612013. ETB
Behind the scenes, however, the Obama administration and Pentagon ¶ officials considered heavily AND .S. technical ¶ capability in this field is highly classified.11
We meet – we are a restriction
Don’t vote on it for a terrible interp – our interp is that a restriction is an actual restriction. What does that mean?
Just a part we also don’t restrict – that’s inevitable
They over-limit, we would have to restrict everything
Yet the iron rule of Washington is that TPA votes only succeed via ferocious and AND to worry, he keeps telling them. He's making a few calls. Losers-lose is wrong --- won’t impact rest of agenda Sargent, 9/10 (Greg, 9/10/2013, Washington Post.com, “No, a loss on Syria would not destroy the Obama presidency,” Factiva))
If not? None of the other permutations here are anywhere close to that kind AND really mean when they say that. It's not clear even they know.
President Obama kicked off the long Memorial Day weekend with a speech which had a AND power for the federal legislative branch to review and restrain the president's actions.
No trade impact Fletcher 11 Ian Fletcher is Senior Economist of the Coalition for a Prosperous America, former Research Fellow at the U.S. Business and Industry Council M.A. and B.A. from Columbia and U Chicago, "Avoid Trade War? We're Already In One!" August 29 2011 www.huffingtonpost.com/ian-fletcher/avoid-trade-war-were-alre_b_939967.html
The curious thing about the concept of trade war is that, unlike actual shooting AND much harm; it will be no different if we join the party.
2/8/14
2AC Terror Talk - UMKC
Tournament: UMKC | Round: 7 | Opponent: UCO VY | Judge: Matt Munday The alt breeds more terrorism and violence – defining terrorism is key to a stable response Begorre-Bret, Professor of Philosophy at the University de Reims Institut des Hauts Etudes sur la Justice, ’6 (Cyrille, March, “Symposium: Terrorism, Globalization And The Rule Of Law: The Definition Of Terrorism And The Challenge Of Relativism” 27 Cardozo L. Rev. 1987, Cardozo Law Review, lexis) B. The Consequences of "Definitional Abstention" The lack or the blurriness of AND oppression. It remains to be seen if such a definition is possible.
2. Reps don’t shape reality—focusing on them obscures material and political analysis which turns the criticism Tuathail 96 (Gearoid, Department of Georgraphy at Virginia Polytechnic Institute, Political Geography, 15(6-7), p. 664, science direct) While theoretical debates at academic conferences are important to academics, the discourse and concerns AND needs to always be open to the patterned mess that is human history.
3. Masking Disad—discursive criticism masks the problem and prevents legitimate solutions. Meisner 95 (Mark, professor of environmental studies at York University, (Mark, “Resourcist Language: The Symbolic Enslavement of Nature”, Proceedings of the Conference on Communication and Our Environment, ed: David Sachsman, p. 242) Changing the language we use to talk about non-human nature is not a AND to believe either that language is trivial, or that it is deterministic.
4. Their focus on rhetoric stifles debate about social and political structures in favor of discussions on the minutia of terminology. Best and Kellner 91 ( Stephen Best and Douglas Kellner, UT-Austin, 1991, Postmodern Theory: Critical Interrogations, p. 259-60) Postmodern theorists do not do social theory per se, but rather eclectically combine fragments AND together to constitute specific societies, and how societies work or fail to function
10/22/13
2AC Title 50 T - Cyber Aff
Tournament: UNT | Round: Doubles | Opponent: Georgia State FF | Judge: Kearny, Haynal, Tomik 3.CI: OCO’s include intel collection, counterintelligence disruption, covert actions, and cyberwar Bradburry ‘11 Steven, Partner, Dechert, LLP. This speech was delivered as the Keynote Address at the Harvard ¶ National Security Journal Symposium, Cybersecurity: Law, Privacy, and Warfare in a Digital ¶ World (Mar 4. 2011).¶ The Developing Legal Framework for Defensive and ¶ Offensive Cyber Operations. http://harvardnsj.org/wp-content/uploads/2011/04/Vol.-2_Bradbury_Final.pdf ETB
By offensive cyber operations, I’m referring to a range of potential ¶ activities that AND conventional, kinetic war fighting or ¶ on a stand-alone basis).
1/10/14
2AC XO CP - AUMF - UTD
Tournament: UTD | Round: 3 | Opponent: Wyoming MP | Judge: Rob Burns Perm- do the plan and the counterplan- solves the link to politics Corcoran 11 --- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, “Obama's Failed Attempt to Close Gitmo: Why Executive Orders Can't Bring About Systemic Change,” 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President's future controversial policy changes. Perm- do the counterplan- CP doesn’t pose an opportunity cost to the aff because the net benefit is generated through fiat
CP doesn’t solve: a) terrorism- lack of legal clarity prevents effective prosecution of WOT- and unilateral executive action can’t generate the public support and international cooperation necessary for sustainable counter terror operations- and executive action can’t solve interbranch fatigue that is decimating response times and info sharing- that’s Chesney, Wainstein, and Leiter b) firebreaks- reliance on executive authority causes shift to article two justifications, which guts global non-use of force norms and erodes US legitimacy- that’s Barnes CP doesn’t solve terrorism or legitimacy and links to politics
Consider first the option of Congress doing nothing. This is, at bottom, AND to the interests of the ¶ individual in question (for obvious reasons). CP links to politics but the aff doesn’t
Having the intelligence committees publicly on board helps, but what the administration really needs AND at that point the administration will wish it had gone to Congress sooner.
CP Links to flex/warfighting/prez powers but the aff doesn’t
Cronogue ‘12 Graham. Duke University School of Law, J.D. expected 2013; University of North Carolina B.A. 2010. 22 Duke J. Comp. and Int'l L. 377 2011-2012. ETB
Though the President's inherent authority to act in times of emergency¶ and war can AND the future and prevents the "gloss" that comes from congressional acquiescence.¶
Counterplan fiats the direction object the resolution, which is a voting issue- steals the aff with no 2ac recourse because it fiats through all of our solvency deficits and the core topic literature, which rigs the game in favor of the neg- rejecting the team is key to remedy abuse and set a precedent
Doesn’t solve any of the aff A. Austin – continued presidential control is continued military control – only civilian control solves norms.
B. Dulap – empirically allies perceive presidential control poorly, it gives a perception of lawlessness that prevents coalitions.
C. Dycus – Congressional abdication means the president can rescind and do whatever he wants
D. Hansen and Friedman – even if the CP solves for the immediate future, Congressional abdication makes it harder to constrain the president later, and he can un-do his actions
E. Doesn’t solve modeling Rothschild 13 (Matthew, Feb 4, "The Danger's of Obama's Cyber War Power Grab," www.progressive.org/dangers-of-obama-cyber-war-power-grab)
When our founders were drafting the Constitution, they went out of their way to AND successors.¶ They, too, worry about the temptations of a President.
Perm — do both — Congressional involvement makes the plan popular — the CP links to politics Corcoran 11 --- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, “Obama's Failed Attempt to Close Gitmo: Why Executive Orders Can't Bring About Systemic Change,” 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President's future controversial policy changes.
Perm- do the counterplan- there is no opportunity cost to the aff because the link is generated through fiat of the CP rather than to the aff
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
Future presidents roll back Harvard Law Review 12, "Developments in the Law: Presidential Authority," Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf The recent history of signing statements demonstrates how public opinion can effectively check presidential expansions AND practices. 147 Only time, and perhaps public opinion, will tell.
10/22/13
Kentucky Round 4 - Aff v James Madison GP
Tournament: Kentucky | Round: 4 | Opponent: James Madison GP | Judge: Sean Kennedy
1AC
Adv 1: Arms Race
The cyber arms race is accelerating — major attacks are inevitable this year — the best data proves
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war
— there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow’s wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain."
Congressional constraints of OCOs are key to solve
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
The plan is key to secure cyberspace
Lord et al 11 Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf)
The United States should lead a broad, multi-stakeholder international cyber security coalition AND in a way that defends the nation without subverting what it stands for.
Squo offensive cyber policy creates perception of US weakness
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war
Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. "US Hegemony and International Legitimacy," 1-25-10, http://www.routledge.com/books/details/9780415552363/-http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them
In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering AND create a strong force multiplier effect and should be considered a top priority.
China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability
Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, "Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing," Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html-http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war
Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Plan
The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Solvency
First, norm-setting other countries model our use of OCOs
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key
Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key
Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, "Congress’ Role in Cyber Warfare," Journal of National Security Law 26 Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf-http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Congressional restrictions on OCOs send a global signal of cyber leadership
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication
Hansen 26 Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
As the government shutdown enters its third day, Democrats and Republicans seem no closer AND said, will give Republicans more areas where they can look for victory.
The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a deal
The White House’s distance diplomacy with Republicans is an approach that tacitly acknowledges three inescapable AND the president’s always had a "laissez-faire" approach to Congress.
The U.S. debt ceiling deadline may be looming like dark clouds over AND has gone relatively smoothly since early this year despite the onslaught of criticism.
Congress opposed to offensive Cyber ops—- they like the plan, AND Obama will issue other controversial XOs that drain PC
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act."¶
With no movement on either side and the debt ceiling fast approaching, there’s increasing AND around, again, Clinton is advising Obama to call the GOP’s bluff.
No impact to econ decline
Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, "Poverty as a cause of wars?" p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
As he battles with congressional Republicans over the budget and the debt ceiling, and AND will not negotiate with the GOP in Congress over extending the debt ceiling.
2AC Brecher CP
C. The counterplans covert action ensures unilateralism – prevents coalitions and fuels suspicion and cyberwar Rishikof 11, Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf) Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
2. Perm do both — only the perm solves legitimacy — their author
It has become axiomatic of American constitutional doctrine that presidential decisions gain greater constitutional legitimacy AND place substantive limits on the scope of hostilities and the initiation of conflicts.
4. Links to politics – congress wants to be involved
A group of 46 House Republicans, led by Reps. Marsha Blackburn (Tenn AND letter, the House Republicans urged the administration to continue working with Congress.
5. Covert designation fuels suspicion and can’t solve cyber war — also removes international pressure from Chinese hacking
Wright 11, Executive director of studies at The Chicago Council on Global Affairs (Thomas, 6/26, America has double standards in fighting cyberwar, www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html~23axzz1QYnW3i1w-http://www.ft.com/cms/s/0/c8002f6a-a01b-11e0-a115-00144feabdc0.html) While it has several advantages, treating American cyber-destruction as a covert operation will severely undermine the new cyber-strategy. Suspicion that the US uses cyberweapons whenever convenient will hamper its attempts to press other states to be transparent about their intentions. In particular, it takes the pressure off China, widely believed to be the leading state source of cyberattacks. It may also dissuade the US from developing the technology to trace the source of an attack.
6. Congressional involvement makes the plan popular — the CP links to politics
Corcoran 11 —- Professor of Law and Director at University of New Hampshire School of Law (March 2011, Erin M., University of New Hampshire Law Review, "Obama’s Failed Attempt to Close Gitmo: Why Executive Orders Can’t Bring About Systemic Change," 9 U.N.H. L. Rev. 207)) Finally, this example highlights that issuing unilateral executive orders, and then asking Congress AND and can use this knowledge when advancing the President’s future controversial policy changes.
Future presidents roll back
Harvard Law Review 12, "Developments in the Law: Presidential Authority," Vol. 125:2057, www.harvardlawreview.org/media/pdf/vol125_devo.pdf The recent history of signing statements demonstrates how public opinion can effectively check presidential expansions AND practices. 147 Only time, and perhaps public opinion, will tell.
2AC Taoism
Their desire to win prevents the Wu Wei
Chuang 3 (Lao Chuang, Daoist, September 9, 2003, http://www.geocities.com/laochuangtsu/) In Taoism, it all comes down to this: Give up desire. The AND as the mole does. It does not attempt to fight the Tao.
The existence of the alt prevents solvency
Khema 94 (Ayya, monk, "All of us beset by Birth, Decay, and Death."~ In the world we live in, we can find people, animals, nature AND is one’s own, everyone has to find his through his own efforts.
Taoism alone precludes action—the permutation solves best
Some argue that Daoism and Zen are basically the same spirituality or philosophy. I AND violence which allows for self-defense, but not wonton violent aggression.
Even if we can’t know the right course of action, taking action in what seems to be the best direction boosts personal value and provides new information and experiences which can change the world
You’ve probably had the experience at one time or another of feeling "stuck" AND and break free of the painful, mind-numbing cement of indecision21
Psychoanalysis can’t be scaled up to explain society or politics – they can’t explain our impacts and definitely can’t solve Sharpe, lecturer, philosophy and psychoanalytic studies, and Goucher, senior lecturer, literary and psychoanalytic studies – Deakin University, ’10 (Matthew and Geoff, Žižek and Politics: An Introduction, p. 182 – 185, Figure 1.5 included)
Can we bring some order to this host of criticisms? It is remarkable that AND of the analysands’ voluntary desire to overcome their inhibitions, symptoms and anxieties. As a clinical and existential process, it has its own independent importance and authenticity AND and the other methodological, are different (see Figure 5.1) The substantive problem is to equate any political change worth the name with the total AND cure. For what could the concrete consequences of this governing analogy be? We have seen that Žižek equates the individual fantasy with the collective identity of an AND before the beginning of time (IDLC 153; OB 144–8). But can the political theorist reasonably hope or expect that subjects will simply give up AND can the theorist and his allies use to move them to do so?
The claim that suffering is inevitable and that intervention to suffering is life-negating is nothing more than a thinly-veiled cover for mass rape and genocide – accepting their argument necessitates an unconditional acceptance of brutal atrocities in all their forms.
Kelley L. Ross, professor of philosophy at L.A. Valley College, 2003. "Friedrich Nietzsche (1844-1900)", http://www.friesian.com /NIETZSCH.HTM While the discussion of Existentialism treated Nietzsche as an Existentialist before his time, with AND blond" and "German," deleted or altered in the Golffing translation~
Turn – Suffering is only inevitable in a world where affirmative action is not taken, this internal link turns the entire critique, only the aff has the ability to overcome ressentiment
May ’5 (Todd May, prof @ Clemson. "To change the world, to celebrate life," Philosophy 26 Social Criticism 2005 Vol 31 nos 5–6 pp. 517–531) To change the world and to celebrate life. This, as the theologian Harvey AND who would be more than willing to take your world up for you.
Psychological torture DA – the alternative’s attempt to reorient our relationship towards death represses the basic instinct of human beings which turns their offense
Pyszczynski et al 6 – Tom, Prof. Psych. – U. Colorado, Sheldon Solomon, Prof. Psych. – Skidmore College, Jeff Greenberg, Prof. Psych. – U. Arizona, and Molly Maxfield, U. Colorado, Psychological Inquiry, "On the Unique Psychological Import of the Human Awareness of Mortality: Theme and Variations" 17:4, Ebsco Kirkpatrick and Navarette’s (this issue) first specific complaint with TMT is that it AND didn’t have the ability to instigate fear reactions in response to such threats?
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war
— there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow’s wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain."
Congressional constraints of OCOs are key to solve
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
The plan is key to secure cyberspace
Lord et al 11 Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf)
The United States should lead a broad, multi-stakeholder international cyber security coalition AND in a way that defends the nation without subverting what it stands for.
Squo offensive cyber policy creates perception of US weakness
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war
Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. "US Hegemony and International Legitimacy," 1-25-10, http://www.routledge.com/books/details/9780415552363/-http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them
In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering AND create a strong force multiplier effect and should be considered a top priority.
China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability
Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, "Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing," Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html-http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war
Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Plan
The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Solvency
First, norm-setting other countries model our use of OCOs
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key
Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key
Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, "Congress’ Role in Cyber Warfare," Journal of National Security Law 26 Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf-http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Congressional restrictions on OCOs send a global signal of cyber leadership
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication
Hansen 26 Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
2AC
Case
Uncontained disease leads to extinction
Toolis, the director of a major television series on the history of plagues, 09 (Kevin, The Express, April 28, 2009 U.K. 1st Edition "Pandemic Pandemonium" lexis) It destroyed the Roman Empire, wiped out most of the New World and AND new H1N1 virus it had travelled halfway across the world via international flights.
CALL me a converted skeptic. Three years ago I identified problems in previous climate AND the shape of the observed temperature rise and the known greenhouse gas increase.
Risk K
We must weigh competing probabilities and dismiss threats to survival if they are very unlikely—the alternative is that we do nothing about any existential risk
POSNER 2004 (Richard, US Court of Appeals judge and Senior Lecturer at the University of Chicago Law School, Catastrophe: Risk and Response 19)
The reason for the hedge in "essentially" is that I want to avoid AND multiply their number indefinitely we’ll end up doing nothing about any of them.
Even if they win the world is getting better, war is still increasingly possible - multiple reasons
Ferguson 8 Laurence A. Tisch Professor of History at Harvard University, William Ziegler Professor of AND , AL~
So The War of the World, singular, is an attempt to explain why AND killing fields conceivably of Palestine, of Lebanon, of the Persian Gulf.
The convergence of hyper-competition and hyper-power status make conflict increasingly likely
Capie 11 Senior Lecturer in International Relations at Victoria University of Wellington, New Zealand, Visiting Scholar at the Weatherhead Center for International Affairs at Harvard University, Research Associate in the ASEAN Studies Centre at American University, co-editor of the journal Political Science, member of the editorial board of Asian Politics and Policy ~7/6, David, "Welcome to the dark side? Mittelman’s encounter with global insecurity", Global Change, Peace 26 Security, Volume 23, Issue 2, Taylor and Francis, AL~
The book’s thesis is that there are two systemic drivers of contemporary security and insecurity AND on globalization and peace and conflict to form a compelling and provocative account.
Seriously, there will be wars: economics, security dilemma, nationalism
Mearsheimer 99 Mearsheimer, Distinguished Professor of Political Science, 1999. ¶ (John Mearsheimer, "Is Major War Obsolete?" 1999, http://www.ciaonet.org/conf/cfr10/index.html
So what I’m saying here is you can have an absence of war, but AND great powers have good reasons to go to war against other great powers.
Energy competition increases the risk of major power escalation
Even a regional nuclear war could spark "unprecedented" global cooling and reduce rainfall AND "would be that even a regional nuclear conflict would have global consequences."
Nuclear war would destroy the environment and the food chain, ensuring extinction of all life
Previous studies ,including a 1985 National Research Council Report, had examined the effects AND , endangering the many marine organisms that depend on them for food.
Nuclear war causes extinction
Woodwell 1986 George M Woodwell, PhD From Duke, Director of the Ecosystems center at the Marine Biological Laboratory at Woods Hole Mass. , Nuclear Winter, Deterrence, and the Prevention of Nuclear War, Edited by Sederberg, 1986 p. 20 The primary concern, I suppose, is the direct effects on people. Many AND in areas as large as continents, possibly in the northern hemisphere itself.
Let me make three quick points on that. One is, there’s a book AND no peer competitors in the world because that’s the way we like it.
The obsolescence of major war is impossible—states inevitably slip into conflicts
Doran 99 Doran, Professor of International Relations at Johns Hopkins University’s School of Advanced International Studies, Summer 1999 (Charles F., Survival, "Is Major War Obsolete? An Exchange: The Structural Turbulence of International Affairs," June, vol.41 no.2, p.139-142)
Finally, of course, it is important to be clear about the meaning of AND happen. And that is a faith that is very difficult to maintain.
War is always possible – statements of lasting peace have never been correct – Mandelbaum’s exception of Russia and China undermine their entire argument
Kagan 1999 Donald Kagan is Hilihouse Professor of History and Classics at Yale University "Is Major War Obsolete? An Exchange" Survival, vol. 41, no. 2, Summer 1999, pp. 139—52 I agree that the present moment in history provides a better chance than ever for AND quite enough — it seems to me that his entire thesis is undermined.
Organizations lack full deterrence capabilities—Lack of civilian control means states are more likely to strike preemptively or abandon nuclear discipline
Clark 97 Clark, associate professor of political science and director of the national security studies program at California State University, 97 (Mark T., "Deterrence in the Second Nuclear Age-book reviews: Neorealism versus Organizational Theory," http://www.findarticles.com/p/articles/mi_m0365/is_n1_v41/ai_19238111)
Sagan’s critique is a healthy antidote to Waltz’s optimism. In his view, there AND amounts of time, talent, and treasure into developing its nuclear program.
Predictions are accurate enough and should be used as a basis for political action Chernoff 2009. Fred, Prof. IR and Dir. IR – Colgate U., European Journal of International Relations, "Conventionalism as an Adequate Basis for Policy-Relevant IR Theory", 15:1 For these and other reasons, many social theorists and social scientists have come to AND commitment to both of these conclusions should be evident from the foregoing discussion.
Baudrillard
C. Policy simulation key to creativity and decisionmaking—the detachment that they criticize is key to its revolutionary benefits
Eijkman 12 The role of simulations in the authentic learning for national security policy development: Implications for Practice / Dr. Henk Simon Eijkman. ~electronic resource~ http://nsc.anu.edu.au/test/documents/Sims_in_authentic_learning_report.pdf-http://nsc.anu.edu.au/test/documents/Sims_in_authentic_learning_report.pdf. Dr Henk Eijkman is currently an independent consultant as well as visiting fellow at the University of New South Wales at the Australian Defence Force Academy and is Visiting Professor of Academic Development, Annasaheb Dange College of Engineering and Technology in India. As a sociologist he developed an active interest in tertiary learning and teaching with a focus on socially inclusive innovation and culture change. He has taught at various institutions in the social sciences and his work as an adult learning specialist has taken him to South Africa, Malaysia, Palestine, and India. He publishes widely in international journals, serves on Conference Committees and editorial boards of edited books and international journal
Policy simulations stimulate Creativity Participation in policy games has proved to be a highly effective AND set of meanings and beliefs to guide the policy process in the desired direction
2. Even if there is no objective truth, rationality can provide justified belief, and we should still act as if there were.
Sherry 96 – Suzanna, "The Sleep of Reason", Georgetown Law Journal, Feb, lexis In order to make even such a limited defense, however, I must first AND as if there were. It remains only to give that epistemology content.
5. Images of nuclear apocalypse are necessary to problematize their usage
James Foard. 1997. Associate Professor of Religion, Arizona State, "Imagining Nuclear Weapons: Hiroshima, Armageddon, and the Annihilation of the Students of Ichijo School," Journal of the American Academy of Religion, http://jaar.oxfordjournals.org/cgi/reprint/LXV/1/1.pdf TBC 7/1/10) This ambivalence about Hiroshima has been partially ameliorated by displacing it with Armageddon in our AND to use the most famous phrase, "fabulously textual" (Derrida’23).
7. IR theory proves cyberwar is probable- multiple mechanisms
Junio ’13 ~Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB~
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
9. Even if our lives are valueless, there is value in protecting future generations
Nick Bostrom, Professor in the Faculty of Philosophy 26 Oxford Martin School, Director of the Future of Humanity Institute, and Director of the Programme on the Impacts of Future Technology at the University of Oxford, recipient of the 2009 Eugene R. Gannon Award for the Continued Pursuit of Human Advancement, holds a Ph.D. in Philosophy from the London School of Economics, 2011 ("The Concept of Existential Risk," Draft of a Paper published on ExistentialRisk.com, Available Online at http://www.existentialrisk.com/concept.html-http://www.existentialrisk.com/concept.html, Accessed 07-04-2011)
We have thus far considered existential risk from the perspective of utilitarianism (combined with AND or hubris, we allowed it to come to irreparable harm).~25~
10. Abandoning rational epistemology ensures massive violence, destruction of debate, and death of political participation.
Sherry 96 – Suzanna, "The Sleep of Reason", Georgetown Law Journal, Feb, lexis Some, however, have suggested that the historical era of the Enlightenment was unique AND is the only possible consequence of speaking such a truth to power. 145
1AR
Risk K
Indifference leads to no value to life.
David Johnson. "The Difference Between Winning and Losing: Baudrillardian Reversibility and Chance Versus the World as Stake." International Journal of Baudrillard Studies 7.1 (January 2010).
If there is no real difference in life between winning and losing, better to just watch others play, but then again, if there is no difference between winning and losing, what is the point of watching? Without a difference between winning and losing, even the apathy of the tele-addict is at risk, since without a separation between winning and losing there cannot even be a proper reversal between them, and therefore any drama.
Our impacts aren’t constructed until they prove it.
Yudkowsky 6 – Eliezer Yudkowsky, Research Fellow at the Singularity Institute for Artificial Intelligence that has published multiple peer-reviewed papers on risk assessment. Cognitive biases potentially affecting judgment of global risks Forthcoming in Global Catastrophic Risks, eds. Nick Bostrom and Milan Cirkovic. August 31, 2006. Every true idea which discomforts you will seem to match the pattern of at least AND real-world assertions. Do not take your eye off the ball.
10/6/13
Kentucky Round 7 - Aff v Missouri State PR
Tournament: Kentucky | Round: 7 | Opponent: Missouri State PR | Judge: Al Hiland
1AC
Adv 1: Arms Race
The cyber arms race is accelerating — major attacks are inevitable this year — the best data proves
Security analysts are predicting that 2013 is when nation-sponsored cyberwarfare goes mainstream — AND are particularly vulnerable, according to numerous assessments delivered to Congress last year.
Specifically, OCO-driven retaliatory cycles and arms races
Although setting up a cybersecurity working group with China, Washington has also signaled it AND , the risk of it spilling over into kinetic hostilities will only grow.
Cyber arms race causes world war
— there are no checks on escalation, deterrence doesn’t apply, and only a certain commitment to the plan solves CSM 11 Christian Science Monitor (3/7, Mark Clayton, The new cyber arms race, www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race)
The new cyber arms race Tomorrow’s wars will be fought not just with guns, AND use of cyberattack is ill-formed, undeveloped, and highly uncertain."
Congressional constraints of OCOs are key to solve
The United States is racing for the technological frontier in military and intelligence uses of AND be every bit as reasonable given their anxiety about unconstrained American cyber superiority.
Cyber war escalates - Speed, scope, and spoofing
Clarke and Knake ’12 (Richard (former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States) and Robert (Cybersecurity and homeland security expert at the Council on Foreign Relations), Cyber War: The Next Threat to National Security and What to Do About It, Harper Collins Books, 2012, RSR)
In our hypothetical exercise, the Chinese response aimed at four U.S. AND .¶ But what about collateral damage in the country that is being targeted?
Adv 2: Alliances
Congressional restrictions necessary for allied cooperation
Military commanders have seen the no-legal-limits movie before and they do AND impact on coalition support that the mere perception of American lawlessness can have.
The plan is key to secure cyberspace
Lord et al 11 Vice President and Director of Studies at the Center for a New American Security (Kristin M., Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral.com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the Center for a New American Security’s board of directors, "America’s Cyber Future Security and Prosperity in the Information Age volume I" June 2011, http:// www.cnas.org/files/documents/publications/CNAS_Cyber_Volume20I_0.pdf-http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume I_0.pdf)
The United States should lead a broad, multi-stakeholder international cyber security coalition AND in a way that defends the nation without subverting what it stands for.
Squo offensive cyber policy creates perception of US weakness
What’s more, John Arquilla has advocated taking offensive action against terrorist websites, and AND the most is the marketplace of ideas? Etc., etc., etc.
Coalition building key to solve extinction – disease, climate change, terrorism, and great power war
Lavina Rajendram Lee 10 is a lecturer in the Department of Modern History, Politics and International Relations at Macquarie University, Australia, and has a PhD in International Relations from the University of Sydney. "US Hegemony and International Legitimacy," 1-25-10, http://www.routledge.com/books/details/9780415552363/-http://www.routledge.com/books/details/9780415552363/, Accessed date: 11-7-12 y2k This book examines US hegemony and international legitimacy in the post-Cold War era AND rehabilitate the global leadership credentials of the United States under the Obama Administration.
Chinese anti-access capabilities critically depend on cyber — allied cooperation is key to counter them
In Pacific Forum’s PacNet ~2341 issue, Mihoko Matsubara correctly asserts that "countering AND create a strong force multiplier effect and should be considered a top priority.
China’s rapidly modernizing its military for an A2AD strategy — that fuels territorial disputes
A new report of the U.S. Defense Department says that China is AND and has other territorial disputes with regional neighbors in the South China Sea.
PLA doctrine proves Chinese aggression against Taiwan and the South China Sea are inevitable — A2AD is the linchpin of this capability
Yoshihara 10 (Dr. Toshi Yoshihara, Associate Professor in the Strategy and Policy Department at the Naval War College, former Visiting Professor at the U.S. Air War College, Ph.D. International Relations, The Fletcher School of Law and Diplomacy, Tufts University, M.A. International Relations, School of Advanced International Studies, Johns Hopkins University, B.S. International Relations, School of Foreign Service, Georgetown University, "Chinese Missile Strategy and the U.S. Naval Presence in Japan: The Operational View from Beijing," Naval War College Review, 7-1-2010, (... denotes non-US-ASCII text omitted) http://www.faqs.org/periodicals/201007/2046727461.html-http://www.faqs.org/periodicals/201007/2046727461.html)
In recent years, defense analysts in the United States have substantially revised their estimates AND which China might seek to conduct conventional missile operations against outside intervention.43
Taiwan crisis is imminent and causes nuclear war
Colby et al 13 Elbridgc A. Colby. cochair, is a principal analyst and drvison lead for global strategic affairs at the Center for Naval Analyses (CNA). where he focuses on strateg deterrence, nuclear weapons, and related issues. Previously, he served as policy adviser to the secretary of defense’s representative for the new Strategic Arms Reduction Treaty, as an expert adviser to the Congressional Strategic Posture Commission, as a staff member on the President’s Commission on the Intdhgcnce Capa biLities of the US. Regarding WMD. and in a number of other government positions. Mr. Colby also serves or has served as a consultant to a number of U.S government bodies. He publishes and speaks regularly on strategic issues in the United States. Europe, and Asia. Mr. Colby is a graduate of Harvard College and Yale Law School and is a member of the Council on Foreign Rdations (term) and of the International Institute of Strategic Studies Abraham M. Denmark. cochair. is vice president for political and security affairs at the National Bure-au of Asian Research (NBR) and is an Asia-Pacific security adviser at the Center for Naval Analyses. He manages NBR research programs, dialogues, projects, and initiatives reLated to po. litical and security issues in the Asia-Pacific region. He has experience both inside and outside of government, having previously worked as a fellow at the Center for a New American Security and as country director for China affairs in the Office of the Secretary of Deknse. Mr. Denmark holds an MA. in international security from the Josef Korbel Schoel of International Studies at the University of Denver and has studied at China’s Foreign Atfairs University and Peking Universit, Nuclear Weapons and U.S.-China Relations, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf
Taiwan. Taiwan remains the single most plausible and dangerous source of tension and conflict AND of U.S. defense commitments in the Asia-Pacific region.
Despite America’s best efforts to construct stronger ties with China, relations in-between AND is also rapidly morphing into one of the world’s most sensitive nuclear hotspots.
Plan
The United States federal government should substantially increase restrictions on the war powers authority of the president of the United States by removing the authority to authorize the preemptive use of large-scale cyber-attacks, except in direct support of authorized United States military operations.
Solvency
First, norm-setting other countries model our use of OCOs
It’s reverse causal — lack of norms guarantee escalatory conflict — the U.S. is key
Lewis 11 Senior Fellow at CSIS (James Andrew, Confidence-building and international agreement in cybersecurity, citizenlab.org/cybernorms2012/Lewis2011.pdf)
Alternatives to a formal cyber treaty began to appear as early as 2008. Rejecting AND which states might concede a degree of sovereignty in exchange for greater security.
Second it solves perception — Congress is necessary to reverse independent presidential authority— now is key
Dycus 10 Professor of National Security Law Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, "Congress’ Role in Cyber Warfare," Journal of National Security Law 26 Policy, 4(1), 2010, p.161-164, http://www.jnslp.com/read/vol4no1/11_Dycus.pdf-http://www.jnslp.com/read/vol4no1/11_Dycus.pdf
In his celebrated concurring opinion in The Steel Seizure Case, Justice Jackson cautioned that AND in order to be able to participate in the formulation of national policy.
Congressional restrictions on OCOs send a global signal of cyber leadership
Perhaps more important than being out of the cyber coordination loop, is the how AND put our nation at risk and demonstrates cyber irresponsiblity, not cyber leadership.
Congress must initiate the restriction — anything else is perceived as abdication
Hansen 26 Friedman 9 Professors at the New England School of Law, (Victor and Lawrence, The Case for Congress: Separation of Powers and the War on Terror, p.130)
The problem, of course, is that much of this congressional involvement has come AND more difficult for Congress to stand up to an assertive and aggressive president.
Overt action is key – covert prevents coalitions and fuels suspicion
Rishikof 11, Chair of the ABA Standing Committee on Law and National Security. Former professor of law and chair (PROJECTING FORCE IN THE 21ST CENTURY - LEGITIMACY AND THE RULE OF LAWDepartment of National Security Strategy, National War Collegwww.rutgerslawreview.com/wp-content/uploads/archive/vol63/Issue4/Mustin-Rishikof_Article_PDF.pdf)
Covert action also enables unilateral action. The stealthy nature of covert action means that AND of this instrument when lethality is the goal raises issues of international legitimacy.
2AC
Alliances Adv
Uncontained disease leads to extinction
Toolis, the director of a major television series on the history of plagues, 09 (Kevin, The Express, April 28, 2009 U.K. 1st Edition "Pandemic Pandemonium" lexis) It destroyed the Roman Empire, wiped out most of the New World and AND new H1N1 virus it had travelled halfway across the world via international flights.
2. Triggers litigation, OLC can’t speak to statutes, and White House Counsel Circumvents
Bruce Ackerman 11, Sterling Professor of Law and Political Science at Yale University, "LOST INSIDE THE BELTWAY: A REPLY TO PROFESSOR MORRISON," Harvard Law Review Forum Vol 124:13, http://www.harvardlawreview.org/media/pdf/vol124forum_ackerman.pdf To see why, consider that the relationship between the WHC and the OLC is AND act of legal usurpation — even if that’s precisely what is happening.72
3. OLC Links to Politics
Eric Posner 11, the Kirkland 26 Ellis Professor, University of Chicago Law School. "DEFERENCE TO THE EXECUTIVE IN THE UNITED STATES AFTER 9/11 CONGRESS, THE COURTS AND THE OFFICE OF LEGAL COUNSEL" available at http://www.law.uchicago.edu/academics/publiclaw/index.html. These two events neatly encapsulate the dilemma for OLC, and indeed all the president’s AND OLC only because he believes that OLC will strengthen his hand on net.
4. Perm do both
5. OLC either rubber stamps the prez or gets ignored
6. OLC has to be neutral- the link to politics proves the CP guts solvency and prevents their shielding arguments
Posner 11 - Kirkland 26 Ellis Professor, University of Chicago Law School (Eric A. Posner, "Deference To The Executive In The United States After September 11: Congress, The Courts, And The Office Of Legal Counsel", http://www.harvard-jlpp.com/wp-content/uploads/2012/01/PosnerFinal.pdf)
A question naturally arises about the OLC’s incentives. I have assumed that the OLC AND will be ignored. In no circumstance could it be a constraint. 53
I admit to being a bit puzzled myself, if for slightly different reasons. AND unthinkable as it seems, would not be without precedent for this president.
A substantial portion of Goldsmith’s book presents in detail his case that various forces outside AND little understanding of the broader implications of tying down the president with legalisms.
Stronger statutory checks on Presidential war powers increase credibility
Matthew C. Waxman 13, Professor of Law at Columbia Law School; Adjunct Senior Fellow for Law and Foreign Policy, Council on Foreign Relations, "The Constitutional Power to Threaten War", Forthcoming in Yale Law Journal, vol. 123 (2014), 8/25/2013, PDF
A second argument, this one advanced by some congressionalists, is that stronger legislative AND by pointing foreign actors to the appropriate institution or process for reading them.
It’s impossible for the president to remain adequately flexible on cyber
Such interpretive reorientation raises subsidiary doctrinal issues that¶ might not sit comfortably with extant AND attacks may be much more consequential than the¶ direct and immediate ones.
Zero data supports the resolve or credibility thesis
Jonathan Mercer 13, associate professor of political science at the University of Washington in Seattle and a Fellow at the Center for International Studies at the London School of Economics, 5/13/13, "Bad Reputation," http://www.foreignaffairs.com/articles/136577/jonathan-mercer/bad-reputation-http://www.foreignaffairs.com/articles/136577/jonathan-mercer/bad-reputation Since then, the debate about what to do in Syria has been sidetracked by discussions of how central reputation is to deterrence, and whether protecting it is worth going to war. There are two ways to answer those questions: through evidence and through logic. AND did indeed worry about their reputations. But their worries were often mistaken. For example, when North Korea attacked South Korea in 1950, U.S AND that the Americans intended to destroy his revolution, perhaps with nuclear weapons. Similarly, Ted Hopf, a professor of political science at the National University of AND these threats seriously. As the record shows, reputations do not matter.
====No impact to prez powers==== Healy 11 Gene Healy is a vice president at the Cato Institute and the author of The Cult of the Presidency, The CATO Institute, June 2011, "Book Review: Hail to the Tyrant", http://www.cato.org/publications/commentary/book-review-hail-tyrant
Legal checks "have been relaxed largely because of the need for centralized, relatively efficient government under the complex conditions of a modern dynamic economy and a highly interrelated international order." What’s more, the authors insist, America needs the legally unconstrained presidency both at home (given an increasingly complex economy) and abroad (given the shrinking of global distances). These are disputed points, to say the least. If Friedrich Hayek was at AND means that other players have a stake in protecting the global trading system. Posner and Vermuele coin the term "tyrannophobia," which stands for unjustified fear of AND to cede more power to the president even when more power is needed. Fair enough in the abstract — but Posner and Vermuele fail to provide a single AND executive power is what stood between us and a much larger death toll. Posner and Vermuele argue that only the executive unbound can address modernity’s myriad crises. AND device," according to Paul Wolfowitz — and perhaps no 9/11. Posner and Vermuele are slightly more perceptive when it comes to the home front, letting drop as an aside the observation that because of the easy-money policy that helped inflate the housing bubble, "the Fed is at least partly responsible for both the financial crisis of 2008-2009 and for its resolution." Oh, well — I guess we’re even, then. Sometimes, the authors are so enamored with the elegant economic models they construct that AND off and probably worse off than she would be under the unitary system." But the government-as-firm metaphor is daffy. In the Madisonian vision AND to "consume" them — he might well favor constraints on production. From Franklin Roosevelt onward, we’ve had something close to vertical integration under presidential command AND observed archly, "polls do not reveal the opinions of dead Iraqis."
Pressed on the ABC news program "This Week" on whether the Republican- AND adamant that Republicans would demand concessions for any bill to reopen the government.
The plan is a concession – dems would have to vote for the plan which appeases the GOP – causes a deal
"We have to get something out of this": This is where Rep. AND Boehner spin it any way he wants to simply get the government open.
Plan boosts Obama’s capital without triggering a fight over authority
Kriner 10 Douglas Kriner, Assistant Profess of Political Science at Boston University, 2010, After the Rubicon: Congress, Presidents, and the Politics of Waging War, p. 59-60
Presidents and politicos alike have long recognized Congress’s ability to reduce the political costs that AND .S. interests or the constitutionality of the War Powers Resolution."36
The White House’s distance diplomacy with Republicans is an approach that tacitly acknowledges three inescapable AND the president’s always had a "laissez-faire" approach to Congress.
Congress opposed to offensive Cyber ops—- they like the plan, AND Obama will issue other controversial XOs that drain PC
Unable to reach a deal with Congress, President Obama plans to use his power AND because Congress doesn’t act doesn’t mean the president has a right to act."¶
The U.S. debt ceiling deadline may be looming like dark clouds over AND has gone relatively smoothly since early this year despite the onslaught of criticism.
With no movement on either side and the debt ceiling fast approaching, there’s increasing AND around, again, Clinton is advising Obama to call the GOP’s bluff.
No impact to econ decline
Miller 2k (Morris, economist, adjunct professor in the University of Ottawa’s Faculty of Administration, consultant on international development issues, former Executive Director and Senior Economist at the World Bank, Winter, Interdisciplinary Science Reviews, Vol. 25, Iss. 4, "Poverty as a cause of wars?" p. Proquest)
The question may be reformulated. Do wars spring from a popular reaction to a AND by increasing repression (thereby using one form of violence to abort another).
As he battles with congressional Republicans over the budget and the debt ceiling, and AND will not negotiate with the GOP in Congress over extending the debt ceiling.
As the government shutdown enters its third day, Democrats and Republicans seem no closer AND said, will give Republicans more areas where they can look for victory.
Security K
2. Cyber threats are real – they facilitate dangerous armed social movements
Deibert and Rohozinski 2010 (Ronald J, professor of Political Science and Director of the Canada Centre for AND International Political Sociology, vol. 4, p. 22, BS)
Even among democratic states, the explosion of civic networks has presented serious challenges, AND a 14-year-old living in a refugee camp in Lebanon.
4. Cyber operates in a realist framework
Dawson ’13 ~Ashley Dawson, M.A. Candidate in Policy Sci @ University of British Columbia. "Addressing Cyber Warfare: Bolstering Deterrence through developing norms." Master’s Thesis. Etb~
RDT is centered around two central strategies with the goal of dissuading an ¶ adversary AND a stronger ¶ adversary can thus be expected to make war more likely.
5. IR theory proves cyberwar is probable- multiple mechanisms
Junio ’13 ~Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB~
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking. What is Cyber War? (Again. . .)
7. Their engagement in solely theory of cyberwar will never create change – only the permutation can resolve that.
Eriksson and Giacomello ’6 ~Johan Eriksson and Giampiero Giacomello. International Political Science Review 27.3 (Jul., 2006), pp. 221-244. "The Information Revolution, Security, and International Relations: (IR) Relevant Theory?" ETB~
The foregoing analysis has shown that there are two interrelated problems in ¶ past efforts AND on middle-range theory and on ¶ conditional rather than universal generalizations.
8. Cyber threats are real – cyberspace is organized transnationally, not governed centrally, constantly changes, and is difficult to regulate
Deibert and Rohozinski 2010 (Ronald J, professor of Political Science and Director of the Canada Centre for AND Sociology, vol. 4, p. 15-16, BS)
Globalization is generating new security challenges. Modern societies confront a myriad of risks that AND , can only limit, but not entirely contain the ?ow of ideas.
10. Cyberwar is probable- multiple IR theories prove
Junio ’13 ~Timothy J. Junio (Tim)is a doctoral candidate of political science at the¶ University of Pennsylvania and a predoctoral fellow at the Center for¶ International Security and Cooperation (CISAC) at Stanford University.¶ He also develops new cyber capabilities at the Defense Advanced¶ Research Projects Agency (DARPA). How Probable is Cyber War? Bringing¶ IR Theory Back In to the Cyber Conflict Debate, Journal of Strategic Studies, 36:1,¶ 125-133. ETB~
Two recent articles in the pages of this journal contribute to an¶ important debate AND the wrong targets or miscalculate the potential costs¶ and gains of attacking.
11. The alt results in more securitization and intervention
Tara McCormack, 2010, is Lecturer in International Politics at the University of Leicester and has a PhD in International Relations from the University of Westminster. 2010, (Critique, Security and Power: The political limits to emancipatory approaches, page 127-129)
The following section will briefly raise some questions about the rejection of the old security AND the political limits of the framework proposed by critical and emancipatory theoretical approaches.
12. Lack of empirical ground isn’t sufficient reason to reject the aff- the 1ac contributes to a better understanding of cyber war even without data
Liff ’12 ~Adam P. Liff, Doctoral Candidate, Department of Politics,¶ Princeton University, USA. "Cyberwar: A New ’Absolute Weapon’? The¶ Proliferation of Cyberwarfare Capabilities and Interstate War," Journal of Strategic¶ Studies, 35:3, 401-428. ETB~
Theorizing about a kind of warfare that has not occurred necessitates¶ a major caveat AND real¶ world that can indisputably be cited as an occurrence of cyberwarfare.
1AR
OLC CP
Doesn’t solve legal clarity OR president ignores
Posner 11 Eric Posner is the Kirkland 26 Ellis Professor, University of Chicago Law School. "DEFERENCE TO THE EXECUTIVE IN THE UNITED STATES AFTER 9/11 CONGRESS, THE COURTS AND THE OFFICE OF LEGAL COUNSEL" available at http://www.law.uchicago.edu/academics/publiclaw/index.html.
C. Evidence ¶ 1. Testing the Three Hypotheses ¶ We have three hypotheses AND problem is that foreign relations are not susceptible to regulation by rules. 32
Howell and Pevehouse 7 William Howell and Jon Pevehouse, Associate Professors at the Harris School of Public Policy at the University of Chicago, 2007, When Congress Stops Wars, Foreign Affairs, EBSCO
After all, when presidents anticipate congressional resistance they will not be able to overcome AND Pace, so as to avoid a clash with Congress over his reappointment.
These concerns can be largely addressed by legislation or pre-emptive action by the AND . Treasurys with the halo of being safe relative to other sovereign debt.
Democrats have use doomsday rhetoric about a looming government shutdown and comparing the U. AND ," and raising the debt limit will become an imperative, he suggested.
Congress is debating a debt ceiling agreement, and they are playing with the public’s AND pick up our buckets and scoop out the waste that’s sinking the ship.
Political historian Thomas Whalen believes another credit downgrade need not happen this time. " AND It won’t be long enough to have all these long-term impacts."
Of course the Obama administration is already warning of Armageddon if Congress doesn’t raise the AND country. Our economy will not long survive government spending at those levels.
Now the president is recycling the same lie. Congress would be fools to believe AND of the U.S. government and avoid defaulting on debts due.
Restrictions inevitable—-the aff prevents haphazard ones which are worse
Benjamin Wittes 9, senior fellow and research director in public law at the Brookings Institution, is the author of Law and the Long War: The Future of Justice in the Age of Terror and is also a member of the Hoover Institution’s Task Force on National Security and Law, "Legislating the War on Terror: An Agenda for Reform", November 3, Book, p. 17 A new administration now confronts the same hard problems that plagued its ideologically opposite predecessor AND sparred these past several years and will likely continue sparring over the next several
Congress constrains bolster the credibility of threats – solves escalation
Waxman 8/25/13 (Matthew Waxman is a law professor at Columbia AND YALE LAW JOURNAL, vol. 123, 2014, August 25th DRAFT)
Part II draws on several strands of political science literature to illuminate the relationship between AND supposed, at least in terms of how formal congressional checks are exercised. Part II also shows, however, that congressional checks and influence – even if AND constraints can actually bolster the credibility of U.S. threats. 22