General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Emory
▼:
Document Index
»
Page: Morrow-Karthikeyan Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
Districts | 3 | Kentucky GV | Logan |
| ||||
Fullerton | 2 | Georgetown Burdette-Louvis | Watson |
| ||||
Fullerton | 5 | Texas Fitz-Makuch | Kennedy |
| ||||
GSU | 1 | Georgetown BL | Grellinger |
| ||||
Gsu | 6 | Houston Lanning-Bockmon | Quigley |
| ||||
Gsu | 3 | Georgia Davis-Galerstein | Davis |
| ||||
Gsu | 8 | Iowa Hancock-Kann | Gannon |
| ||||
Harvard | 2 | Towson HW | Kennedy, Sean |
| ||||
Harvard | 3 | Georgetown AM | Foley, Jordan |
| ||||
Harvard | 8 | Gonzaga SH | Tandet, Gabby |
| ||||
Harvard | 6 | Stanford GR | Kallmeyer, Kevin |
| ||||
Kentucky | 2 | Texas Chowdhury-Malone | Murray |
| ||||
Kentucky | 3 | Northwestern OBrien-Shakoor | Stevenson |
| ||||
Kentucky | 3 | Northwestern OBrien-Shakoor | Stevenson |
| ||||
Kentucky | 5 | Wayne State Leap-Messina | McBride |
| ||||
Kentucky | 7 | Liberty Chiri-Edwards | Russell |
| ||||
Texas | 9 | All | All |
| ||||
UGA | 9 | All | All |
| ||||
Usc | 3 | Liberty Chiri-Edwards | Davis |
| ||||
Usc | 6 | Louisville Barnett-Lattimore | Stevenson |
| ||||
Usc | 6 | Louisville Barnett-Lattimore | Stevenson |
|
Tournament | Round | Report |
---|---|---|
Districts | 3 | Opponent: Kentucky GV | Judge: Logan 1NC |
Fullerton | 2 | Opponent: Georgetown Burdette-Louvis | Judge: Watson 1NC Legalism Critique Iran Sanctions Politics DA Warfighting DA T-Restrictions Cyber-deterrence DA |
Fullerton | 5 | Opponent: Texas Fitz-Makuch | Judge: Kennedy 1AC |
GSU | 1 | Opponent: Georgetown BL | Judge: Grellinger aff |
Gsu | 3 | Opponent: Georgia Davis-Galerstein | Judge: Davis 1NC - XO CP Prez Powers DA politics Security T |
Gsu | 8 | Opponent: Iowa Hancock-Kann | Judge: Gannon 1NC |
Harvard | 2 | Opponent: Towson HW | Judge: Kennedy, Sean Victimization Critique |
Harvard | 3 | Opponent: Georgetown AM | Judge: Foley, Jordan 1NC |
Harvard | 8 | Opponent: Gonzaga SH | Judge: Tandet, Gabby 1NC - Chinese internal politics DA Security K Cyber Deterrence CP 2AC Straight impact turned CCP instability |
Harvard | 6 | Opponent: Stanford GR | Judge: Kallmeyer, Kevin 1NC |
Kentucky | 2 | Opponent: Texas Chowdhury-Malone | Judge: Murray 1NC 2NR |
Kentucky | 3 | Opponent: Northwestern OBrien-Shakoor | Judge: Stevenson 2NR - Security K 1NC T K CP PTX NoKo Deterence |
Kentucky | 3 | Opponent: Northwestern OBrien-Shakoor | Judge: Stevenson 2NR - Security K 1NC T K CP PTX NoKo Deterence |
Kentucky | 5 | Opponent: Wayne State Leap-Messina | Judge: McBride 1NC Colonialism K 2NR Framework |
Kentucky | 7 | Opponent: Liberty Chiri-Edwards | Judge: Russell Intersection |
Usc | 3 | Opponent: Liberty Chiri-Edwards | Judge: Davis 1NC - 2NR = Nommo Critique |
Usc | 6 | Opponent: Louisville Barnett-Lattimore | Judge: Stevenson 1NC 2NR |
Usc | 6 | Opponent: Louisville Barnett-Lattimore | Judge: Stevenson 1NC 2NR |
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1AC Cyber BureaucracyTournament: Fullerton | Round: 5 | Opponent: Texas Fitz-Makuch | Judge: Kennedy U.S. intelligence services carried out 231 offensive cyber-operations in 2011 The very moment United States President Barack Obama authorized the “dropping” of an The unregulated nature of the cyber arms trade not only leaves open the possibility of Lack of civilian bereucratic control proliferation and nuclear war are inevitable. The United States is racing for the technological frontier in military and intelligence uses of US cyber attacks inevitably escalate to kinetic war Cyberspace matters. We know this because governments and militaries around the world are scrambling Offensive dominance creates a great risk of cyber arms races. State and non- Independently – Cyber attacks breaks down command and control – causes nuclear response. The bureaucratic decision to react without information is a result of situating offensive cyber ops with the president This section discusses how cyberwar might adversely affect nuclear crisis management. Readers are advised If an adversary conducts a cyberattack against the United States, a first question for III. ALEGISLATIVE HAND ON THE CYBER WAR MOUSE Cyber warfare, as that term Perhaps more important than being out of the cyber coordination loop, is the how Conclusion¶ The sequence of events leading up to the sudden reversal of administration policy 1AC Working between nuclear history and recent developments, and between philosophical critique and strategic debate My suggestion for the future of the discipline is that, fi rst, we In various recent interviews and papers, Mearsheimer and other neorealists have gone even further Reform the War Powers Resolution¶ The War Powers Resolution has failed. Every president The second response is commonly referred to as `TINA', (There Is No | 1/8/14 |
1AC Kiyemba AffTournament: Harvard | Round: 6 | Opponent: Stanford GR | Judge: Kallmeyer, Kevin In 2007, Ninth Circuit Judge A. Wallace Tashima observed that … to come unaccompanied by a meaningful remedy. Today, many individuals throughout the world … recommendations about how these rules could be implemented in a DTC model. Court rulings are the vital internal link to legitimacy – that solves global conflict – classical power dynamics mis-represent IR. The Administration’s detainee policy made clear that—… the courts to reduce the "deference gap" between foreign and domestic cases. More sophisticated treatments of the reputation logic have … provide valuable information when the costs of signaling are low. For all their bitter differences, President Obama and Governor Romney … that no one over the next two decades is willing or capable of filling. Material power is irrelevant – only legitimacy can solve great power wars. Legitimacy is, by its nature, a social and … system to run and few unipoles have tried to do so. The United States government’s National Intelligence … its aims without the help of others. 1AC Advantage Concern about the future of democracy is … in countries like Thailand and Nepal. A STRONG, INDEPENDENT JUDICIARY IS ESSENTIAL TO THE … that many in emerging democracies around the globe seek to ensure for their peoples. Rule of law and detention policy is key to malay political stability Political detention under Malaysia's Internal Security Act … Malaysiakini columnist Hishamuddin Rais; and, Free Anwar Campaign director Raja Petra Raja Kamaruddin. Malaysia will determine the future of the “arc of instability.” It will make or break the region’s democratic transition Malaysia has a population of 29 million, 55 percent of which are … forward manageable reforms at a time of greater political awareness. China and other great powers will get drawn in. Sealanes of communication are at risk Can I say that I believe that emphatically not to be the case? … than by legitimate governments." Crisis risks wars with the US, Japan and India. China’s paranoia about the SLOCs will overwhelm cooperation This central fact has become a near-obsession for the … may be akin to convincing Roosevelt that America did not need a blue-water navy. While nuclear weapons exist, there remains a danger that they will be used. … in ensuring their survival and that of the world, they should be working to encourage these policies. Since 1945, the decline of major great power war has deepened …, as conditions are never quite the same, they may vary less than seemed likely only a short while ago. The precedent of this Court has a significant impact … promote respect for rule of law in foreign states during times of conflict. 1AC Solvency V. AN ALTERNATIVE APPROACH: THE FUNCTIONAL RELEASE THESIS … and delivered into United States jurisdiction.229 The United States federal judiciary should restrict the President’s war powers authority by mandating that a victory in habeas corpus petitions in the third Kiyemba v. Obama case necessitates “release-plus” status. | 11/1/13 |
1AC Offensive Cyber OperationsTournament: GSU | Round: 1 | Opponent: Georgetown BL | Judge: Grellinger 1ACPreemptionContention _ is preemption ====Cyber Space is militarized – the US executive branch is engaged in a clandestine war against every other state==== U.S. intelligence services carried out 231 offensive cyber-operations in 2011 This pre-emption is a direct result of congressional abdication of war powers – Stuxnet opened the floodgate, and PPD 20 prooves that the Presidents capabilities are being expanded without restraint.Walker 8/2/13 (Richard, Pen Name for New York News Producer, American free Press, "OBAMA EXPANDS WAR POWERS; CAN UNLEASH CYBERWAR ANY TIME http://americanfreepress.net/?p=11966~~23sthash.GqeI03l8.dpuf) The very moment United States President Barack Obama authorized the "dropping" of an Our pre-emption policy has created a cyber cold-warBenavides 7/30/13 (Stephen Benavides is a policy analyst and union organizer from Dallas. He holds a bachelor’s degree in political science from the University of North Texas and has done graduate research in econometrics and economic theory. , "The Coming Cyber-Cold War: US Pioneering Online Attacks", http://truth-out.org/news/item/17714-the-coming-cyber-cold-war) The US government is openly and actively engaged in a reincarnation of the Cold War Un-regulated offensive postures uniquely are bad – Complexity and inter-connected infrastructures means any pre-emption is BOUND to escalateBenavides 7/30/13 (Stephen Benavides is a policy analyst and union organizer from Dallas. He holds a bachelor’s degree in political science from the University of North Texas and has done graduate research in econometrics and economic theory. , "The Coming Cyber-Cold War: US Pioneering Online Attacks", http://truth-out.org/news/item/17714-the-coming-cyber-cold-war) The unregulated nature of the cyber arms trade not only leaves open the possibility of Lack of civilian bereucratic control arms racing and nuclear war are inevitable.Austin 8/6/13 (Director of Policy Innovation at the EastWest Institute, "Costs of American Cyber Superiority"http://www.chinausfocus.com/peace-security/costs-of-american-cyber-superiority/) The United States is racing for the technological frontier in military and intelligence uses of US cyber attacks inevitably escalate to kinetic warMoss 4/19/13 (Trefor, covers Asian politics, defence and security, and was Asia-Pacific Editor at Jane’s Defence Weekly until 2009 The Diplomat- - "Is Cyber War the New Cold War?", http://thediplomat.com/2013/04/19/is-cyber-war-the-new-cold-war/3/) Cyberspace matters. We know this because governments and militaries around the world are scrambling Kinetic attacks causes nuclear warRoth 07 professor in IR at Goucher College 7 ~Ariel Ilan Roth, "Nuclear Weapons in Neo-Realist Theory", REFLECTION, EVALUATION, INTEGRATION, International Studies Review, pg 369-384~ Critical, though not explicit, in Waltz is the belief that a war between Independently – Cyber attacks breaks down command and control – causes nuclear response. The bureaucratic decision to react without information is a result of situating offensive cyber ops in the hands of the presidentCimbala 11(Stephen J. Cimbala 2011. Professor of Political Science at Penn State. "Nuclear Crisis Management and "Cyberwar" Phishing for Trouble?" Strategic Studies Quarterly Spring 2011) This section discusses how cyberwar might adversely affect nuclear crisis management. Readers are advised CERTAIN CONGRESSIONAL STATUTE is necessary – preemption is inevitable without congressional checks. Decreasing BUREAUCRATIC INERTIA in response to a cyber attack is the only way to avoid conflict.Dycus 10 (Professor Vermont Law School, "Congress’s Role in Cyber Warfare", 8/11/2010, http://jnslp.com/wp-content/uploads/2010/08/11_Dycus.pdf) III. ALEGISLATIVE HAND ON THE CYBER WAR MOUSE Cyber warfare, as that term optionalThis is particularly true of bureaucratic decision makers and cyber war – they resort to knee-jerk reactions that escalate because of "do something" mentalityOwens et al. 09 (WILLIAM A. OWENS, AEA Holdings, Inc If an adversary conducts a cyberattack against the United States, a first question for LOACContention _ is the Law of Armed ConflictSquo OCO policy violates the Law of Armed conflict – Lack of congressional checks make Jus in Bellum impossible to establishDycus 10 (Professor Stephen Dycus is an internationally recognized authority on national security law and environmental law. The courses he has taught at Vermont Law School include Public International Law, National Security Law, Estates, Property, and Water Law. He was founding chair of the National Security Law Section of the Association of American Law Schools. He is the lead author of "National Security Law" (the field’s leading casebook) and "Counterterrorism Law", and he was founding co-editor in chief of the Journal of National Security Law 26 Policy. (Stephen, "Congress’ Role in Cyber Warfare," National Security Journal, Volume 4, Issue 155, 2010 http://jnslp.com/wp-content/uploads/2010/08/11_Dycus.pdf) The term "cybersecurity" might be understood to refer to defense against cyber attacks They uniquely makes modeling by china impossibleSanger 9/1/13 (David, A 1982 graduate of Harvard College, Sanger has been writing for the Times for 30 years covering foreign policy, globalization, nuclear proliferation, and the presidency., He has been a member of two teams that won the Pulitzer Prize, and has been awarded numerous honors for national security and foreign policy coverage. "Documents detail U.S. cyber-espionage plans", http://www.thehindu.com/news/international/documents-detail-us-cyberespionage-plans/article5083012.ece) 231 operations planned for 2011 – both small scale and large scale Newly disclosed budget Ambiguity in definitions for attack policies means we cant adhere to UN charterAdkisson et al. 12 Carnagie Mellon University (CDR James Adkisson, Mr. Tokunbo Davies, LT Brian Evans,¶ Mr. Rick Lanchantin, Ms. Patty Walters, "Law of Armed Conflict:¶ Implications for Navy Cyber Strategy¶ Masters of Information Technology Strategy¶ Practicum – 2012", http://www.cmu.edu/mits/files/random/mits-cohort1-practicumfinal-lawarmedconflict-implications-aug-2012.pdf) The uncertain definition of the ’use of force’ is increasingly problematic when analyzing cyber Impacts – ChinaA) China doesn’t have a model for LOAC in cyberspace – that escalates ANY SKIRMISH.VornDick 6/30/13 (Wilson VornDick is a lieutenant commander in the U.S. Navy, where he is assigned to the Pentagon. Previously, he worked at the Chinese Maritime Studies Institute at the U.S. Naval War College. , "The Real U.S.-Chinese Cyber Problem", http://nationalinterest.org/commentary/the-real-us-chinese-cyber-problem-8796?page=2) Recent waves of cyber attacks emanated from China despite their vehement denial that they possess China percieves US policy – lack of CLARITY makes Chinese invasion of Taiwan inevitable.Austin 26 Gady 12 (Greg Austin – phD in International Relations, Vice President for the Worldwide Security Initiative, including a leadership role in the institute’s work on cybersecurity, is now a Professorial Fellow. Greg has a 30-year career in international affairs, including senior posts in academia and government., Franz Stefan Gady — M.A. in Strategic Studies/International Economics from the School of Advanced International Studies, Johns Hopkins University., "CYBER DETENTE BETWEEN THE U.S. AND CHINA: Shaping the Agenda, http://www.ewi.info/system/files/detente.pdf) In sum, China is probably engaged in cyber warfare planning for operations against the ExtinctionGompert 26 Saunders 11 (David C. Gompert, bachelor’s degree in engineering from the U.S. Naval Academy, where he once served on the faculty, and a master of public affairs degree from Princeton University’s Woodrow Wilson School of Public and International Affairs. Office of the Director of National Intelligence, Gompert most recently worked as a senior fellow at the RAND Corp, and Phillip C. Saunders, phD in IR from Princeton, Distinguished Research Fellow Director of Studies, Center for Strategic Research Director, Center for Study of Chinese Military Affairs, "The Paradox of Power Sino-American Strategic Restraint in an Age of Vulnerability", http://www.ndu.edu/inss/docuploaded/Paradox20of20Power.pdf) Cyber war capabilities can contribute to crisis instability. Cyber attacks have little or no LOAC WarsB) Human survival hangs in the balance. Absent LOAC wars are more likely to break out and make extinctions.Weston 91 – Chair of the International and Comparative Law Program @ The University of Iowa ~Weston, Burns H., "Logic and Utility of a Lawful United States Foreign Policy," Transnational Law 26 Contemporary Problems, Vol. 1, Issue 1 (Spring 1991), pp. 1-14 George Will and others like him are right, of course, that the rhetoric We solve – Eyes are on the US – our adherence to LOAC is modeled globally. OCO ambiguity is the biggest internal linkBradbury 11 (Steven Assistant Attorney General for the Office of Legal Counsel, The Developing Legal Framework for Defensive and Offensive Cyber Operations, http://harvardnsj.org/wp-content/uploads/2011/02/Vol.-2_Bradbury_Final1.pdf) Evolving customary law. This approach also accommodates the reality that how the U. Congressional restrictions on OCOs send a global signal of cyber leadership that solves reckless use of OCOsBastby 12 (Judy, Chairwoman of the American Bar Association’s Privacy and Computer Crime Committee, CEO of Global Cyber Risk, "U.S. Administration’s Reckless Cyber Policy Puts Nation at Risk" June 4, 2012, http://www.forbes.com/sites/jodywestby/2012/06/04/u-s-administrations-reckless-cyber-policy-puts-nation-at-risk/2/) Perhaps more important than being out of the cyber coordination loop, is the how Action now is key – failure will result in a rapidly created worse legal system that non uniques all their offenseSCHAAP 09 Major – Air Force, the Directorate of Legal Services, Headquarters Air Command, RAF High Wycombe, United Kingdom. JD Cal Western, LLM George Washington, Former Deputy Staff Judge Advocate, Lackland ~Major Aire J. Schaap, CYBERLAW EDITION: CYBER WARFARE OPERATIONS: DEVELOPMENT AND USE UNDER INTERNATIONAL LAW, Air Force Law Review, 64 A.F. L. Rev. 121~ IX. CONCLUSION 1AC PlanThe United States federal government should require consultation in every possible circumstance prior to the use of offensive cyber operations by President of the United States and require a prompt and full account of every significant use of cyber weapons by the President of the United States. | 11/1/13 |
1AC UnipolarityTournament: Usc | Round: 6 | Opponent: Louisville Barnett-Lattimore | Judge: Stevenson The United States federal government should require the President of the United States consult Congress prior to the use of offensive cyber operations or provide a prompt full account of the use of offensive cyber operations by the United States. Advantage 1 – Unipolarity The US government is openly and actively engaged in a reincarnation of the Cold War Global counterbalancing in cyber space is inevitable absent a shift in US policy – the result is a collapse of military primacy The Internet has experienced developments similar to those of the armored tank and helicopter— Evolving customary law. This approach also accommodates the reality that how the U. Perhaps more important than being out of the cyber coordination loop, is the how Decline of great powers and assent of challengers produces massive violence Andrew Mack and his colleagues at the Human Security Report Project are to be congratulated Qualitative research methods are important modes of inquiry, regardless of ¶ discipline. Because Another danger is that declinism may impair foreign policy decision-?making. If top Not so long ago, a high-ranking Chinese official, who obviously had In two related articles, extreme leftists Micah Zenko and Michael Cohen have falsely claimed Contention 2 – Impact Framing The fundamental question of debate is the role of America – should it exist and if so how? We answer yes to both – America must exist and with that it must be celebrated – only US hegemony starves off international violence TWENTY YEARS later, it is time once again to challenge an indifferent America and C ONCLUDING R EMARKS The legal academy has, of late, been swept up Life is always good and even if its not you should stay alive because there is still value Preventing death is the first ethical priority – it’s the only impact you can’t recover from. Comparative evidence – extinction is worse than everything Potentially worse than that, bio-engineered agents by the hundreds with no known | 1/4/14 |
1AC UnipolarityTournament: Usc | Round: 6 | Opponent: Louisville Barnett-Lattimore | Judge: Stevenson The United States federal government should require the President of the United States consult Congress prior to the use of offensive cyber operations or provide a prompt full account of the use of offensive cyber operations by the United States. Advantage 1 – Unipolarity The US government is openly and actively engaged in a reincarnation of the Cold War Global counterbalancing in cyber space is inevitable absent a shift in US policy – the result is a collapse of military primacy The Internet has experienced developments similar to those of the armored tank and helicopter— Evolving customary law. This approach also accommodates the reality that how the U. Perhaps more important than being out of the cyber coordination loop, is the how Decline of great powers and assent of challengers produces massive violence Andrew Mack and his colleagues at the Human Security Report Project are to be congratulated Qualitative research methods are important modes of inquiry, regardless of ¶ discipline. Because Another danger is that declinism may impair foreign policy decision-?making. If top Not so long ago, a high-ranking Chinese official, who obviously had In two related articles, extreme leftists Micah Zenko and Michael Cohen have falsely claimed Contention 2 – Impact Framing The fundamental question of debate is the role of America – should it exist and if so how? We answer yes to both – America must exist and with that it must be celebrated – only US hegemony starves off international violence TWENTY YEARS later, it is time once again to challenge an indifferent America and C ONCLUDING R EMARKS The legal academy has, of late, been swept up Life is always good and even if its not you should stay alive because there is still value Preventing death is the first ethical priority – it’s the only impact you can’t recover from. Comparative evidence – extinction is worse than everything Potentially worse than that, bio-engineered agents by the hundreds with no known | 1/4/14 |
1AC War on Terror AffTournament: Harvard | Round: 2 | Opponent: Towson HW | Judge: Kennedy, Sean From Bush to Obama, the war on terror is principally a war over conscience. … The situation persists not as an aberration from the norms of political liberalism, but because of them. When we lose our conscience and allow the president messianic authority, we give up everything to the state and it’s avatar, the president. The messianic presidency, as a form of sovereign power, … is greater than the superpower itself. Conscience is at the root of our current imperialism. Abu Grhaib, Guantanomo, drones and torture are subsets of a broader thought process that authorizes endless violence. Just before midnight on November 4th, 2003, Sabrina … , affirming their foundation in the truth of what it means to be human. The INSTITUTIONAL MOOD of the government authorizes and justifies racist violence by citizens—racism BECOMES socially appropriate in the context of the war on terror There is also little room in Young’s analysis for the … we walk the same streets, and now we are ‘them.’”(Raza, 2007). These are not individual instances of violence, they are NORMALIZED and CODIFIED auto-immune responses. There is a danger that hate violence against Arabs, … have been normalized. Our willingness to cede power to the executive is a site of subjugation – The security regime – pre-labels anyone non-white as in need of demonstrating they are not a threat—the aff is key to rupture this presumption of guilt The security regime fosters what Iris Marion Young calls ‘… from one moment to the next. Contention Two is Democratic Communication The United States federal government should restrict the President’s authority to conduct the War on Terror. Too long have we ceded our agency to the state in order to allow it to ‘solve” the problem of terrorism for us is the response to terrorism in the context of ceding power to the security state that deprives us from democratic communication To extend Young’s analysis, our feeling of … democratic engagement. Citizenship is the spirit of human dignity, but the war on terror’s policies have birthed us into the citizenship of the gulag. No war can be held at arms length and the atrocities of the war on terror destroy democratic communication. Aristotle’s assertion that we are “born for citizenship” … understanding of democratic communication. Rather than singlehanded solving everything in one shot, elevation of conscience sets off an avalanche of conversation and questioning that activates our conscience. Only this process can engage both formal legal discourse and social movements—conscience is the one kernel of humanity that exists in every context, it is the lynchpin of solvency At the same time, the messianic presidency as …—to find our own voice in it. | 11/1/13 |
1AR Ableism Critique GSU Rd 6Tournament: Gsu | Round: 6 | Opponent: Houston Lanning-Bockmon | Judge: Quigley 1AR CritiqueOur understanding of war is CONTEXTUAL,Tarak BARKAWI Associate Professor of Politics at the New School for Social Research ’12 "Of Camps and Critiques: A Reply to ’Security, War, Violence’" Millennium 41 (1) p. 129-130 A final totalising move in ’Security, War, Violence’ is the idea that 1AR Personal OffenseNO discursive act can include everything; this doesn’t mean we reject or marginalize these concernsRorty, Professor of Comparative Literature @ Stanford, `02 (Richard, Peace Review, vol. 14, no. 2, p. 152-153) We should NOT reduce debate to JUST experience of the body. Fiat keyRoberts 2007 (Jeff Roberts, Bachelors in Communication Studies from Baylor, from his Master’s thesis – "The Rhetorical Structure of Disability: Bridging the Gap Between What is ’Spoken’ and What is ’Said’ with Song - Over-Signifying with Personhood Against the Backdrop of Disease-Centric Discourse", https://beardocs.baylor.edu/xmlui/bitstream/handle/2104/5086/Jeff_Roberts_Masters.pdf?sequence=1-https://beardocs.baylor.edu/xmlui/bitstream/handle/2104/5086/Jeff_Roberts_Masters.pdf?sequence=1**)** Although individual action which permutes the rejection of disease-centric discourse with a call TruthLack of objectivity is irrelevant —- we can still make accurate claims about the worldFerris 92 Timothy, Emeritus Prof @ Berkeley 26 Fellow at American Association for the Advancement of Science, The Mind’s Sky: Human Intelligence in a Cosmic Context the possibility of some flawed theory construction is better than epistemological anarchyBrown 11 ~Vernon, Cadiff University, 2/27/11, "The Reflectivist Critique of Positivist IR Theory," http://www.e-ir.info/?p=7328-http://www.e-ir.info/?p=7328 ~ There is a great deal of support for the positivist approach in IR despite the | 9/25/13 |
2AC Ableism Kritik GSU Rd 6Tournament: Gsu | Round: 6 | Opponent: Houston Lanning-Bockmon | Judge: Quigley 2AC CritiqueUniversalism is wrong and bad – ends up being MIRED in reductionism – perm solves best.Hughes 07 (Head of Division of Sociology Glasgow Caledonian University Bill Being disabled: towards a critical social ontology for disability studies Disability 26 Society 22.7 Taylor 26 Francis) In summary, the universalistic approach to ontology in disability studies that I have sketched That’s biological reductionism – turns their critiuqeHughes 09 (Head of Division of Sociology Glasgow Caledonian University Bill Wounded/monstrous/abject: a critique of the disabled body in the sociological imaginary Disability 26 Society 24.4) The position taken by Turner (2001) and Shakespeare and Watson (2002), We should treat war differently than structural violence. The tradeoff only goes in the other direction – we lose what is distinctive about organized violence.Tarak BARKAWI Associate Professor of Politics at the New School for Social Research ’12 "Of Camps and Critiques: A Reply to ’Security, War, Violence’" Millennium 41 (1) p. 129-130 A final totalising move in ’Security, War, Violence’ is the idea that Speifically – appeals to personal experience replace analysis of group oppression with personal testimony. As a result, politics becomes a policing operation—those not in an identity group are denied intellectual access and those within the group who don’t conform to the aff’s terms are excluded. Over time, this strategy LIMITS politics to ONLY the personal. This devastates structural change, and turns the case—it demands that political performance assimilate to very limited norms of experienceJoan SCOTT Harold F. Linder Professor at the School of Social Science in the Institute for Advanced Study in Princeton 92 ~"Multiculturalism and the Politics of Identity" October Summer p. 16-19~ The logic of individualism has structured the approach to multiculturalism in many ways. The 2. Personal experience isn’t bad for debate, but debate is bad for personal experience—it forces you, the judge, to render the value of a person’s intimate and many times traumatic experiences—this is epistemically violent and turns the caseJudith BUTLER is Maxine Elliot Professor in the Departments of Rhetoric and Comparative Literature at the University of California, Berkeley, 1 ~"Giving an Account of Oneself," Diacritics 31.4 (2001) 22-40, Project Muse~ But here, and for the time being, my concern is with a suspect 4. These case arguments are a net benefit to our framework—we must move beyond first-person agony stories to allow for rejoinderDaniel SUBOTNIK, Professor of Law, Touro College, Jacob D. Fuchsberg Law Center, 98 ~Spring, 1998, "WHAT’S WRONG WITH CRITICAL RACE THEORY?: REOPENING THE CASE FOR MIDDLE CLASS VALUES," Cornell Journal of Law and Public Policy, 7 Cornell J. L. 26 Pub. Pol’y 681, Lexis~ In the absence of scholarly work by white males in the area of race, 5. Pure critique is just fuel for academics—proposing tangible political alternatives is necessaryBryant 12—Levi, professor of philosophy at Collin College ~McKenzie Wark: How Do You Occupy an Abstraction? larvalsubjects.wordpress.com/2012/08/04/mckenzie-wark-how-do-you-occupy-an-abstraction/~23more-6320~ In the language of my machine-oriented ontology or onticology, we would say 6. The affirmative is a claim to performativity rather than true performance. Their claim to having identified a truly liberating, anti-racist speech act substitutes for true anti-racist action and conceals their own privilege as subjects within debate. In this instance, their speech act is only liberatory for them at the expense of true action to help people other than themselves.Sara AHMED, Reader in Race and Cultural Studies, Goldsmiths College, University of London, 4 ~"Declarations of Whiteness: The Non-Performativity of Anti-Racism," Volume 3 Number 2, 2004, http://www.borderlands.net.au/vol3no2_2004/ahmed_declarations.htm~~ 50. This might sound like an argument about the performativity of race. I When mobility is viewed as a universal characteristic individual problems become de-characterized and the focus degenerates to anesthetization and exclusion of bodies – that’s how status quo transportation planning functions – it is entrenched in a universal model of ablismImrie 2k (Department of Geography, Royal Holloway, University of London Rob Disability and discourses of mobility and movement Environment and Planning volume 32 http://www.environmentandplanning.com/epa/fulltext/a32/a331.pdf-http://www.environmentandplanning.com/epa/fulltext/a32/a331.pdf) Barnes et al (1999, page 121), for instance, note that UK | 9/25/13 |
2AC Case GSU Rd 6Tournament: Gsu | Round: 6 | Opponent: Houston Lanning-Bockmon | Judge: Quigley 2AC CaseStructural Tensions make conflict inevitableColby et al. 13 (Elbridge A. Colby, graduate of¶ Harvard College and Yale Law School and is a member of the Council on Foreign Relations (term)¶ and of the International Institute of Strategic Studies., Abraham M. Denmark, M.A. in international security from the Josef Korbel School of International Studies at the University¶ of Denver and has studied at China’s Foreign Affairs University and Peking University., John K. Warden, After receiving a B.A. in history and political science from Northwestern¶ University, he joined CSIS as a recipient of the William J. Taylor debate internship., James M. Acton, He holds a Ph.D. in theoretical physics from Cambridge University., Jay K. Brotz, M.S. in electrical and¶ computer engineering from Carnegie Mellon University., Michael S. Chase, M.A. in China studies from SAIS and a B.A. in politics from Brandeis University., AND more, "Nuclear Weapons and U.S.-China Relations: A way forward," http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf-http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf) Underlying Structural Tensions | 9/25/13 |
2AC Vagueness GSU Rd 6Tournament: Gsu | Round: 6 | Opponent: Houston Lanning-Bockmon | Judge: Quigley 2AC Vagueness2) Congress can do itKAISER 80 The Official Specialist in American National Government, Congressional Research Service, the Library of Congress ~Congressional Action to Overturn Agency Rules: Alternatives to the Legislative Veto; Kaiser, Frederick M., 32 Admin. L. Rev. 667 (1980)~ In addition to direct statutory overrides, there are a variety of statutory and nonstatutory
2) Courts could do itSinger 07 (Jana, Professor of Law, University of Maryland School of Law, SYMPOSIUM A HAMDAN QUARTET: FOUR ESSAYS ON ASPECTS OF HAMDAN V. RUMSFELD: HAMDAN AS AN ASSERTION OF JUDICIAL POWER, Maryland Law Review 2007 66 Md. L. Rev. 759) n25. See, e.g., Dep’t of the Navy v. Egan Decreasing authority requires reducing the permission to act, not the ability to act.Taylor, 1996 (Ellen, 21 Del. J. Corp. L. 870 (1996), Hein Online) The term authority is commonly thought of in the context of the law of agency | 9/25/13 |
2AC Word Pic GSU Rd 6Tournament: Gsu | Round: 6 | Opponent: Houston Lanning-Bockmon | Judge: Quigley 2AC Word PICA catch all security possibly makes action impossible and matters worse – we must combine cyber policy with the alternative strategically – conceptualizing security in terms of intention is a viable vision for changeNICHOLAS D. ANDERSON Georgetown University M.A., Security Studies, 2012, ""Re re defining" International Security", The Josef Korbel Journal of Advanced International Studies Summer 2012, Volume 4, PDF, http://www.du.edu/korbel/jais/journal/volume4/volume4_anderson.pdf-http://www.du.edu/korbel/jais/journal/volume4/volume4_anderson.pdf, KENTUCKY Securitizing cyber space is the ONLY way to prevent large scale cyber war – the alt can’t solve fast enough or change US doctrine – vulnerability creates a Unique need for itPickin 12 (Matthew, MA War Stuides – Kings College, "What is the securitization of cyberspace? Is it a problem?", http://www.academia.edu/3100313/What_is_the_securitization_of_cyberspace_Is_it_a_problem) In analysing the problems of securitization, major issues have been raised. Threat inflation, surveillance, militarisation and the military-industrial complex are only some of the most prominent issues. There are benefits of securitization however, and at the very end of this analysis it will be explained why securitization is necessary for now. The main supporting arguments for securitization include, the future of cyber-attacks in conflicts, protecting critical infrastructure and cyber-crime. 4. Exorcism DA – dirty words only serves as a mask for aggressive humiliation; it is not the words which wound, but how we make them meanZizek 1999 ~Slavoj, Senior Researcher at the Institute for Social Studies(Ljubljana), The Ticklish Subject, p.253-4~ Take politically correct probing into hate speech and sexual harassment: the trap into which 5. Theres structures now – plan solves structures ALL of our 1AC is about breaking down the existing order.Agency DA – People don’t just buy into government words Audiences are smart and reach their own conclusions. Any other interp kills agencyKraus ’89(et al – Sidney Kraus is a professor in the Department of Communication at Cleveland State University and Dennis Giles is also in the Department of Communication at Cleveland State University. Reviewed work(s): Edelman assumes (like the early Frankfurt School) that viewers/audi- tors AT: Zero PointThe "violence" of technical rationality is a fiction – and their alternative links anywayJarvis, 2000 (D.S.L., Lecturer in Government at the University of Sydney, International Relations and the Challenge of Postmodernism: Defending the Discipline, p. 111-113) Ashley’s commitment to transformational politics necessarily made his scholarship secondary to that goal. Many | 9/25/13 |
Filename | Date | Uploaded By | Delete |
---|---|---|---|
2/22/14 | kviveth@gmailcom | ||
1/7/14 | kviveth@gmailcom | ||
1/8/14 | kviveth@gmailcom | ||
11/1/13 | kviveth@gmailcom | ||
9/25/13 | johnholland00@gmailcom | ||
9/28/13 | kviveth@gmailcom | ||
9/28/13 | kviveth@gmailcom | ||
11/1/13 | kviveth@gmailcom | ||
11/1/13 | kviveth@gmailcom | ||
11/1/13 | kviveth@gmailcom | ||
11/1/13 | kviveth@gmailcom | ||
10/5/13 | kentuckymorrow@gmailcom | ||
10/5/13 | kentuckymorrow@gmailcom | ||
10/5/13 | kentuckymorrow@gmailcom | ||
10/6/13 | kentuckymorrow@gmailcom | ||
10/6/13 | kentuckymorrow@gmailcom | ||
2/13/14 | kviveth@gmailcom | ||
2/13/14 | kviveth@gmailcom | ||
1/3/14 | kviveth@gmailcom | ||
1/4/14 | kviveth@gmailcom | ||
1/4/14 | kviveth@gmailcom |
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming