General Actions:
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
Florida LMTournament: gsu | Round: 1 | Opponent: na | Judge: na 1AC Cyber OpsAdvantage 1: International LawCyber tensions between the US and China are escalating rapidly. The brink is now.Yi 13 ~Xiaoxiong Yi is the director of Marietta College’s China Program.~ June 22, 2013 "The coming of China-U.S. cyber war" http://www.mariettatimes.com/page/content.detail/id/552547.html Even innocent data collection can be misinterpreted as an attack, only a matter of timeWilliams 11 (Robert D. Williams, J.D. Harvard Law School… "(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action"… June 2011… The George Washington Law Review… LexisNexis… 8/1/13… RTV) ====Oversight solves escalation==== Cyber espionage would be misread as an attack – US or China would respond with nukesClarke 13(Richard Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001…. "The perils of linking cyberwar to nuclear war"… 6/16/2013 … The Washington Post… LexisNexis Academic… 8/13/13… RTV) ====Title 50 framework clarifies Cyber ops and forces compliance with the LOAC==== LOAC doesn’t cover cyber ops in the squoKodar 12 (Erki Kodar is a professor of law at the University of Tartu, and also the Director of the Legal Department of the Estonian Ministry… "APPLYING THE LAW OF ARMEDCONFLICT TO CYBER ATTACKS:FROM THE MARTENS CLAUSE TOADDITIONAL PROTOCOL I"… http://www.ksk.edu.ee/wp-content/uploads/2012/12/KVUOA_Toimetised_15_5_Kodar.pdf ... 9/1/13… RTV) Applying LOAC norms to cyber attacks is only possible in the event of anarmed conflict LOAC has worked, and is key to stop collapse of societyIOLD 12 Validity. Although critics of the regulation of warfare cite examples of violations of evolving The development of international law is based on modeling – comes before treaties and conventionsBrown and Poellet 12 (Colonel Gary Brown, JD Senior Legal Counsel for U.S. Cyber Command, Fort Meade, Maryland and Keira Pollet, JD and LLM Judge Advocate General and former Operations Law Attorney at US CYBERCOM, Strategic Studies Quarterly, Fall 2012, The Customary International Law of Cyberspace, Accessed 8/30/13) (www.au.af.mil/au/ssq/2012/fall/brown-poellet.pdf?) /ejc\ The US has the authority to establish precedent as a member of the U.N. Security CouncilMelnitzky 12 (Alexander B. Melnitzky, Associate at The Serbagi Law Firm, P.C. Former Associate Editor of Cardozo Journal of International and Comparative Law. He earned his J.D. from Benjamin N. Cardozo School of Law at Yeshiva University and a B.A. in History from NYU.) /ejc\ (https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay26crawlid=126doctype=cite26docid=20+Cardozo+J.+Int27l+26+Comp.+L.+53726srctype=smi26srcid=3B1526key=e30e49aa22650c3c135d44854f) De-militarizing cyber ops key to soft powerBelk and Noyes ’12 Over the past decade, hard power has dominated U.S. foreign policy Soft power prevents extinction, disease, climate change, terrorism and great power warJoseph Nye 8 is professor of international relations at Harvard University, "American Power After the Financial Crises," http://www.foresightproject.net/publications/articles/article.asp?p=3533, Date Accessed: 9-15-13 Revised by JM Most comprehensive study of over 11,000 years proves warming is real and anthropogenicRomm 13 (Romm, Ph.D. from MIT, served as Acting Assistant Secretary of the U.S. Department of Energy. He is now a Senior Fellow with the Center for American Progress Joe. Bombshell: Recent Warming Is ’Amazing And Atypical’ And Poised To Destroy Stable Climate That Enabled Civilizationhttp://thinkprogress.org/climate/2013/03/08/1691411/bombshell-recent-warming-is-amazing-and-atypical-and-poised-to-destroy-stable-climate-that-made-civilization-possible/?mobile=nc kjl) Even if we save 1, it’s infinitely better than extinctionMatheny 7 (Jason, Ph.D. Candidate in the Department of Health Policy and Management at the Bloomberg School of Public Health at Johns Hopkins University, Reducing the Risk of Human Extinction, Risk Analysis, Volume 27, Number 5, Available Online at http://www.upmc-biosecurity.org/website/resources/publications/2007_orig-articles/2007-10-15-reducingrisk.html) Advantage 2: Turf WarInteragency turf wars have blocked reorganization of cyber policiesBiggs 12 Despite the ongoing concern about the escalating pace of cyber attacks, a new set Interagency convergence disrupts the decision making process and kills response time to cyber attacksChesney 2012. "Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate" (Charles I. Francis Professor in Law, University of Texas School of Law) http://jnslp.com/wp- content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf The first way in which cyberspace is especially prone to convergence has to do with Non-state actors are targeting the US now – these attacks risk nuclear meltdowns and stock market crashesSharp 2010. "National Leadership, Individual Responsibility: The Past, Present, and Future of Cybersecurity" (Walter Gary Sharp Sr. Senior Associate Deputy General Counsel for Intelligence, Office of the General Counsel, U.S. Department of Defense; Adjunct Professor of Law, Georgetown University Law Center) 4 J. Nat’l Security L. 26 Pol’y 13. AMon The cyber threat to U.S. national security, economic security, and Cyber attack shuts down the grid – Syria makes timeframe KEYDykes and Melton 13 DoD bases are vulnerable to grid disruptionsRobitaille 12 Grid failure shuts down US military operationsPaul Stockton 11, assistant secretary of defense for Homeland Defense and Americas’ Security Affairs, "Ten Years After 9/11: Challenges for the Decade to Come", http://www.hsaj.org/?fullarticle=7.2.11 Global WarFrederick Kagan and Michael O’Hanlon 7, Fred’s a resident scholar at AEI, Michael is a senior fellow in foreign policy at Brookings, "The Case for Larger Ground Forces", April, http://www.aei.org/files/2007/04/24/20070424_Kagan20070424.pdf Response time is key – a cyber attack could shut down the US economyAAP 13 AAP (Australian Associated Press) 06/12/13, Cyber wars would cripple economies: experts, http://www.businessspectator.com.au/news/2013/6/12/global-news/cyber-wars-would-cripple-economies-experts, (08/13/13)~23HBK Cyber attackers have the power to shut down economies and a global cyber war could Even the possibility of cyber-attack has the potential to shake business confidence and destroy the economyCornish 11 Paul Cornish(Professor of Strategic Studies at the University of Exeter. He was educated at the London School of Economics (MSc Econ, International Relations). He completed his PhD at the University of Cambridge, Lecturer in Defence Studies at the UK Defence Academy (King’s College London) and then Lecturer in International Security at the University of Cambridge, Cornish also spent several years as Director of the Centre for Defence Studies at King’s College London.) June 2011, The Velnerabilities of Developed States to Economic Cyber Warfare, http://www.chathamhouse.org/sites/default/files/0611wp_cornish.pdf, (p. 12) (08/13/13)~23HBK In a world of interconnected and interdependent economies we could expect an element of self US economic decline triggers global decline, that escalates to conflictTilford 2008 – PhD in history from George Washington University, served for 32 years as a military officer and analyst with the Air Force and Army (Earl, "Critical mass: economic leadership or dictatorship", Cedartown Standard, lexis) Could it happen again? Bourgeois democracy requires a vibrant capitalist system. Without it Diversionary theory supports thisRoyal 10 US decline destroys global consumer confidence- destroying the Japanese economyRoubini 2008 (Nouriel, chairman of RGE Monitor and professor of economics at New York University’s Stern School of Business, The Coming Financial Pandemic, Foreign Policy, March/April, http://www.viet-studies.info/kinhte/coming_financial_pandemic.htm) Consumer confidence outside the United States—especially in Europe and Japan—was never Collapse of the Japanese economy causes nuclear war with ChinaThe Guardian ’02 (2-11, Lexis) Even so, the west cannot afford to be complacent about what is happening in PLAN:====United States Congress should enact legislation requiring offensive cyber operations be funded, conducted, and/or directed pursuant to Title 50 United States Code § 413b.==== SolvencyPrefer Covert Action Statute of Title 50, agencies are more careful with opsBrecher 12 "Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations" by Aaron P. Brecher (J.D. Candidate, May 2013, University of Michigan Law School), December 2012 – Michigan Law Review VED Clarifying cyber operations under covert action under a framework of congressional notification solves.Chesney 12 ~Robert M. Chesney is an American lawyer and the Charles I. Francis Professor in Law at The University of Texas School of Law, where he serves as the Associate Dean for Academic Affairs and teaches courses relating to U.S. national security and constitutional law.~1~ Chesney addresses issues involving national security and law, including matters relating to military detention, the use of force, terrorism-related prosecutions, the role of the courts in national security affairs, and the relationship between military and intelligence community activities.~2~ He is a co-founder and contributor to the Lawfare Blog~ February 2012 "Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate" http://jnslp.com/wp-content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf date accessed ~8-13-2013~ NNF Operations constituting "covert action" must be reported to the House and Senate Intelligence Congressional oversight is key – but congress has to take the lead (on policymaking)Dycus 10 J. Nat’l Sec. L. 26 Pol’y 4 pg155 (2010) Congress’s Role in Cyber Warfare; Dycus, Stephen (Professor, Vermont Law School.) Congress obviously cannot act alone to develop a cyber warfare policy for the United States In cyberspace, magnitude outweighs probabilityLin 12 (I/S: A Journal of Law and Policy for the | 9/21/13 |
Filename | Date | Uploaded By | Delete |
---|---|---|---|
9/21/13 | sespring@uhedu |
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming