General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Florida
▼:
Document Index
»
Page: Persico-Daskalakis Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
Bulldogdebates | 7 | Liberty Call-Crane | Spiker, Foley, Mulholand |
| ||||
Bulldogdebates | 2 | Clarion Baker-King | Poapst |
| ||||
Sunshine State Showdown | 1 | Miami |
|
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
Cyber Ops 1acTournament: Bulldogdebates | Round: 2 | Opponent: Clarion Baker-King | Judge: Poapst InherencyThe military hides cyber operations as "operational preparation of the environment" with no oversight. This is the root cause of the Snowden Scandal.Dycus 10 PLAN:====United States Congress should enact legislation requiring offensive cyber operations be funded, conducted, and/or directed pursuant to Title 50 United States Code § 413b.==== Adv 1 LOACCyber tensions between the US and China are escalating rapidly. The brink is now.Yi 13 ~Xiaoxiong Yi is the director of Marietta College’s China Program.~ June 22, 2013 "The coming of China-U.S. cyber war" http://www.mariettatimes.com/page/content.detail/id/552547.html Cyber espionage would be misread as an attack – US or China would respond with nukesClarke 13(Richard Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001…. "The perils of linking cyberwar to nuclear war"… 6/16/2013 … The Washington Post… LexisNexis Academic… 8/13/13… RTV) Even innocent data collection can be misinterpreted as an attack, only a matter of timeWilliams 11 (Robert D. Williams, J.D. Harvard Law School… "(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action"… June 2011… The George Washington Law Review… LexisNexis… 8/1/13… RTV) ====A Covert Action framework clarifies Cyber Exploitation as Cyber Opps and forces compliance with the LOAC, which solves escalation==== LOAC has worked, and is key to stop collapse of societyIOLD 12 Validity. Although critics of the regulation of warfare cite examples of violations of evolving The US has the authority to establish precedent as a member of the U.N. Security Council, especially in Cyber SpaceMelnitzky 12 (Alexander B. Melnitzky, Associate at The Serbagi Law Firm, P.C. Former Associate Editor of Cardozo Journal of International and Comparative Law. He earned his J.D. from Benjamin N. Cardozo School of Law at Yeshiva University and a B.A. in History from NYU.) /ejc\ (https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay26crawlid=126doctype=cite26docid=20+Cardozo+J.+Int27l+26+Comp.+L.+53726srctype=smi26srcid=3B1526key=e30e49aa22650c3c135d44854f) The development of international law is based on modeling – Other Countries Model Because of the Lotus PrincipleBrown and Poellet 12 (Colonel Gary Brown, JD Senior Legal Counsel for U.S. Cyber Command, Fort Meade, Maryland and Keira Pollet, JD and LLM Judge Advocate General and former Operations Law Attorney at US CYBERCOM, Strategic Studies Quarterly, Fall 2012, The Customary International Law of Cyberspace, Accessed 8/30/13) (www.au.af.mil/au/ssq/2012/fall/brown-poellet.pdf?) /ejc\ De-escalating cyber ops key to soft powerBelk and Noyes ’12 Over the past decade, hard power has dominated U.S. foreign policy Soft power prevents extinction, disease, climate change, terrorism and great power warJoseph Nye 8 is professor of international relations at Harvard University, "American Power After the Financial Crises," http://www.foresightproject.net/publications/articles/article.asp?p=3533-http://www.foresightproject.net/publications/articles/article.asp?p=3533, Date Accessed: 9-15-13 Revised by JM Most comprehensive study of over 11,000 years proves warming is real and anthropogenicRomm 13 (Romm, Ph.D. from MIT, served as Acting Assistant Secretary of the U.S. Department of Energy. He is now a Senior Fellow with the Center for American Progress Joe. Bombshell: Recent Warming Is ’Amazing And Atypical’ And Poised To Destroy Stable Climate That Enabled Civilizationhttp://thinkprogress.org/climate/2013/03/08/1691411/bombshell-recent-warming-is-amazing-and-atypical-and-poised-to-destroy-stable-climate-that-made-civilization-possible/?mobile=nc-http://thinkprogress.org/climate/2013/03/08/1691411/bombshell-recent-warming-is-amazing-and-atypical-and-poised-to-destroy-stable-climate-that-made-civilization-possible/?mobile=nc kjl) Every 1 we solve is huge – outweighs nuclear warMatheny 7 (Jason, Ph.D. Candidate in the Department of Health Policy and Management at the Bloomberg School of Public Health at Johns Hopkins University, Reducing the Risk of Human Extinction, Risk Analysis, Volume 27, Number 5, Available Online at http://www.upmc-biosecurity.org/website/resources/publications/2007_orig-articles/2007-10-15-reducingrisk.html) Adv 2 OversightInteragency turf wars have blocked reorganization of cyber policiesBiggs 12 Despite the ongoing concern about the escalating pace of cyber attacks, a new set Interagency convergence disrupts the decision making process and kills response time to cyber attacksChesney 2012. "Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate" (Charles I. Francis Professor in Law, University of Texas School of Law) http://jnslp.com/wp- content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf-http://jnslp.com/wp-content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf The first way in which cyberspace is especially prone to convergence has to do with Consultation solves—Prevents covert espionage but enables flexibility. Scenario 1: Turf WarsNon-state actors are targeting the US now – these attacks risk nuclear meltdowns and stock market crashesSharp 2010. "National Leadership, Individual Responsibility: The Past, Present, and Future of Cybersecurity" (Walter Gary Sharp Sr. Senior Associate Deputy General Counsel for Intelligence, Office of the General Counsel, U.S. Department of Defense; Adjunct Professor of Law, Georgetown University Law Center) 4 J. Nat’l Security L. 26 Pol’y 13. AMon The cyber threat to U.S. national security, economic security, and Cyber attack shuts down the grid – Syria makes timeframe KEYDykes and Melton 13 DoD bases are vulnerable to grid disruptionsRobitaille 12 Grid failure shuts down US military operationsPaul Stockton 11, assistant secretary of defense for Homeland Defense and Americas’ Security Affairs, "Ten Years After 9/11: Challenges for the Decade to Come", http://www.hsaj.org/?fullarticle=7.2.11-http://www.hsaj.org/?fullarticle=7.2.11 Global WarFrederick Kagan and Michael O’Hanlon 7, Fred’s a resident scholar at AEI, Michael is a senior fellow in foreign policy at Brookings, "The Case for Larger Ground Forces", April, http://www.aei.org/files/2007/04/24/20070424_Kagan20070424.pdf-http://www.aei.org/files/2007/04/24/20070424_Kagan20070424.pdf Scenario 2: Business ConfidenceResponse time is key – a cyber attack could shut down the US economyAAP 13 AAP (Australian Associated Press) 06/12/13, Cyber wars would cripple economies: experts, http://www.businessspectator.com.au/news/2013/6/12/global-news/cyber-wars-would-cripple-economies-experts, (08/13/13)~23HBK Cyber attackers have the power to shut down economies and a global cyber war could Even the possibility of cyber-attack has the potential to shake business confidence and destroy the economyCornish 11 Paul Cornish(Professor of Strategic Studies at the University of Exeter. He was educated at the London School of Economics (MSc Econ, International Relations). He completed his PhD at the University of Cambridge, Lecturer in Defence Studies at the UK Defence Academy (King’s College London) and then Lecturer in International Security at the University of Cambridge, Cornish also spent several years as Director of the Centre for Defence Studies at King’s College London.) June 2011, The Velnerabilities of Developed States to Economic Cyber Warfare, http://www.chathamhouse.org/sites/default/files/0611wp_cornish.pdf, (p. 12) (08/13/13)~23HBK In a world of interconnected and interdependent economies we could expect an element of self US economic decline triggers global decline, that escalates to conflictTilford 2008 – PhD in history from George Washington University, served for 32 years as a military officer and analyst with the Air Force and Army (Earl, "Critical mass: economic leadership or dictatorship", Cedartown Standard, lexis) Could it happen again? Bourgeois democracy requires a vibrant capitalist system. Without it Solvency====Oversight solves escalation==== | 2/16/14 |
Ghost Stories AffirmativeTournament: Bulldogdebates | Round: 7 | Opponent: Liberty Call-Crane | Judge: Spiker, Foley, Mulholand They say it came first from Africa, carried in the screams of the enslaved A true interrogation of war powers demands a spiritual reflection on the lived experience of its victims. Sometimes this means engaging non-traditional ways of knowing – like very superstitious writings on the wall.Trujillo? US military strategists had his back – a man guilty of slaughtering 13,000 Haitians in the Parsely Masacre. The saying was, "Sure he’s a son of a bitch, but he’s our son of a bitch." Do you see new how the exercise of war powers are key to maintain US imperial control over the Caribbean? Look at Guantanamo Bay.Toby Habertson12 (Rock around the Blockade is a British campaign in defence of socialist Cuba.) http://www.ratb.org.uk/news/cuba/214-10-years-guantanamo SP-http://www.ratb.org.uk/news/cuba/214-10-years-guantanamo SP January 2012 marked ten years since the first 20 prisoners arrived at the US prison This ain’t some new shit either. The legacy of America’s Backyard Policy has created two centuries of neo-imperialist interventionism in Latin America and the Caribbean - legally justified by executive war powers. Here’s an abridged list(Source: http://www.english.illinois.edu/maps/poets/a_f/espada/imperialism.htm) 1966: U.S. Green Berets take part in "Operation Guatemala"; over 8,000 Guatemalans killed The deployment of US war powers and foreign policy is the face of modern imperialism. The ordering of the world through an interventionist, hegemonic state gurantees global instability and violence. Unlimited imperialist conquest inevitably results in extinction, every modern war has been a byproduct of the spread of colonialismHarvey ’06 The globalized economy under imperialism demands structural violence against the most vulnerable peopleDemenchonok and Peterson ’09 The ubiquity of this system means our role of the ballot is to determine whoever best performatively and methodologically resists imperialism. Our advocacy is to use magic to undermine these oppressive forces.Contrary to the popular narratives about coloniality and the lived experience of people in captivity – there are ways to transcend and even defeat these evils. In Jamaica, the land of my father a mystic force named Obeah was used to confront the specter of white supremacy and economic coercion.This is Winnie Chan - http://www.people.vcu.edu/~~wchan/poco/624/harris_south/Obeah20and20Myal.htm-http://www.people.vcu.edu/~wchan/poco/624/harris_south/Obeah and Myal.htm Obeah is perhaps the oldest of all Afro-Creole religions in the Caribbean. The belief that the supernatural can create invincibility and salvation injects hope into the political sphere which is the key internal link to social change.Gary McCarron-gmccarro@sfu.ca2007** is an Assistant Professor in the School of Communication at Simon Fraser University. He is currently studying the relationship between democracy and health. 2007 Gary McCarron (http://bad.eserver.org/issues/2007/78/moral.html-http://bad.eserver.org/issues/2007/78/moral.html_)//SP26VED I write out of the conviction that hope is still important in a world where These tactics destabilized white rule in not only the Caribbean – but Africa too. The resistance was able to manifest in peaceful and violent cultural micro-politics.Bernault (no date) Magical Politics in Equatorial Africa - Florence Bernault - University of Wisconsin-Madison - PhD: University of Paris-Diderot; MA: University of Paris-Sorbonne; BA: University of Paris-Sorbonne - pecializations are Equatorial African History and Contemporary Africa. I teach and research on the formation of modern identities, nation-states, and popular culture in West and Equatorial Africa, from the 19th century to the present. I offer courses and seminars on Africa since 1870, on Equatorial Africa since 1500, on Non-Traditional Sources for Modern African History, on African Christianity, and on African Art from the Primitive to the Global: Collections, Tourism, Museums. I have also written extensively on France’s current debates about citizenship, naturalization, immigration and the colonial debt. http://faculty.history.wisc.edu/bernault/magical/Bernault20magical20politics.htm-http://faculty.history.wisc.edu/bernault/magical/Bernault magical politics.htm SP Imagination and superstition uniquely create transformation and liberationTyson Lewis and Richard Kahn10 | 2/16/14 |
Sunshine State Showdown 1acTournament: Sunshine State Showdown | Round: 1 | Opponent: Miami | Judge: Cyber tensions between the US and China are escalating rapidly. The brink is now. Even innocent data collection can be misinterpreted as an attack, only a matter of time Oversight solves escalation Cyber espionage would be misread as an attack – US or China would respond with nukes Title 50 framework clarifies Cyber ops and forces compliance with the LOAC LOAC doesn’t cover cyber ops in the squo Applying LOAC norms to cyber attacks is only possible in the event of anarmed conflict LOAC has worked, and is key to stop collapse of society Validity. Although critics of the regulation of warfare cite examples of violations of evolving The development of international law is based on modeling – comes before treaties and conventions The US has the authority to establish precedent as a member of the U.N. Security Council De-militarizing cyber ops key to soft power Over the past decade, hard power has dominated U.S. foreign policy Soft power prevents extinction, disease, climate change, terrorism and great power war Interagency turf wars have blocked reorganization of cyber policies Despite the ongoing concern about the escalating pace of cyber attacks, a new set Interagency convergence disrupts the decision making process and kills response time to cyber attacks The first way in which cyberspace is especially prone to convergence has to do with Non-state actors are targeting the US now – these attacks risk nuclear meltdowns and stock market crashes The cyber threat to U.S. national security, economic security, and Cyber attack shuts down the grid – Syria makes timeframe KEY DoD bases are vulnerable to grid disruptions Grid failure shuts down US military operations Global War Response time is key – a cyber attack could shut down the US economy Cyber attackers have the power to shut down economies and a global cyber war could Even the possibility of cyber-attack has the potential to shake business confidence and destroy the economy In a world of interconnected and interdependent economies we could expect an element of self US economic decline triggers global decline, that escalates to conflict Could it happen again? Bourgeois democracy requires a vibrant capitalist system. Without it Prefer Covert Action Statute of Title 50, agencies are more careful with ops Clarifying cyber operations under covert action under a framework of congressional notification solves. Operations constituting “covert action” must be reported to the House and Senate Intelligence Congressional oversight is key – but congress has to take the lead (on policymaking) Congress obviously cannot act alone to develop a cyber warfare policy for the United States In cyberspace, magnitude outweighs probability | 10/23/13 |
Filename | Date | Uploaded By | Delete |
---|
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming