General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Florida
▼:
Document Index
»
Page: Prescott-Frank Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
GSU | 2 | all |
| |||||
Shirley | 1 | Kansas City Kansas CC Casas-Gonzaba | Kozak |
| ||||
Shirley | 8 | Nevada Las Vegas Jallits-Saxe | Lain |
| ||||
Texas | 5 | Southern California Haas-Saiedian | Green |
| ||||
tournament | 2 | Emory Cheng-Sawyer | Galloway |
|
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1ac round 8 ShirleyTournament: Shirley | Round: 8 | Opponent: Nevada Las Vegas Jallits-Saxe | Judge: Lain Adv 1 – Cyber Militarization Adv The Pentagon's acquisition directorate has drafted a charter for a new, high-level DOD moving to IDIQ contracts Air Force cyber planners have developed a new approach to buying cyber weapons that they Only bureaucracy checks speed The U.S. Department of Defense is experiencing delays with their plan to IDIQ contracts overcome those That bizarre phrase is one that has definitely been popping up regularly in the Pentagon’s China and Russia intensify cyber arms race in response The Pentagon plans to fast-track cyber weapon development and acquisition through a process Signaling is key That speed could present an intelligence advantage for the Pentagon as it seeks to acquire Nuclear pre-emption become policy And this new aggressive stance will lead to a cyber-arms race. The This escalates to nuclear war "We will reduce the role of nuclear weapons in our national security strategy and US gets modeled – procurement policy is the ONLY starting point The United States has many different means to advance its international goals. Most of Adv 2 – Defense Industry One problem that arises with an IDIQ contract minimum guarantee is the amount of this Cyber-security bubble threatens sector But quietly over the past few months, several companies have been showing some of Defense industry cyber shift now The internet is turning the defence industry on its head, just as it transformed The biggest U.S. military contractors are counting on winning billions of dollars Defense industry key to the US economy – Jobs and Tax Revenue Economic diversionary theory true Less intuitive is how periods of economic decline may increase the likelihood of external conflict Causes nuclear war Now its time to look at the consequences of a failing world economy. With Defense industry enables Egypt influence In the late 1970s, Egypt needed a new state sponsor. “They were Israeli aggressive alert makes first-strike likely Near the Sinai peninsula, the Israeli Defense Forces continue on high alert, watching Takes out Egypt’s stabilizing role - escalation follows Once again, Egypt roils from a brutal crackdown by the interim military government and Strategic stability in the region is thus undermined by various factors: (1) Adv 3 - Booz Allen Hamilton A delivery-order contract is a contract for supplies that does not specify a Booz Allen is getting most despite leaks Booz Allen Hamilton has announced four new cybersecurity contracts. The contracts come in the wake of leaks by government contracted, and former Booz Allen employee Edward Snowden. More leaks probable Edward Snowden isn’t Booz Allen Hamilton’s first leak problem. In an earlier incident, German Relations are on the brink. Cooperation is happening with Merkel now but preventing future leaks is critical. After disclosures that the U.S. National Security Agency tapped German Chancellor Angela Germany is our EU liaison - mediates Russia. Germany remains an important part of the European continent. Its position will directly influence Missile defense dispute causes Russian first strike Russia's top military officer has threatened to carry out a pre-emptive strike on Russia-US conflict guarantees extinction A much greater existential risk emerged with the build-up of nuclear arsenals in Relations key to solving climate change And while we all are rightly focused on a non-carbon future, we Warming is real, anthropogenic, and threatens extinction The polar icecaps are melting faster than we thought they would; seas are rising Solvency Government restrictions on IDIQ contracts are key to industry stability. Congressional bans shift risk and perception Although the current focus in the federal market centers on budgetary issues like sequestration, Executive constraints on contracts face legal challenges | 12/31/13 |
Districts 1acTournament: tournament | Round: 2 | Opponent: Emory Cheng-Sawyer | Judge: Galloway Solvency Backdoor program is at the heart of NSA data collection scheme. Congressional ban on backdoors and warrants for decryption solves best. Congressional ban on NSA backdoors and disclosure via oversight solves. Plan solves key to signaling, cyber-security, and transparency. National Cyber Security Backdoors weaken national cybersecurity NSA backdoor program destroys national cybersecurity. Two Reasons:
2. Kills cryptography that’s key to cyber-security Non-state actors are targeting the US now causes nuclear meltdowns. Cyber attack shuts down the grid – timeframe KEY Extinction NSA backdoor program allows for state attacks. That guarantees nuclear retaliation EU-US Perception of an unrestrained NSA tanks TTIP negotiations. TTIP critical to capital influx TTIP key to bio-technology – Capital Influx Bio-tech key to solving coming food crisis Tech Industry Backdoor destroy the technology sector Tech sector critical to algo trading increases liquidity Industry shift now - Tech sector is critical to facilitate. Liquidity shortage in squo Crisis timeframe is early 2014 - guarantees collapse. Economic diversionary theory true Less intuitive is how periods of economic decline may increase the likelihood of external conflict Causes nuclear war Now its time to look at the consequences of a failing world economy. With | 2/22/14 |
GSU 1ACTournament: GSU | Round: 2 | Opponent: all | Judge: 1ACAdvantage 1: International LawCyber tensions between the US and China are escalating rapidly. The brink is now.Yi 13 ~Xiaoxiong Yi is the director of Marietta College’s China Program.~ June 22, 2013 "The coming of China-U.S. cyber war" http://www.mariettatimes.com/page/content.detail/id/552547.html Even innocent data collection can be misinterpreted as an attack, only a matter of timeWilliams 11 (Robert D. Williams, J.D. Harvard Law School… "(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action"… June 2011… The George Washington Law Review… LexisNexis… 8/1/13… RTV) ====Oversight solves escalation==== Cyber espionage would be misread as an attack – US or China would respond with nukesClarke 13(Richard Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001…. "The perils of linking cyberwar to nuclear war"… 6/16/2013 … The Washington Post… LexisNexis Academic… 8/13/13… RTV) ====The aff framework clarifies Cyber ops and forces compliance with the LOAC==== LOAC doesn’t cover cyber ops in the squoKodar 12 (Erki Kodar is a professor of law at the University of Tartu, and also the Director of the Legal Department of the Estonian Ministry… "APPLYING THE LAW OF ARMED¶ CONFLICT TO CYBER ATTACKS:¶ FROM THE MARTENS CLAUSE TO¶ ADDITIONAL PROTOCOL I"… http://www.ksk.edu.ee/wp-content/uploads/2012/12/KVUOA_Toimetised_15_5_Kodar.pdf ... 9/1/13… RTV) Applying LOAC norms to cyber attacks is only possible in the event of an¶ LOAC has worked, and is key to stop collapse of societyIOLD 12 Validity. Although critics of the regulation of warfare cite examples of violations of evolving The development of international law is based on modeling – comes before treaties and conventionsBrown and Poellet 12 (Colonel Gary Brown, JD Senior Legal Counsel for U.S. Cyber Command, Fort Meade, Maryland and Keira Pollet, JD and LLM Judge Advocate General and former Operations Law Attorney at US CYBERCOM, Strategic Studies Quarterly, Fall 2012, The Customary International Law of Cyberspace, Accessed 8/30/13) (www.au.af.mil/au/ssq/2012/fall/brown-poellet.pdf?) /ejc\ The US has the authority to establish precedent as a member of the U.N. Security CouncilMelnitzky 12 (Alexander B. Melnitzky, Associate at The Serbagi Law Firm, P.C. Former Associate Editor of Cardozo Journal of International and Comparative Law. He earned his J.D. from Benjamin N. Cardozo School of Law at Yeshiva University and a B.A. in History from NYU.) /ejc\ (https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay26crawlid=126doctype=cite26docid=20+Cardozo+J.+Int27l+26+Comp.+L.+53726srctype=smi26srcid=3B1526key=e30e49aa22650c3c135d44854f) De-militarizing cyber ops key to soft powerBelk and Noyes ’12 Over the past decade, hard power has dominated U.S. foreign policy Soft power prevents extinction, disease, climate change, terrorism and great power warJoseph Nye 8 is professor of international relations at Harvard University, "American Power After the Financial Crises," http://www.foresightproject.net/publications/articles/article.asp?p=3533, Date Accessed: 9-15-13 Revised by JM Advantage 2: Turf WarInteragency turf wars have blocked reorganization of cyber policiesBiggs 12 (Zachary Fryer-Biggs is a Washington Staff Writer for DefenseSystems, a news source focusing on national security matters… 5/7/12… http://www.defensenews.com/article/20120507/DEFREG02/305070004 "Debate Slows New U.S. Cyber Rules" … 9/17/13) Despite the ongoing concern about the escalating pace of cyber attacks, a new set Interagency convergence disrupts the decision making process and kills response time to cyber attacksChesney 2012. "Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate" (Charles I. Francis Professor in Law, University of Texas School of Law) http://jnslp.com/wp- content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf The first way in which cyberspace is especially prone to convergence ¶ has to do Non-state actors are targeting the US now – these attacks risk nuclear meltdowns and stock market crashesSharp 2010. "National Leadership, Individual Responsibility: The Past, Present, and Future of Cybersecurity" (Walter Gary Sharp Sr. Senior Associate Deputy General Counsel for Intelligence, Office of the General Counsel, U.S. Department of Defense; Adjunct Professor of Law, Georgetown University Law Center) 4 J. Nat’l Security L. 26 Pol’y 13. AMon The cyber threat to U.S. national security, economic security, and Scenario 1: GridCyber attack shuts down the grid – Syria makes timeframe KEYDykes and Melton 13 DoD bases are vulnerable to grid disruptionsRobitaille 12 Grid failure shuts down US military operationsPaul Stockton 11, assistant secretary of defense for Homeland Defense and Americas’ Security Affairs, "Ten Years After 9/11: Challenges for the Decade to Come", http://www.hsaj.org/?fullarticle=7.2.11 Global WarFrederick Kagan and Michael O’Hanlon 7, Fred’s a resident scholar at AEI, Michael is a senior fellow in foreign policy at Brookings, "The Case for Larger Ground Forces", April, http://www.aei.org/files/2007/04/24/20070424_Kagan20070424.pdf Scenario 2: EconResponse time is key – a cyber attack could shut down the US economyAAP 13 AAP (Australian Associated Press) 06/12/13, Cyber wars would cripple economies: experts, http://www.businessspectator.com.au/news/2013/6/12/global-news/cyber-wars-would-cripple-economies-experts, (08/13/13)~23HBK Cyber attackers have the power to shut down economies and a global cyber war could Even the possibility of cyber-attack has the potential to shake business confidence and destroy the economyCornish 11 Paul Cornish(Professor of Strategic Studies at the University of Exeter. He was educated at the London School of Economics (MSc Econ, International Relations). He completed his PhD at the University of Cambridge, Lecturer in Defence Studies at the UK Defence Academy (King’s College London) and then Lecturer in International Security at the University of Cambridge, Cornish also spent several years as Director of the Centre for Defence Studies at King’s College London.) June 2011, The Velnerabilities of Developed States to Economic Cyber Warfare, http://www.chathamhouse.org/sites/default/files/0611wp_cornish.pdf, (p. 12) (08/13/13)~23HBK In a world of interconnected and interdependent economies we could expect an element of self US economic decline triggers global decline, that escalates to conflictTilford 2008 – PhD in history from George Washington University, served for 32 years as a military officer and analyst with the Air Force and Army (Earl, "Critical mass: economic leadership or dictatorship", Cedartown Standard, lexis) Could it happen again? Bourgeois democracy requires a vibrant capitalist system. Without it . Nuclear WarBroward 9 ((Member of Triond) http://newsflavor.com/opinions/will-an-economic-collapse-kill-you/) PLAN:====The United States Congress should enact legislation requiring offensive cyber operations be funded, conducted, and directed pursuant to Title 50 United States Code § 413b.==== SolvencyPrefer Covert Action Statute of Title 50, agencies are more careful with opsBrecher 12 "Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations" by Aaron P. Brecher (J.D. Candidate, May 2013, University of Michigan Law School), December 2012 – Michigan Law Review VED Clarifying cyber operations under covert action under a framework of congressional notification solves.Chesney 12 ~Robert M. Chesney is an American lawyer and the Charles I. Francis Professor in Law at The University of Texas School of Law, where he serves as the Associate Dean for Academic Affairs and teaches courses relating to U.S. national security and constitutional law.~1~ Chesney addresses issues involving national security and law, including matters relating to military detention, the use of force, terrorism-related prosecutions, the role of the courts in national security affairs, and the relationship between military and intelligence community activities.~2~ He is a co-founder and contributor to the Lawfare Blog~ February 2012 "Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate" http://jnslp.com/wp-content/uploads/2012/01/Military-Intelligence-Convergence-and-the-Law-of-the-Title-10Title-50-Debate.pdf date accessed ~8-13-2013~ NNF Operations constituting "covert action" must be reported to the House and Senate Intelligence Congressional oversight is key – but congress has to take the leadDycus 10 J. Nat’l Sec. L. 26 Pol’y 4 pg155 (2010) Congress’s Role in Cyber Warfare; Dycus, Stephen (Professor, Vermont Law School.) ¶ Congress obviously cannot act alone to develop a cyber warfare policy ¶ for the | 11/17/13 |
Shirley 1acTournament: Shirley | Round: 1 | Opponent: Kansas City Kansas CC Casas-Gonzaba | Judge: Kozak 9/11 is the militaristic justification for expanded war power with the intention of genocide in The Third World 9/11 was an inside job: NORAD stand down, Able Danger, WTC 7, War games, Presidential Directive w99i, and insider trading prove 9/11 Truth 6 The 911Truth.org website speaks for itself. Grassroots contacts, local groups, and sites on the links page or elsewhere at the site are listed for outreach and informational purposes only--911Truth.org does not necessarily endorse, does not speak for these individuals, nor do they speak for this site. No groups, including those which use '911truth.org' within their name, are representatives of 911truth.org; for instance, NY911truth.org is an entirely separate, autonomous group. We do not have "chapters" or "members." We do have hundreds of thousands of activists (millions, now?) who work together with us through this autonomous, decentralized structure. May 16 2006 “THE TOP 40: REASONS TO DOUBT THE OFFICIAL STORY OF SEPTEMBER 11th, 2001” http://911truth.org/article.php?story=20041221155307646 https://www.indybay.org/newsitems/2002/01/23/1142811.php accessed 7-11-2013 It is well documented that the officials topping the chain of command for response to The only solution to this instance of mass Stockholm syndrome is an explicit questioning of 9/11 as a conspiracy of global proportions. Thus, Nigel and I question and ultimately reject the United States Federal Government’s account of the September 11 2001 attacks. We suspect that the attacks were the result of shadowy elements within the government itself. 9/11 is the central justification for expanded presidential war powers. This requires a total epistemological rejection/questioning of the government narrative – Only our Aff solves. Because of the events of 9/11, the regime proclaims, the world Narrative Closure The resolution operates under a framework of narrative closure one that demands we decrease the President’s war powers authority which stem from an “event” that as we know it never even happened! The Role of the Ballot is to endorse whoever best performatively and methodologically rejects an epistemology of Narrative Closure The Symbolic image of the Other leads to dehumanization and demonization in attempt to secure a more “pure” self. Governmentality and totalizing control over regimes of truth forms the basis of oppressive state power We refuse to sign this contract and instead endorse conspiracy theory as a method of “Looking awry”. Conspiracy Theory is the only method of looking at the world that positively acknowledges our inability of dealing with the world – by looking at the world through the lens of conspiracy theory we can look awry The paranoid story is one that resists the symbolic – the paranoid is the only person to refuse to sign a contract with the symbolic CONSPIRACIES ARE POLITICALLY POWERFUL WAYS OF PREVENTING THE NECESSITY OF NARRATIVE CLOSURE | 11/17/13 |
Texas BSA 1acTournament: Texas | Round: 5 | Opponent: Southern California Haas-Saiedian | Judge: Green Dead line for signing the BSA at end of this month Bilateral Security Agreement in Afghanistan not reached but still possible WASHINGTON: President Barack Obama has met at the White House with his top commander Resolving US detention of third-country nationals solves --- it’s central to the BSA dispute BSA failure collapses Afghan and regional stability The impact is Central and Pakistan instability --- goes nuclear Central Asia escalates globally Pakistan instability causes loose nukes and Indian intervention --- goes nuclear Indo-pak causes extinction No checks on escalation --- destroys regional stability + US influence Escalation’s guaranteed Adv 2 Afghanistan instability is a threat to Central Asian countries This instability spills over to Central Asia --- causes conflict that draws in Russia War in Central Asia is the most probable scenario for extinction Thus many structural conditions for conventional war or protracted ethnic conflict where third parties intervene Strong Russia key to deter Iran Global Nuclear War Even a small war means extinction Russian collapse causes extinction. Adv 3 Bagram prison releases make instability and terrorism extremely likely. Keeping forces intact and cooperation with locals is key to checking terrorism in 2014 Many TCNs represent a significant terrorist threat Historically true – TCNs in Bagram include top Al-Qaeda members The threat is high Afghan terrorist base spills over globally Afghan safe haven is the key staging point for large-scale attack Terrorism causes extinction Current terror blowback results in bioterror Causes extinction Plan Solvency Plan’s statute prevents circumvention BSA impact happens in weeks --- o/w on timeframe Indefinite detention is the biggest issue --- o/w alt causes --- saves the BSA Other issues have been resolved --- detention’s the main sticking point | 2/13/14 |
Filename | Date | Uploaded By | Delete |
---|
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming