General Actions:
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
GSU | 1 | na | na |
|
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
DisclosureTournament: GSU | Round: 1 | Opponent: na | Judge: na 1AC Cites GSU1US cyber policy is being modeled worldwide—Causes cyber prolif.Gjelten 13 With the Pentagon now officially recognizing cyberspace as a domain of warfare… spoken at conferences and other public events." Specifically, Presidential control over OCOs is causing a cyber-arms race that goes nuclear.Rothschild 13, Editor of Progressive Magazine, Matthew Rothschild is the editor of The Progressive magazine, which is one of the leading voices for peace and social justice in this country. Rothschild has appeared on Nightline, C-SPAN, The O’Reilly Factor, and NPR, and his newspaper commentaries have run in the Chicago Tribune, the L.A. Times, the Miami Herald, and a host of other newspapers. Rothschild is the host of "Progressive Radio," a syndicated half-hour weekly interview program. And he does a two-minute daily radio commentary, entitled "Progressive Point of View," which is also syndicated around the country. Rothschild is the author of You Have No Rights: Stories of America in an Age of Repression (New Press, 2007). He also is the editor ofDemocracy in Print: The Best of The Progressive, 1909-2009(University of Wisconsin Press, 2009)., The Dangers of Obama’s Cyber War Power Grab, http://progressive.org/dangers-of-obama-cyber-war-power-grab 2013 is the brink—Consensus of experts.Goldman 13, CNN Writer, Nations Prepare for Cyberwar, http://money.cnn.com/2013/01/07/technology/security/cyber-war/index.html American OCOs prevent international norms and drive the cyber-arms race.Goldsmith 10, Professor of Law at Harvard, Can we stop the Cyber Arms Race, Jack Goldsmith teaches at Harvard Law School and is on the Hoover Institution’s Task Force on National Security and Law. He was a member of a 2009 National Academies committee that issued the report "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities.", http://articles.washingtonpost.com/2010-02-01/opinions/36895669_1_botnets-cyber-attacks-computer-attacks This also destabilizes norms surrounding nuclear weaponsAustin 13 Fear of a pre-emptive attack causes hair trigger posture and miscalc.Morgan 2010 On the other hand, since they will likely not be readily visible,… capabilities were and turned to a worst-case analysis. The arms race escalates====A) Miscalc==== B) Third PartiesLibicki 09 An exchange of cyberattacks… because who knows where it will lead C) Disproportional Retaliation
Nuclear WarClarke 2009 As in the 1960s,… respond with "kinetic activity." Only the plan can solve—acknowledging our own covert attacks establishes a norm that stops proliferationGoldsmith 10 In a speech this month on "Internet freedom,"… concessions by our adversaries. 2The NSA scandal is creating an exodus of talent from the cyber industrial complex which endangers cyber security.Economist 13 Its reverse causal—Congressional oversight creates the transparency key to recruiting. Hackers are calling for less presidential authority.Kar 13 Cyber Industrial Complex.Peterson 13 Absent the plan, the espionage scandal costs 15,000 recruits.Wyler 13 The government is currently recruiting for the National Mission Force which will defend against cyber-attacks.Hayes 13 The few good recruits go to the NSA for offense—DHS recruiting is key to defense.Boston Globe 13 Strong defense solves cyber-attacks.McGraw 10 The shortage forces the government to hire bad or corrupt defensive expertsMichaels 13 Either scenario destroys cyber defense.USA Today 13 Cyber-attacks are up 680.FCW 12 Cyber-attacks shut down our military—It’s all been transferred to the internet.Samuelson 13 Bad Cyber Defenses enable decapitation of the government from the military.Paul Stockton 11, assistant secretary of defense for Homeland Defense and Americas’ Security Affairs, "Ten Years After 9/11: Challenges for the Decade to Come", http://www.hsaj.org/?fullarticle=7.2.11 The cyber threat to the DIB… and never will – exercise control. Causes lash out—goes nuclearLawson, Professor of Communication at Utah, 09 Vulnerabilities and tensions get exploited to start nuclear war.Fritz 09 Its not hegemony good/bad—A quick collapse of America from external factors causes global transition wars.Brzezinski ’05 Zbigniew was the National Security Advisor for the Carter Administration and former Professor of Foreign Policy at Johns Hopkins University, 2005, "The Choice: Global Domination or Global Leadership" Even the perception of decline causes lashout and hegemonic warsGoldstein 7 Professor of Global Politics and International Relations @ University of Pennsylvania "Power transitions, institutions, and China’s rise in East Asia: Theoretical expectations and evidence," Journal of Strategic Studies, Volume 30, Issue 4 26 5 August 2007, pages 639 – 682 Cyber-attacks threaten our entire financial system.Tsai 12 This outweighs nuclear war.Information Week 7 Three Internal Links1) Power GridWSJ 12 – President of the United States (Barack, "Taking the Cyberattack Threat Seriously", 7/20/12, Wall Street Journal, http://online.wsj.com/article/SB10000872396390444330904577535492693044650.html)//GP In a future conflict, an adversary… wide open to our cyber adversaries. ====2) Trade Wars==== 3) Banks—Kills Biz ConOstrer 12 For a week, cyber-attacks plagued… Lieberman believes the Iranian special forces are behind the attack. ExtinctionRoyal 10 (Jedediah, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, Economic Integration, Economic Signaling and the Problem of Economic Crises, in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215) PlanPlan: The United States Congress should prohibit Operational Preparation of the Environment about which congress has not been notified.The military hides offensive cyber operations as "operational preparation of the environment" to keep them covert.Dycus 10 The plan prevents covert operations but enables flexibility.Dycus 10 Congressional oversight guarantees a cooperative framework which is key to cyber capabilities.Dycus 10 Congress must initiate the restriction – Failure irreversibly increases presidential power.Hansen 26 Friedman 9, | 9/21/13 |
Filename | Date | Uploaded By | Delete |
---|
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming