General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Kansas State
▼:
Document Index
»
Page: Klucas-Hartman Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
ESU | 2 | UMKF AF | Chase |
| ||||
Wake | 1 | Cornell RR | Girouard |
|
Tournament | Round | Report |
---|---|---|
ESU | 2 | Opponent: UMKF AF | Judge: Chase 1ac - OCO w auto-retaliation adv |
Wake | 1 | Opponent: Cornell RR | Judge: Girouard 1ac - OCO w EU and split authority advs |
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1AC - ESUTournament: ESU | Round: 2 | Opponent: UMKF AF | Judge: Chase The Air Force is currently centralizing DoD cyber infrastructure in an attempt to fully automate Every generation stands on the many shoulders of greatness that preceded¶ it. For The DoD is building a Tower of Babel that gets locked in – the plan prevents unpreparedness for longer conflicts which cedes escalation control At least once before, the Air Force suffered similar “doctrinal lock in,”¶ Auto-retaliation is enabled by Title 50’s loophole – the plan changes DoD cost-benefit analysis toward higher-level planning which prevents mis-informed attribution and major power war Recommendation 4: The U.S. government should have a clear, transparent Cyber warfare is real and attacks against the US are increasing – a proportionate response key to prevent major power war However, there are reasons to believe that what is going on now amounts Information is insufficient after any cyber-attack – auto-neutralization forces the US’s hand too quickly which prevents signaling commitment to de-escalation Signaling Intentions in Cyber Conflict¶ Nothing in the set of options above is specific Auto-retal spills over to communication networks and muddies restraint signaling – independently, catalytic conflict causes escalation – launch-on-warning makes nuclear extinction inevitable Notwithstanding the preceding disclaimers, information warfare has the potential to attack or disrupt successful Sloppy OCOs eliminate nuclear restraint and cause health care crises Critical infrastructure is a normal target for military planners, to gain tactical or strategic Hindering response and surveillance makes epidemics uniquely likely Power cuts related to disasters may disrupt water treatment and supply plants, thereby increasing Mutations ensure extinction A pandemic will kill off all humans. In the past, humans have indeed 1AC – solvency Splitting the same set of Offensive Cyber Operations between different statutory authorizations makes oversight incoherent – Congress must clarify that all DoD funded and operated operations are subject to Title 10. There is no rigid separation between Title 10 and Title 50. A more¶ Split authority imposes no restrictions on kinetic-level attacks globally – plan is the optimal balance between oversight and flexibility If the United States did intend to hide a cyberattack, even though it was Current OCO debates are too obscured by bureaucracy to make citizen checks effective – limited and technical debates key The possibility that the United States might choose to engage in cyberattacks to serve its Specifically, the Title 10/50 debate goes to the core of cyber ops oversight – contextual effects-based decisionmaking creates the best OCO policy To correct this shortcoming, we have developed a framework that elucidates the critical considerations DoD decision-making can create accurate threat assessments with sufficient intel – systematic checks are key to accuracy Quite expectedly, the more doctrinaire of the non-interventionists take pains to deny | 10/20/13 |
1AC - WakeTournament: Wake | Round: 1 | Opponent: Cornell RR | Judge: Girouard United States Congress should enact legislation requiring offensive cyber operations funded, conducted, and/or directed by Department of Defense be conducted pursuant to Title 10 United States Code. Advantage 1 is split authority Split authority makes DoD cyber planning incoherent – the plan enables sufficient intelligence integration to make cyber operations a true US force multiplier Operational Planning¶ Larger than the targeting process is¶ overall planning for an operation Split authority will leave CYBERCOM scrambling for info to generate a Title 10 response – cyberattacks on infrastructure and military assets cause a reaction dead zone which is sufficient to degrade the U.S. economy, military ability, and leadership As the DoD grappled with these major cyber espionage events, DHS was designated the US conventional war fighting is inevitable – ineffectiveness causes regional aggression and major power competition It is important to recognize at the outset two key points about United States strategy AND, status-seeking is inevitable – ambiguous hierarchies cause over-exertion and great power conflict – prefer overwhelming research consensus SIT is often seen in a scholarly context that contrasts power-based and identity There are infinite causes of war – but only stabilizing perceptions consistently puts a ceiling on escalation – don’t make the good contingent on perfection If major interstate war is predominantly a product of a synergy between a potential nondemocratic Econ decline causes global escalation and extinction The second scenario, called Mayhem and Chaos, is the opposite of the first Advantage 2 is EU Online spying is destroying US – EU relations now. That kills diplomatic solutions The aff is the critical concession to transparency. It prevents international backlash because of its perception, and gives the DoS credibility that the DoD can’t strip anymore. Its reverse causal. EU relations solve extinction EU-US relations are key to Iran talks – that solves multiple avenues of prolif and terrorism Iran proliferation causes nuclear war Extinction 1AC – solvency Splitting the same set of Offensive Cyber Operations between different statutory authorizations makes oversight incoherent – the plan aligns the law with operational realities There is no rigid separation between Title 10 and Title 50. A more¶ Split authority imposes no restrictions on kinetic-level attacks globally – the plan is the optimal balance between oversight and flexibility If the United States did intend to hide a cyberattack, even though it was | 11/17/13 |
Filename | Date | Uploaded By | Delete |
---|
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming