Opponent: Wake Forest Villa-Stirrat | Judge: Taylor
Cyber 1AC China Norms
1NC Politics (patents) Flex (Iran impact) China Soft Power DA Markets DA OLC CP
Bulldogdebates
4
Opponent: Emory Adler-Bontha | Judge: Corrigan
1AC - Cyber
1NC - Security OLC CP Iran politics
2NR - Security
Bulldogdebates
6
Opponent: James Madison Miller-Lepp | Judge: Herndon
1AC - Cyber
1NC - T OCO Cap K XO Politics (Iran)
2NR - Politics
JMU
1
Opponent: Wake CH | Judge: Jensen
1AC Pakistan 1NC Militarism K Politics DA Prez Powers DA OLC CP
2NR K
Navy
5
Opponent: Georgetown Fang-Kelley | Judge: OGorman
1AC - Cyber Aff (norms China)
1NC - Self-Restraint CP Legal Lib Iran ptx War-fighting DA
2NR - CP War-fighting
Navy
5
Opponent: Georgetown Fang-Kelley | Judge: OGorman
1AC Cyber
1NC Warfighting DA Ptx Iran XO CP Legal liberalism
2NR XO War-fighting
Texas
2
Opponent: Towson Thomas-Whitley | Judge: Keenan
1AC - Cybe Warming aff
1NC - Hacking K (securitywhiteness)
West Point
1
Opponent: GMU BW | Judge: Joe Keeton
1NC T Restriction Black Counter Gaze K
Block K
2NR K
West Point
4
Opponent: Vandy BM | Judge: Matthew Bartholamae
1AC - Pakistan Veto
1NC T - Restrict CMR DA War Powers DA Terrorism DA NMS CP
2NR CP CMR DA
To modify or delete round reports, edit the associated round.
Cites
Entry
Date
Cyber 1AC - ADA
Tournament: Adanationals | Round: 2 | Opponent: Wake Forest Villa-Stirrat | Judge: Taylor Plan Text – 1AC
Plan: The United States federal government should statutorily require that all offensive cyber operations be made consistent with the law of armed conflict, in accordance with the Tallinn Manual.
Advantage 1: China
Chinese fear of US cyber unilateralism means escalation of US-China war is probable – international LOAC principles are key VornDick, lieutenant commander, U.S. Navy, 13 (Wilson, previously worked at the Chinese Maritime Studies Institute at the U.S. Naval War College, “The Real U.S.-Chinese Cyber Problem,” 7-30-13, http://nationalinterest.org/commentary/the-real-us-chinese-cyber-problem-8796?page=show, DOA: 1-11-14, ara)
One crucial point lost amid the backdrop of the new digitized … should work to form one sooner rather than later, lest they push each other over the digital edge.
US restraint is key to preventing China attacks that cause espionage and attacks – those destroy US competitiveness and cause expansionist polices in Taiwan that guarantee war Mazza, Research Fellow, AEI, 13 (Michael, American Enterprise Institute, MA in IR from John Hopkins, program manager for AEI's annual Executive Program on National Security Policy and Strategy, “Cyber Attacks: An Unprecedented Threat to U.S. National Security,” 3-21-13, Statement before the House Committee on Foreign Affairs Committee on Europe, Eurasia, and Emerging Threats, http://docs.house.gov/meetings/FA/FA14/20130321/100547/HHRG-113-FA14-Wstate-MazzaM-20130321.pdf, DOA: 1-5-14, ara)
That third point is most relevant for our purposes. … in cyberspace from which all nations can benefit.
Taiwan crisis causes nuclear war Colby, et al., CSIS, 13 (Elbridge A., principal analyst and division lead for global strategic affairs at the Center for Naval Analyses, graduated from Harvard and Yale Law School, Abraham M. Denmark, VP for political and security affairs at the National Bureau of Asian Research, and John K. Warden, and a bunch of other smart people, “Nuclear Weapons and U.S.-China Relations: A Way Forward,” March 2013, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf, DOA: 1-11-14, ara)
Taiwan. Taiwan remains the single most …defense commitments in the Asia-Pacific region.
Cyber uniquely causes risk taking and lowers conflict inhibition in Taiwan Dobbins, et al., director, RAND International Security and Defense Policy Center, 11 (James F., Ambassador, David C. Gompert, Principal Deputy Director of National Intelligence from 2009 to 2010, Visiting Professor for National Security Studies at the United States Naval Academy, David A. Shlapak, Senior International Policy Analyst at RAND, Andrew Scobell, senior political scientist at the RAND Corporation, “Con?ict with China: Prospects, Consequences, and Strategies for Deterrence,” 2011, http://www.rand.org/content/dam/rand/pubs/occasional_papers/2011/RAND_OP344.pdf, DOA: 1-13-14, ara)
Generally speaking, direct defense by U.S. forces … if not quantity with Chinese advances in the military field.
China’s expansionism will encourage aggression and miscalc Friedberg, Princeton International Affairs professor, 2011 (Aaron, “China's Challenge at Sea”, 9-4, www.nytimes.com/2011/09/05/opinion/chinas-challenge-at-sea.html?_r=0, DOA 11-4-12, ldg)
Unfortunately, those constraints are being imposed … preserving the Asian power balance, but it must lead.
U.S. intelligence services carried out 231 offensive … provided few other details about the operations.
Reducing offensive operations is key to global norms – hypocrisy dooms current diplomacy Healy, Director, Cyber Statecraft Initiative, Atlantic Council, 13 (Jason, Director of the Cyber Statecraft Initiative at the Atlantic Council of the United States, editor of the first military history of cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012, “How Emperor Alexander Militarized American Cyberspace,” 11-6-13, http://www.foreignpolicy.com/articles/2013/11/06/how_emperor_alexander_militarized_american_cyberspace, DOA: 11-7-13, ara)
It could have been a priority to ensure the … of cyberspace everywhere -- a more stable and secure future.
Answering ambiguities of how cyberspace fits into international law are key to preventing cyber arms races that cause total war Finkelstein, Professor, University of Pennsylvania Law School, 12 (Claire, Director, Center for Ethics and the Rule of Law, PennLaw, “Roundtable on Cyberwar and the Rule of Law,” 10-15-12, https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/Cyberwar20Details.pdf, DOA: 1-5-14, ara)
Cyberweapons and cyberwarfare have … becomes a more integral aspect of national security.
Other nations will model us if we take a consistent position – now is key to strengthen norms based on the Tallinn Manual McGhee, Air Force cyber law attorney, 13 (James E, operational cyber law attorney with the 24th Air Force, Joint Base San Antonio, Lackland AFB, “Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy,” Spring 2013, Journal of Law and Cyber Warfare, Vol. 2, Iss. 1, p. 64-103, http://www.jlcw.org/wp-content/uploads/2013/09/2_JLCW_Cyber-Redux-The-Schmitt-Analysis-Tallinn-Manual-and-US-Cyber-Policy.pdf, DOA: 1-10-14, ara)
An additional discrepancy arises when considering the …, one cannot expect any consensus either.
Retaliation ensures attacks go nuclear Lawson, Utah Communications professor, 2009 (Sean, “Cross-Domain Response to Cyber Attacks and the Threat of Conflict Escalation”, 5-13, http://www.seanlawson.net/?p=477, ldg)
At a time when it seems impossible to avoid the … option for response to a massive cyberattack:
In addition, there are policy questions raised by the … quickly, or we will face the danger of cyber chaos and anarchy.
Scenario 1: Economy
Cyberwar collapses the economy Krepinevish, Staff for the Sec. of Def. and the National Defense Panel, 12 (Andrew, Krepinevich is the president of the center for strategic and budgetary assessments and served in the department of defense office of net assessment and was person staff of three secretaries of defense and has been of the Nation Defense Panel, the Defesne Science Board task Force, and the Defense Policy, he is also a West Point grad and has an M.P.A. and Ph.D. from Harvard, “Cyber Warfare a ‘Nuclear Option’?”, 8-24-12, http://www.csbaonline.org/publications/2012/08/cyber-warfare-a-nuclear-option/, accessed 7-11,13, aaw)
Given the increasing reliance on information … United States, neither is a surprise massive cyber attack likely to do so.
Economic shocks causes war---strong statistical support Royal, director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010 (Jedediah, Economics of War and Peace: Economic, Legal, and Political Perspectives, pg 213-215, ldg)
Less intuitive is how periods of economic decline may increase the … view presented here should be considered ancillary to those views.
Scenario 2: Smart Power
The perception of following international law in cyberspace is key to US smart power Koh, State Department legal advisor, 12 (Harold, international law professor at Yale, “Harold Koh on International Law in Cyberspace,” 9-19-12, http://opiniojuris.org/2012/09/19/harold-koh-on-international-law-in-cyberspace/, DOA: 1-5-14, ara)
That leads to my Final Question for this group: … in a way that more fully promotes our U.S. national interests.
Smart power is key to combat all global problems Armitage and Nye, CSIS, 7 (Richard L., president of Armitage International, and Joseph , Jr., distinguished service professor, Harvard University, “CSIS COMMISSION ON SMART POWER: A smarter, more secure America,” 2007, http://csis.org/files/media/csis/pubs/071106_csissmartpowerreport.pdf, DOA: 2-6-14, ara)
Smart power is neither hard nor soft—… of countering terrorism if we want to maintain our legitimacy.
Solvency – 1AC
Tallinn Manual standards solves – gives transparency on key issues and resolves ambiguities Corrin, national security staff writer, FCW, 13 (Amber, Federal Computer Week “What does international law mean for cyber warfare?” 4-2-13, http://fcw.com/Articles/2013/04/02/cyber-engagement-international-law.aspx?Page=1, DOA: 1-6-14, ara)
Creating rules of engagement for operations in … important is because it finally draws the line."
Congress is key to transparency and legitimacy Butler, Appellate Advocacy Counsel, Electronic Privacy Information Center , 13 (Alan, graduate of UCLA School of Law, formerly Chief Technology Editor of both the UCLA Journal of Law and Technology (JOLT) and the Entertainment Law Review (ELR), “When Cyberweapons End Up On Private Networks: Third Amendment Implications For Cybersecurity Policy,” American University Law Review 62.5, p. 1203-1238 2013, retrieved from ProQuest, DOA: 1-16-14, ara)
The Third Amendment implications of military … has not provided adequate guidance or legal balance to executive power in this area.
Alternatively, perhaps the Neustadt and … teeth of White House opposition.80
Multiple agencies aren’t covered by current rulings Rabkin and Rabkin, Hoover Institute, 12 (Jeremy, Professor of Law at George Mason University School of Law, serves on the Board of Directors of the U.S. Institute of Peace appointed by Bush and Obama, and Ariel, Postdoctoral Researcher on software designs, “To Confront Cyber Threats, We must Rethink the Law of Armed Conflict,” 2012, http://media.hoover.org/sites/default/files/documents/EmergingThreats_Rabkin.pdf, DOA: 1-5-14, ara)
Meanwhile, Congress—on its own initiative—enacted … in the endemic turf wars of American security policy.7
U.S. intelligence services carried out 231 … provided few other details about the operations.
Reducing offensive operations is key to global norms – hypocrisy dooms current diplomacy Healy, Director, Cyber Statecraft Initiative, Atlantic Council, 13 (Jason, Director of the Cyber Statecraft Initiative at the Atlantic Council of the United States, editor of the first military history of cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012, “How Emperor Alexander Militarized American Cyberspace,” 11-6-13, http://www.foreignpolicy.com/articles/2013/11/06/how_emperor_alexander_militarized_american_cyberspace, DOA: 11-7-13, ara)
It could have been a priority to …-- a more stable and secure future.
With the Pentagon now officially recognizing cyberspace as a … downside is higher than the government acknowledges."
Answering ambiguities of how cyberspace fits into international law are key to preventing cyber arms races that cause total war Finkelstein, Professor, University of Pennsylvania Law School, 12 (Claire, Director, Center for Ethics and the Rule of Law, PennLaw, “Roundtable on Cyberwar and the Rule of Law,” 10-15-12, https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/Cyberwar20Details.pdf, DOA: 1-5-14, ara)
Cyberweapons and cyberwarfare have become …becomes a more integral aspect of national security.
Other nations will model us if we take a consistent position – now is key to strengthen norms based on the Tallinn Manual McGhee, Air Force cyber law attorney, 13 (James E, operational cyber law attorney with the 24th Air Force, Joint Base San Antonio, Lackland AFB, “Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy,” Spring 2013, Journal of Law and Cyber Warfare, Vol. 2, Iss. 1, p. 64-103, http://www.jlcw.org/wp-content/uploads/2013/09/2_JLCW_Cyber-Redux-The-Schmitt-Analysis-Tallinn-Manual-and-US-Cyber-Policy.pdf, DOA: 1-10-14, ara)
An additional discrepancy arises when considering …this is addressed, one cannot expect any consensus either.
Retaliation ensures attacks go nuclear Lawson, Utah Communications professor, 2009 (Sean, “Cross-Domain Response to Cyber Attacks and the Threat of Conflict Escalation”, 5-13, http://www.seanlawson.net/?p=477, ldg)
At a time when it seems impossible to avoid … for response to a massive cyberattack:
In Pacific Forum’s PacNet #41 issue, Mihoko Matsubara correctly … and should be considered a top priority.
Independently, US restraint is key to China modeling which prevents espionage and attacks – those destroy US competitiveness and cause expansionist polices in Taiwan that guarantee war Mazza, Research Fellow, AEI, 13 (Michael, American Enterprise Institute, MA in IR from John Hopkins, program manager for AEI's annual Executive Program on National Security Policy and Strategy, “Cyber Attacks: An Unprecedented Threat to U.S. National Security,” 3-21-13, Statement before the House Committee on Foreign Affairs Committee on Europe, Eurasia, and Emerging Threats, http://docs.house.gov/meetings/FA/FA14/20130321/100547/HHRG-113-FA14-Wstate-MazzaM-20130321.pdf, DOA: 1-5-14, ara)
That third point is most relevant for our purposes. General … in cyberspace from which all nations can benefit.
Taiwan crisis causes nuclear war Colby, et al., CSIS, 13 (Elbridge A., principal analyst and division lead for global strategic affairs at the Center for Naval Analyses, graduated from Harvard and Yale Law School, Abraham M. Denmark, VP for political and security affairs at the National Bureau of Asian Research, and John K. Warden, and a bunch of other smart people, “Nuclear Weapons and U.S.-China Relations: A Way Forward,” March 2013, http://csis.org/files/publication/130307_Colby_USChinaNuclear_Web.pdf, DOA: 1-11-14, ara)
Taiwan. Taiwan remains the single … defense commitments in the Asia-Pacific region.
Independently, Chinese fear of US cyber unilateralism means escalation of US-China war is probable – LOAC principles are key to solve VornDick, lieutenant commander, U.S. Navy, 13 (Wilson, previously worked at the Chinese Maritime Studies Institute at the U.S. Naval War College, “The Real U.S.-Chinese Cyber Problem,” 7-30-13, http://nationalinterest.org/commentary/the-real-us-chinese-cyber-problem-8796?page=show, DOA: 1-11-14, ara)
One crucial point lost amid the backdrop of … later, lest they push each other over the digital edge.
China’s expansionism will encourage aggression and miscalc Friedberg, Princeton International Affairs professor, 2011 (Aaron, “China's Challenge at Sea”, 9-4, www.nytimes.com/2011/09/05/opinion/chinas-challenge-at-sea.html?_r=0, DOA 11-4-12, ldg)
Unfortunately, those constraints are being …Asian power balance, but it must lead.
This does not necessarily mean that the … that will inevitably be devoid of unrivalled US primacy.
Those go nuclear Walton, University of Reading Politics and International Relations professor, 07 (C. Dale., University of Hull, Ph.D. “Geopolitics of Great Power Politics in the Twenty-First Century : Multipolarity and the Revolution in Strategic Perspective.” June 2007. Pg. 49. Accessed: 10/03/2012. ADC)
Obviously, it is of vital importance … marked by close great power alliances.
Ultimately, the U.S. must be serious … as much as any other nation.
Plan Text – 1AC
Thus the Plan: The United States Federal Government should statutorily require that all offensive cyber operations be made consistent with the law of armed conflict, in accordance with the Tallinn Manual.
Solvency – 1AC
Tallinn Manual standards solves – gives transparency on key issues and resolves ambiguities Corrin, national security staff writer, FCW, 13 (Amber, Federal Computer Week “What does international law mean for cyber warfare?” 4-2-13, http://fcw.com/Articles/2013/04/02/cyber-engagement-international-law.aspx?Page=1, DOA: 1-6-14, ara)
Creating rules of engagement for operations in … important is because it finally draws the line."
Congress is key to transparency and legitimacy Butler, Appellate Advocacy Counsel, Electronic Privacy Information Center , 13 (Alan, graduate of UCLA School of Law, formerly Chief Technology Editor of both the UCLA Journal of Law and Technology (JOLT) and the Entertainment Law Review (ELR), “When Cyberweapons End Up On Private Networks: Third Amendment Implications For Cybersecurity Policy,” American University Law Review 62.5, p. 1203-1238 2013, retrieved from ProQuest, DOA: 1-16-14, ara)
The Third Amendment implications …to executive power in this area.
Plan: The United States federal government should statutorily require that all offensive cyber operations be made consistent with the law of armed conflict, in accordance with the Tallinn Manual.
Contention 1 – Warming
Cyber-attack’s coming now---actors are probing the grid Reed, Foreign Policy contributor, 12 (John, “U.S. energy companies victims of potentially destructive cyber intrusions”, killerapps.foreignpolicy.com/posts/2012/10/11/us_energy_companies_victims_of_potentially_destructive_cyber_attacks, DOA: 11-3-12, ldg)
Foreign actors are probing the networks … Stuxnet very far away from Iran," Kaspersky said.
Answering ambiguities of how cyberspace fits into international law are key to preventing cyber arms races that cause total war Finkelstein, Professor, University of Pennsylvania Law School, 12 (Claire, Director, Center for Ethics and the Rule of Law, PennLaw, “Roundtable on Cyberwar and the Rule of Law,” 10-15-12, https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/Cyberwar20Details.pdf, DOA: 1-5-14, ara)
Cyberweapons and cyberwarfare have … becomes a more integral aspect of national security.
Other nations will model us if we take a consistent position – now is key to strengthen norms based on the Tallinn Manual McGhee, Air Force cyber law attorney, 13 (James E, operational cyber law attorney with the 24th Air Force, Joint Base San Antonio, Lackland AFB, “Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy,” Spring 2013, Journal of Law and Cyber Warfare, Vol. 2, Iss. 1, p. 64-103, http://www.jlcw.org/wp-content/uploads/2013/09/2_JLCW_Cyber-Redux-The-Schmitt-Analysis-Tallinn-Manual-and-US-Cyber-Policy.pdf, DOA: 1-10-14, ara)
An additional discrepancy arises when considering the … this is addressed, one cannot expect any consensus either.
Cyberattacks risk nuclear meltdowns Kesler, Institute for Information Infrastructure Protection research coordinator, 11 (Brent, graduated from Dartmouth with a degree in computer science and has written Security in the News and graduated from the Monterey Institute of International Studies with a master's degree in international policy and a focus on terrorism, 9-9-11, “The Vulnerability of Nuclear Facilities to Cyber Attack”, accessed 10-4-13, http://edocs.nps.edu/npspubs/institutional/newsletters/strategic20insight/2011/SI-v10-I1_Kesler.pdf, aaw)
The United States has 104 nuclear power plants … all the vulnerabilities in a process control system.
There's never a shortage of things for Americans to worry … serves as a reminder that, in nuclear power, there's zero margin for major error.
Other nations will model US investment – it’s a bellwether of nuclear tech Adamantiades et al., ICG Aeolian Energy, 9 (A. Adamantiades, ICG Properties is a real estate development firm; and I. Kessides, The World Bank, "Nuclear power for sustainable development: Current status and future prospects," Energy Policy Volume 37, Issue 12, December 2009, Science Direct, accessed 8-5-12, mtf)
This paper describes the current status and future plans for expansion of … for action in other parts of the world.
Large-scale nuclear power transition solves warming – assumes resource and time restraints Knapp et al., University of Zagreb professor, 10 (Vladimir Knapp, Dubravko Pevec, and Mario Matijevi?, Faculty of Electrical Engineering and Computing, Department of Applied Physics, University of Zagreb in Croatia, "The potential of fission nuclear power in resolving global climate change under the constraints of nuclear fuel resources and once-through fuel cycles," Energy Policy Volume 38, Issue 11, November 2010, Science Direct, accessed 8-22-12, mtf)
In this study, we have investigated the … strategies and for public acceptance of nuclear energy.
Call me a converted skeptic. Three years … diplomatic spectrum about what can and should be done.
Warming causes extinction Tickell, Climate researcher 2008 (Oliver, Climate Researcher, The Gaurdian, “On a planet 4C hotter, all we can prepare for is extinction”, 8-11, http://www.guardian.co.uk/ commentisfree/2008/aug/11/ climatechange, ldg)
We need to get prepared for four degrees of global warming, Bob … could propel us towards a similar hothouse Earth.
The climate fight is about the post-2040 world. … basically don’t get any real effect.”
Contention Two – Framing
Prioritizing global warming is a prerequisite to solving inequality, racism, war, poverty and social justice Glick, National Coordinator of the Independent Progressive Politics Network, 04 (Ted, January 13, 2004, “Global warming: not just another issue” http://www.dissidentvoice.org/Jan04/Glick0113.htm, 9/15/12, atl)
I've been in and around the environmental movement … for democracy, peace and justice in November.
Deliberative policymaking through debate is the crucial internal link to solving warming through public policy and subsumes their critiques of traditional persuasion Isham, Middlebury College Economics Associate Professor 10 (Jon, “The Promise of Deliberative Democracy”, http://www.thesolutionsjournal.com/node/775, 9/23/12, atl)
Getting to 350 parts per million CO2 in the atmosphere … seek out deliberative polls in their decision-making process.
Simulation key to motivate responses to climate risks Marks et al, Center for Research on Environmental Decisions (CRED), Columbia University, 07 (Sabine, “Communication and mental processes: experiential and analytic processing of uncertain climate information” Global Environmental Change, 17 (2007), pp. 47–58, 9/15/12, atl)
Based on the observation that experiential and … in the process of individual and group decision-making.
Specifically true for nature Deudney, Johns Hopkins University Professor of Political Science, 99 (Daniel, Contested Grounds, SUNY Press, p. 50, 9/15/12, atl)
First, to provide a robust analysis of the … the key to bringing nature back into social theory.
Our deployment of risk is enabling – we need to visualize climate change to shake up political apathy Beck, Munich Professor of Sociology, 10 (Ulrich, “Climate for Change, or How to Create a Green Modernity?”, Theory Culture Society 2010 27: 254, 9/15/12, atl)
Sixth thesis: The political explosiveness of … concern manages to be at least as powerful as this hunger for modernization or it is condemned to repeated failure.
The inclusion of hypothetical impact scenarios supercharges the deliberative process by providing a normative means of assessing consequences Larsen, Royal Institute of Technology Department of Philosophy and History of Technology, 9 (Katarina, “Climate change scenarios and citizen-participation: Mitigation and adaptation perspectives in constructing sustainable futures”, Habitat International Volume 33, Issue 3, July 2009, Pages 260–266, 9/23/12, atl)
In constructing normative scenarios a set of images … the result, both the content sustainability and the capacity to act might increase.
Science DOES work and its predictions ARE verified – experts are experts because their theories ARE TRUE Tallis, one of the top living polymaths in the world, 95 (Raymond, British philosopher, secular humanist, poet, novelist, cultural critic and retired medical doctor, doctor at the University of Oxford, was Professor of Geriatric Medicine at the University of Manchester and a consultant physician in Health Care of the Elderly in Salford, “Newton's Sleep: The Two Cultures and the Two Kingdoms”, Palgrave Macmillan; New Ed edition (18 Sep 1995), 9/14/12, atl)
The aim of Harre’s ‘microsociology of scientists’ is … thought that are quite unlike anything else in human life."
2/8/14
Cyber 2AC - CP - OLC
Tournament: Bulldogdebates | Round: 4 | Opponent: Emory Adler-Bontha | Judge: Corrigan Perm do both – combining strategies solves best for cyber Dycus, professor, Vermont Law School, 10 (Stephen, internationally recognized authority on national security law, LLB from Southern Methodist University, founding chair of the National Security Law Section of the Association of American Law Schools, “Congress’s Role in Cyber Warfare”, 8-11-10, http://jnslp.com/wp-content/uploads/2010/08/11_Dycus.pdf, DOA: 1-11-14, ara)
Congress must work hand … among federal agencies and congressional committees.8
The perm shields from politics – Congressional involvement makes the plan popular – the CP links more Corcoran, law professor, University of New Hampshire School of Law, 11 (Erin B., Director, Social Justice Institute, University of New Hampshire School of Law, “Obama's Failed Attempt to Close Gitmo: Why Executive Orders Can't Bring About Systemic Change,” March 2011, 9 U.N.H. L. Rev. 207, l/n, DOA: 1-13-14, ara)
Finally, this example highlights that issuing … the President's future controversial policy changes.
Congress is key to cyber modeling and de-escalation – executive control of cyberweapons guarantees nuclear war Rothschild, editor, The Progressive, 13 (Matthew, “The Dangers of Obama’s Cyber War Power Grab,” 2-4-13, http://www.progressive.org/dangers-of-obama-cyber-war-power-grab, DOA: 1-13-14, ara)
When our founders were drafting … his successors. They, too, worry about the temptations of a President.
CP can’t solve, serves as a rubber stamp AND links to politics – generates adverse reactions from congress Posner, University of Chicago Law School Prof, 11 (Eric, “Deference To The Executive In The United States After 9/11 Congress, The Courts And The Office Of Legal Counsel,” accessed 9-29-13, http://www.law.uchicago.edu/files/file/363-eap-deference.pdf, hec)
These two events neatly encapsulate the dilemma …, it will be ignored. In no circumstance could it be a “constraint.”
2/4/14
Cyber 2AC - CP - XO
Tournament: Navy | Round: 5 | Opponent: Georgetown Fang-Kelley | Judge: OGorman Perm do both – combining strategies solves best for cyber Dycus, professor, Vermont Law School, 10 (Stephen, internationally recognized authority on national security law, LLB from Southern Methodist University, founding chair of the National Security Law Section of the Association of American Law Schools, “Congress’s Role in Cyber Warfare”, 8-11-10, http://jnslp.com/wp-content/uploads/2010/08/11_Dycus.pdf, DOA: 1-11-14, ara)
Congress must work hand in hand with the … battles among federal agencies and congressional committees.8
The perm shields from politics – Congressional involvement makes the plan popular – the CP links more Corcoran, law professor, University of New Hampshire School of Law, 11 (Erin B., Director, Social Justice Institute, University of New Hampshire School of Law, “Obama's Failed Attempt to Close Gitmo: Why Executive Orders Can't Bring About Systemic Change,” March 2011, 9 U.N.H. L. Rev. 207, l/n, DOA: 1-13-14, ara)
Finally, this example highlights that issuing … when advancing the President's future controversial policy changes.
Congress is key to cyber modeling and de-escalation – executive control of cyberweapons guarantees nuclear war Rothschild, editor, The Progressive, 13 (Matthew, “The Dangers of Obama’s Cyber War Power Grab,” 2-4-13, http://www.progressive.org/dangers-of-obama-cyber-war-power-grab, DOA: 1-13-14, ara)
When our founders were drafting the Constitution, … about the temptations of a President.
1/23/14
Cyber 2AC - Case
Tournament: Bulldogdebates | Round: 4 | Opponent: Emory Adler-Bontha | Judge: Corrigan Naysayer’s gonna naysay – overwhelming consensus of experts goes aff Sales, Assistant Law Professor, GMU, 13 (Nathan Alexander, graduated from Duke Law School magna cum laude, served at the Office of Legal Policy at the U.S. Department of Justice, “REGULATING CYBER-SECURITY,” Northwestern University Law Review, Vol. 107, No. 4, p. 1503-1568, http://www.law.northwestern.edu/lawreview/v107/n4/1503/LR107n4Sales.pdf, DOA: 1-6-14, ara)
The Red Army had been gone for years, but it still had the … adversaries (such as foreign intelligence services).
Prior notification is impossible – setting guidelines and ex post review is sufficient Dycus, professor, Vermont Law School, 10 (Stephen, internationally recognized authority on national security law, LLB from Southern Methodist University, founding chair of the National Security Law Section of the Association of American Law Schools, “Congress’s Role in Cyber Warfare”, 8-11-10, http://jnslp.com/wp-content/uploads/2010/08/11_Dycus.pdf, DOA: 1-11-14, ara)
Given these characteristics of … significant use of cyber weapons.
Cyber offenses trade off with defense and causes prolif – game theory proves – uniquely more risk than deterrence Moore, et al., Center for Research on Computation and Society, Harvard University, 10 (Tyler, Allan Friedman, and Ariel D. Procaccia, “Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems,” September 2010, http://www.nspw.org/papers/2010/nspw2010-moore.pdf, DOA: 1-12-14, ara)
7. Conclusion The militarization of … that promotes better security investment.
Could the Yucca Mountain case put the … precedent to force Obama to come back to Congress.
2/4/14
Cyber 2AC - DA - China Soft Power
Tournament: Adanationals | Round: 2 | Opponent: Wake Forest Villa-Stirrat | Judge: Taylor Your authors are biased - CO2 not key, no weather events, models fail, and other countries don’t follow Watts, WUWT, ‘12 (Anthory “ Lindzen at Sandia National Labs: ‘climate models are flawed’” A press release provided by Sandia National Labs to Wattsupwiththat, 7-25-12 accessed: 9-24-12 mlb)
Massachusetts Institute of Technology professor Richard …are always fluctuating by tenths of a degree.
Adherence to the rule of law is especially … inhumane, or iniquitous way.29
We don’t prevent OCOs or slow them down, just say they have to comply with international law – means we can’t do preventative attack
Oversight is necessary in crisis situations – only way to accurately evaluate threats Holmes, NYU Law Prof, 9 (Stephen, April, “The Brennan Center Jorde Symposium on Constitutional Law: In Case of Emergency: Misunderstanding Tradeoffs in the War on Terror,” California Law Review, 97 Calif. L. Rev. 301, hec)
The most persuasive argument for executive…that much more tenuous and open to question.¶ Note: edited for language
Unchecked cyber-attacks disrupt communication lines – guarantees conflict escalation Rabkin and Rabkin, Hoover Institute, 12 (Jeremy, Professor of Law at George Mason University School of Law, serves on the Board of Directors of the U.S. Institute of Peace appointed by Bush and Obama, and Ariel, Postdoctoral Researcher on software designs, “To Confront Cyber Threats, We must Rethink the Law of Armed Conflict,” 2012, http://media.hoover.org/sites/default/files/documents/EmergingThreats_Rabkin.pdf, DOA: 1-5-14, ara)
In twentieth century bombing campaigns, …, “use it or lose it” decision-making.
3/14/14
Cyber 2AC - DA - Markets
Tournament: Adanationals | Round: 2 | Opponent: Wake Forest Villa-Stirrat | Judge: Taylor EU leadership is insufficient-lack of effective soft power, allies, and policies Lobjakas, Estonian political analyst, 2010 Ahto, September 22, “Hand To Mouth,” Lexis, d/a 11-16-10, ADS
A report by the European Council for … one's mouth where one's money is?
3/14/14
Cyber 2AC - DA - Politics
Tournament: Navy | Round: 5 | Opponent: Georgetown Fang-Kelley | Judge: OGorman The plan’s not perceived – most specific evidence Schmitt, co-director, Marilyn Ware Center for Security Studies, AEI, 11 (Gary, director of AEI's Program on American Citizenship, former staff director of the Senate Select Committee on Intelligence, formerly executive director of the President's Foreign Intelligence Advisory Board, “New authorization, new questions for cyber attacks,” 12-15-11, http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/, DOA: 1-14-14, ara)
The press (and the White House) has been… law of armed conflict; and (2) the War Powers Resolution.
The plan would be viewed as a concession – creates a climate of bipartisanship Shane, Chair in Law, Moritz College of Law, Ohio State University, 13 (Peter M., previously visiting professor at Harvard Law School, “Using the Syria Debate to Launch War Powers Reform,” 9-9-13, http://www.huffingtonpost.com/peter-m-shane/using-the-syria-debate-to_b_3881124.html, DOA: 1-15-14, ara)
Remarkably, however, it is possible in the … interventionists and perhaps even some military hawks.
The Senate should move … a nuclear power,” he said.
The plan’s not perceived – most specific evidence Schmitt, co-director, Marilyn Ware Center for Security Studies, AEI, 11 (Gary, director of AEI's Program on American Citizenship, former staff director of the Senate Select Committee on Intelligence, formerly executive director of the President's Foreign Intelligence Advisory Board, “New authorization, new questions for cyber attacks,” 12-15-11, http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/, DOA: 1-14-14, ara)
The press (and the White House) has been … conflict; and (2) the War Powers Resolution.
The plan would be viewed as a concession – creates a climate of bipartisanship Shane, Chair in Law, Moritz College of Law, Ohio State University, 13 (Peter M., previously visiting professor at Harvard Law School, “Using the Syria Debate to Launch War Powers Reform,” 9-9-13, http://www.huffingtonpost.com/peter-m-shane/using-the-syria-debate-to_b_3881124.html, DOA: 1-15-14, ara)
Remarkably, however, it is possible in … perhaps even some military hawks.
The most important person in … diplomacy forward, he'll have Harry Reid to thank.
2/4/14
Cyber 2AC - DA - Politics - Patents
Tournament: Adanationals | Round: 2 | Opponent: Wake Forest Villa-Stirrat | Judge: Taylor No impact to patents – impacts are industry-fueled hype, not outside historical trends, don’t cost society, and don’t slow tech Merbeth, chief policy counsel, Intellectual Ventures, 2-18 (Russ,“Five Fairy Tales To Quash in 2014,” 2-18-14, http://www.intellectualventures.com/insights/archives/five-fairy-tales-to-quash-in-2014, DOA: 2-22-14, ara)
As Congress and regulators suit up for … against big corporate infringers.
The plan’s not perceived – most specific evidence Schmitt, co-director, Marilyn Ware Center for Security Studies, AEI, 11 (Gary, director of AEI's Program on American Citizenship, former staff director of the Senate Select Committee on Intelligence, formerly executive director of the President's Foreign Intelligence Advisory Board, “New authorization, new questions for cyber attacks,” 12-15-11, http://www.aei-ideas.org/2011/12/authorization-for-cyber-attacks/, DOA: 1-14-14, ara)
The press (and the White House) has been … conflict; and (2) the War Powers Resolution.
Now that the smoke has cleared from … vote that can be used against them politically.
3/14/14
Cyber 2AC - DA - War Powers
Tournament: Navy | Round: 5 | Opponent: Georgetown Fang-Kelley | Judge: OGorman Unchecked cyber-attacks disrupt communication lines – guarantees conflict escalation Rabkin and Rabkin, Hoover Institute, 12 (Jeremy, Professor of Law at George Mason University School of Law, serves on the Board of Directors of the U.S. Institute of Peace appointed by Bush and Obama, and Ariel, Postdoctoral Researcher on software designs, “To Confront Cyber Threats, We must Rethink the Law of Armed Conflict,” 2012, http://media.hoover.org/sites/default/files/documents/EmergingThreats_Rabkin.pdf, DOA: 1-5-14, ara)
In twentieth century bombing campaigns, …it or lose it” decision-making.
Oversight is necessary in crisis situations – only way to accurately evaluate threats Holmes, NYU Law Prof, 9 (Stephen, April, “The Brennan Center Jorde Symposium on Constitutional Law: In Case of Emergency: Misunderstanding Tradeoffs in the War on Terror,” California Law Review, 97 Calif. L. Rev. 301, hec)
The most persuasive argument for executive … seems that much more tenuous and open to question.¶
Legal constraints don’t prevent flex Holmes, NYU Law Prof, 9 (Stephen, “In Case of Emergency: Misunderstanding Tradeoffs in the War on Terror,” accessed 10-2-13, hec)
Campaigners for executive discretion …during emergencies, including national-security emergencies.
1/23/14
Cyber 2AC - K - Legal Liberalism
Tournament: Navy | Round: 5 | Opponent: Georgetown Fang-Kelley | Judge: OGorman Oppositional views of the law and it’s use for war are inevitable – ONLY the permutation resolves academic conflict Luban, Professor of Law and Philosohpy at Georgetown University, ’13 (David, “Military Necessity and the Cultures of Military Law,” Leiden Journal of International Law, Volume 26, Issue 02, pp 315-349, DATE ACCESSED: 12/15/13, LMM)
These arguments about military necessity are … for achieving whatever convergence is humanly possible.
Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2002 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or an unfortunate feature of the … promotes arrogance. And it undermines political effectiveness.
Legal restraints work – the theory of the exception is self-serving and wrong Scheuerman, Professor of Political Science at the Indiana University, 06 (William E., Winter, “Carl Schmitt and the Road to Abu Ghraib”, Constellations, Volume 13, Issue 1, date accessed: 12/16/13, LMM)
Yet this argument relies on Schmitt’s controversial …to the special problem of irregular combatants.
Legal interventions work and the alt is worse Margulies and Metcalf, Law Professors of Northwestern and Yale, 11 (Joseph and Hope 02/11, “Terrorizing Academia”, Journal of Legal Education, Volume 60, Number 3, date accessed: 12/16/13, LMM)
From the vantage of 2010, it appears the interventionist … law should be, but how it functions and whom it serves.
Legal norms don’t cause wars and the alt can’t effect liberalism Luban, Professor of Law at Georgetown University, 10 (David, Spring, “Beyond Traditional Concepts of Lawfare: Carl Schmitt and the Critique of Lawfare”, 43 Case W. Res. J. Int'l L. 457, date accessed: 12/14/13, LMM)
Among these associations is the … It would simply be a bad one.
International monopoly on violence has led to the rights revolutions – creating a psychological deterrent against all forms of xenophobia – bringing out the best in human nature Pinker, Johnstone Family Professor of Psychology – Harvard, 11 Steven, September 27, 2011, “A History of Violence: Edge Master Class 2011”, http://edge.org/conversation/mc2011-history-violence-pinker, 10/21/11, atl
The final historical development I call the …the institutions of civilization and enlightenment that have made it possible.
1/23/14
Cyber 2AC - K - Cap
Tournament: Bulldogdebates | Round: 6 | Opponent: James Madison Miller-Lepp | Judge: Herndon *Capitalism can be used to better civilization. Rothkrug, Monthly Review, 1990 (Paul, “Ecological and historical timetables - comments on 'Socialism and Ecology'; includes reply of editors - letter to the editor Monthly Review, March, 1990, http://findarticles.com/p/articles/mi_m1132/is_n10_v41/ai_8834605/pg_2/?tag=content;col1, ldg)
No institution is or ever has been a … success for that very effort.
*Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or an unfortunate … undermines political effectiveness.
*No root cause Goldstein 03 (Joshua, Prof of Int'l Relations @ American University, War and Gender: How Gender Shapes the War System and Vice Versa, p. 412)
First, peace activists face a dilemma in … as the main cause of war seems to be empirically inadequate.
OCOs link, stopping them doesn’t – the military-industrial complex uses the private market to hide security flaws that it can exploit later – aff solves Gjelten, World Affairs Journal, 13 (Tom, NPR correspondent, “First Strike: US Cyber Warriors Seize the Offensive,” Jan/Feb 2013, http://www.worldaffairsjournal.org/article/first-strike-us-cyber-warriors-seize-offensive, DOA: 12-10-13, ara)
Mills was describing offensive cyber actions. … the demand for their services.
Capitalism sustainable-empirics AFP 2008 (Atlantic Free Press, “Creative Destruction - The Madness of the Global Economy”, 2-5, lexis, ldg)
In 1997, a major financial crisis … on the verge of total collapse.
*Turn- can’t abandon growth, past the limits of growth-only way to avert extinction is through technological progress AtKisson, former executive editor of In Context: A Quarterly of Humane Sustainable Culture, 2003 (Alan, “Sustainability is Dead— Long Live Sustainability”, 3-20, http://www.rrcap.unep.org/uneptg06/course/Robert/SustainabilityManifesto2001.pdf, ldg)
At precisely the moment when … an intensely scientific and technological path, and we can never stop.
Reps 1st is bad – reps only matter because of their pragmatic effect on policy Dewsbury, Bristol University geographical studies professor, 2003 (John-David, Environment and Planning A 2003, volume 35, pages 1907-1932 -- http://www.sages.unimelb.edu.au/news/mhgr/dewsbury.pdf, ldg)
That someone includes us -- the social scientists, the researchers, … understanding at all -- that is critically flawed.
They have it backwards – war rhetoric that justifies offensive approaches is bad – the aff is a step away by limiting offensive operations Rid, reader, Department of War Studies, King’s College, 13 (Thomas, “The Obama administration's lousy record on cyber security,” 2-4-13, http://www.newrepublic.com/article/112314/obama-administrations-lousy-record-cyber-security, DOA: 1-12-14, ara)
But the rhetoric of war doesn't accurately describe … Act of 2012, has stalled indefinitely in the Senate.
Only way to achieve true change is through policy relevance. Gunnng, deputy director of the Centre for the Study of Radicalisation and Contemporary Political Violence at the University of Wales 2007 (Jeroen, “A Case for Critical Terrorism Studies?” Government and Opposition Volume 42 Issue 3, ebsco, ldg)
The notion of emancipation also crystallizes … universalist without betraying its 'critical' commitment. Note: SSI=socioscientific issues
Our specific proposals are key to creating change and improving our advocacy skills – the K isn’t sufficient unless they win that their way of addressing problems is effective - Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2002 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or an unfortunate …. And it undermines political effectiveness.
Their method of hacking gets misconstrued by other nations – make them prove that their method actually accomplishes real world difference
Individualized politics fail and get coopted Mann, Professor of English at Pomona, 1995 (Paul, “Stupid Undergrounds”, PostModern Culture 5:3, Project MUSE, ldg)
Intellectual economics guarantees that … futility and that immanent obsolescence. One must pursue it still.
Suffering outweighs- only concrete action solves Ling, New School International Affairs professor, 2001 (LHM, Post-Colonial International Relations: Conquest and Desire Between Asia and the West, pg 59-60, ldg)
Without concrete action for change, … obligation to do anything about it' (Spegele, 1992: 174).
Empiricism is sufficient and alternatives collapse into endless unfalsifiable theorizing Owen, reader in political theory at the University of Southampton, 2002 (David, “Re-orienting International Relations: On Pragmatism, Pluralism and Practical Reasoning”, Millennium - Journal of International Studies 2002 31: 653-673., Sage Journals, ldg)
Commenting on the ‘philosophical turn’ in IR, Wæver … and so a potentially vicious circle arises.
Military can accurately predict cyber threats – our impacts are real Kerner, senior editor, eWEEK, 13 (Sean Michael, tech news organization, quoting Adam Meyers, vice president of intelligence at security vendor CrowdStrike, “Do Cyber-Offensive Strategies Make Sense,” 9-30-13, http://www.eweek.com/security/do-cyber-offensive-strategies-make-sense.html, DOA: 11-7-13, ara)
Understanding what an attack and an attacker is … and forecast what the outcome might be."
Threat construction is inevitable Loader et al., All Souls College criminology professor, 2007 (Ian, Civilizing Security, pg 258-9, ldg)
The way ahead, in our view, and the focus of our closing remarks, is to … the inevitable exists in some form or other.
Apocalyptic rhetoric is good, it does not represent an escape from the future, but tools for its reparation. Skrimshire, 3-25-05
In conclusion, I would like to argue … itself the apocalypse; “Come” is apocalyptic.”14
5. Turn – the aff’s ethical obligation to prevent specific atrocities precedes ontology—the death of the "other" calls our very being into question Bulley 04 (Dan, PhD Candidate @ Department of Politics and International Studies--University of Warwick, "Ethics and Negotiation," www.lancs.ac.uk/fss/politics/events/aber/ethics20and20negotiation20-20bulley.doc)
Crucially an openness to justice cannot be an a priori good thing. … remains a closure. And every closure is problematic.
Decolonizing the academy is an attempt to proclaim innocence and assuage our guilt – proposing specific reforms is necessary to overcome the temptations of this palliative---also proves T version of aff Tuck, State University of New York, and Yang, UC San Diego, 12 (Eve, Assistant Professor of Educational Foundations, State University of New York at New Paltz, and K. Wayne, University of California, San Diego, “Decolonization is not a metaphor,” 2012, Decolonization: Indigeneity, Education and Society Vol. 1, No. 1, pp. 1-?40, http://decolonization.org/index.php/des/article/view/18630/15554, DOA: 1-4-13, ara)
Fanon told us in 1963 that decolonizing the mind is the first step, not … offer any pathways that lead to decolonization.
*We can use security discourse for progressive aims. Huysmans, Open University Politics Lecturer, 99 (Jef, “Language And The Mobilisation Of Security Expectations. The Normative Dilemma Of Speaking And Writing Security,” www.essex.ac.uk/ecpr/events/jointsessions/paperarchive/mannheim/w18/huysmans.pdf, DOA: 8-15-11, ldg)
There is no solution for the normative …. that should be secured.42
Military can accurately predict cyber threats – our impacts are real Kerner, senior editor, eWEEK, 13 (Sean Michael, tech news organization, quoting Adam Meyers, vice president of intelligence at security vendor CrowdStrike, “Do Cyber-Offensive Strategies Make Sense,” 9-30-13, http://www.eweek.com/security/do-cyber-offensive-strategies-make-sense.html, DOA: 11-7-13, ara)
Understanding what an attack and an …forecast what the outcome might be."
Empiricism is sufficient and alternatives collapse into endless unfalsifiable theorizing Owen, reader in political theory at the University of Southampton, 2002 (David, “Re-orienting International Relations: On Pragmatism, Pluralism and Practical Reasoning”, Millennium - Journal of International Studies 2002 31: 653-673., Sage Journals, ldg)
Commenting on the ‘philosophical turn’ in IR, … and so a potentially vicious circle arises.
*Securitization is inevitable. Loader et al., All Souls College criminology professor, 2007 (Ian, Civilizing Security, pg 258-9, ldg)
The way ahead, in our view, and the focus of our … the inevitable exists in some form or other.
Even if predictions aren’t perfect acting on relative confidence of scenarios materializing is good---the alt is either political inaction or pure reaction Ulfelder, Political Instability Task Force research director, 2011 (Jay, “Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing)”, 5-5, dartthrowingchimp.wordpress.com/2011/05/05/why-political-instability-forecasts-are-less-precise-than-wed-like-and-why-its-still-worth-doing/, DOA: 11-4-12, ldg)
If this is the best we can do, then what’s …preparation stand a decent chance of making a (positive) difference.
Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or an unfortunate … And it undermines political effectiveness.
2/4/14
Cyber 2AC - T - OCO
Tournament: Bulldogdebates | Round: 6 | Opponent: James Madison Miller-Lepp | Judge: Herndon 2. Counter-interpretation: OCO includes infiltration, info stealing, and attacks Finkelstein, Professor, University of Pennsylvania Law School, 12 (Claire, Director, Center for Ethics and the Rule of Law, PennLaw, “Roundtable on Cyberwar and the Rule of Law,” 10-15-12, https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/Cyberwar20Details.pdf, DOA: 1-5-14, ara)
The United States and its allies ... War’s nuclear arms race.
2/4/14
Cyber 2AC - Warming Case
Tournament: Texas | Round: 2 | Opponent: Towson Thomas-Whitley | Judge: Keenan 2. Policy simulation key to creativity and decision-making - detachment is key to its revolutionary benefits Eijkman, University of New South Wales Australian Defence Force Academy Visiting Fellow, 2012 (Dr Henk, University of New South Wales Australian Defence Force Academy Independent consultant, Annasaheb Dange College of Engineering and Technology in India Visiting Professor of Academic Development, has taught at various institutions in the social sciences and his work as an adult learning specialist has taken him to South Africa, Malaysia, Palestine, and India. He publishes widely in international journals, “The role of simulations in the authentic learning for national security policy development: Implications for Practice,” http://nsc.anu.edu.au/test/documents/Sims_in_authentic_learning_report.pdf, DOA: 10-19-12, ads)
Policy simulations stimulate Creativity Participation in … process in the desired direction
3. Debating specific policies on war powers makes us better advocates against government violence – criticism without policy details is bankrupt Mellor, European University Institute, 13 (Ewan, “Why Policy Relevance is a Moral Necessity: Just War Theory, Impact and UAVs”, DOA: 10-1-13, http://www.academia.edu/Documents/in/Drones_Targeted_Killing_Ethics_of_War, llc)
This section of the paper considers more generally the need for … that are necessary for democratic politics. 52
2/8/14
Pakistan 1AC - JMU
Tournament: JMU | Round: 1 | Opponent: Wake CH | Judge: Jensen Plan
The United States Federal Government should increase restrictions on the war powers authority of the President by requiring that the President acquire the approval of the Pakistani government for remotely piloted aircraft targeting entities within Pakistan
Advantage 1 - Sharif
Status quo drones kill Sharif’s political capital – plan is the only way to consolidate a win Markey, Council on Foreign Relations, 7-16-13 (Daniel, “A New Drone Deal For Pakistan,” accessed 7-30-13, http://troubledkashmir.com/kashmir/?p=5370, LMM)
For all its successes, the U.S. drone … especially when it comes to target selection.
If you want to gain a good insight … what he calls the "youth bulge."
Nuclear war Rosenbaum, Slate columnist, 11 (Ron, How the End Begins: The Road to a Nuclear World War III, March 2011, google books, pg16-19, accessed 10-25-11, mss)
Pakistan has long been a regional nuclear war …nuclear flashpoint we face. Unless you count…
Pakistan stability key to the global economy- trillions in debt, mega-refugee crisis, dirty bombs, and conflict Walayat, financial analyst, 10 (Nadeem, editor of the Market Oracle, over 20 years’ experience of trading derivatives, portfolio management and analysing the financial markets "Pakistan Collapse Could Trigger Global Great Depression and World War III," The Market Oracle, 1-16-10, www.marketoracle.co.uk/Article16543.html, accessed 10-25-11, mss)
Pakistan Collapse Could Trigger … Depression ultimately resulted in the Second World War.
Global economic crisis causes war---strong statistical support Royal, director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010 (Jedediah, Economics of War and Peace: Economic, Legal, and Political Perspectives, pg 213-215, ldg)
Less intuitive is how periods of economic decline may … here should be considered ancillary to those views.
Scenario 2: Balochistan
Squo efforts in Baluchistan fail – Sharif’s reforms are key Zehra, Intelligence Analyst for South Asia Monitor, 13 (Nasim, 7-22, “ Will Sharif’s Capacity Match His Resolve?”, date accessed: 9-11-13, http://southasiamonitor.org/detail.php?type=nandnid=5240, LMM)
The curse of terrorism too hit Pakistan’s three … question Pakistanis want an answer to.
Pakistani ambassador to the U.S. Sherry … action against really important threats.
Unilateral drones in FATA spur anti-Americanism, blowback, and increased radical takeover - plan key to solve Masood, Professor of Law at Monmouth College, 13 (Hassan, “Death From the Heavens: The Politics of the United States’ Drone Campaign in Pakistan’s Tribal Areas”, date accessed: 9-14-13, LMM)
Fricker and Plaw draw attention to the fact that … its tracks by the people most directly affected by it.
Sharif’s stance on TTP is weak now and US drone strikes destroys his credibility Jan, Analyst and the Pakistan Team Lead for the American Enterprise Institute’s Critical Threats Project, 13 (Reza, 07-13, His work has focused on South Asian security as well as domestic and regional politics, energy and economic issues. He specializes in the Taliban insurgency, terrorist groups in South Asia, the Pakistani military and regional counterinsurgency strategy and operations. Reza has briefed U.S. representatives and senior congressional staff as well as members of the U.S. military, intelligence and law enforcement communities. His writings and analyses have been widely published, including in the New York Times, Foreign Policy and Small Wars Journal, among others. Reza graduated with honors from Georgetown University’s School of Foreign Service where he received a B.S.F.S. in International Politics, concentrating in Security Studies. Reza is from Karachi, Pakistan, “The Future of Pakistan: What To Expect From Nawaz Sharif’s New Government”, 9-3-13, http://www.criticalthreats.org/sites/default/files/pdf_upload/analysis/The_Future_of_Pakistan_RJan_20130731.pdf, LMM)
One of the principal challenges confronting … consensus on how to approach the TTP.
A drone strike in Pakistan’s tribal …of the guarantors, though talks did not materialize.
Independently, instability risks nuclear terror – high risk of loose Pakistani nukes Rettig, New York University, 2011 (Michael D., Masters student of International Relations, "Preserving Pakistani Security," World Press, 9-29-11, http://www.worldpress.org/Asia/3815.cfm#down, accessed 10-26-11, mtf)
The internal security of Pakistan and its … increase the future likelihood of the first scenario.
In 1914, a terrorist assassinated Archduke Franz … greatest threat we face from terrorism.
Terrorism uniquely causes conflict – overrides other checks on conflict Tripathi, Assistant Professor at the Department of International Relations of South Asian University, 12 (Dhananjay, 4-1, “Energy Security: The Functional Area of Regional Cooperation for South Asia”, date accessed: 9-14-13, http://133.87.26.249/dspace/bitstream/2115/50918/1/EBR3-2_006.pdf, LMM)
The problem does not lie on … a need for better cooperation in some functional area
Giving veto power to Pakistan key - creates sustainable ways to eliminate terrorist havens in Afghanistan and Pakistan Gerstein, Politico Reporter, 7-29-11 (Josh, “Dennis Blair rips Obama White House,” accessed 8-25-13, http://www.politico.com/news/stories/0711/60199.html, LMM)
Former Director of National Intelligence Dennis Blair … northwest part of Pakistan under control.”
A terrorist nuclear attack, and even the use of … not help the chances of nuclear restraint.
10/11/13
Pakistan 1AC vs Ks - West Point
Tournament: West Point | Round: 5 | Opponent: UVM BB | Judge: Jeff Roberts Plan
The United States Federal Government should increase restrictions on the war powers authority of the President by requiring that the President acquire the approval of the Pakistani government for remotely piloted aircraft targeting entities within Pakistan
Contention 1: Sharif
Status quo drones kill Sharif’s political capital – plan is the only way to consolidate a win Markey, Council on Foreign Relations, 7-16-13 (Daniel, “A New Drone Deal For Pakistan,” accessed 7-30-13, http://troubledkashmir.com/kashmir/?p=5370, LMM)
For all its successes, the U.S. …, especially when it comes to target selection.
Sharif key to Indo-Pak relations – that solves Afghanistan, economy, and Asia stability and nuclear war – political capital in military strategies shatters the opposition Lees, Washington attorney, 9-28 (Kevin, associate attorney at Latham and Watkins LLP in Washington, D.C, Editor and Foreign Policy Analyst at Suffragio, “A More Important UN Handshake,” 9-28-13, http://nationalinterest.org/commentary/more-important-un-handshake-9145?page=1, DOA: 10-9-13, ara)
The global foreign-policy establishment's gaze … theory on nuclear proliferation is correct.
Prime Minister Nawaz Sharif said in … challenges faced by the country.
Contention 2: Framing
The roll of the ballot is to simulate enacting the plan - debate is never the site for social change, only for learning the skills to advocate for change Atchison, Wake Forest University Director of Debate, and Panetta, University of Georgia Director of Debate, 2009 (Jarrod, Edward, “Intercollegiate Debate and Speech Communication: Issues for the Future,” The SAGE Handbook of Rhetorical Studies, Lunsford, Andrea, ed., 2009, p. 317-334)
The final problem with an individual … by a great number of people.
US imperialist policy is inevitable – the alternative is authoritarianism – we don’t have to defend every part of America, just prove that our aff is better than the status quo Sussman, researcher and columnist, Swarthmore College, 12 (Sam, International Policy Digest, think tank on international affairs, “Left Behind: Re-Evaluating American Hegemony,” 8-27-12, http://www.internationalpolicydigest.org/2012/08/27/left-behind-re-evaluating-american-hegemony/, accessed 11-29-12, ara)
Yet three intersecting geopolitical … benevolence over decisive autocratic apathy.
Violence has declined – authors who say otherwise shortcut their scholarship towards convenient conclusions Pinker, Johnstone Family Professor of Psychology – Harvard, 11 (Steven, October 4, 2011, “The Better Angels of Our Nature: Why Violence Has Declined”, Viking Adult, 2/29/12, atl)
This book is about what may be … deal with changing circumstances.
Rational choice theory is good Owen, Southampton Political theory reader, 2002 (David, “Re-orienting International Relations: On Pragmatism, Pluralism and Practical Reasoning”, Millennium - Journal of International Studies, 31.3, SAGE, ldg)
Commenting on the ‘philosophical turn’ in …, and so a potentially vicious circle arises.
Policy simulation key to creativity and decision-making - detachment is key to its revolutionary benefits Eijkman, University of New South Wales Australian Defence Force Academy Visiting Fellow, 2012 (Dr Henk, University of New South Wales Australian Defence Force Academy Independent consultant, Annasaheb Dange College of Engineering and Technology in India Visiting Professor of Academic Development, has taught at various institutions in the social sciences and his work as an adult learning specialist has taken him to South Africa, Malaysia, Palestine, and India. He publishes widely in international journals, “The role of simulations in the authentic learning for national security policy development: Implications for Practice,” http://nsc.anu.edu.au/test/documents/Sims_in_authentic_learning_report.pdf, DOA: 10-19-12, ads)
Policy simulations stimulate Creativity Participation …process in the desired direction
Debating specific policies on war powers makes us better advocates against government violence – criticism without policy details is bankrupt Mellor, European University Institute, 13 (Ewan, “Why Policy Relevance is a Moral Necessity: Just War Theory, Impact and UAVs”, DOA: 10-1-13, http://www.academia.edu/Documents/in/Drones_Targeted_Killing_Ethics_of_War, llc)
This section of the paper considers more … that are necessary for democratic politics. 52
Focus on strategic deterrence and democracy are key to adverting crisis escalation—there are an infinite number of root causes that debilitate action Moore, UVA law professor, 2004 (John, “Beyond the Democratic Peace: Solving the War Puzzle”, 44 Va. J. Int'l L. 341, Winter, lexis, ldg)
If major interstate war is predominantly a … levels of deterrence are dramatically increased or decreased?
Our method of policy advocate is productive and effective Martin, Cambridge geography professor, 2001 (Ron, “Geography and public policy: the case of the missing agenda”, Progress in Human Geography 25,2, SAGE, ldg)
One reason for the neglect of …form the basis of critical public policy analysis.9
We don’t need to win our epistemology is perfect-flawed empiricism is better than giving up all meaning. Sil, assistant professor of Political Science at University of Pennsylvania, 2000 (Rudra, “Against Epistemological Absolutism”, pg 160-61, ldg)
An even stronger case is made by Paul … the most extreme epistemological positions.
10/21/13
Pakistan 2AC - CP - NMS
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae Perm – do both
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae Sharif key to Indo-Pak relations – that solves Afghanistan, economy, and Asia stability and nuclear war – political capital in military strategies shatters the opposition Lees, Washington attorney, 9-28 (Kevin, associate attorney at Latham and Watkins LLP in Washington, D.C, Editor and Foreign Policy Analyst at Suffragio, “A More Important UN Handshake,” 9-28-13, http://nationalinterest.org/commentary/more-important-un-handshake-9145?page=1, DOA: 10-9-13, ara)
The global foreign-policy … nuclear proliferation is correct.
Drone strikes are another … Egypt, Syria and Middle East peace.
Perception of Baloch instability triggers global competition – causes Pakistan to launch nukes to defend its interests – aff is key to solve perception of Pakistan weakness in Balochistan Rehman, politics and international relations Assistant Professor, Qurtuba University, 11 (Khalil ur, Assistant Professor, Department of Politics and International Relations, Qurtuba University of Science and IT, “Balochistan: The Strategic Pearl,” March 2011, http://www.qurtuba.edu.pk/thedialogue/The20Dialogue/6_1/Dialogue_January_March2011_1-11.pdf, DOA: 10-10-13, ara)
The State of Pakistan has enough … restraint can deter such a possibility.
10/21/13
Pakistan 2AC - Case - Sharif Adv
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae Sharif key to Indo-Pak relations – that solves Afghanistan, economy, and Asia stability and nuclear war – political capital in military strategies shatters the opposition Lees, Washington attorney, 9-28 (Kevin, associate attorney at Latham and Watkins LLP in Washington, D.C, Editor and Foreign Policy Analyst at Suffragio, “A More Important UN Handshake,” 9-28-13, http://nationalinterest.org/commentary/more-important-un-handshake-9145?page=1, DOA: 10-9-13, ara)
The global foreign-policy … nuclear proliferation is correct.
Drone strikes are another … Egypt, Syria and Middle East peace.
Perception of Baloch instability triggers global competition – causes Pakistan to launch nukes to defend its interests – aff is key to solve perception of Pakistan weakness in Balochistan Rehman, politics and international relations Assistant Professor, Qurtuba University, 11 (Khalil ur, Assistant Professor, Department of Politics and International Relations, Qurtuba University of Science and IT, “Balochistan: The Strategic Pearl,” March 2011, http://www.qurtuba.edu.pk/thedialogue/The20Dialogue/6_1/Dialogue_January_March2011_1-11.pdf, DOA: 10-10-13, ara)
The State of Pakistan has enough … restraint can deter such a possibility.
10/21/13
Pakistan 2AC - DA - CMR
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae CMR low now and multiple alt causes Munson, Marine officer, 12 (Peter J., 11/12, “A Caution on Civil-Military Relations,” accessed: 9/15/2013, http://smallwarsjournal.com/jrnl/art/a-caution-on-civil-military-relations, ADC)
This brief post represents only a … reach crisis proportions in the years to come.
Policy disagreements don’t spill over -~-- no turns case Hansen, Professor of Law at the New England School, 09 (Victor Hansen, Associate Professor of Law, New England Law School, Summer 2009, “Symposium: Law, Ethics, And The War On Terror: Article: Understanding The Role Of Military Lawyers In The War On Terror: A Response To The Perceived Crisis In Civil-Military Relations,” South Texas Law Review, 50 S. Tex. L. Rev. 617, p. lexis, LMM)
According to Sulmasy and Yoo, … question that we now turn.
No impact – empirics prove Feaver and Kohn, Professor of Political Science, 05 (Peter Feaver, professor of Political Science and Public Policy and the director of the Triangle Institute for Security Studies at Duke University, and Richard H. Kohn, Professor of History at the University of North Carolina, 2005, “The Gap: Soldiers, Civilians, and Their Mutual Misunderstanding,” in American Defense Policy, 2005 edition, ed. Paul J. Bolt, Damon V. Coletta, Collins G. Shackelford, p. 339, LMM)
Concerns about a troublesome … project provides some answers.
If civil-military relations aren't that … these sorts of military operations.
10/21/13
Pakistan 2AC - DA - CMR
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae CMR low now and multiple alt causes Munson, Marine officer, 12 (Peter J., 11/12, “A Caution on Civil-Military Relations,” accessed: 9/15/2013, http://smallwarsjournal.com/jrnl/art/a-caution-on-civil-military-relations, ADC)
This brief post represents only a … reach crisis proportions in the years to come.
Policy disagreements don’t spill over -~-- no turns case Hansen, Professor of Law at the New England School, 09 (Victor Hansen, Associate Professor of Law, New England Law School, Summer 2009, “Symposium: Law, Ethics, And The War On Terror: Article: Understanding The Role Of Military Lawyers In The War On Terror: A Response To The Perceived Crisis In Civil-Military Relations,” South Texas Law Review, 50 S. Tex. L. Rev. 617, p. lexis, LMM)
According to Sulmasy and Yoo, … question that we now turn.
No impact – empirics prove Feaver and Kohn, Professor of Political Science, 05 (Peter Feaver, professor of Political Science and Public Policy and the director of the Triangle Institute for Security Studies at Duke University, and Richard H. Kohn, Professor of History at the University of North Carolina, 2005, “The Gap: Soldiers, Civilians, and Their Mutual Misunderstanding,” in American Defense Policy, 2005 edition, ed. Paul J. Bolt, Damon V. Coletta, Collins G. Shackelford, p. 339, LMM)
Concerns about a troublesome … project provides some answers.
If civil-military relations aren't that … these sorts of military operations.
10/21/13
Pakistan 2AC - DA - War Powers
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae Obama’s decisions are hurting presidential powers now, even setting the precedent for lower powers in the future Yoo, law professor at the University of California at Berkeley, 2013 (John, January 2013, “John Yoo: Diminishing the Presidency”, accessed 9/18/13, http://online.wsj.com/article/SB10001424127887323375204578271681410646810.html, vc)
A year ago this month, President Obama … legacy unless he changes course.
ISLAMABAD -- The Pakistani … the first U.S. drone strike in 2004.
10/21/13
Pakistan 2AC - DA - War Powers
Tournament: West Point | Round: 4 | Opponent: Vandy BM | Judge: Matthew Bartholamae Obama’s decisions are hurting presidential powers now, even setting the precedent for lower powers in the future Yoo, law professor at the University of California at Berkeley, 2013 (John, January 2013, “John Yoo: Diminishing the Presidency”, accessed 9/18/13, http://online.wsj.com/article/SB10001424127887323375204578271681410646810.html, vc)
A year ago this month, President Obama … legacy unless he changes course.
ISLAMABAD -- The Pakistani … the first U.S. drone strike in 2004.
10/21/13
Pakistan 2AC - K - Black Counter Gaze
Tournament: West Point | Round: 1 | Opponent: GMU BW | Judge: Joe Keeton Reps 1st is bad – reps only matter because of their pragmatic effect on policy Dewsbury, Bristol University geographical studies professor, 2003 (John-David, Environment and Planning A 2003, volume 35, pages 1907-1932 -- http://www.sages.unimelb.edu.au/news/mhgr/dewsbury.pdf, ldg)
That someone includes us -- the social scientists, … at all -- that is critically flawed.
Violence has declined – authors who say otherwise shortcut their scholarship towards convenient conclusions Pinker, Johnstone Family Professor of Psychology – Harvard, 11 (Steven, October 4, 2011, “The Better Angels of Our Nature: Why Violence Has Declined”, Viking Adult, 2/29/12, atl)
This book is about what may … minds deal with changing circumstances.
Labeling and condemning the term “terrorism” is vital to stigmatizing terrorist legitimacy and to eliminating violence against civilians as a means to attain political goals Ganor, Director of the International Policy Institute for Counter-Terrorism, 01 Boaz, “Defining Terrorism”, http://www.ict.org.il/articles/define.htm, 1/5/11, atl
The prevalent definitions of terrorism … come to this realization, the better.
Realism is accurate–states act out of rational interests – break-down of deterrence creates policy failures that risk war Harvey, political science professor at Dalhousie University, 1997 (Frank, “The Future’s Back: Nuclear Rivalry, Deterrence Theory, and Crisis Stability after the Cold War”, pg 8-11, ldg)
Critics of political psychology … sub conscious psychological pressures.
Securitization is inevitable. Loader et al., All Souls College criminology professor, 2007 (Ian, Civilizing Security, pg 258-9, ldg)
The way ahead, in our view, and … exists in some form or other.
Perm do the plan and then the alt.
Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2002 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or … undermines political effectiveness.
US imperialist policy is inevitable – the alternative is authoritarianism – we don’t have to defend every part of America, just prove that our aff is better than the status quo Sussman, researcher and columnist, Swarthmore College, 12 (Sam, International Policy Digest, think tank on international affairs, “Left Behind: Re-Evaluating American Hegemony,” 8-27-12, http://www.internationalpolicydigest.org/2012/08/27/left-behind-re-evaluating-american-hegemony/, accessed 11-29-12, ara)
Yet three intersecting geopolitical trends … over decisive autocratic apathy.
Omission is not exclusion; NO discursive act can include everything; this doesn't mean we reject or marginalize these concerns Rorty, Stanford comparative literature professor, 2002 (Richard, “Hope and the Future”, Peace Review; Jun2002, Vol. 14 Issue 2, p149-155, 7p, ebsco, ldg)
I have no quarrel with Cornell’s and Spivak’s … in many other ways.
Taking actions towards recognition and working within the system is key to prevent Natives oppression – radical utopian actions fail to create progressive change Pommersheim, South Dakota Law Professor, 1999 (Frank, 31 Arizona state Law Journal 439 p. Lexis) language modified
Neither of these responses-in their … to decolonize federal Indian law. n33
The 1NC entrenches the black-white binary- cursory acknowledgements of a broader problem is insufficient- the neg marginalizes non-black minorities Perea, University of Florida law professor, 1997 Juan, California Law Review, "The Black/White Binary Paradigm of Race," 85 Calif. L. Rev. 1213, l/n, accessed 2-21-10, mss
B. Describing the Binary Paradigm of Race Paradigms of race shape our … are often not seen at all." n29
Debate is never the site for social change only for learning the skills to advocate for change Atchison, Wake Forest University Director of Debate, and Panetta, University of Georgia Director of Debate, 2009 (Jarrod, Edward, “Intercollegiate Debate and Speech Communication: Issues for the Future,” The SAGE Handbook of Rhetorical Studies, Lunsford, Andrea, ed., 2009, p. 317-334)
The final problem with an individual … effort by a great number of people.
10/21/13
Pakistan 2AC - K - Twerking
Tournament: West Point | Round: 5 | Opponent: UVM BB | Judge: Jeff Roberts Our permutation is the best advocacy- you can’t hold the sins of the debate community against us. Exclusionary practices should not be rejected out right but reformed. Whiteness as a race is inevitable, but just trying to reject whiteness would be itself a racist move, and worse, it leaves the definition of whiteness up to white supremacists. We should use whiteness as a means to an end that does not tolerate racism. The permutation becomes a way to embrace our advocacy and theirs Sullivan, Penn State University Charles S. Peirce Society, 2008 (Shannon, Transactions of the Charles S. Peirce Society. Buffalo: 2008. Vol. 44, Iss. 2; pg. 236, 27 pgs, ldg)
It is commonly acknowledged today, … this need will not be effective in practice.
The affirmative casually deploys the term “fetish”. Unfortunately, the affirmative’s deployment of the term fetish to describe an irrational obsession with a material object replicates the long history of the term “fetish” which is a racist representation of African religions rooted in European Colonialism.
West, Assistant Professor of Anthropology at the New School University, 2003 (Harry G., “Transparency and Conspiracy Ethnographies of suspicion in the new world order, Pg 249)
More than four hundred years ago, Europeans … cosmopolitan New York City.
Only rejecting the affirmative for deploying the term fetish has the potential to unravel the history of European colonialism which spawned the Enlightenment and the exact same rationality that the Affirmative identifies as the root of the Nuclear Weapons Complex. West, Assistant Professor of Anthropology at the New School University, 2003 (Harry G., “Transparency and Conspiracy Ethnographies of suspicion in the new world order, Pg 249-251)
A “theoretically suggestive” term (Pietz 1985), … with Haiti, Abner Louima's country.
No root cause – war turns all their impacts Goldstein 03 (Joshua, Prof of Int'l Relations @ American University, War and Gender: How Gender Shapes the War System and Vice Versa, p. 412)
First, peace activists face a … seems to be empirically inadequate.
Taking actions towards recognition and working within the system is key – radical utopian actions fail to create progressive change Pommersheim, South Dakota Law Professor, 1999 (Frank, 31 Arizona state Law Journal 439 p. Lexis) language modified
Neither of these responses-in their … to decolonize federal Indian law. n33
Ethical decisions must be grounded in consequences Isaac, political science professor Indiana University, 2002 (Jeffrey, “Ends, Means, and Politics, Dissent Magazine, Spring 2002, ldg)
Power is not a dirty word or an … it undermines political effectiveness.
Using music and dance as a political strategy gets coopted by hegemonic forces and is used as a tool to placate the masses – the perm recognizes Black Music’s potential, but also recognizes its limits – key to stopping academic self-congratulation Gitlin Columbia Professor of Sociology, 97 (Todd, “The Anti-Political Populism of Cultural Studies, Dissent, Spring Vol. 44 Issue 2, pg 77, DA: 2/15/2013, lmm)
From the late 1960s onward, as I have … that our academic work is already that.
Omission is not exclusion; NO discursive act can include everything; this doesn't mean we reject or marginalize these concerns Rorty, Stanford comparative literature professor, 2002 (Richard, “Hope and the Future”, Peace Review; Jun2002, Vol. 14 Issue 2, p149-155, 7p, ebsco, ldg)
I have no quarrel with Cornell’s and … be told, in many other ways.
Resisting state action only serves to legitimize state control and consequent decisions - the only way to actually embrace an ethical positioning is to provide the state with specific demands Zizek 2007 (Slavoj, a dialectical-materialist philosopher and psychoanalyst. He also co-directs the International Centre for Humanities at Birkbeck College , “Resistance is Surrender” London Review of Books http://www.lrb.co.uk/v29/n22/zize01_.html) RKB
These words simply demonstrate that today’s …which can’t be met with the same excuse.
10/21/13
Pakistan 2AC - T - Restrictions
Tournament: West Point | Round: 1 | Opponent: GMU BW | Judge: Joe Keeton 2. Counter interp - Restriction means a limit and includes conditions on action CAA, 08 (Court Of Appeals Of Arizona, Division One, Department A, State Of Arizona, Appellee, v. JEREMY RAY WAGNER, Appellant., 2008 Ariz. App. Unpub. LEXIS 613 P10 The term "restriction" is not defined by the Legislature for the purposes of the DUI statutes. See generally A.R.S. § 28-1301 (2004) (providing the "definitions" section of the DUI statutes). In the absence of a statutory definition of a term, we look to ordinary dictionary definitions and do not construe the word as being a term of art. Lee v. State, 215 Ariz. 540, 544, ¶ 15, 161 P.3d 583, 587, date accessed: 9-18-13, LMM)