General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Texas-Austin
▼:
Document Index
»
Page: Kilpatrick-Segura Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
UMKC | 2 | UT Dallas Velasquez-Ogbuli | Murillo |
| ||||
UNLV | 6 | Nevada Las Vegas Saxe-Jallits | Crowe |
| ||||
UNLV | 4 | California, Berkeley Martin-Epner | Allen |
|
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1AC Hacktivism -- UNLVTournament: UNLV | Round: 4 | Opponent: California, Berkeley Martin-Epner | Judge: Allen | 10/20/13 |
1AC PPD-20 -- UMKCTournament: UMKC | Round: 2 | Opponent: UT Dallas Velasquez-Ogbuli | Judge: Murillo Contention one is the status quoSecret executive memos regarding cyber operations have become the infrastructure of the police state—the post-9/11 race towards secrecy has destroyed all government accountabilityRoberts 13-former Assistant Secretary of the US Treasury and Associate Editor of the Wall Street Journal, PhD @ University of Virginia, Post-Grad fellow @ Berkeley 26 Oxford, ~Paul, Counter Punch, and#34;The Police State is Real,and#34; 2/8/2013, http://www.counterpunch.org/2013/02/08/the-police-state-is-real/-http://www.counterpunch.org/2013/02/08/the-police-state-is-real/, DKP~ The Bush regime’s response to 9/11 and the Obama regime’s validation of this Specifically, presidential policy directive-20 infused War on Terror principles of secrecy into offensive cyber operationsGlobal Research 13-~Washington’s Blog, Centre for Research on Globalization, and#34;Global Cyberwarfare. High-Level US Intelligence Source: ’We Hack Everyone Everywhere’and#34;6/8/2013, http://www.globalresearch.ca/global-cyberwarfare-high-level-us-intelligence-source-we-hack-everyone-everywhere/5338193-http://www.globalresearch.ca/global-cyberwarfare-high-level-us-intelligence-source-we-hack-everyone-everywhere/5338193, DKP~ Glenn Greenwald – who broke the phone and internet spying stories this week – has The effect moves beyond strategic operations – The shutdown of any meaningful debate about presidential powers combatting this censorship is necessary to understand the effects of offensive cyber operationsGosztola 13-trusted author who publishes his writing regularly to OpEdNews and Open Salon and he is a 2009 Young People For Fellow. Kevin, The Dissenter, and#34;Top Secret Cybersecurity Policy Directive Revealed 26 the Debate Obama May ’Welcome’ But Never Have,and#34; http://dissenter.firedoglake.com/2013/06/08/top-secret-cybersecurity-policy-directive-revealed-the-debate-obama-may-welcome-but-never-have/-http://dissenter.firedoglake.com/2013/06/08/top-secret-cybersecurity-policy-directive-revealed-the-debate-obama-may-welcome-but-never-have/, DKP~ Thus we argue that the:The United States Federal Government should repeal Presidential Policy Directive-20. Contention 2 is HacktivismRemoving presidential Policy Directive-20 is key- the affirmative challenges a last ditch effort of the elite to crack down—OCO’s can now be used by the executive to attack citizens, telecommunications, websites, and protests in the name of and#34;national securityand#34;Martin 13-Writer @ Global Research-Centre for Research on Globalization ~Patrick, Global Research, and#34;Obama’s ’Cyberwarfare First Strike’: Using Offensive Cyber Effects Operations (OCEO) to Destabilize Countries,and#34; 6/10/2013, http://www.globalresearch.ca/obamas-cyberwarfare-first-strike-using-offensive-cyber-effects-operations-oceo-to-destabilize-countries/5338457-http://www.globalresearch.ca/obamas-cyberwarfare-first-strike-using-offensive-cyber-effects-operations-oceo-to-destabilize-countries/5338457, DKP~ The directive ~Presidential Policy Directive-20~ also discusses possible cyber attacks by AND, these domestic cyber-attacks are key to the Cheney and#34;continuity of governmentand#34; doctrine in which all power is given to a few in the executive branch, wholly excluding the legislative and judicial branches from having any sayMartin 13-Writer @ Global Research-Centre for Research on Globalization ~Patrick, Global Research, and#34;Obama’s ’Cyberwarfare First Strike’: Using Offensive Cyber Effects Operations (OCEO) to Destabilize Countries,and#34; 6/10/2013, http://www.globalresearch.ca/obamas-cyberwarfare-first-strike-using-offensive-cyber-effects-operations-oceo-to-destabilize-countries/5338457-http://www.globalresearch.ca/obamas-cyberwarfare-first-strike-using-offensive-cyber-effects-operations-oceo-to-destabilize-countries/5338457, DKP~ According to the directive, domestic cyber-warfare actions would be coordinated with dozens First, hacktavists are at the front of the global information war—revolutions against state oppression are grounded in cyber spacePenny 11-writer, journalist and activist who writes regularly for The New Statesman and the Independent, author of books about dissent ~Laurie, The Nation, and#34;Cyberactivism From Egypt to Occupy Wall Street,and#34; 10/31/2011, http://www.thenation.com/article/163922/rise-digital-natives~~23-http://www.thenation.com/article/163922/rise-digital-natives, DKP~ Hackers come in many forms, from criminals stealing credit card details to shadowy government And, the dissent politics of hacking is political freedom—it helped bring about revolution, allowed WikiLeaks to continue, and helps rebels communicate—this is the battlefield of the 21st centuryPenny 11-writer, journalist and activist who writes regularly for The New Statesman and the Independent, author of books about dissent ~Laurie, The Nation, and#34;Cyberactivism From Egypt to Occupy Wall Street,and#34; 10/31/2011, http://www.thenation.com/article/163922/rise-digital-natives~~23-http://www.thenation.com/article/163922/rise-digital-natives, DKP~ Like so much on the Internet, in a way, contemporary hacktivism started with Cyberspace, in particular the Internet, has made networking between likeminded individuals and groups This cyber activism is the new wave of civil disobedience—dissent is the only way to have an open democratic society, to make informed political decisions, and to create meaningful debate about government policyHayase 13-contributing writer to Culture Unplugged, global citizen blogger @ Journal Between Words, she brings out deeper dimensions of socio-cultural events at the intersection between politics and psychology to share insight on future social evolution, PhD Candidate in Philosophy ~Nozomi, Counter Punch, and#34;Manning, Snowden and Assange, The Rise of the Internet Dissidents,and#34; 8/13/2013, http://www.counterpunch.org/2013/08/13/the-rise-of-the-internet-dissidents/,-http://www.counterpunch.org/2013/08/13/the-rise-of-the-internet-dissidents/, DKP~ NSA whistleblower Edward Snowden’s volcanic revelations of ubiquitous US surveillance are in their third month Even if the executive ignores congressional ruling, it would get leaked to the pubic Sitting in court, I kept thinking back to 1971 and my effort to unwrap This is particularly true in the context of cyber operations—empiricsGosztola 13-trusted author who publishes his writing regularly to OpEdNews and Open Salon and he is a 2009 Young People For Fellow. ~Kevin, The Dissenter, and#34;Top Secret Cybersecurity Policy Directive Revealed 26 the Debate Obama May ’Welcome’ But Never Have,and#34; http://dissenter.firedoglake.com/2013/06/08/top-secret-cybersecurity-policy-directive-revealed-the-debate-obama-may-welcome-but-never-have/-http://dissenter.firedoglake.com/2013/06/08/top-secret-cybersecurity-policy-directive-revealed-the-debate-obama-may-welcome-but-never-have/, DKP~ Back in November 2012, the Washington Post reported on a and#34;secretand#34; presidential These forms of dissent are necessary—widespread conformity and lack of public information cause the worst forms of injustice, oppression, and violenceSunstein 3-Felix Frankfurter Professor of Law @ Harvard Law School, JD @ Harvard Law School, former Professor of Political Science @ the University of Chicago ~Cass, Why Societies Need Dissent, 2003, pg. 6, DKP~ The problem is that widespread conformity deprives the public of information that it needs to Although the dissent of the affirmative is at the core of new challenges to corporate domination, government violence, and oppression, our argument is also about compassion and caring for others—cyber activism is a way of building connections between people that embody our collective consciousness capable of truly toppling regimes of domination—regardless of success in congress, the 1AC is capable of political change from the ground upHayase 13-contributing writer to Culture Unplugged, global citizen blogger @ Journal Between Words, she brings out deeper dimensions of socio-cultural events at the intersection between politics and psychology to share insight on future social evolution, PhD Candidate in Philosophy ~Nozomi, Counter Punch, and#34;Manning, Snowden and Assange, The Rise of the Internet Dissidents,and#34; 8/13/2013, http://www.counterpunch.org/2013/08/13/the-rise-of-the-internet-dissidents/,-http://www.counterpunch.org/2013/08/13/the-rise-of-the-internet-dissidents/, DKP~ Before Snowden’s whistleblowing, Julian Assange saw the increasing force that was subverting the internet The unexamined life is not worth living—the affirmative advances a comportment of resistance necessary for life to have meaning and valueFrançoise Proust-http://muse.jhu.edu/journals/hypatia/v015/15.4proust01.html 2k-Fall 2000. agregée in Philosophy, was a program director at the Collége Internationale de Philosophie, in addition to her post at the Université de Paris I. Her work centered on the problem of how to think politics and political action today. She is the author of Kant et le ton d’histoire (1991), L’Histoire à contretemps: Le temps historique chez Walter Benjamin (1994), Point de Passage (1994), and De la Resistance (1997). We are indebted to Michel Foucault for having generalized, while also displacing, the Contention three is RiskIf impacts are calculated by multiplying probability times magnitude, then every absurd probability of an infinite impact register as infinite – breaking down rational risk calculusKessler ’8 ~Oliver Kessler, Sociology at University of Bielefeld, and#34;From Insecurity to Uncertainty: Risk and the Paradox of Security Politicsand#34; Alternatives 33 (2008), 211-232~ The problem of the second method is that it is very difficult to and#34;calculate This is particularly true in the context of OCO’s—policy solutions to risk just beget more risk—cycle continues until we become obsessed with itDeibert and Rohozinski 10-*Professor of Political Science and Director of the Canada Centre Third, like Beck, we place a great deal of emphasis on unintended and Cyber war depends on affective orientations towards apocalypse—Their political frame desensitizes publics through a circulation of continuous threatStevens 2013 Viewed as an ’accident’, strategic cyber war appears immanent to our contemporary ’ This apocalyptic rhetoric is at the heart of cybersecurity politics—the question of predictions being accurate takes a backseat to escalating threats in hopes predictions will someday become trueStevens, 13 Tim Stevens, Prof. at , King’s College London Department of War Studies and#34;Apocalyptic Visions: Cyber War and the Politics of Timeand#34; http://s3.amazonaws.com/academia.edu.documents/31124211/Apocalyptic_Visions_-_Stevens_14-04-13.pdf?AWSAccessKeyId=AKIAIR6FSIMDFXPEERSA26Expires=137745518726Signature=xLDiNWVoQar2i4n0aIHuBof7maw3D26response-content-disposition=inline-http://s3.amazonaws.com/academia.edu.documents/31124211/Apocalyptic_Visions_-_Stevens_14-04-13.pdf?AWSAccessKeyId=AKIAIR6FSIMDFXPEERSA26Expires=137745518726Signature=xLDiNWVoQar2i4n0aIHuBof7maw3D26response-content-disposition=inline BJM Apocalyptic thinking is inherently eschatological, interpreting history through the prism of finitude: | 9/15/13 |
Filename | Date | Uploaded By | Delete |
---|---|---|---|
10/20/13 | qsure123@gmailcom |
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming