General Actions:
Wiki: opencaselist13
▼:
Document Index
»
Space: Texas-Austin
▼:
Document Index
»
Page: Stransky-Kilpatrick Aff
Tournament | Round | Opponent | Judge | Cites | Round Report | Open Source | Video | Edit/Delete |
---|---|---|---|---|---|---|---|---|
Swings | 1 | Kansas State Mays-Klucas | Pryor |
| ||||
Texas | 3 | North Texas Kersch-Anderson | McNeil |
| ||||
Uco | 2 | Emporia State Haynes-Smith | Strange |
| ||||
tournament | 2 | Baylor Sheaff-Walmsley | Taylor |
| ||||
tournament | 2 | Baylor Sheaff-Walmsley | Taylor |
|
Tournament | Round | Report |
---|
To modify or delete round reports, edit the associated round.
Entry | Date |
---|---|
1AC HacktivismTournament: Uco | Round: 2 | Opponent: Emporia State Haynes-Smith | Judge: Strange Debate over war powers has ended, the rush towards secrecy over OCOs has quelled information and crushed any opportunity for dissent Back in November 2012, the Washington Post reported on a “secret” presidential These secret presidential orders have become the latest manifestation of the post 9/11 police state The Bush regime’s response to 9/11 and the Obama regime’s validation of this This is an extension of war on terror politics to stifle activism and manipulate the media Glenn Greenwald – who broke the phone and internet spying stories this week – has The most recent directives allow the government to stop domestic dissent in the name of security The directive Presidential Policy Directive-20 also discusses possible cyber attacks by And, the rhetoric of the dangerous “cyberwar” is at an all-time high, results in bad policies and makes war more likely Apocalyptic thinking is inherently eschatological, interpreting history through the prism of finitude: Therefore, David and I advocate performative hacktivism as a method for restricting the President’s authority in the area of offensive cyber operations. Contention 2 is Hacktivism Performative hacktivism is a combination of hacking, art, political theatre, and theory to engage in resistance against dominant power structures Performative hacktivism consists of legally ambiguous hacktions, undertaken by hacktivists with artist-activist AND, hacktavists are at the front of the global information war—revolutions against state oppression are grounded in cyber space Like so much on the Internet, in a way, contemporary hacktivism started with Our dissent is a way of turning the weapons of the elites against them, building new lines of communication between people in a way that embodies a collective consciousness powerful enough to topple regimes of domination. What is allowed in debates has been restricted by authority, the aff opens space for emancipatory change. Before Snowden’s whistleblowing, Julian Assange saw the increasing force that was subverting the internet Our analysis brings politics back to the community—performative hacktivism enables us to expose the crumbling pillars of institutions and resist dominance We seek to bring radical political analysis and discourse to the hacking community, to The aff creates an affect of resistance that enables active questions of power relations—this advances a comportment necessary to affirm life We are indebted to Michel Foucault for having generalized, while also displacing, the This strategy of resistance is the only way to combat fascism stop the expansion of the increasingly omnipotent war machine This brings us back to the paradox of fascism, and the way in which Contention 3 is Debate Cyber war depends on affective orientations towards apocalypse—Their political frame desensitizes publics through a circulation of continuous threat Viewed as an ‘accident’, strategic cyber war appears immanent to our contemporary ‘ If impacts are calculated by multiplying probability times magnitude, then every absurd probability of an infinite impact register as infinite – breaking down rational risk calculus The problem of the second method is that it is very difficult to "calculate" politically unacceptable losses. This is particularly true in the context of OCO’s—policy solutions to risk just beget more risk—cycle continues until we become obsessed with it Third, like Beck, we place a great deal of emphasis on unintended and Policymaking doesn’t stay in the debate space – it directly influences the elites that control the lever of the state – this justifies “invisible” violence in the name of countering rivals. This begs the question as to why a discourse with ostensibly confused, narrow and Exclusionary frameworks create control of education, restricting alternative forms of knowledge and should be rejected. 21. The neo-liberal states, through the use of standards, assessments | 11/2/13 |
1AC HacktivismTournament: Swings | Round: 1 | Opponent: Kansas State Mays-Klucas | Judge: Pryor Debate over war powers has ended, the rush towards secrecy over OCOs has quelled information and crushed any opportunity for dissent Back in November 2012, the Washington Post reported on a “secret” presidential These secret presidential orders have become the latest manifestation of the post 9/11 police state The Bush regime’s response to 9/11 and the Obama regime’s validation of this This is an extension of war on terror politics to stifle activism and manipulate the media Glenn Greenwald – who broke the phone and internet spying stories this week – has The most recent directives allow the government to stop domestic dissent in the name of security The directive Presidential Policy Directive-20 also discusses possible cyber attacks by And, the rhetoric of the dangerous “cyberwar” is at an all-time high, results in bad policies and makes war more likely Apocalyptic thinking is inherently eschatological, interpreting history through the prism of finitude: Therefore, David and I advocate performative hacktivism as a method for restricting the President’s war powers authority in the area of offensive cyber operations. Contention 2 is Hacktivism Performative hacktivism is a combination of hacking, art, political theatre, and theory to engage in resistance against dominant power structures Performative hacktivism consists of legally ambiguous hacktions, undertaken by hacktivists with artist-activist AND, hacktavists are at the front of the global information war—revolutions against state oppression are grounded in cyber space Like so much on the Internet, in a way, contemporary hacktivism started with Our analysis brings politics back to the community—performative hacktivism enables us to expose the crumbling pillars of institutions and resist dominance We seek to bring radical political analysis and discourse to the hacking community, to The anonymous fight against surveillance is necessary for a politics of opacity that can disrupt power The forest provided invisibility, in other words, but is no longer an adequate Working through the guise of anonymity is key—executive authority seeks to crush movements against neoliberalism through the visibility of movements More generally, the political imagination of the liberal subject is structured by the nodal The aff creates an affect of resistance that enables active questions of power relations—this advances a comportment necessary to affirm life We are indebted to Michel Foucault for having generalized, while also displacing, the This strategy of resistance is the only way to combat fascism stop the expansion of the increasingly omnipotent war machine This brings us back to the paradox of fascism, and the way in which Contention 3 is Debate Cyber war depends on affective orientations towards apocalypse—Their political frame desensitizes publics through a circulation of continuous threat Viewed as an ‘accident’, strategic cyber war appears immanent to our contemporary ‘ If impacts are calculated by multiplying probability times magnitude, then every absurd probability of an infinite impact register as infinite – breaking down rational risk calculus The problem of the second method is that it is very difficult to "calculate" politically unacceptable losses. This is particularly true in the context of OCO’s—policy solutions to risk just beget more risk—cycle continues until we become obsessed with it Third, like Beck, we place a great deal of emphasis on unintended and Exclusionary frameworks create neo-liberal control of education, restricting alternative forms of knowledge and should be rejected. 21. The neo-liberal states, through the use of standards, assessments Policymaking doesn’t stay in the debate space – it directly influences the elites that control the lever of the state – this justifies “invisible” violence in the name of countering rivals. This begs the question as to why a discourse with ostensibly confused, narrow and | 1/12/14 |
1AC Preemptive OCOsTournament: Texas | Round: 3 | Opponent: North Texas Kersch-Anderson | Judge: McNeil | 2/9/14 |
Plan TextTournament: tournament | Round: 2 | Opponent: Baylor Sheaff-Walmsley | Judge: Taylor | 2/28/14 |
Filename | Date | Uploaded By | Delete |
---|
Air Force
Amherst
Appalachian State
Arizona State
Army
Augustana
Bard
Baylor
Binghamton
Boston College
Capital
CSU Long Beach
CSU Northridge
CSU Sacramento
CUNY
Cal Berkeley
Cal Lutheran
Cal Poly SLO
Case Western
Central Florida
Central Oklahoma
Chico
Clarion
Columbia
Concordia
Cornell
Dartmouth
Denver
Drexel-Swarthmore
ENMU
East Los Angeles College
Eastern Washington
Emory
Emporia
Fayetteville State
Florida
Florida Int'l
Florida State
Fordham
Fresno State
Fullerton
Gainesville State
George Mason
George Washington
Georgetown
Georgia
Georgia State
Georgia Tech
Gonzaga
Harvard
Houston
Idaho State
Illinois
Illinois State
Indiana
Iowa
Irvine/SFSU
James Madison
John Carroll
Johns Hopkins
Johnson County CC
KCKCC
Kansas
Kansas State
Kentucky
LA City College
Lakeland
Lewis-Clark State College
Liberty
Lindenwood
Los Rios
Louisville
Loyola
Macalester
Marist
Mary Washington
Mercer
Methodist
Miami FL
Miami OH
Michigan
Michigan State
Minnesota
Mission
Missouri State
NYU
Navy
New School
North Texas
Northern Iowa
Northwestern
Notre Dame
Ohio Wesleyan
Oklahoma
Oregon
Pepperdine
Piedmont
Pittsburgh
Portland State
Princeton
Puget Sound
Redlands
Richmond
Rochester
Rutgers
Samford
San Diego State
San Francisco State
Santa Clara
South Florida St Pete
Southern Methodist
Southwestern
Stanford
Texas State
Texas-Austin
Texas-Dallas
Texas-San Antonio
Texas-Tyler
Towson
Trinity
U Chicago
UCLA
UDC-CC
UMKC
UNLV
USC
Utah
Vanderbilt
Vermont
Virginia Tech
Wake Forest
Wash U (St. Louis)
Washburn
Washington
Wayne State
Weber
West Georgia
West Virginia
Western Connecticut
Whitman
Wichita State
Wisconsin Oshkosh
Wyoming