Vous êtes sur la page 1sur 14

===1===

====TPP will pass ====


**ICTSD 2/28**
~~[The Intl Center for Trade and Sustainable Development. "Obama Sets Sights on
2016 TPP Approval, Despite Political Landscape" Bridges, Vol 20 N7. 2/25/16 ln
//GBS-JV~~]
US President Barack Obama said on Monday that he was "cautiously optimistic" that
AND
currency, remains unclear. White House presses on, despite election politics.

====The plan's a huge fight in Congress—drains PC====


**Barron-Lopez 15** – Laura Barron-Lopez is a Congressional Reporter for The
Washington Post. ("Senators Are Really Worried About Encrypted Data After Paris,"
The Huffington Post, http://www.huffingtonpost.com/entry/encrypted-data-paris-
attacks_us_564cefcbe4b08c74b73426eb, November 18, 2015, Quay)
The failure to pick up communications between terrorists involved in the deadly Paris
attacks last
AND
. "I think the security of the U.S. is."

====Capital's key ====


**AFP 2-24**
~~[The Agence France Presse. "Obama 'cautiously optimistic' Congress will pass TPP
trade deal" AFP, 2/24/16 ln //GBS-JV~~]
US President Barack Obama yesterday said he is "cautiously optimistic" that Congress
will
AND
Congress and generally support free trade, have been mixed in their response.

====TPP solves South China Sea war====


**Froman 14** – Michael Froman is the United States Trade Representative. ("The
Strategic Logic of Trade New Rules of the Road for the Global Market,"
http://www.foreignaffairs.com/articles/142198/michael-b-froman/the-strategic-logic-
of-trade, November/December 2014)
The Trans-Pacific Partnership presents an unprecedented opportunity to update the
rules of the
AND
, as the crisis in Ukraine has triggered deep unease across the continent.

====The impact is global war====


Wesley 12 – ~~[Michael Wesley, Non-Resident Senior Fellow at the Brookings
Institution and an Adjunct Professor at Griffith University and The University of
Sydney, former Executive Director of the Lowy Institute for International Policy, former
Professor of International Relations and Director of the Griffith Asia Institute at Griffith
University, and Senior Lecturer in International Relations at the University of New
South Wales, July 2012, "What's at stake in the South China Sea?"
http://lowyinstitute.cachefly.net/files/wesley_whats_at_stake_snapshot11.pdf~~]
The South China Sea is enclosed by the west coast of mainland Southeast Asia,
AND
the South China Sea will become ever more crowded with shipping and commerce.

===2===
====Juridical approaches to surveillance are a façade that conceals circumvention and
shatters challenges to sovereign power====
**Hull 14** – Gordon Hull is an Associate Professor in the Department of Philosophy at
UNC Charlotte and is part of the core faculty in the Public Policy PhD Program. Since
Summer 2013, he's been the Director of the Center for Professional and Applied Ethics.
("The Surveillance State at the Intersection of Bio, Juridical and Sovereign Power,"
NewAPPS, http://www.newappsblog.com/2014/11/the-surveillance-state-at-the-
intersection-of-bio-juridical-and-sovereign-power.html, November 11, 2014, Alla)
As I've suggested here before, one of the undertheorized aspects of biopower is the
AND
fully capable of blurring the boundaries between itself and old-fashioned sovereignty.

====Sovereign power controls death—the impact is the right to kill, founded on


colonial Otherization and racism====
**Shalhoub-Kevorkian 15** – ~~[Nadera, Prof. Nadera Shalhoub-Kevorkian is the
Lawrence D. Biele Chair in Law at the Faculty of Law-Institute of Criminology and the
School of Social Work and Public Welfare at the Hebrew University of Jerusalem. She is
a longtime anti-violence, native Palestinian feminist activist and the director of the
Gender Studies Program at Mada al-Carmel, the Arab Center for Applied Social
Research in Haifa. Her research focuses on law, society and crimes of abuse of power.
She studies the crime of femicide and other forms of gendered violence, crimes of abuse
of power in settler colonial contexts, surveillance, securitization and social control, and
trauma and recovery in militarized and colonized zones, "Security Theology,
Surveillance and the Politics of Fear", May 2015, pgs.116-117, Cambridge University
Press, https://books.google.com/books?
id=mQa7BwAAQBAJ&printsec=frontcover~~#v=onepage&q&f=false~~] alla
In the context of exercising control over death and dying, this chapter considers the
AND
to control the death of the Other, even after they are dead.

====The alternative is to affirm a space of risk—rather than debating about state action
on surveillance, we should expose the failure of legal reform====
**Karatzogianni and Robinson 13** – Athina Karatzogianni and Andrew Robinson are
Professor at the University of Hull. ("Schizorevolutions vs. Microfascisms: A
DeleuzoNietzschean Perspective on State, Security, and Active/Reactive Networks,"
http://works.bepress.com/cgi/viewcontent.cgi?
article=1037&context=athina_karatzogianni)
The return of state violence from the kernel of state exceptionalism is a growing
problem
AND
ward off constant anxiety, at the cost of a war on difference.

===3===

====Interpretation—"curtail" means to restrict====


**Webster's 15** – Webster's New World College Dictionary, 4th Ed., "curtail",
http://www.yourdictionary.com/curtail
verb
To curtail is defined as to restrict something, stop something or deprive of something.
An example of curtail is when a town wants to stop drunk driving.

====That refers only to outright prohibitions, not any effectual decrease====


**Caiaccio 94** (Kevin T., "Are Noncompetition Covenants Among Law Partners
Against Public Policy?", Georgia Law Review, Spring, 28 Ga. L. Rev. 807, Lexis)
The Howard court began its analysis by examining the California Business and
Professions Code,
AND
and that a mere "economic consequence" does not equal a prohibition.
====The plan violates—only curtails the use of vulnerabilities but does not create a
prohibition on surveillance====

====Voting issue—====

====1. Limits—allowing effectual reductions explodes the topic. Any action can
potentially result in less surveillance. Limits are key to depth of preparation and
clash.====

====2. Ground—our interpretation is key to establish a stable mechanism of legal


prohibition that guarantees core ground based on topic direction. They allow the Aff to
defend completely different processes like "oversight" that dodge core DAs and rob the
best counterplan ground.====

===4===

====Domestic surveillance checks terrorism now====


**Boot 13** – Max Boot is a Senior Fellow in National Security Studies at the Council on
Foreign Relations. In 2004, he was named by the World Affairs Councils of America as
one of "the 500 most influential people in the United States in the field of foreign
policy." In 2007, he won the Eric Breindel Award for Excellence in Opinion Journalism.
From 1992 to 1994 he was an editor and writer at the Christian Science Monitor. Boot
holds a bachelor's degree in history, with high honors, from the University of California,
Berkeley and a master's degree in history from Yale University. Boot has served as an
adviser to U.S. commanders in Iraq and Afghanistan. He is the published author of
Invisible Armies: An Epic History of Guerrilla Warfare from Ancient Times to the
Present. From the article: "Stay calm and let the NSA carry on" - LA Times – June 9th -
http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance-
20130609
After 9/11, there was a widespread expectation of many more terrorist attacks
AND
to unilateral disarmament in a war against terrorism that is far from over.

====Backdoor surveillance is key to solve terrorism====


**Rubin 14** — Jennifer Rubin, Columnist and Blogger for the Washington Post, holds
a J.D. from the University of California-Berkeley, 2014 ("Silicon Valley enables terrorists
and criminals," Right Turn—a Washington Post blog, October 19th, Available Online at
http://www.washingtonpost.com/blogs/right-turn/wp/2014/10/19/silicon-valley-
enables-terrorists-and-criminals/, Accessed 07-05-2015)
Google chairman Eric Schmidt likes to brag that his company is "on the right
AND
he should have just told them flat out, "Don't be evil."

====Bioterrorism causes extinction====


**Rose 14** – ~~[Patrick, PhD, recognized international biodefense expert Center for
Health & Homeland Security senior policy analyst & biosecurity expert, National
Defense University lecturer, and Adam Bernier, expert in counter-terrorism, "DIY
Bioterrorism Part II: The proliferation of bioterrorism through synthetic biology,"
CBRNePortal, 2-24-14, www.cbrneportal.com/diy-bioterrorism-part-ii-the-
proliferation-of-bioterrorism-through-synthetic-biology/, accessed 8-16-14~~]
In Part I of this series, we examined how the advancement of synthetic biology
AND
reverberate around the globe because biological weapons are not bound by international
borders.

===5===
====Bitcoin is sustainable now====
**Heffernan 15** – Shayne Heffernan is a writer for Live Trading News. ("Will The
Legitimacy Of Bitcoin Devalue World Currencies?," Live Trading News,
http://www.livetradingnews.com/will-legitimacy-bitcoin-devalue-world-currencies-
97625.htm, March 1, 2015, Quay)
Bitcoin just got a major legitimacy boost that it badly needed to take on the
AND
way for companies that accept the currency to capitalize on the unbanked consumer.

====The plan saves Bitcoin and makes it legitimate—backdoors kill Bitcoin====


**Gallagher 13** – Kevin Gallagher is a writer for Motherboard. ("What Do the Latest
NSA Leaks Mean for Bitcoin?," http://motherboard.vice.com/blog/what-do-the-latest-
nsa-leaks-mean-for-bitcoin, September 12, 2013)
Could the intelligence community have a secret exploit for Bitcoin? It's rather obvious
that
AND
such weaknesses are often discoverable by other state and non-state actors.

====Bitcoin's causes lone wolf terrorism ====


Terence **Check 13**, J.D. Candidate, Cleveland-Marshall College of Law, 5/5/13,
"Shadow currency: how Bitcoin can finance terrorism,"
http://theworldoutline.com/2013/05/shadow-currency-how-bitcoin-can-finance-
terrorism/
This "crypto-currency" has already been the inspiration for several online robberies
AND
communications, the ultimate security benefits may outweigh the cost to certain
freedoms.

====Lone wolves will use WMDs—-extinction ====


Gary A. **Ackerman 14** & Lauren E. Pinson, Gary is Director of the Center for
Terrorism and Intelligence Studies, Lauren is Senior Researcher and Project Manager
for the National Consortium for the Study of Terrorism and Responses of Terrorism, An
Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells,
Terrorism and Political Violence, Volume 26, Issue 1
The first question to answer is whence the concerns about the nexus between CBRN
weapons
AND
very well influence the weapon selection of lone actor jihadists in Western nations.

===6===

====Counterplan text: the United States federal government should condition legal
immunity pursuant to Section 230 of the Communications Decency Act on whether
companies maintain the technical capacity to deliver interpretable signal in compliance
with orders for electronic surveillance under the Foreign Intelligence Surveillance Act
and Title III.====

====The counterplan is the best middle ground—solves the aff by maintaining


encryption but preserves the flexibility to fight terrorism====
**Wittes 16** – Benjamin Wittes is editor in chief of Lawfare and a Senior Fellow in
Governance Studies at the Brookings Institution. He is the author of several books and
is co-chair of the Hoover Institution's Working Group on National Security, Technology,
and Law. ("An Out of the Box Approach to the Going Dark Problem," Lawfare,
https://lawfareblog.com/out-box-approach-going-dark-problem, February 2, 2016,
Quay)
I've been thinking about out-of-the-box ways to address the
AND
your systems to frustrate government efforts to monitor that third-party conduct.
===Cybersecurity===

====Zero internal link to any of their impacts—the plan ensures security for private
companies and their communications—those systems are distinct from cyber-security of
nuclear and grid systems====

====They don't solve anything—their plan text says "decrease domestic backdoor
surveillance," which means the NSA stops looking through the backdoors but the
backdoors aren't actually closed—plan doesn't solve cybersecurity or the Internet
because there would still be vulnerabilities, but the NSA just stops accessing them====
**Abelson et al 15** — Harold Abelson, Professor of Electrical Engineering and
Computer Science at the Massachusetts Institute of Technology, Fellow of The Institute
of Electrical and Electronics Engineers, Founding Director of Creative Commons and
the Free Software Foundation, holds a Ph.D. in Mathematics from the Massachusetts
Institute of Technology, et al., with Ross Anderson, Steven M. Bellovin, Josh Benaloh,
Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G.
Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and
Daniel J. Weitzner, qualifications of these co-authors available upon request, 2015
("Keys Under Doormats: Mandating insecurity by requiring government access to all
data and communications," Massachusetts Institute of Technology Computer Science
and Artificial Intelligence Laboratory Technical Report (MIT-CSAIL-TR-2015-026),
July 6^^th^^, Available Online at
http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf,
Accessed 07-20-2015, p. 2-3)
The goal of this report is to similarly analyze the newly proposed requirement of
exceptional
AND
incorrectly, the security of all of their users will be at risk.

====Circumvention—the word "backdoors" is lawyered narrowly which justifies


keeping other vulnerabilities====
**Rasch 14** – (Mark Rasch, an attorney and author, working in the areas of corporate
and government cybersecurity, privacy and incident response. He is currently the Vice
President, Deputy General Counsel, and Chief Privacy and Data Security Officer for
SAIC, December 5, 2014 , "Sen. Wyden's Plan to Close Backdoors May Backfire"
http://www.securitycurrent.com/en/news/ac_news/sen-wydens-plan-to-close-
backdoors-may-backfire)
Senator Ron Wyden (D. Or.) announced on December 4 the introduction of
AND
doesn't work the other way. I know. I have tried it.

====No internal link—their evidence is about backdoors in companies security, not the
grid====

====Encryption doesn't solve and risks more cyber-attacks====


**Aggarwal 15** – (Varun, Principal Correspondent at The Economic Times, "Here's
how data encryption is making companies less secure", 14 April 2015,
http://articles.economictimes.indiatimes.com/2015-04-
14/news/61142361_1_malware-credit-card-data-theft-encryption)
While security experts have been advising companies to encrypt all their sensitive data
to secure
AND
growth of retail in India, Indian customers could possibly face similar attacks.

====No impact and alt causes====


**Perera 14** – David Perara, a cybersecurity reporter for POLITICO Pro, author of
"Inside Guide to the Federal IT Market, 2014 ("U.S. grid safe from large-scale attack,
experts say," POLITICO Pro, September 10th, available online at
http://www.politico.com/story/2014/09/power-grid-safety-
110815.html~~#ixzz3dkDaEAQ9 , accessed 6/21/2015, J.L.)
The specter of a large-scale, destructive attack on the U.S
AND
date suggests to many that they lack of the ability to launch one.
====Cyberattacks are inevitable—thousands have been conducted and nobody has
managed to destroy the US military yet====

====There's no lashout impact====


**Libicki 14** - Martin Libicki is a Senior Management Scientist and Professor at
Pardee RAND Graduate School. ("Is Cyberwar Good for Peace? ~~[par Martin
Libicki~~]," http://www.observatoire-fic.com/is-cyberwar-good-for-peace/ 9/1/2014)
STRYKER
The assumption that cyberwar is a cool war also rests on the presumption that what
AND
can substitute for kinetic attacks, may also reduce the odds of violence.

====No deaths from nuclear meltdowns and they've happened multiple times====
**Drum 11** – Kevin, political blogger for Mother Jones, "Nukes and the Free Market",
March 14, www.motherjones.com/kevin-drum/2011/03/nukes-and-free-market
We're currently told that the death toll in Japan will be at least 10,
AND
the worst case the containment vessels will almost certainly restrict the worst damage.

===Tech Competitiveness===

====Tech's not key to the economy—the loss of some revenue for US companies doesn't
destroy the foundation of growth like energy and stocks====
====No internal link—surveillance doesn't hurt competitiveness====
**IS 14** – (Insider Surveillance. Insider Surveillance is the most widely read source of
information on surveillance technologies for law enforcement, government agencies,
military intelligence, communications companies and technology leaders who together
safeguard national security and protect the public from criminals and terrorists. The
publication reflects the expertise of the intelligence, law enforcement and public policy
communities on surveillance and is followed by members in over 130 nations — from
Washington, D.C. to London, Paris, Beijing, Moscow, Rome, Madrid, Berlin, Tokyo,
Lahore, Delhi, Abu Dhabi, Rio de Janeiro, Mexico City, Seoul and thousands of places in
between. "De-Bunking the Myth of U.S. Tech Sales Lost Due to NSA," . 9-24-2014.
https://insidersurveillance.com/de-bunking-myth-of-u-s-tech-sales-lost-due-
nsa///ghs-kw)
Flashback to October 2013. "The sky is falling! The sky is falling
AND
the year 2016 and also by Forrester, just a few months earlier.

====No impact to economic decline—statistics prove====


Drezner 12 – Daniel is a professor in the Fletcher School of Law and Diplomacy at Tufts.
("The Irony of Global Economic Governance: The System Worked", October 2012,
http://www.globaleconomicgovernance.org/wp-content/uploads/IR-Colloquium-
MT12-Week-5_The-Irony-of-Global-Economic-Governance.pdf)
The final outcome addresses a dog that hasn't barked: the effect of the Great
AND
War II – and not even worse – must be regarded as fortunate."

====No competitiveness decline====


**Petraeus and O'Hanlon 15** – David H. Petraeus is a retired U.S. Army general and
chairman of the KKR Global Institute. Michael O'Hanlon is a senior fellow and co-
director with the Center for 21st Century Security and Intelligence and director of
research for the Foreign Policy program at the Brookings Institution, where he
specializes in U.S. defense strategy, the use of military force and American foreign
policy. He is a visiting lecturer at Princeton University, an adjunct professor at Johns
Hopkins University and a member of the International Institute for Strategic Studies.
("The next American century," The Washington Post, Regional Edition, Lexis Nexis,
2/1/2015) STRYKER
Short-term economic trends in the United States are encouraging. Unemployment is
down
AND
compromises on a number of policies and otherwise get out of the way.

====Or alternative causes====


**Petraeus and O'Hanlon 15** - David H. Petraeus is a retired U.S. Army general and
chairman of the KKR Global Institute. Michael O'Hanlon is a senior fellow and co-
director with the Center for 21st Century Security and Intelligence and director of
research for the Foreign Policy program at the Brookings Institution, where he
specializes in U.S. defense strategy, the use of military force and American foreign
policy. He is a visiting lecturer at Princeton University, an adjunct professor at Johns
Hopkins University and a member of the International Institute for Strategic Studies.
("The next American century," The Washington Post, Regional Edition, Lexis Nexis,
2/1/2015) STRYKER
There is, of course, much that the United States needs to do.
AND
, as do Islamic extremist groups and Iran, as well as Russia.

====The status quo solves====


**Kendrick 15** – (Katharine Kendrick is a policy associate for Internet
communications technologies at the NYU Stern Center for Business and Human Rights.,
2.19.15, "Risky Business: Data Localization"
http://www.forbes.com/sites/realspin/2015/02/19/risky-business-data-localization/,
ekr)
U.S. companies' eagerness to please the EU affects their leverage in a
AND
Internet—at the forefront of decisions over where to store their data.
====Empirically disproven—attacks on encryption have been known since Snowden,
but there hasn't been a marked decline in competitiveness====

====Foreign surveillance is an alt cause====


**Funk 14** - Matthew Funk is a writer for the Syracuse Science & Technology Law
Reporter. ("TRAGEDY OF THE COMMONS: SNOWDEN'S REFORMATION AND THE
BALKANIZATION OF THE INTERNET," Syracuse Science & Technology Law Reporter,
31 Syracuse Sci. & Tech. L. Rep. 39, Lexis Nexis, 2014-2015) STRYKER
For many, though, the answer is simply to curb the use of unlawful
AND
incentives to balkanize and preserve the integrity of shared digital resources against
containment.

Vous aimerez peut-être aussi