Académique Documents
Professionnel Documents
Culture Documents
===2===
====Juridical approaches to surveillance are a façade that conceals circumvention and
shatters challenges to sovereign power====
**Hull 14** – Gordon Hull is an Associate Professor in the Department of Philosophy at
UNC Charlotte and is part of the core faculty in the Public Policy PhD Program. Since
Summer 2013, he's been the Director of the Center for Professional and Applied Ethics.
("The Surveillance State at the Intersection of Bio, Juridical and Sovereign Power,"
NewAPPS, http://www.newappsblog.com/2014/11/the-surveillance-state-at-the-
intersection-of-bio-juridical-and-sovereign-power.html, November 11, 2014, Alla)
As I've suggested here before, one of the undertheorized aspects of biopower is the
AND
fully capable of blurring the boundaries between itself and old-fashioned sovereignty.
====The alternative is to affirm a space of risk—rather than debating about state action
on surveillance, we should expose the failure of legal reform====
**Karatzogianni and Robinson 13** – Athina Karatzogianni and Andrew Robinson are
Professor at the University of Hull. ("Schizorevolutions vs. Microfascisms: A
DeleuzoNietzschean Perspective on State, Security, and Active/Reactive Networks,"
http://works.bepress.com/cgi/viewcontent.cgi?
article=1037&context=athina_karatzogianni)
The return of state violence from the kernel of state exceptionalism is a growing
problem
AND
ward off constant anxiety, at the cost of a war on difference.
===3===
====Voting issue—====
====1. Limits—allowing effectual reductions explodes the topic. Any action can
potentially result in less surveillance. Limits are key to depth of preparation and
clash.====
===4===
===5===
====Bitcoin is sustainable now====
**Heffernan 15** – Shayne Heffernan is a writer for Live Trading News. ("Will The
Legitimacy Of Bitcoin Devalue World Currencies?," Live Trading News,
http://www.livetradingnews.com/will-legitimacy-bitcoin-devalue-world-currencies-
97625.htm, March 1, 2015, Quay)
Bitcoin just got a major legitimacy boost that it badly needed to take on the
AND
way for companies that accept the currency to capitalize on the unbanked consumer.
===6===
====Counterplan text: the United States federal government should condition legal
immunity pursuant to Section 230 of the Communications Decency Act on whether
companies maintain the technical capacity to deliver interpretable signal in compliance
with orders for electronic surveillance under the Foreign Intelligence Surveillance Act
and Title III.====
====Zero internal link to any of their impacts—the plan ensures security for private
companies and their communications—those systems are distinct from cyber-security of
nuclear and grid systems====
====They don't solve anything—their plan text says "decrease domestic backdoor
surveillance," which means the NSA stops looking through the backdoors but the
backdoors aren't actually closed—plan doesn't solve cybersecurity or the Internet
because there would still be vulnerabilities, but the NSA just stops accessing them====
**Abelson et al 15** — Harold Abelson, Professor of Electrical Engineering and
Computer Science at the Massachusetts Institute of Technology, Fellow of The Institute
of Electrical and Electronics Engineers, Founding Director of Creative Commons and
the Free Software Foundation, holds a Ph.D. in Mathematics from the Massachusetts
Institute of Technology, et al., with Ross Anderson, Steven M. Bellovin, Josh Benaloh,
Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G.
Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and
Daniel J. Weitzner, qualifications of these co-authors available upon request, 2015
("Keys Under Doormats: Mandating insecurity by requiring government access to all
data and communications," Massachusetts Institute of Technology Computer Science
and Artificial Intelligence Laboratory Technical Report (MIT-CSAIL-TR-2015-026),
July 6^^th^^, Available Online at
http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf,
Accessed 07-20-2015, p. 2-3)
The goal of this report is to similarly analyze the newly proposed requirement of
exceptional
AND
incorrectly, the security of all of their users will be at risk.
====No internal link—their evidence is about backdoors in companies security, not the
grid====
====No deaths from nuclear meltdowns and they've happened multiple times====
**Drum 11** – Kevin, political blogger for Mother Jones, "Nukes and the Free Market",
March 14, www.motherjones.com/kevin-drum/2011/03/nukes-and-free-market
We're currently told that the death toll in Japan will be at least 10,
AND
the worst case the containment vessels will almost certainly restrict the worst damage.
===Tech Competitiveness===
====Tech's not key to the economy—the loss of some revenue for US companies doesn't
destroy the foundation of growth like energy and stocks====
====No internal link—surveillance doesn't hurt competitiveness====
**IS 14** – (Insider Surveillance. Insider Surveillance is the most widely read source of
information on surveillance technologies for law enforcement, government agencies,
military intelligence, communications companies and technology leaders who together
safeguard national security and protect the public from criminals and terrorists. The
publication reflects the expertise of the intelligence, law enforcement and public policy
communities on surveillance and is followed by members in over 130 nations — from
Washington, D.C. to London, Paris, Beijing, Moscow, Rome, Madrid, Berlin, Tokyo,
Lahore, Delhi, Abu Dhabi, Rio de Janeiro, Mexico City, Seoul and thousands of places in
between. "De-Bunking the Myth of U.S. Tech Sales Lost Due to NSA," . 9-24-2014.
https://insidersurveillance.com/de-bunking-myth-of-u-s-tech-sales-lost-due-
nsa///ghs-kw)
Flashback to October 2013. "The sky is falling! The sky is falling
AND
the year 2016 and also by Forrester, just a few months earlier.