Emily+Chen+and+Isaac+Cui

=AFF=

plan

 * The United States federal government should substantially curtail its domestic aerial surveillance by ruling that such surveillance constitutes a search within the Fourth Amendment and is unreasonable without a warrant, barring exigent circumstances.**

surveillance state
Imagine for a moment…at this time.
 * The War on Terror is being brought to America in the form of aerial surveillance, making Orwell’s dystopia a reality—Fourth Amendment is key to prevent it**
 * Gohoshray, 13** (Saby [President, Institute of Interdisciplinary Studies Director, Research, and Compliance WorldCompliance Company]; Domestic Surveillance Via Drones: Looking Through the Lens of the Fourth Amendment; 33 N. Ill. U. L. Rev. 579)

Law enforcement agencies…authority to kill."
 * Police forces are increasingly paramilitarized due to lack of judicial authority—drones will be a critical tool to stifle and kill dissidents—we access the quickest internal link**
 * Talai 14 -** University of California, Berkeley, School of Law (Andrew, “The Fourth Amendment and Police Discretion in the Digital Age,” 102 Cal. L. Rev. 729, Lexis/SEP)

"You're not just talking…with very little information."
 * This will disproportionately impact communities of color—the War on Drugs proves**
 * Bernd 2015** (Candice; Proposed Rules Regulating Domestic Drone Use Lack Police Warrant Requirement; Feb 24; www.truth-out.org/news/item/29250-proposed-rules-regulating-domestic-drone-use-lack-police-warrant-requirement; kdf)

Today, media reporting…of **structural racism.**
 * This will further exasperate structural racism**
 * Cyril 2015** (Malkia Amala [under and executive director of the Center for Media Justice (CMJ) and co-founder of the Media Action Grassroots Network]; Black America's State of Surveillance; Mar 30; www.progressive.org/news/2015/03/188074/black-americas-state-surveillance; kdf)

The use of drones…constructing that coalition.
 * Plans exist to weaponize drones through corporations and the federal government—escalates into proliferation of drones which devastate privacy rights**
 * Greenwald, 13** (Glenn [former columnist on civil liberties and US national security issues for the Guardian. An ex-constitutional lawyer]; The US Needs To Wake Up To Threat Of Domestic Drones; Mar 30; http://www.theguardian.com/commentisfree/2013/mar/29/domestic-drones-unique-dangers; kdf)


 * Drones remove any public anonymity and create an omnipresent Panopticon—leads to totalitarianism**
 * Burow 2013** (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf)
 * modified for language**

Empirically, this has this totalitarian state will be used to perpetuate genocide Burow 2013 **(Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf)** modified card for language This Note has explored...a worthy answer.
 * Walking down the street…cult of individualism. 140**

solvency
IV. ENSURING A REASONABLE FUTURE…Fourth Amendment protections.
 * Court action on aerial surveillance is critical to solve privacy backsliding—keeps up with technology, sets precedents for future rulings, and provides law enforcement with legal bright lines**
 * Celso 2014** (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT: ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)

[*493] The Katz reasonable expectation…legitimate privacy expectations.
 * A Supreme Court ruling on aerial surveillance is key to revitalizing 4th Amendment’s ability to protect privacy—this stops the onslaught of advancing technologies**
 * Celso 2014** (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT: ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)


 * The plan solves for invasive surveillance for multiple reasons—**

Simultaneously, the IHSS survey…catch up with technology.
 * First, requiring warrants on drones acts as a catalyst to jolt privacy law forward**
 * Ahsanuddin et al 2014** (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf)

Looking back at…protection of individual privacy.
 * Second, the plan grants adversarial standing, making it possible to challenge the constitutionality of all surveillance programs**
 * Correia 2014** (Evan RC [JD Candidate, 2015 @ Temple]; PULLING BACK THE VEIL OF SECRECY: STANDING TO CHALLENGE THE GOVERNMENT'S ELECTRONIC SURVEILLANCE ACTIVITIES; 24 Temp. Pol. & Civ. Rts. L. Rev. 185; kdf)

To begin with, skeptics…but effective policymakers.
 * Third, our precedent of the plan sets a constitutional floor for states and municipalities—empirically, it will be modeled internationally and solves future technology**
 * Rushin 2011** (Stephen [PhD student at the University of California, Berkeley, Jurisprudence and Social Policy Program; J.D., University of California, Berkeley]; THE JUDICIAL RESPONSE TO MASS POLICE SURVEILLANCE; 2011 U. Ill. J.L. Tech. & Pol'y 281; kdf)

Throughout the 13-plus years…and sadly unchallenged.
 * This is particularly important because current counter-terror initiatives are failing**
 * Zenko 2015** (Micah [Douglas Dillon fellow in the Center for Preventive Action @ CFR]; America's Virulent, Extremist Counterterrorism Ideology; May 21; foreignpolicy.com/2015/05/21/americas-virulent-extremist-counterterrorism-ideology-perpetual-war-islamic-state/; kdf)

One of the core tenets…national security policies.
 * The deference the court currently shows to the executive underpins the expansion of surveillance and war powers**
 * Deeks 13 –** Associate Professor of Law, University of Virginia Law School(Ashley S., //The Observer Effect: National Security Litigation, Executive Policy Changes, and Judicial Deference//, 82 Fordham L. Review, 827, 2013, http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=4941&context=flr)

(Avidan, Cardozo Law Review, “Presumed Imminence: Judicial Risk Assessment in the post-9/11 World,” 5 Cardozo L. Rev. 1415, Lexis/SEP) Arguments favoring judicial…only to the experts. [|n298]
 * Deference is to blame for the failures of counterterrorism—the court is key to accurate risk assessments and decision**
 * Cover 14 –** Assistant Professor of Law, Case Western Reserve University School of Law; Director, Institute for Global Security Law and Policy

The observer effect provides…rights-sensitive direction.156
 * The judicial observer effect provides a counterweight that forces the executive to adopt pre-decisional awareness of accountability**
 * Deeks 13 –** Assistant Professor of Law, University of Virginia Law School, Attorney-Adviser in the Office of the Legal Adviser at the U.S. Department of State (Ashley S., “The Observer Effect: National Security Litigation, Executive Policy Changes, and Judicial Deference,” 82 Fordham Law Review 2, SEP)

More systemically, the observer…that **implicate individual rights**.
 * Observer effect spills over to executive policies—especially when the triggering case directly implicates individual rights**
 * Deeks ’13** (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of State, advised on the law of armed conflict, including detention, the U.S. relationship with the International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)

WE MUST CHALLENGE THE ASSUMPTION…soul of this democracy
 * Justifications for maintaining the status quo are wrought with** **faulty logic—only increasing transparency of information can ensure safety**
 * Scheer 2015** (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 208-212; kdf)

1ac – plan text

 * The United States federal government should substantially curtail its domestic surveillance of security inputs of United States corporations covered by the Transportation Security Administration’s Screening Partnership Program.**

1ac – terrorism

 * Advantage one is terrorism –**

//Any American who travels…Americans would be freer.//
 * The TSA’s terrorism policy empirically guarantees vast security breaches that make terrorism inevitable – the private sector would provide a useful model, but burdensome surveillance impedes innovation**
 * Bandow 14** – senior fellow at CATO institute, specializing in foreign policy and civil liberties. Special assistant to Reagan, editor of the Inquiry Magazine, J.D. from Stanford (Doug Bandow, 1/10/14, “Privatize the TSA: Make Americans Safer by Letting Airports Handle Security,” http://www.cato.org/blog/privatize-tsa-make-americans-safer-letting-airports-handle-airport-security)//twemchen//

//**Three internal links –**//

//**a) Hiring and regulatory flexibility – decentralization allows robust quality control over private contractors – which creates a race to the top in security performance**// //**Edwards 13** – Director of Tax Policy Studies at Cato (Chris Edwards, 11/19/13, “Privatizing the Transportation Security Administration,” No. 742, Lexis)//twemchen Under the SPP program…Cato Institute scholar Jim Harper.131

//The existence of the…the current centralized system.//
 * The best studies prove our argument**
 * Edwards 13** – Director of Tax Policy Studies at Cato (Chris Edwards, 11/19/13, “Privatizing the Transportation Security Administration,” No. 742, Lexis)//twemchen//

//**b) Streamlining – the plan redirects resources – making counter-terror more effective**// //**Edwards 13** – Director of Tax Policy Studies at Cato (Chris Edwards, 11/19/13, “Privatizing the Transportation Security Administration,” No. 742, Lexis)//twemchen Management problems stemming…as discussed below.

//Considering that the human brain…tested at our checkpoints.//
 * c) Risk analysis – it’s essential to deal with the complexity of terrorism – only private innovation institutionalizes it**
 * Hawley 13** – former administrator for the TSA (Kip Hawley, 8/6/13, “TSA, change the airport security mindset,” http://www.cnn.com/2013/08/06/opinion/hawley-tsa/)//twemchen//

//**In the meantime, however, airport mismanagement has created massive vulnerabilities – which exposes airports to impending terrorist attacks – innovation in security screening is essential**// //**Brandt 11** – director at Lime, political risk consultancy based in the UAE, worked as a threat analyst for a major U.S. airline (Ben Brandt, 11/30/11, “TERRORIST THREATS TO COMMERCIAL AVIATION: A CONTEMPORARY ASSESSMENT,” https://www.ctc.usma.edu/posts/terrorist-threats-to-commercial-aviation-a-contemporary-assessment)//twemchen Despite the strenuous efforts…tactic a persistent threat.

//They’ve been accused of…terrorist threats and collect intelligence.//
 * These innovations chronically outpace the TSA – their security is always reactive – making them incapable of responding effectively**
 * Hudson 11** – staff writer @ Human Events (Audrey Hudson, 9/12/11, “TSA Creator Says Dismantle, Privatize the Agency,” http://humanevents.com/2011/09/12/tsa-creator-says-dismantle-privatize-the-agency/)//twemchen//

//**Aviation terrorism risks lashout**// //**Hanson 4** (Victor Davis Hanson is a Senior Fellow at the Hoover Institution. Private Papers -- Response to Readership -- June 20th http://victorhanson.com/articles/Private%20Papers/Question%20Log/June_20.html)// //Can Islam coexist with the West… **American counter-responses**.//

//**Innovations to prevent terrorism are necessary to check illegal wildlife trafficking**// //**IPSN 14** – India Public Sector News (8/11/14, “Govt Says Revenue Target in Indirect Taxes for 2014-15 Fiscal Achievable,” IPSN, Lexis)//twemchen Ms. Shanti Sundharam…institutionalize consultative mechanisms.

//Trafficking of **flora** and **fauna**…also affected fragile ecosystems.//
 * Trafficking destroys the environment and causes rampant disease outbreaks**
 * VADR 14 –** Vayu Aerospace and Defense Review (8/28/14, “Clear and Present Danger: Non-traditional security threats in the Indian Ocean Region (IOR),” Lexis)//twemchen//

//**That’s the only way to prevent extinction**// //**Casadevall 12** March 21st, 2012, Arturo Casaveall is a professor of Microbiology and Immunology at the Albert Einstein College of Medicine, Arturo, “The future of biological warfare,” [] // //In considering the importance…natural evolution or bioengineering.//

//**Specifically, Avian flu**// //**Chandra 4** – National Security Advisor for India (Satish Chandra, 2004, “Global Security: A broader concept for the 21st century”, Center for Strategic Decision Research, 5-7, http://www.csdr.org/2004book/chandra.htm)//twemchen This scenario, as frightening…60 percent mortality rate is estimated.

1ac – airlines

 * Advantage two is airlines –**

//From removing shoes and belts…application from being approved," she reports.//
 * TSA screening imposes chronic delays on airport operators – this devastates airlines – SPP modeling is essential**
 * Garrett 10** – staff writer at Airport Improvement Magazine (Ronnie L. Garrett, March-April 2010, “Airports Across the Nation Make Passenger Screening a Private Matter,” http://www.airportimprovement.com/content/story.php?article=00157)//twemchen//

//**These inefficiencies are devastating to airlines – imposing a long-term drag on their financial success – streamlining is key**// //**Lichtenstein 10** – associate director in the Consulting Services division of the economic forecasting firm HIS Global Insight, redesigns government operational systems incorporating econometric decision models that leverage data to achieve savings (Daniel Lichtenstein, Q1 2010, “Tighter air security will need a deft touch to avoid economic harm,” http://www.supplychainquarterly.com/print/scq201001monetarymatters/)//twemchen In August 2010, the United States…result from increased screening.


 * The plan solves streamlining –**

//Further, who do you think really foots the bill…Boeing 737s crashing each year.” -//
 * a) Efficiency and cost delegation – TSA policy passes security screening costs onto airlines – it’s vital to balance their budget – inefficient security functions as a tax on air travel**
 * Perkins 14** – staff writer at Outset Magazine, citing the one and only Nate Silver (Stephen Perkins, 8/18/14, “Abolish the TSA? Here’s Why We Should,” http://outsetmagazine.com/2014/08/18/abolish-tsa-heres/)//twemchen//

//**Efficiency’s essential – delays deter flyers, devastating demand**// //**May 4** – Air Transport Association (Mr. Jim May, 6/22/4, “Statement of Mr. Jim May CEO, Air Transport Association (ATA),” Federal Document Clearing House Congressional Testimony, Lexis)//twemchen II. TSA MUST **PROMOTE**…perform their functions effectively.

//I would encourage you…overdirecting in other areas.//
 * b) Confidence – delays kill it**
 * Pearce 4** – US House of Representatives from New Mexico (Steve Pearce, 4/22/4, “HOUSE COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE: SUBCOMMITTEE ON AVIATION HOLDS A HEARING ON AIRPORT SCREENER PRIVATIZATION,” Aviation Subcommittee, Lexis)//twemchen//

//**Efficient airlines are vital to agricultural distribution – no other transport can fill in**// //**AFA 12** (Airlines for America, “Economic Impact,” http://www.airlines.org/Pages/Economic-Impact.aspx)//twemchen In the summer of 2005, Pulitzer Prize…modes are unreliable or non-existent."

The world has been **slow**…is the overriding concern."
 * This causes food price blips – which kill billions**
 * Brown 5 –** Lester R. Brown, President of the Earth Policy Institute, 2-7-2005 http://www.peopleandplanet.net/doc.php?id=2424

Those who claim the relatively affluent…the expense of the starving.
 * Preventing starvation is ethically prior to any other impact**
 * LaFollette 3** — Cole Chair in Ethics at USF (Hugh, www.stpt.usf.edu/hhl/papers/World.Hunger.htm)

In a world confronted by global terrorism…health of our planet.
 * Famine risks WMD conflict and extinction**
 * Lugar 4** (Richard G., Former U.S. Senator – Indiana, Former Chair – Senate Foreign Relations Committee, “Plant Power”, Our Planet, 14(3), http://www.unep.org/ourplanet/imgversn/143/lugar.html)

Aerospace systems are of considerable importance…**entire** space sector relies on.
 * Airline demand is essential for military aerospace**
 * Thompson 9** – David, President – American Institute of Aeronautics and Astronautics, “The Aerospace Workforce”, Federal News Service, 12-10, Lexis

Deterrence Strategy In stark contrast to the bipolar Cold War…U.S. strategy and **crisis management**.
 * Extinction**
 * Pfaltzgraff 10** – Robert L, Shelby Cullom Davis Professor of International Security Studies at. The Fletcher School of Law and Diplomacy and President of the Institute for Foreign Policy Analysis, et al., Final Report of the IFPA-Fletcher Conference on National Security Strategy and Policy, “Air, Space, & Cyberspace Power in the 21st-Century”, p. xiii-9

1ac – solvency

 * Contention three is solvency –**

//While you will hear later from BearingPoint…proposal **careful consideration**.//
 * Private sector innovation is essential – the TSA is statutorily obligated to model private innovations – under the SPP, they’re too constrained now**
 * Stone 4** – Admiral, Acting Administrator of the TSA (David Stone, 4/22/4, “ HOUSE COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE: SUBCOMMITTEE ON AVIATION HOLDS A HEARING ON AIRPORT SCREENER PRIVATIZATION,” Aviation Subcommittee, Lexis)//twemchen//

//**The status quo imposes devastating innovation constraints on SPP screeners – only curtailing TSA oversight of the security inputs process prevents inefficient micromanagement**// //**Ybarra 13** – senior transportation policy analyst at the Reason Foundation, a nonprofit think tank (Shirley Ybarra, July 2013, “Overhauling U.S. Airport Security Screening,” Policy Brief 109, http://reason.org/files/overhauling_airport_security.pdf)//twemchen Competitive contracting has been widely used…federal laws and screening.


 * All their disads are non-unique –**

//Many other countries…**terrorism intelligence** and **analysis**.//
 * a) Privatization’s inevitable internationally**
 * Edwards 13** – Director of Tax Policy Studies at Cato (Chris Edwards, 11/19/13, “Privatizing the Transportation Security Administration,” No. 742, Lexis)//twemchen//

//**b) It’s inevitable in the US – and increases are coming**// //**Trainor 12** – staff writer at the Montana Standard (Tim Trainor, 9/2/12, “Airport may use private screeners,” McClatchy-Tribune Business News, Lexis)//twemchen Sixteen U.S. airports…will want to apply." The PP5 Pilot Program allows qualified…federal operating standards, the SOPs.
 * Decentralizing regulation solves**
 * Mica 4** – US House of Representatives from Florida (John Mica, 4/22/4, “HOUSE COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE: SUBCOMMITTEE ON AVIATION HOLDS A HEARING ON AIRPORT SCREENER PRIVATIZATION,” Aviation Subcommittee, Lexis)//twemchen

plan
====The United States federal government should substantially curtail its domestic aerial surveillance by ruling that such surveillance constitutes a search within the Fourth Amendment and is unreasonable without a warrant.====

The War on Terror is being brought to America in the form of **aerial surveillance**, making Orwell’s **dystopia a reality** —Fourth Amendment is **key to prevent it**
Gohoshray, 13 (Saby [President, Institute of Interdisciplinary Studies Director, Research, and Compliance WorldCompliance Company]; Domestic Surveillance Via Drones: Looking Through the Lens of the Fourth Amendment; 33 N. Ill. U. L. Rev. 579) Imagine for a moment… at this time.

Police forces are increasingly paramilitarized due to __lack of judicial__ authority—drones will be a **critical tool** to stifle and kill dissidents—we access the **quickest internal link**
Talai 14 - University of California, Berkeley, School of Law (Andrew, “The Fourth Amendment and Police Discretion in the Digital Age,” 102 Cal. L. Rev. 729, Lexis/SEP) Law enforcement agencies…authority to kill."

This will **disproportionately impact** communities of color—the War on Drugs proves
" __You're not just talking…__ very little information." ==== Drones are an **unprecedented threat** to privacy—capable of monitoring entire cities with facial recognition technology, break into wifi connections, and hack phones—drones are the __epitome__ of surveillance technology ==== Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) Introduction A sixteen-hour standoff… laws were developed.
 * Bernd 2015** (Candice; Proposed Rules Regulating Domestic Drone Use Lack Police Warrant Requirement; Feb 24; www.truth-out.org/news/item/29250-proposed-rules-regulating-domestic-drone-use-lack-police-warrant-requirement; kdf)

This will further **exacerbate** structural racism—ubiquitous drone technology is used to police and control communities of color—racial profiling __relies__ on this surveillance
Cyril 2015 (Malkia Amala [under and executive director of the Center for Media Justice (CMJ) and co-founder of the Media Action Grassroots Network]; Black America's State of Surveillance; Mar 30; www.progressive.org/news/2015/03/188074/black-americas-state-surveillance; kdf) Today, media reporting on…context of //structural racism.// ====Plans exist to **weaponize drones** through corporations and the federal government— **escalates** into **proliferation of drones** which **devastate** privacy rights and lends more power to the state—a curtailment now is critical==== Greenwald, 13 (Glenn [former columnist on civil liberties and US national security issues for the Guardian. An ex-constitutional lawyer]; The US Needs To Wake Up To Threat Of Domestic Drones; Mar 30; http://www.theguardian.com/commentisfree/2013/mar/29/domestic-drones-unique-dangers; kdf) The use of drones by domestic US…constructing that coalition.

Drones make dissent impossible by removing any **public anonymity** and create an **omnipresent Panopticon** —leads to totalitarianism
Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) Walking down the street… cult of individualism. 140
 * modified for language

Empirically, this has this totalitarian state will be used to **perpetuate genocide**
Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) This Note has explored… a worthy answer. ====There are no court surveillance checks now—privacy invasions are inevitable **absent ruling** on the Fourth Amendment. Court action on aerial surveillance is **critical** to solve privacy backsliding— **keeps up** with technology, sets precedents for **future rulings**, and provides law enforcement with **legal bright lines**. Otherwise, it leads to the proliferation of other types of surveillance and **unprecedented** technological capabilities of UAS.==== Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT: ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf) IV. ENSURING A REASONABLE FUTURE… Fourth Amendment protections.
 * modified card for language

====The current trend towards **normalization** of aerial surveillance will devastate privacy rights. A Supreme Court ruling on aerial surveillance is **key to revitalizing** 4th Amendment’s ability to protect privacy—this stops the **onslaught** of advancing technologies and solves better than the legislative branch.==== Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT: ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf) [*493] The Katz reasonable expectation… legitimate privacy expectations.

The plan solves for invasive surveillance for three reasons—
====First, drones threaten to **perfect surveillance** —warrants are key to act as a **catalyst** to **jolt** privacy law forward to match the speed of the development of technology—this functions as an __overarching framework__ to address future privacy issues==== Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf) Simultaneously, the IHSS survey…catch up with technology. ====Second, the plan sets a **precedent** for judicial review of surveillance activities, which ensures the possibility of __adversarial **standing.** __ This creates a dialogical exchange between opposing parties to **balance interests** between national security and privacy, which ensures neutrality and makes it possible to **challenge** surveillance programs==== Correia 2014 (Evan RC [JD Candidate, 2015 @ Temple]; PULLING BACK THE VEIL OF SECRECY: STANDING TO CHALLENGE THE GOVERNMENT'S ELECTRONIC SURVEILLANCE ACTIVITIES; 24 Temp. Pol. & Civ. Rts. L. Rev. 185; kdf) Looking back at the events…protection of individual privacy. ====Third, our **precedent** of the plan sets a **constitutional floor** for states and municipalities to model policies after. Judges are more flexible and knowledgeable than the legislature. The plan will be **modeled internationally and solves future technology. The plan is a step in the right direction to break down the surveillance state.** ==== Rushin 2011 (Stephen [PhD student at the University of California, Berkeley, Jurisprudence and Social Policy Program; J.D., University of California, Berkeley]; THE JUDICIAL RESPONSE TO MASS POLICE SURVEILLANCE; 2011 U. Ill. J.L. Tech. & Pol'y 281; kdf) To begin with, skeptics allege…effective policymakers.

Drones are a __uniquely__ bad form of surveillance—their **intrusive** and **perceivable** nature creates a chilling effect
Slobogin 2014 (Christopher [Milton Underwood Prof of Law, Vanderbilt U Law School]; Panvasive Surveillance, Political Process Theory, and the Nondelegation Doctrine; 102 Geo. L.J. 1721; kdf) Why has there been…in the same manner.

The plan sheds light on other drone programs – aff is a critical first step to set a precedent for curbing overreach
Selinger and Kaag 2015 (Evan and John [Associate prof of philosophy @ U of Massachusetts Lowell]; Why domestic drones stir more debate than ones used in warfighting abroad; Mar 9; http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0309/Why-domestic-drones-stir-more-debate-than-ones-used-in-warfighting-abroad kdf) Selinger: Do you think it’s…aware of this difference.

In instances in which we can shed light on dangerous surveillance technology, we have a **responsibility** to do so
Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 176; kdf) WE ARE A NATION…United States in the world.

The massive **chilling effect** produced by surveillance needs to be confronted
Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 208-212; kdf) WE MUST CHALLENGE THE…soul of this democracy."

=Neg= This will be every neg round we've had, in (roughly) chronological order.

Round Report:
Aff: Drones (privacy advantage) 1NC: T-its, Terrorism DA, Foucault K, Warrants PIC, Circumvention on case, Drones good on case 2NR: Foucault

The United States federal government is the national government
//__Federal government. 1. A national ... United States - - 2-3] __//
 * __Black’s Law__** Dictionary, 8th Edition, June 1, 20**__04__**, pg.716.

“Its” implies that the USFG must be the possessor or agent of surveillance
Merriam Webster No date ([|http://www.merriam-webster.com/dictionary/its] its AWEY) Full Definition of ITS¶ : of ...  

Terror threats are mounting
Bolton 2015 (John R [served as the US Permanent Representative to the UN and as Under Secretary of State for Arms Control and International Security]; NSA activities key to terrorism fight; Apr 28; www.aei.org/publication/nsa-activities-key-to-terrorism-fight/; kdf)

After six years of President Obama, however, trust in government is in short

AND

more confidence, where a calmer, more sensible debate can take place.

Drones are critical to combat bio- and chemical-terror
Koerner 2015 (Matthew R [Duke University School of Law, J.D. expected 2015]; DRONES AND THE FOURTH AMENDMENT: REDEFINING EXPECTATIONS OF PRIVACY; 64 Duke L.J. 1129; kdf)

Senator Dianne Feinstein, a staunch advocate of governmental surveillance n1 and Chairman of the

AND

and license plates, and to fly in strategic, coordinated formations. n16

Government surveillance critical to prevent terror attacks
Sulmasy, 13 --- Professor of Law and Governmental Affairs Officer at Coast Guard Academy (6/10/2013, Glenn, “Why we need government surveillance,” [], JMP)

// The current threat by al Qaeda and jihadists is one that requires aggressive intelligence collection //

// AND //

government can, and must, do in order to protect its citizens.

Terrorist attacks escalate – killing billions
Myhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf)

Technology contains no inherent moral directive—it empowers people, whatever their intent,

AND

, and bombings in major cities. Strategic objectives cannot be far behind.

=
Their attempt to restrain a small element of the surveillance state normalizes its activities, creating and reinforcing a fear of otherness that renders the subject dependent upon surveillance—this creates social apathy and embraces authoritarianism===== Giroux 2014 [Henry A., Global TV Network Chair Professor at McMaster University in the English and Cultural Studies Department and a Distinguished Visiting Professor at Ryerson University, “Totalitarian Paranoia in the Post-Orwellian Surveillance State,” Truthout, 10 February 2014, []] In his videotaped Christmas message, Snowden references Orwell's warning of "the dangers of AND  make them everybody's shared property and a property everybody wishes to share.10

Their façade of resistance is actually the project of liberal subject building—this is a nihilistic enterprise that destroys value to life and causes endless warfare
Resilientsubjects are subjects that have //accepted the imperative not to resist// or secure themselves AND that contemporarily permeate our ways ofliving //devoid of any meaning// as such.
 * Evans and Reid 13** [Brad, Senior Lecturer in International Relations at the University of Bristole, and Julian, “Dangerously exposed: the life and death of the resilient subject,” //Resilience//, 2013, Vol. 1 (2), pp. 83-98]

=
The alternative is to reject the legalistic imaginary in favor of a politics of autonomous collective struggle. Our dissent channels progressive politics towards massive collective struggle—this is necessary to reinstate democracy to the neoliberal state===== Giroux 2014 [Henry A., Global TV Network Chair Professor at McMaster University in the English and Cultural Studies Department and a Distinguished Visiting Professor at Ryerson University, “Totalitarian Paranoia in the Post-Orwellian Surveillance State,” Truthout, 10 February 2014, []] Under the rubric of battling terrorism, the US government has waged a war on AND most evident in the insults and patriotic gore heaped on Manning and Snowden.

=
The United States federal government should limit the persistent use of aerial surveillance, require law enforcement agents to delete impertinent information after 48 hours, and mandate that aerial surveillance occur at least 350 feet above the ground.=====

The CP is preferable to the warrant-based logic of the aff
McNeal, Pepperdine professor, 14 (Gregory [prof at Pepperdine University]; Drones and Aerial surveillance: Considerations for Legislators; Nov; www.brookings.edu/research/reports2/2014/11/drones-and-aerial-surveillance; kdf) While warrants are appealing to privacy advocates, the enactment of overly broad restrictions on AND may make aerial surveillance by drones more protective of privacy than human surveillance.

Round Report:
Aff: Islamophobia (with plan text) 1NC: Psychoanalysis, Circumvention DA, State PIC, 'Islamophobia' PIC, Speaking for Others on case, Schlag on case 2NR: Psychoanalysis

=
The 1AC is a subversive performance that is functionally wishful fantasy—by briefly snatching away a small part of the power structure, they create a feel-good solution that leaves most forms of oppression intact. Moreover, they __necessitate__ that power structure because they derive pleasure from the act of snatching; their revolution is thus trapped in opposition to the Master===== Zizek 97 (Slavoj, International Director of the Birkbeck Institute for the Humanities, president of the Society for Theoretical Psychoanalysis, The Plague of Fantasies, p. 45-48) DJ Inshort, __the right-wing intellectual is a knave, a conformist who__ __AND__ __Master - **makes us accept the framework of the social relationship of domination.**__

=
The alternative is to embrace the death drive—it is only by recognizing the internal limit of our conceptions of security by which we can articulate a different political project. Their political project is doomed to failure, as there will always exist some obstacle to our utopia, to be met with escalatory violence. The missing signifier is enjoyable only insofar as it remains missing—rather than render it an external, empirical object to be found, vote negative to uphold it as lost===== // There is no path leading from the death drive to utopia. The death drive // // AND // // recognize that //we enjoy the lost object only insofar as it remains lost.//
 * McGowan 2013** --- Associate Professor at the University of Vermont (Todd, __Enjoying What We Don’t Have__, Project Muse)//trepka//

A network of national security officials actually determines policy --- enacting external checks just legitimates them without providing any constraint
VI. Conclusion __U.S. national security policy has **scarcely changed from**__ AND __encourages the public to become less, not more, informed and engaged__.
 * Glennon, 14 ** --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” [|http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf, JMP)]

State-centric curtailment will __inevitably__ fail—__circumvention__, increase in __suppression__, and extension of __power__
Schriefer, 10 —advocacy director at Freedom House and contributor to New York Times (Paula, 11/9/10, "The Wrong Way to Combat 'Islamophobia'", New York Times, [|www.nytimes.com/2010/11/10/opinion/10iht-edschriefer.html?_r=0&module=ArrowsNav&contentCollection=Opinion&action=keypress&region=FixedLeft&pgtype=article)//twemchen] This week, member states of the United Nations will vote on what has become AND  any context and U.N. member states should reject them unconditionally.

Specifically, executive lawyers provides the means to circumvent the plan
II. The Breakdown of Government Lawyering The military and foreign policy disasters generated AND would be malpractice. Government lawyering this bad should be grounds for discharge.
 * Shane, 12** --- Jacob E. Davis and Jacob E. Davis II Chair in Law, The Ohio State University Moritz School of Law (Peter M., Journal of National Security Law & Policy, “Executive Branch Self-Policing in Times of Crisis: The Challenges for Conscientious Legal Analysis,” 5 J. Nat'l Security L. & Pol'y 507))

=
“Change from within” is built on the liberal multiculturalist presumption that Muslim-Americans have political agency and institutional power – they don’t, and whenever they even come close to attaining it they’re labeled terrorists and investigated===== Guttman, 12 —Nathan, “The Truth? Few Muslims in Government,” Forward, [] --BR When Minnesota Republican Rep. Michele Bachmann and a group of colleagues called for a AND the young Zogby constantly came under attack from some pro-Israel activists.

=
State approaches to challenging surveillance only result in more surveillance moves that __depoliticize and destroy student activism__ – the alt is a form of __consciousness raising__ that is vital to avoid their hopeless belief in institutional reform===== Asmail, 14 – Asmail, Juman. Palestinian student activist. co-founder of Southampton Students for Palestine and is interested in the universal struggle for justice. "Student Activism Is Being Sabotaged and This Is Why It Matters." OpenDemocracy. Creative Commons Attribution, 12 Sept. 2014. Web – Janai It was students’ consciousness of their duty towards humanity, towards their fellow oppressed students AND loss not only to students but the good of society as a whole.

The usage of the term ‘Islamophobia’ is inappropriate, causes homogenization and essentialism, and generalizes the concept of Islam based oppression
Lorente 10 (Javier Rosón Lorente, PhD. in Social Anthropology from the University of Granada and is currently researcher at Casa Árabe e Instituto Internacional de Estudios Árabes y del Mundo Musulmán (Spain). __Discrepancies Around the Use of the Term “Islamophobia”__, The Omar Khayyam Center for Integrative Research in Utopia, Mysticism, and Science, HUMAN ARCHITECTURE: JOURNAL OF THE SOCIOLOGY OF SELF-KNOWLEDGE, VIII, 2, FALL 2010, 115-128)//ASMITH As mentioned above, there is another order of criticism or discrepancy toward the term AND such as discourse associated to the death of Theo van Gogh, etc.

This is a //pre-requisite// to effectively challenging anti-Muslim violence
Edvardsson 08 (Linda Edvardsson, “Islamophobia – Features of Islamophobia and Strategies against it” Malmö University Department of International Migration and Ethnic Relations IMER 91-120 Fall 2008 Master Thesis) There is ultimately a need to address Islamophobia; both on a social level and AND attributes of Islam and the Muslim population instead of always doing the opposite.

=
The 1AC speaks from a __privileged position__ of __disinvestment__ with the stories of the Muslim Americans that they have chosen to tell—their universalization of Muslim subject positions isn’t an act of speaking on behalf of others, it’s an act of speaking for others and silencing the subaltern===== Kapoor, 2008 —Professor of Critical Development Studies at the Faculty of Environmental Studies at York University (Ilan, Spring 2008, "Introduction: Islam and Cultural Politics", //Topia: Canadian Journal Of Cultural Studies//, pg. 3-5)//twemchen The Postcolonial View: Islam as Open and Political But there is another perspective on AND of TOPIA bring much needed attention to these important postcolonial insights and preoccupations.

Speaking for others __re-enforces__ violence, coercion, and oppression while silencing Muslim Americans—their stories are __inevitably__ twisted and construed to fit the current hierarchy of power
Alcoff, 91 — Associate Professor of Philosophy and Women's Studies and the Meredith Professor for Teaching Excellence at Syracuse University (Linda, Winter 1991, “The Problem of Speaking for Others,” Cultural Critique, No. 20, p. 5-32)//twemchen These examples demonstrate the range of current practices of speaking for others in our society AND amount to the following: will it enable the empowerment of oppressed peoples?

=
Training students in ‘the language of the state’ teaches mediocrity and complacency with status quo power relations—this guarantees violent decision-making—voting negative is necessary to rupture the echo-chamber of legalistic education===== In terms of social organization then, there may be something to be said for AND for the standardization point made earlier, generally, standardization is overdone. n62
 * Schlag 9** [Pierre, Byron R. White Professor of Law and Former Associate Dean for Research, University of Colorado Law School, “ESSAY AND RESPONSE: Spam Jurisprudence, Air Law, and the Rank Anxiety of Nothing Happening (A Report on the State of the Art),” March, 2009, Georgetown Law Journal, 97 Geo. L.J. 803]

Round Report:
1AC: Islamophobia (First Amendment protected rights plan text) 1NC: Foucault K, 'Islamophobia' PIC, 'Reasonable suspicion' PIC, T-nonpublic information 2NR: T

K
See above

'Islamophobia' PIC
See above

=
A truly deontological ethics must be __completely__ divorced from calculation about the rights of privacy against racial profiling—we must reject racial profiling in __every instance__ – their 1AC evidence===== Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L. Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004, Lexis, //*fc//) 2. "Profiling" of Muslims Does the F.B.I AND the First Amendment, but suppression of evidence is an unlikely remedy. n203

It’s a yes-no question—we cannot compromise—more 1AC evidence
Horwitz, 14 --- covers the Justice Department and criminal justice issues nationwide for The Washington Post (12/8/2014, Sari, “Justice Dept. announces new rules to curb racial profiling by federal law enforcement,” [], JMP) The Obama administration on Monday formally announced long-awaited curbs on racial profiling by AND is not an adequate response to the crisis of racial profiling in America.”

b. Their solvency advocate—Berman justifies the plan as a balance between rights and security—their ONLY 1AC solvency advocate
Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” [], JMP) Substantive Recommendations Regardless of what additional procedural protections are implemented, some elements of the AND of threats. The result will be a safer, more just America.

=
2) Circumvention—the 1AC gives the FBI and other agencies the excuse to justify surveillance through ‘reasonable suspicion’, which is __defined by__ the government itself—all of their inherency arguments are proof that the government’s internal checks fail—only taking a hardline stance can solve=====

Interpretation and violation: surveillance requires an __expectation of privacy__ but the aff only curtails federal acquisition of __public__ information
Bedan, 7 - J.D. Candidate, Indiana University School of Law (Matt, “Echelon's Effect: The Obsolescence of the U.S. Foreign Intelligence Legal Regime," Federal Communications Law Journal: Vol. 59: Iss. 2, Article 7. Available at: [] The definition of surveillance, in pertinent form, is the acquisition of a communication AND years, the privacy implications of government access to this data are huge.

1AC: NSA
1NC: Psychoanalysis K, T-Domestic Surveillance, Repeal 702 CP, Rights Malthus on case, circumvention 2NR: T

Hypocrisy is __intrinsic__ to the US internet freedom agenda—legal reform fails. Only addressing the __ideological__ underpinnings of surveillance can solve
Mozorov, 13 – Visiting Scholar, Liberation Technology Program, Freeman Spogli Institute for International Studies, Stanford University and Schwartz Fellow, New America Foundation (Evgeny, “The Price of Hypocrisy,” Frankfurt General Newspaper, 7/24, http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html?printPagedArticle=true#pageIndex_2)//SY This is the real tragedy of America’s “Internet freedom agenda”: it’s going to AND dangling in your pocket and – soon – Google Glasses adoring your face.

====The alternative is to embrace the death drive—their political project will fail—there are always some obstacle to our utopia—met with escalatory violence. The missing signifier is enjoyable only insofar as it remains missing—rather than render it an external, empirical object to be found, vote negative to uphold it as lost==== // There is no path leading from the death drive to utopia. The death drive // // AND // // recognize that //we enjoy the lost object only insofar as it remains lost.//
 * McGowan 2013** --- Associate Professor at the University of Vermont (Todd, __Enjoying What We Don’t Have__, Project Muse)//trepka//

CP
====The United States federal government should repeal section 702 of the FISA Amendments Act and replace it with a requirement mandating an individualized court order for the interception of communications involving United States persons, allowing an exception solely if the primary purpose of federal surveillance is foreign intelligence gathering. This requirement should govern all federal surveillance.====

It competes – the plan makes section 702 __exclusive__ – the CP makes an individualized court order the exclusive precondition of surveillance
[] That’s why our report states that, “[w]ith the exception of e AND be programmatic acquisition of any type of communication sent by a foreign target.
 * Patel and Goitein, 15 –** *co-director of the Liberty and National Security Program at the Brennan Center for Justice AND ** co-directs the Brennan Center for Justice’s Liberty and National Security Program(Faiza and Liza, “Fixing the FISA Court by Fixing FISA: A Response to Carrie Cordero” 4/8, Lawfare,

That’s the __only__ viable mechanism to solve the case – they don’t solve perception, the CP does
The FISA provisions that govern intelligence surveillance of targets in the U.S. AND is occurring has //significantly damaged the U.S. tech industry abroad//.
 * Nojeim, 14 -** Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology(Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)

Extend Deeks 15—Domestic surveillance has to be on individuals __within__ the US—anything else __isn’t__ domestic—the majority of courts and treaties prefer our interpretation
They say you should prefer their card for qualifications—Deeks is an associate professor of law at the University of Virginia and she is a Senior Fellow at the Center for National Security Law—obviously her interpretation is the most precise because she understands the terms of art and legal jargon of “domestic surveillance” ALSO THEY HAVE CONCEDED THE ARGUMENT THAT EVEN IF THEIR INTERPRETATION IS GOOD, THEIR INTERPRETATION DOESN’T DEFINE “DOMESTIC SURVEILLANCE” IT ONLY DEFINES DOMESTIC. Our evidence makes a clear distinction between what is foreign surveillance and what is not which means we access the intent to exclude. “Domestic surveillance” is “surveilling state’s territory” while foreign survillenace is “locatd outside the surveilling state’s territory”. Her definition is based off the consensus of treaties andcourts. Ashley Deeks (Associate Professor of Law at the University of Virginia, Senior Fellow, Center for National Security Law J.D., University of Chicago Law School, 1998) 2015 “An International Legal Framework for Surveillance” 55 VA. J. INT’L L. 2015, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490700 The concept of peacetime espionage or spying encompasses a wide range of clandestine government activities AND is hard to reconcile with the nature of electronic communications and their interception.

Vote neg:
====Limits—curtailing non-US-based surveillance results in a fundamentally __different__ literature basis, allowing them to access __international relations__ based advantages—explodes negative research burden====

Ground—allowing for non-US-based surveillance subverts the __core controversy__ of privacy versus national security—this means they subvert core generics like the terrorism DA
====Extra-T is an independent voting issue—incentivizes affs to skirt to alternative literature bases and gives them unpredictable offense—that subverts negative prep—also proves the topical parts of aff aren’t enough to prove the resolution true means you can vote neg on presumption and causes unpredictable advantages====

Round Report:
1AC: Zerodays 1NC: Cyberdeterrence DA, Iran Politics DA, Psychoanalysis K, Regulations CP, Heg bad, circumvention 2NR: Politics, Heg bad, circumvention

Cites
=da= // In comparison, __the zero-days...__ __resorting to kinetic action__ .78 // //**That’s the __lynchpin__ of __cyberdeterrence__ --- decline turns the aff and ensures a __Chinese invasion__ of __Taiwan__**// //**Hjortdal 11** [Magnus Hjortdal is a researcher asso ciated with CHINA-SEC, Centre for Military Studies at the University of Copenhagen. He ho lds an M.Sc. in Political Science from the University of Copenhagen and is owner of MH International Relations, which advise s private and public institutions, “China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence” Journal of Strategic Security, 4 (2): 1-24]// khirn __China's military strategy ...____and surp rise its enemies.__ 29 THE PROSPECTS for avoiding... efforts and a general poisoning of U.S.-Chinese relations.
 * Maintaining zero-days is key to __offensive__ cyber capabilities**
 * Cushing 14** [Seychelle, B.A. in political science from Simon Fraser University, “Leveraging Information as Power: America’s Pursuit of Cyber Security,” Simon Fraser University, 11/28/14 ]//eugchen//
 * China war __escalates__ --- sovereign justifications**
 * Glaser 11** [Professor of Political Science and International Affairs – George Washington University, “Will China’s Rise Lead to War?” //Foreign Affairs// Vol. 9 Iss. 2, March/April] //khirn

=ptx=

// President __Obama's__ nuclear __agreement with Iran is the__ latest __test of the Democrats' loyalty__ toward // // AND // //__going to be OK,__ ” he said as he left the House meeting. //
 * Obama is walking a fine line now to build support for Iran deal — Dems are on the fence and PC is key**
 * Lillis 7/19**, staff writer at The Hill, (Mike, 7/19/15, Iran deal tests Dems' loyalty to Obama, The Hill, http://thehill.com/policy/international/248371-iran-nuclear-deal-tests-democrat-loyalty-to-obama)//kap//

//**Obama supports maintaining zero-day exploits**// //**Zetter 14** (Kim Zetter, “Obama: NSA Must Reveal Bugs Like Heartbleed, Unless They Help the NSA”, WIRED, 4/15/2014, http://www.wired.com/2014/04/obama-zero-day/) //MBB AFTER YEARS OF studied silence on the government’s secret and controversial use of security vulnerabilities AND only be made “following senior, interagency review involving all appropriate departments.”

(3/2/2007, Dr. Andrew J. Loomis is a Visiting Fellow at the Center for a New American Security, “Leveraging legitimacy in the crafting of U.S. foreign policy,” pg 35-36, [|http://citation.allacademic.com//meta/p_mla_apa_research_citation/1/7/9/4/8/pages179487/p179487-36.php] ) Declining political authority encourages defection. American political analyst Norman __Ornstein writes__ of the domestic AND influences infiltrate policy-making processes and affect the character of policy decisions.
 * This means the plan is a perceived loss for Obama that saps his capital and derails the agenda**
 * Loomis, 7** --- Department of Government at Georgetown

Jeffrey M. **Kaplow 2015**, Fellow with the University of California’s Institute on Global Conflict and Cooperation and a Ph.D. candidate in political science at the University of California, San Diego, 2015, “The Days After a Deal with Iran: Implications for the Nuclear Nonproliferation Regime,” [] A nuclear __agreement with Iran__ would represent a success for the nonproliferation regime in several AND __this signal extend__ well beyond Iran’s neighbors, __to reach potential proliferants globally.__
 * The deal is key to the overall credibility of the entire nonprolif regime**

The **Economist 3/7**, “The new nuclear age,” 2015, http://www.economist.com/news/leaders/21645729-quarter-century-after-end-cold-war-world-faces-growing-threat-nuclear A quarter of a century after the end of the cold war, __the world__ __AND__ confronting the growing nuclear threat is to stare it full in the face.
 * Credible regime prevents __global nuclear escalation__ involving __every major power__**

=psycho=

There is no path leading from the death drive to utopia. __The death drive__ __AND__ __recognize that **we enjoy the lost object only insofar as it remains lost.**__
 * Their utopian conceptions of security are driven by the pursuit of the missing signifier as stolen by the Other—be it China, Russia, or the terrorist, the 1AC’s paranoid politics will inevitably find another Other to be targeted and scapegoated, driving ever larger cycles of violence. The missing signifier is enjoyable only insofar as it remains missing—rather than render it as an external object to be attained, vote negative to uphold it as lost. It is only by recognizing the internal conceptions of security by which we can articulate a different political project**
 * McGowan 2013** --- Associate Professor at the University of Vermont (Todd, __Enjoying What We Don’t Have__, Project Muse)//trepka

=regulations counterplan= B. Partial Defenses __....__ copyrighted works. n501
 * The United States federal government should:**
 * **require firms that transact in software security vulnerabilities permit the federal government to participate in any offerings or service they provide the sale of zero-day exploits and vulnerabilities that are unreported to the National Security Agency;**
 * **require confidential reporting for transactions zero-day exploits and vulnerabilities; and**
 * **establish a reward system for researchers who share zero-day vulnerabilities and exploits with the government. The United States federal government will offer financial rewards greater than the market price for relevant zero-days.**
 * Counterplan solves zero-day use and boosts cyberdefense --- solves __every impact__**
 * Bambauer 14** [Derek E., Professor of Law, James E. Rogers College of Law, University of Arizona, “Ghost in the Network,” April, 2014, University of Pennsylvania Law Review, 162 U. Pa. L. Rev. 1011, lexis] //khirn

Round Report
1AC: Zero days 1NC: Psychoanalysis, Iran Politics, circumvention 2NR: Politics + Circumvention

Cites are same as R5

Round Report
1AC: Islamophobia without a plan text 1NC: Framework, 'Islamophobia' PIC, Psychoanalysis, Brown ballot K on case 2NR: Framework

That’s the most predictable—the wording of the resolution implies a policy enacted by governmental means
Ericson, California Polytechnic Dean Emeritus, 2003 (Jon M., Dean Emeritus of the College of Liberal Arts – California Polytechnic U., et al., The Debater’s Guide, Third Edition, p. 4) The Proposition of Policy: Urging Future Action In policy propositions, each topic contains AND compelling reasons for an audience to perform the future action that you propose.

Predictability is key—a core controversy is necessary for clash and enhances decision making
Steinberg & Freeley, 2008 – Professor, Department of Communications, John Carroll University AND Lecturer, School of Communication, University of Miami (Austin J. and David L., “Argumentation and Debate,” 43-45, [|http://staff.uny.ac.id/sites/default/files/pendidikan/Rachmat%20Nurcahyo,%20SS,%20M.A./__Argumentation_and_Debate__Critical_Thinking_for_Reasoned_Decision_Making.pdf)//SY] Debate is a means of settling differences, so there must be a difference of AND particular point of difference, which will be outlined in the following discussion.

Vote neg:
====1. __Preparation and clash__—changing the topic post facto manipulates balance of prep, which __structurally favors the aff__ because they speak last and permute alternatives—fairness is key to engaging a well-prepared opponent. That’s a reason to vote negative on presumption—the 1AC’s offense should be presumed __suspect__ because we could not test it====

That prevents __topic education__—debate about __political__ aspects of surveillance is critical to check state power—it’s key to dissent
Goold, 2009 - Fellow in Law at Somerville College (Benjamin J. Goold, 2009, “SURVEILLANCE AND THE POLITICAL VALUE OF PRIVACY,” published in the Amsterdam Law Forum, accessed: 5/9/15, fg) Of all the rights typically enshrined in domestic and international human rights instruments, privacy AND we have come to associate with life in modern, liberal democratic states.

====2. __Neg ground__—forcing a __policy__ out of the 1AC is necessary for engagement—otherwise, we’re limited to impact turning, which is __unreasonable__ since the affirmative can choose their ideology, e.g. Islamophobia, racism, sexism bad====

The impact is __antagonism__—__predictable constraints__ and engagement are necessary to channel that into __agonism__
Dryzek 2006 —Australian National University Professor of Social and Political Theory (John, Reconciling Pluralism and Consensus as Political Ideals, American Journal of Political Science, Vol. 50, No. 3, July 2006; JRom) Mouffe is a radical pluralist: "By pluralism I mean the end of a AND
 * __need principles to regulate the substance of what rightfully belongs in democratic debate__**.

====3. __Switch side debate__—it creates a space for pluralism—that allows for the development of empathy, acceptance, and understanding, but ONLY resolutional debate can solve—it also solves the aff since they can critique Islamophobic policies on the neg==== Zwarensteyn 2012 (Ellen C., "High School Policy Debate as an Enduring Pathway to Political Education: Evaluating Possibilities for Political Learning" (2012). //Masters Theses.// Paper 35.

[], LB) After surveying literature dating back to the policy debate controversies of the 1950s and 1960s AND __continuously adapting multiple perspectives in and out of a student’s world-view.__

4. __Decision making__—policy analysis is key to it. Those skills outweigh their offense—it’s key to all aspects of life
Strait and Wallace, 2008 – Lecturer, Communication, University of Southern California AND BA, George Washington University (Laurance Paul and Brett, “Academic Debate as a Decision Making Game Inculcating the Virtue of Practical Wisdom,” Contemporary Argumentation and Debate, Vol. 29, 3-6, http://www.cedadebate.org/files/2008CAD.pdf)//SY Since the inception of modern academic debate, much of the praise it has received AND maker(s) are red herrings and interfere with true rational deliberation.

5. __Debate is a game__ that should be governed by a specific and fixed set of rules—the refusal to abide by rules renders the game meaningless
Caillois, 1961 - French philosopher (Roger, 1961, “Man, Play and Games,” pg. 5-12, fg) Property is exchanged, but no goods are produced. What is more, this AND patience, skill, or ingenuity. I call this second component ludus.

The usage of the term ‘Islamophobia’ is inappropriate, causes homogenization and essentialism, and generalizes the concept of Islam based oppression
Lorente 10 (Javier Rosón Lorente, PhD. in Social Anthropology from the University of Granada and is currently researcher at Casa Árabe e Instituto Internacional de Estudios Árabes y del Mundo Musulmán (Spain). __Discrepancies Around the Use of the Term “Islamophobia”__, The Omar Khayyam Center for Integrative Research in Utopia, Mysticism, and Science, HUMAN ARCHITECTURE: JOURNAL OF THE SOCIOLOGY OF SELF-KNOWLEDGE, VIII, 2, FALL 2010, 115-128)//ASMITH As mentioned above, there is another order of criticism or discrepancy toward the term AND such as discourse associated to the death of Theo van Gogh, etc.

Psychoanalysis
====The 1AC is a subversive performance that is functionally wishful fantasy—by briefly snatching away a small part of the power structure, they create a feel-good solution that leaves most forms of oppression intact. Moreover, they __necessitate__ that power structure because they derive pleasure from the act of snatching==== Zizek 1997 (Slavoj, International Director of the Birkbeck Institute for the Humanities, president of the Society for Theoretical Psychoanalysis, The Plague of Fantasies, p. 45-48) DJ Inshort, __the right-wing intellectual is a knave, a conformist who__ __AND__ __Master - **makes us accept the framework of the social relationship of domination.**__

====Moreover, their performance is an act of interpassivity—the critique of American foreign policy as extremist is simultaneously the critique of the Right, to create the logical and correct ‘tolerant liberal’—this effaces structural antagonisms and allows for Islamophobia to continue==== Rodrigues 2011 (Laurie [U of Rhode Island]; Did Somebody Say ‘Islamophobia’? An Essay on the American Liberal Understanding of Park51 and the 911-Event; International Journal of Zizek Studies; Vol 5; no 2; kdf) In light of the contradictory press surrounding the building of this cultural center at 51 AND the central role of tolerating the Other within discourses concerning American “rights.”

====Knowledge production fails to promote social change—emancipatory politics occurs not through the lens of consciousness-raising but of __competing methods of enjoyment__—this means only the alt can solve==== McGowan 2013 Todd McGowan, Assoc. Prof. of Film and Television Studies at U. of Vermont. “Enjoying What We Don’t Have: The Political Project of Psychoanalysis. Pgs. 172 - 175. PWoods. The rule of the expert has such a degree of hegemony today that it is AND suffer its enjoyment. Sacrifice is essential to our capacity for enjoying ourselves.

====Their political project is doomed to failure, as there will always exists some obstacle to our utopia to be met with escalatory violence. The alternative is to embrace the death drive—this recognition of the internal limit of our conceptions of security allows us to articulate a different political project==== McGowan 2013 --- Associate Professor at the University of Vermont (Todd, __Enjoying What We Don’t Have__, Project Muse)//trepka// // There is no path leading from the death drive to utopia. The death drive // // AND // // recognize that //we enjoy the lost object only insofar as it remains lost.//

Resistance via the ballot can only instill an __adaptive politics of being__ and effaces the institutional constraints that __reproduce structural violence__
Brown 95 —prof at UC Berkeley (Wendy, States of Injury, 21-3) For some, fueled by opprobrium toward regulatory norms or other mo- dalities of AND //so forms an important element of legitimacy for the antidemocratic dimensions of liberalism.//

Round Report
1AC: Agamben 1NC: Framework, Psychoanalysis, right malthus on case 2NR: Framework

Cites
All read before

Round Report
1AC: Zero days 1NC: Iran Politics, cyber deterrence DA, regs CP, T-domestic, Neolib K, circumvention 2NR: Politics, circumvention

Cites
=K=

====The affirmative’s adherence to state based solutions props up global capitalism and allows it to continue environmental destruction and war mongering – the alternative is a collective transformative project against capitalism==== Carroll, Professor of Sociology, 2014 (William K, “Chapter 9 - Neoliberal Hegemony and the Organization of Consent”, Corporate Watch, Aug 9, 2014, http://www.corporatewatch.org.uk/resources/2014/chapter-9-neoliberal-hegemony-and-organization-consent) Environmentalism has been co-opted; indeed, mainstream corporate environmentalism helps //disable more// //AND// . (See also Fisher, Chapter 2 and Whyte, Chapter 3.)

=CP=

The United States federal government should:

 * **require firms that transact in software security vulnerabilities permit the federal government to participate in any offerings or service they provide the sale of zero-day exploits and vulnerabilities that are unreported to the National Security Agency;**
 * **require confidential reporting for transactions zero-day exploits and vulnerabilities; and**
 * **establish**
 * **AND**
 * **offer financial rewards greater than the market price for relevant zero-days.**

Counterplan solves zero-day use and boosts cyberdefense --- solves __every impact__
Bambauer 14 [Derek E., Professor of Law, James E. Rogers College of Law, University of Arizona, “Ghost in the Network,” April, 2014, University of Pennsylvania Law Review, 162 U. Pa. L. Rev. 1011, lexis] //khirn B. Partial Defenses While a complete defense to zero-day attacks is impossible AND proposed to deal with websites illegally offering prescription drugs or copyrighted works. n501

=DA=

House democrats will stay in line now, but only with __sustained__ capital—that prevents override
Hattem 7/25 /15 – congressional reporter for The Hill (Julian, Will Obama's Iran firewall hold?, The Hill, **http://thehill.com/policy/national-security/249173-will-obamas-iran-firewall-hold)//JJ//**
 * //President Obama is counting on House Democrats to be his last line of defense against //**
 * //AND//**
 * //and collecting names." “I feel optimistic that we will have enough.”//**

//Obama supports maintaining zero-day exploits// //Zetter 14** (Kim Zetter, “Obama: NSA Must Reveal Bugs Like Heartbleed, Unless They Help the NSA”, WIRED, 4/15/2014, http://www.wired.com/2014/04/obama-zero-day/) //MBB AFTER YEARS OF studied silence on the government’s secret and controversial use of security vulnerabilities AND only be made “following senior, interagency review involving all appropriate departments.”

This means the plan is a perceived loss for Obama—that saps his capital and derails the agenda
Loomis 2007 --- Department of Government at Georgetown (3/2/2007, Dr. Andrew J. Loomis is a Visiting Fellow at the Center for a New American Security, “Leveraging legitimacy in the crafting of U.S. foreign policy,” pg 35-36, [|http://citation.allacademic.com//meta/p_mla_apa_research_citation/1/7/9/4/8/pages179487/p179487-36.php]) Declining political authority encourages defection. American political analyst Norman Ornstein writes of the domestic AND influences infiltrate policy-making processes and affect the character of policy decisions.

The deal is key to the overall credibility of the entire nonprolif regime
Jeffrey M. Kaplow 2015, Fellow with the University of California’s Institute on Global Conflict and Cooperation and a Ph.D. candidate in political science at the University of California, San Diego, 2015, “The Days After a Deal with Iran: Implications for the Nuclear Nonproliferation Regime,” [] A nuclear agreement with Iran would represent a success for the nonproliferation regime in several AND this signal extend well beyond Iran’s neighbors, to reach potential proliferants globally.

Credible regime prevents __global nuclear escalation__ involving __every major power__
The Economist 3/7, “The new nuclear age,” 2015, http://www.economist.com/news/leaders/21645729-quarter-century-after-end-cold-war-world-faces-growing-threat-nuclear A quarter of a century after the end of the cold war, the world AND confronting the growing nuclear threat is to stare it full in the face.

=T=

Interpretation: domestic surveillance means that it must target US persons
Eggen also continues the mainstream media’s propagandistic use of the term “domestic surveillance [ AND for national security purposes is FOREIGN INTELLIGENCE COLLECTION, not “domestic surveillance .”
 * McCarthy, 6** – former assistant U.S. attorney for the Southern District of New York. (Andrew, “It’s Not “Domestic Spying”; It’s Foreign Intelligence Collection” National Review, 5/15, Read more at: []

Ground—they allow for affs that spike out of __core__ topic generics like the terror DA
=DA=

Maintaining zero-days is key to __offensive__ cyber capabilities
Cushing 14 [Seychelle, B.A. in political science from Simon Fraser University, “Leveraging Information as Power: America’s Pursuit of Cyber Security,” Simon Fraser University, 11/28/14 ]//eugchen In comparison, the zero-days used in cyber weapons require the US to AND United States to delay Iran’s nuclear program without resorting to kinetic action .78

That’s the __lynchpin__ of __cyberdeterrence__ --- decline turns the aff and ensures a __Chinese invasion__ of __Taiwan__
Hjortdal 11 [Magnus Hjortdal is a researcher asso ciated with CHINA-SEC, Centre for Military Studies at the University of Copenhagen. He ho lds an M.Sc. in Political Science from the University of Copenhagen and is owner of MH International Relations, which advise s private and public institutions, “China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence” Journal of Strategic Security, 4 (2): 1-24] //khirn __China's military strategy mentions cyber capabilities as an area that the__ People's Liberation Army ( __AND__ __virus and hacker attacks that can paralyze and surp rise its enemies.__ 29

China war __escalates__ --- sovereign justifications
Glaser 11 [Professor of Political Science and International Affairs – George Washington University, “Will China’s Rise Lead to War?” //Foreign Affairs// Vol. 9 Iss. 2, March/April] //khirn THE PROSPECTS for avoiding intense military competition and war may be good, but growth AND military efforts and a general poisoning of U.S.-Chinese relations.

Round Report
1AC: NSA 1NC: Wilderson, circumvention 2NR: both

Cites
====Domestic surveillance is __inseparable__ from the history of slavery—disciplinary power functioned to __create__ the racialized subject, imposing compulsory visibility upon the black body as oppositional to the white body==== Browne 2012 – PhD in Sociology and Equity Studies in Education (Simone; “Race and Surveillance” “Routledge Handbook of Surveillance Studies”; Google Book; [|https://books.google.com/books?hl=en&lr=&id=F8nhCfrUamEC&oi=fnd&pg=PA72&dq=race+and+surveillance+Simone+browne&ots=y_cvDcnYS0&sig=ZmhtR3WJI2mp_clVI6qwScZDZwQ#v=onepage&q=race%20and%20surveillance%20Simone%20browne&f=false]; 7/5/15 || NDW) According to Christian Parenti, the history of surveillance in America can be traced to AND looks have the power to trouble surveillance as a "Technology of Whiteness".

====Civil society is __grounded__ in the opposition of Master to Slave—it is in the death of the Slave that Humanity is birthed. The affirmative’s complacency with such violence necessitates an exclusionary politics that can never account for the political ontology of blackness; moreover, it is through such assumptive logics that the structure of antiblackness continues, setting the stage for antagonistic relationships such as class conflict, gendered violence, etc. An ethical politics can only exist through upholding the position of the Slave as prior==== Wilderson 2010 (Frank B. American writer, dramatist, filmmaker, critic and professor of Drama and African American studies at the University of California, Irvine //Red White & Black: Cinema and the Structure of U.S. Antagonisms// Duke University Press Durham & London 2010 page 1-5, //cayla//_) WHEN I WAS a young student at Columbia University in New York there was a AND themselves may not be aware of the ontological position from which they speak).

Their ontology can never reclaim freedom and humanity because the exclusion of Blackness and its founding contradistinctions. Their humanism relies on the murder of the slave.
Wilderson 2010 (Frank B. American writer, dramatist, filmmaker, critic and professor of Drama and African American studies at the University of California, Irvine //Red White & Black: Cinema and the Structure of U.S. Antagonisms// Duke University Press Durham & London 2010 page 19-23, //cayla//_) Again, what is important for us to glean from these historians is that the AND infinite—for they have no line of flight leading to the Slave.

====The alternative is to endorse an unflinching paradigmatic analysis of the World—civil society is irredeemable and the logic of Humanism can never account for the Slave as it can only understand violence as __contingent__. However, violence against the Black is both __gratuitous__ and __structural__, constantly reenacted by civil society to sustain the possibility of the Human==== Wilderson 2010 Frank, Associate Professor at UC Irvine’s Department of Drama and African American Studies (//Red, White & Black: Cinema and the Structure of U.S. Antagonisms//, ix-x, 54-9 || NDW) Strange as it might seem, this book project began in South Africa. During AND than accumulation and fungibility, when regarding the ontological status of the Black.

Round Report
1AC: Insider Threats 1NC: Insider Threats DA, Iran Politics DA, T-Curtail, Neolib, Incentives CP 2NR: Politics

Curtail means to reduce the extent or quantity of
Definition of curtail in English: verb [WITH OBJECT] 1 Reduce in extent or quantity; impose a restriction on : civil liberties were further curtailed
 * Oxford Dictionaries, 15** (“curtail”, [])

Violation: oversight is __not__ reduction—contextual evidence
Butler, Appellate Advocate Counsel, 2013 (Alan, “Standing Up to Clapper: How to Increase Transparency and Oversight of FISA Surveillance,” 48 New Eng. L. Rev. 55, 2013, LexisNexis, IC) The Supreme Court's decision in Clapper will limit judicial oversight of FISA surveillance in the AND will focus on the reforms necessary to improve the current public oversight process.

Vote neg:
====a. Bidirectionality—allowing oversight affs creates a __bidirectional__ topic since oversight could still result in an increase in surveillance—that destroys neg ground since they can link turn core generics====

K
====The affirmative’s adherence to state based solutions props up global capitalism and allows it to continue environmental destruction and war mongering – the alternative is a collective transformative project against capitalism==== Carroll, Professor of Sociology, 2014 (William K, “Chapter 9 - Neoliberal Hegemony and the Organization of Consent”, Corporate Watch, Aug 9, 2014, http://www.corporatewatch.org.uk/resources/2014/chapter-9-neoliberal-hegemony-and-organization-consent) Environmentalism has been co-opted; indeed, mainstream corporate environmentalism helps //disable more// //AND// . (See also Fisher, Chapter 2 and Whyte, Chapter 3.)

House democrats will stay in line now, but only with __sustained__ capital—that prevents override
Hattem 7/25 /15 – congressional reporter for The Hill (Julian, Will Obama's Iran firewall hold?, The Hill, **http://thehill.com/policy/national-security/249173-will-obamas-iran-firewall-hold)//JJ President Obama is counting on House Democrats to be his last line of defense against AND and collecting names." “I feel optimistic that we will have enough.”

Insider Threat is __Obama’s program__ and he’ll protect it
Taylor and Landay 2013 (“pg online @ http://www.mcclatchydc.com/news/special-reports/insider-threats/article24750244.html#storylink=cpy //um-ef) President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping AND have other grave consequences for the public’s right to know and national security.

This means the plan is a perceived loss for Obama—that saps his capital and derails the agenda
Loomis 2007 --- Department of Government at Georgetown (3/2/2007, Dr. Andrew J. Loomis is a Visiting Fellow at the Center for a New American Security, “Leveraging legitimacy in the crafting of U.S. foreign policy,” pg 35-36, [|http://citation.allacademic.com//meta/p_mla_apa_research_citation/1/7/9/4/8/pages179487/p179487-36.php]) Declining political authority encourages defection. American political analyst Norman Ornstein writes of the domestic AND influences infiltrate policy-making processes and affect the character of policy decisions.

The deal is key to the overall credibility of the entire nonprolif regime
Jeffrey M. Kaplow 2015, Fellow with the University of California’s Institute on Global Conflict and Cooperation and a Ph.D. candidate in political science at the University of California, San Diego, 2015, “The Days After a Deal with Iran: Implications for the Nuclear Nonproliferation Regime,” [] A nuclear agreement with Iran would represent a success for the nonproliferation regime in several AND this signal extend well beyond Iran’s neighbors, to reach potential proliferants globally.

Credible regime prevents __global nuclear escalation__ involving __every major power__
The Economist 3/7, “The new nuclear age,” 2015, http://www.economist.com/news/leaders/21645729-quarter-century-after-end-cold-war-world-faces-growing-threat-nuclear A quarter of a century after the end of the cold war, the world AND confronting the growing nuclear threat is to stare it full in the face.

Text: The President of the United States should
====--create a government-wide whistleblower protection policy that prevents federal agencies from using information collected by surveillance as retaliation for whistleblowing or providing it to anyone else without judicial review and express authorization by Congress.====

That solves the aff --- prevents the __chilling effect__ by removing __disincentives__ to whistleblowing --- creates __protection__ from surveillance while allowing it to __continue__
Whistleblowers are the //guardians// of the //public trust// and safety. Without proper controls at AND and accountable to the American people. I look forward to your questions.
 * Canterbury 14** (Angela, Director of Public Policy, “POGO's Angela Canterbury testifies on “Limitless Surveillance at the FDA: Protecting the Rights of Federal Whistleblowers” February 26, 2014, pg online @ [] //um-ef)

The aff throws the baby out with the bathwater --- modifying the ITP prevents insider threats and a chilling effect without decreasing surveillance that’s critical to prevent insider threats
(Michael Lawrence, Master in Security Studies, “Combating Insider Threats: An Analysis Of Current United States Insider Threat Policies And Necessary Improvements,” pg online @ http://repositories.tdl.org/asu-ir/bitstream/handle/2346.1/30135/PORTER-THESIS-2014.pdf?sequence=1&isAllowed=y //ghs-ef) Given the many insider threat-related challenges the CI Community faces, the United AND will turn personnel into sensors for future threats, not just current ones131.
 * Porter 14**

Insider threats risk __increasing now__ --- __new rules__ are __sufficient__ to solve them, but the aff’s decrease causes __critical vulnerabilities__
After a string of high-profile incidents from the Ft. Hood shooter to AND ,” said Jason O’Connor, Lockheed’s vice president for analysis and mission solutions.
 * Washington Post 14** ("Federal agencies embrace new technology and strategies to find the enemy within," Washington Post, 3/7, pg lexis//um-ef)

First, insider hacks risk __lashout__ and __extinction__
Fritz, 9 – Masters in International Relations, Researcher for International Commission on Nuclear Nonproliferation and Disarmament (Jason, 2009, “Hacking Nuclear Command and Control,” http://icnnd.org/Documents/Jason_Fritz_Hacking_NC2.pdf)//DR. H This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. AND its own, without the need for compromising command and control centres directly.

Absent detection, Chinese insiders risk __espionage__ of a __litany__ of weapons systems --- including __nuclear weapons__
(Larry M., May 16, "Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation while Protecting Critical Information" Testimony before the House of Representatives, Committee on Science, Space and Technology Subcommittee on Investigations and oversight,origin.www.uscc.gov/sites/default/files/Wortzel_Espionage%20Threat%20at%20Federal%20Laboratories05.16.13.pdf) Science and technology cooperation programs are vital to China’s own long-term goals, AND needed, classification of the product is the “only appropriate mechanism.”9
 * Wortzel, 2013** [seven-term Commissioner of the U.S.-China Economic and Security Review Commission of the United States Congress]

Chinese modernization causes __escalation__
Twomey 2009 (Christopher, co-directs the Center for Contemporary Conflict and is an assistant professor in the Department of National Security Affairs, both at the Naval Postgraduate School, Monterey, California, Arms Control Association, Chinese-U.S. Strategic Affairs: Dangerous Dynamism, http://www.armscontrol.org/act/2009_01-02/china_us_dangerous_dynamism#Twomey) // JRW China and the United States are not in a strategic weapons arms race. Nonetheless AND rogue" nations. These too would //undermine stability// in an intense crisis.