Luisa+&+Lenny

lennybrahin(at)gmail.com luisacusick(at)gmail.com

Affs - **1ac – Prism**

Plan
====The United States federal government should substantially curtail its surveillance of information in the custody of American corporations by exclusively limiting surveillance to investigations carried out under section 702 of the FISA Amendments Act, subject to additional use restrictions in Presidential Policy Directive 28.====

NSA surveillance is __crushing__ U.S. cloud-computing – __decks competitiveness__ and spills over to the __entire tech sector__
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.15-18, 2015, Hein Online)//JJ I. ECONOMIC IMPACT OF NSA PROGRAMS The NSA programs, and public awareness AND __by U.S. firms, gaining market share in the process.__

That undermines US global technological leadership
CONCLUSION When historians write about this period in U.S. history it AND . government enable its tech industry to effectively compete in the global market.
 * Castro and McQuinn 15 **, Daniel Castro works at the Center for Data Innovation, Government Technology, The Information Technology & Innovation Foundation, worked at the U.S. Government Accountability Office, went to Carnegie Mellon. Alan McQuinn works at the Federal Communications Commission, previously had the Bill Archer Fellowship at the University of Texas, (June 2015, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness”, file:///C:/Users/Mark/Downloads/2015-beyond-usa-freedom-act.pdf)//AK

Tech leadership is the __primary driver of hegemony__ –
So __what accounts for America’s transformative capacity__? AND primarily) a commercial matter—even when the NSS "goes commercial.
 * Weiss 14** – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell University Press, 4/1/14, p. 1-3)//JJ
 * NSS=National Security State

Hegemonic decline causes great power wars
(Yuhan, “America’s decline: A harbinger of conflict and rivalry”, 1-22, http://www.eastasiaforum.org/2011/01/22/americas-decline-a-harbinger-of-conflict-and-rivalry/, ldg) This does not necessarily mean that the US is in systemic decline, but it AND forecast in a future that will inevitably be devoid of unrivalled US primacy.
 * Zhang et al., Carnegie Endowment researcher, 2011 **

Hegemony solidifies economic stability and trade
Kim, 14 – [Aejung Kim, Correspondent with the Department of Political Science, Kent State University, Ohio, February 28, 2014, The Effects of the U.S. Hegemony on Economic Growth in East Asia, and the Middle East and North Africa, http://www.isca.in/IJSS/Archive/v3/i4/1.ISCA-IRJSS-2013-210.pdf, pg. 2] Jeong Although there is a difficulty in defining hegemony, hegemony is categorized as four groups AND //ties with East Asian countries with the geostrategic motivation of containing the communism.//

Robust __studies prove__ – conflict escalates and goes global
Royal 10 – Director of Cooperative Threat Reduction at the US Department of Defense (Jedidiah, “Economic Integration, Economic Signalling and the Problem of Economic Crises”, chapter in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215)//BB First, on the systemic level, Pollins (2008) advances Modelski and Thompson’s AND popularity, are statistically linked to an increase in the use of force.

The __perception__ that the NSA is using the XO 12333 back-door to circumvent section 702 is causing a __global backlash__ against US tech companies and driving data localization
Beyond 215 and FAA, media reports have suggested that there have been collection programs AND to provide their customers with some sense of how many requests are made.
 * Eoyang, 14** - Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto) (“A Modest Proposal: FAA Exclusivity for Collection Involving U.S. Technology Companies” Lawfare, 11/24, http://www.lawfareblog.com/modest-proposal-faa-exclusivity-collection-involving-us-technology-companies

====The US needs to draw a __sharp distinction__ between domestic and national security surveillance to make the US Internet Freedom agenda credible – otherwise __global internet fragmentation__ will result==== The 2013 revelations of mass surveillance by the U.S. government transformed the AND that EU officials said stemmed directly from worries after the Snowden disclosures.32
 * Fontaine, 14** – President of the Center for a New American Security; was foreign policy advisor to Senator John McCain for more than five years; Worked at the State Department, the National Security Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New American Security, September 18, 2014, [|http://www.cnas.org/sites/default/files/publications-pdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT]

Localization hurts cloud computing
Cloud Computing. Data localization requirements will often prevent access to global cloud computing services AND data flow, but this will depend on the specifics of the law.
 * Chandler and Le, 15** - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)

Cloud computing is also critical to __space situational awareness__ – solves asteroids and debris
Abstract¶ In this paper we demonstrate how __a cloud-based computing architecture can__ __AND__ NEO trajectory and impact analysis to help improve planetary defencs capability for all.
 * Johnston et al 9** [Steven, PhD in computer engineering and MEng degree in software engineering, specializes in cloud-based architecture, Kenji Takeda, Solutions Architect and Technical Manager for the Microsoft Research Connections EMEA team, has extensive experience in Cloud Computing, Hugh Lewis, professor at University of Southampton, specialist in space situational awareness, Simon Cox, professor of Computational Methods and Director of the Microsoft Institute for High Performance Computing at University of Southampton, Graham Swinerd, professor at University of Southampton, specializes in space situational awareness, “Cloud Computing for Planetary Defense”, http://eprints.soton.ac.uk/71883/1/John_09.pdf, October 2009, 3/31/15]

Asteroid strikes are unpredictable and cause extinction
Once upon a time there was a Big Bang... Cause/Effect - Cause AND ” in favor of rational random inevitable expectation... and its attendant fear.
 * Brownfield 4** (Roger, Gaishiled Project, “A Million Miles a Day”, Presentation at the Planetary Defense Conference: Protecting Earth From Asteroids, 2-26, [|http://www.aiaa.org/content.cfm?pageid=406&gTable= Paper&g] ID=17092//cc)

Applying the restrictions of PPD-28 to section 702 eliminates all negative perceptions of overbreadth
To address the problem of overbreadth in Section 702 collection, PCLOB should recommend that AND disclosure of communications content absent judicial review as a means of doing so.
 * Nojeim, 14 -** Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology(Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)

First is overreach – NSA surveillance of American companies undercuts cybersecurity – creates vulnerabilities
In addition to influencing standards-setting bodies, the NSA also goes straight to AND compromised both security and privacy in a failed attempt to improve security .”281
 * Kehl 14** - Danielle Kehl is a Policy Analyst at New America’s Open Technology Institute (OTI) (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity”, New America’s Open Technology Institute, https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf//DM)

That’s a __threat magnifier__ – makes it easier for cyberterrorists to attack
WASHINGTON — This month a four-month investigation by The Washington Post reported that AND , the NSA would keep the secret to itself for potential future actions.
 * Zhang 14** - Shu is pursuing her graduate degree at the Medill School of Journalism at Northwestern University, specializing in business reporting and video journalism. Currently, she is a health care and pharmaceutical industry reporter at Medill News Service in Chicago. (Shu, “Tech companies hurt by NSA surveillance take actions to improve internet security”, Medill National Security Zone, http://nationalsecurityzone.org/site/tech-companies-hurt-by-nsa-surveillance-take-actions-to-improve-internet-security//DM)

Second is __US-Chinese cooperation__ – NSA overreach makes cyber-surveillance cooperation with China __impossible__
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.35-36, 2015, Hein Online)//JJ// //Online warfare between China and the United States simmered in the background, until in// //AND// //__States to__// __obtain the information needed to protect the country// against foreign threats.__

Chinese cyber technology is going rogue - increase in cyber espionage and breaching of intellectual property rights of American firms
Chinese technology firms have greatly benefited in the aftermath of the Snowden revelations. For AND the Chinese market wherein the enforcement of IPR will only soften their downfall.
 * Li 13** – Director, John L. Thornton China Center, Senior Fellow, Foreign Policy (Cheng, “NSA Revelations Have Irreparably Hurt U.S. Corporations in China”, Brookings, 12/12/13, [|http://www.brookings.edu/research/opinions/2013/12/12-nsa-revelations-hurt-corporations-china-li-mcelveen)//GK]

// WASHINGTON – Former U.S. and Russian commanders Thursday called for scrapping “ // AND systems// are subject to //false alarms// ,” Cartwright said at a news conference.
 * Independently risks miscalc --- hair-trigger status causes nuclear war**
 * Japan Times 15** [May 1, 2015, “U.S., Russian ‘hair-trigger’ nuclear alert urged ended, especially in age of cyberattack,” http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp] //khirn//

Chinese cyberattack is likely - will shut down US power grids and critical infrastructure
Welcome to the increasingly dangerous world of cyber-warfare. The latest nightmare; AND crucial as our Special Forces in beating back ISIS and other Islamic terrorists.
 * Lenzner 14** - Robert Lenzner is National Editor of Forbes magazine. He joined Forbes as a Senior Editor in September 1992.Mr. Lenzner has a B.A. (cum laude) from Harvard University and an M.B.A. from Columbia University. (Robert, “Chinese Cyber Attack Could Shut Down U.S. Electric Power Grid”, Forbes, November 28, 2014, http://www.forbes.com/sites/robertlenzner/2014/11/28/chinese-cyber-attack-could-shut-down-u-s-electric-power-grid//DM)

Grid attacks take out command and control ---causes retaliation and nuclear war
// To make matters worse __a cyber attack that can take out a civilian power grid__// //__AND__// // include the use //of “nuclear weapons// ”, if authorized by the President.
 * Tilford 12** [Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, “Cyber attackers could shut down the electric grid for the entire east coast” 2012, []] //khirn//

Cyberterrorism is the most likely impact – will have catastrophic ramifications
// Terrorists will recognize the opportunity the cyber world offers sooner or later. They will // // AND // //likely major cyber threat.// It must be met with all our assets.//
 * Bucci 09** - Dr. Steven P. Bucci is IBM's Issue Lead for Cyber Security Programs and a part of the Global Leadership Initiative, the in-house think tank for IBM's public-sector practice. He most recently served as Deputy Assistant Secretary of Defense, Homeland Defense and Defense Support to Civil Authorities. (Steven, “The Confluence of Cyber Crime and Terrorism”, The Heritage Foundation, June 12, 2009, http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism//DM)//

1ac – becoming
==== The denial of subjecthood begins within modernity – systems of liberalism ontologize subjects to regulate their bodies which creates a culture of homonationalism and denies any possibility of becoming ==== Perry 14 [Brock Perry, Graduate Division of Religion, Drew University, “Towards an ontogenesis of queerness and divinity: Queer political theology and Terrorist Assemblages,” May 30, 2014]//JIH The historical shift in modernity and modern state formation to which the concept of homonationalism AND responses to the issues of homonationalism, biopolitics and identity that Puar describes.

====This imposition of a universal notion of life paradoxically causes the destruction of all life. Perhaps the curtailment of surveillance is good in the abstract, but the incarnation of surveillance that presupposes a universal model of humanity is deployed in racialized global counterinsurgency that eventually purges all life for its inevitable imperfections==== //Imposing liberalism// has often come at a price. That price has tended to be AND underwrites the violence of contemporary liberal occupations is //removed from the analytical arena//.
 * Evans 10** [Brad Evans, Lecturer in the School of Politics and International Studies at the University of Leeds and Programme Director for International Relations, “Foucault’s Legacy: Security, War, and Violence in the 21st Century,” Security Dialogue vol.41, no. 4, August 2010, pg. 422-424, sage]

====Status quo social critiques are ultimately self defeating without any form of affirmation. Rather than always being against power structures – antiblackness, capitalism, patriarchy – we should focus our politics away from reactivity and towards affirmation==== // What is, then, this sustainable subject ? It is a slice of living // // AND // common ground// on which to //negotiate these encounters// and also their //eventual conflicts//.
 * Braidotti 6** [Rosi, Philosopher and Distinguished University Professor at Utrecht University as well as director of the Centre for the Humanities in Utrecht, “The Ethics of Becoming Imperceptible,” //Deleuze and Philosophy//, ed. Constantin Boundas, Edinburgh University, Press: Edinburgh, 2006, p. 133-159] //khirn//

Joy is good and negativity is bad – Voting affirmative is an act that moves away from a politics of reactivity and opens itself to the flux that is life
Kontturi & Tiainen: Our last question relates to the broader concerns engaging feminist scholarship AND : a new world, a new body, a people to come.
 * Grosz 7** [“Feminism, Art, Deleuze, and Darwin: An Interview with Elizabeth Grosz,” NORA - Nordic Journal of Feminist and Gender Research, Volume 15, Issue 4, 2007, Katve‐ Kaisa Kontturi,* & Milla Tiainen, pages 246-256] //khirn

In face of modernity, we offer this debate as a convivial gathering – imagining unpredictable becoming rather than forcing away alterity allows for the possibility of movement
Puar 10. Jasbir Puar, professor of women’s and gender studies at Rutgers University, Women & Performance: a journal of feminist theory, Vol. 19, No. 2, July 2009, pg. 168 Out of the numerous possibilities that ‘‘assemblage theory’’ offers, much of it has AND //outcome//, //the literalism of its object// nor //the direction of its drive.//

====Refuse any attempt at legibility – The attempt to render all identity coherent and legible is a disciplinary technique which paves over modernity’s foundational Conquest, rendering it illegible. This Conquest is the sum total of all acts of violence which make the material convergence of this debate possible.==== ---seriousness is a disciplinary apparatus ---strive towards the unpredictable, dimly lit places – Benjaminian street walker Halberstam 11. J. J. Jack Halberstam, professor of English at the AND that privile //ges profit// over all kinds of other //motivations// for //being and doing//.

To abstract this debate onto a time and place we can’t control is ultimately self-defeating – our affirmation is one which affirms the assemblage of identity and refuses any attempt at coherency
Weheliye 14. Alexander G. Weheliye, professor of African American studies at Northwestern University, Habeas Viscus, pg. 82 We are in dire need of alternatives to the legal conception of personhood that dominates AND movements to abolish the grounds upon which all forms of subjugation are administered.

====Ultimately, we don’t know what this debate will do or won’t do --- to presume we know that this is meaningful or utterly meaningless is to assume a knowledge of the future we lack --- in fact, fantasies of the future structure our political lives --- reject their disavowal of materiality==== Cruel optimism highlights the workings of affect beyond familiar oppositions in the tradition of political AND how political idioms can be ingeniously reinvented for critique that engages the affects.
 * Shanks 15** [“Affect, Critique, and the Social Contract,” Torrey Shanks, Assistant Professor of Political Science at the University at Albany, State University of New York, Theory & Event, Volume 18, Issue 1, 2015] //khirn

Negative -

1ac - CVE 1nc - Legalism, T, Ptx 2nr - Legalism

1ac - Zero days 1nc - Psycho, T, deterrence DA, oversight cp 2nr - Deterrence DA

1ac - Cosmo 1nc - liberal subject bad DA, framework, cosmo bad (on case) 2nr - Everything

1ac - PRISM 1nc - terrorism da, nietzsche, t, exp post cp 2nr - terrorism da

1ac - agamben (plan) 1nc - rimal, state pik, heg good (on case), child molester pic, t-counterwarrants 2nr - rimal, heg good, nb to child molester pic, state pik solvency turn

1ac - insider threats 1nc - t, security, heg good da, rimal, terrorism da, nato/legalize weed cp, cartels k (on case) 2nr - t

1ac - alpr 1nc - puar, t, asset forfeiture da, pic out of amber alerts 2nr - t

1ac - zero days 1nc - psycho, t, deterrence da, iran sanctions da, nato cp, circumvention, heg bad 2nr - iran sanctions, circumvention

1ac - census 1nc - puar, t, politics, birth certificate cp, census good turns, colorblindness turn 2nr - politics, colorblindness turn

1ac - fugitivity 1nc - framework, university k, ballot turn, tuck and yang turn, classrooms bad turn 2nr - tuck and yang turn, classrooms bad turn