Cayla+and+Christina


 * If you have any questions, gchat us!**
 * Cayla (2N): cayla1202@gmail.com**
 * Christina (2A): christina.li2017@gmail.com**
 * ~*go bite win*~ **


 * Plan text: The United States federal government should substantially curtail its domestic surveillance using computer software vulnerabilities or exploits by disclosing them to relevant vendors.**


 * Advantage One: IP theft**

JAMIL N. JAFFER: Thank you Dr. Johnson. … share that kind of information.
 * Intellectual property theft is expanding on a massive scale --- disclosing zero-days builds trust with companies --- info-sharing legislation is key**
 * Jaffer 15** //[Jamil N., Adjunct Professor of Law and Director, Security Law Program, George Mason University Law School, Occasional Papers Series, published by the Dean Rusk Center for International Law and Policy, 4-1-2015, “Cybersecurity and National Defense: Building a Public-Private Partnership,” []]// khirn

Intellectual Property (IP) … R&D centers of multinational companies
 * IP theft disincentives innovation**
 * Warikoo 13** //professor of Himalayan and Central Asian Studies at the University of Colorado (Arun, “CYBER WARFARE: CHINA'S ROLE AND CHALLENGE TO THE UNITED STATES” p. 67-8, Jul-Dec 2013, ProQuest) | js//

American companies that … energy and the environment.
 * Cyber espionage decimates US competitiveness**
 * Gjelten 13** //(Tom Gjelten, NPR News Reporter, NPR, 5/7/13, []) /dylsbury//

A deeper look shows … can be unraveling so quickly.
 * Decline in Competitiveness Leads to Economic Collapse and Fiscal Crisis – Empirics in France Prove**
 * Tully 13** //(Shawn Tully, editor at Fortune, Fortune, 6/20/15, []) /dylsbury//

The U.S. is back in the driver’s seat … Asset Management International.
 * US economic decline goes global and BRIC countries can’t fill in**
 * Miller 15** //**–** Bloomberg reporter (Rich, “U.S. Retakes the Helm of the Global Economy,” Bloomberg, http://www.bloomberg.com/news/articles/2015-01-09/u-s-retakes-the-helm-of-the-global-economy)BB//

Less intuitive is how periods … considered ancillary to those views.
 * Decline Faciliates Nuclear War and Terrorism – Statistics Prove**
 * Royal 10** //[Jedediah, Director of Cooperative Threat Reduction at the U.S. Department of Defense, “Economic Integration, Economic Signaling and the Problem of Economic Crises,” in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-215]//

Russia has ramped up … “So we’ve got some work to do.”
 * Russian IP theft now --- they can’t be deterred --- bolstering cyberdefense is key**
 * Bennett 4/12/**//1////5 cybersecurity reporter for The Hill (Cory, “Russia’s cyberattacks grow more brazen” 4/12/15,// //[]) | js//

Russia’s own espionage effort … military advantages worth billions.
 * That’s crucial to Russian modernization efforts**
 * Booz Allen Hamilton 13** //[Leading provider of management and technology consulting services to the U.S. government, Economist Intelligence Unit, The Economist, “Cyber Theft of Corporate Intellectual Property: The Nature of the Threat,” July 2013, []]// khirn

MOSCOW (AP) — Hundreds of new … economic potential beyond the limit.
 * That causes Russian aggression**
 * Isachenov 15** //[Vladimir Isachenkov, Associated Press, Business Insider, Feb. 4, 2015, “Russia continues massive military modernization despite economic woes,” [|http://www.businessinsider.com/russia-continues-massive-military-modernization-despite-economic-woes-2015-2#ixzz3eVw3maaO]] khirn//

In waging such a limited … emanate again from a world leader.
 * That escalates—we’re already on the brink of nuclear war**
 * Reid 15** //Professor of Law at University of St. Thomas School of Law (Charles J., University of St. Thomas Journal of Law and Public Policy, “VLADIMIR PUTIN’S CULTURE OF TERROR: WHAT IS TO BE DONE?” p. 53–5) | js//


 * Advantage Two: Offensive Cyber Operations**

Rapid proliferation What surprised … caught up but moved ahead.
 * Cyber arms race now --- the US is rapidly expanding offensive capabilities under the guise of surveillance**
 * Correa 15** //[Gordon, security correspondent, BBC News, “Rapid escalation of the cyber arms race,” 29 April 2015, []] khirn//

Cyber war is real. … ways to reduce that unpredictability.
 * Cyber war is real and unpredictably dangerous—four reasons**
 * Clarke 10** //former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States (Richard A., Cyber War: The Next Threat to National Security and What to Do About It, p.21, 4/20/10) | js//

The United States is racing … unconstrained American cyber superiority.
 * That goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements**
 * Austin 13** //[Director of Policy Innovation at the EastWest Institute, “Costs of American Cyber Superiority,” 8/6, []] khirn//

WASHINGTON – Former U.S. and Russian … Cartwright said at a news conference.
 * Independently risks miscalc --- hair-trigger status causes nuclear war**
 * Japan Times 15** //[May 1, 2015, “U.S., Russian ‘hair-trigger’ nuclear alert urged ended, especially in age of cyberattack,” [|http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp]] khirn//

In other ways, cyber weapons … before launching a counterstrike, if that were U.S. policy.
 * Low response times means there’s a greater timeframe and probability than traditional nuclear escalation**
 * Dycus 10** //[Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, “Congress’ Role in Cyber Warfare,” Journal of National Security Law & Policy, 4(1), 2010, p.161-164, []] khirn//

Offensive dominance creates … could also ignite a conflict.124
 * Uniquely true because of misperception fostered by offensive dominance**
 * Rosenzweig 9** //[Paul, founder of Reid Branch Consulting, specializing in homeland security, senior advisor to the Chertoff Group, Carnegie Fellow at Northwestern, professor at National Defense University, Editorial board at the Journal of National Security Law & Policy, deputy assistant secretary for policy at the US Department of Homeland Security, "National Security Threatsin Cyberspace" merican Bar Association Standing Committee on Law and National Security And National Strategy Forum, September 2009, [|www.utexas.edu/law/journals/tlr/sources/Issue%2088.7/Jensen/fn137.Rosenwieg.pdf]] khirn//

4.1 Intellectual Property (IP) Protection and Enforcement … cost $1 billion and 20 years to develop.36
 * Cyber terror destroys military operations – the impact is primacy**
 * Warikoo 13** //professor of Himalayan and Central Asian Studies at the University of Colorado (Arun, “CYBER WARFARE: CHINA'S ROLE AND CHALLENGE TO THE UNITED STATES” p. 67-8, Jul-Dec 2013, ProQuest) | js//

//Great power competition has returned// //…// //military competition of regional powers.//
 * That solves great power conflict**
 * Kagan, 2/19/**//2015 (Robert, Senior fellow with the Project on International Order and Strategy in the Foreign Policy program at Brookings, Ph.D. in American history from American University, “The United States must resist a return to spheres of interest in the international system”, Brookings, [|http://www.brookings.edu/blogs/order-from-chaos/posts/2015/02/19-united-states-must-resist-return-to-spheres-of-interest-international-system-kagan)//JBS]//

Øday exploits are dual-use. … protections against cyber intrusions.37
 * Zero-days are key --- inadequate cooperation risks multiple critical sectors --- like electricity and water**
 * Stockton and Golabek-Goldman 13** //[Paul and Michele, " Curbing the market for cyber weapons," Yale Law & Policy Review, Forthcoming, pg. 108-109 ] /eugchen//

To make matters worse … if authorized by the President.
 * Grid attacks take out command and control ---causes retaliation and nuclear war**
 * Tilford 12** //[Robert, Graduate US Army Airborne School, Ft. Benning, Georgia, “Cyber attackers could shut down the electric grid for the entire east coast” 2012, []] khirn//

The implications of U.S. policy … vulnerabilities we find. But not all, yet.
 * Disclosing vulnerabilities instead of using them for surveillance prevents arms races --- builds legitimacy to negotiate international cyberdefense agreements**
 * Schneier 14** //(Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. Schneier is a fellow at the [|Berkman Center for Internet and Society] at Harvard Law School and a program fellow at the New America Foundation's [|Open Technology Institute]. “Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?”, May 19, 2014, http://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/)CLi//

The potential utility of international … beyond conventional forms of deterrence.
 * That spurs international coop and mitigates offensive use**
 * Clark et. al. 9** //(David Clark, Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, Whitfield Diffie, Internet Corporation for Assigned Names and Numbers, Abraham Sofaer, former federal judge for the [|United States District Court for the Southern District of New York], and then a Legal Adviser to the [|United States State Department], “Cyber Security and International Agreements”, [|http://cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf)//CLi]//

In a speech this month on "Internet freedom," … offense already has a natural advantage.
 * Eliminating offensive cyberattacks allows the US to set global norms in cyberspace --- that’s key to prevent cyber arms races**
 * Goldsmith 10** //[Jack, teaches at Harvard Law School and is a visiting fellow at the Hoover Institution at Stanford University, “Can we stop the Cyber Arms Race,” Washington Post, February 1, 2010, []] khirn//

Plan: The United States federal government should substantially curtail its domestic surveillance using computer software vulnerabilities or exploits by disclosing them to relevant vendors.


 * Solvency**

//Information Sharing, Public Goods,// //…// //law, but of commitment.//
 * The plan solves effective information sharing between the government and private sector --- a signal of clear commitment and a steady flow of actionable disclosure is key to cooperative cyberdefense --- overcomes legal barriers**
 * Rosenzweig 12** //[Paul, leading cybersecurity expert, founder of Red Branch Consulting PLLC, a homeland security consulting company, and a Senior Advisor to The Chertoff Group, “Cybersecurity and Public Goods: The Public/Private “Partnership,” An Emerging Threats Essay, Hoover Institution, Stanford]// khirn

//**Disclosing zero-days disarms cyberattackers globally**// //**Masnick 14**// [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, “Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite,” Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml] //khirn// However, the NY Times had a story … other than themselves.

//Now, the market for information// //…// //some of the biggest participants.//
 * US is the lynchpin of the zero-days market---that sustains the arms race and global cyberattacks—the plan reverses that and reduces the market drastically**
 * Perlroth and Sanger 13** //(Nicole Perlroth covers cyberattacks, hackers and the cybersecurity industry for The Times’s business news section. She is a graduate of Princeton University, Stanford University’s Graduate School of Journalism and is a guest lecturer at Stanford’s graduate schools of business and communications. David Sanger is the chief Washington correspondent of The New York Times. “Nations Buying as Hackers Sell Flaws in Computer Code”, July 13, 2013, [])//CLi

//**US security policies modeled globally—plan spills over**// //**Demchak 14**// (Chris Demchak, Professor of Cyber Security and Co-Director, Center for Cyber Conflict Studies and Peter Dombrowski, professor of strategy at the Naval War College where he serves as the chair of the Strategic Research Department. He has also been affiliated with research institutions including the East-West Center, The Brookings Institution, the Friedrich Ebert Foundation, and the Watson Institute for International Studies at Brown University among others. “Rise of a Cybered Westphalian Age: The Coming Decades”, The Global Politics of Science and Technology - Vol. 1, July 24, 3014, http://link.springer.com/chapter/10.1007/978-3-642-55007-2_5)//CLi// In the fall of 2010, … the functions of US Cyber Command.

//In April 2014, Bloomberg reported// //…// //full analysis, and acted upon promptly.”296//
 * Disclosing vulnerabilities amounts to disarming the NSA --- zero-days are key**
 * Kehl et al. 14** //[Danielle Kehl is a Policy Analyst at New America’s Open Technology Institute (OTI). Kevin Bankston is the Policy Director at OTI, Robyn Greene is a Policy Counsel at OTI, and Robert Morgus is a Research Associate at OTI, New America is a nonprofit, nonpartisan public policy institute that invests in new thinkers and new ideas to address the next generation of challenges facing the United States, Policy Paper, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July 2014, []]// khirn

//**The status quo provides incentives for writing software with vulnerabilities --- the signal of the plan is crucial to long-term cybersecurity**// //**Schneier 12**// [Bruce, security expert with 13 books, fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute and the CTO of Resilient Systems, “The Vulnerabilities Market and the Future of Security,” Forbes, 5/30/2012, []] //khirn// Recently, there have been several … And it makes the rest of us less safe.


 * Here's our second aff: we'll disclose before the round**


 * Plan text: The United States federal government should abolish its domestic prisons.**

Surveillance, or the close observation ... generated by these inequities.
 * What does it mean to be a target? A threat? A criminal? The answer isn’t as simple as black and white, but it’s close. The United States security apparatus is intimately connected to surveillance and the desire to control, restrain, punish, and deter– the prison has become a literal and metaphysical cage for deviant bodies– this operates as a tactic of racialization which recreates the problem it attempts to solve **
 * Herzing 2005** //(Rachel, activist from the US with almost 20 years of organising experience, came to the forum and gave a talk about the work and politics of two US prison abolitionist organisations "Defending Justice - What Is The Prison Industrial Complex?" N.p., 2005. Web. 17 July 2015. http://www.publiceye.org/defendingjustice/overview/herzing_pic.html, LB)//

Almost two million people ... is directly related to the prison "solution."
 * The prison is no longer the savior from violence and lascivious activity – rather, it disproportionately targets black and brown bodies by threat inflation, unwarranted search and seizure, and assumptions of criminality. The Prison Industrial Complex is not perpetuated by racism, it IS racism**
 * Davis 98** – //former Professor at University of California, Los Angeles, PhD., Political and Social Activist (Angela, “Masked Racism: Reflections on the Prison Industrial Complex,” [], Colorlines, Sept. 10, 1998, tony)//

Having its origin in coloniality ... represent "their race" (McIntosh 1997).
 * That process of racialization allows for white self-decriminalization at the expense of bodies of color – this pushes white illegality to the sideline and furthers the idea of the innocent white liberal subject and the brooding black Other**
 * Martinot 10** -- //Instructor Emeritus at the Center for Interdisciplinary Programs at San Francisco State University (Steve “The Machinery of Whiteness: Studies in the Structure of Racialization,” Temple University Press, pp. 20-23, 2010, tony)//

Prisons are places of intense brutality ... the odor of rot and acute despair palpable.
 * The steel bars of civil society bracket off the possibility for subjectivity and personhood. Instead, prisons re-establish the master/slave dialectic with the threat of repercussion -- white “activism” is a ruse**
 * McLeod 15** -- //Associate Professor, Georgetown University Law Center (Allegra, “Prison Abolition and Grounded Justice,” UCLA Law Review, Number 1156, [], tony) **pronoun changes marked by brackets**//

White supremacist social, economic, and cultural formations ... civil society building, and globality.
 * Unlike black bodies, this form of violence isn’t relegated to the steel bars and concrete walls of the prison, rather, The justification of prisons is used to justify global United States Supremacy – the impact is endless violence as a result of codified whiteness and the globalization of the carceral state**
 * Rodriguez 8** -- //Professor and Chair of the Department of Ethnic Studies at UC Riverside, PhD. In Ethnic Studies from Berkeley (Dylan, “I Would Wish Death on You..." Race, Gender, and Immigration in the Globality of the U.S. Prison Regime,” The Scholar and Feminist Online, “Borders on Belonging: Gender and Immigration, Issue 6.3, Summer 2008, tony)//


 * Thus the plan: The United States federal government should abolish its domestic prisons.**

The U.S. prison industrial complex ... stronger and more durable.
 * Our strategy is not reformism, nor is it a call for fixing a broken system -- we demand a total destruction of prison society that permeates all aspects of life**
 * Herzing 2005** //(Rachel, activist from the US with almost 20 years of organising experience, came to the forum and gave a talk about the work and politics of two US prison abolitionist organisations "Defending Justice - What Is The Prison Industrial Complex?" N.p., 2005. Web. 17 July 2015. [], LB)//

"Imperialism" may sound like ... truly violent and harmful prison industrial complex.
 * The prison industrial complex should come first – the imperial nature of the PIC functions as an impact magnifier for any eruption of violence**
 * David 8** //(gilbert, “A SYSTEM WITH IN THE SYSTEM: THE PRISON INDUSTRIAL COM PLEX AND IMPERIALISM,” Abolition Now! Ten Years of Strategy and Struggle Against the Prison Industrial Complex, ed. CR-10 Publications Collective, 2008, LB)//

To study racism is to study walls ... is the path to a racism-free society.
 * Brick by brick, stone by stone – you have an obligation to tear down the walls of racial hierarchies that confine each one of us in our own prison of whiteness**
 * BARNDT 2k7** //(Joseph-has been a parish pastor and an antiracism trainer and organizer for thirty years, much of the latter work being done with Crossroads Ministry, Chicago, which he directed for eighteen years; Director of Crossroads, a non profit organization “Understanding and Dismantling Racism: The Twenty-First Century Challenge To White America;” pp.219-220)//

An abolitionist approach that seeks ... able to enter treatment programs.
 * Refuse any ideology that demands the continuation of the prison system – white supremacy creates laws to capture any form of alterity that exists in our perfect world, working on helping people at an individual level is more beneficial for those encaged now – our discussion of this subject within an academic setting matters**
 * Davis 2003** //(Angela Y professor of history of consciousness at the University of California, Are Prisons Obsolete? New York: Seven Stories, 2003, [], LB)//

I'd like to present an alternative ... look at what we're up against.
 * Prioritize empowerment of marginalized communities, even when with faced with extinction---this radical break from ‘business as usual’ is critical to stop inevitable destruction of the planet**
 * Pinkard 13** //(Lynice, pastor, teacher, and healer in Oakland, California “Revolutionary Suicide: Risking Everything to Transform Society and Live Fully”, Tikkun, 28.4, doi: 10.1215/08879982-2367496)//

I call this set of spiritual beliefs ... to transformation and revolution.
 * A life secured by a refusal to challenge domination is not worth living—such an existence is only a prop for a system of exploitation that destroys the possibility of valuable connections to other people**
 * Pinkard 13** //(Lynice, pastor, teacher, and healer in Oakland, California “Revolutionary Suicide: Risking Everything to Transform Society and Live Fully”, Tikkun, 28.4, doi: 10.1215/08879982-2367496)//

The global U.S. prison regime ... bureaucracies and curriculum of schools.
 * Discussing prison abolition in academic spaces is key**
 * Rodríguez 2010** //(Dylan. "The Disorientation of the Teaching Act: Abolition as Pedagogical Position." Radical Teacher 88.1 (2010): 7-19, [], LB)//


 * Past Neg Rounds Disclosure:**

--1ac: zero days --1nc: oversight cp, cyberdeterrence da, t-surveillance, psychoanalysis k --2nr: psychoanalysis
 * Practice Round 5**

--1ac: courts drones --1nc: wilderson k, t-non-public --2nr: wilderson
 * Practice Round 7**

--1ac: insider threat policy --1nc: t-curtail, insider threat da, politics da, psychoanalysis k --2nr: politics da
 * Practice Round 8**

--1ac: nsa (fcc) --1nc: t-curtail, transparency cp, politics da, neolib k --2nr: politics da
 * Interlab Round 1**

--1ac: courts drones --1nc: mosaic da, politics da, terror da --2nr: terror da
 * Interlab Round 3**

--1ac: agamben+fugitivity --1nc: framework, domestic pik --2nr: framework
 * Interlab Round 5**

--1ac: ice --1nc: t-its, t-curtail, t-surveillance, cartels k, borders cp, terror da --2nr: terror da
 * Interlab Round 8**