Tristen+and+Jon

advocacy: Tristen and I affirm a substantial curtailment in domestic surveillance through a process of becoming-minor

====Civil society is constituted by absolute visibility – surveillance technologies have enabled diffuse networks of control that preemptively identify all subjects as potential threats to the body politic====


 * Newman ‘9 ** (Saul Newman, Professor of Political Theory@ ULondon, “Politics in the Age of Control”, //Deleuze and New Technology//, ed. Mark Poster, pg 105-107, //wcp//)

Technologies of Control __There can be little doubt that we are living today in a__

__AND__


 * __permanent risk, capable of certain unpredictable and criminal behaviours at any time.__**

The surveillance state and globalization have aligned to enforce a model of biopolitical consumerism that necessitates the identification and extermination of difference

 * Newman ‘9 ** (Saul Newman, Professor of Political Theory@ ULondon, “Politics in the Age of Control”, //Deleuze and New Technology//, ed. Mark Poster, pg 107-110, //wcp//)

Biopolitics and Global Capitalism __In this paradigm, moreover, the body itself becomes the__

__AND__



====This security logic has led the sovereign to enact a permanent state of exception, stepping outside of the law and society itself. Social life has itself come to resemble a concentration camp – subjects are under constant surveillance, bound to the free market and state power by the fear of being declared bare life. The existence of this sovereign makes the extermination of global populations inevitable====


 * Newman ‘9 ** (Saul Newman, Professor of Political Theory@ ULondon, “Politics in the Age of Control”, //Deleuze and New Technology//, ed. Mark Poster, pg 110-113, //wcp//)

Controlling Terrorism The reterritorialising effects of global capitalism also have a paradoxical effect on the

AND

of power and a new logic of politics that must be critically analysed.

Statist societies are defined by exclusion – any subject faces the constant threat of being declared bare life

 * Robinson ’11** (Andrew, Political Theorist, Activist Based in the UK and research fellow affiliated to the Centre for the Study of Social and Global Justice (CSSGJ), University of Nottingham, “Giorgio Agamben: The State and the Concentration Camp”, January 7th, https://ceasefiremagazine.co.uk/in-theory-giorgio-agamben-the-state-and-the-concentration-camp/, //wcp//)

Agamben defines sovereignty mainly in terms of exclusion or exception. __Sovereignty is constitutive of__

__AND__

outside normal laws – the refugee detention and border control regime for example.

====Traditional political means fail to combat the neoliberal state - ‘democracy’ is a red herring for the end of individual agency. Liberal notions of commonality and consensus eliminate authentic agonism and contestation.====


 * Newman ‘9** (Saul Newman, Professor of Political Theory@ ULondon, “Politics in the Age of Control”, //Deleuze and New Technology//, ed. Mark Poster, pg 113-115, //wcp//)

Post-Politics These developments in the control society signify, I would suggest,

AND


 * __must be protected against any foreseeable security risk__** (Baudrillard 2002: 15).

====Sovereignty is not inevitable but rather comes about through the cultural acceptance of Western thought. There is no one-way forward in history – the acceptance of the liberal narrative of progress is what has legitimized domination and the erasure of individual will. Rather than dedicate ourselves to refining liberal structures, we instead move to abolish the very conditions of thinking that prompted their existence====


 * Call ‘2 ** (Lewis, Associate Professor of History @ Cal Poly San Luis Obispo, “Postmodern Anarchism”, pg 47-56, //wcp//)

But the usual suspects have another, much more serious problem. Even if postmodern

AND

__as mere phantasms of consciousness all fixed politics, economics, and culture.__

====In response to a liberal state that thrives through the identification of bodies and the imposition of political identities - Tristen and I affirm a substantial curtailment in domestic surveillance through a process of becoming-minor – in this we desert our roles and create a space that privileges anonymity and new ways of being together====


 * Newman ‘9** (Saul Newman, Professor of Political Theory@ ULondon, “Politics in the Age of Control”, //Deleuze and New Technology//, ed. Mark Poster, pg 115-120, //wcp//)

Politics in Search of a People When discussing the new society of control, Deleuze

AND

- a new collective politics based on the people and its radical potential.

Our act of intellectual self-creation eliminates the conditions that allow oppression to come about

 * Clifford ‘1** (Michael Clifford, Associate Professor of Philosophy @ Mississippi State University, “Political Genealogy After Foucault: Savage Identities”, pg 144-146, //wcp//)

__Foucault’s genealogical analyses reveal that **“the self is not given to us”**—there__

__AND__

lifted such movements from the shadows and given them an air of legitimacy.

Other aff

1ac inherency
====Obama announced that the US would disclose zero-day vulnerabilities, or unknown software flaws, to their vendors --- but loopholes allow the NSA to stockpile zero-days and jeopardize widespread cybersecurity==== Soghoian and Roubini 20 15 ( [|Chris Soghoian], Principal Technologist and Senior Policy Analyst, American Civil Liberties Union Speech, Privacy, and Technology Project & [|Sonia Roubini] , ACLU Speech, Privacy, and Technology Project, “Feds Refuse to Release Documents on “Zero-Day” Security Exploits”, March 3, 2015, [])//CLi Federal agencies served with a Freedom of Information Act request are refusing to release documents AND documents like the ones we have requested, this debate cannot take place.

Additionally, loopholes let the NSA stockpile zero-days purchased from the grey market
// Healey notes that the public statements on the new policy leave a //lot of questions AND // or to the //arsenal of zero-day vulnerabilities// the government //already possesses//.
 * Zetter 14** [Kim, award-winning journalist who covers cybercrime, civil liberties, privacy, and security for Wired, “Obama: NSA must reveal bugs like Heartbleed, unless they help the NSA,” //Wired//, []] //khirn//

Intellectual property theft is expanding on a massive scale --- disclosing zero-days __builds trust__ with companies --- __info-sharing legislation__ is key
// JAMIL N. JAFFER: Thank you Dr. Johnson. Well, I’ll actually // // AND // trust// between the //government// and //private sector// to //share that kind ofinformation//.
 * Jaffer 15** [Jamil N., Adjunct Professor of Law and Director, Security Law Program, George Mason University Law School, Occasional Papers Series, published by the Dean Rusk Center for International Law and Policy, 4-1-2015, “Cybersecurity and National Defense: Building a Public-Private Partnership,” []] //khirn//

IP theft destroys military operations --- the impact is primacy
Warikoo 13 professor of Himalayan and Central Asian Studies at the University of Colorado (Arun, “CYBER WARFARE: CHINA'S ROLE AND CHALLENGE TO THE UNITED STATES” p. 67-8, Jul-Dec 2013, //ProQuest//) | js 4.1 Intellectual Property (IP) Protection and Enforcement Intellectual Property or IP AND China's hackers that cost $1 billion and 20 years to develop.36

That solves great power conflict
//Great power competition has returned//. Or rather, it has reminded us that it AND , the system will //buckle// under the unrestrained military competition of regional powers.
 * Kagan, 2/19**/2015 (Robert, Senior fellow with the Project on International Order and Strategy in the Foreign Policy program at Brookings, Ph.D. in American history from American University, “The United States must resist a return to spheres of interest in the international system”, Brookings, [|http://www.brookings.edu/blogs/order-from-chaos/posts/2015/02/19-united-states-must-resist-return-to-spheres-of-interest-international-system-kagan)//JBS]

Russian IP theft now --- they can’t be deterred --- bolstering cyberdefense is key
Bennett 4/12 /15 cybersecurity reporter for The Hill (Cory, “Russia’s cyberattacks grow more brazen” 4/12/15, []) | js Russia has ramped up cyber attacks against the U nited S tates to an unprecedented level since AND future,” he said. “So we’ve got some work to do.”

That’s crucial to Russian modernization efforts
// Russia’s own espionage effort is also driven by a desire to diversify its economy and // // AND // industryand government networks// could give //China// and //Russia military advantages worth billions//.
 * Booz Allen Hamilton 13** [Leading provider of management and technology consulting services to the U.S. government, Economist Intelligence Unit, //The Economist//, “Cyber Theft of Corporate Intellectual Property: The Nature of the Threat,” July 2013, []] //khirn//

That causes Russian aggression
MOSCOW (AP) — Hundreds of new Russian aircraft, tanks and missiles are AND the massive military buildup will stretch the nation's economic potential beyond the limit.
 * Isachenov 15** [Vladimir Isachenkov, Associated Press, Business Insider, Feb. 4, 2015, “Russia continues massive military modernization despite economic woes,” [|http://www.businessinsider.com/russia-continues-massive-military-modernization-despite-economic-woes-2015-2#ixzz3eVw3maaO]] //khirn

That escalates—we’re already on the brink of nuclear war
Reid 15 Professor of Law at University of St. Thomas School of Law (Charles J., //University of St. Thomas Journal of Law and Public Policy//, “VLADIMIR PUTIN’S CULTURE OF TERROR: WHAT IS TO BE DONE?” p. 53–5) | js In waging such a limited war, furthermore, Putinwouldrely not on ICBMs AND must make sure such threats do not emanate again from a world leader.

IP theft causes Chinese modernization
Hager 2013 (Nicholas, Nicholas Hager is an intern at the Streit Council. U.S. and European Intellectual Property: Strategies to Circumscribe Theft by China; October 3, 2013; http://blog.streitcouncil.org/2013/10/03/u-s-and-european-intellectual-property-strategies-to-circumscribe-theft-by-china/) //JRW China’s relatively new foray into drone creation serves as a reminder of how extensively, AND ., EU, and others the ability to successfully press for China’s compliance.

That leads to global nuclear war
Twomey 2009 (Christopher, co-directs the Center for Contemporary Conflict and is an assistant professor in the Department of National Security Affairs, both at the Naval Postgraduate School, Monterey, California, Arms Control Association, Chinese-U.S. Strategic Affairs: Dangerous Dynamism, http://www.armscontrol.org/act/2009_01-02/china_us_dangerous_dynamism#Twomey) // JRW China and the United States are not in a strategic weapons arms race. Nonetheless AND rogue" nations. These too would undermine stability in an intense crisis.

Cyber arms race now --- the US is rapidly expanding offensive capabilities under the guise of surveillance
// Rapid proliferation What surprised cyber-experts is the speed with which cyber-attack // // AND // // long before the //Chinese// had also not just caught up but //moved ahead//.
 * Correa 15** [Gordon, security correspondent, BBC News, “Rapid escalation of the cyber arms race,” 29 April 2015, []] //khirn//

That goes nuclear due to command and control hacking, crisis instability, and fracturing nuclear agreements
// The U nited S tates is racing for the technological frontier in military __and intelligence uses of__// // AND // // be every bit as reasonable given their anxiety about unconstrained American cyber superiority. //
 * Austin 13** [Director of Policy Innovation at the EastWest Institute, “Costs of American Cyber Superiority,” 8/6, []] //khirn//

//**Independently risks miscalc --- hair-trigger status causes nuclear war**// //**Japan Times 15** [May 1, 2015, “U.S., Russian ‘hair-trigger’ nuclear alert urged ended, especially in age of cyberattack,” [|http://www.japantimes.co.jp/news/2015/05/01/world/u-s-russian-hair-trigger-nuclear-alert-urged-ended-especially-age-cyberattack/#.VZIjlflVikp]]// khirn WASHINGTON – Former U.S. and Russian commanders Thursday called for scrapping “ //AND// //systems// are subject to //false alarms// ,” Cartwright said at a news conference.

And, low response times means there’s a greater timeframe and probability than traditional nuclear escalation
// In other ways, __cyber weapons are__// __critically different from their nuclear counterparts//__. For AND __before launching a counterstrike__, if that were U.S. policy.
 * Dycus 10** [Stephen is a Professor of national security law at Vermont Law School, former member of the National Academies committee on cyber warfare, LLM, Harvard University, LLB, BA, Southern Methodist University, “Congress’ Role in Cyber Warfare,” Journal of National Security Law & Policy, 4(1), 2010, p.161-164, []] //khirn//

Uniquely true because of misperception fostered by offensive dominance
Offensive dominance// __creates a__ great __risk of__**__cyber arms races__**__.____State and non-__ __AND__ it came from a third party, __could also ignite a conflict__ .124
 * Rosenzweig 9** [Paul, founder of Reid Branch Consulting, specializing in homeland security, senior advisor to the Chertoff Group, Carnegie Fellow at Northwestern, professor at National Defense University, Editorial board at the Journal of National Security Law & Policy, deputy assistant secretary for policy at the US Department of Homeland Security, "National Security Threats in Cyberspace" American Bar Association Standing Committee on Law and National Security And National Strategy Forum, September 2009, [|www.utexas.edu/law/journals/tlr/sources/Issue%2088.7/Jensen/fn137.Rosenwieg.pdf]] //khirn//

Disclosing vulnerabilities instead of using them for surveillance prevents arms races --- builds legitimacy to negotiate international cyberdefense agreements
Schneier 14 (Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. Schneier is a fellow at the [|Berkman Center for Internet and Society] at Harvard Law School and a program fellow at the New America Foundation's [|Open Technology Institute] . “Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?”, May 19, 2014, http://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197/)//CLi The implications of U.S. policy can be felt on a variety of AND fix almost all the vulnerabilities we find. But not all, yet.

That spurs international coop and mitigates offensive use
Clark et. al. 9 (David Clark, Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, Whitfield Diffie, Internet Corporation for Assigned Names and Numbers, Abraham Sofaer, former federal judge for the[|United States District Court for the Southern District of New York], and then a Legal Adviser to the[|United States State Department], “Cyber Security and International Agreements”, [|http://cs.brown.edu/courses/csci1800/sources/lec17/Sofaer.pdf)//CLi] The potential utility of international cybersecurity agreements deserves to be carefully examined. //International agreements// AND //more secure cyber environment// through measures that go beyond conventional forms of deterrence.

Eliminating offensive cyberattacks allows the US to set global norms in cyberspace --- that’s key to prevent cyber arms races
// In a speech this month on "Internet freedom," Secretary of State Hillary Clinton // // AND // arms race// __in an arena where the offense already has a natural advantage__.
 * Goldsmith 10** [Jack, teaches at Harvard Law School and is a visiting fellow at the Hoover Institution at Stanford University, “Can we stop the Cyber Arms Race,” //Washington Post//, February 1, 2010, []] //khirn//

1ac solvency
====The plan solves effective information sharing between the government and private sector --- a signal of clear commitment and a steady flow of actionable disclosure is key to cooperative cyberdefense --- overcomes legal barriers==== // Information Sharing, Public Goods, and the Law This economic understanding of cybersecurity suggests // // AND // // problems are not likely to be ones of law, but of //commitment//.
 * Rosenzweig 12** [Paul, leading cybersecurity expert, founder of Red Branch Consulting PLLC, a homeland security consulting company, and a Senior Advisor to The Chertoff Group, “Cybersecurity and Public Goods: The Public/Private “Partnership,” An Emerging Threats Essay, Hoover Institution, Stanford] //khirn//

Disclosing zero-days __disarms__ cyberattackers globally
However, the NY Times had a story this weekend about how this move has AND do that. Because they're not about protecting anyone -- other than themselves.
 * Masnick 14** [Mike, founder and CEO of Floor64 and editor of the Techdirt blog, “Obama Tells NSA To Reveal, Not Exploit, Flaws... Except All The Times It Wants To Do The Opposite,” Techdirt, April 14, 2014, https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml] //khirn

US is the lynchpin of the zero-days market---that sustains the arms race and global cyberattacks—the plan reverses that and reduces the market drastically
Perlroth and Sanger 13 (Nicole Perlroth covers cyberattacks, hackers and the cybersecurity industry for The Times’s business news section. She is a graduate of Princeton University, Stanford University’s Graduate School of Journalism and is a guest lecturer at Stanford’s graduate schools of business and communications. David Sanger is the chief Washington correspondent of The New York Times. “Nations Buying as Hackers Sell Flaws in Computer Code”, July 13, 2013, [] )//CLi Now, themarket for information about computer vulnerabilities has turned into a gold rush regulate a market in which government agencies are some of the biggest participants.
 * AND **

Disclosing vulnerabilities amounts to disarming the NSA --- zero-days are key
In April 2014, Bloomberg reported that the NSA had known for at least two AND are documented, subject to full analysis, and acted upon promptly.”296
 * Kehl et al. 14** [Danielle Kehl is a Policy Analyst at New America’sOpen Technology Institute (OTI). Kevin Bankstonis the Policy Director at OTI, Robyn Greene is aPolicy Counsel at OTI, and Robert Morgus is aResearch Associate at OTI, New America is a nonprofit, nonpartisan publicpolicy institute that invests in new thinkers andnew ideas to address the next generation ofchallenges facing the United States, Policy Paper, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July 2014, []] //khirn

The status quo provides incentives for writing software with vulnerabilities --- the signal of the plan is crucial to long-term cybersecurity
Recently, there have been several articles about the new market in zero-day AND for the 1%.” And it makes the rest of us less safe.
 * Schneier 12** [Bruce, security expert with 13 books, fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute and the CTO of Resilient Systems, “The Vulnerabilities Market and the Future of Security,” Forbes, 5/30/2012, []] //khirn

The Drug Enforcement Administration is creating a massive database of license plate tracking information – this is being exploited to violently target racial and political groups
Salles 15 (Alice, journalist specializing in civil liberties, “License plate surveillance may invite political targeting,” Watchdog Arena, Feb 4, http://watchdog.org/197745/license-plate-surveillance-political-targeting/)

__License plate surveillance may invite political targeting__ By Alice Salles / February 4, 2015

AND

__detailed pictures of the private lives of citizens__ and visitors to this country.

License plate monitoring exemplifies totalitarian consolidation of power for power’s sake – resistance now is key
Suarez 13 (John, human rights activist who has spoken before the United Nations Human Rights Council on several occasions, PanAm Post, Oct 18, http://panampost.com/john-suarez/2013/10/18/the-us-surveillance-state-and-the-totalitarian-tipping-point/)

Today, massive and unsustainable debts are maintaining the US standard of living. Freedom

AND

one of many ominous signs regarding where this centralization of power is heading.

Freedom from surveillance is an a priori value: it’s the key liberty that defines the value of our lives and our capacities for agency
Greenwald 14 (Glenn, Snowden’s lawyer, “Why Privacy Matters,” http://www.ted.com/talks/glenn_greenwald_why_privacy_matters/transcript?language=en)

Now, there's a reason why privacy is so craved __universally and instinctively__. It

AND

__the constraints that it imposes on us__ // do not become any less potent //.

Surveillance violates our basic ethical imperative to treat people with dignity and protect freedom, but even if utilitarianism is good, you should still vote aff
Burkhart et al. 7 (Laurie Burkhart, Michael Haubert, and Damon Thorley, undergraduate editors who published a book on surveillance under the supervision of Dr. Dirk S. Hovorka, “The Efect [sic] of Government Surveillance on Social Progress,” in Confronting Information Ethics in the New Millennium” [])

__Under utilitarian, duty-based, //and// rights-based ethical theories__ the act

AND

__freedom of speech and the power of the people will be__ // lost forever //.

Actions determine morality, not results—consequentialism might be good, but moral side constraints exist that we cannot violate
Nagel 79 (Thomas, philosopher, Mortal Questions, pg. 48-49, 1979)

Many people feel, without being able to say much more about it, that

__AND__

__ease the consciences of those responsible for a certain number of__ // charred babies //.

Our advantage is one of those side constraints—the injustices we have described should not be tolerated at any cost
Rawls 71 (John, philosopher, A Theory of Justice, p. 3-4)

__Justice is the first virtue of social institutions____as truth is of systems of thought__

AND

. __Being first virtues of human activities,__ // truth and justice are uncompromising //.

====The negative’s argument will be that the right to privacy is outweighed by some appeal to the greater good but this utilitarian forced-choice rests upon the problematic premise that no rights are absolute and even the most evil acts can further the greater good – that twisted logic justifies torture and enslavement because those in power will always invoke some greater utility which exceeds the agency of the subjugated. Voting negative is not justified by any consequence because privacy is absolute and absolute rights are the only check against mass violence given a utilitarian calculus – this debate must be over whether the plan is intrinsically moral====

Gewirth 81 (Alan, prof of philosophy at U Chicago, “Are There Any Absolute Rights?,” Philosophical Quarterly, January)

__It is a widely held opinion that there are no absolute rights. Consider what __

AND

of the valid principle of morality in its equal application to all persons.

Dead bodies aren’t the key metric for decision-making – surveillance might not be dramatic, but the failure to confront it now adds up to a worse harm over time as abuses accumulate
Solove 11 (Daniel, professor of law at George Washington University, Why Privacy Matters Even if You Have 'Nothing to Hide', May 15, http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/)

Investigating __the nothing-to-hide argument__ a little more deeply, we find

AND

__to-hide argument, in the end, has **nothing to say**__.

“Life key to rights” is backwards – life and death are not inherently good except for the things we enjoy about them which the status quo erodes and the plan protects
Nagel 12 [Thomas, University Professor of Philosophy and Law at New York University, “Mortal Questions”, Cambridge University Press, Mar 26, 2012, Pg.1-3]

If death is the unequivocal and permanent end of our existence, // the question arises //

// AND //

disadvantage, it is not easy to say when a man suffers it.

The obsession with human survival is self-defeating – the tyranny of survival paradoxically destroys more people in the long run and diminishes the value of life
Callahan 73 (Daniel, Institute of Society and Ethics, The Tyranny of Survival, pg. 91-3)

__The value of survival could not be so readily abused were it not for its__

__AND__

__survival. It would be the Pyrrhic victory to end all Pyrrhic victories__.

The plan is a necessary response to violations of liberty – federal action is key
Salles 15 (Alice, journalist specializing in civil liberties, “License plate surveillance may invite political targeting,” Watchdog Arena, Feb 4, http://watchdog.org/197745/license-plate-surveillance-political-targeting/)

But if the program was allowed to be carried out unchecked for so long,

__AND__

__aren’t even asking questions about civil liberties and privacy when approving this technology__ .”

We must resist license plate tracking as an infringement of liberty – this form of surveillance will constantly expand to new abuses with no security rationale
Cooke 15 (Charles, writer at the National Review, “As You Drive, So Are You Watched,” National Review, Jan 25, http://www.nationalreview.com/article/397303/you-drive-so-you-are-watched-charles-c-w-cooke)

__Another day, and another of **Leviathan’s tentacles** is exposed for all the world to__

__AND__

consumptive child in a hospital incubator, __is nowhere included within its brief__.

No counterplan can solve the case – the ability of another actor to address the harm doesn’t absolve you of your obligation to do so as well
Aitken 77 (William, teaches philosophy at Chatham College, World Hunger and Moral Obligation, p 93-94)

__Some have maintained that__ there is a fourth minimal condition which a potential helper of

AND

__resort is too strong; it is not a minimal condition for obligation.__

====Various world systems exist in a critical state where sudden and unpredictable collapse is possible at any time – it is literally impossible to learn from history or identify a cause of war even minutes before it breaks out====

Buchanan 2 (Mark, Ubiquity: Why Catastrophes Happen, p. 62)

This book is not only about earthquakes. It is about __ubiquitous patterns of change__

__AND__

__for explanation may be terribly misplaced, and__ // doomed always to go unsatisfied //.

We can’t make policy based on linear predictions – the complexity of government and the chaos of unpredictable events means that as a judge you should simply ignore disads based on future impacts
Ward 96 (Brian, “The Chaos of History: Notes Towards a Postmodernist Historiography,” Limina, Vol 2, http://www.limina.arts.uwa.edu.au/previous/volumes_15/volume_2?f=73934)

Porush establishes the link between narrative-as-history and chaos theory by recognising

AND

a historical event recorded in a text or a series of texts.41

This is particularly true for war – it’s too chaotic to be controlled or avoided through policymaking
Font and Régis 6 (Joan Pere Plaza i Font UAB – Universitat Autònoma de Barcelona – Spain Dandoy Régis UCL – University of Louvain – Belgium “Chaos Theory and its Application in Political Science” IPSA – AISP Congress Fukuoka, 9 – 13 July 2006 http://www.sciencespo.site.ulb.ac.be/dossiers_membres/dandoy-regis/fichiers/dandoy-regis-publication18.pdf)

Betts (2000) observed a useful application of chaos to strategy and international security

AND

, the transition from predictability to chaos in deterministic mathematical system is possible.

=** 2NR: Politics and Framework **=