crypto 2acs - ddi 2015 st.docx

Upload: michael-tang

Post on 28-Feb-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    1/41

    2AC XO CP

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    2/41

    2AC - XO CP

    1. Solvency Defcit - The executive does not solve perceptully less trusted.

    !idler 2"1#Mailyn Fidler, Marshall Scholar, Department of Politics and International RelationsMay 2014 Anarchy or Re!lation" #ontrollin the $lo%al &rade In 'ero(Day)!lnera%ilities* A &hesis S!%mitted &o &he Interschool +onors Proram inInternational Sec!rity St!dies, #enter for International Sec!rity and #ooperation,Freeman Spoli Instit!te for International St!dies, Stanford ni-ersityhttps"..decryptedmatri/com.p(content.!ploads.2014.0.Fidler('ero(Day()!lnera%ility(&hesispdf

    +oe-er, e/ec!ti-e %ranch o-ersiht can %e opa3!e, and it may not increase p!%lictr!st in ho ero(days are handled 5-ersiht of S o-ernment !se andproc!rement of ero(days also has no international reach It cannot address actions of ray(

    mar6et %!yers and sellers %eyond S %orders &he ero(day mar6et is manifestly a lo%alpro%lem, and the nited States o!ld ha-e no !arantee that allies or foes o!ldfollo S restraint441 &he ne/t chapter ill address this ea6ness of domestic mechanisms, in-estiatinthe prospects for international strateies to control the ero(day -!lnera%ility trade

    2. The executive cn$t li%it its o&n po&er. Only the 'r%tivesolves.Donohue, 2""(7a!ra Donoh!e is Professor of 7a, $eoreton ni-ersity 7a #enter, &he cost ofco!nterterrorism" poer, politics, and li%erty #am%ride ni-ersity Press

    &hese are 8!st e/amples of chec6s that co!ld %e instit!ted ithin the e/ec!ti-e 9an immensely comple/ pro%lem that deser-es f!rther scr!tiny :et ) % s*epticl

    +out the +ility o, the executive, as an oran to li%it its uest ,or %orepo&er After all, +ecuse it ,lls directly to this +rnch to t*e responsi+ility,or cri%e nd threts to ntionl security it is to +e expected tht it &ouldsee* the +rodest rn/e o, po&ers vil+le.

    &he 8!diciary also has an important role to play in settin the limits of statea!thority It as ;randen%!r - 5hio that esta%lished protections for politicalspeech in the nited States

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    3/41

    %ein !sed appropriately and demonstrate the e@orts %ein made to mitiate the%roader costs. )nsistin/ tht the /overn%ent %*es its cse relesin/ intothe pu+lic do%in &htever it cn o, relevnt in,or%tion reverses theusul course o, counterterroris%( here the e/ec!ti-e is a%le to p!t thro!hmany of its demands immediately folloin a terrorist attac6, lea-in to those ho>nd the pro-isions e/cessi-e and ant to repeal them the impossi%le tas6 of

    pro-in either that no -iolence ill follo repeal or that some -iolence isaccepta%le The le/islture hs the po&er to reverse the counterterroristspirl.

    0. Conditionlity is voter splits the 2AC ti%e lloction%on/ %ultiple dvoccies decreses eduction +y reducin/in-depth discussion on issues And ustifes per%uttions li*eDo the CP3

    #. Per% do +oth solves pre4 po&ers.

    5. Presidentil Po&ers 6onuniue - 7ecent decisions +outexecutive ppoint%ents lredy *ill presidentil po&ersS89A7, MI#+A7 BDecision %y C!stices 5pens a e De%ate on the 7imits ofPresidential PoerB &he e :or6 &imes ll -acancies at tofederal aencies itho!t Senate con>rmation;!t Mr 5%ama and his allies notedthat the decision stopped short of se-erely !nderminin the %roader appointmentpoer of the presidency, as an appeals co!rt had r!led earlier Ghite +o!se oHcials hadorried that the co!rt?s more conser-ati-e mem%ers miht emere -ictorio!s ith a far more restricti-e -ie ofpresidential poer &hey did not ??Ge?re, of co!rse, deeply disappointed in today?s decision,?? Cosh arnest, theGhite +o!se press secretary, said ??Ge are, hoe-er, pleased that the co!rt reconied the president?s e/ec!ti-e

    a!thority as e/ercised %y presidents oin all the ay %ac6 to $eore Gashinton?? Mr 5%ama had tried tomane!-er aro!nd lonstandin Rep!%lican e@orts to %loc6 his appointments to theational 7a%or Relations ;oard %y seatin mem%ers d!rin pro forma sessions ofthe Senate hen almost all of the senators ere at home in their districts and no

    leislati-e %!siness as cond!cted &he co!rt r!led that the president?s action -iolated the#onstit!tion and said that the Senate and +o!se ha-e the !ltimate poer to %loc6 s!ch recess appointments %ysched!lin the mini(sessions hen they ant to ;!t the 8!stices for the >rst time reconied the %asic riht of thepresident to ma6e appointments itho!t the consent of the Senate hen the #onress is in an e/tended recessd!rin a to(year session, as it often is d!rin the s!mmer, aro!nd #hristmas and in the sprin Rep!%licans said

    the decision amo!nted to a re%!6e of the president at a time hen they are ar!in that Mr 5%ama isrepeatedly e/ceedin his a!thority to et aro!nd a #onress that does not do hathe ants it to ??+e pic6s and chooses hat parts of the #onstit!tion and d!lypassed leislation he ants to enforce or follo ,?? said Representati-e e-in Mc#arthy of#alifornia, the incomin ma8ority leader in the +o!se ??&he president?s attempt at illeitimate

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    4/41

    administrati-e appointments is a prime e/ample of o-erreach &his %olsters thecase for the +o!se to ta6e f!rther action to ens!re o!r las are properly e/ec!tedand o!r freedoms are protected?? Representati-e Darrell Issa, a #alifornia Rep!%lican and chairman ofthe +o!se 5-ersiht and $o-ernment Reform #ommittee, said the co!rt?s decision made it clear that ??President5%ama acted itho!t any leitimate a!thority?? &he decision comes a day afterSpea6er Cohn A ;oehner said he o!ld see6 leislation alloin the +o!se to s!e

    Mr 5%ama o-er the president?s !se of e/ec!ti-e actions Rep!%licans say Mr5%ama has e/ceeded his a!thority, pointin to the president?s delayin of someparts of the A@orda%le #are Act and his rantin of deportation deferrals to someimmirants ho are in the co!ntry illeally Ghite +o!se oHcials ha-e dismissed Mr ;oehner?sthreats of a las!it as a st!nt, sayin that Mr 5%ama?s e/ec!ti-e actions are %ased on the president?s ell(esta%lished poers &hey ar!e that the president has the riht to act on %ehalf of the American people here hecan

    :. The CP lin*s to the 6et-+eneft - ;c*lsh to 9xecutiveOrders crush Presidentil Po&ersPCAP "(

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    5/41

    2AC Topiclity

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    6/41

    2AC T - Curtil

    1.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    7/41

    Btermination B or Bcancellation,B spea6s only of B red!ction or c!rtailment inhole or in partB n12 &hese ords miht co-er the endin of the pro8ects, %!t it isorth notin that as %asic a so!rce as ;lac6?s 7a Dictionary de>nes c!rtail as Btoshorten, a%ride, diminish, lessen, or red!ceN and hs no such %enin/ s+olishB n1T

    ;. Surveillnce includes +oth &ire co%%uniction nd onlinesurveillnce.@e/l )n,or%tion )nstitute 15 7eal Information Instit!te 7II a smallresearch, enineerin, and editorial ro!p ho!sed at the #ornell 7a School 201lectronic S!r-eillance https"..lacornelled!.e/.electronicKs!r-eillance

    &o eneral cateories of electronic comm!nication s!r-eillance e/ist Girecomm!nications refer to the transfer of the h!man -oice from one point to another-ia !se of a ire, ca%le, or similar de-ice Ghen la enforcement BtapsB a ire, they!se some mechanical or electrical de-ice that i-es them o!tside access to the-ocal transfer, th!s disclosin the contents of the con-ersation lectroniccomm!nications refer to the transfer of information, data , or so!nds from one

    location to another o-er a de-ice desined for electronic transmissions &his type ofcomm!nication incl!des email or information !ploaded from a pri-ate comp!ter tothe internet

    0. cant consideration as the leislati-e process proceeds n2O As disc!ssed,

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    8/41

    hoe-er, there is no technically feasi%le ay to pro-ide %ac6 doors to ood !ysitho!t also ma6in them accessi%le to %ad !ys n2O Moreo-er, for anonymiationtechnoloies li6e &or to or6 on an indi-id!al operational le-el for -ario!s types of o-ernment personnel, theym!st also %e a-aila%le to the eneral p!%lic n2OE Indeed, the di-ersity of the !ser %ase is an essential part of &or?ssec!rity protocols ( if only o-ernment personnel !se &or, their identities ill not %e sec!re n2OJ Q2 Pri-acy(enhancin technoloies li6e &or and Silent #ircle are, in e@ect, helpin to ad-ance the comm!nications pri-acydialo!e insofar as they lin6 certain aspects of electronic pri-acy ith sec!rity Moreo-er, altho!h they do not

    carry the leal clarity or a!thority of a 8!dicial mandate or conressional action thro!h leislation, theseprivcy-enhncin/ technolo/ies ne-ertheless o@er the promise of a temporary Btechnoloy >/Bthat mihtdust the previlin/ i%+lnce o, po&er in the ,vor o,/overn%ent surveillnce ctivities!ntil 8!dicial or leislati-e action can pro-ide a more de>niti-eanser &o %e s!re, they are not a pri-acy mandate At least in the short r!n, hoe-er, they o>er uic*sure %echnis% to constrin the plp+le /ro&th o, /overn%ent po&ernoted ith s!ch apprehension %y some of the C!stices in Cones

    #. Pre,er our interprettion-

    A. Contextul - Their interprettion re%oves curtil3 ,ro%

    the context o, surveillnce tht ,ils +ecuse it doesn$tconsider the scope o, do%estic surveillnce in di/itl &orld.Context is *ey to policy %*in/ nd topic eduction.

    ;. Overli%its Their interprettion only llo&s > tht plce noutri/ht +n on surveillnce uthority. ;ut le/l uthority ,orsurveillnce is too co%plex ,or +ns to &or*. The > &ouldlose every de+te to circu%vention.

    5. 7eson+ility ?ood IS/ood enou/h +ecuse the > cn$t

    &in on T nd su+ectivity is inevit+le.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    9/41

    2AC T Do%estic

    1.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    10/41

    intellience in-estiation if the $o-ernment ere in-estiatin that indi-id!al?srelationship ith a forein o-ernment or international terrorist ro!p In otherords, the di@erence %eteen hether an in-estiation is a Bdomestic foreinintellience in-estiationB or a Bdomestic intellience in-estiation B t!rns onhether the in-estiation foc!ses in part on a forein o-ernment or internationalro!p

    0.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    11/41

    ;. A> !lexi+ility Our interprettion llo&s the > to doreserch in the 21stcentury nd develop cretive interestin/>s this is *ey to void st/nnt de+tes +out pen-trps.3

    :. 7eson+ility ?ood IS/ood enou/h +ecuse the > cn$t&in on T nd su+ectivity is inevit+le.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    12/41

    2AC Terror DA

    1. The Disd is ,llcy. Surveillnce doesn$t &or* hsn$t

    stopped terroris% nd their evidence is prop/nd.n ;uren1#,Peter )an ;!ren %le the histle on State Department aste and mismanaementd!rin Ira3i reconstr!ction in his >rst %oo6, Ge Meant Gell" +o I +elped 7ose the;attle for the +earts and Minds of the Ira3i People 1(14(2014, BPeter )an ;!ren" Ge+a-e to Destroy 5!r #onstit!tion to Sa-e It,B $!ernica . A Maaine of Art UampNPolitics, https"..!ernicamacom.daily.peter(-an(%!ren(e(ha-e(to(destroy(o!r(constit!tion(to(sa-e(it.O= GeL-e stayed safe DoesnLt that 8!st pro-e all the o-ernment e@orts ha-eor6ed Xo, thatLs called false ca!sality &here simply is no e-idence that itLs tr!e, and m!ch to the contrary ItLs

    the same as %elie-in o-ernment e@orts ha-e pre-ented Martian attac6s or ildlions in o!r %edrooms For one thin, e already 6no that more SA spyin o!ld notha-e stopped O.11N most of the needed information as already held %y the S o-ernment and assimply not properly shared or acted !pon E11 &s policy ,ilure not %tter o, too-little snoopin/ .&oday, hoe-er, it remains astra(man8!sti>cation for hate-er theSA ants to do, a ay of scarin yo! into acceptin anythin from the desecration of theFo!rth Amendment to ta6in o@ o!r shoes at airport sec!rity ;!t the o-ernment !ses this ar!ment endlessly topromote hat it ants to do -en the SALs tal6in points recommend their on people say" I m!ch prefer to %ehere today e/plainin these prorams, than e/plainin another O.11 e-ent that e ere not a%le to pre-ent* At the

    same time, despite all this intr!sion into o!r li-es and the o%-io!s -iolations of the Fo!rthAmendment, the syste% co%pletely %issed the ;oston +o%+ers t&o o, thedu%+est lest sophisticted +ro terrorists on the plnet Since O.11, e ha-e seensome T4,000 deaths in o!r schools, or6places, and homes ca!sed %y pri-ately oned >rearms, and none of the

    spyin or s!r-eillance identi>ed any of the 6illers in ad-ance May%e esho!ldsimply stop thin6in a%o!t allthis s!r-eillance as a matter of stoppin terrorists and start thin6inmore a%o!t hat it means toha-e a metastasied lo%al s!r-eillance system aimed at spyin on !s a ll,!sin a fa6ear!ment a%o!t the need for 100Z sec!rity in ret!rn for e-er more minimal pri-acy So m!ch has %een 8!sti>ed inthese years9tort!re, inde>nite detention, the $!antanamo penal colony, drone 6illins, ars, and the !se ofSpecial 5perations forces as lo%al assassination teams9%y some -ersion of the so(called tic6in time %om%

    scenario )t$s &orth /ettin/ it throu/h our hedsF there hs never +een nctul tic*in/ ti%e +o%+ scenrio. The +o/ey %n isn$t rel. There$s no%onster hidin/ under your +ed.

    2. There$s very lo& ris* o, terroris%. Gou$re ust s li*ely to+e *illed +y shr*.;l*o 2"15Radley ;al6o, Radley ;al6o %los a%o!t criminal 8!stice, the dr! ar and ci-illi%erties for &he Gashinton Post E((201, B&he ood nes a%o!t e/tremist-iolence in the nited States" ItLs -anishinly rare,B Gashinton Post,

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    13/41

    http"..ashintonpostcom.nes.the(atch.p.201.0E.0.the(ood(nes(a%o!t(e/tremist(-iolence(in(the(!nited(states(its(-anishinly(rare.

    &his is li6ely hy pretty m!ch e-eryone missed the real story a%o!t the e Americast!dy that as released last month 9 8!st ho little e/tremist -iolence there is inthe nited States of any 6ind Accordin to the st!dy, e/tremist attac6s ha-e 6illed E4

    people in the nited S tate s since 2001 &hat comes o!t to 8!st o-er >-e per year In a co!ntry of T20million people, thatLs an incredi%ly small n!m%er Accordin to F;I statistics, there ere ana-erae of 1,J homicides %eteen 2002 and 201T&hat means, on a-erae, politicale/tremism moti-ated the 6illers in 00T percent of S homicides since 2001 &hatLsstatistical noise ItLs a%o!t the same n!m%er of people 6illed each year %y shar6s

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    14/41

    &he S intellience comm!nity also li6ens >ndin a terrorist plot to loo6in for aneedle in a haystac6 And, as former SA director $eneral eith Ale/ander said, yo! need the haystac6 to>nd the needle* &hat statement perfectly ill!strates the pro%lem ith mass s!r-eillance and %!l6 collection

    Ghen yo!Lre loo6in for the needle, the last thin yo! ant to do is pile lots morehay on it More speci>cally, there is no scienti>c rationale for %elie-in that addin

    irrele-ant data a%o!t innocent people ma6es it easier to >nd a terrorist attac6, and lotsof e-idence that it does not:o! miht %e addin slihtly more sinal, %!t yo!Lre alsoaddin m!ch more noise And despite the SALs collect it all* mentality, its on doc!ments %ear this o!t

    &he military intellience comm!nity e-en tal6s a%o!t the pro%lem of drin6in froma >re hose*" ha-in so m!ch irrele-ant data that itLs impossi%le to >nd theimportant %its Ge sa this pro%lem ith the SALs ea-esdroppin proram" the false positi-eso-erhelmed the system In the years after O.11, the SA passed to the F;I tho!sands oftips per monthN e-ery one of them t!rned o!t to %e a false alarm &he cost asenormo!s ,and ended !p fr!stratin the F;I aents ho ere o%liated to in-estiate all the tips Ge also sathis ith the S!spicio!s Acti-ity Reports 9or SAR 9 data%ase" tens of tho!sands of reports, and no act!al res!ltsAnd all the telephone metadata the SA collected led to 8!st one s!ccess" the con-iction of a ta/i dri-er ho sentYJ,00 to a Somali ro!p that posed no direct threat to the S 9 and that as pro%a%ly tr!mped !p so the SAo!ld ha-e %etter tal6in points in front of #onress

    5. 9ncryption is essentil security cri%inls terrorists &illinevit+ly +e +le to ccess encryption the only uestion is&hether consu%ers &ill hve ccess.

    Ca6e@perruue nd Coseph 7oreno 8ll, E(O(2"15, BF;ILs e #rypto Plan"Ditch 7eislation, ;!ild &horLs Maic +ammer,B o P!%lication,https"..cdtor.%lo.f%is(ne(crypto(plan(%!ild(thors(maic(hammer.

    &hro!ho!t the hearin, F;I Director #omey stressed that ISI7 recr!iters reach o!t topotential domestic s!pporters on social media, then attempt to coordinate ithcertain indi-id!als %y as6in them to mo-e to an encrypted platform ;!t as Director#omey himself ac6noleded at the SS#I hearin, these ne,rious ctors and any criminalsho ant to hide their acti-ities cn si%ply use n encryptedco%%unictions service developed outside the nited Sttes no %tter&ht the S policy on encryption is.&he tr!e impact of p!shin companies toadd %ac6doors or store e/tra 6eys onLt %e on criminals, %!t rather on a-eraeInternet !sers ho ha-e profo!ndly %ene>tted from encryption technoloyConsu%er encryption is &ht llo&s us to protect fnncil %edicl othersensitive records tht re no& connected electroniclly nd drillin/ holein such co%%on security protections ris*s cy+er ttc*s on %ss scle And the ris6s %ecome e-en reater hen considerin ho important encryptiontechnoloy is %ecomin to critical infrastr!ct!re and instit!tions As alays

    technoloy poses o%stacles and 3!estions, %!t on this iss!e e sho!ldnLt %edisco!raed that a maic anser has not emered, %eca!se encryption is not asec!rity pro%lem itLs a sol!tion

    :. Terror threts re ex//erted )S)S nd AlIed don$tpose rel thret.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    15/41

    Strt,or 2"15 Don?t &a6e &errorism &hreats at Face )al!e,* Sec!rity Gee6ly,.14.201 stratforcom.ee6ly.dont(ta6e(terrorism(threats(face(-al!e

    &he Islamic State has demonstrated in the past year that it is 3!ite adept in its !seof social media as a tool to raise money, recr!it >hters and inspire rassroots

    8ihadists to cond!ct attac6s &his ee6, hoe-er, its social media netor6 as hea-ily foc!sed on ma6inthreats 5n May 11, &itter !sers associated ith the Islamic State !nleashed to seeminly !nrelated threat

    campains 5ne !sin the hashta [7ondonAttac6, displayed photos of 7ondon and eapons eld s!ccessesaainst the Ira3i and Syrian o-ernments and militant ro!ps, the Islamic State is certainly far ea6er militarilythan the nited States and !rope An important part of threat e-al!ation is assessin if the party ma6in thethreat possesses %oth the intention to cond!ct s!ch an action and the capa%ility to carry o!t that intent Indeed,

    many threats are made %y ro!ps or indi-id!als ho ha-e neither intent norcapa%ility &hey are made simply to create fear and panicor to in!ence the cond!ct or%eha-ior of the taret, as in the cases of a person ho sends a Bhite poderB letter to a o-ernment oHce or a

    st!dent ho phones in a %om% threat to his school to et o!t of ta6in a test $enerally, if a person orro!p possesses %oth the intent and capa%ility to cond!ct an act of -iolence, they

    8!st do it&here is little need to aste the time and e@ort to threaten hat they are a%o!t to do In fact, %yteleraphin their intent they miht pro-ide their taret ith the opport!nity to

    a-oid the attac6 Professional terrorists often in-est a lot of time and reso!rces in a plot, especially aspectac!lar transnational attac6 ;eca!se of this, they ta6e reat pains to hide their operational acti-ity so that thetaret or a!thorities do not catch ind of it and employ co!ntermeas!res that o!ld pre-ent the s!ccessf!le/ec!tion of the scheme Instead of teleraphin their attac6, terrorist ro!ps prefer to cond!ct the attac6 ande/ploit it after the fact, somethin sometimes called the propaanda of the deed #ertainly, people ho possess thecapa%ility to f!l>ll the threat sometimes ma6e threats ;!t normally in s!ch cases the threat is made in aconditional manner For e/ample, the nited States threatened to in-ade Afhanistan !nless the &ali%ano-ernment handed o-er 5sama %in 7aden &he Islamic State, hoe-er, is not in that type of dominatin position Ifit dispatched a team or teams of professional terrorist operati-es to the nited States and !rope to cond!ctterrorist attac6s, the -ery last thin it o!ld ant to do is alert said co!ntries to the presence of those teams andha-e them et rolled !p &rained terrorist operati-es ho ha-e the a%ility to tra-el in the nited States or !rope

    are far too -al!a%le to 8eopardie ith a &itter threat Rather than re-eal a netor6 ofsophisticated Islamic State operati-es poised to cond!ct de-astatin attac6s on thenited States and !rope, these threats are meant to instill fear and stri6e terror

    into the hearts of one of their intended a!diences" the p!%lic at lare I say one of theira!diences %eca!se these threats are not only aimed at the American and !ropean p!%lic &hey are also meant tosend a messae to radicalie and enerie rassroots 8ihadists li6e those ho ha-e cond!cted Islamic State(relatedattac6s in the Gest

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    16/41

    J. 9ncryption does not %*e the /overn%ent /o dr*. )t %ust+e protected to ensure pu+lic s,ety.Croc*,ord 2"15ade #roc6ford, Director, &echnoloy for 7i%erty Pro8ect, A#7 Massach!sets, E(J(201, B&he F;I?s attac6 on encryption and the misleadin phrase Blaf!l

    interceptionB, http"..pri-acysosor.node.1EE&ransparency reports from ma8or comm!nications pro-iders ro!tinely sho that laenforcement !ses the loest possi%le standard of demand9the s!%poena, oftenne-er e-en seen %y a 8!de, let alone appro-ed %y one9hen it as6s these corporations foro!r information&hen there are the co!rt orders*&om #otton referenced today at the senate hearinon the F;ILs plot to destroy internet sec!rity #o!rt orders are not the same as arrants &hemost commonly !sed co!rt order, called a nd o!t ho it is yo! 6no&hey area%le to et access to -ast amo!nts of information 8!st %y as6in,B said Pri-acyInternational?s +osein B&hey complain that they?re not ettin eno!h information%!t they?-e had more than they?-e e-er had %efore,B he added din%!rh apierni-ersity?s ;!chanan echoes the sentiment" B&here are no so many ays that in-estiators

    https://privacysos.org/node/1307http://privacysos.org/admin_subpoenashttps://privacysos.org/node/696http://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-googlehttps://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/https://privacysos.org/node/1765https://privacysos.org/node/1765http://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted-communication.htmlhttp://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted-communication.htmlhttp://privacysos.org/admin_subpoenashttps://privacysos.org/node/696http://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-googlehttps://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/https://privacysos.org/node/1765http://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted-communication.htmlhttp://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted-communication.htmlhttps://privacysos.org/node/1307
  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    17/41

    can act!ally in-estiate someone ho is s!spected of committin a crime thereisn?t really a pro%lem &his isn?t oin to sh!t the doorB $ood old(fashioned policinand follo(the(money are still the most e@ecti-e ays of catchin the %ad !ys

    . =ss surveillnce cretes Tsun%i o, dt under%inin/counterterror e>orts.=ss 2"15Peter Maass 1, (2J(201, BInside SA, 5Hcials Pri-ately #riticie B#ollect It AllBS!r-eillance,B Intercept, https"..>rstloo6or.theintercept.201.0.2J.nsa(oHcials(pri-ately(criticie(collect(it(all(s!r-eillance.AS MM;RS 5F #5$RSS str!le to aree on hich s!r-eillance prorams to re(a!thorie%efore the Patriot Act e/pires, they miht consider the !n!s!al ad-ice of anintellience analyst at the ational S ec!rity A encyho arned a%o!t the danerof collectin too m!ch data Imaine, the analyst rote in a lea6ed doc!ment, that yo! are standin in ashoppin aisle tryin to decide %eteen 8am, 8elly or fr!it spread, hich sie, s!ar(free or not, eneric or

    Sm!c6erLs It can %e paralyin Ge in the aency are at ris6 ofa similar, collecti-e paralysis inthe face of a diyin array of choices e-ery sinle day ,* the analyst rote in 2011 LAnalysisparalysisL isnLt only a c!te rhyme ItLs the term for hat happens hen yo! spend so m!ch time analyin asit!ation that yo! !ltimately stymie any o!tcome \ ItLs hat happens in SI$I& sinals intellience hen eha-e access to endless possi%ilities, %!t e str!le to prioritie, narro, and e/ploit the %est ones* &he doc!mentis one of a%o!t a doen in hich SA intellience e/perts e/press concerns !s!ally heard from the aencyLs critics"

    that the S o-ernmentLs collect it all* stratey can !ndermine the e@ort to >htterrorism &he doc!ments, pro-ided to &he Intercept %y SA histle%loer dard Snoden, appear tocontradict years of statements from senior oHcials ho ha-e claimed that per-asi-e s!r-eillance of lo%alcomm!nications helps the o-ernment identify terrorists %efore they stri6e or 3!ic6ly >nd them after an attac6 &hePatriot Act, portions of hich e/pire on S!nday, has %een !sed since 2001 to cond!ct a n!m%er of dranet

    s!r-eillance prorams, incl!din the %!l6 collection of phone metadata from American companies ;ut thedocu%ents su//est tht nlysts t the 6SA hve dro&ned in dt sinceE11 %*in/ it %ore di'cult ,or the% to fnd the rel threts .&he titles ofthe doc!ments capt!re theiro-erall messae" Data Is ot Intellience,* &he Fallacies;ehind the Scenes,* #oniti-e 5-eroX* S!mmit Fe-er* and In Praise of ot noin* 5ther titles incl!de

    Dealin Gith a ]&s!namiL of Intercept* and 5-ercome %y 5-erloadX*

    1". The 8ystc* theory o, CounterTerror ,ils its +sed onthe ,ulty presu%ption tht there is needle in the hystc*.

    8u 2"15Mararet, Assistant Professor of 7a, Gashinton and 7ee School of 7a BSmallData S!r-eillance - ;i Data #y%ers!r-eillanceB Pepp 7 Re- 42 cation for the -ie that all persons are s!spects Also orthy of ca!tion is thefact that this pres!mption presents the potential for m!ltiple challenes ,2E incl!din

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    18/41

    interatin %iasesinto datadri-en systems rmation %ias, implicit %ias, coniti-e %ias=N pathdependencycation= In other ords, pres!min that

    there is a diitally constr!cted needleed thro!h %i data tools= in the o-ernmentLs diitally constr!ctedhaystac62E

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    19/41

    AT Terror DA

    Terroris% isn$t n existentil thret O+% confr%s

    intelli/ence hsn$t ,ound ny terrorists=ueller nd Ste&rt 15

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    20/41

    Terrorist threts over+lo&n terrorists only hve re/ionlinterests6orton-Tylor 1# htin ith Isis +e told $oodMornin ;ritain" BI left the to >ht for the sa6e of Allah, to i-e e-erythin I ha-e for the sa6e of Allah 5ne of thehappiest moments in my life as hen the plane too6 o@ from $atic6 airport I as so happy, as a M!slim yo!cannot li-e in the co!ntry of 6!@ars non(%elie-ersBAmin added" BI left the ho!se ith the intention not to o %ac6,

    I?m oin to stay and >ht !ntil the 6hilafah r!le of Islam is esta%lished or I dieB Dearlo-e said he asconcerned a%o!t the in!ence of the media on the o-ernment?s sec!rity policy Itas time to ta6e hat he called a Bmore proportionate approach to terrorismB MI,MI, and $#+W de-oted a reater share of their reso!rces to co!nterin Islamist f!ndamentalism than they did to

    the So-iet nion d!rin the cold ar, or to Irish terrorism that had cost the li-es of more citiens and ;ritishsoldiers than al(Waida had done, Dearlo-e notedA massi-e reaction after the O.11 attac6s asine-ita%le, he said, %!t it as not ine-ita%le the 2001 attac6s o!ld contin!e toBdominate o!r ay of thin6in a%o!t national sec!rityB &here had %een aBf!ndamental chaneB in the nat!re of the threat posed %y Islamist e/tremists Al(Waida had larely failed to mo!nt the 6ind of attac6s in the S and it hadthreatened after O.11 It as time, he said to mo-e aay from the BdistortionB of thepost(O.11 mindset, ma6e Brealistic ris6 assessmentsB and thin6 rationally a%o!t theca!ses of the crisis in the Middle ast

    9ncryption does not %*e the /overn%ent /o dr*. )t %ust +eprotected to ensure pu+lic s,ety.Croc*,ord 2"15ade #roc6ford, Director, &echnoloy for 7i%erty Pro8ect, A#7 Massach!sets, E(J(201, B&he F;I?s attac6 on encryption and the misleadin phrase Blaf!linterceptionB, http"..pri-acysosor.node.1EE

    &ransparency reports from ma8or comm!nications pro-iders ro!tinely sho that laenforcement !ses the loest possi%le standard of demand9the s!%poena, oftenne-er e-en seen %y a 8!de, let alone appro-ed %y one9hen it as6s these corporations foro!r information&hen there are the co!rt orders*&om #otton referenced today at the senate hearin

    https://privacysos.org/node/1307http://privacysos.org/admin_subpoenashttps://privacysos.org/node/1307http://privacysos.org/admin_subpoenas
  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    21/41

    on the F;ILs plot to destroy internet sec!rity #o!rt orders are not the same as arrants &hemost commonly !sed co!rt order, called a

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    22/41

    critical to resc!in an indi-id!al, he responded, I ha-enLt fo!nd one yet* despitecan-assin state and local la enforcement for e/amples $o-ernment has m!ltiple options"If information is encrypted in one place, it is often a-aila%le from another so!rce Fore/ample, emails or te/t messaes on an encrypted phone can %e retrie-ed from the email ser-ice pro-ider or thephone company Many smartphones are %ac6ed !p to the clo!d, here the data can %e o%tained from the ser-ice

    pro-ider thro!h leal process In addition, la enforcement may %e a%le to compel a s!spect

    to decrypt information or de-ices ith a search arrant &he o-ernment m!stenerally o%tain a arrant prior to searchin a smartphone

    9ncryption is essentil ,or security cri%inls nd terrorists &illinevit+ly +e +le to ccess encryption the only uestion is&hether consu%ers &ill hve ccess.

    Ca6e@perruue nd Coseph 7oreno 8ll, E(O(2"15, BF;ILs e #rypto Plan"Ditch 7eislation, ;!ild &horLs Maic +ammer,B o P!%lication,https"..cdtor.%lo.f%is(ne(crypto(plan(%!ild(thors(maic(hammer.

    &hro!ho!t the hearin, F;I Director #omey stressed that ISI7 recr!iters reach o!t topotential domestic s!pporters on social media, then attempt to coordinate ithcertain indi-id!als %y as6in them to mo-e to an encrypted platform ;!t as Director#omey himself ac6noleded at the SS#I hearin, these ne,rious ctors and any criminalsho ant to hide their acti-ities cn si%ply use n encryptedco%%unictions service developed outside the nited Sttes no %tter&ht the S policy on encryption is.&he tr!e impact of p!shin companies toadd %ac6doors or store e/tra 6eys onLt %e on criminals, %!t rather on a-eraeInternet !sers ho ha-e profo!ndly %ene>tted from encryption technoloyConsu%er encryption is &ht llo&s us to protect fnncil %edicl othersensitive records tht re no& connected electroniclly nd drillin/ holein such co%%on security protections ris*s cy+er ttc*s on %ss scle

    And the ris6s %ecome e-en reater hen considerin ho important encryptiontechnoloy is %ecomin to critical infrastr!ct!re and instit!tions As alaystechnoloy poses o%stacles and 3!estions, %!t on this iss!e e sho!ldnLt %edisco!raed that a maic anser has not emered, %eca!se encryption is not asec!rity pro%lem itLs a sol!tion

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    23/41

    2AC 6eoli+

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    24/41

    2AC 6eoli+ B

    1. 6o lin* The > protects everyone not ust corportions.

    K7ed only i, not in 1ACE 9xtend this crd i, in 1ACL

    ;c*doors nd so,t&re vulner+ilities ,und%entllyunder%ine hu%n security.Dunn Cvelty 2"1#Myriam, Dep!ty for research and teachin a the #enter for Sec!rity St!dies

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    25/41

    and Senior 7ect!rer for Sec!rity Politics at &+ '!rich B;rea6in the cy%er(sec!ritydilemma" Alinin sec!rity needs and remo-in -!lnera%ilitiesB Science andenineerin ethics 20T ed and disc!ssed implicationsof cy%er

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    26/41

    201T= #y%er(sec!rity, as ar!ed in the -ery %einnin, is far more than this, hoe-er" From %oth a stateand a h!man sec!rity perspecti-e, cy%erspace has %ecome more than 8!st atechnoloical realm in hich e sometimes interact for social or economic reasons#y%erspace has %ecome a f!ndamental part of life and is constit!ti-e of ne,comple/ s!%8ecti-ities An ethics that >ts s!ch a %road !nderstandin is Information thics It constit!tesan e/pansion of en-ironmental ethics toards a less anthropocentric concept of aent, hich incl!des non(h!man

    cial= and non(indi-id!al

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    27/41

    5. The per% solves - The per%uttion solves +est

    neoli+erl institutions cn +e used /inst the%selves +solute re,usl %*es structurl violence inevit+le!er/uson Pro,essor o, Anthropolo/y t Stn,ord 11t tied to national citienship simply e/acer%ate the -icio!s/enopho%ia that already di-ides the So!th African poor, in a conte/t here many ofthe poorest are not citiens, and o!ld th!s not %e elii%le for the ;I$X Perhaps

    e-en more f!ndamentally, is the idea of %asic income really capa%le of commandinthe mass s!pport that alone co!ld ma6e it a central pillar of a ne approach todistri%!tionX &he record to date i-es poerf!l reasons to do!%t it So far, thetechnocratsL dreams of relie-in po-erty thro!h eHcient cash transfers ha-eattracted little s!pport from act!al poor people, ho seem to >nd that -ision a %itpale and ashed o!t, compared ith the -i-id ed %y Caco% '!ma cant, formy p!rposes, is not hether or not these are ood policies, %!t the ay that theyill!strate a process thro!h hich speci>c o-ernmental de-ices and modes of

    reasonin that e ha-e %ecome !sed to associatin ith a -ery partic!lar

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    28/41

    %e characteried=, on the one hand, and speci>c neoli%eral* techni3!es, on theother #lose attention to partic!lar techni3!es c o-ernmental techni3!es, e may %es!rprised to >nd that some of them can %e rep!rposed, and p!t to or6 in theser-ice of political pro8ects -ery di@erent from those !s!ally associated ith thatord If so, e may >nd that the ca%inet of o-ernmental arts a-aila%le to !s is a %itless %are than >rst appeared, and that some rather !sef!l little mechanisms may %enearer to hand than e tho!ht

    :. The lterntive ,ils their nlysis o, neoli+erlis%precludes ny %echnis% ,or +ehviorl chn/e the stren/tho, their lin*s over&hel%s the possi+ility o, lt solvency;rnett 1"

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    29/41

    and ine3!ality, and is imposed either from the o!tside or %y !nacco!nta%le elites&he concept!al analysis of neoli%eralism is therefore alays already critical, %!t at acost &hey are condemned to in-o6e their fa-o!red positi-e -al!es

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    30/41

    9xt A2 6eoli+

    6eoli+erlis% is resilient nd the lterntive ,ils theiropti%is% tht the syste% &ill collpse on its o&n

    underesti%tes neoli+erlis%$s +ility to re-or/ni4e inresponse to fnncil crises ,ter%th o, 2""( recessionproves=iro&s*i 10

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    31/41

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    32/41

    A2 Co2 A/

    9ven i, CO2 is /ood in isoltion e>ects o, &r%in/ hurt/riculture &orse pre,er co%prtive evidence

    MS S&%inthnndP# Besvn, 2"12, Indian eneticist andinternational administrator, renoned for his leadin role in India?s B$reenRe-ol!tionB Aric!lt!ral Research (( BAric!lt!ral Research in an ra of #limate#haneB

    ormally, increased #52 in the atmosphere can help to increase the rate ofphotosynthesisi, &ter nd nutrients do not +eco%e li%itin/ ,ctors It sho!ld%e noted that #T and #4 plants

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    33/41

    are associated ith a shortenin of the heat(roin season res!ltin from pro8ectedtemperat!re increases

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    34/41

    2AC CP Theory

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    35/41

    2AC A/ent CP

    1. Per% do the CP- the CP isn$t co%petitive. ), they &in MMMMMM is nor%l %ens

    tht is ustifction o, n > +llot.

    2. A/ent CPs ;d

    A. A> ?round stels the 1AC nd &e cn$t /enerte o>ensetht is specifc to our >.

    ;. !ils to Disprove > the CP proves tht the > is desir+le.

    C. 7eserch no solvency dvocte ,or the CP +ecuse itsillo/icl nd not rel &orld the i%pct is tht the CPdisincentivi4es reserch nd de+te +out the cse.

    D. )llo/icl no rtionl ctor hs the option to choose+et&een the pln nd the CP the CP cretes totlly illo/icldecision-%*in/ %odel.

    0. And otin/ )ssue ,or !irness nd eduction.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    36/41

    2AC Conditionlity

    1. Conditionlity is voter

    2. splits the 2AC ti%e lloction %on/ %ultiple dvoccies

    0. decreses eduction +y reducin/ in-depth discussion onissues

    #. And ustifes per%uttions li*e Do the CP3

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    37/41

    2AC CP Theory P)Cs

    1. Pln inclusive counterpln$s re voter

    2. Stels A> /round nd ,orces us to de+te /inst ourselves

    0. P)Cs is infnitely re/ressive they &ill P)C out o, s%ller nds%ller portions o, the >.

    #. !orces the A> to &rite v/ue plns.

    5. 7edin/ the net-+eneft lone solves their o>ense.

    :. 7eect the Counterpln the d%/e hs +een done.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    38/41

    2AC Condition CPs ;d Theory

    1. Condition CPs re otin/ )ssue

    A. npredict+le no internl lin* +et&een pln nd condition%ens &e cn$t /enerte o>ence.

    ;. 6o solvency dvocte reciprocl +urden decreseseduction +ecuse &ere de+tin/ r+itrry policies.

    C. Nustifes per% do the counterpln CP is pln plus.

    D. Destroys topic specifc eduction prevents de+te +outthe resolution.

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    39/41

    2AC - Consult

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    40/41

    2AC Consulttion

    1. Consult CP$s ille/iti%te

    KL )nfnitely re/ressive There re n infnite nu%+er o,/ents nd issues tht the 6e/ could consultEcondition. The A>could never +e prepred.

    K+L Artifcilly co%petitive the co%petition is +sed onchn/in/ nor%l %ens nd not the pln. This hurts topiceduction nd ,orces us to de,end the infnite %ount o, issuestht re not prt o, the pln.

    KcL )%pct they usti,y the per%uttion Do the CP

    Per% do the pln s per the counterpln. CP$s onlyco%petitive +sed on thin/s not in the pln.

    2. ?enuine consulttion destroys ledership.Crroll

  • 7/25/2019 Crypto 2acs - DDI 2015 ST.docx

    41/41

    Per% Stu>

    Counter interprettions

    A. 7esolved %ens to express +y ,or%l votethis is the onlydefnition tht$s in the context o, the resolution