CrossExLecture - Georgia Debate Institutes

advertisement
Cross-Examination: The Art of
Asking and Answering Questions
Hays Watson – Head Debate Coach at the University of Georgia
Preview
Explaining cross-examination (CX) and its
purpose in debates
 Tips/tricks for asking good CX questions
 Tips/tricks for answering good CX
questions
 Practice, Practice, Practice

What is Cross-Examination?
What Is Cross-Examination?
3 minute question-and-answer period
 After each constructive speech (1ac, 1nc,
2ac, 2nc)
 Follows a specific sequence:
The 2nc questions the 1ac
The 1ac questions the 1nc
The 1nc questions the 2ac
The 2ac questions the 1nc

What Is Its Relevance to Debate?
It distinguishes some forms of debate
from others (public forum, parliamentary
debate)
 Helps identify and clarify key issues
 Serves as a means to undermine/refute
your opponents arguments
 Opportunity for “style” points
 It’s what distinguishes good debaters from
bad, great debaters from good

Why We’re Cross-Ex Debate!
Is Justin Bieber doing policy debate? Is he good at cross-ex?
Asking and Answering Questions
Cross-examination involves both asking
and answering questions
 This is DIFFERENT from the courtroom
– lawyers ask, witnesses answer
 EVERY speaker gets to ask AND answer
questions
 They’re EQUALLY important – style
points from asking great questions can be
undermined by poor answers to CX
questions

Asking Questions – Tips and Tricks
 Work
hard to be an expert!
Asking Questions – Tips and Tricks
 Think
Strategically
Asking Questions – Tips and Tricks
 Ask
questions about evidence
Sladick 12 (Kelli, Contributor @ Tenth Amendment Center, "Battlefield USA: The Drones are
Coming," http://blog.tenthamendmentcenter.com/2012/12/battlefield-usa-the-drones-arecoming)
In a US leaked document, “Airforce Instruction 14-104”, on domestic surveillance is permitted
on US citizens. It defines domestic surveillance as, “any imagery collected by satellite
(national or commercial) and airborne platforms that cover the land areas of the 50
United States, the District of Columbia, and the territories and possessions of the US, to a 12
nautical mile seaward limit of these land areas.” In the leaked document, legal uses include:
natural disasters, force protection, counter-terrorism, security vulnerabilities, environmental
studies, navigation, and exercises. In the 14-104 document, it acknowledges that drones may
be used to spy on US citizens: “This instruction applies to all Air Force active duty, Air Force
Reserve Command, and Air National Guard (when performing a federal function) intelligence
units, staff organizations, and non-intelligence organizations that perform intelligence-related
activities (e.g., Eagle Vision units) that could collect, analyze, process, retain, or disseminate
information on US persons and it also applies to those who exercise command over these
units and organizations.”
Asking Questions – Tips and Tricks
 Minimize
open-ended questions –
questions that begin with who, what,
when, why
--Syntax is key: verb + subject + rest of
question
Question Word vs.Verb/Subject

Where are you from? vs. Are you from
Alabama? Georgia?
Asking Questions – Tips and Tricks
POLITELY interrupt
--if they violate the yes/no answer
expectation
--if they’re intentionally being wordy/evasive
--if you need to move on to another
question
--keep an eye on the judge – many will give
you visual cues that you should interrupt

Asking Questions – Tips and Tricks
 Don’t
be afraid to move on!
Answering Questions Like a Pro
 Work
hard to be an expert!
There’s a common theme emerging…
Answering Questions Like a Pro
 Exploit
open-ended questions!
Answering Questions Like a Pro
 Don’t
be afraid to have them repeat
the question…but don’t do this all
the time…
Answering Questions Like a Pro
 You
have a partner for a reason –
don’t be afraid to use them!
Answering Questions Like a Pro
 You
don’t know every answer – it’s
ok to admit that every now and then
Cross-Ex Practice Makes Cross-Ex
(Almost) Perfect
More practice = better cross-ex
 Foreign languages, musical instruments,
sports, etc. all serve as strong empirical
proof
 You can practice cross-ex – partner, coach,
sibling, friend, your “boo,” classmate
 Side benefit of debating more – more
debates means more CX practice!
 Anecdotal evidence of effort/improvement

I Ask Kids CX Questions

Read and prepare to answer questions
about this 1ac card:
US human rights cred solves global WMD conflict
Burke-White 4 (William W., Lecturer in Public and International Affairs and Senior Special Assistant to the
Dean at the Woodrow Wilson School of Public and International Affairs, Princeton University and Ph.D. at
Cambridge, “Human Rights and National Security: The Strategic Correlation”, The Harvard Human Rights
Journal, Spring, 17 Harv. Hum. Rts. J. 249, Lexis)
This Article presents a strategic--as opposed to ideological or normative--argument that the promotion of
human rights should be given a more prominent place in U.S. foreign policy. It does so by suggesting a
correlation between the domestic human rights practices of states and their propensity to engage in aggressive
international conduct. Among the chief threats to U.S. national security are acts of aggression by other states.
Aggressive acts of war may directly endanger the United States, as did the Japanese bombing of Pearl Harbor in
1941, or they may require U.S. military action overseas, as in Kuwait fifty years later. Evidence from the postCold War period [*250] indicates that states that systematically abuse their own citizens' human rights are
also those most likely to engage in aggression. To the degree that improvements in various states' human rights
records decrease the likelihood of aggressive war, a foreign policy informed by human rights can significantly
enhance U.S. and global security. Since 1990, a state's domestic human rights policy appears to be a telling
indicator of that state's propensity to engage in international aggression. A central element of U.S. foreign policy
has long been the preservation of peace and the prevention of such acts of aggression. 2 If the correlation
discussed herein is accurate, it provides U.S. policymakers with a powerful new tool to enhance national
security through the promotion of human rights. A strategic linkage between national security and human
rights would result in a number of important policy modifications. First, it changes the prioritization of those
countries U.S. policymakers have identified as presenting the greatest concern. Second, it alters some of the
policy prescriptions for such states. Third, it offers states a means of signaling benign international intent
through the improvement of their domestic human rights records. Fourth, it provides a way for a current
government to prevent future governments from aggressive international behavior through the
institutionalization of human rights protections. Fifth, it addresses the particular threat of human rights abusing
states obtaining weapons of mass destruction (WMD). Finally, it offers a mechanism for U.S.-U.N. cooperation
on human rights issues.
Kids Ask Me CX Questions

Read and prepare to ask me questions about this
card:
US surveillance causes other nations to restrict Internet AND delegitimizes the efforts of local civil society groups
globally
Kehl 14 (Danielle Kehl et al, July 2014. Policy Analyst at New America’s Open Technology Institute (OTI); Kevin Bankston is the Policy
Director at OTI; Robyn Greene is a Policy Counsel at OTI; and Robert Morgus is a Research Associate at OTI. “Surveillance Costs:
The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,”
http://oti.newamerica.net/sites/newamerica.net/files/policydocs/Surveilance_Costs_Final.pdf)
The effects of the NSA disclosures on the Internet Freedom agenda go beyond the realm of Internet governance. The loss of the
United States as a model on Internet Freedom issues has made it harder for local civil society groups around the world—including
the groups that the State Department’s Internet Freedom programs typically support 203 —to advocate for Internet Freedom within
their own governments. 204 The Committee to Protect Journalists, for example, reports that in Pakistan, “where freedom of
expression is largely perceived as a Western notion, the Snowden revelations have had a damaging effect. The deeply polarized
narrative has become starker as the corridors of power push back on attempts to curb government surveillance.” 205 For some of
these groups, in fact, even the appearance of collaboration with or support from the U.S. government can diminish credibility, making it
harder for them to achieve local goals that align with U.S. foreign policy interests. 206 The gap in trust is particularly significant for
individuals and organizations that receive funding from the U.S. government for free expression activities or circumvention tools.
Technology supported by or exported from the United States is, in some cases, inherently suspect due to the revelations about the
NSA’s surveillance dragnet and the agency’s attempts to covertly influence product development. Moreover, revelations of what the
NSA has been doing in the past decade are eroding the moral high ground that the United States has often relied upon when putting
public pressure on authoritarian countries like China, Russia, and Iran to change their behavior. In 2014, Reporters Without Borders
added the United States to its “Enemies of the Internet” list for the first time, explicitly linking the inclusion to NSA surveillance. “The
main player in [the United States’] vast surveillance operation is the highly secretive National Security Agency (NSA) which, in the light
of Snowden’s revelations, has come to symbolize the abuses by the world’s intelligence agencies,” noted the 2014 report. 207 The
damaged perception of the United States 208 as a leader on Internet Freedom and its diminished ability to legitimately criticize other
countries for censorship and surveillance opens the door for foreign leaders to justify—and even expand— their own efforts. 209 For
example, the Egyptian government recently announced plans to monitor social media for potential terrorist activity, prompting backlash
from a number of advocates for free expression and privacy. 210 When a spokesman for the Egyptian Interior Ministry, Abdel Fatah
Uthman, appeared on television to explain the policy, one justification that he offered in response to privacy concerns was that “the US
listens in to phone calls, and supervises anyone who could threaten its national security.” 211 This type of rhetoric makes it difficult for
the U.S. to effectively criticize such a policy. Similarly, India’s comparatively mild response to allegations of NSA surveillance have been
seen by some critics “as a reflection of India’s own aspirations in the world of surveillance,” a further indication that U.S. spying may
now make it easier for foreign governments to quietly defend their own behavior. 212 It is even more difficult for the United States to
credibly indict Chinese hackers for breaking into U.S. government and commercial targets without fear of retribution in light of the
NSA revelations. 213 These challenges reflect an overall decline in U.S. soft power on free expression issues.
Download