KM 1NC Agrawal-Desai vs. Ghandi-Zhang

advertisement
Document1
Dartmouth 2012
1
*^*^*^*OFF CASE*^*^*^*
T – Investment/Transportation Infrastructure
Interpretation:
(A) “Investment” requires capital expenditure – it must add to the physical capital stock.
Anderson 6
(Edward, Lecturer in Development Studies – University of East Anglia, et al., “The Role of Public Investment in Poverty Reduction: Theories, Evidence and Methods”,
Overseas Development Institute Working Paper 263, March, http://www.odi.org.uk/resources/docs/1786.pdf)
1.3 Definitions We define (net) public investment as public expenditure that adds to the public physical capital stock .
This would include the building of roads, ports, schools, hospitals etc. This corresponds to the definition of public
investment in national accounts data, namely, capital expenditure . It is not within the scope of this paper to include
public expenditure on health and education, despite the fact that many regard such expenditure as investment. Methods for
assessing the poverty impact of public expenditure on social sectors such as health and education have been well covered
elsewhere in recent years (see for example, van de Walle and Nead, 1995; Sahn and Younger, 2000; and World Bank,
2002).
(B) Infrastructure is defined by specific physical characteristics --- this differentiates transportation from
utilities, communication, and energy
Inderst 9
(Georg, Financial Affairs Division – Organisation for Economic Co-operation and Development, “Pension Fund Investment in Infrastructure”, OECD Working Paper,
No. 32, January, http://www.oecd.org/dataoecd/41/9/42052208.pdf)
Definition of infrastructure assets The definition of infrastructure investment seems intuitive. The OECD uses a simple and
general definition for infrastructure as the system of public works in a country, state or region, including roads, utility lines
and public buildings. A standard dictionary‘s definition is: ―The basic facilities, services, and installations needed for the
functioning of a community or society, such as transportation and communications systems, water and power lines, and
public institutions including schools, post offices, and prisons. ‖ (American Heritage Dictionary). Infrastructure assets are
traditionally defined by their physical characteristics . One can split them into two main categories, and a range of
sectors within those: Economic infrastructure transport (e.g. toll roads, airports, seaport, tunnels, bridges, metro, rail
systems) utilities (e.g. water supply, sewage system, energy distribution networks, power plants, pipelines, gas storage)
communication
renewable energy Social
infrastructure
infrastructure if it is defined by its physical nature , and
people disagree what exactly should or should not count as infrastructure asset. For example, do utility companies count as
infrastructure? When their activities span production, distribution and networks, where is the dividing line? More generally,
where does public infrastructure end and private infrastructure start?
Violation:
The AFF doesn’t invest in capital expenditure in physical transportation infrastructure. The AFF is
investing in research making geospatial data more organized and coordinated making it not capital
expenditure. Remote sensors are communication infrastructure making it not physical infrastructure.
Voting Issue:
Limits – the AFF over limits the topic. By running a AFF that don’t invest or don’t invest in
transportation infrastructure, the AFF explodes the topic. Plans that don’t spend, don’t have any returns,
or are not transportation infrastructure allows for MILLIONS of more affs that creates an enormous
reseach burden for the neg. It would be impossible to research all the possible AFFs under their
interpretation. This kills education because it doesn’t allow for clash making it bad for debate.
Last printed 3/17/2016 11:17:00 PM
1
Document1
Dartmouth 2012
1
Ground - The neg has to run generic arguments that don’t specifically link, because their arguments are
not topical. They can spike out of our DA links.
Security K
The affirmative’s obsession with ranking and managing risk is the essence of security logic
Hagmann & Cavelty, 2012 (National risk registers: Security scientism and the propagation of permanent insecurity, John
Hagmann and Myriam Dunn Cavelty, International Peace Research Institute, Oslo, Sage Journals Feb 15 2012)
With the demise of communism as an overarching organizing principle and crystallization point, Western security doctrines
have seen the inclusion of a growing range of different security issues from political, societal, economic and environmental
sectors. By the same token, Western security politics has also been prominently infused with risk narratives and logics since
the 1990s (Petersen, 2011; Hameiri and Kühn, 2011). Particular to risk-centric conceptualizations of public danger is the
understanding that national and international security should take into account a varied set of natural or man-made disaster
potentials, as well as other probable disruptions with potentially grave consequences for society. Also, specific to these
dangers is the profound uncertainty regarding their exact form and likely impact, and the substantial room for conflicting
interpretations surrounding them. However, precise and ‘actionable’ knowledge of looming danger is quintessential to
security politics, the shift to new security narratives notwithstanding. Without conceptions of existing or upcoming
collective dangers, security schemes are neither intelligible nor implementable. Whether the matter at hand concerns the
installation of hi-tech body scanners at airports, the construction of avalanche barriers in the Alps or diplomatic initiatives
for a global anti-terror alliance, any security agenda is rhetorically and politically grounded in a representation of national
or international danger. In recent years, the epistemological foundations of security politics have been addressed by
reflexive and critical approaches, a literature that enquires into the formation, contestation and appropriation of (in)security
discourses. Situating itself in this broader literature, this article focuses on national risk registers as a particular means for
authoritative knowledge definition in the field of national security. National risk registers are fairly recent, comprehensive
inventories of public dangers ranging from natural hazards to industrial risks and political perils. Often produced by civil
protection agencies, they seek to provide secure foundations for public policymaking, security-related resource allocation
and policy planning. Evaluating and ranking all kinds of potential insecurities, from toxic accidents and political unrest to
plant diseases, thunderstorms, energy shortages, terrorist strikes, wars and the instability of global financial markets, risk
registers stand at the intersection of the broadening of security politics and the adoption of risk logics.
In particular, infrastructure development is the essence of modern securitization – it translates the
normal function of life into the discourse of security
Lundborg and Vaughan-Williams, 10 (Tom Lundborg, The Swedish Institute of International Affairs, Nick VaughanWilliams, University of Warwick, “There’s More to Life than Biopolitics: Critical Infrastructure, Resilience Planning, and Molecular
Security,” Paper prepared for the SGIR Conference, Stockholm, 7-10 September, 2010)
While the terrain of security studies is of course fiercely contested, what is common among a range of otherwise often
diverse perspectives is the core premise that ‘security’ relates to a realm of activity in some sense beyond the ‘norm’ of
political life. Thus, in the language of the Copenhagen School, a securitizing move occurs when an issue not previously
thought of as a security threat comes to be produced as such via a speech act that declares an existential threat to a
referent object (Buzan et al 1998). A similar logic can be identified in approaches to security that focus on exceptionalism:
the idea, following the paradigmatic thought of Carl Schmitt, that sovereign practices rely upon the decision to suspend
the normal state of affairs in order to produce emergency conditions in which extraordinary measures—such as martial
law, for example—are legitimised. For this reason, a tendency in security studies—even among self-styled ‘critical’
approaches – is to privilege analysis of high-profile ‘speech acts’ of elites, ‘exceptional’ responses to ‘exceptional’
circumstances, and events that are deemed to be ‘extraordinary’. Arguably this leads to an emphasis on what we might call
the ‘spectacle of security’, rather than more mundane, prosaic, and ‘everyday’ aspects of security policy and practice. By
contrast, the world of CIs necessitates a shift in the referent object of security away from the ‘spectacular’ to the ‘banal’.
Instead of high-profile speech-based acts of securitization, we are here dealing with telecommunications and transportation
networks, water treatment and sewage works, and so on: ‘semi-invisible’ phenomena that are often taken-for-granted
Last printed 3/17/2016 11:17:00 PM
2
Document1
Dartmouth 2012
1
fixtures and fittings of society, yet vital for the maintenance of what is considered to be ‘normal daily life’. For this
reason our subject matter calls for a re-thinking of the very ‘stuff’ considered to be apposite for the study of international
security. Indeed, analysing the role of CIs and resilience planning in global security relations adds particular resonance to
existing calls within the literature to broaden and deepen the way in which acts of securitization are conceptualised (Bigo
2002; Balzacq 2005; McDonald 2008; Williams 2003). Those adopting more sociologically-oriented perspectives, for
example, have sought to emphasise the way in which securitizing moves can be made by institutions (as well as
individuals), through repeated activity (as well as one-off ‘acts’), and involve various media (not only ‘speech’, but visual
culture, for example). From this reconfigured point of view it is possible to then see how the design, planning, management,
and execution of CIs also constitute an arena in which processes of securitization—of physical and cyber networks—takes
place.
The dream of security produces apocalypse– constructions of existential risk produce the annihilation
they are meant to escape
Pever Coviello, Prof. of English @ Bowdoin, 2k [Queer Frontiers, p. 39-40]
Perhaps. But to claim that American culture is at present decisively postnuclear is not to say that the world we inhabit is in
any way postapocalyptic. Apocalypse, as I began by saying, changed-it did not go away. And here I want to hazard my
second assertion: if, in the nuclear age of yesteryear, apocalypse signified an event threatening everyone and everything
with (in Jacques Derrida’s suitably menacing phrase) "remainderless and a-symbolic destruction," then in the postnuclear
world apocalypse is an affair whose parameters are definitively local. In shape and in substance, apocalypse is defined now
by the affliction it brings somewhere else, always to an "other" people whose very presence might then be written as a
kind of dangerous contagion, threatening the safety and prosperity of a cherished "general population." This fact seems
to me to stand behind Susan Sontag's incisive observation, from 1989, that, 'Apocalypse is now a long-running serial: not
'Apocalypse Now' but 'Apocalypse from Now On."" The decisive point here in the perpetuation of the threat of
apocalypse (the point Sontag goes on, at length, to miss) is that apocalypse is ever present because, as an element in a vast
economy of power, it is ever useful. That is, through the perpetual threat of destruction-through the constant
reproduction of the figure of apocalypse-agencies of power ensure their authority to act on and through the bodies of a
particular population. No one turns this point more persuasively than Michel Foucault, who in the final chapter of his first
volume of The History of Sexuality addresses himself to the problem of a power that is less repressive than productive, less
life-threatening than, in his words, "life-administering." Power, he contends, "exerts a positive influence on life land,
endeavors to administer, optimize, and multiply it, subjecting it to precise controls and comprehensive regulations?' In his
brief comments on what he calls "the atomic situation;' however, Foucault insists as well that the productiveness of modern
power must not be mistaken for a uniform repudiation of violent or even lethal means. For as "managers of life and
survival, of bodies and the race," agencies of modern power presume to act 'on the behalf of the existence of everyone."
Whatsoever might be construed as a threat to life and survival in this way serves to authorize any expression of force, no
matter how invasive or, indeed, potentially annihilating. "If genocide is indeed the dream of modem power," Foucault
writes, "this is not because of a recent return to the ancient right to kill; it is because power is situated and exercised at the
level of life, the species, the race, and the large-scale phenomena of population." For a state that would arm itself not with
the power to kill its population, but with a more comprehensive power over the patterns and functioning of its collective
life, the threat of an apocalyptic demise, nuclear or otherwise, seems a civic initiative that can scarcely be done without.
Alternative – Reject the affirmative’s security logic – only resistance to the discourse of security can
generate genuine political thought
Mark Neocleous, Prof. of Government @ Brunel, 2008 [Critique of Security, 185-6]
The only way out of such a dilemma, to escape the fetish, is perhaps to eschew the logic of security altogether - to reject it
as so ideologically loaded in favour of the state that any real political thought other than the authoritarian and reactionary
should be pressed to give it up. That is clearly something that can not be achieved within the limits of bourgeois thought
and thus could never even begin to be imagined by the security intellectual. It is also something that the constant iteration
of the refrain 'this is an insecure world' and reiteration of one fear, anxiety and insecurity after another will also make it
hard to do. But it is something that the critique of security suggests we may have to consider if we want a political way out
of the impasse of security. This impasse exists because security has now become so all-encompassing that it marginalises
Last printed 3/17/2016 11:17:00 PM
3
Document1
Dartmouth 2012
1
all else, most notably the constructive conflicts, debates and discussions that animate political life. The constant
prioritising of a mythical security as a political end - as the political end constitutes a rejection of politics in any meaningful
sense of the term. That is, as a mode of action in which differences can be articulated, in which the conflicts and struggles
that arise from such differences can be fought for and negotiated, in which people might come to believe that another world
is possible - that they might transform the world and in turn be transformed. Security politics simply removes this; worse, it
remoeves it while purportedly addressing it. In so doing it suppresses all issues of power and turns political questions into
debates about the most efficient way to achieve 'security', despite the fact that we are never quite told - never could be told what might count as having achieved it. Security politics is, in this sense, an anti-politics,"' dominating political discourse
in much the same manner as the security state tries to dominate human beings, reinforcing security fetishism and the
monopolistic character of security on the political imagination. We therefore need to get beyond security politics, not add
yet more 'sectors' to it in a way that simply expands the scope of the state and legitimises state intervention in yet more and
more areas of our lives. Simon Dalby reports a personal communication with Michael Williams, co-editor of the important
text Critical Security Studies, in which the latter asks: if you take away security, what do you put in the hole that's left
behind? But I'm inclined to agree with Dalby: maybe there is no hole."' The mistake has been to think that there is a hole
and that this hole needs to be filled with a new vision or revision of security in which it is re-mapped or civilised or
gendered or humanised or expanded or whatever. All of these ultimately remain within the statist political imaginary, and
consequently end up reaffirming the state as the terrain of modern politics, the grounds of security. The real task is not to
fill the supposed hole with yet another vision of security, but to fight for an alternative political language which takes us
beyond the narrow horizon of bourgeois security and which therefore does not constantly throw us into the arms of the
state. That's the point of critical politics: to develop a new political language more adequate to the kind of society we want.
Thus while much of what I have said here has been of a negative order, part of the tradition of critical theory is that the
negative may be as significant as the positive in setting thought on new paths. For if security really is the supreme concept
of bourgeois society and the fundamental thematic of liberalism, then to keep harping on about insecurity and to keep
demanding 'more security' (while meekly hoping that this increased security doesn't damage our liberty) is to blind
ourselves to the possibility of building real alternatives to the authoritarian tendencies in contemporary politics. To situate
ourselves against security politics would allow us to circumvent the debilitating effect achieved through the constant
securitising of social and political issues, debilitating in the sense that 'security' helps consolidate the power of the existing
forms of social domination and justifies the short-circuiting of even the most democratic forms. It would also allow us to
forge another kind of politics centred on a different conception of the good. We need a new way of thinking and talking
about social being and politics that moves us beyond security. This would perhaps be emancipatory in the true sense of the
word. What this might mean, precisely, must be open to debate. But it certainly requires recognising that security is an
illusion that has forgotten it is an illusion; it requires recognising that security is not the same as solidarity; it requires
accepting that insecurity is part of the human condition, and thus giving up the search for the certainty of security and
instead learning to tolerate the uncertainties, ambiguities and 'insecurities' that come with being human; it requires
accepting that 'securitizing' an issue does not mean dealing with it politically, but bracketing it out and handing it to the
state; it requires us to be brave enough to return the gift."'
Downgrade
A. Fiscal discipline now – political pressure will lead to debt compromise
Washington Post 7/18
Washington Post 7/18/12, http://www.columbiatribune.com/news/2012/jul/18/coalition-aims-to-head-off-debtdisaster/
WASHINGTON — A coalition of business leaders, budget experts and former politicians launched a $25 million campaign
yesterday to build political support for a far-reaching plan to raise taxes, cut popular retirement programs and tame the national
debt. With anxiety rising over a major budget mess looming in January, the campaign — dubbed "Fix the Debt" — is founded on
the notion that the moment is finally at hand when policymakers will be forced to compromise on an ambitious debt-reduction
strategy. After nearly three years of bipartisan negotiations, the broad outlines of that strategy are clear, the group's leaders said
during a news conference at the National Press Club: Raise more money through a simplified tax code and spend less on Social
Security, Medicare and Medicaid, the primary drivers of future borrowing. "Everyone knows in their hearts and their minds what
has to be done," said Democratic former Pennsylvania Gov. Ed Rendell, who is chairing the group with former New Hampshire
Last printed 3/17/2016 11:17:00 PM
4
Document1
Dartmouth 2012
1
Sen. Judd Gregg, a Republican. The goal of the campaign is to "create a safe environment where it's not only good policy, but
good politics as well." The campaign was founded by former Clinton White House Chief of Staff Erskine Bowles and former
Republican Sen. Alan Simpson of Wyoming. The two men led an independent fiscal commission that in 2010 produced a $4
trillion debt-reduction framework that has won praise from politicians across the political spectrum. But the Bowles-Simpson plan
never won the explicit backing of President Barack Obama or GOP leaders and therefore never gained real traction in Congress.
The campaign plans to launch a social media drive to persuade lawmakers to approve a plan similar to the Bowles-Simpson
framework by July 4, 2013 — replacing $600 billion in abrupt tax hikes and sharp spending cuts that are otherwise set to take
effect in January.
B. New infrastructure spending kills fiscal discipline – it undercuts the spirit of “shared sacrifice”
O’Hanlon 10
Michael O’Hanlon, senior fellow at the Brookings Institution, 12/22/10, “THE DEFENSE BUDGET AND
AMERICAN POWER,”
http://www.brookings.edu/~/media/Files/events/2010/1222_defense_budget/20101222_defense_budget.pdf
So the minute that someone says, well, defense is the top constitutional obligation of the federal government and therefore
it should be protected regardless, and we should make our deficit reduction out of other accounts. If we start a conversation
in those terms, then a big constituency is going to come up and say let's protect Social Security, or let's protect college loans
for students because that's our future after all. Or let's protect science research or infrastructural development, and you get
the idea pretty soon you've lost the spirit of shared sacrifice that I think is essential if we're going to have any hope of
reducing the deficit in the coming years. So that's the basic motivation. We're not probably going to reduce the deficit
effectively, and therefore strengthen our long-term economy and the foundation for our long-term military power, if we
don't establish a spirit of shared sacrifice.
C. Loss of fiscal discipline causes a downgrade
Mark Gongloff, Wall Street Journal, 08/2/’11, [Moody’s Affirms US AAA Rating,
http://blogs.wsj.com/marketbeat/2011/08/02/moodys-affirms-us-aaa-rating/] VN
Moody’s just came out and said, great job, USA, you get to keep your AAA rating. For now. This follows Fitch, which earlier said
more or less that they were still reviewing the US rating, a process that could take through August. They didn’t promise they’d
keep a AAA rating at the end of the process, but called the debt deal “a step in the right direction.” Now the big shoe dangling is
S&P, which is really on the hook, having sounded the loudest warning about a downgrade. The size of the debt deal doesn’t seem
to hit the $4 trillion mark S&P has said would be necessary to keep a AAA rating. My prediction? They’ll issue a similar
placeholder statement soonish. Meanwhile, let’s hear what Moody’s has to say: Moody’s Investors Service has confirmed the
Aaa government bond rating of the United States following the raising of the statutory debt limit on August 2. The rating outlook
is now negative. Moody’s placed the rating on review for possible downgrade on July 13 due to the small but rising probability of
a default on the government’s debt obligations because of a failure to increase the debt limit. The initial increase of the debt limit
by $900 billion and the commitment to raise it by a further $1.2-1.5 trillion by yearend have virtually eliminated the risk of such a
default, prompting the confirmation of the rating at Aaa. In confirming the Aaa rating, Moody’s also recognized that today’s
agreement is a first step toward achieving the long-term fiscal consolidation needed to maintain the US government debt metrics
within Aaa parameters over the long run. The legislation calls for $917 billion in specific spending cuts over the next decade and
established a congressional committee charged with making recommendations for achieving a further $1.5 trillion in deficit
reduction over the same time period. In the absence of the committee reaching an agreement, automatic spending cuts of $1.2
trillion would become effective. In assigning a negative outlook to the rating, Moody’s indicated, however, that there would be a
risk of downgrade if (1) there is a weakening in fiscal discipline in the coming year; (2) further fiscal consolidation measures are
not adopted in 2013; (3) the economic outlook deteriorates significantly; or (4) there is an appreciable rise in the US government’s
funding costs over and above what is currently expected.
D. Further downgrades would create a debt spiral, crippling the economy
Rowley 12 Charles Rowley, Professor Emeritus of Economics at George Mason University, 10/15/12, “Renewed threats to U.S.
credit rating,” Charles Rowley’s blog, http://charlesrowley.wordpress.com/2012/06/15/renewed-threats-to-u-s-credit-rating/
If Moody’s downgrades and if S & P further downgrades U.S. credit ratings, this would move the United States out of the
exclusive club of AAA-rated nations, and throw into question the privileged status of U.S. Treasury securities as a safe
Last printed 3/17/2016 11:17:00 PM
5
Document1
Dartmouth 2012
1
haven for global investors. Any significant flight from Treasuries would raise Treasury bond rates, with crippling
consequences for the economy. A 1-percentage point increase in rates would raise Treasury debt payments by $1 trillion
over the next decade, wiping out the benefits of all the budget cuts enacted by Congress last year. The dynamics of such a
process may prove to be devastating, moving the U.S. federal government onto a path of sovereign downgrades that
accelerates an already worsening fiscal situation. Greece here we come.
E. Economic collapse causes global nuclear war.
Merlini, Senior Fellow – Brookings, 11
[Cesare Merlini, nonresident senior fellow at the Center on the United States and Europe and chairman of the
Board of Trustees of the Italian Institute for International Affairs (IAI) in Rome. He served as IAI president
from 1979 to 2001. Until 2009, he also occupied the position of executive vice chairman of the Council for the
United States and Italy, which he co-founded in 1983. His areas of expertise include transatlantic relations,
European integration and nuclear non-proliferation, with particular focus on nuclear science and technology. A
Post-Secular World? DOI: 10.1080/00396338.2011.571015 Article Requests: Order Reprints : Request
Permissions Published in: journal Survival, Volume 53, Issue 2 April 2011 , pages 117 - 130 Publication
Frequency: 6 issues per year Download PDF Download PDF (~357 KB) View Related Articles To cite this
Article: Merlini, Cesare 'A Post-Secular World?', Survival, 53:2, 117 – 130]
Two neatly opposed scenarios for the future of the world order illustrate the range of possibilities, albeit at the risk of
oversimplification. The first scenario entails the premature crumbling of the post-Westphalian system. One or more of the
acute tensions apparent today evolves into an open and traditional conflict between states, perhaps even involving the use of
nuclear weapons. The crisis might be triggered by a collapse of the global economic and financial system, the vulnerability
of which we have just experienced, and the prospect of a second Great Depression, with consequences for peace and
democracy similar to those of the first. Whatever the trigger, the unlimited exercise of national sovereignty, exclusive selfinterest and rejection of outside interference would likely be amplified, emptying, perhaps entirely, the half-full glass of
multilateralism, including the UN and the European Union. Many of the more likely conflicts, such as between Israel and
Iran or India and Pakistan, have potential religious dimensions. Short of war, tensions such as those related to immigration
might become unbearable. Familiar issues of creed and identity could be exacerbated. One way or another, the secular
rational approach would be sidestepped by a return to theocratic absolutes, competing or converging with secular absolutes
such as unbridled nationalism.
Privates CP
Plan text: The United States Federal Governments should release geospatial data to the public and
private sectors.
Open source solves remote sensing
Jackson 2008 (Joab Jackson, Joab
Jackson
is
the
senior
technology
editor
for
Government
Computer
News)
http://gcn.com/articles/2008/07/28/open-source-remote-sensing.aspx
Ball Aerospace & Technologies Corp. has released into open source software for analyzing remote sensing data. According to the
company, Defense Department intelligence analysts and scientists use the software, called Opticks. By open sourcing the software,
Ball hopes to increase the demand for remote sensing analysis, as well as increase the number of features on the application. At
present, Opticks supports analysis for imagery, motion imagery, synthetic aperture radar, and multi-spectral and hyper-spectral remote
sensing data. "Ball Aerospace's Opticks demonstrates how government-sponsored code originally developed by a contractor can be
maximized by releasing it as open source," said John M. Weathersby, executive director of the Open Source Software Institute, in a
statement. "This creative business development effort is consistent with the forward-thinking strategy outlined in the Department of
Defense's
Open
Technology
Development
roadmap."
Last printed 3/17/2016 11:17:00 PM
6
Document1
Dartmouth 2012
1
*^*^*^*CASE*^*^*^*
Nuke Terror
Their Budge and Williamson evidence indicates that there are many other things that are involved in
solving important security concerns other than Remote sensing. Their plan only fiats one of them, means
that they can’t solve the advantage.
Prefer conventional weapons
Craig 11 [Campbell, professor of international relations at the University of Southampton Special Issue: Bringing Critical Realism
and Historical Materialism into Critical Terrorism Studies Atomic obsession: nuclear alarmism from Hiroshima to al-Qaeda Critical
Studies on Terrorism Volume 4, Issue 1, 2011, April, pages 115-124]
Let us address each of his claims, in reverse order. Mueller suggests that the risk of an act of major nuclear terrorism is
exceptionally small, along the lines of an asteroid hitting the earth. Drawing upon his powerful book against terrorism
alarmism, Overblown (2006), he shows that serious anti-Western terrorist groups are today widely scattered and
disorganized – precisely the wrong kind of arrangement for the sustained and centralized project of building an atomic
bomb. Looking for immediate results, terrorist groups are likely to go with what works today, rather than committing to a
long-term and likely futile project. He points out, as have other authors, that so-called ‘rogue’ nations, even if they obtain a
bomb, are never going to hand it over to terrorists: to do so would utterly negate everything they had worked so hard for. A
nation such as Iran that somehow decided to give its bomb to al-Qaeda (leaving aide their completely different objectives)
would not only be handing over a weapon that it had spent years and billions to build, and giving up the prestige and
deterrence the bomb supposedly confers, it would also be putting itself at acute risk of being on the receiving end of a
retaliatory strike once the terrorists did their work. By what rationale would any leader make such a move? The potential
costs would be astronomical, the benefits non-existent.
Their Budge and Williamson evidence talks about a terrorist attack on a car that’s transporting chemical
material down the highway would be bad. There is no way that the US would mistake this attack for
Russia.
No desire, no market, and locks check.
Mueller, Political Science at Ohio State, 11 [John, Professor of Political Science at Ohio State, The Truth About Al-Qaeda,
August 2, 2011, http://www.foreignaffairs.com/articles/68012/john-mueller/the-truth-about-al-qaeda?page=show]
Thus far terrorist groups seem to have exhibited only limited desire and even less progress in going atomic. This may be
because, after brief exploration of the possible routes, they, unlike generations of alarmists on the issue, have discovered
that the tremendous effort required is scarcely likely to be successful. It is highly improbable that a would-be atomic
terrorist would be given or sold a bomb by a generous like-minded nuclear state because the donor could not control its use
and because the ultimate source of the weapon might be discovered. Although there has been great worry about terrorists
illicitly stealing or purchasing a nuclear weapon, it seems likely that neither “loose nukes” nor a market in illicit nuclear
materials exists. Moreover, finished bombs have been outfitted with an array of locks and safety devices. There could be
dangers in the chaos that would emerge if a nuclear state were utterly to fail, collapsing in full disarray. However, even
under those conditions, nuclear weapons would likely remain under heavy guard by people who know that a purloined
bomb would most likely end up going off in their own territory, would still have locks, and could probably be followed and
hunted down by an alarmed international community. The most plausible route for terrorists would be to manufacture the
device themselves from purloined materials. This task requires that a considerable series of difficult hurdles be conquered
in sequence, including the effective recruitment of people who at once have great technical skills and will remain
completely devoted to the cause. In addition, a host of corrupted co-conspirators, many of them foreign, must remain utterly
reliable, international and local security services must be kept perpetually in the dark, and no curious outsider must get
Last printed 3/17/2016 11:17:00 PM
7
Document1
Dartmouth 2012
1
consequential wind of the project over the months or even years it takes to pull off. In addition, the financial costs of the
operation could easily become monumental. Moreover, the difficulties are likely to increase because of enhanced
protective and policing efforts by self-interested governments and because any foiled attempt would expose flaws in the
defense system, holes the defenders would then plug. The evidence of al-Qaeda’s desire to go atomic, and about its
progress in accomplishing this exceedingly difficult task, is remarkably skimpy, if not completely negligible. The scariest
stuff—a decade’s worth of loose nuke rumor—seems to have no substance whatever. For the most part, terrorists seem to
be heeding the advice found in an al-Qaeda laptop seized in Pakistan: “Make use of that which is available ... rather than
waste valuable time becoming despondent over that which is not within your reach.” In part because of current policies—
but also because of a wealth of other technical and organizational difficulties—the atomic terrorists’ task is already
monumental, and their likelihood of success is vanishingly small. Efforts to further enhance this monumentality, if costeffective and accompanied with only tolerable side effects, are generally desirable.
Their Budge and Williamson Evidence talks about an attack on airline security, their evidence doesn’t
give a reason why remote sensing would solve for it.
No nuclear threat- Russia’s weapons are useless
Lieber and Press ‘6 Keir is a professor of political science at Notre Dame and Daryl G. is an associate professor of political science at the University of
Pennsylvania (Foreign Affairs, “The Rise of U.S. Nuclear Primacy” March/April 2006)
EVEN AS the United States' nuclear forces have grown stronger since the end of the Cold War, Russia's strategic nuclear arsenal has
sharply deteriorated. Russia has 39 percent fewer long-range bombers, S8 percent fewer ICBMs, and 8o percent fewer SSBNS than
the Soviet Union fielded during its last days. The true extent of the Russian arsenal's decay, however, is much greater than these cuts
suggest. What nuclear forces Russia retains are hardly ready for use. Russia's strategic bombers, now located at only two bases and
thus vulnerable to a surprise attack, rarely conduct training exercises, and their warheads are stored off-base. Over 8o percent of
Russia's silo-based ICBMS have exceeded their original service lives, and plans to replace them with new missiles have been stymied
by failed tests and low rates of production. Russia's mobile ICBMS rarely patrol, and although they could fire their missiles from
inside their bases if given sufficient warning of an attack, it appears unlikely that they would have the time to do so. The third leg of
Russia's nuclear triad has weakened the most. Since 2000, Russia's SSBNS have conducted approximately two patrols per year, down
from 6o in 1990. (By contrast, the U.S. SSBN patrol rate today is about 40 per year.) Most of the time, all nine of Russia's ballistic
missile submarines are sitting in port, where they make easy targets. Moreover, submarines require well-trained crews to be effective.
Operating a ballistic missile submarine-and silently coordinating its operations with surface ships and attack submarines to evade an
enemy's forces-is not simple. Without frequent patrols, the skills of Russian submariners, like the submarines themselves, are
decaying. Revealingly, a 2004 test (attended by President Vladimir Putin) of several submarine-launched ballistic missiles was a total
fiasco: all either failed to launch or veered off course. The fact that there were similar failures in the summer and fall of 2005
completes this unflat tering picture of Russia's nuclear forces. Compounding these problems, Russia's early warning system is a mess.
Neither Soviet nor Russian satellites have ever been capa ble of reliably detecting missiles launched from U.S. submarines. (In a
recent public statement, a top Russian general described his country's early warning satellite constellation as "hopelessly out dated.")
Bioterror
Squo Solves – Remote Sensing Tech is already good enough – that’s their authors
Yang 02 (2002 Chaowei Phil Yang Professor of GIScience, George Mason University “UTILIZING REMOTE SENSED DATA IN
A QUICK RESPONSE SYSTEM” Menas Kafatos, Ruixin Yang, Chaowei Yang, Richard Gomez, & Zafer Boybeyi)
Remote sensing technology has been improving in the modern age. With LIDAR (LIght Detection And Ranging) and hyperspectral
instruments through space-borne and airborne platforms, one can get high spatial and spectral resolution information of the Earth
surface. The information can be used to assess the damage of terrorist and other hazardous events and provide information for running
prediction models for response planning.
Bioweapons don’t cause extinction
A. They were used during WWII and didn’t result in massive human wipeouts
B. A bioweapon was used on a bus in Washington DC last year and made 13 people sick
Last printed 3/17/2016 11:17:00 PM
8
Document1
Dartmouth 2012
1
Bioterror risk is low—dispersal problems, tech barriers, risk fo back spread—experts agree
John Mueller, Professor, Political Science, Ohio State University, OVERBLOWN: HOW POLITICIANS AND
THE TERRORISM INDUSTRY INFLATE NATIONAL SECURITY THREATS, AND WHY WE BELIEVE
THEM, 2009, p. 21-22.
For the most destructive results, biological weapons need to be dispersed in very low-altitude aerosol clouds. Because
aerosols do not appreciably settle, pathogens like anthrax (which is not easy to spread or catch and is not contagious) would probably have
to be sprayed near nose level. Moreover, 90 percent of the microorganisms are likely to die during the process of
aerosolization, and their effectiveness could be reduced still further by sunlight, smog, humidity, and temperature changes .
Explosive methods of dispersion may destroy the organisms , and, except for anthrax spores, long-term storage of lethal
organisms in bombs or warheads is difficult: even if refrigerated, most of the organisms have a limited lifetime. The effects of such weapons can
take days or weeks to have full effect, during which time they can be countered with medical and civil defense measures.
And their impact is very difficult to predict; in combat situations they may spread back onto the attacker. In the judgment of two careful analysts,
delivering microbes and toxins over a wide area in the form most suitable for inflicting mass casualties—as an aerosol that
can be inhaled—requires a delivery system whose development "would outstrip the technical capabilities of all
but the most sophisticated terrorist" Even then effective dispersal could easily be disrupted by unfavorable
environmental and meteorological conditions." After assessing, and stressing, the difficulties a nonstate entity would find in obtaining,
handling, growing, storing, processing, and dispersing lethal pathogens effectively, biological weapons expert Milton Leitenberg compares his conclusions
with glib pronouncements in the press about how biological attacks can be pulled off by anyone with "a little training and a few glass jars," or how it
would be "about as difficult as producing beer." He sardonically concludes, "The less the commentator seems to know about biological warfare the easier
he seems to think the task is.""
Bioweapons won’t cause extinction – unlikely to spread and cause epidemics
Gregg Easterbrook, senior fellow at The New Republic, July 2003, Wired, “We’re All Gonna Die!”
http://www.wired.com/wired/archive/11.07/doomsday.html?pg=2&topic=&topic_set=
3. Germ warfare!Like chemical agents, biological weapons have never lived up to their billing in popular culture. Consider
the 1995 medical thriller Outbreak, in which a highly contagious virus takes out entire towns. The reality is quite different.
Weaponized smallpox escaped from a Soviet laboratory in Aralsk, Kazakhstan, in 1971; three people died, no epidemic
followed. In 1979, weapons-grade anthrax got out of a Soviet facility in Sverdlovsk (now called Ekaterinburg); 68 died, no
epidemic. The loss of life was tragic, but no greater than could have been caused by a single conventional bomb. In 1989,
workers at a US government facility near Washington were accidentally exposed to Ebola virus. They walked around the
community and hung out with family and friends for several days before the mistake was discovered. No one died. The fact
is, evolution has spent millions of years conditioning mammals to resist germs. Consider the Black Plague. It was the worst
known pathogen in history, loose in a Middle Ages society of poor public health, awful sanitation, and no antibiotics. Yet it
didn’t kill off humanity. Most people who were caught in the epidemic survived. Any superbug introduced into today’s
Western world would encounter top-notch public health, excellent sanitation, and an array of medicines specifically
engineered to kill bioagents. Perhaps one day some aspiring Dr. Evil will invent a bug that bypasses the immune system.
Because it is possible some novel superdisease could be invented, or that existing pathogens like smallpox could be
genetically altered to make them more virulent (two-thirds of those who contract natural smallpox survive), biological
agents are a legitimate concern. They may turn increasingly troublesome as time passes and knowledge of biotechnology
becomes harder to control, allowing individuals or small groups to cook up nasty germs as readily as they can buy guns
today. But no superplague has ever come close to wiping out humanity before, and it seems unlikely to happen in the
future.
FEMA
If we need FEMA to maintain credibility, why didn’t this happen after Hurricane Katrina. Their
evidence indicates that credibility decreased so why didn’t their impacts happen?
Last printed 3/17/2016 11:17:00 PM
9
Document1
Dartmouth 2012
1
Their Walters evidence cites that the BP Gulf Oil Spill was another example of a failed response of the
American government that should have destroyed credibility – a reason why their impact should be non
unique
Single issues not key – perceptions change slowly.
Gray, International Politics at Reading, 11 [COLIN S. GRAY is Professor of International Poli- tics and Strategic Studies
at the University of Reading, England. He worked at the International Institute for Strategic Studies (London), and at Hudson
Institute (Croton-on-Hudson, NY) before founding the Na- tional Institute for Public Policy, a defense-oriented think tank in the
Washington, DC, area. Dr. Gray served for 5 years in the Reagan administration on the President’s General Advisory Committee on
Arms SSI Monograph HARD POWER AND SOFT POWER: THE UTILITY OF MILITARY FORCE AS AN INSTRUMENT OF
POLICY IN THE 21ST CENTURY Colin S. Gray April 2011]
The error lies in the search for, and inevitable finding of, “golden keys” and “silver bullets” to resolve current versions of
en- during problems. Soft-power salesmen have a potent product-mix to sell, but they fail to appreciate the real- ity that
American soft power is a product essentially unalterable over a short span of years. As a country with a cultural or
civilizational brand that is unique and mainly rooted in deep historical, geographical, and ideational roots, America is not
at liberty to emu- late a major car manufacturer and advertise an exten- sive and varied model range of persuasive softpower profiles. Of course, some elements of soft power can be emphasized purposefully in tailored word and deed.
However, foreign perceptions of the United States are no more developed from a blank page than the American past can
be retooled and fine-tuned for contemporary advantage. Frustrating though it may be, a country cannot easily escape
legacies from its past.
Their NASA and US DOT evidence just talks about how Remote Sensing can solve for fire and make fire
propogation models – this means that they can’t solve for disasters like floods and Hurricanes – means
Remote sensing doesn’t solve for Credibility
Can’t substitute for hard power.
Kroenig, Government at Georgetown, et al. 10 [Matthew, Department of Government, Georgetown University Melissa
McAdam, Department of Political Science, University of California, Berkeley Steven Weber, Information School, University of
California, Berkeley, Taking Soft Power Seriously, Comparative Strategy, Volume 29, Issue 5 November 2010 , pages 412 – 431]
Foreign policy actors have many reasons to experiment with soft power, not merely because its use can be less costly than
hard power. But, soft power comes with its own quite striking limitations. Our research suggests that soft power strategies
will be unlikely to succeed except under fairly restrictive conditions. It may very well be, then, that the U.S. foreign policy
elite is at risk of exaggerating the effectiveness of soft power (rather than underutilizing it) as a tool of foreign policy.
After all, international communication is fraught with difficulties, persuading people to change firmly held political views
is hard, and individual attitudes are often thought to have an insignificant role in determining international political
outcomes. Soft power, therefore, will probably be considered a niche foreign policy option useful for addressing a small
fraction of the problems on Washington's foreign policy agenda. Analysts who suggest that soft power can easily be
substituted for hard power or who maintain that soft power should provide an overarching guide to the formulation of U.S.
foreign policy are badly mistaken. It is not conducive to good policy to employ the idea of soft power as a way of arguing
against the use of military force, for example.
Their Hartfod Courant evidence doesn’t talk about how response to disasters can solve for soft power,
and it takes out their uniqueness for the impact because it says that credibility was destroyed after
Katrina
1. American soft power is unworkable – nations don’t believe in benevolent hegemony enough to
overwhelm their resentment and fear***
Last printed 3/17/2016 11:17:00 PM
10
Document1
Dartmouth 2012
1
Christopher Layne (Associate Professor in the Bush School of Government and Public Service at Texas A&M
University) 2007 “American Empire: A Debate” p 68
Doubtless, American
primacy has its dimension of benevolence, but a state as powerful as the United States can never be
benevolent enough to offset the fear that other states have of its unchecked power . In international politics, benevolent hegemons
are like unicorns—there is no such animal. Hegemons love themselves, but others mistrust and fear them—and for good reason.
In today's world, others dread both the overconcentration of geopolitical weight in America's favor and the purposes for
which it may be used. After all,"Nogreat power has a monopoly on virtue and, although some may have a greatdeal more virtue than others, virtue
imposed on others is not seen as such bythem. All great powers are capable of exercising a measure of self-restraint, butthey are tempted not to and the
choice to practice restraint is made easier by theexistence of countervailing power and the possibility of it being exercised." While Washington's selfproclaimed benevolence is inherently ephemeral, the hard fist of American power is tangible . Others must worry constantly that
ifU.S. intentions change, bad things may happen to them. In a one-superpower world, the overconcentration of power in America's
hands is an omnipresent challenge to other states's ecurity, and Washington's ability to reassure others of its benevolence is
limited by the very enormity of its power .
2. Self-correction --- move to multilateralism happening now
Economist ’07 (Kevin Kalaugher, “Still No.1: Wounded, tetchy and less effective than it should be, America is
still the power that counts,” 6-28, http://www.economist.com/opinion/PrinterFriendly.cfm?story_id=9407806)
If America were a stock, it would be a “buy”: an undervalued market leader, in need of new management. But that points to its last great
strength. More than any rival, America corrects itself. Under pressure from voters, Mr Bush has already rediscovered
some of the charms of multilateralism; he is talking about climate change; a Middle East peace initiative is
possible. Next year's presidential election offers a chance for renewal. Such corrections are not automatic: something (a
misadventure in Iran?) may yet compound the misery of Iraq in the same way Watergate followed Vietnam. But America recovered from the
1970s. It will bounce back stronger again.
3. Soft power cannot prevent conflict – empirically proven
Fen Hampsen et al, 1998 International Journal
Perhaps the
two best examples of the continued utility of military force are the Persian Gulf conflict of 1990-1 and the
coalition deployment to the same region, led by the United States (and supported by the United Nations), in early 1998 to ensure Iraq's
compliance with the 1991 ceasefire agreement. Both missions have occasioned much debate in the scholarly community, and deservedly so, but we take it
as axiomatic that for both sides on each occasion the role of military force was critical in the evolution -- and resolution -- of the crisis. In 1990-1, this
would appear to be self-evident, while in 1998 no less a commentator than Kofi Annan, in the wake of Iraq's decision to again permit weapons inspectors
access to its presidential palaces, dubbed the United States and Britain 'the perfect UN peacekeepers' for their show of force in support of UNSCOM. It is
important to note that in each case soft power proved singularly unable to affect the actions of a single, isolated, pariah state,
albeit one that possessed considerable military wherewithal and a modicum of regional legitimacy. It is certainly dangerous to generalize from the Iraqi
example, but one might at least question the applicability of soft power to powerful rogue states in bold defiance of international
law and international agreements.
Many things are more important to soft power than aff.
United Nations support
Shattuck ’07 (John, CEO – John F. Kennedy Library Foundation, CQ Testimony, 3-29, Lexis)
4. The U.S. decision to disengage from U.N. human rights institutions undermines its position as a human rights leader . For more than
sixty years the U.S. has been a world leader in building international institutions to promote human rights. Today, unfortunately, we seem to have renounced that
leadership by withdrawing from the new U.N. Human Rights Council and by refusing to participate in efforts to shape the new
I nternational C riminal C ourt. In both cases the U.S. now has no influence over the future of these two flawed institutions. In the case of the Human Rights Council,
the U.S. abandoned its support when it was unable to limit the Council's membership to countries with good human rights records, despite the fact that the Council
membership requirements adopted in the recent U.N. reforms are an improvement over those of the dysfunctional Human Rights Commission which it replaced. In
the case of the International Criminal Court, many structural changes need to be made in order for the U.S. to become a full participant. Nevertheless, in recent years
the U.S. has lost all leverage over the Court's development by withdrawing its signature from the treaty establishing it. In addition, an active U.S. campaign to
put pressure on governments not to join the Court has engendered international ill will and further undermined the capacity of the
U.S. to exercise human rights leadership.
Last printed 3/17/2016 11:17:00 PM
11
Document1
Dartmouth 2012
1
Turn – Taiwan
US soft power destroys Chinese soft power
Kurlantzick, 07 – Visiting scholar in the Carnegie Endowment’s China Program (Joshua Kurlantzick, Charm
Offensive: How China's Soft Power is Transforming the World. p. 208-209)
But China's
growing soft power will threaten the United States as well: the emergence of China's soft power is already having a
strategic impact on US foreign policy. China could wield its influence in a growing clash over resources. Like China, the United States needs
continued access to oil and gas, since estimates suggest that America could be importing nearly 70 percent of its oil in two decades, up from just over 50 percent
today. Oil and gas do not trade on a completely free market, tend to be controlled by state-linked companies—and may be running out. Stores of easily accessible
petroleum, like the fields in Saudi Arabia, could be dwindling. Colin Campbell, the former chief geologist for Amoco, argues that 2006 may have been the peak
production year for oil, after which reserves and production will hit a long downward slope.19 With oil becoming scarcer, Latin American and West African and
Asian oil remain among the cheapest for the United States, and the easiest for American companies to refine and use. The United States cannot afford to lose
access to these reserves to any potential competitor. As we saw in Chapter 7, China has enjoyed success in winning access to oil and gas, and Beijing views
energy as a zero-sum game. "For China's leaders, energy security clearly is too important to be left to the markets," argues the Asia energy specialist Mikkal
Herberg, who believes competing US and Chinese demands for energy will eventually lead to a clash over resources. “The Chinese are seeking to
achieve assured sources of supply in Latin America through a strategy that focuses on securing the entire supply chain in critical industries,” believes R. Evan Ellis, a
Latin America specialist. “This strategy of ‘vertical integration’ involves using strategic purchases and investments to ensure an acceptable amount of leverage
over… all elements of the supply chain.”
Chinese soft power is critical to preventing a Taiwanese push for independence
Gill and Huang 06 (Bates holds the CSIS Freeman Chair in China, Yanzhong is an assistant professor at the
John Whitehead School of Diplomacy and International Relations, Survival, “Sources and limits of Chinese
'soft power',” Volume Issue 2 June, pg 17-36,
http://www.informaworld.com/smpp/section?content=a747985000&fulltext=713240928)
A most intriguing example of China's soft power can be seen in its relations with Taiwan. In 2005, China launched a charm offensive
against the politicians and people in the island by inviting opposition party leaders to visit the mainland, extending tuition benefits to
Taiwanese studying at mainland universities, and, through a zero-tariff policy on imports of Taiwan's fruit, offering export incentive perks to
farmers in the south of Taiwan (traditionally a pro-Taiwan independence stronghold). This 'hearts-and-minds' policy not only aims to reduce the
perception of military threat from China, but also gives the Chinese government leverage to exercise influence in Taiwan's political
culture and society, and politically marginalise Taiwan's independence-oriented president, Chen Shui-bian.In part as a result of
Beijing's manoeuvres in recent years - and Chen's increasingly frustrated but worrisome responses - the possibility for Taiwan independence
seems more distant and difficult. Chen Shiubian has increasingly alienated American supporters in Washington who do not appreciate what they see as his
provocative political stance on cross-Strait issues. In the meantime, some 1 million, or about 5%, of the Taiwan population lives and works in China, and Taiwan
business has invested more than $100bn on the mainland.
Extinction
Hsiung 01 – Professor of Politics and International Law at NYU (James, 21st Century World Order and the
Asia Pacific, p. 359-360)
Admittedly, it is harmless for an analyst like Lind to be so oblivious of lessons from the past and of the reasons behind both the dogs barking and not barking. But
decision-makers cannot afford such luxury. Lee Kuan Yew, Singapore’s Senior Minister, issued a grave warning presumably directed at all government leaders,
including the United States, that the Taiwan powder keg could ignite a conflagration that will engulf the entire region. It might even embroil
the United States in a nuclear holocaust that nobody wants. Oftentimes, well-meaning analysts raise the question whether China, with its present military
capability and modest defense expenditures (about U.S. $15 billion annually), can or cannot take Taiwan by force. But this is the wrong question to pose. As the late
patriarch Deng Xiapoing put it, “We’d rather have it proven that we tried but failed [to stop it] even by force, than be accused [by our
disgruntled compatriots and posterity] of not trying to stop Taiwan from going independent.” Earlier, I raised the issue of stability within the U.S.China-Japan triad, precisely with the U.S.-Japan alliance in view. Apparently, many in Japan have apprehensions about the stability. Japanese Nobel laureate (for
literature) Ohe Kenzaburo, for instance, once told a pen pal that he was fearful of the outcome of a conflict between the United States and China over the question of
Taiwan. Because of its alliance relationship, Japan would be embroiled in a conflict that it did not choose and that might escalate into a
nuclear holocaust. From the ashes of such a nuclear conflict, he figured, some form of life may still be found in the combatant nuclear giants,
China and the United States. But, Kenaburo rued, there would be absolutely nothing left in Japan or Taiwan in the conflict’s wake. By
now, I hope it is clear why stability in the U.S.-China-Japan triadic relationship is a sine qua non for geopolitical peace in the Asia Pacific region.
Last printed 3/17/2016 11:17:00 PM
12
Download