Cdl core Files 2015-2016 cdl core Files


**2NC/1NR/1NR Drone Affirmative



Download 1.69 Mb.
Page34/75
Date18.10.2016
Size1.69 Mb.
#2993
1   ...   30   31   32   33   34   35   36   37   ...   75

**2NC/1NR/1NR Drone Affirmative

2NC/1NR Drone Affirmative- “Federal Government”- Overview




  1. Extend our 1NC Black’s Law and Cambridge Dictionary evidence, the phrase, “The Federal Government should curtail its domestic surveillance”, can only refer to the federal government’s surveillance

  2. Extend our violation- drones are used for surveillance by local law enforcement not by federal law enforcement. This puts them in a solvency double bind either: a) they only curtail federal government surveillance, in which case they cannot solve their internal links or b) they curtail both, in which case they are extra topical, extra topicality is a voting issue for predictability and ground- it allows the affirmative to claim advantages based on untopical portions of the plan text

  3. Extend our reasons to prefer- by curtailing non-federal government surveillance, the affirmative broadens the scope of the topic, a limited topic is better for our education since we will have in depth discussions on a small number of affirmatives. Also, by having a non-usfg actor, the affirmative does not link to many core negative generics, which are also vital for topic education

4. Prefer a competing interpretations model when evaluating topicality it’s the only objective way to determine what the words in the resolution mean

2NC/1NR Drone Affirmative- “Federal Government”- Violation




The affirmative regulates only local law enforcement surveillance


NEW YORK TIMES 2013- “Rise of Drones in U.S. Drives Efforts to Limit Police Use” http://www.nytimes.com/2013/02/16/technology/rise-of-drones-in-us-spurs-efforts-to-limit-uses.html?pagewanted=all&_r=0

For now, drones for civilian use run on relatively small batteries and fly short distances. In principle, various sensors, including cameras, can be attached to them. But there is no consensus in law on how the data collected can be used, shared or stored.¶ State and local government authorities are trying to fill that void. As they do, they are weighing not only the demands of the police and civil libertarians but also tricky legal questions. The law offers citizens the right to take pictures on the street, for instance, just as it protects citizens from unreasonable search.¶ State legislatures have come up with measures that seek to permit certain uses, while reassuring citizens against unwanted snooping.¶ Virginia is furthest along in dealing with the issue. In early February, its state Legislature passed a two-year moratorium on the use of drones in criminal investigations, though it has yet to be reviewed by the governor. In several states, proposals would require the police to obtain a search warrant before collecting evidence with a drone.



Here’s more evidence, surveillance drones are used primarily by local law enforcement


Washington Times 2012- December 10, “Homeland Security increasingly lending drones to local police” http://www.washingtontimes.com/news/2012/dec/10/homeland-security-increasingly-loaning-drones-to-l/

Since then, the Washington Guardian has confirmed, DHS and its Customs and Border Protection agency have deployed drones — originally bought to guard America’s borders — to assist local law enforcement and other federal agencies on several occasions.¶ The practice is raising questions inside and outside government about whether federal officials may be creating an ad-hoc, loan-a-drone program without formal rules for engagement, privacy protection or taxpayer reimbursements. The drones used by CPB can cost between $15 million and $34 million each to buy, and have hourly operational costs as well.¶ In addition, DHS recently began distributing $4 million in grants to help local law enforcement buy its own, smaller versions of drones, opening a new market for politically connected drone makers as the wars overseas shrinkThe double-barreled lending and purchasing have some concerned that federal taxpayers may be subsidizing the militarization of local police forces and creating new threats to average Americans’ privacy.


**2NC/1NR/1NR Stingray Affirmative

2NC/1NR Drone Affirmative- “Federal Government”- Overview




  1. Extend our 1NC Black’s Law and Cambridge Dictionary evidence, the phrase, “The Federal Government should curtail its domestic surveillance”, can only refer to the federal government’s surveillance

  2. Extend our violation- stingrays are used for surveillance by local law enforcement not by federal law enforcement. This puts them in a solvency double bind either: a) they only curtail federal government surveillance, in which case they cannot solve their internal links or b) they curtail both, in which case they are extra topical, extra topicality is a voting issue for predictability and ground- it allows the affirmative to claim advantages based on untopical portions of the plan text

  3. Extend our reasons to prefer- by curtailing non-federal government surveillance, the affirmative broadens the scope of the topic, a limited topic is better for our education since we will have in depth discussions on a small number of affirmatives. Also, by having a non-usfg actor, the affirmative does not link to many core negative generics, which are also vital for topic education

4. Prefer a competing interpretations model when evaluating topicality it’s the only objective way to determine what the words in the resolution mean

2NC/1NR Stingray Affirmative- “Federal Government”- Violation




Stingray technology is used only by local law enforcement


Scientific American 2015 “What Is the Big Secret Surrounding Stingray Surveillance?” http://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/, June 25

Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data to aid their investigations. Standard procedure involves getting a court order to obtain phone records from a wireless carrier. When authorities cannot or do not want to go that route, they can set up a simulated cell phone tower—often called a stingray—that surreptitiously gathers information from the suspects in question as well as any other mobile device in the area.¶ These simulated cell sites—which collect international mobile subscriber identity (IMSI), location and other data from mobile phones connecting to them—have become a source of controversy for a number of reasons. National and local law enforcement agencies closely guard details about the technology’s use, with much of what is known about stingrays revealed through court documents and other paperwork made public via Freedom of Information Act (FOIA) requests.¶ One such document recently revealed that the Baltimore Police Department has used a cell site simulator 4,300 times since 2007 and signed a nondisclosure agreement with the FBI that instructed prosecutors to drop cases rather than reveal the department’s use of the stingray. Other records indicate law enforcement agencies have used the technology hundreds of times without a search warrant, instead relying on a much more generic court order known as a pen register and trap and trace order. Last year Harris Corp., the Melbourne, Fla., company that makes the majority of cell site simulators, went so far as to petition the Federal Communications Commission to block a FOIA request for user manuals for some of the company’s products.

Local law enforcement use stingray devices


ABC 7 NEWS 2014- December 3, “Investigation: Law enforcement use secret 'Stingray' devices to track cell phone signals” http://abc7.com/news/investigation-law-enforcement-use-secret-devices-to-track-cell-phone-signals/421190/

Law enforcement agencies across the U.S. and in Southern California are using a device so secret that agencies are required to sign a non-disclosure agreement before they can buy or use it.¶ The device is commonly referred to as a "Stingray," although several companies manufacture models under various brand names, including "Kingfish" and "Hailstorm."¶ "Local law enforcement can do things now that we used to relegate to the realm of spies and espionage," ABC7 intelligence expert Hal Kempfer tells Eyewitness News.¶ Stingray-type devices trick a target's cell phone into connecting to it by masquerading as the strongest cell phone tower in the area -- one phones think belongs to a phone carrier like Verizon or AT&T.¶ The tracking device pinpoints a cell phone's location down to about three yards and extracts the numbers of all incoming and outgoing calls.


Download 1.69 Mb.

Share with your friends:
1   ...   30   31   32   33   34   35   36   37   ...   75




The database is protected by copyright ©ininet.org 2024
send message

    Main page