The Glenbrooks AC
Transcript of The Glenbrooks AC
-
7/23/2019 The Glenbrooks AC
1/8
HOOVER WM
The Glenbrooks AC
We affirm
Observation 1:The government exists to protect and maximize the social welfare of the
governed. As such, the resolution should be evaluated based upon the success of the US Governments
attempts to protect its citizens.
Observation 2:States have obligations to protect its citizens, which terrorism threatens. Thus,
counter terrorism is an utmost priorit. !onathan "ooper for the #ffice for $emocratic %nstitutions and
&uman 'ights "ounter Terrorism, (rotecting &uman'ights explains, )States have an obligation to provide protectionagainst terrorism. &uman rights impose positive obligations on states to ensure the right to life. Acts
of terrorism infringe on all of the rights that are part of a state*s dut to protect.+ Thus, in this round,
prevention of terrorism must be weighed over an violation of rights as counter terrorism is a pre
reuisite for the securit which allows these rights to be realized.
http://www.osce.org/odihr/29103
http://www.osce.org/odihr/29103http://www.osce.org/odihr/29103 -
7/23/2019 The Glenbrooks AC
2/8
HOOVER WM
Contention 1: Human Trafficking
100,000 children are being used as prostitutes in the US each year. Emily Stanton for US News in 2013 explains,
the underground sex trade is very much alive in the United States - especially for minors. Human trafficking is a
$9.8 billion dollar domestic industry. Human trafficking is dehumanizing. Rutvi Andrijase for Oxford University
elaborates, Standing commonly for the essence of ones being, the soul impels an understanding of prostitution
not merely as a form of physical violence, but also as a type of violence that shatters ones very personhood and
from which there is ultimately no recovery. NSA surveillance of mobile phones can solve this dehumanizing issue
of human trafficking. Mark Latonero for the University of Souther California in 2012 warrants, mobile phones play
a central role in facilitating potential cases of domestic minor sexual trafficking. Logistical information such as
time, place, pricing, and types of services are communicated through phone calls or text messages on mobile
phones. The field of technology forensics is exploring ways to disrupt human trafficking online by using trace data
to identify perpetrators, mobile technology is already shifting the spaces from which we can collect those traces.
This is clarified -acAsill of the Guardian /012 http://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-
surveillance
,who writes
There is an account, too, of the NSA's part in disrupting a human trafficking racket based in Fuzhou, China.
It ed to t!o arrests at Ne! "ork's #F$ airport. %ne of those ifted aeged& carried detais of the smugging
routes in his pocket.
http://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillancehttp://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillancehttp://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillancehttp://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillance -
7/23/2019 The Glenbrooks AC
3/8
HOOVER WM
Contention : !nfrastructural Attacks
"ber3attacs are among the newest growing threats to the United States.
C"berattacks coul# gri#lock societ" an# kill millions
$ogatchnik, Shawn. %1&4'eporter for the Associate#$ress. )A( %nterview5 6x378% "hief on 'isof "ber Terror+. 9 !ul. Accessed 1: !ul 12. http5;;bigstor.ap.org;article;ap3interview3ex3fbi3chief3
ris3cber3terror