Last modified by Administrator on 2017/08/29 03:35

From version < 49.1 >
edited by William Berlin
on 2017/02/19 14:42
To version < 46.1 >
edited by William Berlin
on 2017/02/19 14:41
< >
Change comment: There is no comment for this version

Summary

Details

Harvard Westlake-Berliin-Neg-Berkely-Round3.docx
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.wberlin1@hwemailcom
Size
... ... @@ -1,1 +1,0 @@
1 -245.1 KB
Content
Caselist.CitesClass[10]
Cites
... ... @@ -1,21 +1,0 @@
1 -New terror regulations stop campus attacks but OSU attack prove rising risk of campus terror. Bernstein 11/29
2 -“Terror attack at Ohio State University prompts Senators to rethink 'extreme vetting,'” Leandra Bernstein, 11/29/16, KBOI2 (Associated Press).
3 -The violent attack at Ohio State University (OSU) on Monday, being investigated as an act of terror by a Somali refugee living legally in the United States, has led some in Congress to look favorably at the policies of the incoming Donald Trump administration, including the "extreme vetting" of individuals seeking entry to the country.¶ On Monday, an Ohio State student identified as Abdul Razak Ali Artan, drove his car into a group of people on the main campus in Columbus before attacking bystanders with a butcher knife. Artan was subdued by an Ohio State police officer who fatally shot him after he had injured 11 people.¶ As the event was unfolding on Monday, Trump issued a brief message of support to the students and faculty at OSU and first responders. As information about the apparently radicalized Somali-born suspect came in, it prompted many to reflect on Trump's campaign promises to strengthen the vetting of individuals coming to the country and also initiate a "total and complete shutdown of Muslims entering the United States." Prior to Trump's early campaign statement calling for an end to Muslim immigration to the United States (until U.S. representatives "can figure out what is going on"), Senator Rand Paul (R-Ky.) introduced a bill to officially pause the resettlement of refugees entering the United States from 33 terror-prone countries, including Somalia. The bill also proposed strengthening the system of background checks.¶ On Tuesday, Paul told Sinclair Broadcast Group, "I am still for putting a pause" on resettlement. He explained that the pause should relate to specific goals, including putting in place a better system to monitor individuals who come into the country as immigrants or on a U.S. visa.¶ Even though his proposal to block terrorists from taking advantage of the U.S. visa and immigration system was defeated back in December 2015, Paul now sees an opportunity to revisit the proposal under a new administration that is "more inclined" to enforce laws that prevent the abuse of immigration and visa laws.¶ "Trump talked about 'extreme vetting,' and I think there needs to be more significant vetting of those who want to come to our country," Paul insisted. "We need to get a better handle on this." Former Trump rival, Sen. Ted Cruz (R-Tex.) reacted to the the incident at Ohio State University, saying it is a reminder that the United States government "should not be letting people in this country who are security risks." Cruz noted that unlike the Obama administration, the incoming Trump administration is likely to work harder to prevent terrorists from entering the United States.¶ "I am optimistic that the new administration will put, as a far higher priority, keeping this country safe and protecting us against radical Islamic terrorism," Cruz said.¶ For Senate Homeland Security Committee chairman, Ron Johnson (R-Wis.), Trump's pledge to secure the border is even more important than implementing a stricter vetting process for refugees.¶ "I am far more concerned about Islamic terrorists potentially coming through our incredibly porous southern border" Johnson said. "Which is why I am completely supportive of President-elect Trump's commitment to secure the border."¶ With little information about the suspect in the Ohio State University attack, now is not the time prejudge the incident or make broad-reaching policy decisions, according to some lawmakers.¶ Only 24 hours after the attack, it is just too soon to jump to conclusions about the suspect, says Ohio Democrat, Sherrod Brown.¶ "These attacks are always a tragedy for our community," he stated. "I want to know more about this young man's journey to the U.S., and his background... before making a judgment," Brown added. For others, like Georgia Senator Johnny Isakson (R), now is also not the right time to be reactive or push major policy changes. Although Isakson supported previous legislative efforts to curb refugee resettlement from Syria and Iraq, he advised on Tuesday not to let one incident determine changes in existing policy. ¶ The OSU attack "certainly raises the question about Somali refugees," Isakson noted, but the overall policy towards refugees should be reexamined on "an ongoing basis," not just in response to particular events.¶ Law enforcement officials have indicated that they are still a long way from establishing Artan's motives in carrying out the Monday assault. According to media reports, prior to carrying out the attack, Artan posted an anti-American rant on Facebook, where he praised the U.S. citizen turned Islamist cleric, Anwar al-Awlaki, as a "hero," and referred to American officials' inability to stop "lone wolf attacks."¶ Law enforcement officials have not made any official findings connecting Artan to the Islamic State, but in a Tuesday internet posting, ISIS claimed the attacker was a "soldier" of the terrorist group. Earlier this month, ISIS issued instructions to its adherents abroad to carry out attacks using knives and cars. Preliminary reports indicate that Artan was born in Somalia and lived there until 2007, when he and his family resettled in Pakistan. Around 2014, the family arrived in the United States as refugees, staying in Dallas temporarily before relocating to Columbus, Ohio, a city with a sizable Somali community. Artan attended Columbus State Community College and graduated last spring before enrolling at OSU.¶ As the identity of the Ohio State attacker was revealed by state law enforcement officials, Ohio's openness to refugees, particularly of Somali origin, came under fire. Even though the states have little power to control refugee flows into their borders, many took to social media to blame Ohio Governor John Kasich, saying that the attack “is on you.” Though critical of the Obama administration's plan to accept additional Syrian refugees into the United States, Kasich has generally spoken favorably about integrating new citizens into his state. According to the Somali Association of Ohio, there are at least 38,000 Somali immigrants and refugees living in the Columbus metropolitan area, with an addition 200 immigrants expected to arrive monthly within the next four years.¶ Earlier this year, the Obama administration announced new targets for resettling refugees after settling 85,000 in FY 2016 and aiming for 110,000 in 2017. Obama's announcement followed on the heels of a heated reaction from the public and lawmakers to revelations that one of the suspects in the Nov. 2015 terrorist attacks in Paris has reportedly entered Europe as a refugee.¶ The Paris attack, which left 130 civilians dead, triggered U.S. officials to begin rethinking federal policies, it prompted changes in visa waiver laws, and a reconsideration of visa-free travel from Europe. It also led to dozens of state governors openly rejecting the resettlement of Syrian refugees in their states.¶ In a prescient testimony before the Senate Homeland Security Committee in 2015, national security analyst Peter Bergen warned that acts of violence perpetrated by homegrown extremists posted "a more immediate challenge" than the threat of foreign terrorists. He warned that the "more likely threat" to the United States came from individuals inspired by ISIS or other militant groups, and who may never even come into direct contact with these groups.¶ The threat of homegrown extremism prompted Obama's Department of Homeland Security to work on a new phase of domestic counter-terrorism efforts. In 2016, DHS stood up a number of community engagement programs, designed to work with members of at-risk communities, including American-Muslim communities, to identify and redirect potential lone wolf attackers, or individuals who could be heading down the path of radicalization.
4 -FS zones k2 prevent campus terrorist attacks – it allows law enforcement to defend and prevent better. Zeiner 05
5 -Zoned Out! Examining Campus Speech Zones, Carol L. Zeiner (Assistant Professor of Law, St. Thomas University School of Law, Miami Gardens, Florida; former College Attorney for Miami-Dade Community College (now Miami-Dade College)), Louisiana Law Review (Volume 66, No. 1), Fall 2005.
6 -Unfortunately, the possibility of terrorist acts must be¶ considered as well as more general concerns under the heading of¶ campus safety and security. As pointed out in Part II.D,27 there¶ are risks posed by international and domestic terrorist groups.278¶ Obviously, large gatherings constitute a particularly attractive¶ target for terrorists, although any site on a university campus might¶ be considered attractive by those bent on attacking the American¶ way of life. On the one hand, this would seem to suggest that¶ campus speech zones enable terrorists to know which areas of¶ campus might be likely targets and suggests that campus speech¶ zones should be eliminated so that free speech events could occur¶ spontaneously anywhere on campus, and terrorists would not have¶ time to plan an attack. However, it does not take much advance¶ planning to carry a weapons-laden knapsack into a crowd. Thus,¶ perhaps it is more important for security personnel to have the¶ benefit of advance planning. Moreover, security features could be¶ designed into the physical characteristics of designated speech¶ zones more practically than could be accomplished if large¶ gatherings for speech activities could occur anywhere on campus.¶
7 -
8 -Campus terror sends an ideological message globally – it encourages more terror and threatens education. Flanagin 15
9 -“Why terrorists target schools and universities,” Jake Flanagin, 04/02/2015, The Quartz.
10 -One reason that “terrorist organizations might choose to target educational institutions is that schools and school children act as powerful symbolic targets,” wrote Emma Bradford and Margaret A. Wilson, forensic psychologists at the University of Liverpool, in a 2013 analysis for the Journal of Police and Criminal Psychology. “Attacks on these targets evoke a strong emotional response.”¶ “Schools and other educational institutions represent ‘soft targets,’” they added. “A soft target is a relatively unguarded site where people congregate, normally in large numbers, thus offering the potential for mass casualties.” But practicalities aside, there are also specific, political and cultural reasons a terrorist cell might target a school or university. And this is where such acts diverge from the usual modes of modern terror.¶ Though bombing public transport takes months, if not years of intensive planning, it is intended to make the act appear random—anyone could become a victim by passing through at the wrong time. The terrifying power of this particular terror tactic is, after all, its unpredictability. An ideological message is usually announced in the aftermath.¶ Attacking schools, however, is predictable because the act is the message. Terrorists who attack schools intend to deplete the number of institutions disseminating philosophies ostensibly contradictory to their worldview; “Boko Haram,” roughly translated from the Hausa language means “Western education is forbidden.”¶ “They’re attacking what they see as the institutions of culture, and in particular the institutions of Western culture,” Ebrahim Moosa, professor of Islamic studies at the University of Notre Dame, told The Christian Science Monitor following the attacks in Peshawar. “They see that the process of Westernization begins at school, so schools that violate strict Islamic education become targets.”¶ It’s not difficult to see why Garissa was targeted. Kenyan schools consistently rank toward the best in the region, and the overall Kenyan population demonstrates one of the highest literacy rates on the continent. It is also a highly diverse place, with regards to religion and ethnicity, not unlike many African countries occupying the borderlands between Muslim-dominated North Africa and the Christian-dominated south. Consequently, Kenyan schools and universities are well-positioned for the maximal exchange of cultures, politics, and ideas—a concept that stands in direct opposition to the rigid ideologies of groups like al-Shabab.¶ Al-Shabab has a history of interfering in local education. In areas of Somalia under the group’s control, once co-ed schools have been gender segregated, with the majority of girls being intimidated against enrolling, if not forcibly removed from schools all together. Whole classes of boys have been pulled out of schools and conscripted into its ranks.¶ In an audio message released following the attack at Garissa, Ali Mohamoud Raghe, a spokesperson for al-Shabab, said, “the university had been targeted because it was educating many Christian students in ‘a Muslim land under colony,’” according to The New York Times, “a reference to the large ethnic Somali population in a part of Kenya that Somalia once tried to claim. He called the university part of Kenya’s ‘plan to spread their Christianity and infidelity.’” Which makes al-Shabab’s objective crystal-clear, and all too familiar: to wipe out a generation of ideological non-adherents.
11 -
12 -Turns and outweighs case: terrorism reinscribes neoliberalism and militarism into education due to fear and backlash. Di Leo et al 14
13 -This excerpt from the chapter titled, "Twelve Theses on Education's Future in the Age of Neoliberalism and Terrorism," is taken from the book, Neoliberalism, Education, Terrorism: Contemporary Dialogues, by Jeffrey R. Di Leo, Henry A. Giroux, Kenneth J. Saltman and Sophia A. McClennen
14 -1. Neoliberalism is one of the greatest threats to the future of progressive education in the United States.¶ The goal of neoliberal education policies is not to improve education, but rather to increase the profits of private corporations. Profit-driven models for education directly contrast the goals of progressive educators. The goal of progressive education is to educate students to be productive participants in democratic culture and to engage actively in critical citizenship. Such goals are not supported by neoliberal educational policy mainstays such as teaching to the test and standardized testing. Because neoliberal education policy tends to be data-driven it works against the development of a student's ability to think critically, thereby undermining the formative culture and values necessary for a democratic society. As long as the United States continues to view educational policy and practice through the lens of market-based values, there is little hope that progressive education, with its aim of educating students for critical citizenship and social and economic justice, will survive.¶ 2. The war on terror and the discourse on terrorism have intensified the militarization of education.¶ The military–industrial complex should not be the driving force of education in the United States. However, the reaction to the tragic attacks of September 11, 2001, has become yet another excuse to allow the military-academic complex to drive United States educational policies, practices, and funding. Not only has funding been diverted from public education to support the war on terror, but there has also been a push to understand America and the world in a way that supports American imperial ambitions. The militarization of education encourages the rationalization of state-sanctioned violence as a social and political value and supports educational practices that validate this violence. The celebration of war as a sign of power and knowledge by the military-industrial complex obliterates the democratic values of equality, public debate of political problems, and respect for diversity. The militarized society eschews reasoned political resolutions to public problems in favor of eradication of the designated enemy/other. Hence, the war on terror is a war on democracy, difference, and thinking. Critical citizenship and democratic culture as the major goals of education cannot survive in a culture dominated by extreme fear and a war waged against an emotion, namely, terror.
15 -False claims of responsibility cause cyber terrorism to escalate into nuclear war. Fritz 09.
16 -Jason Fritz, (Bond University IR Masters) , “Hacking Nuclear Command and Control”, July 2009http://www.icnnd.org/latest/research/Jason_Fritz_Hacking_NC2.pdf//
17 -This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within established cyber terrorists’ capabilities, strategies, and tactics. If access to command and control centres is obtained, terrorists could fake or actually cause one nuclear-armed state to attack another, thus provoking a nuclear response from another nuclear power. This may be an easier alternative for terrorist groups than building or acquiring a nuclear weapon or dirty bomb themselves. This would also act as a force equaliser, and provide terrorists with the asymmetric benefits of high speed, removal of geographical distance, and a relatively low cost. Continuing difficulties in developing computer tracking technologies which could trace the identity of intruders, and difficulties in establishing an internationally agreed upon legal framework to guide responses to computer network operations, point towards an inherent weakness in using computer networks to manage nuclear weaponry. This is particularly relevant to reducing the hair trigger posture of existing nuclear arsenals. All computers which are connected to the internet are susceptible to infiltration and remote control. Computers which operate on a closed network may also be compromised by various hacker methods, such as privilege escalation, roaming notebooks, wireless access points, embedded exploits in software and hardware, and maintenance entry points. For example, e-mail spoofing targeted at individuals who have access to a closed network, could lead to the installation of a virus on an open network. This virus could then be carelessly transported on removable data storage between the open and closed network. Information found on the internet may also reveal how to access these closed networks directly. Efforts by militaries to place increasing reliance on computer networks, including experimental technology such as autonomous systems, and their desire to have multiple launch options, such as nuclear triad capability, enables multiple entry points for terrorists. For example, if a terrestrial command centre is impenetrable, perhaps isolating one nuclear armed submarine would prove an easier task. There is evidence to suggest multiple attempts have been made by hackers to compromise the extremely low radio frequency once used by the US Navy to send nuclear launch approval to submerged submarines. Additionally, the alleged Soviet system known as Perimetr was designed to automatically launch nuclear weapons if it was unable to establish communications with Soviet leadership. This was intended as a retaliatory response in the event that nuclear weapons had decapitated Soviet leadership; however it did not account for the possibility of cyber terrorists blocking communications through computer network operations in an attempt to engage the system. Should a warhead be launched, damage could be further enhanced through additional computer network operations. By using proxies, multi-layered attacks could be engineered. Terrorists could remotely commandeer computers in China and use them to launch a US nuclear attack against Russia. Thus Russia would believe it was under attack from the US and the US would believe China was responsible. Further, emergency response communications could be disrupted, transportation could be shut down, and disinformation, such as misdirection, could be planted, thereby hindering the disaster relief effort and maximizing destruction. Disruptions in communication and the use of disinformation could also be used to provoke uninformed responses. For example, a nuclear strike between India and Pakistan could be coordinated with Distributed Denial of Service attacks against key networks, so they would have further difficulty in identifying what happened and be forced to respond quickly. Terrorists could also knock out communications between these states so they cannot discuss the situation. Alternatively, amidst the confusion of a traditional large-scale terrorist attack, claims of responsibility and declarations of war could be falsified in an attempt to instigate a hasty military response. These false claims could be posted directly on Presidential, military, and government websites. E-mails could also be sent to the media and foreign governments using the IP addresses and e-mail accounts of government officials. A sophisticated and all encompassing combination of traditional terrorism and cyber terrorism could be enough to launch nuclear weapons on its own, without the need for compromising command and control centres directly.
18 -
19 -Cyber terrorism would destroy the economy, cause food shortages, and extinction. Guterl 12.
20 -Guterl, (executive editor) – Scientific American, 11/28/’12.
21 -(Fred, “Armageddon 2.0,” Bulletin of the Atomic Scientists) The world lived for half a century with the constant specter of nuclear war and its potentially devastating consequences. The end of the Cold War took the potency out of this Armageddon scenario, yet the existential dangers have only multiplied. Today the technologies that pose some of the biggest problems are not so much military as commercial. They come from biology, energy production, and the information sciences ~-~- and are the very technologies that have fueled our prodigious growth as a species. They are far more seductive than nuclear weapons, and more difficult to extricate ourselves from. The technologies we worry about today form the basis of our global civilization and are essential to our survival. The mistake many of us make about the darker aspects of our high-tech civilization is in thinking that we have plenty of time to address them. We may, if we're lucky. But it's more likely that we have less time than we think. There may be a limited window of opportunity for preventing catastrophes such as pandemics, runaway climate change, and cyber attacks on national power grids. Emerging diseases. The influenza pandemic of 2009 is a case in point. Because of rising prosperity and travel, the world has grown more conducive to a destructive flu virus in recent years, many public health officials believe. Most people probably remember 2009 as a time when health officials overreacted. But in truth, the 2009 virus came from nowhere, and by the time it reached the radar screens of health officials, it was already well on its way to spreading far and wide. "H1N1 caught us all with our pants down," says flu expert Robert G. Webster of St. Jude Children's Research Hospital in Memphis, Tennessee. Before it became apparent that the virus was a mild one, health officials must have felt as if they were staring into the abyss. If the virus had been as deadly as, say, the 1918 flu virus or some more recent strains of bird flu, the result would have rivaled what the planners of the 1950s expected from a nuclear war. It would have been a "total disaster," Webster says. "You wouldn't get the gasoline for your car, you wouldn't get the electricity for your power, you wouldn't get the medicines you need. Society as we know it would fall apart." Climate change. Climate is another potentially urgent risk. It's easy to think about greenhouse gases as a long-term problem, but the current rate of change in the Arctic has alarmed more and more scientists in recent years. Tim Lenton, a climate scientist at the University of Exeter in England, has looked at climate from the standpoint of tipping points ~-~- sudden changes that are not reflected in current climate models. We may already have reached a tipping point ~-~- a transition to a new state in which the Arctic is ice-free during the summer months. Perhaps the most alarming of Lenton's tipping points is the Indian summer monsoon. Smoke from household fires, and soot from automobiles and buses in crowded cities, rises into the atmosphere and drifts out over the Indian Ocean, changing the atmospheric dynamics upon which the monsoon depends ~-~- keeping much of the sun's energy from reaching the surface, and lessening the power of storms. At the same time, the buildup of greenhouse gases ~-~- emitted mainly from developed countries in the northern hemisphere ~-~- has a very different effect on the Indian summer monsoon: It makes it stronger. These two opposite influences make the fate of the monsoon difficult to predict and subject to instability. A small influence ~-~- a bit more carbon dioxide in the atmosphere, and a bit more brown haze ~-~- could have an outsize effect. The Indian monsoon, Lenton believes, could be teetering on a knife's edge, ready to change abruptly in ways that are hard to predict. What happens then? More than a billion people depend on the monsoon's rains. Other tipping points may be in play, says Lenton. The West African monsoon is potentially near a tipping point. So are Greenland's glaciers, which hold enough water to raise sea levels by more than 20 feet; and the West Antarctic Ice Sheet, which has enough ice to raise sea levels by at least 10 feet. Regional tipping points could hasten the ill effects of climate change more quickly than currently projected by the Intergovernmental Panel on Climate Change. Computer hacking. The computer industry has already made it possible for computers to handle a variety of tasks without human intervention. Autonomous computers, using techniques formerly known as artificial intelligence, have begun to exert control in virtually every sphere of our lives. Cars, for instance, can now take action to avoid collisions. To do this, a car has to make decisions: When does it take control? How much braking power should be applied, and to which wheels? And when should the car allow its reflex-challenged driver to regain control? Cars that drive themselves, currently being field tested, could hit dealer showrooms in a few years. Autonomous computers can make our lives easier and safer, but they can also make them more dangerous. A case in point is Stuxnet, the computer worm designed by the US and Israel to attack Iran's nuclear fuel program. It is a watershed in the brief history of malware ~-~- the Jason Bourne of computer code, designed for maximum autonomy and effectiveness. Stuxnet's creators gave their program the best training possible: they stocked it with detailed technical knowledge that would come in handy for whatever situation Stuxnet could conceivably encounter. Although the software included rendezvous procedures and communication codes for reporting back to headquarters, Stuxnet was built to survive and carry out its mission even if it found itself cut off. The uranium centrifuges that Stuxnet attacked are very similar in principle to the generators that power the US electrical grid. Both are monitored and controlled by programmable-logic computer chips. Stuxnet cleverly caused the uranium centrifuges to throw themselves off-balance, inflicting enough damage to set the Iranian nuclear industry back by 18 months or more. A similar piece of malware installed on the computers that control the generators at the base of the Grand Coulee Dam would likewise cause them to shake, rattle, and roll ~-~- and eventually explode. If Stuxnet-like malware were to insinuate itself into a few hundred power generators in the United States and attack them all at once, the damage would be enough to cause blackouts on the East and West Coasts. With such widespread destruction, it could take many months to restore power to the grid. It seems incredible that this should be so, but the worldwide capacity to manufacture generator parts is limited. Generators generally last 30 years, sometimes 50, so normally there's little need for replacements. The main demand for generators is in China, India, and other parts of rapidly developing Asia. That's where the manufacturers are ~-~- not in the United States. Even if the United States, in crisis mode, put full diplomatic pressure on supplier nations ~-~- or launched a military invasion to take over manufacturing facilities ~-~- the capacity to ramp up production would be severely limited. Worldwide production currently amounts to only a few hundred generators per year. The consequences of going without power for months, across a large swath of the United States, would be devastating. Backup electrical generators in hospitals and other vulnerable facilities would have to rely on fuel that would be in high demand. Diabetics would go without their insulin; heart attack victims would not have their defibrillators; and sick people would have no place to go. Businesses would run out of inventory and extra capacity. Grocery stores would run out of food, and deliveries of all sorts would virtually cease (no gasoline for trucks and airplanes, trains would be down). As we saw with the blackouts caused by Hurricane Sandy, gas stations couldn't pump gas from their tanks, and fuel-carrying trucks wouldn't be able to fill up at refueling stations. Without power, the economy would virtually cease, and if power failed over a large enough portion of the country, simply trucking in supplies from elsewhere would not be adequate to cover the needs of hundreds of millions of people. People would start to die by the thousands, then by the tens of thousands, and eventually the millions. The loss of the power grid would put nuclear plants on backup, but how many of those systems would fail, causing meltdowns, as we saw at Fukushima? The loss in human life would quickly reach, and perhaps exceed, After eight to 10 days, about 72 percent of all economic activity, as measured by GDP, would shut down,
EntryDate
... ... @@ -1,1 +1,0 @@
1 -2017-02-19 14:42:00.0
Judge
... ... @@ -1,1 +1,0 @@
1 -Robey Holland
Opponent
... ... @@ -1,1 +1,0 @@
1 -West GG
ParentRound
... ... @@ -1,1 +1,0 @@
1 -8
Round
... ... @@ -1,1 +1,0 @@
1 -3
Team
... ... @@ -1,1 +1,0 @@
1 -Harvard Westlake Berliin Neg
Title
... ... @@ -1,1 +1,0 @@
1 -JanFeb - DA - FSZ Terror
Tournament
... ... @@ -1,1 +1,0 @@
1 -Berkely
Caselist.RoundClass[8]
EntryDate
... ... @@ -1,1 +1,1 @@
1 -2017-02-19 14:41:58.0
1 +2017-02-19 14:41:58.806
OpenSource
... ... @@ -1,1 +1,0 @@
1 -https://hsld.debatecoaches.org/download/Harvard+Westlake/Berliin+Neg/Harvard%20Westlake-Berliin-Neg-Berkely-Round3.docx

Schools

Aberdeen Central (SD)
Acton-Boxborough (MA)
Albany (CA)
Albuquerque Academy (NM)
Alief Taylor (TX)
American Heritage Boca Delray (FL)
American Heritage Plantation (FL)
Anderson (TX)
Annie Wright (WA)
Apple Valley (MN)
Appleton East (WI)
Arbor View (NV)
Arcadia (CA)
Archbishop Mitty (CA)
Ardrey Kell (NC)
Ashland (OR)
Athens (TX)
Bainbridge (WA)
Bakersfield (CA)
Barbers Hill (TX)
Barrington (IL)
BASIS Mesa (AZ)
BASIS Scottsdale (AZ)
BASIS Silicon (CA)
Beckman (CA)
Bellarmine (CA)
Benjamin Franklin (LA)
Benjamin N Cardozo (NY)
Bentonville (AR)
Bergen County (NJ)
Bettendorf (IA)
Bingham (UT)
Blue Valley Southwest (KS)
Brentwood (CA)
Brentwood Middle (CA)
Bridgewater-Raritan (NJ)
Bronx Science (NY)
Brophy College Prep (AZ)
Brown (KY)
Byram Hills (NY)
Byron Nelson (TX)
Cabot (AR)
Calhoun Homeschool (TX)
Cambridge Rindge (MA)
Canyon Crest (CA)
Canyon Springs (NV)
Cape Fear Academy (NC)
Carmel Valley Independent (CA)
Carpe Diem (NJ)
Cedar Park (TX)
Cedar Ridge (TX)
Centennial (ID)
Centennial (TX)
Center For Talented Youth (MD)
Cerritos (CA)
Chaminade (CA)
Chandler (AZ)
Chandler Prep (AZ)
Chaparral (AZ)
Charles E Smith (MD)
Cherokee (OK)
Christ Episcopal (LA)
Christopher Columbus (FL)
Cinco Ranch (TX)
Citrus Valley (CA)
Claremont (CA)
Clark (NV)
Clark (TX)
Clear Brook (TX)
Clements (TX)
Clovis North (CA)
College Prep (CA)
Collegiate (NY)
Colleyville Heritage (TX)
Concord Carlisle (MA)
Concordia Lutheran (TX)
Connally (TX)
Coral Glades (FL)
Coral Science (NV)
Coral Springs (FL)
Coppell (TX)
Copper Hills (UT)
Corona Del Sol (AZ)
Crandall (TX)
Crossroads (CA)
Cupertino (CA)
Cy-Fair (TX)
Cypress Bay (FL)
Cypress Falls (TX)
Cypress Lakes (TX)
Cypress Ridge (TX)
Cypress Springs (TX)
Cypress Woods (TX)
Dallastown (PA)
Davis (CA)
Delbarton (NJ)
Derby (KS)
Des Moines Roosevelt (IA)
Desert Vista (AZ)
Diamond Bar (CA)
Dobson (AZ)
Dougherty Valley (CA)
Dowling Catholic (IA)
Dripping Springs (TX)
Dulles (TX)
duPont Manual (KY)
Dwyer (FL)
Eagle (ID)
Eastside Catholic (WA)
Edgemont (NY)
Edina (MN)
Edmond North (OK)
Edmond Santa Fe (OK)
El Cerrito (CA)
Elkins (TX)
Enloe (NC)
Episcopal (TX)
Evanston (IL)
Evergreen Valley (CA)
Ferris (TX)
Flintridge Sacred Heart (CA)
Flower Mound (TX)
Fordham Prep (NY)
Fort Lauderdale (FL)
Fort Walton Beach (FL)
Freehold Township (NJ)
Fremont (NE)
Frontier (MO)
Gabrielino (CA)
Garland (TX)
George Ranch (TX)
Georgetown Day (DC)
Gig Harbor (WA)
Gilmour (OH)
Glenbrook South (IL)
Gonzaga Prep (WA)
Grand Junction (CO)
Grapevine (TX)
Green Valley (NV)
Greenhill (TX)
Guyer (TX)
Hamilton (AZ)
Hamilton (MT)
Harker (CA)
Harmony (TX)
Harrison (NY)
Harvard Westlake (CA)
Hawken (OH)
Head Royce (CA)
Hebron (TX)
Heights (MD)
Hendrick Hudson (NY)
Henry Grady (GA)
Highland (UT)
Highland (ID)
Hockaday (TX)
Holy Cross (LA)
Homewood Flossmoor (IL)
Hopkins (MN)
Houston Homeschool (TX)
Hunter College (NY)
Hutchinson (KS)
Immaculate Heart (CA)
Independent (All)
Interlake (WA)
Isidore Newman (LA)
Jack C Hays (TX)
James Bowie (TX)
Jefferson City (MO)
Jersey Village (TX)
John Marshall (CA)
Juan Diego (UT)
Jupiter (FL)
Kapaun Mount Carmel (KS)
Kamiak (WA)
Katy Taylor (TX)
Keller (TX)
Kempner (TX)
Kent Denver (CO)
King (FL)
Kingwood (TX)
Kinkaid (TX)
Klein (TX)
Klein Oak (TX)
Kudos College (CA)
La Canada (CA)
La Costa Canyon (CA)
La Jolla (CA)
La Reina (CA)
Lafayette (MO)
Lake Highland (FL)
Lake Travis (TX)
Lakeville North (MN)
Lakeville South (MN)
Lamar (TX)
LAMP (AL)
Law Magnet (TX)
Langham Creek (TX)
Lansing (KS)
LaSalle College (PA)
Lawrence Free State (KS)
Layton (UT)
Leland (CA)
Leucadia Independent (CA)
Lexington (MA)
Liberty Christian (TX)
Lincoln (OR)
Lincoln (NE)
Lincoln East (NE)
Lindale (TX)
Livingston (NJ)
Logan (UT)
Lone Peak (UT)
Los Altos (CA)
Los Osos (CA)
Lovejoy (TX)
Loyola (CA)
Loyola Blakefield (MA)
Lynbrook (CA)
Maeser Prep (UT)
Mannford (OK)
Marcus (TX)
Marlborough (CA)
McClintock (AZ)
McDowell (PA)
McNeil (TX)
Meadows (NV)
Memorial (TX)
Millard North (NE)
Millard South (NE)
Millard West (NE)
Millburn (NJ)
Milpitas (CA)
Miramonte (CA)
Mission San Jose (CA)
Monsignor Kelly (TX)
Monta Vista (CA)
Montclair Kimberley (NJ)
Montgomery (TX)
Monticello (NY)
Montville Township (NJ)
Morris Hills (NJ)
Mountain Brook (AL)
Mountain Pointe (AZ)
Mountain View (CA)
Mountain View (AZ)
Murphy Middle (TX)
NCSSM (NC)
New Orleans Jesuit (LA)
New Trier (IL)
Newark Science (NJ)
Newburgh Free Academy (NY)
Newport (WA)
North Allegheny (PA)
North Crowley (TX)
North Hollywood (CA)
Northland Christian (TX)
Northwood (CA)
Notre Dame (CA)
Nueva (CA)
Oak Hall (FL)
Oakwood (CA)
Okoboji (IA)
Oxbridge (FL)
Oxford (CA)
Pacific Ridge (CA)
Palm Beach Gardens (FL)
Palo Alto Independent (CA)
Palos Verdes Peninsula (CA)
Park Crossing (AL)
Peak to Peak (CO)
Pembroke Pines (FL)
Pennsbury (PA)
Phillips Academy Andover (MA)
Phoenix Country Day (AZ)
Pine Crest (FL)
Pingry (NJ)
Pittsburgh Central Catholic (PA)
Plano East (TX)
Polytechnic (CA)
Presentation (CA)
Princeton (NJ)
Prosper (TX)
Quarry Lane (CA)
Raisbeck-Aviation (WA)
Rancho Bernardo (CA)
Randolph (NJ)
Reagan (TX)
Richardson (TX)
Ridge (NJ)
Ridge Point (TX)
Riverside (SC)
Robert Vela (TX)
Rosemount (MN)
Roseville (MN)
Round Rock (TX)
Rowland Hall (UT)
Royse City (TX)
Ruston (LA)
Sacred Heart (MA)
Sacred Heart (MS)
Sage Hill (CA)
Sage Ridge (NV)
Salado (TX)
Salpointe Catholic (AZ)
Sammamish (WA)
San Dieguito (CA)
San Marino (CA)
SandHoke (NC)
Santa Monica (CA)
Sarasota (FL)
Saratoga (CA)
Scarsdale (NY)
Servite (CA)
Seven Lakes (TX)
Shawnee Mission East (KS)
Shawnee Mission Northwest (KS)
Shawnee Mission South (KS)
Shawnee Mission West (KS)
Sky View (UT)
Skyline (UT)
Smithson Valley (TX)
Southlake Carroll (TX)
Sprague (OR)
St Agnes (TX)
St Andrews (MS)
St Francis (CA)
St James (AL)
St Johns (TX)
St Louis Park (MN)
St Margarets (CA)
St Marys Hall (TX)
St Thomas (MN)
St Thomas (TX)
Stephen F Austin (TX)
Stoneman Douglas (FL)
Stony Point (TX)
Strake Jesuit (TX)
Stratford (TX)
Stratford Independent (CA)
Stuyvesant (NY)
Success Academy (NY)
Sunnyslope (AZ)
Sunset (OR)
Syosset (NY)
Tahoma (WA)
Talley (AZ)
Texas Academy of Math and Science (TX)
Thomas Jefferson (VA)
Thompkins (TX)
Timber Creek (FL)
Timothy Christian (NJ)
Tom C Clark (TX)
Tompkins (TX)
Torrey Pines (CA)
Travis (TX)
Trinity (KY)
Trinity Prep (FL)
Trinity Valley (TX)
Truman (PA)
Turlock (CA)
Union (OK)
Unionville (PA)
University High (CA)
University School (OH)
University (FL)
Upper Arlington (OH)
Upper Dublin (PA)
Valley (IA)
Valor Christian (CO)
Vashon (WA)
Ventura (CA)
Veritas Prep (AZ)
Vestavia Hills (AL)
Vincentian (PA)
Walla Walla (WA)
Walt Whitman (MD)
Warren (TX)
Wenatchee (WA)
West (UT)
West Ranch (CA)
Westford (MA)
Westlake (TX)
Westview (OR)
Westwood (TX)
Whitefish Bay (WI)
Whitney (CA)
Wilson (DC)
Winston Churchill (TX)
Winter Springs (FL)
Woodlands (TX)
Woodlands College Park (TX)
Wren (SC)
Yucca Valley (CA)