Authors
Joshua Alvarez
News Type
News
Date
Paragraphs

What is it about terrorism that makes it so difficult to study and counteract through U.S. government policy? That’s the central question CISAC Senior Fellow Martha Crenshaw hopes to answer in an upcoming book she is co-authoring with Gary LaFree, Director of the National Center for the Study of Terrorism and Responses to Terrorism (START), where Crenshaw serves as lead investigator. at the University of Maryland. 

The idea for the book stems from Crenshaw’s long career in grappling with terrorism and observing how governments struggle to combat it. She has been writing and thinking about terrorism since the 1970s and is currently conducting a multi-year project mapping the evolution of violent extremist groups. However, the difficulties inherent in the topic have not much changed for academics and policymakers.

The problems start with defining terrorism, something that has bedeviled both researchers and policymakers for decades, Crenshaw told a Stanford audience in CISAC. 

“We are still arguing about what terrorism means. But even if you agree on a definition, then applying it to the real world remains difficult,” she said.

Beyond semantics, the study of terrorism faces a series of hurdles inherent to the topic. An overarching social theory of the causes of terrorism remains elusive, and there is no agreement on whether terrorism actually works. 

Additionally, academics have used many different levels of analyses–individual, organizational, cultural, economic, and others–but have yet to agree on which analyses bear more fruit.

Despite what you might gather from what’s said in the media, terrorism events are actually very rare. Terrorist attacks that kill large amounts of people are even more rare. “9/11 was a black swan, a highly consequential event but only a one-of-a-kind. We show why it’s the case that terrorism is very rare and therefore makes it very hard to predict any kind of trends,” Crenshaw said.

Most of the information available is about attacks that actually happened. But there are many more plots, about ten times more, than actual attacks. Crenshaw said she and her research assistants have used news media and government documents to identify failed and foiled plots against the United States, European Union, and NATO countries plus Australia and New Zealand. The plots have been coded in a dataset that she will analyze.  

There are additional obstacles in the way of researchers and policymakers. 

Attributing responsibility for attacks is difficult, which hampers research and government responses. “How do you know who to respond against? The concept of terrorism is mixed in with insurgency. It’s hard to think of a policy that targets one but not the other,” Crenshaw said. Terrorist organizations are very small and the boundaries between groups are extremely porous. Yet, there is not a preponderance of lone wolves.

Sometimes, the U.S. government obstructs research. Crenshaw lamented the over-classification of government documents, and drew particular attention to the designation “For Official Use Only”, which is not a classification but a designation that seems to depend on the agency using it. 

“If you are analyzing illegal forms of violence there are three sources of information: governments, victims, and terrorists. Victims are difficult to find. Self-reporting is even harder and usually unfeasible. And governments are very secretive. We would like to see more transparency and openness on their part,” she said.

“I think what is being done here is really important when it comes to the question of why it’s so hard to find policy solutions for terrorism,” said Betsy Cooper, a Law and International Security Postdoctoral Fellow at CISAC, who offered commentary on the book draft to the seminar. “A lot of what is in the chapter about the state of counter-terrorism research is very important.” 

“I learned a lot especially about the automation in the global terrorism database and it poses some interesting questions. Is something terrorism because we say it is or can we use objective criteria regardless of whether you see it as something else?” 

Hero Image
All News button
1
Paragraphs

Speech excerpt:

The conference is designed to illustrate the scope and variety of the security challenges we face and I commend both the organizers and the presenters. I have learned much and am confident you have as well. Others have addressed specific challenges; my assignment is to provide a big picture perspective that will provide context and a framework for understanding the nature of the world we live in and the types of challenges we face.

Toward that end, I will organize my remarks around three interrelated questions:

Why do we characterize the world and our present era as turbulent?

Why do we consider the security challenges we face to be different, and perhaps more dangerous, than those confronted by previous generations of Americans?

And finally, which of the many perceived and proclaimed security challenges are most important, and what should we do about them?

Each of these questions warrants an entire lecture—or conference—but you don’t have that much time so I hope you will allow me to discuss them in highly abbreviated fashion. We can dig deeper in the question and answer period if you wish [...]

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Annual IAS Symposium
Authors
Thomas Fingar
Thomas Fingar
Paragraphs

Much has happened in the three years since the FAA Modernization and Reform Act of 2012 (FMRA) was signed into law. Under the FMRA, the FAA was directed to “develop and implement operational and certification requirements for the operation of public unmanned aircraft systems in the national airspace system” by the end of 2015. In addition, the FAA was directed to “provide for the safe integration of civil unmanned aircraft systems into the national airspace system as soon as practicable, but not later than” the end of September 2015. CISAC affiliate  John Villasenor gives testimony before the Senate Committee on Commerce, Science, and Transportation Subcommittee on Aviation Operations, Safety, and Security about key considerations of safety, innovation, economic impact and privacy when it comes to drones.

All Publications button
1
Publication Type
Testimonies
Publication Date
Journal Publisher
Governance Studies at Brookings
Authors
John Villasenor
John Villasenor
News Type
News
Date
Paragraphs

 

In this talk sponsored by the Stanford Institute for Economic Policy Research, three CISAC scholars discuss the Islamic State, Iran and the Taliban and the threats they impose to American security. The talk is moderated by Brad Kapnick, a Partner at Katten & Temple, LLP, and SIEPR Advisory Board member. Joining him are Martha Crenshaw, a senior fellow at CISAC and the Freeman Spogli Institute for International Studies and professor, by courtesy, of political science; CISAC Senior Fellow Scott Sagan, the Caroline S.G. Munro Professor of Political Science; former U.S. Ambassador to Afghanistan Karl Eikenberry, the William J. Perry Fellow at CISAC and a consulting professor at the Freeman Spogli Institute.

This is an abbreviated version of the talk below. The full talk can be found here.

 

 

Hero Image
All News button
1
Authors
News Type
News
Date
Paragraphs
 

Former U.S. Sen. Mark Udall gained notoriety for his vocal opposition to National Security Agency surveillance programs in the wake of the Edward Snowden disclosures of June 2013.

Before losing his seat in the mid-term elections last year, the senior senator from Colorado had become one of the staunchest critics of the U.S. spy agency for conducting massive, warrantless data grabs on millions of Americans without their knowledge.

Even before the Snowden leaks, Udall had warned on the Senate floor in 2011 that the Patriot Act was being interpreted in a way to allow domestic surveillance activities that many members of Congress and the American public do not understand.

"Americans would be alarmed if they knew how this law is being carried out," he told fellow senators before he introduced amendments to the Patriot Act that would have secured tougher privacy mechanisms. The act was renewed without the amendments.

Udall – who served on the Senate's Intelligence and Armed Services committees – will be in conversation with Center for International Security and Cooperation Co-Director Amy Zegart Thursday, April 2, at 7:30 p.m. in CEMEX Auditorium as part of Stanford's Security Conundrum lecture series. The event is open to the public but an RSVP is required by 5 p.m. April 1.

The special series has brought together nationally prominent experts this academic year to explore the critical issues raised by the NSA's activities, including their impact on security, privacy and civil liberties. The series ends April 10 with a public conversation with Judge Reggie Barnett Walton, former presiding judge of the Foreign Intelligence Surveillance Court, known as the FISA court.

The Foreign Intelligence Surveillance Act of 1978 empowered the FISA court to oversee government requests for surveillance of foreign intelligence agencies. During its existence, the court has granted more than 30,000 warrants; it has denied only 11.

Walton, in conversation with Stanford Law School Professor Jenny Martinez, will explain the role that the secretive institution attempts to play in maintaining the balance between civil liberties and national security.

"We're delighted to end the Security Conundrum series with a view from Congress and the courts," said Zegart, who is also a senior fellow at the Hoover Institution. "Holding serious campus-wide conversations about issues of national importance is an essential part of the Stanford experience."

Zegart said CISAC and Hoover would conduct a similar series on international cybersecurity challenges in the coming academic year.

Udall, the third speaker in the series, also advocated for the declassification of the Senate Intelligence Committee's study on the CIA's enhanced interrogation program. The post-9/11 program allowed the government to ship suspected terrorists to secret overseas prisons and subject them to waterboarding and other torture techniques.

Gen. Michael Hayden, the former director of the NSA and CIA who has defended the government surveillance programs, kicked off the Security Conundrum series in October. In that talk, he said the metadata collection "is something we would never have done on Sept. 9 or Sept. 10. But it seemed reasonable after Sept. 11. No one is doing this out of prurient interests. No – it as a logical response to the needs of the moment."

The second speaker in the series, journalist Barton Gellman, gave a detailed account of his relationship with former NSA contractor Snowden and how he worked with him to reveal the details of the NSA's global and domestic surveillance programs.

One of the first Snowden revelations, Gellman said, was the top-secret PRISM surveillance program, in which the NSA tapped into the servers of nine large U.S. Internet companies, including Google, Microsoft, Yahoo and Facebook. Snowden said he believed the extent of mass data collection on American citizens was far greater than what the public knew.

The PRISM program allows the U.S. intelligence community to gain access from the tech companies to a wide range of digital information, including audio, video chats, photographs, emails and stored data, that enables analysts to track foreign targets. The program does not require individual warrants, but instead operates under the broad authorization of the FISA court.

"I asked him very bluntly, 'Why are you doing this?'" Gellman said of Snowden.

"He gave me very persuasive and consistent answers about his motives. Whatever you think of what he did or whether or not I should have published these stories, I would claim to you that all the evidence supports his claim that he had come across a dangerous accumulation of state power that the people needed to know about."

 
Hero Image
All News button
1
Paragraphs

On Tuesday March 3, 2015, the Subcommittee on Oversight and Investigations held a hearing entitled, “Understanding the Cyber Threat and Implications for the 21st Century Economy.” This was the first in a series of hearings focused on cyberspace, the Internet, and the challenges and opportunities that they present. Cyberspace has become the backbone and engine of the 21st century economy, and recent high-profile information security breaches have raised awareness of the vulnerabilities and risks facing cyberspace. With this hearing series, the subcommittee seeks to expand the discussion surrounding these issues to examine the broader implications for businesses and consumers in today’s 21st century economy. This initial hearing will provide an overview of the issue, focusing on the history, evolution, and future of cybersecurity.

The witnesses included Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Senior Fellow at the Hoover Institution, Stanford University; Richard Bejtlich, Chief Security Strategist, FireEye, Incorporated; and Gregory Shannon, Chief Scientist, CERT Program, the Software Engineering Institute, Carnegie Mellon University. III.

Lin's testimony begins at 21:00.

All Publications button
1
Publication Type
Testimonies
Publication Date
Authors
Herbert Lin
Paragraphs

In the past years, different forms of non-democratic rule have expanded, associated with revamped attempts at controlling the media. New mechanisms, including legislative, commercial and technological tools have been used to contain, co-opt and silence critical voices. At the same time, bottom-up pursuits of pushing the boundaries of the permissible and redefining the space for creative critical discourse have intensified, with outspoken journalists and netizens creating new platforms to bypass complex political restrictions. This panel presents a unique discussion on how this cat and mouse game works across non-democratic contexts: in Russia, China, and Turkey. These cases present different degrees of separation from democracy, with China being the furthest, categorized as a full authoritarian regime, Turkey being in between an illiberal democracy and competitive authoritarianism, and Russia positioned in the middle of China and Turkey. Beyond illuminating the specific dynamics of each case, the panel will engage in drawing the parallels and distinctions in control and resistance mechanisms across the three cases. It will further explore and reflect on the recent tendencies of cross-authoritarian diffusion of information management, illustrating how the three regimes and the critical journalists in them may be learning from one another and what that means for our understanding of media in non-democratic contexts. Watch Jaclyn Kerr's discussion of the Russian case.

 
All Publications button
1
Publication Type
Testimonies
Publication Date
Journal Publisher
PARGC Panel
Authors
Jaclyn A. Kerr
Jaclyn A. Kerr
Paragraphs

For seven decades, the Bulletin of the Atomic Scientists has served as a discussion forum for urgent issues at the intersection of science, technology, and society. Born in the aftermath of World War II and a roiling debate over the control of the postwar atom, the Bulletin has been a sounding board for major nuclear-age debates, from atomic espionage to missile defense. Since the end of the Cold War, the magazine has featured an expanding array of challenges, including the threat posed by global climate change. The Bulletin’s contributors have expressed their public citizenship by helping to bring the political aspects of science into proper focus. They have stood up for the political freedom of science, and sought to harness scientific knowledge to responsible ends in the political arena. Such efforts are needed now, as they were in 1945. Read Benjamin Wilson's discussion here.

 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of Atomic Scientists
Authors
Benjamin Wilson
Paragraphs

Every week, the Islamic State (ISIS) makes further headlines with its ruthless behavior. Beheadings, mass executions, burnings and extreme acts of brutality are the methods of a terrorist campaign intended to cow opponents and rally potential fighters. At the same time, the group is fighting a guerilla war against Iraqi forces while engaging in more conventional infantry battles against Kurdish Peshmerga and Free Syrian Army cadres. The many tactics of ISIS raises the question: Which type of war are we fighting against?

CISAC's Joe Felter and his Empirical Studies of Conflict colleagues Eli Berman and Jacob Shapiro ask those questions in this National Interest article.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
The National Interest
Authors
Joseph Felter
Joseph Felter
Paragraphs

In a commentary on the long-term storage of SNF in the March 2015 issue of Nature Materials, Professor Rod Ewing writes that, "to design reliable and safe geological repositories it is critical to understand how the characteristics of spent nuclear fuel evolve with time, and how this affects the storage environment. Globally, about 10,000 metric tonnes of heavy metal (MTHM) are produced each year by nuclear power plants, and a cumulative inventory of approximately 300,000 MTHM is stored either in pools or dry casks at reactor sites around the world1. Most of this inventory is destined for long-term storage and eventual geologic disposal. Thus, the behaviour of UO2 in spent fuel as a waste form must be understood and evaluated under the extraordinary conditions of geologic disposal, which extends to hundreds of thousands of years. The behaviour of nuclear fuel under the conditions of long-term disposal in a geologic repository depend specifically on the chemical changes that have occurred to the fuel during service life in the reactor."

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Nature Materials
Authors
Rodney C. Ewing
Rodney Ewing
Subscribe to