Skip to:

Security

Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the value of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. An interdisciplinary team of scholars accomplishes this mission through teaching and honing a research portfolio focused on agriculture, aquaculture, and climate change.

 

Recent Events

Records 24 / 858

Evolving perspectives on risk in biology and the life sciences

September 27, 2017

Abstract: TBASpeaker Bio: David A. Relman, M.D., is the Thomas C. and Joan M.

Bitcoin: adoption, usage and privacy

September 25, 2017

Abstract: This presentation will review research from two papers about Bitcoin.  The first paper uses data from the MIT digital currency experiment to shed light on consumer behavior regarding...

Managing the Impact of Emerging Technologies on Strategic Stability

September 18, 2017

Abstract: TBASpeaker Bio: Dr. James N.

Knowledge infrastructures under siege: environmental data systems as memory, truce, and target

September 18, 2017

Abstract: This talk examines the history of environmental data systems in the context of the Trump administration’s assault on environmental science.

Countering information warfare: emerging challenges for national security

September 1, 2017

Abstract: The United States is (belatedly) waking up to the risk that adversaries will use social media and botnets to influence U.S. elections.

Global politics of the AI revolution

August 23, 2017

Abstract: Advanced machine intelligence is likely to arrive in the coming decades. When it does it will transform employment, wealth and power, and world order.

Nuclear power development in China and why should we cooperate?

August 16, 2017

Abstract: Mainland China has undergone a rapid development of nuclear power during the last two decades. The reactors under construction or soon to be constructed there include some of the world's...

Can water security be engineered?

August 2, 2017

Abstract: Freshwater scarcity is expected to increase over the coming decades due to population growth, migration to urban centers in water-scarce regions, and climate change.

CISAC Honors Students Prize-Winning Presentations 2017

May 15, 2017

Lunch will be served to pre-registered guests. To ensure an accurate headcount, RSVPs are required. The winners of the 2017 Firestone Medal and the William J.

A Conversation with General Michael Hayden

April 27, 2017

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea...

The Cold War: A World History

April 19, 2017

Abstract: The Cold War was about the rise and the solidification of US power. But it was also about more than that.

The continuation of policy by other means: asymmetric warfare via the ballot box

April 18, 2017

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes....

Private Foreign Policy

March 29, 2017

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S.

Reputation in the Anti-Abuse Regime

March 27, 2017

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware.

Normalization by Other Means: The Failed Techno-diplomacy of Light Water Reactor Export in the North Korean Nuclear Crisis

March 17, 2017

Abstract: In 1992, North Korea offered to dismantle its plutonium-production reactors in exchange for more “proliferation-resistant” light water reactors (LWRs) from the West, and this offer...

Bits and pieces: Liberal democracy in the digital era

March 14, 2017

 The event is a joint sponsorship between CISAC, the Freeman Spogli Institute for International Studies, the European Security Initiative (in The Europe Center) and the Center for Russian, East...

Provably beneficial AI

March 11, 2017

Abstract: Should we be concerned about long-term risks from superintelligent AI?If so, what can we do about it?  While some in the mainstream AI community dismiss these concerns, I will argue...

Can changes in climate cause conflict?

January 24, 2017

Abstract: A growing body of empirical evidence indicates that changes in climate are associated with increases in human violence.  I review new and recent evidence on this topic, using data ranging...

Inside the CIA: A Conversation with Michael Morell

January 11, 2017

This event is at maximum capacity. We thank you for your interest and regret that we cannot accept more registrations.- This event is part of the Robert G.

U.S. Strategic Command Perspectives on Deterrence and Assurance

December 16, 2016

- Registration for this event is mandatory -About the Speaker: Gen. John E. Hyten is Commander of U.S.

The Digital Dimension

November 21, 2016

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S.

Metrology is a Common Good: The Foundations of Sharing, Trusting, and Dividing

November 18, 2016

Abstract: Trustworthy measurement results are basic to human interaction.

Cybersecurity Futures 2020

November 17, 2016

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data?

Reality-based election security

November 2, 2016

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged".

People

James D. Fearon Senior Fellow Professor, Political Science
Jeremy M. Weinstein Senior Fellow Professor, Political Science
Jenny Martinez Senior Fellow, by courtesy Professor, Law
Stephen J. Stedman Senior Fellow, Professor, by courtesy, Political Science
Beatriz Magaloni Senior Fellow Associate Professor, Political Science
Rod Ewing Rodney C. Ewing Senior Fellow Professor of Geological Sciences
Scott D. Sagan Senior Fellow Professor, Political Science
Siegfried S. Hecker Senior Fellow Professor, Management Science and Engineering
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
David Holloway, CISAC David Holloway Senior Fellow Professor, History, Professor, Political Science
Martha Crenshaw Senior Fellow, Professor, by courtesy, Political Science
David Relman Senior Fellow Professor, Medicine, Professor, Microbiology and Immunology