Skip to:

Security

Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the value of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. An interdisciplinary team of scholars accomplishes this mission through teaching and honing a research portfolio focused on agriculture, aquaculture, and climate change.

 

Recent Scholarly Publications

Records 24 / 387

Uneasy Partnerships: China’s Engagement with Japan, the Koreas, and Russia in the Era of Reform

April 2017

Uneasy Partnerships presents the analysis and insights of practitioners and scholars who have shaped and examined China's interactions with key Northeast Asian partners.

American Crossings: Border Politics in the Western Hemisphere (edited volume)

November 2016

In American Crossings, nine scholars consider the complicated modern history of borders in the Western Hemisphere, examining borders as geopolitical boundaries, key locations for internal security,...

Questions for the presidential candidates on nuclear terrorism, proliferation, weapons policy, and energy

September 2016

Stanford expert Siegfried Hecker proposes a series of nuclear weapons and energy questions that journalists and citizens should consider asking the 2016 presidential candidates.

Perspectives on Complex Global Challenges: Education, Energy, Healthcare, Security, and Resilience

July 2016

This book discusses issues in large-scale systems in the United States and around the world.

My Journey at the Nuclear Brink

January 2016

My Journey at the Nuclear Brink is a continuation of William J. Perry's efforts to keep the world safe from a nuclear catastrophe.

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Flash from the past: Why an apparent Israeli nuclear test in 1979 matters today

September 2015

The paper provides technical and circumstantial evidence that the detection of a "double flash" by a Vela satellite on 9/22/79 was that of an Israeli nuclear test logistically assisted by South...

New Game, New Rules: Limiting the Risks of Biological Engineering

September 2015

In an article published by the Council on Foreign Relations' Foreign Affairs magazine, David Relman and Marc Lipsitch examine recent advances in biological engineering as well as lapses in...

Explaining and Influencing Chinese Arms Transfers

March 2015

This paper addresses the factors motivating Chinese conventional arms sales and speculates on means to influence them.

Take No Casualties

March 2015

By emphasizing casualty reduction as a goal without regard to the importance of battlefield victory, the U.S. Army risks developing inappropriate military doctrine.Read more here.

Long-Term Storage of Spent Nuclear Fuel

February 2015

In a commentary on the long-term storage of SNF in the March 2015 issue of Nature Materials, Professor Rod Ewing writes that, "to design reliable and safe geological repositories it is critical to...

Learning from the Sony Hack Attack

February 2015

As the fallout from the November 2014 cyber attack on Sony Pictures Entertainment continues, with Sony co-chairman Amy Pascal stepping down this month, it’s still not clear how the story will end,...

American scientists as public citizens: 70 years of the Bulletin of the Atomic Scientists

January 2015

For seven decades, the Bulletin of the Atomic Scientists has served as a discussion forum for urgent issues at the intersection of science, technology, and society.

The American Calculus of Military Intervention

June 2014

The protracted campaigns in Afghanistan and Iraq have diminished America’s appetite for waging wars to end tyranny or internal disorder in foreign lands. Military interventions have traditionally...

Efficient, Secure Green: Digital Utopianism and the Challenge of Making the Electrical Grid “Smart”

December 2013

Abstract: Electrical grids have long depended upon information infrastructures—systems for exchanging information about electricity generation, transmission, distribution, and use.

Reassessing the All-Volunteer Force

December 2013

Karl Eikenberry, former ambassador to Afghanistan and retired U.S.

Poor Man’s Atomic Bomb? Exploring the Relationship between “Weapons of Mass Destruction”

November 2013

Abstract The causes and consequences of nuclear proliferation have received a great deal ofacademic attention. However, nuclear weapons are rarely discussed in isolation in policycircles.

The Hidden Dangers of Chop-Shop Electronics

September 2013

John Villasenor, a CISAC affiliate and professor of electrical engineering and public policy at UCLA, writes in this IEEE SPECTRUM article with Mohammad Tehranipoor, that counterfeiters sell old...

Nuclear denial: From Hiroshima to Fukushima

September 2013

Abstract: Governments and the nuclear power industry have a strong interest in playing down the harmful effects of radiation from atomic weapons and nuclear power plants.

Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012

August 2013

Overview (From http://mitpress.mit.edu/books/arguments-count):In a rapidly changing world, we rely upon experts to assess the promise and risks of new technology.

Explaining Rape during Civil War: Cross-National Evidence (1980-2009)

August 2013

Why do some armed groups commit massive wartime rape, whereas others never do?

Disowning Fukushima: Managing the credibility of nuclear reliability assessment in the wake of disaster

July 2013

Abstract: This paper reflects on the credibility of nuclear risk assessment in the wake of the 2011 Fukushima meltdowns.

Defending a Hacker: Amicus brief for U.S. v. Andrew Auernheimer

July 2013

In an amicus brief written in defense of computer expert and hacker Andrew Auernheimer, Jennifer Granick and Jonathan Mayer argue that independent security testing of websites strengthen user...

The Lavon Affair: How a false-flag operation led to war and the Israeli bomb

July 2013

Abstract The Lavon Affair, a failed Israeli covert operation directed against Egypt in 1954, triggered a chain of events that have had profound consequences for power relationships in the Middle...

People

Stephen J. Stedman Senior Fellow, Professor, by courtesy, Political Science
Beatriz Magaloni Senior Fellow Associate Professor, Political Science
Rod Ewing Rodney C. Ewing Senior Fellow Professor of Geological Sciences
Scott D. Sagan Senior Fellow Professor, Political Science
Siegfried S. Hecker Senior Fellow Professor, Management Science and Engineering
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
David Holloway, CISAC David Holloway Senior Fellow Professor, History, Professor, Political Science
Martha Crenshaw Senior Fellow, Professor, by courtesy, Political Science
David Relman Senior Fellow Professor, Medicine, Professor, Microbiology and Immunology
James D. Fearon Senior Fellow Professor, Political Science
Jeremy M. Weinstein Senior Fellow Professor, Political Science
Jenny Martinez Senior Fellow, by courtesy Professor, Law