Security

Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the value of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. An interdisciplinary team of scholars accomplishes this mission through teaching and honing a research portfolio focused on agriculture, aquaculture, and climate change.

Recent Scholarly Publications

Records 24 / 515

Behavioral Economics and Nuclear Weapons

August 2019

Recent discoveries in psychology and neuroscience have improved our understanding of why our decision making processes fail to match standard social science assumptions about rationality.

International Intervention and the Rule of Law after Civil War: Evidence from Liberia

April 2019

What are the effects of international intervention on the rule of law after civil war?

Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations

January 2019

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

Chronic long-term risk of low-level radiation exposure: Bridging the lay/expert divide

August 2018

Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by...

Integrating Offensive Cyber Capabilities: Meaning, dilemmas, and assessment

August 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity

May 2018

From New York Times bestselling author and former U.S. secretary of state Condoleezza Rice and Stanford University professor Amy B.

Cheap fights, credible threats: The future of armed drones and coercion

February 2018

Drones are considered poor coercion tools: They cannot operate in contested airspace and they offer low-cost fights instead of more credible, costly signals.

Militants, Criminals, and Warlords - The Challenge of Local Governance in an Age of Disorder

November 2017

The sovereign state is frequently held up as the legitimate source of domestic order and an important provider of public goods in any society, regardless of regime type.

Japan's Shift in the Nuclear Debate: A Changing Identity?

May 2017

Sayuri Romei, a political scientist and predoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), has a new working paper that shows Japan is an increasingly...

On Cyber-Enabled Information/Influence Warfare and Manipulation

April 2017

CISAC's Herbet Lin and Jackie Kerr from the Lawrence Livermore National Laboratory write in this draft working paper that the United States has no peer competitors in conventional military power. ...

Structuring Cooperative Nuclear Risk Reduction Initiatives with China

April 2017

CISAC's Siegfried Hecker, Larry Brandt and Jason Reinhardt worked with Chinese nuclear organizations on issues involving radiological and nuclear terrorism.

Uneasy Partnerships: China’s Engagement with Japan, the Koreas, and Russia in the Era of Reform

April 2017

Uneasy Partnerships presents the analysis and insights of practitioners and scholars who have shaped and examined China's interactions with key Northeast Asian partners.

Insider Threats

February 2017

High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information, facilities, and materials.

Separating Fact from Fiction in the Debate over Drone Proliferation

November 2016

What are the consequences of drone proliferation for international security?

American Crossings: Border Politics in the Western Hemisphere (edited volume)

November 2016

In American Crossings, nine scholars consider the complicated modern history of borders in the Western Hemisphere, examining borders as geopolitical boundaries, key locations for internal security,...

Questions for the presidential candidates on nuclear terrorism, proliferation, weapons policy, and energy

September 2016

Stanford expert Siegfried Hecker proposes a series of nuclear weapons and energy questions that journalists and citizens should consider asking the 2016 presidential candidates.

Perspectives on Complex Global Challenges: Education, Energy, Healthcare, Security, and Resilience

July 2016

This book discusses issues in large-scale systems in the United States and around the world.

My Journey at the Nuclear Brink

January 2016

My Journey at the Nuclear Brink is a continuation of William J. Perry's efforts to keep the world safe from a nuclear catastrophe.

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Flash from the past: Why an apparent Israeli nuclear test in 1979 matters today

September 2015

The paper provides technical and circumstantial evidence that the detection of a "double flash" by a Vela satellite on 9/22/79 was that of an Israeli nuclear test logistically assisted by South...

New Game, New Rules: Limiting the Risks of Biological Engineering

September 2015

In an article published by the Council on Foreign Relations' Foreign Affairs magazine, David Relman and Marc Lipsitch examine recent advances in biological engineering as well as lapses in...

Take No Casualties

March 2015

By emphasizing casualty reduction as a goal without regard to the importance of battlefield victory, the U.S. Army risks developing inappropriate military doctrine.Read more here.

Explaining and Influencing Chinese Arms Transfers

March 2015

This paper addresses the factors motivating Chinese conventional arms sales and speculates on means to influence them.

People

Stephen J. Stedman Senior Fellow, Professor, by courtesy, Political Science
Martha Crenshaw Martha Crenshaw Senior Fellow, Professor, by courtesy, Political Science
Rod Ewing Rodney C. Ewing Senior Fellow Professor of Geological Sciences
Gabrielle Hecht Gabrielle Hecht Senior Fellow Professor, History
Jacquelyn Schneider Jacquelyn Schneider Hoover Fellow
Scott D. Sagan Senior Fellow Professor, Political Science
Philip Taubman Lecturer
David Relman Senior Fellow Professor, Medicine, Professor, Microbiology and Immunology
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Jeremy M. Weinstein Senior Fellow Professor, Political Science
Jenny Martinez Senior Fellow, by courtesy Professor, Law
Herb Lin Herbert Lin Senior Research Scholar