Security

Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Recent Scholarly Publications

Records 48 / 521

Future Crimes: Inside the Digital Underground and the Battle for Our Connected World

January 2016

About the Author: Marc Goodman has spent a career in law enforcement and technology. He was appointed futurist-in-residence with the FBI, worked as a senior adviser to Interpol, and served as a...

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Flash from the past: Why an apparent Israeli nuclear test in 1979 matters today

September 2015

The paper provides technical and circumstantial evidence that the detection of a "double flash" by a Vela satellite on 9/22/79 was that of an Israeli nuclear test logistically assisted by South...

New Game, New Rules: Limiting the Risks of Biological Engineering

September 2015

In an article published by the Council on Foreign Relations' Foreign Affairs magazine, David Relman and Marc Lipsitch examine recent advances in biological engineering as well as lapses in...

Explaining and Influencing Chinese Arms Transfers

March 2015

This paper addresses the factors motivating Chinese conventional arms sales and speculates on means to influence them.

Take No Casualties

March 2015

By emphasizing casualty reduction as a goal without regard to the importance of battlefield victory, the U.S. Army risks developing inappropriate military doctrine.Read more here.

Long-Term Storage of Spent Nuclear Fuel

February 2015

In a commentary on the long-term storage of SNF in the March 2015 issue of Nature Materials, Professor Rod Ewing writes that, "to design reliable and safe geological repositories it is critical to...

Learning from the Sony Hack Attack

February 2015

As the fallout from the November 2014 cyber attack on Sony Pictures Entertainment continues, with Sony co-chairman Amy Pascal stepping down this month, it’s still not clear how the story will end,...

American scientists as public citizens: 70 years of the Bulletin of the Atomic Scientists

January 2015

For seven decades, the Bulletin of the Atomic Scientists has served as a discussion forum for urgent issues at the intersection of science, technology, and society.

The American Calculus of Military Intervention

June 2014

The protracted campaigns in Afghanistan and Iraq have diminished America’s appetite for waging wars to end tyranny or internal disorder in foreign lands. Military interventions have traditionally...

Efficient, Secure Green: Digital Utopianism and the Challenge of Making the Electrical Grid “Smart”

December 2013

Abstract: Electrical grids have long depended upon information infrastructures—systems for exchanging information about electricity generation, transmission, distribution, and use.

Reassessing the All-Volunteer Force

December 2013

Karl Eikenberry, former ambassador to Afghanistan and retired U.S.

Poor Man’s Atomic Bomb? Exploring the Relationship between “Weapons of Mass Destruction”

November 2013

Abstract The causes and consequences of nuclear proliferation have received a great deal ofacademic attention. However, nuclear weapons are rarely discussed in isolation in policycircles.

The Hidden Dangers of Chop-Shop Electronics

September 2013

John Villasenor, a CISAC affiliate and professor of electrical engineering and public policy at UCLA, writes in this IEEE SPECTRUM article with Mohammad Tehranipoor, that counterfeiters sell old...

Nuclear denial: From Hiroshima to Fukushima

September 2013

Abstract: Governments and the nuclear power industry have a strong interest in playing down the harmful effects of radiation from atomic weapons and nuclear power plants.

Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012

August 2013

Overview (From http://mitpress.mit.edu/books/arguments-count):In a rapidly changing world, we rely upon experts to assess the promise and risks of new technology.

Explaining Rape during Civil War: Cross-National Evidence (1980-2009)

August 2013

Why do some armed groups commit massive wartime rape, whereas others never do?

Disowning Fukushima: Managing the credibility of nuclear reliability assessment in the wake of disaster

July 2013

Abstract: This paper reflects on the credibility of nuclear risk assessment in the wake of the 2011 Fukushima meltdowns.

Defending a Hacker: Amicus brief for U.S. v. Andrew Auernheimer

July 2013

In an amicus brief written in defense of computer expert and hacker Andrew Auernheimer, Jennifer Granick and Jonathan Mayer argue that independent security testing of websites strengthen user...

The Lavon Affair: How a false-flag operation led to war and the Israeli bomb

July 2013

Abstract The Lavon Affair, a failed Israeli covert operation directed against Egypt in 1954, triggered a chain of events that have had profound consequences for power relationships in the Middle...

Making discoveries in virtual worlds via the Cloud

May 2013

Abstract:Analysts at CISAC, together with colleagues at the James Martin Center for Nonproliferation Studies, are playing a leading role in deriving new, timely, and value-added information of...

Ready-to-use food-allocation policy to reduce the effects of childhood undernutrition in developing countries

March 2013

Abstract: Several aid groups have proposed strategies for allocating ready-touse (therapeutic and supplementary) foods to children in developing countries.

The Increasingly Compelling Moral Responsibilities of Life Scientists

March 2013

First paragraph of article:Many of my colleagues and fellow investigators in the life sciences were surprised in late 2011 to hear about the deliberate laboratory manipulation of highly pathogenic...

State Strategies in Multi-Ethnic Territories: Explaining Variation in the Former Soviet Union and Eastern Bloc

February 2013

Abstract After the collapse of the Soviet bloc, its twenty-seven successor states were charged with devising policies with respect to their ethnic minorities.

People

Sagan, Scott 2012 photo Scott D. Sagan Senior Fellow Professor, Political Science
weinstein Jeremy M. Weinstein Senior Fellow Professor, Political Science
thumbnail ddo photo Joseph Felter Lecturer
Jacquelyn Schneider Jacquelyn Schneider Hoover Fellow
1 RSD13 085 0052a 001 David Relman Senior Fellow Professor, Medicine, Professor, Microbiology and Immunology
Vardi, Gil li Gil-li Vardi Lecturer, GSB, History
woman smiling Megan Palmer Executive Director, Bio Policy & Leadership Initiatives, Department of Bioengineering (BioE)
lapidus Gail W. Lapidus Senior Fellow, Emerita Professor, Political Science, Emerita
Wein Lawrence M. Wein Professor, Management Science
rsd19 072 0308a Paul N. Edwards William J. Perry Fellow
Alla Kassianova Alla Kassianova Research Scholar
Man in a black suit smiling Ronald E Robertson Postdoctoral Fellow, Stanford Internet Observatory