Conflict
Authors
Asfandyar Mir
News Type
Commentary
Date
Paragraphs

Many analystspractitioners, and scholars are skeptical of the efficacy of drone strikes for counterterrorism, suggesting that they provide short-term gains at best and are counterproductive at worst. However, despite how widespread these views are, reliable evidence on the consequences of drone strikes remains limited. My research on drone warfare and U.S. counterterrorism—some of which was recently published in International Security—addresses this issue by examining the U.S. drone war in Pakistan from 2004 to 2014. Contrary to the skeptics, I find that drone strikes in Pakistan were effective in degrading the targeted armed groups. And, troublingly, they succeeded in doing so even though they harmed civilians.

 

Three Key Findings

I have conducted research in Pakistan and the United States over the last few years, gathering new qualitative data on the politics of the war and its effects on the two main targets, al-Qaeda and the Pakistan Taliban. I have also evaluated detailed quantitative data on drone strikes and violence by al-Qaeda and the Pakistan Taliban. This research offers three important findings.

First, the U.S. drone war was damaging for the organizational trajectories of al-Qaeda and the Pakistan Taliban. I found that after the United States surged its surveillance and targeting capabilities in 2008, both groups suffered increasing setbacks; they lost bases, their operational capabilities were reduced, their ranks were checked by growing numbers of desertions, and the organizations fractured politically. These effects appear to have persisted until 2014. In a related paper, my University of Michigan colleague Dylan Moore and I show that during the drone program in the Waziristan region, violence by the two groups fell substantially.

Second, the U.S. drone war disrupted al-Qaeda and the Pakistan Taliban not just by killing their leaders and specialized rank-and-file members, but also by heightening the perceived risk of being targeted. Across a variety of empirical materials, including some collected through fieldwork, I found that both groups were direly constrained by the fear—a constant sense of anticipation—of drone strikes, which crippled routine movement and communication. In addition, leaders and rank-and-file jihadis regularly viewed each other with the suspicion of being spies for the drone program, which contributed to their organizational fragmentation.

Third, the notion of increased recruitment for al-Qaeda and the Pakistan Taliban due to civilian harm in drone strikes is questionable. In the local battlefield, I did not find evidence of any tangible increase in recruitment. Interviews with some surviving mid-level members of al-Qaeda and the Pakistan Taliban negated the impression that the groups benefited from a stream of angry recruits. Instead, a recurring theme was that they experienced desertions and manpower shortages because of the stress of operating under drones. To the extent that new recruits were available, both groups struggled to integrate them in their organizations because of the fear that they might be spies for the drone program.

 

Beyond Pakistan?

The U.S. drone war in Pakistan is a crucial case of U.S. counterterrorism policy, but it is one of many other campaigns. The U.S. government is waging such campaigns in Yemen and Somalia, and considering an expansion in the Sahara. In my work, I identify two factors which are important for the dynamics evident in Pakistan to hold generally.

First, the United States must have extensive knowledge of the civilian population where the armed group is based. The counterterrorism force needs such knowledge to generate intelligence leads on their targets, who are often hiding within the civilian population. This comes from detailed population data sharing by local partners, large-scale communication interception, and pattern-of-life analysis of target regions from sophisticated drones.

Second, the United States must be able to exploit available intelligence leads in a timely manner. As members of targeted armed groups consistently try to escape detection, most intelligence has a limited shelf life. The capability to act quickly depends on the bureaucratic capacity to process intelligence, decentralized decision-making for targeting, and rapid-strike capabilities like armed drones.

In Pakistan, the United States met these criteria with an abundance of technology and high-quality local partner cooperation. Starting in 2008, the United States mobilized a large fleet of drones and surveillance technologies to develop granular knowledge of the civilian population in the targeted regions. Despite deep political rifts on the conflict in Afghanistan, the Central Intelligence Agency obtained extensive covert support from Pakistani intelligence against al-Qaeda and the Pakistan Taliban, which enabled it to regularly locate targets. With ample targeting authority and armed drones operating from nearby bases, U.S. forces were able to exploit available leads.

In Yemen, however, the United States has struggled to develop knowledge of the civilian population and act on available intelligence. My interviews with U.S. officials and a leaked government document suggest that, until 2013, U.S. forces did not sustain aerial surveillance of targeted regions, the Yemeni state’s capacity in support of operations remained poor, and the targeting rules were stringent.

 

Implications for U.S. Counterterrorism Policy

The U.S. government’s preference for drone strikes is motivated by the desire to prevent attacks against the American homeland. My research suggests that the drone program has the potential to inflict enough damage on the targeted armed groups to upset their ability to plot and organize attacks in the United States.

The United States also deploys drone strikes to manage jihadi threats to allied regimes. In such cases, the political value of strikes depends, in part, on the capability of the local partner. An effective drone deployment can go a long way in providing a necessary condition for restoring order. But the local partner must ultimately step up to consolidate state control.

For example, President Obama’s drone policy degraded al-Qaeda and the Pakistan Taliban, securing the American homeland and substantially reducing the threat to the nuclear-armed Pakistani state. The Obama administration’s policy was sufficient because the Pakistani state was relatively capable and could build on the gains made by U.S. counterterrorism strikes. Indeed, Pakistan’s ground operations, although contentiously timed, consolidated those gains.

In contrast, in today’s Afghanistan, the U.S. government cannot rely on instruments of counterterrorism alone. U.S. officials realize that just degrading the Afghan Taliban and the Islamic State is unlikely to stabilize the country. The Afghan government remains so weak that it will struggle to consolidate territorial control even after substantial degradation of its armed foes.

Finally, a key limitation of counterterrorism strikes is that they cannot alleviate the ideological appeal of jihadi actors like al-Qaeda and the Islamic State. Strikes cannot substitute for efforts at countering online jihadi propaganda and de-radicalization. Thus, they should not be seen as a silver bullet that can defeat armed groups operating from safe havens and weak states.

 

Civilian Protection and Drone Strikes

Civilian harm in U.S. counterterrorism remains a vital challenge. While moral objections to civilian casualties are a powerful reason to reconsider drone operations, my research suggests that strategic concerns, like a surge in local violence or increased recruitment of targeted organizations, are not. In Pakistan, for example, drone strikes harmed civilians while also undermining al-Qaeda and Pakistan Taliban. Similarly, the U.S.-led counter-ISIL campaign in Iraq and Syria was very difficult for the civilian population, and yet also inflicted losses on the Islamic State.

If civilian casualties do not affect the strategic outcomes of counterterrorism campaigns, then the U.S. government must be convinced to protect civilians for purely moral reasons. How responsive might the U.S. government be to such appeals? It is unclear. The Obama administration was not transparent about the use of drone strikes. Under President Trump, the lack of transparency has worsened. Concerned policymakers and human rights activists must continue to push the U.S. government to be more transparent and to protect civilians caught up in counterterrorism campaigns.

 

Hero Image
All News button
1
Paragraphs

This article assesses American public attitudes toward the just war principles of proportionality, due care and distinction. Consistent with the logic of proportionality, the authors find that Americans are less willing to inflict collateral deaths on foreign civilians when the military advantage of destroying a target is lower. Most Americans also are willing to risk the deaths of American soldiers to avert a larger number of collateral foreign civilian deaths, which accords with the due care principle. Nevertheless, they find that the public's commitments to proportionality and due care are heavily biased in favor of protecting American soldiers and promoting US national security interests. Moreover, they find little evidence that the majority of the public supports the principle of noncombatant immunity, and, contrary to just war doctrine, Americans are more likely to accept collateral deaths of foreign civilians when those civilians are described as politically sympathetic with the adversary.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
International Studies Quarterly
Authors
Scott D. Sagan
Scott Sagan
Benjamin Valentino
Number
Volume 62, Issue 3
-

Click here to RSVP

Abstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has transformed geopolitics like nothing since the invention of the airplane and the atomic bomb. Cheap to acquire, easy to deny, usable for everything from crippling infrastructure to sowing discord and doubt, cyber is now the weapon of choice for American presidents, North Korean dictators, Iranian mullahs, and Kremlin officials. The United States struck early with the most sophisticated cyber attack in history, Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and it has gone on to use cyberweapons against North Korean missiles and the Islamic State. Soon, the cyber floodgates opened. But as the global cyber conflict took off, America turned out to be remarkably unprepared. Its own weapons were stolen from the American arsenal by a group called Shadow Brokers and were quickly turned against the United States and its allies. Even while the United States built up a powerful new Cyber Command, it had no doctrine for how to use it. Deterrence failed. When under attack—by Russia, China, or even Iran and North Korea —the government was often paralyzed, unable to use cyberweapons because America’s voting system, its electrical system, and even routers in citizens’ homes had been infiltrated by foreign hackers. American citizens became the collateral damage in a war they barely understood, one that was being fought in foreign computer networks and along undersea cables.

Speaker Bio: David Sanger is national security correspondent for the New York Times and bestselling author of The Inheritance and Confront and Conceal. He has been a member of three teams that won the Pulitzer Prize, including in 2017 for international reporting. A regular contributor to CNN, he also teaches national security policy at Harvard’s Kennedy School of Government.

 

David Sanger Chief Washington Correspondent The New York Times
-

Jake Shapiro Bio: Jacob N. Shapiro is Professor of Politics and International Affairs at Princeton University and co-directs the Empirical Studies of Conflict Project. His research focuses on political violence, economic development in conflict zones, and security policy. He is the author of The Terrorist’s Dilemma: Managing Violent Covert Organizations. His research has been published in Journal of Political Economy, American Economic Review, American Journal of Political Science, International Security, International Studies Quarterly, Journal of Conflict Resolution, Perspectives on Politics, Political Analysis, Public Opinion Quarterly, Security Studies, World Politics, Foreign Affairs, Foreign Policy, Military Operations Research, Terrorism and Political Violence, and a number of edited volumes. Shapiro is a term member of the Council on Foreign Relations, an Associate Editor of World Politics, a Faculty Fellow of the Association for Analytic Learning about Islam and Muslim Societies (AALIMS), a Research Fellow at the Center for Economic Research in Pakistan (CERP), and served in the U.S. Navy and Naval Reserve. Ph.D. Political Science, M.A. Economics, Stanford University. B.A. Political Science, University of Michigan.

Eli Berman Bio: Eli Berman is chair and professor of economics at UC San Diego, research director for international security studies at the UC Institute on Global Conflict and Cooperation, faculty member at the UCSD school of Global Policy and Strategy, member of the Empirical Studies of Conflict research project, and research associate at the National Bureau of Economic Research. His book Radical, Religious and Violent: The New Economics of Terrorism was published in 2009 by the MIT Press. Berman received his Ph.D. in economics from Harvard University. His latest publications are “The Empiricists’ Insurgency” (with Aila Matanock), and "Modest, Secure and Employed: Successful Development in Conflict Zones," (with Joseph Felter, Jacob Shapiro and Erin Troland). Grants supporting his research have come from the Department of Defense, Department of Homeland Security, and the National Science Foundation. His research interests include economic development and conflict, the economics of religion, labor economics, technological change, and economic demography.

Abstract: The way wars are fought has changed starkly over the past sixty years. International military campaigns used to play out between large armies at central fronts. Today's conflicts find major powers facing rebel insurgencies that deploy elusive methods, from improvised explosives to terrorist attacks. Small Wars, Big Data presents a transformative understanding of these contemporary confrontations and how they should be fought. The authors show that a revolution in the study of conflict--enabled by vast data, rich qualitative evidence, and modern methods—yields new insights into terrorism, civil wars, and foreign interventions. Modern warfare is not about struggles over territory but over people; civilians—and the information they might choose to provide—can turn the tide at critical junctures.The authors draw practical lessons from the past two decades of conflict in locations ranging from Latin America and the Middle East to Central and Southeast Asia. Building an information-centric understanding of insurgencies, the authors examine the relationships between rebels, the government, and civilians. This approach serves as a springboard for exploring other aspects of modern conflict, including the suppression of rebel activity, the role of mobile communications networks, the links between aid and violence, and why conventional military methods might provide short-term success but undermine lasting peace. Ultimately the authorsshow how the stronger side can almost always win the villages, but why that does not guarantee winning the war.

Jake Shapiro, Professor, Princeton University and Eli Berman, Professor, UC San Diego
Seminars
-

Abstract: In November 1998, ‘mujahideen’ warriors climbed the heights above Kargil in Indian held Kashmir, crossed the Line of Control, and occupied Indian military posts. These ‘mujahideens’ were really Pakistani soldiers clad in civilian garb on a secret mission. This was the beginning of the war in Kargil between two nuclear neighbors (India and Pakistan). This study critically evaluates the relationship between ‘learning’ and risk-prone behavior of Pakistan in the midst of technological maturation. Should we be confident and rely on nuclear deterrence and believe that Kargil-like crisis will never happen again? This talk will explain the story of Kargil from a theoretical lens of nuclear learning, demonstrating how difficult it has been for Pakistan to learn appropriate lessons given the firewalls of convictions, cover-ups, and confirmation biases. 

Speaker bio: Sannia Abdullah is a political scientist. Her doctoral thesis is on nuclear learning in South Asia with special reference to India-Pakistan crisis behavior. She is associated with Quaid-i-Azam University in the Department of Defense and Strategic Studies as a permanent faculty member. At CISAC, she is working on her book manuscript focusing on the evolution of Pakistan's nuclear behavior and its deterrence logic. Prior to joining CISAC, she was a visiting research scholar at Cooperative Monitory Center, Sandia National Labs (NM) where her research focuses primarily nonproliferation issues in South Asia. In 2016, she presented her research at Atlantic Council on Pakistan’s pursuit of full spectrum deterrence strategy and posture, conceptual nuances, and implied ramifications and at ISAC-ISSS, Annual Conference, University of Notre Dame. She was invited to deliver lectures at the USAFA on Pakistan’s deterrence stability and maturing force posture. She expressed her academic views at different forums including Pentagon, Lawrence Livermore National Labs, Congressional Budget Office and in some Think Tanks in Washington D.C. She had been a Nonproliferation Fellow at the Center for Nonproliferation Studies (CNS), in Monterey and a SWAMOS alumni of Columbia University (2011). Since 2010, Dr. Abdullah has been part of several Track-II dialogues and had an opportunity to learn decision-making trends through her regular participations in Table Top Exercises exploring escalation control and deterrence stability in South Asia.

 

0
sanniaabdullah_rsd17_076_0359a.jpg
PhD

Dr. Sannia Abdullah is a political scientist working on nonproliferation and regional security issues for over ten years. Sannia was a visiting research scholar at Sandia National Labs (2018-2019). She completed her postdoc as Stanton Nuclear Security Postdoctoral Fellow at CISAC (Stanford University). From 2011 to 2019, she was a faculty in the Department of Defense and Strategic Studies (Quaid-i-Azam University, Pakistan). She also hosts her podcast show 'Women with Ambition.’ Since 2010, Dr. Abdullah has been part of several Track-II dialogues and learned decision-making trends through her regular participation in Table Top Exercises exploring escalation control and deterrence stability in South Asia. She published nationally and internationally. Her recent articles are published in Space and Defense, International Journal for Nuclear Security, The Washington Quarterly, Asia Europe Journal, War on the Rocks, and South Asian Voices. She is working on her book manuscript, focusing on the evolution of Pakistan's nuclear behavior and its deterrence logic. Her primary research interests include Governance, Organizations and Institutions, Military, and Nuclear Policy.

 

Affiliate
CISAC, Stanford University
Seminars
Authors
News Type
News
Date
Paragraphs

Evolving drone technology will enable countries to make low-cost but highly credible threats against states and groups that do not possess drones, Stanford political scientist Amy Zegart found in new research.

Could the mere threat of using an armed drone ever coerce an enemy to change their behavior – without attacking them?

Yes, says Stanford political scientist Amy Zegart, who argues in a new research paper that countries that simply possess deadly, armed drones could change an adversary’s behavior without even striking them. Zegart is the Davies Family Senior Fellow at the Hoover Institution and co-director of Stanford’s Center for International Security and Cooperation.

“Armed drones are likely to offer coercion ‘windows of opportunity’ in at least one important circumstance: states that have armed drones confronting states that do not,” she said. “As wars grow longer and less conclusive, armed drones enable states to sustain combat operations, making threats to ‘stay the course’ more believable.”

Zegart believes that drone technology is becoming a more effective instrument to change a state’s behavior than yesteryear’s more costly option of using ground troops or large-scale military movements in war or conflict.

“Drones may be turning deterrence theory on its head,” said Zegart, referring to the cost-benefit calculation a potential aggressor makes when assessing an attack.

Zegart’s focus is on next-generation drones, which are essentially unmanned fighter jets and are currently in development. She is not examining the use of existing drones like quadcopters and Reaper and Predator unmanned aerial vehicles.

 

Foreign military officers surveyed

Zegart’s research is based on surveys of 259 foreign military officers conducted between 2015 and 2017. Participants were highly experienced foreign military officers who were attending classes at the National Defense University and Naval War College.

A drone is an unmanned aircraft that can be piloted remotely to deliver a lethal payload to a specific target.

Today, Zegart said, many scholars are studying whether drone proliferation across the world could change the future of warfare.

“But even here the focus has been the implications for the use of force, not the threat of force,” she said.

 

New drones are more lethal than ever, offering greater speeds, ranges, stealth and agility, according to Zegart. The U.S. is ahead, but not alone, in using drones. Nine countries have already used armed drones in combat, and at least 20 more are developing lethal drone programs – including Russia and China.

“It is time for a rethink” about drones, Zegart said. Technological advances will soon enable drones to function in hostile environments better than ever before.

“Drones offer three unique coercion advantages that theorists did not foresee: sustainability in long duration conflicts; certainty of precision punishment, which can change the psychology of adversaries; and changes in the relative costs of war,” she said.

Threats involving a high cost may be actually less credible than assumed, said Zegart. Her findings challenge the belief of “cost signals,” a military strategy where a country threatens another with a high-cost option, such as ground troops, which is intended to show resolve.

Drones may actually signal a nation’s resolve more effectively because – as a low-cost option – they can be part of an enduring offensive campaign against an enemy.

“The advent of armed drones suggests that costly signals may no longer be the best or only path to threat credibility,” she said. As wars grow longer and less conclusive, a particular country’s test of resolve becomes “more about sustaining than initiating action.”

“In situations where a coercing state has armed drones but a target state does not, drones make it possible to implement threats in ways that impose vanishingly low costs on the coercer but disproportionately high costs on the target,” Zegart said.

 

Combat, coercion

Zegart said that throughout history, whenever a new military technology emerges, adversaries have basically faced two choices – either concede or innovate to overcome the other side’s advantage.

 

“There is no reason to expect drones will be any different. The more that drones are used for combat and coercion, the more likely it will be that others will develop drone countermeasures,” she said.

New weapons often evolve technologically before “game-changing ideas” occur about how to use them, Zegart added. This was true of submarines before World War I, tanks after World War I, airplanes (which originally replaced surveillance balloons and were not used to drop bombs until 1911), and nuclear weapons during the Cold War.

“While physicists in the Manhattan Project developed the first atom bomb in just three years, it took much longer to develop the conceptual underpinnings of deterrence that kept the Cold War cold,” she said.

Drones raise important questions about the role of machines in decision-making during conflict, Zegart said. For example, much has been debated and written about the ethical and legal issues raised by U.S. drone strikes, the usefulness of drone operations against terrorist groups and whether the Pentagon or CIA should control and operate the drones.

Such questions are likely to grow more “numerous and knotty” as drones and other technologies evolve, she said.

 

Media Contacts

Amy Zegart, Hoover Institution and Center for International Security and Cooperation: zegart@stanford.edu

Clifton B. Parker, Hoover Institution: (650) 498-5205, cbparker@stanford.edu

 

 

All News button
1
-

Abstract: The quotation in the title is taken from the memoirs of Boris Chertok, a leading Soviet missile designer.  In my talk I will examine significant shifts in Soviet thinking about nuclear war and military strategy in the 1960s and 1970s and discuss some of the implications of those shifts for strategic stability in the 1980s.  I will also explore the influence of the McNamara Pentagon on Soviet military strategy and Soviet thinking about deterrence and war-fighting.    

Speaker bio: David Holloway is the Raymond A. Spruance Professor of International History, a professor of political science, and an FSI senior fellow. He was co-director of CISAC from 1991 to 1997, and director of FSI from 1998 to 2003. His research focuses on the international history of nuclear weapons, on science and technology in the Soviet Union, and on the relationship between international history and international relations theory. His book Stalin and the Bomb: The Soviet Union and Atomic Energy, 1939-1956 (Yale University Press, 1994) was chosen by the New York Times Book Review as one of the 11 best books of 1994, and it won the Vucinich and Shulman prizes of the American Association for the Advancement of Slavic Studies. It has been translated into seven languages. The Chinese translation is due to be published later in 2018. Holloway also wrote The Soviet Union and the Arms Race (1983) and co-authored The Reagan Strategic Defense Initiative: Technical, Political and Arms Control Assessment (1984). He has contributed to the Bulletin of the Atomic Scientists, Foreign Affairs, and other scholarly journals.

Since joining the Stanford faculty in 1986 -- first as a professor of political science and later (in 1996) as a professor of history as well -- Holloway has served as chair and co-chair of the International Relations Program (1989-1991), and as associate dean in the School of Humanities and Sciences (1997-1998). Before coming to Stanford, he taught at the University of Lancaster (1967-1970) and the University of Edinburgh (1970-1986). Born in Dublin, Ireland, he received his undergraduate degree in modern languages and literature, and his PhD in social and political sciences, both from Cambridge University.

CISAC
Stanford University
Encina Hall, E214
Stanford, CA 94305-6165

(650) 723-1737 (650) 723-0089
0
Senior Fellow Emeritus at the Freeman Spogli Institute of International Studies
Raymond A. Spruance Professor of International History
0820stanford-davidholloway-238-edit.jpg
PhD

David Holloway is the Raymond A. Spruance Professor of International History, a professor of political science, and an FSI senior fellow. He was co-director of CISAC from 1991 to 1997, and director of FSI from 1998 to 2003. His research focuses on the international history of nuclear weapons, on science and technology in the Soviet Union, and on the relationship between international history and international relations theory. His book Stalin and the Bomb: The Soviet Union and Atomic Energy, 1939-1956 (Yale University Press, 1994) was chosen by the New York Times Book Review as one of the 11 best books of 1994, and it won the Vucinich and Shulman prizes of the American Association for the Advancement of Slavic Studies. It has been translated into seven languages, most recently into Chinese. The Chinese translation is due to be published later in 2018. Holloway also wrote The Soviet Union and the Arms Race (1983) and co-authored The Reagan Strategic Defense Initiative: Technical, Political and Arms Control Assessment (1984). He has contributed to the Bulletin of the Atomic Scientists, Foreign Affairs, and other scholarly journals.

Since joining the Stanford faculty in 1986 -- first as a professor of political science and later (in 1996) as a professor of history as well -- Holloway has served as chair and co-chair of the International Relations Program (1989-1991), and as associate dean in the School of Humanities and Sciences (1997-1998). Before coming to Stanford, he taught at the University of Lancaster (1967-1970) and the University of Edinburgh (1970-1986). Born in Dublin, Ireland, he received his undergraduate degree in modern languages and literature, and his PhD in social and political sciences, both from Cambridge University.

Faculty member at the Center for International Security and Cooperation
Affiliated faculty at the Center on Democracy, Development, and the Rule of Law
Affiliated faculty at The Europe Center
CV
Date Label
David Holloway Professor of Political Science, Professor of History CISAC, Stanford University
Seminars
-

Abstract: This research investigates why and how regional nuclear powers come to develop specific kind of nuclear delivery systems, especially a submarine-based ballistic missile (SSBN) force. In the second nuclear age, as new nuclear states develop sophisticated delivery systems including SSBNs, understanding the logic and process of their nuclear force development is essential for both regional and international security. The origins and development process of India’s nuclear submarine program suggests that nuclear force development is a historically contingent process. This data-driven research, based on newly declassified archival documents from the Indian archives and extensive oral history interviews, refutes teleological narratives that either argue for technological determinism or the need for projecting nuclear deterrence as the primary causal variables. By situating India’s nuclear submarine program in the organizational routines of its nuclear scientific bureaucracy, bureaucratic politics of its military-scientific complex and the military socialization of the Indian Navy, this research explains India’s most secretive military-scientific programs. This comprehensive empirical research, currently based on a single case study, also addresses an important theoretical question in the field of international security studies: why states develop specific kinds of weapon systems, including those for nuclear weapons delivery?  

Speaker bio: Prior to joining CISAC as a Nuclear Security Postdoctoral Fellow, Yogesh Joshi was an Associate Fellow in the Strategic Studies Program at the Observer Research Foundation, New Delhi. He recently received his PhD from Jawaharlal Nehru University specializing in Indian foreign and security policy. 

At CISAC, Yogesh is finishing a book manuscript on the history of India's nuclear submarine program. His research traces the origins, process and development of India's nuclear submarine program using multi-archival sources and extensive oral history interviews. Yogesh’s data-driven research posits that India’s nuclear submarine program was riddled with shifting motivations, ambivalent rationales and halting progress. Rather than being driven by a single coherent strategic plan, India stumbled upon a submarine-based nuclear deterrent. By situating the nuclear submarine program in India’s Cold War security policy, its nuclear policy, its naval strategy in the Indian Ocean, the bureaucratic politics of its military-scientific complex and its quest for technological prestige, this research is an attempt to understand path-dependency in one of India’s most secretive military-scientific programs. It not only has implications for explaining India's nuclear program and policy but also provides an avenue to explain the process of decision-making behind state's pursuance of specific kinds of nuclear delivery systems. This research is supported by the MacArthur foundation. 

He has held fellowships at George Washington University, King’s College London and Carnegie Endowment for International Peace, Washington DC. His research has appeared or is under review in Asian Security, International History Review, International Affairs, Survival, US Naval War College Review, Comparative Strategy, Harvard Asia Quarterly, India Review, Asia Policy, Journal of Asian Security and International Affairs, War on the Rocks, World Politics Review and The Diplomat. He has co-authored two books: The US ‘Pivot’ and Indian Foreign Policy: Asia's Emerging Balance of Power (Palgrave Macmillan, 2015) and India in Nuclear Asia: Regional Forces, Perceptions and Policies (Orient Blackswan (South Asia), forthcoming 2018; also forthcoming in fall 2018 by Georgetown University Press for the rest of the world). A short introduction on India’s Nuclear Policy was recently commissioned by Oxford University Press and has been accepted for publication in 2018. A monograph titled 'India’s Evolving Nuclear Force and Implications for U.S. Strategy in the Asia-Pacific' was published by the Strategic Studies Institute, US Army War College in 2016. 

Not in residence
0
yogesh_joshi.jpg
PhD

Prior to joining CISAC as a Nuclear Security Postdoctoral Fellow, Yogesh Joshi was an Associate Fellow in the Strategic Studies Program at the Observer Research Foundation, New Delhi. He recently received his PhD from Jawaharlal Nehru University specializing in Indian foreign and security policy. 

At CISAC, Yogesh is finishing a book manuscript on the history of India's nuclear submarine program. His research traces the origins, process, and development of India's nuclear submarine program using multi-archival sources and extensive oral history interviews. Yogesh’s data-driven research posits that India’s nuclear submarine program was riddled with shifting motivations, ambivalent rationales and halting progress. Rather than being driven by a single coherent strategic plan, India stumbled upon a submarine-based nuclear deterrent. By situating the nuclear submarine program in India’s Cold War security policy, its nuclear policy, its naval strategy in the Indian Ocean, the bureaucratic politics of its military-scientific complex and its quest for technological prestige, this research is an attempt to understand path-dependency in one of India’s most secretive military-scientific programs. It not only has implications for explaining India's nuclear program and policy but also provides an avenue to explain the process of decision-making behind state's pursuance of specific kinds of nuclear delivery systems. This research is supported by the Stanton Foundation. 

He has held fellowships at George Washington University, King’s College London and Carnegie Endowment for International Peace, Washington DC. His research has appeared or is forthcoming in Diplomacy and Statecraft, Asian Security, International History Review, International Affairs, Survival, US Naval War College Review, Comparative Strategy, Harvard Asia Quarterly, India Review, Asia Policy, Journal of Asian Security and International Affairs, War on the Rocks, World Politics Review and The Diplomat. He has co-authored two books: The US ‘Pivot’ and Indian Foreign Policy: Asia's Emerging Balance of Power (Basingstoke: Palgrave Macmillan, 2015) and India and Nuclear Asia: Forces, Doctrines and Dangers (Washington DC: Georgetown University Press, 2018).  A short introduction to India’s Nuclear Policy was recently published by Oxford University Press.  

 

Affiliates
CV
Yogesh Joshi Nuclear Security Postdoctoral Fellow CISAC
Seminars
-
Abstract: This paper explores Iraqi signaling after the 1991 Gulf War. The conventional wisdom argues that Iraq sent mixed signals to the outside world due to Saddam’s desire to balance deterrence and compliance with Security Council resolutions. Drawing on Iraqi primary sources, I explore how Iraqi officials debated their options, crafted signals, and how they interpreted the reception of these signals in the outside world. I argue that Iraqi regime was more rational, but also more dysfunctional, than previous work suggests.
  
Speaker bio: Målfrid Braut-Hegghammer is Associate Professor of Political Science at the University of Oslo. She has previously been a Junior Faculty Fellow at CISAC, Stanford University, and a pre- and post-doctoral fellow at the Belfer Center, Harvard University. She received her doctoral degree from London School of Economics in 2009, which received the Michael Nicholson Thesis Prize from BISA in 2010. She recently published Unclear Physics: Why Iraq and Libya failed to build nuclear weapons (Cornell University Press, 2016), which was reviewed in The New York Review of Books, Foreign Affairs, Survival, International Affairs, HDiplo, Babylon, and Internasjonal Politikk. Her work has been published in International Security, The Middle East Journal, the New York Times (online), International Herald Tribune, Monkey Cage and War on the Rocks.

Not in residence

0
Affiliate
Braut-Hegghammer,_Malfrid.jpg

Målfrid Braut-Hegghammer is an Associate Professor of Political Science at the University of Oslo. She first joined CISAC as a visiting associate professor and Stanton nuclear security junior faculty fellow in September 2012, and was a Stanford MacArthur Visiting Scholar between 2013-15. Between 2008 and 2010 she was a predoctoral and postdoctoral fellow at Harvard University's Belfer Center for Science and International Affairs. Braut-Hegghammer received her PhD, entitled “Nuclear Entrepreneurs: Drivers of Nuclear Proliferation” from the London School of Economics in 2010. She received the British International Studies Association’s Michael Nicholson Thesis Prize that same year for her work.

 

CV
Associate Professor of Political Science University of Oslo
Seminars
-

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information warfare (CEIW) leverages the features of modern information and communications technology to age-old techniques of propaganda, deception, and chaos production to confuse, mislead, and to influence the choices and decisions that the adversary makes—and a recent example of CEIW can be seen in the Russian hacks on the U.S. presidential election in 2016.  CEIW is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it.  Nor is it cyber war or cyber conflict as we have come to understand those ideas.  Some approaches to counter CEIW show some promise of having some modest but valuable defensive effect.  If better solutions for countering CEIW waged against free and democratic societies are not forthcoming, societal discourse will no longer be grounded in reason and objective reality—an outcome that can fairly be called the end of the Enlightenment.

Speaker bios: Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.  His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. He recently served on President Obama’s Commission on Enhancing National Cybersecurity.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

To read more about Herb Lin's interests, please read "An Evolving Research Agenda in Cyber Policy and Security."

Jackie Kerr is a Postdoctoral Research Fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory.  Her research examines cybersecurity and information security strategy, Internet governance, and the Internet policies of non-democratic regimes.  She was a 2015-2016 Science, Technology, and Public Policy (STPP) Pre-Doctoral Fellow with the Cyber Security Project at the Belfer Center for Science and International Affairs and Visiting Scholar at the Davis Center for Russian and Eurasian Studies at Harvard University and a Cybersecurity Predoctoral Fellow at Stanford University's Center for International Security and Cooperation in 2014-2015.  Jackie holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University.  She has held research fellowships in Russia, Kazakhstan, and Qatar, and has previous professional experience as a software engineer.

CISAC
Stanford University
Encina Hall, C236
Stanford, CA 94305-6165

650-497-8600
0
Senior Research Scholar at the Center for International Security and Cooperation
Hank J. Holland Fellow in Cyber Policy and Security, Hoover Institution
HerbertLin.jpg

Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.  His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in the use of offensive operations in cyberspace as instruments of national policy and in the security dimensions of information warfare and influence operations on national security.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. In 2016, he served on President Obama’s Commission on Enhancing National Cybersecurity.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Avocationally, he is a longtime folk and swing dancer and a lousy magician. Apart from his work on cyberspace and cybersecurity, he is published in cognitive science, science education, biophysics, and arms control and defense policy. He also consults on K-12 math and science education.

Herbert Lin Senior Research Scholar for Cyber Policy and Security CISAC, Stanford University
0
Affiliate
jaclyn_kerr.jpg
PhD

Jackie Kerr is a Senior Research Fellow for Defense and Technology Futures at the Center for Strategic Research (CSR) at National Defense University’s Institute for National Strategic Studies (INSS).  She is also a Nonresident Fellow with the Brookings Institution and an Adjunct Professor at Georgetown University.  Her work focuses on digital and emerging technologies and their current and future impacts on international politics, national security, and democracy.  She has conducted research and taught on the digital politics of authoritarian regimes, the role of information technologies in civil society and protest mobilization, cyber domain strategy, global Internet governance, the role of artificial intelligence in national security and foreign policy, and on the role of digital technologies in the politics of Russia, China, and Eurasia.  In 2019-2020 Dr. Kerr served as a AAAS Science and Technology Policy Fellow at the U.S. Department of State’s Office of the Science and Technology Advisor to the Secretary (STAS), where she advised on digital technology policy, particularly as it pertains to human rights, democracy, and national security.  From 2016 to 2019, she was a postdoctoral research fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory, where she led work on cybersecurity, cyber domain strategy, and information conflict.  Dr. Kerr was previously a Science, Technology, and Public Policy Fellow at Harvard University’s Belfer Center for Science and International Affairs, a Visiting Scholar at Harvard's Davis Center for Russian and Eurasian Studies, a Cybersecurity Fellow at Stanford University’s Center for International Security and Cooperation (CISAC), and has held research fellowships in Russia, Kazakhstan, and Qatar.  She also has prior professional experience as a software engineer with Comcast and Symantec.  Dr. Kerr holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University. 

CV
Jaclyn A. Kerr Lawrence Livermore National Laboratory; CISAC Affiliate
Seminars
Subscribe to Conflict