Conflict
Authors
Siegfried S. Hecker
News Type
Commentary
Date
Paragraphs

Stanford nuclear scientist and CISAC senior fellow Siegfried S. Hecker explains in this article in 38 North why North Korea's recent nuclear test is "deeply alarming" and what Washington's possible policy options are going forward. An excerpted passage is below:

 

On September 9, 2016, seismic stations around the world picked up the unmistakable signals of another North Korean underground nuclear test in the vicinity of Punggye-ri. The technical details about the test will be sorted out over the next few weeks, but the political message is already loud and clear: North Korea will continue to expand its dangerous nuclear arsenal so long as Washington stays on its current path.

 

Preliminary indications are that the test registered at 5.2 to 5.3 on the Richter scale, which translates to an explosion yield of approximately 15 to 20 kilotons, possibly twice the magnitude of the largest previous test. It appears to have been conducted in the same network of tunnels as the last three tests, just buried deeper into the mountain. This was the fifth known North Korean nuclear explosion; the second this year, and the third since Kim Jong Un took over the country’s leadership in December 2011. Continue reading

Hero Image
noth korean nuclear bomb explosion
People watch a news report on North Korea's first hydrogen bomb test at a railroad station in Seoul on January 6, 2016.
JUNG YEON-JE/AFP/Getty Images
All News button
1
Paragraphs

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity. Which type of attribution is relevant depends on the goals of the relevant decision maker. Further, attribution is a multi-dimensional issue that draws on all sources of information available, including technical forensics, human intelligence, signals intelligence, history, and geopolitics, among others. From the perspective of the victim, some degree of factual uncertainty attaches to any of these types of attribution, although the last type—attribution to an ultimately responsible party—also implicates to a very large degree legal, policy, and political questions. But from the perspective of the adversary, the ability to conceal its identity from the victim with high confidence is also uncertain. It is the very existence of such risk that underpins the possibility of deterring hostile actions in cyberspace.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Social Science Research Network
Authors
Herbert Lin
-

Abstract: What role do negotiations play in the midst of interstate wars? Extant scholarship has largely treated negotiations as being irrelevant to understanding a conflict's trajectory, or as being a direct reflection of hostilities on the battlefield. Neither view is supported by historical readings or empirical patterns of intra-war diplomacy. I present an alternative view of negotiations as being instrumental. Diplomatic bargaining not only occurs in response to battlefield outcomes, but is also used deceptively by disadvantaged belligerents to stall for time, manage political pressures, and regroup militarily. Using two new daily-level datasets of battles and diplomatic activity, I show that negotiations in post-1945 wars extend conflict when the war initiator has an advantage in fighting, occur in response to lop-sided battle outcomes, dampen the intensity of combat, and are associated with subsequent improvements in the war target's success on the battlefield. This framework of instrumental negotiations shows that the effect of intra-war diplomacy is conditional on the state of hostilities, and has substantial implications on our understanding of war termination and conflict resolution.

About the Speaker: Eric Min is a CISAC Predoctoral Fellow for 2016-2017 and a Ph.D. candidate in political science at Stanford University. His research is focused on interstate diplomacy, information gathering and sharing during crises, and applications of machine learning and text analysis techniques to declassified documents related to conflict and foreign policy. 

His dissertation develops a theory regarding the strategic use of negotiations as a tool of war. Utilizing two new daily-level datasets of battles and diplomatic activity across all interstate wars since 1816, digitized versions of military operations reports and negotiation transcripts from the Korean War, and a series of case studies, he shows that states dynamically weigh costs and benefits with respect to “instrumental” negotiations. His findings demonstrate when, why, and how diplomacy is not only used to settle wars, but also to help win them. These conclusions have substantial implications on academic and policy-making approaches to conflict resolution.  
Eric is a National Science Foundation Graduate Research Fellow. He has also received support from Stanford's Institute for Research in the Social Sciences (IRiSS) and the Center for International Cooperation and Negotiation (SCICN). Eric received his undergraduate degree in International Relations and Spanish/Linguistics at New York University, where he was valedictorian of the College of Arts and Science.

Encina Hall, 2nd floor

0
ericmin_rsd17_076_0432a.jpg

Eric Min is Associate Professor of Political Science at UCLA. He is received his Ph.D. in Political Science from Stanford University, where he was the Zukerman Postdoctoral Fellow at the Center for International Security and Cooperation for the 2017-2018 academic year. He was a Henry Frank Guggenheim Foundation Distinguished Scholar in 2021-22.

Min's primary research interests include the intersection of interstate war and diplomacy; international security and conflict management; and the application of machine learning, text, and statistical methods to study these topics. His work is published in the American Political Science Review, International Organization, Journal of Conflict Resolution, Journal of Peace Research, and the Journal of Strategic Studies.

His dissertation, entitled “Negotiation in War,” was the recipient of the 2018 Kenneth Waltz Dissertation Prize from APSA’s International Security Section. Min’s book, titled Words of War: Negotiation as a Tool of Conflict, is part of the Studies in Security Affairs series at Cornell University Press.

Affiliate
CV
Date Label
Eric Min Predoctoral Fellow CISAC
Seminars
-

Abstract: The Army is in a period of Transition and Transformation, where the wars of Iraq and Afghanistan are supposed to be over or winding down, in theory enabling the force to rebalance and refocus our efforts.  Though we have been here before with many post-war and conflict periods, the Army and DoD are in actuality presented with possibly the most complex set of challenges and threats to the Army’s mission and to national security as a whole this nation has experienced.  While the Budget Control Act is currently preventing any strategic planning for operations, training, personnel forecasting and management, and R&D/Acquisition investment, all key factors for input into any strategy, the myriad threats to national security and in global competition are on the rise.  Resources and focus are down; threats and competition are going up.  China’s rapid development and matching need for resources, such as those in Africa and the South China Seas; a reemerging Russia, bent on disrupting NATO efforts to expand while simultaneously persisting in efforts to expand their reach in the Arctic and the Middle East and disrupt U.S. interests where it can in the “Grey Zone” of conflict; an unstable and possibly nuclear weapons-capable North Korea; an Iran that will be nuclear-armed and looking to maintain Shia hegemony in the Middle East and defeat U.S. interests in the region; and existing and emerging transnational terrorist organizations and states, such as Daesh/ISIL; innovative and widely-available technologies in cyberwarfare, unmanned aerial systems, dynamic shifts in regional and global demographics, information and liberation technology, and even the U.S. national debt round out a list of our current and future national security challenges.

SECDEF Ash Carter has articulated that the DoD is looking for a Third Offset Strategy to keep our unique hedge of capabilities against many, if not all of these threats and conditions.  Unfortunately, neither the First nor Second Offset were devised as such and only came into their being once key technologies and applications were developed against a much smaller list of threats and capabilities than we face now.

The key question is then, how does the Army, with these challenges, limitations, and threats, create opportunities now that assist a Third Offset Strategy?  Or at least, how are we going to fight and win our nations’ wars in the near and far-term?

About the Speaker: COL J.B. Vowell has served as an Infantry Officer in the U.S. Army for over 25 years.  He has had a variety of postings, including Europe, the Pacific, Iraq, Egypt, and Afghanistan.  He was a combat leader in both the Surge in Iraq, 2006-2007 and the Surge in Afghanistan, 2010-2011.  He currently serves as Army Chief of Staff GEN Mark Milley’s Senior Fellow to Brookings Institution, where he works to assist in the development of policy and strategy with research towards Land Warfare, 2030-2050 and the Human Domain of Battle.

COL Vowell commanded 2d battalion, 327th Infantry (“No Slack”) in the 1st Brigade Combat Team, 101st Airborne Division, Fort Campbell, KY.  During this 2.5-year command, COL Vowell trained and deployed his Infantry Task Force to Kunar and Nangarhar provinces in support of Operation Enduring Freedom XI in Afghanistan.  During this year-long deployment, COL Vowell and his task force of more than 1,000 men and women were deployed along the Pakistan-Afghanistan border, dealing with local, national and international issues at the tactical, operational and strategic levels of policy and diplomacy.  The documentary film, The Hornet’s Nest, features the numerous missions and heroic fights during this challenging combat deployment.

COL Vowell then commanded 3rd Brigade Combat Team (“Rakkasans”), 101st Airborne Division (Air Assault), from 2013-2015.  COL Vowell led the Brigade's deployment to Afghanistan for ISAF and Operation Resolute Support (RS) from January 2015-October 2015, where his task force led the efforts to train, advise, and assist Afghan Army and Police efforts across Eastern Afghanistan to defeat Taliban, al-Qaeda, and newly-formed ISIL efforts to destabilize the country.

COL Vowell’s military and civilian education includes the United States Army Command and General Staff College, the School of Advanced Military Studies (SAMS), and he was a War College Fellow to Stanford and CISAC from 2012-2013. He holds a Bachelor of Science degree (Biology) from the University of Alabama and a Master of Science degree in Human Resources Management from Troy State University and a Masters of Arts in Theater Operations from the U.S. Army Command and General Staff College.

 

Encina Hall, 2nd floor

Infantry Officer U.S. Army
Seminars
-
Abstract: Grand strategy represents a state's overarching theory of what constitutes national security and how best to produce national security. Do U.S. presidential administrations have grand strategies? If so, do these theoretical frameworks shape the actual practice of American foreign policy? This seminar addresses these questions, focusing on the grand strategies of the Bush and Obama administrations and American foreign policy in the Middle East since 9/11. 
 
About the Speaker: Dr. Colin Kahl is the National Security Advisor to the Vice President and Deputy Assistant to the President. He is on public service leave from Georgetown University, where he is an associate professor in the Security Studies Program at the Edmund A. Walsh School of Foreign Service. He previously served as the Deputy Assistant Secretary of Defense for the Middle East at the Pentagon (2009-2011), where he received the Outstanding Public Service Medal in 2011.  He has published articles on U.S. foreign and defense policy in the Middle East in Foreign Affairs, Foreign Policy, International Security, the Los Angeles Times, Middle East Policy, the National Interest, the New York Times, the Washington Post, and the Washington Quarterly. Kahl's previous research, including his book States, Scarcity, and Civil Strife in the Developing World (Princeton, 2006), focused on the causes of civil and ethnic conflict. Kahl received his B.A. in political science from the University of Michigan (1993) and his Ph.D. in political science from Columbia University (2000).

Encina Hall, 2nd floor

Colin Kahl National Security Advisor to the Vice President, Deputy Assistant to the President Office of the Vice President
Seminars
-

Lunch will be served. Please RSVP to allow for an accurate headcount.

Abstract: Dr. Johnston will present a preliminary analysis of some of the tensions between inter-state crisis management principles (as accepted by many Chinese crisis management experts) and concepts for the use of cyber weapons in military conOlicts being developed by the Chinese military.

About the Speaker: Alastair Iain Johnston is The Governor James Albert Noe and Linda Noe Laine Professor of China in World Affairs at Harvard University and a visiting fellow at the Hoover Institution in summer 2016. He has written on socialization theory, identity and foreign policy, and strategic culture, mostly with application to the study of China’s foreign policy and East Asian international relations.

Alastair Iain Johnston Harvard University
Seminars
Authors
News Type
Commentary
Date
Paragraphs

CISAC senior fellow Scott Sagan decodes the enduring lessons and secret messages hidden in the hauting battlefield drawings of the Lakota Chief known as Red Horse, who fought against Lt. Col George Custer and his Seventh Cavalry forces during their infamous defeat in 1876, in this story for the New York Times' Sunday Review section.

 

Hero Image
An eyewitness drawing from the Battle of Little Bighorn by the Lakota Chief known as Red Horse.
An eyewitness drawing from the Battle of Little Bighorn by the Lakota Chief known as Red Horse.
National Anthropological Archives/Smithsonian Institution
All News button
1
-

Abstract:  In recent decades, social scientists have begun to employ the rigorous research methods that used to be the province of the natural sciences. This evidence-based approach has revolutionized how academic work is judged, how policies are created and evaluated and, now, how war is viewed. At the forefront of this movement, the Empirical Studies of Conflict Project (ESOC) has developed a large body of evidence on conflict that enables a new perspective on the causes and effects of violence. Information and War presents a new framework to understand the conflicts that have prevailed since World War II and the kind in which the US was so recently embroiled: asymmetric contests where a greater power struggles to contain an insurgency.

About the Speakers: Dr. Joseph Felter joined CISAC as a senior research scholar in September 2011.

Felter retired from the US Army as a Colonel following a career as a Special Forces and foreign area officer with distinguished service in a variety of special operations and diplomatic assignments. He has conducted foreign internal defense and security assistance missions across East and Southeast Asia and has participated in combat deployments to Panama, Iraq, and Afghanistan.

Prior to arriving at CISAC, he led the International Security and Assistance Force, Counterinsurgency Advisory and Assistance Team (CAAT) in Afghanistan reporting directly to Gen. Stanley McChrystal and Gen. David Petraeus and advising them on counterinsurgency strategy. Felter held leadership positions in the US Army Rangers and Special Forces and directed the Combating Terrorism Center (CTC) at West Point from 2005-2008. He is Co-Director of the Empirical Studies of Conflict Project (ESOC) and a research fellow at the Hoover Institution.

He has published many scholarly articles on the topic of  counterinsurgency and has focused on the study of how to address the root causes of terrorism and political violence. Some highlights include: “Aid Under Fire: Development Projects and Civil Conflict” with Benjamin Crost and Patrick Johnston (American Economic Review), "Can Hearts and Minds be Bought? The Economics of Counterinsurgency in Iraq," with Eli Berman and Jacob N. Shapiro (Journal of Political Economy), and "Do Working Men Rebel? Insurgency and Unemployment in Afghanistan, Iraq, and the Philippines," with Eli Berman, Michael Callen, and Jacob N. Shapiro (Journal of Conflict Resolution).

Felter holds a BS from West Point, an MPA from the Harvard Kennedy School of Government, and a PhD in Political Science from Stanford University.

Dr. Jacob N. Shapiro is Associate Professor of Politics and International Affairs at Princeton University and co-directs the Empirical Studies of Conflict Project. His active research projects study political violence, economic and political development in conflict zones, security policy, and urban conflict. He is author of The Terrorist’s Dilemma: Managing Violent Covert Organizations. His research has been published or is forthcoming in broad range of academic and policy journals including American Journal of Political Science, Foreign Affairs, Foreign Policy, International Organization, International Security, Journal of Political Economy, and World Politics as well as a number of edited volumes. Shapiro is a term member of the Council on Foreign Relations, an Associate Editor of World Politics, a Faculty Fellow of the Association for Analytic Learning about Islam and Muslim Societies (AALIMS), a Research Fellow at the Center for Economic Research in Pakistan (CERP), and served in the U.S. Navy and Naval Reserve. Ph.D. Political Science, M.A. Economics, Stanford University. B.A. Political Science, University of Michigan.

 

Senior research scholar CISAC, Stanford University
Jacob N. Shapiro Associate Professor of Politics and International Affairs Princeton University
Seminars
Paragraphs

An affiliate of the largest and most powerful Kurdish party in Syria, the Democratic Union Party (PYD), opened its first official mission abroad — in Moscow. Given the amount of military and political support the PYD has received from the United States, this decision is likely to be received with some shock and confusion in the West. But a closer examination of the PYD’s historical experience and core interests suggests that the politics behind a potential realignment with Moscow makes strategic sense.

All Publications button
1
Publication Type
Blogs
Publication Date
Journal Publisher
Monkey Cage (Washington Post)
Authors
Paragraphs

Conditional cash transfer (CCT) programs are an increasingly popular tool for reducing poverty in conflict affected areas. Despite their growing popularity, there is limited evidence on how CCT programs affect conflictand theoretical predictions are ambiguous. We estimate the effect of conditional cash transfers on civil conflict in the Philippines by exploiting an experiment that randomly assigned eligibility for a CCT program at the village level. We find that cash transfers caused a substantial decrease in conflict-related incidents in treatment villages relative to control villages in the first nine months of the program. Using unique data on local insurgent influence, we also find that the program reduced insurgent influence in treated villages. An analysis of possible spillovers yields inconclusive results. While we find no statistical evidence of spillovers, we also cannot rule out that the village level effect was due to displacement of insurgent activity from treatment to control villages.

This journal article can be accessed below.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Development Economics
Authors
Subscribe to Conflict