Terrorism
Authors
Martha Crenshaw
News Type
Q&As
Date
Paragraphs

Q&A with Martha Crenshaw, a senior fellow at FSI’s Center for International Security and Cooperation. Written with Katy Gabel Chui.

On Wednesday, President Trump announced he wants to pull troops out of Syria because the United States military had achieved its goal of defeating the Islamic State militant group there. In this Q&A, terrorism expert Martha Crenshaw addresses the president’s decision.

Has the U.S. defeated the Islamic State in Syria? What does “defeat” mean in this context?

U.S. leaders have talked optimistically about “defeating” first Al Qaeda and then the Islamic State since the declaration of a global war on terror in 2001. If it were possible to vanquish such an adversary on the battlefield through the application of superior military force, we would already have accomplished the mission. The Islamic State combines insurgency with transnational terrorism, and its operations flow easily across national borders. Since its beginnings in 2003, it has demonstrated a capacity for resilience and reconstitution — and for surprising us. The loss of the Caliphate has not changed this equation.

What regional impacts might this decision have?

The Iraqi government has not shown itself capable of providing the security or legitimacy that might undermine the appeal of the Islamic State. Despite [Syrian President] Assad’s ruthless consolidation of power with the aid of Iran and Russia, opposition to his regime will continue. If the American-supported Kurdish resistance is abandoned by the U.S. and then destroyed or weakened by Turkey, there will be even more scope and rationale for jihadists such as the Islamic State. Also, we shouldn’t forget that the Al Qaeda branch in Syria is still active.

What about in terms of the U.S. relationship with Russia and Iran versus with allies in the region?

It seems that the assumption behind the withdrawal is that the U.S. is willing to leave Syrian affairs to Russia and Iran and to allow Turkey to pursue an offensive against our Kurdish allies. We should probably call them “former allies” now. Turkey is likely to draw closer to Iran and Russia.

Some American military leaders have spoken up against this decision, calling it wrongheaded. Does that matter?

Probably not to the President’s decisions, but vocal military opposition would matter to Congress and other opinion leaders.

 

Views expressed here do not necessarily represent those of the Freeman Spogli Institute for International Studies or Stanford University, both of which are nonpartisan institutions.

 

Hero Image
All News button
1
Authors
Asfandyar Mir
News Type
Commentary
Date
Paragraphs

Many analystspractitioners, and scholars are skeptical of the efficacy of drone strikes for counterterrorism, suggesting that they provide short-term gains at best and are counterproductive at worst. However, despite how widespread these views are, reliable evidence on the consequences of drone strikes remains limited. My research on drone warfare and U.S. counterterrorism—some of which was recently published in International Security—addresses this issue by examining the U.S. drone war in Pakistan from 2004 to 2014. Contrary to the skeptics, I find that drone strikes in Pakistan were effective in degrading the targeted armed groups. And, troublingly, they succeeded in doing so even though they harmed civilians.

 

Three Key Findings

I have conducted research in Pakistan and the United States over the last few years, gathering new qualitative data on the politics of the war and its effects on the two main targets, al-Qaeda and the Pakistan Taliban. I have also evaluated detailed quantitative data on drone strikes and violence by al-Qaeda and the Pakistan Taliban. This research offers three important findings.

First, the U.S. drone war was damaging for the organizational trajectories of al-Qaeda and the Pakistan Taliban. I found that after the United States surged its surveillance and targeting capabilities in 2008, both groups suffered increasing setbacks; they lost bases, their operational capabilities were reduced, their ranks were checked by growing numbers of desertions, and the organizations fractured politically. These effects appear to have persisted until 2014. In a related paper, my University of Michigan colleague Dylan Moore and I show that during the drone program in the Waziristan region, violence by the two groups fell substantially.

Second, the U.S. drone war disrupted al-Qaeda and the Pakistan Taliban not just by killing their leaders and specialized rank-and-file members, but also by heightening the perceived risk of being targeted. Across a variety of empirical materials, including some collected through fieldwork, I found that both groups were direly constrained by the fear—a constant sense of anticipation—of drone strikes, which crippled routine movement and communication. In addition, leaders and rank-and-file jihadis regularly viewed each other with the suspicion of being spies for the drone program, which contributed to their organizational fragmentation.

Third, the notion of increased recruitment for al-Qaeda and the Pakistan Taliban due to civilian harm in drone strikes is questionable. In the local battlefield, I did not find evidence of any tangible increase in recruitment. Interviews with some surviving mid-level members of al-Qaeda and the Pakistan Taliban negated the impression that the groups benefited from a stream of angry recruits. Instead, a recurring theme was that they experienced desertions and manpower shortages because of the stress of operating under drones. To the extent that new recruits were available, both groups struggled to integrate them in their organizations because of the fear that they might be spies for the drone program.

 

Beyond Pakistan?

The U.S. drone war in Pakistan is a crucial case of U.S. counterterrorism policy, but it is one of many other campaigns. The U.S. government is waging such campaigns in Yemen and Somalia, and considering an expansion in the Sahara. In my work, I identify two factors which are important for the dynamics evident in Pakistan to hold generally.

First, the United States must have extensive knowledge of the civilian population where the armed group is based. The counterterrorism force needs such knowledge to generate intelligence leads on their targets, who are often hiding within the civilian population. This comes from detailed population data sharing by local partners, large-scale communication interception, and pattern-of-life analysis of target regions from sophisticated drones.

Second, the United States must be able to exploit available intelligence leads in a timely manner. As members of targeted armed groups consistently try to escape detection, most intelligence has a limited shelf life. The capability to act quickly depends on the bureaucratic capacity to process intelligence, decentralized decision-making for targeting, and rapid-strike capabilities like armed drones.

In Pakistan, the United States met these criteria with an abundance of technology and high-quality local partner cooperation. Starting in 2008, the United States mobilized a large fleet of drones and surveillance technologies to develop granular knowledge of the civilian population in the targeted regions. Despite deep political rifts on the conflict in Afghanistan, the Central Intelligence Agency obtained extensive covert support from Pakistani intelligence against al-Qaeda and the Pakistan Taliban, which enabled it to regularly locate targets. With ample targeting authority and armed drones operating from nearby bases, U.S. forces were able to exploit available leads.

In Yemen, however, the United States has struggled to develop knowledge of the civilian population and act on available intelligence. My interviews with U.S. officials and a leaked government document suggest that, until 2013, U.S. forces did not sustain aerial surveillance of targeted regions, the Yemeni state’s capacity in support of operations remained poor, and the targeting rules were stringent.

 

Implications for U.S. Counterterrorism Policy

The U.S. government’s preference for drone strikes is motivated by the desire to prevent attacks against the American homeland. My research suggests that the drone program has the potential to inflict enough damage on the targeted armed groups to upset their ability to plot and organize attacks in the United States.

The United States also deploys drone strikes to manage jihadi threats to allied regimes. In such cases, the political value of strikes depends, in part, on the capability of the local partner. An effective drone deployment can go a long way in providing a necessary condition for restoring order. But the local partner must ultimately step up to consolidate state control.

For example, President Obama’s drone policy degraded al-Qaeda and the Pakistan Taliban, securing the American homeland and substantially reducing the threat to the nuclear-armed Pakistani state. The Obama administration’s policy was sufficient because the Pakistani state was relatively capable and could build on the gains made by U.S. counterterrorism strikes. Indeed, Pakistan’s ground operations, although contentiously timed, consolidated those gains.

In contrast, in today’s Afghanistan, the U.S. government cannot rely on instruments of counterterrorism alone. U.S. officials realize that just degrading the Afghan Taliban and the Islamic State is unlikely to stabilize the country. The Afghan government remains so weak that it will struggle to consolidate territorial control even after substantial degradation of its armed foes.

Finally, a key limitation of counterterrorism strikes is that they cannot alleviate the ideological appeal of jihadi actors like al-Qaeda and the Islamic State. Strikes cannot substitute for efforts at countering online jihadi propaganda and de-radicalization. Thus, they should not be seen as a silver bullet that can defeat armed groups operating from safe havens and weak states.

 

Civilian Protection and Drone Strikes

Civilian harm in U.S. counterterrorism remains a vital challenge. While moral objections to civilian casualties are a powerful reason to reconsider drone operations, my research suggests that strategic concerns, like a surge in local violence or increased recruitment of targeted organizations, are not. In Pakistan, for example, drone strikes harmed civilians while also undermining al-Qaeda and Pakistan Taliban. Similarly, the U.S.-led counter-ISIL campaign in Iraq and Syria was very difficult for the civilian population, and yet also inflicted losses on the Islamic State.

If civilian casualties do not affect the strategic outcomes of counterterrorism campaigns, then the U.S. government must be convinced to protect civilians for purely moral reasons. How responsive might the U.S. government be to such appeals? It is unclear. The Obama administration was not transparent about the use of drone strikes. Under President Trump, the lack of transparency has worsened. Concerned policymakers and human rights activists must continue to push the U.S. government to be more transparent and to protect civilians caught up in counterterrorism campaigns.

 

Hero Image
All News button
1
Authors
Amy Zegart
News Type
Q&As
Date
Paragraphs

In a world complicated by terrorism, cyber threats and political instability, the private sector has to prepare for the unexpected. Amy Zegart, CISAC co-director, the Hoover Institution’s Davies Family Senior Fellow, and co-author (along with Condoleezza Rice) of Political Risk: How Businesses And Organizations Can Anticipate Global Insecurity, explains lessons learned in keeping cargo planes moving, hotel guests protected – and possibly coffee customers better served.  

Hero Image
All News button
1
Authors
News Type
News
Date
Paragraphs

Evolving drone technology will enable countries to make low-cost but highly credible threats against states and groups that do not possess drones, Stanford political scientist Amy Zegart found in new research.

Could the mere threat of using an armed drone ever coerce an enemy to change their behavior – without attacking them?

Yes, says Stanford political scientist Amy Zegart, who argues in a new research paper that countries that simply possess deadly, armed drones could change an adversary’s behavior without even striking them. Zegart is the Davies Family Senior Fellow at the Hoover Institution and co-director of Stanford’s Center for International Security and Cooperation.

“Armed drones are likely to offer coercion ‘windows of opportunity’ in at least one important circumstance: states that have armed drones confronting states that do not,” she said. “As wars grow longer and less conclusive, armed drones enable states to sustain combat operations, making threats to ‘stay the course’ more believable.”

Zegart believes that drone technology is becoming a more effective instrument to change a state’s behavior than yesteryear’s more costly option of using ground troops or large-scale military movements in war or conflict.

“Drones may be turning deterrence theory on its head,” said Zegart, referring to the cost-benefit calculation a potential aggressor makes when assessing an attack.

Zegart’s focus is on next-generation drones, which are essentially unmanned fighter jets and are currently in development. She is not examining the use of existing drones like quadcopters and Reaper and Predator unmanned aerial vehicles.

 

Foreign military officers surveyed

Zegart’s research is based on surveys of 259 foreign military officers conducted between 2015 and 2017. Participants were highly experienced foreign military officers who were attending classes at the National Defense University and Naval War College.

A drone is an unmanned aircraft that can be piloted remotely to deliver a lethal payload to a specific target.

Today, Zegart said, many scholars are studying whether drone proliferation across the world could change the future of warfare.

“But even here the focus has been the implications for the use of force, not the threat of force,” she said.

 

New drones are more lethal than ever, offering greater speeds, ranges, stealth and agility, according to Zegart. The U.S. is ahead, but not alone, in using drones. Nine countries have already used armed drones in combat, and at least 20 more are developing lethal drone programs – including Russia and China.

“It is time for a rethink” about drones, Zegart said. Technological advances will soon enable drones to function in hostile environments better than ever before.

“Drones offer three unique coercion advantages that theorists did not foresee: sustainability in long duration conflicts; certainty of precision punishment, which can change the psychology of adversaries; and changes in the relative costs of war,” she said.

Threats involving a high cost may be actually less credible than assumed, said Zegart. Her findings challenge the belief of “cost signals,” a military strategy where a country threatens another with a high-cost option, such as ground troops, which is intended to show resolve.

Drones may actually signal a nation’s resolve more effectively because – as a low-cost option – they can be part of an enduring offensive campaign against an enemy.

“The advent of armed drones suggests that costly signals may no longer be the best or only path to threat credibility,” she said. As wars grow longer and less conclusive, a particular country’s test of resolve becomes “more about sustaining than initiating action.”

“In situations where a coercing state has armed drones but a target state does not, drones make it possible to implement threats in ways that impose vanishingly low costs on the coercer but disproportionately high costs on the target,” Zegart said.

 

Combat, coercion

Zegart said that throughout history, whenever a new military technology emerges, adversaries have basically faced two choices – either concede or innovate to overcome the other side’s advantage.

 

“There is no reason to expect drones will be any different. The more that drones are used for combat and coercion, the more likely it will be that others will develop drone countermeasures,” she said.

New weapons often evolve technologically before “game-changing ideas” occur about how to use them, Zegart added. This was true of submarines before World War I, tanks after World War I, airplanes (which originally replaced surveillance balloons and were not used to drop bombs until 1911), and nuclear weapons during the Cold War.

“While physicists in the Manhattan Project developed the first atom bomb in just three years, it took much longer to develop the conceptual underpinnings of deterrence that kept the Cold War cold,” she said.

Drones raise important questions about the role of machines in decision-making during conflict, Zegart said. For example, much has been debated and written about the ethical and legal issues raised by U.S. drone strikes, the usefulness of drone operations against terrorist groups and whether the Pentagon or CIA should control and operate the drones.

Such questions are likely to grow more “numerous and knotty” as drones and other technologies evolve, she said.

 

Media Contacts

Amy Zegart, Hoover Institution and Center for International Security and Cooperation: zegart@stanford.edu

Clifton B. Parker, Hoover Institution: (650) 498-5205, cbparker@stanford.edu

 

 

All News button
1
Paragraphs

Research brief: How plots come to fail or to be foiled is of great importance to the study of terrorism and to the development of counterterrorism policy. There can be no comprehensive picture of the threat without analyzing what adversaries planned to do as well as what they actually managed to accomplish. Examining failed and foiled plots is essential to understanding their intentions as well as their capabilities. This specific project, “Comparing Failed, Foiled, Completed and Successful Terrorist Attacks,” examines jihadist plots in the United States (121 plots) and selected allied countries (314 plots) occurring between 1993 and 2017. The full report can be found here: 

.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
National Consortium for the Study of Terrorism and Responses to Terrorism
Authors
Martha Crenshaw
Martha Crenshaw
Erik Dahl
Margaret Wilson
-

Abstract: It has been more than a decade since the UN Security Council enacted Resolution 1540—the most far-reaching of international instruments to counter Weapons of Mass Destruction (WMD) terrorism. It requires states to adopt and enforce effective laws to keep WMD materials outside the reach of terrorists. Scholars and policy makers compliment 1540 for making WMD trafficking illegal, for raising awareness of threats and increasing states’ capacity to reduce them. In 2017, one hundred and seventy-six states reported to the UN on domestic measures they took to comply with 1540. These numbers may produce a false sense of confidence in universal implementation of 1540. The threat of WMD terrorism remains potent. Allegations of ISIS using mustard agents against the Kurds, North Korea shipping chemicals to Syria or middlemen trafficking nuclear materials via Moldova suggest that the international response to WMD smuggling has not achieved its desired results. It is, therefore, important to evaluate the UN’s role in preventing WMD terrorism, and explore ways to further strengthen it. Drawing on interviews, fieldwork and observation data, this talk will examine the 1540 regime’s setup and its performance. It will outline policy options to improve the international counter-proliferation and counter-terrorism regime.

Speaker  bio:  Sarah Shirazyan is a Nuclear Security Postdoctoral Fellow at CISAC. Her research is funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council Resolution 1540 in preventing terrorists from accessing Weapons of Mass Destruction. Sarah designed Interpol-Stanford policy lab and serves as a Lecturer in Law at Stanford Law School. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of Gerald J. Lieberman Award.

In addition to her academic experience, Sarah has held multiple posts with leading tech companies and international organizations. Sarah worked at Facebook’s Global Policy Team, where she developed company’s engagement strategies with inter-governmental organizations. Ms. Shirazyan also designed the data protection and privacy curricula for legal professionals at the Council of Europe. Prior to that, Ms. Shirazyan was a Drafting Lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N. Office for Disarmament Affairs; and handled international drug cartel investigation cases at the INTERPOL Secretariat. 

0
sarahshirazianrsd17_076_0298a.jpg
J.S.D.

Sarah Shirazyan is a leading expert in technology law and policy, misinformation, and responsible AI development. She is a Lecturer in Law at Stanford Law School, where she teaches a course on combating misinformation online. She also serves as a Director and Head of Meta's GenAI Product Policy work, overseeing the development and implementation of company-wide policies governing the responsible use of generative AI technologies. In this role, Dr. Shirazyan advises product and engineering teams to ensure trust, safety, and ethical innovation across Meta's platforms. Previously, she led the company’s efforts to inform its misinformation and algorithmic ranking policies through engaging with experts across the globe.

Prior to joining tech industry, Dr. Shirazyan held multiple posts with leading international organizations—she was a data protection consultant for the Council of Europe; served as human right lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N.; and handled international drug cartel investigation cases at INTERPOL.

From 2017-2020, she designed and ran Interpol-Stanford Policy Lab at Stanford Law. From 2017-2018, Dr. Shirazyan was a Nuclear Security Postdoctoral Fellow at CISAC. Her research was funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council’s response to WMD terrorism. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of the Gerald J. Lieberman Award.

Her work has been published in Journal for National Security Law and Policy, Lawfare, Just Security, Stanford Journal of Online Trust and Safety, Arms Control Today, and Project on Nuclear Issues by Center for Strategic and International Studies (CSIS).

Publications

CISAC Affiliate
Date Label
Sarah Shirazyan CISAC
Seminars
-

Abstract: Why do moderate majorities often fail to coordinate opposition to extremist minorities? This paper offers an explanation for the microfoundations of moderate mobilization in the face of extremist minorities using the case of Islamist extremism in Indonesia. In particular, I show that moderates and extremists face asymmetric costs in the decision to voice their true preferences resulting in a coordination dilemma for moderates, which I call the “Moderates’ Dilemma.” An original survey experiment and observational data of participant behavior during two additional surveys demonstrate that moderates hide anti-violent views for fear of reputation costs and that these effects vary by individuals’ sensitivity to reputation costs and degree of uncertainty of others’ attitudes. These findings suggest that over 16 million Indonesians may be hiding moderate preferences and have significant implications for countering violent extremism policies globally. 

Speaker Bio: Kerry Ann Carter Persen is a Carnegie Predoctoral Fellow at CISAC for the 2017-2018 academic year and a Ph.D. Candidate in the Department of Political Science at Stanford University. Her research focuses on the impact of violent extremism on political behavior in the Islamic World.

In her dissertation, she develops a theory of the microfoundations of moderate mobilization against extremist groups using the case of Islamist extremism in Indonesia.  Employing fieldwork, survey data, and observational data, she shows that moderates and extremists face asymmetric costs in the decision to voice their private preferences publicly. This asymmetry results in a failure of moderates to act collectively in line with their individual beliefs, a coordination dilemma called the “Moderates Dilemma.”
 
Kerry’s research has been supported by the National Science Foundation, the U.S. Institute for Peace, the Horowitz Foundation, the National Consortium for the Study of Terrorism and Responses to Terrorism (START), and the Vice Provost for Graduate Education at Stanford University, among others.
 
Prior to graduate school, Kerry spent a Fulbright year in Indonesia and worked at the U.S-Indonesia Society in Washington, D.C. She graduated summa cum laude from Bowdoin College with a double major in Government and Economics.
0
kp_headshot_2023.jpeg

Dr. Kerry Ann Carter Persen is an expert in the intersection of technology and societal concerns, particularly countering violent extremism, dual use and emerging technologies, and misinformation. She currently works on Stripe’s Public Policy team and is a Security Fellow at the Truman National Security Project. 

Previously, Kerry has worked on the Global Policy team at Meta on AR/VR technologies and data privacy issues, at the Institute for the Future on misinformation and as a political consultant at RiceHadleyGates LLC, a strategic consulting firm led by former Secretary of State Condoleezza Rice, former National Security Advisor Stephen Hadley and former Secretary of Defense Robert Gates. She has also been a Fellow at Stanford's Center for International Security and Cooperation, a Minerva Fellow at the U.S. Institute for Peace, a Fellow at the Berkley Center for Religion, Peace & World Affairs at Georgetown University, and a Fulbright Fellow in Indonesia.

Kerry received her Ph.D. from the Department of Political Science at Stanford University, where her research was supported by the National Science Foundation, the Horowitz Foundation, and the National Consortium for the Study of Terrorism and Responses to Terrorism (START), among others. She graduated summa cum laude from Bowdoin College with a double major in Government and Economics.

Affiliate
Predoctoral Fellow CISAC
Seminars
Paragraphs

Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign. After years of wars, ever more intensive and pervasive surveillance, enhanced security measures at major transportation centers, and many attempts to explain who we are fighting and why and how to fight them, the threats continue to multiply.

So, too, do our attempts to understand just what terrorism is and how to counter it.

Two leaders in the field of terrorism studies, Martha Crenshaw and Gary LaFree, provide a critical look at how we have dealt with the terror threat over the years. They make clear why it is so difficult to create policy to counter terrorism. The foes are multiple and often amorphous, the study of the field dogged by disagreement on basic definitional and methodological issues, and the creation of policy hobbled by an exacting standard: the counterterrorist must succeed all the time, the terrorist only once. As Countering Terrorism shows, there are no simple solutions to this threat.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press
Authors
Martha Crenshaw
Gary LaFree
Paragraphs

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z. George and Harvey Rishikof that provides practitioners' insights into the operation, missions, and organizational cultures of the principal national security agencies and other institutions that shape the U.S. national security decision-making process. Unlike some textbooks on American foreign policy, it offers analysis from insiders who have worked at the National Security Council, the State and Defense Departments, the intelligence community, and the other critical government entities. The book explains how organizational missions and cultures create the labyrinth in which a coherent national security policy must be fashioned. Understanding and appreciating these organizations and their cultures is essential for formulating and implementing it. Taking into account the changes introduced by the Obama administration, the second edition includes four new or entirely revised chapters (Congress, Department of Homeland Security, Treasury, and USAID) and updates to the text throughout. It covers changes instituted since the first edition was published in 2011, implications of the government campaign to prosecute leaks, and lessons learned from more than a decade of war in Afghanistan and Iraq. This up-to-date book will appeal to students of U.S. national security and foreign policy as well as career policymakers.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Georgetown University Press
Authors
Thomas Fingar
-

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea, Iran and Russia, and will assess President Trump’s relations with the U.S. intelligence community. 

About the Speaker: General Michael Hayden is a retired four-star general who served as director of the Central Intelligence Agency and the National Security Agency when the course of world events was changing at a rapid rate. As head of the country’s premier intelligence agencies, he was on the frontline of global change, the war on terrorism and the growing cyber challenge. He understands the dangers, risks, and potential rewards of the political, economic, and security situations facing us. General Hayden dissects political situations in hot spots around the world, analyzing the tumultuous global environment and what it all means for Americans and America’s interests. He speaks on the delicate balance between liberty and security in intelligence work, as well the potential benefits and dangers associated with the cyber domain. As the former head of two multi-billion dollar enterprises, he can also address the challenges of managing complex organizations in times of stress and risk, and the need to develop effective internal and external communications.

In addition to leading CIA and NSA, General Hayden was the country’s first principal deputy director of national intelligence and the highest-ranking military intelligence officer in the country.  In all of these jobs, he worked to put a human face on American intelligence, explaining to the American people the role of espionage in protecting both American security and American liberty.  Hayden also served as commander of the Air Intelligence Agency and Director of the Joint Command and Control Warfare Center and served in senior staff positions at the Pentagon, at U.S. European Command, at the National Security Council, and the U.S. Embassy in Bulgaria. He was also the deputy chief of staff for the United Nations Command and U.S. Forces in South Korea.

Hayden has been a frequent expert and commentator on major news outlets and in top publications, valued for his expertise on intelligence matters like cyber security, government surveillance, geopolitics, and more. He was featured in the HBO documentary Manhunt, which looked at espionage through the eyes of the insiders who led the secret war against Osama bin Laden, and in Showtime’s The Spymasters, a detailed look at the directors of the Central Intelligence Agency.

Hayden is currently a principal at the Chertoff Group and a distinguished visiting professor at the George Mason University Schar School of Policy and Government. He is on the board of directors of Motorola Solutions and serves on a variety of other boards and consultancies. In 2013, the Intelligence and National Security Alliance (INSA) awarded Hayden the 29th annual William Oliver Baker Award.  General Hayden is also the first recipient of the Helms Award presented by the CIA Officers’ Memorial Foundation.  In 2014 he was the inaugural Humanitas visiting professor in intelligence studies at Oxford University in the United Kingdom.  His recent memoir, Playing to the Edge: American Intelligence in the Age of Terror, has been a New York Times best-seller and was recently selected as one of the 100 most notable books of 2016.

Philip Taubman is Adjunct Professor at the Center for International Security and Cooperation. He is also the former Moscow and Washington Bureau Chief, and Deputy Editorial Page Editor, of The New York Times. Philip Taubman served as a reporter and editor at The New York Times for thirty years, specializing in national security coverage. He is author of Secret Empire: Eisenhower, the CIA, and the Hidden Story of America’s Space Espionage, and The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb. He is working on a biography of George P. Shultz, the former secretary of state.

Michael Hayden Former director, CIA, NSA
Seminars
Subscribe to Terrorism