Migration and Citizenship (Society)
-

Martha Crenshaw is the Colin and Nancy Campbell Professor of Global Issues and Democratic Thought and Professor of Government at Wesleyan University, in Middletown, Conn., where she has taught since 1974. She has written extensively on the issue of political terrorism; her first article, "The Concept of Revolutionary Terrorism," was published in the Journal of Conflict Resolution in 1972. Her recent work includes the chapter on "Coercive Diplomacy and the Response to Terrorism," in The United States and Coercive Diplomacy (United States Institute of Peace Press), "Terrorism, Strategies, and Grand Strategies", in Attacking Terrorism (Georgetown University Press), and "Counterterrorism in Retrospect" in the July-August 2005 issue of Foreign Affairs. She serves on the Executive Board of Women in International Security and chairs the American Political Science Association Task Force on Political Violence and Terrorism.

She has served on the Council of the APSA and is a former president and councilor of the International Society of Political Psychology (ISPP). In 2004 ISPP awarded her its Nevitt Sanford Award for Distinguished Scientific Contribution and in 2005 the Jeanne Knutson Award for service to the society. She serves on the editorial boards of the journals International Security, Orbis, Political Psychology, Security Studies, and Terrorism and Political Violence. She coordinated the working group on political explanations of terrorism for the 2005 Club de Madrid International Summit on Democracy, Terrorism and Security. For the next three years she will be a lead investigator with the new National Center for the Study of Terrorism and the Response to Terrorism at the University of Maryland, funded by the Department of Homeland Security. She is also the recipient of a John Simon Guggenheim Memorial Foundation Fellowship in 2005-2006. She serves on the Committee on Law and Justice and the Committee on Determining Basic Research Needs to Interrupt the Improvised Explosive Device Delivery Chain of the National Research Council of the National Academies of Science. Her current research focuses on why the U.S. is the target of terrorism and the distinction between "old" and "new" terrorism, as well as how campaigns of terrorism come to an end.

Reuben W. Hills Conference Room

Martha Crenshaw Colin and Nancy Campbell Professor of Global Issues and Democratic Thought and professor of government at Speaker Wesleyan University
Seminars
Paragraphs

Paul Collier and Anke Hoeffler at Oxford University have reported that countries with a higher percentage of national income from primary commodity exports have been more prone to civil war, an interesting finding that has received much attention from policy makers and the media. In this paper, James Fearon shows that this result is quite fragile, even using Collier and Hoeffler's data. Minor changes in the sample framing and the recovery of missing data undermine it. To the extent that there is an association, it is likely because oil is a major component of primary commodity exports and substantial oil production does associate with civil war risk. Fearon argues that oil predicts civil war risk not because it provides an easy source of rebel start-up finance but probably because oil producers have relatively low state capabilities given their level of per capita income and because oil makes state or regional control a tempting "prize." An analysis of data on government observance of contracts and investor-perceived expropriation risk is consistent with this hypothesis.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Conflict Resolution
Authors
James D. Fearon
Authors
Lawrence M. Wein
News Type
Commentary
Date
Paragraphs
The president's border security and immigration reform proposals won't protect Americans from the gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon. To tackle this problem, policymakers need to think inside the box, write CISAC's Lawrence M. Wein and colleague Stephen E. Flynn in this New York Times op-ed.

This week President Bush will seek to focus the nation's attention on border security and immigration reform. But the president's proposals won't protect Americans from our gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon.

The Bush administration maintains that it has a smart strategy to reduce this risk. A new 24-Hour Rule requires that importers report the contents of their containers to customs inspectors one day before the boxes are loaded on ships bound for the United States. The Department of Homeland Security's National Targeting Center then reviews the data, checking against other intelligence to determine which boxes may pose a threat. Although the containers deemed high risk are inspected at cooperating foreign ports or when they enter the United States, the rest--more than 90 percent--land here without any perusal.

We have two concerns about this strategy. First, it presumes that the United States government has good enough intelligence about Al Qaeda to reliably discern which containers are suspicious and which are not. But our inability to thwart the attacks in Iraq demonstrates that we lack such specific tactical intelligence. And supporting customs inspectors, who must make the first assessment of risk, is not a priority for the intelligence agencies. Inspectors must rely on their experience in spotting anomalies--a company that claims to be exporting pineapples from Iceland, for example.

Second, determined terrorists can easily take advantage of the knowledge that customs inspectors routinely designate certain shipments as low risk. A container frequently makes 10 or more stops between its factory of origin and the vessel carrying it to American shores. Many of the way stations are in poorly policed parts of the world. Because name-brand companies like Wal-Mart and General Motors are widely known to be considered low-risk, terrorists need only to stake out their shipment routes and exploit the weakest points to introduce a weapon of mass destruction. A terrorist cell posing as a legal shipping company for more than two years, or a terrorist truck driver hauling goods from a well-known shipper, can also be confident of being perceived as low risk.

So what needs to be done? A pilot project under way in Hong Kong, the world's largest container port along with Singapore, offers one piece of a potential solution. At an estimated cost of $7 per container, new technology can photograph the box's exterior, screen for radioactive material, and collect a gamma-ray image of a box's contents while the truck on which it is carried moves at 10 miles per hour.

Terrorists can defeat radiation sensors by shielding a dirty bomb with dense materials like lead. But by combining those sensors with gamma ray images, the Hong Kong system allows inspectors to sound the alarm on suspiciously dense objects. Inspectors would need to analyze enough of the scans--perhaps 20 percent to 30 percent--to convince terrorists that there is a good chance that an indistinct image will lead a container's contents to be sent for more reliable X-ray or manual examinations. Images of container contents would then be reviewed remotely by inspectors inside the United States who are trained to spot possible nuclear weapons.

If terrorists were to succeed in shipping a dirty bomb, for example, the database of these images could serve as a kind of black box--an invaluable forensic tool in the effort to identify how and where security was breached. That information could help prevent politicians from reacting spasmodically and freezing the entire container system after an attack.

Such a program could significantly reduce the likelihood that terrorists will smuggle plutonium or a dirty bomb through American ports. But it still would not stop a terrorist from importing highly enriched uranium, which can be used to construct a nuclear weapon. Lengthening the time that a container is screened for radiation would help, and this could be done without increasing waiting times if additional monitors were added to the Hong Kong system near the gate where the trucks must already stop for driver identification checks. Better still would be for the Department of Homeland Security to make the development of new technology that can recognize the unique signature of highly enriched uranium an urgent priority.

Finally, we must find ways to ensure that terrorists do not breach containers before shipments arrive at loading ports. Sensors should be installed inside containers in order to track their movements, detect any infiltration and discern the presence of radioactive material. Where boxes are loaded, certified independent inspectors should verify that companies have followed adequate protocols to ensure that legitimate and authorized goods are being shipped.

Taken together, these recommendations will require new investments and an extraordinary degree of international cooperation. But increased container security will not only help the United States prevent terrorism, it will also help all countries reduce theft, stop the smuggling of drugs and humans, crack down on tariff evasion and improve export controls. What's more, such a program would require an investment of just one one-hundredth of the capital that could be lost if we shut down the global container shipping system after an attack.

Container security is a complex problem with enormous stakes. American officials insist that existing programs have matters well in hand. But we cannot afford to take these perky reassurances at face value while the same officials fail to embrace promising initiatives like the Hong Kong pilot project.

All News button
1
News Type
News
Date
Paragraphs
A new united nations report recommending the most sweeping reform in the institution's history offers a global vision of collective security for the 21st century that is as committed to development in poor nations as it is to prevention of nuclear terrorism in rich ones.

A new united nations report recommending the most sweeping reform in the institution's history offers a global vision of collective security for the 21st century that is as committed to development in poor nations as it is to prevention of nuclear terrorism in rich ones.

The point is, according to the report's research director, Stephen Stedman, a threat to one is a threat to all in today's world. "Globalization means that a major terrorist attack anywhere in the industrial world would have devastating consequences for the well-being of millions around the developing world," the document states. The report's value lies in putting forward a comparative framework of collective security that addresses all the compelling threats of the day, Stedman explained. "The recommendations really are the most important possible makeover of the institution in 60 years," he said. "I think something is going to come out of it." Stedman, a senior fellow at the Center for International Security and Cooperation (CISAC) at the Stanford Institute for International Studies (SIIS), was recruited a year ago by U.N. Secretary General Kofi Annan to direct research for the High-Level Panel on Threats, Challenges, and Change. Stedman is an expert on civil wars, mediation, conflict prevention, and peacekeeping.

Annan created the 16-member blue-ribbon panel, made up mostly of former government leaders and ministers, in the wake of widespread heated criticism of the United Nations following the U.S.-led war in Iraq. In Annan's annual report to the General Assembly in 2003, he said, "Rarely have such dire forecasts been made about the U.N. ... We have reached a fork in the road ... a moment no less decisive than 1945 itself, when the U.N. was founded." The panel was charged with analyzing global security threats and proposing far-reaching reforms to the international system.

On December 2 the panel, chaired by former Thai prime minister Anand Panyarachun, issued its 95-page report: "A More Secure World: Our Shared Responsibility." The document identifies six major threats to global security:

-War between states;

-Violence within states, including civil wars, large-scale human rights abuses, and genocide;

-Poverty, infectious disease, and environmental degradation;

-Nuclear, radiological, chemical, and biological weapons;

-Terrorism; and

-Transnational organized crime.

Although states do not face these threats equally, a collective security system must take all member states' threats seriously and deal with them equitably, the report noted. It specifically mentioned the world's appallingly slow response to AIDS.

The report makes 101 recommendations for collective prevention and response to the threats, including ways to reform the United Nations. Annan described these in a December 3 editorial in the International Herald Tribune as "the most comprehensive and coherent set of proposals for forging a common response to common threats that I have seen."

The document also reaffirms the right of states to defend themselves-even preemptively-when an attack is imminent, and it offers guidelines to help the Security Council decide when to authorize the use of force. Stedman said other significant proposals involve improving biosecurity, strengthening nuclear nonproliferation, and defining terrorism. Panel members agreed that any politically motivated violence against civilians should be regarded as terrorism and condemned.

The panel was very critical of the Human Rights Commission, a body that has often harmed the United Nations' reputation by permitting the membership of some of the worst human-rights violators, including Cuba, Libya, and Sudan. The report also discussed the need for new institutions, such as a peace-building commission, that would support countries emerging from conflict.

Scott Sagan, co-director of CISAC, described the report as hard-hitting, although he said he would have tried to extend the withdrawal clause of the nonproliferation treaty from three months to a year. "I think it's the beginning of some major changes that will be helpful," he said. "We need to get states to work together to reform the U.N. rather than sniping at it."

CISAC was closely involved in the panel's work and was named in a cover letter accompanying the report from Panyarachun to Annan. Co-director Chris Chyba served on the panel's 30-member resource group, providing expertise on nuclear nonproliferation and bioterrorism. Bruce Jones, a former CISAC Hamburg Fellow, acted as Stedman's deputy, and Tarun Chhabra, a graduate of CISAC's undergraduate honors program and recent Marshall Scholarship recipient, worked as a research officer. Political science Professors David Laitin and James Fearon, and SIIS Senior Fellow David Victor, provided, respectively, expertise on terrorism, civil wars, and the environment, Stedman said. "There is an immense amount of Stanford influence in the report," he added.

CISAC also hosted a nuclear nonproliferation workshop for the panel on campus last March and helped organize a meeting during the summer in Bangkok. SIIS co-hosted a conference on governance and sovereignty on campus in April and a meeting at Oxford University in June. CISAC provided workspace to give the research team a quiet place to focus on writing the report's first draft in August.

The report has attracted intense international media interest in part because it calls for expanding the U.N. Security Council, its top decision-making group, from 15 to 24 members. The panel was unable to agree on one proposal and offers two options that would make the council more representative and democratic. "I believe either formula would strengthen the legitimacy in the eyes of the world, by bringing its membership closer to the realities of the 21st century-as opposed to those of 1945, when the U.N. Charter was drafted," Annan wrote in the International Herald Tribune.

According to Stedman, the media has highlighted the Security Council's proposed expansion because so many nations have a stake in it. "But in the absence of a new consensus on international peace and security, expansion of the council will not be effective," he explained.

In March, Annan will use the report to inform a series of proposals he will present to the 191 U.N. member states. These, in turn, will be submitted to a summit of world leaders before the General Assembly convenes next September in New York. Stedman said he has been asked to stay on for another year as a special advisor to the secretary general to keep the United Nations "on message" during negotiations.

Engagement by the United States, which has openly questioned the institution's relevance, will be critical to implementing the report's recommendations, said Stedman, who added that the superpower can benefit from a revamped United Nations. "Putting threats to the United States into a global framework makes it more secure," he said.

Stedman noted that one of the most disturbing aspects of the panel's consultations was listening to government representatives from civil-society organizations dismiss the seriousness of bio- and nuclear terror threats against the United States. "They were essentially denying this as a real threat to American security," he said. "I said it's as real a threat to the U.S. as other threats are to you."

When Stedman accepted the job, he thought he would spend 80 percent of his time on research and writing and 20 percent on consultations and negotiating. In fact, he said, it was the other way around. "It's unlike anything I've ever done," he said. "It's been a blast." In contrast to academia, where a researcher presents his or her best findings and defends them, Stedman was faced with 16 people who would push back, reject, or accept his work. "I had to work to change language to include their concerns," he said. "My biggest concern at the beginning was that the report would be based on the lowest common denominator. It's not."

Stedman said the panel members remained open-minded throughout the year. "They showed flexibility, listened to arguments, and changed their minds," he said. "Our job was to be as persuasive, rigorous, and comprehensive in our analysis as we were able to achieve."

In the end, Stedman said, the report belongs to the panel. "Parts of what the exercise shows is that access to those making policy is really important," he said. "If you do really good work and you have access, you have a chance of being heard. Kofi Annan gave me that opportunity."

All News button
1
Paragraphs

How does the resource base of a rebel group impact its membership, structure, and behavior? While scholars, analysts, and policy makers increasingly link natural resources to the onset and duration of civil war, this article explores how resource endowments shape the character and conduct of rebel groups. This article identifies a rebel "resource curse" much like the one that undermines state institutions in resource-rich environments. While the presence of economic endowments makes it possible for leaders to recruit on the basis of short-term rewards, these groups are flooded with opportunistic joiners who exhibit little commitment to the long-term goals of the organization. In resource-poor environments, leaders attract new recruits by drawing on social ties to make credible promises about the private rewards that will come with victory. Opportunistic joiners stay away from these movements, leaving a pool of activist recruits willing to invest their time and energy in the hope of reaping large gains in the future.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Conflict Resolution
Authors
-

The Energy Security Initiative (ESI) is a proposal to increase the benefits offered to countries in good standing with their NPT Obligations, to compensate for all the new supply restrictions and intrusive safeguards requirements imposed on them. The NPT Balance between benefits to signatories and impositions made on them has eroded through more restrictive interpretations of the NPT. The recently implemented Additional Protocol, the Proliferation Security Initiative (PSI) and the proposals to deny nuclear fuel cycle facilities to countries not yet operating them on the one hand, and the limited supply of low cost nuclear energy available to developing countries on the other hand, demonstrate the need to re-constitute the balance implied in the NPT. It is, in fact, in the self interest of the developed countries, to be able to offer an expanded menu of additional energy benefits to countries whose current scope of available benefits has shrank, while the costs of complying with all new restrictions imposed and proposed has increased. This is the purpose of the ESI, which represents a reinterpretation and expansion of a part of Article IV of the NPT.

This presentation includes a detailed description of what ESI could offer under a new reading of article IV; which countries could qualify as beneficiaries of such program, how much might the total program cost, and how to fund it. A special case dealing with small national enrichment plants in countries such as Iran or Brazil is also considered.

Chaim Braun is a vice president of Altos Management Partners, Inc., and a CISAC science fellow and affiliate. He is a member of the Near-Term Deployment and the Economic Cross-Cut Working Groups of the Department of Energy (DOE) Generation IV Roadmap study. He conducted several nuclear economics-related studies for the DOE Nuclear Energy Office, the Energy Information Administration, the Electric Power Research Institute, the Nuclear Energy Institute, Non-Proliferation Trust International, and others. Braun has worked as a member of Bechtel Power Corporation's Nuclear Management Group, and led studies on power plant performance and economics used to support maintenance services. Braun has worked on a study of safeguarding the Agreed Framework in North Korea, he was the co-leader of a NATO Study of Terrorist Threats to Nuclear Power Plants, led CISAC's Summer Study on Terrorist Threats to Research Reactors, and most recently co-authored an article with CISAC Co-Director Chris Chyba on nuclear proliferation rings. His research project this year is entitled "The Energy Security Initiative and a Nuclear Fuel Cycle Center: Two Enhancement Options for the Current Non-Proliferation Regime."

Reuben W. Hills Conference Room, East 207, Encina Hall

Chaim Braun
Seminars
-

Page Fortna is an assistant professor in the Political Science Department at Columbia University. Her research focuses on the durability of peace in the aftermath of both civil and interstate wars. She is the author of Peace Time: Cease-Fire Agreements and the Durability of Peace (Princeton University Press, 2004), and has published articles in World Politics, International Organization, International Studies Quarterly, International Studies Review, and the Georgetown Journal of International Affairs. She is currently working on a project evaluating the effectiveness of peacekeeping in civil wars, as well as a project on long-term historical trends in war termination.

During the 2004-2005 academic year, she is a fellow at the Hoover Institution at Stanford University. She has also been a visiting fellow at the American Academy of Arts and Sciences in Cambridge, MA (2002-2003). Before coming to Columbia, Fortna was a pre-doctoral and then a post-doctoral fellow at CISAC. Her graduate work was done in the Government Department at Harvard University (Ph.D. 1998). Before graduate school, she worked at the Henry L. Stimson Center, a think tank in Washington DC. She is a graduate of Wesleyan University.

Reuben W. Hills Conference Room, East 207, Encina Hall

Page Fortna Assistant Professor of Political Science at Columbia University and Susan Louise Dyer Peace Fellow the Hoover Institution, Stanford University
Seminars
-

Despite an interesting prehistory, the field of information security we know today dates from the introduction of radio at the beginning of the 20th century. Cryptography dominated information security in its first hundred years and is now the best understood part of the field. In the last thirty years, cryptography was joined by the broad subject of secure computing, which remains much less well developed but shows signs of substantial improvement in the near future. The growth of networking promises a world in which typical computations are collaborations among many computers in a fashion suggestive of commercial subcontracting. In this environment, negotiation and configuration control will become the dominant information security problems.

Whitfield Diffie, Chief Security Officer of Sun Microsystems, is Vice President and Sun Fellow and has been at Sun since 1991. As Chief Security Officer, Diffie is the chief exponent of Sun's security vision and responsible for developing Sun's strategy to achieve that vision. Best known for his 1975 discovery of the concept of public key cryptography, Diffie spent the 1990s working primarily on the public policy aspects of cryptography and has testified several times in the Senate and House of Representatives. His position - in opposition to limitations on the business and personal use of cryptography - is the subject of the book, Crypto, by Steven Levy of Newsweek. Diffie and Susan Landau are joint authors of the book Privacy on the Line, which examines the politics of wiretapping and encryption and won the Donald McGannon Award for Social and Ethical Relevance in Communications Policy Research and the IEEE-USA award for Distinguished Literary Contributions Furthering Public Understanding of the Profession.

Diffie is a fellow of the Marconi Foundation and the International Association for Cryptologic Research and is the recipient of awards from a number of organizations, including IEEE, The Electronic Frontiers Foundation, NIST, NSA, the Franklin Institute and ACM. Prior to assuming his present position in 1991, Diffie was Manager of Secure Systems Research for Northern Telecom, where he designed the key management architecture for NT's PDSO security system for X.25 packet networks. Diffie received a BS in mathematics from the Massachusetts Institute of Technology in 1965, and was awarded a Doctorate in Technical Sciences (Honoris Causa) by the Swiss Federal Institute of Technology in 1992.

Reuben W. Hills Conference Room

0
Affiliate
Diffie_Whit.jpg

Whitfield Diffie is a consulting scholar at CISAC. He was a visiting scholar in 2009-2010 and an affiliate from 2010-2012. He is best known for the discovery of the concept of public key cryptography, in 1975, which he developed along with Stanford University Electrical Engineering Professor Martin Hellman. Public key cryptography, which revolutionized not only cryptography but also the cryptographic community, now underlies the security of internet commerce.

During the 1980s, Diffie served as manager of secure systems research at Northern Telecom. In 1991, he joined Sun Microsystems as distinguished engineer and remained as Sun fellow and chief security officer until the spring of 2009.

Diffie spent the 1990s working to protect the individual and business right to use encryption, for which he argues in the book Privacy on the Line, the Politics of Wiretapping and Encryption, which he wrote jointly with Susan Landau. Diffie is a Marconi fellow and the recipient of a number of awards including the National Computer Systems Security Award (given jointly by NIST and NSA) and the Franklin Institute's Levy Prize.

Whitfield Diffie Speaker Sun Microsystems, Inc.
Seminars
-

Since Vietnam, the US Army has focused an unprecedented degree of effort on capturing lessons learned in training and on the battlefield and communicating them to other affected units. The Center for Army Lessons Learned (CALL), established after Operation URGENT FURY, is the prime example of the Army's efforts to institutionalize the process of learning during the Cold War. CALL continues to function and provide lessons learned in the current Global War on Terror, while other grassroots organizations have sprung up within the Army to target the learning needs of specific segments of the force. One such organization is CompanyCommand.com, an online professional forum of Army leaders dedicated to outstanding leadership at the small-unit level. This talk will discuss the evolution of organizational learning in the Army since Vietnam, and examine how organizations like CALL and CompanyCommand complement one other in the pursuit of excellence.

Captain Raymond A. Kimball is a native of Reading, Pennsylvania, and was commissioned through the United States Military Academy in 1995. After completing initial officer and flight training, he was assigned to the 1st Battalion (Attack), 10th Aviation Regiment, at Fort Drum, New York in November 1996. While assigned to the 10th Mountain Division, he served as an aeroscout platoon leader and logistics and support officer. In those positions, he participated in the full range of Army operations, from home station training to counter-drug operations along the Mexican border to peacekeeping in Bosnia-Herzegovina. In May of 2001, after completing further officer training, he reported to the 3rd Infantry Division, where he was assigned to the 3rd Squadron, 7th U.S. Cavalry. He took command of F Troop, 3-7 Cavalry in July of 2001. The troop consisted of 88 soldiers and $6 million in equipment and was responsible for all aspects of support and maintenance for the squadron's sixteen scout helicopters. In January of 2003, the troop deployed as part of 3rd Squadron, 7th Cavalry, to Kuwait in support of Operation Iraqi Freedom. During combat operations the troop supported 870 flight hours over a period of twenty-one days while moving 700 kilometers through enemy territory without the loss of a single soldier. He gave up command of F Troop in June of 2003 and returned to the United States to begin graduate studies in history at Stanford. In addition to his coursework, he serves as a research assistant to the Preventive Defense Project in CISAC. For the past two years, he has also served as a Topic Lead and advisor to CompanyCommand.com. His next assignment will be as an Associate Professor of History at the United States Military Academy. His awards include the Bronze Star, the Army Commendation Medal, the Army Achievement Medal, and the Humanitarian Service Medal. He is married to the former Mindy Hynds of Vacaville, California; they have one son, Daniel.

Reuben W. Hills Conference Room, East 207, Encina Hall

Raymond A. Kimball
Seminars
Paragraphs

The turmoil caused by weak and failing states gravely threatens U.S. security, yet Washington is doing little to respond. The United States needs a new, comprehensive development strategy combining crisis prevention, rapid response, centralized decision-making, and international cooperation.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Foreign Affairs
Authors
Subscribe to Migration and Citizenship (Society)