Intelligence
-

Abstract

Under Secretary Sewall will deliver remarks on Countering Violent Extremism, the U.S. Government’s comprehensive approach for preventing the spread of ISIL and emergence of new terrorist threats. The Under Secretary will describe how the evolution of violent extremism since the 9/11 attacks necessitates a “whole of society” approach to prevent people from aligning with terrorist movements and ideologies in the first place. Drawing on recent travel to Indonesia, India, and Egypt, the Under Secretary will describe the vital role of actors outside government in this approach, including women, youth, religious leaders, businesses, and researchers. She will also elaborate on new steps the U.S. Government is taking to intensify its CVE efforts around the world. The Under Secretary will also take questions from the audience.

Speaker bio

Image
sarah sewall

Dr. Sarah Sewall is the Under Secretary for Civilian Security, Democracy, and Human Rights at the U.S. State Department, and is a longtime advocate for advancing civilian security and human rights around the world. Dr. Sewall was sworn in on February 20, 2014. She serves concurrently as the Special Coordinator for Tibetan Issues. Over the previous decade, Dr. Sewall taught at the Harvard Kennedy School of Government, where she served as Director of the Carr Center for Human Rights Policy and directed the Program on National Security and Human Rights.

Dr. Sewall has extensive experience partnering with the U.S. armed forces around civilian security. At the Kennedy School, she launched the MARO (Mass Atrocities Response Operations Project) to assist the U.S. military with contingency planning to protect civilians from large-scale violence. She was a member of the Defense Policy Board and served as the Minerva Chair at the Naval War College in 2012. She also led several research studies of U.S. military operations for the Department of Defense and served as the inaugural Deputy Assistant Secretary of Defense for Peacekeeping and Humanitarian Assistance in the Clinton Administration. Prior joining the executive branch, Dr. Sewall served for six years as the Senior Foreign Policy Advisor to U.S. Senate Majority Leader George J. Mitchell and earned a Ph.D at Oxford University, where she was a Rhodes Scholar.

This event is co-sponsored by Stanford in Government and CISAC

 

[[{"fid":"222126","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"Sewall Flyer","field_file_image_alt_text[und][0][value]":"","field_file_image_title_text[und][0][value]":"","field_credit[und][0][value]":"","field_caption[und][0][value]":"","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"width":"870","class":"media-element file-crop-870xauto"}}]]

Dr. Sarah Sewall Under Secretary for Civilian Security, Democracy, and Human Rights U. S. State Department
Lectures
Authors
News Type
News
Date
Paragraphs

The U.S. Senate summary report on the allegations of CIA torture during the "war on terror" failed to live up to its original purpose, according to Amy Zegart, co-director of Stanford's Center on International Security and Cooperation (CISAC).

In a new journal article, Zegart wrote that the report has "not changed minds on either side of the torture debate and is unlikely to do so."

In December 2014, after five years of research, the U.S. Senate Select Committee on Intelligence issued a summary report of its investigation into the Central Intelligence Agency's terrorist detention and interrogation program between 2001 and 2006.

As Zegart noted, the Senate's summary released to the public amounted to less than a tenth of the full report, most of which remains classified. In an interview, she said the issue at hand should concern all Americans.

"How do secret agencies operate in a democratic society? Were the CIA's interrogation methods effective? Were they legal or moral? What role should the Congress have played when decisions about detainees were being made? All of these are vital questions which, sadly, remain unanswered and hotly contested – in large part because they have been caught in the maw of politics on both sides," said Zegart, the co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution.

'A tiny portion of the full study'

Zegart explained that four key errors have doomed the Senate report to "eternal controversy."

"It was not bipartisan, took too long to write, made little effort to generate public support along the way and produced a declassified version that constituted a tiny portion of the full study," she said.

In contrast, Zegart said, the U.S. Senate's 1975-76 Church Committee investigation of intelligence abuses made different calls on all four issues, which helped it achieve significantly more impact. That committee was formed in the wake of Watergate and disclosures in the New York Times that U.S. intelligence agencies had engaged in a number of illegal activities for years, including widespread domestic surveillance on American citizens.

[[{"fid":"221516","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"","field_file_image_alt_text[und][0][value]":"","field_file_image_title_text[und][0][value]":"The cover of the U.S. Senate Select Committee on Intelligence's report on the CIA's detention and interrogation program.","field_credit[und][0][value]":"","field_caption[und][0][value]":"","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"title":"The cover of the U.S. Senate Select Committee on Intelligence's report on the CIA's detention and interrogation program.","width":"870","style":"width: 350px; height: 521px; float: right;","class":"media-element file-crop-870xauto"}}]]She said the Church Committee was bipartisan and finished its job in 16 months. As a result, Congress passed new laws aimed at curbing aggressive spying on Americans and political assassinations abroad, among other measures.

Zegart wrote, "This was deliberate: As one Church Committee source told the New York Times in December 1975, 'If you wait too long, both the public and the members of Congress forget what you're trying to reform.' He was right."

On the other hand, she said, the Senate committee investigating CIA torture consisted entirely of Democrats and took five years to deliver what turned out to be a heavily redacted report. U.S. Sen. Dianne Feinstein (D-Calif.) chaired the committee.

While Feinstein's staff worked from 2009 to 2014, Zegart said, public outrage about torture faded – in fact, public support for coercive techniques actually increased. According to Zegart, a 2007 Rasmussen poll showed that 27 percent of Americans said the U.S. should torture captured terrorists, while 53 percent said the U.S. should not. A 2012 YouGov national poll conducted by Zegart found that support for torture rose 14 points while opposition fell 19 points.

Another problem was that the investigation did not hold a single public hearing to generate public attention or support, she said. In contrast, Church's investigation held 21 public hearings in 15 months.

Finally, the Senate report is still almost entirely classified, Zegart said.

"The 'report' released in December 2014 was a redacted executive summary of 500 pages – that's less than 10 percent of the 6,700-page report. No one knows when the other 6,200 pages will see the light of day," she wrote.

'Extraordinary resistance'

The aforementioned factors gave CIA defenders the upper hand when the report was eventually issued, she said.

"When the summary was released, former CIA officials launched an unprecedented public relations campaign replete with a web site, op-ed onslaught, and even a 'CIAsavedlives' Twitter hashtag," Zegart wrote.

And so, the episode represented one of the controversial episodes in the history of the CIA's relationship with the U.S. Senate, Zegart said.

"They [the Senate] faced extraordinary resistance from the CIA that included spying on the investigation; stonewalling and whittling away what parts of the report would be declassified; and a publicity campaign to discredit the study as soon as it was released," she wrote.

Zegart said the Feinstein investigation serves as a "cautionary tale" for Congress in its constitutional role of intelligence oversight.

"Even those who consider the interrogation and detention programs a dark mark on American history should be wary of calling the Senate report the definitive account of the subject or a model of intelligence oversight success," she wrote.

Hero Image
dianne feinstein senate cia report 12 09 14
U.S. Senate Intelligence Committee Chairman Dianne Feinstein holds a copy of a summary report on the CIA's detention and interrogation program on the day of its public release – December 9, 2014.
U.S. Senate
All News button
1
Paragraphs

Eight leading experts in the areas of intelligence ethics and oversight and accountability were invited to contribute their perspectives on the US Senate Select Committee Report on the CIA's Detention and Interrogation Program  The responses that follow, presented in alphabetical order, offer a range of views that together provide an excellent guide to the questions and concerns posed by the report and its reception, and provide a thoughtful basis for further exploration and consideration of key issues; of ethics, of the relationship between claims regarding efficacy and normative values in the torture debate, of the relationship between law and ethics, of the significance of language in the torture debate, of the ‘politics of lying’ and of the implications of this episode for the future of intelligence oversight in the US.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Routledge - Taylor & Francis Group
Authors
Amy Zegart
Authors
News Type
News
Date
Paragraphs

The deadly terrorist attacks in Paris last Friday that killed 129 people and wounded around 350 more signaled a significant change in strategy for the Islamic State in Iraq and Syria (ISIS), the radical jihadist organization that has claimed responsibility.

“It underscores that this threat is real and that ISIS is not going to be content to consolidate its power in Iraq and Syria,” said Joe Felter, a former Colonel in the U.S. Army Special Forces and senior research scholar Stanford’s Center for International Security and Cooperation (CISAC).

“They have demonstrated their ability to project power into foreign countries and conduct what I would call an “asymmetric strategic bombing capacity” in the form of these home-grown Western citizens who are willing to strap on suicide vests and blow up targets in support of ISIS directed objectives.

“They’re able to launch attacks with centralized planning and decentralized execution in a way that makes anticipating and interdicting them very difficult.”

 

French President François Hollande said that the attacks were “planned in Syria, organized in Belgium, perpetrated on our soil with French complicity.”

CISAC senior fellow Martha Crenshaw said the Paris attacks represented “a shift in strategy” for ISIS with the group “taking a more Al Qaeda-like stance and striking Western countries.”

However, she emphasized that the carefully planned nature of the coordinated strikes, where multiple teams carried out simultaneous attacks in three locations across downtown Paris, indicated that this new strategy had been secretly underway for some time.

“These attacks were planned a long time ago,” said Crenshaw, whose Mapping Militants Project includes more information on groups like ISIS.

“You shouldn’t think they’re reacting to very recent circumstances…It’s not like we bombed them one day and the next day they planned these attacks.”

Apocalyptic visions

ISIS has long advocated a plan of provoking the West into a larger confrontation that would lead to an apocalyptic victory for Islam, according to Abbas Milani, director of Iranian studies at Stanford and an affiliate at the Center for Democracy Development and the Rule of Law.

“There’s a lot of method to this madness,” Milani said.

“If you read their literature, they have always talked about creating this sort of mayhem.”

ISIS’s propaganda magazine Dabiq, which is available online in Arabic and English, is named after a village in Syria with important symbolism for jihadists.

“They claim that the prophet has predicted that if you can get the West to come and fight the Muslims at Dabiq, then Islam will conquer the world,” Milani said.

Unlike France’s earlier battles against extremists in Algeria, it cannot rely on a proxy state to take the fight to the terrorists, according to Crenshaw.

“When terrorism in France has its origins in Algeria, France could rely on the Algerian state to crack down on these groups,” she said.

“Now you’ve got a situation where the planners are in a country where you don’t have a reliable state to go in and get them for you and wrap up their networks.”

With French warplanes already bombing targets in the Syrian city of Raqqa, Felter warned against the limits of air power in the fight against ISIS.

“There’s a risk that as we ramp up the bombing campaign and increase civilian casualties, this does play into the narrative of these extremists,” he said.

“It’s a very difficult targeting process. ISIS has occupied urban areas full of non-combatants and civilians…It’s the ultimate human shield.”

Felter acknowledged that increasing the number of US ground forces sent to interdict ISIS in Iraq and Syria may ultimately be necessary, but also that this increased presence, if not managed carefully, could backfire.

“At some level, they want to bring Western military forces to occupy these lands, because that will help turn popular opinion against the West and aid in their propaganda and recruitment,” he said.

The fight against ISIS is not limited to the territories it claims in the Middle East. It must be a global effort and include increased international cooperation and information sharing across intelligence, law enforcement and other agencies around the world, Felter said.

ISIS wants to drive a wedge between Europeans and the growing Muslim communities in their countries, so recruiting French citizens to participate in the Paris attacks served a dual purpose, Milani said.

“Using French citizens helps them with logistics, but it also helps them in terms of their strategy in that it makes it difficult for Muslims to live in a non-caliphate context,” he said.

Failed states problem

In the wake of the attacks, European nations are working to create legislation that would toughen criminal penalties for citizens who travel abroad to fight with designated terrorist organizations such as ISIS, or strip them of their citizenship, according to CISAC affiliate Anja Dalgaard-Nielsen, a former executive director of the Danish Security and Intelligence Service.

Individuals who are seen as inciting people to travel to Syria and Iraq to join the jihad could also face tougher sanctions, she said.

The emergence of ISIS and its nihilistic theology is a symptom of broader underlying problems in the Middle East, which is grappling with failed and failing states across North Africa and in Syria, Iraq, Afghanistan and Pakistan, according to Milani.

“ISIS is the most militant and brutal manifestation of something deeper that’s going wrong,” he said.

“I honestly have never seen the Middle East as perilously close to complete chaos as it is now… [and] I don’t think we’ve seen the worst of it yet.”

Resources & links

Get more background on the Islamic State and its leaders from Martha Crenshaw’s Mapping Militants Project

Is There a Sunni Solution to ISIS? – The Atlantic | By Lisa Blaydes & Martha Crenshaw

Airstrikes Can Only Do So Much to Combat ISIS – New York Times | By Joe Felter

The Super Smart Way to Dismantle ISIS – The National Interest | By Eli Berman, Joe Felter & Jacob Shapiro

The Rise of ISIS and the Changing Landscape of the Middle East – Commonwealth Club of California | Abbas Milani

Hero Image
french soldiers patrol eiffel tower reuters rts6zju
Police patrol near the Eiffel Tower the day after a series of deadly attacks in Paris.
Reuters
All News button
1
-

Abstract: The years ahead will likely include hundreds of small satellites launched into orbit, more countries operating in space, and continued investment in anti-satellite capabilities by China and others. The U.S. faces major choices about the future of its national space capabilities -- including the composition of U.S. satellite systems, deterrence of potential adversaries, and new operational practices. This seminar will highlight changes in space security, as well as some of the issues and options facing secretaries of defense and military leaders. 

Speaker Bio for Lt. Gen. John W. "Jay" Raymond: Lt. Gen. John W. “Jay” Raymond is the Deputy Chief of Staff for Operations, Headquarters U.S. Air Force, Washington, D.C.  He is responsible to the Secretary of the Air Force and the Chief of Staff for formulating policy supporting air, space, cyber, irregular warfare, counter-proliferation, homeland security, and weather operations.  As the Air Force operations deputy to the Joint Chiefs of Staff, the general determines operational requirements, capabilities and training necessary to support national security objectives and military strategy.

General Raymond was commissioned through the ROTC program at Clemson University in 1984.  He has commanded the 5th Space Surveillance Squadron at Royal Air Force Feltwell, England; the 30th Operations Group at Vandenberg Air Force Base, Calif.; and the 21st Space Wing at Peterson AFB, Colo.  He deployed to Southwest Asia as Director of Space Forces in support of operations Enduring Freedom and Iraqi Freedom.  The general's staff assignments include Headquarters Air Force Space Command, U.S. Strategic Command, the Air Staff and the Office of Secretary of Defense, and the Director of Plans and Policy, Headquarters U.S. Strategic Command, Offutt AFB, Neb.  Prior to his current assignment, General Raymond was the Commander, 14th Air Force (Air Forces Strategic), Air Force Space Command, and Commander, Joint Functional Component Command for Space, U.S. Strategic Command, Vandenberg AFB, Calif.

Speaker Bio for Matthew Daniels: Matthew Daniels works in the Office of Net Assessment within the Office of the Secretary of Defense. At Net Assessment, his principal areas of focus include future US activities in space and deep space exploration. He is also an engineer and special assistant at NASA. His work at NASA has included satellite engineering, joint projects with DARPA and other governments, and strategic analysis activities. Daniels received his Ph.D. and M.S. degrees from Stanford University, his B.A. from Cornell University, and was a predoctoral fellow at Stanford's Center for International Security and Cooperation.

Lt. Gen. John "Jay" Raymond Deputy Chief of Staff for Operations, Headquarters U.S. Air Force, Washington, D.C. U.S. Air Force
0
Affiliate
1-RSD13_085_0211a.jpg

Dr. Matthew Daniels is a technology and policy leader in Washington and New York. He has held technical, leadership, and strategy roles at the White House, NASA, and Department of Defense. His work focuses on space security, exploration, and technology strategy.

At the White House, Matt led initiatives on space and national security, Lunar exploration, US-India space cooperation, and planetary defense. He has also served as Senior Advisor to the Director of Net Assessment, focusing on space and nuclear security; the DOD's Tech Director for AI, overseeing the DOD's broad AI R&D portfolio; and a senior technical advisor in the office of the NASA Administrator, focusing on deep space exploration and development. He is a member of the Council on Foreign Relations.

Matt started as an engineer at NASA, received his Ph.D. from Stanford, and was a fellow at Stanford's Center for International Security and Cooperation. He has twice been a recipient of Department of Defense Distinguished Service medals. For his work on planetary defense, Asteroid 22028 Matthewdaniels, discovered by the Catalina Sky Survey, is named for him. 

Date Label
Office of Net Assessment U.S. Department of Defense
-

- This event is offered as a joint sponsorship with the Hoover Institution - 

 

Abstract: Writing on matters relating to the cyber era dominate government and academia alike.  Much of the focus tends to be on either the technical aspects or questions about cyber threats and warfare. Much less attention has been on the advent of the cyber era for the intelligence community. While there can be no doubt that the technological age in which we find ourselves today is new, there is a related question about the extent to which it has changed the work of the intelligence community. This talk argues that to find an answer, it is imperative to consider previous technological revolutions and consider how the intelligence community adapted. Only by doing so is it possible to address the issue of whether intelligence is the cyber era is a revolution or evolution.

About the Speaker: Professor Michael S. Goodman is a Professor in ‘Intelligence and International Affairs’ in the Department of War Studies, King's College London.  He has published widely in the field of intelligence history, including most recently The Official History of the Joint Intelligence Committee, Volume I: From the Approach of the Second World War to the Suez Crisis (Routledge, 2014), which was chosen as one of The Spectator’s books of the year.  He is series editor for ‘Intelligence and Security’ for Hurst/Columbia University Press and is a member of the editorial boards for five journals, including the three main intelligence ones. He is currently on secondment to the Cabinet Office where he is the Official Historian of the Joint Intelligence Committee.

Michael Goodman Professor in Intelligence and International Affairs Speaker King's College London
Seminars
-

Abstract: TBA

About the Speaker: Amy Zegart is co-director of CISAC and Professor of Political Science, by courtesy. She is also the Davies Family Senior Fellow at the Hoover Institution. 

Before coming to Stanford in 2011, Zegart served as professor of public policy at UCLA’s Luskin School of Public Affairs and as a fellow at the Burkle Center for International Relations. Her research examines the organization of American national security agencies and their effectiveness. She is the author of two award-winning books. Flawed by Design, which chronicles the development of the Central Intelligence Agency, Joint Chiefs of Staff, and National Security Council, won the highest national dissertation award in political science. Spying Blind, which examines why American intelligence agencies failed to adapt to the terrorist threat before 9/11, won the National Academy of Public Administration’s Brownlow Book Award. She has also published in International SecurityPolitical Science Quarterly, and other leading academic journals. She serves on the editorial boards of Terrorism and Political Violence and Intelligence and National Security. Her most recent book is Eyes on Spies: Congress and the United States Intelligence Community.

Zegart was featured by the National Journal as one of the ten most influential experts in intelligence reform. She served on the Clinton administration's National Security Council staff and as a foreign policy adviser to the Bush-Cheney 2000 presidential campaign. She has testified before the Senate Intelligence Committee, provided training to the Marine Corps, and advised officials on intelligence and homeland security matters. From 2009 to 2011 she served on the National Academies of Science Panel to Improve Intelligence Analysis. Her commentary has been featured on national television and radio shows and in the New York TimesWashington Post, and Los Angeles Times.

Before her academic career, Zegart spent three years at McKinsey & Company advising Fortune 100 companies about strategy and organizational effectiveness.

A former Fulbright scholar, Zegart received an AB in East Asian studies magna cum laude from Harvard University and an MA and PhD in political science from Stanford University. She served on the FBI Intelligence Analysts Association National Advisory Board and the Los Angeles Police Department’s Counter-terrorism and Community Police Advisory Board. She also served on the Secretary of Energy Advisory Board Task Force on Nuclear Nonproliferation and is a lifetime member of the Council on Foreign Relations. She was appointed to the board of directors of Kratos Defense and Security Solutions in September 2014.

CISAC
Stanford University
Encina Hall, E216
Stanford, CA 94305-6165

(650) 725-9754 (650) 723-0089
0
Senior Fellow at the Freeman Spogli Institute for International Studies
Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution
Senior Fellow at the Stanford Institute for Human-Centered AI
Professor, by courtesy, of Political Science
amyzegart-9.jpg PhD

Dr. Amy Zegart is the Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution. The author of five books, she specializes in U.S. intelligence, emerging technologies, and national security. At Hoover, she leads the Technology Policy Accelerator and the Oster National Security Affairs Fellows Program. She also is an associate director and senior fellow at the Stanford Institute for Human-Centered AI; a senior fellow at the Freeman Spogli Institute; and professor of political science by courtesy, teaching 100 students each year about how emerging technologies are transforming espionage.

Her award-winning research includes the leading academic study of intelligence failures before 9/11: Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton, 2007) and the bestseller Spies, Lies, and Algorithms: The History and Future of American Intelligence (Princeton, 2022), which was nominated by Princeton University Press for the Pulitzer Prize. She also coauthored Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity, with Condoleezza Rice (Twelve, 2018). Her op-eds and essays have appeared in Foreign Affairs, Politico, the New York Times, the Washington Post, and the Wall Street Journal.

Zegart has advised senior officials about intelligence and foreign policy for more than two decades. She served on the National Security Council staff and as a presidential campaign foreign policy advisor and has testified before numerous congressional committees. Before her academic career, she spent several years as a McKinsey & Company consultant.

Zegart received an AB in East Asian studies from Harvard and an MA and a PhD in political science from Stanford. She serves on the boards of the Council on Foreign Relations, Kratos Defense & Security Solutions, and the American Funds/Capital Group.

Date Label
Amy Zegart Co-director CISAC
Seminars
-

Abstract: A number of senior Intelligence Community (IC) officials describe compliance as one of the IC’s biggest problems, perhaps the biggest. The underlying legal and informational issues are bound to become more acute and complex.  How can AI help? The IC protects our nation by analyzing the relationships between people, places, and things - essentially "connecting the dots.”  Doing so while remaining compliant with policies such as Executive Order 12333[1] and Presidential Policy Directive 28[2] is a balancing act. The interpretation, implementation, and enforcement of policy vary across organizations and administrations.  This frequently leaves analysts struggling to determine what data they can and cannot look at. The Internet, mobile, and “Big Data” generally further complicate the problem. The sheer volume, velocity, and variety of data that is constantly being generated necessitate automation, and even AI, to manage.  However, the benefits of analytic automation over the data deluge will remain limited, until the IC finds a way to scale the processing of legal judgments at a comparable rate.

Before we consider the potential benefits to AI-based methodologies we need to understand two things: Data Rights and Application Uncertainty. Data rights are data attributes derived from laws and dependent institutional policies.  Data rights include but are not limited to classifications, access policies, source limitations, “privacy” constraints, etc. While such data rights are entailed in the data itself, the interpretation and application of these rights are contextual and will vary.  More specifically, application of laws on a data set may be indeterminate: they may vary by time, user, and/or geography; the Second Circuit may issue an unexpected, divergent opinion; access may occur before or after a seminal FISA decision; the Office of Legal Counsel may change its mind; the legal state of a data set at the time of collection may be indeterminate; etc. 
 
About the Speakers: As Executive Vice President at In-Q-Tel, Bob Gleichauf supports technology advancement programs. He is also Director of IQT’s Lab41 initiative, a unique Silicon Valley-based challenge lab that provides “innovation through collaboration” in the area of Big Data analytics. Gleichauf joined IQT from Cisco Systems, where he spent a decade working on the development of secure network infrastructures across a variety of the company’s products. Gleichauf, who has more than a dozen patents in network security, served as CTO for the Wireless and Security Technology Group at Cisco, and is respected globally for his work in information security. He previously served as head of product engineering for the WheelGroup prior to its acquisition by Cisco. Earlier, he was with IQ Software, a leader in the development of database report writing tools. Before making the leap into technology, Gleichauf pursued a Ph.D. in Early Human Prehistory at the University of Michigan, where he earned a fellowship and had the privilege of working in East Africa with the celebrated Leakey family.
 
Joshua H. Walker is an Intellectual Property (IP) partner at Greenberg Traurig, LLP, handling all aspects of IP strategy and transactions, and a legal informatics entrepreneur. Josh has built his career at the nexus of law and computer science. Historically, as an analyst, his work has included helping prosecutors convict orchestrators of the 1996 Rwandan genocide to, now, as an attorney, helping many of the largest and most dynamic technology and financial entities in the world improve IP and data rights outcomes in the M&A, licensing, strategic litigation, and network theft contexts. To help clients solve IP governance, transactional, and risk management problems, Josh cofounded the first law and computer science lab in the country (CodeX), at Stanford University, as well as the top “big data” company for IP litigation (Lex Machina; founding CEO & Chief Legal Architect). However, data wins neither cases nor negotiations. We focus on client collaborations employing engineering efficiencies, design thinking, and empirical data to enhance and advance traditional legal practice. Josh’s IP work has been featured in The Wall Street Journal, The New York Times, The Economist, The Financial Times (listed, 2014 Top Ten Legal Innovator for North America), and numerous other publications. He co-taught “IP Analytics, Strategy, and Decision-Making” at Berkeley Law School, and an advanced IP media transactions seminar at Stanford Law School (“SIPX”). He received his J.D. from the University of Chicago Law School, and an A.B. in Conflict Studies (Special Concentrations) from Harvard College, m.c.l.

 

Bob Gleichauf Chief Scientist and Director of Lab41 In-Q-Tel
Joshua H. Walker Co-founder CodeX: The Stanford Center for Legal Informatics
Seminars
Authors
News Type
News
Date
Paragraphs

U.S. national security faces rising challenges from insider threats and organizational rigidity, a Stanford professor says.

Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution, wrote in a new study that in the past five years, seemingly trustworthy U.S. military and intelligence insiders have been responsible for a number of national security incidents, including the WikiLeaks publications and the 2009 attack at Fort Hood in Texas that killed 13 and injured more than 30.

She defines "insider threats" as people who use their authorized access to do harm to the security of the United States. They could range from mentally ill people to "coldly calculating officials" who betray critical national security secrets.

In her research, which relies upon declassified investigations by the U.S. military, FBI and Congress, Zegart analyzes the Fort Hood attack and one facet of the insider threat universe – Islamist terrorists.

In this case, a self-radicalized Army psychiatrist named Nidal Hasan walked into a Fort Hood facility in 2009 and fired 200 rounds, killing 13 people and wounding dozens of others. The shooting spree remains the worst terrorist attack on American soil since 9/11 and the worst mass murder at a military site in American history, she added.

Insights and lessons learned

Zegart's study of insider and surprise attacks as well as academic research into the theory of organizations led her to some key insights about why the Army failed to prevent Hasan's attack when clues were clear:

Image
• Routines can create hidden hazards. People in bureaucracies tend to continue doing things the same old way, even when they should not, Zegart said, and not just in America. In the Cuban missile crisis of 1962, for example, U.S. spy planes were able to spot Soviet missile installations in Cuba because the Soviets had built them exactly like they always had in the Soviet Union – without camouflage.

In the Fort Hood case, she said, bureaucratic procedures kept red flags about Hasan in different places, making them harder to detect.

• Career incentives and organizational cultures often backfire. As Zegart wrote, several researchers found that "misaligned incentives and cultures" played major roles in undermining safety before the Challenger space shuttle disaster.

Zegart's earlier research on 9/11 found the same dynamic played a role in the FBI's manhunt for two 9/11 hijackers just 19 days before their attack. Because the FBI's culture prized convicting criminals after the fact rather than preventing disasters beforehand, the search for two would-be terrorists received the lowest priority and was handled by one of the least experienced agents in the New York office.

• Organizations matter more than most people think. Robust structures, processes and cultures that were effective in earlier periods for other tasks proved maladaptive after 9/11.

In the case of the Fort Hood attack, the evidence suggests that government investigations, which focused on individual errors and political correctness (disciplining or investigating a Muslim American in the military) identified only some of the root causes, missing key organizational failures.

Hasan slipped through the cracks not only because people made mistakes or were prone to political correctness, but also because defense organizations "worked in their usual ways," according to Zegart.

Adapting to a new threat

In terms of organizational weaknesses, Hasan's Fort Hood attack signaled a new challenge for the U.S. military: rethinking what "force protection" truly means, Zegart said. Before 9/11, force protection reflected a physical protection or hardening of potential targets from an outside attack. Now, force protection has evolved to mean that the threats could come from within the Defense Department and from Americans, she added.

"For half a century, the department's structure, systems, policies and culture had been oriented to think about protecting forces from the outside, not the inside," Zegart wrote.

In the case of Hasan, the Defense Department failed in three different ways to identify him as a threat: through the disciplinary system, the performance evaluation system and the counter-terrorism investigatory system run jointly with the FBI through Joint Terrorism Task Forces.

"Organizational factors played a significant role in explaining why the Pentagon could not stop Nidal Hasan in time. Despite 9/11 and a rising number of homegrown Jihadi terrorist attacks, the Defense Department struggled to adapt to insider terrorist threats," Zegart wrote.

Difficult to change

Another problem was that the Pentagon faced substantial manpower shortages in the medical corps – especially among psychiatrists. So the Defense Department responded to incentives and promoted Hasan, despite his increasingly poor performance and erratic behavior.

In addition, Zegart found the Defense Department official who investigated Hasan prior to the attack saw nothing amiss because he was the wrong person for the job – he was trained to ferret out waste, fraud and abuse, not counterterrorism, which is why he did not know how to look for signs of radicalization or counterintelligence risk.

"In sum, the Pentagon's force protection, discipline, promotion and counter-terrorism investigatory systems all missed this insider threat because they were designed for other purposes in earlier times, and deep-seated organizational incentives and cultures made it difficult for officials to change what they normally did," she wrote.

Zegart acknowledges the difficulties of learning lessons from tragedies like 9/11, the NASA space shuttle accidents and the 2009 Fort Hood shooting.

"People and organizations often remember what they should forget and forget what they should remember," she said, adding that policymakers tend to attribute failure to people and policies. While seemingly hidden at times, the organizational roots of disaster are much more important than many think, she added.

Hero Image
dod flkr ambulance fort hood us army photo jeramie sivley
Medics treat injured service members at Fort Hood, Texas – site of the worst mass murder at a military installation in U.S. history.
U.S. Army / Jeramie Sivley
All News button
1
-

DUE TO UNFORESEEN CIRCUMSTANCES, MICHAEL MORELL HAD TO CANCEL HIS VISIT. THE TALK IS BEING REPLACED WITH A PANEL DISCUSSION ON TERRORISM.

 

Due to the overwhelming response this event has received, all future RSVPs will be added to a wait list. Click here to be added to the wait list.

 

- This event is offered as a joint sponsorship with the Hoover Institution - 

About the Event: Michael Morell, Former Deputy Director and twice Acting Director of the Central Intelligence Agency, will be interviewed by Amy Zegart, CISAC Co-director and Davies Family Senior Fellow at the Hoover Institution. Audience members will have an opportunity to ask questions after the interview. A book signing will follow. Copies of Michael Morell's book will be available for purchase in the Reuben Hills ("East") Conference Room, on the second floor of Encina Hall. 

About the Speaker: Michael Morell, the former Acting Director and Deputy Director of the Central Intelligence Agency, is one of our nation’s leading national security professionals, with extensive experience in intelligence and foreign policy.

During his 33-year career at CIA, he served as Deputy Director for over three years, a job in which he managed the Agency’s day-to-day operations, represented the Agency at the White House and Congress, and maintained the Agency’s relationships with intelligence services and foreign leaders around the world.  Michael also served twice as Acting Director, leading CIA when Leon Panetta was named Secretary of Defense and again after David Petraeus left government.

Michael’s senior assignments at CIA also included serving for two years as the Director of Intelligence, the Agency’s top analyst, and for two years as Executive Director, the CIA’s top administrator—managing human resources, the budget, security, and information technology for an agency the size of a Fortune 200 firm.

Michael retired from the CIA in September 2013.  Upon retiring, he joined the Harvard Kennedy School’s Belfer Center for Science and International Affairs as a senior fellow.  He also became a member of the Board of Directors of the Goodyear Tire and Rubber Company, one the of the largest tire manufacturers in the world, as well as a Senior Counselor at Beacon Global Strategies, a Washington, DC based national security consulting firm. Michael is also a commentator on national security issues for CBS News.

Seminars
Subscribe to Intelligence