Authors
News Type
News
Date
Paragraphs

While the United States has no peers in conventional military power, it is especially vulnerable – as a free and democratic society – to cyber misinformation campaigns, a Stanford scholar says.

Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation (CISAC), is the co-author of a new draft working paper that spells out the perilous risks facing democratic, wired-up countries around the world.

America’s adversaries are seeking “asymmetric” methods for social disruption, rather than direct military conflict, Lin said.

“Cyber warfare is one asymmetric counter to Western (and especially U.S.) military advantages that depend on the use of cyberspace,” wrote Lin and his co-author Jackie Kerr, a research fellow at the Lawrence Livermore National Laboratory.

This new type of cyber aggression is aimed at winning – and confusing – hearts and minds, the very control centers of human existence, Lin said.

As a result, “information/influence warfare and manipulation,” or IIWAM as Lin describes it, poses profound implications for Western democracies, even though much of it may not be illegal under international law. This approach is based on the deliberate use of information by one party on an adversary to confuse, mislead, and ultimately to influence the choices and decisions that the adversary makes.

A recent example in point would be the 2016 Russian hacking of the U.S. presidential election and the surge of so-called “fake news.”

Lin points out that while misinformation campaigns are not new, the technology to spread it far and wide globally is. He noted that the patron saint of distorting reality for war-like purposes is Sun Tzu, who wrote that, “The supreme art of war is to subdue the enemy without fighting.”

While traditional cyber attacks typically hit hard targets like computer systems, cyber “influence” campaigns are conducted over longer periods of time and rely on soft power – propaganda, persuasion, culture, social forces, confusion and deception, Lin said. 

Words and images

How does it work? Lin explains:

“Victory is achieved by A when A succeeds changing B’s political goals so that they are aligned with those of A.  But such alignment is not the result of B’s 'capitulation' or B’s loss of the ability to resist – on the contrary, B (the losing side) is openly willing.”  That is, such victory shares the focus on subverting the opponent’s will, though not on destroying his military forces.

The ammunition in these cyberspace battles are “words and images,” the kind that persuade, inform, mislead, and deceive so that the adversary cannot respond militarily. In the example of a “fake news” story, they often take place below legal thresholds of “use of force” or “armed attack,” and at least in an international legal sense, do not trigger a military response.

The target is the “adversary’s perceptions,” which reside in the “cognitive dimension of the information environment.” In other words, such cyber warfare focuses on “damaging knowledge, truth, and confidence, rather than physical or digital artifacts,” according to Lin. It is the “brain-space.”

Additionally, IIWAM injects fear, anger, anxiety, uncertainty, and doubt into the adversary’s decision making processes, he added.  Success is defined as altering such perceptions so the target makes choices favoring the aggressor.

“Sowing chaos and confusion is thus essentially operational preparation of the information battlefield – shaping actions that make the information environment more favorable for actual operations should they become necessary,” the researchers wrote.

These cyber manipulations often prey upon cognitive and emotional biases present in the psychological and mental makeup of human beings, Lin said. 

For example, media channels such as Fox News play to “confirmation bias” for individuals with a right-of-center orientation, and similarly for MSNBC for those with a left-of-center, orientation, he wrote. Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories.

Countering misinformation

“Naming and shaming” is probably ineffective against many nation states conducting cyber disinformation campaigns, Lin said. And the idea that a government like the U.S. can quickly respond to misinformation created in the private sphere is unlikely to be effective as well.

What, then, might work? Lin suggests new tactics are needed, as no existing approach seems adequate. For example, Facebook is deploying a new protocol for its users to flag questionable news sites.  Google has banned fake news web sites from using its online advertising service. Twitter, YouTube, and Facebook shut down accounts that they determine are promoting terrorist content.  He noted that a recent Facebook letter from CEO Mark Zuckerberg states that, “Our approach will focus less on banning misinformation and more on surfacing additional perspectives and information, including that fact checkers dispute an item's accuracy.”

But such measures are unlikely to stem the “rising tide of misinformation conveyed” through cyber warfare, Lin said, because they mostly require users to do additional mental work.  

Wired world riskier

Today’s Internet-driven Western world offers countless opportunities for cyber influence mischief, Lin wrote.

“Democracy has rested on an underlying foundation of an enlightened, informed populace engaging in rational debate and argument to sort out truth from fiction and half-truth in an attempt to produce the best possible policy and political outcomes,” Lin wrote.

Cyber manipulators have exploited an arguable gap between ideals and reality in democratic systems – “rendered it much more questionable” – through the tremendous reach and speed of misinformation, he said. Many countries cannot deal with the onslaught of such focused efforts. This serves to make the democratic process look weak and unstable in the eyes of its citizens. The same dynamic does not apply equally around the world.

“Cyber weapons pose a greater threat to nations that are more advanced users of information technology than to less-developed nations,” Lin wrote.

He said that less developed or authoritarian countries do not have much Internet infrastructure or that wield control over expression – North Korea is an example.

MEDIA CONTACTS

Herbert Lin, Center for International Security and Cooperation: (650) 497-8600, herbert.s.lin@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-0224, cbparker@stanford.edu

 

 

 

Hero Image
gettyimages 597931354
Stanford cybersecurity expert Herb Lin says a new brand of cyber warfare aims to destabilize Western democracies through misinformation and even changing the way people think about reality.
Getty Images/Vertigo3d
All News button
1
Authors
Anna Péczeli
News Type
News
Date
Paragraphs

Anna Péczeli, a Stanton Nuclear Security Fellow at CISAC, wrote the following op-ed for the Bulletin of the Atomic Scientists:

What does the future hold for the US nuclear posture under President Trump? The last Nuclear Posture Review occurred in April 2009, when a 12-month review process was conducted to translate President Obama’s vision into a comprehensive nuclear strategy for the next five to 10 years. The review addressed several major areas: the role of nuclear forces, policy requirements, and objectives to maintain a safe, reliable, and credible deterrence posture; the relationship between deterrence policy, targeting strategy, and arms control objectives; the role of missile defense and conventional forces in determining the role and size of the nuclear arsenal; the size and composition of delivery capabilities; the nuclear weapons complex; and finally the necessary number of active and inactive nuclear weapons stockpiles to meet the requirements of national and military strategies.

Clearly, changes are afoot. On January 27, 2017, President Trump issued a presidential memorandum that mandated “a new Nuclear Posture Review to ensure that the United States nuclear deterrent is modern, robust, flexible, resilient, ready, and appropriately tailored to deter 21st-century threats and reassure our allies.” 

Looking ahead, the new administration should conduct this review through a broad, inter-agency process, involving the State and Energy departments, and allies as well. This approach offers several valuable benefits by broadening the focus from deterrence to non-proliferation, reassurance, and nuclear security.

The main role of the Nuclear Posture Review, or NPR, is to assess the threat environment, outline nuclear deterrence policy and strategy for the next 5 to 10 years, and align the country’s nuclear forces accordingly. Since the end of the Cold War, each administration has conducted its own NPR, but the process and the scope of the reviews were different in all three cases. 

The first NPR was conducted by the Clinton administration in 1994, and even though important senior positions have still not been appointed by the Trump White House, Trump's mandate suggests that their review might use it as a template for 2017. It was a bottom-up review, initiated by the Department of Defense, mostly focusing on a set of force structure decisions—such as the right size and composition of US nuclear forces, including the size of the reserve or so-called “ hedge” force. That review lasted for 10 months, and the Pentagon was in charge of the entire process, mainly focusing on deterrence requirements. 

In contrast, the 2001 NPR of the Bush administration was mandated by Congress, and it addressed a broader set of issues, including all components of the deterrence mix—nuclear and non-nuclear offensive strike systems, active and passive defenses, and the defense infrastructure. The Defense Department took the lead in this case just as before, but this time the Energy Department and the White House were also engaged in the process. As a result, the Bush NPR’s force structure requirements—how to size and sustain the country’s forces—were driven by four factors: assuring allies, deterring aggressors, dissuading competitors, and defeating enemies. 

The Obama administration’s 2010 NPR was also mandated by Congress, but the Defense Department was specifically tasked to conduct an inter-agency review. Besides the unprecedented level of such cooperation, a bipartisan Congressional commission also laid out a number of recommendations for the review process, many of which became part of the final text of the Obama review. Officials from State, Energy, and the Joint Chiefs of Staff were involved, as well as US allies who were regularly briefed during the different stages of the review. 

In the final phase of the 2010 NPR, the White House leadership made the decisions on the actual content of the nuclear posture. While the Clinton and the Bush reviews were largely conducted behind the scenes and only short briefing materials were published on the outcome, the Obama administration released an unprecedentedly long report on its nuclear posture review. 

These cases offer two models for a review process: It can be conducted by a small group of people in the most highly classified manner, or it can be a larger, relatively transparent inter-agency process. In the former approach, the final decisions are typically presented to the secretary of defense, the president, Congress, and allies. The problem is that this tends to be a one-sided approach, putting the main focus on deterrence and modernizations. 

Though it is effective and fast, the implementation of a Nuclear Posture Review requires all stakeholders to be on board with the new strategy. One of the most painful lessons of the Bush review was that because the White House and Defense failed to explain their new approach to the public, the military, and Congress, there was effectively a loss of leadership—which made procurement extremely difficult and caused major problems in the implementation of their strategy. 

On the other hand, involving all stakeholders and providing a balanced approach to nuclear strategy would support the goals of not just deterrence, but those of reassurance, non-proliferation, and nuclear security as well. Due to the involvement of the State Department, the 2010 NPR, for example, emphasized a number of policies which supported non-proliferation objectives and strengthened US negotiating positions at global arms control forums. One of these policies was the “negative security assurance,” which stated that the United States would not use or threaten to use nuclear weapons against non-nuclear weapon states that are party to the NPT and in compliance with their nuclear nonproliferation obligations. 

The other policy that was advocated by senior State Department officials was the so called sole-purpose posture—which means that nuclear weapons only serve to deter or respond to a nuclear attack, and they no longer play a role in non-nuclear scenarios. Although the sole purpose posture was eventually dropped and it was set only as a long-term objective, the Obama administration still reduced the role of nuclear weapons with the new negative security assurance, and it signaled its intent to continue this process with the promise of sole purpose. These steps supported US leadership at the 2010 Nuclear Non-Proliferation Treaty Review Conference and they contributed to the adoption of a consensual final document at the conference. 

This broader scope strengthens inter-agency cooperation, and ensures that all the departments that are affected by the NPR are on board with the strategy, which eases the implementation of the decisions. Besides, it also strengthens alliance relations by regular consultations. The Trump administration’s mandate did not include a specific timeline or format; consequently it will be mainly the responsibility of Defense Secretary James Mattis to decide on the framework. Though the presidential memorandum did not require an inter-agency process, it would be wise to conduct one.

Compared to 2010, the security environment has dramatically deteriorated: renewed tensions between NATO and Russia since the annexation of Crimea, China’s building of military bases in what had previously been international waters, significant military modernization efforts by both these states, and North Korea’s increasingly bellicose nuclear threats. All of these developments have created a serious deterrence and security challenge for the United States and its allies. Only a broader approach can address all relevant threats and create the necessary internal consensus for the funding and creation of a modern, robust, flexible, resilient, ready, and appropriately tailored nuclear arsenal.

Hero Image
gettyimages 632782096
CISAC fellow Anna Péczeli suggests that the Trump Administration conduct a broad Nuclear Posture Review that includes the State Department, which in the last such review in 2009 emphasized a number of policies that supported non-proliferation objectives and strengthened U.S. negotiating positions at global arms control forums.
Getty Images/Win McNamee
All News button
1
Paragraphs

CISAC's Herbet Lin and Jackie Kerr from the Lawrence Livermore National Laboratory write in this draft working paper that the United States has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods in cyberspace for engaging in conflict -- and  free and democratic societies are especially vulernable.   Development of new tactics and responses is therefore needed.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Center for International Security and Cooperation (CISAC)
Authors
News Type
News
Date
Paragraphs

The first Russian explosive device to land on US soil wasn’t delivered by a Russian missile, as Americans feared might happen throughout the Cold War. It was delivered by FedEx. The device, an explosive magnetic flux compression generator, arrived at Los Alamos National Laboratory in late 1993, shipped from the Russian Federal Nuclear Center VNIIEF. It allowed Los Alamos and VNIIEF scientists to conduct a groundbreaking joint experiment to study high-temperature superconductivity in ultra-high magnetic fields. 

The shared excitement and jubilation the scientists involved felt over successful experiments like this were testament to a profound shift. Less than two years after the dissolution of the Soviet Union and some 18 months after the remarkable and improbable exchange visits between Russian and American nuclear weapons lab directors, scientists from Los Alamos and VNIIEF were conducting experiments at each other’s previously highly secret sites. Some of these scientists had helped design their country’s hydrogen bombs. Now, they were focused on fundamental scientific discovery. 

The Soviet nuclear weapons program was built on the shoulders of scientific giants—Yuli B. Khariton, Igor V. Kurchatov, Igor E. Tamm, Andrey D. Sakharov, Yakov B. Zeldovich, and many others—just as the American program was built on the shoulders of J. Robert Oppenheimer, Enrico Fermi, Hans Bethe, Edward Teller, John von Neumann, and many more. Unlike their American counterparts, though, Soviet weapons scientists labored in secrecy during the Cold War. When Soviet leader Mikhail Gorbachev lifted the Iron Curtain, curiosity about US research and a pent-up desire to cooperate internationally led them to reach out to the American nuclear weapons labs during the last three years of the USSR. They did so at international conferences and during first-time lab exchanges, long before Washington was prepared for such collaborations. 

Scientific cooperation tapped into the most basic interest of scientists and engineers on both sides, namely, the desire to create new knowledge and technologies. Science is fundamentally an interactive, cooperative pursuit, which requires exposing the results of research to review and critique. As a participant in those early exchanges, I can say that the common language of science allowed us to more easily cross cultures and borders. The two sides’ expertise and facilities proved enormously synergistic, resulting in remarkable progress in several areas of science that neither side alone could have produced for some time to come. We found science, unlike politics, to be a unifying force—one that allowed us to build trust through collaboration.

The pursuit of fusion

High-energy-density physics was the first—and over the years, most intense—area of cooperation between US and Russian nuclear labs. The field involves studying materials at high densities, extreme pressures, and high temperatures, such as those found in stars and the cores of giant planets. On Earth, these conditions are found in nuclear detonations, the basic physics of which were obviously of great interest to the scientists involved. 

Working together, they used VNIIEF explosive magnetic flux compression generators in Russia, VNIIEF generators sent by FedEX from Russia to the United States and charged with US-supplied explosives, and stationary pulsed-power machines at Los Alamos to produce ultra-high electrical currents and magnetic fields that, in turn, produced a wide range of high-energy density environments. This technology provided the capability needed to pursue a unique approach to civilian nuclear fusion, which has tantalized the international physics community for decades with its potential to provide unlimited clean energy. Such energy densities also enabled the scientists to study materials strength under extreme conditions, material behavior under super-strong magnetic fields, and many other problems.

In fact, the initial Los Alamos interest in VNIIEF flux compression technology was stimulated by VNIIEF’s approach to an emerging energy research area now called magnetized target fusion, as Los Alamos scientists I.R. Lindemuth and R. R. Reinovsky and VNIIEF scientist S.F. Garanin write in Doomed to Cooperate. Magnetized target fusion is an approach to fusion that relies on intermediate fuel densities, between the more conventional magnetically confined fusion and inertially confined fusion. 

High-energy-density physics is exciting science that helps attract talent, especially young recruits. It represents a non-military outlet for creative weapon scientists to solve big-world problems for the benefit of mankind. It allows scientists to create new knowledge, not just try to prevent potential new nuclear dangers. It also opened the door to cooperation by scientists with complimentary skills. The Russian side excelled in the design of the explosive generators, the American side in instrumentation and diagnostics, allowing the partnership to go beyond what had been achieved before by either side alone. For example, in the mid-1990s VNIIEF scientists produced a world-record magnetic field of 28 million gauss, some 50 million times larger than the magnetic field at the earth’s surface. Moreover, many of the joint high-field experiments were considered the best-instrumented ever. US-Russian collaborations on high-energy-density physics between 1993 and 2013 resulted in over 400 joint publications and presentations, and opened the door for joint work in other areas. 

An enigmatic element

Plutonium science was similarly of great interest to both sides, yet direct collaboration was not established until the late 1990s because of the sensitivity of the subject. Some fundamental aspects of plutonium science were first presented by Americans and Soviets at the Geneva International Conferences on the Peaceful Uses of Atomic Energy in 1955 and 1958. However, the US and Russian results presented in these and subsequent meetings differed dramatically, and the differences were not resolved until we established direct lab-to-lab collaborations. 

By the early 1990s, both sides had for decades attempted to understand plutonium, a complex metal that exhibits six solid crystallographic phases at ambient pressure. Its phases are notoriously unstable, affected by temperature, pressure, chemical additions, and time (the latter because of the radioactive decay of plutonium). With little provocation, the metal can change its density by as much as 25 percent. It can be as brittle as glass or as malleable as aluminum; it expands when it solidifies, and its freshly machined surface will tarnish in minutes. It challenges our understanding of chemical bonding in heavy element metals, compounds, and complexes. Indeed, plutonium is the most challenging element.

Several of my Russian counterparts and I have devoted much of our 50 years of scientific endeavor attempting to understand the properties of this enigmatic metal.American and Russian scientists had disagreed for 40 years on how to tame plutonium’s notorious instability, when, in 1998, I began working with Lidia Timofeeva, the preeminent Russian plutonium metallurgist. The end of the Cold War enabled us to talk, challenge each other’s views, and finally understand this element better. Our joint work demonstrated the validity of Russian research finding that a high-temperature phase of plutonium could be retained at room temperature, but not stabilized, by adding small amounts of gallium. (We published the results in a paper called “A Tale of Two Diagrams.”) US-Russian collaboration at more than a dozen plutonium science workshops continued for 15 years. 

Computing power

Computational methods for massively parallel computing became a third important topic of scientific collaboration. During the 1992 US lab directors’ visit to Sarov, I was surprised by VNIIEF’s computational capabilities. Soviet computers were known to be greatly inferior to US supercomputers, the most powerful of which resided at the Los Alamos and Lawrence Livermore laboratories. Yet their three-dimensional simulations of a representative ballistic impact problem were extraordinary. When I marveled at my counterparts’ computing abilities, one of them explained, “since we don’t have the computing power you have, we have to think harder”—and they did. More than one thousand specialists worked in VNIIEF’s Mathematical Department, including some of the most gifted Russian mathematicians and computer scientists. 

Because only low-performing, single-central processing unit (CPU) computers were available to Russia’s scientific institutes, in the 1970s VNIIEF began to physically link CPUs and create parallel software algorithms that efficiently used multiple CPUs to greatly accelerate simulations for problems such as hydrodynamics, heat conduction, and radiation transport. They confirmed the efficiency of their parallelization strategies on computers with up to 10 CPUs, the most they could link at the time. They also developed analytical models for predicting the scaling efficiency to arbitrarily large numbers of processors.

During this time, the American labs were just beginning to transition their nuclear simulation codes from powerful single-CPU computers to the massively parallel computers that were becoming commercially available, a transition the Russian side had accomplished years earlier but with fewer and less powerful CPUs. Our collaborations gave Americans access to proven parallelizing algorithms, and gave Russians the ability to evaluate different analytical models for predicting the scaling efficiency to large numbers of processors. This same technology would later prove critical to both US and Russian programs for maintaining their arsenals after nuclear tests were banned.

Allowing the nuclear weapons scientists to move out of the shadow of Cold-War secrecy through scientific collaborations made us realize how much we were alike. It helped build trust, which had a powerful impact on enhancing nuclear security because it allowed us to extend our collaboration into sensitive subject areas, like the safety and security of nuclear weapons and materials. For the nuclear weapons scientists, the progression from science to security was a natural evolution, since we had practiced both from the beginning of our nation’s nuclear programs. It also fulfilled our desire to apply our skills to enhance scientific progress.

MEDIA CONTACTS

Siegfried S. Hecker, Center for International Security and Cooperation: (650) 725-6468, shecker@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

Hero Image
sem
An abandoned guard post at the Semipalatinsk Test Site in Kazakhstan in 1998. Stunned by the lack of security and the presence of scavengers, Siegfried Hecker used this photo to convince his Russian colleagues that they needed to cooperate with the Americans and Kazakhs to secure the site. Also known as "The Polygon," Semipalatinsk was the primary testing venue for the Soviet Union's nuclear weapons.
Courtesy of Siegfried S. Hecker
All News button
1
0
Senior Research Scholar, Columbia University’s School for International and Public Affairs
jasonhealey_ac_photo_large_best.jpg

Jason Healey is a Senior Research Scholar and adjunct faculty at Columbia University’s School for International and Public Affairs specializing in cyber conflict, competition and cooperation. Prior to this, he was the founding director of the Cyber Statecraft Initiative of the Atlantic Council where he remains a Senior Fellow.  He is the author of dozens of published articles and the editor of the first history of conflict in cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012.  A frequent speaker on these issues, he is rated as a “top-rated” speaker for the RSA Conference and won the inaugural “Best of Briefing Award” at Black Hat.

During his time in the White House, he was a director for cyber policy and helped advise the President and coordinate US efforts to secure US cyberspace and critical infrastructure.  He created the first cyber incident response team for Goldman Sachs and later oversaw the bank’s crisis management and business continuity in Hong Kong.  He has been vice chairman of the FS-ISAC (the information sharing and security organization for the finance sector) and started his career as a US Air Force intelligence officer with jobs at the Pentagon and National Security Agency.  Jason was a founding member (plankowner) of the first cyber command in the world, the Joint Task Force for Computer Network Defense, in 1998, where he was one of the early pioneers of cyber threat intelligence.

He is on the Defense Science Board task force on cyber deterrence and is a frequent speaker at the main hacker and security conferences, including Black Hat, RSA, and DEF CON, for which he is also on the review board.  He is president of the Cyber Conflict Studies Association, and has been adjunct faculty at NSA’s National Cryptologic School, Georgetown University and Johns Hopkins School of Advanced International Studies. 

Authors
News Type
News
Date
Paragraphs

When a state is “shamed” by outsiders for perceived injustices, it often proves counterproductive, resulting in worse behavior and civil rights violations, a Stanford researcher has found.

Rochelle Terman, a political scientist and postdoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), recently spoke about how countries criticized by outsiders on issues like human rights typically respond -- and it's contrary to conventional wisdom. Terman has published findings, “The Relational Politics of Shame: Evidence from the Universal Periodic Review,” on this topic in the Review of International Organizations. She discussed her research in the interview below:

What does your research show about state "shaming"?

Shaming is a ubiquitous strategy to promote international human rights. A key contention in the literature on international norms is that transnational advocacy networks can pressure states into adopting international norms by shaming them – condemning violations and urging reform. The idea is that shaming undermines a state’s legitimacy, which then incentivizes elites into complying with international norms.

In contrast, my work shows that shaming can be counterproductive, encouraging leaders in the target state to persist or “double down” on violations. That is because shaming is seen as illegitimate foreign intervention that threatens a state’s sovereignty and independence.  When viewed in this light, leaders are rewarded for standing up to such pressure and defending the nation against perceived domination. Meanwhile, leaders who “give in” have their political legitimacy undermined at home. The result is that violations tend to persist or even exacerbate.

When and where does it work better to directly confront a country’s leadership about such injustices?

At least two factors moderate the effects of international shaming. The first is the degree to which the norm being promoted is shared between the “shamer” and the target. For instance, the West may shame Uganda or Nigeria for violating LGBT rights. But if Uganda and Nigeria do not accept the “LGBT rights” norm, and refuse to accept that homophobia constitutes bad behavior, then shaming will fail. In this case, it is more likely that shaming will be viewed as illegitimate meddling by foreign powers, and will be met with indignation and defiance.

Second, shaming is quintessentially a relational process. Insofar as it is successful, shaming persuades actors to voluntary change their behavior in order to maintain valued social relationships. In the absence of such relationship, shaming will fail. This is especially so when pressure emanates from a current or historical geopolitical adversary. In this later scenario, not only will shaming fail to work, it will likely provoke defensive hostility and defiance, having a counterproductive effect.

Combing these insights, we can say that shaming is most likely to work under two conditions: when the target is a strong ally, and the norm is shared.

What are some well-known cases where "shaming" backfired?

The main example I use in my forthcoming paper is on the infamous “anti-homosexuality bill” in Uganda. When Uganda introduced the legislation in 2009 (which in some versions applied capital punishment to offenders) it provoked harsh condemnation among its foreign allies, especially in the West. Western donor countries even suspended aid in attempt to push Yoweri Musaveni’s government to abandon the bill. According to conventional accounts, the onslaught of foreign shaming, coupled with the threat of aid cuts and other material sanctions, should have worked best in the Uganda case.

And yet what we saw was the opposite. The wave of international attention provoked an outraged and defiant reaction among the Ugandan population, turning the bill into a symbol of national sovereignty and self-determination in the face of abusive Western bullying. This reaction energized Ugandan elites to champion the bill in order to reap the political rewards at home. Indeed, the bill was the first to pass unanimously in the Ugandan legislature since the end of military rule in 1999. Museveni – who by all accounts preferred a more moderate solution to the crisis – was backed into a corner.

A Foreign Policy story quoted Ugandan journalist Andrew Mwenda as saying, “the mere fact that Obama threatened Museveni publicly is the very reason he chose to go ahead and sign the bill.” And Museveni did so in a particularly defiant fashion, “with the full witness of the international media to demonstrate Uganda’s independence in the face of Western pressure and provocation.”

Uganda anti-homosexuality law was finally quashed by its constitutional court, which ruled the act invalid because it was not passed with the required quorum. By dismissing the law on procedural grounds, Museveni – widely thought to have control over the court – was able to kill the legislation “without appearing to cave in to foreign pressure.” But by that time, defiance had already transformed Uganda’s normative order, entrenching homophobia into its national identity.

Does this 'doubling down' effect vary in domestic or international contexts?

Probably. States with a significant populist contingent, for instance, are especially hostile to international pressure, especially when it emanates from a historical adversary, like a former colonial power. Ironically, democracies may also be more susceptible to defiance, because elites are more beholden to their constituents, and thus are less able to “give in” to foreign pressure without undermining their own political power. 

The international context matters a great deal as well. States are more likely to resist certain norms if they have allies who feel the same way. For instance, we see significant polarization around LGBT rights at the international level, with most states in Africa and the Muslim world voting against resolutions that push LGBT rights forward. South Africa – originally a pioneer for LGBT rights – has changed its position following criticism from its regional neighbors. 

Does elite reaction drive this response to state "shaming?"

To be quite honest, this is a question I’m still exploring and I don’t have a very clear answer. My hunch at the moment is no. The “defiant” reaction occurs mainly at the level of public audiences, which then incentives elites to violate norms for political gain.  These audiences can be at either the domestic or international level. For instance, if domestic constituents are indignant by foreign shaming, elites are incentivized to “double down,” or at least remain silent, lest they undermine their own political legitimacy.

That said, elites can also strategize and manipulate these expected public reactions for their own political purposes. For instance, if Vladimir Putin knows that the Russian public will grow indignant following Western shaming, he might strategically promote a law that he knows will provoke such a reaction in order to benefit from the ensuing conflict. This is what likely occurred with Russia’s “anti-gay propaganda” law, which (unsurprisingly) provoked harsh condemnation from the West and probably bolstered Putin’s domestic popularity.

Any other important points to highlight?

One important point I’d like to highlight is the long-term effects of defiance. In an effort to resist international pressure, states take action that, in the long term, work to internalize oppositional norms in their national identity. In this way, shaming actually produces deviance, not the other way around.

Follow CISAC at @StanfordCISAC and  www.facebook.com/StanfordCISAC

MEDIA CONTACTS:

Rochelle Terman, Center for International Security and Cooperation: (650) 721-1378, rterman@stanford.edu,

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 
Hero Image
gettyimages 158093568
Protestors march to the United Nations building during International Human Rights Day in 2012 in New York City. Activists then called for immediate action by the UN and world governments to pressure China to loosen its control over Tibet -- a form of "state shaming," as examined by CISAC fellow Rochelle Terman in her research.
Steve Platt/Getty Images
All News button
1
Authors
News Type
News
Date
Paragraphs

Whether it’s WikiLeaks and CIA documents or nuclear thieves, the danger from insiders in high-security organizations is escalating in our Internet age.

But many threats from within go unrecognized or misunderstood, according to Stanford professor Scott Sagan, who co-edited a new book Insider Threats with Matthew Bunn, a professor of practice at Harvard University. Their work analyzes the challenges that high-security organizations face in protecting themselves from employees who might betray them. Sagan, a core faculty member in Stanford's Center for International Security and Cooperation, and Bunn recently participated in an online discussion of the book’s key arguments. They will hold a talk and book signing at 3:30 p.m. on May 16 in the CISAC Central Conference Room.

Sagan and Bunn wrote, “Perhaps the most striking lesson we learned in working with scholars and officials who have dealt with this problem was the sheer scale of the red flags – from explicit statements of support for Osama bin Laden to behavior leading other staff to fear for their lives – that organizations are able to ignore.”

They found that organizations tend to have biases that cause them to downplay insider threats. In particular, organizations with high-security needs face significant risks from trusted employees with access to sensitive information, facilities, and materials. 

The researchers highlight "worst practices" from these past mistakes, suggesting lessons and insights that could improve the security situations at many workplaces. Amy Zegart, co-director of CISAC, has a chapter in Insider Threats that provides a detailed account of the organizational dysfunction that allowed Nidal Hasan to carry out his massacre at Fort Hood.

Other chapters include the following topics and authors:

  • An analysis of the similar problems that led Bruce Ivins, who probably carried out the anthrax attacks in 2001, to continue to have access to deadly pathogens (by Jessica Stern, then of Harvard and now at Boston University, and Ron Schouten, of Massachusetts General Hospital and Harvard Medical School);
  • An analysis of the rapid rise and subsequent fall of “green-on-blue” attacks in Afghanistan – that is, Afghan soldiers and police officers attacking Americans there to help them (by Austin Long of Columbia University); and 
  • An assessment of how casinos and pharmaceutical plants, with a profit incentive to protect against insiders, cope with the problem (by Bunn and Kathryn Glynn, then of IBM Global Business Services and now at the National Nuclear Security Administration). 

Another chapter examines the potential terrorist use of nuclear insiders, offering new data that shows that jihadist writings and postings contain only a modest emphasis on possible nuclear plots, and essentially no mention of the possibility of using nuclear insiders. However, the authors warn this is no reason for complacency – insiders have been largely responsible for past nuclear theft incidents.

MEDIA CONTACTS

Scott Sagan, Center for International Security and Cooperation: (650) 725-2715, ssagan@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 

 

 

Hero Image
gettyimages 540849924
CISAC's Scott Sagan writes in a new book that organizations tend to ignore the many red flags typically associated with insider threats.
xijian/Getty Images
All News button
1
-

- This event is co-sponsored by Stanford Global Studies, The Europe Center, and the History Department - 

Abstract: By 1914, exploiting colonies was a well-established practice of even the most ‘liberal’ empires. Treating areas of Europe like colonies was not, except on the more remote peripheries. However, when the Central Powers occupied substantial parts of Europe during World War One, they applied harsh economic regimes while the British and French intensified the use of their empires. This paper will consider the comparisons – and the links - between these two forms of exploitation. It will suggest that both became ‘laboratories of autarky’ for kinds of economic regime (especially with regard to manpower) that were still not possible domestically for the nation-states fighting the war. The argument will be general but focus empirically on French North Africa and German-occupied France and Belgium. 

About the Speaker: John Horne is Leverhulme Visiting Professor at Oxford University (2016-17) and Emeritus Fellow and former Professor of Modern European History at Trinity College Dublin, where he founded the Centre for War Studies. He is a Fellow of the Royal Irish Academy and a board member of the Research Centre at the Historial de la Grande Guerre, Péronne (France). He is the author and editor of a number of books and over ninety chapters and articles, many relating to the history of the Great War. Among his latest publications are (ed.) A Companion to World War One (Oxford, Blackwell-Wiley, 2010); (ed.) Vers la guerre totale: le tournant de 1914-1915 (Paris, Tallandier, 2010); and with Robert Gerwarth (ed.) War in Peace: Paramilitary Violence in Europe after the Great War (Oxford University Press, 2012). He is currently working on a history of the French experiences of the First World War.

Encina Hall, 2nd floor

John Horne Leverhulme Visiting Professor Oxford University Oxford University and Trinity College Dublin
Seminars
-

About the Event: NATO is entering today the 4th phase of its history and must adapt to changes in today’s security environment in order to remain relevant. NATO’s ability to adapt will ultimately redefine NATO’s place in the world.  General Mercier will discuss challenges facing NATO faces such as maintaining the unity between members in the Alliance, addressing potential crises in Eastern Europe, reopening dialogue with Russia, and addressing instability on NATO-member borders.

About the Speaker: General Denis Mercier is the North Atlantic Council as Supreme Allied Commander Transformation. Prior to this assignment, he served as the French Air Force Chief of Staff from 2012-2015.

He graduated with a Master’s of Science from the French Air Force Academy in 1981, qualifying as a fighter pilot in 1983. He has more than 3000 flying hours including 182 hours in combat missions. Gen. Mercier commanded the 1/12 "Cambrésis" Fighter Squadron, a founding unit of the NATO Tiger association. He participated in numerous other NATO exercises and operations, including Operation Deny Flight over Bosnia-Herzegovina in 1994, "Strong Resolve” in 1998, and Operation Allied Force in Kosovo.

From 1999 to 2002, Gen. Mercier was deputy head of the combined joint task force deputy branch at Regional Headquarters where he contributed to the development of the Combined Joint Task Force concept. He was a member of the combined analysis team for exercise "Allied Effort '01" and an evaluator of the CJTF HQ for Exercise "Strong Resolve '02". He also acted as liaison officer for the Commander Striking Fleet Atlantic stationed in Norfolk, VA.

He later served as the commander of Reims Air force base, integrating Mirage F1CR squadrons with ISAF in Afghanistan. From 2004 to 2008 he served as the head of the plans division at the French Air Force headquarters and was nominated as a flag officer in 2007. He then commanded the French Air Force Academy in Salon-de-Provence. As senior military advisor for the Minister of Defence from 2010-2012, Gen. Mercier prepared and participated in all NATO ministerial meetings, summits in Lisbon and Chicago, and was special advisor to Operation Unified Protector over Libya.

Among other awards, Gen. Mercier has been awarded the rank of Grand Officier of the French Legion of Honor and, among other distinctions, an officer of the National Order of Merit.

Encina Hall, 2nd floor

General Denis Mercier Supreme Allied Commander Transformation, NATO
Seminars
Authors
News Type
News
Date
Paragraphs

When governments and scholars work together on data security, society benefits from better safeguards and protections, a U.S. intelligence expert said Wednesday.

The difficulty is keeping up with technology and societal trends, Admiral Bobby R. Inman said at the Center for International Security and Cooperation's annual Drell Lecture for 2017. His talk was titled, “The Challenges of Providing Data Security.”

Inman, whose U.S. Navy career spanned 31 years, served as the director of the National Security Agency, deputy director of the Central Intelligence Agency, and held other influential positions in the U.S. intelligence community. After retiring from the Navy, Inman worked on start-ups in the private sector, in higher education, and as chairman of the Federal Reserve Bank of Dallas. He is currently the Lyndon B. Johnson Centennial Chair in National Policy at the University of Texas, Austin.

'9/11 changed everything'

During his talk, Inman recounted the early days of cryptography and the dialogue between government officials like himself and scholars at universities such as Stanford and UC Berkeley. Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties typically known as adversaries.

Inman was a key driver behind establishing the United States Foreign Intelligence Surveillance Court in 1978. The purpose of the “FISA” court was to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

Today, technology has overwhelmed many issues regarding how the government tracks the communications of foreign entities, Inman said. And events have ushered in a different orientation on what type of information and from whom is sought by U.S. intelligence. “9/11 changed everything,” he added.

After 9/11, U.S. intelligence began to focus on foreign individuals in addition to the traditional foreign state actors, Inman said. He pointed out the value of such data collection, as penetrating small groups with human agents is extraordinarily difficult and dangerous.

“The only way you’re likely to get a lead on them (terrorists or narcotic traffickers) is through their communications,” he said.

The Internet, especially social media, has exploded in usage and made data security efforts even more complex, Inman said. “A vastly different world.” As a result, serious privacy, commercial usages and intellectual property issues need to be resolved more than ever. He noted that the rule of law is important to follow when the governmnt or other entities collect and examine communications data.

Inman is particularly worried about how “basic issues of ethics and morality” have eroded in society, which results in people scheming to sell private data for profit that puts others at risk. Another issue involves how to prevent terrorist groups from preying upon mentally weak people and recruiting them over the Internet.

A key reason Inman was invited to be the Drell speaker this year was his connection to Martin Hellman and Whitfield Diffie, two pioneering cryptographers from CISAC who drew Inman’s attention in the mid-1970s when they wrote a groundbreaking paper in their field of study. The three later established long-running friendships that produced strong cryptography frameworks.

Inman said, “We were privileged to start the dialogue. That’s where you begin to solve problems,” as fears and misperceptions can be resolved through discussions and openness. “I think what we need is a repeat of pulling together people” from academia and government to deal with today’s security threats. “We need to assess where we are.”

His concern is who would convene such a dialogue. “We’re in a pretty bumpy time, nationally,” said Inman, who urges a neutral party to be such a convener. On broader security fronts, Inman said he is most apprehensive about a possible nuclear exchange between Pakistan and India.

Legacy of Drell

The event included a tribute to Sidney Drell, who passed away last December at the age of 90. Drell co-founded CISAC, and jointly directed it from 1983 to 1989. The Drell Lecture, which is named after him, is an annual public event sponsored by CISAC. By tradition, the lecturer addresses a current and critical national or international security issue that has important scientific or technical dimensions.

In her opening remarks, Amy Zegart, co-director of CISAC, described Drell as a “true giant in the field of theoretical physics” who devoted his life’s work to reducing the threat of nuclear catastrophe. One trademarks of the Drell lecture was that its namesake had the opportunity to ask the first question of the speaker. “He had a unique way of asking penetrating questions" with gentle decency and fairness, she added.

CISAC’s William Perry, also on hand to discuss Drell’s legacy, said, “Sid Drell was truly a man for all seasons” who excelled in various fields of academic and policy. Perry first met Drell 55 years ago when he was beginning his own career in nuclear arms control. “Sid’s deep interest in arms control led to him teaming up with John Lewis” to launch CISAC, he noted.

“He was an extraordinary man,” Perry said, “and we shall never see his like again.”

Drell was a fan of classical music, especially the St. Lawrence String Quartet, a chamber music group whose music was piped in to the Bechtel Conference Room before the event began.

Follow CISAC at @StanfordCISAC and  www.facebook.com/StanfordCISAC

MEDIA CONTACTS

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 

Hero Image
gettyimages 507473994 Getty Images
All News button
1
Subscribe to Europe