Authors
News Type
Commentary
Date
Paragraphs
In the war on terror, the United States has become a military theater of operations. At stake, writes CISAC fellow Laura K. Donohue, is the long-held "principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement."

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All News button
1
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
-

Matthew Rojansky is a JD candidate at Stanford Law School and a CISAC predoctoral fellow. His research focuses on international law and security, counter-terrorism and counter-proliferation. He is currently conducting a study of UN Security Council legitimacy in the global counter-terrorism context, and developing a theory of network-based attribution for internationally wrongful acts. He has worked for the U.S. Department of Justice's Office of Special Investigations, the National Democratic Institute for International Affairs, the Israel Ministry of Foreign Affairs, and private law firms, where he has worked on international trade and IP litigation.

He received an AB in Soviet history from Harvard University. Next year, he will serve as a clerk for the United States Court of Appeals for the Armed Forces.

Reuben W. Hills Conference Room

Matthew Rojansky Speaker
Seminars
Authors
James D. Fearon
News Type
Commentary
Date
Paragraphs
Is the conflict in Iraq a civil war or not? Debate over this question is largely political. James D. Fearon sets aside politics to explain the meaning of civil war and how it applies to Iraq.

Does the conflict in Iraq amount to a civil war? In many ways, the public debate over this question is largely political. Calling Iraq a "civil war" implies yet another failure for the Bush administration and adds force to the question of whether U.S. troops still have a constructive role to play.

Politics aside, however, the definition of civil war is not arbitrary. For some -- and perhaps especially Americans -- the term brings to mind all-out historical conflicts along the lines of the U.S. or Spanish civil wars. According to this notion, there will not be civil war in Iraq until we see mass mobilization of sectarian communities behind more or less conventional armies.

But a more standard definition is common today:

1) Civil war refers to a violent conflict between organized groups within a country that are fighting over control of the government, one side's separatist goals, or some divisive government policy.

By this measure, the war in Iraq has been a civil war not simply since the escalation of internecine killings following the bombing of a Shiite shrine in Samarra in February, but at least since the United States handed over formal control to an interim Iraqi government in June 2004.

Here's why: Although the insurgents target the U.S. military, they are also fighting the Shiite-dominated Iraqi government and killing large numbers of Iraqis. There is little reason to believe that if the United States were suddenly to withdraw its forces, they would not continue their battle to control or shape the government.

Political scientists who study civil war have proposed various refinements to this rough definition to deal with borderline cases. One issue concerns how much killing has to occur -- and at what rate.

2) For a conflict to qualify as a civil war, most academics use the threshold of 1,000 dead, which leads to the inclusion of a good number of low-intensity rural insurgencies.

Current estimates suggest that more than 25,000 Iraqis have been killed in fighting since the U.S.-led invasion in March 2003 -- a level and rate of killing that is comparable to numerous other conflicts that are commonly described as civil wars, such as those in Lebanon (1975-1990) and Sri Lanka (beginning in 1983).

The organization -- or rather, disorganization -- of the warring communities in Iraq means that a large-scale conventional conflict along the lines of the U.S. Civil War is unlikely to develop. More probable is a gradual escalation of the current "dirty war" between neighborhood militias that have loose ties to national political factions and are fighting almost as much within sectarian lines as across them.

This is roughly what happened in Lebanon and at a lower level in Turkish cities in the late 1970s. Ethnic cleansing will occur not as a systematic, centrally directed campaign (as in Bosnia), but as a result of people moving to escape danger.

And there's another twist to the terminology:

3) If the conflict in Iraq becomes purely a matter of violence between Sunni and Shiite communities driven by revenge and hatred rather than by political goals, many political scientists would say that it is something other than civil war.

Almost no one, for example, calls the Hindu-Muslim violence in India a civil war.

A civil war has to involve attempts to grab power at the center of government or in a given region, or to use violence to change some major government policy.

In Iraq's case, however, the vacuum of power at the center means that communal violence will inevitably be tied to struggles for political power and control.

A final complication concerns the nature of international involvement. Some argue, for example, that the war in Bosnia should be seen as an interstate war rather than a civil war, since the Bosnian Serb forces were armed and directed largely by Belgrade. Post-Mobutu violence in Congo is often termed a civil war, even though fighters have been closely tied to armies from neighboring states.

4) A conflict may be both a civil and an interstate war at the same time.

The Vietnam War, for instance, clearly comprised both a civil war in the South and an interstate war involving the North, the South and the United States.

Iraq may be moving in this direction. The United States and Britain are already openly involved, and such neighboring countries as Iran and Syria are more covertly involved. Not that it matters to the people dying there, but the next debate here may turn on whether what is already a civil war in Iraq should be viewed as an interstate war as well.

All News button
1
Paragraphs

In this article, we critique the Eurocentric character of security studies as it has developed since World War II. The taken-for-granted historical geographies that underpin security studies systematically misrepresent the role of the global South in security relations and lead to a distorted view of Europe and the West in world politics. Understanding security relations, past and present, requires acknowledging the mutual constitution of European and non-European worlds and their joint role in making history. The politics of Eurocentric security studies, those of the powerful, prevent adequate understanding of the nature or legitimacy of the armed resistance of the weak. Through analysis of the explanatory and political problems Eurocentrism generates, this article lays the groundwork for the development of a non-Eurocentric security studies.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Review of International Studies
Authors
Authors
David Holloway
News Type
Commentary
Date
Paragraphs
Jeffrey T. Richelson's history of American nuclear intelligence, Spying on the Bomb, is timely, writes CISAC's David Holloway, given the faulty intelligence about nuclear weapons that was used to justify the U.S. invasion of Iraq. In fact the book could have gone further toward analyzing the relationship between the intelligence community and policy makers, Holloway suggests in this New York Times book review.

Before attacking Iraq in March 2003, the United States told the world that Saddam Hussein had reconstituted his nuclear weapons program in defiance of the United Nations. That claim, used to justify the war, was based on assessments provided by the United States intelligence community. But as everyone now knows, those assessments were wrong. So Jeffrey T. Richelson's history of American nuclear intelligence, including our attempts to learn about Iraq's nuclear program, could hardly be more timely.

In "Spying on the Bomb," Richelson, the author of several books on American intelligence, has brought together a huge amount of information about Washington's efforts to track the nuclear weapons projects of other countries. He examines the nuclear projects of Nazi Germany, the Soviet Union, China, France, Israel, India, South Africa, Taiwan, Libya, Pakistan, Iran and North Korea, as well as Iraq. Through interviews and declassified documents as well as secondary works, he sets out briefly what we currently know about those projects and compares that with assessments of the time.

This may sound like heavy going, but Richelson writes with admirable clarity. And along the way he has fascinating stories to tell: about plans to assassinate the German physicist Werner Heisenberg during World War II; about discussions in the Kennedy and Johnson administrations on the possibility of attacking Chinese nuclear installations; about Indian measures to evade the gaze of American reconnaissance satellites; and about the bureaucratic infighting over the estimates on Iraq.

The United States has put an enormous effort into gathering information about the nuclear projects of other countries. After World War II it equipped aircraft with special filters to pick up radioactive debris from nuclear tests for isotopic analysis. It created a network of stations around the world to register the seismic effects of nuclear explosions. Most important, in 1960 it began to launch reconnaissance satellites that could take detailed photographs of nuclear sites in the Soviet Union and China. Richelson occasionally speculates about the role of communications intercepts and of spies, but these appear from his account to have been much less important than the other methods of collecting information.

Through these means the United States has gathered a vast quantity of data, sometimes to surprising effect. Intelligence played a crucial role in the cold war, for instance, by reducing uncertainty about Soviet nuclear forces. Alongside such successes, however, there have been failures. One notable example concerned the first Soviet test, which took place in August 1949, much sooner than the C.I.A. had predicted. Another was the failure to detect Indian preparations for tests in May 1998, even though at an earlier time the United States, with the help of satellite intelligence, had managed to learn about preparations the Indians were making and to head off their tests.

But the most serious failure of all was in Iraq in 2003, because in no other case did the intelligence assessments serve as justification for the use of military force. The information needed for avoiding political surprise is one thing. That needed for preventive war is quite another, if only because of the consequences of making a mistake.

Beyond making the uncontroversial recommendation that "aggressive and inventive intelligence collection and analysis" should continue, Richelson draws no general conclusions. That is a pity, because his rich material points to issues that cry out for further analysis. He suggests in one or two cases that failures sprang from the mind-set of the intelligence community, but he does not elaborate on this point. He has little to say about relations between policy makers and the intelligence community, even though the quality of intelligence and the use made of it depend heavily on that relationship.

His focus is no less narrow in his discussion of foreign nuclear projects. He concentrates on the programs themselves, paying very little attention to their political context. Does that reflect a technological bias in nuclear intelligence? Would, for example, the prewar assessment of Iraqi nuclear capabilities have been more accurate if it had paid more attention to the broader political and economic circumstances of Hussein's regime?

The task of intelligence has become more complex than it was during the cold war. A single dominant nuclear opponent has now been replaced by a number of nuclear states, along with states and stateless terrorists that are aiming to get their hands on nuclear weapons. Meanwhile, the technology needed for producing nuclear weapons has become easier to acquire.

Many critics believe the recent performance of the intelligence community shows it has not responded adequately to this new situation. Richelson does not have much to say on this question; nor does he discuss the likely impact of the current reforms, initiated in response to the Iraq war, on the quality of intelligence. His reticence may imply that he does not think reform is necessary. Still, it is disappointing that he does not draw on his historical survey to discuss whether new approaches are needed for dealing with nuclear threats, and, if so, what those new approaches might be.

All News button
1
Authors
News Type
News
Date
Paragraphs
George Habash, a militant and former secretary-general of the Popular Front for the Liberation of Palestine, once characterized terrorism as a "thinking man's game." Fighting terrorism is a thinking game, too, as illustrated by CISAC scholars Lawrence M. Wein and Jonathan Farley who use operations research and mathematics to devise rational methods for homeland security policy making.

George Habash, a militant and former secretary-general of the Popular Front for the Liberation of Palestine, once characterized terrorism as a "thinking man's game." Using mathematics, researchers at Stanford University's Center for International Security and Cooperation (CISAC) have made fighting terrorism a thinking man's game as well.

CISAC affiliate Lawrence M. Wein of the Graduate School of Business and CISAC Science Fellow Jonathan Farley are both applying mathematical models to homeland security problems, such as preventing a nuclear detonation in a major U.S. city and determining whether terrorist cells have likely been disrupted.

Wein, who teaches operations classes about different business processes used to deliver goods and services, has focused his research on bioterrorism and border issues. He has performed, he says, the first mathematical analyses of hypothetical botulism poisoning, anthrax outbreaks and smallpox infections.

"One overriding theme of my work is that all these homeland security problems are operations problems," said Wein, the Paul E. Holden Professor of Management Science. "Just as McDonald's needs to get hamburgers out in a rapid and defect-free manner, so too does the government have to get vaccines and antibiotics out and test the borders for nuclear weapons or terrorists in a rapid and defect-free manner."

In collaboration with Stephen Flynn of the Council on Foreign Relations, a nonpartisan research center, Wein recently has conducted research to improve security at U.S. borders and ports. Port security has received significant attention recently owing to the furor over Dubai Ports World's bid to manage six terminals at major U.S. harbors. The aim of Wein and Flynn's work is to prevent terrorists from bringing into the country a nuclear weaponbe it an atomic bomb or a so-called "dirty bomb," or conventional explosive packed with radioactive waste.

"Of all the problems I've studied, this is the most important because the worst-case terrorist scenario is a nuclear weapon going off in a major U.S. city and also it is the one the government has dropped the ball on the most," Wein said. "They have done a very poor job."

Instead of using the existing approach, where U.S. Customs actively inspects a minority of containers based on information from a specialized tracking system designed to identify suspicious containers, Wein and Flynn have recommended the government use a multi-layer, passive screening system for every container entering the country. Under their system, Customs would photograph a shipping container's exterior, screen for radioactive material and collect gamma-ray images of the container's contents. If terrorists shielded a bomb with a heavy metal such as lead to hide it from radiation detectors, gamma-ray imaging would allow inspectors to see the shielding and flag the container for inspection. Wein and Flynn believe this whole process would cost about $7 per container.

"Right now about maybe 6 percent of the containers are deemed suspicious and they will go through some testing and the other 94 percent of the containers just waltz right into the country without an inspector laying an eye on them," Wein said. "What we're proposing to do is 100 percent passive testing."

Wein's earlier work addressed a different threat: bioterrorism. In 2005, Wein revealed the nation's milk supply was vulnerable--a terrorist could potentially poison 100,000 gallons of milk by sneaking a few grams of botulinum into a milk tanker. Although the government and dairy industry have collaborated to intensify the heat pasteurization formula for milk, Wein is still pushing for additional botulinum testing, which he says would cost less than 1 percent of the cost of milk.

Wein also has used math to study smallpox outbreaks, the U.S. fingerprint identification system and U.S.-Mexico border security issues. Wein's congressional testimony on the fingerprint identification system in 2004 led to a switch from a two-finger system to a 10-finger system. His 2003 research on anthrax attacks resulted in a Washington, D.C., pilot program to use the U.S. Postal Service to distribute antibiotics throughout the capital after an outbreak. Seattle is now testing a similar program.

"In Washington, D.C., now, if there is a large-scale anthrax attack, postal workers will be the first to get their Cipro and, on a voluntary basis, they will go door-to-door distributing antibiotics," Wein said.

He said the common thread throughout his research is queuing theory, or the mathematical study of waiting lines, but he also draws upon mathematical epidemiology for his smallpox studies; air dispersion models for the anthrax model; supply chain management for the milk study; probability theory for the fingerprint identification system; and models for nuclear transport and detection for his work with containers.

From tainted lactose to lattice structures

While Wein is working on improving the government's counterterrorism systems, Jonathan Farley is working to figure out when terrorist organizations have been effectively disrupted. His mathematical model is designed to help law enforcement decide how to act once they have captured or killed a terrorist or a number of terrorists in a cell.

A professor at the University of the West Indies who will chair the Department of Mathematics and Computer Science there next year, Farley is on a one-year science fellowship at CISAC. In 2003, he co-founded Phoenix Mathematical Systems Modeling Inc., a company that develops mathematical solutions to homeland security problems.

He is using lattice theory--a branch of mathematics that deals with ordered sets--to determine the probability a terrorist cell has been disrupted once some of its members have been captured or killed.

"Law enforcement has to make decisions about what resources they should allocate to target different cells," Farley said. "The model should provide them with a more rational basis for allocating their scarce resources. ... It will inform you when you're making decisions about how much time and effort and how much money you're going to spend going after a particular cell."

While at Stanford, Farley hopes to unearth the perfect structure, mathematically speaking, for a terrorist cell--or in other words, a cell structure that is most resistant to the loss of members.

"If it's possible to determine the structure of an ideal terrorist cell, you can focus on a much smaller number of possibilities, because it makes more sense to assume the adversary is going to be smart rather than stupid," Farley said.

Farley has suggested it is possible Al-Qaida and other terrorist organizations already may have figured out the perfect structure for a terror cell by trial and error.

"I don't expect Osama bin Laden to be reading lattice theory in his caves in Afghanistan," said Farley. "But if it follows from the mathematics, perhaps heuristically, the terrorists will have come to the same conclusion--that this is the best way to structure a terrorist cell."

Although Farley acknowledges his model is not a panacea for terrorism, he hopes it will help reduce guesswork that might be involved in pursuing terrorists.

"It's not that I think mathematics can solve all of these problems," Farley said. "Because it can't. But it's better to use rational means to make decisions rather than guesswork."

John B. Stafford is a science-writing intern at Stanford News Service.

All News button
1
Paragraphs

Recent events in Iran and elsewhere demand a reevaluation of the need for increasing nuclear fuel supplies and assuring reliable flow of fuel to nuclear power user states vis-à-vis the need for strengthened security for all countries against the use of weapons of mass destruction (WMD). The right of countries to a guaranteed supply of nuclear energy for peaceful uses must be balanced with the global community's desire to limit flows of nuclear material and sensitive nuclear facilities that could create opportunities for nuclear proliferation. This article proposes elements of an international regime of fresh fuel supply and spent fuel disposal that will guarantee fresh fuel supplies to countries honoring their obligations under the Treaty for the Non-Proliferation of Nuclear Weapons (NPT), while reducing concerns about diversion of spent fuel for weapons purposes. A specific application to countries with small pre-commercial uranium enrichment plants is also proposed.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Nonproliferation Review
Authors
Michael M. May
Authors
James D. Fearon
News Type
Commentary
Date
Paragraphs
Is civil war likely to break out in Iraq? It already has, according to CISAC's James D. Fearon, a political science professor who studies recent civil wars. Fearon is among four experts Time asked to comment on the current violence in Iraq.

Noah Feldman

In looking at the brewing civil war between the two groups in Iraq, it's easy to assume that the cause is ancient hatred. Nothing could be further from the truth. For the overwhelming majority of Iraqi history, Sunnis and Shi'ites have lived peacefully side by side, and numerous Iraqis are the children of mixed marriages. Instead we are witnessing in Iraq what occurs when government collapses and there is no state around capable of guaranteeing personal security.

What do you do when your family is in peril and you cannot turn to the government for protection? The answer is that you will take security wherever you can get it. You need to find some group that will be capable of keeping you safe, and that group had better be one that can count on your loyalty just as you can count on its protection. If you are a member of my ethnic, racial or religious group, then we share at least some basic bond, which may be enough to ensure our loyalty to one another. I need some assurance that you will have my back, and identity is better than nothing.

Sunnis and Shi'ites may find themselves joining militias or supporting denomination-based political parties even if they are not particularly pious and would much prefer not to. Something similar happened in the former Yugoslavia when its government collapsed with the fall of communism and nothing replaced it. Ethnic activists - call them identity entrepreneurs - will always form the core of the new militia. These radicals will emphasize symbols, like al-Askari mosque that was blown up last week in Iraq, and hope that followers will react by strengthening their commitments to the group itself.

Is it possible to break the cycle of violence that gets under way when identity groups move toward civil war? One answer is for an outside force to impose a solution. The killing did not stop in Bosnia or Kosovo until Western powers showed they were willing to bomb. But this approach is not viable in Iraq, where U.S. bombs came first and civil strife has followed. Instead the only way out of the violence is for Iraqis to realize that they have more to gain by negotiating a settlement between their groups than they do by allowing a full-blown brothers' war to break out.

Vali Nasr Author The Shia Revival (forthcoming)

What lies at the heart of the sectarian violence in Iraq is not so much religious dispute as it is a very secular competition for power and prominence in the new Iraq. Iraq is not all that different from Northern Ireland or Bosnia, where religion paraded as ethnicity and became a vehicle for communal rivalries. In the vacuum of power left by the fall of Saddam Hussein, the game of numbers has favored Shi'as, who are 60% of the population. It is for this reason that they wholeheartedly embraced democracy. Disgruntled Sunnis, on the other hand, vested their fortunes in boycott and violence, hoping that as spoilers, they would gain leverage in negotiating over the future.

Few in the West recognized the depth of either the Shi'a anger at the Saddam regime or the Sunni rage born of loss of power. There is a strong sense of Iraqi identity among both Shi'as and Sunnis, but as strong allegiance to sect and ethnicity in every election has shown, a shared notion of what Iraqi identity means and how each community sees the future of Iraq is fast disappearing. As happened in Bosnia, in Iraq mixed marriages and shared memory of coexistence will not be enough to stop internecine violence.

Shi'as embraced the political process that the U.S. set in place in 2003 in the hope that it would guarantee their security and serve their interests. There is indication now that many Shi'as are having second thoughts. Already overstretched in facing the Sunni insurgency, the U.S. can hardly afford losing the Shi'a as well. If tensions escalate to a full-blown civil war, Iran, Saudi Arabia, Jordan and Syria may all join the war to protect their co-sectarians and to scramble for pieces of a failed Iraq.

Pulling Iraq back from the brink will be difficult. Building a strong central government and an effective security force will help. The challenge is to get them up and running before events on the ground pass a point of no return.

James D. Fearon

By any reasonable definition, there has been a civil war in progress in Iraq at least since the Coalition Provisional Authority formally handed over authority to the Iraqis in 2004. A civil war is a violent conflict within a country fought between organized groups seeking to compel a major change in government policies or to take control of the center or a region. The insurgents in Iraq target the U.S. military, but they are also fighting against the Shi'ite-dominated Iraqi government and killing large numbers of Iraqis. There is little reason to think that if the U.S. suddenly withdrew, the insurgents would not continue to fight to control or shape the government.

When we hear talk about incipient civil war in Iraq, the fear is of an escalation of the current insurgency into a much bigger war. Analysts may have in mind something like the U.S. Civil War, with Sunni and Shi'ite armies fighting each other across well-defined fronts. Or they may imagine a sudden spasm of massive communal conflict and ethnic cleansing along the lines of Bosnia or Rwanda. Neither scenario is all that likely, although bouts of violent ethnic cleansing are certainly possible in a few parts of the country, especially Kirkuk.

My guess would be that as the insurgency continues to create insecurity, sectarian militias will continue to grow in power and influence. They will increasingly supply local security, but in the form of protection rackets that extort as they protect. They will clash with each other over territory and control of revenue sources. Since the Sunnis remain highly disorganized, some of these local fights may initially be intra-Shi'ite. But in the absence of effective political incorporation and protection from national police and army units - which are heavily infiltrated by Shi'ite militias - Sunnis will gradually form a patchwork of militias. Neighborhood-by-neighborhood conflict and violence will increase. Think Lebanon.

Juan Cole

If you look at the ethnic conflicts and street demonstrations during Iraq's modern history, it is remarkable how few have involved Shi'ites fighting Sunnis. During the colonial era, Iraqis were united by their opposition to the British occupation. Sunni and Shi'ite tribes cooperated in rebelling against British rule, and were only put down with a bombing campaign in 1920 that killed 9,000. In 1941 mobs targeted Iraq's small Jewish population; Jews had been a valued part of the Iraqi national fabric but were accused, unfairly, of being pro-colonial. After World War II, much of the violence in Iraq was fueled by issues of class. In 1948 slum dwellers and railway and oil workers revolted against a government treaty with Britain. In 1959, Arab nationalists assassinated Communist Party members, while mobs in Mosul and Kirkuk attacked and killed rich businessmen and landowners.

Iraqi Muslims have not all along been severely divided by religious sect. There have been many instances of strong cooperation between Sunnis and Shi'ites. Other social divides have led to mob violence in the past, but Iraqis have overcome them to re-establish national unity. It remains to be seen whether they can accomplish this feat again.

All News button
1
Subscribe to Middle East and North Africa