Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
-

Jacob N. Shapiro is a graduate student in political science at Stanford University and a homeland security fellow at CISAC. He is also an associate at the Combating Terrorism Center at the United States Military Academy and teaches on terrorist financing at the Naval Postgraduate School. His research focuses on the organizational dynamics of terrorist groups. His current projects use economic and sociological organization theory to examine the interactions between individual motivations and organizational structure in covert groups. As a Naval Reserve officer he was assigned to the Office of Naval Intelligence and the Naval Warfare Development Command. Prior to attending Stanford, he served on active duty at Special Boat Team 20 and onboard the USS Arthur W. Radford (DD-968). He received his BA with honors in political science from the University of Michigan.

Reuben W. Hills Conference Room

Jacob N. Shapiro Speaker
Seminars
Paragraphs

Part I of this article looks at the American institution of legal controls on the executive branch and their subsequent erosion post-9/11. It explores three changes incorporated in the USA PATRIOT Act: alterations to the Foreign Intelligence Surveillance Act; the introduction of Delayed Notice Search Warrants; and the expansion of National Security Letters. Outside of this legislation, the weakening of the Attorney General guidelines

increased the FBI's ability to collect information. The article highlights the Department of Defense's ("DOD") movement into the domestic surveillance realm. It discusses a number of operations both inside and outside the DOD, such as TALON, Echelon, Carnivore, Magic Lantern, TIPS, and the use of watch lists. Part I concludes with a discussion of the data mining efforts underway. The article argues that Total Information Awareness, ADVISE, and other projects catapult surveillance into another realm. Moreover, while any one program, such as the NSA initiative, may be considered on narrow grounds, the sheer breadth of current powers raises important concerns.

Part II notes that, until recently, no laws governed police and intelligence service information-gathering authorities in the UK. Extraordinary stop and search powers for terrorist-related offences, and warrants for police interference with property provided exceptions. But physical searches of property conducted by the intelligence services, the interception of communications by law enforcement and intelligence agencies, the use of covert surveillance or "electronic bugs," and the running of covert human intelligence sources operated under the legislative and judicial radars. Beginning in the mid-1980s, the European Court began to raise objections to the lack of safeguards and statutory framework. But each time the Court handed down a significant finding against the United Kingdom, the state responded not just by, at least on the surface, meeting the demands of the European Convention of Human Rights, but, it appears, by expanding executive surveillance authorities. Moreover, the warrant system introduced retained control within the executive branch. Not subject to judicial review, the standard applied is reasonable suspicion--considerably less robust than probable cause. Like the United States, Britain draws on new technologies; the country leads the world in its use of public surveillance systems.

Having laid out legal developments on both sides of the Atlantic, Part III moves to policy concerns: it begins by briefly exploring the substantive, political, legal, social, and economic risks posed by such measures. It then considers six approaches that would help to mitigate the risks. First is the possibility of creating a property right in personal information. The second centers on the regulation of access, transfer, use, and retention of data. Such efforts would satisfy demands for accountability and transparency in both the public and private sector. A third possibility centers on scaling back the existing powers of the state. Fourth, both countries may contemplate placing limits on what constitutes national security. Fifth, alternative safeguards and oversight structures deserve attention - such as reporting requirements, random audits, the creation of ombudspersons, the insertion of the judiciary, and (in the UK) allowing intercepted communications to be used as evidence. Sixth, preventing countries from introducing ever greater powers of surveillance under the claim that they are only temporary in nature would force legislatures to consider the long-term impact of provisions beyond the immediate terrorist threat.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Criminal Law and Criminology
Authors
-

Philip Coyle is a recognized expert on U.S. and worldwide military research, development and testing, on operational military matters, and on national security policy and defense spending, including defense acquisition reform and defense procurement. He also has extensive background in missile defense, in military space systems, and in high-technology weapons, such as high power lasers and other directed-energy weapons.

From Sept. 29, 1994, through Jan. 20 2001, Coyle was assistant secretary of defense and director of Operational Test and Evaluation, in the Department of Defense, and he is the longest serving director in the 20-year history of the office. In this capacity, he was the principal advisor to the secretary of defense on test and evaluation at DoD.

Appointed by President George W. Bush to serve on the 2005 Defense Base Realignment and Closure Commission, Coyle is currently serving on that commission, and was nominated for this position by House Minority Leader Nancy Pelosi. Coyle has 40 years experience in research, development, and testing matters. From 1959 to 1979, and again from 1981 to 1993, he worked at the Lawrence Livermore National Laboratory in Livermore, California. From 1987 to 1993, he served as laboratory associate director and deputy to the laboratory director. In recognition of his 33 years service to the laboratory and to the University of California, the university named him laboratory associate director emeritus.

Coyle graduated from Dartmouth College with an MS in mechanical engineering (1957) and a BA (1956). His wife, Dr. Martha Krebs, was assistant secretary of energy and director of the office of science from 1993 to 2000, and was the founding director of the new California NanoSystems Institute, a research partnership between UCLA and U.C. Santa Barbara. They have four grown children and four grandchildren, and live in Los Angeles.

Reuben W. Hills Conference Room

Philip Coyle Former Assistant Secretary of Defense for Operational Tests and Evaluation Speaker
Seminars
-

Matthew Rojansky is a JD candidate at Stanford Law School and a CISAC predoctoral fellow. His research focuses on international law and security, counter-terrorism and counter-proliferation. He is currently conducting a study of UN Security Council legitimacy in the global counter-terrorism context, and developing a theory of network-based attribution for internationally wrongful acts. He has worked for the U.S. Department of Justice's Office of Special Investigations, the National Democratic Institute for International Affairs, the Israel Ministry of Foreign Affairs, and private law firms, where he has worked on international trade and IP litigation.

He received an AB in Soviet history from Harvard University. Next year, he will serve as a clerk for the United States Court of Appeals for the Armed Forces.

Reuben W. Hills Conference Room

Matthew Rojansky Speaker
Seminars
Authors
James D. Fearon
News Type
Commentary
Date
Paragraphs
Is the conflict in Iraq a civil war or not? Debate over this question is largely political. James D. Fearon sets aside politics to explain the meaning of civil war and how it applies to Iraq.

Does the conflict in Iraq amount to a civil war? In many ways, the public debate over this question is largely political. Calling Iraq a "civil war" implies yet another failure for the Bush administration and adds force to the question of whether U.S. troops still have a constructive role to play.

Politics aside, however, the definition of civil war is not arbitrary. For some -- and perhaps especially Americans -- the term brings to mind all-out historical conflicts along the lines of the U.S. or Spanish civil wars. According to this notion, there will not be civil war in Iraq until we see mass mobilization of sectarian communities behind more or less conventional armies.

But a more standard definition is common today:

1) Civil war refers to a violent conflict between organized groups within a country that are fighting over control of the government, one side's separatist goals, or some divisive government policy.

By this measure, the war in Iraq has been a civil war not simply since the escalation of internecine killings following the bombing of a Shiite shrine in Samarra in February, but at least since the United States handed over formal control to an interim Iraqi government in June 2004.

Here's why: Although the insurgents target the U.S. military, they are also fighting the Shiite-dominated Iraqi government and killing large numbers of Iraqis. There is little reason to believe that if the United States were suddenly to withdraw its forces, they would not continue their battle to control or shape the government.

Political scientists who study civil war have proposed various refinements to this rough definition to deal with borderline cases. One issue concerns how much killing has to occur -- and at what rate.

2) For a conflict to qualify as a civil war, most academics use the threshold of 1,000 dead, which leads to the inclusion of a good number of low-intensity rural insurgencies.

Current estimates suggest that more than 25,000 Iraqis have been killed in fighting since the U.S.-led invasion in March 2003 -- a level and rate of killing that is comparable to numerous other conflicts that are commonly described as civil wars, such as those in Lebanon (1975-1990) and Sri Lanka (beginning in 1983).

The organization -- or rather, disorganization -- of the warring communities in Iraq means that a large-scale conventional conflict along the lines of the U.S. Civil War is unlikely to develop. More probable is a gradual escalation of the current "dirty war" between neighborhood militias that have loose ties to national political factions and are fighting almost as much within sectarian lines as across them.

This is roughly what happened in Lebanon and at a lower level in Turkish cities in the late 1970s. Ethnic cleansing will occur not as a systematic, centrally directed campaign (as in Bosnia), but as a result of people moving to escape danger.

And there's another twist to the terminology:

3) If the conflict in Iraq becomes purely a matter of violence between Sunni and Shiite communities driven by revenge and hatred rather than by political goals, many political scientists would say that it is something other than civil war.

Almost no one, for example, calls the Hindu-Muslim violence in India a civil war.

A civil war has to involve attempts to grab power at the center of government or in a given region, or to use violence to change some major government policy.

In Iraq's case, however, the vacuum of power at the center means that communal violence will inevitably be tied to struggles for political power and control.

A final complication concerns the nature of international involvement. Some argue, for example, that the war in Bosnia should be seen as an interstate war rather than a civil war, since the Bosnian Serb forces were armed and directed largely by Belgrade. Post-Mobutu violence in Congo is often termed a civil war, even though fighters have been closely tied to armies from neighboring states.

4) A conflict may be both a civil and an interstate war at the same time.

The Vietnam War, for instance, clearly comprised both a civil war in the South and an interstate war involving the North, the South and the United States.

Iraq may be moving in this direction. The United States and Britain are already openly involved, and such neighboring countries as Iran and Syria are more covertly involved. Not that it matters to the people dying there, but the next debate here may turn on whether what is already a civil war in Iraq should be viewed as an interstate war as well.

All News button
1
-

Brian Jenkins is a senior advisor to the president of the RAND Corporation and one of the world's leading authorities on terrorism. He founded the RAND Corporation's terrorism research program in 1972, has written frequently on terrorism, and has served as an advisor to the federal government and the private sector on the subject. A former Army captain who served with Special Forces in Vietnam, he is also a former deputy chairman of Kroll Associates. He served as a captain in the Green Berets in the Dominican Republic and later in Vietnam (1966-1970). In 1996, he was appointed by President Clinton to be a member of the White House Commission on Aviation Safety and Security. He has served as an advisor to the National Commission on Terrorism (1999-2000) and in 2000 was appointed as a member of the U.S. Comptroller General's Advisory Board. He is Is also a special advisor to the International Chamber of Commerce (ICC) and a member of the board of directors of the ICC's Commercial Crime Services. He is the author of International Terrorism: A New Mode of Conflict, the editor and coauthor of Terrorism and Personal Protection, coeditor and coauthor of Aviation Terrorism and Security, and coauthor of The Fall of South Vietnam.

Reuben W. Hills Conference Room

Brian Jenkins Senior Advisor to the President Speaker RAND Corporation
Seminars
Paragraphs

In this article, we critique the Eurocentric character of security studies as it has developed since World War II. The taken-for-granted historical geographies that underpin security studies systematically misrepresent the role of the global South in security relations and lead to a distorted view of Europe and the West in world politics. Understanding security relations, past and present, requires acknowledging the mutual constitution of European and non-European worlds and their joint role in making history. The politics of Eurocentric security studies, those of the powerful, prevent adequate understanding of the nature or legitimacy of the armed resistance of the weak. Through analysis of the explanatory and political problems Eurocentrism generates, this article lays the groundwork for the development of a non-Eurocentric security studies.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Review of International Studies
Authors
Authors
News Type
Commentary
Date
Paragraphs
President Bush is right to stress the importance of math education for U.S. students, writes CISAC science fellow Jonathan Farley in the San Francisco Chronicle. Practical, urgent national security problems--like fighting terrorism--illustrate the need for more U.S. mathematicians, Farley says. These pressing needs may also be the key to enticing teachers and students to pursue the subject.

In his State of the Union address in January, President Bush stressed the importance of improving math education. He proposed to "train 70,000 high school teachers to lead advanced placement courses in math and science, bring 30,000 math and science professionals to teach in classrooms, and give early help to students who struggle with math."

But where will these teachers come from? And will the training of teachers be sufficient to increase the number of students choosing math and science careers? And why does all this matter?

Because mathematics is the foundation of the natural sciences. It is no coincidence that Isaac Newton, the man who formulated the law of gravitational attraction that revolutionized our understanding of the universe, was also the man who popularized the calculus. And the natural sciences, however pure, are what give us airplanes, cable TV and the Internet.

In the 2003 Program for International Student Assessment, a test that measures math literacy, American 15-year-olds performed worse than their peers in 23 countries, as well as those in Hong Kong. It's not hard to see why. According to the National Council of Teachers of Mathematics, 40 percent of the nation's middle school math teachers do not have the equivalent of an undergraduate minor in math. The average starting salary of a teacher is only $30,000, whereas the average starting salary for a recent college graduate in computer science or engineering is $50,000.

Short of following the British, who have proposed paying experienced math teachers more than $100,000, with a guaranteed minimum of $70,000, where will we find a way to attract the thousands of teachers George Bush wants?

New York State initiated an innovative program to bring teachers from Jamaica for two or four years to teach in New York schools. Jamaica, a developing nation where one U.S. dollar equals 65 Jamaican dollars, is nonetheless a stable, English-speaking nation with an unbroken democratic tradition; it stands poised to beat the United States in establishing the world's first Institute for Mathematical Methods in Counterterrorism. When teachers for the New York program were recruited on the campus of the University of the West Indies, recruiters found more experienced math and science teachers than they ever dreamed they would.

But you can have all the teachers in the world and still not inspire kids to learn math. My friend Autumn e-mailed me about her nephew, Joshua: "He's upset because he's asked several of the math teachers why math is important or what are certain formulas used for -- there has to be a use, correct?"

Autumn told her nephew about my work in counterterrorism and for the television crime drama "Numb3rs." Autumn reported, "He's told his math teachers about you as well, and about the show 'Numb3rs.' He's informing them that through something called lattice theory you are managing to fight terrorists -- all with math."

Mathematics is art, and should be appreciated for its beauty, not simply for its utility. But we cannot expect 11 year-olds to cherish totally order-disconnected topological spaces as much as professional mathematicians do.

As I first proposed in January 2005, television shows like "Numb3rs" (or "Medium") -- where the main characters are mathematicians -- could work with the National Council of Teachers of Mathematics to show kids how math is really used; the council and Texas Instruments are now working together to use "Numb3rs" to promote math literacy in schools.

Another way to inspire kids is to relate mathematics to something they see every day. In order to excite students and draw funding to his school, school superintendent Ronald Ross of Roosevelt, N.Y., has begun looking into the idea of creating a curriculum involving math and counterterrorism. What kinds of topics would students learn?

The opening line of the Oscar-winning movie "A Beautiful Mind" is "Mathematicians won the war." During World War II, the mathematics underlying cryptography played an important role in military planning. Winston Churchill admired Alan Turing, the mathematician who had mastered the German codes, recognizing him as the man who had perhaps made the single greatest individual contribution to defeating Hitler.

At Los Alamos, the lab that built the atomic bomb, Cliff Joslyn uses lattice theory to mine data drawn from thousands of reports of terrorist-related activity to discover patterns and relationships that were previously in shadow.

Lattice theoretical methods developed at MIT tell us the probability that we have disabled a terrorist cell, based on how many men we have taken out and what rank they hold in the organization. Lauren McGough, a Massachusetts high school student, tested the accuracy of this model by getting her classmates to pretend they were terrorists, passing orders down a fictitious chain of command, essentially confirming what the theory predicts.

High school students could learn algebra, trigonometry, calculus and logic while also learning concrete applications involving homeland security. No longer would students yawn and ask, "What is math good for?" Beauty could defeat both terror and boredom.

Whatever you may think of the State of the Union address, when it comes to supporting math education, we should all see pi to pi. President Bush is correct when he says that mathematics education in America must improve if the United States is to stay economically competitive, but the stakes are much higher than that. During the Cold War, the United States would not have tolerated a military gap between itself and its adversaries. Yet today, with 61 percent of all U.S. doctorates in math going to foreigners (15 percent to Chinese), we readily accept a "math gap."

Dollar for dollar, the best defense against our adversaries' weapons of mass destruction may be our allies in the Americas, armed with weapons of math instruction.

Improving math education is not merely a smart idea. It is a matter of national security. Algebra is one revolutionary Islamic concept we cannot afford to neglect or ignore.

All News button
1
Subscribe to The Americas