Paragraphs

When Norwegian and U.S. scientists launched the Black Brant XII sounding rocket from a small island off Norway's northwest coast on January 25, 1995, they intended for it to harmlessly collect scientific data about the Northern Lights. But when Russia's early warning system radars detected the rocket, they generated an alarm that entered the nuclear forces command and control system and reached the highest levels of government. An accidental nuclear war was never a possibility--by the time the alarm reached Russian President Boris Yeltsin, the rocket had been properly identified--but the incident clearly demonstrated the dangers of a launch-on-warning posture.

A Cold War hangover, launch-on-warning was designed to provide additional protection to nuclear forces by ensuring that a retaliatory attack could be initiated before a first strike obliterated its targets. Implementing launch-on-warning required substantial investment into a network of early warning radars and satellites--plus a command and control system that would allow missiles to be on constant "hair-trigger alert." Its cost proved high enough that only two nuclear powers--the United States and Soviet Union--established a launch-on-warning capability. Nearly 15 years after the Soviet Union's collapse, neither the United States nor Russia have abandoned it.

Numerous proposals have tried to address launch-on-warning concerns. Most point to the Black Brant XII incident as evidence that the precipitous decline of the Russian early warning and command and control systems is the main problem. The argument is simple: If the early warning system was unreliable a decade ago when it was in relatively good shape, imagine how bad the situation is today, after years of decline. Accordingly, many believe the remedy lies in helping Russia compensate for the disrepair, either by creating arrangements that would allow Russia and the United States to share their early warning data, or by providing direct assistance to Russia that would allow it to upgrade its system. These proposals are misguided. Repairing the Russian early warning system would actually increase the danger of an accidental launch.

The reason for this is that the role of the Russian early warning system today is marginal at best. Even in its prime, the system could not provide the data necessary for a launch-on-warning strike. The radar network has always had serious gaps in coverage and the space-based segment of the system was not designed to detect sea-launched missiles. In addition to this, a series of problems plagued the system during its development and early deployment stages. As a result, the Soviet military learned to regard the alarms it generated with suspicion.

The system's deterioration has only added to doubts about its ability to provide a reliable warning. The breakup of the Soviet Union left most of the radars outside Russian territory. At present, Russia operates only three early warning satellites, while minimally reliable coverage of U.S. territory requires at least five. No second-generation satellites, which would expand coverage to the oceans, are operational today. This leaves Russia with an early warning system it can't really trust.

The lack of trust is exactly the reason why the decline of the system is much less dangerous that it may seem. The continued disrepair erodes confidence in the system's performance further and makes it much less likely that an alarm (whether real or false) would be acted upon. Attempts to repair or upgrade the system, on the other hand, would only increase the danger of miscalculation, since such actions would introduce new elements into an already complex system and boost confidence in its performance.

By the same logic, the United States should not be complacent about its early warning system simply because it is thought to be more robust and reliable than its Russian counterpart. High confidence in the U.S. system could make a technical malfunction--should one ever occur--an extremely dangerous event, since U.S. operators would be unlikely to question the information provided by the system.

The best way to deal with the dangers of accidental launch is to remove missiles from hair-trigger alert, for example by introducing physical barriers that would prevent a launch on warning. Technical solutions that have been suggested include removing warheads from missiles or limiting submarine patrol areas. None of these measures have been implemented, since they involve intrusive and cumbersome verification provisions that neither side is willing to accept. What these proposals don't take into account though is that the main goal of de-alerting--reducing the risk of accidental launch--does not require transparency or verification. If a missile does not have a warhead, it won't be able to leave a silo regardless of whether or not one can verify it. In this respect de-alerting is quite different from disarmament, where verification rightfully belongs.

Moreover, transparency could make de-alerting potentially dangerous. Reducing a missile's readiness for all the world to see could create instability during a crisis. If one country decides to bring its missiles back into operation, its counterpart might feel the need to do the same lest its forces remain unprepared for a launch. This might create a rush to re-alert forces, and the dangers associated with re-alerting could outweigh any de-alerting benefits. Ideally, de-alerting measures should be completely undetectable. This approach would remove missiles from the launch-on-warning equation while minimizing the instabilities associated with re-alerting.

With the verification hurdle removed, there is no reason why the United States and Russia should not make a public commitment to de-alert their strategic arsenals. They don't even need to do it together. De-alerting is beneficial even when done unilaterally. Of course, there will be plenty of questions about the value of commitments that are neither enforceable nor verifiable. But the value would be quite real--thousands of missiles would no longer be on hair-trigger alert. And the next time Norway launches a scientific sounding rocket, we can all breathe a little easier.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
Pavel Podvig
Authors
News Type
Commentary
Date
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All News button
1
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Washington Post
Authors
Authors
News Type
News
Date
Paragraphs

In May, North Korean leaders hinted to visiting U.S scholar John W. Lewis that they're willing to resume negotiations with the United States on nuclear arms. But if those talks are revived, North Korea wants to focus on mutual steps toward a denuclearized Korean peninsula. The Bush administration has said repeatedly it doesn't want to depart from six-way nuclear talks. (Mike Shuster's full report on NPR's Morning Edition is linked below.)

Daniel Sneider writes, "There is a small crack in the otherwise closed door between the United States and North Korea. That is part of the message Stanford Professor John W. Lewis, an expert on Northeast Asian security issues, brought back this past week from a visit to China and North Korea." (Sneider's column, "Window is closing for U.S. in N. Korean nuclear talks," is linked below.)

All News button
1
Paragraphs

Robert McNamara is worried. He knows how close we've come. His counsel helped the Kennedy administration avert nuclear catastrophe during the Cuban Missile Crisis. Today, he believes the United States must no longer rely on nuclear weapons as a foreign-policy tool. To do so is immoral, illegal, and dreadfully dangerous.

This article, the cover story for the May/June 2005 issue of Foreign Policy, began as a talk McNamara delivered at Stanford to CISAC researchers, staff, and friends on Oct. 18, 2004.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Foreign Policy
Authors
Paragraphs

The nuclear Nonproliferation Treaty (NPT) provides that a state-party intending to withdraw from the treaty must give the UN Security Council three months' notice of its intention and provide the Security Council with its reasons for withdrawal. This provision was intended to give the Security Council an opportunity to deal with any withdrawal that might produce a threat to international peace and security.

More than two years ago, North Korea renewed its 1993 notice of withdrawal from the NPT, a notice that had been suspended a decade earlier during negotiations with the United States. That announcement left the Security Council with only a single day before North Korea would become the first country to withdraw from the NPT.

The Security Council did nothing. Indeed, it has continued to ignore North Korea's action even as Pyongyang has repeatedly stated its intention to produce nuclear weapons, sending a dangerous message to other states considering withdrawal. The once-every-five-years NPT review conference that will meet in New York this month provides a valuable opportunity to address the North Korea case and prod the Security Council to address similar cases that may emerge.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Arms Control Today
Authors
Authors
Karthika Sasikumar
News Type
Commentary
Date
Paragraphs
"We hardly needed the 30th anniversary of the Vietnam War's end to remind us of that war," write CISAC Fellows Lien-Hang Nguyen and Karthika Sasikumar. "Iraq provides daily reminders, prompting frequent comparisons to Vietnam." If the United States applies some lessons from Vietnam, it need not repeat past mistakes in Iraq, the researchers argue in this op-ed.

We hardly needed the 30th anniversary of the Vietnam War's end to remind us of that war. Iraq provides daily reminders, prompting frequent comparisons to Vietnam. While many of the analogies are misplaced, looking back at America's intervention in Vietnam can be valuable.

The major challenge now facing the United States in Iraq is to establish a stable and powerful indigenous military to provide a secure environment for nation-building.

The U.S. Army's initial unwillingness to integrate South Vietnamese soldiers into its military plans--and its later inability to motivate the indigenous troops to take over the fighting--tells us what to avoid in Iraq.

The old Iraqi army fell apart in April 2003 as American soldiers marched on Baghdad. As the insurgency grew and American casualties mounted, the coalition forces started putting Iraq's army together again. Many of the same soldiers came back to sign up--it was only at the higher levels that Baathist officers were purged. Both Iraq and the United States have an interest in strengthening a purely Iraqi force.

Still some lessons

President Bush calls the comparison of Iraq with Vietnam a "false analogy" and accuses those who use it of sending the wrong message to the enemy and to the troops. Likewise, Rep. Richard Baker, R-La., calls the analogy "wrong, disturbing and dangerous."

In fact, Vietnam does not make for a good comparison with Iraq--but the differences are informative. The most striking difference between the two situations is in the sequence of war and nation-building. In Vietnam, the United States attempted nation-building under South Vietnamese President Ngo Dinh Diem's administration for nearly a decade before intervening directly with ground troops; in Iraq, a short and overwhelming display of force preceded nation-building. Moreover, the Americans were facing a much stronger adversary--including an organized army--in Vietnam.

Beginning in 1969, the Nixon administration implemented its policy of "Vietnamization," withdrawing U.S. troops while simultaneously turning over to the Army of the Republic of Vietnam the fighting and the pacification efforts. By 1973, the South Vietnamese army was the strongest in Southeast Asia, boasting more than 1 million soldiers and toting the most advanced weaponry, thanks to U.S. Army programs such as Enhance and Enhance Plus. However, unimpressive performances during a joint incursion into Cambodia and the 1972 spring offensive testified otherwise. Finally, on April 30, 1975, Saigon fell to the communists. Where did Vietnamization go wrong?

From the entry of American ground forces in 1965, South Vietnamese forces were made to feel marginalized in defending South Vietnam. This was mainly due to the U.S. Army's belief in 1965-69 that the South Vietnamese troops were essentially irrelevant to victory or defeat. Not only were the soldiers equipped with inferior weapons, underpaid and given poor housing compared to their American counterparts, but they also were relegated to so-called pacification missions.

U.S. soldiers had more respect for their enemies from the North than for their allies in the South. Training and communication were beset with linguistic, social and cultural barriers. By the time South Vietnamese soldiers started replacing U.S. soldiers in 1969, it was too late to induce them to adopt what had come to be regarded as U.S. strategic goals, rather than South Vietnamese ones.

It's not too late

Now, in Iraq, a window of opportunity is still open for Americans. According to Anthony Cordesman of the Center for Strategic and International Studies, the United States wasted the whole first year after the invasion in halfhearted attempts to create effective Iraqi military and police forces. The bulk of the army is made up of soldiers who were fighting Americans a few months ago. Ethnic and religious divisions among the men, and their legacy of service under an autocrat, make it difficult for them to attain modern professional military standards. However, the Iraqi people are much less distrustful of the Iraqi army than they are of occupying U.S. forces.

The Multinational Security Transition Command, set up late last year, must focus on the Iraqi army's esprit de corps. It is not too late to incorporate and integrate Iraqi forces in strategic planning and operations so that they have a stake in securing a stable Iraq. Otherwise, the Iraqi army will soon be overwhelmed by the size and hostility of a growing insurgency.

The Vietnam analogy has too often been deployed in times of political conflict in the United States. But the comparison can be useful. If we learn the right lessons from the mistakes in Vietnam, we need not be condemned to repeat them in Iraq.

All News button
1
Authors
William J. Perry
News Type
Commentary
Date
Paragraphs
"Of the Pentagon's $419.3 billion budget request for next year, only about $10.5 billion--2 percent--will go toward basic research, applied research and advanced technology development," write %people1% and John M. Deutch, former secretary and assistant secretary of defense, respectively, in a New York Times op-ed. This 20 percent reduction will weaken national security in the long run, they warn, adding, "Secretary of Defense Donald Rumsfeld should reconsider this request, and if he does not, Congress should restore the cut."

Of the Pentagon's $419.3 billion budget request for next year, only about $10.5 billion - 2 percent - will go toward basic research, applied research and advanced technology development. This represents a 20 percent reduction from last year, a drastic cutback that threatens the long-term security of the nation. Secretary of Defense Donald Rumsfeld should reconsider this request, and if he does not, Congress should restore the cut.

These research and development activities, known as the "technology base" program, are a vital part of the United States defense program. For good reason: the tech base is America's investment in the future. Over the years, tech base activities have yielded advances in scientific and engineering knowledge that have given United States forces the technological superiority that is responsible in large measure for their current dominance in conventional military power.

Research into basic understanding of methods for reducing radar signatures in the 1970's, for example, gave rise to "stealth" technology. Advances in electronic sensor technology enable the vast collection of information from satellites, and past work on computer systems permits distribution of this information in near real-time to military commanders. The combination of near-real-time intelligence and precision munitions are the heart of the so-called "revolution in military affairs" that avoids large and costly systems and approaches.

These advances require years of sustained effort by university, industry and government researchers. If the Pentagon does not make the required investments today, America will not have dominant military technology tomorrow.

The technology base program has also had a major effect on American industry. Indeed, it is the primary reason that the United States leads the world today in information technology. American companies not only draw heavily on the Pentagon's work, but they have also come to depend on it. The research and development programs of many of America's major information technology companies are almost exclusively devoted to product development.

It was the investment of the Defense Advanced Research Projects Agency in a network known as ARPA-net in the 1960's and 70's, for example, that gave rise to the Internet. The JPEG file format for digital images is based on software and standards developed by the Pentagon. The global positioning satellite system, first developed for precision-guided munitions, is now used in many cellphones and has the potential to revolutionize our air traffic control system. America's ability to translate the Pentagon's technology base into commercial achievement is the envy of the world.

Of course, the administration and Congress need to make tough budget choices. But to shift money away from the technology base to pay for Iraq, other current military operations or research on large, expensive initiatives, is to give priority to the near term at the expense of the future. This is doubtful judgment, especially at a time when the nature of the threat confronting America is changing. New threats, like catastrophic terrorism and the spread of weapons of mass destruction, urgently call for new technology.

There should be no doubt that basic research will continue to make a contribution. Robotics, artificial intelligence, biotechnology, brain and cognitive sciences, nanotechnology, large-scale modeling and simulation: all these fields can have a huge impact. If properly supported, basic technology work is likely to lead to unprecedented results.

Mr. Rumsfeld has long championed the need to transform the military and exploit new technology. He has supported the technology base in the past and has urged the adoption of a more long-term view of security needs. He should, then, be willing to review and reverse the Pentagon's request for reducing its technology base. He should understand that short-term budget requirements for the armed services always tend to push out the technology base program - unless the Pentagon leadership supports it.

Perhaps the reason for this year's reduction is the mistaken belief that a one-year gap in financing does not matter, because innovation takes so long. But tech base advances occur because of stable financing. Fluctuating budgets cause wasted effort.

It is possible that Congress will restore the cuts in technology base programs and correspondingly reduce some other part of the defense budget. But Mr. Rumsfeld should not depend on Congress. It would be vastly better if the Pentagon understood the importance of the tech base effort, and acted on that understanding.

The Department of Defense's technology base programs have been an important factor in giving America the dominant military force in the world. They have also helped many American information technology companies become successful. The Pentagon should maintain its dedication to these programs, and that will require leadership from the secretary of defense - as well as support from Congress.

John Deutch, a professor of chemistry at M.I.T., was deputy secretary of defense from 1994 to 1995. William J. Perry was secretary of defense from 1994 to 1997.

All News button
1
-

Cellular prion protein (PrPC) is present in the healthy adult brain. It is a presumably essential membrane protein but its cellular function is unclear. Like Ice-9 - the fictitious water allotrope in Kurt Vonnegut's Cat's Cradle, which "taught the atoms a novel way in which to stack, lock and crystallize until the oceans turned to ice" - cellular prion protein can, in a rare event, adopt a pathogenic and 'contagious' shape, PrPSc, which causes mad cow disease or Bovine Spongiform Encephalopathy (BSE). New variant Creutzfeldt Jakob Disease (vCJD) is the human malady attributed to eating beef tainted with BSE. In comparison to the UK epidemic (at the peak of which 37,280 cases of BSE were reported in the single year 1992), the emergence of four North American mad cows since May 2003 is minor yet still alarming. This work examines the USDA's response to indigenous BSE as manifested in "The Final Rule" (9 CFR 93-96, Jan 4, 2005) and questions whether current regulations are stringent enough to keep PrPSc out of cattle feed and human food.

Sheila Healy is a CISAC Science Fellow. She is currently analyzing USDA policy addressing Bovine Spongiform Encephalopathy (BSE) or mad cow disease. She recently finished a postdoctoral appointment in Stanley Prusiner's laboratory in the Department of Neurology at the University of California, San Francisco. There she studied the molecular and structural requirements for the conversion of cellular prion protein to its pathogenic form, the agent that causes BSE. She holds a doctoral degree in biochemistry and molecular and cellular biology from the University of Arizona.

Reuben W. Hills Conference Room, East 207, Encina Hall

Sheila Healy
Seminars
-

The Energy Security Initiative (ESI) is a proposal to increase the benefits offered to countries in good standing with their NPT Obligations, to compensate for all the new supply restrictions and intrusive safeguards requirements imposed on them. The NPT Balance between benefits to signatories and impositions made on them has eroded through more restrictive interpretations of the NPT. The recently implemented Additional Protocol, the Proliferation Security Initiative (PSI) and the proposals to deny nuclear fuel cycle facilities to countries not yet operating them on the one hand, and the limited supply of low cost nuclear energy available to developing countries on the other hand, demonstrate the need to re-constitute the balance implied in the NPT. It is, in fact, in the self interest of the developed countries, to be able to offer an expanded menu of additional energy benefits to countries whose current scope of available benefits has shrank, while the costs of complying with all new restrictions imposed and proposed has increased. This is the purpose of the ESI, which represents a reinterpretation and expansion of a part of Article IV of the NPT.

This presentation includes a detailed description of what ESI could offer under a new reading of article IV; which countries could qualify as beneficiaries of such program, how much might the total program cost, and how to fund it. A special case dealing with small national enrichment plants in countries such as Iran or Brazil is also considered.

Chaim Braun is a vice president of Altos Management Partners, Inc., and a CISAC science fellow and affiliate. He is a member of the Near-Term Deployment and the Economic Cross-Cut Working Groups of the Department of Energy (DOE) Generation IV Roadmap study. He conducted several nuclear economics-related studies for the DOE Nuclear Energy Office, the Energy Information Administration, the Electric Power Research Institute, the Nuclear Energy Institute, Non-Proliferation Trust International, and others. Braun has worked as a member of Bechtel Power Corporation's Nuclear Management Group, and led studies on power plant performance and economics used to support maintenance services. Braun has worked on a study of safeguarding the Agreed Framework in North Korea, he was the co-leader of a NATO Study of Terrorist Threats to Nuclear Power Plants, led CISAC's Summer Study on Terrorist Threats to Research Reactors, and most recently co-authored an article with CISAC Co-Director Chris Chyba on nuclear proliferation rings. His research project this year is entitled "The Energy Security Initiative and a Nuclear Fuel Cycle Center: Two Enhancement Options for the Current Non-Proliferation Regime."

Reuben W. Hills Conference Room, East 207, Encina Hall

Chaim Braun
Seminars
Subscribe to The Americas