Authors
Pavel Podvig
News Type
Commentary
Date
Paragraphs

The row over U.S. intentions to deploy elements of its missile defense system in Poland and the Czech Republic has the potential of bringing U.S.-Russian relations--not to mention bilateral arms control--to a new low. Russia has disapproved of the scheme ever since the United States first went public with the system about two years ago. But despite sounding angry, Russia remained calm, arguing that it already possessed the technology to deal with the interceptors the United States planned to place in Eastern Europe.

Recently, however, Moscow decided to up the ante. Clearly inspired by the assertive and rather confrontational presentation given by President Vladimir Putin at a conference in Munich on February 10, Russian generals started painting a picture of a much harsher response to the possible deployment.

Hero Image
Bulletin 1 07cover
All News button
1
-

The speaker will describe his experiences over ten years of developing a comprehensive program to engage the formerly top secret Soviet biological weapons complex through joint scientific research and disease surveillance. He will also discuss how lessons learned can be applied to potential new efforts to reduce global threats of bioterrorism and potential pandemics.

Andrew Weber is the adviser for cooperative threat reduction policy in the Office of the Secretary of Defense. His responsibilities include developing and overseeing CTR biological threat reduction programs in the former Soviet Union, and nuclear and chemical weapons threat reduction projects in Central Asia. Before coming to the Office of the Secretary of Defense in 1996, Weber served as a U.S. Foreign Service officer in Saudi Arabia, Germany, Kazakhstan, and Hong Kong. Weber holds an MSFS degree from Georgetown University and a BA from Cornell University. He speaks Russian. Weber is an adjunct professor at the Georgetown University Graduate School of Foreign Service.

Reuben W. Hills Conference Room

Andrew Weber Senior Adviser for Cooperative Threat Reduction Policy Speaker Office of the Secretary of Defense
Seminars
Paragraphs

The current trend toward suicide bombings began in Lebanon in the early 1980s. The practice soon spread to civil conflicts in Sri Lanka, the Kurdish areas of Turkey, and Chechnya. Palestinian attacks on Israeli civilians in the 1990s and during the Al Aqsa intifada further highlighted the threat. Al Qaeda's adoption of the tactic brought a transnational dimension. Interest in the phenomenon then surged after the shock of the 2001 attacks, which involved an unprecedented number of both perpetrators and casualties. Since then, suicide bombings have expanded in number and geographical range, reaching extraordinary levels in the Iraq War and spreading around the world to countries such as Saudi Arabia, Morocco, Tunisia, Kenya, Indonesia, Turkey, Pakistan, India, Afghanistan, Egypt, Jordan, Bangladesh, and Britain.

This review covers thirteen of the books published on the subject since 2002. Three analyze the Palestinian case and four others focus on Islamist violence. The other six, including two edited collections, intend to be comprehensive. This review also refers to a few selected publications that discuss the arguments presented in the works reviewed. It aims to give readers a glimpse of the content of the different volumes as well as offer a critique.

The essay reviews these works:

  • Mia Bloom, Dying to Kill: The Allure of Suicide Terror (New York: Columbia University Press, 2005).
  • Joyce M. Davis, Martyrs: Innocence, Vengeance and Despair in the Middle East (New York: Palgrave Macmillan, 2003).
  • Diego Gambetta, ed., Making Sense of Suicide Missions (New York: Oxford University Press, 2005).
  • Mohammed M. Hafez, Manufacturing Human Bombs: The Making of Palestinian Suicide Bombers (Washington, D.C.: United States Institute of Peace Press, 2006).
  • Raphael Israeli, Islamikaze: Manifestations of Islamic Martyrology (London: Frank Cass, 2003).
  • Farhad Khosrokhavar, Suicide Bombers: Allah's New Martyrs, translated from the French by David Macey (London: Pluto Press, 2005).
  • Anne Marie Oliver and Paul F. Steinberg, The Road to Martyrs' Square: A Journey into the World of the Suicide Bomber (New York: Oxford University Press, 2005).
  • Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terrorism (New York: Random House, 2005).
  • Ami Pedahzur, Suicide Terrorism (Cambridge: Polity Press, 2005).
  • Ami Pedahzur, ed., Root Causes of Suicide Terrorism: The Globalization of Martyrdom (London and New York: Routledge, 2006).
  • Christoph Reuter, My Life is a Weapon: A Modern History of Suicide Bombing, translated from the German by Helena Ragg-Kirkby (Princeton: Princeton University Press, 2004).
  • Shaul Shay, The Shahids: Islam and Suicide Attacks (New Brunswick: Transaction Publishers, 2004).
  • Barbara Victor, Army of Roses: Inside the World of Palestinian Women Suicide Bombers (Emmaus Pa.: Rodale [distributed by St. Martin's Press] 2003).
All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Security Studies
Authors
Martha Crenshaw
-

The Center for Science, Technology and Security Policy at the American Association for the Advancement of Science has assembled a panel of experts to examine the technical aspects of the Reliable Replacement Warhead program. The speaker will discuss the preliminary findings of this panel.

Benn Tannenbaum is Project Director at the Center for Science, Technology and Security Policy. Tannenbaum works on a variety of projects for CSTSP, including drafting policy briefs, tracking legislation, serving as liaison with MacArthur-funded centers and the security policy community, organizing workshops and other meetings, attending Congressional hearings and conducting topical research. He testified before the House Homeland Security Committee on radiation portal monitors. Tannenbaum also serves on the American Physical Society's Panel on Public Affairs and on the Program Committee for the Forum on Physics and Society. Prior to joining AAAS, Tannenbaum worked as a senior research analyst for the Federation of American Scientists. He worked extensively on the FAS paper "Flying Blind"; this paper explores ways to increase the quality and consistency of science advising to the federal government. Before joining FAS, Tannenbaum served as the 2002-2003 American Physical Society Congressional Science Fellow. During his fellowship, Tannenbaum worked for Rep. Edward J. Markey (D-MA) on nonproliferation issues. Before his fellowship, Tannenbaum worked as a postdoctoral rellow at the University of California, Los Angeles. At UCLA, he was involved in the Compact Muon Solenoid experiment at CERN, in Geneva, Switzerland, and the Collider Detector Facility at the Fermi National Accelerator Laboratory outside Chicago. He received his PhD in particle physics from the University of New Mexico in 1997. His dissertation involved a search for evidence of supersymmetry. None was found.

Reuben W. Hills Conference Room

Benn Tannenbaum Project Director at the Center for Science, Technology and Security Policy Speaker American Association for the Advancement of Science
Seminars
Authors
News Type
Commentary
Date
Paragraphs

The National Security Agency is a riddle wrapped in a mystery inside a code. Secrets lie within. Located in Fort Meade, Md., it dwarfs the CIA. Its budget is black, unknown. And, most disturbing of all, it is the world's largest employer of mathematicians.

One of its secrets, recently revealed, is that it's monitoring millions of phone calls to learn just who was calling whom. (Technically, only telephone numbers are being recorded, but you don't have to be Q from James Bond to get a name from a number.) This information was being used to determine who might be a terrorist.

Legal or not, the spying program isn't worth violating our civil liberties for. The information one can glean will hardly help us win the war on terror.

With the NSA data, you can draw a picture with nodes or dots representing individuals, and lines between nodes if one person has called another. Mathematicians who work with pictures like this are called graph theorists. The field of social network analysis deals with trying to determine information about a group from such a graph, such as who the key players are or who the cell leaders might be.

But even when you know everyone in the graph is a terrorist, graphs don't contain information about the order or hierarchy of the cell. Researchers look instead for graph features like centrality: They try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel. Monterey Naval Postgraduate School researcher Ted Lewis, in his textbook "Critical Infrastructure Protection," defines a critical node to be such a central hub.

There are two problems. First, the central player might not be as important as the hub metaphor suggests. Jafar Adibi of the University of Southern California looked at e-mail traffic between Enron employees before Enron collapsed, and drew the graph. He found that if you naively analyzed the graph, you could mistakenly conclude that one of the central players was CEO Ken Lay's ... secretary. But that wasn't the person who ran the company into the ground.

Second, as the journal Studies in Conflict and Terrorism reported in 2003, you can kill all the central players in a terrorist cell and still leave the cell with a complete chain of command -- still capable of carrying out a devastating attack.

Expert Kathleen Carley of Carnegie Mellon was able to correctly predict -- twice -- who would take over Hamas when its leaders were assassinated, and her analysis used detailed information about the individuals in the organization, not just what anonymous nodes were linked with what. The moral is that the graph theory approach is inadequate. For useful results, it's important to utilize the lattice theory approach, which takes into account order and hierarchy.

The other questionable aspect of the NSA spying program is that it seeks to work out who might be a terrorist based on their calling patterns. While I agree that anyone calling 1 (800) AL-QAEDA is probably a terrorist, guilt by association is not just bad law, it's bad mathematics, for three reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period-Beatles kind of way, but in the sense of the Kevin Bacon game. Sociologist Stanley Milgram took individuals unknown to each other, separated by a continent, and asked one person to send a package to the other -- but only by sending the package to an individual he or she knew, who could then only send the package to someone he knew, and so on. While Milgram's interpretation of the results has since been questioned, the conclusion that emerged is that it took only six mailings, on average, for each package to reach its intended destination.

For example, President Bush is only three steps away from Osama bin Laden. And terrorist hermits like the Unabomber might be connected only to very few people. So much for guilt by association.

The second reason the NSA methodology is flawed is the concept "strength of weak ties," made famous by Stanford sociologist Mark Granovetter. Robert Spulak of the Joint Special Operations University puts it this way: You might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: There is no communication for years. The links between nodes that the NSA is looking for simply might not exist for the real threats.

Formal concept analysis, a branch of lattice theory, helps rectify this situation. Individuals who share many of the same characteristics are grouped together as one node, and links between nodes in this picture, called a concept lattice, indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes. For instance, you might group together people based on what cafés, bookstores and mosques they attend, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa). While this tool has in fact been used by researchers at Los Alamos National Laboratory to sift through hundreds of terrorism-related reports, it's still dangerous to rely on the math.

The NSA data mining is flawed because, as Kennedy and Lincoln buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One is just minding his own business. The other is Cat Stevens.

This isn't to say mathematicians are useless. In September 2004 -- 10 months before the July 7 bombing of the London Underground -- mathematician Gordon Woo warned that London was a hotbed of jihadist radicalism. But Woo, who works for the Bay Area company Risk Management Solutions, didn't anticipate the bombings using math. He used his knowledge and experience of London, especially the Wood Green area. That's what law enforcement officials should be doing.

As for tracking terrorist financing, it may already be too late. The terrorism of the future, according to mathematician Stefan Schmidt of the Technical University in Dresden, Germany, may be the terrorism of the futures -- when bombs explode, the stock market drops. Schmidt wants to quantify the impact on the market of a terrorist incident. The only people who know when a bomb will explode are the terrorists. By playing the market, they may already have obtained as much money as they need -- in perfectly legitimate ways -- thus stifling Treasury Department efforts to cut off the source of their funding.

Math is just a tool. Used wisely, math can indeed help win the Battle of Britain (by breaking the German codes). But used unwisely -- as seems to be the case in the NSA telephone caper -- your approval rating might just hit an all-time low.

Hero Image
nsa seal
All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Taking a mathematical perspective, CISAC science fellow Jonathan Farley argues that legal issues aside, the National Security Agency's collection of phone records is not likely to help defeat terrorists.

News that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or ''nodes'' representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like ''centrality'': they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the ''central player'' -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naively analyzed the resulting graph, you could conclude that one of the ''central'' players was Ken Lay's secretary.

And even if you manage to eliminate all the ''central players,'' you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the ''strength of weak ties.'' As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a ''concept lattice'' -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004 -- 10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

Hero Image
farley logo
All News button
1
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
Authors
News Type
Commentary
Date
Paragraphs
President Bush is right to stress the importance of math education for U.S. students, writes CISAC science fellow Jonathan Farley in the San Francisco Chronicle. Practical, urgent national security problems--like fighting terrorism--illustrate the need for more U.S. mathematicians, Farley says. These pressing needs may also be the key to enticing teachers and students to pursue the subject.

In his State of the Union address in January, President Bush stressed the importance of improving math education. He proposed to "train 70,000 high school teachers to lead advanced placement courses in math and science, bring 30,000 math and science professionals to teach in classrooms, and give early help to students who struggle with math."

But where will these teachers come from? And will the training of teachers be sufficient to increase the number of students choosing math and science careers? And why does all this matter?

Because mathematics is the foundation of the natural sciences. It is no coincidence that Isaac Newton, the man who formulated the law of gravitational attraction that revolutionized our understanding of the universe, was also the man who popularized the calculus. And the natural sciences, however pure, are what give us airplanes, cable TV and the Internet.

In the 2003 Program for International Student Assessment, a test that measures math literacy, American 15-year-olds performed worse than their peers in 23 countries, as well as those in Hong Kong. It's not hard to see why. According to the National Council of Teachers of Mathematics, 40 percent of the nation's middle school math teachers do not have the equivalent of an undergraduate minor in math. The average starting salary of a teacher is only $30,000, whereas the average starting salary for a recent college graduate in computer science or engineering is $50,000.

Short of following the British, who have proposed paying experienced math teachers more than $100,000, with a guaranteed minimum of $70,000, where will we find a way to attract the thousands of teachers George Bush wants?

New York State initiated an innovative program to bring teachers from Jamaica for two or four years to teach in New York schools. Jamaica, a developing nation where one U.S. dollar equals 65 Jamaican dollars, is nonetheless a stable, English-speaking nation with an unbroken democratic tradition; it stands poised to beat the United States in establishing the world's first Institute for Mathematical Methods in Counterterrorism. When teachers for the New York program were recruited on the campus of the University of the West Indies, recruiters found more experienced math and science teachers than they ever dreamed they would.

But you can have all the teachers in the world and still not inspire kids to learn math. My friend Autumn e-mailed me about her nephew, Joshua: "He's upset because he's asked several of the math teachers why math is important or what are certain formulas used for -- there has to be a use, correct?"

Autumn told her nephew about my work in counterterrorism and for the television crime drama "Numb3rs." Autumn reported, "He's told his math teachers about you as well, and about the show 'Numb3rs.' He's informing them that through something called lattice theory you are managing to fight terrorists -- all with math."

Mathematics is art, and should be appreciated for its beauty, not simply for its utility. But we cannot expect 11 year-olds to cherish totally order-disconnected topological spaces as much as professional mathematicians do.

As I first proposed in January 2005, television shows like "Numb3rs" (or "Medium") -- where the main characters are mathematicians -- could work with the National Council of Teachers of Mathematics to show kids how math is really used; the council and Texas Instruments are now working together to use "Numb3rs" to promote math literacy in schools.

Another way to inspire kids is to relate mathematics to something they see every day. In order to excite students and draw funding to his school, school superintendent Ronald Ross of Roosevelt, N.Y., has begun looking into the idea of creating a curriculum involving math and counterterrorism. What kinds of topics would students learn?

The opening line of the Oscar-winning movie "A Beautiful Mind" is "Mathematicians won the war." During World War II, the mathematics underlying cryptography played an important role in military planning. Winston Churchill admired Alan Turing, the mathematician who had mastered the German codes, recognizing him as the man who had perhaps made the single greatest individual contribution to defeating Hitler.

At Los Alamos, the lab that built the atomic bomb, Cliff Joslyn uses lattice theory to mine data drawn from thousands of reports of terrorist-related activity to discover patterns and relationships that were previously in shadow.

Lattice theoretical methods developed at MIT tell us the probability that we have disabled a terrorist cell, based on how many men we have taken out and what rank they hold in the organization. Lauren McGough, a Massachusetts high school student, tested the accuracy of this model by getting her classmates to pretend they were terrorists, passing orders down a fictitious chain of command, essentially confirming what the theory predicts.

High school students could learn algebra, trigonometry, calculus and logic while also learning concrete applications involving homeland security. No longer would students yawn and ask, "What is math good for?" Beauty could defeat both terror and boredom.

Whatever you may think of the State of the Union address, when it comes to supporting math education, we should all see pi to pi. President Bush is correct when he says that mathematics education in America must improve if the United States is to stay economically competitive, but the stakes are much higher than that. During the Cold War, the United States would not have tolerated a military gap between itself and its adversaries. Yet today, with 61 percent of all U.S. doctorates in math going to foreigners (15 percent to Chinese), we readily accept a "math gap."

Dollar for dollar, the best defense against our adversaries' weapons of mass destruction may be our allies in the Americas, armed with weapons of math instruction.

Improving math education is not merely a smart idea. It is a matter of national security. Algebra is one revolutionary Islamic concept we cannot afford to neglect or ignore.

All News button
1
Authors
David Holloway
News Type
Commentary
Date
Paragraphs
Jeffrey T. Richelson's history of American nuclear intelligence, Spying on the Bomb, is timely, writes CISAC's David Holloway, given the faulty intelligence about nuclear weapons that was used to justify the U.S. invasion of Iraq. In fact the book could have gone further toward analyzing the relationship between the intelligence community and policy makers, Holloway suggests in this New York Times book review.

Before attacking Iraq in March 2003, the United States told the world that Saddam Hussein had reconstituted his nuclear weapons program in defiance of the United Nations. That claim, used to justify the war, was based on assessments provided by the United States intelligence community. But as everyone now knows, those assessments were wrong. So Jeffrey T. Richelson's history of American nuclear intelligence, including our attempts to learn about Iraq's nuclear program, could hardly be more timely.

In "Spying on the Bomb," Richelson, the author of several books on American intelligence, has brought together a huge amount of information about Washington's efforts to track the nuclear weapons projects of other countries. He examines the nuclear projects of Nazi Germany, the Soviet Union, China, France, Israel, India, South Africa, Taiwan, Libya, Pakistan, Iran and North Korea, as well as Iraq. Through interviews and declassified documents as well as secondary works, he sets out briefly what we currently know about those projects and compares that with assessments of the time.

This may sound like heavy going, but Richelson writes with admirable clarity. And along the way he has fascinating stories to tell: about plans to assassinate the German physicist Werner Heisenberg during World War II; about discussions in the Kennedy and Johnson administrations on the possibility of attacking Chinese nuclear installations; about Indian measures to evade the gaze of American reconnaissance satellites; and about the bureaucratic infighting over the estimates on Iraq.

The United States has put an enormous effort into gathering information about the nuclear projects of other countries. After World War II it equipped aircraft with special filters to pick up radioactive debris from nuclear tests for isotopic analysis. It created a network of stations around the world to register the seismic effects of nuclear explosions. Most important, in 1960 it began to launch reconnaissance satellites that could take detailed photographs of nuclear sites in the Soviet Union and China. Richelson occasionally speculates about the role of communications intercepts and of spies, but these appear from his account to have been much less important than the other methods of collecting information.

Through these means the United States has gathered a vast quantity of data, sometimes to surprising effect. Intelligence played a crucial role in the cold war, for instance, by reducing uncertainty about Soviet nuclear forces. Alongside such successes, however, there have been failures. One notable example concerned the first Soviet test, which took place in August 1949, much sooner than the C.I.A. had predicted. Another was the failure to detect Indian preparations for tests in May 1998, even though at an earlier time the United States, with the help of satellite intelligence, had managed to learn about preparations the Indians were making and to head off their tests.

But the most serious failure of all was in Iraq in 2003, because in no other case did the intelligence assessments serve as justification for the use of military force. The information needed for avoiding political surprise is one thing. That needed for preventive war is quite another, if only because of the consequences of making a mistake.

Beyond making the uncontroversial recommendation that "aggressive and inventive intelligence collection and analysis" should continue, Richelson draws no general conclusions. That is a pity, because his rich material points to issues that cry out for further analysis. He suggests in one or two cases that failures sprang from the mind-set of the intelligence community, but he does not elaborate on this point. He has little to say about relations between policy makers and the intelligence community, even though the quality of intelligence and the use made of it depend heavily on that relationship.

His focus is no less narrow in his discussion of foreign nuclear projects. He concentrates on the programs themselves, paying very little attention to their political context. Does that reflect a technological bias in nuclear intelligence? Would, for example, the prewar assessment of Iraqi nuclear capabilities have been more accurate if it had paid more attention to the broader political and economic circumstances of Hussein's regime?

The task of intelligence has become more complex than it was during the cold war. A single dominant nuclear opponent has now been replaced by a number of nuclear states, along with states and stateless terrorists that are aiming to get their hands on nuclear weapons. Meanwhile, the technology needed for producing nuclear weapons has become easier to acquire.

Many critics believe the recent performance of the intelligence community shows it has not responded adequately to this new situation. Richelson does not have much to say on this question; nor does he discuss the likely impact of the current reforms, initiated in response to the Iraq war, on the quality of intelligence. His reticence may imply that he does not think reform is necessary. Still, it is disappointing that he does not draw on his historical survey to discuss whether new approaches are needed for dealing with nuclear threats, and, if so, what those new approaches might be.

All News button
1
Subscribe to Central Europe