Authors
Scott D. Sagan
News Type
Commentary
Date
Paragraphs
Excerpted from Foreign Affairs, September/October 2006

Preventing the unthinkable ongoing crisis with Tehran is not the first time Washington has faced a hostile government attempting to develop nuclear weapons. Nor is it likely to be the last. Yet the reasoning of U.S. officials now struggling to deal with Iran’s nuclear ambitions is clouded by a kind of historical amnesia, which leads to both creeping fatalism about the United States’ ability to keep Iran from getting the bomb and excessive optimism about the United States’ ability to contain Iran if it does become a nuclear power.

A U.S. official in the executive branch anonymously told the New York Times in March 2006, “The reality is that most of us think the Iranians are probably going to get a weapon, or the technology to make one, sooner or later.” Military planners and intelligence officers have reportedly been tasked with developing strategies to deter Tehran if negotiations fail.

Both proliferation fatalism and deterrence optimism are wrong-headed, and they reinforce each other in a disturbing way. As nuclear proliferation comes to be seen as inevitable, wishful thinking can make its consequences seem less severe, and if faith in deterrence grows, incentives to combat proliferation diminish.

Deterrence optimism is based on mistaken nostalgia and a faulty analogy. Although deterrence did work with the Soviet Union and China, there were many close calls; maintaining nuclear peace during the Cold War was far more difficult and uncertain than U.S. officials and the American public seem to remember today. Furthermore, a nuclear Iran would look a lot less like the totalitarian Soviet Union and the People’s Republic of China and a lot more like Pakistan, Iran’s unstable neighbor—a far more frightening prospect.

Fatalism about nuclear proliferation is equally unwarranted. Although the United States did fail to prevent its major Cold War rivals from developing nuclear arsenals, many other countries—including Japan, West Germany, South Korea, and more recently Libya—curbed their own nuclear ambitions.

THE REASONS WHY

The way for Washington to move forward on Iran is to give Tehran good reason to relinquish its pursuit of nuclear weapons. That, in turn, requires understanding why Tehran wants them in the first place.

Iran’s nuclear energy program began in the 1960s under the shah, but even he wanted to create a breakout option to get the bomb quickly if necessary. One of his senior energy advisers recalled, “The shah told me that he does not want the bomb yet, but if anyone in the neighborhood has it, we must be ready to have it.” At first, Ayatollah Ruhollah Khomeini objected to nuclear weapons on religious grounds, but the mullahs abandoned such restraint after Saddam Hussein ordered chemical attacks on Iranian forces during the Iran-Iraq War.

The end of Saddam’s rule in 2003 significantly reduced the security threat to Tehran. But by then the United States had taken Iraq’s place. In his January 2002 State of the Union address, President Bush had denounced the governments of Iran, Iraq, and North Korea as members of an “axis of evil” with ties to international terrorism. After the fall of Baghdad, an unidentified senior U.S. official told a Los Angeles Times reporter that Tehran should “take a number,” hinting that it was next in line for regime change.

Increasingly, Bush administration spokespeople advocated “preemption” to counter proliferation. When asked, in April 2006, whether the Pentagon was considering a potential preventive nuclear strike against Iranian nuclear facilities, President Bush pointedly replied, “All options are on the table.”

AGREED FRAMEWORK IN FARSI

A source of inspiration for handling Iran is the 1994 Agreed Framework that the United States struck with North Korea. The Bush administration has severely criticized the deal, but it contained several elements that could prove useful in the Iranian nuclear crisis.

After the North Koreans were caught violating their NPT commitments in early 1993, they threatened to withdraw from the treaty. Declaring that “North Korea cannot be allowed to develop a nuclear bomb,” President Clinton threatened an air strike on the Yongbyon reactor site if the North Koreans took further steps to reprocess plutonium. In June 1994, as the Pentagon was reinforcing military units on the Korean Peninsula, Pyongyang froze its plutonium production, agreed to let IAEA inspectors monitor the reactor site, and entered into bilateral negotiations.

The talks produced the October 1994 Agreed Framework, under which North Korea agreed to eventually dismantle its reactors, remain in the NPT, and implement full IAEA safeguards. In exchange, the United States promised to provide it with limited oil supplies, construct two peaceful light-water reactors for energy production, “move toward full normalization of political and economic relations,” and extend “formal assurances to [North Korea] against the threat or use of nuclear weapons by the U.S.”

“The way for Washington to move forward on Iran is to give Tehran good reason to relinquish its pursuit of nuclear weapons.”By 2002, the Agreed Framework had broken down, not only because Pyongyang was suspected of cheating but also because it believed that the United States, by delaying construction of the light-water reactors and failing to start normalizing relations, had not honored its side of the bargain. When confronted with evidence of its secret uranium program, in November 2002, Pyongyang took advantage of the fact that the U.S. military was tied down in preparations for the invasion of Iraq and withdrew from the NPT, kicked out the inspectors, and started reprocessing plutonium.

President Bush famously promised, in his 2002 State of the Union address, that the United States “will not permit the world’s most dangerous regimes to threaten us with the world’s most destructive weapons.” Yet when North Korea kicked out the IAEA inspectors, Secretary of State Colin Powell proclaimed that the situation was “not a crisis.” Bush repeatedly declared that the United States had “no intention of invading North Korea.” The point was not lost on Tehran.

If Washington is to offer security assurances to Tehran, it should do so soon (making the assurances contingent on Tehran’s not developing nuclear weapons), rather than offering them too late, as it did with North Korea (and thus making them contingent on Tehran’s getting rid of any existing nuclear weapons). As with North Korea, any deal with Iran must be structured in a series of steps, each offering a package of economic benefits (light-water reactors, aircraft parts, or status at the World Trade Organization) in exchange for constraints placed on Iran’s future nuclear development.

Most important, however, would be a reduction in the security threat that the United States poses to Iran. Given the need for Washington to have a credible deterrent against, say, terrorist attacks sponsored by Iran, a blanket security guarantee would be ill advised. But more limited guarantees, such as a commitment not to use nuclear weapons, could be effective. They would reassure Tehran and pave the way toward the eventual normalization of U.S.–Iranian relations while signaling to other states that nuclear weapons are not the be all and end all of security.

Peaceful coexistence does not require friendly relations, but it does mean exercising mutual restraint. Relinquishing the threat of regime change by force is a necessary and acceptable price for the United States to pay to stop Tehran from getting the bomb.

All News button
1
Authors
William J. Perry
News Type
Commentary
Date
Paragraphs
An op-ed by George P. Shultz, William J. Perry, Henry A. Kissinger and Sam Nunn and published in The Wall Street Journal outlines a vision of a world free of nuclear weapons together with specific steps that can reduce nuclear dangers.

Nuclear weapons today present tremendous dangers, but also an historic opportunity. U.S. leadership will be required to take the world to the next stage -- to a solid consensus for reversing reliance on nuclear weapons globally as a vital contribution to preventing their proliferation into potentially dangerous hands, and ultimately ending them as a threat to the world.

Nuclear weapons were essential to maintaining international security during the Cold War because they were a means of deterrence. The end of the Cold War made the doctrine of mutual Soviet-American deterrence obsolete. Deterrence continues to be a relevant consideration for many states with regard to threats from other states. But reliance on nuclear weapons for this purpose is becoming increasingly hazardous and decreasingly effective.

North Korea's recent nuclear test and Iran's refusal to stop its program to enrich uranium -- potentially to weapons grade -- highlight the fact that the world is now on the precipice of a new and dangerous nuclear era. Most alarmingly, the likelihood that non-state terrorists will get their hands on nuclear weaponry is increasing. In today's war waged on world order by terrorists, nuclear weapons are the ultimate means of mass devastation. And non-state terrorist groups with nuclear weapons are conceptually outside the bounds of a deterrent strategy and present difficult new security challenges.

Apart from the terrorist threat, unless urgent new actions are taken, the U.S. soon will be compelled to enter a new nuclear era that will be more precarious, psychologically disorienting, and economically even more costly than was Cold War deterrence. It is far from certain that we can successfully replicate the old Soviet-American "mutually assured destruction" with an increasing number of potential nuclear enemies world-wide without dramatically increasing the risk that nuclear weapons will be used. New nuclear states do not have the benefit of years of step-by-step safeguards put in effect during the Cold War to prevent nuclear accidents, misjudgments or unauthorized launches. The United States and the Soviet Union learned from mistakes that were less than fatal. Both countries were diligent to ensure that no nuclear weapon was used during the Cold War by design or by accident. Will new nuclear nations and the world be as fortunate in the next 50 years as we were during the Cold War?

* * *

Leaders addressed this issue in earlier times. In his "Atoms for Peace" address to the United Nations in 1953, Dwight D. Eisenhower pledged America's "determination to help solve the fearful atomic dilemma -- to devote its entire heart and mind to find the way by which the miraculous inventiveness of man shall not be dedicated to his death, but consecrated to his life." John F. Kennedy, seeking to break the logjam on nuclear disarmament, said, "The world was not meant to be a prison in which man awaits his execution."

Rajiv Gandhi, addressing the U.N. General Assembly on June 9, 1988, appealed, "Nuclear war will not mean the death of a hundred million people. Or even a thousand million. It will mean the extinction of four thousand million: the end of life as we know it on our planet earth. We come to the United Nations to seek your support. We seek your support to put a stop to this madness."

Ronald Reagan called for the abolishment of "all nuclear weapons," which he considered to be "totally irrational, totally inhumane, good for nothing but killing, possibly destructive of life on earth and civilization." Mikhail Gorbachev shared this vision, which had also been expressed by previous American presidents.

Although Reagan and Mr. Gorbachev failed at Reykjavik to achieve the goal of an agreement to get rid of all nuclear weapons, they did succeed in turning the arms race on its head. They initiated steps leading to significant reductions in deployed long- and intermediate-range nuclear forces, including the elimination of an entire class of threatening missiles.

What will it take to rekindle the vision shared by Reagan and Mr. Gorbachev? Can a world-wide consensus be forged that defines a series of practical steps leading to major reductions in the nuclear danger? There is an urgent need to address the challenge posed by these two questions.

The Non-Proliferation Treaty (NPT) envisioned the end of all nuclear weapons. It provides (a) that states that did not possess nuclear weapons as of 1967 agree not to obtain them, and (b) that states that do possess them agree to divest themselves of these weapons over time. Every president of both parties since Richard Nixon has reaffirmed these treaty obligations, but non-nuclear weapon states have grown increasingly skeptical of the sincerity of the nuclear powers.

Strong non-proliferation efforts are under way. The Cooperative Threat Reduction program, the Global Threat Reduction Initiative, the Proliferation Security Initiative and the Additional Protocols are innovative approaches that provide powerful new tools for detecting activities that violate the NPT and endanger world security. They deserve full implementation. The negotiations on proliferation of nuclear weapons by North Korea and Iran, involving all the permanent members of the Security Council plus Germany and Japan, are crucially important. They must be energetically pursued.

But by themselves, none of these steps are adequate to the danger. Reagan and General Secretary Gorbachev aspired to accomplish more at their meeting in Reykjavik 20 years ago -- the elimination of nuclear weapons altogether. Their vision shocked experts in the doctrine of nuclear deterrence, but galvanized the hopes of people around the world. The leaders of the two countries with the largest arsenals of nuclear weapons discussed the abolition of their most powerful weapons.

* * *

What should be done? Can the promise of the NPT and the possibilities envisioned at Reykjavik be brought to fruition? We believe that a major effort should be launched by the United States to produce a positive answer through concrete stages.

First and foremost is intensive work with leaders of the countries in possession of nuclear weapons to turn the goal of a world without nuclear weapons into a joint enterprise. Such a joint enterprise, by involving changes in the disposition of the states possessing nuclear weapons, would lend additional weight to efforts already under way to avoid the emergence of a nuclear-armed North Korea and Iran.

The program on which agreements should be sought would constitute a series of agreed and urgent steps that would lay the groundwork for a world free of the nuclear threat. Steps would include:

  • Changing the Cold War posture of deployed nuclear weapons to increase warning time and thereby reduce the danger of an accidental or unauthorized use of a nuclear weapon.
  • Continuing to reduce substantially the size of nuclear forces in all states that possess them.
  • Eliminating short-range nuclear weapons designed to be forward-deployed.
  • Initiating a bipartisan process with the Senate, including understandings to increase confidence and provide for periodic review, to achieve ratification of the Comprehensive Test Ban Treaty, taking advantage of recent technical advances, and working to secure ratification by other key states.
  • Providing the highest possible standards of security for all stocks of weapons, weapons-usable plutonium, and highly enriched uranium everywhere in the world.
  • Getting control of the uranium enrichment process, combined with the guarantee that uranium for nuclear power reactors could be obtained at a reasonable price, first from the Nuclear Suppliers Group and then from the International Atomic Energy Agency (IAEA) or other controlled international reserves. It will also be necessary to deal with proliferation issues presented by spent fuel from reactors producing electricity.
  • Halting the production of fissile material for weapons globally; phasing out the use of highly enriched uranium in civil commerce and removing weapons-usable uranium from research facilities around the world and rendering the materials safe.
  • Redoubling our efforts to resolve regional confrontations and conflicts that give rise to new nuclear powers.

 
Achieving the goal of a world free of nuclear weapons will also require effective measures to impede or counter any nuclear-related conduct that is potentially threatening to the security of any state or peoples.

Reassertion of the vision of a world free of nuclear weapons and practical measures toward achieving that goal would be, and would be perceived as, a bold initiative consistent with America's moral heritage. The effort could have a profoundly positive impact on the security of future generations. Without the bold vision, the actions will not be perceived as fair or urgent. Without the actions, the vision will not be perceived as realistic or possible.

We endorse setting the goal of a world free of nuclear weapons and working energetically on the actions required to achieve that goal, beginning with the measures outlined above.


Mr. Shultz, a distinguished fellow at the Hoover Institution at Stanford, was secretary of state from 1982 to 1989. Mr. Perry was secretary of defense from 1994 to 1997. Mr. Kissinger, chairman of Kissinger Associates, was secretary of state from 1973 to 1977. Mr. Nunn is former chairman of the Senate Armed Services Committee.

A conference organized by Mr. Shultz and Sidney D. Drell was held at Hoover to reconsider the vision that Reagan and Mr. Gorbachev brought to Reykjavik. In addition to Messrs. Shultz and Drell, the following participants also endorse the view in this statement: Martin Anderson, Steve Andreasen, Michael Armacost, William Crowe, James Goodby, Thomas Graham Jr., Thomas Henriksen, David Holloway, Max Kampelman, Jack Matlock, John McLaughlin, Don Oberdorfer, Rozanne Ridgway, Henry Rowen, Roald Sagdeev and Abraham Sofaer.

All News button
1
-
The Airborne Laser (ABL) is a project undertaken by the U. S. missile defense agency. The basic idea is to install a megawatt class chemical laser into a Boeing 747. This ABL is supposed to patrol in the vicinity of "rogue" states in order to destroy missiles in their boost phase over distances of several hundred kilometres.

In order to achieve this goal, numerous technical obstacles have to be overcome. This talk presents an independent “best case” analysis of the ABL’s technical capabilities. Calculations of missile trajectories are combined with atmospheric physics and structural mechanics calculations. One result is that the laser will not be able to destroy missile warheads for significant distances, but only missile boosters. Warheads will fall short of intended targets and may endanger third parties. Exemplary calculations are presented to narrow down possible impact points.

Jan Stupl
is a doctoral scholar at the Institute for Peace Research and Security Policy at the University of Hamburg, Germany. He finished his studies in 2004 with a diploma thesis in laser physics at the University of Jena, Germany. The last three years he has been working on an interdisciplinary PhD thesis on the topic of the effects of potential high energy lasers weapons. His thesis will include physics and political science aspects.

Reuben W. Hills Conference Room

Jan Stupl Doctoral Scholar Speaker Institute for Peace Research and Security Policy, University of Hamburg
Seminars
Paragraphs

From the Pulitzer Prize-winning author of The Making of the Atomic Bomb, here is the story of the entire postwar superpower arms race, climaxing during the Reagan-Gorbachev decade when the United States and the Soviet Union came within scant hours of nuclear war--and then nearly agreed to abolish nuclear weapons.

Rhodes reveals how the Reagan administration's unprecedented arms buildup in the early 1980s led ailing Soviet leader Yuri Andropov to conclude that Reagan must be preparing for a nuclear war. In the fall of 1983, when NATO staged a larger than usual series of field exercises that included, uniquely, a practice run-up to a nuclear attack, the Soviet military came very close to launching a defensive first strike on Europe and North America. With Soviet aircraft loaded with nuclear bombs warming up on East German runways, U.S. intelligence organizations finally realized the danger. Then Reagan, out of deep conviction, launched the arms-reduction campaign of his second presidential term and set the stage for his famous 1986 summit meeting with Gorbachev in Reykjavik, Iceland, and the breakthroughs that followed.

Rhodes reveals the early influence of neoconservatives and right-wing figures such as Richard Perle, Donald Rumsfeld, Dick Cheney, and Paul Wolfowitz. We see how Perle in particular sabotaged the Reykjavik meeting by convincing Reagan that mutual nuclear disarmament meant giving up his cherished dream of strategic defense (the Star Wars system). Rhodes' detailed exploration of these and other events constitutes a prehistory of the neoconservatives, demonstrating that the manipulation of government and public opinion with fake intelligence and threat inflation that the administration of George W. Bush has used to justify the current "war on terror" and the disastrous invasion of Iraq were developed and applied in the Reagan era and even before.

Drawing on personal interviews with both Soviet and U.S. participants, and on a wealth of new documentation, memoir literature, and oral history that has become available only in the past ten years, Rhodes recounts what actually happened in the final years of the Cold War that led to its dramatic end. The story is new, compelling, and continually surprising--a revelatory re-creation of a hugely important era of our recent history.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Alfred A. Knopf
Authors
-

The speaker will describe his experiences over ten years of developing a comprehensive program to engage the formerly top secret Soviet biological weapons complex through joint scientific research and disease surveillance. He will also discuss how lessons learned can be applied to potential new efforts to reduce global threats of bioterrorism and potential pandemics.

Andrew Weber is the adviser for cooperative threat reduction policy in the Office of the Secretary of Defense. His responsibilities include developing and overseeing CTR biological threat reduction programs in the former Soviet Union, and nuclear and chemical weapons threat reduction projects in Central Asia. Before coming to the Office of the Secretary of Defense in 1996, Weber served as a U.S. Foreign Service officer in Saudi Arabia, Germany, Kazakhstan, and Hong Kong. Weber holds an MSFS degree from Georgetown University and a BA from Cornell University. He speaks Russian. Weber is an adjunct professor at the Georgetown University Graduate School of Foreign Service.

Reuben W. Hills Conference Room

Andrew Weber Senior Adviser for Cooperative Threat Reduction Policy Speaker Office of the Secretary of Defense
Seminars
Paragraphs

The current trend toward suicide bombings began in Lebanon in the early 1980s. The practice soon spread to civil conflicts in Sri Lanka, the Kurdish areas of Turkey, and Chechnya. Palestinian attacks on Israeli civilians in the 1990s and during the Al Aqsa intifada further highlighted the threat. Al Qaeda's adoption of the tactic brought a transnational dimension. Interest in the phenomenon then surged after the shock of the 2001 attacks, which involved an unprecedented number of both perpetrators and casualties. Since then, suicide bombings have expanded in number and geographical range, reaching extraordinary levels in the Iraq War and spreading around the world to countries such as Saudi Arabia, Morocco, Tunisia, Kenya, Indonesia, Turkey, Pakistan, India, Afghanistan, Egypt, Jordan, Bangladesh, and Britain.

This review covers thirteen of the books published on the subject since 2002. Three analyze the Palestinian case and four others focus on Islamist violence. The other six, including two edited collections, intend to be comprehensive. This review also refers to a few selected publications that discuss the arguments presented in the works reviewed. It aims to give readers a glimpse of the content of the different volumes as well as offer a critique.

The essay reviews these works:

  • Mia Bloom, Dying to Kill: The Allure of Suicide Terror (New York: Columbia University Press, 2005).
  • Joyce M. Davis, Martyrs: Innocence, Vengeance and Despair in the Middle East (New York: Palgrave Macmillan, 2003).
  • Diego Gambetta, ed., Making Sense of Suicide Missions (New York: Oxford University Press, 2005).
  • Mohammed M. Hafez, Manufacturing Human Bombs: The Making of Palestinian Suicide Bombers (Washington, D.C.: United States Institute of Peace Press, 2006).
  • Raphael Israeli, Islamikaze: Manifestations of Islamic Martyrology (London: Frank Cass, 2003).
  • Farhad Khosrokhavar, Suicide Bombers: Allah's New Martyrs, translated from the French by David Macey (London: Pluto Press, 2005).
  • Anne Marie Oliver and Paul F. Steinberg, The Road to Martyrs' Square: A Journey into the World of the Suicide Bomber (New York: Oxford University Press, 2005).
  • Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terrorism (New York: Random House, 2005).
  • Ami Pedahzur, Suicide Terrorism (Cambridge: Polity Press, 2005).
  • Ami Pedahzur, ed., Root Causes of Suicide Terrorism: The Globalization of Martyrdom (London and New York: Routledge, 2006).
  • Christoph Reuter, My Life is a Weapon: A Modern History of Suicide Bombing, translated from the German by Helena Ragg-Kirkby (Princeton: Princeton University Press, 2004).
  • Shaul Shay, The Shahids: Islam and Suicide Attacks (New Brunswick: Transaction Publishers, 2004).
  • Barbara Victor, Army of Roses: Inside the World of Palestinian Women Suicide Bombers (Emmaus Pa.: Rodale [distributed by St. Martin's Press] 2003).
All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Security Studies
Authors
Martha Crenshaw
Authors
News Type
Commentary
Date
Paragraphs

The National Security Agency is a riddle wrapped in a mystery inside a code. Secrets lie within. Located in Fort Meade, Md., it dwarfs the CIA. Its budget is black, unknown. And, most disturbing of all, it is the world's largest employer of mathematicians.

One of its secrets, recently revealed, is that it's monitoring millions of phone calls to learn just who was calling whom. (Technically, only telephone numbers are being recorded, but you don't have to be Q from James Bond to get a name from a number.) This information was being used to determine who might be a terrorist.

Legal or not, the spying program isn't worth violating our civil liberties for. The information one can glean will hardly help us win the war on terror.

With the NSA data, you can draw a picture with nodes or dots representing individuals, and lines between nodes if one person has called another. Mathematicians who work with pictures like this are called graph theorists. The field of social network analysis deals with trying to determine information about a group from such a graph, such as who the key players are or who the cell leaders might be.

But even when you know everyone in the graph is a terrorist, graphs don't contain information about the order or hierarchy of the cell. Researchers look instead for graph features like centrality: They try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel. Monterey Naval Postgraduate School researcher Ted Lewis, in his textbook "Critical Infrastructure Protection," defines a critical node to be such a central hub.

There are two problems. First, the central player might not be as important as the hub metaphor suggests. Jafar Adibi of the University of Southern California looked at e-mail traffic between Enron employees before Enron collapsed, and drew the graph. He found that if you naively analyzed the graph, you could mistakenly conclude that one of the central players was CEO Ken Lay's ... secretary. But that wasn't the person who ran the company into the ground.

Second, as the journal Studies in Conflict and Terrorism reported in 2003, you can kill all the central players in a terrorist cell and still leave the cell with a complete chain of command -- still capable of carrying out a devastating attack.

Expert Kathleen Carley of Carnegie Mellon was able to correctly predict -- twice -- who would take over Hamas when its leaders were assassinated, and her analysis used detailed information about the individuals in the organization, not just what anonymous nodes were linked with what. The moral is that the graph theory approach is inadequate. For useful results, it's important to utilize the lattice theory approach, which takes into account order and hierarchy.

The other questionable aspect of the NSA spying program is that it seeks to work out who might be a terrorist based on their calling patterns. While I agree that anyone calling 1 (800) AL-QAEDA is probably a terrorist, guilt by association is not just bad law, it's bad mathematics, for three reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period-Beatles kind of way, but in the sense of the Kevin Bacon game. Sociologist Stanley Milgram took individuals unknown to each other, separated by a continent, and asked one person to send a package to the other -- but only by sending the package to an individual he or she knew, who could then only send the package to someone he knew, and so on. While Milgram's interpretation of the results has since been questioned, the conclusion that emerged is that it took only six mailings, on average, for each package to reach its intended destination.

For example, President Bush is only three steps away from Osama bin Laden. And terrorist hermits like the Unabomber might be connected only to very few people. So much for guilt by association.

The second reason the NSA methodology is flawed is the concept "strength of weak ties," made famous by Stanford sociologist Mark Granovetter. Robert Spulak of the Joint Special Operations University puts it this way: You might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: There is no communication for years. The links between nodes that the NSA is looking for simply might not exist for the real threats.

Formal concept analysis, a branch of lattice theory, helps rectify this situation. Individuals who share many of the same characteristics are grouped together as one node, and links between nodes in this picture, called a concept lattice, indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes. For instance, you might group together people based on what cafés, bookstores and mosques they attend, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa). While this tool has in fact been used by researchers at Los Alamos National Laboratory to sift through hundreds of terrorism-related reports, it's still dangerous to rely on the math.

The NSA data mining is flawed because, as Kennedy and Lincoln buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One is just minding his own business. The other is Cat Stevens.

This isn't to say mathematicians are useless. In September 2004 -- 10 months before the July 7 bombing of the London Underground -- mathematician Gordon Woo warned that London was a hotbed of jihadist radicalism. But Woo, who works for the Bay Area company Risk Management Solutions, didn't anticipate the bombings using math. He used his knowledge and experience of London, especially the Wood Green area. That's what law enforcement officials should be doing.

As for tracking terrorist financing, it may already be too late. The terrorism of the future, according to mathematician Stefan Schmidt of the Technical University in Dresden, Germany, may be the terrorism of the futures -- when bombs explode, the stock market drops. Schmidt wants to quantify the impact on the market of a terrorist incident. The only people who know when a bomb will explode are the terrorists. By playing the market, they may already have obtained as much money as they need -- in perfectly legitimate ways -- thus stifling Treasury Department efforts to cut off the source of their funding.

Math is just a tool. Used wisely, math can indeed help win the Battle of Britain (by breaking the German codes). But used unwisely -- as seems to be the case in the NSA telephone caper -- your approval rating might just hit an all-time low.

Hero Image
nsa seal
All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Taking a mathematical perspective, CISAC science fellow Jonathan Farley argues that legal issues aside, the National Security Agency's collection of phone records is not likely to help defeat terrorists.

News that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or ''nodes'' representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like ''centrality'': they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the ''central player'' -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naively analyzed the resulting graph, you could conclude that one of the ''central'' players was Ken Lay's secretary.

And even if you manage to eliminate all the ''central players,'' you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the ''strength of weak ties.'' As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a ''concept lattice'' -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004 -- 10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

Hero Image
farley logo
All News button
1
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
Subscribe to Germany