-

Alexander Downes is assistant professor of political science at Duke University specializing in international security. Before coming to Duke, Downes held fellowships at the Olin Institute for Strategic Studies (Harvard University) and the Center for International Security and Cooperation (Stanford University). His current research focuses on why states attack enemy noncombatants in warfare, a subject on which he is revising a book manuscript that includes case studies of strategic bombing, blockade, counterinsurgency, and ethnic cleansing. His previous research on the relative efficacy of partition versus negotiated settlements as solutions to ethnic wars has appeared in the journal Security Studies.

Reuben W. Hills Conference Room

Alexander Downes Assistant Professor, Department of Political Science Speaker Duke University
Seminars
-

Michael May is emeritus professor Emeritus (research) in the Stanford University School of Engineering and a senior fellow with FSI. He is the former co-director of CISAC, having served seven years in that capacity through January 2000.

May is emeritus director of the Lawrence Livermore National Laboratory, where he worked from 1952 to 1988, with some brief periods away from the laboratory. While there, he held a variety of research and development positions, serving as director of the laboratory from 1965 to 1971. May was technical adviser to the Threshold Test Ban Treaty negotiating team; a member of the U.S. delegation to the Strategic Arms Limitation Talks; and at various times has been a member of the Defense Science Board, the General Advisory Committee to the AEC, the Secretary of Energy Advisory Board, the RAND Corporation Board of Trustees, and the Committee on International Security and Arms Control of the National Academy of Sciences. He is a member of the Council on Foreign Relations and the Pacific Council on International Policy, and a Fellow of the American Physical Society and the American Association for the Advancement of Science.

May received the Distinguished Public Service and Distinguished Civilian Service Medals from the Department of Defense, and the Ernest Orlando Lawrence Award from the Atomic Energy Commission, as well as other awards. May's current research interests are in the area of safeguarding the nuclear fuel cycle, nuclear terrorism, energy, security and environment, and the relation of nuclear weapons and foreign policy.

Chaim Braun is a vice president of Altos Management Partners, Inc., and a CISAC science fellow and affiliate. He is a member of the Near-Term Deployment and the Economic Cross-Cut Working Groups of the Department of Energy (DOE) Generation IV Roadmap study. He conducted several nuclear economics-related studies for the DOE Nuclear Energy Office, the Energy Information Administration, the Electric Power Research Institute, the Nuclear Energy Institute, Non-Proliferation Trust International, and others.

Braun has worked as a member of Bechtel Power Corporation's Nuclear Management Group, and led studies on power plant performance and economics used to support maintenance services. Braun has worked on a study of safeguarding the Agreed Framework in North Korea, he was the co-leader of a NATO Study of Terrorist Threats to Nuclear Power Plants, led CISAC's Summer Study on Terrorist Threats to Research Reactors, and most recently co-authored an article with CISAC Co-Director Chris Chyba on nuclear proliferation rings. His research project this year is entitled "The Energy Security Initiative and a Nuclear Fuel Cycle Center: Two Enhancement Options for the Current Non-Proliferation Regime."

Reuben W. Hills Conference Room

0
Professor, Management Science and Engineering, Emeritus
FSI Senior Fellow
CISAC Faculty Member
Not in Residence
michaelmayrsd17_040_0117aa.jpg PhD

Michael May is Professor Emeritus (Research) in the Stanford University School of Engineering and a senior fellow with the Freeman Spogli Institute for International Studies at Stanford University. He is the former co-director of Stanford University's Center for International Security and Cooperation, having served seven years in that capacity through January 2000.

May is a director emeritus of the Lawrence Livermore National Laboratory, where he worked from 1952 to 1988, with some brief periods away from the Laboratory. While there, he held a variety of research and development positions, serving as director of the Laboratory from 1965 to 1971.

May was a technical adviser to the Threshold Test Ban Treaty negotiating team; a member of the U.S. delegation to the Strategic Arms Limitation Talks; and at various times has been a member of the Defense Science Board, the General Advisory Committee to the AEC, the Secretary of Energy Advisory Board, the RAND Corporation Board of Trustees, and the Committee on International Security and Arms Control of the National Academy of Sciences. He is a member of the International Institute on Strategic Studies, and a Fellow of the American Physical Society and the American Association for the Advancement of Science.

May received the Distinguished Public Service and Distinguished Civilian Service Medals from the Department of Defense, and the Ernest Orlando Lawrence Award from the Atomic Energy Commission, as well as other awards.

His current research interests are nuclear weapons policy in the US and in other countries; nuclear terrorism; nuclear and other forms of energy and their impact on the environment, health and safety and security; the use of statistics and mathematical models in the public sphere.

May is continuing work on creating a secure future for civilian nuclear applications. In October 2007, May hosted an international workshop on how the nuclear weapon states can help rebuild the consensus underlying the Nuclear Non-Proliferation Treaty (NPT). Proceedings and a summary report are available online or by email request. May also chaired a technical working group on nuclear forensics. The final report is available online.

In April 2007, May in cooperation with former Secretary of Defense William J. Perry and Professor Ashton Carter of Harvard hosted a workshop on what would have to be done to be ready for a terrorist nuclear detonation. The report is available online at the Preventive Defense Project. A summary, titled, "The Day After: Action Following a Nuclear Blast in a U.S. City," was published fall 2007 in Washington Quarterly and is available online.

Recent work also includes a study of nuclear postures in several countries (2007 - 2009); an article on nuclear disarmament and one on tactical nuclear weapons; and a report with Kate Marvel for the American Academy of Arts and Sciences on possible game changers in the nuclear energy industry.

Date Label
Michael M. May Speaker
Chaim Braun Speaker
Seminars
-

Martha Crenshaw is the Colin and Nancy Campbell Professor of Global Issues and Democratic Thought and Professor of Government at Wesleyan University, in Middletown, Conn., where she has taught since 1974. She has written extensively on the issue of political terrorism; her first article, "The Concept of Revolutionary Terrorism," was published in the Journal of Conflict Resolution in 1972. Her recent work includes the chapter on "Coercive Diplomacy and the Response to Terrorism," in The United States and Coercive Diplomacy (United States Institute of Peace Press), "Terrorism, Strategies, and Grand Strategies", in Attacking Terrorism (Georgetown University Press), and "Counterterrorism in Retrospect" in the July-August 2005 issue of Foreign Affairs. She serves on the Executive Board of Women in International Security and chairs the American Political Science Association Task Force on Political Violence and Terrorism.

She has served on the Council of the APSA and is a former president and councilor of the International Society of Political Psychology (ISPP). In 2004 ISPP awarded her its Nevitt Sanford Award for Distinguished Scientific Contribution and in 2005 the Jeanne Knutson Award for service to the society. She serves on the editorial boards of the journals International Security, Orbis, Political Psychology, Security Studies, and Terrorism and Political Violence. She coordinated the working group on political explanations of terrorism for the 2005 Club de Madrid International Summit on Democracy, Terrorism and Security. For the next three years she will be a lead investigator with the new National Center for the Study of Terrorism and the Response to Terrorism at the University of Maryland, funded by the Department of Homeland Security. She is also the recipient of a John Simon Guggenheim Memorial Foundation Fellowship in 2005-2006. She serves on the Committee on Law and Justice and the Committee on Determining Basic Research Needs to Interrupt the Improvised Explosive Device Delivery Chain of the National Research Council of the National Academies of Science. Her current research focuses on why the U.S. is the target of terrorism and the distinction between "old" and "new" terrorism, as well as how campaigns of terrorism come to an end.

Reuben W. Hills Conference Room

Martha Crenshaw Colin and Nancy Campbell Professor of Global Issues and Democratic Thought and professor of government at Speaker Wesleyan University
Seminars
-

We know the terrorist threat: an atomic bomb exploding in downtown Manhattan, a roadside bomb in Las Cruces, New Mexico. Yet Congress, against the wishes of New York's Senator Schumer, voted down a bill that would have facilitated complete surveillance of radio activity, the sort of surveillance that might actually prevent the demise of NYC. The price tag was $100 million of initial funding and it would have cost $100 billion altogether--expensive then, but cheap after Iraq and Katrina. So where are we now? We have still have terrorist threats and still have limited protection.

In my talk I want to give an affordable solution: mathematical modeling, using an even more magical bullet: Reflexive Theory. If we talk about security and cooperation, we need one thing, as important as the frontal lobe: a model of the self! That is, we need Reflexive Theory.

My presentation will be an exciting journey through a contemporary approach to counter-terrorism, based on the work of the famous mathematical psychologist Vladimir Lefebvre.

Stefan E. Schmidt is CEO of the research company Phoenix Mathematical Systems Modeling, Inc.; he is also a member of the graduate faculty of the Department of Mathematical Sciences at New Mexico State University and a fellow of the Center for Advanced Defense Studies. For the past five years, he has been working as Senior Research Scientist at the Physical Science Laboratory of New Mexico State University.

From fall 2004 to 2005, Schmidt was on a one-year professional leave from PSL to follow an invitation as visiting professor at the University of Technology in Dresden, Germany. Between 1995 and 2000, he has held research appointments at the University of California, Berkeley (1995-98), the Mathematical Sciences Research Institute (96/97), the Shannon Laboratory of AT&T (98/99), and the Massachusetts Institute of Technology (1999-2000).

Previously, after his PhD in 1987 at the University of Technology in Darmstadt, Germany, Schmidt was assistant professor until 1995 at ainz University, Germany (as Hochschulassistent, Habilitation 1993).

Schmidt's scientific research ranges from discrete mathematics to applications in information sciences and network analysis; his expertise covers geometric algebra, order theory, combinatorics, formal concept analysis and reflexive theory--applied to communication networks, agent modeling and systems of systems analysis. His recent work includes modeling and simulating terrorist recruitment via reflexive theory as well as border protection via reflexive control. As a real world application of his scientific methods, he is currently involved in a long-term research project on the stock market (as a market of markets).

Reuben W. Hills Conference Room

Stefan Schmidt Mathematician, Physical Science Laboratory Speaker New Mexico State University
Seminars
Authors
News Type
Commentary
Date
Paragraphs
Ellen Johnson Sirleaf's inauguration provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries. CISAC's Jeremy M. Weinstein and colleague Steve Radelet tell how, in this Boston Globe op-ed.

Ellen Johnson Sirleaf's inauguration as the president of Liberia marks a watershed in the country's tumultuous history.

Twenty-five years of misrule and civil war under Samuel Doe, Charles Taylor, and successive interim governments have left the country in ruins. Nearly 300,000 Liberians lost their lives, average income is one-eighth what it was in 1980, and large majorities of the population subsist in dire poverty.

Since United Nations and US troops ousted Taylor in 2003, a fragile peace has taken hold, supported by 15,000 UN peacekeepers. With free and peaceful elections under their belts, Liberians are feeling new optimism and hope. Markets here are bustling, stores are freshly painted and open for business, and newspapers and radios feature lively debate.

The new government is a clear break from a past characterized by rule by force, extensive corruption, and a culture of impunity. Sirleaf, the first African woman elected head of state, has been an outspoken champion of accountability, transparency, and good governance for decades, a stance that landed her in jail twice and was a hallmark of her opposition to past governments and campaign for the presidency.

Already change is underway. She has instituted a code of conduct and full financial disclosure for senior officials, and endorsed a program that will install internationally recruited financial controllers in several state enterprises and create a strong anticorruption commission. Her government plans to publish financial accounts on the Web, make it easier for whistleblowers to report infractions, and rewrite Liberia's outdated constitution to firmly establish participatory democracy, decentralize power, and install robust checks on the executive.

Recovery from deep conflict in Africa is not easy, but we know it is possible. Mozambique was destroyed by civil war in the 1980s, but its democratically elected government led the way to peace, stability, and a doubling of income in a dozen years. Sierra Leone suffered a blood bath in the 1990s, but the 1999 peace agreement and 2001 elections brought stability and economic growth of 7 percent a year. Rwanda's genocide was followed by a recovery that few could have imagined.

But Sirleaf faces a daunting task. Liberia's recovery will depend mainly on Liberians themselves, but it will require strong international support, just as in Mozambique, Sierra Leone, and Rwanda.

West Africa's civil wars have spawned widespread smuggling of diamonds, transshipment of drugs, and easy money laundering opportunities for global terrorist groups. Liberia's historic moment provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries.

First, the United States must continue its crucial role in the demobilization of combatants and commit to long-term rebuilding of Liberia's police and army. The new government must be able to maintain and enhance security to begin to recover.

Second, the administration should support rapid and comprehensive forgiveness of Liberia's debts, which were mainly undertaken and wasted by the rapacious Doe government. It makes no more sense to stick today's Liberians with the bill, including 20 years of accumulated interest, than to force today's Iraqis to pay Saddam Hussein's bills.

Third, and perhaps most urgent, Congress should approve supplemental funding of $50 million to $100 million to support the new government. Unfortunately, Congress recently cut the administration's initial request for Liberia, a short-sighted step that sent the wrong signal to a struggling democracy and old ally at a crucial turning point. These funds would build critical infrastructure, put kids back into schools, and continue vital training for security forces. It would give Liberians their best chance of securing peace and basic freedoms.

All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition. This decision seems a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past? CISAC science fellow Jonathan Farley provides some mathematical insights.

You burst into the room. Sitting on a chair, blindfolded, his hands tied behind his back, is your prisoner. The room is dark, except for a lonely naked bulb hanging from the ceiling. He is sweating. He is afraid.

"Tell me where it is!" you scream. "Now!" You know there is little time left. Somewhere in your city, a time bomb is ticking. Whether it spits serin into the air, uranium into the water or atomic fire into the heavens, you do not know.

He does. But he is not talking. Involuntarily, you raise your hand as if to strike. What you are about to do violates the law and your conscience. And yet...

In peacetime, torture ranks next to murder as a primal sin. But during war, the debate begins over whether this evil can ever be justified to combat the seemingly greater evil of the enemy. Harvard law Professor Alan Dershowitz has said torture should be legalized.

In early October, the U.S. Senate voted 90-9 to ban it. Although Secretary of State Condoleezza Rice and President Bush have both recently asserted that "We do not torture," five U.S. Army Rangers were charged in November for punching and kicking detainees in Iraq, secret U.S. prisons have caused anxiety in Europe, and Vice President Dick Cheney has battled to win the CIA an exemption from the torture ban. As late as December, the U.S. House of Representatives stood poised to defeat the White House.

Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition.

The decision of an individual to support, or reject, torture seems at first to be a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past?

One cannot do experiments with societies, or predict the future, but, it turns out, one can attempt to address this issue using the cold, hard tools of mathematics and logic. This story begins in 1963.

The United States and the Soviet Union are on the perpetual brink of war, balanced like two sides of an equation. On the American side are "game theorists" like Thomas Schelling, recently awarded the Nobel Prize for his work on the strategy of conflict. On the Soviet side, there is the solitary mathematical psychologist Vladimir Lefebvre.

Just as mathematics could be used to describe logical reasoning, Lefebvre saw that mathematics could be used to describe ethical reasoning. If something was good -- for example, "church," "democracy," "prosperity," "kindness" -- it had value "1."

If something was evil -- "earthquake," "famine," "military defeat," "murder" -- it had value "0." But rarely were ethical situations so simple. For instance, "killing" is bad (0) but protecting one's country is good (1) -- so is war 1 or 0?

Lefebvre saw that, at the crudest level, there were essentially two types of ethical systems. Those that held that employing evil means to attain just ends was good, and those that saw that employing evil means to attain good ends was wrong.

There were also, crudely put, two types of relations between individuals: those entailing compromise (or cooperation) and those entailing confrontation.

Of course, evil people rarely see themselves as evil. So Lefebvre had to incorporate in his model of human nature the capacity of human beings to judge -- correctly or incorrectly -- the goodness or evil of their own acts, and to reflect upon their own judgments, and others'. "Reflexive Theory" was born.

It quickly became a paradigm within the Soviet defense establishment, with the publication of books such as "Mathematics and Armed Conflict." Nothing like it was known in the West.

With very simple assumptions -- for instance, that an individual who correctly sees his actions to be good when they are good, and evil if they are evil, is more highly regarded by society than an individual who incorrectly sees himself -- Lefebvre showed that in a society that accepted the compromise of good with evil, individuals would more often seek the path of confrontation with each other.

Lefebvre's insights were called upon by the State Department during negotiations with Mikhail Gorbachev in Reykjavik, Iceland. (And perhaps Lefebvre's model could be re-enlisted to help U.S. officials understand and negotiate with Arab and Muslim heads of state, who must also negotiate with their people.)

In support of Lefebvre's revolutionary new theory, a survey of Soviet émigrés and Americans was conducted in the 1970s. They were asked questions like, "Should a doctor conceal from a patient that he has cancer in order to diminish his suffering?" Overwhelmingly, the Americans would say no, and overwhelmingly, the Soviets yes. The Soviets accepted the compromise of good with evil; the Americans rejected it.

What does this mean? If Americans begin to accept the use of torture, American society might turn into a society of individuals in conflict.

Not uniformly, thanks to something called free will, but generally, with harmful consequences for society: Imagine two roads, with a stream of cars moving along each one. Each driver wants to reach his destination as quickly as possible; on occasion, drivers will impede each other.

On the first road, drivers rise in their own, and in other drivers', estimation if they yield. Drivers on the second road lose face when they yield. It is clear that traffic will move faster on the first road than on the second.

It can be argued that repressive states like Saudi Arabia, which bred most of the Sept. 11 hijackers, are on the second road. If the United States moved to accept torture, it could veer toward the second road, too -- the road of the Soviet Union.

And we know where that road ends. The Soviet Union no longer exists.

All News button
1
Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
-

Robert A. Pape is a professor of political science at the University of Chicago specializing in international security affairs. His publications include Dying to Win: The Strategic Logic of Suicide Terrorism (Random House, June 2005); Bombing to Win: Air Power and Coercion in War (Cornell, 1996), "Why Economic Sanctions Do Not Work," in International Security (1997), "The Determinants of International Moral Action," in International Organization (1999), "The Strategic Logic of Suicide Terrorism," in American Political Science Review (August 2003), "The True Worth of Air Power," in Foreign Affairs (March/April 2004), and "Soft Balancing against the United States," in International Security (Summer 2005).

His commentary on international security policy has appeared in The New York Times, Washington Post, The New Republic, Boston Globe, Los Angeles Times and Bulletin of the Atomic Scientists. He has appeared on The News Hour with Jim Lehrer; Nightline; ABC News; CNN's Wolf Blitzer, Anderson Cooper and Lou Dobbs; Fox's John Gipson; CNN International; and National Public Radio.

Before coming to Chicago in 1999, he taught international relations at Dartmouth College for five years and air power strategy for the U.S. Air Force's School of Advanced Airpower Studies for three years. He received his PhD from the University of Chicago in 1988 and graduated summa cum laude and Phi Beta Kappa from the University of Pittsburgh in 1982. His current work focuses on the origins of suicide terrorism and the logic of soft balancing in a unipolar world.

Reuben W. Hills Conference Room

Robert A. Pape Professor of Politicial Science Speaker University of Chicago
Seminars
-

Sigfried Hecker is a visiting professor at CISAC and an emeritus director of Los Alamos National Laboratory. A metallurgist, he focuses on plutonium science and nuclear weapons stockpile stewardship, while working closely with the Russian Academy of Sciences and the Russian Ministry of Atomic Energy on a variety of cooperative threat reduction programs. He is actively involved with the U.S. National Academies, serving on the Council of the National Academy of Engineering, as chair of the newly established Committee on Counterterrorism Challenges for Russia and the United States, and as a member of the National Academies Committee on Nuclear Nonproliferation. At CISAC, he also contributes regularly to seminars and to the popular undergraduate course, Technology and National Security, taught by William Perry and Elisabeth Paté-Cornell.

Directing Los Alamos National Laboratory from 1986 through 1997, Hecker was named Laboratory Director of the Year by the National Laboratory Consortium in 1998. He has devoted most of his career to providing technical and leadership expertise to the laboratory, beginning with summer graduate school and postdoctoral assignments there. After a three-year stint as a senior research metallurgist with the General Motors Research Laboratories, he returned to Los Alamos in 1973 as a technical staff member in the laboratory's Physical Metallurgy Group. Later he led the Science and Technology Division and chaired the Center for Materials Science before becoming director.

Among his professional distinctions, Hecker is a member of the National Academy of Engineering; a foreign member of the Russian Academy of Sciences; a fellow of the TMS, or Minerals, Metallurgy and Materials Society; a fellow of the American Society for Metals; an honorary member of the American Ceramics Society; and a fellow of the American Academy of Arts and Sciences. His achievements have been recognized with the American Nuclear Society's Seaborg Medal and many other awards, including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Reuben W. Hills Conference Room

CISAC
Stanford University
Encina Hall, C220
Stanford, CA 94305-6165

(650) 725-6468 (650) 723-0089
0
Senior Fellow, Freeman Spogli Institute for International Studies, Emeritus
Research Professor, Management Science and Engineering, Emeritus
hecker2.jpg PhD

Siegfried S. Hecker is a professor emeritus (research) in the Department of Management Science and Engineering and a senior fellow emeritus at the Freeman Spogli Institute for International Studies (FSI). He was co-director of CISAC from 2007-2012. From 1986 to 1997, Dr. Hecker served as the fifth Director of the Los Alamos National Laboratory. Dr. Hecker is an internationally recognized expert in plutonium science, global threat reduction, and nuclear security.

Dr. Hecker’s current research interests include nuclear nonproliferation and arms control, nuclear weapons policy, nuclear security, the safe and secure expansion of nuclear energy, and plutonium science. At the end of the Cold War, he has fostered cooperation with the Russian nuclear laboratories to secure and safeguard the vast stockpile of ex-Soviet fissile materials. In June 2016, the Los Alamos Historical Society published two volumes edited by Dr. Hecker. The works, titled Doomed to Cooperate, document the history of Russian-U.S. laboratory-to-laboratory cooperation since 1992.

Dr. Hecker’s research projects at CISAC focus on cooperation with young and senior nuclear professionals in Russia and China to reduce the risks of nuclear proliferation and nuclear terrorism worldwide, to avoid a return to a nuclear arms race, and to promote the safe and secure global expansion of nuclear power. He also continues to assess the technical and political challenges of nuclear North Korea and the nuclear aspirations of Iran.

Dr. Hecker joined Los Alamos National Laboratory as graduate research assistant and postdoctoral fellow before returning as technical staff member following a tenure at General Motors Research. He led the laboratory's Materials Science and Technology Division and Center for Materials Science before serving as laboratory director from 1986 through 1997, and senior fellow until July 2005.

Among his professional distinctions, Dr. Hecker is a member of the National Academy of Engineering; foreign member of the Russian Academy of Sciences; fellow of the TMS, or Minerals, Metallurgy and Materials Society; fellow of the American Society for Metals; fellow of the American Physical Society, honorary member of the American Ceramics Society; and fellow of the American Academy of Arts and Sciences.

His achievements have been recognized with the Presidential Enrico Fermi Award, the 2020 Building Bridges Award from the Pacific Century Institute, the 2018 National Engineering Award from the American Association of Engineering Societies, the 2017 American Nuclear Society Eisenhower Medal, the American Physical Society’s Leo Szilard Prize, the American Nuclear Society's Seaborg Medal, the Department of Energy's E.O. Lawrence Award, the Los Alamos National Laboratory Medal, among other awards including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Date Label
Siegfried S. Hecker Speaker
Seminars
Subscribe to North America