Authors
News Type
Q&As
Date
Paragraphs

CISAC Senior Fellow Siegfried Hecker and a delegation of American scientists traveled to Moscow last week to revitalize nuclear cooperation with Russia, despite diplomatic tensions between the United States and Russia over the crisis in Ukraine.

The delegation that traveled to Russia last week included former U.S. laboratory scientists Paul White, James Toevs, and K. David Nokes, as well as CISAC research assistants Peter Davis and Alla Kassianova and CISAC fellow Jason Reinhardt.

The team traveled to Russia to host a workshop and make the case that continued scientific cooperation in reducing nuclear risks – particularly to prevent nuclear proliferation and terrorism – should remain a top priority for both countries, even as U.S.-Russia relations continue to deteriorate.

The White House has implemented increasingly stricter sanctions against top Russian officials and has restricted official travel and scientific cooperation. Washington accuses Moscow of trying to destabilize the new government in Ukraine by backing pro-Russian separatists in the former Soviet state.

Hecker chaired a Track II workshop at the Moscow Engineering and Physics Institute (MEPhI) on April 24 on “Cooperation on Countering Nuclear Terrorism and Nonproliferation.” Presenters from Russian institutes and U.S. laboratories included Reinhardt, a national security systems analyst at Sandia National Laboratories who is pursuing a PhD at Stanford in Management Science & Engineering. He argued for expanded cooperation to counter nuclear terrorism and reduce the risk of global proliferation.

“It is paramount that American and Russian scientists continue to work together to deal with today’s nuclear risks despite the tension between our two nations,” says Hecker, a Stanford professor of management science and engineering. The former head of the Los Alamos National Laboratory made his first trip to the Russian nuclear complex in early 1992, shortly after the collapse of the Soviet Union to promote joint efforts to mitigate the threats posed by the huge Russian nuclear complex during a time of political and economic turmoil.

The threats have changed during the past 22 years, but have not gone away, Hecker says. Yet cooperation between Russian and American nuclear scientists has declined significantly during the past decade because Russia has recovered economically and has grown progressively more protective against external intervention. Now, the crisis in the Ukraine threatens to stop cooperation completely.

More than 200 students from MEPhI’s nuclear science and nonproliferation programs participated in the workshop, alongside prominent Russian scientists.

“The large audience indicates how seriously the nuclear specialists from both sides take the need to protect the world from the spread of nuclear weapons and materials to other states and non-state actors,” says Hecker, whose workshop grew from his Nuclear Risk Reduction Project (NRR), which is funded by the Carnegie Corporation and the MacArthur Foundation.

Hecker is also working with his former Russian counterparts at the Russian nuclear weapons laboratories on a book about the history of U.S.-Russia national laboratory cooperation, which is due out later this year. That book will tell the story of how the scientists worked together during difficult times to make the world a safer place.

Russian and American scientists discuss nuclear collaboration as students from the Moscow Engineering and Physics Institute look on.
Photo Credit: Peter Davis

We asked Hecker to answer several questions related to his trip to Moscow.

Why did you still travel to Moscow given the recent events in Ukraine?

I had to discuss the book with my Russian collaborators in order to meet our fall deadline for publication. We also wanted to reinforce the belief of scientists on both sides that we must continue to cooperate even, or perhaps especially, when our governments are at odds. That is why we organized the educational conference on nuclear cooperation.

Did the U.S. government try to stop you?

Since I went as a Stanford University professor, I did not need official approval. Key individuals in the government knew that I was going and did not try to stop me. However, colleagues from the Department of Energy’s nuclear laboratories were prohibited from attending a related conference and Washington canceled several official bilateral meetings and visits.

Were the Russians allowed to meet with your delegation?

Yes, we met with the key individuals on the Russian side and MEPhI organized a great conference. We did have to switch the venue of one of our side meetings from one of the Russian nuclear weapons laboratories to neutral ground. I think the Russian government did not want these meetings to look official after the U.S. government has canceled most interactions for the foreseeable future.

How do your Russian collaborators view the recent events in Ukraine?

Without exception, they viewed it with alarm and laid the blame squarely on the “fascists” who took over Kiev’s government illegally. They could not understand how the Americans could support what they see as an illegitimate regime. We got quite a lesson on the intertwined history of Russia and the Ukraine. They believe the Americans simply don’t understand the deep relations and commitment all Russians have for Ukraine. When we tried to give a Western point of view, some Russian colleagues told us that we have been brainwashed by Washington and the media.

How does the downturn in relations affect your views on the need for cooperation?

Despite their views on Ukraine, our Russian colleagues all said we must continue to work the nuclear issues together. So while we couldn’t agree on Ukraine, we agreed for the need to keep up our work – which for me has now spanned 49 visits to Russia during the past 22 years. 

What role has CISAC’s collaboration with the Moscow Engineering and Physics Institute (MEPhI) played in your work on nuclear cooperation?

MEPhI is a great counterpart for CISAC and a number of other American universities. It educates about one-third of the scientists and engineers that make up the Russian nuclear complex. It is with the next generation that we have the best chance of reducing the global nuclear risks that we face now and in the future.

All News button
1
Date
Paragraphs

CISAC fellow Rachel Gillum writes in this commentary that the NYPD's decision to disband its special Muslim surveillance unit may eventually aid in counterterrorism efforts as the Muslim community regains trust and works together with the police to identify possible threats.

Gillum, a doctoral candidate in political science at Stanford, is the principal investigator at the Muslim American National Opinion Survey, which aims to better understand the political attitudes and behaviors of the diverse community of Muslims living in the United States.

She writes: "While terrorism in the U.S. remains a serious threat, the measurable results of the NYPD spying program appear to be less than desirable. In addition to potentially suppressing voluntary assistance from the Muslim-American community, after years of collecting information, the NYPD acknowledged that the unit never generated a lead."

Hero Image
Reuters OWS April2014 Reuters
All News button
1
Authors
Date
Paragraphs

The greatest dangers to nuclear facilities are sabotage and theft from insiders, according to political scientist Scott Sagan. Analysis of past incidents can help boost safeguards at these sites.

A diesel generator at the San Onofre Nuclear Generating Station in Southern California was possibly sabotaged, likely by an insider, in 2012.

Insider threats are the most serious challenge confronting nuclear facilities in today's world, a Stanford political scientist says.

In every case of theft of nuclear materials where the circumstances of the theft are known, the perpetrators were either insiders or had help from insiders, according to Scott Sagan and his co-author, Matthew Bunn of Harvard University, in a research paper published this month by the American Academy of Arts and Sciences.

"Given that the other cases involve bulk material stolen covertly without anyone being aware the material was missing, there is every reason to believe that they were perpetrated by insiders as well," they wrote.

And theft is not the only danger facing facility operators; sabotage is a risk as well, said Sagan, who is a CISAC senior fellow and professor of political science.

While there have been sabotage attempts in the United States and elsewhere against nuclear facilities conducted by insiders, the truth may be hard to decipher in an industry shrouded in security, he said.

"We usually lack good and unclassified information about the details of such nuclear incidents," Sagan said.

The most recent known example occurred in 2012, an apparent insider sabotage of a diesel generator at the San Onofre nuclear facility in California. Arguably the most spectacular incident happened at South Africa's Koeberg nuclear power plant (then under construction) in South Africa in 1982 when someone detonated explosives directly on a nuclear reactor.

Lessons Learned

In their paper, the authors offered some advice and insights based on lessons learned from past insider incidents:

  • Don't assume that serious insider threats are NIMO (not in my organization).
  • Don't assume that background checks will solve the insider problem.
  • Don't assume that red flags will be read properly.
  • Don't assume that insider conspiracies are impossible.
  • Don't assume that organizational culture and employee disgruntlement don't matter.
  • Don't forget that insiders may know about security measures and how to work around them.
  • Don't assume that security rules are followed.
  • Don't assume that only consciously malicious insider actions matter.
  • Don't focus only on prevention and miss opportunities for mitigation.
 

The information for the research paper emanated from an American Academy of Arts and Sciences project on nuclear site threats, Sagan said.

"It was unusual in that it brought together specialists on insider threats and risks in many different areas – including intelligence agencies, biosecurity, the U.S. military – to encourage interdisciplinary learning across organizations," he said.

Sagan explained that the experts sought to answer the following questions: "What can we learn about potential risks regarding nuclear weapons and nuclear power facilities by studying insider threat experiences in other organizations? What kinds of successes and failures did security specialists find in efforts to prevent insider threats from emerging in other organizations?"

'Not perfect'

He noted that only a few serious insider cases in the U.S. nuclear industry have arisen, thanks to rigorous "personal reliability" programs conducted by the Nuclear Regulatory Commission and the U.S. military for people with access to sensitive nuclear materials.

But there is room for improvement, Sagan said.

"These programs are effective," he said, "but they are not perfect. And relative success can breed overconfidence, even complacency, which can be a major cause of security breaches in the future."

For example, the nuclear industry needs to do more research about how terrorist organizations recruit individuals to join or at least help their cause. It also needs to do a better job on distributing "creative ideas and best practices" against insider threats to nuclear partners worldwide.

Sagan said the U.S. government is not complacent about the danger of insider threats to nuclear security, but the problem is complex and the dangers hard to measure.

"Sometimes governments assume, incorrectly, that they do not face serious risks," he said.

One worrisome example is Japan, he said.

"Despite the creation of a stronger and more independent nuclear regulator to improve safety after the Fukushima accident in Japan, little has been done to improve nuclear security there," said Sagan.

He added, "There is no personal reliability program requiring background checks for workers in sensitive positions in Japanese nuclear reactor facilities or the plutonium reprocessing facility in Japan."

Sagan explained that some Japanese government and nuclear industry officials believe that Japanese are loyal and trustworthy by nature, and that domestic terrorism in their country is "unthinkable" – thus, such programs are not necessary.

"This strikes me as wishful thinking," Sagan said, "especially in light of the experience of the Aum Shinrikyo terrorist group, which launched the 1995 sarin gas attack in the Tokyo subway."

Hero Image
1 Screen Shot 2014 04 09 at 2 22 10 PM
All News button
1
Paragraphs

Sample from article: 

Last year, greenhouse gas emissions reached a record high of 39 billion tons. Emissions actually dropped in the United States and Europe, but substantial increases in China and India more than erased this bit of good news.

That is all the more reason to focus on innovative solutions that slow the growth in emissions from emerging markets.

The U.S.-India civilian nuclear deal is one such solution.

The key principles of this agreement were signed by President George W. Bush and Prime Minster Manmohan Singh eight years ago this week. The deal brought India’s civilian nuclear program under the International Atomic Energy Agency’s inspection regime. In return, Washington removed sanctions and permitted India to build nuclear power plants with foreign help. Most of the discussion leading up to the deal has focused on its potential effect on non-proliferation treaties and on the partnership between the U.S. and India.

All Publications button
1
Publication Type
Commentary
Journal Publisher
Reuters
Authors
Anja Manuel
Authors
News Type
News
Date
Paragraphs

The National Security Agency's mass surveillance of telephone metadata could yield detailed information about the private lives of individuals far beyond what the federal government claims, according to new Stanford research.

Stanford computer science student and CISAC cybersecurity fellow Jonathan Mayer and a fellow CS student, Patrick Mutchler, were able to acquire detailed information about people's lives just from telephone metadata: the phone number of the caller and recipient, the particular serial number of the phones involved, the time and duration of calls and possibly the location of each person when the call occurred.

The researchers did not do any illegal snooping – they worked with the phone records of 546 volunteers, matching phone numbers against the public Yelp and Google Places directories to see who was being called.

From the phone numbers, it was possible to determine that 57 percent of the volunteers made at least one medical call. Forty percent made a call related to financial services.

The volunteers called 33,688 unique numbers; 6,107 of those numbers, or 18 percent, were isolated to a particular identity.

Privacy issues

The metadata issue has taken on urgency in the wake of last summer's revelations about surveillance of American citizens by the NSA. Privacy experts have questioned the federal government's assertions on the subject.

President Obama has said, "They are not looking at people's names, and they're not looking at content."

Federal judges have split on the legality of the NSA's telephone metadata program.

Jonathan Mayer talks to Hari Sreenivasan on PBS Newshour in this video: 

Computer scientists such as Mayer say metadata are extremely sensitive and revealing.

They contend their research shows that metadata from phone calls can yield a wealth of detail about family, political, professional, religious and sexual associations.

"It would be no technical challenge to scale these identifications to a larger population," said Mayer.

At the outset, Mayer said, they asked, "Is it easy to draw sensitive inferences from phone metadata? How often do people conduct sensitive matters by phone? We turned to our crowdsourced MetaPhone dataset for empirical answers."

They crowdsourced the data using an Android application and conducted an analysis of individual calls made by the volunteers to sensitive numbers, connecting the patterns of calls to emphasize the detail available in telephone metadata, Mayer said.

"A pattern of calls will, of course, reveal more than individual call records," he said. "In our analysis, we identified a number of patterns that were highly indicative of sensitive activities or traits."

For example, one participant called several local neurology groups, a specialty pharmacy, a rare-condition management service, and a pharmaceutical hotline used for multiple sclerosis.

Another contacted a home improvement store, locksmiths, a hydroponics dealer and a head shop.

'Unambiguously sensitive'

The researchers initially shared the same hypothesis as their computer science colleagues, Mayer said. They did not anticipate finding much evidence one way or the other.

"We were wrong. Phone metadata is unambiguously sensitive, even over a small sample and short time window. We were able to infer medical conditions, firearm ownership and more, using solely phone metadata," he said.

All three branches of the federal government are now considering curbs on access to telephone metadata, Mayer noted. Consumer privacy concerns are also salient as the Federal Communications Commission assesses telecom data sharing practices, he added.

 

Hero Image
1 13617 nsasign1 news
Stanford computer science students Jonathan Mayer and Patrick Mutchler examined phone records to learn what the NSA can find out through surveillance.
National Security Agency
All News button
1
Authors
News Type
Q&As
Date
Paragraphs

U.S. Sen. Dianne Feinstein is alleging the CIA may have violated the U.S. Constitution by spying on the staff of the Senate Intelligence Committee.

Feinstein, D-Calif., who chairs the committee and has been a longtime supporter of the CIA and other intelligence agencies, made a dramatic speech on the floor of the U.S. Senate, accusing the CIA of possible criminal activity in its attempts to obstruct the committee’s investigation into the agency’s use of torture in the aftermath of the 9/11 terrorist attacks.

CIA Director John Brennan has dismissed the charges as “beyond the scope of reason” and insists the CIA has broken no laws.

CISAC Co-Director Amy Zegart, an intelligence expert, tells Politico: “This is the most serious feud since the Intelligence committees were established."

Zegart, a former National Security Council staffer, answers questions about the dispute: 

Brennan said Feinstein's accusations of the CIA possibly violating the U.S. Constitution are "beyond the scope of reason." What's going on between these two?

This is a longstanding and before-now private, bitter fight over how the Senate Intelligence Committee is investigating the CIA's past detention and interrogation programs. The current controversy is about whether congressional staff illegally acquired CIA documents during the course of their investigation and whether the CIA illegally spied on those congressional staffers.

But the deeper fight is really about how history will record and judge the Bush administration's detention and interrogation policies. It's a complex battle that is tinged with politics. The Senate investigation began years ago as a bipartisan effort to examine these policies and their efficacy. Eventually, though, Republican members of the committee felt they could no longer participate. So we're now in a bizarre world where Democratic senators on the Intelligence Committee are feuding with a Democratic administration about investigating controversial policies practices that occurred under a Republican predecessor.

 

 

Feinstein calls the crisis a defining moment for the agency. Is it?

This is an extraordinary moment for CIA-congressional relations and the worst feud since the Church Committee investigation of CIA abuses in the 1970s. Oversight is always a delicate dance between intelligence officials who believe strongly in the importance of secrecy for carrying out their mission and lawmakers who believe strongly in the value of transparency to maintain the public trust. Intelligence officials never freely volunteer details of their agencies' activities. It's Congress's job to probe, to ask tough questions and demand good answers. 

But this is different than the usual tension between intelligence overseers and agencies. Feinstein isn't accusing the CIA of stonewalling or not telling the full truth. She is accusing the agency of spying on and intimidating her staff. That's totally out of bounds. For Feinstein, this conflict is Constitutional – raising serious questions about separation of powers and Congress's ability to check the executive's most powerful agencies. It is institutional, calling into question the role of her committee in particular. And it is personal. She is claiming that her own staff has been referred to the Justice Department for possible criminal prosecution.

How serious is this for CIA Director Brennan, who vehemently denies the accusations and says no computers were hacked. 

The CIA is in big-time trouble. We may never know what actually happened in a basement room in Virginia where congressional staffers were reading millions of pages of CIA documents on computers. What matters more now is the political narrative. Ever since Edward Snowden – the former contractor for the National Security Agency – started releasing documents last June, the political narrative has been that U.S. intelligence agencies spy on and lie to just about everyone.

Much of this narrative is woefully distorted and just plain wrong. NSA is not out there listening to your calls with grandma. And there is still no evidence that NSA programs violated the law. But the narrative of distrust is powerful. Which is why Sen. Feinstein's charges against the CIA -- coming from one of the intelligence community's biggest defenders -- is so devastating.

Hero Image
1 427026
CIA Director John Brennan
The White House
All News button
1
Authors
News Type
News
Date
Paragraphs

In the post-9/11 world, forging a successful grand strategy in U.S. foreign policy is unlikely and dangerous, according to a Stanford scholar.

During the Cold War, American leaders understood that the Soviet Union was their primary adversary, writes political scientist Amy Zegart in an essay for the Hoover Institution's Foreign Policy Working Group, a new two-year initiative that brings together Stanford scholars to examine key U.S. foreign policy challenges.

Zegart, co-director of the Center for International Security and Cooperation, notes that the Soviet threat – one of nuclear annihilation – brought a singular focus to U.S. foreign policy for the second half of the 20th century.

Successful grand strategies, she writes, depend on knowing the number and identities of one's enemies, what they want, how they operate and what damage they can unleash.

That is no longer the case in 2014 and for the foreseeable future, she suggests.

"The post-9/11 threat environment is vastly different," notes Zegart. Today, the number, identity and magnitude of dangers threatening American interests are all "wildly uncertain."

Exactly how many principal adversaries does the United States face at any given time? Who are they and what do they want? What could they do to America? Is China a rising threat or a responsible stakeholder? How likely is a "digital Pearl Harbor" that cripples U.S. strategic forces or financial institutions?

The answer to all these questions, she writes, is that nobody really knows: "Each day, it seems, we are told to be very afraid about something different and vaguely sinister."

On top of this, grand strategy requires dynamic international collaboration. But organizations like NATO, the International Monetary Fund and the United Nations Security Council are "out of whack with current power realities," writes Zegart. Gaps exist between the "aspirations and capabilities" of international organizations that typically forge partnerships with America.

A new approach

If grand strategy is outdated – and even dangerous – what can be done?

The first step is to give up on notions of grand strategy, Zegart advises. Instead, the United States should strive for what FSI Senior Fellow and working group co-chair Stephen Krasner calls "orienting principles." These are policy ideas that lie between ad hoc reactions to arising situations and grand visions of how the future should unfold.

"Orienting principles aren't glamorous," Zegart writes, "but they hold out the prospect of something better than foreign policy a la carte or a grand strategy that mis-estimates the threat environment and misunderstands the organizational requirements for success."

When grand strategies work well, they are truly grand, says Zegart. "That is, they must be able to anticipate and articulate a compelling future state of the world and galvanize the development of policies, institutions and capabilities at the domestic and international level to get us there. That's hard enough."

A second challenge, she adds, is the strategic interaction part of grand strategy, which requires thwarting and adjusting to the countermoves of principal adversaries.

"Grand strategy is not a game of solitaire, where we come up with all the moves and the cards just sit there. It's not all about us and our big ideas," she notes.

Instead, grand strategy is a multi-player game with powerful adversaries seeking to impose their national wills on the world to serve their own interests, Zegart observes.

"The sorry truth is that American grand strategies are usually alluring but elusive," she concludes. "The Cold War this isn't. We live in a hazy threat du jour world. This is too much complexity and uncertainty for grand strategy to handle."

 

Hero Image
1 chess board
Cold War chess board in Red Square
Damian Corrigan
All News button
1
Paragraphs

First paragraph of the article:

In the post-9/11 world, the days of an American “grand strategy” are over.


Grand strategy has always been seductive because it promises policy coherence in the face of complexity. Yet the sorry truth is that American grand strategies are usually alluring but elusive. Containment during the Cold War, the most often cited example of grand strategy success, is a recent lonely exception that has driven political scientists and policy makers to keep hope alive. That hope is misguided. In the post-9/11 world, forging a successful grand strategy is unlikely and dangerous.

All Publications button
1
Publication Type
Journal Articles
Journal Publisher
Defining Ideas
Authors
Amy Zegart
Paragraphs

First paragraph of the article:

If the Syrian civil war and, in particular, the horrific Ghouta attack this August have reminded the world of the persistent danger of chemical weapons, it is worth remembering that this is not the first time the United States has confronted a Middle Eastern dictator armed with weapons of mass destruction. During the 1991 Gulf War, Saddam Hussein possessed large stockpiles of chemical weapons, which he had used frequently in his 8-year war with Iran during the 1980s. And yet Iraq did not use these weapons against the U.S.-led coalition forces, even as they soundly defeated the Iraqi army, pushing it from Kuwait. For two decades, the question has been, why no

All Publications button
1
Publication Type
Commentary
Journal Publisher
Foreign Policy
Authors
Scott D. Sagan
Subscribe to United States