-

Livestream: Please click here to join the livestream webinar via Zoom or log-in with webinar ID 944 5730 9104.

 

About this Event: Why do some governments give foreign militants missiles that can destroy aircraft while giving others only bullets and AK-47s? Why do some governments deploy special operations forces to carry out joint attacks with some insurgent groups, while only giving others basic training on weapons handling? Despite the fact that governments often provide costly - and controversial - forms of support to foreign militant groups, we know little about why some groups receive advanced weapons technology and boots on the ground while others do not. In this presentation, I unpack trends in third-party provision of support through an in-depth examination of the CIA's provision of anti-tank missiles and the Pentagon's deployment of Special Operations Forces to support specific militant groups in the recent Syrian conflict. Drawing from an original dataset of the over 150 Syrian militant brigades that received some form of US support and over 60 interviews with Syrian militants and US and Jordanian government officials, I find that, when militant groups have similar organizational characteristics as the armed forces of their government partners, they are more likely to receive and accept costly forms of support. 

 

About the Speaker: Melissa Carlson is a PhD candidate in the Department of Political Science at U.C. Berkeley, specializing in international relations, comparative politics, and methodology. She will join CISAC in 2019-2020 as a Middle East Initiative Pre-doctoral Fellow. Broadly, her research examines the dynamics of military partnerships between state governments and foreign militant groups. Melissa's dissertation develops an organizational theory of third-party provision of support: when foreign militant groups and state armed forces share similar organizational characteristics, they are more likely to form joint commands, carry out joint attacks, and provide each other with advanced weapons systems.  Melissa's other research interests focus on factors that influence informal cooperation between states, and on how refugee perceptions of host communities, host governments, and aid organizations influence refugee decision-making. Prior to beginning her PhD at U.C. Berkeley, Melissa worked as Public Information consultant for the International Organization for Migration, Iraq Mission in Jordan and Iraqi Kurdistan. Melissa has a M.A. in Political Science from U.C. Berkeley, and a B.A. in International Relations and Politics, Philosophy, and Economics from Claremont McKenna College.

Virtual Seminar

0
rsd19_072_0235a.jpg

Dr. Melissa Carlson is currently working with the Defense Security Cooperation Agency's Assessment, Monitoring, and Evaluation unit, where she promotes rigorous standards of measuring the effectiveness of the U.S.'s security cooperation and assistance programming. During her tenure at CISAC, she was a postdoctoral research and teaching fellow. She received her PhD in Political Science from the University of California, Berkeley, specializing in international relations, comparative politics, and methodology. Dr. Carlson's primary research examines the factors that influence the variation and intensity of partnerships between governments and foreign militant groups with a focus on the recent conflicts in Iraq and Syria. Her book-style dissertation project finds that, when foreign militant groups and state armed forces share similar organizational characteristics, they are more likely to deploy forces to conduct joint combat operations and provide each other with advanced weapons systems. In other research, Dr. Carlson examines the factors that influence informal and secret security cooperation between states and how misinformation and rumors influence refugees' relationships with host governments, service providers, and smugglers. Her research has been published in the American Political Science Review, the Review of International Organizations, and International Studies Quarterly, among other outlets. Outside of academia, Dr. Carlson has worked as a consultant for the International Organization for Migration's Iraq and Jordan Missions.

Affiliate
Melissa Carlson Predoctoral Fellow at CISAC
Seminars
-

 

Seminar Recording: https://youtu.be/cLeMYCUzXvE

 

About this Event: This talk will offer an explanation for a contradiction in cryptocurrency and blockchain technologies: similar tools and platforms — indeed, sometimes the same ones — are adopted both for and against security and stability. How can a technology be interesting to ISIS, Facebook, blackmailers, central banks, ransomware developers, philanthropists, offshore casinos, drug cartels, logistics officers, smugglers, and food safety inspectors? I will argue that we can understand some of the present and near future dynamics of cryptocurrencies and blockchain tools through the history of their creation, which stretches back almost fifty years. I will take us through the agendas, goals, and ideologies woven into the development of the technology — from destroying governments, to creating unique digital objects with the provenance of gold ingots, to funding immortality — and discuss how they are playing out in the threats and promises of systems now.

 

About the Speaker: Finn Brunton is associate professor at New York University’s Department of Media, Culture, and Communication. He is the author of Spam: A Shadow History of the Internet (2013) and Digital Cash: The Unknown History of the Anarchists, Technologists, and Utopians Who Created Cryptocurrency (2019), and co-author of Obfuscation: A User’s Guide for Privacy and Protest (2015) and Communication (2019).”

 

 

Virtual Seminar

Finn Brunton Associate Professor New York University
Seminars
-

Seminar Recording: https://youtu.be/j9S_CKmku00

 

About this Event:

Image
bryan

Bryan Metzger

1:30 PM - 2:15 PM 

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: Lobbyists, Public Relations and “Malign Activities”: The JCPOA as a Case Study of Foreign Influence

Abstract: In July 2015, the P5+1 announced the conclusion of the Joint Comprehensive Plan of Action (JCPOA), known colloquially as the “Iran nuclear deal,” an agreement between Iran and the P5+1 to place limits on the Iranian nuclear program. The agreement was controversial not only within American domestic politics, but also in the eyes of American allies in the Middle East that are commonly thought to exercise significant influence over American foreign policy. Using the JCPOA as a case study on foreign influence in American political decision-making, this thesis analyzes the influence strategies of Israel, Saudi Arabia, and Iran from 2013 to 2018 while assessing the efficacy of these strategies. Based on the theoretical literature, I propose four different influence strategies: direct and indirect lobbying, and direct and indirect shaping of the information space. As a result of nearly forty interviews with former government officials, ambassadors, policy advocates, and regional experts, this thesis finds that while foreign influence does not drive US foreign policy, it can act as an important intervening factor, raising or lowering the costs of political decision-making and amplifying existing preferences within the American political system. Thus, this thesis provides a nuanced perspective on foreign influence in American decision-making, showing the real impact that such campaigns can have while eschewing the idea that American policymakers lack agency in important foreign policy matters.

 

 

Image
andrew

Andrew Lokay

2:15 PM - 2:50 PM

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: The Repatriation Dilemma: European Countries and Islamic State Foreign Terrorist Fighters

Abstract: This thesis explains differences in European countries’ approaches to the repatriation of Islamic State foreign terrorist fighters (FTFs). Following the territorial defeat of the Islamic State, the United States urged European countries to take back their citizens who travelled to Syria and Iraq to join the caliphate. Some have done so, while others have not. This thesis is the first study to analyze the variation in responses to this request and uses an original dataset of FTF repatriation across 16 European countries. I apply a nested analysis research design to evaluate four explanatory variables: a country’s history of jihadist attacks, justice system capability, desire for a better relationship with the United States, and domestic political pressure. I arbitrate among these potential explanations though a medium-N analysis and case studies of the United Kingdom and the Republic of North Macedonia. I suggest that NATO aspirants are more likely to repatriate FTFs. The empirical evidence I collect does not support the other three hypotheses. I also propose that high evidentiary requirements in legal systems present a challenge to FTF repatriation. This thesis advances the literature’s understanding of the responsiveness of U.S. allies and partners to Washington’s demands, and it expands the counterterrorism scholarship to address a novel question regarding a salient and divisive policy debate.

 

 

Image
adam

Adam Elliott

2:50 PM - 3:20 PM

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: Keeping Pace: Addressing Life Sciences Dual Use Risk Across U.S. Government Agencies

Abstract: Why do different institutions address the same security challenge in different ways? Global biosecurity governance is ill-equipped to stay apace with advances in biotechnology. While almost all necessary life sciences research incurs the risk for misuse, certain experiments with higher risk to human health if misused are labelled dual use research of concern (DURC). U.S. government policies to guide public funding for DURC experiments attempt to outline lists of experiment types or select agents that constitute DURC. However, experts argue some experiments are definitionally DURC, but they do not fall within the scope of the U.S. policy. This thesis analyzes how the National Institutes of Health (NIH) and the Defense Advanced Research Projects Agency (DARPA) approach funding two of these experiment types: gene drives and virus engineering for pandemic preparedness. Tracing each agency’s approach to funding these experiments, as well as their institutional history and culture, leads to several findings. First, when experiment types test the limits of what biosecurity policies are scoped to address, agencies tend to respond in accordance with their mission. However, decisions by agency directors may influence the response as well. Coherent leadership and strategies are critical for preserving the integrity of the scientific enterprise and for protecting humanity from biological threats – including natural, accidental, and deliberate release of biological products that could cause human suffering. By studying the ways different agencies respond when they have to address new biosecurity challenges, governments can better assess the effectiveness of existing biosecurity policies and design future policies in a way that allows society to enjoy the benefits of life sciences advances without undue exposure to risk.

Virtual Seminar

Bryan Metzger, Andrew Lokay, and Adam Elliott
Seminars
-

Seminar Recording:  https://youtu.be/sQynE60SFTc

 

About this Event:

Image
sophia

Sophia Boyer

1:30 PM - 2:15 PM 

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: AK-47s, Tanks, and F-16s: Understanding Shifts in Pakistan's Conventional Military Strategy in the post-Cold war era

Abstract: The United States has navigated a complex relationship with Pakistan since the country’s inception in 1947. The behavior of the Pakistan Army has been a central factor in that relationship. This thesis analyzes when, how and why the Pakistan Army has shifted its conventional military strategy in the post-Cold war era. An investigation of the Pakistan Army’s capabilities, doctrines, rhetoric and force distribution suggests that Pakistan shifted its conventional military strategy four times since 1989: a ‘Post-Cold war Strategy’ from 1989-1994, a ‘Defense Minimal strategy’ from 1994-2001, a ‘Two-Front Commitment Strategy’ from 2001-2010, and a ‘Three-Front Commitment Strategy’ from 2010-2019. Based on existing literature and interviews, this thesis argues that external threats, specifically those emanating from India and the U.S., and bureaucratic politics driven by leadership changes have impacted shifts in Pakistan’s conventional military strategy substantially. These findings can inform a calibrated US South Asia policy comprising the management of conventional military balance in nuclear South Asia.

 

 

Image
samantha

Samantha Feuer

2:15 PM - 2:50 PM

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: From the Shadows to the Front Page: State Use of Proxies for Cyber Operations.

Abstract: Why do some states delegate cyber operations to proxies while others rely on central commands? This thesis explores state use of cyber proxies in light of principal-agent problems. In particular, this work examines cyber proxies allegedly acting at the behest of China, Russia, Iran and North Korea by considering three variables: cost, skills and specialization, and plausible deniability. The use of case studies and process tracing analyses evaluate their explanatory power in the cyber realm. The data suggest that states may use cyber proxies to differing degrees and with differing motivations depending upon the type of mission or strategic aim, as well as their ability to pose credible threats to misbehaving proxies. Although cyber operations are comparatively “cheap” relative to physical missions - hence their appeal - some evidence suggests that using cyber proxies may provide additional cost savings compared to the use of their central commands for certain missions. States’ need for skills and specializations, not immediately attainable through central commands, may also lead them to use cyber proxies. Based on available evidence, it remains inconclusive whether states’ potential desire for plausible deniability influences their use of cyber proxies. During a period of global uncertainty in which our everyday lives have been forced online, critical infrastructure, the public sector and private industry are increasingly vulnerable to cyber-attacks from adverse actors. As data in this field improves, this thesis hopes to serve as a framework for future researchers to test, with more certainty, the causal links between these explanations and the use of cyber proxies within these four states.

 

 

Image
elena

Elena Crespo

2:50 PM - 3:20 PM

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: Blood and Treasure, but Mostly Blood: U.S. Electoral Accountability and the All-Volunteer Force

Abstract: In the wake of the American military’s transition to an all-volunteer force (AVF), scholars and military leaders alike cautioned that the Armed Forces defending the nation would come to disproportionately draw from the least advantaged and least politically powerful populations. Should that be the case, certain communities would pay higher costs of war while others would be relatively untouched, leaving the Executive free to command with little public accountability. This thesis adopts an experimental statistical counterfactual approach to examine the geographic casualty distribution across states during the Iraq War had there been a conscripted force. The data presented suggest that the conventional logic is partially correct: an all-volunteer force is not egalitarian. It disproportionately burdened certain states—predominantly in the South and Midwest—with higher casualty rates than would have a conscripted force. However, many of the states that shouldered the costs of war under an AVF also carry disproportionate political gravity as electoral swing states. These findings suggest that a President who chooses to use force is more likely to face electoral backlash for his or her decisions under an all-volunteer force than under a conscripted force. Ultimately, the thesis proposes that President George W. Bush may have increased the margin of his victory in the 2004 Presidential election and contributed to greater Republican victories in the 2006 Senate election had the Iraq War been fought with a conscripted force that more equally distributed casualties. This finding runs contrary to the popular contention that a conscripted force is inherently more democratic and will lead to better electoral accountability for use of force.

Virtual Seminar

Sophia Boyer, Samantha Feuer, and Elena Crespo
Seminars
-

Seminar Recording: https://youtu.be/vrUV4VtYZsE

 

About this Event:

Image
rsd19 067 0145a

Ben Boston

1:30 PM - 2:15 PM 

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: America in East Africa: Security Partnerships, Aid Dependence, and Diplomatic Leverage

Abstract: Why is the United States able to shape the actions of friendly nations? In this thesis, I offer an answer by examining cases of military invasions by and domestic political liberalization effort of the Kenyan and Ugandan governments since the end of the Cold War. Drawing on academic, journalistic, and participant reporting of each case, including interviews with key American policymakers, I test three theoretical frameworks: balance of interests, dependence, and coercive diplomacy. Through these I attempt to explain American influence over the 1998 Ugandan and Rwandan invasion of the Democratic Republic of the Congo, the 2011 Kenyan invasion of southern Somalia, the 1991 Kenyan reinstitution of multiparty politics, and the 2005 Ugandan abolition of presidential term limits and reinstitution of multiparty politics. The existing literature on these cases focuses on outcomes broadly, and on African states’ comparative ability to secure agency relative to the wishes of their donors. Taking the United States as my focus, in this comparative case study, I find consistent limits to America’s ability to shape the actions of Kenya and Uganda regarding their core interests; however, clear, sustained application of coercive diplomacy still altered outcomes — especially when it used the leverage offered by dependence. This thesis creates a model of American agency in maximizing leverage over aid-dependent states.

 

 

Image
rsd19 067 0015a 1

Eva Frankel

2:15 PM - 2:50 PM

Introductions will start at 1:30pm. Each presentation will be 20 minutes with a 10 minute discussion.

Title: Assessing the Threat of Bioterror from Lone Insiders in Biological Laboratories

Abstract: As the cost of DNA synthesis and sequencing drops and the life sciences advance, the literature suggests that synthesizing and weaponizing pathogens may have become within reach for non-state actors, creating a fundamental shift from a Cold War framework focused on the capabilities of state bioweapons programs to one focused on the threat posed by mass-casualty attacks perpetrated by terrorists. Lone insiders in biological laboratories, who have technical training and access to laboratory equipment, are considered a particular threat. Given the scholarship that suggests lone insiders in biological laboratories pose a significant security threat, why have there been no mass-casualty attacks perpetrated by lone insiders using pathogens? This thesis considers the capabilities of potential malicious actors in biological laboratories to weaponize pathogens, and their motivations to perpetrate mass-casualty attacks. Drawing on bibliometric data from synthetic virology papers, I argue that the historical threshold for capability required to weaponize pathogens is prohibitory to those who are not early adopters or innovators in the field of synthetic virology. Furthermore, I show that the malicious acts historically perpetrated by lone insiders are best characterized as biocrimes rather than bioterrorist acts, and transnational groups have not sought to recruit insiders in biological laboratories. By more fully understanding the threat of bioterrorism posed by lone insiders, policymakers and research institutions can work to ensure laboratory safety and security while promoting open science.

Virtual Seminar

Ben Boston and Eva Frankel
Seminars
-

Seminar Recording:   https://youtu.be/FUlEJekANWY

 

About this event: On March 11, the Cyberspace Solarium Commission issued its final report to the U.S. Congress. Tasked by Congress to "develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences," the commission's report identifies over 80 recommendations on U.S. government organization, norms and diplomacy, resilience, private sector collaboration and offensive cyber operations. The Solarium Commission's report is the latest in a growing line of blue-ribbon task force reports aimed at cyber issues, from the Commission on Cybersecurity for the 44th Presidency convened by CSIS in 2008 to the Obama Administration's National Commission on Enhancing National Cybersecurity that issued a final report in December 2016. How does the Solarium Commission's report fit into this landscape? Join Stanford experts for a discussion of the Solarium Commission's report and recommendations, an assessment of the cyber policy landscape, and next steps for American cyber policy.

 

About the speakers: 

Andrew J. Grotto is a William J. Perry International Security Fellow at the Cyber Policy Center and a Research Fellow at the Hoover Institution, both at Stanford University. Grotto’s research interests center on the national security and international economic dimensions of America’s global leadership in information technology innovation, and its growing reliance on this innovation for its economic and social life. He is particularly interested in the allocation of responsibility between the government and the private sector for defending against cyber threats, especially as it pertains to critical infrastructure; cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies; opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world; and governance of global trade in information technologies.

 

Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.  His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in the use of offensive operations in cyberspace as instruments of national policy and in the security dimensions of information warfare and influence operations on national security.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. In 2016, he served on President Obama’s Commission on Enhancing National Cybersecurity. 

 

Jacquelyn Schneider is a Hoover Fellow at the Hoover Institution, a non-resident fellow at the Naval War College, and a senior policy advisor to the Cyberspace Solarium Commission.  Her research focuses on the intersection of technology, national security, and political psychology with a special interest in cybersecurity, unmanned technologies, and Northeast Asia.  Her work has appeared in Security Studies, Journal of Conflict ResolutionStrategic Studies QuarterlyJournal of Cybersecurity, and Journal of Strategic Studies and is featured in Cross Domain Deterrence: Strategy in an Era of Complexity (Oxford University Press, 2019).   In addition to her scholarly publications, she is a frequent contributor to policy outlets,  including The New York Times, Foreign AffairsCFR, Cipher BriefLawfare, War on the RocksWashington PostBulletin of the Atomic ScientistsNational Interest, H-Diplo, and the Center for a New American Security.  She has a BA from Columbia University, MA from Arizona State University, and PhD from George Washington University.

 

Dr. Amy Zegart is a senior fellow at the Freeman Spogli Institute of International Studies (FSI), professor of political science (by courtesy) at Stanford University, and a contributing editor to The Atlantic. She is also the Davies Family Senior Fellow at the Hoover Institution, where she directs the Robert and Marion Oster National Security Affairs Fellows program. From 2013 to 2018, she served as co-director of the Freeman Spogli Institute’s Center for International Security and Cooperation (CISAC) and founder and co-director of the Stanford Cyber Policy Program. She previously served as the chief academic officer of the Hoover Institution.

Virtual Seminar

Andrew Grotto, Herb Lin, Jackie Schneider, and Amy Zegart, moderated by Colin Kahl
Seminars
-

Seminar Recording: https://youtu.be/fPTpcgTKAdg

 

About this Event: Russian decision making, though at times characterized as tactical or perhaps opportunistic, reflects a strategic consensus with a discernible theory of victory. Russian grand strategy reflects more an evolution rather than a revolution in thinking, with continuity prevailing over change. Framed by enduring threat perceptions, the quest for a geopolitical space, and the ever present mismatch between Moscow's desired position in international politics versus its means to attain it. Conversely Russian strategy in conflict reflects considerable adaptation, while still leveraging hard military power, there is a tangible shift towards reasonable sufficiency and emergent strategy over more deliberate approaches.

 

About the Speaker: Michael Kofman serves as Director of the Russia Studies Program at the CNA Corporation and a Fellow at the Kennan Institute, Woodrow Wilson International Center in Washington, D.C. His research focuses on Russia and the former Soviet Union, specializing in the Russian armed forces, Russian military thought, and strategy. Previously he served at the National Defense University as a Program Manager and subject matter expert, advising senior military and government officials on issues in Russia and Eurasia. Mr. Kofman's other affiliations include being a Senior Editor at War on the Rocks, where he regularly authors articles on strategy, the Russian military, Russian decision making, and related foreign policy issues.

Virtual Seminar

Michael Kofman Director Russia Studies Program at the CNA Corporation
Seminars
-

Seminar Recording: https://youtu.be/LqMutLWMTHo

 

About this Event: When Russia seized Crimea in 2014, NATO was forced to reorient itself to its mission to deter and defend in a way that many expected would never happen again after the Cold War.  NATO went about this in an innovative fashion, quickly deploying four battlegroups in the Baltic States and Poland to send the clear message that an attack on one of those Allies would be an attack on all.  Since then, the Alliance has continued to build up its capability to respond quickly and decisively should an attack come.  At the same time, it has underscored the necessity of steady dialogue with Russia, to avoid crisis and maintain the peace by whatever means.

 

About the Speaker: Rose Gottemoeller is the Frank E. and Arthur W. Payne Distinguished Lecturer at the Freeman Spogli Institute for International Studies and Center for Security and Cooperation at Stanford University.

Before joining Stanford Gottemoeller was the Deputy Secretary General of NATO from 2016 to 2019, where she helped to drive forward NATO’s adaptation to new security challenges in Europe and in the fight against terrorism.  Prior to NATO, she served for nearly five years as the Under Secretary for Arms Control and International Security at the U.S. Department of State, advising the Secretary of State on arms control, nonproliferation and political-military affairs. While Assistant Secretary of State for Arms Control, Verification and Compliance in 2009 and 2010, she was the chief U.S. negotiator of the New Strategic Arms Reduction Treaty (New START) with the Russian Federation.

Prior to her government service, she was a senior associate with the Carnegie Endowment for International Peace, with joint appointments to the Nonproliferation and Russia programs. She served as the Director of the Carnegie Moscow Center from 2006 to 2008, and is currently a nonresident fellow in Carnegie's Nuclear Policy Program. She is also a research fellow at the Hoover Institution. 

At Stanford, Gottemoeller will teach and mentor students in the Ford Dorsey Master’s in International Policy program and the CISAC Honors program; contribute to policy research and outreach activities; and convene workshops, seminars and other events relating to her areas of expertise, including nuclear security, Russian relations, the NATO alliance, EU cooperation and non-proliferation.

Virtual Seminar​

Rose Gottemoeller Lecturer Center for Security and Cooperation at Stanford University
Seminars
-

CISAC will be canceling all public events and seminars until at least April 5th due to the ongoing developments associated with COVID-19.

------------------------------------------------------------------------------------------------------------------------------------------------------

 

 

About this Event: The Trump administration's National Security Strategy, released in December 2017, put the economic, military and political challenges posed by peer competitors--Russia and China--at the top of its list of national security concerns.  What was the process that led the Trump administration to this conclusion, particularly regarding Russia, and what policies did the National Security Strategy advocate that the United States accordingly pursue toward Russia?  Our speaker, Nadia Schadlow, served on the National Security Council from 2017 to 2018 and was the principal author of the National Security Strategy.

 

About the Speaker: Dr. Nadia Schadlow has served in leadership positions in government and the private sector for over 25 years. Dr. Schadlow’s U.S. government experience includes senior leadership positions at the National Security Council and the Department of Defense. She was the principal author of the Trump Administration’s National Security Strategy (NSS) which  identified the return of great power rivalry as a central feature of global geopolitics.

Prior to her most recent  government service,  Dr. Schadlow served as a Senior Program Officer at the Smith Richardson Foundation where she invested in  research and policy solutions to improve the security and strategic competitiveness of the United States. Dr. Schadlow has written frequently on national security matters.  Her 2017  book, War and the Art of Governance, addressed the problems of political and economic consolidation during and following war. Dr. Schadlow received a B.A. degree in Government and Soviet Studies from Cornell University, and M.A. and Ph.D. degrees from the John Hopkins School of Advanced International Studies (SAIS).

 

 

Nadia Schadlow Hoover Institution
Seminars
-

CISAC will be canceling all public events and seminars until at least April 5th due to the ongoing developments associated with COVID-19.

------------------------------------------------------------------------------------------------------------------------------------------------------

 

With discussant: Brett McGurk
Payne Distinguished Lecturer at the Center for International Security and Cooperation

 

This event is co-sponsored with the Hamid and Christina Moghadam Program in Iranian Studies

 

About this Event: Kim Ghattas's most recent book Black Wave  tells the story of the rivalry between Saudi Arabia and Iran, a conflict born from the 1979 Iranian revolution. Ghattas, a native of the region, explores the distortion and deployment of religion in a competition that went beyond geopolitics, where each side proceeded to strategically feed intolerance, suppress cultural expression and encourage sectarian violence from Egypt to Pakistan. 


About the Speaker: Kim Ghattas is an Emmy Award-winning journalist and writer who covered the Middle East for twenty years for the BBC and the Financial Times. She has also reported on the U.S State Department and American politics. She has been published in The Atlantic, the Washington Post, and Foreign Policy and is currently a non-resident scholar at the Carnegie Endowment for International Peace in Washington. Her first book, The Secretary, was a New York Times bestseller. Born and raised in Lebanon, she now lives in Beirut and Washington, D.C.

Kim Ghattas Non-resident Scholar Carnegie Endowment for International Peace
Seminars
Subscribe to Seminars