International Relations

FSI researchers strive to understand how countries relate to one another, and what policies are needed to achieve global stability and prosperity. International relations experts focus on the challenging U.S.-Russian relationship, the alliance between the U.S. and Japan and the limitations of America’s counterinsurgency strategy in Afghanistan.

Foreign aid is also examined by scholars trying to understand whether money earmarked for health improvements reaches those who need it most. And FSI’s Walter H. Shorenstein Asia-Pacific Research Center has published on the need for strong South Korean leadership in dealing with its northern neighbor.

FSI researchers also look at the citizens who drive international relations, studying the effects of migration and how borders shape people’s lives. Meanwhile FSI students are very much involved in this area, working with the United Nations in Ethiopia to rethink refugee communities.

Trade is also a key component of international relations, with FSI approaching the topic from a slew of angles and states. The economy of trade is rife for study, with an APARC event on the implications of more open trade policies in Japan, and FSI researchers making sense of who would benefit from a free trade zone between the European Union and the United States.

Authors
News Type
News
Date
Paragraphs

Andrew J. Grotto, a former top National Security Council cybersecurity official in the White House, will join Stanford’s Center for International Security and Cooperation this summer.

Grotto will hold the William J. Perry International Security Fellowship and serve as a research fellow at the Hoover Institution. His appointment is for two years, and he will also be a fellow in the Stanford Cyber Initiative

Cybersecurity focus

Grotto has been involved in virtually every major U.S. cyber policy initiative of the past nine years, from his time on Capitol Hill through his tenure in the Obama Administration as Commerce Secretary Penny Pritzker's senior advisor on technology policy, and to his recent service for two presidents as senior director for cyber policy at the National Security Council. 

Amy Zegart, CISAC's co-director for the social sciences and a senior fellow at the Hoover Institution, said, "Grotto is one of the world's leading cyber policymakers. He brings deep knowledge, penetrating insights, and experience at the highest levels on issues ranging from trade to espionage to cyber warfare. We are delighted to have him join the cyber community at CISAC and Hoover."

In an interview, Grotto said that cyber policy remains underdeveloped as a distinct policy domain. And that has drawn him to CISAC, he noted, “for its commitment to becoming a leading institution supporting the development of this domain.”

Image
image1
Grotto added, “In more established national security domains, such as nonproliferation and counterterrorism, there is a well-developed corpus of scholarly work, historical precedent, and practical experience within the domain that we can draw from to inform, contextualize and evaluate policy decisions. This corpus is still thin with respect to cyber policy making. We don’t have the luxury of waiting decades to create this corpus for cyber – we need to develop it quickly.” 

Grotto first became familiar with CISAC's work during an earlier phase of his career when he focused on U.S. policy towards nuclear weapons - how to prevent their spread, and their role in U.S. national security strategy. CISAC core faculty member Scott Sagan was an early mentor of Grotto’s and first exposed him to CISAC and its scholarly work. Grotto describes the center as a “first-rate research institution at a world class university, with great people. I'm thrilled to be a part of it.”

 

Topics to explore

Cybersecurity policy is a vast field, Grotto said, because virtually every national security challenge facing the country has a cyber dimension to it. 

“I'd be hard pressed to identify a single directorate within the National Security Council that my team and I did not at some point work with on a ‘cyber and…’ problem: cyber and the financial services sector, cyber and the electric grid, cyber and global economic competitiveness, cyber and China, to name a few. So, there's no shortage of cyber-related topics to write on,” he said. 

Several policy problems stand out as foundational for Grotto, and these will be the focus of his research and writing while at CISAC:

• Development of analytic frameworks for defining the dimensions and boundaries of private sector responsibility, especially infrastructure, for defending against cyber threats, versus the government’s responsibility, and using these frameworks to evaluate cybersecurity regulation and identify opportunities and challenges for more effective cybersecurity partnerships between the government and the private sector.

• Cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies.

• Opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world. 

For example, Grotto explained, an adversary physically located in Country X may have cyber infrastructure in Country Y and Country Z, such that an operation against that adversary generates effects in one or more third countries. “How we approach this ‘third country’ issue will have dramatic ramifications for the practical role of offensive cyber operations in U.S. national security strategy,” he noted.

• Governance of global trade in information technologies, especially cybersecurity-related regulation, norms of behavior in cyberspace for governments and private actors, and the appropriateness of applying traditional arms control tools such as export controls to limit the proliferation and use of malicious cyber capabilities.

National Security Council highlights

Grotto said working at the National Security Council was “a privilege of a lifetime. It was the most challenging and intense job I have ever had, and easily the most rewarding.” 

His portfolio spanned a range of cyber policy issues, including defense of critical infrastructure—financial services, energy, communications, transportation, health care, electoral infrastructure, and other vital sectors—cybersecurity risk management policies for federal networks, consumer cybersecurity, and cyber incident response policy and incident management. He also covered technology policy topics with a nexus to cyber policy including encryption, surveillance, privacy, Internet of Things, and the national security dimensions of artificial intelligence and machine learning. 

Grotto said his first job out of graduate school was at a prominent Washington, D.C. think tank. “I viewed it as a waypoint on the path to becoming a law professor, and an academic career focused on international trade law and policy,” he said.

There he was surrounded by people who had served in government, and their “passion for public service was infectious,” he recalled.

He left the think tank to join the Professional Staff of the Senate Select Committee on Intelligence, where he served as then-Chairman Dianne Feinstein’s (D-CA) lead staff overseeing cyber-related activities of the intelligence community and all aspects of NSA’s mission. He also served as committee designee first for Senator Sheldon Whitehouse (D-RI) and later for Senator Kent Conrad (D-ND), advising the senators on oversight of the intelligence community, including of covert action programs, and was a contributing author of the “Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

In 2013, he left the committee to become Commerce Secretary Penny Pritzker’s senior advisor on technology policy, advising Pritzker on all aspects of technology policy, including Internet of Things, net neutrality, privacy, national security reviews of foreign investment in the U.S. technology sector, and international developments affecting the competitiveness of the U.S. technology sector.

While serving on the NSC, Grotto played a key role in shaping President Obama’s Cybersecurity National Action Plan and driving its implementation. He was also the principal architect of the Trump Administration's cybersecurity executive order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”

During his time on Capitol Hill, he led the negotiation and drafting of the information sharing title of the Cybersecurity Act of 2012, which later served as the foundation for the Cybersecurity Information Sharing Act that President Obama signed in 2015.

Grotto received a master’s degree in public administration from Harvard University, a law degree from UC Berkeley, and a bachelor’s degree in philosophy from the University of Kentucky.

MEDIA CONTACT:

Andy Grotto, Center for International Security and Cooperation: grotto@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: 650-725-6488, cbparker@stanford.edu

 

 

Hero Image
gettyimages 646068058
Andrew J. Grotto, a former top National Security Council cybersecurity official, will join Stanford’s Center for International Security and Cooperation this summer.
Getty Images
All News button
1
Authors
Amy Zegart
News Type
News
Date
Paragraphs

CISAC's co-director Amy Zegart wrote this essay, "James Comey's 'Shock and Awe' Testimony," for The Atlantic in its June 8 edition and was also quoted in this Stanford News Service article:

Imagine that two years ago, you sequestered a jury of 12 Americans, kept them in a news-free zone, and brought them today to hear former FBI Director James Comey testify before the Senate Intelligence Committee. Chances are that all of them—no matter what their political beliefs—would be stunned and outraged.

From the perspective of one of these Americans, Comey dropped bombshell after bombshell: The Russians are mucking around in American democratic elections, trying to change how we think, how we act, how we vote—and they will be back. The attorney general cannot be trusted to ensure impartial enforcement of the law. The president fired the FBI director and then lied about why he did it. Yet by the time Comey said these things in an open hearing, all of it was old news. It should have been more shocking than it was, but on some level, Americans were used to it.

Some historical context here is important. Only one FBI Director has ever been fired since J. Edgar Hoover took the job back in 1924: William Sessions, who was sacked by President Bill Clinton in 1993 after the Justice Department's own Office of Professional Responsibility found so many severe ethical lapses, they filled a 161-page report. It included schemes to avoid paying taxes, using government funds to build an expensive home fence that actually reduced the security of the property, using FBI resources for personal purposes, and involving his wife, Alice, in bureau management in “entirely inappropriate” ways. Comey, by contrast, was fired by President Trump for doing his job. Big difference. One was miscarrying justice and abusing power; the other was carrying out justice and speaking truth to power.

Similarly, the only episode in recent history approximating the cloud hanging over the attorney general’s office occurred during the Watergate scandal. That attorney general chose to resign rather than fire White House special prosecutor Archibald Cox and impede an investigation reaching into the White House. This attorney general, by contrast, appears to be implicated in an investigation that reaches into the White House.

Finally, never in American history has a foreign power so deliberately, powerfully, and maliciously tried to distort the cornerstone of American democracy. Comey sent this point home in the hearing, declaring, “There should be no fuzz on this whatsoever. The Russians interfered in our election during the 2016 cycle. They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts. … It is a high confidence judgment of the entire intelligence community. ... It's not a close call.”

Comey’s testimony delivered a “shock and awe” campaign, FBI-style: calm, cautious, and candid, at once stoic and relatable. It was as though Comey were trying to reach through our television sets and shake the body politic into our collective senses.

And yet, his shock and awe testimony may not shock and awe for long. The biggest story of the day is how unlikely this is to remain the biggest story. In all likelihood, after the Twittersphere dies down, partisans will retreat to their respective corners and business as usual will return to Washington.

Why?

Because of something called the “normalization of deviance:” the more frequently exceptional things happen, the less we think of them as exceptional.  Over time, we become desensitized to events that fall far outside the normal range—often with disastrous consequences. The space shuttle Challenger exploded in 1986 despite previous shuttle launches that revealed O-ring seals in the shuttle’s rocket boosters were cracking in cold weather. They shouldn’t have been cracking at all. But NASA “normalized” the poor performance of O-rings as acceptable and okayed the launch, even with record low temperatures forecast for liftoff. Seven astronauts, including Christa McAuliffe, the first teacher in space, were killed.

We experience the normalization of deviance in daily life, too. Ever hear a funny noise in your car? The first time, it seems alarming. After living with it for a few days, however, you think it must not be so serious after all. You tell yourself the car seems to be running just fine. You grow accustomed to the noise. After a while you don’t notice it anymore. And maybe the car really is fine. Or maybe the funny noise is an indication that the car is about to experience a catastrophic breakdown (which is what happened to me one night, when I assumed a strange noise in my car was really nothing, until the car broke down on the freeway, at night, in Los Angeles, “without warning.”)

The Trump era has brought the normalization of deviance to politics. In four short months, this administration’s national-security advisor has had to resign in disgrace for lying about his contacts with Russians and now faces possible criminal charges. The attorney general is so tainted by his own Russian-related activities that he has had to recuse himself from the bureau’s investigation of Russian-related activities. And the FBI director, who by law serves a 10-year term precisely to ensure independence from the president, was fired by the president because he was independent. This is bizarro world. Any one of these events would in normal times be enough to bring down a president. And yet senators today were talking about whether President Trump’s exact words to Jim Comey constituted a hope, a wish, an order, a directive, a threat, or as one senator characterized it, simply a “light touch” approach.

Comey was right about one thing: The Russians “are coming after America.” They may not have to. In this era of normalized deviance, we are defeating ourselves.

Read Amy Zegart's comments and those from other Stanford faculty in this Stanford News Service article.

Hero Image
gettyimages 693800194
Former FBI Director James Comey moves from an open hearing to a closed hearing during a break in testimony before the Senate Intelligence Committee in the Hart Senate Office Building on June 8, 2017 in Washington, DC. CISAC's Amy Zegart says Comey was right about one thing: The Russians “are coming after America.” They may not have to, she added -- in this era of normalized deviance, we are defeating ourselves.
Chip Somodevilla/Getty Images
All News button
1
Authors
News Type
News
Date
Paragraphs

Japan is an increasingly divided country between elites and the public as it grapples with whether it should acquire nuclear weapons itself and not rely on America’s protection, a Stanford scholar found.

Sayuri Romei, a political scientist and predoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), has a new working paper that describes how Japanese society is grappling with its nuclear future. Romei researches the U.S.-Japan relationship, nuclear security, nationalism and identity in East Asia.

“The shift in the Japanese nuclear debate at the turn of the 21st century did not stem directly from a willingness to deter the new and urgent looming military threats, but was rather the result of a very limited security role that collapsed after the end of the Cold War, and took the shape of a disoriented and shaky Japanese identity,” she wrote.

Japan, a country that suffered two nuclear bombs in WWII, has a well-justified historical “nuclear allergy” that long restrained nuclear weapons ambitions, Romei said. But today, internal questions about Japan’s national sense of identity is causing elites to reconsider the nuclear military option.

She said it’s true that the tone in that debate has been changing in recent years as Japan’s security landscape changes – North Korea and China are building up their nuclear and conventional military programs. On top of this, when the Cold War ended in 1991, the “nuclear umbrella” that the U.S. afforded Japan became “theoretically less justified in an evolving security context,” as Romei describes it. Japan, in turn, sought reassurance from the U.S. that it would not abandon her.

Rethinking Japan's security

Yet the turn of the 21st century is hardly the first time that Japanese elites have discussed a nuclear option, or that they have felt a sense of mistrust towards their ally, she said. Rather than a break from the past, Japanese elites’ behavior suggests a continuity in their thinking:

“It would therefore be more correct to talk of a renaissance of the nuclear debate, rather than an erosion of the nuclear taboo,” Romei said.

What is new in today’s nuclear statements, however, is the increasing intertwining between rethinking security identity issues, a rising nationalism, and a more challenging regional environment, she said.

Along with the necessity to rethink Japan’s security arrangement, pre-WWII nostalgia and nationalism have been growing in Japan as Prime Minister Shinzō Abe's constitutional reforms are being enacted, Romei said. And so, some top officials are reevaluating Japan's nuclear policy in favor of a more self-sufficient approach that fits their increasingly nationalist mood.

“The line between the rethinking of a Japanese security identity and pushing a nationalist agenda into the current nuclear policy is very thin,” wrote Romei.

No longer do Japanese nationalists wish to be perceived as the “faithful dog” in the U.S-Japan alliance, as they resent the “lack of a healthy postwar nationalism,” she said. Restarting some of the country’s nuclear power plants after the Fukushima Daiichi accident was even described by one leading Japanese politician as the first step toward the country acquiring nuclear weapons of its own, she added.

Though some Japanese scholars argue that Japan has been preparing for the acquisition of nuclear weapons since the end of WWII, Romei said that the link between the two sides of the nuclear coin was never really visible in Japan: indeed, the government has historically succeeded in making a sharp distinction between nuclear power for peaceful vs. military purposes.

‘Still very sensitive’

One well-known trait of Japan’s nuclear history is that Japan has a strong popular peace and anti-nuclear movement with public opinion polls set against acquiring nuclear weapons, Romei said. Peace, security, and nuclear matters are in fact deeply linked in postwar Japanese history.

“The constant and consistent work of peace associations and the massive organized demonstrations against Prime Minister Abe’s security reform plans that took place across Japan during the entire summer in 2015 are a relevant sign that public opinion is still very sensitive to a change of pace,” she wrote.

But public opinion and elite opinion “do not speak the same language and are heading in different directions,” she wrote. Elites – political  and  thought leaders, for example – continue to allude to a nuclear option for Japan to defend itself unilaterally, with or without the American nuclear umbrella.

“This sudden proliferation of nuclear statements among Japanese elites  in 2002 has been directly linked by Japan watchers to the break out of the second North Korean nuclear crisis and the rapid buildup of China’s military capabilities,” Romei said.

Trusting America?

But those external threats, she said, are actually used as a “pretext to solve a more deep-rooted and long-standing anxiety that stems from Japan’s own unsuccessful quest for a less reactive, and more proactive post-Cold War identity,” Romei noted.

The level of trust that Japanese elites feel towards their American ally is an important leitmotiv in the country’s nuclear debate, she said.

While during the Cold War U.S. credibility was mainly linked to Japan’s limited role as an ally in a bipolar era, after the collapse of this system Japanese elites slowly began their quest for a new identity, thus questioning and changing the meaning of the U.S.-Japan alliance, Roemi said. Furthermore, the first decade of the 21st century brought about a new nationalist layer that complicates the issue of trust in the ally by adding a populist tone to the domestic nuclear debate.

Romei believes that if the gap in elite-public opinion continues to widen, Japan’s longstanding “nuclear allergy” could be overwhelmed as the government – not necessarily by design – gradually creates the political and cultural conditions that seemingly justify building nuclear weapons, Romei said.

“The turn of the century brought a new strategic environment in which Japan was forced to question its own post-Cold War identity, without eventually succeeding in an actual change,” she wrote.

Romei urges a careful monitoring of Japan’s nuclear debate moving forward – the major political shift in the U.S. caused by the November 2016 presidential elections is a key reason. America’s future political direction will ultimately affect Japan’s sense of identity by easing the questioning of the U.S.-Japan security arrangement.

While the study of the Japanese nuclear debate cannot necessarily offer a prediction of the country’s future nuclear policy choices, it can serve as an important tool to gauge the evolution of Japan’s own perception of its role in the current world order, she said.

Romei is a nuclear security predoctoral fellow at CISAC for 2016-2017 and a doctoral candidate in international relations at Roma Tre University in Rome, Italy. Her dissertation focuses on the relationship between Japan’s nuclear mentality and its identity evolution in the post-WWII era. 

MEDIA CONTACTS:

Sayuri Romei, Center for International Security and Cooperation: (650) 725-5364, sromei@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 

 

Hero Image
gettyimages 670651328
The Hiroshima Peace Memorial, often called the Atomic Bomb Dome, is part of the Hiroshima Peace Memorial Park in Hiroshima. CISAC fellow Sayuri Romei's research explains how nationalism and post-war identity are key factors in Japan's evolving public debate on nuclear weapons.
Getty Images/Nigel Killeen
All News button
1
Authors
Amy Zegart
News Type
News
Date
Paragraphs

(Amy Zegart, co-director of the Center for International Security and Cooperation, wrote the following essay for The Atlantic.)

Today The Washington Post dropped the bombshell that President Trump had revealed classified information about the Islamic State to Russian Foreign Minister Sergei Lavrov and Russian ambassador Sergey Kislyak when the three of them met at the White House last week. You know a story is big when it gets as many concurrent visitors as the story about the infamous Access Hollywood video. There was no hiding near bushes in the dark this time to walk back the damage. Deputy National-Security Advisor Dina Powell declared the story “false,” and the administration also called out the big guns, with Secretary of State Rex Tillerson and National Security Advisor H.R. McMaster dutifully rushing into the breach to discuss the breach, using oh-so-carefully worded statements about how the president did not reveal “sources or methods” or any “military operations” that were not already known publicly.

So just how bad is the damage? On a scale of 1 to 10—and I’m just ball parking here—it’s about a billion. The story, which has since been confirmed by The Wall Street Journal, The New York Times, Reuters, Buzzfeed, and CNN, notes that the president could have jeopardized a critical source of intelligence on the Islamic State. Not America’s source. Somebody else’s. Presumably from an allied intelligence service who now knows that the American president cannot be trusted with sensitive information.

The type of information Trump cavalierly shared fell under a classification known as “code word,” according to the Post. There are three basic levels of classified information. Confidential information is defined as anything that could reasonably be expected to “cause damage” to American national security if shared without authorization. Secret information is one step up, considered to have the potential to cause “serious damage” if revealed. Top Secret information is a higher classification level still, comprising anything that could reasonably be expected to cause “exceptionally grave damage” to U.S. national security if revealed.

Code word is beyond Top Secret. It limits access to classified information to a much narrower pool of people to provide an extra layer of security. Many secrets are super-secrets—Harry Truman, as vice president, didn’t know about the Manhattan project. He learned of it only after Franklin Delano Roosevelt died and Truman was sworn in as president. Code word classification is so far off the scale, even fake spies rarely refer to it in the movies. Technically, the president can "declassify" anything he wants, so he did not violate any laws. But as Lawfare notes, if the president tweeted out the nuclear codes, he also wouldn't violate the law—but he would rightly be considered unfit for office.

Did Trump reveal intelligence crown jewels or just boast about the fact that he liked diamonds? According to the Post he revealed information about a purported ISIS plot involving laptops. It’s likely, however, that Tillerson, McMaster, the Postand the Times are ALL correct: The president did not reveal sources or methods or military operations. But that doesn’t matter much if he gave away information that will enable the Russians to identify the source or the methods. It looks like he did, since according to the Post’s account he talked about the content of a specific plot, the potential harm, and the location of the city in the Islamic State’s territory where the allied state’s intelligence service detected it. It was almost everything except the GPS coordinates. The denials by Tillerson and McMaster are a classic case of intelligence super-parsing—saying things that are technically and narrowly true but may not be accurate at all. No spin can hide the fact that the breach was deadly serious and reckless in the extreme.

Then there’s the impact on America’s unnamed ally, whom the Post reported was already nervous about sharing such sensitive intelligence with the United States. It is difficult to penetrate the Islamic State, and there is a major risk that this breach will close down a vital source. It’s an even bigger deal in the big picture, potentially jeopardizing intelligence cooperation with other U.S. allies around the world. Trump already raised intelligence eyebrows when he turned his Mar-a-Lago dining area into an impromptu Situation Room after the North Koreans decided to launch a ballistic missile. The president and his aides used the lights on cell phones to illuminate field reports, in full view of resort dinner guests snapping photos. If you’re known as someone who cannot keep a secret, the world’s secret-keepers are not going to tell you much.

“Can you believe the world we live in today?” President Trump said, according to one official in the two Sergeis meeting. “Isn’t it crazy?”

Yes, Mr. President. It’s crazy.

Hero Image
gettyimages 95466434 Getty Images/Tetra Images
All News button
1

Encina Hall
616 Jane Stanford Way
Stanford, CA 94305-6055

(650) 721-5345 (650) 724-2996
0
eileen_head_shot_2024.jpeg

Eileen Donahoe is the co-founder and an affiliated scholar at the Global Digital Policy Incubator (GDPI) at Stanford University's Center on Democracy, Development and the Rule of Law. (Previously, she served as GDPI’s executive director.) GDPI is a global multi-stakeholder collaboration hub for the development of policies that reinforce human rights and democratic values in a digitized society. Current research priorities include: international trends in AI governance, technical methods for aligning AI with democratic norms and standards, evolution of digital authoritarian policies and practices, and emerging blockchain and AI-enabled tools to support democracy.

Eileen served in the Biden administration as US Special Envoy for Digital Freedom at the Department of State. She also served in the Obama administration as the first US Ambassador to the UN Human Rights Council in Geneva during a period of significant institutional reform and innovation. After the Obama administration, she joined Human Rights Watch as Director of Global Affairs, where she represented the organization worldwide on human rights foreign policy, with special emphasis on digital rights, cybersecurity, and internet governance. Earlier in her career, she was a technology litigator at Fenwick & West in Silicon Valley.

Eileen serves as Vice Chair of the National Endowment for Democracy Board of Directors; on the Carnegie Endowment for International Peace Board of Directors; and on the Dartmouth College Board of Trustees. She is a member of the Global Network Initiative (GNI), the World Economic Forum AI Governance Alliance, and the Resilient Governance and Regulation working group. Previously, she served on the Transatlantic Commission on Election Integrity, the University of Essex Advisory Board on Human Rights, Big Data and Technology, the NDI Designing for Democracy Advisory Board, and the Freedom Online Coalition Advisory Network. Degrees: BA, Dartmouth; J.D., Stanford Law School; MA East Asian Studies, Stanford; M.T.S., Harvard; and Ph.D., Ethics & Social Theory, GTU Cooperative Program with UC Berkeley. She is a member of the Council on Foreign Relations.

CDDRL Affiliated Scholar
Date Label
-

- This event is jointly sponsored by the Center for International Security and Cooperation and the Walter H. Shorenstein Asia-Pacific Research Center -

As tensions rise between the U.S. and North Korea, a panel of Stanford experts will convene in Encina Hall on Tuesday, May 30 to assess the issues involved. Panelists will include:

  • Kathleen Stephens, former U.S. ambassador to the Republic of Korea, William J. Perry Fellow in the Korea Program at the Walter H. Shorenstein Asia-Pacific Research Center (APARC). She will talk about the South Korean leadership’s thinking and position on North Korea in the context of its U.S. relationship.
  • James Person, director of the Hyundai Motor-Korea Foundation, Center for Korean History and Public Policy. He offers a perspective on the North Korean leadership in the current crisis, including a broader historical context, as well as thoughts on the China-North Korea relationship.
  • Katharina Zellweger, visiting scholar at the Center for International Security and Cooperation. She will discuss the impact of the current crisis on the North Korean people., and how sanctions and changes in Chinese trade are affecting them.
  • Gi-Wook Shin, director of the Shorenstein Asia-Pacific Research Center, director of the Korea Program, senior Fellow at the Freeman Spogli Institute for International Studies (FSI) and professor of sociology, will moderate the session.
Kathleen Stephens APARC
James Person Wilson Center
CISAC
Gi-Wook Shin APARC, Korea Program
Panel Discussions
Authors
News Type
News
Date
Paragraphs

This is the eighth and last in a series of interviews by the Korea Times on North Korea. CISAC's Siegfried Hecker is featured in this story below by Kim Jae-kyoung:

 

NK estimated to have ability to produce 7 nuclear bombs a year

By Kim Jae-kyoung

A world-renowned nuclear scientist said that U.S. President Donald Trump must to talk to North Korean leader Kim Jong-un by sending an envoy to Pyongyang to avoid a nuclear catastrophe.

"I believe the first talks should be bilateral and informal by a presidential envoy talking directly to Kim Jong-un," said Siegfried S. Hecker, a senior fellow at the Center for International Security and Cooperation (CISAC) at Stanford University, in an interview.

"I believe both Seoul and Beijing would support such talks. These talks may then also help to build the foundation for renewed multilateral negotiations, which, first and foremost must involve South Korea, as well as China," he added.

Hecker, the co-director of CISAC from 2007 to 2012, has visited North Korea several times to assess the plutonium program at the Yongbyon Nuclear Scientific Research Center since 2004.

He stressed that it is most important to convey the message that nuclear weapons cannot be used under any circumstances.

"There is no such thing as a limited nuclear war. Any explosion of a nuclear device on the Korean Peninsula is a catastrophe of indescribable proportions," he said.

The internationally recognized expert in plutonium science, global threat reduction and nuclear security said that the Trump administration and the new South Korean government face the challenge of avoiding a nuclear detonation on the Korean Peninsula.

He believes that such an incident could result from a miscalculation or overconfidence by the Kim Jong-un regime as well as an accident with the nuclear weapons in the North.

"A conventional confrontation may turn nuclear with an inexperienced leader in charge," he said. "Or, in the case of instability in the North, who will control the nuclear weapons? These are serious concerns that must be addressed now," he added.

Hecker, who served as the director of the Los Alamos weapons laboratory in New Mexico, the birthplace of the atomic bomb, from 1986 to 1997, estimated that North Korea, although he is uncertain, may have sufficient material for 20 to 25 nuclear weapons.

NK's nuclear capabilities evolving 

He explained that the size of its nuclear arsenal depends primarily on how much plutonium and highly enriched uranium North Korea has produced.

"The sophistication of the arsenal depends primarily on nuclear testing. With five nuclear tests conducted over 10 years, North Korea is likely able to produce nuclear devices small enough to fit on missiles that can reach all of South Korea and Japan," he said.

He also estimated that the totalitarian country can produce sufficient plutonium and highly enriched uranium for six to seven bombs per year.

"However, all estimates are uncertain because we know little about the North's capacity to produce highly enriched uranium since it is not possible to monitor such facilities from afar," he said.

In his view, the world does not have to accept the reclusive country as a "nuclear weapons state," but it must be treated as a country with a nuclear arsenal.

"Whether we like it or not, North Korea is a country with nuclear weapons," he said. "The final aim is to have a denuclearized Korean Peninsula, but that will take time. It will have to be done in sequence of halt, roll back and then eliminate."

However, Hecker dismissed North Korea's claim that it has the capability to fire an intercontinental ballistic missile (ICBM) all the way to the U.S. mainland.

"I do not believe North Korea is capable of reaching the U.S. mainland with a nuclear-tipped missile today. It is working on developing such a capability, but it will likely take another five years or so," he said.

Hecker explained that it has not demonstrated all the aspects of necessary rocket technology or the ability to make a nuclear warhead small enough to be able to survive atmospheric reentry.

"Besides, to actually launch a nuclear warhead on an ICBM you must have complete confidence that it will not blow up on the launch pad," he added. "They cannot have such confidence based on their missile launch history."

Hero Image
gettyimages 503569580
In 2016, South Korean officials check seismic waves from North Korea to confirm a hydrogen bomb test in that country the prior year.
Getty Images
All News button
1
Authors
News Type
News
Date
Paragraphs

While the United States has no peers in conventional military power, it is especially vulnerable – as a free and democratic society – to cyber misinformation campaigns, a Stanford scholar says.

Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation (CISAC), is the co-author of a new draft working paper that spells out the perilous risks facing democratic, wired-up countries around the world.

America’s adversaries are seeking “asymmetric” methods for social disruption, rather than direct military conflict, Lin said.

“Cyber warfare is one asymmetric counter to Western (and especially U.S.) military advantages that depend on the use of cyberspace,” wrote Lin and his co-author Jackie Kerr, a research fellow at the Lawrence Livermore National Laboratory.

This new type of cyber aggression is aimed at winning – and confusing – hearts and minds, the very control centers of human existence, Lin said.

As a result, “information/influence warfare and manipulation,” or IIWAM as Lin describes it, poses profound implications for Western democracies, even though much of it may not be illegal under international law. This approach is based on the deliberate use of information by one party on an adversary to confuse, mislead, and ultimately to influence the choices and decisions that the adversary makes.

A recent example in point would be the 2016 Russian hacking of the U.S. presidential election and the surge of so-called “fake news.”

Lin points out that while misinformation campaigns are not new, the technology to spread it far and wide globally is. He noted that the patron saint of distorting reality for war-like purposes is Sun Tzu, who wrote that, “The supreme art of war is to subdue the enemy without fighting.”

While traditional cyber attacks typically hit hard targets like computer systems, cyber “influence” campaigns are conducted over longer periods of time and rely on soft power – propaganda, persuasion, culture, social forces, confusion and deception, Lin said. 

Words and images

How does it work? Lin explains:

“Victory is achieved by A when A succeeds changing B’s political goals so that they are aligned with those of A.  But such alignment is not the result of B’s 'capitulation' or B’s loss of the ability to resist – on the contrary, B (the losing side) is openly willing.”  That is, such victory shares the focus on subverting the opponent’s will, though not on destroying his military forces.

The ammunition in these cyberspace battles are “words and images,” the kind that persuade, inform, mislead, and deceive so that the adversary cannot respond militarily. In the example of a “fake news” story, they often take place below legal thresholds of “use of force” or “armed attack,” and at least in an international legal sense, do not trigger a military response.

The target is the “adversary’s perceptions,” which reside in the “cognitive dimension of the information environment.” In other words, such cyber warfare focuses on “damaging knowledge, truth, and confidence, rather than physical or digital artifacts,” according to Lin. It is the “brain-space.”

Additionally, IIWAM injects fear, anger, anxiety, uncertainty, and doubt into the adversary’s decision making processes, he added.  Success is defined as altering such perceptions so the target makes choices favoring the aggressor.

“Sowing chaos and confusion is thus essentially operational preparation of the information battlefield – shaping actions that make the information environment more favorable for actual operations should they become necessary,” the researchers wrote.

These cyber manipulations often prey upon cognitive and emotional biases present in the psychological and mental makeup of human beings, Lin said. 

For example, media channels such as Fox News play to “confirmation bias” for individuals with a right-of-center orientation, and similarly for MSNBC for those with a left-of-center, orientation, he wrote. Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories.

Countering misinformation

“Naming and shaming” is probably ineffective against many nation states conducting cyber disinformation campaigns, Lin said. And the idea that a government like the U.S. can quickly respond to misinformation created in the private sphere is unlikely to be effective as well.

What, then, might work? Lin suggests new tactics are needed, as no existing approach seems adequate. For example, Facebook is deploying a new protocol for its users to flag questionable news sites.  Google has banned fake news web sites from using its online advertising service. Twitter, YouTube, and Facebook shut down accounts that they determine are promoting terrorist content.  He noted that a recent Facebook letter from CEO Mark Zuckerberg states that, “Our approach will focus less on banning misinformation and more on surfacing additional perspectives and information, including that fact checkers dispute an item's accuracy.”

But such measures are unlikely to stem the “rising tide of misinformation conveyed” through cyber warfare, Lin said, because they mostly require users to do additional mental work.  

Wired world riskier

Today’s Internet-driven Western world offers countless opportunities for cyber influence mischief, Lin wrote.

“Democracy has rested on an underlying foundation of an enlightened, informed populace engaging in rational debate and argument to sort out truth from fiction and half-truth in an attempt to produce the best possible policy and political outcomes,” Lin wrote.

Cyber manipulators have exploited an arguable gap between ideals and reality in democratic systems – “rendered it much more questionable” – through the tremendous reach and speed of misinformation, he said. Many countries cannot deal with the onslaught of such focused efforts. This serves to make the democratic process look weak and unstable in the eyes of its citizens. The same dynamic does not apply equally around the world.

“Cyber weapons pose a greater threat to nations that are more advanced users of information technology than to less-developed nations,” Lin wrote.

He said that less developed or authoritarian countries do not have much Internet infrastructure or that wield control over expression – North Korea is an example.

MEDIA CONTACTS

Herbert Lin, Center for International Security and Cooperation: (650) 497-8600, herbert.s.lin@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-0224, cbparker@stanford.edu

 

 

 

Hero Image
gettyimages 597931354
Stanford cybersecurity expert Herb Lin says a new brand of cyber warfare aims to destabilize Western democracies through misinformation and even changing the way people think about reality.
Getty Images/Vertigo3d
All News button
1
Authors
Anna Péczeli
News Type
News
Date
Paragraphs

Anna Péczeli, a Stanton Nuclear Security Fellow at CISAC, wrote the following op-ed for the Bulletin of the Atomic Scientists:

What does the future hold for the US nuclear posture under President Trump? The last Nuclear Posture Review occurred in April 2009, when a 12-month review process was conducted to translate President Obama’s vision into a comprehensive nuclear strategy for the next five to 10 years. The review addressed several major areas: the role of nuclear forces, policy requirements, and objectives to maintain a safe, reliable, and credible deterrence posture; the relationship between deterrence policy, targeting strategy, and arms control objectives; the role of missile defense and conventional forces in determining the role and size of the nuclear arsenal; the size and composition of delivery capabilities; the nuclear weapons complex; and finally the necessary number of active and inactive nuclear weapons stockpiles to meet the requirements of national and military strategies.

Clearly, changes are afoot. On January 27, 2017, President Trump issued a presidential memorandum that mandated “a new Nuclear Posture Review to ensure that the United States nuclear deterrent is modern, robust, flexible, resilient, ready, and appropriately tailored to deter 21st-century threats and reassure our allies.” 

Looking ahead, the new administration should conduct this review through a broad, inter-agency process, involving the State and Energy departments, and allies as well. This approach offers several valuable benefits by broadening the focus from deterrence to non-proliferation, reassurance, and nuclear security.

The main role of the Nuclear Posture Review, or NPR, is to assess the threat environment, outline nuclear deterrence policy and strategy for the next 5 to 10 years, and align the country’s nuclear forces accordingly. Since the end of the Cold War, each administration has conducted its own NPR, but the process and the scope of the reviews were different in all three cases. 

The first NPR was conducted by the Clinton administration in 1994, and even though important senior positions have still not been appointed by the Trump White House, Trump's mandate suggests that their review might use it as a template for 2017. It was a bottom-up review, initiated by the Department of Defense, mostly focusing on a set of force structure decisions—such as the right size and composition of US nuclear forces, including the size of the reserve or so-called “ hedge” force. That review lasted for 10 months, and the Pentagon was in charge of the entire process, mainly focusing on deterrence requirements. 

In contrast, the 2001 NPR of the Bush administration was mandated by Congress, and it addressed a broader set of issues, including all components of the deterrence mix—nuclear and non-nuclear offensive strike systems, active and passive defenses, and the defense infrastructure. The Defense Department took the lead in this case just as before, but this time the Energy Department and the White House were also engaged in the process. As a result, the Bush NPR’s force structure requirements—how to size and sustain the country’s forces—were driven by four factors: assuring allies, deterring aggressors, dissuading competitors, and defeating enemies. 

The Obama administration’s 2010 NPR was also mandated by Congress, but the Defense Department was specifically tasked to conduct an inter-agency review. Besides the unprecedented level of such cooperation, a bipartisan Congressional commission also laid out a number of recommendations for the review process, many of which became part of the final text of the Obama review. Officials from State, Energy, and the Joint Chiefs of Staff were involved, as well as US allies who were regularly briefed during the different stages of the review. 

In the final phase of the 2010 NPR, the White House leadership made the decisions on the actual content of the nuclear posture. While the Clinton and the Bush reviews were largely conducted behind the scenes and only short briefing materials were published on the outcome, the Obama administration released an unprecedentedly long report on its nuclear posture review. 

These cases offer two models for a review process: It can be conducted by a small group of people in the most highly classified manner, or it can be a larger, relatively transparent inter-agency process. In the former approach, the final decisions are typically presented to the secretary of defense, the president, Congress, and allies. The problem is that this tends to be a one-sided approach, putting the main focus on deterrence and modernizations. 

Though it is effective and fast, the implementation of a Nuclear Posture Review requires all stakeholders to be on board with the new strategy. One of the most painful lessons of the Bush review was that because the White House and Defense failed to explain their new approach to the public, the military, and Congress, there was effectively a loss of leadership—which made procurement extremely difficult and caused major problems in the implementation of their strategy. 

On the other hand, involving all stakeholders and providing a balanced approach to nuclear strategy would support the goals of not just deterrence, but those of reassurance, non-proliferation, and nuclear security as well. Due to the involvement of the State Department, the 2010 NPR, for example, emphasized a number of policies which supported non-proliferation objectives and strengthened US negotiating positions at global arms control forums. One of these policies was the “negative security assurance,” which stated that the United States would not use or threaten to use nuclear weapons against non-nuclear weapon states that are party to the NPT and in compliance with their nuclear nonproliferation obligations. 

The other policy that was advocated by senior State Department officials was the so called sole-purpose posture—which means that nuclear weapons only serve to deter or respond to a nuclear attack, and they no longer play a role in non-nuclear scenarios. Although the sole purpose posture was eventually dropped and it was set only as a long-term objective, the Obama administration still reduced the role of nuclear weapons with the new negative security assurance, and it signaled its intent to continue this process with the promise of sole purpose. These steps supported US leadership at the 2010 Nuclear Non-Proliferation Treaty Review Conference and they contributed to the adoption of a consensual final document at the conference. 

This broader scope strengthens inter-agency cooperation, and ensures that all the departments that are affected by the NPR are on board with the strategy, which eases the implementation of the decisions. Besides, it also strengthens alliance relations by regular consultations. The Trump administration’s mandate did not include a specific timeline or format; consequently it will be mainly the responsibility of Defense Secretary James Mattis to decide on the framework. Though the presidential memorandum did not require an inter-agency process, it would be wise to conduct one.

Compared to 2010, the security environment has dramatically deteriorated: renewed tensions between NATO and Russia since the annexation of Crimea, China’s building of military bases in what had previously been international waters, significant military modernization efforts by both these states, and North Korea’s increasingly bellicose nuclear threats. All of these developments have created a serious deterrence and security challenge for the United States and its allies. Only a broader approach can address all relevant threats and create the necessary internal consensus for the funding and creation of a modern, robust, flexible, resilient, ready, and appropriately tailored nuclear arsenal.

Hero Image
gettyimages 632782096
CISAC fellow Anna Péczeli suggests that the Trump Administration conduct a broad Nuclear Posture Review that includes the State Department, which in the last such review in 2009 emphasized a number of policies that supported non-proliferation objectives and strengthened U.S. negotiating positions at global arms control forums.
Getty Images/Win McNamee
All News button
1
Paragraphs

CISAC's Herbet Lin and Jackie Kerr from the Lawrence Livermore National Laboratory write in this draft working paper that the United States has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods in cyberspace for engaging in conflict -- and  free and democratic societies are especially vulernable.   Development of new tactics and responses is therefore needed.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Center for International Security and Cooperation (CISAC)
Subscribe to International Relations