Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

-

Co-sponsored by the Center for Russian, East European & Eurasian Studies (CREEES), the Center for International Security and Cooperation (CISAC), The Europe Center and the German Studies department

About the topic:  This talk presents an unconventional look at the creation of a deadly barrier between East and West Germany.  It reveals how the Iron Curtain was not simply imposed by communism, but had been emerging haphazardly in both East and West long before the construction of the Berlin Wall in 1961.  From the end of the Third Reich, ad hoc enforcement of the tenuous border between the two Germanys led to the creation of difference where there was no difference, institutionalization of violence among neighbors, popular participation in a system that was deeply unpopular--and people normalizing a monstrosity in their midst.

About the Speaker: Edith Sheffer is assistant professor of Modern European History at Stanford. Edith Sheffer came to Stanford as an Andrew W. Mellon Fellow in the Humanities in 2008 and joined the History Department faculty in 2010.  She recently completed Burned Bridge: How East and West Germans Made the Iron Curtain, and was the winner of the 2011 Fraenkel Prize, awarded by the Wiener Library Institute of Contemporary History, London. 

Her future research will also examine the intersection of public events and private choices, from Germans’ “zero Hour” diaries in 1945 to the development and dissemination of corporate cultures.  Research and teaching interests span modern Europe and Germany, especially the social and cultural history of the twentieth century.

CISAC Conference Room

Edith Sheffer Assistant Professor of Modern European History, The Europe Center Research Affiliate Speaker
Seminars
Paragraphs

OVER the last three years, as I delved into the world of American nuclear weapons, I felt increasingly as though I had stepped into a time warp. Despite the nearly total rearrangement of the international security landscape since the demise of the Soviet Union in 1991, the rise of Islamic terrorism and the spread of nuclear materials and technology to volatile nations like Pakistan, North Korea and Iran, the Defense Department remains enthralled by cold war nuclear strategies and practices.

Barack Obama took office determined to change that. He has made progress on many fronts. Last week, he outlined a new, no-frills defense strategy, downsizing conventional forces. He now needs to double down on his commitment to refashion nuclear forces. He should trim the American nuclear arsenal by two-thirds to bring it down to a sensible size, order the Pentagon to scale back nuclear war-fighting plans so they are relevant to contemporary threats, remove most American intercontinental, land-based missiles from high alert and drop the quaint notion that a fleet of aging B-52 bombers can effectively deliver nuclear weapons to distant targets.

This agenda is not only desirable, it is doable without undercutting American security. It would save tens of billions of dollars a year, a relatively small amount by Pentagon standards, but every billion counts as Leon E. Panetta, the defense secretary, trims his budget. And the steps can safely be taken without requiring reciprocal moves by Russia that must be codified in a treaty.

For the last few months, the Obama administration has been conducting a classified review of the doctrines and operations that determine the shape and potential uses of America’s nuclear armaments. If the president pushes back against the defenders of the old order at the Pentagon and other redoubts of the nuclear priesthood, he can preserve American security while making the United States a more credible leader on one of today’s most critical issues — containing the spread of nuclear weapons. Like a chain smoker asking others to give up cigarettes, the United States, with its bloated arsenal, sounds hypocritical when it puts pressure on other nations to cut weapons and stop producing bomb-grade highly enriched uranium, the key ingredient of a crude nuclear weapon.

American actions alone won’t end the proliferation danger, but American leadership is essential to any hope of containing the threat.

Sam Nunn, the former chairman of the Senate Armed Services Committee, and anything but a dove over the years, rightly warns that the spread of weapons and the means to make them may soon reach a combustible stage where New York, Washington, Moscow, Tokyo or London is at risk of a nuclear terrorist attack.

Mr. Nunn and other keepers of America’s cold-war armory, George P. Shultz and Henry A. Kissinger, former Republican secretaries of state, and William J. Perry, a former Democratic defense secretary, have banded together in recent years to press, among other things, for cutting nuclear forces, de-alerting missiles and, ultimately, eliminating nuclear arms. Mr. Obama has embraced their aims and welcomed them to the Oval Office. Their high-powered, bipartisan alliance, if adroitly employed by the White House, ought to provide some political cover as Mr. Obama reshapes nuclear policy while running for a second term.

There is no national security rationale for maintaining an arsenal of some 5,000 warheads, with nearly 2,000 arms ready to use on short notice and the rest in reserve. We don’t need thousands of warheads, or even hundreds, to counter threats from countries like Iran or North Korea.

The only conceivable use of so many weapons would be a full-scale nuclear war with Russia, which has more warheads than the United States. But two decades after the collapse of the Soviet Union, even Vladimir V. Putin, with his authoritarian bent, is not about to put Russia on a collision course with the United States that leads to nuclear war. China, equally unlikely to escalate tensions to the nuclear brink, probably has fewer than 400 warheads and a policy to use them only in self-defense. Pakistan has roughly 100, North Korea fewer than 10 and Iran, so far, zero.

The United States could live quite securely with fewer than 1,500 warheads, half in reserve. Defenders of the nuclear faith claim we need 5,000 weapons as a hedge against warheads that may become defective over time. But an elaborate Energy Department program to maintain and refurbish warheads, the Stockpile Stewardship Program, has proved highly effective.

Another oft-cited reason for increasing our arsenal is that the Pentagon’s nuclear war-fighting plans still call for striking hundreds of targets in Russia and China, as well as dozens of sites in a number of other publicly unidentified nations — presumably Iran, North Korea and Syria — considered potentially hostile to the United States and eager to possess unconventional weapons.

Washington’s current nuclear war plans remain far too outsize to deal with any plausible attack on America. Mr. Obama could remove some nations from the hit list, starting with China, and tell his generals to limit the number of targets in the countries that remain.

The oversize American nuclear arsenal features an equally outdated reliance on long-distance bombers. The days when lumbering B-52 bombers could play a central role in delivering nuclear weapons — memorably spoofed in Stanley Kubrick’s “Dr. Strangelove” — ended decades ago. Mr. Obama should ground the bombers and depend on land- and sea-based missiles.

The high-alert status of America’s intercontinental ballistic missiles is another anachronism. There are few circumstances that might require the United States to quickly launch nuclear-tipped missiles, and missiles on high alert are an invitation to an accident, or impulsive action. In the first year of his presidency, Mr. Obama outlined an ambitious nuclear weapons agenda. Absent new action, Washington will remain frozen in a costly cold war posture.

Philip Taubman is a former New York Times bureau chief in Moscow and Washington and the author of “The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb.”

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
New York Times
Authors
Philip Taubman
-

Zittrain will discuss the false starts in understanding the simultaneously underappreciated and overhyped fields of cybersecurity and cyberwarfare, and offer a view on where the deepest problems lie -- and how to address them.


About the speaker: Jonathan Zittrain is a Professor of Law at Harvard Law School and the Kennedy School of Government, Professor of Computer Science at Harvard’s School of Engineering and Applied Sciences, and a co-founder of the Berkman Center for Internet & Society at Harvard University. Previously, he was Professor of Internet Governance and Regulation at Oxford University and a principal of the Oxford Internet Institute. He was also a visiting professor at the New York University School of Law and Stanford Law School.

Zittrain’s research interests include battles for control of digital property and content, cryptography, electronic privacy, the roles of intermediaries within Internet architecture, and the useful and unobtrusive deployment of technology in education. He was co-counsel with Lawrence Lessig in Eldred v. Ashcroft, challenging the Sonny Bono Copyright Term Extension Act of 1998. The case lost 7-2 at the Supreme Court.

He also performed the first large-scale tests of Internet filtering in China and Saudi Arabia in 2002, and as part of the OpenNet Initiative, he has co-edited studies of Internet filtering by national governments, Access Denied: The Practice and Policy of Global Internet Filtering and Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. His brainchild Herdict – a website that collects and tracks self-reported inaccessible sites from around the world- was launched in February, 2009. His book about the future of the now-intertwined Internet and PC, “The Future of the Internet — And How to Stop It,” came out in April 2008 from Yale University Press and Penguin UK — and under a Creative Commons license.

Zittrain holds a bachelor’s degree in cognitive science and artificial intelligence from Yale University, a J.D. from Harvard Law School, and a master’s in public administration from Harvard’s John F. Kennedy School of Government. He is a member of the Board of Trustees of the Internet Society, the Board of Directors of the Electronic Frontier Foundation, and a faculty fellow and Young Global Leader of the World Economic Forum, where he also chairs the Global Agenda Council on the Future of the Internet.

Reuben W. Hills Conference Room

Jonathan Zittrain Professor of Law at Harvard Law School and Professor of Computer Science at the Harvard School of Engineering and Applied Sciences Speaker
Seminars
-

Reuben W. Hills Conference Room

Samuel J. Rascoff Associate Professor of Law, New York University School of Law Speaker
Mariano-Florentino Cuéllar Professor and Deane F. Johnson Faculty Scholar at Stanford Law School; CDDRL Affiliated Faculty; FSI Senior Fellow; FSE Affiliated Faculty and Co-Director of CISAC Commentator
Seminars
-

Aziz Huq earned his BA summa cum laude in International Studies and French from the University of North Carolina at Chapel Hill in 1996 and his law degree from Columbia Law School in 2001, where he was awarded the John Ordronaux Prize. He clerked for Judge Robert D. Sack of the U.S. Court of Appeals for the Second Circuit (2001–02) and Justice Ruth Bader Ginsburg of the Supreme Court of the United States (2003–04). After clerking he worked as Associate Counsel and then Director of the Liberty and National Security Project of the Brennan Center for Justice at NYU School of Law. He has also been a Senior Consultant Analyst for the International Crisis Group.

His research and teaching interests include constitutional law, national security and counterterrorism, federal jurisdiction, legislation, human rights, and comparative constitutional law.


Abstract

What forum should be employed to adjudicate the status of persons suspected of involvement in terrorism? Recent clashes between Congress and the President as to whether the status of terrorism suspects should be determined via Article III criminal process or military commissions have revived debate on this venue question. The problem is typically framed as a simple matter of law on the assumption that existing statutory and doctrinal rules already furnish dispositive guidance for sorting suspects between civilian and military venues. This article takes issue with that assumption. It argues that the choice of forum question can more profitably be understood as a problem of institutional design rather than a choice of law puzzle. A key institutional design decision that to date has been ignored is whether or when to create jurisdictional redundancy: When, that is, should overlapping jurisdictions vest the government with a choice of forums or an option to retry a suspect acquitted in an initial process? Such redundancy is currently pervasive. But conventional wisdom suggests that it both risks abuse and is needlessly costly. This Article demonstrates that jurisdictional redundancy has complex direct and indirect effects on the accuracy and cost of terrorism-related adjudication. It presents a comprehensive framework for analyzing jurisdictional redundancy by exploring how the latter influences error rates, system maintenance costs, externalities, information production, and incentives. Applying that framework, I suggest the current status quo of pervasive redundancy has surprising merit in contrast to two leading reform proposals.

Reuben W. Hills Conference Room

Aziz Huq Assistant Professor of Law, The University of Chicago Law School Speaker
Seminars
-

Reuben W. Hills Conference Room

Jacob Shapiro Assistant Professor of Politics and International Affairs, Princeton University; Co-director, Empirical Studies of Conflict Project Speaker
David Blum Predoctoral Fellow, CISAC Commentator
Seminars
-

Reuben W. Hills Conference Room

Ryan Ellis Postdoctoral Fellow, CISAC Speaker
0
Affiliate
Diffie_Whit.jpg

Whitfield Diffie is a consulting scholar at CISAC. He was a visiting scholar in 2009-2010 and an affiliate from 2010-2012. He is best known for the discovery of the concept of public key cryptography, in 1975, which he developed along with Stanford University Electrical Engineering Professor Martin Hellman. Public key cryptography, which revolutionized not only cryptography but also the cryptographic community, now underlies the security of internet commerce.

During the 1980s, Diffie served as manager of secure systems research at Northern Telecom. In 1991, he joined Sun Microsystems as distinguished engineer and remained as Sun fellow and chief security officer until the spring of 2009.

Diffie spent the 1990s working to protect the individual and business right to use encryption, for which he argues in the book Privacy on the Line, the Politics of Wiretapping and Encryption, which he wrote jointly with Susan Landau. Diffie is a Marconi fellow and the recipient of a number of awards including the National Computer Systems Security Award (given jointly by NIST and NSA) and the Franklin Institute's Levy Prize.

Whitfield Diffie Affiliate, CISAC Commentator
Seminars
-

Reuben W. Hills Conference Room

David Palkki Deputy Director, National Defense University, Conflict Records Research Center; Co-editor, The Saddam Tapes: The Inner Workings of A Tyrant’s Regime, 1978-2001 Speaker

Not in residence

0
Senior Fellow at the Freeman Spogli Institute for International Studies, Emerita
Professor, by courtesy, of Political Science, Emerita
crenshaw_martha.jpg PhD

Martha Crenshaw is a senior fellow emerita at CISAC and FSI. She taught at Wesleyan University in Middletown, Connecticut, from 1974 to 2007.  She has published extensively on the subject of terrorism.  In 2011 Routledge published Explaining Terrorism, a collection of her previously published work.  A book co-authored with Gary LaFree titled Countering Terrorism was published by the Brookings Institution Press in 2017. She recently authored a report for the U.S. Institute of Peace, “Rethinking Transnational Terrorism:  An Integrated Approach”.

 

 She served on the Executive Board of Women in International Security and is a former President and Councilor of the International Society of Political Psychology (ISPP). In 2005-2006 she was a Guggenheim Fellow. She was a lead investigator with the National Consortium for the Study of Terrorism and the Response to Terrorism (START) at the University of Maryland from 2005 to 2017.  She is currently affiliated with the National Counterterrorism, Innovation, Technology, and Education (NCITE) Center, also a Center of Excellence for the Department of Homeland Security.  In 2009 the National Science Foundation/Department of Defense Minerva Initiative awarded her a grant for a research project on "mapping terrorist organizations," which is ongoing.  She has served on several committees of the National Academy of Sciences.  In 2015 she was elected a Corresponding Fellow of the British Academy.  She is the recipient of the International Studies Association International Security Studies Section Distinguished Scholar Award for 2016. Also in 2016 Ghent University awarded her an honorary doctorate.  She serves on the editorial boards of the journals International Security, Security Studies, Dynamics of Asymmetric Conflict, Orbis, and Terrorism and Political Violence.

Date Label
Martha Crenshaw Professor of Political Science (by courtesy); Senior Fellow, CISAC and FSI Commentator
Seminars
Subscribe to Security