Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

"Does America need allies? The United States is the strongest nation on earth, the only standing superpower, and its natural impulse is to assume that it can act unencumbered.

Paradoxically, America needs allies because of its overwhelming strengths and the vulnerabilities that lurk in the shadow of such unprecedented national power.

"In this era of American predominance, alliances are more compelling than ever, yet U.S. citizens are largely unaware of or uninformed about who their allies are. For example, in the recent uproar over the potential acquisition by a Dubai company of contracts for management of U.S. ports, many were ignorant of Dubai's status as a long-standing partner providing critical support to American policies in the Persian Gulf. The lack of clarity underscores the fact that policymakers and analysts have failed to think strategically or systematically about the role alliances should play in American national security in the 21st century. As a consequence, they have also failed to build the public support necessary for sustained global engagements."

--from the introduction of "The Case for Alliances," by Elizabeth Sherwood-Randall, in Joint Force Quarterly

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Joint Force Quarterly
Authors
Paragraphs

What role should nuclear weapons play in today's world? How can the United States promote international security while safeguarding its own interests? U.S. Nuclear Weapons Policy informs this debate with an analysis of current nuclear weapons policies and strategies, including those for deterring, preventing, or preempting nuclear attack; preventing further proliferation, to nations and terrorists; modifying weapons designs; and revising the U.S. nuclear posture.

Presidents Bush and Clinton made major changes in U.S. policy after the cold war, and George W. Bush's administration made further, more radical changes after 9/11. Leaked portions of 2001's Nuclear Posture Review, for example, described more aggressive possible uses for nuclear weapons. This important volume examines the significance of such changes and suggests a way forward for U.S. policy, emphasizing stronger security of nuclear weapons and materials, international compliance with nonproliferation obligations, attention to the demand side of proliferation, and reduced reliance on nuclear weapons in U.S. foreign policy.

With a foreword by William J. Perry. Contributors: Chaim Braun (CISAC), George Bunn (CISAC), Christopher F. Chyba (formerly CISAC Co-Director), David Holloway (CISAC), Michael May (CISAC, formerly Director of Lawrence Livermore National Laboratory), W.K.H. Panofsky (formerly Director of Stanford Linear Accelerator Center), Karthika Sasikumar (University of British Columbia, former CISAC fellow), Roger Speed (formerly with the Livermore Laboratory), and Dean A. Wilkening (Science Program Director, CISAC).

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press and CISAC
Authors
David Holloway
Michael M. May
Karthika Sasikumar
Paragraphs

James D. Fearon testified on 15 September 2006 before the U.S. House of Representatives, Committee on Government Reform, Subcommittee on National Security, Emerging Threats, and International Relations, on the topic, "Iraq: Democracy or Civil War?"

 

Congressman Christopher Shays (R-CT), Chairman of the Subcommittee on National Security, Emerging Threats, and International Relations, convened a three-day oversight hearing entitled "Iraq: Democracy or Civil War?"

Fearon testified in the third of the following sessions that comprised the hearing:

  • Monday September 11
    Part I: When Can Iraqis Assume Full Internal Security?
  • Wednesday, September 13
    Part II: What will it Take to Achieve National Reconciliation?
  • Friday, September 15
    Part III: What Are the Consequences of Leaving Iraq?
All Publications button
1
Publication Type
Testimonies
Publication Date
Journal Publisher
U.S. House of Representatives, Committee on Government Reform, Subcommittee on National Security, Emerging Threats, and International Relations
Authors
James D. Fearon
Authors
News Type
News
Date
Paragraphs

Timely reunion panel hosted by Stanford president John Hennessy, moderated by Stanford alum Ted Koppel, and featuring Bill Perry and George Shultz.

The final decade of the 20th century was a time of great optimism. The fall of the Iron Curtain ushered in a new era of democracy and freedom for millions. The expansion of the European Union promised to open borders to trade and opportunity. The technology revolutions of the 1990s promised to bridge cultural gaps and unite diverse people.

Yet, in the first decade of the 21st century, this optimism has faded in the face of myriad threats: the menace of terrorism and nuclear proliferation, the danger of virulent pandemics, the global dependence on oil from volatile regions, and the far-reaching and often unsettling implications of an interconnected planet.

In such uneasy times, is it safe to feel safe? What is the way forward in the midst of these challenges? What will it take? What is Stanford doing to help address these issues?

Panelists

John L. Hennessy, Stanford President and Bing Presidential Professor

Jean-Pierre Garnier, MBA '74, CEO, GlaxoSmithKline

The Hon. Anthony M. Kennedy, '58, Supreme Court Justice

William J. Perry, '49, MS '50, former Secretary of Defense, Berberian Professor in the School of Engineering

Dr. Lucy Shapiro, Ludwig Professor of developmental biology and cancer researcher

George P. Shultz, former Secretary of State, Ford Distinguished Fellow, Hoover Institution

Jerry Yang, '90, MS '90, co-founder, Yahoo!

All News button
1
Authors
Pavel Podvig
News Type
Commentary
Date
Paragraphs
Russian nuclear forces are not as ill prepared as a Foreign Affairs article might suggest, writes CISAC research associate Pavel Podvig. His letter, in the September-October 2006 issue of Foreign Affairs, responds to "The Rise of U.S. Nuclear Primacy," by Keir Lieber and former CISAC fellow Daryl Press, in the March-April 2006 issue. For a longer version of Podvig's comment and further discussion of Lieber and Press' article, see Russian Strategic Nuclear Forces: "Speaking of nuclear primacy".

In arguing that the United States has achieved nuclear primacy and thereby made mutual assured destruction obsolete, Lieber and Press rely on some questionable assumptions about the status of Russia's strategic forces.

To make their case that the Russian strategic nuclear arsenal "has sharply deteriorated," Lieber and Press quote statistics showing that Russia today has "39 percent fewer long-range bombers, 58 percent fewer ICBMs, and 80 percent fewer SSBNs [ballistic-missile-launching submarines] than the Soviet Union fielded during its last days." These numbers are generally correct, but a similarly one-sided examination of U.S. forces would have painted a similarly dire portrait; after all, the U.S. nuclear arsenal today has 66 percent fewer strategic bombers, 50 percent fewer ICBMs, and more than 50 percent fewer ballistic missile submarines than it possessed during the Cold War.

Lieber and Press claim that Russia's strategic bombers "rarely conduct training exercises," implying that Russia's military is neglecting strategic aviation. Yet Russia's strategic air forces participated in four major exercises in 2005 alone. Similarly, Lieber and Press refer to a number of failures during launches of submarine-launched ballistic missiles (SLBMs) in 2004 to illustrate the decline of the Russian navy. But they do not mention the much larger number of successful launches or the Bulava SLBM development program, which has been quite successful so far.

It may be true, as Lieber and Press write, that "over 80 percent of Russia's silo-based ICBMs have exceeded their original service lives," but regular and successful tests of ICBMs that have been kept in silos for 25 years or longer suggest that this has not affected the missiles' reliability. Russia is decommissioning its ICBMs not because they are unreliable but because it does not need them. Lieber and Press claim that the development of the next-generation Russian ICBM, the Topol-M, has been "stymied by failed tests." But of 15 flight tests conducted to date, only one has failed -- a remarkable achievement for any missile-development program. It is true that the production rate of new Topol-Ms is low, but that may be because Russia has decided to concentrate on producing the mobile version of the missile, which it will begin deploying this year.

Lieber and Press are right to state that Russia may end up having as few as 150 land-based missiles by the end of the decade. But about half of those ICBMs would probably be road-mobile Topols and Topol-Ms, which, if operated properly, would have a good chance of surviving a first strike. Lieber and Press dismiss Russia's mobile missiles by saying that they "rarely patrol." In reality, very little is known about Russia's mobile-missile patrol rates, and although it is quite plausible that they are low, it is a stretch to assume that they are zero.

Lieber and Press describe Russia's early warning system as "a mess." In fact, although the system is past its prime, it has lost surprisingly little of its effectiveness. It may seem counterintuitive, but Russia would gain very little were its early warning system to be deployed to the fullest extent. Adding the capability to detect SLBM launches would not dramatically increase the time available to the Russian leadership for assessing attacks. The much-discussed "gaping hole" in the radar coverage east of Russia also should be put in context. Missiles launched from the Pacific could not cover the entire range of Russian targets that would need to be destroyed in a first strike. The scenario that Lieber and Press postulate, in which "Russian leaders probably would not know of the attack until the warheads detonated" because of flaws in their early warning system, is simply impossible.

All News button
1
Paragraphs

To reduce the risk of nuclear terrorism, we must prevent terrorists from obtaining nuclear weapons or materials. This will require, among other things, a sustained effort to keep dangerous nations from going nuclear--in particular North Korea. This article reviews the efforts the United States has undertaken through the years to keep North Korea from building a nuclear arsenal, arguing that the history of proliferation on the Korean Peninsula is marked by five nuclear crises. A sixth could be on the horizon, further compromising American efforts to lessen the likelihood of a nuclear attack on U.S. soil.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of the American Academy of Political and Social Science
Authors
William J. Perry
Paragraphs

One of the serious risks associated with the strategic nuclear arsenals of Russia and the United States is that an accidental launch might result from a false alarm or from misinterpreting information provided by an early-warning system. This risk will not be reduced by bringing down the number of strategic missiles on high alert to the level of about 500 warheads on each side because this measure will not significantly affect first-strike vulnerability of the Russian strategic forces. Other measures that have been suggested so far, namely an upgrade of the Russian early-warning system, establishing additional channels of real-time exchange of early-warning data, or transparent and verifiable de-alerting of strategic forces, are more likely to increase the probability of an accident than to reduce it. To address the problem of an accidental launch in the short term, the United States and Russia, while continuing to work toward deep reductions of their strategic nuclear forces, should develop and implement measures that would keep their entire forces at low levels of readiness without revealing their actual alert status.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Science and Global Security
Authors
Pavel Podvig
Paragraphs

The nexus of terrorism and nuclear weapons is today's greatest security concern. The importance of keeping fissile materials out of the hands of terrorists is now generally accepted. The difficulty of doing so is not. Lack of appreciation, especially for the technical difficulties, is hampering our ability to build a comprehensive safeguards system and prevent nuclear terrorism.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of the American Academy of Political and Social Science
Authors
Siegfried S. Hecker
Paragraphs

The debate over how to deal with Iran's nuclear program is clouded by historical amnesia. Nuclear proliferation has been stopped before, and it can and should be stopped in this case as well. Unfortunately, with Tehran -- as with some of its predecessors -- the price for Washington will be relinquishing the threat of regime change by force.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Foreign Affairs
Authors
Scott D. Sagan
Authors
News Type
Commentary
Date
Paragraphs

The National Security Agency is a riddle wrapped in a mystery inside a code. Secrets lie within. Located in Fort Meade, Md., it dwarfs the CIA. Its budget is black, unknown. And, most disturbing of all, it is the world's largest employer of mathematicians.

One of its secrets, recently revealed, is that it's monitoring millions of phone calls to learn just who was calling whom. (Technically, only telephone numbers are being recorded, but you don't have to be Q from James Bond to get a name from a number.) This information was being used to determine who might be a terrorist.

Legal or not, the spying program isn't worth violating our civil liberties for. The information one can glean will hardly help us win the war on terror.

With the NSA data, you can draw a picture with nodes or dots representing individuals, and lines between nodes if one person has called another. Mathematicians who work with pictures like this are called graph theorists. The field of social network analysis deals with trying to determine information about a group from such a graph, such as who the key players are or who the cell leaders might be.

But even when you know everyone in the graph is a terrorist, graphs don't contain information about the order or hierarchy of the cell. Researchers look instead for graph features like centrality: They try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel. Monterey Naval Postgraduate School researcher Ted Lewis, in his textbook "Critical Infrastructure Protection," defines a critical node to be such a central hub.

There are two problems. First, the central player might not be as important as the hub metaphor suggests. Jafar Adibi of the University of Southern California looked at e-mail traffic between Enron employees before Enron collapsed, and drew the graph. He found that if you naively analyzed the graph, you could mistakenly conclude that one of the central players was CEO Ken Lay's ... secretary. But that wasn't the person who ran the company into the ground.

Second, as the journal Studies in Conflict and Terrorism reported in 2003, you can kill all the central players in a terrorist cell and still leave the cell with a complete chain of command -- still capable of carrying out a devastating attack.

Expert Kathleen Carley of Carnegie Mellon was able to correctly predict -- twice -- who would take over Hamas when its leaders were assassinated, and her analysis used detailed information about the individuals in the organization, not just what anonymous nodes were linked with what. The moral is that the graph theory approach is inadequate. For useful results, it's important to utilize the lattice theory approach, which takes into account order and hierarchy.

The other questionable aspect of the NSA spying program is that it seeks to work out who might be a terrorist based on their calling patterns. While I agree that anyone calling 1 (800) AL-QAEDA is probably a terrorist, guilt by association is not just bad law, it's bad mathematics, for three reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period-Beatles kind of way, but in the sense of the Kevin Bacon game. Sociologist Stanley Milgram took individuals unknown to each other, separated by a continent, and asked one person to send a package to the other -- but only by sending the package to an individual he or she knew, who could then only send the package to someone he knew, and so on. While Milgram's interpretation of the results has since been questioned, the conclusion that emerged is that it took only six mailings, on average, for each package to reach its intended destination.

For example, President Bush is only three steps away from Osama bin Laden. And terrorist hermits like the Unabomber might be connected only to very few people. So much for guilt by association.

The second reason the NSA methodology is flawed is the concept "strength of weak ties," made famous by Stanford sociologist Mark Granovetter. Robert Spulak of the Joint Special Operations University puts it this way: You might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: There is no communication for years. The links between nodes that the NSA is looking for simply might not exist for the real threats.

Formal concept analysis, a branch of lattice theory, helps rectify this situation. Individuals who share many of the same characteristics are grouped together as one node, and links between nodes in this picture, called a concept lattice, indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes. For instance, you might group together people based on what cafés, bookstores and mosques they attend, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa). While this tool has in fact been used by researchers at Los Alamos National Laboratory to sift through hundreds of terrorism-related reports, it's still dangerous to rely on the math.

The NSA data mining is flawed because, as Kennedy and Lincoln buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One is just minding his own business. The other is Cat Stevens.

This isn't to say mathematicians are useless. In September 2004 -- 10 months before the July 7 bombing of the London Underground -- mathematician Gordon Woo warned that London was a hotbed of jihadist radicalism. But Woo, who works for the Bay Area company Risk Management Solutions, didn't anticipate the bombings using math. He used his knowledge and experience of London, especially the Wood Green area. That's what law enforcement officials should be doing.

As for tracking terrorist financing, it may already be too late. The terrorism of the future, according to mathematician Stefan Schmidt of the Technical University in Dresden, Germany, may be the terrorism of the futures -- when bombs explode, the stock market drops. Schmidt wants to quantify the impact on the market of a terrorist incident. The only people who know when a bomb will explode are the terrorists. By playing the market, they may already have obtained as much money as they need -- in perfectly legitimate ways -- thus stifling Treasury Department efforts to cut off the source of their funding.

Math is just a tool. Used wisely, math can indeed help win the Battle of Britain (by breaking the German codes). But used unwisely -- as seems to be the case in the NSA telephone caper -- your approval rating might just hit an all-time low.

Hero Image
nsa seal
All News button
1
Subscribe to Security