Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
-

Sonja Schmid is a social science research associate at Stanford University. Having received her Ph.D. in Science & Technology Studies from Cornell University, she is now a science fellow at the Center for International Security and Cooperation, and affiliated with the Program in Science, Technology and Society at Stanford. Her research has focused on understanding complex decision-making processes at the interface between science, technology, and the state in the Cold War Soviet context, and is based on extensive archival research and narrative interviews with nuclear energy specialists in Russia. She is currently working on a book about reactor design choices and the development of the civilian nuclear industry in the Soviet Union. In addition, she is involved in an international research project on Cold War Technopolitics and Colonialism, where she works on Soviet technology transfer to Central and Eastern Europe. Her research interests also include risk communication, and the popularization of science and technology, subjects on which she has published in the past.

Reuben W. Hills Conference Room

Sonja Schmid Speaker
Seminars
-

The United Nations Secretariat--the main part of the UN bureaucracy directly under the Secretary-General--has arguably changed or been challenged more than any other part of the UN system in recent years, with more and more mandates and rising expectations. Though much attention has been given to the reform of the Security Council, and though Washington has made UN 'management reform' a core pillar of its UN policy since the Oil-for-Food scandal, the UN Secretariat has nevertheless proved singularly impervious to even the common sense suggestions for improvement. In many ways, there is a greater gap today than at any time in the past between what the Secretariat does, what it's meant to do, and the capacity it has. Why has improvement been so difficult and what have been the recurrent mistakes of UN reform efforts? With the election of a new Secretary-General due in late 2006, can we think about the UN bureaucracy in a different and more practical way?

Thant Myint-U is a visiting senior fellow at the International Peace Academy. He is also a senior advisor to the Conflict Prevention and Peace Forum at the Social Science Research Council and a Fellow of the Cambridge University Centre for History and Economics.

From 2000-2006 he worked in the United Nations Secretariat, first for the Office for the Coordination of Humanitarian Affairs (OCHA) and then for the Department of Political Affairs (DPA). From 2004-5 he was Chief of DPA's Policy Planning Unit of the Department of Political and in 2005-6 he was a Senior Political Officer in the Executive Office of the Secretary-General. In 2004 he was also a member of the Secretariat of the Secretary-General's High Level Panel on Threats, Challenges and Change.

Thant Myint-U has also served on three United Nations peacekeeping operations, with UNTAC in Cambodia in 1992-3 and with UNPROFOR and UNMIBH in the former Yugoslavia from 1994-6. In 1994 he was the UN's senior spokesman in Sarajavo.

From 1994-1999 Thant Myint-U was a fellow of Trinity College Cambridge, where he researched and taught Asian and British imperial history. He received his bachelor's degree from Harvard University in 1988, his master's degree in international relations from the Johns Hopkins School of Advanced International Studies in 1992 and his PhD in history from Cambridge University in 1996.

He is the author of several published and broadcast works, including two books: The Making of Modern Burma (Cambridge University Press, 2000) and The River of Lost Footsteps: Remembering Burma's Past (Farrar, Strauss and Giroux, 2006 forthcoming).

Reuben W. Hills Conference Room

Thant Myint-U Senior Visiting Fellow Speaker International Peace Academy
Seminars
Paragraphs

Several models have been proposed for the dose-response function and the incubation period distribution for human inhalation anthrax. These models give very different predictions for the severity of a hypothetical bioterror attack, when an attack might be detected from clinical cases, the efficacy of medical intervention and the requirements for decontamination. Using data from the 1979 accidental atmospheric release of anthrax in Sverdlovsk, Russia, and limited nonhuman primate data, this paper eliminates two of the contending models and derives parameters for the other two, thereby narrowing the range of models that accurately predict the effects of human inhalation anthrax. Dose-response functions that exhibit a threshold for infectivity are contraindicated by the Sverdlovsk data. Dose-dependent incubation period distributions explain the 10-day median incubation period observed at Sverdlovsk and the 1- to 5-day incubation period observed in nonhuman primate experiments.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Proceedings of the National Academy of Sciences
Authors
-

David Hafemeister is a Science Fellow at Stanford's Center for International Security and Cooperation (2005-6). He is also Professor (emeritus) of Physics at California Polytechnic State University. He spent a dozen years in Washington as Professional Staff Member, Senate Committees on Foreign Relations and Governmental Affairs (1990-93 on arms control treaties at the end of the Cold War), Science Advisor to Senator John Glenn (1975-77), Special Assistant to Under Secretary of State Benson and Deputy-Under Secretary Nye (1977-78), Visiting Scientist in the State Department's Office of Nuclear Proliferation Policy (1979), the Office of Strategic Nuclear Policy (1987) and Study Director at the National Academy of Sciences (2000-02). He also held appointments at Carnegie Mellon, MIT, Stanford, Princeton, and the Lawrence-Berkeley, Argonne and Los Alamos national laboratories. He was Chair of the APS Forum on Physics and Society (1985-6) and the APS Panel on Public Affairs (1996-7). He has written/edited ten books and 140 articles and was awarded the APS Szilard award in 1996.

Reuben W. Hills Conference Room

David Hafemeister Speaker
Seminars
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
-

Jacob N. Shapiro is a graduate student in political science at Stanford University and a homeland security fellow at CISAC. He is also an associate at the Combating Terrorism Center at the United States Military Academy and teaches on terrorist financing at the Naval Postgraduate School. His research focuses on the organizational dynamics of terrorist groups. His current projects use economic and sociological organization theory to examine the interactions between individual motivations and organizational structure in covert groups. As a Naval Reserve officer he was assigned to the Office of Naval Intelligence and the Naval Warfare Development Command. Prior to attending Stanford, he served on active duty at Special Boat Team 20 and onboard the USS Arthur W. Radford (DD-968). He received his BA with honors in political science from the University of Michigan.

Reuben W. Hills Conference Room

Jacob N. Shapiro Speaker
Seminars
-

Dr. Ronald F. Lehman II is Director of the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory. Ron also is Chairman of the Governing Board of the International Science and Technology Center (ISTC) in Moscow. . He serves on the State Department Arms Control and Nonproliferation Advisory Board (ACNAB) and as a member of the Department of Defense Threat Reduction Advisory Committee (TRAC). Previously, he was the Director of the U.S. Arms Control and Disarmament Agency and has served in the Defense Department as Assistant Secretary, in the State Department as U.S. Chief Negotiator on Strategic Offensive Arms (START), and in the White House as Deputy Assistant to the President for National Security Affairs.

Tuan H. Nguyen is the Herbert York Fellow in the Center for Global Security Research at the Department of Energy's Lawrence Livermore National Laboratory. In addition, he is a member of the Forensic Science Center in the Chemistry and Materials Science Directorate at Livermore. Dr. Nguyen has been an Adjunct Professor of Chemistry at California State University, East Bay. He received his BS in biochemistry and a PhD in organic chemistry.

Reuben W. Hills Conference Room

Ron Lehman III Speaker Lawrence Livermore National Laboratory
Tuan Nguyen Speaker Lawrence Livermore National Laboratory
Seminars
Paragraphs

Part I of this article looks at the American institution of legal controls on the executive branch and their subsequent erosion post-9/11. It explores three changes incorporated in the USA PATRIOT Act: alterations to the Foreign Intelligence Surveillance Act; the introduction of Delayed Notice Search Warrants; and the expansion of National Security Letters. Outside of this legislation, the weakening of the Attorney General guidelines

increased the FBI's ability to collect information. The article highlights the Department of Defense's ("DOD") movement into the domestic surveillance realm. It discusses a number of operations both inside and outside the DOD, such as TALON, Echelon, Carnivore, Magic Lantern, TIPS, and the use of watch lists. Part I concludes with a discussion of the data mining efforts underway. The article argues that Total Information Awareness, ADVISE, and other projects catapult surveillance into another realm. Moreover, while any one program, such as the NSA initiative, may be considered on narrow grounds, the sheer breadth of current powers raises important concerns.

Part II notes that, until recently, no laws governed police and intelligence service information-gathering authorities in the UK. Extraordinary stop and search powers for terrorist-related offences, and warrants for police interference with property provided exceptions. But physical searches of property conducted by the intelligence services, the interception of communications by law enforcement and intelligence agencies, the use of covert surveillance or "electronic bugs," and the running of covert human intelligence sources operated under the legislative and judicial radars. Beginning in the mid-1980s, the European Court began to raise objections to the lack of safeguards and statutory framework. But each time the Court handed down a significant finding against the United Kingdom, the state responded not just by, at least on the surface, meeting the demands of the European Convention of Human Rights, but, it appears, by expanding executive surveillance authorities. Moreover, the warrant system introduced retained control within the executive branch. Not subject to judicial review, the standard applied is reasonable suspicion--considerably less robust than probable cause. Like the United States, Britain draws on new technologies; the country leads the world in its use of public surveillance systems.

Having laid out legal developments on both sides of the Atlantic, Part III moves to policy concerns: it begins by briefly exploring the substantive, political, legal, social, and economic risks posed by such measures. It then considers six approaches that would help to mitigate the risks. First is the possibility of creating a property right in personal information. The second centers on the regulation of access, transfer, use, and retention of data. Such efforts would satisfy demands for accountability and transparency in both the public and private sector. A third possibility centers on scaling back the existing powers of the state. Fourth, both countries may contemplate placing limits on what constitutes national security. Fifth, alternative safeguards and oversight structures deserve attention - such as reporting requirements, random audits, the creation of ombudspersons, the insertion of the judiciary, and (in the UK) allowing intercepted communications to be used as evidence. Sixth, preventing countries from introducing ever greater powers of surveillance under the claim that they are only temporary in nature would force legislatures to consider the long-term impact of provisions beyond the immediate terrorist threat.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Criminal Law and Criminology
Authors
-

CISAC Conference Room

MV Ramana Physicist, Visiting Research Staff Member Speaker the Program on Science and Global Security
Seminars
Subscribe to Security