Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

-

Dr. Sarah Mendelson is a senior fellow with the Russia and Eurasia Program at the Center for Strategic and International Studies. Before joining CSIS in 2001, she taught international politics at the Fletcher School of Law and Diplomacy, Tufts University. Dr. Mendelson received her B.A. in history from Yale University, and her Ph.D. in political science from Columbia University. She also earned a certificate from the Harriman Institute.

At CSIS, she manages several projects that explore the links between security and human rights. Her current research includes collaborative work on public opinion surveys of Russian attitudes on democracy, human rights, Chechnya and the military. She directed a collaborative study evaluating the impact of Western democracy assistance to Eastern Europe and Eurasia. In addition, she has served on the staff of the National Democratic Institute's Moscow office, and was a resident associate at the Carnegie Endowment for International Peace. She has also been a fellow at CISAC and at Princeton University's Center of International Studies.

Dr. Mendelson serves on the steering committee of Human Rights Watch, the editorial board of International Security, and is a member of the Council on Foreign Relations, and the Program on New Approaches to Russian Security.

Reuben W. Hills Conference Room, East 207, Encina Hall

Sarah Mendelson Senior Fellow Russia and Eurasia Program, Center for Strategic and International Studies
Seminars
-

Tonya Putnam has a J.D. from Harvard Law School and received her Ph.D. from the Department of Political Science at Stanford University in March 2005. She is currently a postdoctoral fellow at CISAC, but will be moving to the Center on Globalization and Governance at Princeton University for a postdoctoral fellowship next academic year. Her dissertation, Courts Without Borders? The Politics and Law of Extraterritorial Regulation, explores the extraterritorial reach of U.S. federal courts and regulatory institutions, and implications for the development of de facto international regulatory frameworks. Other research areas have included human rights in peace implementation missions, comparative legal responses to the threat of cybercrime and cyberterrorism, risk communication in the context of radiological terrorism (dirty bombs), and obstacles to military reform in Russia.

Reuben W. Hills Conference Room, East 207, Encina Hall

0
Affiliate
Tonya Lee Putnam

Tonya L. Putnam (J.D./Ph.D) is a Research Scholar at the Arnold A. Salzman Institute of War and Peace Studies at Columbia University. From 2007 to 2020 she was a member of the Political Science at Columbia University. Tonya’s work engages a variety of topics related to international relations and international law with emphasis on issues related to jurisdiction and jurisdictional overlaps in international regulatory and security matters. She is the author of Courts Without Borders: Law, Politics, and U.S. Extraterritoriality along with several articles in International Organization, International Security, and the Human Rights Review. She is also a member (inactive) of the California State Bar.

CV
Tonya L. Putnam
Seminars
-

Linda Kirschke is a predoctoral fellow at CISAC. She is a PhD candidate at Princeton University, in the Department of Politics, and her research focuses on state politics and ethnic violence. She published "Informal repression, zero sum politics and late third wave transitions" in the Journal of Modern African Studies in 2000. Drawing on the cases of Cameroon, Rwanda and Kenya, this article shows that transitions to multiparty politics place Sub-Saharan South Africa at high risk for civil violence. Kirschke was a Eurasia Title VIII Fellow at the Social Science Research Council in 2002-03, working on Russian language training. In 2003-04, she was awarded an Andrew W. Mellon Foundation Pre-Dissertation Fellowship at Columbia Universityís Council for European Studies. Kirschke has a BA in French and African studies and has worked for human rights organizations in France, London and Africa.

Reuben W. Hills Conference Room, East 207, Encina Hall

Linda Kirschke Predoctoral Fellow
Seminars
-

Has the Bush administration used the War on Terror to consolidate power in the executive branch? Is the United States in danger of undermining civil liberties and laying the foundation for an American police state? Arguing against conventional wisdom the authors answer these questions with an emphatic No. Drawing on evidence from the USA Patriot Act, the creation of the Department of Homeland Security, the Transportation Security Administration, intelligence reform, and the detention of enemy combatants, the authors argue that what is most striking about US homeland security policy in the wake of 9-11 is just how weak the response of the American state has been. This outcome is contrary to both conventional wisdom and theoretical expectation. The authors argue that this puzzle is best explained by focusing on the institutional structure of US domestic politics.

Jay Stowsky is an adjunct professor at the University of California, Berkeley's School of Information Management and Systems (SIMS) and is the executive drector of UC Berkeley's Services Science Program. Previously, he directed UC Berkeley's program on Information Technology and Homeland Security at the Goldman School of Public Policy and served in the Clinton administration as senior economist for science and technology policy on the staff of the White House Council of Economic Advisers. Stowsky has also served as associate dean at UC Berkeley's Haas School of Business and as director of research policy for the University of California system. He has authored several studies of U.S. technology policy, including "Secrets to Share or Shield: New Dilemmas for Military R&D in the Digital Age," in Research Policy (Vol. 33, No. 2, March 2004) and "The Dual-Use Dilemma," in Issues in Science and Technology (Winter 1996). He is co-author, with Wayne Sandholtz, et al., of The Highest Stakes: The Economic Foundations of the Next Security System (Cambridge Oxford University Press, 1992).

Matthew Kroenig is a PhD candidate in the Department of Political Science at UC Berkeley and a Public Policy and Nuclear Threats Fellow at the Institute of Global Conflict and Cooperation. Kroenig's dissertation research explains the conditions under which states provide sensitive nuclear assistance to nonnuclear weapons states. Previously, he was a research associate with the Information Technology and Homeland Security Project and has also served in government as an intelligence analyst.

Reuben W. Hills Conference Room, East 207, Encina Hall

Matt Kroenig PhD Candidate Speaker Department of Political Science, UC Berkeley
Jay Stowsky Adjunct Professor Speaker School of Information Management and Systems, UC Berkeley
Seminars
-

Shapiro presents research he conducted with David A. Siegel, a student in Stanford's Graduate School of Business:

A review of international terrorist activity reveals a recurring pattern of financially strapped operatives working for terrorist organizations that seem to have plenty of money. This observation is hard to square with traditional accounts of terrorist financial and logistical systems, accounts that stress the efficiency with which terrorist financial networks distribute funds while operating through a variety of covert channels. In order to explain the observed inefficiencies, we present a hierarchical model of terror organizations in which leaders must delegate financial and logistical tasks to middlemen for security reasons; however, these middlemen do not always share their leaders' interests. In particular, the temptation always exists to skim funds from any financial transaction. To counteract this problem, leaders can threaten to punish the middlemen. Because logisticians in international terrorist organizations are often geographically separated from leaders, and because they can defect to the government if threatened, violence is rarely the effective threat it is for localized groups such as the IRA. Therefore leaders must rely on more prosaic strategies to solve this agency problem; we focus on leaders' ability to remove middlemen from the network, denying them the rewards of future participation. We find that when the middlemen are sufficiently greedy, and when the organization suffers from a sufficiently strong budget constraint, that leaders will choose not to fund attacks in equilibrium because the costs of skimming are too great. Further, we show there can be important non-linearities in terrorists' response to government counter-terrorism. Specifically, we find that given constrained funding for terrorists, government efforts will yield few results until they reach a certain threshold, at which point cooperation between leaders and middlemen in terrorist groups breaks down leading to a dramatic drop in the probability of terrorist success.

Reuben W. Hills Conference Room, East 207, Encina Hall

Jacob N. Shapiro
Seminars
-

Robert O. Keohane (PhD., Harvard University), James B. Duke Professor of Political Science, has taught at Swarthmore College, Stanford University, Brandeis University, and Harvard University where he was Stanfield Professor of International Peace.

He is the author of After Hegemony: Cooperation and Discord in the World Political Economy (Princeton University Press, 1984), for which he was awarded the second annual Grawemeyer Award in 1989 for Ideas Improving World Order. He is editor or co-editor of, and contributor to, eleven other books, most recently, Humanitarian Intervention (Cambridge 2003), with J.L. Holzgrefe. Between 1974 and 1980 he was editor of the journal, International Organization. He was president of the International Studies Association, 1988-89, and of the American Political Science Association, 1999-2000. He is a fellow of the American Academy of Arts and Sciences, and has held a Guggenheim Fellowship and fellowships at the Center for Advanced Study in the Behavioral Sciences and the National Humanities Center. He is on leave from Duke this year, conducting research at the Center for Advanced Study in the Behavioral Sciences.

Reuben W. Hills Conference Room, East 207, Encina Hall

Robert Keohane
Seminars
-

Page Fortna is an assistant professor in the Political Science Department at Columbia University. Her research focuses on the durability of peace in the aftermath of both civil and interstate wars. She is the author of Peace Time: Cease-Fire Agreements and the Durability of Peace (Princeton University Press, 2004), and has published articles in World Politics, International Organization, International Studies Quarterly, International Studies Review, and the Georgetown Journal of International Affairs. She is currently working on a project evaluating the effectiveness of peacekeeping in civil wars, as well as a project on long-term historical trends in war termination.

During the 2004-2005 academic year, she is a fellow at the Hoover Institution at Stanford University. She has also been a visiting fellow at the American Academy of Arts and Sciences in Cambridge, MA (2002-2003). Before coming to Columbia, Fortna was a pre-doctoral and then a post-doctoral fellow at CISAC. Her graduate work was done in the Government Department at Harvard University (Ph.D. 1998). Before graduate school, she worked at the Henry L. Stimson Center, a think tank in Washington DC. She is a graduate of Wesleyan University.

Reuben W. Hills Conference Room, East 207, Encina Hall

Page Fortna Assistant Professor of Political Science at Columbia University and Susan Louise Dyer Peace Fellow the Hoover Institution, Stanford University
Seminars

CISAC
Stanford University
Encina Hall, E201-1
Stanford, CA 94305-6165

(650) 723-9625 (650) 724-5683
0
rsd22_056_0671a.jpg
Administrative Associate and Receptionist
News Type
News
Date
Paragraphs
This article originally appeared in Stanford Report.

By Dawn Levy

Responding to a terrorist attack employing biological or chemical agents requires knowledge spanning many disciplines. Three Stanford researchers were among nearly 135 leading scientists and technical experts from industry, academia and government invited to participate in the Gordon Research Conference on Chemical and Biological Terrorism Jan. 30-Feb. 4 in Buellton, Calif. The conference brought together public and private sectors to discuss what has worked, where problems are now and may appear in the future, and what needs more attention in responding to and preventing terrorism. The goal was to move toward a better "systems approach" to defense.

The Stanford participants were Margaret E. Kosal, a science fellow at the Center for International Security and Cooperation (CISAC) with a doctorate in chemistry; Steven M. Block, a professor of applied physics and of biological sciences and senior fellow, by courtesy, at the Stanford Institute for International Studies; and Mark A. Musen, a professor of medicine (medical informatics) and, by courtesy, of computer science.

The conference included discussions of public health surveillance and response, food supply vulnerabilities and agricultural security, forensics of biological and chemical evidence, and the changing nature of the threat environment.

Both biological and chemical terrorist attacks have the potential to cause a large number of causalities and overwhelm medical capabilities, or "surge capacity." The nation's terrorism defense plans focus on mass-effect bioterrorism--events with the potential to infect tens of thousands and kill more than a thousand. But those plans may not effectively counter small-scale biological or chemical attacks, much less nuclear or radiological attacks, Kosal asserted.

Musen spoke about the computational problems of automating surveillance for possible bioterrorism using "prediagnostic" indicators that become available even before health-care workers can identify a specific epidemic.

"There is enormous enthusiasm--and enormous spending--for combining databases of over-the-counter drug sales, absenteeism records, 911 calls and admitting diagnoses to emergency rooms and clinics," he said. "There has been virtually no empirical evaluation of any of these efforts, despite all the excitement."

Musen discussed difficulties computers have making sense of high-volume, low-signal data streams, including basic problems with the way that the data typically are represented, difficulties of integrating disparate data sources and uncertainty in how to present the results of computational analyses to public-health officials in an optimal way.

"Although there is enormous political pressure to be 'doing something' to monitor for bioterrorism, it's also important to take a step back and to engage in the research needed to determine what we really should be doing," Musen said.

Chemical threats are underestimated

The focus on bioterror threats may miss a more frequent occurrence--chemical attacks. In a presentation titled "The Shifting Face of Chemical Terrorism: Assessing an Emerging Threat," Kosal examined the growing trend of non-state actors to use improvised chemical devices (ICDs) that may include choking and blistering agents.

"The path from the 'street chemistry' of improvised explosive devices [IEDs] to ICDs incorporating commercial chemicals is very short, whereas the path from IEDs to transgenic biological agents effectively weaponized is a substantial leap for states and even more so for terrorists," Kosal said. "While U.S. policy is focused on defending against a mass-effect bioterrorism attack, we may be missing a lower-tech threat of much higher probability."

Half of the U.S. fatalities in Iraq have been due to IEDs, typically roadside bombs, Kosal said. "This strongly suggests there is a substantial tacit knowledge base and readily available materials for constructing these types of weapons--one guy has not been making them all in a Mosul garage." While incorporating chemicals into roadside bombs would not dramatically increase military casualties, incorporating them in devices employed in enclosed spaces could, Kosal said.

An analysis of terrorism between 1910 and 2003 from open-source information shows the lion's share of 265 terrorist attacks--76 percent--were chemical. Only 17 percent were biological, 0 percent nuclear (involving fissile material, such as that powering an atomic bomb) and 7 percent radiological (involving radioactive elements that cannot be used for fission or that contain less than a critical mass of fissionable material, such as those employed in "dirty bombs").

It used to be that the major threat of chemical weapons came from state-based programs. Chlorine and mustard gases were used extensively in World War I, for example. The United States and the former Soviet Union amassed stockpiles exceeding 40,000 tons, which are still being destroyed. International efforts to control the exchange of certain chemicals, such as precursors for nerve and blister agents, have been effective. Kosal cited the refusal in the 1980s during the Iran-Iraq war of the world community to sell Iraq the key precursor to mustard gas.

Nowadays, terrorists both foreign and domestic may disperse traditional chemical warfare agents using improvised methods. In 1995, for example, the Aum Shinrikyo group crudely dispersed a nerve agent in a Tokyo subway--killing 12 and panicking thousands--using umbrellas to puncture 11 garbage bags, each filled with a common solvent and about a pound of sarin. Today's chemical weapons may just as likely come from common commercial sources, such as agrochemicals. Radical Islamists have even attempted to weaponize a research chemical, osmium tetroxide, used to prepare biological specimens for electron microscopy.

In contrast with nuclear or mass-effect biological weapons, chemical weapons may not require sophisticated knowledge to produce. In 2003 at a rented storage space in Tyler, Texas, government agents seized half a million rounds of ammunition, more than 60 pipe bombs, remote-controlled bombs disguised as briefcases, pamphlets on how to make chemical weapons and improvised hydrogen cyanide dispersal devices hypothetically capable of killing thousands in a minute. The stockpiler, William J. Krar, described as a white supremacist and anti-government extremist, was sentenced to 11 years in federal prison. His specific objectives remain unknown to authorities.

Kosal said terrorists do not appear to be concocting new chemicals; they're co-opting existing ones. "Chemical terrorism is likely to be a crime of opportunity and familiarity with chemicals and chemistry," Kosal said. "Perhaps the basic knowledge and materials--commercial dual-use chemicals in this instance--are too globally widespread to justify efforts to control the capability of terrorists to co-opt them for malfeasant uses. . . . The best threat-reduction policy may be to reduce the motivation.

"Much of the academic and policy dialogue segregates the folks discussing motivation from the folks discussing capacity and vulnerability. The former tend to be historians and social scientists and the latter, biologists, chemists and physicists. It may prove that decreasing terrorist motivation is unfeasible in the near term, but here is an example where those with the technical knowledge and those with the social science knowledge need to be working cooperatively, the type of interaction that the CISAC Science Fellows program fosters," Kosal said.

Ten thousand fingers on the bioterror "button"

Block's talk focused on the growing threat of bioterror. While chemicals have killed more people to date than have biological weapons, future biological attacks using infectious, untreatable pathogens have the potential to kill more people than chemicals. Block wryly called such biological attacks "the gift that keeps on giving."

Block said post-9/11 restrictions aimed at keeping pathogens out of the wrong hands have backfired. One is the Department of Health and Human Services' "Select Agent Rule," which establishes requirements regarding possession and use in the United States, receipt from outside the United States and transfer within the United States of a particular list of agents and toxins.

"We're shooting ourselves in the foot," Block said. "We've made it so hard to work on these pathogens that even our so-called 'A-Team' can't do research with them." World-renowned plague researcher Stanley Falkow of Stanford and famed anthrax expert John Collier of Harvard have stopped working on live pathogens because of restrictive effects of recent legislation, according to Block. They now confine their research to a handful of cloned genes. "It's almost impossible to hire grad students or postdocs to work on Select Agents. Such research has been driven underground or into our national labs, which historically have not had the biological expertise found in the top academic labs and biotech companies."

Much of our response to bioterror threats is based on how we've historically responded to nuclear terror threats, Block said. "With nuclear weapons, only two things can be made to go 'boom'--plutonium and highly enriched uranium," he said. That made it comparatively easy to track and control materials, and to get a handle on the problem. "We tried to keep nuclear secrets secret. Not everyone knows how to make an atomic bomb."

In contrast, the genie has long been out of the bottle when it comes to biological agents. Virtually all research is reported in the open literature. "Even if we were to stop publishing everything now, there'd be enough public information to keep bioterrorists busy for at least another 50 years," he said.

"Back in the nuclear age, only a few countries were nuclear powers, and only a few people were authorized to have their 'fingers on the button,'" Block said. "Like them or not, they were responsible people. Contrast that with a world where genetically engineered weapons can be produced by, say, 10,000 people. Someone is guaranteed to press that button. We can't stop [bioterror acts] at the source any more than we can stop a computer virus at the source."

Rather than futilely attempting to thwart biological threats at their sources, which are ubiquitous, Block advocated shoring up the public health system so it can respond nimbly once threat turns to reality. A new generation of antitoxin, antiviral and antibacterial agents may mitigate ill effects, and improved vaccines may prevent damage altogether. "We need to work the problem from the other direction," he said. "To confine our attention to Select Agents alone is essentially putting on blinders. The future threats we may face may bear little relation to the organisms on the current list."

All News button
1
Subscribe to Security