Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

The nuclear nonproliferation regime was challenged in 1998 by nuclear-weapon tests in India and Pakistan, by medium-range missile tests in those countries and in Iran and North Korea, by Iraq's defiance of UN Security Council resolutions requiring it to complete its disclosure of efforts to acquire weapons of mass destruction, and by the combination of "loose nukes" and economic collapse in Russia. Additional threats to the regime's vitality came in 1999 from the erosion of American relations with both China and Russia that resulted from NATO's 1999 bombing of Yugoslavia--with additional harm to relations with China resulting from U.S. accusations of Chinese nuclear espionage and Taiwan's announcement that it was a state separate from China despite its earlier acceptance of a U.S.-Chinese "one China" agreement. Major threats to the regime also came from the continued stalemate on arms-control treaties in the Russian Duma and the U.S. Senate, from a change in U.S. policy to favor building a national defense against missile attack, and from a Russian decision to develop a new generation of small tactical nuclear weapons for defense against conventional attack.

This paper will discuss the effect some of these developments had on the 1999 Preparatory Committee (PrepCom) meeting of Non-Proliferation Treaty (NPT) parties to prepare for review of the NPT in 2000, and speculate about their likely future effect on the regime.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

This article addresses two central questions: First, why have Chinese efforts over the last half century to create a modern air force failed? Second, what lessons have the Chinese gleaned from these failures? Based on their findings, the authors conclude that China's air force has moved away from a strategy based on "active defense" and no first strike, adopting along the way Western notions of the role of air power in combat.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
International Security
Authors
Paragraphs

The Soviet Union placed a high priority on science and technology and built a huge assembly of research institutes, educational programs, design bureaus, and production enterprises embodying some measure of science and/or technology. This assembly concentrated overwhelmingly on military applications. Approximately three-quarters of this complex was located in Russia, but essential elements of many programs were located in other republics.

Starting in the Gorbachev regime there was a recognition that the economy was deteriorating and that it was necessary to reduce military expenditures and increase the civilian economy. A major element of this has been the attempt to direct a much greater effort toward the development of commercial products and services based upon technologies and skills developed in the military-industrial complex (MIC). This commercialization of Soviet and Russian military technology has been attempted by the Russians both independently, through conversion programs, and in cooperation with foreign partners. The conversion programs have had very limited success. The success of attempts at cooperative commercialization by U.S. companies and Russian enterprises have also been modest, but they illustrate workable models that could be utilized by other cooperative ventures. These cooperative commercialization ventures are the primary subject of this report.

This research is based primarily on the study of several cases of cooperative attempts by U.S. companies and Russian enterprises to commercialize Russian technology. Additional information has been gathered through participation in workshops and conferences including sessions or presentations on technology commercialization. There is no attempt to determine the total amount of such activity, but foreign investment of all types in Russia has been very small. These cases may not be representative of what is going on at many defense enterprises, especially those that do not have foreign partners. They do, however, show models of what can be achieved, as well as some of the problems encountered in technology commercialization.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-53-2
Paragraphs

The decade of the 1990s has seen renewed concerns over nuclear proliferation, both horizontal and vertical. While many in the arms control community focus on numbers, it is control that is the most important factor--the detonation of just one nuclear weapon would be an international catastrophe. Rather than concentrating on numbers, the regime defined herein centers on enhancing the safety and security being provided nuclear weapons and weapons-usable fissile materials. The proposal in the paper is called the Nuclear Weapons Control Treaty (NWCT) and referred to as New Court. The emphasis is on control rather than disarmament, protection from unintended or unauthorized use rather than elimination. New Court, once in place, would provide an environment in which the necessary audits and accountability for undertaking dramatic reductions in the numbers of weapons and the quantities of weapons-usable materials could be made with much greater confidence than exists today. However, it will be decades (if ever) before the number of nuclear weapons goes to zero. In the meantime, it is paramount that comprehensive safety and security be established and maintained.

There are currently more than a thousand metric tons of civilian fuel cycle plutonium, mostly in spent fuel rods, but hundreds of tons are already separated and in storage. Any of this plutonium could be fashioned into a nuclear explosive. There are no practical approaches for disposing of plutonium in periods of time less than decades. Much of the architecture and technology from New Court can be applied to the development of international monitored storage facilities (IMSF) for civil nuclear material. The paper outlines the five key requirements an international depository must satisfy: national security for the depositors and the host nation; safety and security of the material; transparency of operations; technology transfer to provide uniform global protection; and precise accurate accountability of the quantities and forms of material deposited. The synergism and conflict among the factors is briefly described. The paper also contains annexes on the current status of some key monitoring technologies and a description of an international "stored weapons standard" for protecting weapons-usable fissile material.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-55-9
Paragraphs

The end of the Cold War left the United States in the fortunate position of facing no imminent threat of global war. But it also left the United States in a strategic vacuum, with no organizing principle for its national security. This book proposes a security strategy for the 21st century based on preventing new major threats to U.S. security from emerging.

Informed by the authors' service in the Pentagon during President Clinton's first term, this book identifies six major dangers to U.S. security that have the potential to grow into threats to American interests and values as ominous as the Cold War's nuclear standoff. In chapters that cover chilling dangers ranging from Russia's implosion to the rising power of China, and from proliferation of biological weapons to cyber terrorism, the authors first recount from first hand experience the Pentagon's efforts to define and prevent dangers to U.S. security since the end of the Cold War, and then advance preventive defense strategies for the future. It argues that implementing a Preventive Defense strategy will require a revolution in the way the Pentagon does business -- a revolution that is only beginning.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press
Authors
William J. Perry
Number
0-8157-1308-8
Paragraphs

The Twenty-fifth Amendment to the Constitution evolved as a response to the need to relieve a sick and disabled president fromthe responsibilities of office, in the best interests of both the sick president and the nation. The congressional hearings that preceded and accompanied its enactment made clear that some members of Congress understood the need for objective medical information to be available to the vice president andCabinet before they couldmake the political determination of disability.Nevertheless, not a single physician was called to testify or advise in the Senate or the House despite the fact that they represent the only societal repository of expertise on physical and mental impairment. Nor was any mechanism defined whereby a dispassionate medical appraisal of the cognitive competence of the president could be obtained if it were in question. Instead, there was an implicit reliance on the physician to the president, whose conflict of interest is so strong that he or she has been used in the past more to conceal than to reveal the true state of the president’s health. The Twenty-fifth Amendment remains a vital mechanism for ensuring the stability of the presidency. But its disability provisions (sections 3 and 4) have not been implemented as the framers intended. Sooner or later, the nation will be confronted with a president who has Alzheimer’s disease, brain trauma, or illness such that his cognitive faculties are not up to the demands of office. A powerful antidote to the White House cover-ups of the past would be a medical advisory committee on the health of the president, created by congressional action. The committee would review the president’s health annually and report to the nation on its significant findings; it also would be convened urgently to assess his health status whenever it was in serious question. It would then advise the vice president and Cabinet of the degree of presidential impairment to provide a scientific medical foundation for the political decision as to the presence or absence of disability. The independence, breadth of expertise, lack of conflict of interest, availability, and credibility of the committee would assure the public of an objective appraisal and would preclude inaction by the executive branch in the face of disability. The arguments against such an advisory committee—that physicians would decide rather than advise; that they might disagree; that they might harass the president or violate confidentiality; and that the committee is unnecessary,would function poorly,
could not assemble quickly, and would infringe on the separation of powers doctrine —have been carefully analyzed and been found wanting. Because the advantages of establishing a medical advisory committee are compelling, it should be the subject of congressional action before, rather than after, the next medical cover-up in the White
House and the accompanying public crisis of confidence.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Presidential Studies Quarterly
Authors
Paragraphs

This report and the conference it is based on are motivated by the sharp debate stemming from NATO's decision at Madrid to invite three new members to join its ranks. This debate is not partisan: it cleaves parties. It is profound because it has kindled the first truly geostrategic inquiry among Americans in the post-Cold War era. This inquiry has led Americans to advance from celebrating the end of the Cold War to confronting the design of Eurasia's future security system and America's role in it.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
The Stanford-Harvard Preventive Defense Project
Authors
Coit D. Blacker
William J. Perry
Paragraphs

The Revolution in Business Affairs (RBA) is an effort to improve the overall effectiveness of the Department of Defense (DOD) by increasing the efficiency of its support operations. Waste and inefficiency within the DOD represent a major internal threat - an "enemy within" -- that, by drawing money away from needed modernization, could steadily erode our ability to meet the challenges of the post-Cold War era. The RBA seeks to change the way DOD does business.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
The Stanford-Harvard Preventive Defense Project
Authors
Paragraphs

The Cross-Industry Working Team (XIWT), with the support of Stanford University Consortium for Research on Information Security and Policy (CRISP), sponsored a symposium on cross-industry activities aimed at improving the reliability, dependability, and robustness of the information infrastructure. The purpose of this meeting was to identify the steps required to get to a reliable and dependable information infrastructure serving the needs of society. The emphasis in the meeting was on cross-industry and potentially cross-sector (government, industry, and academia) activities to accomplish that goal. The symposium dealt with the following generic topics: organizational activities to identify and pursue critical issues, issues in data transport and communications, issues in applications and services, and potential research and development activities.

The presentations and discussions of the meeting identified several potential cross-industry activities that could further the effort toward a more reliable and trustworthy information infrastructure. These activities fell into four general categories:

  • Information Exchange Activities
  • Consensus Activities
  • Collaborative Operational Activities
  • Collaborative R&D Activities

Two specific activities were discussed in some detail.

Government Sharing of Best Practices

It was observed that many of the government agencies have undertaken extensive efforts to improve the trustworthiness of their information systems, enabling them to withstand both failures and attacks. There is an opportunity for these agencies to be exemplars for the community— sharing what they have learned in the process of trying to make their systems more robust. This was felt to be an example of how the government and industry could work together to improve the trustworthiness of the overall information infrastructure.

Collaborative Experimental Environments

A potentially very productive collaborative R&D activity was discussed, involving industry, academia, and government. Universities and university consortia are investigating new techniques for building reliable systems of unreliable components, and for dealing with large complex systems. There is a need to evaluate, validate, and assimilate such research results into the industry environment. To that end, a collaborative, multi-industry experimental environment was discussed. This environment, distributed across multiple organizations, could provide such an evaluation, validation, and assimilation opportunity.

A number of other potential cross-industry activities were also mentioned throughout the meeting, and are discussed briefly in the proceedings.

Attendees agreed (based on a follow-up survey and informal comments) that the symposium was well worthwhile, and that continued dialogue is important to achieving the shared goal of a trustworthy information infrastructure. XIWT plans on helping foster such dialogue as well as collaborative activities toward that goal.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

Dr. Lapidus summarizes factors, both domestic and international, pushing for and against regional separatism from the Russian Federation. Attention then turns to factors influencing the further devolution of authority from central to regional officials. A typology is offered of types of issues animating conflict in center-periphery relations. The article then discusses the impact of the August 1998 crisis on these trends and on prospects for the future.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Post-Soviet Affairs (formerly Soviet Economy). Article republished in "Federalism in Russia" by Kazan Inst of Federalism, Tatarstan, 2002
Authors
Gail W. Lapidus
Subscribe to Security