Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend a comprehensive national policy and implementation strategy for protecting those infrastructures from physical and cyber threats, and to propose statutory or regulatory actions to effect the recommended remedies. The charter gives examples of critical infrastructures (telecommunications, electrical power systems, gas and oil storage and transportation, banking and finance, transportation, water supply systems, emergency services, and continuity of government), and also notes the types of cyber threats of concern (electronic, radio-frequency, or computer-based attacks on the information or communications components that control critical infrastructures).

Some of the critical infrastructures are owned or controlled by the government, and hence the government can, in principle, harden and restructure these systems and control access to achieve a greater degree of robustness. However, the President's executive order recognizes that many of the critical infrastructures are developed, owned, operated, or used by the private sector and that government and private sector cooperation will be required to define acceptable measures for the adequate protection and assurance of continued operation of these infrastructures.

The Stanford Center for International Security and Arms Control (CISAC), as part of its ongoing Program on Information Technology and National Security, and the Center for Global Security Research (CGSR) of the Lawrence Livermore National Laboratory (LLNL) are conducting workshops to examine many of the issues connected with the work of the Commission. In addition to the questions of vulnerabilities, threats, and possible remedies, we discuss the impact on the marketplace of possible protective actions, cost in terms of capital and functionality, legal constraints, and the probable need for international cooperation.

The first of these jointly sponsored workshops was held March 10-11, 1997, and included participation by members and staff of the Presidential Commission; the Stanford community; the information technology industry; and by security specialists at infrastructure organizations, research companies, and the national laboratories. The results of this two-day meeting are summarized in the following report.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-47-8
Paragraphs

This paper focuses on the impact of a comprehensive test ban on China's nuclear program and security policy. After a general review of China's nuclear doctrine and development, the study analyzes the relationship between China's nuclear strategy and its desire for testing, and explores the reasons China decided to join the Comprehensive Test Ban Treaty. By comparing the maturity of the nuclear programs of the nuclear states and the degree of their preparations for a cessation of nuclear tests, this paper concludes that a comprehensive test ban would place greater constraints on China's nuclear program than on those of the others. Efforts such as a deeper reduction of the nuclear arsenals of the principal nuclear powers, a no-first-use commitment by all nuclear states, and the adherence to the ABM treaty by its signatories would be critical to reducing China's concerns. The progress of international arms control negotiations in the above directions would further encourage China to make even greater contributions in the field of global arms control in the post-comprehensive test ban era.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

"Claim-Making and Large-Scale Historical Processes in the Late Twentieth Century," held March 7-9, 1997, at Stanford University, was an experimental workshop to preview the dimensions on the eve of the twenty-first century that the MacArthur Foundation Consortiumon Challenges to the Study of International Peace and Cooperation, will explore over the next three years: war and institutions of violence; globalization; society and the ecosphere; and identity and social power. The idea was to examine these dimensions as large structural macro-historical processes and also to look at how these processes are immanent in the political and cultural claims made by contending actors. All of the workshop panels brought out issues of several dimensions. The first panel, on Globalization and Social Claims, looked at processes of globalization and also at society and the ecosphere. The second panel, State Formation and Claim-Making, focused on the dimensions of war and institutions of violence and also identity and social power. The third panel, Identities and Social Power, was on that dimension, largely in the context of globalization. The fourth panel, a roundtable on Claims to Sovereignty in the Former Soviet Union, was most related to the dimension of war and institutions of violence.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

By the end of 1995, China had built the world's ten largest telecommunications networks and the industry was growing at a faster rate than any other sector of the booming Chinese economy. For example, the country's 40 million telephone subscribers with 50 million telephone numbers represented an average annual growth rate of nearly 100 percent over a ten-year period. Internet users served by ChinaNet jumped from 6,000 in 1995 to 53,739 in March 1997. Progress was qualitative as well, as China procured state-of-the-art fiber-optic and satellite technologies and narrowed the gap between itself and the United States and between its own urban and rural areas. The achievement can be attributed to the government's commitment to telecommunications as the key to further development--a commitment backed by preferential policies; to foreign financial and technical support; and to changing attitudes of the Chinese people themselves.

However, China faces some major problems. The gap in living standards between coastal and interior provinces is widening, as people migrate from poor villages to increasingly affluent cities. The government must focus more on developing isolated regions. Rapid development of telecommunications cannot be sustained under a government monopoly, which aids the government's economic and security interests but discourages foreign companies from investing and transferring technology. At the same time, there has been little headway in developing domestic telecommunications products. Management of the industry is chaotic in the absence of clear regulations, and a multilayered bureaucracy encourages wasted resources, duplication, red tape, and corruption. Political problems are likely to emerge as telecommunications continues to help open Chinese society and young Chinese come to embrace Western industrial culture.

Nevertheless, China is destined to become and remain the world's "super market" as long as it remains politically stable in its transition from a plannned to a market economy. Telecommunications will continue to play a key role during this transition.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

The discussion begins with a conceptual framework for addressing the protection of infrastructure systems subject to attacks on their information subsystems. This includes treating the types of infrastructure systems, possible strategies for their protection, and the nature and scale of the attack. Three components of a protection strategy are identified: preventing attacks, limiting the damage in an attack, and ensuring rapid reconstitution of the target system following an attack. The paper concludes with a discussion of public and private responsibilities for infrastructure protection and the identification of a number of areas where public initiatives might be effective. These are ordered roughly in terms of the cost and difficulty of implementation. In addressing the subject, the analysis is from the perspective of minimizing government intervention in privately owned infrastructure systems.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

The author concludes that strategy posited on the unchanging character of the differences that have separated Russia and the West is a self-fulfilling prophecy. The trouble with a status quo strategy is that it offers no vision of the opportunities available to construct a
security system in which power is constrained not just by countervailing power but by the exercise of democratic control over national decisions. Security in Europe is not just a question of military limitations and reductions. The essence of European security and the key to achieving a stable peace lies in the process of creating an inclusive community of
democratic nations.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

Late last year, we noted the tenth anniversary of what was probably the most remarkable of all the meetings between an American president and his Soviet counterpart, the Reykjavik Summit of October 1986. History has shown that Reykjavik was a true turning point. Three major treaties between the United States and the Soviet Union were negotiated by the end of 1992; they resulted in substantially reduced levels of nuclear weapons. That happened as the Cold War was ending and, as the Russians say, it was no coincidence. A dramatic change in the relationship between the Soviet Union and the United States made it possible. A readiness, both in Washington and in Moscow, to open a new chapter in their relationship prepared the way.

The world has moved on. The Soviet Union no longer exists. But can we say that the world has been freed from the incessant and pervasive fear of nuclear devastation? Not yet, as this report will show. Persuading three newly independent states to eliminate the nuclear weapons they inherited in the collapse of the Soviet Union was a major achievement. Cooperating with Russia to tighten controls over fissile materials has made a real difference in terms of international security. But illicit trafficking in nuclear materials is still a potential problem and this has happened just as a more brutal form of terrorism, more willing to engage in mass murder, has made its appearance. This threat requires a wide spectrum of responses, but at the heart of it is the need for strict controls over nuclear weapons and fissile materials from the laboratory to the missile silo and every point in between.

The idea of a safer strategic environment involving progressively less reliance on nuclear weapons is still valid and must be pursued. Abolishing nuclear weapons is a feat beyond our present capacity to achieve, but we can go much further than we have to date in eliminating these weapons. The recent U.S.-Russian summit meeting in Helsinki made a start in that direction.

The American relationship with Russia is one among many that require careful tending. It is one of the few that can be said to be vital. We can reduce the salience of nuclear weapons in the Russian-American relationship and that would open the door to many opportunities now denied us.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
CISAC
Authors
William J. Perry
Paragraphs

Global concerns over illicit trafficking in nuclear materials intensified in the 1990s. Some
countermeasures were taken, including steps involving the IAEA. But greater international cooperation, and higher standards of physical protection, may be needed to guard against the chance that weapons-grade material might fall into the wrong hands. This viewpoint article — based on a presentation to the IAEA’s International Conference on Physical
Protection in November 1997 — advocates steps to raise global standards, and to have them monitored internationally.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
IAEA Bulletin
Authors
Paragraphs

As a result of the rapid changes following the breakup of the Soviet bloc, there were suddenly new markets of hundreds of millions of people, covering a large portion of the earth, containing large fractions of many of the world's natural resources, possessing extensive research and production capacity, with a highly educated workforce, and utilizing many advanced technologies. Russia contained a large fraction of these factors, especially those oriented toward high technology, and hence it behooves international companies to formulate and implement strategies for doing business in Russia.

This particular study was undertaken because the quest for cooperative ventures has been a major portion of the strategy of many Russian defense enterprises and U.S. companies in addressing these changes. We deemed it important to gain a better understanding of the factors affecting companies' and enterprises' decisions regarding cooperative ventures and some of the determinants of success, as well as to analyze strategies for U.S. companies and Russian enterprises contemplating or participating in cooperative ventures.

The conclusions in this report are based on case-study interviews with companies and enterprises engaged in cooperative ventures. All of the Russian enterprises in our study, with the exception of some start-ups, had been heavily involved in military work; the American companies were from both the military and civilian sectors.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-45-1
Subscribe to Security