Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

A Conference report of the Center for International Security and Arms Control. This conference report contains papers presented at a symposium sponsored by the Institute of Far Eastern Studies (IFES) of the Soviet Academy of Sciences and the International Strategic Institute at Stanford (ISIS) at Alma-Ata, Kazakhstan, June 21-30, 1988.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Paragraphs

Robert Axelrod's The Evolution of Cooperation has been widely acclaimed in the few years since its publication. Given its promise for promoting cooperation in ‘prisoner's dilemma games' (PDGs), such praise is unsurprising. The purpose of this paper is to consider whether the tit-for-tat (TFT) strategy Axelrod recommends for achieving an evolution of cooperation in PD situations has application to the negotiation of arms control treaties.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Arms Control Today
Authors
Paragraphs

The Korean Peninsula is one of the areas of acute political instability and conflict in the Asian-Pacific region. This is partly but not exclusively because of the unsettled problems between the two parts of Korea. The international environment could be more conducive to an inter-Korean dialogue, to national reconciliation, and to reunification. Without interfering in the internal affairs of the Korean nation, the United States and the Soviet Union, and other major powers of the region, could create more-favorable conditions settling the Korean problem, understanding always that the principal aspects of the problem are internal and must be solved by the two Korean states themselves.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Paragraphs

It is the American view that Japan has been totally dependent on the United States for its national security, and that this favorable condition has enabled the Japanese to dedicate themselves fully to economic development with no significant military burden. The competitive edge of many U.S. industries, including those of steel, shipbuilding, electrical appliances, motorcycles, office equipment, automobiles, and computers, has eroded considerably since the 1960s, and Japan has taken all the blame for the downfall. The U.S. semiconductor industry is on the verge of falling behind because of aggressive Japanese sales policies.  Moreover, Japan has for years protected its domestic industries so the U.S. industries have struggled in vain to penetrate the Japanese market.  Some U.S. critics argue that the disputes over a huge trade imbalance between the two countries can best be explained by these unfair Japanese advantages. The invisibility of the role of Japanese contribution toward western security has also intensified irritation in the U.S. Congress. The recent controversy over the FS-X (fighter supporter) project of the Japanese Air Self-Defense Force (JASDF) evolved out of these circumstances. The details of and epilogue to this controversy are discussed in this paper.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

The neutron bomb is a controversial weapon. Indeed, the public disclosure by the United States of its development in 1977 has provoked sharp and widespread debate that is likely to continue in the future. Although the United States has manufactured and stockpiled neutron bombs, in order to mollify public opposition in Europe it announced in 1981 that these weapons would not be deployed overseas at that time. France has developed and tested a neutron bomb successfully, but it has not yet decided whether to produce and deploy it. The Soviet Union claims that, although it has tested a neutron bomb, it has never started production of that weapon.

What about China? There is little information about the neutron bomb in open literature, yet Chinese Defense Minister Zhang Aiping said recently at a memorial service for China's leading nuclear scientist, Deng Jiaxian, that Deng made important contributions to the theory of atomic and hydrogen bombs and their successful testing as well as major breakthroughs in the principles of new nuclear weapons and their research and testing. What kind of new nuclear weapons? Do they include the neutron bomb? Minister Zhang Aiping did not mention this weapon. Maybe China is not developing the neutron bomb now, but at least we can say that China, as a nuclear country, has the ability to develop it and is interested in it. Does China need neutron bombs? This report reviews U.S. and French plans for deployment of the neutron bomb and, further, evaluates the practicality of neutron bombs for China from the perspective of China's politics, strategy, geography, and technical and economic capabilities.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-20-6
Paragraphs

The U.S. Navy's New Maritime Strategy addresses the navy's role in a nonnuclear U.S.-Soviet conflict in Europe. Rather than protecting the North Atlantic sea-lanes by bottling up the Soviet Navy, it proposes that U.S. naval forces move aggressively into the waters near the Soviet Union and seek out and destroy Soviet warships. In particular, the strategy explicitly calls for destroying Soviet nuclear-powered attack and ballistic-missile submarines (SSNs and SSBNs). It posits that the threat to the SSBNs would accomplish two goals. The first is that the Soviets would not surge their SSNs out into the Atlantic to contest U.S. control of the seas but because of the threat would stay back and protect their highly valued SSBNs. The second is that attrition of their SSBNs by U.S. attack would decrease the incentive for the Soviets to go nuclear in the European war, since the balance of forces would shift to the U.S. side. Much debate has been provoked by the prospects of this strategy's leading instead to nuclear escalation.

Congress is being told that the proposed 600-ship navy is the minimum needed to carry out this mission. The strategy is the justification for both the number and the types of ships that are in the shipbuilding program. This program includes a new class of attack submarines, called the Seawolf, which will cost about $1 billion each and are described as the counter to the increasingly quiet Soviet submarines.

This study examines whether the force structure that is being proposed has a reasonable chance of success. lt explores whether modest changes in the building program can make a significant change in the outcome and considers possible alternative approaches.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Number
0-935371-19-2
Paragraphs

The expected degree of compliance with agreements or treaties under negotiation must be inferred from the record of the past as well as from the expectations that are raised by the willingness of the parties to dedicate increased resources to verification, to accept more-intrusive inspections, to exhibit greater openness, and to provide for cooperative verification measures.  Yet such expectations for compliance must be tempered by the recognition of fundamental factors, which are discussed.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

ABOUT THE BOOK

We have seen in recent hijackings and other hostage-takings that the mightiest military machine in the world can be tied down like Gulliver. What would happen if tomorrow's Lilliputians had an atomic bomb, or used other means to cause nuclear violence? Preventing Nuclear Terrorism is an insightful and provocative book that provides early warning of a threat that must be stopped from materializing at all costs. It points the way to avoiding a situation in which the world order, not just our nation, would be placed at risk. It warrants close scrutiny.
- Representative Richard Gephardt
Chairman, House Democratic Caucus

The old adage about an ounce of prevention being worth a pound of cure aptly describes the basic thrust of this valuable book. The book begins with a distinguished and balanced International Task Force of experts concluding that 'the probability of nuclear terrorism is increasing' and warning that 'the fact that so far there has been no serious act of nuclear terrorism is no reason for complacency.' The Task Force report is followed by 26 studies that provide valuable insight and perspective into all aspects of a world-threatening problem. This is a unique body of work that offers a realistic and urgently needed roadmap for steering clear of nuclear terrorism.
- Senator Sam Nunn
Chairman, Senate Armed Services Committee

There is no greater challenge to the entire world than the prevention of a detonation, accidental or otherwise, of even a single nuclear weapon. Preventing Nuclear Terrorism makes a unique and valued contribution toward that end. It should be widely read, discussed, and acted upon.
- Senator John W. Warner
Secretary of the Navy, 1972-74

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Lexington Books in "Preventing Nuclear Terrorism", Paul Leventhal and Yonah Alexander ed.
Authors
Subscribe to Security