Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

-

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea, Iran and Russia, and will assess President Trump’s relations with the U.S. intelligence community. 

About the Speaker: General Michael Hayden is a retired four-star general who served as director of the Central Intelligence Agency and the National Security Agency when the course of world events was changing at a rapid rate. As head of the country’s premier intelligence agencies, he was on the frontline of global change, the war on terrorism and the growing cyber challenge. He understands the dangers, risks, and potential rewards of the political, economic, and security situations facing us. General Hayden dissects political situations in hot spots around the world, analyzing the tumultuous global environment and what it all means for Americans and America’s interests. He speaks on the delicate balance between liberty and security in intelligence work, as well the potential benefits and dangers associated with the cyber domain. As the former head of two multi-billion dollar enterprises, he can also address the challenges of managing complex organizations in times of stress and risk, and the need to develop effective internal and external communications.

In addition to leading CIA and NSA, General Hayden was the country’s first principal deputy director of national intelligence and the highest-ranking military intelligence officer in the country.  In all of these jobs, he worked to put a human face on American intelligence, explaining to the American people the role of espionage in protecting both American security and American liberty.  Hayden also served as commander of the Air Intelligence Agency and Director of the Joint Command and Control Warfare Center and served in senior staff positions at the Pentagon, at U.S. European Command, at the National Security Council, and the U.S. Embassy in Bulgaria. He was also the deputy chief of staff for the United Nations Command and U.S. Forces in South Korea.

Hayden has been a frequent expert and commentator on major news outlets and in top publications, valued for his expertise on intelligence matters like cyber security, government surveillance, geopolitics, and more. He was featured in the HBO documentary Manhunt, which looked at espionage through the eyes of the insiders who led the secret war against Osama bin Laden, and in Showtime’s The Spymasters, a detailed look at the directors of the Central Intelligence Agency.

Hayden is currently a principal at the Chertoff Group and a distinguished visiting professor at the George Mason University Schar School of Policy and Government. He is on the board of directors of Motorola Solutions and serves on a variety of other boards and consultancies. In 2013, the Intelligence and National Security Alliance (INSA) awarded Hayden the 29th annual William Oliver Baker Award.  General Hayden is also the first recipient of the Helms Award presented by the CIA Officers’ Memorial Foundation.  In 2014 he was the inaugural Humanitas visiting professor in intelligence studies at Oxford University in the United Kingdom.  His recent memoir, Playing to the Edge: American Intelligence in the Age of Terror, has been a New York Times best-seller and was recently selected as one of the 100 most notable books of 2016.

Philip Taubman is Adjunct Professor at the Center for International Security and Cooperation. He is also the former Moscow and Washington Bureau Chief, and Deputy Editorial Page Editor, of The New York Times. Philip Taubman served as a reporter and editor at The New York Times for thirty years, specializing in national security coverage. He is author of Secret Empire: Eisenhower, the CIA, and the Hidden Story of America’s Space Espionage, and The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb. He is working on a biography of George P. Shultz, the former secretary of state.

Michael Hayden Former director, CIA, NSA
Seminars
Authors
News Type
News
Date
Paragraphs

While the United States has no peers in conventional military power, it is especially vulnerable – as a free and democratic society – to cyber misinformation campaigns, a Stanford scholar says.

Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation (CISAC), is the co-author of a new draft working paper that spells out the perilous risks facing democratic, wired-up countries around the world.

America’s adversaries are seeking “asymmetric” methods for social disruption, rather than direct military conflict, Lin said.

“Cyber warfare is one asymmetric counter to Western (and especially U.S.) military advantages that depend on the use of cyberspace,” wrote Lin and his co-author Jackie Kerr, a research fellow at the Lawrence Livermore National Laboratory.

This new type of cyber aggression is aimed at winning – and confusing – hearts and minds, the very control centers of human existence, Lin said.

As a result, “information/influence warfare and manipulation,” or IIWAM as Lin describes it, poses profound implications for Western democracies, even though much of it may not be illegal under international law. This approach is based on the deliberate use of information by one party on an adversary to confuse, mislead, and ultimately to influence the choices and decisions that the adversary makes.

A recent example in point would be the 2016 Russian hacking of the U.S. presidential election and the surge of so-called “fake news.”

Lin points out that while misinformation campaigns are not new, the technology to spread it far and wide globally is. He noted that the patron saint of distorting reality for war-like purposes is Sun Tzu, who wrote that, “The supreme art of war is to subdue the enemy without fighting.”

While traditional cyber attacks typically hit hard targets like computer systems, cyber “influence” campaigns are conducted over longer periods of time and rely on soft power – propaganda, persuasion, culture, social forces, confusion and deception, Lin said. 

Words and images

How does it work? Lin explains:

“Victory is achieved by A when A succeeds changing B’s political goals so that they are aligned with those of A.  But such alignment is not the result of B’s 'capitulation' or B’s loss of the ability to resist – on the contrary, B (the losing side) is openly willing.”  That is, such victory shares the focus on subverting the opponent’s will, though not on destroying his military forces.

The ammunition in these cyberspace battles are “words and images,” the kind that persuade, inform, mislead, and deceive so that the adversary cannot respond militarily. In the example of a “fake news” story, they often take place below legal thresholds of “use of force” or “armed attack,” and at least in an international legal sense, do not trigger a military response.

The target is the “adversary’s perceptions,” which reside in the “cognitive dimension of the information environment.” In other words, such cyber warfare focuses on “damaging knowledge, truth, and confidence, rather than physical or digital artifacts,” according to Lin. It is the “brain-space.”

Additionally, IIWAM injects fear, anger, anxiety, uncertainty, and doubt into the adversary’s decision making processes, he added.  Success is defined as altering such perceptions so the target makes choices favoring the aggressor.

“Sowing chaos and confusion is thus essentially operational preparation of the information battlefield – shaping actions that make the information environment more favorable for actual operations should they become necessary,” the researchers wrote.

These cyber manipulations often prey upon cognitive and emotional biases present in the psychological and mental makeup of human beings, Lin said. 

For example, media channels such as Fox News play to “confirmation bias” for individuals with a right-of-center orientation, and similarly for MSNBC for those with a left-of-center, orientation, he wrote. Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories.

Countering misinformation

“Naming and shaming” is probably ineffective against many nation states conducting cyber disinformation campaigns, Lin said. And the idea that a government like the U.S. can quickly respond to misinformation created in the private sphere is unlikely to be effective as well.

What, then, might work? Lin suggests new tactics are needed, as no existing approach seems adequate. For example, Facebook is deploying a new protocol for its users to flag questionable news sites.  Google has banned fake news web sites from using its online advertising service. Twitter, YouTube, and Facebook shut down accounts that they determine are promoting terrorist content.  He noted that a recent Facebook letter from CEO Mark Zuckerberg states that, “Our approach will focus less on banning misinformation and more on surfacing additional perspectives and information, including that fact checkers dispute an item's accuracy.”

But such measures are unlikely to stem the “rising tide of misinformation conveyed” through cyber warfare, Lin said, because they mostly require users to do additional mental work.  

Wired world riskier

Today’s Internet-driven Western world offers countless opportunities for cyber influence mischief, Lin wrote.

“Democracy has rested on an underlying foundation of an enlightened, informed populace engaging in rational debate and argument to sort out truth from fiction and half-truth in an attempt to produce the best possible policy and political outcomes,” Lin wrote.

Cyber manipulators have exploited an arguable gap between ideals and reality in democratic systems – “rendered it much more questionable” – through the tremendous reach and speed of misinformation, he said. Many countries cannot deal with the onslaught of such focused efforts. This serves to make the democratic process look weak and unstable in the eyes of its citizens. The same dynamic does not apply equally around the world.

“Cyber weapons pose a greater threat to nations that are more advanced users of information technology than to less-developed nations,” Lin wrote.

He said that less developed or authoritarian countries do not have much Internet infrastructure or that wield control over expression – North Korea is an example.

MEDIA CONTACTS

Herbert Lin, Center for International Security and Cooperation: (650) 497-8600, herbert.s.lin@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-0224, cbparker@stanford.edu

 

 

 

Hero Image
gettyimages 597931354
Stanford cybersecurity expert Herb Lin says a new brand of cyber warfare aims to destabilize Western democracies through misinformation and even changing the way people think about reality.
Getty Images/Vertigo3d
All News button
1
Authors
Anna Péczeli
News Type
News
Date
Paragraphs

Anna Péczeli, a Stanton Nuclear Security Fellow at CISAC, wrote the following op-ed for the Bulletin of the Atomic Scientists:

What does the future hold for the US nuclear posture under President Trump? The last Nuclear Posture Review occurred in April 2009, when a 12-month review process was conducted to translate President Obama’s vision into a comprehensive nuclear strategy for the next five to 10 years. The review addressed several major areas: the role of nuclear forces, policy requirements, and objectives to maintain a safe, reliable, and credible deterrence posture; the relationship between deterrence policy, targeting strategy, and arms control objectives; the role of missile defense and conventional forces in determining the role and size of the nuclear arsenal; the size and composition of delivery capabilities; the nuclear weapons complex; and finally the necessary number of active and inactive nuclear weapons stockpiles to meet the requirements of national and military strategies.

Clearly, changes are afoot. On January 27, 2017, President Trump issued a presidential memorandum that mandated “a new Nuclear Posture Review to ensure that the United States nuclear deterrent is modern, robust, flexible, resilient, ready, and appropriately tailored to deter 21st-century threats and reassure our allies.” 

Looking ahead, the new administration should conduct this review through a broad, inter-agency process, involving the State and Energy departments, and allies as well. This approach offers several valuable benefits by broadening the focus from deterrence to non-proliferation, reassurance, and nuclear security.

The main role of the Nuclear Posture Review, or NPR, is to assess the threat environment, outline nuclear deterrence policy and strategy for the next 5 to 10 years, and align the country’s nuclear forces accordingly. Since the end of the Cold War, each administration has conducted its own NPR, but the process and the scope of the reviews were different in all three cases. 

The first NPR was conducted by the Clinton administration in 1994, and even though important senior positions have still not been appointed by the Trump White House, Trump's mandate suggests that their review might use it as a template for 2017. It was a bottom-up review, initiated by the Department of Defense, mostly focusing on a set of force structure decisions—such as the right size and composition of US nuclear forces, including the size of the reserve or so-called “ hedge” force. That review lasted for 10 months, and the Pentagon was in charge of the entire process, mainly focusing on deterrence requirements. 

In contrast, the 2001 NPR of the Bush administration was mandated by Congress, and it addressed a broader set of issues, including all components of the deterrence mix—nuclear and non-nuclear offensive strike systems, active and passive defenses, and the defense infrastructure. The Defense Department took the lead in this case just as before, but this time the Energy Department and the White House were also engaged in the process. As a result, the Bush NPR’s force structure requirements—how to size and sustain the country’s forces—were driven by four factors: assuring allies, deterring aggressors, dissuading competitors, and defeating enemies. 

The Obama administration’s 2010 NPR was also mandated by Congress, but the Defense Department was specifically tasked to conduct an inter-agency review. Besides the unprecedented level of such cooperation, a bipartisan Congressional commission also laid out a number of recommendations for the review process, many of which became part of the final text of the Obama review. Officials from State, Energy, and the Joint Chiefs of Staff were involved, as well as US allies who were regularly briefed during the different stages of the review. 

In the final phase of the 2010 NPR, the White House leadership made the decisions on the actual content of the nuclear posture. While the Clinton and the Bush reviews were largely conducted behind the scenes and only short briefing materials were published on the outcome, the Obama administration released an unprecedentedly long report on its nuclear posture review. 

These cases offer two models for a review process: It can be conducted by a small group of people in the most highly classified manner, or it can be a larger, relatively transparent inter-agency process. In the former approach, the final decisions are typically presented to the secretary of defense, the president, Congress, and allies. The problem is that this tends to be a one-sided approach, putting the main focus on deterrence and modernizations. 

Though it is effective and fast, the implementation of a Nuclear Posture Review requires all stakeholders to be on board with the new strategy. One of the most painful lessons of the Bush review was that because the White House and Defense failed to explain their new approach to the public, the military, and Congress, there was effectively a loss of leadership—which made procurement extremely difficult and caused major problems in the implementation of their strategy. 

On the other hand, involving all stakeholders and providing a balanced approach to nuclear strategy would support the goals of not just deterrence, but those of reassurance, non-proliferation, and nuclear security as well. Due to the involvement of the State Department, the 2010 NPR, for example, emphasized a number of policies which supported non-proliferation objectives and strengthened US negotiating positions at global arms control forums. One of these policies was the “negative security assurance,” which stated that the United States would not use or threaten to use nuclear weapons against non-nuclear weapon states that are party to the NPT and in compliance with their nuclear nonproliferation obligations. 

The other policy that was advocated by senior State Department officials was the so called sole-purpose posture—which means that nuclear weapons only serve to deter or respond to a nuclear attack, and they no longer play a role in non-nuclear scenarios. Although the sole purpose posture was eventually dropped and it was set only as a long-term objective, the Obama administration still reduced the role of nuclear weapons with the new negative security assurance, and it signaled its intent to continue this process with the promise of sole purpose. These steps supported US leadership at the 2010 Nuclear Non-Proliferation Treaty Review Conference and they contributed to the adoption of a consensual final document at the conference. 

This broader scope strengthens inter-agency cooperation, and ensures that all the departments that are affected by the NPR are on board with the strategy, which eases the implementation of the decisions. Besides, it also strengthens alliance relations by regular consultations. The Trump administration’s mandate did not include a specific timeline or format; consequently it will be mainly the responsibility of Defense Secretary James Mattis to decide on the framework. Though the presidential memorandum did not require an inter-agency process, it would be wise to conduct one.

Compared to 2010, the security environment has dramatically deteriorated: renewed tensions between NATO and Russia since the annexation of Crimea, China’s building of military bases in what had previously been international waters, significant military modernization efforts by both these states, and North Korea’s increasingly bellicose nuclear threats. All of these developments have created a serious deterrence and security challenge for the United States and its allies. Only a broader approach can address all relevant threats and create the necessary internal consensus for the funding and creation of a modern, robust, flexible, resilient, ready, and appropriately tailored nuclear arsenal.

Hero Image
gettyimages 632782096
CISAC fellow Anna Péczeli suggests that the Trump Administration conduct a broad Nuclear Posture Review that includes the State Department, which in the last such review in 2009 emphasized a number of policies that supported non-proliferation objectives and strengthened U.S. negotiating positions at global arms control forums.
Getty Images/Win McNamee
All News button
1
Paragraphs

CISAC's Herbet Lin and Jackie Kerr from the Lawrence Livermore National Laboratory write in this draft working paper that the United States has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods in cyberspace for engaging in conflict -- and  free and democratic societies are especially vulernable.   Development of new tactics and responses is therefore needed.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Center for International Security and Cooperation (CISAC)
-

Abstract: The Cold War was about the rise and the solidification of US power. But it was also about more than that. It was about the defeat of Soviet-style Communism and the victory, in Europe, of a form of democratic consensus that had become institutionalized through the European Union. In China it meant a political and social revolution carried out by the Chinese Communist Party. In Latin America it meant the increasing polarization of societies along Cold War ideological lines of division. This book attempts to show the significance of the Cold War between capitalism and socialism on a world scale, in all its varieties and its sometimes confusing inconsistencies. As a one-volume history it can do little but scratch the surface of  complicated developments. But it will have served its purpose if it invites the reader to explore further the ways in which the Cold War made the world what it is today.

About the Speaker: Odd Arne Westad is the S.T. Lee Professor of U.S.-Asia Relations at Harvard University, where he teaches at the Kennedy School of Government. He is an expert on contemporary international history and on the eastern Asian region.  

Before coming to Harvard in 2015, Westad was School Professor of International History at the London School of Economics and Political Science (LSE). While at LSE, he directed LSE IDEAS, a leading centre for international affairs, diplomacy and strategy.
 
Professor Westad won the Bancroft Prize for The Global Cold War: Third World Interventions and the Making of Our Times. The book, which has been translated into fifteen languages, also won a number of other awards. Westad served as general editor for the three-volume Cambridge History of the Cold War, and is the author of the Penguin History of the World (now in its 6th edition). His most recent book, Restless Empire: China and the World since 1750, won the Asia Society’s book award for 2013.
Arne Westad Harvard University
Seminars
-

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes. These are new approaches, meant if not to alter electoral outcomes then at least to sow discord and seem in some instances to have been successful. Methods used include hacking into political parties' servers and “doxxing” embarrassing hacked materials; disseminating via “bots” false stories that have occasionally gone viral; as well highly granular big data analyses to target voters with ads specifically tailored to their profiles as culled from social media.

These methods and tactics have been employed in the U.S, French, and Dutch elections; cyber-break-ins into the Bundestag and German political think tanks suggest they will play a role in the upcoming German parliamentary elections. Perpetrated by an authoritarian government, they are asymmetric: without a free media environment they are immune to such tacts even if democracies were to even try to respond in kind. What democracies have experienced in the past several years will force them to adapt to a new environment with the realization that there are many ways for an adversary to change a nations policies.

About the Speaker: Toomas Hendrik Ilves was born on December 26, 1953, to an Estonian family living in Stockholm, Sweden. He was educated in the United States, receiving a degree from Columbia University in 1976 and a master's degree in psychology from the University of Pennsylvania in 1978.

In 1984 he moved to Munich, Germany, to work at the office of Radio Free Europe, first as a researcher and foreign policy analyst and later as the head of the Estonian Desk.

From 1993 to 1996 Ilves served in Washington as the ambassador of the Republic of Estonia to the United States and Canada. During this time, he launched the Tiger Leap Initiative to computerize and connect all Estonian schools online with Education Minister Jaak Aaviksoo. He then served as minister of foreign affairs from 1996 to 1998. After a brief period as chairman of the North Atlantic Institute in 1998, he was again appointed minister of foreign affairs, serving until 2002.

From 2002 to 2004, Ilves was a member of the Estonian Parliament and in 2004 he was elected a member of the European Parliament, where he was vice-president of the Foreign Affairs Committee. As a MEP, he initiated the Baltic Sea Strategy that was later implemented as official regional policy of the European Union.

Ilves was elected president of the Republic of Estonia in 2006. He was re-elected for a second term in office in 2011.

During his presidency, Ilves has been appointed to serve in several high positions in the field of ICT in the European Union. He served as chairman of the EU Task Force on eHealth from 2011 to 2012 and was chairman of the European Cloud Partnership Steering Board at the invitation of the European Commission from 2012 to 2014. In 2013 he chaired the High-Level Panel on Global Internet Cooperation and Governance Mechanisms convened by ICANN. From 2014 to 2015 Ilves was the co-chair of the advisory panel of the World Bank's World Development Report 2016 "Digital Dividends" and was also the chair of World Economic Forum's Global Agenda Council on Cyber Security beginning in June 2014.

Starting from 2016, Ilves co-chairs The World Economic Forum working group The Global Futures Council on Blockchain Technology. In 2017 he joined Stanford University as a Bernard and Susan Liautaud Distinguished Visiting Fellow at the Center for International Security and Cooperation in the Freeman Spogli Institute for International Studies.

President Ilves has published many essays and articles in Estonian and English on numerous topics ranging from Estonian language, history, and literature to global foreign and security policy and cyber security. His books include essay collections in Estonian, Finnish, Latvian, Hungarian, and Russian.

His international awards and honorary degrees include Knight of Freedom Award by the Casimir Pulaski Foundation (2016), the Aspen Prague Award by the Aspen Institute (2015), the Freedom Award by the Atlantic Council (2014) and the NDI Democracy Award by the National Democratic Institute (2013). His Honorary Degrees include an Honorary Degree from St. Olaf College, US (2014), an Honorary Degree from the John Paul II Catholic University of Lublin, Poland (2010), and an Honorary Degree from Tbilisi University, Georgia (2007).

Encina Hall, 2nd floor

Seminars
Paragraphs

CISAC's Siegfried Hecker, Larry Brandt and Jason Reinhardt worked with Chinese nuclear organizations on issues involving radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Center for International Security and Cooperation (CISAC)
Authors
Larry Brandt
Siegfried S. Hecker
Authors
News Type
News
Date
Paragraphs

The first Russian explosive device to land on US soil wasn’t delivered by a Russian missile, as Americans feared might happen throughout the Cold War. It was delivered by FedEx. The device, an explosive magnetic flux compression generator, arrived at Los Alamos National Laboratory in late 1993, shipped from the Russian Federal Nuclear Center VNIIEF. It allowed Los Alamos and VNIIEF scientists to conduct a groundbreaking joint experiment to study high-temperature superconductivity in ultra-high magnetic fields. 

The shared excitement and jubilation the scientists involved felt over successful experiments like this were testament to a profound shift. Less than two years after the dissolution of the Soviet Union and some 18 months after the remarkable and improbable exchange visits between Russian and American nuclear weapons lab directors, scientists from Los Alamos and VNIIEF were conducting experiments at each other’s previously highly secret sites. Some of these scientists had helped design their country’s hydrogen bombs. Now, they were focused on fundamental scientific discovery. 

The Soviet nuclear weapons program was built on the shoulders of scientific giants—Yuli B. Khariton, Igor V. Kurchatov, Igor E. Tamm, Andrey D. Sakharov, Yakov B. Zeldovich, and many others—just as the American program was built on the shoulders of J. Robert Oppenheimer, Enrico Fermi, Hans Bethe, Edward Teller, John von Neumann, and many more. Unlike their American counterparts, though, Soviet weapons scientists labored in secrecy during the Cold War. When Soviet leader Mikhail Gorbachev lifted the Iron Curtain, curiosity about US research and a pent-up desire to cooperate internationally led them to reach out to the American nuclear weapons labs during the last three years of the USSR. They did so at international conferences and during first-time lab exchanges, long before Washington was prepared for such collaborations. 

Scientific cooperation tapped into the most basic interest of scientists and engineers on both sides, namely, the desire to create new knowledge and technologies. Science is fundamentally an interactive, cooperative pursuit, which requires exposing the results of research to review and critique. As a participant in those early exchanges, I can say that the common language of science allowed us to more easily cross cultures and borders. The two sides’ expertise and facilities proved enormously synergistic, resulting in remarkable progress in several areas of science that neither side alone could have produced for some time to come. We found science, unlike politics, to be a unifying force—one that allowed us to build trust through collaboration.

The pursuit of fusion

High-energy-density physics was the first—and over the years, most intense—area of cooperation between US and Russian nuclear labs. The field involves studying materials at high densities, extreme pressures, and high temperatures, such as those found in stars and the cores of giant planets. On Earth, these conditions are found in nuclear detonations, the basic physics of which were obviously of great interest to the scientists involved. 

Working together, they used VNIIEF explosive magnetic flux compression generators in Russia, VNIIEF generators sent by FedEX from Russia to the United States and charged with US-supplied explosives, and stationary pulsed-power machines at Los Alamos to produce ultra-high electrical currents and magnetic fields that, in turn, produced a wide range of high-energy density environments. This technology provided the capability needed to pursue a unique approach to civilian nuclear fusion, which has tantalized the international physics community for decades with its potential to provide unlimited clean energy. Such energy densities also enabled the scientists to study materials strength under extreme conditions, material behavior under super-strong magnetic fields, and many other problems.

In fact, the initial Los Alamos interest in VNIIEF flux compression technology was stimulated by VNIIEF’s approach to an emerging energy research area now called magnetized target fusion, as Los Alamos scientists I.R. Lindemuth and R. R. Reinovsky and VNIIEF scientist S.F. Garanin write in Doomed to Cooperate. Magnetized target fusion is an approach to fusion that relies on intermediate fuel densities, between the more conventional magnetically confined fusion and inertially confined fusion. 

High-energy-density physics is exciting science that helps attract talent, especially young recruits. It represents a non-military outlet for creative weapon scientists to solve big-world problems for the benefit of mankind. It allows scientists to create new knowledge, not just try to prevent potential new nuclear dangers. It also opened the door to cooperation by scientists with complimentary skills. The Russian side excelled in the design of the explosive generators, the American side in instrumentation and diagnostics, allowing the partnership to go beyond what had been achieved before by either side alone. For example, in the mid-1990s VNIIEF scientists produced a world-record magnetic field of 28 million gauss, some 50 million times larger than the magnetic field at the earth’s surface. Moreover, many of the joint high-field experiments were considered the best-instrumented ever. US-Russian collaborations on high-energy-density physics between 1993 and 2013 resulted in over 400 joint publications and presentations, and opened the door for joint work in other areas. 

An enigmatic element

Plutonium science was similarly of great interest to both sides, yet direct collaboration was not established until the late 1990s because of the sensitivity of the subject. Some fundamental aspects of plutonium science were first presented by Americans and Soviets at the Geneva International Conferences on the Peaceful Uses of Atomic Energy in 1955 and 1958. However, the US and Russian results presented in these and subsequent meetings differed dramatically, and the differences were not resolved until we established direct lab-to-lab collaborations. 

By the early 1990s, both sides had for decades attempted to understand plutonium, a complex metal that exhibits six solid crystallographic phases at ambient pressure. Its phases are notoriously unstable, affected by temperature, pressure, chemical additions, and time (the latter because of the radioactive decay of plutonium). With little provocation, the metal can change its density by as much as 25 percent. It can be as brittle as glass or as malleable as aluminum; it expands when it solidifies, and its freshly machined surface will tarnish in minutes. It challenges our understanding of chemical bonding in heavy element metals, compounds, and complexes. Indeed, plutonium is the most challenging element.

Several of my Russian counterparts and I have devoted much of our 50 years of scientific endeavor attempting to understand the properties of this enigmatic metal.American and Russian scientists had disagreed for 40 years on how to tame plutonium’s notorious instability, when, in 1998, I began working with Lidia Timofeeva, the preeminent Russian plutonium metallurgist. The end of the Cold War enabled us to talk, challenge each other’s views, and finally understand this element better. Our joint work demonstrated the validity of Russian research finding that a high-temperature phase of plutonium could be retained at room temperature, but not stabilized, by adding small amounts of gallium. (We published the results in a paper called “A Tale of Two Diagrams.”) US-Russian collaboration at more than a dozen plutonium science workshops continued for 15 years. 

Computing power

Computational methods for massively parallel computing became a third important topic of scientific collaboration. During the 1992 US lab directors’ visit to Sarov, I was surprised by VNIIEF’s computational capabilities. Soviet computers were known to be greatly inferior to US supercomputers, the most powerful of which resided at the Los Alamos and Lawrence Livermore laboratories. Yet their three-dimensional simulations of a representative ballistic impact problem were extraordinary. When I marveled at my counterparts’ computing abilities, one of them explained, “since we don’t have the computing power you have, we have to think harder”—and they did. More than one thousand specialists worked in VNIIEF’s Mathematical Department, including some of the most gifted Russian mathematicians and computer scientists. 

Because only low-performing, single-central processing unit (CPU) computers were available to Russia’s scientific institutes, in the 1970s VNIIEF began to physically link CPUs and create parallel software algorithms that efficiently used multiple CPUs to greatly accelerate simulations for problems such as hydrodynamics, heat conduction, and radiation transport. They confirmed the efficiency of their parallelization strategies on computers with up to 10 CPUs, the most they could link at the time. They also developed analytical models for predicting the scaling efficiency to arbitrarily large numbers of processors.

During this time, the American labs were just beginning to transition their nuclear simulation codes from powerful single-CPU computers to the massively parallel computers that were becoming commercially available, a transition the Russian side had accomplished years earlier but with fewer and less powerful CPUs. Our collaborations gave Americans access to proven parallelizing algorithms, and gave Russians the ability to evaluate different analytical models for predicting the scaling efficiency to large numbers of processors. This same technology would later prove critical to both US and Russian programs for maintaining their arsenals after nuclear tests were banned.

Allowing the nuclear weapons scientists to move out of the shadow of Cold-War secrecy through scientific collaborations made us realize how much we were alike. It helped build trust, which had a powerful impact on enhancing nuclear security because it allowed us to extend our collaboration into sensitive subject areas, like the safety and security of nuclear weapons and materials. For the nuclear weapons scientists, the progression from science to security was a natural evolution, since we had practiced both from the beginning of our nation’s nuclear programs. It also fulfilled our desire to apply our skills to enhance scientific progress.

MEDIA CONTACTS

Siegfried S. Hecker, Center for International Security and Cooperation: (650) 725-6468, shecker@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

Hero Image
sem
An abandoned guard post at the Semipalatinsk Test Site in Kazakhstan in 1998. Stunned by the lack of security and the presence of scavengers, Siegfried Hecker used this photo to convince his Russian colleagues that they needed to cooperate with the Americans and Kazakhs to secure the site. Also known as "The Polygon," Semipalatinsk was the primary testing venue for the Soviet Union's nuclear weapons.
Courtesy of Siegfried S. Hecker
All News button
1
Paragraphs

Uneasy Partnerships presents the analysis and insights of practitioners and scholars who have shaped and examined China's interactions with key Northeast Asian partners. Using the same empirical approach employed in the companion volume, The New Great Game (Stanford University Press, 2016), this new text analyzes the perceptions, priorities, and policies of China and its partners to explain why dyadic relationships evolved as they have during China's "rise."

Synthesizing insights from an array of research, Uneasy Partnerships traces how the relationships that formed between China and its partner states—Japan, the Koreas, and Russia—resulted from the interplay of competing and compatible objectives, as well as from the influence of third-country ties. These findings are used to identify patterns and trends and to develop a framework that can be used to illuminate and explain Beijing's engagement with the rest of the world.

This book is part of the Studies of the Walter H. Shorenstein Asia-Pacific Research Center series at Stanford University Press.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
Thomas Fingar
-

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S. technology companies have increasingly taken on with respect to cybersecurity and privacy: they are acting like states and running their own foreign policies, and they are setting themselves as neutrals with respect to existing national authorities, including the United States. U.S. tech companies are not the first super-empowered private companies, but they have numerous features that set them apart from prior private powers like the Dutch East India Company or more recent examples like ExxonMobil. This article first provides an account of how the relationship between U.S. tech companies and governments has evolved over time. By breaking down the “Digital Switzerland” idea, the article then explores the extent to which and how the companies differ from the powerful private interests of earlier eras, and it concludes by analyzing the implications of the companies’ role for governance and for individuals going forward.

About the Speaker: Kristen Eichensehr is an Assistant Professor of Law at UCLA School of Law. She writes and teaches about foreign relations, separation of powers, cybersecurity, and national security law. Before joining the UCLA faculty, Eichensehr clerked for Chief Judge Merrick B. Garland of the U.S. Court of Appeals for the D.C. Circuit and for Justices Sandra Day O’Connor and Sonia Sotomayor of the Supreme Court of the United States. Eichensehr also served as Special Assistant to the Legal Adviser of the U.S. Department of State and practiced at Covington & Burling LLP. Eichensehr received her J.D. from Yale Law School, where she served as executive editor of the Yale Law Journal. Eichensehr is a term member of the Council on Foreign Relations, a former visiting fellow at the Hoover Institution, and an affiliate scholar at the Center for Internet and Society at Stanford Law School. She is a frequent contributor to and member of the editorial board of the national security blog, Just Security.

Encina Hall, 2nd floor

Kristen Eichensehr Assistant Professor UCLA School of Law
Seminars
Subscribe to Security