Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

-

About the Topic: Japan’s March 2011 Great Tohoku earthquake and tsunami led to core damage in three reactors at the Fukushima Dai-ichi nuclear power station. This presentation will describe both the short-term and long-term actions of the U.S. Nuclear Regulatory Commission (NRC) to implement lessons learned from the Fukushima accident and will highlight Commissioner Apostolakis’ views on the accident. The presentation will also describe the findings of the Commissioner’s Risk Management Task Force chartered to develop a strategic vision and options for adopting a more comprehensive and holistic risk-informed, performance-based regulatory approach for the NRC.

 

About the Speaker: George Apostolakis was sworn in as a Commissioner of the U.S. Nuclear Regulatory Commission (NRC) on April 23, 2010, to a term ending on June 30, 2014. 

Dr. Apostolakis has had a distinguished career as an engineer, professor and risk analyst. Before joining the NRC, he was a professor of Nuclear Science and Engineering and a professor of Engineering Systems at the Massachusetts Institute of Technology.  He was also a member and former Chairman of the statutory Advisory Committee on Reactor Safeguards of the NRC. In 2007, he was elected to the National Academy of Engineering for "innovations in the theory and practice of probabilistic risk assessment and risk management." He received the Tommy Thompson Award for his contributions to improvement of reactor safety in 1999 and the Arthur Holly Compton Award in Education in 2005 from the American Nuclear Society.

CISAC Conference Room

George Apostolakis Commissioner of the U.S. Nuclear Regulatory Commission Speaker
Seminars
-

Sponsored by

The Preventive Defense Project and the

CISAC Science Seminar Series

Roughly 85% of the critical infrastructure systems in the United States is owned or operated by the private sector. Managers of these systems must keep everything running and try to ensure nothing bad happens, despite increasing system complexity and demand for continuing improvements in efficiency. This challenge naturally leads to the questions “which parts of an infrastructure are critical,” “how critical are they,” and “how should we invest limited budget to defend our infrastructure?”

We introduce two- and three-stage optimization models that represent the strategic, game-theoretic interactions between preparations to defend critical infrastructure, an “attacker” who observes these preparations before acting, and a “defender” who operates the surviving infrastructure as best as possible after an optimal attack. We identify worst-case disruptions in the operation of a system by solving a system interdiction problem. Then, given an available budget and list of possible defensive investments (e.g., hardening, redundancy, capacity expansion), we solve for a combination of investments that makes the system maximally resilient to worst-case disruption. We show some unexpected results that have proven insightful.

These models apply equally well to government, military, and commercial systems. Between our NPS student-officers and faculty, we have conducted over 150 case studies on systems ranging from electric power, to transportation, to supply chains, to the Internet.


About the speaker: David L. Alderson, Ph.D, joined the Naval Postgraduate School faculty in 2006 after working for three years as a postdoctoral scholar in the Division of Engineering and Applied Sciences at the California Institute of Technology (Caltech). He received a B.S.E. in Civil Engineering and Operations Research from Princeton University and the M.S. and Ph.D. degrees from the Department of Management Science and Engineering at Stanford University. His research focuses on the function and operation of critical infrastructures, with particular emphasis on how to invest limited resources to ensure efficient and resilient performance in the face of accidents, failures, natural disasters, or deliberate attacks. He currently serves as the Director of the NPS Center for Infrastructure Defense (CID). As part of a Multiple University Research Initiative (MURI) team studying "Next-Generation Network Science," he studies tradeoffs between efficiency, complexity, and fragility in a wide variety of public and private network-centric systems. He has extensive experience working on the Internet and other complex communication networks, having been a researcher at the Xerox Palo Alto Research Center (PARC), the Santa Fe Institute (SFI), and the Institute for Pure and Applied Mathematics (IPAM) at UCLA. He is a member of INFORMS and MORS.

CISAC Conference Room

Dave Alderson Assistant Professor, Operations Research Department Director, Center for Infrastructure Defense, Naval Postgraduate School Speaker
Seminars
-

Location-based services from are quickly gaining popularity. Many such services track the user's location and make use of it as needed. While tracking raises privacy concerns, it is believed to be unavoidable if users want the benefits of location-based services. In this talk I will give several examples of services that provide location-based functionality without learning the user's location. Our goal is to show that privacy and functionality are not always in conflict. We will also discuss our experiences with deploying these mechanisms in the real world. This is joint work with Arvind Narayanan, Mike Hamburg, and Narendran Thiagarajan.


About the speaker: Dr. Boneh heads the applied crypto group at the Computer Science
department at Stanford University. Dr. Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, security for mobile devices, web security, digital copyright protection, and cryptanalysis. He is the author of over a hundred technical publications in the field and a recipient of the Packard Award, the Alfred P. Sloan Award, the RSA award, and the Terman Award.

CISAC Conference Room

Not in residence

0
Rajeev Motwani Professor in the School of Engineering and Professor of Electrical Engineering
Co-director of the Stanford Computer Security Lab
Co-director of the Stanford Cyber Initiative
Affiliate Faculty at CISAC
dabo.jpg MA, PhD

Professor Boneh heads the applied cryptography group and co-direct the computer security lab. Professor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, and cryptanalysis. He is the author of over a hundred publications in the field and is a Packard and Alfred P. Sloan fellow. He is a recipient of the 2014 ACM prize and the 2013 Godel prize. In 2011 Dr. Boneh received the Ishii award for industry education innovation. Professor Boneh received his Ph.D from Princeton University and joined Stanford in 1997.

Dan Boneh Professor of Computer Science and Electrical Engineering, Stanford University and CISAC Affiliate Speaker
Seminars
Paragraphs

Abstract

Why do insurgencies erupt in some places and not in others? This article exploits an original violent event database of 274,428 municipality-month observations in Colombia to determine the conditions favoring organized violence at the subnational level. The data cast doubt on the conventional correlates of war: poverty, rough terrain, lootable natural resources, and large, sparsely distributed populations. The evidence suggests that rebellions begin not in localities that afford sanctuaries, impoverished recruits, and abundant finances, but instead in regions providing receptacles of collective action: the organizational legacies of war. Specifically, the data indicate that regions affected by past mobilization are six times more likely to experience rebellion than those without a tradition of armed organized action. The significant correlation between prior and future mobilization is robust across different measurements of the concepts, levels of aggregations of the data, units of analysis, and specifications of the model. These include rare events and spatial lag analyses. These results highlight the need for micro conflict data, theory disentangling the causes of war onset from those of war recurrence, and a reorientation away from physical geography and back to the human and social geography that determines if rebellion is organizationally feasible. The findings suggest new avenues of research on the post-war trajectories of armed organizations, the causes of repeated war, and the micro-foundations of rebellion.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Peace Research
Authors
Sarah Z. Daly
Subscribe to Security