Foreign Policy
-

Abstract
I will begin this talk with a short discussion of the function of warning in the US national security community, and the analytic methodology used by US intelligence agencies (in 1941 and since) to address the problem of warning. I will then present a formal model for crisis warning consisting of a Partially Observable Markov Decision Process (POMDP) intended to assist an intelligence analyst in deciding when to issue an alert to a foreign policy principal decision maker such as the President. The lead time demanded by the principal is a key element in the model. I will spend the remainder of the talk illustrating this warning model in the context of the brewing crisis in the Pacific from July to December 1941, and present results from test runs of the model using historical raw intelligence data from that period. While a probabilistic approach to warning is not a new idea, this research addresses three outstanding issues left unresolved from past efforts to develop such an approach:

  1. The need to process multiple dependent signals in a manner that is combinatorially feasible;
  2. Incorporation of the time dimension in which intelligence data is received into the inference, and the effect of dynamics on a warning decision where a finite horizon is imposed;
  3. Consideration of the fact that the analyst serves as an advisor to the principal decision maker but is not completely aware of the principal’s preference set.

Together with my thesis advisor, Prof Elisabeth Pate-Cornell, I am currently writing a paper that covers the presented material, and I hope to incorporate feedback from this presentation into the paper. Because the paper is currently a work in progress, I am not distributing it at this time.


David Blum attends Stanford University, where he is a 3rd year Ph.D. student in the Department of Management Science & Engineering as well as a U.S. Department of Defense SMART Scholar. He is currently developing a probabilistic model of national security crises, with the goal of improving crisis early warning. His interests also include targeting in counter-terrorism, signatures of WMD proliferation, and models of decisions made by adversarial actors as games with incomplete information. He is a graduate intern in the Counter-Proliferation Operations-Intelligence Support program at Lawrence Livermore National Laboratory.

Between 2004 and 2008 David worked at the U.S. Department of Defense as an operations research analyst. He deployed twice to Iraq, in 2007 and 2008, where,  as member of Multi-National Corps Iraq, he provided direct analytic support to conventional and special operations units. He received his Master's degree from MIT in political science, concentrating in security studies, and his Bachelor's degree from Columbia University in history and physics.

Reuben W. Hills Conference Room

David Blum Predoctoral Fellow, CISAC Speaker
Seminars
-

Reuben W. Hills Conference Room

Francis Gavin Director, Robert S. Strauss Center for International Security & Law Speaker University of Texas at Austin
Mira Rapp-Hooper PhD Student Speaker Columbia University
Seminars
Paragraphs

Recent breakdowns in American national security have exposed the weaknesses of the nation's vast overlapping security and foreign policy bureaucracy and the often dysfunctional interagency process. In the literature of national security studies, however, surprisingly little attention is given to the specific dynamics or underlying organizational cultures that often drive the bureaucratic politics of U.S. security policy.

The National Security Enterprise offers a broad overview and analysis of the many government agencies involved in national security issues, the interagency process, Congressional checks and balances, and the influence of private sector organizations. The chapters cover the National Security Council, the Departments of Defense and State, the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and the Office of Management and Budget. The book also focuses on the roles of Congress, the Supreme Court, and outside players in the national security process like the media, think tanks, and lobbyists. Each chapter details the organizational culture and personality of these institutions so that readers can better understand the mindsets that drive these organizations and their roles in the policy process.

Many of the contributors to this volume are long-time practitioners who have spent most of their careers working for these organizations. As such, they offer unique insights into how diplomats, military officers, civilian analysts, spies, and law enforcement officials are distinct breeds of policymakers and political actors. To illustrate how different agencies can behave in the face of a common challenge, contributors reflect in detail on their respective agency's behavior during the Iraq War.

This impressive volume is suitable for academic studies at both the undergraduate and graduate level; ideal for U.S. government, military, and national security training programs; and useful for practitioners and specialists in national security studies.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Georgetown University Press in "The National Security Enterprise: Navigating the Labyrinth"
Authors
Thomas Fingar
Paragraphs

From Cornell University Press:

At first glance, the U.S. decision to escalate the war in Vietnam in the mid-1960s, China's position on North Korea's nuclear program in the late 1990s and early 2000s, and the EU resolution to lift what remained of the arms embargo against Libya in the mid-2000s would appear to share little in common. Yet each of these seemingly unconnected and far-reaching foreign policy decisions resulted at least in part from the exercise of a unique kind of coercion, one predicated on the intentional creation, manipulation, and exploitation of real or threatened mass population movements. In Weapons of Mass Migration, Kelly M. Greenhill offers the first systematic examination of this widely deployed but largely unrecognized instrument of state influence. She shows both how often this unorthodox brand of coercion has been attempted (more than fifty times in the last half century) and how successful it has been (well over half the time). She also tackles the questions of who employs this policy tool, to what ends, and how and why it ever works.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Cornell Studies in Security Affairs
Authors
Subscribe to Foreign Policy