International Development

FSI researchers consider international development from a variety of angles. They analyze ideas such as how public action and good governance are cornerstones of economic prosperity in Mexico and how investments in high school education will improve China’s economy.

They are looking at novel technological interventions to improve rural livelihoods, like the development implications of solar power-generated crop growing in Northern Benin.

FSI academics also assess which political processes yield better access to public services, particularly in developing countries. With a focus on health care, researchers have studied the political incentives to embrace UNICEF’s child survival efforts and how a well-run anti-alcohol policy in Russia affected mortality rates.

FSI’s work on international development also includes training the next generation of leaders through pre- and post-doctoral fellowships as well as the Draper Hills Summer Fellows Program.

-

The prospect of civil nuclear cooperation between the United States and India has stirred controversy for its potential impact on nuclear proliferation. I will discuss the origins or the U.S.-India nuclear deal, its current political prospects in the United States and India, and evaluate its impact on the nonproliferation regime. My talk will be based on part on the report U.S.-India Nuclear Cooperation: A Strategy for Moving Forward.

Michael Levi is a fellow for science and technology at the Council on Foreign Relations in New York. He was previously a science and technology fellow at the Brookings Institution. Levi is the author of two books, The Future of Arms Control (Brookings, 2005, with Michael O'Hanlon), and Rethinking Nuclear Terrorism (Harvard University Press, forthcoming).

Reuben W. Hills Conference Room

Michael Levi Fellow for Science and Technology Speaker Council on Foreign Relations
Seminars
-

The siting and construction of high-level biocontainment facilities involves a complex review process with environmental impact documents, legally mandated reviews, and public involvement in decision making about associated risks. In some cases, serious public opposition and legal challenges may arise during the review and approval stages of a project. The recent proposed construction of NIH-NIAID regional and national biocontainment labs provided an opportunity for a real-time study of the review and approval processes associated with labs in many different locations. By analyzing environmental impact documents, mass media coverage, internet communications, and detailed timelines at the various labs, it was possible to identify common issues and features associated with labs in general, as well as specific concerns associated with those where public controversies and opposition arose. The study focused on both good and bad experiences at various recently proposed lab sites and compared them with other past case examples to identify 'lessons learned' that are relevant to both current and future biocontainment projects. Overall, the study documented the continuing importance of trust, transparency, and due process in public decision making and highlighted the importance of developing and implementing a comprehensive pro-active risk communication strategy at the earliest stages of project planning. The study also documented indications of public insecurity associated with biodefense research, which may translate into future problems for public health researchers.

Margaret Race is an ecologist working with NASA through the SETI Institute in Mountain View, Calif. She recently completed a study on public decision making and risk communication associated with the construction of BSL-3 and BSL-4 biocontainment labs nationwide. The study, which was begun during a fellowship at Stanford University and CISAC, reflects her longstanding interest in risk perceptions, legal and societal issues, public communication and education associated with controversial science and technological proposals. In her work with NASA, she focuses on planetary protection and the search for extraterrestrial life--which will someday involve construction of a BSL-4 biocontainment lab for handling and testing scientific samples returned from Mars and other solar system locaitons. During the past decade, she has been a lead member of an international team of researchers that helped NASA develop a protocol for the quarantine, handling, and testing of extraterrestrial samples from Mars. She has served on numerous National Resource Council studies analyzing risk communication and societal issues associated environmental protection on Earth and in space. Dr. Race received her BA degree in Biology and MS degree in Energy Management and Policy from the University of Pennsylvania, and her Ph.D. in Ecology/Zoology from the University of California at Berkeley. Her teaching and research work has included positions at Stanford University (Human Biology Program), UC Berkeley (Assistant Dean, College of Natural Resources), and Office of the President, University of California (Senior Science Policy Analyst and Director of Planning). She was also a Postdoctoral Fellow in Marine Policy and Ocean Management at Woods Hole Oceanographic Institution.

Reuben W. Hills Conference Room

Margaret Race Ecologist Speaker SETI Institute, Mountain View, Calif.
Seminars
-

After considering trends in the role of nuclear weapons and some lessons from history, this presentation examines nuclear signaling in the context of the evolving role of nuclear weapons (for deterrence and dissuasion, among other purposes) and likely developments of U.S. nuclear forces and their concepts of operation for regional crises. Following the development of a 2015 regional crisis scenario, the utility of potential signaling options are examined in light of current U.S. nuclear force development trends. Options for future U.S. nuclear force and concepts development for signaling as part of overall tailored deterrence are identified and examined.

Owen Price is a consulting visiting fellow in the Center for Strategic and International Studies International Security Program, on sabbatical until March 2007 from the U.K. Atomic Weapons Establishment (AWE), where he has worked for 12 years. Most recently, he led a team of systems engineers working on AWE capability programs, work designed to ensure that AWE continues to be able to design and field new warheads of tasked to do so by the British government. From 2000 to 2003, he led the AWE Verification Research Program, was a technical adviser to the British Foreign and Commonwealth Office, and was a member of the U.K. delegation to the Non-Proliferation Treaty Preparatory Committee Meetings in 2003 and 2004. Price holds an MA in engineering from the University of Cambridge, England, and an MBA in engineering management from the University of Bradford, England. He is currently reading (part time) for an MSc in systems engineering at the U.K. Defense Academy, Cranfield University, Shrivenham, England. He is a member of the International Institute for Strategic Studies and is a British national.

Reuben W. Hills Conference Room

Owen Price Speaker Center for Science and International Security
Seminars
-

Satellites are absolutely essential and extremely vulnerable for national and economic security. How do we deal with this dilemma?

Michael Krepon is co-founder of the Henry L. Stimson Center and the author or editor of eleven books and over 350 articles. Prior to co-founding the Stimson Center, Krepon worked at the Carnegie Endowment for International Peace, the U.S. Arms Control and Disarmament Agency during the Carter administration, and in the U.S. House of Representatives, assisting Congressman Norm Dicks. He receive an MA from the School for Advanced International Studies, Johns Hopkins University, and a BA from Franklin & Marshall College. He also studied Arabic at the American University in Cairo, Egypt.

Krepon divides his time between Stimson's South Asia and space security projects. The South Asia project concentrates on escalation control, nuclear risk reduction, confidence building, and peace making between India and Pakistan. This project entails field work, publications, and Washington-based programming, including a visiting fellowship program. The space security project seeks to promote a code of conduct for responsible space-faring nations and works toward stronger international norms for the peaceful uses of outer space.

Reuben W. Hills Conference Room

Michael Krepon Speaker Henry L. Stimson Center
Seminars
-

Bioterrorism is a growing threat. While the U.S. government has spent considerable sums on programs designed to protect the United States from a biological attack, no clear strategy has been articulated to guide planning and expenditures. This talk will present the outlines of a coherent strategy for coping with bioterrorism that includes diplomacy, deterrence and defense, with the emphasis on defense.

Dean Wilkening directs the Science Program at CISAC. He holds a Ph.D. in physics from Harvard University and spent 13 years at the RAND Corporation prior to coming to Stanford in 1996. His major research interests have been nuclear strategy and policy, arms control, the proliferation of nuclear, biological, and chemical weapons, ballistic missile defense, and conventional force modernization. His most recent research focuses on ballistic missile defense and biological terrorism. His work on missile defense focuses on the broad strategic and political implications of deploying national and theater missile defenses, in particular, the impact of theater missile defense in Northeast Asia, and the technical feasibility of boost-phase interceptors for national and theater missile defense. His work on biological weapons focuses on understanding the scientific and technical uncertainties associated with predicting the outcome of hypothetical airborne biological weapon attacks, with the aim of devising more effective civil defenses, and a reanalysis of the accidental anthrax release in 1979 from a Russian military compound in Sverdlovsk with the aim of improving our understanding of the human effects of inhalation anthrax.

Reuben W. Hills Conference Room

Dean Wilkening Speaker
Seminars
Paragraphs

What role should nuclear weapons play in today's world? How can the United States promote international security while safeguarding its own interests? U.S. Nuclear Weapons Policy informs this debate with an analysis of current nuclear weapons policies and strategies, including those for deterring, preventing, or preempting nuclear attack; preventing further proliferation, to nations and terrorists; modifying weapons designs; and revising the U.S. nuclear posture.

Presidents Bush and Clinton made major changes in U.S. policy after the cold war, and George W. Bush's administration made further, more radical changes after 9/11. Leaked portions of 2001's Nuclear Posture Review, for example, described more aggressive possible uses for nuclear weapons. This important volume examines the significance of such changes and suggests a way forward for U.S. policy, emphasizing stronger security of nuclear weapons and materials, international compliance with nonproliferation obligations, attention to the demand side of proliferation, and reduced reliance on nuclear weapons in U.S. foreign policy.

With a foreword by William J. Perry. Contributors: Chaim Braun (CISAC), George Bunn (CISAC), Christopher F. Chyba (formerly CISAC Co-Director), David Holloway (CISAC), Michael May (CISAC, formerly Director of Lawrence Livermore National Laboratory), W.K.H. Panofsky (formerly Director of Stanford Linear Accelerator Center), Karthika Sasikumar (University of British Columbia, former CISAC fellow), Roger Speed (formerly with the Livermore Laboratory), and Dean A. Wilkening (Science Program Director, CISAC).

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press and CISAC
Authors
David Holloway
Michael M. May
Karthika Sasikumar
Paragraphs

To reduce the risk of nuclear terrorism, we must prevent terrorists from obtaining nuclear weapons or materials. This will require, among other things, a sustained effort to keep dangerous nations from going nuclear--in particular North Korea. This article reviews the efforts the United States has undertaken through the years to keep North Korea from building a nuclear arsenal, arguing that the history of proliferation on the Korean Peninsula is marked by five nuclear crises. A sixth could be on the horizon, further compromising American efforts to lessen the likelihood of a nuclear attack on U.S. soil.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of the American Academy of Political and Social Science
Authors
William J. Perry
Paragraphs

One of the serious risks associated with the strategic nuclear arsenals of Russia and the United States is that an accidental launch might result from a false alarm or from misinterpreting information provided by an early-warning system. This risk will not be reduced by bringing down the number of strategic missiles on high alert to the level of about 500 warheads on each side because this measure will not significantly affect first-strike vulnerability of the Russian strategic forces. Other measures that have been suggested so far, namely an upgrade of the Russian early-warning system, establishing additional channels of real-time exchange of early-warning data, or transparent and verifiable de-alerting of strategic forces, are more likely to increase the probability of an accident than to reduce it. To address the problem of an accidental launch in the short term, the United States and Russia, while continuing to work toward deep reductions of their strategic nuclear forces, should develop and implement measures that would keep their entire forces at low levels of readiness without revealing their actual alert status.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Science and Global Security
Authors
Pavel Podvig
Paragraphs

The nexus of terrorism and nuclear weapons is today's greatest security concern. The importance of keeping fissile materials out of the hands of terrorists is now generally accepted. The difficulty of doing so is not. Lack of appreciation, especially for the technical difficulties, is hampering our ability to build a comprehensive safeguards system and prevent nuclear terrorism.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of the American Academy of Political and Social Science
Authors
Siegfried S. Hecker
Authors
News Type
Commentary
Date
Paragraphs

The National Security Agency is a riddle wrapped in a mystery inside a code. Secrets lie within. Located in Fort Meade, Md., it dwarfs the CIA. Its budget is black, unknown. And, most disturbing of all, it is the world's largest employer of mathematicians.

One of its secrets, recently revealed, is that it's monitoring millions of phone calls to learn just who was calling whom. (Technically, only telephone numbers are being recorded, but you don't have to be Q from James Bond to get a name from a number.) This information was being used to determine who might be a terrorist.

Legal or not, the spying program isn't worth violating our civil liberties for. The information one can glean will hardly help us win the war on terror.

With the NSA data, you can draw a picture with nodes or dots representing individuals, and lines between nodes if one person has called another. Mathematicians who work with pictures like this are called graph theorists. The field of social network analysis deals with trying to determine information about a group from such a graph, such as who the key players are or who the cell leaders might be.

But even when you know everyone in the graph is a terrorist, graphs don't contain information about the order or hierarchy of the cell. Researchers look instead for graph features like centrality: They try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel. Monterey Naval Postgraduate School researcher Ted Lewis, in his textbook "Critical Infrastructure Protection," defines a critical node to be such a central hub.

There are two problems. First, the central player might not be as important as the hub metaphor suggests. Jafar Adibi of the University of Southern California looked at e-mail traffic between Enron employees before Enron collapsed, and drew the graph. He found that if you naively analyzed the graph, you could mistakenly conclude that one of the central players was CEO Ken Lay's ... secretary. But that wasn't the person who ran the company into the ground.

Second, as the journal Studies in Conflict and Terrorism reported in 2003, you can kill all the central players in a terrorist cell and still leave the cell with a complete chain of command -- still capable of carrying out a devastating attack.

Expert Kathleen Carley of Carnegie Mellon was able to correctly predict -- twice -- who would take over Hamas when its leaders were assassinated, and her analysis used detailed information about the individuals in the organization, not just what anonymous nodes were linked with what. The moral is that the graph theory approach is inadequate. For useful results, it's important to utilize the lattice theory approach, which takes into account order and hierarchy.

The other questionable aspect of the NSA spying program is that it seeks to work out who might be a terrorist based on their calling patterns. While I agree that anyone calling 1 (800) AL-QAEDA is probably a terrorist, guilt by association is not just bad law, it's bad mathematics, for three reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period-Beatles kind of way, but in the sense of the Kevin Bacon game. Sociologist Stanley Milgram took individuals unknown to each other, separated by a continent, and asked one person to send a package to the other -- but only by sending the package to an individual he or she knew, who could then only send the package to someone he knew, and so on. While Milgram's interpretation of the results has since been questioned, the conclusion that emerged is that it took only six mailings, on average, for each package to reach its intended destination.

For example, President Bush is only three steps away from Osama bin Laden. And terrorist hermits like the Unabomber might be connected only to very few people. So much for guilt by association.

The second reason the NSA methodology is flawed is the concept "strength of weak ties," made famous by Stanford sociologist Mark Granovetter. Robert Spulak of the Joint Special Operations University puts it this way: You might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: There is no communication for years. The links between nodes that the NSA is looking for simply might not exist for the real threats.

Formal concept analysis, a branch of lattice theory, helps rectify this situation. Individuals who share many of the same characteristics are grouped together as one node, and links between nodes in this picture, called a concept lattice, indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes. For instance, you might group together people based on what cafés, bookstores and mosques they attend, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa). While this tool has in fact been used by researchers at Los Alamos National Laboratory to sift through hundreds of terrorism-related reports, it's still dangerous to rely on the math.

The NSA data mining is flawed because, as Kennedy and Lincoln buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One is just minding his own business. The other is Cat Stevens.

This isn't to say mathematicians are useless. In September 2004 -- 10 months before the July 7 bombing of the London Underground -- mathematician Gordon Woo warned that London was a hotbed of jihadist radicalism. But Woo, who works for the Bay Area company Risk Management Solutions, didn't anticipate the bombings using math. He used his knowledge and experience of London, especially the Wood Green area. That's what law enforcement officials should be doing.

As for tracking terrorist financing, it may already be too late. The terrorism of the future, according to mathematician Stefan Schmidt of the Technical University in Dresden, Germany, may be the terrorism of the futures -- when bombs explode, the stock market drops. Schmidt wants to quantify the impact on the market of a terrorist incident. The only people who know when a bomb will explode are the terrorists. By playing the market, they may already have obtained as much money as they need -- in perfectly legitimate ways -- thus stifling Treasury Department efforts to cut off the source of their funding.

Math is just a tool. Used wisely, math can indeed help win the Battle of Britain (by breaking the German codes). But used unwisely -- as seems to be the case in the NSA telephone caper -- your approval rating might just hit an all-time low.

Hero Image
nsa seal
All News button
1
Subscribe to International Development