International Development

FSI researchers consider international development from a variety of angles. They analyze ideas such as how public action and good governance are cornerstones of economic prosperity in Mexico and how investments in high school education will improve China’s economy.

They are looking at novel technological interventions to improve rural livelihoods, like the development implications of solar power-generated crop growing in Northern Benin.

FSI academics also assess which political processes yield better access to public services, particularly in developing countries. With a focus on health care, researchers have studied the political incentives to embrace UNICEF’s child survival efforts and how a well-run anti-alcohol policy in Russia affected mortality rates.

FSI’s work on international development also includes training the next generation of leaders through pre- and post-doctoral fellowships as well as the Draper Hills Summer Fellows Program.

-

Professor Li Shian is a Professor of History and Director of American and European Studies at Beijing's Renmin University. He is the Chief Editor of the journal World History and is a Council Member of the China Society for Human Rights Studies, which he has represented at several international human rights conferences. A former Chairman of the History Department at Renmin University, Dr. Li was awarded his doctorate at the University of Birmingham in 1989, and did post-graduate work at Stanford University from July 1990 to October 1992. He is the author of several books, including A Study of American Human Rights History and A History of the Development of Western Capitalism.

Professor Li will deliver remarks on the role human rights plays in US-China relations, from a Chinese perspective. He will begin with an exposition of human rights in traditional and post-1949 China, and drawing on this, review US-China exchanges on human rights post-June 4, 1989. He will discuss different approaches for addressing what Chinese and Americans both recognize as a central if contentious issue in their relations: respect for international laws as they protect both individual and collective freedoms.

Philippines Conference Room

Li Shian Professor of History and Director of American and European Studies Speaker Beijing's Renmin University
Seminars
-

Reuben W. Hills Conference Room

CISAC
Stanford University
Encina Hall, E214
Stanford, CA 94305-6165

(650) 723-1737 (650) 723-0089
0
Senior Fellow Emeritus at the Freeman Spogli Institute of International Studies
Raymond A. Spruance Professor of International History
0820stanford-davidholloway-238-edit.jpg PhD

David Holloway is the Raymond A. Spruance Professor of International History, a professor of political science, and an FSI senior fellow. He was co-director of CISAC from 1991 to 1997, and director of FSI from 1998 to 2003. His research focuses on the international history of nuclear weapons, on science and technology in the Soviet Union, and on the relationship between international history and international relations theory. His book Stalin and the Bomb: The Soviet Union and Atomic Energy, 1939-1956 (Yale University Press, 1994) was chosen by the New York Times Book Review as one of the 11 best books of 1994, and it won the Vucinich and Shulman prizes of the American Association for the Advancement of Slavic Studies. It has been translated into seven languages, most recently into Chinese. The Chinese translation is due to be published later in 2018. Holloway also wrote The Soviet Union and the Arms Race (1983) and co-authored The Reagan Strategic Defense Initiative: Technical, Political and Arms Control Assessment (1984). He has contributed to the Bulletin of the Atomic Scientists, Foreign Affairs, and other scholarly journals.

Since joining the Stanford faculty in 1986 -- first as a professor of political science and later (in 1996) as a professor of history as well -- Holloway has served as chair and co-chair of the International Relations Program (1989-1991), and as associate dean in the School of Humanities and Sciences (1997-1998). Before coming to Stanford, he taught at the University of Lancaster (1967-1970) and the University of Edinburgh (1970-1986). Born in Dublin, Ireland, he received his undergraduate degree in modern languages and literature, and his PhD in social and political sciences, both from Cambridge University.

Faculty member at the Center for International Security and Cooperation
Affiliated faculty at the Center on Democracy, Development, and the Rule of Law
Affiliated faculty at The Europe Center
CV
Date Label
David Holloway Speaker
Seminars
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
-

Sonja Schmid is a social science research associate at Stanford University. Having received her Ph.D. in Science & Technology Studies from Cornell University, she is now a science fellow at the Center for International Security and Cooperation, and affiliated with the Program in Science, Technology and Society at Stanford. Her research has focused on understanding complex decision-making processes at the interface between science, technology, and the state in the Cold War Soviet context, and is based on extensive archival research and narrative interviews with nuclear energy specialists in Russia. She is currently working on a book about reactor design choices and the development of the civilian nuclear industry in the Soviet Union. In addition, she is involved in an international research project on Cold War Technopolitics and Colonialism, where she works on Soviet technology transfer to Central and Eastern Europe. Her research interests also include risk communication, and the popularization of science and technology, subjects on which she has published in the past.

Reuben W. Hills Conference Room

Sonja Schmid Speaker
Seminars
-

The United Nations Secretariat--the main part of the UN bureaucracy directly under the Secretary-General--has arguably changed or been challenged more than any other part of the UN system in recent years, with more and more mandates and rising expectations. Though much attention has been given to the reform of the Security Council, and though Washington has made UN 'management reform' a core pillar of its UN policy since the Oil-for-Food scandal, the UN Secretariat has nevertheless proved singularly impervious to even the common sense suggestions for improvement. In many ways, there is a greater gap today than at any time in the past between what the Secretariat does, what it's meant to do, and the capacity it has. Why has improvement been so difficult and what have been the recurrent mistakes of UN reform efforts? With the election of a new Secretary-General due in late 2006, can we think about the UN bureaucracy in a different and more practical way?

Thant Myint-U is a visiting senior fellow at the International Peace Academy. He is also a senior advisor to the Conflict Prevention and Peace Forum at the Social Science Research Council and a Fellow of the Cambridge University Centre for History and Economics.

From 2000-2006 he worked in the United Nations Secretariat, first for the Office for the Coordination of Humanitarian Affairs (OCHA) and then for the Department of Political Affairs (DPA). From 2004-5 he was Chief of DPA's Policy Planning Unit of the Department of Political and in 2005-6 he was a Senior Political Officer in the Executive Office of the Secretary-General. In 2004 he was also a member of the Secretariat of the Secretary-General's High Level Panel on Threats, Challenges and Change.

Thant Myint-U has also served on three United Nations peacekeeping operations, with UNTAC in Cambodia in 1992-3 and with UNPROFOR and UNMIBH in the former Yugoslavia from 1994-6. In 1994 he was the UN's senior spokesman in Sarajavo.

From 1994-1999 Thant Myint-U was a fellow of Trinity College Cambridge, where he researched and taught Asian and British imperial history. He received his bachelor's degree from Harvard University in 1988, his master's degree in international relations from the Johns Hopkins School of Advanced International Studies in 1992 and his PhD in history from Cambridge University in 1996.

He is the author of several published and broadcast works, including two books: The Making of Modern Burma (Cambridge University Press, 2000) and The River of Lost Footsteps: Remembering Burma's Past (Farrar, Strauss and Giroux, 2006 forthcoming).

Reuben W. Hills Conference Room

Thant Myint-U Senior Visiting Fellow Speaker International Peace Academy
Seminars
-

David Hafemeister is a Science Fellow at Stanford's Center for International Security and Cooperation (2005-6). He is also Professor (emeritus) of Physics at California Polytechnic State University. He spent a dozen years in Washington as Professional Staff Member, Senate Committees on Foreign Relations and Governmental Affairs (1990-93 on arms control treaties at the end of the Cold War), Science Advisor to Senator John Glenn (1975-77), Special Assistant to Under Secretary of State Benson and Deputy-Under Secretary Nye (1977-78), Visiting Scientist in the State Department's Office of Nuclear Proliferation Policy (1979), the Office of Strategic Nuclear Policy (1987) and Study Director at the National Academy of Sciences (2000-02). He also held appointments at Carnegie Mellon, MIT, Stanford, Princeton, and the Lawrence-Berkeley, Argonne and Los Alamos national laboratories. He was Chair of the APS Forum on Physics and Society (1985-6) and the APS Panel on Public Affairs (1996-7). He has written/edited ten books and 140 articles and was awarded the APS Szilard award in 1996.

Reuben W. Hills Conference Room

David Hafemeister Speaker
Seminars
-

Jacob N. Shapiro is a graduate student in political science at Stanford University and a homeland security fellow at CISAC. He is also an associate at the Combating Terrorism Center at the United States Military Academy and teaches on terrorist financing at the Naval Postgraduate School. His research focuses on the organizational dynamics of terrorist groups. His current projects use economic and sociological organization theory to examine the interactions between individual motivations and organizational structure in covert groups. As a Naval Reserve officer he was assigned to the Office of Naval Intelligence and the Naval Warfare Development Command. Prior to attending Stanford, he served on active duty at Special Boat Team 20 and onboard the USS Arthur W. Radford (DD-968). He received his BA with honors in political science from the University of Michigan.

Reuben W. Hills Conference Room

Jacob N. Shapiro Speaker
Seminars
-

Dr. Ronald F. Lehman II is Director of the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory. Ron also is Chairman of the Governing Board of the International Science and Technology Center (ISTC) in Moscow. . He serves on the State Department Arms Control and Nonproliferation Advisory Board (ACNAB) and as a member of the Department of Defense Threat Reduction Advisory Committee (TRAC). Previously, he was the Director of the U.S. Arms Control and Disarmament Agency and has served in the Defense Department as Assistant Secretary, in the State Department as U.S. Chief Negotiator on Strategic Offensive Arms (START), and in the White House as Deputy Assistant to the President for National Security Affairs.

Tuan H. Nguyen is the Herbert York Fellow in the Center for Global Security Research at the Department of Energy's Lawrence Livermore National Laboratory. In addition, he is a member of the Forensic Science Center in the Chemistry and Materials Science Directorate at Livermore. Dr. Nguyen has been an Adjunct Professor of Chemistry at California State University, East Bay. He received his BS in biochemistry and a PhD in organic chemistry.

Reuben W. Hills Conference Room

Ron Lehman III Speaker Lawrence Livermore National Laboratory
Tuan Nguyen Speaker Lawrence Livermore National Laboratory
Seminars
Subscribe to International Development