International Development

FSI researchers consider international development from a variety of angles. They analyze ideas such as how public action and good governance are cornerstones of economic prosperity in Mexico and how investments in high school education will improve China’s economy.

They are looking at novel technological interventions to improve rural livelihoods, like the development implications of solar power-generated crop growing in Northern Benin.

FSI academics also assess which political processes yield better access to public services, particularly in developing countries. With a focus on health care, researchers have studied the political incentives to embrace UNICEF’s child survival efforts and how a well-run anti-alcohol policy in Russia affected mortality rates.

FSI’s work on international development also includes training the next generation of leaders through pre- and post-doctoral fellowships as well as the Draper Hills Summer Fellows Program.

Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
-

Robert A. Pape is a professor of political science at the University of Chicago specializing in international security affairs. His publications include Dying to Win: The Strategic Logic of Suicide Terrorism (Random House, June 2005); Bombing to Win: Air Power and Coercion in War (Cornell, 1996), "Why Economic Sanctions Do Not Work," in International Security (1997), "The Determinants of International Moral Action," in International Organization (1999), "The Strategic Logic of Suicide Terrorism," in American Political Science Review (August 2003), "The True Worth of Air Power," in Foreign Affairs (March/April 2004), and "Soft Balancing against the United States," in International Security (Summer 2005).

His commentary on international security policy has appeared in The New York Times, Washington Post, The New Republic, Boston Globe, Los Angeles Times and Bulletin of the Atomic Scientists. He has appeared on The News Hour with Jim Lehrer; Nightline; ABC News; CNN's Wolf Blitzer, Anderson Cooper and Lou Dobbs; Fox's John Gipson; CNN International; and National Public Radio.

Before coming to Chicago in 1999, he taught international relations at Dartmouth College for five years and air power strategy for the U.S. Air Force's School of Advanced Airpower Studies for three years. He received his PhD from the University of Chicago in 1988 and graduated summa cum laude and Phi Beta Kappa from the University of Pittsburgh in 1982. His current work focuses on the origins of suicide terrorism and the logic of soft balancing in a unipolar world.

Reuben W. Hills Conference Room

Robert A. Pape Professor of Politicial Science Speaker University of Chicago
Seminars
-

Sigfried Hecker is a visiting professor at CISAC and an emeritus director of Los Alamos National Laboratory. A metallurgist, he focuses on plutonium science and nuclear weapons stockpile stewardship, while working closely with the Russian Academy of Sciences and the Russian Ministry of Atomic Energy on a variety of cooperative threat reduction programs. He is actively involved with the U.S. National Academies, serving on the Council of the National Academy of Engineering, as chair of the newly established Committee on Counterterrorism Challenges for Russia and the United States, and as a member of the National Academies Committee on Nuclear Nonproliferation. At CISAC, he also contributes regularly to seminars and to the popular undergraduate course, Technology and National Security, taught by William Perry and Elisabeth Paté-Cornell.

Directing Los Alamos National Laboratory from 1986 through 1997, Hecker was named Laboratory Director of the Year by the National Laboratory Consortium in 1998. He has devoted most of his career to providing technical and leadership expertise to the laboratory, beginning with summer graduate school and postdoctoral assignments there. After a three-year stint as a senior research metallurgist with the General Motors Research Laboratories, he returned to Los Alamos in 1973 as a technical staff member in the laboratory's Physical Metallurgy Group. Later he led the Science and Technology Division and chaired the Center for Materials Science before becoming director.

Among his professional distinctions, Hecker is a member of the National Academy of Engineering; a foreign member of the Russian Academy of Sciences; a fellow of the TMS, or Minerals, Metallurgy and Materials Society; a fellow of the American Society for Metals; an honorary member of the American Ceramics Society; and a fellow of the American Academy of Arts and Sciences. His achievements have been recognized with the American Nuclear Society's Seaborg Medal and many other awards, including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Reuben W. Hills Conference Room

CISAC
Stanford University
Encina Hall, C220
Stanford, CA 94305-6165

(650) 725-6468 (650) 723-0089
0
Senior Fellow, Freeman Spogli Institute for International Studies, Emeritus
Research Professor, Management Science and Engineering, Emeritus
hecker2.jpg PhD

Siegfried S. Hecker is a professor emeritus (research) in the Department of Management Science and Engineering and a senior fellow emeritus at the Freeman Spogli Institute for International Studies (FSI). He was co-director of CISAC from 2007-2012. From 1986 to 1997, Dr. Hecker served as the fifth Director of the Los Alamos National Laboratory. Dr. Hecker is an internationally recognized expert in plutonium science, global threat reduction, and nuclear security.

Dr. Hecker’s current research interests include nuclear nonproliferation and arms control, nuclear weapons policy, nuclear security, the safe and secure expansion of nuclear energy, and plutonium science. At the end of the Cold War, he has fostered cooperation with the Russian nuclear laboratories to secure and safeguard the vast stockpile of ex-Soviet fissile materials. In June 2016, the Los Alamos Historical Society published two volumes edited by Dr. Hecker. The works, titled Doomed to Cooperate, document the history of Russian-U.S. laboratory-to-laboratory cooperation since 1992.

Dr. Hecker’s research projects at CISAC focus on cooperation with young and senior nuclear professionals in Russia and China to reduce the risks of nuclear proliferation and nuclear terrorism worldwide, to avoid a return to a nuclear arms race, and to promote the safe and secure global expansion of nuclear power. He also continues to assess the technical and political challenges of nuclear North Korea and the nuclear aspirations of Iran.

Dr. Hecker joined Los Alamos National Laboratory as graduate research assistant and postdoctoral fellow before returning as technical staff member following a tenure at General Motors Research. He led the laboratory's Materials Science and Technology Division and Center for Materials Science before serving as laboratory director from 1986 through 1997, and senior fellow until July 2005.

Among his professional distinctions, Dr. Hecker is a member of the National Academy of Engineering; foreign member of the Russian Academy of Sciences; fellow of the TMS, or Minerals, Metallurgy and Materials Society; fellow of the American Society for Metals; fellow of the American Physical Society, honorary member of the American Ceramics Society; and fellow of the American Academy of Arts and Sciences.

His achievements have been recognized with the Presidential Enrico Fermi Award, the 2020 Building Bridges Award from the Pacific Century Institute, the 2018 National Engineering Award from the American Association of Engineering Societies, the 2017 American Nuclear Society Eisenhower Medal, the American Physical Society’s Leo Szilard Prize, the American Nuclear Society's Seaborg Medal, the Department of Energy's E.O. Lawrence Award, the Los Alamos National Laboratory Medal, among other awards including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Date Label
Siegfried S. Hecker Speaker
Seminars
Paragraphs

Chapter 6 in Reappraising Openheimer: Centennial Studies and Reflections, edited by Cathryn Carson and David A. Hollinger (Office for History and Science of Technology, University of California, Berkeley, 2005).

The editors write: "From the beginning all the way up to the present, the Soviet nuclear weapons project has served as foil for the American effort. It preoccupied Robert Oppenheimer's minders in the Manhattan Project, fixated by the possibility of espionage; it drove his postwar attempts to achieve international control of atomic weapons just as surely as it lit up his opponents' mistrust of his stance on the hydrogen bomb. Throughout the arms race, Soviet progress vis-a-vis American weapons production helped drive the dynamic of the Cold War. More recently, Soviet and post-Soviet sources have inspired careful reanalysis of the dual courses of the two nations' nuclear projects. That effort has shed new light on the conditions under which Oppenheimer's wartime labors could find the conclusion they did. . . .

"David Holloway explores parallels between Robert Oppenheimer and his Soviet counterpart, Iulii Khariton. Similarities in background and differences in role make Holloway's contrast instructive."

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
University of California, Berkeley in "Reappraising Oppenheimer: Centennial Studies and Reflections"
Authors
David Holloway
Paragraphs

A net assessment of the benefits/losses of arms control treaties in terms of military significance was required in response to the START Resolution of Ratification. The response by the Executive Branch belabored smaller issues, avoided accomplishments and didn't carry out the net assessment.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Science and Global Security
Authors
Paragraphs

We investigate the impact on effective terrorism response of the viability degradation of biological weapons agents in the environment. We briefly review the scientific understanding and modeling of agent environmental viability degradation. In general, agent susceptibility to viability loss is greatest for vegetative bacteria, intermediate for viruses, and least for bacterial spores. Survival is greatest in soil and progressively decreases in the following environments: textiles, water, hard surfaces, and air. There is little detailed understanding of loss mechanisms. We analyze the time behavior and sensitivity of four mathematical models that are used to represent environmental viability degradation (the exponential, probability, and first- and second-order catastrophic decay models). The models behave similarly at short times (<30 min for our example case) but diverge to significantly different values at intermediate to long times. Hence, for a release event in which the majority of atmospheric exposure or deposition occurs over very short times, the current response models likely provide a good representation of the hazard. For longer time phenomena, including decontamina tion, the current model capabilities are likely insufficient. Finally, we implement each model in a simple numerical integration of anthrax dispersion, viability degradation, and dose response. Decay models spanning the current knowledge of airborne degradation result in vastly different predicted hazard areas. This confounds attempts to determine necessary medical and decontamination measures. Hence, the current level of understanding and representation of environmental viability degradation in response models is inadequate to inform appropriate emergency response measures.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Environmental Science and Technology
Authors
Paragraphs

On June 16, 2002, Dennis Pluchinsky, a senior intelligence analyst at the U.S. Department of State, wrote an article in the Washington Post calling for censorship. The article began, "I accuse the media in the United States of treason." Pluchinsky, who worked counterterrorism in the government for twenty-five years, pointed to post-9/11 articles that revealed not scientific advancements, but American vulnerabilities in regard to the food supply, electricity, chemical production, transportation, and border security. He suggested that research conducted by the media could not have been funded by one, single terrorist organization: "Our news media, and certain think tankers and academicians, have done and continue to do the target vulnerability research for them."

Pluchinsky has a point. Terrorist organizations can and do use the media--and the protections afforded speech in the United States and the United Kingdom--to obtain and disseminate critical information.

The crucial point is this: Both liberal, democratic states, and nonstate terrorist organizations need free speech. Under what circumstances are the interests of the state secured and the opportunism of terrorist organizations avoided? Here, the experiences of the United States and United Kingdom prove instructive. On both sides of the Atlantic, where the state acts as sovereign, efforts to restrict persuasive political speech have relaxed over time to allow for more criticism. In the United States, Brandenburg v. Ohio cemented this shift. In the United Kingdom, change came gradually. The practical elimination of treason and seditious libel, and incorporation of the European Convention of Human Rights (ECHR) into domestic law through the 1998 Human Rights Act (HRA), marked the transition. If free speech remains central to our understanding of liberal democracy, it would nevertheless be naïve to rely on these alterations to protect expression in the contemporary counterterrorist environment--regardless of how remarkable they might be in the context of what went before.

Underlying my argument in this paper is a deeper concern that centers on the shifting nature of technology. What the average person could have done in 1776, or for that matter, 1976, to hurt either state pales in comparison to what a person with basic knowledge of microbiology, $1000, and a lab can do today. But neither American nor British law appears to have come to terms with what weapons of mass destruction, in terrorist hands, means for free speech.

This article won the 2004-2005 Steven M. Block Civil Liberties award for the best piece of writing in civil liberties at Stanford Law School. It also won second place in the national competition for the 2005 Judge John R. Brown Award for Excellence in Legal Writing, which recognizes the best legal writing by U.S. law students.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Cardozo Law Review
Authors
-

This presentation is based on a paper written by Anne Platt Barrows, Paul Kucik, William Skimmyhorn and John Straigis.

Paul Kucik is a Major in the U.S. Army. He served in Aviation units in a series of assignments, including Company Command. He then served as Assistant Professor in the Department of Social Sciences at the United States Military Academy. He later served as analyst and as deputy director of the U.S. Army Office of Economic and Manpower Analysis. He has a Bachelor of Science degree in Economics from the United States Military Academy and a Master of Business Administration from the Massachusetts Institute of Technology.

Anne Platt Barrows is a Member of the Technical Staff in the Advanced System Deployments department at Sandia National Laboratories in Livermore, California. She focuses on facility protection, primarily on defending facilities against attacks with chemical agents. She holds a B.S. degree in Electrical Engineering and a B.A. in Ethics, Politics, and Economics from Yale University.

William Skimmyhorn is a Captain in the U.S. Army. He has served in Aviation units in a variety of assignments including Bosnia, Kosovo and two tours in Korea. His jobs have ranged from Platoon Leader to Liaison Officer to Troop Commander. He is currently a dual Master's Student at Stanford University studying International Policy and Management Science and Engineering. He has a Bachelor of Science Degree in Economics from the United States Military Academy.

John Straigis is currently working as a Systems Engineer at Lockheed Martin Space Systems Company in Sunnyvale, California. He just celebrated his second anniversary with the company, and is presently in Special Programs. Concurrently, he is completing his second Master's degree from Stanford University, in Management Science and Engineering, with a focus on Decision and Risk Analysis. His first Master's, before beginning his career at Lockheed Martin, was in Aero/Astro Engineering, also from Stanford. For undergraduate, he attended Rose-Hulman Institute of Technology, in Terre Haute, Indiana, receiving double degrees in Chemical Engineering and Mechanical Engineering. Outside of work and school, he enjoys several sports, particularly ice hockey, in which he is the starting goaltender for the Stanford ice hockey team.

Reuben W. Hills Conference Room

Paul Kucik PhD Candidate Speaker Department of Management Science and Engineering, Stanford
Seminars
Authors
Lawrence M. Wein
News Type
Commentary
Date
Paragraphs
The president's border security and immigration reform proposals won't protect Americans from the gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon. To tackle this problem, policymakers need to think inside the box, write CISAC's Lawrence M. Wein and colleague Stephen E. Flynn in this New York Times op-ed.

This week President Bush will seek to focus the nation's attention on border security and immigration reform. But the president's proposals won't protect Americans from our gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon.

The Bush administration maintains that it has a smart strategy to reduce this risk. A new 24-Hour Rule requires that importers report the contents of their containers to customs inspectors one day before the boxes are loaded on ships bound for the United States. The Department of Homeland Security's National Targeting Center then reviews the data, checking against other intelligence to determine which boxes may pose a threat. Although the containers deemed high risk are inspected at cooperating foreign ports or when they enter the United States, the rest--more than 90 percent--land here without any perusal.

We have two concerns about this strategy. First, it presumes that the United States government has good enough intelligence about Al Qaeda to reliably discern which containers are suspicious and which are not. But our inability to thwart the attacks in Iraq demonstrates that we lack such specific tactical intelligence. And supporting customs inspectors, who must make the first assessment of risk, is not a priority for the intelligence agencies. Inspectors must rely on their experience in spotting anomalies--a company that claims to be exporting pineapples from Iceland, for example.

Second, determined terrorists can easily take advantage of the knowledge that customs inspectors routinely designate certain shipments as low risk. A container frequently makes 10 or more stops between its factory of origin and the vessel carrying it to American shores. Many of the way stations are in poorly policed parts of the world. Because name-brand companies like Wal-Mart and General Motors are widely known to be considered low-risk, terrorists need only to stake out their shipment routes and exploit the weakest points to introduce a weapon of mass destruction. A terrorist cell posing as a legal shipping company for more than two years, or a terrorist truck driver hauling goods from a well-known shipper, can also be confident of being perceived as low risk.

So what needs to be done? A pilot project under way in Hong Kong, the world's largest container port along with Singapore, offers one piece of a potential solution. At an estimated cost of $7 per container, new technology can photograph the box's exterior, screen for radioactive material, and collect a gamma-ray image of a box's contents while the truck on which it is carried moves at 10 miles per hour.

Terrorists can defeat radiation sensors by shielding a dirty bomb with dense materials like lead. But by combining those sensors with gamma ray images, the Hong Kong system allows inspectors to sound the alarm on suspiciously dense objects. Inspectors would need to analyze enough of the scans--perhaps 20 percent to 30 percent--to convince terrorists that there is a good chance that an indistinct image will lead a container's contents to be sent for more reliable X-ray or manual examinations. Images of container contents would then be reviewed remotely by inspectors inside the United States who are trained to spot possible nuclear weapons.

If terrorists were to succeed in shipping a dirty bomb, for example, the database of these images could serve as a kind of black box--an invaluable forensic tool in the effort to identify how and where security was breached. That information could help prevent politicians from reacting spasmodically and freezing the entire container system after an attack.

Such a program could significantly reduce the likelihood that terrorists will smuggle plutonium or a dirty bomb through American ports. But it still would not stop a terrorist from importing highly enriched uranium, which can be used to construct a nuclear weapon. Lengthening the time that a container is screened for radiation would help, and this could be done without increasing waiting times if additional monitors were added to the Hong Kong system near the gate where the trucks must already stop for driver identification checks. Better still would be for the Department of Homeland Security to make the development of new technology that can recognize the unique signature of highly enriched uranium an urgent priority.

Finally, we must find ways to ensure that terrorists do not breach containers before shipments arrive at loading ports. Sensors should be installed inside containers in order to track their movements, detect any infiltration and discern the presence of radioactive material. Where boxes are loaded, certified independent inspectors should verify that companies have followed adequate protocols to ensure that legitimate and authorized goods are being shipped.

Taken together, these recommendations will require new investments and an extraordinary degree of international cooperation. But increased container security will not only help the United States prevent terrorism, it will also help all countries reduce theft, stop the smuggling of drugs and humans, crack down on tariff evasion and improve export controls. What's more, such a program would require an investment of just one one-hundredth of the capital that could be lost if we shut down the global container shipping system after an attack.

Container security is a complex problem with enormous stakes. American officials insist that existing programs have matters well in hand. But we cannot afford to take these perky reassurances at face value while the same officials fail to embrace promising initiatives like the Hong Kong pilot project.

All News button
1
-

Marc Trachtenberg, a historian by training, now teaches political science at UCLA. He's the author of a number of works on twentieth century international politics, including most notably A Constructed Peace: The Making of the European Settlement, 1945-1963. He just finished a book due to come out this spring called The Craft of History: A Guide to Method.

Reuben W. Hills Conference Room

Marc Trachtenberg Professor of Political Science Speaker University of California, Los Angeles
Seminars
Subscribe to International Development