Business
Authors
News Type
News
Date
Paragraphs
George Habash, a militant and former secretary-general of the Popular Front for the Liberation of Palestine, once characterized terrorism as a "thinking man's game." Fighting terrorism is a thinking game, too, as illustrated by CISAC scholars Lawrence M. Wein and Jonathan Farley who use operations research and mathematics to devise rational methods for homeland security policy making.

George Habash, a militant and former secretary-general of the Popular Front for the Liberation of Palestine, once characterized terrorism as a "thinking man's game." Using mathematics, researchers at Stanford University's Center for International Security and Cooperation (CISAC) have made fighting terrorism a thinking man's game as well.

CISAC affiliate Lawrence M. Wein of the Graduate School of Business and CISAC Science Fellow Jonathan Farley are both applying mathematical models to homeland security problems, such as preventing a nuclear detonation in a major U.S. city and determining whether terrorist cells have likely been disrupted.

Wein, who teaches operations classes about different business processes used to deliver goods and services, has focused his research on bioterrorism and border issues. He has performed, he says, the first mathematical analyses of hypothetical botulism poisoning, anthrax outbreaks and smallpox infections.

"One overriding theme of my work is that all these homeland security problems are operations problems," said Wein, the Paul E. Holden Professor of Management Science. "Just as McDonald's needs to get hamburgers out in a rapid and defect-free manner, so too does the government have to get vaccines and antibiotics out and test the borders for nuclear weapons or terrorists in a rapid and defect-free manner."

In collaboration with Stephen Flynn of the Council on Foreign Relations, a nonpartisan research center, Wein recently has conducted research to improve security at U.S. borders and ports. Port security has received significant attention recently owing to the furor over Dubai Ports World's bid to manage six terminals at major U.S. harbors. The aim of Wein and Flynn's work is to prevent terrorists from bringing into the country a nuclear weaponbe it an atomic bomb or a so-called "dirty bomb," or conventional explosive packed with radioactive waste.

"Of all the problems I've studied, this is the most important because the worst-case terrorist scenario is a nuclear weapon going off in a major U.S. city and also it is the one the government has dropped the ball on the most," Wein said. "They have done a very poor job."

Instead of using the existing approach, where U.S. Customs actively inspects a minority of containers based on information from a specialized tracking system designed to identify suspicious containers, Wein and Flynn have recommended the government use a multi-layer, passive screening system for every container entering the country. Under their system, Customs would photograph a shipping container's exterior, screen for radioactive material and collect gamma-ray images of the container's contents. If terrorists shielded a bomb with a heavy metal such as lead to hide it from radiation detectors, gamma-ray imaging would allow inspectors to see the shielding and flag the container for inspection. Wein and Flynn believe this whole process would cost about $7 per container.

"Right now about maybe 6 percent of the containers are deemed suspicious and they will go through some testing and the other 94 percent of the containers just waltz right into the country without an inspector laying an eye on them," Wein said. "What we're proposing to do is 100 percent passive testing."

Wein's earlier work addressed a different threat: bioterrorism. In 2005, Wein revealed the nation's milk supply was vulnerable--a terrorist could potentially poison 100,000 gallons of milk by sneaking a few grams of botulinum into a milk tanker. Although the government and dairy industry have collaborated to intensify the heat pasteurization formula for milk, Wein is still pushing for additional botulinum testing, which he says would cost less than 1 percent of the cost of milk.

Wein also has used math to study smallpox outbreaks, the U.S. fingerprint identification system and U.S.-Mexico border security issues. Wein's congressional testimony on the fingerprint identification system in 2004 led to a switch from a two-finger system to a 10-finger system. His 2003 research on anthrax attacks resulted in a Washington, D.C., pilot program to use the U.S. Postal Service to distribute antibiotics throughout the capital after an outbreak. Seattle is now testing a similar program.

"In Washington, D.C., now, if there is a large-scale anthrax attack, postal workers will be the first to get their Cipro and, on a voluntary basis, they will go door-to-door distributing antibiotics," Wein said.

He said the common thread throughout his research is queuing theory, or the mathematical study of waiting lines, but he also draws upon mathematical epidemiology for his smallpox studies; air dispersion models for the anthrax model; supply chain management for the milk study; probability theory for the fingerprint identification system; and models for nuclear transport and detection for his work with containers.

From tainted lactose to lattice structures

While Wein is working on improving the government's counterterrorism systems, Jonathan Farley is working to figure out when terrorist organizations have been effectively disrupted. His mathematical model is designed to help law enforcement decide how to act once they have captured or killed a terrorist or a number of terrorists in a cell.

A professor at the University of the West Indies who will chair the Department of Mathematics and Computer Science there next year, Farley is on a one-year science fellowship at CISAC. In 2003, he co-founded Phoenix Mathematical Systems Modeling Inc., a company that develops mathematical solutions to homeland security problems.

He is using lattice theory--a branch of mathematics that deals with ordered sets--to determine the probability a terrorist cell has been disrupted once some of its members have been captured or killed.

"Law enforcement has to make decisions about what resources they should allocate to target different cells," Farley said. "The model should provide them with a more rational basis for allocating their scarce resources. ... It will inform you when you're making decisions about how much time and effort and how much money you're going to spend going after a particular cell."

While at Stanford, Farley hopes to unearth the perfect structure, mathematically speaking, for a terrorist cell--or in other words, a cell structure that is most resistant to the loss of members.

"If it's possible to determine the structure of an ideal terrorist cell, you can focus on a much smaller number of possibilities, because it makes more sense to assume the adversary is going to be smart rather than stupid," Farley said.

Farley has suggested it is possible Al-Qaida and other terrorist organizations already may have figured out the perfect structure for a terror cell by trial and error.

"I don't expect Osama bin Laden to be reading lattice theory in his caves in Afghanistan," said Farley. "But if it follows from the mathematics, perhaps heuristically, the terrorists will have come to the same conclusion--that this is the best way to structure a terrorist cell."

Although Farley acknowledges his model is not a panacea for terrorism, he hopes it will help reduce guesswork that might be involved in pursuing terrorists.

"It's not that I think mathematics can solve all of these problems," Farley said. "Because it can't. But it's better to use rational means to make decisions rather than guesswork."

John B. Stafford is a science-writing intern at Stanford News Service.

All News button
1
-

One of the fundamental challenges facing the United States Department of Homeland Security is the determination of what is critical in critical infrastructure systems such as water, Internet, power, energy, and transportation. Current practice is focused on single-point security audits of things like power plants, airport terminals, and refineries. But this approach does not identify the most vital components of any infrastructure which leads to an inadequate strategy and wasted funding. We show that single-point audits lead to the wrong conclusions and do not provide sufficient national security relative to the effort and money being spent. Instead, we propose an approach similar to social network analysis whereby a critical infrastructure is modeled as a network and then analyzed to identify the critical nodes and links. We present models and software to analyze such networks to obtain optimal resource allocation such that network risk is minimized. In the parlance of network science, our approach extends the theory of scale free networks to incorporate damage estimates for nodes and links. By exploiting the structure inherent in a network, we are able to allocate resources in the most optimal manner, which leads to a fundamentally different strategy than currently practiced.

Rudolph Darken is the Director of the Institute for Modeling, and Simulation (MOVES) and an Associate Professor of Computer Science at the Naval Postgraduate School in Monterey, California. He is the Chair of the MOVES Curriculum Committee and is also the Associate Director for Research for the Center for Homeland Defense and Security. His personal research has been primarily focused on human factors and training using virtual environments and computer gaming media with emphasis on navigation and wayfinding in large-scale virtual worlds. He is a Senior Editor of PRESENCE Journal, the MIT Press journal of teleoperators and virtual environments. He received his B.S. in Computer Science Engineering from the University of Illinois at Chicago in 1990 and his M.S. and D.Sc. degrees in Computer Science from The George Washington University in 1993 and 1995, respectively.

Ted Lewis is Professor of Computer Science and Academic Associate of the Homeland Security curriculum at the Naval Postgraduate School. He served as Sr. Vice President of Eastman Kodak Company, President and CEO of DaimlerChrysler Research, North America, Editor-in-Chief (twice) of IEEE Computer magazine and IEEE Software magazine, and has authored more than 100 papers and 30 books over the past 35 years on subjects ranging from software engineering, parallel processing, to hi-tech business. Currently, he teaches the Critical Infrastructure Protection course at NPS and does research in the application of network science to strategy and policy questions for the US Department of Homeland Security. Dr. Lewis' textbook, "Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation" will be published by John Wiley & Sons, in April 2006.

Reuben W. Hills Conference Room

Rudolph Darken Director, Institute for Modeling and Simulation; Associate Professor of Computer Science Speaker Naval Postgraduate School
Ted Lewis Professor of Computer Science; Academic Associate of the Homeland Security Curriculum Speaker Naval Postgraduate School
Seminars
Authors
News Type
Commentary
Date
Paragraphs
Ellen Johnson Sirleaf's inauguration provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries. CISAC's Jeremy M. Weinstein and colleague Steve Radelet tell how, in this Boston Globe op-ed.

Ellen Johnson Sirleaf's inauguration as the president of Liberia marks a watershed in the country's tumultuous history.

Twenty-five years of misrule and civil war under Samuel Doe, Charles Taylor, and successive interim governments have left the country in ruins. Nearly 300,000 Liberians lost their lives, average income is one-eighth what it was in 1980, and large majorities of the population subsist in dire poverty.

Since United Nations and US troops ousted Taylor in 2003, a fragile peace has taken hold, supported by 15,000 UN peacekeepers. With free and peaceful elections under their belts, Liberians are feeling new optimism and hope. Markets here are bustling, stores are freshly painted and open for business, and newspapers and radios feature lively debate.

The new government is a clear break from a past characterized by rule by force, extensive corruption, and a culture of impunity. Sirleaf, the first African woman elected head of state, has been an outspoken champion of accountability, transparency, and good governance for decades, a stance that landed her in jail twice and was a hallmark of her opposition to past governments and campaign for the presidency.

Already change is underway. She has instituted a code of conduct and full financial disclosure for senior officials, and endorsed a program that will install internationally recruited financial controllers in several state enterprises and create a strong anticorruption commission. Her government plans to publish financial accounts on the Web, make it easier for whistleblowers to report infractions, and rewrite Liberia's outdated constitution to firmly establish participatory democracy, decentralize power, and install robust checks on the executive.

Recovery from deep conflict in Africa is not easy, but we know it is possible. Mozambique was destroyed by civil war in the 1980s, but its democratically elected government led the way to peace, stability, and a doubling of income in a dozen years. Sierra Leone suffered a blood bath in the 1990s, but the 1999 peace agreement and 2001 elections brought stability and economic growth of 7 percent a year. Rwanda's genocide was followed by a recovery that few could have imagined.

But Sirleaf faces a daunting task. Liberia's recovery will depend mainly on Liberians themselves, but it will require strong international support, just as in Mozambique, Sierra Leone, and Rwanda.

West Africa's civil wars have spawned widespread smuggling of diamonds, transshipment of drugs, and easy money laundering opportunities for global terrorist groups. Liberia's historic moment provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries.

First, the United States must continue its crucial role in the demobilization of combatants and commit to long-term rebuilding of Liberia's police and army. The new government must be able to maintain and enhance security to begin to recover.

Second, the administration should support rapid and comprehensive forgiveness of Liberia's debts, which were mainly undertaken and wasted by the rapacious Doe government. It makes no more sense to stick today's Liberians with the bill, including 20 years of accumulated interest, than to force today's Iraqis to pay Saddam Hussein's bills.

Third, and perhaps most urgent, Congress should approve supplemental funding of $50 million to $100 million to support the new government. Unfortunately, Congress recently cut the administration's initial request for Liberia, a short-sighted step that sent the wrong signal to a struggling democracy and old ally at a crucial turning point. These funds would build critical infrastructure, put kids back into schools, and continue vital training for security forces. It would give Liberians their best chance of securing peace and basic freedoms.

All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
-

This presentation is based on a paper written by Anne Platt Barrows, Paul Kucik, William Skimmyhorn and John Straigis.

Paul Kucik is a Major in the U.S. Army. He served in Aviation units in a series of assignments, including Company Command. He then served as Assistant Professor in the Department of Social Sciences at the United States Military Academy. He later served as analyst and as deputy director of the U.S. Army Office of Economic and Manpower Analysis. He has a Bachelor of Science degree in Economics from the United States Military Academy and a Master of Business Administration from the Massachusetts Institute of Technology.

Anne Platt Barrows is a Member of the Technical Staff in the Advanced System Deployments department at Sandia National Laboratories in Livermore, California. She focuses on facility protection, primarily on defending facilities against attacks with chemical agents. She holds a B.S. degree in Electrical Engineering and a B.A. in Ethics, Politics, and Economics from Yale University.

William Skimmyhorn is a Captain in the U.S. Army. He has served in Aviation units in a variety of assignments including Bosnia, Kosovo and two tours in Korea. His jobs have ranged from Platoon Leader to Liaison Officer to Troop Commander. He is currently a dual Master's Student at Stanford University studying International Policy and Management Science and Engineering. He has a Bachelor of Science Degree in Economics from the United States Military Academy.

John Straigis is currently working as a Systems Engineer at Lockheed Martin Space Systems Company in Sunnyvale, California. He just celebrated his second anniversary with the company, and is presently in Special Programs. Concurrently, he is completing his second Master's degree from Stanford University, in Management Science and Engineering, with a focus on Decision and Risk Analysis. His first Master's, before beginning his career at Lockheed Martin, was in Aero/Astro Engineering, also from Stanford. For undergraduate, he attended Rose-Hulman Institute of Technology, in Terre Haute, Indiana, receiving double degrees in Chemical Engineering and Mechanical Engineering. Outside of work and school, he enjoys several sports, particularly ice hockey, in which he is the starting goaltender for the Stanford ice hockey team.

Reuben W. Hills Conference Room

Paul Kucik PhD Candidate Speaker Department of Management Science and Engineering, Stanford
Seminars
-

Post-9/11, the U.S. government instituted the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) Program, which compares two index fingerprints from every foreign visitor entering the U.S. against a watchlist of fingerprints from several million criminals and suspected terrorists. In the first part of this talk, we develop a new probabilistic model for fingerprint matching that allows for population heterogeneity in fingerprint image quality, calibrate this model using data from the National Institute of Standards and Technology (NIST), and embed the model into a Stackelberg game, in which the U.S. government chooses an optimal biometric strategy to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses his fingerprint image quality to minimize his detection probability. We predict that switching from a two-finger system to a ten-finger system would increase the detection probability in this game from 0.526 to 0.949. This work was the basis of Congressional testimony last fall, and the Department of Homeland Security recently announced that they are switching from a two-finger system to a ten-finger system. In the second part of this talk, we use new data from Cogent (the biometrics vendor for the U.S. Visit Program) to derive a two-stage, two-finger biometric strategy that works as well as a one-stage, ten-finger strategy. The second stage of this two-stage strategy employs texture matching rather than the traditional minutiae matching.

Manas Baveja is a doctoral candidate in the Institute for Computational and Mathematical Engineering at Stanford University and a CISAC science fellow. His doctoral research is focused on quantitative modeling of homeland security projects.

Lawrence Wein is the Paul E. Holden Professor of Management Science at the Graduate School of Business, Stanford University, and an affiliated faculty member at CISAC.

Reuben W. Hills Conference Room

Manas Baveja Speaker

Graduate School of Business
Stanford University
Stanford, CA 94305-5015

(650) 724-1676 (650) 725-0468
0
Jeffrey S. Skoll Professor of Management Science
CISAC Affiliated Faculty Member
Wein.jpg PhD

Lawrence Wein is the Jeffrey S. Skoll Professor of Management Science at the Graduate School of Business, Stanford University, and an affiliated faculty member at CISAC. After getting a PhD in Operations Research from Stanford University in 1988, he spent 14 years at the Sloan School of Management at MIT, where he was the DEC Leaders for Manufacturing Professor of Management Science. His research interests include mathematical models in operations management, medicine and biology.

Since 2001, he has analyzed a variety of homeland security problems. His homeland security work includes four papers in Proceedings of the National Academy of Sciences, on an emergency response to a smallpox attack, an emergency response to an anthrax attack, a biometric analysis of the US-VISIT Program, and an analysis of a bioterror attack on the milk supply. He has also published the Washington Post op-ed "Unready for Anthrax" (2003) and the New York Times op-ed "Got Toxic Milk?", and has written papers on port security, indoor remediation after an anthrax attack, and the detention and removal of illegal aliens.

For his homeland security research, Wein has received several awards from the International Federation of Operations Research and Management Science (INFORMS), including the Koopman Prize for the best paper in military operations research, the INFORMS Expository Writing Award, the INFORMS President’s Award for contributions to society, the Philip McCord Morse Lectureship, the Frederick W. Lanchester Prize for best research publication, and the George E. Kimball Medal. He was Editor-in-Chief of Operations Research from 2000 to 2005, and was elected to the National Academy of Engineering in 2009.   

CV
Lawrence M. Wein Speaker
Seminars
-

Many critiques have been made of the U.S. Intelligence Community's performance in thwarting terrorist attacks (i.e. 9/11) and understanding the proliferation of WMD (i.e. Iraq). Given the reports from the 9/11 and WMD commissions as well as last year's legislation establishing the position of National Intelligence Director, what in fact are the deficiencies of the Intelligence Community and what changes have the best chance of correcting them and preventing future intelligence failures?

This seminar will feature a panel discussion by three experts on intelligence issues. They will focus their comments on the issues, challenges, and potential solutions for improving the U.S. Intelligence Community capabilities to provide timely warning and accurate assessments of future threats. They will then invite comments, questions, and discussion.

Sidney Drell is a professor of theoretical physics (Emeritus) at the Stanford Linear Accelerator Center and a senior fellow at the Hoover Institution. As a physicist and arms control specialist, he has been a leader in providing essential technical advice to the U.S. Government on national security issues. He is an active member of JASON, a group of distinguished scientists, and has served on a number of boards, including the President's Foreign Intelligence Advisory Board, the President's Science Advisory Committee, and the Non-Proliferation Advisory Panel.

Keith Hansen is a consulting professor of international relations teaching courses on U.S. intelligence and arms control/proliferation. His 35-year government career included seven years on the National Intelligence Council, where he managed numerous national intelligence estimates and other interagency studies on strategic and nuclear issues, and where he served as the National Intelligence Officer for Strategic Programs and Nuclear Proliferation.

Henry Rowen is Director Emeritus of the Asia/Pacific Research Center, professor of public policy and management (emeritus) at Stanford's Graduate School of Business, and senior fellow at the Hoover Institution. He was Assistant Secretary of Defense for International Security Affairs in the Department of Defense (1989-1991), Chairman of the DCI's National Intelligence Council (1981-1983), President of RAND Corporation (1968-1972), and Assistant Director of the U.S. Bureau of the Budget (1965-1966). Most recently, he was a Member of the President's Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.

Reuben W. Hills Conference Room

Henry S. Rowen Speaker
Keith Hansen Visiting professor of international relations Speaker
Sidney D. Drell Professor of theoretical physics (Emeritus) Speaker Stanford University
Seminars
-

Has the Bush administration used the War on Terror to consolidate power in the executive branch? Is the United States in danger of undermining civil liberties and laying the foundation for an American police state? Arguing against conventional wisdom the authors answer these questions with an emphatic No. Drawing on evidence from the USA Patriot Act, the creation of the Department of Homeland Security, the Transportation Security Administration, intelligence reform, and the detention of enemy combatants, the authors argue that what is most striking about US homeland security policy in the wake of 9-11 is just how weak the response of the American state has been. This outcome is contrary to both conventional wisdom and theoretical expectation. The authors argue that this puzzle is best explained by focusing on the institutional structure of US domestic politics.

Jay Stowsky is an adjunct professor at the University of California, Berkeley's School of Information Management and Systems (SIMS) and is the executive drector of UC Berkeley's Services Science Program. Previously, he directed UC Berkeley's program on Information Technology and Homeland Security at the Goldman School of Public Policy and served in the Clinton administration as senior economist for science and technology policy on the staff of the White House Council of Economic Advisers. Stowsky has also served as associate dean at UC Berkeley's Haas School of Business and as director of research policy for the University of California system. He has authored several studies of U.S. technology policy, including "Secrets to Share or Shield: New Dilemmas for Military R&D in the Digital Age," in Research Policy (Vol. 33, No. 2, March 2004) and "The Dual-Use Dilemma," in Issues in Science and Technology (Winter 1996). He is co-author, with Wayne Sandholtz, et al., of The Highest Stakes: The Economic Foundations of the Next Security System (Cambridge Oxford University Press, 1992).

Matthew Kroenig is a PhD candidate in the Department of Political Science at UC Berkeley and a Public Policy and Nuclear Threats Fellow at the Institute of Global Conflict and Cooperation. Kroenig's dissertation research explains the conditions under which states provide sensitive nuclear assistance to nonnuclear weapons states. Previously, he was a research associate with the Information Technology and Homeland Security Project and has also served in government as an intelligence analyst.

Reuben W. Hills Conference Room, East 207, Encina Hall

Matt Kroenig PhD Candidate Speaker Department of Political Science, UC Berkeley
Jay Stowsky Adjunct Professor Speaker School of Information Management and Systems, UC Berkeley
Seminars
-

Shapiro presents research he conducted with David A. Siegel, a student in Stanford's Graduate School of Business:

A review of international terrorist activity reveals a recurring pattern of financially strapped operatives working for terrorist organizations that seem to have plenty of money. This observation is hard to square with traditional accounts of terrorist financial and logistical systems, accounts that stress the efficiency with which terrorist financial networks distribute funds while operating through a variety of covert channels. In order to explain the observed inefficiencies, we present a hierarchical model of terror organizations in which leaders must delegate financial and logistical tasks to middlemen for security reasons; however, these middlemen do not always share their leaders' interests. In particular, the temptation always exists to skim funds from any financial transaction. To counteract this problem, leaders can threaten to punish the middlemen. Because logisticians in international terrorist organizations are often geographically separated from leaders, and because they can defect to the government if threatened, violence is rarely the effective threat it is for localized groups such as the IRA. Therefore leaders must rely on more prosaic strategies to solve this agency problem; we focus on leaders' ability to remove middlemen from the network, denying them the rewards of future participation. We find that when the middlemen are sufficiently greedy, and when the organization suffers from a sufficiently strong budget constraint, that leaders will choose not to fund attacks in equilibrium because the costs of skimming are too great. Further, we show there can be important non-linearities in terrorists' response to government counter-terrorism. Specifically, we find that given constrained funding for terrorists, government efforts will yield few results until they reach a certain threshold, at which point cooperation between leaders and middlemen in terrorist groups breaks down leading to a dramatic drop in the probability of terrorist success.

Reuben W. Hills Conference Room, East 207, Encina Hall

Jacob N. Shapiro
Seminars
Subscribe to Business