Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition. This decision seems a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past? CISAC science fellow Jonathan Farley provides some mathematical insights.

You burst into the room. Sitting on a chair, blindfolded, his hands tied behind his back, is your prisoner. The room is dark, except for a lonely naked bulb hanging from the ceiling. He is sweating. He is afraid.

"Tell me where it is!" you scream. "Now!" You know there is little time left. Somewhere in your city, a time bomb is ticking. Whether it spits serin into the air, uranium into the water or atomic fire into the heavens, you do not know.

He does. But he is not talking. Involuntarily, you raise your hand as if to strike. What you are about to do violates the law and your conscience. And yet...

In peacetime, torture ranks next to murder as a primal sin. But during war, the debate begins over whether this evil can ever be justified to combat the seemingly greater evil of the enemy. Harvard law Professor Alan Dershowitz has said torture should be legalized.

In early October, the U.S. Senate voted 90-9 to ban it. Although Secretary of State Condoleezza Rice and President Bush have both recently asserted that "We do not torture," five U.S. Army Rangers were charged in November for punching and kicking detainees in Iraq, secret U.S. prisons have caused anxiety in Europe, and Vice President Dick Cheney has battled to win the CIA an exemption from the torture ban. As late as December, the U.S. House of Representatives stood poised to defeat the White House.

Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition.

The decision of an individual to support, or reject, torture seems at first to be a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past?

One cannot do experiments with societies, or predict the future, but, it turns out, one can attempt to address this issue using the cold, hard tools of mathematics and logic. This story begins in 1963.

The United States and the Soviet Union are on the perpetual brink of war, balanced like two sides of an equation. On the American side are "game theorists" like Thomas Schelling, recently awarded the Nobel Prize for his work on the strategy of conflict. On the Soviet side, there is the solitary mathematical psychologist Vladimir Lefebvre.

Just as mathematics could be used to describe logical reasoning, Lefebvre saw that mathematics could be used to describe ethical reasoning. If something was good -- for example, "church," "democracy," "prosperity," "kindness" -- it had value "1."

If something was evil -- "earthquake," "famine," "military defeat," "murder" -- it had value "0." But rarely were ethical situations so simple. For instance, "killing" is bad (0) but protecting one's country is good (1) -- so is war 1 or 0?

Lefebvre saw that, at the crudest level, there were essentially two types of ethical systems. Those that held that employing evil means to attain just ends was good, and those that saw that employing evil means to attain good ends was wrong.

There were also, crudely put, two types of relations between individuals: those entailing compromise (or cooperation) and those entailing confrontation.

Of course, evil people rarely see themselves as evil. So Lefebvre had to incorporate in his model of human nature the capacity of human beings to judge -- correctly or incorrectly -- the goodness or evil of their own acts, and to reflect upon their own judgments, and others'. "Reflexive Theory" was born.

It quickly became a paradigm within the Soviet defense establishment, with the publication of books such as "Mathematics and Armed Conflict." Nothing like it was known in the West.

With very simple assumptions -- for instance, that an individual who correctly sees his actions to be good when they are good, and evil if they are evil, is more highly regarded by society than an individual who incorrectly sees himself -- Lefebvre showed that in a society that accepted the compromise of good with evil, individuals would more often seek the path of confrontation with each other.

Lefebvre's insights were called upon by the State Department during negotiations with Mikhail Gorbachev in Reykjavik, Iceland. (And perhaps Lefebvre's model could be re-enlisted to help U.S. officials understand and negotiate with Arab and Muslim heads of state, who must also negotiate with their people.)

In support of Lefebvre's revolutionary new theory, a survey of Soviet émigrés and Americans was conducted in the 1970s. They were asked questions like, "Should a doctor conceal from a patient that he has cancer in order to diminish his suffering?" Overwhelmingly, the Americans would say no, and overwhelmingly, the Soviets yes. The Soviets accepted the compromise of good with evil; the Americans rejected it.

What does this mean? If Americans begin to accept the use of torture, American society might turn into a society of individuals in conflict.

Not uniformly, thanks to something called free will, but generally, with harmful consequences for society: Imagine two roads, with a stream of cars moving along each one. Each driver wants to reach his destination as quickly as possible; on occasion, drivers will impede each other.

On the first road, drivers rise in their own, and in other drivers', estimation if they yield. Drivers on the second road lose face when they yield. It is clear that traffic will move faster on the first road than on the second.

It can be argued that repressive states like Saudi Arabia, which bred most of the Sept. 11 hijackers, are on the second road. If the United States moved to accept torture, it could veer toward the second road, too -- the road of the Soviet Union.

And we know where that road ends. The Soviet Union no longer exists.

All News button
1
-

John Harvey has served since March 2001 as director of the Policy Planning Staff of the National Nuclear Security Administration. In this role he advises the NNSA Administrator on major policy and program decisions. He is responsible for analysis of program and policy options relating to NSC-directed policy reviews, the work of the Nuclear Weapons Council, external advisory boards, and interagency working groups. He has the lead in developing NNSA's long-range planning guidance--the so-called "front end" of the Program, Planning Budgeting and Execution process currently being implemented in NNSA. Of note, Harvey has been "point" for NNSA on the President's NSPD-4 Strategic Review, the Nuclear Posture Review and its associated implementation, the interagency review of nuclear testing issues, and on the drafting and implementation of National Security Presidential Directive (NSPD)-28 on Nuclear Weapons Command, Control, Safety, and Security. From March 1995 to January 2001, Harvey served as Deputy Assistant Secretary of Defense for Nuclear Forces and Missile Defense Policy where he developed and oversaw implementation of U.S. defense policy governing strategic and theater nuclear forces and ballistic missile defense.

Reuben W. Hills Conference Room

John Harvey Senior Technical Advisor Speaker the National Nuclear Security Administration
Seminars
-

The assumption that states can and ought to stop the flow of funds to terrorist organizations deserves greater scrutiny. Potential benefits obtained by disrupting financial networks may not decrease the intensity of attacks, even as they weaken terrorist organizations. The anti-money laundering model currently applied by the UK and US has proven counter-productive, undermining the states' counterterrorism efforts. The erosion of individual rights incorporated in the regime risks leaking into criminal law, thereby altering basic constitutional entitlements. Efforts to prevent extremists from obtaining funds may have a devastating affect on social services in poor regions and impede the development of civil society and "state building." What is intriguing about ATF is that it evokes many of the same issues that arise in other areas of counterterrorism. Whether and how to surmount them remains less than clear.

This event is a collaborative effort between CISAC and European Forum.

Encina Hall Central,
Second Floor, C231

Jacob Shapiro Speaker
Laura Donohue Speaker
Khalid Medani Speaker
Workshops
Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Paragraphs

You burst into the room. Sitting on a chair, blindfolded, his hands tied behind his back, is your prisoner. The room is dark, except for a lonely naked bulb hanging from the ceiling. He is sweating. He is afraid.

"Tell me where it is!" you scream. "Now!" You know there is little time left. Somewhere in your city, a time bomb is ticking. Whether it spits serin into the air, uranium into the water or atomic fire into the heavens, you do not know.

He does. But he is not talking. Involuntarily, you raise your hand as if to strike. What you are about to do violates the law and your conscience. And yet. ...

In peacetime, torture ranks next to murder as a primal sin. But during war, the debate begins over whether this evil can ever be justified to combat the seemingly greater evil of the enemy. Harvard law Professor Alan Dershowitz has said torture should be legalized.

In early October, the U.S. Senate voted 90-9 to ban it. Although Secretary of State Condoleezza Rice and President Bush have both recently asserted that "We do not torture," five U.S. Army Rangers were charged in November for punching and kicking detainees in Iraq, secret U.S. prisons have caused anxiety in Europe, and Vice President Dick Cheney has battled to win the CIA an exemption from the torture ban. As late as December, the U.S. House of Representatives stood poised to defeat the White House.

Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition.

The decision of an individual to support, or reject, torture seems at first to be a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past?

One cannot do experiments with societies, or predict the future, but, it turns out, one can attempt to address this issue using the cold, hard tools of mathematics and logic. This story begins in 1963.

The United States and the Soviet Union are on the perpetual brink of war, balanced like two sides of an equation. On the American side are "game theorists" like Thomas Schelling, recently awarded the Nobel Prize for his work on the strategy of conflict. On the Soviet side, there is the solitary mathematical psychologist Vladimir Lefebvre.

Just as mathematics could be used to describe logical reasoning, Lefebvre saw that mathematics could be used to describe ethical reasoning. If something was good -- for example, "church," "democracy," "prosperity," "kindness" -- it had value "1."

If something was evil -- "earthquake," "famine," "military defeat," "murder" -- it had value "0." But rarely were ethical situations so simple. For instance, "killing" is bad (0) but protecting one's country is good (1) -- so is war 1 or 0?

Lefebvre saw that, at the crudest level, there were essentially two types of ethical systems. Those that held that employing evil means to attain just ends was good, and those that saw that employing evil means to attain good ends was wrong.

There were also, crudely put, two types of relations between individuals: those entailing compromise (or cooperation) and those entailing confrontation.

Of course, evil people rarely see themselves as evil. So Lefebvre had to incorporate in his model of human nature the capacity of human beings to judge -- correctly or incorrectly -- the goodness or evil of their own acts, and to reflect upon their own judgments, and others'. "Reflexive Theory" was born.

It quickly became a paradigm within the Soviet defense establishment, with the publication of books such as "Mathematics and Armed Conflict." Nothing like it was known in the West.

With very simple assumptions -- for instance, that an individual who correctly sees his actions to be good when they are good, and evil if they are evil, is more highly regarded by society than an individual who incorrectly sees himself -- Lefebvre showed that in a society that accepted the compromise of good with evil, individuals would more often seek the path of confrontation with each other.

Lefebvre's insights were called upon by the State Department during negotiations with Mikhail Gorbachev in Reykjavik, Iceland. (And perhaps Lefebvre's model could be re-enlisted to help U.S. officials understand and negotiate with Arab and Muslim heads of state, who must also negotiate with their people.)

In support of Lefebvre's revolutionary new theory, a survey of Soviet émigrés and Americans was conducted in the 1970s. They were asked questions like, "Should a doctor conceal from a patient that he has cancer in order to diminish his suffering?" Overwhelmingly, the Americans would say no, and overwhelmingly, the Soviets yes. The Soviets accepted the compromise of good with evil; the Americans rejected it.

What does this mean? If Americans begin to accept the use of torture, American society might turn into a society of individuals in conflict.

Not uniformly, thanks to something called free will, but generally, with harmful consequences for society: Imagine two roads, with a stream of cars moving along each one. Each driver wants to reach his destination as quickly as possible; on occasion, drivers will impede each other.

On the first road, drivers rise in their own, and in other drivers', estimation if they yield. Drivers on the second road lose face when they yield. It is clear that traffic will move faster on the first road than on the second.

It can be argued that repressive states like Saudi Arabia, which bred most of the Sept. 11 hijackers, are on the second road. If the United States moved to accept torture, it could veer toward the second road, too -- the road of the Soviet Union.

And we know where that road ends. The Soviet Union no longer exists.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
San Francisco Chronicle
Authors
Paragraphs

This article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States--two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes--and accepts--the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts--flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This article recognizes that both states consider the fight against terrorism to be partly military but also a matter of bringing certain democratic principles to bear. Critics have been quick to condemn some of the measures for their encroachments into civil liberties. My goal is not to measure the success of the laws according to any particular ideology but rather, accepting the governments' democracy-promoting goals, and the role these play in generating domestic and international support, to clarify which components do not appear to serve the states' aims.

This article won Stanford Law School's Carl Mason Franklin Prize for 2005-2006, for most distinguished written work in international law.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Michigan Journal of International Law
Authors
Paragraphs

Chapter 6 in Reappraising Openheimer: Centennial Studies and Reflections, edited by Cathryn Carson and David A. Hollinger (Office for History and Science of Technology, University of California, Berkeley, 2005).

The editors write: "From the beginning all the way up to the present, the Soviet nuclear weapons project has served as foil for the American effort. It preoccupied Robert Oppenheimer's minders in the Manhattan Project, fixated by the possibility of espionage; it drove his postwar attempts to achieve international control of atomic weapons just as surely as it lit up his opponents' mistrust of his stance on the hydrogen bomb. Throughout the arms race, Soviet progress vis-a-vis American weapons production helped drive the dynamic of the Cold War. More recently, Soviet and post-Soviet sources have inspired careful reanalysis of the dual courses of the two nations' nuclear projects. That effort has shed new light on the conditions under which Oppenheimer's wartime labors could find the conclusion they did. . . .

"David Holloway explores parallels between Robert Oppenheimer and his Soviet counterpart, Iulii Khariton. Similarities in background and differences in role make Holloway's contrast instructive."

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
University of California, Berkeley in "Reappraising Oppenheimer: Centennial Studies and Reflections"
Authors
David Holloway
Paragraphs

Paul Collier and Anke Hoeffler at Oxford University have reported that countries with a higher percentage of national income from primary commodity exports have been more prone to civil war, an interesting finding that has received much attention from policy makers and the media. In this paper, James Fearon shows that this result is quite fragile, even using Collier and Hoeffler's data. Minor changes in the sample framing and the recovery of missing data undermine it. To the extent that there is an association, it is likely because oil is a major component of primary commodity exports and substantial oil production does associate with civil war risk. Fearon argues that oil predicts civil war risk not because it provides an easy source of rebel start-up finance but probably because oil producers have relatively low state capabilities given their level of per capita income and because oil makes state or regional control a tempting "prize." An analysis of data on government observance of contracts and investor-perceived expropriation risk is consistent with this hypothesis.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Conflict Resolution
Authors
James D. Fearon
Subscribe to Governance