Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

Paragraphs

A net assessment of the benefits/losses of arms control treaties in terms of military significance was required in response to the START Resolution of Ratification. The response by the Executive Branch belabored smaller issues, avoided accomplishments and didn't carry out the net assessment.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Science and Global Security
Authors
Paragraphs

We investigate the impact on effective terrorism response of the viability degradation of biological weapons agents in the environment. We briefly review the scientific understanding and modeling of agent environmental viability degradation. In general, agent susceptibility to viability loss is greatest for vegetative bacteria, intermediate for viruses, and least for bacterial spores. Survival is greatest in soil and progressively decreases in the following environments: textiles, water, hard surfaces, and air. There is little detailed understanding of loss mechanisms. We analyze the time behavior and sensitivity of four mathematical models that are used to represent environmental viability degradation (the exponential, probability, and first- and second-order catastrophic decay models). The models behave similarly at short times (<30 min for our example case) but diverge to significantly different values at intermediate to long times. Hence, for a release event in which the majority of atmospheric exposure or deposition occurs over very short times, the current response models likely provide a good representation of the hazard. For longer time phenomena, including decontamina tion, the current model capabilities are likely insufficient. Finally, we implement each model in a simple numerical integration of anthrax dispersion, viability degradation, and dose response. Decay models spanning the current knowledge of airborne degradation result in vastly different predicted hazard areas. This confounds attempts to determine necessary medical and decontamination measures. Hence, the current level of understanding and representation of environmental viability degradation in response models is inadequate to inform appropriate emergency response measures.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Environmental Science and Technology
Authors
Paragraphs

On June 16, 2002, Dennis Pluchinsky, a senior intelligence analyst at the U.S. Department of State, wrote an article in the Washington Post calling for censorship. The article began, "I accuse the media in the United States of treason." Pluchinsky, who worked counterterrorism in the government for twenty-five years, pointed to post-9/11 articles that revealed not scientific advancements, but American vulnerabilities in regard to the food supply, electricity, chemical production, transportation, and border security. He suggested that research conducted by the media could not have been funded by one, single terrorist organization: "Our news media, and certain think tankers and academicians, have done and continue to do the target vulnerability research for them."

Pluchinsky has a point. Terrorist organizations can and do use the media--and the protections afforded speech in the United States and the United Kingdom--to obtain and disseminate critical information.

The crucial point is this: Both liberal, democratic states, and nonstate terrorist organizations need free speech. Under what circumstances are the interests of the state secured and the opportunism of terrorist organizations avoided? Here, the experiences of the United States and United Kingdom prove instructive. On both sides of the Atlantic, where the state acts as sovereign, efforts to restrict persuasive political speech have relaxed over time to allow for more criticism. In the United States, Brandenburg v. Ohio cemented this shift. In the United Kingdom, change came gradually. The practical elimination of treason and seditious libel, and incorporation of the European Convention of Human Rights (ECHR) into domestic law through the 1998 Human Rights Act (HRA), marked the transition. If free speech remains central to our understanding of liberal democracy, it would nevertheless be naïve to rely on these alterations to protect expression in the contemporary counterterrorist environment--regardless of how remarkable they might be in the context of what went before.

Underlying my argument in this paper is a deeper concern that centers on the shifting nature of technology. What the average person could have done in 1776, or for that matter, 1976, to hurt either state pales in comparison to what a person with basic knowledge of microbiology, $1000, and a lab can do today. But neither American nor British law appears to have come to terms with what weapons of mass destruction, in terrorist hands, means for free speech.

This article won the 2004-2005 Steven M. Block Civil Liberties award for the best piece of writing in civil liberties at Stanford Law School. It also won second place in the national competition for the 2005 Judge John R. Brown Award for Excellence in Legal Writing, which recognizes the best legal writing by U.S. law students.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Cardozo Law Review
Authors
-

This presentation is based on a paper written by Anne Platt Barrows, Paul Kucik, William Skimmyhorn and John Straigis.

Paul Kucik is a Major in the U.S. Army. He served in Aviation units in a series of assignments, including Company Command. He then served as Assistant Professor in the Department of Social Sciences at the United States Military Academy. He later served as analyst and as deputy director of the U.S. Army Office of Economic and Manpower Analysis. He has a Bachelor of Science degree in Economics from the United States Military Academy and a Master of Business Administration from the Massachusetts Institute of Technology.

Anne Platt Barrows is a Member of the Technical Staff in the Advanced System Deployments department at Sandia National Laboratories in Livermore, California. She focuses on facility protection, primarily on defending facilities against attacks with chemical agents. She holds a B.S. degree in Electrical Engineering and a B.A. in Ethics, Politics, and Economics from Yale University.

William Skimmyhorn is a Captain in the U.S. Army. He has served in Aviation units in a variety of assignments including Bosnia, Kosovo and two tours in Korea. His jobs have ranged from Platoon Leader to Liaison Officer to Troop Commander. He is currently a dual Master's Student at Stanford University studying International Policy and Management Science and Engineering. He has a Bachelor of Science Degree in Economics from the United States Military Academy.

John Straigis is currently working as a Systems Engineer at Lockheed Martin Space Systems Company in Sunnyvale, California. He just celebrated his second anniversary with the company, and is presently in Special Programs. Concurrently, he is completing his second Master's degree from Stanford University, in Management Science and Engineering, with a focus on Decision and Risk Analysis. His first Master's, before beginning his career at Lockheed Martin, was in Aero/Astro Engineering, also from Stanford. For undergraduate, he attended Rose-Hulman Institute of Technology, in Terre Haute, Indiana, receiving double degrees in Chemical Engineering and Mechanical Engineering. Outside of work and school, he enjoys several sports, particularly ice hockey, in which he is the starting goaltender for the Stanford ice hockey team.

Reuben W. Hills Conference Room

Paul Kucik PhD Candidate Speaker Department of Management Science and Engineering, Stanford
Seminars
-

A lasting legacy of the Cold War is the continued existence of weapons of mass destruction--uniquely, nuclear arms. The context in which they exist has been drastically changed in the realm of international politics. Father Hehir will probe the changed context of proliferation, as he addresses the continuing ethical and strategic challenges inherited from the past and now reshaped in this century.

 

Drell Lecture Recording: NA

 

Drell Lecture Transcript: 

 

Speaker's Biography: J. Bryan Hehir is the Parker Gilbert Montgomery Professor of the Practice of Religion and Public Life at Harvard University and the Secretary for Social Services and the President of Catholic Charities for the Archdiocese of Boston. Father Hehir's research focuses on ethics and foreign policy, and the role of religion on world politics and in American society. His writings include The Moral Measurement of War: A Tradition of Continuity and Change and Military Intervention and National Sovereignty.

Oak Lounge

J. Bryan Hehir Parker Gilbert Montgomery Professor of the Practice of Religion and Public Life, Kennedy School of Government Speaker Harvard University
Lectures
Authors
Allen S. Weiner
News Type
Commentary
Date
Paragraphs
What should we expect from the trial of Saddam Hussein? Full justice will likely elude the court, since Hussein faces only a partial list of possible charges. The trial probably won't quell ethnic and sectarian conflicts, either. But the trial could teach a valuable lesson about the place of law in a democratic state, writes CISAC's Allen S. Weiner in this Los Angeles Times op-ed.

The prosecution of Saddam Hussein and his co-defendants is off to a rocky start. As of last week, the trial has been adjourned twice after only a day and a half of proceedings; two of the defense lawyers have been murdered, perhaps by Iraqi security agents; and Hussein has showered the judges with contempt and challenged the legitimacy of the tribunal.

Can the trial in fact succeed? That depends on what we think are its goals.

The principal rationale for criminal justice is retribution--to punish those who have harmed others and violated society's norms. But retribution--or revenge--could be achieved without courts and due process. Trials also ordinarily produce reliable determinations of guilt or innocence, but few people, either inside or outside Iraq, have genuine doubts about Hussein's guilt.

The success of the Hussein trial, then, should be judged by whether it can also accomplish any of the broader goals that criminal prosecutions can serve in societies that have experienced widespread atrocities:

1) Providing justice for victims and documenting history. Trials enable victims to confront their abusers, a psychologically important step in the social re-integration of victimized groups. Trials also generate an authoritative record of the crimes committed by a previous regime. This can compel other groups in society--including perpetrators--to acknowledge that abuses occurred and can refute subsequent attempts at historical revisionism. This is today viewed as one of the important legacies of the Nuremberg trials.

The Hussein trial could provide a forum for victims, but only if the tribunal is allowed to address the full range of atrocities perpetrated by his regime. At this point, Hussein is being tried only for crimes committed in connection with a single episode--the killing and torture of residents of the village of Dujail after an assassination attempt on Hussein in 1982. Iraqi prosecutors have said that, after the Dujail case, they will pursue other cases involving the killings of tens of thousands of Shiites and Kurds.

A full airing of the vast tableau of Hussein's crimes, however, could take years; the trial of former Balkan strongman Slobodan Milosevic on crimes of comparable scope before the Yugoslavia War Crimes Tribunal in The Hague has been underway for almost four years. Such a timeline is unlikely to satisfy Iraqi street protesters demanding a swift trial and hanging of Hussein. Prime Minister Ibrahim Jafari's declaration that the Hussein trial "is not a research project" suggests the Iraqi government may feel pressure to sacrifice the goal of giving Hussein's victims a chance to record the atrocities they suffered in the interests of swift retribution.

2) Contributing to peace and reconciliation. Particularly in societies emerging from ethnic or sectarian conflicts, criminal trials individualize responsibility for abuses. They thus allow victims of atrocities to move beyond collective condemnation of the ethnic or religious groups from which their abusers came, enabling once-divided groups to begin to reconcile.

But the Hussein trial seems more likely to inflame sectarian tensions than to soothe them, at least in the short term. It gives Hussein a platform from which to challenge the Shiite-dominated government and to rally Sunni insurgents. Shiites and Kurds, frustrated by delays in having Hussein face the justice they believe he deserves, may escalate attacks against Sunni or Baathist targets. The net result may be a spiraling pattern of vigilantism and counter-vigilantism.

3) Promoting the rule of law. Subjecting a former dictator to a court of law, rather than a firing squad, can commit a transitional regime to due process and the rule of law. But early indications do not give hope that the Hussein trial will promote this goal. Last-minute legal changes--such as the elimination of the right of defendants to represent themselves--have been made for political, rather than legal, reasons. Tribunal officials have been selectively targeted for dismissal by the de-Baathification Commission headed by Ahmad Chalabi.

Moreover, Iraq's president announced in September that he had learned from one of the tribunal's investigating judges that Hussein had confessed to ordering executions during the notorious Anfal campaign, raising further questions about the judicial independence of the tribunal. Even the decision to try Hussein for the Dujail killings before the completion of investigations of more serious atrocities appears to be politically motivated. The government hopes to demoralize Hussein loyalists by securing a swift conviction on the easiest charges to prove.

Even under the best of circumstances, the Hussein trial could not possibly accomplish all three of these goals simultaneously. Hussein's crimes are so numerous that no trial can produce both a full historical accounting and swift justice. Iraq may be better served by establishing a truth commission to write a comprehensive history of the abuses of the Hussein era. Efforts to manage the trial to promote political stability in Iraq are unlikely to succeed and will only reflect a continuation of the Hussein-era tradition of executive branch manipulation of the courts. Addressing Sunni grievances, protecting minority rights and sharing Iraq's wealth is the way to promote reconciliation.

The best hope for the Hussein trial to be meaningful is for the Iraqi government to accord him full due-process rights and to refrain from further interference and manipulation. If the Iraqi government accepts the constraints of the rule of law, the Hussein trial can teach Iraq the valuable lesson that the state may punish citizens, even one as detested as Hussein, solely on the basis of laws impartially applied, not on the whims or caprice of the ruler.

All News button
1
Authors
Lawrence M. Wein
News Type
Commentary
Date
Paragraphs
The president's border security and immigration reform proposals won't protect Americans from the gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon. To tackle this problem, policymakers need to think inside the box, write CISAC's Lawrence M. Wein and colleague Stephen E. Flynn in this New York Times op-ed.

This week President Bush will seek to focus the nation's attention on border security and immigration reform. But the president's proposals won't protect Americans from our gravest cross-border threat: the possibility that a ship, truck or train will one day import a 40-foot cargo container in which terrorists have hidden a dirty bomb or nuclear weapon.

The Bush administration maintains that it has a smart strategy to reduce this risk. A new 24-Hour Rule requires that importers report the contents of their containers to customs inspectors one day before the boxes are loaded on ships bound for the United States. The Department of Homeland Security's National Targeting Center then reviews the data, checking against other intelligence to determine which boxes may pose a threat. Although the containers deemed high risk are inspected at cooperating foreign ports or when they enter the United States, the rest--more than 90 percent--land here without any perusal.

We have two concerns about this strategy. First, it presumes that the United States government has good enough intelligence about Al Qaeda to reliably discern which containers are suspicious and which are not. But our inability to thwart the attacks in Iraq demonstrates that we lack such specific tactical intelligence. And supporting customs inspectors, who must make the first assessment of risk, is not a priority for the intelligence agencies. Inspectors must rely on their experience in spotting anomalies--a company that claims to be exporting pineapples from Iceland, for example.

Second, determined terrorists can easily take advantage of the knowledge that customs inspectors routinely designate certain shipments as low risk. A container frequently makes 10 or more stops between its factory of origin and the vessel carrying it to American shores. Many of the way stations are in poorly policed parts of the world. Because name-brand companies like Wal-Mart and General Motors are widely known to be considered low-risk, terrorists need only to stake out their shipment routes and exploit the weakest points to introduce a weapon of mass destruction. A terrorist cell posing as a legal shipping company for more than two years, or a terrorist truck driver hauling goods from a well-known shipper, can also be confident of being perceived as low risk.

So what needs to be done? A pilot project under way in Hong Kong, the world's largest container port along with Singapore, offers one piece of a potential solution. At an estimated cost of $7 per container, new technology can photograph the box's exterior, screen for radioactive material, and collect a gamma-ray image of a box's contents while the truck on which it is carried moves at 10 miles per hour.

Terrorists can defeat radiation sensors by shielding a dirty bomb with dense materials like lead. But by combining those sensors with gamma ray images, the Hong Kong system allows inspectors to sound the alarm on suspiciously dense objects. Inspectors would need to analyze enough of the scans--perhaps 20 percent to 30 percent--to convince terrorists that there is a good chance that an indistinct image will lead a container's contents to be sent for more reliable X-ray or manual examinations. Images of container contents would then be reviewed remotely by inspectors inside the United States who are trained to spot possible nuclear weapons.

If terrorists were to succeed in shipping a dirty bomb, for example, the database of these images could serve as a kind of black box--an invaluable forensic tool in the effort to identify how and where security was breached. That information could help prevent politicians from reacting spasmodically and freezing the entire container system after an attack.

Such a program could significantly reduce the likelihood that terrorists will smuggle plutonium or a dirty bomb through American ports. But it still would not stop a terrorist from importing highly enriched uranium, which can be used to construct a nuclear weapon. Lengthening the time that a container is screened for radiation would help, and this could be done without increasing waiting times if additional monitors were added to the Hong Kong system near the gate where the trucks must already stop for driver identification checks. Better still would be for the Department of Homeland Security to make the development of new technology that can recognize the unique signature of highly enriched uranium an urgent priority.

Finally, we must find ways to ensure that terrorists do not breach containers before shipments arrive at loading ports. Sensors should be installed inside containers in order to track their movements, detect any infiltration and discern the presence of radioactive material. Where boxes are loaded, certified independent inspectors should verify that companies have followed adequate protocols to ensure that legitimate and authorized goods are being shipped.

Taken together, these recommendations will require new investments and an extraordinary degree of international cooperation. But increased container security will not only help the United States prevent terrorism, it will also help all countries reduce theft, stop the smuggling of drugs and humans, crack down on tariff evasion and improve export controls. What's more, such a program would require an investment of just one one-hundredth of the capital that could be lost if we shut down the global container shipping system after an attack.

Container security is a complex problem with enormous stakes. American officials insist that existing programs have matters well in hand. But we cannot afford to take these perky reassurances at face value while the same officials fail to embrace promising initiatives like the Hong Kong pilot project.

All News button
1
-

Paul Stockton is the associate provost at the Naval Postgraduate School in Monterey, California, and is director of its Center for Homeland Defense and Security. Stockton is the editor of Homeland Security (forthcoming from Oxford University Press in 2005). His research has appeared in Political Science Quarterly, International Security and Strategic Survey. He is co-editor of Reconstituting America's Defense: America's New National Security Strategy (1992). Stockton has also published an Adelphi Paper and has contributed chapters to a number of books, including James Lindsay and Randall Ripley, eds., U.S. Foreign Policy After the Cold War (1997). Stockton received a BA summa cum laude from Dartmouth College in 1976 and a PhD in government from Harvard University in 1986. He served from 1986-1989 as legislative assistant to U.S. Senator Daniel Patrick Moynihan. Stockton was awarded a postdoctoral fellowship for 1989-1990 by CISAC. In August 1990, he joined the faculty of the Naval Postgraduate School. From 1995 until 2000, he served as director of the NPS Center for Civil-Military Relations. From 2000-2001, he founded and served as the acting dean of the NPS School of International Graduate Studies. He was appointed associate provost in 2001.

Reuben W. Hills Conference Room

Paul Stockton Associate Provost, Director, Center for Homeland Security Speaker Naval Postgraduate School
Seminars
Subscribe to Governance