Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

Paragraphs

How does the resource base of a rebel group impact its membership, structure, and behavior? While scholars, analysts, and policy makers increasingly link natural resources to the onset and duration of civil war, this article explores how resource endowments shape the character and conduct of rebel groups. This article identifies a rebel "resource curse" much like the one that undermines state institutions in resource-rich environments. While the presence of economic endowments makes it possible for leaders to recruit on the basis of short-term rewards, these groups are flooded with opportunistic joiners who exhibit little commitment to the long-term goals of the organization. In resource-poor environments, leaders attract new recruits by drawing on social ties to make credible promises about the private rewards that will come with victory. Opportunistic joiners stay away from these movements, leaving a pool of activist recruits willing to invest their time and energy in the hope of reaping large gains in the future.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Conflict Resolution
Authors
Authors
News Type
News
Date
Paragraphs

Two of the 10 Stanford University undergraduates who completed CISAC's Interschool Honors Program in International Security Studies this year earned awards for their theses.

Sheena Elise Chestnut, a political science major, received a Firestone Medal for her thesis, "The 'Sopranos State'? North Korean Involvement in Criminal Activity and Implications for International Security." The Firestone Medal recognizes the top 10 percent of Stanford University's undergraduate honors theses.

Jessica McLaughlin, a management science and engineering major, received the William J. Perry Award for her thesis, "A Bayesian Updating Model for Intelligence Analysis: A Case Study of Iraq's Nuclear Weapons Program." The Perry Award recognizes excellence in policy-relevant research in international security studies.

In a June graduation ceremony outside Stanford University's Encina Hall, CISAC faculty member Mariano-Florentino Cuéllar, CISAC Postdoctoral Fellow Tonya L. Putnam, and CISAC Co-Director Scott D. Sagan presented students with certificates and thesis awards.

At a CISAC Directors' Seminar on June 1, Chestnut and McLaughlin presented their award-winning theses to an audience of 50 fellow students, faculty members and guests. Chestnut also gave a special seminar at CISAC in May, hosted by APARC and the Preventive Defense Project at CISAC.

The names, majors and thesis titles of eight others who completed the CISAC honors program are

Zack Cooper, public policy, Roman and British Experiences with Maritime Piracy and Implications for Combating Terrorism Today

Nina Hsu, political science, Chinese Assistance in the Pakistani Nuclear Program

Sohan Japa, biomechanical engineering, A Path to Peril: Understanding the Technical Hurdles of Biological Weapon Production

Bradley Larson, political science, Soft Power: US Foreign Aid Post-9/11

Frances Lewis, international relations, The Yellow Light Reactor: An Explanation of the Stop and Go Progress at Bushehr

Victor Marsh II, international relations, A Responsibility to Consult? Local Policy Ownership During Transitional Governance

Christopher Williams, physics, Closing the Nuclear Fuel Cycle: A Component Based Analysis of Options for Spent Fuel Management"

Ming Zhu, international relations, Power and Cooperation: Understanding the Road Towards a Truth Commission

Begun in 2000 to help develop the next generation of security specialists, CISAC's honors hrogram accepts 12 to 14 Stanford undergraduates each year, from any disciplines. Those selected attend a two-week CISAC honors college in Washington, D.C., complete an internship with a security-related organization, attend a year-long core seminar on international security research and produce an honors thesis with policy implications for international security. After fulfilling their individual department course requirements and completing the honors program, participants graduate in their major with an honors certificate in international security studies.

All News button
1
Paragraphs

We developed a mathematical model of a cows-to-consumers supply chain associated with a single milk-processing facility that is the victim of a deliberate release of botulinum toxin. Because centralized storage and processing lead to substantial dilution of the toxin, a minimum amount of toxin is required for the release to do damage. Irreducible uncertainties regarding the dose-response curve prevent us from quantifying the minimum effective release. However, if terrorists can obtain enough toxin, and this may well be possible, then rapid distribution and consumption result in several hundred thousand poisoned individuals if detection from early symptomatics is not timely. Timely and specific in-process testing has the potential to eliminate the threat of this scenario at a cost of less than 1 cent per gallon and should be pursued aggressively. Investigation of improving the toxin inactivation rate of heat pasteurization without sacrificing taste or nutrition is warranted.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Proceedings of the National Academy of Sciences
Authors
Lawrence M. Wein
Paragraphs

When Norwegian and U.S. scientists launched the Black Brant XII sounding rocket from a small island off Norway's northwest coast on January 25, 1995, they intended for it to harmlessly collect scientific data about the Northern Lights. But when Russia's early warning system radars detected the rocket, they generated an alarm that entered the nuclear forces command and control system and reached the highest levels of government. An accidental nuclear war was never a possibility--by the time the alarm reached Russian President Boris Yeltsin, the rocket had been properly identified--but the incident clearly demonstrated the dangers of a launch-on-warning posture.

A Cold War hangover, launch-on-warning was designed to provide additional protection to nuclear forces by ensuring that a retaliatory attack could be initiated before a first strike obliterated its targets. Implementing launch-on-warning required substantial investment into a network of early warning radars and satellites--plus a command and control system that would allow missiles to be on constant "hair-trigger alert." Its cost proved high enough that only two nuclear powers--the United States and Soviet Union--established a launch-on-warning capability. Nearly 15 years after the Soviet Union's collapse, neither the United States nor Russia have abandoned it.

Numerous proposals have tried to address launch-on-warning concerns. Most point to the Black Brant XII incident as evidence that the precipitous decline of the Russian early warning and command and control systems is the main problem. The argument is simple: If the early warning system was unreliable a decade ago when it was in relatively good shape, imagine how bad the situation is today, after years of decline. Accordingly, many believe the remedy lies in helping Russia compensate for the disrepair, either by creating arrangements that would allow Russia and the United States to share their early warning data, or by providing direct assistance to Russia that would allow it to upgrade its system. These proposals are misguided. Repairing the Russian early warning system would actually increase the danger of an accidental launch.

The reason for this is that the role of the Russian early warning system today is marginal at best. Even in its prime, the system could not provide the data necessary for a launch-on-warning strike. The radar network has always had serious gaps in coverage and the space-based segment of the system was not designed to detect sea-launched missiles. In addition to this, a series of problems plagued the system during its development and early deployment stages. As a result, the Soviet military learned to regard the alarms it generated with suspicion.

The system's deterioration has only added to doubts about its ability to provide a reliable warning. The breakup of the Soviet Union left most of the radars outside Russian territory. At present, Russia operates only three early warning satellites, while minimally reliable coverage of U.S. territory requires at least five. No second-generation satellites, which would expand coverage to the oceans, are operational today. This leaves Russia with an early warning system it can't really trust.

The lack of trust is exactly the reason why the decline of the system is much less dangerous that it may seem. The continued disrepair erodes confidence in the system's performance further and makes it much less likely that an alarm (whether real or false) would be acted upon. Attempts to repair or upgrade the system, on the other hand, would only increase the danger of miscalculation, since such actions would introduce new elements into an already complex system and boost confidence in its performance.

By the same logic, the United States should not be complacent about its early warning system simply because it is thought to be more robust and reliable than its Russian counterpart. High confidence in the U.S. system could make a technical malfunction--should one ever occur--an extremely dangerous event, since U.S. operators would be unlikely to question the information provided by the system.

The best way to deal with the dangers of accidental launch is to remove missiles from hair-trigger alert, for example by introducing physical barriers that would prevent a launch on warning. Technical solutions that have been suggested include removing warheads from missiles or limiting submarine patrol areas. None of these measures have been implemented, since they involve intrusive and cumbersome verification provisions that neither side is willing to accept. What these proposals don't take into account though is that the main goal of de-alerting--reducing the risk of accidental launch--does not require transparency or verification. If a missile does not have a warhead, it won't be able to leave a silo regardless of whether or not one can verify it. In this respect de-alerting is quite different from disarmament, where verification rightfully belongs.

Moreover, transparency could make de-alerting potentially dangerous. Reducing a missile's readiness for all the world to see could create instability during a crisis. If one country decides to bring its missiles back into operation, its counterpart might feel the need to do the same lest its forces remain unprepared for a launch. This might create a rush to re-alert forces, and the dangers associated with re-alerting could outweigh any de-alerting benefits. Ideally, de-alerting measures should be completely undetectable. This approach would remove missiles from the launch-on-warning equation while minimizing the instabilities associated with re-alerting.

With the verification hurdle removed, there is no reason why the United States and Russia should not make a public commitment to de-alert their strategic arsenals. They don't even need to do it together. De-alerting is beneficial even when done unilaterally. Of course, there will be plenty of questions about the value of commitments that are neither enforceable nor verifiable. But the value would be quite real--thousands of missiles would no longer be on hair-trigger alert. And the next time Norway launches a scientific sounding rocket, we can all breathe a little easier.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
Pavel Podvig
Authors
News Type
Commentary
Date
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All News button
1
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Washington Post
Authors
Authors
Lawrence M. Wein
News Type
Commentary
Date
Paragraphs
Milk processing is just as susceptible to terrorism as chemical production, yet the nation's milk supplies are far more vulnerable because many security measures are voluntary, CISAC faculty member Lawrence M. Wein points out in this New York Times op-ed. Using research he conducted with Yifan Liu, an incoming CISAC fellow next year, Wein makes the case for stricter controls of the milk supply "from cow to consumer."

While the anthrax scare at Washington Post offices this year proved to be a false alarm, it was a reminder of how vulnerable Americans are to biological terrorism. In general, two threats are viewed as the most dangerous: anthrax, which is as durable as it is deadly, and smallpox, which is transmitted very easily and kills 30 percent of its victims.

But there is a third possibility that, while it seems far more mundane, could be just as deadly: terrorists spreading a toxin that causes botulism throughout the nation's milk supply.

Why milk? In addition to its symbolic value as a target--a glass of milk is an icon of purity and healthfulness--Americans drink more than 6 billion gallons of it a year. And because it is stored in large quantities at centralized processing plants and then shipped across country for rapid consumption, it is a uniquely valuable medium for a bioterrorist.

For the last year, a graduate student, Yifan Liu, and I have been studying how such an attack might play out, and here is the situation we consider most likely: a terrorist, using a 28-page manual called "Preparation of Botulism Toxin" that has been published on several jihadist Web sites and buying toxin from an overseas black-market laboratory, fills a one-gallon jug with a sludgy substance containing a few grams of botulin. He then sneaks onto a dairy farm and pours its contents into an unlocked milk tank, or he dumps it into the tank on a milk truck while the driver is eating breakfast at a truck stop.

This tainted milk is eventually piped into a raw-milk silo at a dairy-processing factory, where it is thoroughly mixed with other milk. Because milk continually flows in and out of silos, approximately 100,000 gallons of contaminated milk go through the silo before it is emptied and cleaned (the factories are required to do this only every 72 hours). While the majority of the toxin is rendered harmless by heat pasteurization, some will survive. These 100,000 gallons of milk are put in cartons and trucked to distributors and retailers, and they eventually wind up in refrigerators across the country, where they are consumed by hundreds of thousands of unsuspecting people.

It might seem hard to believe that just a few grams of toxin, much of it inactivated by pasteurization, could harm so many people. But that, in the eye of the terrorists, is the beauty of botulism: just one one-millionth of a gram may be enough to poison and eventually kill an adult. It is likely that more than half the people who drink the contaminated milk would succumb.

The other worrisome factor is that it takes a while for botulism to take effect: usually there are no symptoms for 48 hours. So, based on studies of consumption, even if such an attack were promptly detected and the government warned us to stop drinking milk within 24 hours of the first reports of poisonings, it is likely that a third of the tainted milk would have been consumed. Worse, children would be hit hardest: they drink significantly more milk on average than adults, less of the toxin would be needed to poison them and they drink milk sooner after its release from dairy processors because it is shipped directly to schools.

And what will happen to the victims? First they will experience gastrointestinal pain, which is followed by neurological symptoms. They will have difficulty seeing, speaking and walking as paralysis sets in. Most of those who reach a hospital and get antitoxins and ventilators to aid breathing would recover, albeit after months of intensive and expensive treatment. But our hospitals simply don't have enough antitoxins and ventilators to deal with such a widespread attack, and it seems likely that up to half of those poisoned would die.

As scary as this possibility is, we have actually been conservative in some of our assumptions. The concentration of toxin in the terrorists' initial gallon is based on 1980's technology and it's possible they could mix up a more potent brew; there are silos up to four times as large as the one we based our model on, and some feed into several different processing lines that would contaminate more milk; and the assumption that the nationwide alarm could go out within 24 hours of the first reported symptoms is very optimistic (two major salmonella outbreaks in the dairy industry, in 1985 and 1994, went undetected for weeks and sickened 200,000 people).

What can we do to avoid such a horror? First, we must invest in prevention. The Food and Drug Administration has some guidelines - tanks and trucks holding milk are supposed to have locks, two people are supposed to be present when milk is transferred - but they are voluntary. Let's face it: in the hands of a terrorist, a dairy is just as dangerous as a chemical factory or nuclear plant, and voluntary guidelines are not commensurate with the severity of the threat. We need strict laws - or at least more stringent rules similar to those set by the International Organization for Standardization in Geneva and used in many countries - to ensure that our milk supply is vigilantly guarded, from cow to consumer.

Second, the dairy industry should improve pasteurization so that it is far more potent at eliminating toxins. Finally, and most important, tanks should be tested for toxins as milk trucks line up to unload into the silo. The trucks have to stop to be tested for antibiotic residue at this point anyway, and there is a test that can detect all four types of toxin associated with human botulism that takes less than 15 minutes. Yes, to perform the test four times, once for each toxin, on each truck would cost several cents per gallon. But in the end it comes down to a simple question: isn't the elimination of this terrifying threat worth a 1 percent increase in the cost of a carton of milk?

One other concern: although milk may be the obvious target, it is by no means the only food product capable of generating tens of thousands of deaths. The government needs to persuade other food-processing industries - soft drinks, fruit juices, vegetable juices, processed-tomato products - to study the potential impact of a deliberate botulin release in their supply chains and take steps to prevent and mitigate such an event.

Americans are blessed with perhaps the most efficient food distribution network in history, but we must ensure that the system that makes it so easy to cook a good dinner doesn't also make it easy for terrorists to kill us in our homes.

All News button
1
Paragraphs

Robert McNamara is worried. He knows how close we've come. His counsel helped the Kennedy administration avert nuclear catastrophe during the Cuban Missile Crisis. Today, he believes the United States must no longer rely on nuclear weapons as a foreign-policy tool. To do so is immoral, illegal, and dreadfully dangerous.

This article, the cover story for the May/June 2005 issue of Foreign Policy, began as a talk McNamara delivered at Stanford to CISAC researchers, staff, and friends on Oct. 18, 2004.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Foreign Policy
Authors
Paragraphs

The nuclear Nonproliferation Treaty (NPT) provides that a state-party intending to withdraw from the treaty must give the UN Security Council three months' notice of its intention and provide the Security Council with its reasons for withdrawal. This provision was intended to give the Security Council an opportunity to deal with any withdrawal that might produce a threat to international peace and security.

More than two years ago, North Korea renewed its 1993 notice of withdrawal from the NPT, a notice that had been suspended a decade earlier during negotiations with the United States. That announcement left the Security Council with only a single day before North Korea would become the first country to withdraw from the NPT.

The Security Council did nothing. Indeed, it has continued to ignore North Korea's action even as Pyongyang has repeatedly stated its intention to produce nuclear weapons, sending a dangerous message to other states considering withdrawal. The once-every-five-years NPT review conference that will meet in New York this month provides a valuable opportunity to address the North Korea case and prod the Security Council to address similar cases that may emerge.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Arms Control Today
Authors
-

Despite the increasing centrality of computer software in modern weapons systems, computing remains relatively underrepresented in public debates about weapons policy. For example, in 1991, a software glitch in the Patriot missile defense system killed 28 people, yet physicists remain the most prominent technical critics of this system. This talk suggests that the different patterns of political intervention exhibited by physicists and computer experts cannot be explained by technical relevance. It suggests alternate explanations by examining the processes by which technical judgments are generated and rendered authoritative in the political arena, using insights from science and technology studies. These processes are then illustrated by comparing how computer experts and physicists intervened in political controversy about the feasibility of 'Star Wars', President Ronald Reagan's proposal to develop a missile defense that would render the massive Soviet nuclear arsenal 'impotent and obsolete.' I compare how critical groups of physicists and computer professionals attempted to persuade the public that a perfect missile shield could not be built. This analysis suggests that sharp differences in the two groups' technical frames of analysis, rhetoric, and professional organizations all contributed to the physicists' ability to demonstrate a much higher level of consensus and authority in the political arena.

Reuben W. Hills Conference Room

0
Affiliate
slayton_headshot.jpg PhD

Slayton’s research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project, Shadowing Cybersecurity, examines the historical emergence of cybersecurity expertise. Shadowing Cybersecurity shows how efforts to establish credible expertise in corporate, governmental, and non-governmental contexts have produced varying and sometimes conflicting expert practices. Nonetheless, all cybersecurity experts wrestle with the irreducible uncertainties that characterize intelligent adversaries, and the fundamental inability to prove that systems are secure. The book shows how cybersecurity experts have paradoxically gained credibility by making threats and vulnerabilities visible, while acknowledging that more always remain in the shadows.

Slayton’s first book, Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 (MIT Press, 2013), shows how the rise of a new field of expertise in computing reshaped public policies and perceptions about the risks of missile defense in the United States. In 2015, Arguments that Count won the Computer History Museum Prize. In 2016, Slayton was awarded a National Science Foundation CAREER grant for her project “Enacting Cybersecurity Expertise.” In 2019, Slayton was also a recipient of the United States Presidential Early Career Award for Scientists and Engineers, for her NSF CAREER project.

CV
Date Label
Rebecca Slayton Science Fellow CISAC
Seminars
Subscribe to Governance