Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

Encina Hall 
616 Jane Stanford Way
Stanford, CA 94305-6055

0
Director, Freeman Spogli Institute for International Studies
Steven C. Házy Senior Fellow, Freeman Spogli Institute for International Studies
Professor, by courtesy, of Political Science
colin_kahl_2025_sq.jpg

Colin Kahl is director of the Freeman Spogli Institute for International Studies and the Steven C. Házy Senior Fellow. He is also the faculty director of CISAC’s Program on Geopolitics, Technology, and Governance, and a professor of political science (by courtesy).

From April 2021-July 2023, Dr. Kahl served as the under secretary of defense for policy at the U.S. Department of Defense. In that role, he was the principal adviser to the secretary of defense for all matters related to national security and defense policy and represented the department as a standing member of the National Security Council Deputies’ Committee. He oversaw the writing of the 2022 National Defense Strategy, which focused the Pentagon’s efforts on the “pacing challenge” posed by the PRC, and he led the department’s response to Russia’s invasion of Ukraine and numerous other international crises. He also led several other major defense diplomacy initiatives, including an unprecedented strengthening of the NATO alliance; the negotiation of the AUKUS agreement with Australia and the United Kingdom; historic defense force posture enhancements in Australia, Japan, and the Philippines; and deepening defense and strategic ties with India. In June 2023, Secretary of Defense Lloyd Austin III awarded Dr. Kahl the Department of Defense Distinguished Public Service Medal, the highest civilian award presented by the secretary of defense.

During the Obama Administration, Dr. Kahl served as deputy assistant to President Obama and national security advisor to Vice President Biden from October 2014 to January 2017. He also served as deputy assistant secretary of defense for the Middle East from February 2009 to December 2011, for which he received the Outstanding Public Service Medal in July 2011.

Dr. Kahl is the co-author (along with Thomas Wright) of Aftershocks: Pandemic Politics and the End of the Old International Order (New York: St. Martin’s Press, 2021) and the author of States, Scarcity, and Civil Strife in the Developing World (Princeton, NJ: Princeton University Press, 2006). He has also published numerous article on U.S. national security and defense policy in Foreign Affairs, Foreign Policy, International Security, the Los Angeles Times, Middle East Policy, the National Interest, the New Republic, the New York Times, Politico, the Washington Post, and the Washington Quarterly, as well as several reports for the Center for a New American Security (CNAS), a non-partisan think tank in Washington, DC.

Dr. Kahl previously taught at Georgetown University and the University of Minnesota, and he has held fellowship positions at Harvard University, the Council on Foreign Relations, CNAS, and the Penn Biden Center for Diplomacy and International Engagement.

He received his B.A. in political science from the University of Michigan (1993) and his Ph.D. in political science from Columbia University (2000).

Date Label
-

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information warfare (CEIW) leverages the features of modern information and communications technology to age-old techniques of propaganda, deception, and chaos production to confuse, mislead, and to influence the choices and decisions that the adversary makes—and a recent example of CEIW can be seen in the Russian hacks on the U.S. presidential election in 2016.  CEIW is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it.  Nor is it cyber war or cyber conflict as we have come to understand those ideas.  Some approaches to counter CEIW show some promise of having some modest but valuable defensive effect.  If better solutions for countering CEIW waged against free and democratic societies are not forthcoming, societal discourse will no longer be grounded in reason and objective reality—an outcome that can fairly be called the end of the Enlightenment.

Speaker bios: Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.  His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. He recently served on President Obama’s Commission on Enhancing National Cybersecurity.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

To read more about Herb Lin's interests, please read "An Evolving Research Agenda in Cyber Policy and Security."

Jackie Kerr is a Postdoctoral Research Fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory.  Her research examines cybersecurity and information security strategy, Internet governance, and the Internet policies of non-democratic regimes.  She was a 2015-2016 Science, Technology, and Public Policy (STPP) Pre-Doctoral Fellow with the Cyber Security Project at the Belfer Center for Science and International Affairs and Visiting Scholar at the Davis Center for Russian and Eurasian Studies at Harvard University and a Cybersecurity Predoctoral Fellow at Stanford University's Center for International Security and Cooperation in 2014-2015.  Jackie holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University.  She has held research fellowships in Russia, Kazakhstan, and Qatar, and has previous professional experience as a software engineer.

CISAC
Stanford University
Encina Hall, C236
Stanford, CA 94305-6165

650-497-8600
0
Senior Research Scholar at the Center for International Security and Cooperation
Hank J. Holland Fellow in Cyber Policy and Security, Hoover Institution
HerbertLin.jpg

Dr. Herb Lin is senior research scholar at the Center for International Security and Cooperation and Research Fellow at the Hoover Institution, both at Stanford University.  His research interests relate broadly to the impact of emerging technologies on national security, especially in the digital domain (cyber, artificial intelligence, information warfare and operations), and has written extensively on the role of offensive operations in cyberspace as instruments of national policy.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology.  From 2016 to 2025, he was a member of the Science and Security Board of the Bulletin of Atomic Scientists. In 2016, he served on President Obama’s Commission on Enhancing National Cybersecurity and in  2021 on the Aspen Commission on Information Disorder.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Avocationally, he is a longtime folk and swing dancer and a lousy magician. Apart from his work on cyberspace and cybersecurity, he is published in cognitive science, science education, biophysics, and arms control and defense policy. He also consults on K-12 math and science education.

Date Label
Herbert Lin Senior Research Scholar for Cyber Policy and Security CISAC, Stanford University
0
Affiliate
jaclyn_kerr.jpg PhD

Jackie Kerr is a Professor in the College of Information and Cyberspace (CIC) at National Defense University (NDU).  She is also a Nonresident Fellow with the Brookings Institution Foreign Policy Program and an Adjunct Professor at Georgetown University’s Center for Russian, Eurasian, and East European Studies in the School of Foreign Service.  Her work focuses on digital and emerging technologies and their current and future impacts on international politics, national security, and democracy.  She has conducted research and taught on the digital politics of authoritarian regimes, the role of information technologies in civil society and protest mobilization, cyber domain strategy, global Internet governance, the role of artificial intelligence in national security and foreign policy, and on the role of digital technologies in the politics of Russia, China, and Eurasia.  While at NDU, Dr. Kerr previously served as Senior Research Fellow for Defense and Technology Futures at the Center for Strategic Research (2020-2024) and the Center for Emerging Technology and Future Warfare (2024-2025) within the Institute for National Strategic Studies (INSS).  In 2019-2020, she served as a AAAS Science and Technology Policy Fellow at the U.S. Department of State’s Office of the Science and Technology Advisor to the Secretary (STAS), where she advised on digital technology policy, particularly as it pertains to human rights, democracy, and national security.  From 2016 to 2019, she was a postdoctoral research fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory, where she led work on cybersecurity, cyber domain strategy, and information conflict.  Dr. Kerr was previously a Science, Technology, and Public Policy Fellow at Harvard University’s Belfer Center for Science and International Affairs, a Visiting Scholar at Harvard's Davis Center for Russian and Eurasian Studies, a Cybersecurity Fellow at Stanford University’s Center for International Security and Cooperation (CISAC), and has held research fellowships in Russia, Kazakhstan, and Qatar.  She also has prior professional experience as a software engineer with Comcast and Symantec.  Dr. Kerr holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University. 

CV
Date Label
Jaclyn A. Kerr Lawrence Livermore National Laboratory; CISAC Affiliate
Seminars
-

Abstract: It has been more than a decade since the UN Security Council enacted Resolution 1540—the most far-reaching of international instruments to counter Weapons of Mass Destruction (WMD) terrorism. It requires states to adopt and enforce effective laws to keep WMD materials outside the reach of terrorists. Scholars and policy makers compliment 1540 for making WMD trafficking illegal, for raising awareness of threats and increasing states’ capacity to reduce them. In 2017, one hundred and seventy-six states reported to the UN on domestic measures they took to comply with 1540. These numbers may produce a false sense of confidence in universal implementation of 1540. The threat of WMD terrorism remains potent. Allegations of ISIS using mustard agents against the Kurds, North Korea shipping chemicals to Syria or middlemen trafficking nuclear materials via Moldova suggest that the international response to WMD smuggling has not achieved its desired results. It is, therefore, important to evaluate the UN’s role in preventing WMD terrorism, and explore ways to further strengthen it. Drawing on interviews, fieldwork and observation data, this talk will examine the 1540 regime’s setup and its performance. It will outline policy options to improve the international counter-proliferation and counter-terrorism regime.

Speaker  bio:  Sarah Shirazyan is a Nuclear Security Postdoctoral Fellow at CISAC. Her research is funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council Resolution 1540 in preventing terrorists from accessing Weapons of Mass Destruction. Sarah designed Interpol-Stanford policy lab and serves as a Lecturer in Law at Stanford Law School. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of Gerald J. Lieberman Award.

In addition to her academic experience, Sarah has held multiple posts with leading tech companies and international organizations. Sarah worked at Facebook’s Global Policy Team, where she developed company’s engagement strategies with inter-governmental organizations. Ms. Shirazyan also designed the data protection and privacy curricula for legal professionals at the Council of Europe. Prior to that, Ms. Shirazyan was a Drafting Lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N. Office for Disarmament Affairs; and handled international drug cartel investigation cases at the INTERPOL Secretariat. 

0
sarahshirazianrsd17_076_0298a.jpg J.S.D.

Sarah Shirazyan is a leading expert in technology law and policy, misinformation, and responsible AI development. She is a Lecturer in Law at Stanford Law School, where she teaches a course on combating misinformation online. She also serves as a Director and Head of Meta's GenAI Product Policy work, overseeing the development and implementation of company-wide policies governing the responsible use of generative AI technologies. In this role, Dr. Shirazyan advises product and engineering teams to ensure trust, safety, and ethical innovation across Meta's platforms. Previously, she led the company’s efforts to inform its misinformation and algorithmic ranking policies through engaging with experts across the globe.

Prior to joining tech industry, Dr. Shirazyan held multiple posts with leading international organizations—she was a data protection consultant for the Council of Europe; served as human right lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N.; and handled international drug cartel investigation cases at INTERPOL.

From 2017-2020, she designed and ran Interpol-Stanford Policy Lab at Stanford Law. From 2017-2018, Dr. Shirazyan was a Nuclear Security Postdoctoral Fellow at CISAC. Her research was funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council’s response to WMD terrorism. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of the Gerald J. Lieberman Award.

Her work has been published in Journal for National Security Law and Policy, Lawfare, Just Security, Stanford Journal of Online Trust and Safety, Arms Control Today, and Project on Nuclear Issues by Center for Strategic and International Studies (CSIS).

Publications

CISAC Affiliate
Date Label
Sarah Shirazyan CISAC
Seminars
-

Abstract: In 1945, our homeland was inviolate. Since then, we have invested trillions of dollars to improve our national security, yet we now can be destroyed in under an hour. In mathematics, such an absurd result from otherwise logical reasoning proves that at least one assumption must be in error. This talk therefore examines a number of assumptions that form the foundation of our thinking about national security, starting with the very concept itself: In the nuclear age, is national security separable from global security?

Speaker bio: Martin Hellman is best known for his invention, joint with Whitfield Diffie and Ralph Merkle, of public key cryptography, the technology that enables secure Internet transactions. He has been a key player in the computer privacy debate, won three “outstanding professor” awards from minority student organizations, and pioneered a risk-informed framework for nuclear deterrence. His current work “Rethinking National Security” critically examines the assumptions that form the foundation of our national security. Hellman’s many honors include election to the National Academy of Engineering and receiving (jointly with Diffie) the million dollar ACM Turing Award, the top prize in computer science.

 
 

Not in residence

0
CISAC Affiliated Faculty Member
Professor (Emeritus) of Electrical Engineering
Hellman,_Martin.jpeg
Martin E. Hellman is professor emeritus of electrical engineering at Stanford, a recipient (joint with Whit Diffie) of the million dollar ACM Turing Award, a member of the National Academy of Engineering, and an inductee of the National Inventors Hall of Fame. He became a CISAC affiliated faculty member in October 2012.

Hellman is best known for his invention, with Whitfield Diffie and Ralph Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions and cybersecurity on the Internet. He also has been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and continuing with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations were implemented soon afterward.

Prof. Hellman also has a deep interest in the ethics of technological development. With Prof. Anatoly Gromyko of Moscow, he co-edited Breakthrough: Emerging New Thinking, a book published simultaneously in Russian and English in 1987 during the rapid change in Soviet-American relations (available as a free, 2.6 MB PDF download). In 1986, he and his wife of fifty years published, A New Map for Relationships: Creating True Love at Home & Peace on the Planet, a book that provides a “unified field theory” for successful relationships by illuminating the connections between nuclear war, conventional war, interpersonal war, and war within our own psyches (available as a free, 1.2 MB PDF download).
 
His current research is devoted to bringing a risk-informed framework to nuclear deterrence and critically examining the assumptions that underlie our national security.

Prof. Hellman was at IBM's Watson Research Center from 1968-69 and an assistant professor of EE at MIT from 1969-71. Returning to Stanford in 1971, he served on the regular faculty until becoming Professor Emeritus in 1996. He has authored over seventy technical papers, six US patents and a number of foreign equivalents.

More information on Professor Hellman is available on his EE Department website. His publications, many  of which can be downloaded in PDF, are on the publications page of that site.
Martin Hellman Professor, Electrical Engineering (emeritus) Stanford University
Seminars
Paragraphs

The sovereign state is frequently held up as the legitimate source of domestic order and an important provider of public goods in any society, regardless of regime type. But Hezbollah and the Islamic State in the Middle East, pirate clans in Africa, criminal gangs in South America, and militias in Southeast Asia are examples where nonstate actors have controlled local territory and have delivered public goods that the state cannot or will not provide. This book takes the reader to territories where state governance has broken down—or never really existed. In these places, the vacuum has frequently been filled by armed nonstate actors—local gangs, militias, or warlords—some with ideological or political agendas and others focused primarily on economic gain. In certain cases, these actors have developed substantial support among local populations and have built their own enduring institutions at the expense of de jure sovereign, the state. The authors suggest that the international community has more than a passing interest in this phenomena, in part because of the risk of spillover effects from crime and terrorism, but also because territories where the state is weak or absent can pose threats to international security. This book concludes with policy recommendations for how the international community might best respond to local orders dominated by armed nonstate actors. In many cases, it argues that outsiders have too taken a short-term approach—accepting unsavory local actors out of expediency—at the price of long-term instability and enduring state weakness.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press
Authors
News Type
News
Date
Paragraphs

The sovereign state is frequently held up as the legitimate source of domestic order and an important provider of public goods in any society, regardless of regime type. In Militants, Criminals, and Warlords - The Challenge of Local Governance in an Age of Disorder, however, authors Vanda Felbab-BrownHarold Trinkunas, and Shadi Hamid explain that Hezbollah and the Islamic State in the Middle East, pirate clans in Africa, criminal gangs in South America, and militias in Southeast Asia are examples where nonstate actors have controlled local territory and have delivered public goods that the state cannot or will not provide.

This book takes the reader to territories where state governance has broken down—or never really existed. In these places, the vacuum has frequently been filled by armed nonstate actors—local gangs, militias, or warlords—some with ideological or political agendas and others focused primarily on economic gain. In certain cases, these actors have developed substantial support among local populations and have built their own enduring institutions at the expense of the de jure sovereign, the state. The authors suggest that the international community has more than a passing interest in this phenomena, in part because of the risk of spillover effects from crime and terrorism, but also because territories where the state is weak or absent can pose threats to international security.

The book concludes with policy recommendations for how the international community might best respond to local orders dominated by armed nonstate actors. In many cases, it argues that outsiders have too often taken a short-term approach—accepting unsavory local actors out of expediency—at the price of long-term instability and enduring state weakness.

Text courtesy of Brookings Press. To read more on Militants, Criminals, and Warlords - The Challenge of Local Governance in an Age of Disorder, click here.

Hero Image
Trinkunas_Militants Brookings Press
All News button
1
-

 

Abstract: Despite decades of research on organizational disasters, such events remain too common. Scholars across a wide range of disciplines agree that one of the most viable approaches to preventing such catastrophes is to observe near-misses and use them to identify and eliminate problems before they produce large failures. Unfortunately, these important warning signals are too often ignored because they are perceived and interpreted as successes rather than near-misses, near-failures, or simply failures.  Through a series of studies, we explore how organizational messages might nudge more recognition of a near-miss event as something other than a success.  The intent is not to make organizations more risk-averse, per se, but to make leaders with decision power more aware of the risks they assume and how the low probabilistic nature of high risk decisions facilitates our tendency to become more risk-tolerant over time.

Speaker Bio: Catherine Tinsley, Ph.D., is the Raffini Family Professor of Management at Georgetown University’s McDonough School of Business, Faculty Director of the Georgetown University Women’s Leadership Institute, Academic Director of Georgetown McDonough’s Executive Master’s in Leadership program, and a Senior Policy Scholar at the Georgetown Center for Business and Public Policy.  Tinsley is an expert on principled leadership, workforce development, negotiations, and decision making.  She looks at how and why people make decisions, especially when managing risk, and empowering employees.  She applies decision analytic frameworks to understand leadership challenges, and expert and novice responses to natural disasters (such as hurricanes) and man-made disasters (terrorist attacks).

For the past three years, she participated in The World Economic Forum’s annual meeting in Davos, Switzerland where she spoke about the interplay between confidence and economic empowerment. Tinsley has collaborated with the White House and U.S. State Department on developing programs related to gender and workforce development, including partnering with the Council of Women World Leaders to convene the first ever world-wide meeting of the Ministers of Women’s Affairs.  

Tinsley has served on three committees for the National Academy of Sciences— The Committee to Improve Intelligence Analysis for National Security, The Committee on Unifying Social and Cultural Frameworks in the Military, and the Committee on The Context of Military Environments (where she served as vice-Chair).   She has received several awards for her research as well as grants from NASA, the National Science Foundation, the Department of Homeland Security, the Department of Defense and Army Research Office.  

Tinsley has published more than 50 articles and book chapters in peer-reviewed journals and her research has been covered extensively in the popular media.

Catherine Tinsley Professor of Management McDonough School of Business, Georgetown University
Seminars
Authors
News Type
News
Date
Paragraphs

The same logic that kept a nuclear war from breaking out between the United States and former Soviet Union is the best strategy to now pursue with North Korea, several scholars said Tuesday at Stanford.

The panel, convened at Stanford’s Center for International Security and Cooperation (CISAC), included political scientist Scott D. Sagan of CISAC; political scientist Mira Rapp-Hooper of Yale University; and political scientist Vipin Narang of MIT. The moderator was James D. Fearon, a political scientist at the Freeman Spogli Institute for International Studies. The event was titled “Can the U.S. Deter a Nuclear North Korea” and held in the William J. Perry Conference Room in Encina Hall.

Nuclear decision-making

The discussion revolved around whether North Korea will have the ability to strike the U.S. with nuclear warheads, and can the U.S. depend on a deterrence strategy like it did during the Cold War?

Deterrence theory holds that nuclear weapons are intended to deter other states from attacking with their nuclear weapons, through the promise of retaliation and possibly mutually assured destruction 

Sagan, who recently wrote an essay in Foreign Affairs magazine on the North Korea nuclear crisis, said he has come to decide deterrence is the best approach to the issue.

“I am not one who gladly listens to the siren song of nuclear deterrence,” he said, noting that while he is a self-described dove on disarmament issues, he is more hawkish on allowing countries to obtain nuclear weapons, which deterrence implies. “I accept deterrence reluctantly.”

In North Korea, he said, no military alternatives exist to solve the problem. For example, even if a decapitation strike were successful – and several U.S. attempts have failed in the past with regard to Saddam Hussein and Muammar Gaddafi – there’s no way to know if North Korean leader Kim Jong-un has already given his generals the green light to unleash nuclear or powerful conventional attacks in the case of his demise.

For Sagan, deterrence is a more complicated issue today than during the Cold War when the U.S. and U.S.S.R. were rational actors with thousands of nuclear weapons. He is especially concerned with the rhetoric and the preventive war suggestions emanating from the Trump Administration.

Senior U.S. military leaders, Sagan said, have a duty not to follow “impaired-decision making” that might come from the president. He invoked the prospect of using the Cabinet and the 25th Amendment to halt such an order and remove the president from office. Currently, he belives the nuclear decision process is problematic, as the president alone can directly order the Strategic Air Command to launch nuclear weapons.

Sagan advises that a revised nuclear chain of command should include both the U.S. Secretary of Defense and the U.S. Attorney General. A U.S. Senate hearing, led by Sen. Bob Corker, is actually studying the nuclear authorization process due to concerns with Trump's rhetoric and escalation of the North Korean issue.

“We need more checks on how we decide to use nuclear weapons,” said Sagan, who studies nuclear strategy, ethics and war, public opinion about the use of force, and nuclear non-proliferation and arms control.

He noted that U.S. National Security Advisor H.R McMaster recently criticized his predecessor, Susan Rice, for saying the U.S. could "tolerate" nuclear weapons in North Korea the same way we tolerated nuclear weapons in the Soviet Union​.

He quoted McMaster: “'A regime that poses a continuous threat to the its neighbors in the region and now may pose a threat, direct threat, to the United States with weapons of mass destruction? A regime that imprisons and murders anyone who seems to oppose that regime, including members of his own family, using sarin nerve gas in a public airport?'”

But Sagan said we have long tolerated such authoritarian regimes that have nuclear weapons. 

Stumbling accidentally into war with North Korea also seems like a rising risk. On Sept. 27, several U.S. service members and their families received a fraudulent “noncombatant evacuation operation” order via text and social media, he said. The fake notices were quickly reported up the chain of command and the U.S. issued a statement denouncing their validity – the perpetrators have not been found. But Sagan says it illustrates how easy it is to create a situation where North Korea felt a U.S. invasion and attack is imminent – and as a result, could choose to unleash a nuclear first strike.

‘Western fantasy’

Narang, who was once a CISAC visiting assistant professor, studies nuclear proliferation and strategy, South Asian security, and general security studies.

“Deterrence is your friend,” he said in explaining why it can work with North Korea. If the U.S. believes North Korea seeks to preserve its regime – a status quo intention – then deterrence theory works much like it did with the former Soviet Union.

On the other hand, if the U.S. believes North Korea has darker motives, such as reunifying the Korean peninsula through an invasion, then that perspective could lead to a U.S. first strike. Also, the existing U.S. demand of rolling back North Korea’s nuclear program – “denuclearization” – is a “Western fantasy.” They will not give up nuclear weapons, he said.

He said the U.S. does not like to be deterred from making a first strike – as in preventive war – but that is what it must accept if it decides to follow the deterrence course. North Korea, once it possesses an ICBM capable of hitting the U.S. mainland, would pose such a deterrence in the balance of power between the two countries.

“The good news is that deterrence can work, coupled with coercive diplomacy,” Narang said. “We know how to play this game.”

He believes Jong-un is a rational actor, though a cruel dictator. “There’s nothing to suggest he’s crazy.” Ultimately, he said, an effective deterrence policy depends on clarity, consistency, coherence and communications.

U.S. nuclear shield, alliances

An expert on security in the Asia-Pacific region and alliance politics, Rapp-Hooper talked about the U.S. relationships, especially with Japan and South Korea, and the “nuclear shield” over these countries that those agreements offer. As a result, neither country has developed nuclear weapons.

This dynamic, however, could change if a North Korean missile could reach the U.S., said Rapp-Hooper, who earned a bachelor’s degree in history at Stanford.

“North Korea is eroding U.S. security guarantees over time,” she said, adding that once those missiles are capable of hitting a U.S. city, would the U.S. government still protect Seoul from attack and let an American city be hit?

The Korean situation, Rapp-Hooper said, is much different than Europe in the Cold War, when such an American nuclear shield existed against a Soviet invasion. Many different U.S. agreements exist now than during that time; no U.S. nuclear weapons are forwardly deployed in northeast Asia, like in Europe then; and the unilateral threats coming from the Trump Administration are unprecedented in nuclear diplomacy.

On the latter point, she called it the “Trump multiplier” effect. “That’s the most exacerbating thing of all,” she said, noting that elements of the White staff are pushing a “better-use-it-now” or preventive attack approach, whereas Secretary of Defense James Mattis and Secretary of State Rex Tillerson see North Korea as more concerned with preserving its regime.

Sagan also pointed out how President Trump’s speech at the United Nations in September led to a realization among the North Koreans that they had no choice but to continue to develop nuclear weapons.

That’s when the president said, “’Rocket Man is on a suicide mission for himself and for his regime,’” Sagan noted.

​He then recalled Kim Jong Un’s response to Trump’s speech, quoting the North Korean leader: “’His remarks which described the U.S. option through straightforward expression of his will have convinced me, rather than frightening or stopping me, that the path I chose is correct and that it is the one I have to follow to the last.’”​

 

 

 

Hero Image
gettyimages 847114660
The same logic – deterrence – that kept the United States and the former Soviet Union from nuclear war is the best option to deal with North Korea, scholars said Tuesday at Stanford.
Getty Images/Chung Sung-Jun
All News button
1
-

Abstract: In this talk, based on his new book “Experience on Demand: What Virtual Reality is, How it Works, and What it Can Do,” Bailenson draws upon two decades spent researching the psychological effects of virtual reality (VR) to help people understand this powerful new tool. ​He describes the profound ways this technology can be put to use—not to distance ourselves from reality, but to enrich our lives and influence us to treat others, the environment, and ourselves better.

Speaker Bio: Jeremy Bailenson is founding director of Stanford University’s Virtual Human Interaction Lab, Thomas More Storke Professor in the Department of Communication, Professor (by courtesy) of Education, Professor (by courtesy) Program in Symbolic Systems, a Senior Fellow at the Woods Institute for the Environment, and a Faculty Leader at Stanford’s Center for Longevity. He earned a B.A. cum laude from the University of Michigan in 1994 and a Ph.D. in cognitive psychology from Northwestern University in 1999. He spent four years at the University of California, Santa Barbara as a Post-Doctoral Fellow and then an Assistant Research Professor.

Bailenson studies the psychology of Virtual Reality (VR), in particular how virtual experiences lead to changes in perceptions of self and others. His lab builds and studies systems that allow people to meet in virtual space, and explores the changes in the nature of social interaction. His most recent research focuses on how VR can transform education, environmental conservation, empathy, and health.

He consults pro bono on VR policy for a wide variety of government agencies, has published numerous papers and opinion pieces, and has produced three VR documentary experiences which were official selections at the Tribeca Film Festival in 2016 and 2017. His new book, “Experience on Demand” will be published by Norton in January.

Jeremy Bailenson Professor of Communication Stanford University
Seminars
Authors
News Type
News
Date
Paragraphs

The Center for International Security and Cooperation now has more than 46 podcasts, dating all the way back to Oct. 19, 2016. Listen to them on the CISAC page on the iTunes website. Simply mouse over the title and click play. Open iTunes to download and subscribe to CISAC podcasts. Seminars and events at CISAC are routinely audiotaped for use as podcasts. Also, the Freeman Spogli Institute for International Relations offers the World Class podcast series, featuring scholars and experts from FSI, CISAC and beyond.

Hero Image
gettyimages 513740370 Getty Images/Blackzheep
All News button
1
Subscribe to Governance