Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

-

ABOUT THE SPEAKER: James Cameron, Stanton Nuclear Security Postdoctoral Fellow at CISAC for 2013-14, completed his PhD in July 2013 at the University of Cambridge. James is very interested in the contribution history can make to informing today’s debates on nuclear strategy and U.S.-Russian relations. After completing his master’s in Russian and East European Studies at the University of Oxford, he was a business consultant specializing in the former Soviet Union. 

His dissertation, “The Development of United States Anti-Ballistic Missile Policy, 1961-1972”, used the transformation of the American anti-ballistic missile (ABM) program from John F. Kennedy to Richard M. Nixon as a prism through which to examine changing patterns of presidential nuclear leadership during this period. Employing both new American and Russian sources, the thesis shows how successive occupants of the Oval Office and their most trusted advisers managed the tension between their publicly articulated nuclear strategies and their inner convictions regarding the utility of nuclear weapons during this pivotal decade of the Cold War.


ABOUT THE TOPIC:
Richard Nixon did not believe in mutual assured destruction. Yet he signed the Anti-Ballistic Missile (ABM) Treaty in 1972, which enshrined MAD as a central fact of the U.S.-Soviet strategic nuclear balance. Conversely his predecessors, John F. Kennedy and Lyndon Johnson, publicly defended American nuclear superiority and pushed ahead with ABM, despite their private skepticism regarding the utility of both and desire to moderate the arms race. Employing newly available evidence from declassified telephone recordings and documents, this paper attempts to account for this contradiction. It does so by placing the perpetual presidential struggle to reconcile private convictions with public demands at the center of the emergence of assured destruction and the limitation of ABM as elements of U.S.-Soviet détente through strategic arms control.

CISAC Conference Room

James Cameron Stanton Nuclear Security Postdoctoral Fellow, CISAC Speaker
Barton J. Bernstein Professor Emeritus, Department of History, Stanford University Commentator
Seminars
-

ABOUT THE SPEAKER: Rachel Gillum is a PhD student in Political Science at Stanford University, and joined CISAC as a predoctoral fellow in September of 2013. She is also a fellow at the Association for Analytic Learning about Islam and Muslim Societies (AALIMS) and is affiliated with Stanford’s Abbasi Program in Islamic Studies. Rachel’s research focuses on the Muslim-American community and examines the determinants of a variety of political beliefs and behaviors towards the American government, from full integration and identification with the United States, to support for violent extremism.

Rachel previously served as a graduate associate researcher at the RAND Corporation’s International Policy Center, where she conducted in-depth analysis on terrorist recruitment strategies and presented policy suggestions to U.S. government clients. From 2010-2012, she served as the chief editor and head research assistant under Prof. Martha Crenshaw on the Mapping Militants Project, where she oversaw and helped devise the design of an online tool for the analysis of terrorist networks. Rachel has also worked as a consultant for the Gallup Organization and a research assistant at the Department of Defense’s Near East South Asia Center for Strategic Studies.

ABOUT THE TOPIC: How do Muslim-Americans form beliefs about the treatment they expect to receive from US law enforcement? The results of an original, nationally-representative survey of Muslim-Americans suggest two key findings. First, expectations of fairness on the part of Muslim immigrants are shaped, in part, by the level of institutional corruption in their country of origin. Immigrants coming from less corrupt countries hold more optimistic views about expected treatment by US law enforcement. Second, Muslim immigrants who have been naturalized are less trusting in the government than newcomers, and Muslims who were born and raised in the United States are least likely to believe that law enforcement will deal with Muslims fairly. These results are robust to the inclusion of a variety of control variables. Ethnographic evidence drawn from interviews with Muslims-Americans suggests that Muslims update their expectations through interactions and familiarity with American institutions. US-born Muslims expect violations of their rights by the government and are politically concerned about such issues. Foreign-born Muslims, while aware of the controversies regarding US government surveillance and profiling of Muslim communities, tend to be less focused on issues related to citizen rights and more focused on the day-to-day concerns common to immigrants everywhere.

CISAC Conference Room

Rachel Gillum Predoctoral Fellow, CISAC; PhD Candidate, Department of Political Science, Stanford University Speaker
Shirin Sinnar Assistant Professor of Law, Stanford Law School Commentator
Seminars
-

ABOUT THE SPEAKER: Niccolò Petrelli is a postdoctoral fellow at CISAC. His research focuses on reassessing the theory and practice of counterinsurgency. Incorporating insights from the contiguous fields of study of "civil wars" and "peacekeeping operations" and employing critical historical analysis of case studies, the research aims to analyze the features, limits and influence of the theory of Counterinsurgency. Before joining CISAC in 2013, Niccolò was a military research fellow at the Military Center for Strategic Studies (Ce.Mi.S.S.) within the Center for Advanced Defense Studies (CASD) in Rome, Italy, and a research assistant at the International Institute for Counter-Terrorism (ICT) in Herzliya. Niccolò received his PhD in Political Science from the University of Roma Tre in 2013. In his dissertation, he examined the impact of strategic culture on the Israeli approach to counterinsurgency.


ABOUT THE TOPIC: In "Counterinsurgency: A Conceptual Reassessment," Niccolò Petrelli will address unresolved issues in the study of counterinsurgency (COIN). The talk will focus on three main questions: How did COIN theory emerge and which are its intellectual sources? To what extent has COIN practice been informed by theory? Is the population-centric COIN paradigm prevalent in scholarly studies and in the contemporary professional discourse historically accurate? In order to answer these questions, the talk will first outline a critical historical analysis of the development of COIN theory, tracing its intellectual roots and fundamental assumptions. Subsequently, it will reassess practice through the qualitative comparative analysis of several case studies of COIN campaigns.

CISAC Conference Room

Niccolo Petrelli Postdoctoral Fellow, CISAC Speaker

Not in residence

0
Lecturer
Vardi,_Gil-li.jpg

Gil-li Vardi joined CISAC as a visiting scholar in December 2011. She completed her PhD at the London School of Economics in 2008, and spent two years as a research fellow at the Oxford Leverhulme Programme on the Changing Character of War at the University of Oxford, after which she joined Notre Dame university as a J. P. Moran Family Assistant Professor of Military History.

Her research examines the interplay between organizational culture, doctrine, and operational patterns in military organizations, and focuses on the incentives and dynamics of change in military thought and practice.

Driven by her interest in both the German and Israeli militaries and their organizational cultures, Vardi is currently revising her dissertation, "The Enigma of Wehrmacht Operational Doctrine: The Evolution of Military Thought in Germany, 1919-1941," alongside preparing a book manuscript on the sources of the Israeli Defence Forces’ (IDF) early strategic and operational perceptions and preferences.

Gil-li Vardi Visiting Scholar, CISAC Commentator
Seminars
-

ABOUT THE TOPIC: In his talk, Jack Goldsmith will explain why he is skeptical about significant cybersecurity cooperation among military rivals, especially at the treaty level. He will, however, argue that the Snowden revelations make such cooperation more, not less, likely.

ABOUT THE SPEAKER: Jack Goldsmith is Henry L. Shattuck Professor of Law at Harvard University, where he specializes in national security law, international law, internet law, and presidential power. Goldsmith is the author of five books and numerous articles covering these topics. His recent books include: Power and Constraint: The Accountable Presidency After 9/11 (W.W. Norton, 2012); The Terror Presidency: Law and Judgment Inside the Bush Administration (W.W. Norton, 2007); Who Controls the Internet? Illusions of a Borderless World (Oxford Press, 2006, with Tim Wu); and The Limits of International Law (Oxford Press, 2005, with Eric Posner). Prior to his time at Harvard, Goldsmith was Assistant Attorney General in the Office of Legal Counsel from October 2003 to July 2004 and Special Counsel to the General Counsel to the Department of Defense from September 2002 through June 2003. 

CISAC Conference Room

Jack Goldsmith Henry L. Shattuck Professor of Law, Harvard Law School Speaker
Jonathan Mayer Cybersecurity Fellow, CISAC Commentator
Seminars
News Type
News
Date
Paragraphs

With the American government shut down over congressional budget battles, it seems like a particularly opportune time for scholars to talk about the challenges of governance and the rule of law.

But the political scientists and legal experts who gathered this week for a rule of law workshop organized by the Freeman Spogli Institute for International Studies and Stanford Law School probably didn’t see this crisis coming.

Photo Credit: Rod Searcey

“When we first began talking, Gerhard said the rule of law and governance are not peculiar only to developing counties,” Paul Brest, a professor and former dean of the law school, said as he recalled discussing such a workshop with Gerhard Casper, a constitutional law expert and FSI senior fellow. “I don’t think he predicted where the United States would be today.”

The half-day workshop brought together 20 scholars associated with FSI and the law school who discussed their individual research and explored possibilities for collaboration.

Their wide-ranging discussions covered the definitions and measurement of rule of law, governance in developed and developing countries, political participation, partisanship, and policy implementation.

“How do you implement what sounds like a thoughtful, abstract idea?” asked Mariano-Florentino Cuéllar, FSI’s director and law school professor, in discussing the complexity of the concept of rule of law. “There is something about the rule of law that has to go beyond whether a statute is complied with. A society also has to think smartly about how to manage discretion.”

But bending the rules without breaking the rule of law “is a difficult matter," said law school Professor Jenny Martinez – and one worthy of academic attention.

“Most well-functioning legal systems … involve a certain amount of discretion,” she said. “But that’s something we can explore.”

Discussion sessions were led by Martinez and Cuéllar, as well as Erik Jensen and Bernadette Meyler; Bruce Cain, Larry Diamond and Nathaniel Persily; Francis Fukuyama and Avner Greif.

“There’s a lot of work going on across campus focusing on governance and the rule of law,” Brest said. “Getting together to begin discussing that could create some sort of networks and a whole that is greater than the individual parts.”

Hero Image
RSD13 087 0035a
FSI Director Mariano-Florentino Cuéllar leads a discussion during a workshop focused on governance and the rule of law.
Rod Searcey
All News button
1
-

ABOUT THE SPEAKER: Elaine Korzak joined CISAC in September 2013 as a predoctoral cybersecurity fellow. She is a PhD student in the Department of War Studies at King's College London. Elaine's thesis evaluates how cyber attacks challenge current legal norms and whether the identified challenges ultimately warrant a new legal framework. The analysis focuses on two areas in particular: international law on the use of force (jus ad bellum) and international humanitarian law (jus in bello). During her time at CISAC, Elaine is conducting empirical research examining states' responses to the legal challenges created by cyber attacks. Her analysis focuses on various state positions in key international forums, including the United Nations and the International Telecommunication Union.

Elaine earned a Bachelor's degree in International Relations from the University of Dresden (Germany) before focusing her research interests at the interface of international law and security studies. She holds both an MA in International Peace and Security from King's College London and an LL.M in Public International Law from the London School of Economics. Her professional experience includes various governmental and non-governmental institutions (both national and international), where she has worked on various disarmament and international security issues. These include, most recently, NATO's Cyber Defence Section as well as the European Commission's Director-General on Information Society and Media.

ABOUT THE TOPIC: With their unique characteristics such as swiftness, its non-kinetic nature and anonymity, computer network attacks fundamentally challenge the current international legal paradigm which is based on a state-centered concept of armed force involving some degree of kinetic energy transfer through blast and fragmentation. It has been argued that a revolution in military affairs has been ushered in by technological advancements that cannot be accommodated within the existing legal framework. Both practitioners and scholars have called for a new regulatory framework to govern computer network attacks. This presentation will give an overview of Elaine's doctoral research project which evaluates these claims by examining if and how computer network attacks challenge key norms of international law on the use of force and international humanitarian law and whether the identified challenges ultimately warrant a new legal framework.   

CISAC Conference Room

0
Affiliate
elaine_korzak.jpg

Elaine Korzak is a research scholar at the Berkeley Risk and Security Lab (BRSL) at UC Berkeley where she focuses on international cybersecurity governance. She is also an affiliate at the Center for Long-Term Cybersecurity (CLTC) at UC Berkeley and the Center for International Security and Cooperation (CISAC) at Stanford University.

Her research covers international legal, policy, and governance aspects in cybersecurity, including norms and international law governing state conduct in cyberspace, cybersecurity negotiations at the United Nations, and the international regulation of commercial spyware. Her work has appeared in the Oxford Handbook of Cyber Security, the Routledge Handbook of International Cybersecurity, the Georgetown Journal of International Affairs, the Bulletin of the Atomic Scientists, and RUSI Journal.

Previously, Elaine was a cybersecurity postdoctoral fellow at the Center for International Security and Cooperation (CISAC) and a national fellow at the Hoover Institution, both at Stanford University, before leading the Cyber Initiative at the Middlebury Institute of International Studies at Monterey (MIIS). She holds a PhD in War Studies and an MA in International Peace and Security from King’s College London, as well as an LL.M. in Public International Law from the London School of Economics and Political Science (LSE).

 

Date Label
Elaine Korzak Speaker Cybersecurity Predoctoral Fellow, CISAC, and PhD Candidate
Andrew K. Woods Cybersecurity Fellow Speaker CISAC
Seminars
News Type
News
Date
Paragraphs

Academics from American, European and Asian universities came together September 19th and 20th to present their research on the large-scale movements of people, and engage in a multidisciplinary exchange of ideas and perspectives.  This installment of the Europe Center - University of Vienna bi-annual series of conferences and workshops was held on the Stanford campus and co-sponsored by The Walter H. Shorenstein Asia-Pacific Research Center and the Center for International Security and Cooperation.

For the agenda, please visit the event website Migration and Integration: Global and Local Dimensions.

 

Hero Image
migration integration conference headline
Panel presentations and commentaries evoke dialogue at the Conference on Migration and Integration.
Roger Winkleman
All News button
1
Authors
News Type
Q&As
Date
Paragraphs

CISAC Co-Director Amy Zegart and nine other national security and intelligence scholars were recently invited to the headquarters of the National Security Agency in Fort Meade, Md., for unprecedented talks with high-ranking officials. They discussed cybersecurity, the plummeting public trust in the agency, its relationship with Congress and how to rebuild the agency’s reputation and rethink its program operations. 

The academics were first taken to the black granite wall carved with the names of 171 military and civilian cryptologists who have died in service. “I think they wanted us to know that this is an organization of people, not some robots trolling through your emails,” said Zegart, author of the book, “Spying Blind,” which examines why U.S. intelligence agencies failed to adapt to the terrorist threat before the 9/11 attacks. 

The scholars were then taken to a windowless conference room for several hours of what Zegart called remarkably frank and free-ranging talks about the agency and its tactics.

The NSA is one of the world’s most secret intelligence gathering organizations. Its methods have come under intense scrutiny with a series of damaging leaks about its operations. Former NSA contractor Edward Snowden and national intelligence reporters have revealed tactics that have left many Americans cold and questioning the legality and necessity of the agency’s methods. From monitoring emails and phone calls, to secretly cracking encryption codes that protect personal email as well as financial and medical records and Internet chats – the revelations just keep coming. Civil liberty organizations and Internet privacy advocates here at Stanford are outraged, while some foreign governments are accusing Washington of Big Brother tactics run amok. 

Zegart answers questions about those perceptions and her Sept. 23 briefing at NSA headquarters.

 Are the accusations that the NSA is Big Brother squared fair?

Image

If you look at the reporting on the NSA so far, there is zero evidence of a widespread, deliberate and nefarious plan by the agency to violate the law and spy on American citizens. This is a policy debate, not a scandal. There’s no question in my mind that the NSA has interpreted its legal authority to the maximum extent of the law possible. They’ve taken what Congress has granted them and they have pushed to the edge – but that’s a very big difference from running amok.  

How did this unprecedented meeting come about and why do you think the senior NSA officials – who asked not to be identified – called on social scientists?

In our group, the last time someone went to the NSA was in 1975, which tells you how rare it is for them to invite academics in. The was a sense at senior levels that they need to think more systematically and long-term about education, about being more open to academics coming in and doing research about the NSA and hearing what academics have to say. In part, thought-leaders at universities can play a role in transmitting some of the complexities in which the NSA operates – the tradeoffs the agency is confronting and the constrains under which they are operating. 

The other academics invited to the NSA on Monday were William Inboden of the University of Texas, Austin; Michael Desch of Nortre Dame University; Jeffrey Engel and Joshua Rovner of Southern Methodist University; Thomas Mahnken of the U.S. Naval War College; Richard Betts of Columbia University; Benjamin Wittes of The Brookings Institution; Kori Schake of Stanford University; and Robert Chesney of the University of Texas, Austin.

 

 One thing this meeting highlighted for me is that the NSA is not free to respond to the criticism it gets in the press. It’s intertwined with other organizations that have a say in how it responds: the Office of the Director of National Intelligence, the FBI, the Justice Department and the White House. And they have never had to deal with the spotlight before. They gave me this statistic: Last summer, there were 167 legitimate questions from the press; in the summer of 2013 there were 1,900 media requests. That’s a tenfold increase. This is a whole new world for this agency. And to go against secrecy is just totally counter to their culture. This was a bold step for them to have us come in.

 

Did the NSA officials talk about whether they had broken any laws? 

They definitely wanted us to believe that what they are doing is lawful and effective. I believe the lawful part; I’m not so sure about the effective part. I think they haven’t looked hard enough about what effective means. Do they know it when they see it? And who’s to judge?

They were quick to point out that they’re under extensive oversight both by Congress and the Foreign Intelligence Surveillance Act (FISA) court. The question is whether Americans are comfortable with the lines that have been drawn by their own government and if they’re comfortable with the lack of transparency. The NSA is really bad at letting us know what the gains are (from surveillance) and they’ve struggled with how to deal with the public reaction to the Snowden revelations. 

This is an intelligence agency and they’re supposed to be stealing information from other governments; that’s what we pay them to do and other governments would use those capabilities in an instant if they had them. That has gotten lost in the debate. When I talk to my parents and friends, they think that the NSA is listening in on their phone calls. That’s just not true. They’re examining phone logs: who called whom and for how long. No one is listening to your conversation with grandma.

 

The fundamental problem is that the NSA is highly regulated – but nobody trusts the regulatory framework."

Did you discuss former NSA contractor Edward Snowden? 

Extensively. It’s the biggest breach in the agency’s history. They’ve been in crisis mode since June. They’ve been putting our fires every day and the arsonist is still out there. NSA officials told us that they know 125 documents have been compromised; they believe Snowden probably has already passed to the press another 50,000 documents and that the entire tranche that he may have taken is bigger than that. But there’s a question about whether that tranche is accessible, that Snowden may have done things to make some of his data hard to read.  

They said Snowden didn’t just download documents he himself had access to. He used social engineering, convincing someone else to give him access to additional information to breach security protocols. Meanwhile, Snowden had plenty of avenues for whistleblowing, including five inspectors-general and the members of the congressional intelligence committees, but he availed himself of none.

 

Have Snowden’s actions endangered national security or international relations? 

The standard lines about “irreparable harm” are not convincing to many people because they are so vague, we’ve heard them so often, and the government classifies boatloads of information that shouldn’t be secret. But NSA officials got a little more specific. They said Snowden has hurt national security in three ways: The first is that he revealed government surveillance capabilities. Second, he’s revealed politically embarrassing things that are harming relations with our allies – and they believe there is more to come. (Brazilian President Dilma Rousseff postponed a state visit to Washington, for example, following the release of evidence that the U.S. spied on Brazilian politicians and business leaders.) They said Snowden has a pattern of releasing embarrassing information around big international meetings, such as the G20 summit. The third damaging impact is that Snowden has hurt the NSA’s ability to produce intelligence.

 

What are some of the challenges and solutions moving forward? 

Intelligence is a political loser and so you see a lot of members of Congress who says they are shocked – shocked! – to find out what the NSA is doing when they had full opportunity to be briefed on these programs for a long time. So they’re making political hay out of NSA’s difficulties. Most members of Congress have zero incentive to actually learn anything about the complexities of intelligence because the voters don’t hear about it and they don’t reward them for it. 

The near-term challenge is to stop Congress from doing something stupid, such as the wholesale cancelling of NSA programs and capabilities. The medium-term challenge is to figure out what sensible options there are to restoring the public trust and make the NSA more transparent and more targeted in its collection approach. When NSA chief Keith Alexander steps down, we are going to see all of these issues come to a head in a very public way with the confirmation of the next director. 

The longer-term challenge is creating better mechanisms to assess whether NSA should do things just because it can technically – to weigh the wisdom and efficacy of programs, not just their legality. The NSA also needs a sustainable education campaign so that when things break in the news, legislators and constituents have an understanding of what this agency does and can put these revelations into perspective.

They definitely wanted us to believe that what they're doing is lawful and effective; I believe the lawful part, I'm just not so sure about the effective part." 

 

What are the strengths of the NSA that the public doesn’t get to see? 

The NSA is the organization that’s responsible for information assurance, like if you’re in government on a secure phone line. And most people don’t know the NSA wrote the codes to protect our nuclear arsenal from day one. So the NSA has two, often conflicting missions. One is signals intelligence, which is offense, and the other is the information assurance that is defense. In an era of cyber vulnerabilities, information assurance is huge. They feel like they were doing what they were authorized to do and serving the mission and that they are being characterized as evil for doing what they think is right.

 

What were your biggest takeaways from this meeting? 

I would say one of the things that I did walk away from the meeting hearing – and I think that perhaps this is the big policy question – is that the NSA orientation is to collect now, ask questions later. So the question is: Is that the right operating philosophy; are we comfortable as a democratic society with that collect-now-ask-later approach?

Hero Image
NSOC 2012 logo copy
All News button
1
-

This event is now full. We cannot accept any more RSVP's, but you can e-mail Zhila Emadi (zemadi@stanford.edu), if you would like to be placed on a waitlist.

 

About the Speaker:

General C. Robert Kehler is the commander of U.S. Strategic Command. He provides the President and Secretary of Defense with a broad range of strategic capabilities and options. He is responsible for the plans and operations for all U.S. forces conducting strategic nuclear and conventional deterrence and Department of Defense space and cyberspace operations.

General Kehler entered the Air Force in 1975 as a distinguished graduate of the Pennsylvania State University Air Force ROTC program. He has commanded at the squadron, group, wing and major command levels, and has a broad range of operational tours in ICBM, space launch, space control, space and missile warning operations.

General Kehler's staff assignments include tours with the Air Staff and Strategic Air Command headquarters. He was also assigned to the Secretary of the Air Force's Office of Legislative Liaison, where he was the point man on Capitol Hill for matters regarding the President's ICBM Modernization Program. As director of the National Security Space Office, General Kehler integrated the activities of a number of space organizations on behalf of the Under Secretary of the Air Force and Director of the National Reconnaissance Office. He has also served as deputy director of operations, Air Force Space Command, and as deputy commander, U.S. Strategic Command.

CISAC Conference Room

General C. Robert "Bob" Kehler Commander, United States Strategic Command Speaker
Seminars
Subscribe to Governance