Governance

FSI's research on the origins, character and consequences of government institutions spans continents and academic disciplines. The institute’s senior fellows and their colleagues across Stanford examine the principles of public administration and implementation. Their work focuses on how maternal health care is delivered in rural China, how public action can create wealth and eliminate poverty, and why U.S. immigration reform keeps stalling. 

FSI’s work includes comparative studies of how institutions help resolve policy and societal issues. Scholars aim to clearly define and make sense of the rule of law, examining how it is invoked and applied around the world. 

FSI researchers also investigate government services – trying to understand and measure how they work, whom they serve and how good they are. They assess energy services aimed at helping the poorest people around the world and explore public opinion on torture policies. The Children in Crisis project addresses how child health interventions interact with political reform. Specific research on governance, organizations and security capitalizes on FSI's longstanding interests and looks at how governance and organizational issues affect a nation’s ability to address security and international cooperation.

Paragraphs

OVER the last three years, as I delved into the world of American nuclear weapons, I felt increasingly as though I had stepped into a time warp. Despite the nearly total rearrangement of the international security landscape since the demise of the Soviet Union in 1991, the rise of Islamic terrorism and the spread of nuclear materials and technology to volatile nations like Pakistan, North Korea and Iran, the Defense Department remains enthralled by cold war nuclear strategies and practices.

Barack Obama took office determined to change that. He has made progress on many fronts. Last week, he outlined a new, no-frills defense strategy, downsizing conventional forces. He now needs to double down on his commitment to refashion nuclear forces. He should trim the American nuclear arsenal by two-thirds to bring it down to a sensible size, order the Pentagon to scale back nuclear war-fighting plans so they are relevant to contemporary threats, remove most American intercontinental, land-based missiles from high alert and drop the quaint notion that a fleet of aging B-52 bombers can effectively deliver nuclear weapons to distant targets.

This agenda is not only desirable, it is doable without undercutting American security. It would save tens of billions of dollars a year, a relatively small amount by Pentagon standards, but every billion counts as Leon E. Panetta, the defense secretary, trims his budget. And the steps can safely be taken without requiring reciprocal moves by Russia that must be codified in a treaty.

For the last few months, the Obama administration has been conducting a classified review of the doctrines and operations that determine the shape and potential uses of America’s nuclear armaments. If the president pushes back against the defenders of the old order at the Pentagon and other redoubts of the nuclear priesthood, he can preserve American security while making the United States a more credible leader on one of today’s most critical issues — containing the spread of nuclear weapons. Like a chain smoker asking others to give up cigarettes, the United States, with its bloated arsenal, sounds hypocritical when it puts pressure on other nations to cut weapons and stop producing bomb-grade highly enriched uranium, the key ingredient of a crude nuclear weapon.

American actions alone won’t end the proliferation danger, but American leadership is essential to any hope of containing the threat.

Sam Nunn, the former chairman of the Senate Armed Services Committee, and anything but a dove over the years, rightly warns that the spread of weapons and the means to make them may soon reach a combustible stage where New York, Washington, Moscow, Tokyo or London is at risk of a nuclear terrorist attack.

Mr. Nunn and other keepers of America’s cold-war armory, George P. Shultz and Henry A. Kissinger, former Republican secretaries of state, and William J. Perry, a former Democratic defense secretary, have banded together in recent years to press, among other things, for cutting nuclear forces, de-alerting missiles and, ultimately, eliminating nuclear arms. Mr. Obama has embraced their aims and welcomed them to the Oval Office. Their high-powered, bipartisan alliance, if adroitly employed by the White House, ought to provide some political cover as Mr. Obama reshapes nuclear policy while running for a second term.

There is no national security rationale for maintaining an arsenal of some 5,000 warheads, with nearly 2,000 arms ready to use on short notice and the rest in reserve. We don’t need thousands of warheads, or even hundreds, to counter threats from countries like Iran or North Korea.

The only conceivable use of so many weapons would be a full-scale nuclear war with Russia, which has more warheads than the United States. But two decades after the collapse of the Soviet Union, even Vladimir V. Putin, with his authoritarian bent, is not about to put Russia on a collision course with the United States that leads to nuclear war. China, equally unlikely to escalate tensions to the nuclear brink, probably has fewer than 400 warheads and a policy to use them only in self-defense. Pakistan has roughly 100, North Korea fewer than 10 and Iran, so far, zero.

The United States could live quite securely with fewer than 1,500 warheads, half in reserve. Defenders of the nuclear faith claim we need 5,000 weapons as a hedge against warheads that may become defective over time. But an elaborate Energy Department program to maintain and refurbish warheads, the Stockpile Stewardship Program, has proved highly effective.

Another oft-cited reason for increasing our arsenal is that the Pentagon’s nuclear war-fighting plans still call for striking hundreds of targets in Russia and China, as well as dozens of sites in a number of other publicly unidentified nations — presumably Iran, North Korea and Syria — considered potentially hostile to the United States and eager to possess unconventional weapons.

Washington’s current nuclear war plans remain far too outsize to deal with any plausible attack on America. Mr. Obama could remove some nations from the hit list, starting with China, and tell his generals to limit the number of targets in the countries that remain.

The oversize American nuclear arsenal features an equally outdated reliance on long-distance bombers. The days when lumbering B-52 bombers could play a central role in delivering nuclear weapons — memorably spoofed in Stanley Kubrick’s “Dr. Strangelove” — ended decades ago. Mr. Obama should ground the bombers and depend on land- and sea-based missiles.

The high-alert status of America’s intercontinental ballistic missiles is another anachronism. There are few circumstances that might require the United States to quickly launch nuclear-tipped missiles, and missiles on high alert are an invitation to an accident, or impulsive action. In the first year of his presidency, Mr. Obama outlined an ambitious nuclear weapons agenda. Absent new action, Washington will remain frozen in a costly cold war posture.

Philip Taubman is a former New York Times bureau chief in Moscow and Washington and the author of “The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb.”

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
New York Times
Authors
Philip Taubman
-

Zittrain will discuss the false starts in understanding the simultaneously underappreciated and overhyped fields of cybersecurity and cyberwarfare, and offer a view on where the deepest problems lie -- and how to address them.


About the speaker: Jonathan Zittrain is a Professor of Law at Harvard Law School and the Kennedy School of Government, Professor of Computer Science at Harvard’s School of Engineering and Applied Sciences, and a co-founder of the Berkman Center for Internet & Society at Harvard University. Previously, he was Professor of Internet Governance and Regulation at Oxford University and a principal of the Oxford Internet Institute. He was also a visiting professor at the New York University School of Law and Stanford Law School.

Zittrain’s research interests include battles for control of digital property and content, cryptography, electronic privacy, the roles of intermediaries within Internet architecture, and the useful and unobtrusive deployment of technology in education. He was co-counsel with Lawrence Lessig in Eldred v. Ashcroft, challenging the Sonny Bono Copyright Term Extension Act of 1998. The case lost 7-2 at the Supreme Court.

He also performed the first large-scale tests of Internet filtering in China and Saudi Arabia in 2002, and as part of the OpenNet Initiative, he has co-edited studies of Internet filtering by national governments, Access Denied: The Practice and Policy of Global Internet Filtering and Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. His brainchild Herdict – a website that collects and tracks self-reported inaccessible sites from around the world- was launched in February, 2009. His book about the future of the now-intertwined Internet and PC, “The Future of the Internet — And How to Stop It,” came out in April 2008 from Yale University Press and Penguin UK — and under a Creative Commons license.

Zittrain holds a bachelor’s degree in cognitive science and artificial intelligence from Yale University, a J.D. from Harvard Law School, and a master’s in public administration from Harvard’s John F. Kennedy School of Government. He is a member of the Board of Trustees of the Internet Society, the Board of Directors of the Electronic Frontier Foundation, and a faculty fellow and Young Global Leader of the World Economic Forum, where he also chairs the Global Agenda Council on the Future of the Internet.

Reuben W. Hills Conference Room

Jonathan Zittrain Professor of Law at Harvard Law School and Professor of Computer Science at the Harvard School of Engineering and Applied Sciences Speaker
Seminars
-

Aziz Huq earned his BA summa cum laude in International Studies and French from the University of North Carolina at Chapel Hill in 1996 and his law degree from Columbia Law School in 2001, where he was awarded the John Ordronaux Prize. He clerked for Judge Robert D. Sack of the U.S. Court of Appeals for the Second Circuit (2001–02) and Justice Ruth Bader Ginsburg of the Supreme Court of the United States (2003–04). After clerking he worked as Associate Counsel and then Director of the Liberty and National Security Project of the Brennan Center for Justice at NYU School of Law. He has also been a Senior Consultant Analyst for the International Crisis Group.

His research and teaching interests include constitutional law, national security and counterterrorism, federal jurisdiction, legislation, human rights, and comparative constitutional law.


Abstract

What forum should be employed to adjudicate the status of persons suspected of involvement in terrorism? Recent clashes between Congress and the President as to whether the status of terrorism suspects should be determined via Article III criminal process or military commissions have revived debate on this venue question. The problem is typically framed as a simple matter of law on the assumption that existing statutory and doctrinal rules already furnish dispositive guidance for sorting suspects between civilian and military venues. This article takes issue with that assumption. It argues that the choice of forum question can more profitably be understood as a problem of institutional design rather than a choice of law puzzle. A key institutional design decision that to date has been ignored is whether or when to create jurisdictional redundancy: When, that is, should overlapping jurisdictions vest the government with a choice of forums or an option to retry a suspect acquitted in an initial process? Such redundancy is currently pervasive. But conventional wisdom suggests that it both risks abuse and is needlessly costly. This Article demonstrates that jurisdictional redundancy has complex direct and indirect effects on the accuracy and cost of terrorism-related adjudication. It presents a comprehensive framework for analyzing jurisdictional redundancy by exploring how the latter influences error rates, system maintenance costs, externalities, information production, and incentives. Applying that framework, I suggest the current status quo of pervasive redundancy has surprising merit in contrast to two leading reform proposals.

Reuben W. Hills Conference Room

Aziz Huq Assistant Professor of Law, The University of Chicago Law School Speaker
Seminars
-

Reuben W. Hills Conference Room

Jacob Shapiro Assistant Professor of Politics and International Affairs, Princeton University; Co-director, Empirical Studies of Conflict Project Speaker
David Blum Predoctoral Fellow, CISAC Commentator
Seminars
-

Reuben W. Hills Conference Room

Ryan Ellis Postdoctoral Fellow, CISAC Speaker
0
Affiliate
Diffie_Whit.jpg

Whitfield Diffie is a consulting scholar at CISAC. He was a visiting scholar in 2009-2010 and an affiliate from 2010-2012. He is best known for the discovery of the concept of public key cryptography, in 1975, which he developed along with Stanford University Electrical Engineering Professor Martin Hellman. Public key cryptography, which revolutionized not only cryptography but also the cryptographic community, now underlies the security of internet commerce.

During the 1980s, Diffie served as manager of secure systems research at Northern Telecom. In 1991, he joined Sun Microsystems as distinguished engineer and remained as Sun fellow and chief security officer until the spring of 2009.

Diffie spent the 1990s working to protect the individual and business right to use encryption, for which he argues in the book Privacy on the Line, the Politics of Wiretapping and Encryption, which he wrote jointly with Susan Landau. Diffie is a Marconi fellow and the recipient of a number of awards including the National Computer Systems Security Award (given jointly by NIST and NSA) and the Franklin Institute's Levy Prize.

Whitfield Diffie Affiliate, CISAC Commentator
Seminars
-

Reuben W. Hills Conference Room

David Palkki Deputy Director, National Defense University, Conflict Records Research Center; Co-editor, The Saddam Tapes: The Inner Workings of A Tyrant’s Regime, 1978-2001 Speaker

Not in residence

0
Senior Fellow at the Freeman Spogli Institute for International Studies, Emerita
Professor, by courtesy, of Political Science, Emerita
crenshaw_martha.jpg PhD

Martha Crenshaw is a senior fellow emerita at CISAC and FSI. She taught at Wesleyan University in Middletown, Connecticut, from 1974 to 2007.  She has published extensively on the subject of terrorism.  In 2011 Routledge published Explaining Terrorism, a collection of her previously published work.  A book co-authored with Gary LaFree titled Countering Terrorism was published by the Brookings Institution Press in 2017. She recently authored a report for the U.S. Institute of Peace, “Rethinking Transnational Terrorism:  An Integrated Approach”.

 

 She served on the Executive Board of Women in International Security and is a former President and Councilor of the International Society of Political Psychology (ISPP). In 2005-2006 she was a Guggenheim Fellow. She was a lead investigator with the National Consortium for the Study of Terrorism and the Response to Terrorism (START) at the University of Maryland from 2005 to 2017.  She is currently affiliated with the National Counterterrorism, Innovation, Technology, and Education (NCITE) Center, also a Center of Excellence for the Department of Homeland Security.  In 2009 the National Science Foundation/Department of Defense Minerva Initiative awarded her a grant for a research project on "mapping terrorist organizations," which is ongoing.  She has served on several committees of the National Academy of Sciences.  In 2015 she was elected a Corresponding Fellow of the British Academy.  She is the recipient of the International Studies Association International Security Studies Section Distinguished Scholar Award for 2016. Also in 2016 Ghent University awarded her an honorary doctorate.  She serves on the editorial boards of the journals International Security, Security Studies, Dynamics of Asymmetric Conflict, Orbis, and Terrorism and Political Violence.

Date Label
Martha Crenshaw Professor of Political Science (by courtesy); Senior Fellow, CISAC and FSI Commentator
Seminars
Paragraphs

Abstract

As the diplomatic standoff in North Korea enters its fourth year, the crisis atmosphere on the Korean peninsula sparked by Pyongyang's military actions in 2010 has eased. Pyongyang has agreed to return to the diplomatic table, its hand strengthened by advancing its nuclear program in the interim. Washington and Seoul remain reluctant to engage, having been burned by Pyongyang's clandestine uranium enrichment program unveiled in 2010. The authors argue that re-engagement, with the immediate objective to stop a third nuclear test and prevent further missile tests, is imperative to contain the nuclear threat for now; preventing the nuclear program's expansion and preparing the way for the ultimate denuclearization of the peninsula—critical goals—must be left to a second step.

 

Note: There is a supplement to this piece with detailed overhead imagery, additional analysis of Pyongyang's march toward a more threatening nuclear weapons capability, and brief commentary on how the accession of Kim Jong-un to leadership may influence North Korea's nuclear trajectory. Click here to access "North Korea from 30,000 Feet"

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
Siegfried S. Hecker
Robert Carlin
Paragraphs

An excerpt from "Implementing Change: Organizational Challenges" (pp. 309-310):

Improving organizational performance is never easy. As sociologist Jim March has noted, success requires that organizations balance exploration the search for new ways of doing things with exploitation, the ability to harness new practices and jettison older, less effective ones (March, 1991). These challenges confront all organizations, but two factors make them more acute for intelligence agencies. The first is bounded rationality (Simon, 1976). In the theoretical world, individuals have the luxury of perfect rationality, seeing all of the relevant options, assessing trade-offs with clarity, and making the best decisions. The real world is not as nice. There, rationality is inherently limited or bounded by uncertainty, imperfect information, and cognitive constraints that lead individuals to make decisions that appear to be “good enough”—but may turn out to be nowhere close (Simon, 1976). Intelligence officials have the toughest time of all, confronting bounded rationality problems in spades. Their job is to give policy-making customers decision advantage amidst swirling uncertainty, missing information, enemy deception and denial, and fast-changing events that are often unforeseeable, even to the participants themselves.

The second acute intelligence challenge is secrecy. As I discuss below, the more specialized any organization becomes, the harder it is for any one part of the organization to understand or improve what another part is doing, a phenomenon that sociologists call “structural secrecy” (Vaughan, 1996). In the classified universe, of course, this structural secrecy is compounded by actual secrecy, which protects vital information from adversaries, but also compartmentalizes information, ideas, organizations, and practices to a much greater extent.

Despite the intelligence community’s (IC’s) unique challenges, the fields of organization theory and political science offer useful insights and cautionary warnings about the organizational side of improving intelligence analysis. The chapters in Part II (Analytic Methods) of this volume mine an array of relevant literature for the best analytic tools to improve intelligence analysis. Here, we turn to a different task: Examining a broad sweep of relevant social science research with an eye to identifying which organizational factors impede or facilitate effective analysis. Worth underscoring, though, is the fact that social science does not offer ready-made instructions about how to make intelligence analytic improvements stick. However, it does offer some useful generalizations that can illuminate the trade-offs and challenges involved to guide more effective implementation.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
The National Academies Press
Authors
Amy Zegart
Number
0-309-17698-0
Paragraphs

Contention and Trust in Cities and States explores cities and nation-states throughout history and around the world, bringing together the research of top scholars. It takes as a jumping-off point the work of the late Charles Tilly, but proceeds varied topics ranging from how today’s drug cartels undermine nation-states to how cities, nation-states, and empires treated religious minorities in the middle of the last millennium. Threaded throughout are themes of city-state relations, trust networks and commitment, democracy and inequality, and the importance of historical legacies in shaping state structures, practices, and capacities.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Springer Press in "Contention and Trust in Cities and States"
Authors
Lynn Eden
Subscribe to Governance