Food Security
-
 Is military conflict in space inevitable? Has former president Eisenhower’s vision of keeping space peaceful become outdated? How can the United States secure its space interests and assets without provoking international violence? Bound by a treaty written and signed forty years ago, every space-faring nation—save the U.S. and Israel—has gone on record in favor of a new agreement. A new Prevention of an Arms Race in Outer Space (PAROS) treaty could address changes in the post-Cold War world as well as modern satellite and weapons technologies that the 1967 treaty could not anticipate. But in the grand tradition of American exceptionalism, Washington has largely avoided the issue. The administrations of Ronald Reagan, George H.W. Bush, Bill Clinton, and George W. Bush have blocked negotiations, citing potential threats to U.S. “rights, capabilities, and freedom of action.” Self-proclaimed “space warriors” even argue that U.S. military dominance in orbital space will be the only guarantee for international peace in the future. In Twilight War: The Folly of U.S. Space Dominance, Moore argues that the U.S. merely provokes conflict when it presumes to be the exception to the rule. “Unilateral military actions in space will not guarantee American security; they will guarantee conflict, and possibly, a new cold war,” Moore concludes.

Mike Moore is an author, journalist, and speaker, and research fellow at The Independent Institute. He is the author of many articles on national security, conflict resolution, nuclear weapons and proliferation, space weaponry, and related topics. Mike has spoken at many professional conferences and meetings sponsored by scientific organizations and policy institutes. Moore is the former editor of The Bulletin of the Atomic Scientists in 2000, and he has also served as editor of Quill, the magazine of the Society of Professional Journalists. He was general editor of Health Risks and the Press: Perspectives on Media Coverage of Risk Assessment and Health and has been an editor or reporter for the Milwaukee Journal, Chicago Tribune, Chicago Daily News, and the Kansas City Star. His articles have appeared in the Brown Journal of World Affairs, Foreign Service Journal, Yes! A Journal of Positive Futures, and The SAIS Review and International Affairs. He has contributed chapters to The Domestic Sources of American Foreign Policy, Cyberwar, Netwar and the Revolution in Military Affairs and Asia-Pacific Cooperative Security in the 21st Century. Moore has spoken at the Pugwash Conferences on Science and World Affairs, Business Leaders for Sensible Priorities, Fudan University (Shanghai), the National Atomic Museum, the Lawyers Alliance for World Security, the Nuclear-Free Future Foundation, the Council on Foreign Relations, the Stanley Foundation, the International School on Disarmament and Research on Conflicts, the Eisenhower Institute, and the Nuclear Policy Research Institute.

Reuben W. Hills Conference Room

Mike Moore Research Fellow Speaker The Independent Institute
Seminars
Authors
News Type
News
Date
Paragraphs

Starting next fall, Stanford's 25-year-old International Policy Studies (IPS) master's program will double in length and expand its interdisciplinary scope to train a new generation of graduates prepared for careers in international policy-making and advocacy.

The two-year program is named in honor of Susan Ford Dorsey, president of the Sand Hill Foundation, who has made a gift of $7.5 million, which has been matched by university funds to create a $15 million endowment. According to program Director Stephen J. Stedman, the funding will be used to better integrate the program into the university's international policy research centers, increase access to courses in the law and business schools, use more full-time faculty to teach classes and introduce a practicum that involves solving real-world problems.

Ford Dorsey's endowment fulfills one of the key priorities of Stanford's International Initiative, according to Stedman, which is to address global problems by leveraging the university's cross-disciplinary and collaborative research and teaching. Ford Dorsey and her husband, Mike, serve on volunteer committees of The Stanford Challenge, which is seeking to raise $4.3 billion in a broad effort to expand the university's role in addressing global challenges and educating the next generation of leaders.

Stedman, a senior fellow at the Freeman Spogli Institute for International Studies (FSI), was asked to lead the program because he has experience in both academic and policy work. In 2003, Stedman served as research director of the U.N. High-Level Panel on Threats, Challenges and Change, which former U.N. Secretary-General Kofi Annan established to analyze global security threats and propose reforms to the international system. Upon completion of the panel's report, A More Secure World: Our Shared Responsibility, Annan asked Stedman to stay on as a special adviser to help get support in implementing the panel's recommendations. Following the U.N. world leaders' summit in September 2005, during which more than 175 heads of state agreed upon a global security agenda developed from the panel's work, Stedman returned to the Center for International Security and Cooperation at FSI.

According to Stedman, the revamped curriculum will give students the skills to understand the complex connections between poverty, deadly infectious disease, environmental degradation, resource depletion, food insecurity, interstate conflict, civil war, nuclear proliferation and terrorism.

"In a world where problems cross borders and disciplines, where threats that were previously thought to be independent are found to be interconnected, where distinctions between what is domestic policy and what is foreign policy are becoming more and more tenuous, students need training and perspective to break down disciplinary silos," Stedman says in a statement on the program's website. "They need the tools and dexterity to work across issue areas and in diverse policy arenas. They need to see connections that others miss, and be able to describe and explain those connections so that others will then see them too."

The program, which will be jointly administered by the School of Humanities and Sciences and FSI, will continue to admit about 30 students a year, with up to half coming from outside the United States. Students are required to have taken prerequisite courses in economics and statistics, and to speak a foreign language.

At a Feb. 7 dinner celebrating the newly endowed program, Gareth Evans, president of the International Crisis Group and a member of the U.N. High-Level Panel, talked about the need to "make idealism realistic" and discussed the concept of a state's "responsibility to protect" civilians as a new international norm. "In just five years, which is short in the history of ideas, a brand new historical norm" was introduced and recognized by much of the international community, he said. "This was a historic breakthrough. It should reinvigorate our belief in the art of the possible." Concerning the Ford Dorsey IPS program, Evans said, "When it comes to making idealism realistic  there really could be no better place anywhere in the world that this new master's program at Stanford."

The incoming fall cohort of IPS students will study writing and rhetoric and international economics. They will take core courses in Issues in International Policies, which introduces Stanford's policy research centers and provides analyses of current global issues, and Managing Global Complexity, which teaches concepts and theories of international relations while focusing on issues with competing policy concerns. "The goal is to understand that much of what we study today is marked by trade-offs among various goods that we seek to promote," Stedman says in the statement. "Globalization and interdependence creates opportunities for creative solutions to problems, while sometimes creating negative unintended consequences for policy solutions."

IPS students will take a "gateway" course before selecting a concentration during the second year. These specialized fields include democracy, development and the rule of law; energy, environment and natural resources; global health; global justice; international negotiation and conflict management; international political economy; and international security and cooperation. Finally, students will complete a small group practicum in which they will be required to develop solutions to current global problems.

All News button
1

This project involves political scientists, economists, and medical researchers to address the question of whether hunger, poverty, disease and agricultural resource constraints foster civil conflict and international terrorism. Economists have elucidated the links between agricultural stagnation, poverty, and food insecurity, and political scientists have empirically analyzed the role of poverty in facilitating civil conflict.

Authors
News Type
Commentary
Date
Paragraphs
Taking a mathematical perspective, CISAC science fellow Jonathan Farley argues that legal issues aside, the National Security Agency's collection of phone records is not likely to help defeat terrorists.

News that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or ''nodes'' representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like ''centrality'': they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the ''central player'' -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naively analyzed the resulting graph, you could conclude that one of the ''central'' players was Ken Lay's secretary.

And even if you manage to eliminate all the ''central players,'' you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the ''strength of weak ties.'' As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a ''concept lattice'' -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004 -- 10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

Hero Image
farley logo
All News button
1
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
-

In the days after 9/11, there was a widespread sentiment that suicidal terrorist attacks were irrational acts well beyond the bounds of quantitative risk assessment. Since then, terrorism risk models have been developed which are based on certain key theoretical principles that are validated by observational terrorism experience. These principles will be elaborated, and illustrated with examples from conflicts around the world.

Gordon Woo is a catastrophist, specializing on mathematical aspects of catastrophe risk modelling. He has developed a quantitative framework for modelling terrorism risk applied e. g. on the Olympic Games 2004 and the 2006 World Cup in Germany. Prior to this, his main focus has been on natural and environmental hazards. He has twenty years of practical experience in consulting for commercial, industrial and government organizations on major public risk issues varying from the disposal of radioactive waste, to oil pollution, flight safety, to earthquake, windstorm and flood protection.

Dr. Woo graduated as the top mathematician of his year at Cambridge University. He completed his PhD in theoretical physics as a Kennedy Scholar at M.I.T., after which he was elected a Junior Fellow of the Harvard University Society of Fellows. His work has been featured in the Wall Street Journal and Newsweek. In July 2004, he was named by Risk & Treasury Magazine as one of the 100 most influential people in finance.

CISAC Conference Room

Gordon Woo Principal Risk Analyst Speaker Risk Management Solutions
Seminars
Paragraphs

In the late winter of 2003, a number of livestock animals in the Midwest were poisoned due to accidental contamination of a popular commercial feed with a lethal additive. Although all the evidence indicates this incident had no malicious or terrorist intent, it is informative as a case study highlighting potential security implications with respect to a terrorist event directed at U.S. agriculture.

In all the discussions of agricultural terrorism, the threat of deliberate and malicious introduction of a contaminant to animal feed has barely warranted a sentence in policy papers and legislation. Yet the historical record shows that individuals from New Zealand to Kenya to the U.S. have seen contamination as an easy method to kill animals.

In the November 2004 issue of the Journal of Animal Science (the leading peer-reviewed, technical animal science journal), this article discusses the poisoning of livestock alpacas (a smaller cousin of the llama) in early 2003. The animals were killed by accidental contamination of a popular commercial feed with a lethal additive parts per million (ppm) level. Although the absolute number of animals affected was small, if a similar percentage of beef livestock were poisoned, it would correspond to a loss of over 400,000 cattle in the U.S.

The article provides a brief history of incidents of chemical contamination and the political (failure of re-election bid by the Belgian Premier in 2000) and human effects (documented cases of lymphoma, breast and digestive cancers in Michigan among those who ate fire retardant-tainted meat in 1973.) Also addressed are the relative risks to agriculture by biological agent versus chemical agent and concludes with specific recommendations for bringing feed security into the agricultural terrorism dialogue.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Animal Science
Authors
Paragraphs

The web of measures that comprise the nuclear non-proliferation regime continues to hold at bay the "nuclear-armed crowd" that was part of President John F. Kennedy's alarming vision in 1963. The number of nuclear weapons states in 2004 stands at only eight or nine, and assertive steps may yet keep this number from growing. The proliferation of biological weapons, however, is quite another matter. Biotechnological capacity is increasing and spreading rapidly. This trend seems unstoppable, since the economic, medical, and food-security benefits of genetic manipulation appear so great. As a consequence, thresholds for the artificial enhancement or creation of dangerous pathogens--disease-causing organisms--will steadily drop. Neither Cold War bilateral arms control nor multilateral non-proliferation provide good models for how we are to manage this new challenge. Much more than in the nuclear case, civilization will have to cope with, rather than shape, its biological future.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Survival
Authors
Subscribe to Food Security