Homeland Security
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Washington Post
Authors
-

Has the Bush administration used the War on Terror to consolidate power in the executive branch? Is the United States in danger of undermining civil liberties and laying the foundation for an American police state? Arguing against conventional wisdom the authors answer these questions with an emphatic No. Drawing on evidence from the USA Patriot Act, the creation of the Department of Homeland Security, the Transportation Security Administration, intelligence reform, and the detention of enemy combatants, the authors argue that what is most striking about US homeland security policy in the wake of 9-11 is just how weak the response of the American state has been. This outcome is contrary to both conventional wisdom and theoretical expectation. The authors argue that this puzzle is best explained by focusing on the institutional structure of US domestic politics.

Jay Stowsky is an adjunct professor at the University of California, Berkeley's School of Information Management and Systems (SIMS) and is the executive drector of UC Berkeley's Services Science Program. Previously, he directed UC Berkeley's program on Information Technology and Homeland Security at the Goldman School of Public Policy and served in the Clinton administration as senior economist for science and technology policy on the staff of the White House Council of Economic Advisers. Stowsky has also served as associate dean at UC Berkeley's Haas School of Business and as director of research policy for the University of California system. He has authored several studies of U.S. technology policy, including "Secrets to Share or Shield: New Dilemmas for Military R&D in the Digital Age," in Research Policy (Vol. 33, No. 2, March 2004) and "The Dual-Use Dilemma," in Issues in Science and Technology (Winter 1996). He is co-author, with Wayne Sandholtz, et al., of The Highest Stakes: The Economic Foundations of the Next Security System (Cambridge Oxford University Press, 1992).

Matthew Kroenig is a PhD candidate in the Department of Political Science at UC Berkeley and a Public Policy and Nuclear Threats Fellow at the Institute of Global Conflict and Cooperation. Kroenig's dissertation research explains the conditions under which states provide sensitive nuclear assistance to nonnuclear weapons states. Previously, he was a research associate with the Information Technology and Homeland Security Project and has also served in government as an intelligence analyst.

Reuben W. Hills Conference Room, East 207, Encina Hall

Matt Kroenig PhD Candidate Speaker Department of Political Science, UC Berkeley
Jay Stowsky Adjunct Professor Speaker School of Information Management and Systems, UC Berkeley
Seminars
Paragraphs

Arguing for the primary role of homeland security, Council on Foreign Relations fellow Stephen Flynn describes a nation living on borrowed time. He presents a hypothetical scenario of a devastating "next attack" and stresses the difficulty officials have in learning new tricks and politicians have in paying for them. Flynn stresses as well the susceptibility of the food supply to sabotage and the lack of oversight in a vulnerable chemical industry, emphasizing in particular the continuing failure to establish systematic inspection of cargo containers. He is most convincing in arguing the risks of a "silver bullet approach," the assumption that a single innovation will solve a particular security problem. Instead, Flynn proposes a Federal Homeland Security System integrating private and public expertise, funded by levying fees on such activities as the movement of containers and by requiring owners and operators of critical infrastructure to carry antiterrorist insurance. The details of Flynn's proposals are significant in representing a genuinely long-term response to a threat he is convinced will remain serious for an indefinite longterm. Any risks they might pose to civil liberties, he argues, are marginal compared with the likely domestic consequences of being caught unprepared a second time-or a third.

Publisher's Weekly

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
HarperCollins
Authors
Number
0060571292
-

Paul Stockton is Associate Provost at the Naval Postgraduate School in Monterey, California, and is Director of its Center for Homeland Defense and Security. Stockton is the Editor of Homeland Security (forthcoming from Oxford University Press in 2005). His research has appeared in Political Science Quarterly, International Security and Strategic Survey. He is Co-Editor of Reconstituting America's Defense: America's New National Security Strategy (1992). Mr. Stockton has also published an Adelphi Paper and has contributed chapters to a number of books, including James Lindsay and Randall Ripley, Eds., U.S. Foreign Policy After the Cold War (1997).

Mr. Stockton received a B.A. summa cum laude from Dartmouth College in 1976 and a Ph.D. in Government from Harvard University in 1986. Dr. Stockton served from 1986-1989 as Legislative Assistant to US Senator Daniel Patrick Moynihan. Dr. Stockton was awarded a Postdoctoral Fellowship for 1989-1990 by the Center for International Security and Arms Control at Stanford University. In August 1990, Dr. Stockton joined the faculty of the Naval Postgraduate School. From 1995 until 2000, he served as Director of the NPS Center for Civil-Military Relations. From 2000-2001, Dr. Stockton founded and served as the Acting Dean of the NPS School of International Graduate Studies. He was appointed Associate Provost in 2001.

Reuben W. Hills Conference Room, East 207, Encina Hall

Paul Stockton Associate Provost and Director of the Center for Homeland Security Naval Postgraduate School
Seminars
-

Marc J. Ventresca is University Lecturer in Management Studies at Saïd Business School, University of Oxford, Fellow of Wolfson College, and University Fellow at the James Martin Institute for Science and Civilization. For 2004-5 he is a Research Fellow in Organizational Learning and Homeland Security, CISAC, IIS, Stanford University.

His research and teaching interests focus on institutions, organizations, and industry entrepreneurship; organizational learning; organization design and managing change; environmental management; power and leadership in organizations, and economic sociology of strategy.

He earned his Ph.D. in sociology at Stanford University, after master's degrees in policy analysis and education and in sociology. He has taught at the Kellogg School of Management, Northwestern University, the University of Illinois, the Copenhagen Business School, the Center for Work, Technology, and Organizations at Stanford University, and the Stanford Institute for Research on Higher Education.

Prior to a faculty career, Dr. Ventresca worked as a policy analyst at the Congressional Budget Office in Washington D.C., studied language and politics in Florence, Italy, and worked as a technical writer for hopeful start-ups in Silicon Valley.

Reuben W. Hills Conference Room, East 207, Encina Hall

Marc Ventresca CISAC Fellow and Lecturer in Management Studies Oxford University
Seminars

Graduate School of Business
Stanford University
Stanford, CA 94305-5015

(650) 724-1676 (650) 725-0468
0
Jeffrey S. Skoll Professor of Management Science
CISAC Affiliated Faculty Member
Wein.jpg PhD

Lawrence Wein is the Jeffrey S. Skoll Professor of Management Science at the Graduate School of Business, Stanford University, and an affiliated faculty member at CISAC. After getting a PhD in Operations Research from Stanford University in 1988, he spent 14 years at the Sloan School of Management at MIT, where he was the DEC Leaders for Manufacturing Professor of Management Science. His research interests include mathematical models in operations management, medicine and biology.

Since 2001, he has analyzed a variety of homeland security problems. His homeland security work includes four papers in Proceedings of the National Academy of Sciences, on an emergency response to a smallpox attack, an emergency response to an anthrax attack, a biometric analysis of the US-VISIT Program, and an analysis of a bioterror attack on the milk supply. He has also published the Washington Post op-ed "Unready for Anthrax" (2003) and the New York Times op-ed "Got Toxic Milk?", and has written papers on port security, indoor remediation after an anthrax attack, and the detention and removal of illegal aliens.

For his homeland security research, Wein has received several awards from the International Federation of Operations Research and Management Science (INFORMS), including the Koopman Prize for the best paper in military operations research, the INFORMS Expository Writing Award, the INFORMS President’s Award for contributions to society, the Philip McCord Morse Lectureship, the Frederick W. Lanchester Prize for best research publication, and the George E. Kimball Medal. He was Editor-in-Chief of Operations Research from 2000 to 2005, and was elected to the National Academy of Engineering in 2009.   

CV
Paragraphs

Testimony before the U.S. House of Representatives' Select Committee on Homeland Security

There is a serious but reparable vulnerability in the biometric identification system of the US-VISIT Program, which is our last line of defense for keeping terrorists off U.S. soil. A minor software modification that allows the watchlist rule to vary with image quality can increase detection from 53% to 73%. I have provided details to officials who oversee the US-VISIT operations, and this should be implemented as soon as possible. The use of more than 2 fingers for low-quality images can achieve a detection probability of 95%. Although switching from a 2-fingerprint to a 10-fingerprint system may be costly and disruptive, there is no excuse for a 10-billion dollar program to settle for performance below this level. Indeed, our results are not inconsistent with the warning in the November, 2002 NIST report that a 2-finger search was not sufficient for identification from a large watchlist. If slower 2-finger matching algorithms cannot approach 95% detection for poor-quality images, then the US-VISIT Program should be reconfigured with 10-fingerprint scanners as soon as possible.

Our recommendations hinge on the assumption that terrorist organizations as sophisticated as Al Qaeda will eventually attempt to defeat the US-VISIT system by employing terrorists with poor quality fingerprints.

All Publications button
1
Publication Type
Testimonies
Publication Date
Journal Publisher
U.S. House of Representatives
Authors
Lawrence M. Wein
Authors
News Type
News
Date
Paragraphs

The Department of Homeland Security (DHS) has awarded a 15-month $1.65-million contract to the Center for International Security and Cooperation (CISAC), Stanford Institute for International Studies. CISAC's program will be run as part of a joint project with the Naval Postgraduate School (NPS) in Monterey.

CISAC co-director and professor of political science Scott D. Sagan and former co-director and professor emeritus (research) in the School of Engineering Michael M. May are the Stanford co-principal investigators of the new program.

CISAC's portion of the project entails a homeland security seminar and fellowship program, which will bring eight research fellows to campus in 2004-05. Fellows will join CISAC and other faculty to conduct research on some of the most daunting issues confronting the homeland security mission, such as how national and local agencies can learn to cooperate quickly and effectively and how they can learn from past emergencies, real and simulated. CISAC will undertake in-depth scholarly research that can help inform DHS efforts to improve the design and evaluation of future terrorism exercises of national and local response systems.

Scholars will study diverse approaches to learning--and failing to learn--from emergencies, including those of armed forces, medical emergency rooms, police and fire departments. Researchers will also investigate how government organizations can stay ahead of potential attackers in the "competitive learning" situation that terrorism presents--one in which terrorists and law enforcement officials alike try to learn from vulnerabilities exposed in public emergencies.

The DHS research contract resulted in part from CISAC's observation of the spring 2003 State Department-DHS sponsored full-scale exercise called TOP OFFICIALS-2 (TOPOFF-2), designed to prepare national, state and local officials to respond to potential terrorist attacks within the US. CISAC led 11 Stanford scholars in observing and analyzing the exercise involving officials from 25 federal, state, and local agencies. DHS Secretary Tom Ridge received a briefing of CISAC's findings, prepared under May's direction as principal investigator.

Lynn Eden, CISAC associate director for research, will manage Stanford's participation in the new project and mentor the homeland security fellows. Mariano-Florentino Cuellar, assistant professor of law at Stanford, will contribute research on how judicial review processes affect responses to terrorism. Dean Wilkening, director of CISAC's science program, will model uncertainties in biological weapons use, such as effects caused by different exposure rates and different doses of contaminants like anthrax.

The Organizational Learning and Homeland Security fellows chosen for 2004-2005 are Charles Perrow, professor emeritus of sociology at Yale; Marc Ventresca, university lecturer in strategy and fellow at Wolfson College in Oxford's Said Business School and visiting associate professor of organizations and strategy, Graduate School of Management at the University of California-Irvine; Michael Kenney, assistant professor at the School of Public Affairs at Penn State University-Harrisburg; Laura K. Donohue, Ph.D., history, Cambridge University and student at Stanford School of Law; Tonya L. Putnam, J.D., Harvard Law School and Ph.D. student in political science at Stanford; Manas Baveja, a graduate student in the Scientific Computing and computational Mathematics Program in Stanford's School of Engineering and Dara K. Cohen and Jacob N. Shapiro, graduate students in political science at Stanford.

All News button
1
News Type
News
Date
Paragraphs

Those advocating nuclear arms control and nonproliferation have few reasons for optimism and many reasons for concern, with obstacles including a lack of public interest in the issue; inadequate security controls at facilities storing nuclear-weapons materials; the threat posed by rogue nations such as Iran and North Korea; and the Bush administration's opposition to the Comprehensive Test Ban Treaty banning nuclear weapons testing.

These and other challenges were explored at a special CISAC workshop on "Arms Control and Nonproliferation: Past Triumphs, Future Prospects," held June 1 at SIIS. The event honored George Bunn -- a nuclear nonproliferation pioneer and consulting professor at CISAC -- on the occasion of his 79th birthday. The workshop, which drew more than 120 attendees, was moderated by CISAC co-director Christopher F. Chyba and featured presentations by four expert panelists who have worked closely with Bunn. They included his son Matthew, a senior research associate for Harvard University's Project on Managing the Atom.

As the first presenter, Matthew Bunn discussed the problem of inadequate security systems to prevent the theft of weapons-grade nuclear materials. Because there are no worldwide standards for protecting such materials, many nations devote inadequate resources to the task. Bunn showed slides of nuclear materials storage facilities with primitive locks, flimsy seals and broken-down fences. He cited Russia as the largest threat, because it has the world's biggest stock of unguarded nuclear-weapons materials. He urged international standards for safeguarding nuclear materials; renewed discussion with Russia on the issue; and the removal of nuclear material from sites where adequate security is not feasible.

In the second presentation, Thomas Graham -- a senior U.S. diplomat who has negotiated numerous major arms-control agreements -- said the nuclear Non-proliferation Treaty was not meant to forever discriminate between nuclear "haves" and "have-nots." Instead, it was designed so that those without nuclear weapons would benefit by receiving peaceful nuclear technology from weapons-producing nations, and guarantees that they would not be attacked. But when the United States shirks its nonproliferation obligations -- as it has done by rejecting the Comprehensive Test Ban Treaty and taking steps to develop new nuclear weapons -- the entire regime is threatened, Graham said. He cited Pakistan and North Korea as the biggest nuclear threats, and said the United States must engage in direct negotiations with the latter.

The next presentation, by Daryl Kimball -- executive director of the Arms Control Association -- addressed prospects for the Comprehensive Test Ban Treaty. Though the treaty has been signed by 171 nations including the United States, it has been ratified by only 113 of those nations -- not including the United States -- and must be ratified by 12 more of the 44 designated "nuclear-capable" nations before the treaty can take effect. Kimball discussed the Bush administration's opposition to the treaty, noting that Bush has sought to remove it from the Senate's agenda. Still, Kimball said he's optimistic that the treaty will ultimately be ratified by the United States and will take effect. He cited increasing international pressure on CTBT "holdout states," and a recent U.S. poll showing that public support for the treaty is at its highest level ever, 87 percent.

John Rhinelander, an attorney who helped negotiate the ABM Treaty and SALT I agreements, discussed the prospects for nuclear weapons in space. The weaponization of space is supported by the Bush administration, he noted, and is a real possibility if the United States follows through on its missile defense program. He predicted that President Bush, if re-elected, would continue to pursue weapons development in space, but said Kerry seemed unlikely to do so if elected.

During a question-and-answer session following the presentations, the panelists offered perspectives on why it is so difficult to get the public's and lawmakers' attention on nuclear non-proliferation issues. The panelists agreed that since the breakup of the Soviet Union, most Americans -- including lawmakers -- no longer perceive nuclear weapons as a serious threat, and they have little knowledge about the existing quantity of nuclear weapons. Matthew Bunn said the problem is, "there is no one whose reelection depends on reducing or securing nuclear weapons." He said nuclear non-proliferation could best be promoted by tying it to the issues of terrorism and homeland security. Rhinelander and Grahm advocated holding Congressional hearings on the issue for the first time in 20 years.

Regarding Israel, India and Pakistan, Graham said those nations -- which produce nuclear weapons but have refused to join the NPT regime -- cannot continue to remain outside the regime. He proposed that the three nations be allowed to join in limited form, in exchange for accepting basic limitations such as no first use and no nuclear testing.

Throughout the event, Bunn was praised by the panelists and moderator; Chyba described him as "the personification of the best that CISAC strives to be." Bunn was the first general counsel for the U.S. Arms Control and Disarmament Agency, helped negotiate the nuclear Non-Proliferation Treaty, and later served as U.S. ambassador to the Geneva Disarmament Conference.

All News button
1
Authors
News Type
News
Date
Paragraphs

CISAC is announcing the selection of its 2004-2005 fellows. This group of 21 scholars, selected through a competition, will spend the fellowship year working on their research projects, participating in seminars, and exploring international security issues with resident faculty, research associates, and other fellows.

The incoming fellows come from a broad range of academic and professional backgrounds, and they will be focusing on an equally diverse set of research topics, including chemical and biological weapon detection, the future of nonproliferation regimes, and analysis of homeland security policies.

CISAC sponsors three fellowship programs: Pre/Postdoctoral Fellowships; Science Fellowships; and Organizational Learning for Homeland Security Fellowships. In addition, CISAC sponsors visiting scholars, providing opportunities for concentrated research and study within CISAC's multidisciplinary environment.

View the complete list of 2004-2005 fellows and their respective research topics.

All News button
1
Subscribe to Homeland Security