Environment

FSI scholars approach their research on the environment from regulatory, economic and societal angles. The Center on Food Security and the Environment weighs the connection between climate change and agriculture; the impact of biofuel expansion on land and food supply; how to increase crop yields without expanding agricultural lands; and the trends in aquaculture. FSE’s research spans the globe – from the potential of smallholder irrigation to reduce hunger and improve development in sub-Saharan Africa to the devastation of drought on Iowa farms. David Lobell, a senior fellow at FSI and a recipient of a MacArthur “genius” grant, has looked at the impacts of increasing wheat and corn crops in Africa, South Asia, Mexico and the United States; and has studied the effects of extreme heat on the world’s staple crops.

Paragraphs

On June 16, 2002, Dennis Pluchinsky, a senior intelligence analyst at the U.S. Department of State, wrote an article in the Washington Post calling for censorship. The article began, "I accuse the media in the United States of treason." Pluchinsky, who worked counterterrorism in the government for twenty-five years, pointed to post-9/11 articles that revealed not scientific advancements, but American vulnerabilities in regard to the food supply, electricity, chemical production, transportation, and border security. He suggested that research conducted by the media could not have been funded by one, single terrorist organization: "Our news media, and certain think tankers and academicians, have done and continue to do the target vulnerability research for them."

Pluchinsky has a point. Terrorist organizations can and do use the media--and the protections afforded speech in the United States and the United Kingdom--to obtain and disseminate critical information.

The crucial point is this: Both liberal, democratic states, and nonstate terrorist organizations need free speech. Under what circumstances are the interests of the state secured and the opportunism of terrorist organizations avoided? Here, the experiences of the United States and United Kingdom prove instructive. On both sides of the Atlantic, where the state acts as sovereign, efforts to restrict persuasive political speech have relaxed over time to allow for more criticism. In the United States, Brandenburg v. Ohio cemented this shift. In the United Kingdom, change came gradually. The practical elimination of treason and seditious libel, and incorporation of the European Convention of Human Rights (ECHR) into domestic law through the 1998 Human Rights Act (HRA), marked the transition. If free speech remains central to our understanding of liberal democracy, it would nevertheless be naïve to rely on these alterations to protect expression in the contemporary counterterrorist environment--regardless of how remarkable they might be in the context of what went before.

Underlying my argument in this paper is a deeper concern that centers on the shifting nature of technology. What the average person could have done in 1776, or for that matter, 1976, to hurt either state pales in comparison to what a person with basic knowledge of microbiology, $1000, and a lab can do today. But neither American nor British law appears to have come to terms with what weapons of mass destruction, in terrorist hands, means for free speech.

This article won the 2004-2005 Steven M. Block Civil Liberties award for the best piece of writing in civil liberties at Stanford Law School. It also won second place in the national competition for the 2005 Judge John R. Brown Award for Excellence in Legal Writing, which recognizes the best legal writing by U.S. law students.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Cardozo Law Review
Authors
-

Zia Mian, a research assistant with the Program on Science and Global Security (PS&GS) at Princeton University and lecturer of public and international affairs at the Woodrow Wilson School, has been with PS&GS since 1997. His interests include nuclear weapons and nuclear energy programs in South Asia, and finding alternative policies that can contribute to disarmament and sustainable development. With Dr. Pervez Hoodbhoy, Mian co-produced Crossing the Lines, a documentary film about India, Pakistan, and the battle over Kashmir, which was shown at CISAC this past summer. He has edited and co-edited a number of books on South Asia, including Out of the Nuclear Shadow (co-edited with Smitu Kothari; Zed Press, London and Rainbow Press, New Delhi, 2001). Mian has also co-edited a volume with Iftikhar Ahmad and Dohra Ahmad, Between Past and Future: Selected Essays on Pakistan by Eqbal Ahmad (Oxford University Press, Karachi).

Reuben W. Hills Conference Room

Zia Mian Research Assistant, Program on Science and Global Security, and Lecturer, Woodrow Wilson School of Public and International Affairs Speaker Princeton University
Seminars
Paragraphs

Scholars attribute conventional violence in a nuclear South Asia to a phenomenon known as the "stability/instability paradox." According to this paradox, the risk of nuclear war makes it unlikely that conventional conflict will escalate to the nuclear level, thereby making conventional conflict more likely. Although this phenomenon encouraged U.S.-Soviet violence during the Cold War, it does not explain the dynamics of the ongoing conflict between India and Pakistan. Recent violence has seen Pakistan or its proxies launching limited attacks on Indian territory, and India refusing to retaliate in kind. The stability/instability paradox would not predict such behavior. A low probability of conventional war escalating to the nuclear level would reduce the ability of Pakistan's nuclear weapons to deter an Indian conventional attack. Because Pakistan is conventionally weaker than India, this would discourage Pakistani aggression and encourage robust Indian conventional retaliation against Pakistani provocations. Pakistani boldness and Indian restraint have actually resulted from instability in the strategic environment. A full-scale Indo-Pakistani conventional conflict would create a significant risk of nuclear escalation. This danger enables Pakistan to launch limited attacks on India while deterring all out Indian conventional retaliation and attracting international attention to the two countries' dispute over Kashmir. Unlike in Cold War Europe, in contemporary South Asia nuclear danger facilitates, rather than impedes, conventional conflict.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
International Security
Authors
Paragraphs

How does the resource base of a rebel group impact its membership, structure, and behavior? While scholars, analysts, and policy makers increasingly link natural resources to the onset and duration of civil war, this article explores how resource endowments shape the character and conduct of rebel groups. This article identifies a rebel "resource curse" much like the one that undermines state institutions in resource-rich environments. While the presence of economic endowments makes it possible for leaders to recruit on the basis of short-term rewards, these groups are flooded with opportunistic joiners who exhibit little commitment to the long-term goals of the organization. In resource-poor environments, leaders attract new recruits by drawing on social ties to make credible promises about the private rewards that will come with victory. Opportunistic joiners stay away from these movements, leaving a pool of activist recruits willing to invest their time and energy in the hope of reaping large gains in the future.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Conflict Resolution
Authors
Authors
News Type
Commentary
Date
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All News button
1
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Washington Post
Authors
-

Cellular prion protein (PrPC) is present in the healthy adult brain. It is a presumably essential membrane protein but its cellular function is unclear. Like Ice-9 - the fictitious water allotrope in Kurt Vonnegut's Cat's Cradle, which "taught the atoms a novel way in which to stack, lock and crystallize until the oceans turned to ice" - cellular prion protein can, in a rare event, adopt a pathogenic and 'contagious' shape, PrPSc, which causes mad cow disease or Bovine Spongiform Encephalopathy (BSE). New variant Creutzfeldt Jakob Disease (vCJD) is the human malady attributed to eating beef tainted with BSE. In comparison to the UK epidemic (at the peak of which 37,280 cases of BSE were reported in the single year 1992), the emergence of four North American mad cows since May 2003 is minor yet still alarming. This work examines the USDA's response to indigenous BSE as manifested in "The Final Rule" (9 CFR 93-96, Jan 4, 2005) and questions whether current regulations are stringent enough to keep PrPSc out of cattle feed and human food.

Sheila Healy is a CISAC Science Fellow. She is currently analyzing USDA policy addressing Bovine Spongiform Encephalopathy (BSE) or mad cow disease. She recently finished a postdoctoral appointment in Stanley Prusiner's laboratory in the Department of Neurology at the University of California, San Francisco. There she studied the molecular and structural requirements for the conversion of cellular prion protein to its pathogenic form, the agent that causes BSE. She holds a doctoral degree in biochemistry and molecular and cellular biology from the University of Arizona.

Reuben W. Hills Conference Room, East 207, Encina Hall

Sheila Healy
Seminars
-

We describe VEGA, a system for analyzing the vulnerability of an electric power grid to physical attacks by terrorists, and for planning mitigation efforts. VEGA (Vulnerability of Electric Grids Analyzer) consists of a bilevel optimization model and solution algorithm, a graphical user interface and a database. The optimization model implements a Stackelberg game in which (a) a group of terrorists attacks components of a power grid ("the system") so as to maximize the amount of load that must be shed (demand for power that goes unmet), and (b) the system operator minimizes that maximum by controlling the degraded system as best possible. We illustrate the basic model using realistic data and show how it can guide a system-upgrade plan to reduce vulnerability.

Actually, we at NPS are using similar techniques to study the vulnerability to attack of a variety of infrastructure systems. This talk will discuss the common approach, and provide two examples: (a) Finding "weak spots" in the Saudi Arabian crude-oil pipeline system and (b) protecting the Washington, DC subway system from a chemical or biological attack.

Dr. Kevin Wood is professor of operations research at the Naval Postgraduate School. At NPS since 1982, he has taught courses in networks and optimization and has published research on network reliability, mathematical programming and its applications, and on interdiction. His 1993 paper "Deterministic Network Interdiction" spurred renewed interest in applying analytical techniques to network and system interdiction, and has led to a series of papers on these topics, by him and by others. He is currently applying the methodology to critical infrastructure protection in general, and electric power grids in particular: Professor Wood has long-term research support from the Office of Naval Research as well as the Air Force of Scientific Research, and has been a visiting professor at Stanford University, the National Security Agency and the University of Auckland.

Reuben W. Hills Conference Room, East 207, Encina Hall

Kevin Wood Professor of Operations Research Naval Postgraduate School
Seminars
Authors
News Type
News
Date
Paragraphs

While the improving U.S. economy remains the engine of growth for the world economy, an underlying trend involving "huge imbalances and risks" should be cause for serious alarm, Paul Volcker warned Feb. 11 during a speech on campus. Americans have virtually no savings, the former chairman of the Federal Reserve said, and the nation is consuming more than it is producing. Furthermore, Social Security and Medicare are threatened by the retirement of millions of baby boomers and skyrocketing health care costs. More broadly, he continued, the world economy is lopsided.

"Altogether, the circumstances seem as dangerous and intractable as I can remember," Volcker said during a keynote address at the second annual summit of the Stanford Institute for Economic Policy Research. "But no one is willing to understand [this] and do anything about it."

Volcker spoke at the end of a daylong conference that attracted about 450 corporate leaders, entrepreneurs, policymakers and academics. The event included discussions on the stability of the global economy, the U.S. economic outlook and the role of the Internet in helping to level the competitive playing field worldwide. The conference also featured sessions on outsourcing, Medicaid and Medicare, technology policy and the Sarbanes-Oxley Act, which was implemented in 2002 to restore investor confidence in corporate America following a series of bankruptcies and far-reaching accounting scandals.

During a morning session, William J. Perry, a former secretary of defense and a senior fellow at the Stanford Institute for International Studies, gave a chillingly stark assessment of the crisis of terrorism that was reinforced by George Shultz, a former secretary of state.

"I fear that we're headed toward an unprecedented catastrophe where a nuclear bomb is detonated in an American city," Perry said. "The bomb will not come in a missile at the hands of a hostile nation. It will come in a truck or a freighter at the hands of a terror group."

Perry, who holds the Michael and Barbara Berberian Professorship, said the "awesome military capability" of the United States has had unintended consequences in that it has increased the incentive for a hostile power, unable to compete in conventional warfare, to acquire weapons of mass destruction and launch terror attacks against America. U.S. military superiority is not particularly effective against such tactics, he said. "There exist terror groups, of which al Qaeda is the most prominent, that have the mission, the intent to kill Americans," Perry said. "They have the capability to do so; they have the resources to do so." A truly nightmare scenario would involve a terror group using nuclear weapons acquired clandestinely, he said: "After 9/11 that threat seems all too real."

Such a catastrophe is preventable, but the United States is not taking the necessary measures to avert it, Perry warned. Important steps should include a major expansion of the Nunn-Lugar Cooperative Threat Reduction Program with the support the G-8 group of industrialized nations. The program was created in 1991 to reduce the threat posed by the legacy of the Soviet nuclear arsenal and succeeded in dismantling and destroying weapons in Kazakhstan, Ukraine and Belarus. Furthermore, Perry said, a clear strategy of "coercive diplomacy" should be used against North Korea and Iran, followed by a major diplomatic initiative to convince other nuclear powers that the threats posed by terrorists are real and not just directed at Americans. "While America must show real leadership in dealing with this problem, [it] cannot deal with it alone," he said.

Shultz, the Thomas W. and Susan B. Ford Distinguished Fellow at the Hoover Institution, said the United States faces a huge problem in combating Islamic radicals intent on using terror to achieve their goals. "Eventually, what they want is to change the way the world works by creating a unified Islamic theocratic state," he said. "It's a worldwide agenda."

Shultz argued that the United States must help supporters of mainstream Islam understand the fundamental nature of the problem so they will take action against the radicals themselves.

"That's why Iraq is of such overwhelming importance," he said. "Here we have a country in the heart of the Middle East where there is a chance. If Iraq can emerge as a sensibly governed country--that's a gigantic event in the Middle East and in this war on terror. Our enemies recognize that just as well as we do, and that's why we're having so many problems."

Other measures that Shultz said should receive greater support include efforts to set up independent media in countries such as Iraq, as well as a revival and expansion of the U.S. diplomatic service, which he said was allowed to atrophy after the end of the Cold War. "We have developed an awesome military capability," he said. "We need a diplomatic capability that is as every bit as good." Shultz also stressed the need to reduce U.S. dependence on foreign oil. "We are out of our cotton-picking minds not to be doing much, much more to figure out how to use much, much less oil," he said to applause from the audience.

In the afternoon, Thomas Friedman, a columnist at the New York Times, also called for greater efforts to develop alternative energy supplies. This should be the "moon shot of our generation," he said.

Friedman discussed how the convergence of personal computers, cheap telecommunication and workflow software has changed the way the world works. In his upcoming book, The World Is Flat: A Brief History of the 21st Century, Friedman explained that the world has shrunk to the point where individuals, not countries or companies, are increasingly able to think and act globally. "And it's not just a bunch of white Westerners," he said. "It's going to be driven by individuals of every color of the rainbow."

Friedman told the audience that these technological advances quietly unfolded just as the 9/11 terror attacks, the Enron collapse and the dot-com bust grabbed America's attention. "People thought globalization was over but actually it turbo-charged globalization; it drove it overseas," he said. "9/11 completely distracted our administration, and then there was Enron. We have hit a fundamentally transformative moment and no one is talking."

In this new scenario, people anywhere in the world will be able to "innovate and not emigrate" if they have the required skills, Friedman said. This means that engineers in India and China will be able to compete on a level playing field with people in this country. "When the world goes flat, everything changes," he said.

To address this challenge, Friedman said the United States must radically improve science, mathematics and engineering education and encourage young people to enter these fields. "We're not doing that," he said. "In the next two years, five years, it won't matter. In 15 years, which is the time it takes to build an engineer, it will matter. We will not be able to sustain our standard of living."

All News button
1
-

Despite an interesting prehistory, the field of information security we know today dates from the introduction of radio at the beginning of the 20th century. Cryptography dominated information security in its first hundred years and is now the best understood part of the field. In the last thirty years, cryptography was joined by the broad subject of secure computing, which remains much less well developed but shows signs of substantial improvement in the near future. The growth of networking promises a world in which typical computations are collaborations among many computers in a fashion suggestive of commercial subcontracting. In this environment, negotiation and configuration control will become the dominant information security problems.

Whitfield Diffie, Chief Security Officer of Sun Microsystems, is Vice President and Sun Fellow and has been at Sun since 1991. As Chief Security Officer, Diffie is the chief exponent of Sun's security vision and responsible for developing Sun's strategy to achieve that vision. Best known for his 1975 discovery of the concept of public key cryptography, Diffie spent the 1990s working primarily on the public policy aspects of cryptography and has testified several times in the Senate and House of Representatives. His position - in opposition to limitations on the business and personal use of cryptography - is the subject of the book, Crypto, by Steven Levy of Newsweek. Diffie and Susan Landau are joint authors of the book Privacy on the Line, which examines the politics of wiretapping and encryption and won the Donald McGannon Award for Social and Ethical Relevance in Communications Policy Research and the IEEE-USA award for Distinguished Literary Contributions Furthering Public Understanding of the Profession.

Diffie is a fellow of the Marconi Foundation and the International Association for Cryptologic Research and is the recipient of awards from a number of organizations, including IEEE, The Electronic Frontiers Foundation, NIST, NSA, the Franklin Institute and ACM. Prior to assuming his present position in 1991, Diffie was Manager of Secure Systems Research for Northern Telecom, where he designed the key management architecture for NT's PDSO security system for X.25 packet networks. Diffie received a BS in mathematics from the Massachusetts Institute of Technology in 1965, and was awarded a Doctorate in Technical Sciences (Honoris Causa) by the Swiss Federal Institute of Technology in 1992.

Reuben W. Hills Conference Room

0
Affiliate
Diffie_Whit.jpg

Whitfield Diffie is a consulting scholar at CISAC. He was a visiting scholar in 2009-2010 and an affiliate from 2010-2012. He is best known for the discovery of the concept of public key cryptography, in 1975, which he developed along with Stanford University Electrical Engineering Professor Martin Hellman. Public key cryptography, which revolutionized not only cryptography but also the cryptographic community, now underlies the security of internet commerce.

During the 1980s, Diffie served as manager of secure systems research at Northern Telecom. In 1991, he joined Sun Microsystems as distinguished engineer and remained as Sun fellow and chief security officer until the spring of 2009.

Diffie spent the 1990s working to protect the individual and business right to use encryption, for which he argues in the book Privacy on the Line, the Politics of Wiretapping and Encryption, which he wrote jointly with Susan Landau. Diffie is a Marconi fellow and the recipient of a number of awards including the National Computer Systems Security Award (given jointly by NIST and NSA) and the Franklin Institute's Levy Prize.

Whitfield Diffie Speaker Sun Microsystems, Inc.
Seminars
Subscribe to Environment