Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

-

Abstract:  

Image
Arabs and Israelis: Conflict and Peacemaking in the Middle East is a new, ground-breaking textbook on the history of the Arab-Israeli conflict. It is the first on this hyper-sensitive subject to have been team-written by a Palestinian, an Israeli, and an Egyptian representing a broader Arab perspective: The book presents competing narratives that the different parties have developed and adopted with respect to the conflict's various milestones and provides a toolbox for analyzing past, current and future developments in the conflict and in the efforts to resolve it.

At the CDDRL seminar, two of the book's three authors, Shai Feldman and Khalil Shikaki will address the challenges associated with teaching the Arab-Israeli conflict and the manner in which they suggest overcoming these challenges. In addition, they will share what insights they gain from the historical record of the efforts to resolve the Arab-Israeli conflict when assessing the likely prospects of the most recent attempt to end the Palestinian-Israeli conflict, launched and orchestrated by Secretary of State John Kerry. 

Speaker bios:

Image
Shai Feldman is the Judith and Sidney Swartz Director of the Crown Center for Middle East Studies and Professor of Politics at Brandeis University. Prof. Feldman is also a Senior Fellow and a member of the Board of Directors of Harvard University’s Belfer Center for Science and International Affairs where he serves as Co-Chair of the Middle East Security Project. In 1997-2005, he was Head of the Jaffee Center for Strategic Studies at Tel Aviv University and in 2001-2003, he served as a member of the UN Secretary General’s Advisory Board on Disarmament Matters. Educated at the Hebrew University in Jerusalem, Prof. Feldman was awarded his Ph.D. by the University of California at Berkeley in 1980.

Prof. Feldman is the author of numerous publications. These include five books: Israeli Nuclear Deterrence: A Strategy for the 1980s (New York: Columbia University Press, 1982); The Future of U.S.-Israel Strategic Cooperation (Washington D.C.: The Washington Institute for Near East Policy, 1996); Nuclear Weapons and Arms Control in the Middle East (Cambridge: MIT Press, 1997); Bridging the Gap: A Future Security Architecture for the Middle East (Lanham, Maryland: Rowman & Littlefield, 1997 – with Abdullah Toukan (Jordan); and, Track-II Diplomacy: Lessons from the Middle East (Cambridge: MIT Press, 2003 – with Hussein Agha, Ahmad Khalidi, and Zeev Schiff).

 

Image

Khalil Shikaki is a professor of political science and director of the Palestinian Center for Policy and Survey Research in Ramallah. Since 2005 he has been a senior fellow at the Crown Center for Middle East Studies at Brandeis University. He earned his PhD in Political Science from Columbia University in 1985, and taught at several Palestinian and American universities. Between 1996-99, Prof. Shikaki served as the dean of scientific research at al Najah University in Nablus. Since 1993 he has conducted more than 200 polls among Palestinians in the West Bank and the Gaza Strip and, since 2000, dozens of joint polls among Palestinians and Israelis.

He is the co-author of the annual report of the Arab Democracy Index. His recent publications include “The future of Israel-Palestine: a one-state reality in the making,” NOREF Report, May 2012; "Coping with the Arab Spring; Palestinian Domestic and Regional Ramifications," Middle East Brief, no. 58, Crown Center for Middle East Studies, Brandeis University, December 2011; Public Opinion in the Israeli-Palestinian Conflict: The Public Imperative During the Second Intifada, with Yaacov Shamir, Indiana University Press, 2010.

CISAC Conference Room

Seminars
-

This seminar is part of the "European Governance" program series.

After decades of ambiguity towards European integration, the United States is pushing for Europe to become a genuine actor in security and foreign policy. As Vice President Biden put it at the 2013 Munich Security Conference, “a strong and capable Europe is profoundly in America’s interest, and I might add, presumptuously, the world’s interest.”

In principle, Europeans have accepted that closer defense cooperation is essential in order to maintain, and hopefully expand, existing military capabilities, and in order to reinforce mutual trust and contribute to a convergence in common goals and strategic cultures. But the sad reality is that decision-makers have not yet been willing to take the necessary decisions and disagree about what that means. In matters of European security and defense, the gap between rhetoric and policy is wider than in every other area of the European agenda, despite ever-shrinking defense budgets, declining capabilities, and the US “pivot.”

The European Council in December of 2013, focusing on defense and security issues for the first time in many years, will have to deliver ambitious projects - and member states will have to deliver when it comes to their implementation. The European Security Strategy from 2003 is in dire need of an update. And the EU’s new High Representative for Foreign and Security Policy, who will assume office in 2014, will have the difficult task of developing a genuine "one voice approach", a common European foreign and security policy.

A number of fundamental issues will need to be addressed: European security policy priorities, the EU level of ambition and, even larger, the purpose and influence of the EU in a world in which we will increasingly struggle to make ourselves heard. Are EU countries ready and willing to truly join forces and pool resources?

The talk will address current efforts to enhance European security and defense policy, the political feasibility of further steps, Germany’s responsibility to push the agenda forward, and what these efforts in European defense and security policy mean for the United States.

 

Wolfgang Ischinger was the Federal Republic of Germany's Ambassador to London from 2006-2008. Prior to this assignment, he was the German Ambassador to the United States of America from 2001 to 2006. In 2007, he also represented the European Union in the Troika negotiations on the future of Kosovo.

Wolfgang Ischinger studied law at the universities of Bonn and Geneva and obtained his law degree in 1972.  He did graduate and postgraduate work at the Fletcher School of Law and Diplomacy and at Harvard Law School, Cambridge/USA (M. A., Fletcher School, 1973).

Ambassador Ischinger has published widely on foreign policy, security, and arms control policy as well as on European and transatlantic issues. He is a member of the Trilateral Commission, of the European Council on Foreign Relations, and of the Governing Board of SIPRI, Stockholm. He is Co-Chair of the Euro-Atlantic Security Initiative (Carnegie Endowment) and a member of the Global Zero Commission. He also serves on the Boards of the Atlantic Council of the U. S., of the American Institute of Contemporary German Studies (AICGS), of the American Academy, Berlin and of SWP, Berlin. He is an adjunct professor at the University of Tübingen.

CISAC Conference Room

Ambassador Wolfgang Ischinger Career diplomat; Chairman of the Munich Security Conference; Global head of Government Relations at Allianz SE; member of the Supervisory Board of Allianz Deutschland AG, and of the European Advisory Board of Investcorp, London Speaker
Seminars
-

ABOUT THE TOPIC: In his talk, Jack Goldsmith will explain why he is skeptical about significant cybersecurity cooperation among military rivals, especially at the treaty level. He will, however, argue that the Snowden revelations make such cooperation more, not less, likely.

ABOUT THE SPEAKER: Jack Goldsmith is Henry L. Shattuck Professor of Law at Harvard University, where he specializes in national security law, international law, internet law, and presidential power. Goldsmith is the author of five books and numerous articles covering these topics. His recent books include: Power and Constraint: The Accountable Presidency After 9/11 (W.W. Norton, 2012); The Terror Presidency: Law and Judgment Inside the Bush Administration (W.W. Norton, 2007); Who Controls the Internet? Illusions of a Borderless World (Oxford Press, 2006, with Tim Wu); and The Limits of International Law (Oxford Press, 2005, with Eric Posner). Prior to his time at Harvard, Goldsmith was Assistant Attorney General in the Office of Legal Counsel from October 2003 to July 2004 and Special Counsel to the General Counsel to the Department of Defense from September 2002 through June 2003. 

CISAC Conference Room

Jack Goldsmith Henry L. Shattuck Professor of Law, Harvard Law School Speaker
Jonathan Mayer Cybersecurity Fellow, CISAC Commentator
Seminars
News Type
News
Date
Paragraphs

With the American government shut down over congressional budget battles, it seems like a particularly opportune time for scholars to talk about the challenges of governance and the rule of law.

But the political scientists and legal experts who gathered this week for a rule of law workshop organized by the Freeman Spogli Institute for International Studies and Stanford Law School probably didn’t see this crisis coming.

Photo Credit: Rod Searcey

“When we first began talking, Gerhard said the rule of law and governance are not peculiar only to developing counties,” Paul Brest, a professor and former dean of the law school, said as he recalled discussing such a workshop with Gerhard Casper, a constitutional law expert and FSI senior fellow. “I don’t think he predicted where the United States would be today.”

The half-day workshop brought together 20 scholars associated with FSI and the law school who discussed their individual research and explored possibilities for collaboration.

Their wide-ranging discussions covered the definitions and measurement of rule of law, governance in developed and developing countries, political participation, partisanship, and policy implementation.

“How do you implement what sounds like a thoughtful, abstract idea?” asked Mariano-Florentino Cuéllar, FSI’s director and law school professor, in discussing the complexity of the concept of rule of law. “There is something about the rule of law that has to go beyond whether a statute is complied with. A society also has to think smartly about how to manage discretion.”

But bending the rules without breaking the rule of law “is a difficult matter," said law school Professor Jenny Martinez – and one worthy of academic attention.

“Most well-functioning legal systems … involve a certain amount of discretion,” she said. “But that’s something we can explore.”

Discussion sessions were led by Martinez and Cuéllar, as well as Erik Jensen and Bernadette Meyler; Bruce Cain, Larry Diamond and Nathaniel Persily; Francis Fukuyama and Avner Greif.

“There’s a lot of work going on across campus focusing on governance and the rule of law,” Brest said. “Getting together to begin discussing that could create some sort of networks and a whole that is greater than the individual parts.”

Hero Image
RSD13 087 0035a
FSI Director Mariano-Florentino Cuéllar leads a discussion during a workshop focused on governance and the rule of law.
Rod Searcey
All News button
1
News Type
News
Date
Paragraphs

CISAC co-director David Relman, the Thomas C. and Joan M. Merigan Professor and professor of microbiology and immunology and chief of infectious diseases at the VA-Palo Alto, and Susan Holmes, the John Henry Samter University Fellow in Undergraduate Education and professor of statistics, will share a $6.2 million federal grant to examine the effects of perturbations in humans' microbial ecology.

They are among eight Stanford scientists to receive the Transformative Research Awards from the National Institutes of Health.

Relman and Holmes will monitor the microbial ecosystems of healthy humans before, during and after several types of planned disturbance, such as changes in diet or antibiotic administration. They will apply novel mathematical methods to the data generated from these clinical experiments and identify features associated with future stability or recovery from these disturbances, with the goal of predicting disease and restoring health.

 

Hero Image
Relman
David Relman
All News button
1
-

ABOUT THE SPEAKER: Elaine Korzak joined CISAC in September 2013 as a predoctoral cybersecurity fellow. She is a PhD student in the Department of War Studies at King's College London. Elaine's thesis evaluates how cyber attacks challenge current legal norms and whether the identified challenges ultimately warrant a new legal framework. The analysis focuses on two areas in particular: international law on the use of force (jus ad bellum) and international humanitarian law (jus in bello). During her time at CISAC, Elaine is conducting empirical research examining states' responses to the legal challenges created by cyber attacks. Her analysis focuses on various state positions in key international forums, including the United Nations and the International Telecommunication Union.

Elaine earned a Bachelor's degree in International Relations from the University of Dresden (Germany) before focusing her research interests at the interface of international law and security studies. She holds both an MA in International Peace and Security from King's College London and an LL.M in Public International Law from the London School of Economics. Her professional experience includes various governmental and non-governmental institutions (both national and international), where she has worked on various disarmament and international security issues. These include, most recently, NATO's Cyber Defence Section as well as the European Commission's Director-General on Information Society and Media.

ABOUT THE TOPIC: With their unique characteristics such as swiftness, its non-kinetic nature and anonymity, computer network attacks fundamentally challenge the current international legal paradigm which is based on a state-centered concept of armed force involving some degree of kinetic energy transfer through blast and fragmentation. It has been argued that a revolution in military affairs has been ushered in by technological advancements that cannot be accommodated within the existing legal framework. Both practitioners and scholars have called for a new regulatory framework to govern computer network attacks. This presentation will give an overview of Elaine's doctoral research project which evaluates these claims by examining if and how computer network attacks challenge key norms of international law on the use of force and international humanitarian law and whether the identified challenges ultimately warrant a new legal framework.   

CISAC Conference Room

Elaine Korzak Speaker Cybersecurity Predoctoral Fellow, CISAC, and PhD Candidate
Andrew K. Woods Cybersecurity Fellow Speaker CISAC
Seminars
Authors
News Type
Q&As
Date
Paragraphs

CISAC Co-Director Amy Zegart and nine other national security and intelligence scholars were recently invited to the headquarters of the National Security Agency in Fort Meade, Md., for unprecedented talks with high-ranking officials. They discussed cybersecurity, the plummeting public trust in the agency, its relationship with Congress and how to rebuild the agency’s reputation and rethink its program operations. 

The academics were first taken to the black granite wall carved with the names of 171 military and civilian cryptologists who have died in service. “I think they wanted us to know that this is an organization of people, not some robots trolling through your emails,” said Zegart, author of the book, “Spying Blind,” which examines why U.S. intelligence agencies failed to adapt to the terrorist threat before the 9/11 attacks. 

The scholars were then taken to a windowless conference room for several hours of what Zegart called remarkably frank and free-ranging talks about the agency and its tactics.

The NSA is one of the world’s most secret intelligence gathering organizations. Its methods have come under intense scrutiny with a series of damaging leaks about its operations. Former NSA contractor Edward Snowden and national intelligence reporters have revealed tactics that have left many Americans cold and questioning the legality and necessity of the agency’s methods. From monitoring emails and phone calls, to secretly cracking encryption codes that protect personal email as well as financial and medical records and Internet chats – the revelations just keep coming. Civil liberty organizations and Internet privacy advocates here at Stanford are outraged, while some foreign governments are accusing Washington of Big Brother tactics run amok. 

Zegart answers questions about those perceptions and her Sept. 23 briefing at NSA headquarters.

 Are the accusations that the NSA is Big Brother squared fair?

Image

If you look at the reporting on the NSA so far, there is zero evidence of a widespread, deliberate and nefarious plan by the agency to violate the law and spy on American citizens. This is a policy debate, not a scandal. There’s no question in my mind that the NSA has interpreted its legal authority to the maximum extent of the law possible. They’ve taken what Congress has granted them and they have pushed to the edge – but that’s a very big difference from running amok.  

How did this unprecedented meeting come about and why do you think the senior NSA officials – who asked not to be identified – called on social scientists?

In our group, the last time someone went to the NSA was in 1975, which tells you how rare it is for them to invite academics in. The was a sense at senior levels that they need to think more systematically and long-term about education, about being more open to academics coming in and doing research about the NSA and hearing what academics have to say. In part, thought-leaders at universities can play a role in transmitting some of the complexities in which the NSA operates – the tradeoffs the agency is confronting and the constrains under which they are operating. 

The other academics invited to the NSA on Monday were William Inboden of the University of Texas, Austin; Michael Desch of Nortre Dame University; Jeffrey Engel and Joshua Rovner of Southern Methodist University; Thomas Mahnken of the U.S. Naval War College; Richard Betts of Columbia University; Benjamin Wittes of The Brookings Institution; Kori Schake of Stanford University; and Robert Chesney of the University of Texas, Austin.

 

 One thing this meeting highlighted for me is that the NSA is not free to respond to the criticism it gets in the press. It’s intertwined with other organizations that have a say in how it responds: the Office of the Director of National Intelligence, the FBI, the Justice Department and the White House. And they have never had to deal with the spotlight before. They gave me this statistic: Last summer, there were 167 legitimate questions from the press; in the summer of 2013 there were 1,900 media requests. That’s a tenfold increase. This is a whole new world for this agency. And to go against secrecy is just totally counter to their culture. This was a bold step for them to have us come in.

 

Did the NSA officials talk about whether they had broken any laws? 

They definitely wanted us to believe that what they are doing is lawful and effective. I believe the lawful part; I’m not so sure about the effective part. I think they haven’t looked hard enough about what effective means. Do they know it when they see it? And who’s to judge?

They were quick to point out that they’re under extensive oversight both by Congress and the Foreign Intelligence Surveillance Act (FISA) court. The question is whether Americans are comfortable with the lines that have been drawn by their own government and if they’re comfortable with the lack of transparency. The NSA is really bad at letting us know what the gains are (from surveillance) and they’ve struggled with how to deal with the public reaction to the Snowden revelations. 

This is an intelligence agency and they’re supposed to be stealing information from other governments; that’s what we pay them to do and other governments would use those capabilities in an instant if they had them. That has gotten lost in the debate. When I talk to my parents and friends, they think that the NSA is listening in on their phone calls. That’s just not true. They’re examining phone logs: who called whom and for how long. No one is listening to your conversation with grandma.

 

The fundamental problem is that the NSA is highly regulated – but nobody trusts the regulatory framework."

Did you discuss former NSA contractor Edward Snowden? 

Extensively. It’s the biggest breach in the agency’s history. They’ve been in crisis mode since June. They’ve been putting our fires every day and the arsonist is still out there. NSA officials told us that they know 125 documents have been compromised; they believe Snowden probably has already passed to the press another 50,000 documents and that the entire tranche that he may have taken is bigger than that. But there’s a question about whether that tranche is accessible, that Snowden may have done things to make some of his data hard to read.  

They said Snowden didn’t just download documents he himself had access to. He used social engineering, convincing someone else to give him access to additional information to breach security protocols. Meanwhile, Snowden had plenty of avenues for whistleblowing, including five inspectors-general and the members of the congressional intelligence committees, but he availed himself of none.

 

Have Snowden’s actions endangered national security or international relations? 

The standard lines about “irreparable harm” are not convincing to many people because they are so vague, we’ve heard them so often, and the government classifies boatloads of information that shouldn’t be secret. But NSA officials got a little more specific. They said Snowden has hurt national security in three ways: The first is that he revealed government surveillance capabilities. Second, he’s revealed politically embarrassing things that are harming relations with our allies – and they believe there is more to come. (Brazilian President Dilma Rousseff postponed a state visit to Washington, for example, following the release of evidence that the U.S. spied on Brazilian politicians and business leaders.) They said Snowden has a pattern of releasing embarrassing information around big international meetings, such as the G20 summit. The third damaging impact is that Snowden has hurt the NSA’s ability to produce intelligence.

 

What are some of the challenges and solutions moving forward? 

Intelligence is a political loser and so you see a lot of members of Congress who says they are shocked – shocked! – to find out what the NSA is doing when they had full opportunity to be briefed on these programs for a long time. So they’re making political hay out of NSA’s difficulties. Most members of Congress have zero incentive to actually learn anything about the complexities of intelligence because the voters don’t hear about it and they don’t reward them for it. 

The near-term challenge is to stop Congress from doing something stupid, such as the wholesale cancelling of NSA programs and capabilities. The medium-term challenge is to figure out what sensible options there are to restoring the public trust and make the NSA more transparent and more targeted in its collection approach. When NSA chief Keith Alexander steps down, we are going to see all of these issues come to a head in a very public way with the confirmation of the next director. 

The longer-term challenge is creating better mechanisms to assess whether NSA should do things just because it can technically – to weigh the wisdom and efficacy of programs, not just their legality. The NSA also needs a sustainable education campaign so that when things break in the news, legislators and constituents have an understanding of what this agency does and can put these revelations into perspective.

They definitely wanted us to believe that what they're doing is lawful and effective; I believe the lawful part, I'm just not so sure about the effective part." 

 

What are the strengths of the NSA that the public doesn’t get to see? 

The NSA is the organization that’s responsible for information assurance, like if you’re in government on a secure phone line. And most people don’t know the NSA wrote the codes to protect our nuclear arsenal from day one. So the NSA has two, often conflicting missions. One is signals intelligence, which is offense, and the other is the information assurance that is defense. In an era of cyber vulnerabilities, information assurance is huge. They feel like they were doing what they were authorized to do and serving the mission and that they are being characterized as evil for doing what they think is right.

 

What were your biggest takeaways from this meeting? 

I would say one of the things that I did walk away from the meeting hearing – and I think that perhaps this is the big policy question – is that the NSA orientation is to collect now, ask questions later. So the question is: Is that the right operating philosophy; are we comfortable as a democratic society with that collect-now-ask-later approach?

Hero Image
NSOC 2012 logo copy
All News button
1
Subscribe to Security