Predictability of Human Behavior
Reuben W. Hills Conference Room
Reuben W. Hills Conference Room
About the topic: What could queueing theory, the science of customer flows and delays in service systems, possibly offer towards understanding and countering terrorism? In terror queue models, newly hatched terror plots correspond to newly arriving customers, the number of ongoing terror plots corresponds to the queue of customers waiting to receive service, undercover agents or informants correspond to service providers, customer service is initiated when a terror plot is detected, and service is completed when the plot is interdicted. Not all plots are interdicted; successful terror attacks correspond to customers who abandon the queue without receiving service! Building upon these ideas, we will focus our attention upon a simple observation: other things being equal, the number of ongoing terror plots increases with the duration of time from plot initiation until execution or interdiction (whichever comes first), yet no estimate of the probability distribution governing terror plot duration has appeared in the open literature. Starting with a review of US terrorism-related indictments, lower and upper bounds for the initiation date of 30 distinct Jihadi plots were identified in addition to the date of arrest or an attempted/actual terror act. Accounting for the censoring and truncation effects inherent with these data; the estimated mean duration equals 9 months, while 95% of all plots are estimated to fall between 1 and 25 months. These estimates suggest that in the United States, on average approximately three ongoing Jihadi terror plots have been active at any point in time since 9/11/2001.
About the Speaker: Edward H. Kaplan is the William N. and Marie A. Beach Professor of Management Sciences, Professor of Public Health, and Professor of Engineering at Yale University’s School of Management who is currently on sabbatical as Distinguished Visiting Professor at Stanford’s Graduate School of Business. The author of more than 125 research articles, Kaplan received both the Lanchester Prize and the Edelman Award, two top honors in the operations research field, among many other awards. An elected member of the National Academy of Engineering and the Institute of Medicine of the US National Academies, Kaplan’s current research focuses on the application of operations research to problems in counterterrorism and homeland security.
CISAC Conference Room
The National Science Advisory Board for Biosecurity (NSABB), an independent advisory committee tasked with providing guidance on the biosecurity oversight of dual use research, announced on March 30 that it would recommend the publication of controversial research on the H5N1 avian flu. The issue ignited a debate in the scientific community on publishing research that could threaten public health. The committee sent its recommendations to the federal government for review.
On March 12, Professor Paul Keim, chairman of the NSABB, and Dr. David Relman, a NSABB board member and CISAC affiliated faculty and professor of infectious diseases and microbiology and immunology at Stanford, discussed the debate over whether to make public scientific papers about the adaptation of the avian flu virus H5N1 to transmission in a mammal. The NSABB had not announced its decision to publish the research at the time of the presentation.
Audio from the March 12 seminar is available online.
A Wake-up Call for America: We Must Connect with the World
Former U.S. Sen. Russ Feingold, currently the Mimi and Peter E. Haas Distinguished Visitor at Stanford’s Haas Center for Public Service, uses an anecdote in his new book, While America Sleeps: A Wake-up Call for the Post-9/11 Era, to illustrate his concern that Americans have become too insular as a result of the 2001 terrorist attacks. While teaching at Marquette University Law School during the Arab Spring of last year, an undergraduate penned a column lamenting that so many students not only could not find Tunisia on the map – they could spell Kardashian before Kazakhstan.
Feingold writes that he admired this student for his confession about his lack of knowledge on global affairs, then quotes the final thought of the young columnist: “We are connected to the rest of the world in ways few of us can fully fathom, from the shoes we wear and coffee we drink to the cell phones we carry and the tweets we post.”
In a recent interview, CISAC Co-Director Mariano-Florentino Cuéllar and Feingold discuss steps to be taken to ensure that all Americans – young and old, inside the Washington beltway and out on the farm in Wisconsin – take a patriotic stand by engaging with the world to restore our national unity and regain global respect.
Senator Feingold, what prompted you to write this book now?
Feingold: For me, as for many Americans, 9/11 was a life-changing event, the wake-up call in which we all understood that we no longer could be safe just assuming the world would take care of itself. We got misdirected with things like Iraq and we developed this sort of invade-one-country-at-a-time approach. There was also exploitation of the fears from 9/11 for domestic agendas, from the Patriot Act to the way that Muslims and Arabs are treated in this country. And then, finally, with the rise of the tea party, I feel like we went back to sleep. But there are signals all over the place, of the continued presence of al-Qaida and the continued potency of al-Qaida, not to mention so many other trends from the Chinese influence in Africa to the Iranian influence in Latin America. We aren’t connecting as a government or as a people in a way that I think is commensurate with our place in the 21st century. I’m trying to issue a warning that we’re going to get fooled or surprised again if we think we can just go back to being just sort of safely over here across the oceans. That’s just not the world anymore.
So how do you wake up Americans and make them realize we cannot, as you say, survive as a nation without being active and aware of global events and trends?
Feingold: It’s at all levels. I happen to think we have a good president and I think he’s going to be a great president by the end of his second term. And I think he’s started the process of alerting Americans to the need to connect to all places in the world; he’s leading us toward a global vision of the kind that I think we have to have to be safe and to be competitively successful and to be well perceived by the rest of the world. The president and other leaders should call on each of us to try and become citizen diplomats. Three hundred million people should be urged as part of their patriotic duty not just to go to the moon as we once were, but go to the rest of the world. This isn’t Pollyanna; this is about being safe. I don’t think this country is geared up to make that connection and I think it’s a fatal flaw. The Russians, the Chinese and the Iranians, they’re all over the world and they have a plan for what they’re doing. We don’t.
What do you see as the most pressing global security issues today?
Cuéllar: The United States is confronting a changing world, where countries like India, Brazil, and China are evolving and assuming greater importance. Engaging these countries to address problems like nuclear proliferation will be critical in the years ahead. The world also faces a persistent problem involving failed or failing states. In places like Somalia, piracy is not only a regional problem in the Gulf of Aden. The problem is an example of how threats can affect multiple countries and impact flows of commodities, disrupting the rule of law, highlighting the challenges of governing common resources such as international sea lanes. Another challenge is the enormous potential of technology to change people’s lives for the better, coupled with risks that arise which we are only in a very imperfect and incomplete way managing; risks of vulnerabilities in our infrastructure; risks of theft of intellectual property, risks of disruption of organizations.
Feingold: I like this answer because Prof. Cuéllar did not just say, “Well, it’s Russia and Iran and Colombia.” There’s this tendency to just speak of countries. We’re just trained to say, “OK what’s the hot spot and let’s just worry about that.” Like right now it’s Iran; a few months ago it was Yemen. In my book what I’m trying to point out is that you have to look at trends and overall tendencies around the world and somehow we have to have the capacity to deal with more than one thing at a time.
Senator Feingold, you called the Bush Administration’s terrorist surveillance program – the wiretapping and surveillance of emails and financial records without court approval – one of the worst assaults on the Constitution in American history. How does the government protect our constitutional rights to privacy and probable cause while monitoring criminal and terrorist networks in a digital age?
Feingold: The assault on the Constitutional by the administration was not about whether we could do those things, its whether or not the president would basically make up his own laws just because we’re in a crisis. That to me is completely unconstitutional. We understand that a president might have to take emergency action and he may have to come to Congress and say, you know I did this, it may be beyond the law, would you please pass a law to approve it, or I’ll stop doing it. That’s not what Bush did. Bush hid it. Bush hid what he was doing on torture; Bush hid what he was doing on wiretapping. That’s a very dangerous thing that completely saps our strength from within and is completely unnecessary to stop the terrorists.
Cuéllar: The challenge of living up to our constitutional values while we secure the country is always critical. It requires organizations that can learn from their mistakes to be honest with each other enough and recognize when they have overstepped their bounds, that make good use of entities like inspectors-general, that leverage the ability of Congress to do oversight. These are all elements of making our constitutional values relevant. So me the challenge has always been how to you leverage all the information technology and all our ability to make smart, thoughtful, careful decisions – including decisions that do permit appropriate degrees of surveillance and intelligence – in order to avoid superficial reactions against individuals who simply appear threatening.
What key steps should the U.S. government take to improve its counter-terrorism efforts both at home and abroad?
Feingold: The first thing is to recognize the nature of the threat. One of the chapters in the book is called A Game of Risk, where we seem to think the way to counter terrorism is to invade a country and stay there forever and say we have to stay there or the terrorist are going to come back. But this isn’t the nature of al-Qaida or similar organizations. President Bush used to say there were 60 countries where al-Qaida was operating and, of course, one thing that was embarrassing about it was that Iraq wasn’t one of them. But we’re still in this place today. Al-Shabab in Somalia; al-Qaida and the Islamic Maghreb in northern Africa; a group called Boko Haram in Nigeria, which looks very much like an al-Qaida group, has pulled off some 70 attacks in the last year. So this is an international organization that communicates with each other and they’re not done just because Osama bin Laden is gone. So let’s not get caught unawares again.
Senator Feingold, what was your most memorable, defining challenge in Congress and how did that change the way you see yourself and the world around you?
It had to do with recognizing when 9/11 occurred that there really was a group of people out there who would love to kill all of us and, despite the fact that I’m progressive and I voted against most military interventions, just saying to myself: look, there are times when threats are real. And it caused me to actually seek to be on the Intelligence Committee which is something I never wanted to do; I was not sure of the importance of intelligence in the post Cold War era and it was a real change for me. I remember having an emotional response, saying, “You know what? This is real; what these folks did was real and they have intimidated an entire country if not the world.” I wanted to know everything I could about how they came to be and what they were planning next, and to be a person who could try to think ahead for other kinds of threats so we as Americans can get ahead of threats instead of being the people who are reacting.
While many of us here in the US wake up concerned about political, economic, and military unrest at home and abroad, billions still wake up with more basic, human security concerns, opened FSE director Rosamond L. Naylor in a plenary connecting climate, energy, food, water, and health.
Are we going to have enough to eat today? How am I going to feed my family or care for family members struggling with HIV/AIDS and other infectious diesease? Is there enough water to drink, bathe, and still water my crops?
Naylor emphasized the need to bring these human security issues back into the forefront of our global conscious. While these are 'humanitarian needs at the core', they are also related to national and international security.
"When people are desperate enough, and we've seen this particularly with the food price spike in recent years, they take to the streets, and sometimes when they take to the streets they realize they are disgruntled about a number of things in addition to food prices," said Naylor.
The Arab Spring and wave of rebellions throughout the Middle East last year demonstrate the connections between food security, unmet basic needs, and national security. It has been a chaotic time for world food markets, said Naylor.
Naylor's global statistics are discouraging. Over a billion people still suffer from chronic hunger and malnutrition, 1/5 don't have physical access to water, and roughly 1.6 billion are facing economic water constraints (do not have the economic resources to access available water). Food and water insecurity are exacerbating the incidence and transmission of infectious disease.
At a time when investment is sorely needed, the Hill has been making dramatic cutbacks in foreign assistance and foreign investment is falling short. Efforts made by the private sector, philanthropy, and civil society, while valuable, remain siloed. Opportunties are being missed by not addressing the interrelated nature of food and health issues.
Despite this dire outlook, Naylor offered solutions to help us rethink our development strategy.
Naylor was joined on the panel by Jeff Seabright (Vice President, The Coca-Cola Company), Daniel Gerstein (Deputy Under Secretary for Science and Technology, U.S. Department of Homeland Security), and Geoff Dabelko (Woodrow Wilson International Center for Scholars). The panel was moderated by Frank Sesno (George Washington University and Planet Forward). Video of the plenary can be found below:
Helen Nissenbaum is Professor of Media, Culture and Communication, and Computer Science, at New York University, where she is also Senior Faculty Fellow of the Information Law Institute. Her areas of expertise span social, ethical, and political implications of information technology and digital media. Nissenbaum's research publications have appeared in journals of philosophy, politics, law, media studies, information studies, and computer science. She has written and edited four books, including Privacy in Context: Technology, Policy, and the Integrity of Social Life, which was published in 2010 by Stanford University Press. The National Science Foundation, Air Force Office of Scientific Research, Ford Foundation, U.S. Department of Homeland Security, and the U.S. Department of Health and Human Services Office of the National Coordinator have supported her work on privacy, trust online, and security, as well as several studies of values embodied in computer system design, including search engines, digital games, facial recognition technology, and health information systems.
Nissenbaum holds a Ph.D. in philosophy from Stanford University and a B.A. (Hons) from the University of the Witwatersrand. Before joining the faculty at NYU, she served as Associate Director of the Center for Human Values at Princeton University.
Sloan Mathematics Center
Author information: IOM (Institute of Medicine) and NRC (National Research Council). (Committee: Goldstein BD, DeSimone JM, Ascher MS, Buehler JW, Cook KS, Crouch NA, Doyle FJ, Foldy S, Gursky EA, Hoffman S, Johnson CB, Keim P, Kellerman AL, Kleinman KP, Layton M, Lee EK, Mayor SD, Moshier TF, Murphy FA, Murray RW, Owens DK, Pollock SM, Resnick IG, Schaudies RP, Schultz JS)
Following the attacks of September 11, 2001 and the anthrax letters, the ability to detect biological threats as quickly as possible became a top priority. In 2003 the Department of Homeland Security (DHS) introduced the BioWatch program--a federal monitoring system intended to speed detection of specific biological agents that could be released in aerosolized form during a biological attack.
The present volume evaluates the costs and merits of both the current BioWatch program and the plans for a new generation of BioWatch devices. BioWatch and Public Health Surveillance also examines infectious disease surveillance through hospitals and public health agencies in the United States, and considers whether BioWatch and traditional infectious disease surveillance are redundant or complementary.
Charles Perrow is famous worldwide for his ideas about normal accidents, the notion that multiple and unexpected failures--catastrophes waiting to happen--are built into our society's complex systems. In The Next Catastrophe, he offers crucial insights into how to make us safer, proposing a bold new way of thinking about disaster preparedness.
Perrow argues that rather than laying exclusive emphasis on protecting targets, we should reduce their size to minimize damage and diminish their attractiveness to terrorists. He focuses on three causes of disaster--natural, organizational, and deliberate--and shows that our best hope lies in the deconcentration of high-risk populations, corporate power, and critical infrastructures such as electric energy, computer systems, and the chemical and food industries. Perrow reveals how the threat of catastrophe is on the rise, whether from terrorism, natural disasters, or industrial accidents. Along the way, he gives us the first comprehensive history of FEMA and the Department of Homeland Security and examines why these agencies are so ill equipped to protect us.
The Next Catastrophe is a penetrating reassessment of the very real dangers we face today and what we must do to confront them. Written in a highly accessible style by a renowned systems-behavior expert, this book is essential reading for the twenty-first century. The events of September 11 and Hurricane Katrina--and the devastating human toll they wrought--were only the beginning. When the next big disaster comes, will we be ready?
Stewart Baker, a former policymaker at both the National Security Agency and the Department of Homeland Security will talk about the latest concern in official Washington. Putting cyberweapons in historical context, he'll describe how the United States and other countries are responding to the strategic challenge of cyberwar - and what it might mean for the future of the Internet.
Speaker Biography:
Stewart Baker is a partner in the law firm of Steptoe & Johnson. He is the author of Skating on Stilts – Why We Aren’t Stopping Tomorrow’s Terrorism, a book on the security challenges posed by technology and the use of data in preventing terrorism.
From 2005 to 2009, he was the first Assistant Secretary for Policy at the Department of Homeland Security. Stemming from his role at DHS, Mr. Baker has a deep background in the international implications of US security policy- such as disputes over US collection of data from international businesses.
Mr. Baker’s practice covers national security, electronic surveillance, law enforcement, export control, encryption, and related technology issues.
From 1992 to 1994, Mr. Baker was General Counsel of the National Security Agency, where he led NSA and interagency efforts to reform commercial encryption and computer security law and policy.
Reuben W. Hills Conference Room