Authors
Siegfried S. Hecker
News Type
Q&As
Date
Paragraphs

In May 2018, Stanford Center for International Security and Cooperation (CISAC) scholars Siegfried Hecker, Robert Carlin, and Elliot Serbin released an in-depth report analyzing the nuclear history of North Korea between 1992 and 2017 alongside a historical research-based “roadmap” for denuclearization.

Since then, tensions between North Korea and South Korea have thawed. United States President Trump met with Kim Jong-un in Singapore in June, and another U.S.-North Korea summit is planned for later this month.

Today, the CISAC researchers release a 2018 update to their report, chronicling and analyzing historic developments in North Korea over the past year. In this Q&A with Katy Gabel Chui, CISAC Senior Fellow and former Director of the Los Alamos National Laboratory Siegfried Hecker shares what the team learned:

Your research demonstrates that South Korean, North Korean, and U.S. efforts in 2018 were able to lower tensions and the threat of war on the Korean Peninsula. How? What actions were most effective toward this end?

At the end of 2017, the Moon Jae-in administration in South Korea made secret overtures to the Kim Jong-un regime. Kim Jong-un responded positively in his 2018 New Year Speech, proposing to send North Korean athletes to the South as part of a joint delegation for the 2018 Winter Olympics in Seoul.  He also initiated serious diplomatic overtures to Washington. These efforts led to the North/South Summit in April and the historic Singapore Summit in June.

Yet, in spite of these positive initiatives, you did not rate U.S. and North Korean diplomacy at your highest level, why is that?

We stopped one level short for both (a G2 instead of a G3) because progress in talks that followed the summit quickly hit a wall when the US side called for the North to produce a full declaration of its nuclear weapons program, to which Pyongyang responded angrily. The rest of the year was up and down. Nevertheless, the Singapore Summit took the critical step away from the brink of war. The North and South also continued to make remarkable progress toward reconciliation with two more presidential summits.

Most of the focus in the U.S. has been on an apparent failure of North Korea to denuclearize. But you note in your research that the Singapore summit pledged normalization and denuclearization. Why has progress stalled?

First, denuclearization is a poorly defined concept. We should focus on the elimination of the North’s nuclear weapons, the means of production and means of delivery. Second, Washington has so far not taken steps toward normalization. It has insisted on maintaining maximum pressure and sanctions, which Pyongyang considers incompatible with normalization.

Nevertheless, you claim that the threat posed by North Korea was substantially reduced. What about the North’s nuclear capabilities – were these reduced in 2018?

The diplomatic initiatives have greatly reduced the threat. Our study, which looks at the details of how the capabilities have changed in 2018, concludes that the rapid escalation of overall capabilities in 2017 and prior years was halted and in some cases rolled back.

But your research also shows North Korea continued to operate its nuclear weapons complex in 2018, and that it is still producing plutonium and highly enriched uranium.

We are not surprised that North Korea has not halted its fissile materials production in absence of formal negotiations. Our analysis of open-source satellite imagery of the Yongbyon complex led us to estimate they may have added sufficient plutonium and highly enriched uranium for an additional 5 to 7 nuclear weapons on top of our 2017 estimate of approximately 30 weapons.

There have also been reports that it has continued to maintain, produce, and deploy its land-based ballistic missiles. These activities don’t look like the North is denuclearizing.

In our study, we look at the three requisites for a nuclear arsenal – fissile materials, weaponization (that is design, build, and test), and delivery. The North did continue to produce fissile materials. But it took the remarkable step to end nuclear testing and long-range missile testing at a time during which North Korea had been rapidly increasing the sophistication of its nuclear weapons and missiles and their destructive power and reach. Therefore, we conclude that the North not only halted that rapid advance but also rolled back the threat we judged the North’s nuclear and missile programs to pose in 2017.

It sounds like there is a long way to go to denuclearize. In May of last year, you released a framework for denuclearization of North Korea based around a “halt, roll back and eliminate” process. Where does North Korea stand, if anywhere, in that process today?

Our color charts track the progress. Contrary to what we have heard in the media, North Korea has actually halted and rolled back some nuclear activities, with the most important being the end of nuclear and missile testing, which in turn, has significant consequences. In fact, in 2018 it did not flight test missiles of any range. However, the road to final elimination will be long and difficult, especially because of the serious trust deficit between Washington and Pyongyang. We suggested a 10-year time frame last year.

Haven’t you also suggested a way to speed up that process?

Yes, we propose that North Korea, South Korea, and the U.S. explore cooperative efforts to demilitarize North Korea’s nuclear and missile programs and convert them to civilian nuclear and space programs. Such cooperation has the potential of accelerating the elimination of nuclear weapons and nuclear weapons program. It will, in the long term, also greatly improve the prospects of adequate verification.

How do you get North Korea to go along with any of these ideas?

That’s the job of our negotiators. When Special Representative Stephen Biegun was here at Stanford recently, he showed a lot of flexibility to have the U.S. phase denuclearization with normalization. I think that’s what it will take. But a lot of hard work lies ahead.

Full Report: A Comprehensive History of North Korea's Nuclear Program: 2018 Update

Hero Image
All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

 

The Trump administration’s National Cyber Strategy rests on a pair of convenient fictions.

 

I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many. In September, the Trump administration published a National Cyber Strategy—proudly declaring that it was the first fully articulated cyber strategy in 15 years. This week, the annual intelligence threat hearing laid bare the fantasy world of that four-month-old document and the cold hard reality of, well, reality.

The National Cyber Strategy paints an aspirational view of how the U.S. is doing in cyberspace and what we should do in the future. To be fair, aspirational isn’t all bad. Strategy documents need to inspire, not depress. And the strategy’s four pillars seem as unobjectionable as motherhood and apple pie: defending the homeland and America’s way of life; promoting American prosperity; preserving peace through strength; and advancing American interests. Who could argue with that? The best strategies articulate a future world, lay out a pathway to get there, generate new ideas, and align the disparate elements of government on a common path to succeed. Given how hard it is to keep the government lights on these days, getting on the same page about anything is a big deal.

Read the rest at The Atlantic.

 

 

All News button
1
Authors
Clifton Parker
News Type
News
Date
Paragraphs

War is changing, and the U.S. military can now use cyber weapons as digital combat power.

When and how that’s done is the subject of a new book, Bytes, Bombs and Spies: The Strategic Dimensions of Offensive Cyber Capabilities, edited by Herb Lin and Amy Zegart at the Center for International Security and Cooperation and the Hoover Institution.

US military doctrine defines offensive cyber operations as operations intended to project power by the application of force in and through cyberspace. This is defined as actions that disrupt or destroy intended targets.

At a time when US cyber policy is taking a new direction, Bytes, Bombs and Spies is one of the first books to examine strategic dimensions of using offensive cyber operations. With chapters by leading scholars, topics include US cyber policy, deterrence and escalation dynamics, among other issues. Many of the experts conclude that research, scholarship, and more open discussion needs to take place on the topics and concerns involved.

Lin and Zegart are senior research scholar and senior fellow, respectively, at Stanford’s Center for International Security and Cooperation. Max Smeets, a CISAC cybersecurity postdoctoral fellow, is also a contributor to the book.

Offensive cyber rising

Examples in recent years of offensive cyber usage include the Stuxnet computer virus that destroyed centrifuges in Iran and slowed that country’s attempt to build a nuclear weapon; cyber weapons employed against ISIS and its network-based command and control systems; and reported cyber incursions against North Korea’s ballistic missiles system that caused launch failures.

“If recent history is any guide, the interest in using offensive cyber operations is likely to grow,” wrote Lin and Zegart.

One key issue is how to best respond to cyberattacks from abroad, such as the 2015 theft of millions of records from the Office of Personnel Management, the 2016 U.S. election hacking, and the 2017 WannaCry ransomware attack that affected computers worldwide, to name but a few. Those incidents have “provided strong signals to policymakers that offensive cyber operations are powerful instruments of statecraft for adversaries as well as for the United States,” Zegart and Lin wrote.

In September 2018, the White House reportedly issued a directive taking a more aggressive posture toward cyber deterrence. This measure allows the military to engage, without a lengthy approval process, in actions that fall below the “use of force” or a level that would cause death, destruction or significant economic effects. Also, US Cyber Command was elevated to an independent unified command, giving it more independence in conducting offensive cyber operations.

These new policy directions make it all the more imperative that offensive cyber weapons be researched, analyzed and better understood, wrote Lin and Zegart.

Conceptual thinking lags

The 438-page Bytes, Bombs and Spies includes 16 chapters by different authors. Topics include the role and nature of military intelligence, surveillance, and reconnaissance in cyberspace; how should the United States respond if an adversary employs cyberattacks to damage the U.S. homeland or weaken its military capabilities; a strategic assessment of the U.S. Cyber Command vision; and operational considerations for strategic offensive cyber planning; among others.

“Conceptual thinking,” Lin and Zegart noted, lags behind the technical development of cyber weapons. Some issues examined include:

• How might offensive cyber operations be used in coercion or conflict?

• What strategic considerations should guide their development and use?

 • What intelligence capabilities are required for cyber weapons to be effective?

• How do escalation dynamics and deterrence work in cyberspace?

• What role does the private sector play?

Scholars at universities and think tanks need to conduct research on such topics, Zegart said. “Independent perspectives contribute to the overall body of useful knowledge on which policymakers can draw.”

In the chapter Lin wrote on “hacking a nation’s missile development program,” he noted that cyber sabotage relies on electronic access to various points in the life cycle of a missile, from its construction to ultimate use.

“For some points, access is really hard to obtain; in other points, it is easier.  Access can be technical (what might be obtained by hacking into a network) or human (what might be obtained by bribing or blackmailing a technician into inserting a USB thumb drive),” he said. 

One key, Lin said, is the availability of intelligence on the missile and the required infrastructure needed to fabricate, assemble, and launch the missile. 

“Precisely targeted offensive cyber operations generally require a great deal of detailed technical information, and such information is usually hard to obtain, especially if the missile program is operated by a closed authoritarian government that does not make available much information on anything,” he said.

Origins in cyber workshop

The idea for Bytes, Bombs and Spies originated from a 2016 research workshop led by Lin and Zegart through the Stanford Cyber Policy Program. That event brought together researchers from academia and think tanks as well as current and former policymakers in the Department of Defense (DoD) and U.S. Cyber Command.

“We organized the workshop for two reasons,” wrote Lin and Zegart. “First, it was already evident then—and is even more so now—that offensive cyber operations were becoming increasingly prominent in U.S. policy and international security more broadly. Second, despite the rising importance of offensive cyber operations, academics and analysts were paying much greater attention to cyber defense than to cyber offense.”

Herb Lin is the Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution and senior research scholar for cyber policy and security at the Center for International Security and Cooperation, a center of the Freeman Spogli Institute for International Studies.

Amy Zegart is the Davies Family Senior Fellow at the Hoover Institution, where she directs the Robert and Marion Oster National Security Affairs Fellows program. She is founder and co-director of the Stanford Cyber Policy Program, and senior fellow at the Center for International Security and Cooperation, a center of the Freeman Spogli Institute for International Studies.

Media Contacts

Clifton B. Parker, Hoover Institution: 650-498-5205, cbparker@stanford.edu

 

 

 

 

 

 

 

 

 

All News button
1
Authors
Steven Pifer
News Type
Commentary
Date
Paragraphs

Today, January 14, marks the 25th anniversary of the Trilateral Statement.  Signed in Moscow by President Bill Clinton, Russian President Boris Yeltsin and Ukrainian President Leonid Kravchuk, the statement set out the terms under which Ukraine agreed to eliminate the large arsenal of former Soviet strategic nuclear weapons that remained on its territory following the collapse of the Soviet Union.

Among other things, the Trilateral Statement specified the security assurances that the United States, Russia and Britain would provide to Ukraine eleven months later in the Budapest Memorandum on Security Assurances.  Unfortunately, Russia grossly violated those assurances in 2014 when it used military force against Ukraine.

Soon after regaining independence, Ukraine’s leadership indicated its intention to be a non-nuclear weapons state.  Indeed, the July 16, 1990 declaration of state sovereignty adopted by the Rada (parliament) adopted that goal.  Kyiv had questions, however, about the terms of the elimination of the strategic weapons.

First, eliminating the intercontinental ballistic missiles (ICBMs), bombers, ICBM silos and nuclear infrastructure would cost money.  Ukraine’s economic future in the early 1990s was uncertain (the economy ended up declining for most of the decade).  Who would pay for the expensive elimination process?

Second, the strategic nuclear warheads had economic value as they contained highly enriched uranium.  That could be blended down into low enriched uranium to fabricate fuel rods to power nuclear reactors.  If Ukraine shipped warheads to Russia for dismantlement, how would it be compensated for the value of the highly enriched uranium they contained?

Third, nuclear weapons were seen to confer security benefits.  What security guarantees or assurances would Kyiv receive as it gave up the nuclear arms on its territory?

These questions were reasonable, and Kyiv deserved good answers.  In 1992 and the first half of 1993, Ukrainian and Russian officials met in bilateral channels to discuss them, along with other issues such as a schedule for moving warheads to Russia.  In parallel, U.S. officials discussed similar issues with their Ukrainian and Russian counterparts.

However, in September 1993, a Ukrainian-Russian agreement dealing with the nuclear issues fell apart.  Washington decided to become more directly involved out of fear that a resolution might otherwise not prove possible, giving birth to the “trilateral process.”  Discussions over the course of the autumn led U.S. negotiators in mid-December to believe that the pieces of a solution were ready.

In a negotiation in Washington in early January 1994, U.S. Ambassador-at-large Strobe Talbott, Ukrainian Deputy Prime Minister Valeriy Shmarov and Deputy Foreign Minister Borys Tarasyuk, and Russian Deputy Foreign Minister Georgiy Mamedov and their teams finalized answers to Kyiv’s three questions, and wrote them into what became the Trilateral Statement and an accompanying annex.

The United States agreed to provide Nunn-Lugar Cooperative Threat Reduction funds to finance the elimination of the strategic delivery systems and infrastructure in Ukraine.  Specifically, $175 million would be made available as a start.

The three sides agreed that Russia would compensate Ukraine for the value of the highly enriched uranium in the nuclear warheads transferred to Russia for elimination by providing Ukraine fuel rods containing an equivalent amount of low enriched uranium for its nuclear reactors.  In the first ten months, Ukraine would transfer at least 200 warheads, and Russia would provide fuel rods containing 100 tons of low enriched uranium.

The sides laid out in the Trilateral Statement the specific language of the security assurances that Ukraine would receive once it had acceded to the Non-Proliferation Treaty as a non-nuclear weapons state.  Although Kyiv had sought security guarantees, Washington was not prepared to extend what would have been a military commitment similar to what NATO allies have; the assurances were the best that was on offer.

Two issues—the date for transfer of the last nuclear warheads out of Ukraine and compensation for the highly enriched uranium that had been in tactical nuclear warheads removed from Ukraine to Russia by May 1992—nearly derailed the Trilateral Statement.  The sides, however, agreed to address those in private letters.

Presidents Clinton, Yeltsin and Kravchuk met briefly in Moscow on January 14, 1994 and signed the Trilateral Statement.  That set in motion the transfer of nuclear warheads to Russia, accompanied by parallel shipments of fuel rods to Ukraine.  The deactivation and dismantlement of missiles, bombers and missile silos in Ukraine began in earnest with Cooperative Threat Reduction funding.

In December 1994, Ukraine acceded to the Non-Proliferation Treaty and received security assurances from the United States, Russia and Britain in the Budapest Memorandum.  France and China subsequently provided Kyiv similar assurances.

Ukraine fully met its commitments under the Trilateral Statement.  The last nuclear warheads were transferred out of Ukraine in May 1996.

The other signatories met their commitments—with one glaring exception.  In 2014, Russia used military force to illegally seize Crimea, in violation of its Budapest Memorandum commitments “to respect the independence and sovereignty and the existing borders of Ukraine,” and “to refrain from the threat or use of force” against Ukraine.  Russian security and military forces then instigated a conflict in the Donbas region in eastern Ukraine, a conflict that has claimed more than 10,000 lives and continues to simmer.

At the time, the Trilateral Statement was seen as a major achievement in Washington, as it eliminated hundreds of ICBMs and bombers and nearly 2,000 strategic nuclear warheads that had been designed and built to strike the United States.  Not surprisingly, in light of Russia’s aggression, many in Ukraine now question the value of the Trilateral Statement and Budapest Memorandum.  They argue that, had Ukraine held on to at least some nuclear weapons, Russia would never have dared move on Crimea and Donbas.

That argument is understandable and perhaps correct (although alternative histories are not always easy to envisage).  However, had Ukraine tried to keep nuclear weapons, it would have faced political and economic costs, including:

·      Kyiv would have had limited relations, at best, with the United States and European countries (witness the virtual pariah status that a nuclear North Korea suffers).  In particular, there would have been no strategic relationship with the United States.

·      NATO would not have concluded a distinctive partnership relationship with Ukraine, and the European Union would not have signed a partnership and cooperation agreement, to say nothing of an association agreement.

·      Kyiv would have received little in the way of reform, technical or financial assistance from the United States and European Union.

·      Western executive directors would have blocked low interest credits to Ukraine from the IMF, World Bank and European Bank of Reconstruction and Development.

To be sure, one can debate the value of these benefits.  But those who now assert that Ukraine should have kept nuclear arms should recognize that keeping them would have come at a steep price.  Moreover, in any confrontation or crisis with Russia, Ukraine would have found itself alone.

Hero Image
All News button
1
This event is open to Stanford undergraduate students only. 
 
The Center on Democracy, Development, and the Rule of Law (CDDRL) is currently accepting applications from eligible juniors due February 15, 2019 who are interested in writing their senior thesis on a subject touching upon democracy, economic development, and rule of law (DDRL) from any university department. CDDRL faculty and current honors students will be present to discuss the program and answer any questions.
 
For more information on the Fisher Family CDDRL Honors Program, please click here.
 
Image
honors info session 2019 1
 

 

Ground Floor Conference Rm E008 Encina Hall616 Serra MallStanford, CA 94305-6055

 

CDDRL
Encina Hall, C152
616 Jane Stanford Way
Stanford, CA 94305-6055

(650) 725-2705 (650) 724-2996
0
Senior Fellow at the Freeman Spogli Institute for International Studies
Professor, by courtesy, of Political Science
Stedman_Steve.jpg
PhD

Stephen Stedman is a Freeman Spogli senior fellow at the Center on Democracy, Development, and the Rule of Law and FSI, an affiliated faculty member at CISAC, and professor of political science (by courtesy) at Stanford University. 

In 2011-12 Professor Stedman served as the Director for the Global Commission on Elections, Democracy, and Security, a body of eminent persons tasked with developing recommendations on promoting and protecting the integrity of elections and international electoral assistance. The Commission is a joint project of the Kofi Annan Foundation and International IDEA, an intergovernmental organization that works on international democracy and electoral assistance. In 2003-04 Professor Stedman was Research Director of the United Nations High-level Panel on Threats, Challenges and Change and was a principal drafter of the Panel’s report, A More Secure World: Our Shared Responsibility. In 2005 he served as Assistant Secretary-General and Special Advisor to the Secretary- General of the United Nations, with responsibility for working with governments to adopt the Panel’s recommendations for strengthening collective security and for implementing changes within the United Nations Secretariat, including the creation of a Peacebuilding Support Office, a Counter Terrorism Task Force, and a Policy Committee to act as a cabinet to the Secretary-General.  His most recent book, with Bruce Jones and Carlos Pascual, is Power and Responsibility: Creating International Order in an Era of Transnational Threats (Washington DC: Brookings Institution, 2009).

Affiliated faculty at the Center for International Security and Cooperation

Encina Hall, C150
616 Jane Stanford Way
Stanford, CA 94305

0
Center Fellow, Freeman Spogli Institute for International Studies
didi_kuo_2023.jpg

Didi Kuo is a Center Fellow at the Freeman Spogli Institute for International Studies (FSI) at Stanford University. She is a scholar of comparative politics with a focus on democratization, corruption and clientelism, political parties and institutions, and political reform. She is the author of The Great Retreat: How Political Parties Should Behave and Why They Don’t (Oxford University Press, forthcoming) and Clientelism, Capitalism, and Democracy: the rise of programmatic politics in the United States and Britain (Cambridge University Press, 2018).

She has been at Stanford since 2013 as the manager of the Program on American Democracy in Comparative Perspective and is co-director of the Fisher Family Honors Program at CDDRL. She was an Eric and Wendy Schmidt Fellow at New America and is a non-resident fellow with the Carnegie Endowment for International Peace. She received a PhD in political science from Harvard University, an MSc in Economic and Social History from Oxford University, where she studied as a Marshall Scholar, and a BA from Emory University.

News Type
Blogs
Date
Paragraphs

CISAC faculty and fellows offer their winter reading (and listening) selections:

Martha Crenshaw, senior fellow at the Freeman Spogli Institute for International Studies and professor, by courtesy, of political science, recommends:

My Brilliant Friend, by Elena Ferrante


Karl Eikenberry, Oksenberg-Rohlen Fellow at the Shorenstein Asia-Pacific Research Center, CISAC, CDDRL, and TEC affiliate, and director of the U.S.-Asia Security Initiative at the Shorenstein Asia-Pacific Research Center, recommends:

Lost Enlightenment: Central Asia's Golden Age from the Arab Conquest to Tamerlane, by S. Frederick Starr

“This book was recommended to me by Abbas Milani before making a trip to Central Asia and the Caucasus. My respect for the civilizations of those regions grew immensely as a result of this read. Transformed my thinking.”


Rodney C. Ewing, Frank Stanton Professor in Nuclear Security and Co-Director, CISAC, recommends:

In the Shadow of Los Alamos - Selected Writings of Edith Warner, by Edith Warner

“I have the personal tradition at Christmas of rereading the Christmas letters of Edith Warner - written just down the slope from Los Alamos during the Manhattan Project. Warner captures the enchantment of New Mexico and touches on what was going on up the hill.”


Colin Kahl, co-director of the Center for International Security and Cooperation, the inaugural Steven C. Házy Senior Fellow at the Freeman Spogli Institute for International Studies, and professor, by courtesy, in the department of political science at Stanford University recommends:

The Jungle Grows Back: America and Our Imperiled World, by Robert Ragan

“This short provocative book (essentially a long essay) discusses what America’s role should be in an increasingly chaotic world—one full of challenges that the existing norms, institutions, and alliances that compromise the liberal international order seem increasingly ill-suited to address. Whether one agrees or disagrees with Kagan’s conclusions, his analysis is insightful and worth arguing with.”


Erik Lin-Greenberg, predoctoral fellow at CISAC and a PhD candidate in political science at Columbia University, recommends:

Rise and Kill First, by Ronen Bergman

“Rise and Kill First traces the history of Israel's targeted killing program from before the establishment of the State of Israel to present day. Ronen Bergman draws from hundreds of interviews and previously unpublished documents to describe the organizations and operations responsible for assassinating Israel's adversaries in a book that reads more like an action novel than a non-fiction work.”


Michal Onderco, junior faculty fellow, CISAC, recommends:

White Working Class: Overcoming Class Cluelessness in America, by Joan Williams

“If you sometimes wonder about the worldviews of the people you meet under the Christmas tree, this book will give you a framework to understand them better. Williams wrote an excellent (and surprisingly easy to read) book explaining misunderstanding between classes in America; which surprisingly well resonates with research findings from outside the US. Though solutions proposed are rather simplistic, the analysis is worth reading and pondering. ”

Seeing People Off, by Jana Beňová

“A novel about a hipster couple in Bratislava, with all the trappings of the hipster life in Central Europe. Jana Benova received the 2012 European Union Prize for Literature for the book, and it is one of the rare modern Slovak fiction translated to English. Come for the (somewhat) exotic origin, stay for the story.”


Kathryn Stoner, deputy director at the Freeman Spogli Institute for International Studies at Stanford University and a senior fellow at the Center on Democracy, Development, and the Rule of Law, as well as the deputy director of the Ford Dorsey Master's in International Policy at Stanford University, recommends:

These Truths: A History of the United States, by Jill Lepore

“This book came out a few months ago and is a really excellent overview of US history through the lens of inequality. It is really well written, and informative even for those of us who think we know US history well.”


Harold Trinkunas, deputy director and senior research scholar at the Center for International Security and Cooperation at the Freeman Spogli Institute for International Studies at Stanford University, recommends:

Secret Wars: Covert Conflict in International Politics, by Austin Carson

“An engaging read on why states engage in covert action against each other and why even competitors may have a mutual interest in not acknowledging such activities, keeping them 'backstage' and deniable to avoid the risk of escalation and war.”


Sherry Zaks, postdoctoral fellow at the Center for International Security and Cooperation recommends:

Salt, Fat, Acid, Heat: Mastering the Elements of Good Cooking, by Samin Nosrat

“Samin Nosrat -- a former Chez Panisse chef and Alice Waters protege -- takes her readers on an enthralling journey through the four essentials of good cuisine. This book changed the way I cook and eat. While the book itself has some (amazing!) recipes, it reads more like a memoir and history than a cookbook. Nosrat is charming, brilliant, and witty. Don't just skip it in favor of the Netflix Series. If anything, do both. Bon appetit!”

S-Town Podcast, hosted by Brian Reed

“S-Town is one of the most enrapturing examples of investigative reporting I've ever come across. No description would do it justice. It won the 2017 Peabody award and only highlights how antiquated other literary and journalism awards are for not expanding to accommodate this medium. If you want make sitting in Bay Area traffic more palatable, throw this into your rotation.”


Amy Zegart, senior fellow at the Freeman Spogli Institute of International Studies (FSI), professor of political science (by courtesy) at Stanford University, and a contributing editor to The Atlantic, recommends:

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, by David Sanger

“David Sanger's exploration of cyber weapons is an instant classic.”

Bad Blood: Secrets and Lies in a Silicon Valley Startup, by John Carreyrou

“A riveting non-fiction account of how Elizabeth Holmes turned Theranos into a $9 billion Silicon Valley fraud.”

All News button
1
Authors
News Type
News
Date
Paragraphs

From genome editing to “hacking” the microbiome, advances in the life sciences and its associated technological revolution have already altered the biosecurity landscape, and will continue to do so. What does this new landscape look like, and how can policymakers and other stakeholders navigate this space? A new report by Stanford scholars David Relman and Megan Palmer along with George Mason University’s Jesse Kirkpatrick and Greg Koblentz assesses this emerging biosecurity landscape to help answer these questions and illustrates gaps in governance and regulation through the use of scenarios.

The report—the product of two years of workshops, issue briefs, and white papers authored by different participants—involved people from different organizations and backgrounds ranging from life sciences and medicine to social science and ethics. “The project process was just as important as the product,” said Palmer. “It was a truly interdisciplinary effort.”

Genome editing, including CRISPR, is disruptive to the biosecurity landscape, and it serves as an illustration of more general trends in the evolving landscape, the authors write. CRISPR technology does not exist in a vacuum—rather, it is enabled by, represents, and gives rise to a suite of technologies with potential benefits and that require new approaches to adaptive policy making and governance.

Scenarios illustrating governance gaps in in the report include:

  • A reckless CRISPR user who develops and markets a probiotic created with genome editing that has serious unanticipated effects for consumers;
  • An agricultural biotechnology firm conducting dual use genome editing research that lies outside current oversight, but nonetheless could have negative consequences for human health
  • An intentional release of a gene drive organism from a lab, that while having limited physical harm, feeds a state-based misinformation campaign with large economic impacts
  • An accidental release of a gene drive organism due to lack of awareness and uncertainty about the risk classifications and protocols for handling new technologies
  • A terrorist group using commercial firms that lack strong customer and order screening to use genome editing to weaponize a nonpathogenic bacteria
  • A state-sponsored program to develop biological weapons for new strategic uses, including covert assassination, using largely publicly available research
     

In each of these examples, the researchers play out a hypothetical situation exposing a number of security and governance gaps for policymakers and other stakeholders to address.

In the report, the authors conclude that genome editing has tremendous potential benefits and economic impacts. The authors note that the market for genome editing is expected to exceed $3.5 billion by 2019, but a security incident, safety lapse, reckless misadventure, or significant regulatory uncertainty could hurt growth. Increased reliance on the “bio-economy,” they write, means biosecurity is increasingly critical to economic security as well as human health.

Other key takeaways:

Genome editing has the potential to improve the human condition. Genome editing is poised to make major beneficial contributions to basic research, medicine, public health, agriculture, and manufacturing that could reduce suffering, strengthen food security, and protect the environment.

Genome editing is disruptive to the biosecurity landscape. The threat landscape has, and continues to expand to include new means of disrupting or manipulating biological systems and processes in humans, plants, and animals. Genome editing could be used to create new types of biological weapons. Further, technical advances will make misuse easier and more widespread.

CRISPR illuminates broader trends and the challenges of an evolving security landscape. An approach to biosecurity that accounts for these trends, and encompasses risks posed by deliberate, accidental, and reckless misuse, can help address the complex and evolving security landscape.

Technology must be taken seriously.  A thorough, informed, and accessible analysis of any emerging technology is crucial to considering the impact that it may have on the security landscape.

Key stakeholders must be engaged. Stakeholders in the genome editing field encompass a more diverse array of actors than those that have been involved so far in biosecurity discussions. These stakeholders range from international organizations to government agencies to universities, companies, lay communities writ large, and scientists.

Applied research is needed to create and implement innovative and effective policies. Applied research is necessary to continue the process of modifying existing governance measures, and testing and adapting new ones, as new genome editing technologies and applications are developed, new stakeholders emerge, and new pathways for misuse are identified.

Download the executive summary and full report at editingbiosecurity.org.

 

Hero Image
All News button
1
Authors
Asfandyar Mir
News Type
Commentary
Date
Paragraphs

Many analystspractitioners, and scholars are skeptical of the efficacy of drone strikes for counterterrorism, suggesting that they provide short-term gains at best and are counterproductive at worst. However, despite how widespread these views are, reliable evidence on the consequences of drone strikes remains limited. My research on drone warfare and U.S. counterterrorism—some of which was recently published in International Security—addresses this issue by examining the U.S. drone war in Pakistan from 2004 to 2014. Contrary to the skeptics, I find that drone strikes in Pakistan were effective in degrading the targeted armed groups. And, troublingly, they succeeded in doing so even though they harmed civilians.

 

Three Key Findings

I have conducted research in Pakistan and the United States over the last few years, gathering new qualitative data on the politics of the war and its effects on the two main targets, al-Qaeda and the Pakistan Taliban. I have also evaluated detailed quantitative data on drone strikes and violence by al-Qaeda and the Pakistan Taliban. This research offers three important findings.

First, the U.S. drone war was damaging for the organizational trajectories of al-Qaeda and the Pakistan Taliban. I found that after the United States surged its surveillance and targeting capabilities in 2008, both groups suffered increasing setbacks; they lost bases, their operational capabilities were reduced, their ranks were checked by growing numbers of desertions, and the organizations fractured politically. These effects appear to have persisted until 2014. In a related paper, my University of Michigan colleague Dylan Moore and I show that during the drone program in the Waziristan region, violence by the two groups fell substantially.

Second, the U.S. drone war disrupted al-Qaeda and the Pakistan Taliban not just by killing their leaders and specialized rank-and-file members, but also by heightening the perceived risk of being targeted. Across a variety of empirical materials, including some collected through fieldwork, I found that both groups were direly constrained by the fear—a constant sense of anticipation—of drone strikes, which crippled routine movement and communication. In addition, leaders and rank-and-file jihadis regularly viewed each other with the suspicion of being spies for the drone program, which contributed to their organizational fragmentation.

Third, the notion of increased recruitment for al-Qaeda and the Pakistan Taliban due to civilian harm in drone strikes is questionable. In the local battlefield, I did not find evidence of any tangible increase in recruitment. Interviews with some surviving mid-level members of al-Qaeda and the Pakistan Taliban negated the impression that the groups benefited from a stream of angry recruits. Instead, a recurring theme was that they experienced desertions and manpower shortages because of the stress of operating under drones. To the extent that new recruits were available, both groups struggled to integrate them in their organizations because of the fear that they might be spies for the drone program.

 

Beyond Pakistan?

The U.S. drone war in Pakistan is a crucial case of U.S. counterterrorism policy, but it is one of many other campaigns. The U.S. government is waging such campaigns in Yemen and Somalia, and considering an expansion in the Sahara. In my work, I identify two factors which are important for the dynamics evident in Pakistan to hold generally.

First, the United States must have extensive knowledge of the civilian population where the armed group is based. The counterterrorism force needs such knowledge to generate intelligence leads on their targets, who are often hiding within the civilian population. This comes from detailed population data sharing by local partners, large-scale communication interception, and pattern-of-life analysis of target regions from sophisticated drones.

Second, the United States must be able to exploit available intelligence leads in a timely manner. As members of targeted armed groups consistently try to escape detection, most intelligence has a limited shelf life. The capability to act quickly depends on the bureaucratic capacity to process intelligence, decentralized decision-making for targeting, and rapid-strike capabilities like armed drones.

In Pakistan, the United States met these criteria with an abundance of technology and high-quality local partner cooperation. Starting in 2008, the United States mobilized a large fleet of drones and surveillance technologies to develop granular knowledge of the civilian population in the targeted regions. Despite deep political rifts on the conflict in Afghanistan, the Central Intelligence Agency obtained extensive covert support from Pakistani intelligence against al-Qaeda and the Pakistan Taliban, which enabled it to regularly locate targets. With ample targeting authority and armed drones operating from nearby bases, U.S. forces were able to exploit available leads.

In Yemen, however, the United States has struggled to develop knowledge of the civilian population and act on available intelligence. My interviews with U.S. officials and a leaked government document suggest that, until 2013, U.S. forces did not sustain aerial surveillance of targeted regions, the Yemeni state’s capacity in support of operations remained poor, and the targeting rules were stringent.

 

Implications for U.S. Counterterrorism Policy

The U.S. government’s preference for drone strikes is motivated by the desire to prevent attacks against the American homeland. My research suggests that the drone program has the potential to inflict enough damage on the targeted armed groups to upset their ability to plot and organize attacks in the United States.

The United States also deploys drone strikes to manage jihadi threats to allied regimes. In such cases, the political value of strikes depends, in part, on the capability of the local partner. An effective drone deployment can go a long way in providing a necessary condition for restoring order. But the local partner must ultimately step up to consolidate state control.

For example, President Obama’s drone policy degraded al-Qaeda and the Pakistan Taliban, securing the American homeland and substantially reducing the threat to the nuclear-armed Pakistani state. The Obama administration’s policy was sufficient because the Pakistani state was relatively capable and could build on the gains made by U.S. counterterrorism strikes. Indeed, Pakistan’s ground operations, although contentiously timed, consolidated those gains.

In contrast, in today’s Afghanistan, the U.S. government cannot rely on instruments of counterterrorism alone. U.S. officials realize that just degrading the Afghan Taliban and the Islamic State is unlikely to stabilize the country. The Afghan government remains so weak that it will struggle to consolidate territorial control even after substantial degradation of its armed foes.

Finally, a key limitation of counterterrorism strikes is that they cannot alleviate the ideological appeal of jihadi actors like al-Qaeda and the Islamic State. Strikes cannot substitute for efforts at countering online jihadi propaganda and de-radicalization. Thus, they should not be seen as a silver bullet that can defeat armed groups operating from safe havens and weak states.

 

Civilian Protection and Drone Strikes

Civilian harm in U.S. counterterrorism remains a vital challenge. While moral objections to civilian casualties are a powerful reason to reconsider drone operations, my research suggests that strategic concerns, like a surge in local violence or increased recruitment of targeted organizations, are not. In Pakistan, for example, drone strikes harmed civilians while also undermining al-Qaeda and Pakistan Taliban. Similarly, the U.S.-led counter-ISIL campaign in Iraq and Syria was very difficult for the civilian population, and yet also inflicted losses on the Islamic State.

If civilian casualties do not affect the strategic outcomes of counterterrorism campaigns, then the U.S. government must be convinced to protect civilians for purely moral reasons. How responsive might the U.S. government be to such appeals? It is unclear. The Obama administration was not transparent about the use of drone strikes. Under President Trump, the lack of transparency has worsened. Concerned policymakers and human rights activists must continue to push the U.S. government to be more transparent and to protect civilians caught up in counterterrorism campaigns.

 

Hero Image
All News button
1
Authors
Clifton Parker
News Type
News
Date
Paragraphs

Whether it’s foreign government meddling or corporate hacking, every day brings a new challenge in cybersecurity for the United States, said experts at a recent Hoover Institution media roundtable.

Fifteen members of the national media attended the October 1 discussion, “Outside the Beltway,” which included talks by scholars from the Hoover Institution and Stanford’s Center for International Security and Cooperation (CISAC), cosponsors of the full-day event. The media included the Wall Street Journal, NBC, CNBC, Bloomberg, Reuters, The Hill, CNET, Politico, The Washington Free Beacon, Axios, and RealClear Politics, among others.

Speakers included Herb Lin, Hoover research fellow and senior research scholar at CISAC; Alex Stamos, Hoover visiting scholar and CISAC fellow; Andrew Grotto, Hoover research fellow and research scholar at CISAC: John Villasenor, Hoover senior fellow; Irving Lachow, Hoover visiting fellow; Sean Kanuck, Hoover visiting fellow; Max Smeets, CISAC postdoctoral fellow; and Gregory Falco, CISAC postdoctoral fellow; and others from the private sector.

Cyber conflicts

Grotto said many cyber attackers disguise their operations by using another country’s cyber facilities and locations. He describes this as “third country issues,” which occur in cyberspace as well as on other fronts.

During the Cold War, for example, the Soviet Union used Mexico City as a base of covert operations against the United States, according to Grotto. Even though the United States lodged complaints with the Mexican government, the latter continued to allow the Soviet influence-peddling and spying activities.

Kanuck described how trends in cyberspace are producing outcomes such as “fake news,” “fake” and real crime, European data regulation, and an inability to develop unified, international approaches to cyber deterrence.

Looking ahead, he said we may encounter the first death from a malicious cyber activity, limitations on some cloud services, and continued attempts by foreign and domestic groups to influence elections through social media.

“This is a weapon and a space that is designed to help authoritarians,” Kanuck said, noting that open societies are much more vulnerable to cyber meddling than closed ones that can block websites, and censor and surveil their own people.

Finally, the world will likely one day witness the first official state-sponsored and acknowledged response to a cyberattack, Kanuck added. Russia, for example, is “clearly sending geopolitical signals” about its cyber strengths with its activities.

“Persistent Engagement”

With “bad actors” in Russia, China, North Korea, and Iran, Lin talked about current US policy in cyberspace and the “good, bad, and the ugly” of the situation. The US government’s recently unveiled strategy is dubbed “persistent engagement.”

Lin said that while the United States may understand the cyber domain it operates in, the prescribed “medicine” is not well understood. He explained that such an approach is untested, and it is unclear whether current assumptions about the nature of the threats will reduce cyber threats.

“There is no evidence from history of anywhere else to indicate that this strategy will lead to restraint on the part of the adversaries,” Lin said.

Max Smeets, a CISAC post-doctoral scholar, said it is not certain if current US cyber strategy is actually more aggressive, as not enough operational details exist right now. He spoke about his research into “cyber proliferation” and the difficulty of knowing exactly how many more states than the four noted “bad actors” are building serious offensive capabilities.

“Low Hum”

Asked about Russian election hacking in the 2018 midterms, Kevin Mandia, a speaker and CEO of the cybersecurity company FireEye, said, “We’re not responding to an elevated state of Russian activity right now. It’s more of a low hum,” different than what his company found during the 2016 election season.

He suggested that relying on diplomacy and holding nations accountable—and not following the “a good offense is the best defense” strategy—is a realistic approach to dealing with cybersecurity threats from closed society states.

The roundtable topics covered technical issues in cyber, cyber challenges past and present, cyber conflict, countries, companies, and cyber challenges, among others. The event also included a two-hour simulation exercise with participants assuming the roles of executives at a large, fictitious company that was under a major cyberattack.

 

MEDIA CONTACTS

Clifton B. Parker, Hoover Institution: 650-498-5204, cbparker@stanford.edu


 

 

All News button
1
Subscribe to