Authors
News Type
News
Date
Paragraphs

Congratulations to CISAC honors program Class of 2017! On June 16, students in the CISAC Interschool Honors Program in International Studies graduated in a conferral of honors ceremony on the front lawn of Encina Hall. 

We are proud to add our 12 new graduates to our expanding list of graduates from the program since it began in 2001. In total, CISAC has 193 alumni in honors. For the students, their graduation reflects an intellectual adventure that included a two-week honors college program in Washington D.C., tours of government agencies, meetings with influential policy makers, and weekly seminars with CISAC faculty. Honors students are also required to research and complete an original thesis on an important national security issue.

The 2017 program was co-directed by Martha Crenshaw and Chip Blacker. Crenshaw said, "We stress hard work, independent thinking, intellectual honesty, and courtesy and civility.  Our students are critical without being disrespectful, open to new ideas and ways of thinking, and self-made experts in the subjects they have chosen."

In his remarks, Blacker said several features of the CISAC program make it distinctive. "These include the diversity of the disciplines represented by the student's major fields of study, which range this year from political science, history and international relations, on the one hand, to computer science, energy systems engineering, and materials science and engineering, on the other. ..." 

While each project is different, "they all share the unifying and overarching themes of advancing the international security agenda and having value and utility in policy terms," Blacker said. The program, he added, places a "premium on knowledge of the real world, and of the art and science of policymaking in particular, coupled with intensive training in research and writing."

During the conferral ceremony, CISAC honors teaching assistant Shiri Krebs read statements from the students' thesis advisors regarding their final papers. Read below for those comments:


Ken Ben ChaoKen-Ben Chao

A New Journey to the West: The Shanghai Cooperation Organization and Chinese Foreign Policy

Thesis Advisor: Coit. D. Blacker

"What is the Shanghai Cooperation Organization and, to be blunt, why should we care? In essence, this is the question that Ben Chao seeks to answer in this thoughtful, comprehensive and well-written senior thesis. Ben’s answer, like the question, comes in two parts. The Shanghai Cooperation Organization, he tells us, is neither an emerging alliance nor a diplomatic “talk shop.” Rather, it has been – and it continues to be – a subtle instrument of Chinese foreign policy that has waxed and waned in importance since its creation in 2001 depending on Beijing’s assessment of the international security environment. In Ben’s judgment, this is reason enough for us to care and for us to pay attention. Ben’s thesis is a superior piece of scholarship that tells us a great deal about something most of us know little about and does so in an informed and wonderfully entertaining way."


Image
Marina Elmore
Marina Elmore

When Things Are Not What They Seem: Explaining the Success of Countering Violent Extremism in Los Angeles

Thesis Advisor: Martha Crenshaw

"A policy of countering violent extremism and radicalization, known as “CVE,” was a hallmark of the Obama Administration as it struggled to respond to the threat of “homegrown” jihadist terrorism. But what is CVE? And is it effective? These questions motivated Marina Elmore’s fascinating inquiry into the apparent success of the Los Angeles program, highly praised as a model on the national level. Marina probed deeply into the case to discover that special circumstances predetermined the outcome and that the model was not easily transferable to other cities. For one thing, Los Angeles did not actually face a challenge of violent extremism because it lacked a population susceptible to the appeal of jihadist propaganda. For another, the city had already implemented most of the newly prescribed CVE “best practices,” such as community policing, in efforts to solve earlier social and political problems. Marina’s conclusions are astute, balanced, and fair, and she persuasively demonstrates both how important it is to test commonly held assumptions and how difficult it is to establish standards for policy effectiveness in the counterterrorism field."


Gabbi FisherGabbi Fischer

Towards DIUx 2.1 or 3.0? Examining DIUx’s Progress Towards Procurement Innovation

Thesis Advisors: Herb Lin, Dan Boneh

"In 2015, Secretary of Defense Ashton Carter announced the creation of Defense Innovation Unit Experimental (DIUx).  Through some great case-based work, Gabbi cuts through the complexity of the traditional acquisition system to observe that DIUX fills two important niches in the defense innovation ecosystem: it facilitates connections between DoD users and the tech community and it exercises non-traditional acquisition authority (called Other Transaction Authorities (OTAs)) to expedite contracting.  But she also cautions that the use of OTA may not be compatible in the long run with the traditional acquisition system, and suggests that future DIUX efforts may have to take advantage of other existing acquisition authorities (which do exist but which are rarely used) to make further progress in improving the coupling between the tech sector and the DoD.  She makes also substantive recommendations that DIUX should take seriously if it wants to survive in the long term."


Wyatt HoranWyatt Horan

Evaluating the U.S. Foreign Policy Institutions in Permitting a Coercive Russian Energy Policy

Thesis Advisor: Coit D. Blacker

"Following the twin “oil shocks” of the 1970s, the U.S. Government moved effectively to reduce the potential economic and political impact of any future such events by reorienting and reshaping key foreign policy institutions. When, thirty years later, the Russian government under Vladimir Putin began to manipulate Russian deliveries of natural gas to its customers in Europe, the U.S. failed to respond in a focused, deliberate and coordinated way. In this provocative senior thesis, Wyatt asks whether the clumsy American response to Russia’s manipulation of this vital energy resource contributed to Moscow’s alarming behavior. He answers in the affirmative and by so doing forces us to think hard about how seemingly obscure organizational issues impact the effectiveness of U.S. foreign policy. Wyatt’s thesis is bold and a little unsettling. It also reads like a detective novel, which is a tribute to the author’s willingness to run risks in search of a good story."


Tori KellerTori Keller

The Rise and Fall of Secular Politics in Iraq

Thesis Advisor: Lisa Blaydes

"As you know from interacting with Tori over the past year(s), she is a passionate – almost obsessively curious – student of contemporary Iraqi politics. Her drive to understand the case has led her to write a normatively-motivated, policy-relevant thesis on the failure of democratic consolidation in Iraq. Her research suggests that a non-sectarian political future for Iraq was possible; the historical antecedents for such a vision existed. But as a result of a combination of US missteps, Iranian interference and, most importantly, the way these factors manifested into an insecure security environment, secular parties never really had a real chance to succeed even if a plurality of voters supported such an outlook. To write this thesis, Tori invested in her own human capital development in impressive ways. She studied Arabic, learned ArcGIS mapping software, collected original data, and undertook statistical analysis – deploying the skills she had acquired in her four years at Stanford with the goal of answering this research question. In the end, I believe she has the right answer as well. If there was any doubt left in her mind about whether she got it “right,” I feel confident that she would still be puzzling through the research today."


Alexander LubkinAlexander Lubkin

Plutonium Management and Disposition in the United States: History and Analysis of the Program

Thesis Advisor: Rod Ewing

"Alex’s thesis examines the issues related to the failure of the U.S. program for the disposition of excess plutonium from dismantled nuclear weapons. Based on his survey of the literature and interviews with key actors in this program, Alex analyzed the U.S. program and has made a number of important observations and conclusions concerning the causes for the failure of the U.S. program. His most significant conclusion is that one of the major causes of failure was that the U.S. program to use irradiated MOX fuel for the disposition of the plutonium was not consistent with U.S. nuclear policy. The U.S. is pursuing an open nuclear fuel cycle, and thus has limited experience with large scale processing of radioactive materials and the fabrication of MOX fuel. Alex was able to identify a number of other issues, such as over reliance on cost and schedule estimates of the different strategies and a failure to utilize advances in materials science for the development of actinide waste forms. I am very impressed with Alex’s dedication to this research project, and his persistence in the review of an often confusing and obscure literature. We have met regularly over the past year. I outline broad areas that he might investigate, but then he took these ideas and developed them according to his on evaluation of a variety of different sources. He also did an exceptional job of synthesizing the information from the interviews into an interesting and informative chapter in his thesis. Alex’s research will be the basis for a publication, but most importantly, he has opened the door to a whole series of policy issues that require more detailed analysis. He has certainly educated me on a number of these issues."


Jian Yang LumJian Yang Lum

To Bomb or Stab? The Impact of Ideology and Territorial Control on Rebel Tactics

Thesis Advisors: Joseph Felter, Jeremy Weinstein

“Lumpy” as we know him- explores how rebel groups’ ideology and degree of territorial control affect the type of violence they choose to employ in pursuit of their aims. Using fine grained conflict data and case studies from thirty-six years of insurgency and counterinsurgency in the Philippines, Lumpy finds both quantitative and qualitative evidence in support of the predictive model he develops in his thesis. In sum, rebel groups with weaker ideological commitment and more limited control of the territory they operate in are more likely to initiate indiscriminate attacks such as bombings and employment of improvised explosive devices. More ideologically committed rebels, and those exercising greater territorial control, initiate violence that is comparatively more discriminate such as targeted raids and assassinations. The human toll and economic costs incurred by civil war and insurgency around the world are staggering and continuing to mount. There is an urgent need for policy relevant scholarship that increases our understanding of the local level violence associated with these deadly conflicts and how states can better anticipate and respond to these threats. Lumpy’s thesis makes a significant contribution to these important ends."


Elizabeth MargolinElizabeth Margolin

Should I Retweet or Should I Go? Pro-ISIS Twitter Communities and American Decapitation Strategy

Thesis Advisors: Martha Crenshaw, Justin Grimmer

"There are many studies of the U.S. Government’s use of military force in “decapitation” strikes against terrorist leaders, particularly the effects of these strikes on levels of violence and degree of organizational cohesion. Researchers have also analyzed the relationship between social media and terrorism generally. But the specific question of the social media reactions of jihadist sympathizers to decapitation strikes directed against Islamic State leaders was neglected until the idea occurred to Eli Margolin, who took it up as the subject of her honors thesis. This difficult, demanding, and often frustrating research project required Eli to master new cutting-edge analytical methodologies and struggle to acquire elusive data from the archived Twitter accounts of now banned users, obstacles that she overcame with impressive ability, determination, and sophistication. After extensive and thoughtful consideration of three carefully selected cases, she found that Twitter followers of jihadist causes react quite differently to the deaths of different types of terrorist leaders. Her intellectual ambition and tenacity produced a thesis that is excellent in terms of conceptualization, analytical rigor, and empirical foundation."


Lauren NewbyLauren Newby

From Zero to Sixty: Explaining the Proliferation of Shi’a Militias in Iraq after 2003

Thesis Advisor: Martha Crenshaw

"Why has there been a sharp increase in the number of Shia militias in Iraq, a troubling development that may jeopardize Iraqi progress toward stability and democracy? Lauren Newby could not find a good answer in her review of the theoretical literature, so she proposed an original one of her own. Most scholars attribute the proliferation of violent non-state actors to the fragmentation of existing groups through splintering and splitting, whereas Lauren shows that in Iraq the increase is due to the emergence of new groups. Researchers typically focus on groups directly opposing the state, whereas the Iraqi militias side with the incumbent government. Most studies are limited to groups operating in a single bounded conflict zone, whereas the politics of Iraq and Syria are linked. Lauren concludes that the Syrian civil war has been a major impetus for the formation of Shia militias in Iraq and that most are established by Iraqi political parties. Her thesis is exemplary in making a clear and convincing claim, contrasting it to alternative explanations, and providing new supporting evidence from primary sources."


AAnhViet NguyennhViet Nguyen

Territorial Disputes in Court: Power, Compliance, and Defiance

Thesis Advisor: Kenneth Schultz

"In the wake of the arbitration ruling over the China-Philippines dispute in the South China Sea, AnhViet wanted to understand what the prospects were for this ruling to help resolve the conflict. To do so, he placed this case in the context of other territorial disputes that have involved great powers or states who were significantly more powerful than their adversaries. This led to the central research questions: why and under what conditions do great powers comply with adverse court rulings over territorial issues? The thesis draws nicely on the existing literature to articulate several hypotheses and then tests these hypotheses using a variety of methods. Case studies of the US-Mexico dispute over the Chamizal tract and the Nigeria-Cameroon dispute over the Bakassi Penninsula show that great powers who initially reject adverse court decisions might later find these rulings to be a convenient basis for settlement. He also makes a very important and sophisticated point that great power compliance with court rulings may reflect their ability to keep high salience issues off the agenda. The conclusion is mildly optimistic about the prospects for (eventual) compliance while remaining appropriately clear-eyed about the limits of international law in this context. Overall, AnhViet does an admirable job blending theoretical material, historical case studies, and large n data to develop his argument. Moreover, his application of these lessons to the contemporary case of the South China Sea dispute is nuanced and compelling. In short, AnhViet’s thesis represents an excellent example of how academic research can be made relevant to current policy issues."


Thu-An PhamThu-An Pham

On Treaties and Taboos: U.S. Responses to International Norms in the NPT and Genocide Convention (1945-1999)

Thesis Advisor: David Holloway

"Thu-An Pham has written an outstanding thesis on the role of norms in international relations. The United States has not tried strenuously to enforce the Genocide Convention of 1948, which calls for the prevention and punishment of genocide. It has, however, actively sought to enforce the nonproliferation norm expressed in the Nuclear Nonproliferation Treaty of 1968. What explains the difference? On the basis of a subtle theoretical analysis and detailed empirical research, Thu-An offers three answers. First, the Nonproliferation Treaty is better supported than the Genocide Convention by institutions that monitor and enforce compliance. Second, the United States has regarded the norm of nuclear nonproliferation as more important for its national security than the ban on genocide. And third, the nonproliferation norm supports the current international order, which is based on the primacy of states in international relations. The Genocide Convention, by contrast, threatens to weaken the foundations of that order by challenging the primacy of states. Thu-An’s thesis suggests that there are limits on the role that international norms can play in a system of states. This is a wonderful thesis on a crucial issue in international security."


Jack WellerJack Weller

Counting the Czars: Extra-Bureaucratic Appointees in American Foreign Policy

Thesis Advisor: Amy Zegart

"White House czars are frequently discussed in the press, but most people don’t really know what they are and very few scholars have studied them. Yet the use of czars has serious implications for the presidency—signaling when the regular bureaucracy cannot get the job done. Jack Weller’s thesis provides a novel and important contribution to the study of the American presidency. He compiles an original dataset of every foreign policy czar created during the past 100 years and examines alternative explanations for why some presidents used czars more than others. He finds something surprising: czar creation is NOT driven by the individual management style of the president. Instead, it is driven by the external threat environment. Presidents facing simultaneous wars – as FDR did in World War II and George W. Bush did after 9/11 – are more likely to create czars than others. Jack’s thesis is beautifully written and masterfully argued, earning him the honor of being Stanford’s czar of czars."


 

Hero Image
All News button
1
Authors
Clifton B. Parker
News Type
News
Date
Paragraphs

Siegfried Hecker won a national award this week from the American Association for State and Local History for his book, Doomed to Cooperate. Subtitled "How American and Russian Scientists Joined Forces to Avert Some of the Great Post–Cold War Nuclear Dangers," the work tells the story of nuclear scientists from two former enemy nations who reached across political, geographic and cultural divides to solve the new nuclear threats that resulted from the collapse of the Soviet Union. 

The two-volume set, edited by Hecker, a CISAC senior fellow and Los Alamos National Laboratory director emeritus, describes the lab-to-lab collaboration involving more than 100 scientists and leaders through papers, vignettes, and interviews. The book illustrates the challenges they faced, the friendships resulting from the collaborations, and the team's ultimate success in rendering Russian's nuclear materials and facilities safe for the world.

In a press release, Trina Nelson Thomas, the association's awards chair and director, said, “The Leadership in History Awards is AASLH’s highest distinction and the winners represent the best in the field."  

The American Association for State and Local History's awards program was initiated in 1945 to establish and encourage standards of excellence in the collection, preservation, and interpretation of state and local history throughout the United States. More information is available in this article in the Los Alamos Daily Post.

 

 

 

All News button
1
Authors
Clifton B. Parker
News Type
News
Date
Paragraphs

Andrew J. Grotto, a former top National Security Council cybersecurity official in the White House, will join Stanford’s Center for International Security and Cooperation this summer.

Grotto will hold the William J. Perry International Security Fellowship and serve as a research fellow at the Hoover Institution. His appointment is for two years, and he will also be a fellow in the Stanford Cyber Initiative

Cybersecurity focus

Grotto has been involved in virtually every major U.S. cyber policy initiative of the past nine years, from his time on Capitol Hill through his tenure in the Obama Administration as Commerce Secretary Penny Pritzker's senior advisor on technology policy, and to his recent service for two presidents as senior director for cyber policy at the National Security Council. 

Amy Zegart, CISAC's co-director for the social sciences and a senior fellow at the Hoover Institution, said, "Grotto is one of the world's leading cyber policymakers. He brings deep knowledge, penetrating insights, and experience at the highest levels on issues ranging from trade to espionage to cyber warfare. We are delighted to have him join the cyber community at CISAC and Hoover."

In an interview, Grotto said that cyber policy remains underdeveloped as a distinct policy domain. And that has drawn him to CISAC, he noted, “for its commitment to becoming a leading institution supporting the development of this domain.”

Image
image1
Grotto added, “In more established national security domains, such as nonproliferation and counterterrorism, there is a well-developed corpus of scholarly work, historical precedent, and practical experience within the domain that we can draw from to inform, contextualize and evaluate policy decisions. This corpus is still thin with respect to cyber policy making. We don’t have the luxury of waiting decades to create this corpus for cyber – we need to develop it quickly.” 

Grotto first became familiar with CISAC's work during an earlier phase of his career when he focused on U.S. policy towards nuclear weapons - how to prevent their spread, and their role in U.S. national security strategy. CISAC core faculty member Scott Sagan was an early mentor of Grotto’s and first exposed him to CISAC and its scholarly work. Grotto describes the center as a “first-rate research institution at a world class university, with great people. I'm thrilled to be a part of it.”

 

Topics to explore

Cybersecurity policy is a vast field, Grotto said, because virtually every national security challenge facing the country has a cyber dimension to it. 

“I'd be hard pressed to identify a single directorate within the National Security Council that my team and I did not at some point work with on a ‘cyber and…’ problem: cyber and the financial services sector, cyber and the electric grid, cyber and global economic competitiveness, cyber and China, to name a few. So, there's no shortage of cyber-related topics to write on,” he said. 

Several policy problems stand out as foundational for Grotto, and these will be the focus of his research and writing while at CISAC:

• Development of analytic frameworks for defining the dimensions and boundaries of private sector responsibility, especially infrastructure, for defending against cyber threats, versus the government’s responsibility, and using these frameworks to evaluate cybersecurity regulation and identify opportunities and challenges for more effective cybersecurity partnerships between the government and the private sector.

• Cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies.

• Opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world. 

For example, Grotto explained, an adversary physically located in Country X may have cyber infrastructure in Country Y and Country Z, such that an operation against that adversary generates effects in one or more third countries. “How we approach this ‘third country’ issue will have dramatic ramifications for the practical role of offensive cyber operations in U.S. national security strategy,” he noted.

• Governance of global trade in information technologies, especially cybersecurity-related regulation, norms of behavior in cyberspace for governments and private actors, and the appropriateness of applying traditional arms control tools such as export controls to limit the proliferation and use of malicious cyber capabilities.

National Security Council highlights

Grotto said working at the National Security Council was “a privilege of a lifetime. It was the most challenging and intense job I have ever had, and easily the most rewarding.” 

His portfolio spanned a range of cyber policy issues, including defense of critical infrastructure—financial services, energy, communications, transportation, health care, electoral infrastructure, and other vital sectors—cybersecurity risk management policies for federal networks, consumer cybersecurity, and cyber incident response policy and incident management. He also covered technology policy topics with a nexus to cyber policy including encryption, surveillance, privacy, Internet of Things, and the national security dimensions of artificial intelligence and machine learning. 

Grotto said his first job out of graduate school was at a prominent Washington, D.C. think tank. “I viewed it as a waypoint on the path to becoming a law professor, and an academic career focused on international trade law and policy,” he said.

There he was surrounded by people who had served in government, and their “passion for public service was infectious,” he recalled.

He left the think tank to join the Professional Staff of the Senate Select Committee on Intelligence, where he served as then-Chairman Dianne Feinstein’s (D-CA) lead staff overseeing cyber-related activities of the intelligence community and all aspects of NSA’s mission. He also served as committee designee first for Senator Sheldon Whitehouse (D-RI) and later for Senator Kent Conrad (D-ND), advising the senators on oversight of the intelligence community, including of covert action programs, and was a contributing author of the “Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

In 2013, he left the committee to become Commerce Secretary Penny Pritzker’s senior advisor on technology policy, advising Pritzker on all aspects of technology policy, including Internet of Things, net neutrality, privacy, national security reviews of foreign investment in the U.S. technology sector, and international developments affecting the competitiveness of the U.S. technology sector.

While serving on the NSC, Grotto played a key role in shaping President Obama’s Cybersecurity National Action Plan and driving its implementation. He was also the principal architect of the Trump Administration's cybersecurity executive order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”

During his time on Capitol Hill, he led the negotiation and drafting of the information sharing title of the Cybersecurity Act of 2012, which later served as the foundation for the Cybersecurity Information Sharing Act that President Obama signed in 2015.

Grotto received a master’s degree in public administration from Harvard University, a law degree from UC Berkeley, and a bachelor’s degree in philosophy from the University of Kentucky.

MEDIA CONTACT:

Andy Grotto, Center for International Security and Cooperation: grotto@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: 650-725-6488, cbparker@stanford.edu

 

 

All News button
1
Authors
Amy Zegart
Amy Zegart
News Type
News
Date
Paragraphs

CISAC's co-director Amy Zegart wrote this essay, "James Comey's 'Shock and Awe' Testimony," for The Atlantic in its June 8 edition and was also quoted in this Stanford News Service article:

Imagine that two years ago, you sequestered a jury of 12 Americans, kept them in a news-free zone, and brought them today to hear former FBI Director James Comey testify before the Senate Intelligence Committee. Chances are that all of them—no matter what their political beliefs—would be stunned and outraged.

From the perspective of one of these Americans, Comey dropped bombshell after bombshell: The Russians are mucking around in American democratic elections, trying to change how we think, how we act, how we vote—and they will be back. The attorney general cannot be trusted to ensure impartial enforcement of the law. The president fired the FBI director and then lied about why he did it. Yet by the time Comey said these things in an open hearing, all of it was old news. It should have been more shocking than it was, but on some level, Americans were used to it.

Some historical context here is important. Only one FBI Director has ever been fired since J. Edgar Hoover took the job back in 1924: William Sessions, who was sacked by President Bill Clinton in 1993 after the Justice Department's own Office of Professional Responsibility found so many severe ethical lapses, they filled a 161-page report. It included schemes to avoid paying taxes, using government funds to build an expensive home fence that actually reduced the security of the property, using FBI resources for personal purposes, and involving his wife, Alice, in bureau management in “entirely inappropriate” ways. Comey, by contrast, was fired by President Trump for doing his job. Big difference. One was miscarrying justice and abusing power; the other was carrying out justice and speaking truth to power.

Similarly, the only episode in recent history approximating the cloud hanging over the attorney general’s office occurred during the Watergate scandal. That attorney general chose to resign rather than fire White House special prosecutor Archibald Cox and impede an investigation reaching into the White House. This attorney general, by contrast, appears to be implicated in an investigation that reaches into the White House.

Finally, never in American history has a foreign power so deliberately, powerfully, and maliciously tried to distort the cornerstone of American democracy. Comey sent this point home in the hearing, declaring, “There should be no fuzz on this whatsoever. The Russians interfered in our election during the 2016 cycle. They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts. … It is a high confidence judgment of the entire intelligence community. ... It's not a close call.”

Comey’s testimony delivered a “shock and awe” campaign, FBI-style: calm, cautious, and candid, at once stoic and relatable. It was as though Comey were trying to reach through our television sets and shake the body politic into our collective senses.

And yet, his shock and awe testimony may not shock and awe for long. The biggest story of the day is how unlikely this is to remain the biggest story. In all likelihood, after the Twittersphere dies down, partisans will retreat to their respective corners and business as usual will return to Washington.

Why?

Because of something called the “normalization of deviance:” the more frequently exceptional things happen, the less we think of them as exceptional.  Over time, we become desensitized to events that fall far outside the normal range—often with disastrous consequences. The space shuttle Challenger exploded in 1986 despite previous shuttle launches that revealed O-ring seals in the shuttle’s rocket boosters were cracking in cold weather. They shouldn’t have been cracking at all. But NASA “normalized” the poor performance of O-rings as acceptable and okayed the launch, even with record low temperatures forecast for liftoff. Seven astronauts, including Christa McAuliffe, the first teacher in space, were killed.

We experience the normalization of deviance in daily life, too. Ever hear a funny noise in your car? The first time, it seems alarming. After living with it for a few days, however, you think it must not be so serious after all. You tell yourself the car seems to be running just fine. You grow accustomed to the noise. After a while you don’t notice it anymore. And maybe the car really is fine. Or maybe the funny noise is an indication that the car is about to experience a catastrophic breakdown (which is what happened to me one night, when I assumed a strange noise in my car was really nothing, until the car broke down on the freeway, at night, in Los Angeles, “without warning.”)

The Trump era has brought the normalization of deviance to politics. In four short months, this administration’s national-security advisor has had to resign in disgrace for lying about his contacts with Russians and now faces possible criminal charges. The attorney general is so tainted by his own Russian-related activities that he has had to recuse himself from the bureau’s investigation of Russian-related activities. And the FBI director, who by law serves a 10-year term precisely to ensure independence from the president, was fired by the president because he was independent. This is bizarro world. Any one of these events would in normal times be enough to bring down a president. And yet senators today were talking about whether President Trump’s exact words to Jim Comey constituted a hope, a wish, an order, a directive, a threat, or as one senator characterized it, simply a “light touch” approach.

Comey was right about one thing: The Russians “are coming after America.” They may not have to. In this era of normalized deviance, we are defeating ourselves.

Read Amy Zegart's comments and those from other Stanford faculty in this Stanford News Service article.

All News button
1
Authors
Clifton B. Parker
News Type
News
Date
Paragraphs

Japan is an increasingly divided country between elites and the public as it grapples with whether it should acquire nuclear weapons itself and not rely on America’s protection, a Stanford scholar found.

Sayuri Romei, a political scientist and predoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), has a new working paper that describes how Japanese society is grappling with its nuclear future. Romei researches the U.S.-Japan relationship, nuclear security, nationalism and identity in East Asia.

“The shift in the Japanese nuclear debate at the turn of the 21st century did not stem directly from a willingness to deter the new and urgent looming military threats, but was rather the result of a very limited security role that collapsed after the end of the Cold War, and took the shape of a disoriented and shaky Japanese identity,” she wrote.

Japan, a country that suffered two nuclear bombs in WWII, has a well-justified historical “nuclear allergy” that long restrained nuclear weapons ambitions, Romei said. But today, internal questions about Japan’s national sense of identity is causing elites to reconsider the nuclear military option.

She said it’s true that the tone in that debate has been changing in recent years as Japan’s security landscape changes – North Korea and China are building up their nuclear and conventional military programs. On top of this, when the Cold War ended in 1991, the “nuclear umbrella” that the U.S. afforded Japan became “theoretically less justified in an evolving security context,” as Romei describes it. Japan, in turn, sought reassurance from the U.S. that it would not abandon her.

Rethinking Japan's security

Yet the turn of the 21st century is hardly the first time that Japanese elites have discussed a nuclear option, or that they have felt a sense of mistrust towards their ally, she said. Rather than a break from the past, Japanese elites’ behavior suggests a continuity in their thinking:

“It would therefore be more correct to talk of a renaissance of the nuclear debate, rather than an erosion of the nuclear taboo,” Romei said.

What is new in today’s nuclear statements, however, is the increasing intertwining between rethinking security identity issues, a rising nationalism, and a more challenging regional environment, she said.

Along with the necessity to rethink Japan’s security arrangement, pre-WWII nostalgia and nationalism have been growing in Japan as Prime Minister Shinzō Abe's constitutional reforms are being enacted, Romei said. And so, some top officials are reevaluating Japan's nuclear policy in favor of a more self-sufficient approach that fits their increasingly nationalist mood.

“The line between the rethinking of a Japanese security identity and pushing a nationalist agenda into the current nuclear policy is very thin,” wrote Romei.

No longer do Japanese nationalists wish to be perceived as the “faithful dog” in the U.S-Japan alliance, as they resent the “lack of a healthy postwar nationalism,” she said. Restarting some of the country’s nuclear power plants after the Fukushima Daiichi accident was even described by one leading Japanese politician as the first step toward the country acquiring nuclear weapons of its own, she added.

Though some Japanese scholars argue that Japan has been preparing for the acquisition of nuclear weapons since the end of WWII, Romei said that the link between the two sides of the nuclear coin was never really visible in Japan: indeed, the government has historically succeeded in making a sharp distinction between nuclear power for peaceful vs. military purposes.

‘Still very sensitive’

One well-known trait of Japan’s nuclear history is that Japan has a strong popular peace and anti-nuclear movement with public opinion polls set against acquiring nuclear weapons, Romei said. Peace, security, and nuclear matters are in fact deeply linked in postwar Japanese history.

“The constant and consistent work of peace associations and the massive organized demonstrations against Prime Minister Abe’s security reform plans that took place across Japan during the entire summer in 2015 are a relevant sign that public opinion is still very sensitive to a change of pace,” she wrote.

But public opinion and elite opinion “do not speak the same language and are heading in different directions,” she wrote. Elites – political  and  thought leaders, for example – continue to allude to a nuclear option for Japan to defend itself unilaterally, with or without the American nuclear umbrella.

“This sudden proliferation of nuclear statements among Japanese elites  in 2002 has been directly linked by Japan watchers to the break out of the second North Korean nuclear crisis and the rapid buildup of China’s military capabilities,” Romei said.

Trusting America?

But those external threats, she said, are actually used as a “pretext to solve a more deep-rooted and long-standing anxiety that stems from Japan’s own unsuccessful quest for a less reactive, and more proactive post-Cold War identity,” Romei noted.

The level of trust that Japanese elites feel towards their American ally is an important leitmotiv in the country’s nuclear debate, she said.

While during the Cold War U.S. credibility was mainly linked to Japan’s limited role as an ally in a bipolar era, after the collapse of this system Japanese elites slowly began their quest for a new identity, thus questioning and changing the meaning of the U.S.-Japan alliance, Roemi said. Furthermore, the first decade of the 21st century brought about a new nationalist layer that complicates the issue of trust in the ally by adding a populist tone to the domestic nuclear debate.

Romei believes that if the gap in elite-public opinion continues to widen, Japan’s longstanding “nuclear allergy” could be overwhelmed as the government – not necessarily by design – gradually creates the political and cultural conditions that seemingly justify building nuclear weapons, Romei said.

“The turn of the century brought a new strategic environment in which Japan was forced to question its own post-Cold War identity, without eventually succeeding in an actual change,” she wrote.

Romei urges a careful monitoring of Japan’s nuclear debate moving forward – the major political shift in the U.S. caused by the November 2016 presidential elections is a key reason. America’s future political direction will ultimately affect Japan’s sense of identity by easing the questioning of the U.S.-Japan security arrangement.

While the study of the Japanese nuclear debate cannot necessarily offer a prediction of the country’s future nuclear policy choices, it can serve as an important tool to gauge the evolution of Japan’s own perception of its role in the current world order, she said.

Romei is a nuclear security predoctoral fellow at CISAC for 2016-2017 and a doctoral candidate in international relations at Roma Tre University in Rome, Italy. Her dissertation focuses on the relationship between Japan’s nuclear mentality and its identity evolution in the post-WWII era. 

MEDIA CONTACTS:

Sayuri Romei, Center for International Security and Cooperation: (650) 725-5364, sromei@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 

 

All News button
1
Paragraphs

Sayuri Romei, a political scientist and predoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), has a new working paper that shows Japan is an increasingly divided country between elites and the public as it grapples with whether it should acquire nuclear weapons itself and not rely on America’s protection.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Center for International Security and Cooperation (CISAC)
News Type
News
Date
Paragraphs

(The following interview with CISAC's Siegfried Hecker appeared in the May 15 issue of the Bulletin of the Atomic Scientists.)

By Elisabeth Eaves

Siegfried Hecker has the rare distinction of being an American who has visited both North Korean and Russian nuclear facilities. An expert on plutonium science and a professor at Stanford University’s Center for International Security and Cooperation, Hecker is also a former director of the Los Alamos National Laboratory. Here he answers questions on Pyongyang’s nuclear capabilities, its most recent missile test, and what influence the new president of South Korea might have on the regional balance of power. He explains how North Korea developed its arsenal despite global opposition, and says there is no conceivable way the United States can destroy all North Korean nuclear weapons with military might.

BAS: Is North Korea currently capable of delivering any nuclear weapons any distance? How do you know?

SH: We know they have nuclear weapons that work because they have tested five nuclear devices over a period of 10 years. That test experience most likely enables them to miniaturize nuclear warheads to make them small and light enough to mount on missiles. They have also demonstrated over many years that they can launch relatively short-range missiles reliably. We have to assume they can mate the warheads and the missiles so as to reach targets anywhere in South Korea and Japan.

BAS: What does Pyongyang’s most recent missile test, which took place on Sunday, tell us about their capabilities and intentions?

SH: The missile experts are still analyzing the test as North Korea releases details and photos. However, they already agree that this missile outperformed any previous North Korean missile launch. It is reported to have traveled nearly 800 kilometers (497 miles) for 30 minutes (splashing down in the Sea of Japan south of the Russian border) and reached an altitude in excess of 2000 km (1243 miles). Since it was launched in a lofted trajectory, it may be able to travel at least 4,000 km (2486 miles) if launched on a standard trajectory. 

This would make it a real intermediate-range ballistic missile that puts Guam within range. But the more important objective of this test was to move North Korea closer to having an intercontinental ballistic missile (ICBM). 

BAS: What sequence of events might lead Kim Jong-un to launch a nuclear attack on one of its neighbors like South Korea or Japan? 

SH: I cannot imagine any circumstance that would lead Kim Jong-un to launch an unprovoked nuclear attack on anyone. However, we know so little about him and even less about the military that controls the country’s strategic rocket forces that we can’t rule out a miscalculation or a desperate response to a crisis. It is conceivable that they believe a small nuclear weapon could be used to de-escalate or terminate a conventional confrontation on their terms. 

BAS: How big is the largest nuclear bomb tested by North Korea, and can you give a sense of the level of damage such a bomb would cause? 

SH: The highest yield of the North Korean tests to date is in the range of 15 to 25 kilotons—an explosive power similar to the bombs that destroyed Hiroshima and Nagasaki, causing roughly 200,000 immediate fatalities and lingering radiological health effects for many survivors. If such a weapon were to be exploded over Seoul, it is possible that several hundred thousand people or more would perish. 

BAS: If Pyongyang were to attack South Korea or Japan, what would be the immediate and longer-term effects?

SH: The immediate effects would be horrific, the longer-term effects catastrophic. If several bombs exploded over South Korean or Japanese cities, there could be a million or more casualties. Beyond that, the cities would face massive evacuations and long-term building and grounds decontamination efforts. Dangerous radioactive clouds would drift over South Korea, Japan, China, or Russia, depending on the wind flow. An international order would be destroyed. 

BAS: How close is North Korea to being able to attack somewhere as far distant as the United States with a nuclear weapon? What technical leaps does it need to make to achieve that capability?

SH: I believe that North Korea does not yet have the capability to reach the US mainland with a nuclear-tipped missile. It has a very sparse and not very successful long-range rocket test history, although the missile test on Sunday brings it somewhat closer. Its solid-fueled rockets, which are of greatest concern because they can be launched quickly and from hidden locations, have failed regularly. It will need to miniaturize warheads to a much greater extent than it is currently likely capable of doing, and the warheads will have to survive the stresses at launch and the high temperatures and stresses during re-entry. At the current pace, North Korea may be able to make the technological progress required for a nuclear-tipped ICBM in five or so years. 

One corollary question that one must ask, however, is why would North Korea want to strike the US mainland? It is quite clear that it wants to threaten Washington with such a capability, but to launch would be suicidal, and I don’t believe the regime is suicidal. 

BAS: Besides being able to threaten the United States and its allies, what else could the Kim regime be trying to accomplish with its nuclear weapons?

SH: We need to look closely at how the North’s growing nuclear arsenal may change its domestic policies and foreign relations. Domestically, the nuclear arsenal may help justify the regime’s continued call for sacrifice by its citizens. But it may also provide a more solid foundation for the state’s security, allowing it to devote more resources to economic growth. Foreign visitors have reported that living conditions in Pyongyang have improved markedly in the past few years despite international sanctions. Kim Jong-un has officially promoted the dual policy of military and economic growth. 

Looking abroad, the regime’s nuclear arsenal could make it more aggressive in dealings with South Korea and the rest of the region. We have not seen a return to the North’s especially aggressive behavior of the late 1960s. Nevertheless, being one of fewer than 10 states in the world with nuclear weapons may change Pyongyang’s foreign policy toward its neighbors. And we don’t know how possessing a nuclear arsenal will affect the regime’s behavior in a crisis. 

BAS: Is it plausible that a US pre-emptive strike could destroy all North Korean nuclear weapons, fissile material, and nuclear production facilities? Why or why not?

SH: There is no conceivable way the United States could destroy all North Korean nuclear weapons. It is not possible to know where they all are. Even if a few could be located, it would be difficult to destroy them without causing them to detonate and create a mushroom cloud over the Korean peninsula. 

It is even less likely that the United States could locate and demolish all of the North’s nuclear materials. Missile launch sites could be destroyed, nuclear test tunnels could be bombed, production sites could be destroyed, and North Korean missiles could possibly be intercepted after launch. But North Korea is developing road-mobile and submarine-launched missiles, which cannot be located reliably. New test tunnels can be dug. And while we know North Korea has covert production facilities, we don’t know where they are. The US military may not be able to intercept missiles after launch. The bottom line is, military strikes could be used to set back the North Korean nuclear program but not to eliminate it.

Moreover, I believe the US and South Korean governments consider the consequences of any military intervention unacceptably high—in spite of the proclamation that “all options are on the table.” I believe the military option will only really be on the table if North Korea initiates military actions. 

BAS: There is talk that North Korea is about to conduct a sixth nuclear test. What do you make of these reports? Do you have any insight into what to expect?

SH: North Korea has ample technical reason to test again as it moves toward developing a credible nuclear-tipped ICBM. The test site appears to be ready. I believe the only thing that inhibits them from testing is the political fallout they would face—particularly from China and the new South Korean administration.

BAS: You recently estimated that North Korea has 20 to 25 nuclear weapons. How do we know?

SH: My estimate that it has sufficient plutonium and highly enriched uranium for 20 to 25 nuclear weapons is highly uncertain because we know so little about its uranium enrichment capacity. All estimates are to a large extent based on the observations my Stanford colleagues and I made during my last visit to Yongbyon in November 2010. To my knowledge, no outsiders have been in their nuclear complex since. So the only direct evidence we have is from that 30-minute tour and discussions with their experts at the centrifuge facility. The rest of the estimate is based on indirect evidence—that is, satellite imagery, and what North Korea chooses to publicize, combined with modeling of their capabilities and acquisitions. 

BAS: North Korea carried out its first nuclear test in 2006. How was it able to go from that widely condemned first test to today’s arsenal despite global opposition? 

SH: How they developed a threatening nuclear arsenal despite global opposition is a sad reflection on unwise US policies and the international community’s approach to preventing nuclear proliferation. Controlling the supply side of proliferation has been the predominant international mechanism for halting nuclear weapons development, but it failed terribly in the North Korean case. The international export system is leaky enough that a determined government can develop indigenous bomb-building capabilities over time. In North Korea, this process was exacerbated by the fact that once they built the Bomb, sanctions and isolation allowed them to build a whole arsenal instead of forcing them to give it up.

Insufficient attention has been paid to the demand side—that is, to why states want nuclear weapons and what can be done to influence the decision to acquire them. In the North Korean case, the Clinton administration greatly slowed North Korea’s drive to the Bomb with diplomacy. The Bush administration rejected diplomacy, but was unprepared for the consequences. It stood by while North Korea built a nuclear weapon. Subsequent attempts at diplomacy amounted to too little, too late. (This should serve as a lesson on the Iran nuclear agreement: if you kill a deal, you better be prepared for the consequences). The Obama administration was greeted with a North Korean nuclear test in 2009 and was never able or willing to pursue diplomacy effectively. It relied on two tactics, imposing sanctions and pressuring China, while North Korea continued to build its arsenal. Washington and Beijing never got on the same page on how to deal with Pyongyang. 

BAS: South Korea just elected a new president who takes a more conciliatory approach to North Korea than his predecessor. How might this affect the North’s nuclear activities?

SH: In the end, the Korean peninsula nuclear crisis has to be resolved to the satisfaction of the Korean people. South Korean President Moon Jae-in favors diplomatic engagement with North Korea. I believe that at this point, it is imperative for Seoul and Washington to craft a unified strategy on North Korea and speak with one voice. That voice should reflect the new South Korean president’s views on finding a diplomatic resolution. I hope that the Trump administration will support President Moon, and that Pyongyang won’t pre-empt diplomacy with a nuclear or long-range missile test. 

BAS: If you were advising president Trump, what would you tell him to do in the next month regarding North Korea? In the next six months? The next year?

SH: In the next few weeks, after consultation with President Moon, President Trump should send an envoy to Pyongyang to tackle the most immediate danger—that is, to avoid a nuclear detonation on the Korean peninsula. There is a danger that overconfidence or miscalculation by Kim Jong-un, or an unpredictable reaction to a crisis, could result in a nuclear detonation. I also have serious concerns about a nuclear-weapon accident in North Korea, particularly if Pyongyang feels threatened and begins to deploy its nuclear arsenal. Moreover, in the case of upheaval or chaos in the North, who will control the weapons, and what will become of them? 

The next six months should be followed up with additional bilateral US-North Korea dialogue, with Washington separately keeping Seoul and Beijing informed. Washington should stress the seriousness of the situation, but also listen to the North’s concerns. 

These dialogues may then lay the foundation within the next year for a resumption of multilateral negotiations to halt, roll back, and eventually eliminate North Korea’s nuclear weapons. Talks could also lay the groundwork for normalizing relations between the North and its neighbors and the United States.

Follow CISAC at @StanfordCISAC and www.facebook.com/StanfordCISAC.

MEDIA CONTACTS:

Siegfried Hecker, Center for International Security and Cooperation: (650) 725-6468, shecker@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 
All News button
1
Authors
Amy Zegart
News Type
News
Date
Paragraphs

(Amy Zegart, co-director of the Center for International Security and Cooperation, wrote the following essay for The Atlantic.)

Today The Washington Post dropped the bombshell that President Trump had revealed classified information about the Islamic State to Russian Foreign Minister Sergei Lavrov and Russian ambassador Sergey Kislyak when the three of them met at the White House last week. You know a story is big when it gets as many concurrent visitors as the story about the infamous Access Hollywood video. There was no hiding near bushes in the dark this time to walk back the damage. Deputy National-Security Advisor Dina Powell declared the story “false,” and the administration also called out the big guns, with Secretary of State Rex Tillerson and National Security Advisor H.R. McMaster dutifully rushing into the breach to discuss the breach, using oh-so-carefully worded statements about how the president did not reveal “sources or methods” or any “military operations” that were not already known publicly.

So just how bad is the damage? On a scale of 1 to 10—and I’m just ball parking here—it’s about a billion. The story, which has since been confirmed by The Wall Street Journal, The New York Times, Reuters, Buzzfeed, and CNN, notes that the president could have jeopardized a critical source of intelligence on the Islamic State. Not America’s source. Somebody else’s. Presumably from an allied intelligence service who now knows that the American president cannot be trusted with sensitive information.

The type of information Trump cavalierly shared fell under a classification known as “code word,” according to the Post. There are three basic levels of classified information. Confidential information is defined as anything that could reasonably be expected to “cause damage” to American national security if shared without authorization. Secret information is one step up, considered to have the potential to cause “serious damage” if revealed. Top Secret information is a higher classification level still, comprising anything that could reasonably be expected to cause “exceptionally grave damage” to U.S. national security if revealed.

Code word is beyond Top Secret. It limits access to classified information to a much narrower pool of people to provide an extra layer of security. Many secrets are super-secrets—Harry Truman, as vice president, didn’t know about the Manhattan project. He learned of it only after Franklin Delano Roosevelt died and Truman was sworn in as president. Code word classification is so far off the scale, even fake spies rarely refer to it in the movies. Technically, the president can "declassify" anything he wants, so he did not violate any laws. But as Lawfare notes, if the president tweeted out the nuclear codes, he also wouldn't violate the law—but he would rightly be considered unfit for office.

Did Trump reveal intelligence crown jewels or just boast about the fact that he liked diamonds? According to the Post he revealed information about a purported ISIS plot involving laptops. It’s likely, however, that Tillerson, McMaster, the Postand the Times are ALL correct: The president did not reveal sources or methods or military operations. But that doesn’t matter much if he gave away information that will enable the Russians to identify the source or the methods. It looks like he did, since according to the Post’s account he talked about the content of a specific plot, the potential harm, and the location of the city in the Islamic State’s territory where the allied state’s intelligence service detected it. It was almost everything except the GPS coordinates. The denials by Tillerson and McMaster are a classic case of intelligence super-parsing—saying things that are technically and narrowly true but may not be accurate at all. No spin can hide the fact that the breach was deadly serious and reckless in the extreme.

Then there’s the impact on America’s unnamed ally, whom the Post reported was already nervous about sharing such sensitive intelligence with the United States. It is difficult to penetrate the Islamic State, and there is a major risk that this breach will close down a vital source. It’s an even bigger deal in the big picture, potentially jeopardizing intelligence cooperation with other U.S. allies around the world. Trump already raised intelligence eyebrows when he turned his Mar-a-Lago dining area into an impromptu Situation Room after the North Koreans decided to launch a ballistic missile. The president and his aides used the lights on cell phones to illuminate field reports, in full view of resort dinner guests snapping photos. If you’re known as someone who cannot keep a secret, the world’s secret-keepers are not going to tell you much.

“Can you believe the world we live in today?” President Trump said, according to one official in the two Sergeis meeting. “Isn’t it crazy?”

Yes, Mr. President. It’s crazy.

All News button
1
Authors
Kim Jae-kyoung
Kim Jae-kyoung
News Type
News
Date
Paragraphs

This is the eighth and last in a series of interviews by the Korea Times on North Korea. CISAC's Siegfried Hecker is featured in this story below by Kim Jae-kyoung:

 

NK estimated to have ability to produce 7 nuclear bombs a year

By Kim Jae-kyoung

A world-renowned nuclear scientist said that U.S. President Donald Trump must to talk to North Korean leader Kim Jong-un by sending an envoy to Pyongyang to avoid a nuclear catastrophe.

"I believe the first talks should be bilateral and informal by a presidential envoy talking directly to Kim Jong-un," said Siegfried S. Hecker, a senior fellow at the Center for International Security and Cooperation (CISAC) at Stanford University, in an interview.

"I believe both Seoul and Beijing would support such talks. These talks may then also help to build the foundation for renewed multilateral negotiations, which, first and foremost must involve South Korea, as well as China," he added.

Hecker, the co-director of CISAC from 2007 to 2012, has visited North Korea several times to assess the plutonium program at the Yongbyon Nuclear Scientific Research Center since 2004.

He stressed that it is most important to convey the message that nuclear weapons cannot be used under any circumstances.

"There is no such thing as a limited nuclear war. Any explosion of a nuclear device on the Korean Peninsula is a catastrophe of indescribable proportions," he said.

The internationally recognized expert in plutonium science, global threat reduction and nuclear security said that the Trump administration and the new South Korean government face the challenge of avoiding a nuclear detonation on the Korean Peninsula.

He believes that such an incident could result from a miscalculation or overconfidence by the Kim Jong-un regime as well as an accident with the nuclear weapons in the North.

"A conventional confrontation may turn nuclear with an inexperienced leader in charge," he said. "Or, in the case of instability in the North, who will control the nuclear weapons? These are serious concerns that must be addressed now," he added.

Hecker, who served as the director of the Los Alamos weapons laboratory in New Mexico, the birthplace of the atomic bomb, from 1986 to 1997, estimated that North Korea, although he is uncertain, may have sufficient material for 20 to 25 nuclear weapons.

NK's nuclear capabilities evolving 

He explained that the size of its nuclear arsenal depends primarily on how much plutonium and highly enriched uranium North Korea has produced.

"The sophistication of the arsenal depends primarily on nuclear testing. With five nuclear tests conducted over 10 years, North Korea is likely able to produce nuclear devices small enough to fit on missiles that can reach all of South Korea and Japan," he said.

He also estimated that the totalitarian country can produce sufficient plutonium and highly enriched uranium for six to seven bombs per year.

"However, all estimates are uncertain because we know little about the North's capacity to produce highly enriched uranium since it is not possible to monitor such facilities from afar," he said.

In his view, the world does not have to accept the reclusive country as a "nuclear weapons state," but it must be treated as a country with a nuclear arsenal.

"Whether we like it or not, North Korea is a country with nuclear weapons," he said. "The final aim is to have a denuclearized Korean Peninsula, but that will take time. It will have to be done in sequence of halt, roll back and then eliminate."

However, Hecker dismissed North Korea's claim that it has the capability to fire an intercontinental ballistic missile (ICBM) all the way to the U.S. mainland.

"I do not believe North Korea is capable of reaching the U.S. mainland with a nuclear-tipped missile today. It is working on developing such a capability, but it will likely take another five years or so," he said.

Hecker explained that it has not demonstrated all the aspects of necessary rocket technology or the ability to make a nuclear warhead small enough to be able to survive atmospheric reentry.

"Besides, to actually launch a nuclear warhead on an ICBM you must have complete confidence that it will not blow up on the launch pad," he added. "They cannot have such confidence based on their missile launch history."

All News button
1
Authors
News Type
News
Date
Paragraphs

While the United States has no peers in conventional military power, it is especially vulnerable – as a free and democratic society – to cyber misinformation campaigns, a Stanford scholar says.

Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation (CISAC), is the co-author of a new draft working paper that spells out the perilous risks facing democratic, wired-up countries around the world.

America’s adversaries are seeking “asymmetric” methods for social disruption, rather than direct military conflict, Lin said.

“Cyber warfare is one asymmetric counter to Western (and especially U.S.) military advantages that depend on the use of cyberspace,” wrote Lin and his co-author Jackie Kerr, a research fellow at the Lawrence Livermore National Laboratory.

This new type of cyber aggression is aimed at winning – and confusing – hearts and minds, the very control centers of human existence, Lin said.

As a result, “information/influence warfare and manipulation,” or IIWAM as Lin describes it, poses profound implications for Western democracies, even though much of it may not be illegal under international law. This approach is based on the deliberate use of information by one party on an adversary to confuse, mislead, and ultimately to influence the choices and decisions that the adversary makes.

A recent example in point would be the 2016 Russian hacking of the U.S. presidential election and the surge of so-called “fake news.”

Lin points out that while misinformation campaigns are not new, the technology to spread it far and wide globally is. He noted that the patron saint of distorting reality for war-like purposes is Sun Tzu, who wrote that, “The supreme art of war is to subdue the enemy without fighting.”

While traditional cyber attacks typically hit hard targets like computer systems, cyber “influence” campaigns are conducted over longer periods of time and rely on soft power – propaganda, persuasion, culture, social forces, confusion and deception, Lin said. 

Words and images

How does it work? Lin explains:

“Victory is achieved by A when A succeeds changing B’s political goals so that they are aligned with those of A.  But such alignment is not the result of B’s 'capitulation' or B’s loss of the ability to resist – on the contrary, B (the losing side) is openly willing.”  That is, such victory shares the focus on subverting the opponent’s will, though not on destroying his military forces.

The ammunition in these cyberspace battles are “words and images,” the kind that persuade, inform, mislead, and deceive so that the adversary cannot respond militarily. In the example of a “fake news” story, they often take place below legal thresholds of “use of force” or “armed attack,” and at least in an international legal sense, do not trigger a military response.

The target is the “adversary’s perceptions,” which reside in the “cognitive dimension of the information environment.” In other words, such cyber warfare focuses on “damaging knowledge, truth, and confidence, rather than physical or digital artifacts,” according to Lin. It is the “brain-space.”

Additionally, IIWAM injects fear, anger, anxiety, uncertainty, and doubt into the adversary’s decision making processes, he added.  Success is defined as altering such perceptions so the target makes choices favoring the aggressor.

“Sowing chaos and confusion is thus essentially operational preparation of the information battlefield – shaping actions that make the information environment more favorable for actual operations should they become necessary,” the researchers wrote.

These cyber manipulations often prey upon cognitive and emotional biases present in the psychological and mental makeup of human beings, Lin said. 

For example, media channels such as Fox News play to “confirmation bias” for individuals with a right-of-center orientation, and similarly for MSNBC for those with a left-of-center, orientation, he wrote. Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories.

Countering misinformation

“Naming and shaming” is probably ineffective against many nation states conducting cyber disinformation campaigns, Lin said. And the idea that a government like the U.S. can quickly respond to misinformation created in the private sphere is unlikely to be effective as well.

What, then, might work? Lin suggests new tactics are needed, as no existing approach seems adequate. For example, Facebook is deploying a new protocol for its users to flag questionable news sites.  Google has banned fake news web sites from using its online advertising service. Twitter, YouTube, and Facebook shut down accounts that they determine are promoting terrorist content.  He noted that a recent Facebook letter from CEO Mark Zuckerberg states that, “Our approach will focus less on banning misinformation and more on surfacing additional perspectives and information, including that fact checkers dispute an item's accuracy.”

But such measures are unlikely to stem the “rising tide of misinformation conveyed” through cyber warfare, Lin said, because they mostly require users to do additional mental work.  

Wired world riskier

Today’s Internet-driven Western world offers countless opportunities for cyber influence mischief, Lin wrote.

“Democracy has rested on an underlying foundation of an enlightened, informed populace engaging in rational debate and argument to sort out truth from fiction and half-truth in an attempt to produce the best possible policy and political outcomes,” Lin wrote.

Cyber manipulators have exploited an arguable gap between ideals and reality in democratic systems – “rendered it much more questionable” – through the tremendous reach and speed of misinformation, he said. Many countries cannot deal with the onslaught of such focused efforts. This serves to make the democratic process look weak and unstable in the eyes of its citizens. The same dynamic does not apply equally around the world.

“Cyber weapons pose a greater threat to nations that are more advanced users of information technology than to less-developed nations,” Lin wrote.

He said that less developed or authoritarian countries do not have much Internet infrastructure or that wield control over expression – North Korea is an example.

MEDIA CONTACTS

Herbert Lin, Center for International Security and Cooperation: (650) 497-8600, herbert.s.lin@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-0224, cbparker@stanford.edu

 

 

 

All News button
1
Subscribe to