Military
Paragraphs

This is the fourth and final volume in a pioneering series on the Chinese military. It begins with an examination of Chinese military culture and history, with special attention to the transition from Mao Zedong's revolutionary doctrine and the conflict with Moscow to Beijing's preoccupation with Taiwanese separatism and preparations for war to thwart it. Because such a war might involve the United States, the Chinese have concentrated on measures to deter American intervention. Part II focuses on the military and decisionmaking, first in the National Command Authority and then in the People's Liberation Army's command-and-control prioritizing system. Part III provides a detailed study of the Second Artillery, China's strategic rocket forces. Based in part on interviews, the book provides an unprecedented look at its history, operational structure, modernization, and strategy. This is followed by a historical account of the air force's long effort to modernize and its role in joint operations and air defense. The book concludes with the transformation of military strategy and shows how it is being tested in military exercises with Taiwan and the United States as "imagined enemies."

A Chinese translation by Litai Xue was published by Mirror Books, Hong Kong, in 2007.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
-

Dr. Mohamed ElBaradei is the Director General of the International Atomic Energy Agency (IAEA), an intergovernmental organization that is part of the United Nations system. He was appointed to the office effective December 1, 1997, and reappointed to a third term in September 2005.

Dr. ElBaradei was born in Cairo, Egypt, in 1942. He earned a Bachelor´s degree in Law in 1962 at the University of Cairo, and a Doctorate in International Law at the New York University School of Law in 1974. He began his career in the Egyptian Diplomatic Service in 1964. From 1974 to 1978 he was a special assistant to the Foreign Minister of Egypt. In 1980 he left the Diplomatic Service to join the United Nations and became a senior fellow in charge of the International Law Program at the United Nations Institute for Training and Research. From 1981 to 1987 he was also an Adjunct Professor of International Law at the New York University School of Law.

In October 2005, Dr. ElBaradei and the IAEA were jointly awarded the Nobel Peace Prize for efforts "to prevent nuclear energy from being used for military purposes and to ensure that nuclear energy for peaceful purposes is used in the safest possible way." In addition, he has received multiple other awards for his work. These include the International Four Freedoms award from the Roosevelt Institute, the James Park Morton Interfaith Award, and the Golden Plate Award from the Academy of Achievement. Dr. ElBaradei is also the recipient of a number of honorary degrees and decorations, including a Doctorate of Laws from New York University and the Nile Collar - the highest Egyptian decoration.

Dr. ElBaradei is married to Aida Elkachef, an early childhood teacher. They have a daughter, Laila, a lawyer in private practice, and a son, Mostafa, a studio director with a television network, both of whom live and work in London, England.

Introduction by Professor John W. Etchemendy, Provost, Stanford University.

Memorial Auditorium
551 Serra Mall
Stanford University

Dr. Mohamed ElBaradei Director General, International Atomic Energy Agency Keynote Speaker

CISAC
Stanford University
Encina Hall, E202
Stanford, CA 94305-6165

(650) 725-2715 (650) 723-0089
0
The Caroline S.G. Munro Professor of Political Science
The Bass University Fellow in Undergraduate Education  
Senior Fellow, Freeman Spogli Institute for International Studies
rsd25_073_1160a_1.jpg PhD

Scott D. Sagan is Co-Director and Senior Fellow at the Center for International Security and Cooperation, the Caroline S.G. Munro Professor of Political Science, and the Bass University Fellow in Undergraduate Education at Stanford University. He also serves as Co-Chair of the American Academy of Arts and Sciences’ Committee on International Security Studies. Before joining the Stanford faculty, Sagan was a lecturer in the Department of Government at Harvard University and served as special assistant to the director of the Organization of the Joint Chiefs of Staff in the Pentagon.

Sagan is the author of Moving Targets: Nuclear Strategy and National Security (Princeton University Press, 1989); The Limits of Safety: Organizations, Accidents, and Nuclear Weapons (Princeton University Press, 1993); and, with co-author Kenneth N. Waltz, The Spread of Nuclear Weapons: An Enduring Debate (W.W. Norton, 2012). He is the co-editor of Insider Threats (Cornell University Press, 2017) with Matthew Bunn; and co-editor of The Fragile Balance of Terror (Cornell University Press, 2022) with Vipin Narang. Sagan was also the guest editor of a two-volume special issue of DaedalusEthics, Technology, and War (Fall 2016) and The Changing Rules of War (Winter 2017).

Recent publications include “Creeds and Contestation: How US Nuclear and Legal Doctrine Influence Each Other,” with Janina Dill, in a special issue of Security Studies (December 2025); “Kettles of Hawks: Public Opinion on the Nuclear Taboo and Noncombatant Immunity in the United States, United Kingdom, France, and Israel”, with Janina Dill and Benjamin A. Valentino in Security Studies (February 2022); “The Rule of Law and the Role of Strategy in U.S. Nuclear Doctrine” with Allen S. Weiner in International Security (Spring 2021); “Does the Noncombatant Immunity Norm Have Stopping Power?” with Benjamin A. Valentino in International Security (Fall 2020); and “Just War and Unjust Soldiers: American Public Opinion on the Moral Equality of Combatants” and “On Reciprocity, Revenge, and Replication: A Rejoinder to Walzer, McMahan, and Keohane” with Benjamin A. Valentino in Ethics & International Affairs (Winter 2019).

In 2022, Sagan was awarded Thérèse Delpech Memorial Award from the Carnegie Endowment for International Peace at their International Nuclear Policy Conference. In 2017, he received the International Studies Association’s Susan Strange Award which recognizes the scholar whose “singular intellect, assertiveness, and insight most challenge conventional wisdom and intellectual and organizational complacency" in the international studies community. Sagan was also the recipient of the National Academy of Sciences William and Katherine Estes Award in 2015, for his work addressing the risks of nuclear weapons and the causes of nuclear proliferation. The award, which is granted triennially, recognizes “research in any field of cognitive or behavioral science that advances understanding of issues relating to the risk of nuclear war.” In 2013, Sagan received the International Studies Association's International Security Studies Section Distinguished Scholar Award. He has also won four teaching awards: Stanford’s 1998-99 Dean’s Award for Distinguished Teaching; Stanford's 1996 Hoagland Prize for Undergraduate Teaching; the International Studies Association’s 2008 Innovative Teaching Award; and the Monterey Institute for International Studies’ Nonproliferation Education Award in 2009.     

Co-director of the Center for International Security and Cooperation
CV
Date Label
Scott D. Sagan Director, Center for International Security and Cooperation Keynote Speaker
Conferences
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
-

How have intersecting legacies of colonialism and militarization combined with recent forces of globalization to produce new kinds of social identities and movements for political change? How do activists in these social movements contest hegemonic national identities in favor of a multicultural Japan or a global human rights discourse? How do legacies of Japanese colonialism animate current systems of globalization?

The first round table, entitled "Identity Politics and its Social Movements" will bring together a group of scholars examining current identity politics of "ethnic minorities" such as Ainu, Burakumin, Okinawans, and Zainichi (resident Koreans), many of whom are affected by the legacies of colonialism.

The second round table, "Gender, Colonialism, and Militarism in Japan and Okinawa" will focus on groups affected by continuing militarism and globalization such as sex workers, children born of military personnel and those organizing against military occupation and its attendant gendered violence. The invited speakers for this round table are the Okinawan writer, journalist and anti-military activist--Chinin Ushii, Margo Okazawa-Rey, co-founder of the US-East Asian-Puerto Rico Women's Net Work Against US Militarism, and Ueno Chizuko, the renown and highly influential feminist scholar. Japanese Studies Postdoctoral Fellows Michele Mason and Setsu Shigematsu will participate and act as facilitators for this round table.

Symposium Schedule:

9:00 am ~ Opening Comments by Workshop Organizers

9:30 - 11:00 ~ Roundtable One:

Global Human Rights, Identity Politics and Social Movements

Aiuchi, Toshikazu (Otaru University of Commerce)

Befu, Harumi (Stanford University)

Davis, John (Michigan State University)

Mushanokoji, Kinhide (Osaka University of Economics and Law)

Tsutsui, Kiyoteru (facilitator)(Stanford University/Stony Brook University)

15 minute Break

12:30~ Open discussion with all workshop participants facilitated by Kiyo Tsutsui

12:30 - 2:00 ~ Lunch break (buffet lunch)

2:00 - 3:30 ~ Roundtable Two:

Gender, Colonialism and Militarism in Okinawa and Japan

Chinin, Ushii (Okinawan public intellectual, writer and journalist)

Miho Kim (to be confirmed)

Okazawa-Rey, Margo (Professor Emerita, San Francisco State University and

co-founder East Asia-US-Puerto Rico - Women's Network Against Militarism)

Ueno, Chizuko (Tokyo University)

Mason, Michele (Facilitator)(Stanford University)

Shigematsu, Setsu (Facilitator)(Stanford University)

15 minute Break

3:45 - 5:00 ~ Open discussion with all workshop participants facilitated by Michele Mason and Setsu Shigematsu

5:00 pm ~ Closing Comments by workshop organizers

Co-Sponsored by the Stanford Society of Fellows in Japanese Studies and the Center

for East Asian Studies

CISAC Conference Room

Symposiums
-

Christopher Hitchens is a columnist for Vanity Fair. His most recent book is Thomas Jefferson: Author of America. His most recent collection of essays is titled Love, Poverty, and War. Mr. Hitchens, longtime contributor to The Nation, wrote a wide-ranging, biweekly column for the magazine from 1982 to 2002. With trademark savage wit, he flattens hypocrisy inside the Beltway and around the world, laying bare the "permanent government" of entrenched powers and interests. Mr. Hitchens has been Washington editor of Harper's and book critic for Newsday, and regularly contributes to such publications as Granta, The London Review of Books, Vogue, New Left Review, Dissent and the Times Literary Supplement.

Born in 1949 in Portsmouth, England, Mr. Hitchens received a degree in philosophy, politics and economics from Balliol College, Oxford, in 1970.

 

Event Synopsis:

In this presentation Mr. Hitchens presents a "balance sheet" from point of view of those, like him, who advocated regime change in Iraq and hoped that it would have positive effects in Saudi Arabia and Iran as well. He presents areas where progress has not materialized, such as attempts to revive Iraq's badly damaged oil industry. However, he points out political progress made by Kurds in the north of Iraq, and growing pressure on the regimes of Bashar al-Assad in Syria and Muammar Gaddafi in Libya. Attempts to "dry up the swamp" where terrorism breeds have not eliminated but have isolated Islamic fundamentalist terrorism. He urges the international community to "make friends" with moderate forces in Muslim countries which reject terrorism, and to pursue policies that continue to isolate extremist groups.

 A discussion period following the talk raised such questions as: Is there a secular democratic alternative to Hamas? In light of difficulties encountered in establishing democratic governance in Iraq, shouldn't there be a reassessment of the belief system that led to the Iraqi operation? What evidence can be found that Iraq was on the verge of collapse prior to the recent military intervention? How do the happenings in the Middle East translate into a policy regarding North Korea, which is vocal about acquiring weapons of mass destruction? With Saddam Hussein gone, can Iraq remain one country? Is there a risk that intervention in places like Iraq has a galvanizing effect on other enemy groups?

Reuben W. Hills Conference Room

Christopher Hitchens Author Speaker
Seminars
-

For nearly twenty years, an array of mainly Western governments, NGOs, and international organizations including the UN have tried to promote democracy in Burma using sanctions and diplomacy. The net result has been an ever more entrenched military dictatorship, a looming humanitarian crisis, and a possible resumption of armed conflict. How are we to think about this failure in international policy? Thant Myint-U will identify at the core of this external impotence a singularly ahistorical analysis of Burma, its 44-year-old dictatorship, and its even longer-running civil wars. He will also ask: Could things have been handled differently? What does Burmese history tell us about what is and is not possible today? And what are the prospects for constructive change?

Thant Myint-U is a senior visiting fellow at the International Peace Academy in New York City. In 1994-99 he was a fellow of Trinity College in Cambridge University where he taught Indian and colonial history. He has also served for many years in the United Nations, first in three different peacekeeping operations (in Cambodia and ex-Yugoslavia) and then at the United Nations Secretariat in New York. In 2004-05 he was in charge of policy planning in the UN's Department of Political Affairs. He has written two books on Burma: and The River of Lost Footsteps (2006) and The Making of Modern Burma (2000). He was educated at Harvard and Cambridge Universities and completed a PhD in modern history at Cambridge in 1996.

Daniel and Nancy Okimoto Conference Room

Thant Myint-U Fellow, Centre for History and Economics Speaker King's College, Cambridge University
Seminars
-

Jacob N. Shapiro is a graduate student in political science at Stanford University and a homeland security fellow at CISAC. He is also an associate at the Combating Terrorism Center at the United States Military Academy and teaches on terrorist financing at the Naval Postgraduate School. His research focuses on the organizational dynamics of terrorist groups. His current projects use economic and sociological organization theory to examine the interactions between individual motivations and organizational structure in covert groups. As a Naval Reserve officer he was assigned to the Office of Naval Intelligence and the Naval Warfare Development Command. Prior to attending Stanford, he served on active duty at Special Boat Team 20 and onboard the USS Arthur W. Radford (DD-968). He received his BA with honors in political science from the University of Michigan.

Reuben W. Hills Conference Room

Jacob N. Shapiro Speaker
Seminars
Subscribe to Military