Military
Paragraphs

Report of the South Asia and the Nuclear Future workshop hosted on June 4 and 5, 2004, by the Center for International Security and Cooperation (CISAC) at Stanford University, to address question of nuclear weapons and stability in South Asia. The workshop, which brought together approximately 75 scholars, military officers, civilian policy-makers, scientists, and journalists, was co-sponsored by CISAC and the U.S. Army War College.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CISAC
Authors
Paragraphs

Our DNA contains the most intimate details of who we are -- including secrets even we don't know about ourselves. Should the government have control over our genetic information, when we have not been found guilty of any crime?

Proposition 69 would do just this. Privacy advocates from across the political spectrum have begun to raise red flags about this potential expansion of government power.

Six years ago, California's DNA and Forensic Identification Data Base and Data Bank Act gave the state the authority to collect the genetic material of felons convicted of violent crimes, such as murder, rape and other sexual offenses. The idea was to establish a database like the fingerprint and criminal record information bank that already exists.

California was not alone in incorporating DNA provisions into its penal code -- every state introduced DNA databases for the most serious crimes. But California's version lacked protections guaranteed elsewhere. Many states retained only the DNA "fingerprint" or profile and destroyed the original sample. California not only kept the full genetic information, but it also has steadily expanded the number of qualifying offenses.

Gov. Arnold Schwarzenegger signed a ballot argument in support of Proposition 69 in July. If approved by voters on Nov. 2, it would unleash the government to gather this information to a degree and among unprecedented numbers of people. Proposition 69 extends collection to every felonious offense and, within five years, requires every adult and juvenile in California arrested for -- but not convicted of -- a felony to provide the government with cells containing his or her complete genetic structure.

Proposition 69 does not stop there. It would apply retroactively, empowering the government to seek out individuals previously arrested for a felony but found not guilty, and require them to turn over their DNA.

The extension to all felony arrests means a radical expansion in the number of citizens deprived of control over their genetic material. Felonies range from computer hacking and shoplifting, to writing bad checks and fraudulently procuring services.

The numbers are significant. In his advance release of Crime in California 2003, state Attorney General Bill Lockyer reported in July that there were just over half a million felony arrests -- not convictions -- in the state. Under Proposition 69, all 507,081 would be required to relinquish their genetic material -- even though statistics show that approximately one third of those arrested would have the charges dismissed or be found not guilty in a court of law.

The idea that you could easily retract your DNA from this felony database is fiction. Once an individual is found to be innocent, he or she could apply to have material removed, but the state would not be required to do so. Following the initial hearing, no appeal would be allowed.

Perhaps of greatest concern is the very real possibility of error. A recent Stanford University study showed that even sophisticated laboratories exhibit up to a 3 percent error rate in the handling and coding of genetic material. Of the half a million citizens from whom DNA would be collected annually, 15,000 might have their name associated with the wrong sample. Even if the error rate was significantly less -- 3/10 of a percent -- there would still be 1,500 people associated with the wrong DNA sample. And it would be extremely difficult for citizens to find out about, much less rectify, such mistakes.

Proposition 69 shrouds the system in secrecy. It prevents citizens or the courts from obtaining information about the structure of the data bank or database, or the software program in operation. Simultaneously, it makes information available to private laboratories, third parties assisting with statistical analysis, auditing boards, attorney general offices, local law enforcement and federal DNA databases.

The safeguards against misuse are inadequate. The initiative limits the ceiling of liability and exempts government employees or third parties from further civil or criminal penalties. It fails to protect against the threat of felony arrests as a tool for interrogation or the use of felony charges as a way to collect DNA from particular populations.

Behind the immediate and obvious privacy concerns lie deeper issues: We don't yet know how genetic information can -- or will -- be used. So we don't know the full extent of the rights we will relinquish.

We know that genes provide information about parentage and familial relationships, propensity for particular diseases, and biological vulnerabilities. We don't yet know the link between genes and personality, how to clone individuals, or how genetic structures can be altered once their content is known. When these and other discoveries are made, and efforts are made to take advantage of them, it will be too late.

Even seemingly innocuous information appears different depending on context: Within two days of the attack on Pearl Harbor, the Census Bureau provided the military with a list of the number of Japanese Americans in specific neighborhoods. In less than 90 days, the Army "evacuated" 110,442 citizens from the West Coast. DNA contains far more information than simple ancestry.

Even as science wrestles with the implications of the Human Genome Project, there will be repeated efforts to create a universal database that catalogs our biological inheritance. But every attempt to expand this awesome power should be met with skepticism and careful discussion about the implications of giving up control over the very essence of our being. We need to think hard about where we draw the line. A system that captures innocent citizens' DNA, lacks transparency, and fails to adequately protect the gathered information against future misuse goes too far.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
San Francisco Chronicle
Authors
Submitted by fsid9admin on

This curriculum unit examines three case studies of ongoing regional wars—Afghanistan, Democratic Republic of the Congo, and Kashmir—and one past regional war, Guatemala. Students are introduced to these wars in their historical and global context, as well as in the context of efforts to establish and maintain peace.

Paragraphs

Among the constellation of states with interesting constitutional stories to tell, tiny Moldova holds a unique place. It is one of only a handful of countries that has ever switched the structure of its constitutional system midstream without experiencing a democratic breakdown. Whereas some countries, such as Nigeria, have been able to adopt a different kind of constitution following their return to democracy - after a military or authoritarian regime has been swept from power - only a handful have ever managed to change their institutions midstream without experiencing such an intervening crisis.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CDDRL Working Papers
Authors
Paragraphs

Suicide attacks occur in the context of a conflict between warring groups, supported by an organization and sometimes even by families and communities which proudly sacrifice their children. Their design and planning, the construction of weapons and associated equipment, the recruitment of trainers and attackers, and the actual execution all occur within a group engaged in a conflict. Understanding the use of suicide attacks as a tactic of war requires understanding all the factors identified in the study of diplomacy and military strategy - military capability of the warring parties, terrain, payoffs and costs, etc. But that is not enough. Understanding suicide attacks also requires heightened attentiveness to support among the general population, for suicide attacks would not long endure without popular support. Understanding the social climate is thus a key ingredient in understanding suicide attacks.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CDDRL Working Papers
Authors
Eva Meyersson Milgrom
Paragraphs

BACKGROUND: Given the threat of bioterrorism and the increasing availability of electronic data for surveillance, surveillance systems for the early detection of illnesses and syndromes potentially related to bioterrorism have proliferated.

PURPOSE: To critically evaluate the potential utility of existing surveillance systems for illnesses and syndromes related to bioterrorism.

DATA SOURCES: Databases of peer-reviewed articles (for example, MEDLINE for articles published from January 1985 to April 2002) and Web sites of relevant government and nongovernment agencies.

STUDY SELECTION: Reports that described or evaluated systems for collecting, analyzing, or presenting surveillance data for bioterrorism-related illnesses or syndromes.

DATA EXTRACTION: From each included article, the authors abstracted information about the type of surveillance data collected; method of collection, analysis, and presentation of surveillance data; and outcomes of evaluations of the system.

DATA SYNTHESIS: 17 510 article citations and 8088 government and nongovernmental Web sites were reviewed. From these, the authors included 115 systems that collect various surveillance reports, including 9 syndromic surveillance systems, 20 systems collecting bioterrorism detector data, 13 systems collecting influenza-related data, and 23 systems collecting laboratory and antimicrobial resistance data. Only the systems collecting syndromic surveillance data and detection system data were designed, at least in part, for bioterrorism preparedness applications. Syndromic surveillance systems have been deployed for both event-based and continuous bioterrorism surveillance. Few surveillance systems have been comprehensively evaluated. Only 3 systems have had both sensitivity and specificity evaluated.

LIMITATIONS: Data from some existing surveillance systems (particularly those developed by the military) may not be publicly available.

CONCLUSIONS: Few surveillance systems have been specifically designed for collecting and analyzing data for the early detection of a bioterrorist event. Because current evaluations of surveillance systems for detecting bioterrorism and emerging infections are insufficient to characterize the timeliness or sensitivity and specificity, clinical and public health decision making based on these systems may be compromised.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of Internal Medicine
Authors
Douglas K. Owens
-

U.S. President George W. Bush came to power emphasizing that he did not regard nation-building as an appropriate activity for the U.S. military. As he prepares to run for re-election, the United States is engaged in two of the most ambitious nation-building projects in its history in Afghanistan and Iraq. The U.S. undertook a lead role in part because of the circumstances in which the two conflicts commenced, but also as an extension of the present administration's more general opposition to multilateral institutions such as the United Nations. Though the United States determined that it did not need the UN going into Iraq, however, it appears that it has belatedly realized it might need the UN in order to get out.

Simon Chesterman is Executive Director of the Institute for International Law and Justice at New York University School of Law. Prior to joining NYU, he was a Senior Associate at the International Peace Academy and Director of UN Relations at the International Crisis Group in New York. He had previously worked for the Office for the Coordination of Humanitarian Affairs in Belgrade and at the International Criminal Tribunal for Rwanda in Arusha.

He is the author of You, The People: The United Nations, Transitional Administration, and State-Building (Oxford University Press, 2004) and Just War or Just Peace? Humanitarian Intervention and International Law (Oxford University Press, 2001), which was awarded the American Society of International Law Certificate of Merit. He is the editor, with Michael Ignatieff and Ramesh Thakur, of Making States Work: State Failure and the Crisis of Governance (United Nations University Press, forthcoming) and of Civilians in War (Lynne Rienner, 2001). He regularly contributes to international law and political science journals, as well as mass media publications such as the International Herald Tribune. His has taught at the Universities of Melbourne, Oxford, Southampton, and Columbia.

Encina Hall, east wing ground floor conference room E008

Simon Chesterman Executive Director Institute for International Law and Justice at New York University School of Law
Seminars
Paragraphs

Five factors are shown to be strongly related to civil war duration. Civil wars emerging from coups or revolutions tend to be short. Civil wars in Eastern Europe and the former Soviet Union have also tended to be relatively brief, as have anti-colonial wars. By contrast, 'sons of the soil' wars that typically involve land conflict between a peripheral ethnic minority and state-supported migrants of a dominant ethnic group are on average quite long-lived. So are conflicts in which a rebel group derives major funding from contraband such as opium, diamonds, or coca. The article seeks to explain these regularities, developing a game model focused on the puzzle of what prevents negotiated settlements to long-running, destructive civil wars for which conflicting military expectations are an implausible explanation. In the model, regional autonomy deals may be unreachable when fluctuations in state strength undermine the government's ability to commit. The commitment problem binds harder when the center has an enduring political or economic interest in expansion into the periphery, as in "sons of the soil" wars, and when either government or rebels are able to earn some income during a conflict despite the costs of fighting, as in the case of contraband funding.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Journal of Peace Research
Authors
James D. Fearon
Paragraphs

On May 11 and 13, 1998, India tested five nuclear weapons in the Rajasthan desert. By the end of the month, Pakistan had followed suit, claiming to have detonated six nuclear devices at an underground facility in the Chagai Hills. With these tests, the governments in Islamabad and New Delhi loudly announced to the world community, and especially to each other, that they both held the capability to retaliate with nuclear weapons in response to any attack.

What will be the strategic effects of these nuclear weapons developments? There are many scholars and defense analysts who argue that the spread of nuclear weapons to South Asia will significantly reduce, or even eliminate, the risk of future wars between India and Pakistan. These "proliferation optimists" argue that statesmen and soldiers in Islamabad and New Delhi know that a nuclear exchange in South Asia will create devastating damage and therefore will be deterred from starting any military conflict in which there is a serious possibility of escalation to the use of nuclear weapons. Other scholars and defense analysts, however, argue that nuclear weapons proliferation in India and Pakistan will increase the likelihood of crises, accidents, terrorism and nuclear war. These "proliferation pessimists" do not base their arguments on claims that Indian or Pakistani statesmen are irrational. Instead, these scholars start their analysis by noting that nuclear weapons are controlled by military organizations and civilian bureaucracies, not by states or by statesmen. Organization theory, not just deterrence theory, should therefore be used to understand the problem and predict the future of security in the region.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Forum on Physics & Society
Authors
Scott D. Sagan
Subscribe to Military