Terrorism
-

We know the terrorist threat: an atomic bomb exploding in downtown Manhattan, a roadside bomb in Las Cruces, New Mexico. Yet Congress, against the wishes of New York's Senator Schumer, voted down a bill that would have facilitated complete surveillance of radio activity, the sort of surveillance that might actually prevent the demise of NYC. The price tag was $100 million of initial funding and it would have cost $100 billion altogether--expensive then, but cheap after Iraq and Katrina. So where are we now? We have still have terrorist threats and still have limited protection.

In my talk I want to give an affordable solution: mathematical modeling, using an even more magical bullet: Reflexive Theory. If we talk about security and cooperation, we need one thing, as important as the frontal lobe: a model of the self! That is, we need Reflexive Theory.

My presentation will be an exciting journey through a contemporary approach to counter-terrorism, based on the work of the famous mathematical psychologist Vladimir Lefebvre.

Stefan E. Schmidt is CEO of the research company Phoenix Mathematical Systems Modeling, Inc.; he is also a member of the graduate faculty of the Department of Mathematical Sciences at New Mexico State University and a fellow of the Center for Advanced Defense Studies. For the past five years, he has been working as Senior Research Scientist at the Physical Science Laboratory of New Mexico State University.

From fall 2004 to 2005, Schmidt was on a one-year professional leave from PSL to follow an invitation as visiting professor at the University of Technology in Dresden, Germany. Between 1995 and 2000, he has held research appointments at the University of California, Berkeley (1995-98), the Mathematical Sciences Research Institute (96/97), the Shannon Laboratory of AT&T (98/99), and the Massachusetts Institute of Technology (1999-2000).

Previously, after his PhD in 1987 at the University of Technology in Darmstadt, Germany, Schmidt was assistant professor until 1995 at ainz University, Germany (as Hochschulassistent, Habilitation 1993).

Schmidt's scientific research ranges from discrete mathematics to applications in information sciences and network analysis; his expertise covers geometric algebra, order theory, combinatorics, formal concept analysis and reflexive theory--applied to communication networks, agent modeling and systems of systems analysis. His recent work includes modeling and simulating terrorist recruitment via reflexive theory as well as border protection via reflexive control. As a real world application of his scientific methods, he is currently involved in a long-term research project on the stock market (as a market of markets).

Reuben W. Hills Conference Room

Stefan Schmidt Mathematician, Physical Science Laboratory Speaker New Mexico State University
Seminars
-

In the days after 9/11, there was a widespread sentiment that suicidal terrorist attacks were irrational acts well beyond the bounds of quantitative risk assessment. Since then, terrorism risk models have been developed which are based on certain key theoretical principles that are validated by observational terrorism experience. These principles will be elaborated, and illustrated with examples from conflicts around the world.

Gordon Woo is a catastrophist, specializing on mathematical aspects of catastrophe risk modelling. He has developed a quantitative framework for modelling terrorism risk applied e. g. on the Olympic Games 2004 and the 2006 World Cup in Germany. Prior to this, his main focus has been on natural and environmental hazards. He has twenty years of practical experience in consulting for commercial, industrial and government organizations on major public risk issues varying from the disposal of radioactive waste, to oil pollution, flight safety, to earthquake, windstorm and flood protection.

Dr. Woo graduated as the top mathematician of his year at Cambridge University. He completed his PhD in theoretical physics as a Kennedy Scholar at M.I.T., after which he was elected a Junior Fellow of the Harvard University Society of Fellows. His work has been featured in the Wall Street Journal and Newsweek. In July 2004, he was named by Risk & Treasury Magazine as one of the 100 most influential people in finance.

CISAC Conference Room

Gordon Woo Principal Risk Analyst Speaker Risk Management Solutions
Seminars
Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
-

The assumption that states can and ought to stop the flow of funds to terrorist organizations deserves greater scrutiny. Potential benefits obtained by disrupting financial networks may not decrease the intensity of attacks, even as they weaken terrorist organizations. The anti-money laundering model currently applied by the UK and US has proven counter-productive, undermining the states' counterterrorism efforts. The erosion of individual rights incorporated in the regime risks leaking into criminal law, thereby altering basic constitutional entitlements. Efforts to prevent extremists from obtaining funds may have a devastating affect on social services in poor regions and impede the development of civil society and "state building." What is intriguing about ATF is that it evokes many of the same issues that arise in other areas of counterterrorism. Whether and how to surmount them remains less than clear.

This event is a collaborative effort between CISAC and European Forum.

Encina Hall Central,
Second Floor, C231

Jacob Shapiro Speaker
Laura Donohue Speaker
Khalid Medani Speaker
Workshops
Authors
News Type
News
Date
Paragraphs

Joseph S. Nye, the Dean Emeritus of Harvard's Kennedy School of Government, the Sultan of Oman Professor of International Relations, and a member of the Board of Harvard's Center for Science and International Affairs, has been selected to deliver the second annual S.T. Lee lecture. The lectureship, established by Dr. Seng Tee Lee of Singapore, enables the Institute to invite a distinguished scholar to deliver an annual lecture on international political, social or health issues.

Nye is the author of numerous books and articles on major global issues and challenges. A world renowned expert on the use of "soft" and "hard" power in international political, economic, and security affairs, Nye captured global attention with his 2004 book, Soft Power: the Means to Success in World Politics (New York, NY: Public Affairs), and continues to offer arresting insights and perspective in lectures around the world.

All News button
1
Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
-

Robert A. Pape is a professor of political science at the University of Chicago specializing in international security affairs. His publications include Dying to Win: The Strategic Logic of Suicide Terrorism (Random House, June 2005); Bombing to Win: Air Power and Coercion in War (Cornell, 1996), "Why Economic Sanctions Do Not Work," in International Security (1997), "The Determinants of International Moral Action," in International Organization (1999), "The Strategic Logic of Suicide Terrorism," in American Political Science Review (August 2003), "The True Worth of Air Power," in Foreign Affairs (March/April 2004), and "Soft Balancing against the United States," in International Security (Summer 2005).

His commentary on international security policy has appeared in The New York Times, Washington Post, The New Republic, Boston Globe, Los Angeles Times and Bulletin of the Atomic Scientists. He has appeared on The News Hour with Jim Lehrer; Nightline; ABC News; CNN's Wolf Blitzer, Anderson Cooper and Lou Dobbs; Fox's John Gipson; CNN International; and National Public Radio.

Before coming to Chicago in 1999, he taught international relations at Dartmouth College for five years and air power strategy for the U.S. Air Force's School of Advanced Airpower Studies for three years. He received his PhD from the University of Chicago in 1988 and graduated summa cum laude and Phi Beta Kappa from the University of Pittsburgh in 1982. His current work focuses on the origins of suicide terrorism and the logic of soft balancing in a unipolar world.

Reuben W. Hills Conference Room

Robert A. Pape Professor of Politicial Science Speaker University of Chicago
Seminars
-

Sigfried Hecker is a visiting professor at CISAC and an emeritus director of Los Alamos National Laboratory. A metallurgist, he focuses on plutonium science and nuclear weapons stockpile stewardship, while working closely with the Russian Academy of Sciences and the Russian Ministry of Atomic Energy on a variety of cooperative threat reduction programs. He is actively involved with the U.S. National Academies, serving on the Council of the National Academy of Engineering, as chair of the newly established Committee on Counterterrorism Challenges for Russia and the United States, and as a member of the National Academies Committee on Nuclear Nonproliferation. At CISAC, he also contributes regularly to seminars and to the popular undergraduate course, Technology and National Security, taught by William Perry and Elisabeth Paté-Cornell.

Directing Los Alamos National Laboratory from 1986 through 1997, Hecker was named Laboratory Director of the Year by the National Laboratory Consortium in 1998. He has devoted most of his career to providing technical and leadership expertise to the laboratory, beginning with summer graduate school and postdoctoral assignments there. After a three-year stint as a senior research metallurgist with the General Motors Research Laboratories, he returned to Los Alamos in 1973 as a technical staff member in the laboratory's Physical Metallurgy Group. Later he led the Science and Technology Division and chaired the Center for Materials Science before becoming director.

Among his professional distinctions, Hecker is a member of the National Academy of Engineering; a foreign member of the Russian Academy of Sciences; a fellow of the TMS, or Minerals, Metallurgy and Materials Society; a fellow of the American Society for Metals; an honorary member of the American Ceramics Society; and a fellow of the American Academy of Arts and Sciences. His achievements have been recognized with the American Nuclear Society's Seaborg Medal and many other awards, including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Reuben W. Hills Conference Room

CISAC
Stanford University
Encina Hall, C220
Stanford, CA 94305-6165

(650) 725-6468 (650) 723-0089
0
Senior Fellow, Freeman Spogli Institute for International Studies, Emeritus
Research Professor, Management Science and Engineering, Emeritus
hecker2.jpg PhD

Siegfried S. Hecker is a professor emeritus (research) in the Department of Management Science and Engineering and a senior fellow emeritus at the Freeman Spogli Institute for International Studies (FSI). He was co-director of CISAC from 2007-2012. From 1986 to 1997, Dr. Hecker served as the fifth Director of the Los Alamos National Laboratory. Dr. Hecker is an internationally recognized expert in plutonium science, global threat reduction, and nuclear security.

Dr. Hecker’s current research interests include nuclear nonproliferation and arms control, nuclear weapons policy, nuclear security, the safe and secure expansion of nuclear energy, and plutonium science. At the end of the Cold War, he has fostered cooperation with the Russian nuclear laboratories to secure and safeguard the vast stockpile of ex-Soviet fissile materials. In June 2016, the Los Alamos Historical Society published two volumes edited by Dr. Hecker. The works, titled Doomed to Cooperate, document the history of Russian-U.S. laboratory-to-laboratory cooperation since 1992.

Dr. Hecker’s research projects at CISAC focus on cooperation with young and senior nuclear professionals in Russia and China to reduce the risks of nuclear proliferation and nuclear terrorism worldwide, to avoid a return to a nuclear arms race, and to promote the safe and secure global expansion of nuclear power. He also continues to assess the technical and political challenges of nuclear North Korea and the nuclear aspirations of Iran.

Dr. Hecker joined Los Alamos National Laboratory as graduate research assistant and postdoctoral fellow before returning as technical staff member following a tenure at General Motors Research. He led the laboratory's Materials Science and Technology Division and Center for Materials Science before serving as laboratory director from 1986 through 1997, and senior fellow until July 2005.

Among his professional distinctions, Dr. Hecker is a member of the National Academy of Engineering; foreign member of the Russian Academy of Sciences; fellow of the TMS, or Minerals, Metallurgy and Materials Society; fellow of the American Society for Metals; fellow of the American Physical Society, honorary member of the American Ceramics Society; and fellow of the American Academy of Arts and Sciences.

His achievements have been recognized with the Presidential Enrico Fermi Award, the 2020 Building Bridges Award from the Pacific Century Institute, the 2018 National Engineering Award from the American Association of Engineering Societies, the 2017 American Nuclear Society Eisenhower Medal, the American Physical Society’s Leo Szilard Prize, the American Nuclear Society's Seaborg Medal, the Department of Energy's E.O. Lawrence Award, the Los Alamos National Laboratory Medal, among other awards including the Alumni Association Gold Medal and the Undergraduate Distinguished Alumni Award from Case Western Reserve University, where he earned his bachelor's, master's, and doctoral degrees in metallurgy.

Date Label
Siegfried S. Hecker Speaker
Seminars
Paragraphs

This article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States--two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes--and accepts--the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts--flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This article recognizes that both states consider the fight against terrorism to be partly military but also a matter of bringing certain democratic principles to bear. Critics have been quick to condemn some of the measures for their encroachments into civil liberties. My goal is not to measure the success of the laws according to any particular ideology but rather, accepting the governments' democracy-promoting goals, and the role these play in generating domestic and international support, to clarify which components do not appear to serve the states' aims.

This article won Stanford Law School's Carl Mason Franklin Prize for 2005-2006, for most distinguished written work in international law.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Michigan Journal of International Law
Authors
Paragraphs

The Bush administration's response to the September 11 attacks has rendered more urgent Al Qaeda's stated objective to eject the United States from the Middle East. The aim here is not to evaluate the direction of the war on terrorism, but to explore why Al Qaeda has been so unsuccessful in capitalizing on its political violence. The article begins with the premise that terrorism is a communication strategy. It contends that Al Qaeda's policy failures are due to its inability to convince Bush that it would refrain from attacking Americans if the United States moderated its Middle East policies. Borrowing from the literature in political psychology and perception and misperception in international relations, the article offers several explanations for Al Qaeda's ineffectiveness in getting this message across. The article concludes by deriving general observations about the limitations of terrorism as a form of political communication.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Terrorism and Political Violence
Authors
Subscribe to Terrorism