Violence
Paragraphs

In his trenchant analysis, Stephen Biddle ("Seeing Baghdad, Thinking Saigon," March/April 2006) argues that the escalating violence in Iraq is not a nationalist insurgency, as was the Vietnam War, but rather a "communal civil war" and that it must therefore be addressed by pursuing a strategy different from "Vietnamization": if the United States were simply to turn over responsibility for counterinsurgency to the new Iraqi army and police forces, it would risk inflaming the communal conflict, either by empowering the Shiites and the Kurds to slaughter the Sunnis or by enabling a Trojan horse full of Sunni insurgents to penetrate the multiethnic security forces and undermine them.

Biddle is right in many respects. First, Iraq is already in the midst of a very violent civil conflict, which claims 500 to 1,000 lives or more every month. Second, this internal conflict has become primarily communal in nature; as Biddle writes, it is a fight "about group survival." It pits Sunnis against Shiites, in particular, but also Kurds against Sunnis and, more generally, group against group, with smaller minorities coming under attack on multiple fronts. Third, as Biddle warns, the current moderate-intensity communal war could descend into an all-out conflagration, with a high "risk of mass slaughter." Thus the United States cannot in good conscience withdraw from Iraq abruptly -- and doing so would not even be in the United States' national interest -- because that would remove the last significant barrier to a total conflagration.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Foreign Affairs
Authors
Larry Diamond
Paragraphs

ABSTRACT:

While the refugee protection system is one of international law's most recognizable features, it routinely places massive numbers of refugees in camps in the developing world, where they face chronic threats to their physical security from crime and disorder, physical coercion, and military attacks. Yet key actors responsible for refugee protection, including host states, advanced industrialized countries, and the United Nations High Commissioner for Refugees (UNHCR), have failed to prioritize refugee security.

This article asks: (1) Why? (2) What have been the consequences? and (3) What do these answers reveal about how organizations carry out legal mandates in complicated political environments?

Conventional wisdom holds that security only recently became a major problem in the refugee protection system; that UNHCR's role in enhancing refugees' physical security is limited by the agency's legal mandate and practical constraints; and that problems of violence and physical security are largely episodic concerns affecting small numbers in discrete refugee populations. Drawing on historical documents, interviews, data on budgets and performance measures, and legal doctrine, I show this conventional wisdom to be wrong. Only some of the problems associated with the current system can be explained by international geopolitics or by legal compromises reflected in refugee law.Instead, that system's brutal realities also reflect bureaucratic dynamics, political pressures, and legal interpretations shaping the discretionary choices of UNHCR and its nongovernmental organization partners. I develop the argument by tracing the remarkable history of UNHCR as it transformed itself from a refugee advocacy organization with a limited mandate into a modern relief agency.

This evolution helps explain the persistence of security problems and sheds light on the challenges of implementing ambitious legal mandates under uncertainty, particularly when the organizations doing so operate in complex political environments.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Georgetown Journal of International Law
Authors
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Paragraphs

NEWS that AT&T, Verizon and BellSouth gave customer records to the National Security Agency has set off a heated debate over the intricacies of espionage law. But legal or not, this sort of spying program probably isn't worth infringing our civil liberties for -- because it's very unlikely that the type of information one can glean from it will help us win the war on terrorism.

If the program is along the lines described by USA Today -- with the security agency receiving complete lists of who called whom from each of the phone companies -- the object is probably to collect data and draw a chart, with dots or "nodes" representing individuals and lines between nodes if one person has called another.

Mathematicians who work with pictures like this are called graph theorists, and there is an entire academic field, social network analysis, that tries to determine information about a group from such a chart, like who the key players are or who the cell leaders might be.

But without additional data, its reach is limited: as any mathematician will admit, even when you know everyone in the graph is a terrorist, it doesn't directly portray information about the order or hierarchy of the cell. Social network researchers look instead for graph features like "centrality": they try to identify nodes that are connected to a lot of other nodes, like spokes around the hub of a bicycle wheel.

But this isn't as helpful as you might imagine. First, the "central player" -- the person with the most spokes -- might not be as important as the hub metaphor suggests. For example, Jafar Adibi, an information scientist at the University of Southern California, analyzed e-mail traffic among Enron employees before the company collapsed. He found that if you naïvely analyzed the resulting graph, you could conclude that one of the "central" players was Ken Lay's ... secretary.

And even if you manage to eliminate all the "central players," you may well still leave enough lesser players that the cell retains a complete chain of command capable of carrying out a devastating terrorist attack.

In addition, the National Security Agency's entire spying program seems to be based on a false assumption: that you can work out who might be a terrorist based on calling patterns. While I agree that anyone calling 1-800-ALQAEDA is probably a terrorist, in less obvious situations guilt by association is not just bad law, it's bad mathematics, for two reasons.

The simplest reason is that we're all connected. Not in the Haight-Ashbury/Timothy Leary/late-period Beatles kind of way, but in the sense of the Kevin Bacon game. The sociologist Stanley Milgram made this clear in the 1960's when he took pairs of people unknown to each other, separated by a continent, and asked one of the pair to send a package to the other -- but only by passing the package to a person he knew, who could then send the package only to someone he knew, and so on. On average, it took only six mailings -- the famous six degrees of separation -- for the package to reach its intended destination.

Looked at this way, President Bush is only a few steps away from Osama bin Laden (in the 1970's he ran a company partly financed by the American representative for one of the Qaeda leader's brothers). And terrorist hermits like the Unabomber are connected to only a very few people. So much for finding the guilty by association.

A second problem with the spy agency's apparent methodology lies in the way terrorist groups operate and what scientists call the "strength of weak ties." As the military scientist Robert Spulak has described it to me, you might not see your college roommate for 10 years, but if he were to call you up and ask to stay in your apartment, you'd let him. This is the principle under which sleeper cells operate: there is no communication for years. Thus for the most dangerous threats, the links between nodes that the agency is looking for simply might not exist.

If our intelligence agencies are determined to use mathematics in rooting out terrorists, they may consider a profiling technique called formal concept analysis, a branch of lattice theory. The idea, in a nutshell, is that people who share many of the same characteristics are grouped together as one node, and links between nodes in this picture -- called a "concept lattice" -- indicate that all the members of a certain subgroup, with certain attributes, must also have other attributes.

For formal concept analysis to be helpful, you need much more than phone records. For instance, you might group together people based on what cafes, bookstores and mosques they visit, and then find out that all the people who go to a certain cafe also attend the same mosque (but maybe not vice versa).

While researchers at Los Alamos National Laboratory have used this tool to sift through hundreds of terrorism-related reports -- and find connections that human analysts could not have found easily -- it's still dangerous to rely on the math.

This is because, as Kennedy and Lincoln assassination buffs know, two people can be a lot alike without being the same person. Even if there is only a 1 in 150 million chance that someone might share the profile of a terrorist suspect, it still means that, in a country the size of the United States, two people might share that profile. One might be a terrorist, or he might be Cat Stevens.

This isn't to say that mathematicians are useless in fighting terrorism. In September 2004  10 months before the bombing of the London Underground -- Gordon Woo, a mathematician and risk-assessment consultant, gave a speech warning that London was a hotbed of jihadist radicalism. But Dr. Woo didn't anticipate violence just using math; he also used his knowledge of London neighborhoods. That's what law enforcement should have been doing then and should be doing now: using some common sense and knowledge of terrorists, not playing math games.

Math is just a tool. Used wisely, math can indeed help in warfare: consider the Battle of Britain, won in part by breaking the German codes. But use it unwisely -- as seems to be the case here -- and your approval ratings might just hit a new all-time low.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The New York Times
Authors
-

How have intersecting legacies of colonialism and militarization combined with recent forces of globalization to produce new kinds of social identities and movements for political change? How do activists in these social movements contest hegemonic national identities in favor of a multicultural Japan or a global human rights discourse? How do legacies of Japanese colonialism animate current systems of globalization?

The first round table, entitled "Identity Politics and its Social Movements" will bring together a group of scholars examining current identity politics of "ethnic minorities" such as Ainu, Burakumin, Okinawans, and Zainichi (resident Koreans), many of whom are affected by the legacies of colonialism.

The second round table, "Gender, Colonialism, and Militarism in Japan and Okinawa" will focus on groups affected by continuing militarism and globalization such as sex workers, children born of military personnel and those organizing against military occupation and its attendant gendered violence. The invited speakers for this round table are the Okinawan writer, journalist and anti-military activist--Chinin Ushii, Margo Okazawa-Rey, co-founder of the US-East Asian-Puerto Rico Women's Net Work Against US Militarism, and Ueno Chizuko, the renown and highly influential feminist scholar. Japanese Studies Postdoctoral Fellows Michele Mason and Setsu Shigematsu will participate and act as facilitators for this round table.

Symposium Schedule:

9:00 am ~ Opening Comments by Workshop Organizers

9:30 - 11:00 ~ Roundtable One:

Global Human Rights, Identity Politics and Social Movements

Aiuchi, Toshikazu (Otaru University of Commerce)

Befu, Harumi (Stanford University)

Davis, John (Michigan State University)

Mushanokoji, Kinhide (Osaka University of Economics and Law)

Tsutsui, Kiyoteru (facilitator)(Stanford University/Stony Brook University)

15 minute Break

12:30~ Open discussion with all workshop participants facilitated by Kiyo Tsutsui

12:30 - 2:00 ~ Lunch break (buffet lunch)

2:00 - 3:30 ~ Roundtable Two:

Gender, Colonialism and Militarism in Okinawa and Japan

Chinin, Ushii (Okinawan public intellectual, writer and journalist)

Miho Kim (to be confirmed)

Okazawa-Rey, Margo (Professor Emerita, San Francisco State University and

co-founder East Asia-US-Puerto Rico - Women's Network Against Militarism)

Ueno, Chizuko (Tokyo University)

Mason, Michele (Facilitator)(Stanford University)

Shigematsu, Setsu (Facilitator)(Stanford University)

15 minute Break

3:45 - 5:00 ~ Open discussion with all workshop participants facilitated by Michele Mason and Setsu Shigematsu

5:00 pm ~ Closing Comments by workshop organizers

Co-Sponsored by the Stanford Society of Fellows in Japanese Studies and the Center

for East Asian Studies

CISAC Conference Room

Symposiums
-

Singapore's general elections in 2006 are unlikely to shake the country's legendary political stability. Despite repeated predictions over decades that the long-ruling People's Action Party (PAP) would falter, opposition parties and dissident groups have made little headway. Cherian George will offer a counter-intuitive reason for this situation: deliberate self-restraint in the use of violence by the state against its opponents. Since the 1980s, modes of repression in Singapore have grown increasingly subtle and sophisticated. Thanks to "calibrated coercion," the PAP has been able to neutralize opposition with minimum political cost. The study of authoritarian regimes would benefit from more nuanced attention to the methodology of coercion. It is time for analysts to stop treating coercion as if it were not problematic - a black box that need not be taken apart. Or so, based on Singapore's case, Prof. George will argue.

Cherian George is the author of Contentious Journalism and the Internet: Towards Democratic Discourse in Malaysia and Singapore (2006) and Singapore: The Air-Conditioned Nation: Essays on the Politics of Comfort and Control (2000). After completing his PhD in communication at Stanford in 2003, he was a post-doctoral fellow at the Asia Research Institute, Singapore. He is now deputy head of the journalism program at Nanyang Technological University.

Daniel and Nancy Okimoto Conference Room

Cherian George Assistant Professor, School of Communication and Information Speaker Nanyang Technological University, Singapore
Seminars
-

Nancy Peluso will discuss how "political forests" originated in colonial-era Indonesia, Malaysia, and Thailand, and how they have been maintained over at least a century and a half of broader political-economic change. She will argue that forests were produced and normalized in Southeast Asia through political categories embedded in the law, scientific and public practice, colonial and post-colonial empires of forestry, and the insurgencies and emergencies of the Cold War era. This required the sometimes violent separation of the components of agrarian environments. From the fact that forests can be shown to be not only biological but also historical and political in nature she will draw important implications for conservation, development, and "green governance."

Nancy Lee Peluso is program director of the Berkeley Workshop in Environmental Politics at UC - Berkeley, where she teaches courses in political ecology and studies forest politics and agrarian change in Southeast Asia. She is the co-editor of Violent Environments (2001) and Borneo in Transition: People, Forests, Conservation and Development (1996) and the author of Rich Forests, Poor People: Resource Control and Resistance in Java (1992) and many journal articles and book chapters. She is presently finishing a book manuscript whose working title is "Ways of Seeing Borneo: Territoriality, Violence, and the Production of Landscape History". She is an associate editor of Global Environmental Politics and the Annals of the Association of American Geographers. Her PhD is from Cornell University.

Daniel and Nancy Okimoto Conference Room

Nancy Lee Peluso Professor, Department of Environmental Science, Policy and Management Speaker University of California-Berkeley
Seminars
Paragraphs

External-led state building is at the forefront of international security governance; it has been called "a growth industry"; and it is, against the backdrop of the US-led intervention in Iraq, more controversial than ever. Since the end of the cold war, the UN have launched more than 60 missions in 24 countries. Whilst the primary objective of all of these missions was to monitor, keep, enforce or build peace, a second objective, which is intrinsically linked to the first, was to contribute directly or indirectly to the reestablishment of functioning state-hood. Peace-building mission have become state-building missions. There are two broad reasons for this. First, fragile states are seen as a risk to both their societies and to international security. And second, it is now broadly assumed that one vital condition for sustainable peace is that the state-apparatus has the capacity to exercise core functions of state-hood in an efficient, non-violent and legitimate way. Consequently, peace-building is more and more seen as state-building, and this evolution is reflected in both UN strategy documents, and the development aid strategies of most nation states.

It is against this background that the need for a systematic evaluation of successes and failures of external-led state building emerges. This in turn requires a framework that enables a cross-case comparison of outcomes of external-led state building efforts.

This paper has two objectives: First, I propose a framework that allows for the tracing of the absolute and the relative state-building progress of countries hosting a state-building operation. I argue that "success" should be disaggregated and measured along five dimensions: the absence of war, the reestablishment of a full monopoly over the means for violence, economic development, democracy, and institutional capacities. I discuss at some length the implications for data collection and proxying these measures of success. Secondly, I evaluate the outcome of 17 UN-led peace-building operations, using a new data set. I compare the successes and failures of state-building along these five dimensions against three hypothetical scenarios: The first one is "more is better." In this scenario, it is assumed that the more intrusive the intervention, the more successful the outcome. The second scenario can be called "less-is-more" and assumes that too intrusive missions are counterproductive, because they hinder the endogenous emergence of stable statehood. The third scenario is the "trade-off-scenario." Here, it is assumed that more intrusive interventions produce better outcome in some policy fields and worse in others. This then would point to existing trade-offs between different objectives of state building. Rather than assuming that all good things go together, in the "trade-off"-scenario the success in one dimension (for example democracy) comes at the expense of less success in another dimension (for example economic development).

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
CDDRL Working Papers
Authors
Christoph Zuercher
Subscribe to Violence