International Development

FSI researchers consider international development from a variety of angles. They analyze ideas such as how public action and good governance are cornerstones of economic prosperity in Mexico and how investments in high school education will improve China’s economy.

They are looking at novel technological interventions to improve rural livelihoods, like the development implications of solar power-generated crop growing in Northern Benin.

FSI academics also assess which political processes yield better access to public services, particularly in developing countries. With a focus on health care, researchers have studied the political incentives to embrace UNICEF’s child survival efforts and how a well-run anti-alcohol policy in Russia affected mortality rates.

FSI’s work on international development also includes training the next generation of leaders through pre- and post-doctoral fellowships as well as the Draper Hills Summer Fellows Program.

Authors
News Type
Commentary
Date
Paragraphs
Ellen Johnson Sirleaf's inauguration provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries. CISAC's Jeremy M. Weinstein and colleague Steve Radelet tell how, in this Boston Globe op-ed.

Ellen Johnson Sirleaf's inauguration as the president of Liberia marks a watershed in the country's tumultuous history.

Twenty-five years of misrule and civil war under Samuel Doe, Charles Taylor, and successive interim governments have left the country in ruins. Nearly 300,000 Liberians lost their lives, average income is one-eighth what it was in 1980, and large majorities of the population subsist in dire poverty.

Since United Nations and US troops ousted Taylor in 2003, a fragile peace has taken hold, supported by 15,000 UN peacekeepers. With free and peaceful elections under their belts, Liberians are feeling new optimism and hope. Markets here are bustling, stores are freshly painted and open for business, and newspapers and radios feature lively debate.

The new government is a clear break from a past characterized by rule by force, extensive corruption, and a culture of impunity. Sirleaf, the first African woman elected head of state, has been an outspoken champion of accountability, transparency, and good governance for decades, a stance that landed her in jail twice and was a hallmark of her opposition to past governments and campaign for the presidency.

Already change is underway. She has instituted a code of conduct and full financial disclosure for senior officials, and endorsed a program that will install internationally recruited financial controllers in several state enterprises and create a strong anticorruption commission. Her government plans to publish financial accounts on the Web, make it easier for whistleblowers to report infractions, and rewrite Liberia's outdated constitution to firmly establish participatory democracy, decentralize power, and install robust checks on the executive.

Recovery from deep conflict in Africa is not easy, but we know it is possible. Mozambique was destroyed by civil war in the 1980s, but its democratically elected government led the way to peace, stability, and a doubling of income in a dozen years. Sierra Leone suffered a blood bath in the 1990s, but the 1999 peace agreement and 2001 elections brought stability and economic growth of 7 percent a year. Rwanda's genocide was followed by a recovery that few could have imagined.

But Sirleaf faces a daunting task. Liberia's recovery will depend mainly on Liberians themselves, but it will require strong international support, just as in Mozambique, Sierra Leone, and Rwanda.

West Africa's civil wars have spawned widespread smuggling of diamonds, transshipment of drugs, and easy money laundering opportunities for global terrorist groups. Liberia's historic moment provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries.

First, the United States must continue its crucial role in the demobilization of combatants and commit to long-term rebuilding of Liberia's police and army. The new government must be able to maintain and enhance security to begin to recover.

Second, the administration should support rapid and comprehensive forgiveness of Liberia's debts, which were mainly undertaken and wasted by the rapacious Doe government. It makes no more sense to stick today's Liberians with the bill, including 20 years of accumulated interest, than to force today's Iraqis to pay Saddam Hussein's bills.

Third, and perhaps most urgent, Congress should approve supplemental funding of $50 million to $100 million to support the new government. Unfortunately, Congress recently cut the administration's initial request for Liberia, a short-sighted step that sent the wrong signal to a struggling democracy and old ally at a crucial turning point. These funds would build critical infrastructure, put kids back into schools, and continue vital training for security forces. It would give Liberians their best chance of securing peace and basic freedoms.

All News button
1
-

In the days after 9/11, there was a widespread sentiment that suicidal terrorist attacks were irrational acts well beyond the bounds of quantitative risk assessment. Since then, terrorism risk models have been developed which are based on certain key theoretical principles that are validated by observational terrorism experience. These principles will be elaborated, and illustrated with examples from conflicts around the world.

Gordon Woo is a catastrophist, specializing on mathematical aspects of catastrophe risk modelling. He has developed a quantitative framework for modelling terrorism risk applied e. g. on the Olympic Games 2004 and the 2006 World Cup in Germany. Prior to this, his main focus has been on natural and environmental hazards. He has twenty years of practical experience in consulting for commercial, industrial and government organizations on major public risk issues varying from the disposal of radioactive waste, to oil pollution, flight safety, to earthquake, windstorm and flood protection.

Dr. Woo graduated as the top mathematician of his year at Cambridge University. He completed his PhD in theoretical physics as a Kennedy Scholar at M.I.T., after which he was elected a Junior Fellow of the Harvard University Society of Fellows. His work has been featured in the Wall Street Journal and Newsweek. In July 2004, he was named by Risk & Treasury Magazine as one of the 100 most influential people in finance.

CISAC Conference Room

Gordon Woo Principal Risk Analyst Speaker Risk Management Solutions
Seminars
-

Philippines Conference Room

Kwon, Hyeok Yong Assistant Professor of Political Science Speaker Texas A&M University
Seminars
Authors
Daniel C. Sneider
News Type
Commentary
Date
Paragraphs

Pre-emption used to be the watchword of Bush foreign policy. The world's sole superpower would not hesitate to wield force against an imminent threat to its security. The old doctrines of the Cold War era -- of containment and deterrence of a potential enemy -- were disdained as weakness.

Now, facing the most serious national security challenge since the end of the Cold War -- the nuclear weapons programs of Iran and North Korea -- the administration is reaching back to those oldies but goodies.

The determination of Iran and North Korea to develop nuclear weapons has so far been largely unchecked by this administration. The North Koreans, since breaking out of the freeze agreed to during the Clinton administration, have been steadily producing plutonium, and presumably warheads. The Iranians, after the election of hard-line President Mahmoud Ahmadinejad, reversed their deal to suspend uranium-enrichment activities, the crucial step toward nuclear weapons.

Diplomatic negotiations in both cases have produced little movement. But a military strike on their nuclear facilities is almost inconceivable. The danger of potentially horrendous retaliation and the sapping of American will and resources in Iraq have almost killed that option.

"As shaky as a policy of containment is, it is certainly preferable to confrontation, 'rollback,' or 'regime change' through military force,'' wrote conservative national security expert Thomas Donnelly in a recent analysis. "Containment is, in fact, regime change by tolerable means, and the solution to the problems of Iran and North Korea lie in an indirect approach.''

While we try to contain a nuclear Iran and North Korea, suggested Donnelly, we should surround Iran with movements for democratic change in Iraq and Afghanistan. North Korea, he believes, will be changed through Chinese influence.

Donnelly cautions that there may be circumstances when containment proves even more risky than intervention -- say if Iran tries to slip nuclear materials to Islamist terrorists. Iran is less stable than the Soviet Union, though it is worth remembering that the first 15 years of the Cold War brought us to the brink of nuclear war once and close to it several times.

For the administration, this is a stealth policy shift. That is no surprise. It flows directly from the mess in Iraq, a mistake the administration can never really acknowledge.

For those who once touted American global domination, it is still hard to face the reality that containment is impossible without allies and partners. By ourselves, we cannot press those regimes by cutting off their access to investment and advanced technology.

The administration is rightly moving to take Iran to the United Nations Security Council to seek a mandate to enforce the demands of the International Atomic Energy Agency. North Korea is undoubtedly watching this carefully.

China and Russia, who have veto power in the Security Council, are reluctantly going along. But they still resist any move to impose economic sanctions against Iran. Nor are the Europeans, Japanese and others who depend on oil and gas from Iran eager to halt their investment and trade.

Similarly in the case of North Korea, the Chinese and South Koreans are not prepared to cut the flow of economic aid and investment into the otherwise isolated North Korean state. This is less a case of economic interests than a fear that sanctions will escalate to greater confrontation, even war.

"The strategic challenge the Bush administration faced was to convince the rest of the world that Iran is more dangerous than the United States,'' says nuclear proliferation expert George Perkovich. "They finally did it -- and it took Ahmadinejad to do it,'' referring to the inflammatory rhetoric, including threats to "wipe Israel off the map,'' issued by the Iranian leader.

The administration made some headway down the same path with North Korea by engaging in direct talks with that regime this past fall, dispelling the image that the United States was unwilling to negotiate. But that progress has been undermined recently because hard-liners inside the Bush administration pulled the plug on such talks.

Managing an effective containment partnership will be a huge challenge. And there is still tremendous resistance inside the administration to engaging and negotiating -- and compromising -- with the enemy. But that was always a part of making containment succeed, even at the height of the Cold War.

Containment is no silver bullet. It is merely, as Donnelly puts it, "the least bad alternative, but not by a lot, and not under all circumstances.'' And right now, it is the only game in town.

All News button
1
-

China's economic growth and integration with global markets is restructuring the world economy and raising issues important to the future of US companies and workers. In the US market, we hear concerns over a range of Chinese trade practices, including subsidies, dumping; and the exchange rate. In the China market, lack of enforcement of IP protections and non-market behaviors, such as subsidies and industrial policies, give rise to concerns that the deck is being stacked against US companies. At the same time, US exports to China continue to grow rapidly and US invested companies report strong profits. Many also note that low cost imports from China keep the cost of living in the US low and enhance the competiveness of some US companies in global markets. President Bush has described our relations with China as "complex." Our economic relationship is the embodiment of that description.

Henry A. (Hank) Levine serves as the Deputy Assistant Secretary of Commerce for Asia in the International Trade Administration's office of Market Access and Compliance. His responsibilities include the market access concerns and compliance with international trade agreements that affect U.S. companies operating in China, Japan, Korea, Taiwan, Mongolia, and the member countries of ASEAN. In his career State Department Foreign Service Officer, Mr. Levine has served as the Deputy Assistant Secretary of Commerce for Europe, the U.S. Consul General in Shanghai, China and Deputy Director for Economic Affairs in the State Department's Office of Chinese Affairs. Mr. Levine has a B.A. in Political Science from Bucknell University. He did graduate work in international affairs at the Fletcher School of Law and Diplomacy at Tufts University. He is a 1993 graduate, with distinction, from the U.S. National War College. He is fluent in Chinese (Mandarin).

Series Co-sponsored with the Center for East Asian Studies.

Philippines Conference Room

Hank Levine Deputy Assistant Secretary for Asia, International Trade Administration Speaker U.S. Department of Commerce
Seminars
-

David Backer is a CDDRL post-doctoral fellow in the academic year 2005-2006. He is also an Assistant Professor of Politics at the College of William and Mary. He received his Ph.D. in Political Science at the University of Michigan. His dissertation project was an evaluation of the impact of participation by victims in South Africa's Truth and Reconciliation Commission (TRC). He is extending this research by comparing attitudes of victims and the general public, as well as conducting a longitudinal study of victims' attitudes about reparations. In addition, Backer is undertaking a parallel study of victims' responses to the truth commission processes in Ghana, Nigeria and Sierra Leone. His talk at the CDDRL seminar will focus on the South African experience with transitional justice.

Encina Basement Conference Room

N/A

0
Post-doctoral Fellow 2005 - 2006
PhD

David Backer is a post-doctoral Fellow (Ph.D. Michigan) at CDDRL. His dissertation project was an evaluation of the impact of participation by victims in South Africa's Truth and Reconciliation Commission (TRC). He is extending this research by comparing attitudes of victims and the general public, as well as conducting a longitudinal study of victims' attitudes about reparations. In addition, he is undertaking a parallel study of victims' responses to the truth commission processes in Ghana, Nigeria and Sierra Leone.

In another project, Backer looks at modes of transitional justice around the world and their effects on political development including regime stability, human rights practices, inter-group conflict, political violence and rates of violent crime.

David Backer Assistant Professor of Political Science, Post Doctoral Fellow Speaker College of William and Mary and CDDRL
Seminars
Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
-

John Harvey has served since March 2001 as director of the Policy Planning Staff of the National Nuclear Security Administration. In this role he advises the NNSA Administrator on major policy and program decisions. He is responsible for analysis of program and policy options relating to NSC-directed policy reviews, the work of the Nuclear Weapons Council, external advisory boards, and interagency working groups. He has the lead in developing NNSA's long-range planning guidance--the so-called "front end" of the Program, Planning Budgeting and Execution process currently being implemented in NNSA. Of note, Harvey has been "point" for NNSA on the President's NSPD-4 Strategic Review, the Nuclear Posture Review and its associated implementation, the interagency review of nuclear testing issues, and on the drafting and implementation of National Security Presidential Directive (NSPD)-28 on Nuclear Weapons Command, Control, Safety, and Security. From March 1995 to January 2001, Harvey served as Deputy Assistant Secretary of Defense for Nuclear Forces and Missile Defense Policy where he developed and oversaw implementation of U.S. defense policy governing strategic and theater nuclear forces and ballistic missile defense.

Reuben W. Hills Conference Room

John Harvey Senior Technical Advisor Speaker the National Nuclear Security Administration
Seminars
-

The assumption that states can and ought to stop the flow of funds to terrorist organizations deserves greater scrutiny. Potential benefits obtained by disrupting financial networks may not decrease the intensity of attacks, even as they weaken terrorist organizations. The anti-money laundering model currently applied by the UK and US has proven counter-productive, undermining the states' counterterrorism efforts. The erosion of individual rights incorporated in the regime risks leaking into criminal law, thereby altering basic constitutional entitlements. Efforts to prevent extremists from obtaining funds may have a devastating affect on social services in poor regions and impede the development of civil society and "state building." What is intriguing about ATF is that it evokes many of the same issues that arise in other areas of counterterrorism. Whether and how to surmount them remains less than clear.

This event is a collaborative effort between CISAC and European Forum.

Encina Hall Central,
Second Floor, C231

Jacob Shapiro Speaker
Laura Donohue Speaker
Khalid Medani Speaker
Workshops
Subscribe to International Development