Meserole CV 2021

Total Page:16

File Type:pdf, Size:1020Kb

Meserole CV 2021 CHRISTOPHER O. MESEROLE POSITIONS Director of Research, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Coordinator, US-China AI Security Dialogue (2019-2021) Member, Digital Freedom Forum, CNAS (2019-) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2010 Ph.D., University of Maryland, College Park, MD, 2017 POLICY Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; disinformation and malign influence operations; counter- terrorism and countering violent extremism; defense innovation and national security innovation base; democratic alliances for technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation Lists: What Technology Companies Need to Know,” Royal United Services Institute, July 2019. (With Daniel Byman.) “Artificial Intelligence and the Security Dilemma,” Lawfare, November 2018. “What is Machine Learning?” Brookings Institution, October 2018. “Wars of None: AI, Big Data, and the Future of Insurgency,” Lawfare, June 2018. “Disinformation Wars,” Foreign Policy, May 2018. (With Alina Polyakova.) TESTIMONY “Technological Surveillance of Religion in China,” USCIRF Hearing, July 2020 TALKS “Advancing AI: A FrameWork and Agenda for Cross-Disciplinary Research,” Vector Institute, Toronto, August 2019 “When Context Matters: Content Moderation and Atrocity Prevention,” UCLA LaW School, February 2019 MEDIA New Yorker, Foreign Policy, Foreign Affairs, BBC, WIRED, Scientific American .
Recommended publications
  • Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
    Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan.
    [Show full text]
  • Meserole Brookings CV 2021
    CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation
    [Show full text]
  • Uncertainty and Civil War Onset
    Uncertainty and Civil War Onset Iris Malone∗ Abstract Why do some armed groups escalate their campaigns to civil war, while others do not? Only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.” I develop a new theory that argues this variation occurs because of an information problem. States decide how much counterinsurgency effort to allocate for repression on the basis of observable characteristics about an armed group's initial capabilities, but two scenarios make it harder to get this decision right, increasing the risk of civil war. I use fieldwork interviews with intelligence and defense officials to identify important group characteristics for civil war and apply machine learning methods to test the predictive ability of these indicators. The results show that less visible armed groups in strong states and strong armed groups in weak states are most likely to lead to civil war onset. These findings advance scholarly understanding about why civil wars begin and the effect of uncertainty on conflict. ∗Department of Political Science, 100 Encina Hall West, Stanford University, Stanford, CA 94305. ([email protected], web.stanford.edu/~imalone). 1 Introduction Why do some armed groups escalate their campaigns to civil war, while most do not? Using an original dataset, I show that only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.”1 Only 8% of armed groups surpassed the higher \civil war" threshold of 1000 fatalities per year.
    [Show full text]
  • Redalyc.Lawfare: the Colombian Case
    Revista Científica General José María Córdova ISSN: 1900-6586 [email protected] Escuela Militar de Cadetes "General José María Córdova" Colombia Padilla, Juan Manuel Lawfare: The Colombian Case Revista Científica General José María Córdova, vol. 10, núm. 10, 2012, pp. 107-142 Escuela Militar de Cadetes "General José María Córdova" Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=476248923006 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Estudios militares Revista Científica “General José María Córdova”, Bogotá D.C. (Colombia) Sección . Vol 10, Núm 10, Año 2012, Junio REVCGJMC.10(10): 107-142, 2012 Lawfare: The Colombian Case * Guerra jurídica: el caso colombiano La guerre juridique: le cas colombien Guerra jurídica: o caso colombiano Recibido: 20 de Febrero de 2012. Aceptado: 15 de Abril de 2012. Juan Manuel Padillaa * Researche monograph originally presented to the School of Advanced Military Studies of the United States Command and General Staff College, Fort Leavenworth, Kansas, approved for Revista Cientifica Public Release. “General José María Córdova”, Bogotá D.C. (Colombia) a Máster en Ciencias y Artes Militares , U.S. Army Command and General Staff College. Director Sección Estudios militares. de la Escuela Militar de Cadetes “General José María Córdova”. Comentarios a: jumapac@gmail. Vol 10 , Núm 10, Año 2012, com Junio, pp. 107-142 ISSN 1900- 6586 108 Juan Manuel Padilla Abstract. The terrorist groups in Colombia have applied Mao’s theory of protracted people’s war, seeking to use all available means of struggle to achieve their revolutionary goals by counteracting govemment policy.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics by Zachary Abuza
    STRATEGIC PERSPECTIVES 6 The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics by Zachary Abuza Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Technology and National Security Policy, Center for Complex Operations, and Center for Strategic Conferencing. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, and publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Thai and U.S. Army Soldiers participate in Cobra Gold 2006, a combined annual joint training exercise involving the United States, Thailand, Japan, Singapore, and Indonesia. Photo by Efren Lopez, U.S. Air Force The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics By Zachary Abuza Institute for National Strategic Studies Strategic Perspectives, No. 6 Series Editors: C. Nicholas Rostow and Phillip C. Saunders National Defense University Press Washington, D.C.
    [Show full text]
  • The Curious Career of Lawfare, 43 Case W
    Case Western Reserve Journal of International Law Volume 43 | Issue 1 2010 The urC ious Career of Lawfare Wouter G. Werner Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Wouter G. Werner, The Curious Career of Lawfare, 43 Case W. Res. J. Int'l L. 61 (2010) Available at: https://scholarlycommons.law.case.edu/jil/vol43/iss1/4 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. File: Werner 2 Created on: 12/23/2010 9:05:00 PM Last Printed: 4/5/2011 8:14:00 PM THE CURIOUS CAREER OF LAWFARE Wouter G. Werner* This article discusses some different uses of the term „lawfare‟ since the 1970‟s. The main aim of the article is to explore how particular ways of framing the concept of “lawfare” affect questions of legal, moral, and polit- ical accountability. In particular, the article contrasts the way in which the term „lawfare‟ has been used in critical theory with the instrumentalization of the term in neoconservative thinking. While critical theory has used the term to rethink questions of accountability and to spur a process of self- critique, neoconservative thinking has mainly used to term to discredit an opponent‟s reliance on law and legal procedure. This has turned the use of the term „lawfare‟ itself into a strategic move—a move that could eventually undermine the integrity of law.
    [Show full text]
  • ISLAMIST LAWFARE: BRIEFS AS WEAPONS of MASS DISRUPTION by Lawrence A
    Foreign Policy Research Institute E-Notes A Catalyst for Ideas Distributed via Email and Posted at www.fpri.org June 2010 ISLAMIST LAWFARE: BRIEFS AS WEAPONS OF MASS DISRUPTION By Lawrence A. Husick, Esq. Lawrence Husick is a Senior Fellow at FPRI’s Center on Terrorism and Counter-Terrorism. He concentrates on the study of terrorist tactics and counterterrorism strategies, with a particular focus on technology leverage as a defining characteristic of the modern terrorist. He is also co-director of the FPRI Wachman Center’s Program on Teaching the History of Innovation. He is a practicing intellectual property attorney. The 2009 Christmas-day bombing attempt on a commercial flight to Detroit was not the first time that terrorists have used briefs as a weapon. A recent presentation in Philadelphia by Daniel Huff, director of the Legal Project of the Middle East Forum, detailed the use of lawsuits by Islamic organizations as a method of silencing criticism and chilling free speech. “Lawfare” is the wrongful use of a legal process to silence and punish free speech critical of radical Islam, terrorism, or its sources of financing. Lawfare also seeks to enact or reinstate blasphemy laws, especially as applied to Islam and its prophet, Mohammad. Libel, defamation, and “hate speech” suits have been pressed in the United States, Great Britain, and elsewhere, with the intent of inflicting great expense on terrorism researchers, their sponsors and publishers. For those who publish primarily on the Internet, however, there may be a preemptive legal strategy available that strikes a blow at the heart of Islamist lawfare.
    [Show full text]
  • Carl Schmitt and the Critique of Lawfare
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2011 Carl Schmitt and the Critique of Lawfare David Luban Georgetown University Law Center, [email protected] Georgetown Public Law and Legal Theory Research Paper No. 11-33 This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/621 http://ssrn.com/abstract=1797904 43 Case W. Res. J. Int'l L. 457-471 (2010) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Human Rights Law Commons, Legal History Commons, and the Military, War, and Peace Commons CARL SCHMITT AND THE CRITIQUE OF LAWFARE David Luban (forthcoming, Case Western International Law Review, symposium on lawfare) ABSTRACT “Lawfare” is the use of law as a weapon of war against a military adversary. Lawfare critics complain that self-proclaimed “humanitarians” are really engaged in the partisan and political abuse of law—lawfare. This paper turns the mirror on lawfare critics themselves, and argues that the critique of lawfare is no less abusive and political than the alleged lawfare it attacks. Radical lawfare critics view humanitarian law with suspicion, as nothing more than an instrument used by weak adversaries against strong military powers. Casting suspicion on humanitarian law by attacking the motives of humanitarian lawyers, they undermine disinterested argument, and ultimately undermine the validity of their own critique. The paper then explores the vision of politics and law underlying the lawfare critique through a reading of the most significant theorist who defends that vision, the German theorist Carl Schmitt.
    [Show full text]
  • The Development Response to Violent Extremism and Insurgency
    THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY Putting Principles USAID POLICY into Practice BUREAU FOR POLICY, PLANNING AND LEARNING SEPTEMBER 2011 USAID THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY POLICY SEPTEMBER 2011 i Message from the Administrator USAID Policy /The Development Response to Violent Extremism and Insurgency MESSAGE FROM THE ADMINISTRATOR President Obama’s National Security Strategy and Global Already today, close to 60 percent of State and USAID’s for­ Development Policy both stress that successful development eign assistance goes to 50 countries that are in the midst of, is essential to advancing our national security objectives. or trying to prevent conflict or state failure.This policy is crit­ ical to supporting our staff on the frontlines of our greatest Consistent with these broader strategic frameworks, this pol­ national security and development challenges. Our Agency’s icy provides USAID with a clear mandate and specific renewed emphasis on learning, innovation and risk­taking guidance on the development response to violent extremism means we will study and improve our work in exactly those and insurgency.This policy comes at a critical time; develop­ areas that have proven most difficult. ment assistance is increasingly called upon as an integral component of the interagency response to complex national With this policy, the Agency and its field Missions can now security and development challenges. rely on a clear set of common concepts and definitions, engagement criteria, and programming principles to support In line with our USAID Forward reform effort, this policy rep­ and guide our work, enhance its impact and ensure we resents an ongoing drive to use our long experience and vast deliver sustainable results.
    [Show full text]
  • Law of War Handbook 2005
    LAW OF WAR HANDBOOK (2005) MAJ Keith E. Puls Editor 'Contributing Authors Maj Derek Grimes, USAF Lt Col Thomas Hamilton, USMC MAJ Eric Jensen LCDR William O'Brien, USN MAJ Keith Puls NIAJ Randolph Swansiger LTC Daria Wollschlaeger All of the faculty who have served before us and contributed to the literature in the field of operational law. Technical Support CDR Brian J. Bill, USN Ms. Janice D. Prince, Secretary JA 423 International and Operational Law Department The Judge Advocate General's Legal Center and School Charlottesville, Virginia 22903 PREFACE The Law of War Handbook should be a start point for Judge Advocates looking for information on the Law of War. It is the second volume of a three volume set and is to be used in conjunction with the Operational Law Handbook (JA422) and the Documentary Supplement (JA424). The Operational Law Handbook covers the myriad of non-Law of War issues a deployed Judge Advocate may face and the Documentary Supplement reproduces many of the primary source documents referred to in either of the other two volumes. The Law of War Handbook is not a substitute for official references. Like operational law itself, the Handbook is a focused collection of diverse legal and practical information. The handbook is not intended to provide "the school solution" to a particular problem, but to help Judge Advocates recognize, analyze, and resolve the problems they will encounter when dealing with the Law of War. The Handbook was designed and written for the Judge Advocates practicing the Law of War. This body of law is known by several names including the Law of War, the Law of Armed Conflict and International Humanitarian Law.
    [Show full text]