Thursday, April 18, 2013

On Intellectual Property Rights



Intellectual property rights issues are far more complicated than they appear at first glance. Though I think everyone can agree that "content creators" deserve to be compensated for the work they did, the discourse splits in a few places that complicate the issue. The first of these is between entertainment intellectual property and economic or health related intellectual property. Let's look at these in reverse order.

In International Affairs circles, the main intellectual property discussion is that of medicine and patents. Some background is needed. A (usually Western) firm spends a ton of money on R&D to develop a new drug. They then need to sell it to make back the costs incurred in its development. However, once the formula is discovered, basically any manufacturer can produce it (let's say pills, for easy conceptualization), and since they don't have a huge debt from developing the drug in the first place, they can sell at a much lower price. To protect the original firm, we created patent laws. The formula is protected by law so that the firm that created it has a monopoly on its use, for some period (I believe it's currently 20 years?). After that time, anyone can use it. Thus the rise of "generic" drugs. But there is always a period of time that the company that invented the thing can sell it for maximum profit, so they can afford to go on their next huge research project.

In theory, that's how it is supposed to go everywhere. In reality however, it is very different.

Say a drug exists that helps to fight some dangerous illness. It was invented a few years ago, so it is still under patent protection. If a generic manufacturer in the US tries to produce the drug for cheap, they can get sued, so no one does. However, in another country, one where this illness is a huge problem, a generic manufacturer produces it, and the government supports this intellectual property theft. Basically, national interest trumps international law in this case. This situation is not academic, it is actually very common in India and Brazil, among other places. New-ish cholesterol drugs, anti-virals, etc. are produced illegally there for public consumption, and the company that invented this drug can't really do much about it.

Why can't people in Brazil and India just suck it up and pay full price like the rest of us? The short answer is: They can't. The price for these drugs is simply too high for people in many poor countries to afford. So their governments are left with an ethical question: do we steal someone's idea to save our people? Clearly, the answer to date has been yes, and I think that morally, it is the right decision for them to make, they need to save their people. However, in the long term, it creates another problem. Say I, an American citizen, need long term medical care, with really expensive drugs. Do I pay for it here, or do I fly to Brazil and buy insanely cheap, just as good drugs there? Depending on how much I need, it could easily be worth the cost of a plane-flight. Now medical research companies are not making the money they expect to make from western nations, because of "legal" theft in the third world. Without the ability to recoup their investment, they cannot afford to develop the drugs in the first place, and then everybody loses in the long run.

There really is no good answer here, besides "make poor people less poor". In theory, if the situations weren't so desperate, they wouldn't turn to theft to solve their problems and would happily pay full price for needed drugs. But, of course, that isn't a real solution at all. Government subsidies could work, but many governments can't afford those prices either. What about getting rid of private research companies? I suppose all basic medical research could be done by publicly funded institutions that don't need to turn a profit, but at some point, someone is paying for this. A huge expansion of government all over the world to replace private companies in this industry does not sound feasible, and I would question whether it would work at all. The private sector tends to be far better than government at these sorts of tasks, and it takes them many years and many hundreds of millions of dollars to invent something new.

Now, on to the other half of intellectual property, of which the entertainment industry is perhaps the most well known. No one talks about "medical piracy" even if stealing a formula and a movie are basically the same thing.

IP Piracy is far more straightforward, with none of the ethical questions that plague the medical arena. Something is produced, (a movie, game, book, etc.) and people want it, but don't want to pay for it. The question is then, WHY do people not want to pay for it? I personally don't think it's because people are just thieves and don't want to pay for things. I think there is something else going on, and the industry response is only making it worse.

A blockbuster movie costs quite a bit of money to make, and if it's good, they deserve to make a profit on their endeavor. In theory, piracy takes away from that possible profit. But let's get more detail.

Though people can pirate a movie, they cannot pirate seeing a movie IN A THEATER. I actually think this is why 3d has gotten so big so fast, because seeing a 3d film in a theater is an experience that cannot easily be pirated. Of course, I think this also makes most movies bad, so the merits are debatable. Even without 3d, I don't own a 400 inch tv, with 32 speakers, so if I want to see The Avengers the way it was meant to be seen, I better go and pay money for the theater experience.

Where piracy starts to impact profits is in home sales. There are two sides to this as well. The first is bootleggers selling illegal DVDs, and the other is internet sharing. Both are symptoms of the same basically economic problem: supply is not meeting what people are demanding.

Imagine, if you will, a system like this. 4 months after a movie is released, it goes up for streaming from a website. It streams in HD, instantly. The price: 1 Dollar. You want to see a movie at home, the price is a single dollar, and a mouse click. I'd pay that, and I'm cheap as hell. I honestly feel that 99% of piracy would evaporate instantly. The issue is that with current distribution channels, this system is impossible. We are locked into a DVD model that people do not want anymore. The price of a disc is too high, and we do not have enough bandwidth to support everyone streaming all their movies all the time. Because people do not like the options they have to pay for their content, they end up stealing it. Of course, always online requirements for all movies has its own problems. If your internet goes down, well, I guess you're not watching any movies.

This leads into another other part of internet piracy, games. Gamers are endlessly frustrated with harsher and harsher DRM requirements (that pirates seem to get around anyway!) The new fad in DRM is an always online requirement for games: to play, you have to login to an account you made online. This means the game can't really be stolen, because each purchase creates one account, stored on the game companies server. Downloading the game from The Pirate Bay does not create an account, so you can't login, so you can't play. 

This sounds great in theory, but the practice of it is fraught with problems. First off, players seem to REALLY hate always-online requirements. At least some of these reasons are easy to understand. If I want to play a game whenever I do not have internet, I can't. On my laptop on a plane, no good. At home if the internet goes out, impossible. If I live in an area where the internet is no good, like the middle of nowhere Kansas or something, well, I guess I just don't get to play at all? I DON'T GET TO GIVE THE COMPANY MONEY EVEN IF I WANT TO.

This practice creates a lot of ill will from the players, and one has to ask what that is worth. Imagine a game is released with no DRM, for $50. It gets 100 paying payers, and 100 people who pirate it, for total sales of $5000. Now, imagine the game comes out with DRM instead. The corporate mindset seems to be that all the pirates will instantly become paying customers, so you will (in my example) double your sales. This of course is not true. In all likelihood, many of the pirates simply won't play it. Maybe a few will, let's say 10%. So, in the above example, now there are 110 paying customers, for total sales of $5500, and because of your annoying DRM, your customer base now hates you. Is 500 dollars worth that hatred? Oddly, this comes on movies as well. If I BUY a blu-ray disk, it comes with an unskip-able anti-piracy warning. Why am I, a paying customer, subjected to a commercial about piracy? I have to wait a full minute watching this thing that does not apply to me because I actually BOUGHT THE DISC. If I download it off the net, no anti-piracy warning. Isn't that perverse?

Again, the problem here is a fundamental mismatch between supply and demand. People will pay for what they want if they feel it is worth it. If they don't feel it is worth it, reduce the price until they do. Indie game companies have found that drastic reductions in price result in far larger than expected sales increases. Cut the price of a game to 1/10th of what it used to be, and sales go up not by 10, but by 100, resulting in overall INCREASED profits. Why does this happen? In my experience, when the price of something gets low enough, you'll buy it just in case you MIGHT want it in the future. I have bought games that I have yet to play, because they were part of a bundle of games that I paid 6 dollars for. That is money they would not have made otherwise. These games are DRM free. I could download them, for free from the internet right now. But I didn't, because I wanted to buy them, as long as the price was right. And given that the cost of an additional copy of a game (to the producer) is ZERO (downloading a game costs them basically nothing) It makes no sense to keep the prices really high. There is no cost of production for each additional unit, and if the price is higher than I want to pay, piracy is an option.

This is a worldwide problem, in that piracy is happening everywhere and rather than adjust their sales models to meet the new demand, they are protecting the old order with DRM and lawsuits. Should people steal their goods? Absolutely not, but they are GOING TO until content creators (really content distributors) accept reality and shake up how they deliver content in the 21st century. There is a global market for good entertainment, and we all really want to pay for it. We just want it delivered in certain ways and at certain price points. If suppliers refuse to meet that demand, rampant (and growing despite all the industry action) piracy will continue.

Saturday, April 13, 2013

Issues in Cybersecurity, Part 2.



As we have seen, the challenges facing those who want to increase security in the cyber-realm are steep. How can we apply theory to give us some direction on solving these problems?

If we treat a cyber attack as a variant of military, state, or covert attack (instead of as a crime) we can examine it through the offense/defense lens. By determining who has the advantage when it comes to "battle", we can apply the best sort of strategy.

When it comes to protecting yourself from attack, you have two options: defense, or deterrence. Often times, a "defense" can also be used as an offense. This is why the US Department of "Defense" runs all offensive military operations. But in terms of actually defending, what it requires is the ability to prevent an enemy from hurting you when he attempts to do so. So, a high wall counts as defense, so does a trench, or an army to repel invaders. All of these are defensive measures. By having a strong defense, it is likely the enemy will not attack, because he can see that you have the ability to repel him. But, if he does not think your defense will stop his attack, he might attack anyway.

Some attacks are particularly hard to defend against. In the real world, we have determined that ballistic missiles are difficult to defend against. They will almost always hit and do damage. At a certain level of power (nuclear) there is basically no defending against them. No wall is thick enough, and if they launch enough (or advanced enough) missiles, we can't stop them mid-flight. They invalidate all concepts of "defense". Even non-nuclear missiles will do hideous damage to non-hardened targets, like cities, the average military base, or nearly any other installation. How then do we prevent an enemy from using an attack we cannot defend against?

Enter deterrence. Deterrence theory states, in effect, if we can threaten the enemy with enough violence in reprisal that he won't risk attacking us, even though the attack would work. In the real world, this played out with nuclear ballistic missiles: no one nuked America, even though we were helpless to stop them, because we would nuke them back, and they were just as helpless to stop us. No one wanted to risk being nuked, so no one fired their missiles first. As long as everyone understands what is going on, the situation holds, no war is started, and life goes on.

How does all this apply to cyber? Well, let's determine which analogy holds better? Can we use defense to stop cyber-attacks? So far, it seems like no, we cannot. There is no real defense to a cyber attack, we either have enough security to stop it, or we do not, but the hacker risks nearly nothing in the attempt. It is like an army attacking a medieval city that ONLY has a stone wall defending it. It costs nearly nothing to see if the wall is breakable, and if there is nothing threatening behind it, why not try and break it down?

Of course, it's even worse than that. By using viruses, bot-nets, and other tools, the attackers have much more powerful tools than the defenders. As discussed last time, there are also many, many points of vulnerability. Imagine the same stone wall, but now it has thousands of gates. And the enemy has modern artillery and aircraft. And if any hole is made in the defense, the city is pillaged. Clearly, defense is not a viable strategy unless something changes drastically in the cybersecurity field. There are sci-fi novels that introduce ideas of active defense, things that will attack a hackers system if he tries to break in…but in the real world, bot-nets invalidate that anyway. Destroying a hacker's computer is not a defense if it is not his computer doing the attacking, but a thousand random computers that were infected with a virus. So, again, unless technology radically changes, defense is just not a really good option, offense is dramatically more powerful.

That leaves deterrence. If offense is so powerful, than just like nuclear weapons, shouldn't we be able to threaten reprisals? If you hack our systems, we will hack yours back, erase your hard drive, infect you with viruses, and overheat your processor. This certainly SOUNDS effective, if the threat could be clearly communicated and feel credible. In theory, a credible threat, understood by all parties, should keep attacks at bay. Why then are we still being attacked?

Answer: Attribution. Unlike with a ballistic missile, which we can track back to its launch point, cyber attacks, as stated before, often come from unknown sources with unknown agencies behind them. Even if we absolutely know that a cyber attack came from China, we can't know for sure WHO in China is responsible. Is it the government? A private company? A random criminal? A terrorist organization? Who do we attack back? This is the major problem, if we solved this, the rest could be solved with it. A credible threat could be made, and the US has the ability to use far more than cyber to threaten with. Imagine if the attribution problem could be solved, and the US made a clear declaration: Any cyber attack of a certain magnitude would put you on a list of known terrorists and trigger a military response, a drone strike or sniper's bullet. What hacker is willing to risk this?

Of course, that is only if the attribution problem is solved. That MUST be the number one goal of US policy makers and private interests alike. But apparently the conventional wisdom is "deterrence doesn't work, cyber is an offense dominated paradigm". Well, that isn't good enough! If you don't want to hurt the enemy, what good does offense do you? We think China (or Chinese firms) are stealing our technology. What can we do with our offensive abilities? They have nothing for us to steal! Randomly destroying things in reprisal doesn't help either, blowing up a factory that makes goods that US consumers buy only hurts those very consumers. No, an offense-only world is not a world we want to live in, and that should not be a theoretical stopping point that anyone accepts. The problem is not that the world is offense-dominated and deterrence does not work, it's just that we ARE NOT DETERRING. We haven't solved the attribution problem, and we have not communicated any threats or policies to the world about the consequences of hacking American firms. The result: today's world.

I will admit, the nature of cyber is extremely different from anything we have faced before. It is a weapon with global reach, extreme destructive possibilities, but unlike nuclear weapons, can be used by almost anyone who puts their mind to it. The proliferation of cyber-weapons is like the proliferation of small arms, except each of those guns can shoot all the way to America. And because of the speed and connectivity of the internet, these weapons are being upgraded and modified all the time. It is a scary thought, but at the end of the day, these weapons are controlled by people not machines. This isn't terminator. Deterrence would work, IF we can make a credible threat. Working on how to make those threats must be a top priority, because it is unlikely that the nature of cyber space is going to change in such a way as to make a defensive strategy viable. 

Wednesday, April 10, 2013

Issues in Cybersecurity, Part 1.



Some of this is adapted from my notes of a few panels I closely watched at ISA, as well as other papers and sources I have read. I don't claim to be an expert on the subject, but from a high concept, logical standpoint, all of the following items make sense to me, and I have added my own thoughts and analysis when appropriate.

As we all know, cyberspace has seen huge growth in the last, say, 15 years. But until recently, cybersecurity was not seen as an important issue. In 2000, no one really talked about it, but now it's the top of every government's agenda. A few things changed to make this the case, but mainly, there just became a critical mass of people and tools to suddenly make it possible. More and more people have gotten access to the internet, and with those people have come criminals to take advantage of them. With the advances in communications technology, these hackers have increased in skill, shared techniques and software.

None of this would really be a problem, except for the fact that nearly all aspects of the internet were designed with "access", not "security", in mind. Consider most modern software advances. The goal is to let you connect from anywhere, at any time. Google stores your data, but gives you nearly instant access to your e-mail, files stored on their drives, and countless other things, from basically any device with an internet connection. Of course, it's not just Google. The money-making power of the web is to connect huge numbers of people together. But the easier they make it for people to connect, and the more people connected, the less secure everything is. There are huge vulnerabilities, and once the tools to exploit them were figured out, we see the problems we have today.

This is NOT an easy problem to solve, for multiple reasons. For one, the pace of internet access and innovation has only increased, and continues to do so at a far faster rate than people can keep secure. Think about the size of the internet 10 years ago compared to today, and the levels of growth. Cyber is exploding as more and more technology is connected together, but each new connection is a new vulnerability. Let me give you an example. People are waiting for "smart appliances" and "smart grids", in effect internet connected everything. We already have computers, phones, TVs, video game systems, etc. But soon enough, we will have, as a standard practice, internet connected lights, heating and AC, and other basic things around the home. Each of these things is a potential vulnerability for hacking. It might not sound like much, but imagine if someone discovered a vulnerability in a common internet-connected light fixture, and put out a virus that broke them all. How many thousands, millions of dollars in damage could be done? Heating and AC are even worse. Server farms take huge amounts of cooling or else they will overheat. Internet connected AC units could be attacked, which would then shut down the server farms inside those buildings. Thus, the servers are shut down even if the servers themselves are protected against hacking.

Why else is security so difficult? Consider the beginning of the internet, back when it was just ARPAnet. The idea was to create a highly decentralized network that could not be destroyed by enemy nukes, so communications could reroute around any destroyed node. That original idea continues in the basic infrastructure of cyberspace today. There isn't a central location that all information routes through, it goes through servers and hubs all over the world. Though this is very resilient to physical destruction and makes it very easy to add and connect to (thus the growth of the net as we know it today) this lack of central control also prevents any centralized security measures. There are huge amounts of overlapping ISPs, telecoms companies, utilities, to say nothing of individual networks, that could each be attacked individually. An ISP in san francisco could take many measures to secure their data, but the company that actually runs the cables (say Cisco) could be hacked, or a company that uses that ISP could be taken down. Or another ISP nearby could be attacked. The idea is that rather than one central point that could be hardened against any hacking attempt, every individual point of access needs security.

Let's use Microsoft as an example. Microsoft's servers are a point of vulnerability. The ISP Microsoft uses for their traffic is a vulnerability. Any user terminal that can connect to that server is a vulnerability. Any mobile device (phone, tablet, whatever) that can connect to a terminal, or server, is yet another vulnerability. To prevent a hacking attack, virus, etc. from stealing their data, how many things does Microsoft need to secure?

So, we have determined that defense is extremely difficult due to the basic nature of cyberspace today. What about going after the people who actually commit these attacks, be they for economic (cybercrime) intelligence (cyberespionage) or military (cyberwar) reasons? This, as it stands, has its own set of problems. One is proximity. Unlike most ACTUAL thefts, cyber theft can be done from nearly anywhere. Hackers in China can attack servers in the US. There is far more to it than that, though. As far as we can tell, the attacks originated from China. But connections can be routed through all sorts of places. What appears to come from China could actually just be the beginning of a trail of bouncing connections all over the world, making it nearly impossible to track the end user.

Even if one does manage to track down this hacker, how can one bring him to justice? If a company in the US is attacked, and the attack appears to come from, say, North Korea, what can the US do about it? We don't have any authority to investigate who the perpetrator might be. All we have is an IP address. It could have been nearly anyone on the other side of the screen, and the likelihood of the local North Korean authorities to come to our aid is low, to say the least.

Part Two will discuss the theoretical implications of this as well as my personal ideas on cybersecurity theory.

Saturday, April 6, 2013

ISA San Francisco 2013 Report, Part 3

ISA report for Saturday and final thoughts:

I'll admit to getting a little burned out on ISA by this time. Getting out of bed this morning was a struggle. Getting up, dressed and all the way out to San Francisco…on an early Saturday morning? Harsh. Though it was a struggle, I had important things to see today.

First up was a panel on the connections between Realism and Rationalism. There were two interesting looks at Morgenthau, one on Kuhn (someone I had never really heard about but is clearly important, I should look into him) and finally Kant as realist, which is a take I definitely had not heard before. Kant, the writer of perpetual peace, as a realist? Definitely unusual. The panel had Mearsheimer as a discussant, and it turns out he is much more moderate in his views in real life than comes off in discussions about him. He is also an awesome speaker, witty but with informed and clear views on many things. He does remind me of Prof. Hanami though, very clear about his views and is willing to say that other peoples ideas are nonsense if that's what he believes, and both do it while making the audience laugh. I should have a good time in his classes. I was able to introduce myself as an incoming student as well, so hopefully he will remember me in the fall.

Panel two for the day was a combination of thinking about Outer Space and Cyber Space. This was a little different from my last panels about these topics, which both had a military focus. These were a little more general, theoretical, discussing ways of thinking about the fast moving events in these areas, how they intersect with issues of security, sovereignty, but also freedom and connectivity. It was fairly interesting, I didn't learn as much about Outer Space this time, but there was a good survey of the current treaty status, which is useful to have as a starting point for any of my own research.

That was it for today, the convention was pretty much over by this point. In general, I felt that my taking part was enormously helpful to my development as a scholar. I definitely turned some "unknown unknowns" into "known unknowns", and got a sense for what would be expected of me at a similar presentation. As for what I actually LEARNED at the conference…well, that's harder to say. I walked away with many more questions than answers, but it's in answering those questions for myself that I grow as a scholar, and hopefully I can contribute some knowledge next year. I definitely plan on submitting a few paper proposals. Certainly my 550 paper, but I have some ideas about outer space and cybersecurity that I thought up while listening to the panels this year. Whether or not I'll be able to write them all is unknown, but I'm going to try my best to make a name for myself as soon as possible. Apparently, the field is being compressed downward. You used to not have to be published until after you were in a PhD program, even after you had finished. Now, you have to be published well before that, during your MA or even as an undergrad. The conference process seems to be equally important, and I've lost enough time not knowing what was available and what my goals should be.

ISA San Francisco 2013 Report, Part 2



This covers Friday of the Conference.

Today I had the full experience, from 8:15 am all the way to closing at 5:45. I decided this morning that I would just go the the panels that sounded the most interesting, rather than those that I might get the most out of in an academic-political sense (looking specifically for panels that had U. Chicago scholars, for example). Obviously then, the first panel I went to was fairly uninteresting, with the exception of the panelist who discussed an examination of The Prince that I had not heard before. I should have gone to the ISA Innovative Panel on mapping IR theory, which is a general topic that I am very interested in. Alas, I did not. Oh well.

In the break between the first and second timeslots, I considered my options. There was a panel with Ikenberry that…well, it had Ikenberry, an important scholar whose work is well known and received around the IR literature world, read in intro to IR classes, etc. But fuck that. I had a plan, and the plan was "go listen to interesting, fun things that *I* like, not that I 'should' see. In that vein, I went to a roundtable discussion on Cybersecurity, and I HAVE NO REGRETS. It was fascinating, talking about many aspects of the issue, and I have a few pages of notes and questions that I'd like to talk about further at a later date. It actually sparked an idea for a paper that I'd like to write sometime. Anyway, that was extremely awesome, though somewhat scary and depressing. I realize that the defense department has a point of view that is more doom-laden than the average scholar, but from just the facts, the situation does seem rather unstable.

Third on the list was an event called "Critical Security Studies Methods Cafe" which was an informal, inclusive discussion session between a bunch of different scholars and a few methods specialists. I spent most of my time at the Practice-Based Approaches table, listening to people talk and ask questions about the method, how it fits in to their research, and so on. Most of the scholars seemed to be PhDs, working on their dissertations, or junior scholars working on their books. I won't lie, it was a little intimidating. I listened, mostly out of my depth, (the SFSU IR program is great at a lot of things, but none of those things are methods training) but after an hour of listening I had gotten a small sort of handle on it and was able to make a few meaningful contributions. The positive response I got was really encouraging, I wish there were more opportunities like this.

Last for the day was a discussion of a new book which is actually an old book: a translation of Morgenthau's 1933 The Concept of the Political. As you might know (if you were in 550 with me) I used Morgenthau extensively for my research, and would like to read more of his work. I really think a lot of what Morgenthau had to say is still relevant to the field of IR today, especially given contemporary Realism. It is moving in this stark, "material factors, pure power politics, no items, fox only, final destination" direction, and I really feel that reopening realism to the blurry normative considerations it once thought important is theoretically useful. This is a really awkward paragraph, but I think the meaning is clear. And I even included a Smash reference, but one that is just perfectly apt for the situation.

That was Friday. Tomorrow is another outer space/cyber space panel (should be awesome), as well as another discussion of Realism as a theory, where I should be able to introduce myself to Mearsheimer. There are also about 50 papers I'm interested in reading. I HAVE SO MUCH READING TO DO. Looking at the field from the perspective of an undergrad is frightening, I won't lie. There is SO MUCH you have to catch up on just to be considered appropriately read in the field. Not even well read. Just as read as the average scholar. There is so much important scholarship being done every day, I don't know how anyone really stays on top of it all. If all the papers written for this conference are worth being read, hell if even HALF are worth being read, there are something like 2000 serious academic papers from this ISA alone. To read them before the next Annual Conference, you would need to go through about 5.5 per day, EVERY DAY. Let's say that only one in four papers are about something that you are interested in…that STILL means over one paper per day every day of the year, and you have to keep up that pace every year to stay current. And of course this does not include the important books that are published, or anything written from last year, or any of the classic pieces that every scholar should read. This is why I'm shocked anyone knows anything about what anyone is doing. How do you keep track of all this? I guess people heavily invested in the scholarly lifestyle really don't have a lot of outside hobbies. I doubt there are many PhD candidates that also play professional Starcraft. But that's the life I'm working for. Wish me luck.

ISA San Francisco 2013 Report, Part 1



This covers the Wednesday and Thursday of the conference. 

In general, the ISA experience has been incredible. There are a huge number of things to see and people to meet if you really put your mind to it, and I know that I have already lost some opportunities. But there are still two days left, and I plan on making the most of them.
As to the specifics, I saw an amazing roundtable discussion on Realist Institutionalism, a somewhat controversial theoretical approach (for modern realists) that pulls a lot from classical realism as well as constructivism. This is very exciting for me personally, as a lot of the issues the panelists discussed were from up in my 550 paper. Those of you who were in 550 with me might remember (if I did a good job in my presentations anyway) some of the concepts I brought up about contests over prestige, and using the Antarctica Treaty to defend their own power and interests. Anyway, those sorts of things and more were talked about, and it made me really want to go back and tune up my paper, there was so much deeper I could go both in the case as well as the theoretical framework. I might even submit it for next years ISA to discuss in a panel myself.

However, that panel was offset by one of some extremely mediocre paper presentations. If you are coming all the way to San Francisco from as far afield as Argentina, Finland, or China, you should bring your A game to present your paper. After all, you have no idea who will be in the audience and you only get one chance. Coming with a lower quality presentation than one I would expect from the average 550 student is really not serving you, the audience, or ISA itself.

It seems paper presentations are on a range though. I watched, from a packed room, paper presentations on Outer Space policy, and they were polished, clean, and informative. Definitely learned a lot, especially regarding what people are researching at the moment, what angles they were looking at. Most of the panelists were examining the civilian and military aspects of space policy (why space has been so slow to be weaponized, examining the experience of the European Space Agency, etc.) but none of the presenters really discussed the commercial aspects of space, though all mentioned that it will be very important in the coming years. I definitely wrote down some ideas for future papers that, thus far, people seemed to be ignoring.

The last thing I saw on Thursday was an exceptional roundtable discussion on Nuclear Deterrence. Waltz was supposed to be there, but he appears to be MIA for this conference. I was really hoping to meet him, one of the first things that got me into IR as a field was reading Waltz's books. As reading those books launched me on a path that put me where I am today, I wanted to shake his hand tell him that personally. Even without Waltz though, the roundtable was excellent, with all the panelists bringing unique insights and direction to the discussion. I brought home a list of topics and ideas to explore in my own research, and hope to one day be one of the people they mention as "besides Scholar X, Y, and Michael Lopate, people haven't been doing much research about this topic."

Yep, that's how vain I am.


The purpose of this blog.

For a while now, I've been considering putting together a blog for myself, some space where I can put to paper (or at least to screen) my ideas, opinions, and considerations of life and events. I won't lie though, there are other purposes to this as well. As a (hopefully) up and coming scholar, I hope that eventually, this blog will attract the notice of the right people, and eventually become a source of opinion that academics and non-academics alike will appreciate. I know it's not the goal of all scholars to become policy-makers, but I feel torn between both worlds. I absolutely want to be a professor, to work on grand theory that attempts to explain the world. But I also see foreign policy decisions being made at the highest levels and think, "if only I were in the white house, at the state department, DoD, somewhere, we would not be making these mistakes." I realize this is absolutely the height of hubris, especially given where I am right now, not even a college graduate from San Francisco State, which for all its merits is not an elite institution. But that is not going to prevent me from speaking out, and hoping that one day my work can make the world a better, safer, more prosperous place. Or, if not that, than at least a better educated one as to WHY we have the problems we have. According to me. Anyone who reads this is absolutely free to discount any and all of my opinions, theories, or policy prescriptions as being cruel, asinine, theoretically bogus, or all of the above. This is just one man's opinion, and even though *I* feel they have something to them, it is your right as a reader to disagree. I welcome all comments though, so if you think I'm wrong about something, please tell me why.


I should be posting about once a week, mostly related to the work I am doing in or out of school, but I will at times post my opinions on events, politics, policies, or whatever else I feel belongs here. I will eventually add functionality that will allow the reader to ask questions (e.g. What do you think the US should do about North Korea?) and I will attempt to answer them in future blog posts. In the mean time, I hope you enjoy whatever comes after this, and I promise to attempt to always be as fair, open, and intellectually honest as possible.