Nuclear Issues

50 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

President Joe Biden meets with Russian President Vladimir Putin

AP/Patrick Semansky

Analysis & Opinions - Bulletin of the Atomic Scientists

Biden to Putin in Geneva: There's a New Sheriff in Town.

| June 17, 2021

No great breakthroughs or dramatic developments were expected at the Biden-Putin summit, and none was achieved. But the message was clear: There is a new sheriff in town. Putin noticed, describing Biden as very different from Trump—experienced, balanced, and professional.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

FBI agents leave a raid in Trenton, N.J. on July 19, 2012

Julio Cortez/AP

Discussion Paper - Managing the Atom Project, Belfer Center

The Long Arm

| February 2019

The networks of middlemen and intermediaries involved in the illicit procurement of weapons of mass destruction (WMD)-related goods and technologies often operate outside of the United States, which presents several legal and political challenges regarding U.S. trade control enforcement activities. This report considers the extraterritorial efforts of U.S. law enforcement in counterproliferation-related activities and their implications. In other words, how does the United States contend with violations of its weapons of mass destruction (WMD)-related trade controls in overseas jurisdictions, and what are the implications for broader U.S. and international nonproliferation efforts, as well as wider international security and economic concerns? 

Paper

Lessons on the Value of a Military Fellowship, North Korea & Iran's Nuclear Pursuits, and the Evolving Cyberspace Domain

| April 2013

This paper briefly covers three topics of interest—a description of the author's fellowship and its value, how nuclear weapons are still "game changers" on the 50th anniversary of the Cuban Missile Crisis, and how the cyberspace domain is reshaping military activities and doctrine in the 21st Century.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."

June 5, 2008: Gotthard Lerch, right, watches the judges entering the courtroom in Stuttgart, Germany. He admitted to helping procure centrifuge parts for Libya, was convicted in 2008 on minor charges, and sentenced to time served in pretrial detention.

AP Photo

Magazine Article - TIME / time.com

Nuclear Proliferation: The Crime with No Punishment?

| September 16, 2011

"Nuclear proliferation is a crime that pays well. Those involved in the Khan network were made very wealthy for their efforts, and the inability of the international community to effectively punish them has resulted in a missed opportunity to provide a deterrent against future black-market salesmen."