Nuclear Issues

13 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Analysis & Opinions - Power & Policy Blog

The Plutonium Mountain Mission: Lessons

| Sep. 27, 2013

In Summer of 2013, The Project on Managing the Atom released “Plutonium Mountain: Inside the 17-Year Mission to Secure a Dangerous Legacy of Soviet Nuclear Testing.” In the report, Eben Harrell and David Hoffman tell how dedicated scientists and engineers in three countries overcame suspicions, secrecy, bureaucracy, and logistical obstacles to secure more than a dozen bombs worth of plutonium that had been left behind at the Semipalatinsk Test Site in Kazakhstan after the collapse of the Soviet Union. Although the outline of the Semipalatinsk operation had been made public before, the report filled in new details.

Analysis & Opinions - The Washington Post

Saving the World at Plutonium Mountain

| August 16, 2013

Last October, at the foot of a rocky hillside near here, at a spot known as Degelen Mountain, several dozen Kazakh, Russian and American nuclear scientists and engineers gathered for a ceremony. The modest ribbon-cutting marked the conclusion of one of the largest and most complex nuclear security operations since the Cold War — to secure plutonium (enough to build a dozen or more nuclear weapons) that Soviet authorities had buried at the testing site years before and forgotten, leaving it vulnerable to terrorists and rogue states. The effort spanned 17 years, cost $150 million and involved a complex mix of intelligence, science, engineering, politics and sleuthing. This op-ed is based on documents and interviews with Kazakh, Russian and U.S. participants, and reveals the scope of the operation for the first time.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Various images shown on screens at the General Satellite Control and Command Center show the launch of North Korea's Unha-3 rocket, Dec. 12, 2012, in Pyongyang, North Korea.

AP Photo

Policy Brief - National Bureau of Asian Research

The Leap in North Korea's Ballistic Missile Program: The Iran Factor

| December 2012

John S. Park, Stanton Nuclear Security Junior Faculty Fellow at the Massachusetts Institute of Technology and Project on Managing the Atom Associate, argues that cooperation between North Korea and Iran has been a critical—yet underexamined—enabler of North Korea's recent success. He concludes that the time has come for the United States to view the two previously independent missile programs as two sides of the same coin and recommends strategies for disrupting the procurement channels between Iran and North Korea.

Discussion Paper - Managing the Atom Project, Belfer Center

Antiproliferation: Tackling Proliferation by Engaging the Private Sector

| November 2012


Illicit trade from the international marketplace plays a direct role in sustaining the nuclear and missile programs of several countries, including Iran, in defiance of UN sanctions. This paper sets out what measures the private sector should take in order to manage the legal, financial and reputational risks associated with involvement in proliferation-related trade, and makes recommendations to national authorities for how for how to help the private sector identify and prevent potential proliferation.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."