Nuclear Issues

16 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Landscape of the Nevada National Security Site

NNSA/Nevada Site Office

Analysis & Opinions - The National Interest

Donald Trump Could Lose the Election by Authorizing a New Nuclear Weapons Test

    Authors:
  • Benoît Pelopidas
  • Jonathon Baron
  • Fabrício Fialho
| June 23, 2020

Polls in the United States and nine allied countries in Europe and Asia show that public support for a nuclear test is very low. If the Trump administration conducts a test, then it shouldn't expect backing from Americans or its closest U.S. partners.

How to Know if Iran Breaks its Word: Financial Monitoring

AP Images

Analysis & Opinions - Bulletin of the Atomic Scientists

How to Know if Iran Breaks its Word: Financial Monitoring

| May 26, 2015

In this new oped for the Bulletin of the Atomic Scientist, MTA Associate Aaron Arnold and colleague Nikos Passas consider the role of banks in monitoring and verifying proliferation-related transactions. He outlines steps that the P5+1 and Iran can take in a final agreement that will allow them to remain vigilant about proliferation financing.

Analysis & Opinions - Managing the Atom Project, Belfer Center

Imagining a Post-Sanctions Iran

| October 8, 2014

Financial sanctions against Iran are contributing to the growth of regional criminal networks, which use fraud, bribery, and corruption to facilitate commerce. From airplane parts and medical equipment, to specialized materials for weapons programs, an intricate underground economy of financial and logistic intermediaries play a critical role in helping Iran circumvent Western sanctions. Do not expect this to change in a post-sanctions world...

Report - Managing the Atom Project, Belfer Center

Plutonium Mountain: Inside the 17-Year Mission to Secure a Legacy of Soviet Nuclear Testing

| August 15, 2013

The Belfer Center’s Eben Harrell and Pulitzer Prize-winning author David E. Hoffman for the first time report the details of one of the largest nuclear security operations of the post-Cold War years — a  secret 17-year, $150 million operation to secure plutonium in the tunnels of Degelen Mountain.

Report - Council on Foreign Relations Press

Global Korea: South Korea's Contributions to International Security

    Authors:
  • Scott Bruce
  • John Hemmings
  • Balbina Y. Hwang
  • Scott Snyder
| October 2012

Given the seriousness of the ongoing standoff on the Korean peninsula, South Korea's emergence as an active contributor to international security addressing challenges far from the Korean peninsula is a striking new development, marking South Korea's emergence as a producer rather than a consumer of global security resources. This volume outlines South Korea's progress and accomplishments toward enhancing its role and reputation as a contributor to international security.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Book Chapter - Quarterly Journal: International Security

Preface to Going Nuclear

| January 2010

"Concern over nuclear proliferation is likely to increase in the coming years. Many observers believe that the spread of nuclear weapons to one or two more states will trigger a wave of new nuclear states. More states may turn to nuclear power to meet their energy needs as other sources of energy become more costly or undesirable because they emit carbon that contributes to global climate change. As more nuclear reactors are built, the world's stock of nuclear expertise and fissionable materials is likely to grow."

Heavy concrete blocks over steel security doors help protect nuclear warhead storage at Pantex.

Department of Energy

Book Chapter - Quarterly Journal: International Security

Nuclear Terrorism: A Strategy for Prevention

| January 2010

"On the night of November 8, 2007, two teams of armed men attacked the Pelindaba nuclear facility in South Africa, where hundreds of kilograms of weapons-grade highly enriched uranium (HEU) were stored. One of the teams opened fire on the site security forces, who reportedly fled. The other team of four armed men went through a 10,000-volt security fence, disabled the intrusion detectors so that no alarms sounded—possibly using insider knowledge of the security system—broke into the emergency control center, and shot a worker there in the chest after a brief struggle. The worker at the emergency control center raised an alarm for the first time. These intruders spent forty-five minutes inside the secured perimeter without ever being engaged by site security forces...."