Nuclear Issues

20 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Landscape of the Nevada National Security Site

NNSA/Nevada Site Office

Analysis & Opinions - The National Interest

Donald Trump Could Lose the Election by Authorizing a New Nuclear Weapons Test

    Authors:
  • Benoît Pelopidas
  • Jonathon Baron
  • Fabrício Fialho
| June 23, 2020

Polls in the United States and nine allied countries in Europe and Asia show that public support for a nuclear test is very low. If the Trump administration conducts a test, then it shouldn't expect backing from Americans or its closest U.S. partners.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

How to Know if Iran Breaks its Word: Financial Monitoring

AP Images

Analysis & Opinions - Bulletin of the Atomic Scientists

How to Know if Iran Breaks its Word: Financial Monitoring

| May 26, 2015

In this new oped for the Bulletin of the Atomic Scientist, MTA Associate Aaron Arnold and colleague Nikos Passas consider the role of banks in monitoring and verifying proliferation-related transactions. He outlines steps that the P5+1 and Iran can take in a final agreement that will allow them to remain vigilant about proliferation financing.

Announcement - Science, Technology, and Public Policy Program, Belfer Center

Science, Technology, and Public Policy Fellowships, 2015–2016

December 12, 2014

Each year, the Science, Technology, and Public Policy (STPP) Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School welcomes new pre- and post-doctoral fellows and visiting researchers to a select team of scholars exploring the critical role that science and technology play in everyday life.

Announcement - Science, Technology, and Public Policy Program, Belfer Center

STPP Fellowships, 2014–2015

November 25, 2013

Each year, the Science, Technology, and Public Policy (STPP) Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School welcomes new pre- and post-doctoral fellows and visiting researchers to a select team of scholars exploring the critical role that science and technology play in everyday life.

Report - Managing the Atom Project, Belfer Center

Plutonium Mountain: Inside the 17-Year Mission to Secure a Legacy of Soviet Nuclear Testing

| August 15, 2013

The Belfer Center’s Eben Harrell and Pulitzer Prize-winning author David E. Hoffman for the first time report the details of one of the largest nuclear security operations of the post-Cold War years — a  secret 17-year, $150 million operation to secure plutonium in the tunnels of Degelen Mountain.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Report - Council on Foreign Relations Press

Global Korea: South Korea's Contributions to International Security

    Authors:
  • Scott Bruce
  • John Hemmings
  • Balbina Y. Hwang
  • Scott Snyder
| October 2012

Given the seriousness of the ongoing standoff on the Korean peninsula, South Korea's emergence as an active contributor to international security addressing challenges far from the Korean peninsula is a striking new development, marking South Korea's emergence as a producer rather than a consumer of global security resources. This volume outlines South Korea's progress and accomplishments toward enhancing its role and reputation as a contributor to international security.