Nuclear Issues

15 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Announcement - Science, Technology, and Public Policy Program, Belfer Center

Science, Technology, and Public Policy Fellowships, 2015–2016

December 12, 2014

Each year, the Science, Technology, and Public Policy (STPP) Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School welcomes new pre- and post-doctoral fellows and visiting researchers to a select team of scholars exploring the critical role that science and technology play in everyday life.

Announcement - Science, Technology, and Public Policy Program, Belfer Center

STPP Fellowships, 2014–2015

November 25, 2013

Each year, the Science, Technology, and Public Policy (STPP) Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School welcomes new pre- and post-doctoral fellows and visiting researchers to a select team of scholars exploring the critical role that science and technology play in everyday life.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Presentation

The Evolution of the IAEA: Using Nuclear Crises as Windows of Opportunity (or Not)

| March 13, 2013

This seminar considered how the International Atomic Energy Agency (IAEA) has reacted to nuclear crises. The IAEA often appears not just to have weathered such crises, but to have successfully leaped through windows of opportunity presented by them. This has resulted in periodic expansions of its mandate, capabilities, and resources. The 2011 Fukushima disaster appears to be a puzzling exception, raising the question of what concatenation of factors needs to be present for the IAEA to take advantage of nuclear crises.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.