Nuclear Issues

29 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

U.S. Secretary of State John Kerry, right, speaks with Iranian Foreign Minister Mohammad Javad Zarif, in Geneva, Switzerland, Wednesday, January 14, 2015, during a bilateral meeting ahead of nuclear negotiations.

Martial Trezzini/ AP

Journal Article - Quarterly Journal: International Security

Strategies of Inhibition: U.S. Grand Strategy, the Nuclear Revolution, and Nonproliferation

| Summer 2015

Most histories of post-1945 U.S. grand strategy focus on containment of the Soviet Union and U.S. efforts to promote political and economic liberalization. A closer look reveals that "strategies of inhibition"—attempts to control nuclear proliferation—have been a third central pillar of U.S. grand strategy for several decades.

President John F. Kennedy arrived on June 23, 1963 at the airport in Cologne-Wahn for a four day visit to Germany. In front, chancellor Konrad Adenauer.

AP

Journal Article - Quarterly Journal: International Security

Alliance Coercion and Nuclear Restraint: How the United States Thwarted West Germany's Nuclear Ambitions

| Spring 2015

A prominent model of nuclear proliferation posits that a powerful patron state can prevent a weaker ally from proliferating by providing it with security guarantees. The history of West Germany's pursuit of the bomb from 1954 to 1969 suggests that a patron may also need to threaten the client state with military abandonment to convince it not to acquire nuclear weapons.

A Hatf-8 (Ra'ad) missile (precursor to the Nasr missile), capable of carrying nuclear war heads, loaded on a trailer during the Pakistan National Day parade in Islamabad, Pakistan on Sunday, March 23, 2008.

Emilio Morenatti / AP

Journal Article - Quarterly Journal: International Security

Pakistan's Battlefield Nuclear Policy: A Risky Solution to an Exaggerated Threat

| Winter 2014/15

Pakistan has developed tactical nuclear weapons to deter India from executing its Cold Start war doctrine. India, however, has disavowed that doctrine. Further, the use of such weapons against Indian troops inside Pakistan would kill and injure countless civilians, while risking massive nuclear retaliation by India. In this International Security article, Jaganath Sankaran argues Pakistan should reconsider the role of tactical nuclear weapons in its military strategy.

Journal Article - China Nuclear Power

Securing Chinese Nuclear Power Development: Further Strengthening Nuclear Security

| September, 2014

Chinese President Xi Jinping addresses China’s new concept of nuclear security with four “equal emphasis” at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi’s political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China’s existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."