Nuclear Issues

7 Items

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Analysis & Opinions - Iran Matters

Current State of Global Sanctions Against Iran

| Mar. 23, 2015

In this op-ed for Iran Matters, Aaron Arnold provides a crucial update on the status of the economic sanctions placed on Iran. He argues that in the short term, a lack of sanctions relief will continue to damage the Iranian economy and undercut efforts by the Rouhani Administration to revitalize growth. However, he points out that new developments in the global economy, such as the creation of an alternative to the SWIFT financial messaging system pushed by Russia and China, will possibly degrade the effectiveness of sanctions in the long run.

Analysis & Opinions - Power & Policy Blog

The Plutonium Mountain Mission: Lessons

| Sep. 27, 2013

In Summer of 2013, The Project on Managing the Atom released “Plutonium Mountain: Inside the 17-Year Mission to Secure a Dangerous Legacy of Soviet Nuclear Testing.” In the report, Eben Harrell and David Hoffman tell how dedicated scientists and engineers in three countries overcame suspicions, secrecy, bureaucracy, and logistical obstacles to secure more than a dozen bombs worth of plutonium that had been left behind at the Semipalatinsk Test Site in Kazakhstan after the collapse of the Soviet Union. Although the outline of the Semipalatinsk operation had been made public before, the report filled in new details.

Analysis & Opinions - The Washington Post

Saving the World at Plutonium Mountain

| August 16, 2013

Last October, at the foot of a rocky hillside near here, at a spot known as Degelen Mountain, several dozen Kazakh, Russian and American nuclear scientists and engineers gathered for a ceremony. The modest ribbon-cutting marked the conclusion of one of the largest and most complex nuclear security operations since the Cold War — to secure plutonium (enough to build a dozen or more nuclear weapons) that Soviet authorities had buried at the testing site years before and forgotten, leaving it vulnerable to terrorists and rogue states. The effort spanned 17 years, cost $150 million and involved a complex mix of intelligence, science, engineering, politics and sleuthing. This op-ed is based on documents and interviews with Kazakh, Russian and U.S. participants, and reveals the scope of the operation for the first time.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."