Nuclear Issues

7 Items

Houthi supporters chant slogans holding signs reading "Death to America, Death to Israel"

AP/Hani Mohammed, File

Journal Article - Journal of Applied History

Two Types of Applied History

| December 2023

In recent years, a concerted effort has been made to build up and delineate a discipline of applied history. But there has been little discussion about what applied history is, how the discipline navigates a range of epistemological problems, and how applied history is distinct from other disciplines that use historical data and attend to matters of policy—particularly political science. This article considers some of these questions with respect to two common methods of applied history: analogy and genealogy.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Young John F. Kennedy

The John F. Kennedy Presidential Library and Museum

Audio - Radio Open Source

JFK in the American Century

| Oct. 22, 2020

The historian Fredrik Logevall has written a grand fresh take on the life of John F. Kennedy, as if to reignite an old flame. He's given us a chance to remember politics as the sport of great minds and hearts, high language, serious stuff.

bleached radiation warning sign

Wikimedia CC/ArticCynda

Analysis & Opinions - The Washington Post

The Deadly Fallout of Disinformation

| July 08, 2020

Calder Walton writes that autocratic regimes — China, Russia and Iran — have been using social media to try to influence U.S. public opinion. History reveals how and why a one-party regime used disinformation to salvage its reputation following a disaster — the Soviet Union's 1986 Chernobyl nuclear catastrophe, whose history also reveals how such disinformation can be countered.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."