Nuclear Issues

12 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Robert, Laurence, and Renée Belfer

(Photo be Martha Stewart)

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Extraordinary Gift to Harvard Kennedy School’s Belfer Center to Launch Cyber Security Project

January 19, 2016

Cambridge, MA – Harvard University announced today that Robert and Renée Belfer, along with their son Laurence, are investing an additional $15 million to advance the work of the Belfer Center for Science and International Affairs at Harvard Kennedy School in addressing the world’s most critical security issues.

Reflecting their philanthropic mission to build a more secure, peaceful world, the Belfer family’s gift puts the Belfer Center on the front lines of what CIA Director John Brennan calls the greatest threat to U.S. national security in the decade ahead: cyber threats. In particular, it launches a major new Cyber Security Project, which seeks to help create the conceptual arsenal for strategists to confront this growing challenge.

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

A New Report: Steps to Prevent Nuclear Terrorism - Recommendations Based on the U.S.-Russia Joint Threat Assessment

October 2, 2013

Nuclear terrorism remains a real and urgent threat. Despite an array of mechanisms established to combat this threat, several serious problems persist, requiring relentless attention and actions by the United States, Russia and other responsible nations. These problems include continuing nuclear security vulnerabilities in a number of countries and the continued incidents of illicit trafficking in nuclear materials, radioactive sources and the various components.

This new report, “Steps to Prevent Nuclear Terrorism: Recommendations Based on the U.S.-Russia Joint Threat Assessment,” was produced jointly by researchers at Harvard’s Belfer Center for Science and International Affairs and the Russian Academy of Sciences’ Institute for U.S. and Canadian Studies (ISKRAN). The study outlines concrete steps for the United States and Russia to take in leading international efforts to combat the threat of nuclear terrorism.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Center Prepares Dossier for Seoul Nuclear Summit

Spring 2012

When President Barack Obama hosted nearly 50 heads of state in Washington, D.C. for the first global Nuclear Security Summit in 2010, the Belfer Center made available to the leaders and their sherpas a range of relevant background materials and information. With the arrival of the 2012 Seoul Nuclear Security Summit, the Center created www.nuclearsummit.org – an online Nuclear Security Summit dossier.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."