Nuclear Issues

30 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

teaser image

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Center Experts Reflect on 75th Anniversary of Hiroshima Bombing

On August 6, 1945, the United States dropped an atomic bomb on Hiroshima, Japan, launching the nuclear age. On the 75th anniversary of that somber event, Belfer Center experts reflect on the event and its aftermath. 

Blog Post - Nuclear Security Matters

Nuclear Security in Turkey

Aug. 04, 2016

In mid-July, as an attempted coup was taking place in Turkey, many in the United States wondered whether U.S. tactical nuclear weapons stored at the Turkish airbase, Incirlik, were adequately protected against theft. Congressional Research Service Nuclear Weapons Policy Specialist, Amy Woolf, recently published a short article describing some of the security systems surrounding those weapons.

Blog Post - Nuclear Security Matters

The Dannemora Prison Break: Lessons for Nuclear Facilities

| Sep. 09, 2015

In prisons as in nuclear facilities, employees are tasked with guarding something highly dangerous in high-stress environments. Both face high costs in the event of failure, and both are especially vulnerable to complacency and insider threats. Given these parallels, two inmates’ dramatic break-out from a New York prison in early June offers nuclear security practitioners valuable insights into how to avert an equally dramatic (and potentially much more consequential) breech.

Blog Post - Nuclear Security Matters

Dirty bomb efforts and uranium seizure in Ukraine may be less than meets the eye

    Author:
  • Artur Saradzhyan
| Aug. 12, 2015

Ukraine-based journalist Maxim Tucker has just published two articles to claim that pro-Russian rebels in Eastern Ukraine are plotting to manufacture a dirty bomb with the help of Russian scientists, using radioactive waste from a storage facility at the Donetsk Chemical Factory.

Blog Post - Nuclear Security Matters

Bunn, Tobey, and Roth on Nuclear Smuggling

May 20, 2015

Matthew Bunn, William Tobey, and I have a new op-ed in The Hill’s Congress Blog, “Don’t weaken our defenses against nuclear smuggling.” We wrote it in response to proposed legislation that would prohibit funding for fixed radiation detectors to catch nuclear smugglers – both for installing new ones and even for maintaining the ones U.S. taxpayers have already paid billions to install.

Blog Post - Nuclear Security Matters

Why Security Fails

    Author:
  • Roger G. Johnston
| Feb. 11, 2015

In thinking about how nuclear security and safeguards can fail, it is useful to keep in mind why security usually fails in general.  Most security managers and organizations have a good understanding of the assets they are trying to protect, the resources available to them to protect those assets, and the consequences should security fail (though this is sometimes greatly underestimated).  They often have a reasonably accurate understanding of the threats they face—who might attack, why, how, when, and with what goals and resources.  What is often lacking is a good understanding of the vulnerabilities—the weaknesses in the security that can be exploited by the threats—and how those vulnerabilities can be mitigated or eliminated.