Nuclear Issues

20 Items

People watch a TV showing a file image of North Korean leader Kim Jong Un shown during a news program

AP/Ahn Young-joon

Journal Article - Ethics & International Affairs

Nuclear Ethics Revisited

| Spring 2023

Scott Sagan asked Joseph S. Nye to revisit Nuclear Ethics, a book he published in 1986, in light of current developments in world affairs. In doing so, he found that much had changed but the basic usability paradox of nuclear deterrence remains the same. 

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

President Joe Biden meets with Russian President Vladimir Putin

AP/Patrick Semansky

Analysis & Opinions - Bulletin of the Atomic Scientists

Biden to Putin in Geneva: There's a New Sheriff in Town.

| June 17, 2021

No great breakthroughs or dramatic developments were expected at the Biden-Putin summit, and none was achieved. But the message was clear: There is a new sheriff in town. Putin noticed, describing Biden as very different from Trump—experienced, balanced, and professional.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Could There Be a Terrorist Fukushima?

commons.wikimedia.org

Analysis & Opinions - The New York Times

Could There Be a Terrorist Fukushima?

| April 4, 2016

The attacks in Brussels last month were a stark reminder of the terrorists’ resolve, and of our continued vulnerabilities, including in an area of paramount concern: nuclear security.

The attackers struck an airport and the subway, but some Belgian investigators believe they seemed to have fallen back on those targets because they felt the authorities closing in on them, and that their original plan may have been to strike a nuclear plant. A few months ago, during a raid in the apartment of a suspect linked to the November attacks in Paris, investigators found surveillance footage of a senior Belgian nuclear official. Belgian police are said to have connected two of the Brussels terrorists to that footage.

- Belfer Center for Science and International Affairs, Harvard Kennedy School Quarterly Journal: International Security

Paul Doty's Legacy Lives on Through Influential Journal

| Spring 2012

As soon as Paul Doty launched what is now Harvard’s Belfer Center for Science and International Affairs in 1974, he began planning a scholarly journal on international security. He shrugged off colleagues’ concerns that there would be little market for such a journal.Thirty-six years after the first issue appeared in the summer of 1976, the Belfer Center’s quarterly International Security consistently ranks No. 1 or No. 2 out of over 70 international affairs journals surveyed by Thomson Reuters each year.

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Belfer Center Newsletter Winter 2011-2012

| Winter 2011-2012

The Winter 2011-2012 issue of the Belfer Center newsletter features news, analysis and insight by Belfer Center scholars on issues that include increasingly important info-tech policy challenges and the first U.S.-Russian joint threat assessment on nuclear terrorism. The Center’s deepening impact on defense policy is highlighted with an article about the recent appointments of Ashton B. Carter and Eric Rosenbach to senior Pentagon posts and a Q&A with Carter, the new deputy secretary of defense. Additional articles focus on issues ranging from the Palestinian bid for statehood to Calestous Juma’s role in Lagos’ launch of the first innovation advisory council in Africa.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."