Nuclear Issues

10 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Vice President Mike Pence, left, and White House Chief of Staff Reince Priebus, right, watch as President Donald Trump shows off an executive order

AP/Evan Vucci, File

Analysis & Opinions - Foreign Policy

5 Very Important Things About the World Nobody Knows

| Apr. 02, 2019

Stephen Walt writes that the future will be determined by a handful of big questions: What is China's future trajectory; How good are America's cybercapabilities; What's going to happen to the EU; How many states will go nuclear in the next 20 years; and Who will win the debate on U.S. grand strategy?

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Blog Post - Nuclear Security Matters

India’s Nuclear Security

    Author:
  • Rajeswari Pillai Rajagopalan
| Jan. 04, 2016

Situated in a difficult neighborhood, New Delhi has laid strong emphasis on both nuclear safety and security for a couple of decades now. Almost three decades of state-sponsored terrorism and insurgencies of varying scale and proportion within India have meant that security of nuclear materials and installations has been a great worry to India’s security and atomic energy establishments. India’s concerns even predate the Western focus on WMD terrorism, which gained prominence only after the 9/11 terrorist attacks in the United States.  Unfortunately, India’s excessive caution and secrecy in the nuclear arena has led the world to assume that India does not pay much attention to this issue or that it has inadequate security, which is far from the truth.

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Book - Managing the Atom Project, Belfer Center and Nuclear Threat Initiative

Securing the Bomb 2010

| April 2010

Associate Professor of Public Policy and Project on Managing the Atom Co-Principal Investigator Matthew Bunn provides a comprehensive assessment of global efforts to secure and consolidate nuclear stockpiles, and a detailed action plan for securing all nuclear materials in four years.  Securing the Bomb 2010 was commissioned by the Nuclear Threat Initiative (NTI). The full report, with additional information on the threat of nuclear terrorism, is available for download on the NTI website.