Nuclear Issues

116 Items

People watch a TV showing a file image of North Korean leader Kim Jong Un shown during a news program

AP/Ahn Young-joon

Journal Article - Ethics & International Affairs

Nuclear Ethics Revisited

| Spring 2023

Scott Sagan asked Joseph S. Nye to revisit Nuclear Ethics, a book he published in 1986, in light of current developments in world affairs. In doing so, he found that much had changed but the basic usability paradox of nuclear deterrence remains the same. 

Jens Stoltenberg speaks to students at the Harvard Kennedy School.

Bennett Craig

Speech

The Three Ages of NATO: An Evolving Alliance

| Sep. 23, 2016

Jens Stoltenberg,NATO Secretary General, discussed the future of the NATO alliance during this speech, given at the Harvard Kennedy School on September 23, 2016. He described the alliance as a responsive organization, capable of adapting to changes in the international security landscape but committed to the continuity of its founding values. In particular, he emphasized the necessity of maintaining a policy of absolute solidarity among member states, especially  in light of the exacerbating civil war in Syria and Russia’s aggressive stance toward countries to the East of NATO member state borders.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Blog Post - Nuclear Security Matters

ICYMI: Anti-Doping Seals Can be Beaten

June 03, 2016

The sports world was recently in a tizzy over revelations by the former head of Russia’s anti-doping laboratory – who has now fled the country – that he helped run a massive doping operation and cover-up that contributed to Russia’s impressive haul of medals at the 2014 Olympics.  (Russian officials and athletes denied the charges.)

Blog Post - Nuclear Security Matters

Two Recent Incidents of Insecurity

| July 21, 2015

Are nuclear sites secure?  There are some who might assume the answer is yes and that we should not worry about the possibility of nuclear bomb material being stolen. Yet, recent history has repeatedly demonstrated that high security facilities thought to be secure were actually vulnerable. Two such incidents last month illustrated this idea.

Blog Post - Nuclear Security Matters

Why Security Fails

    Author:
  • Roger G. Johnston
| Feb. 11, 2015

In thinking about how nuclear security and safeguards can fail, it is useful to keep in mind why security usually fails in general.  Most security managers and organizations have a good understanding of the assets they are trying to protect, the resources available to them to protect those assets, and the consequences should security fail (though this is sometimes greatly underestimated).  They often have a reasonably accurate understanding of the threats they face—who might attack, why, how, when, and with what goals and resources.  What is often lacking is a good understanding of the vulnerabilities—the weaknesses in the security that can be exploited by the threats—and how those vulnerabilities can be mitigated or eliminated.