Nuclear Issues

52 Items

FBI agents leave a raid in Trenton, N.J. on July 19, 2012

Julio Cortez/AP

Discussion Paper - Managing the Atom Project, Belfer Center

The Long Arm

| February 2019

The networks of middlemen and intermediaries involved in the illicit procurement of weapons of mass destruction (WMD)-related goods and technologies often operate outside of the United States, which presents several legal and political challenges regarding U.S. trade control enforcement activities. This report considers the extraterritorial efforts of U.S. law enforcement in counterproliferation-related activities and their implications. In other words, how does the United States contend with violations of its weapons of mass destruction (WMD)-related trade controls in overseas jurisdictions, and what are the implications for broader U.S. and international nonproliferation efforts, as well as wider international security and economic concerns? 

teaser image

- Belfer Center for Science and International Affairs, Harvard Kennedy School

International Security

| Summer 2017

A sampling of articles in the Spring 2016 issue of the Belfer Center's journal International Security.

International Security is America’s leading journal of security affairs. 
IS was ranked first in impact factor for 2014 among 85 journals of international relations in the annual “Journal Citation Reports”® released by Thomson Reuters. International Security’s 2014 Impact Factor is the highest of any international relations journals.

Blog Post - Nuclear Security Matters

Two Recent Incidents of Insecurity

| July 21, 2015

Are nuclear sites secure?  There are some who might assume the answer is yes and that we should not worry about the possibility of nuclear bomb material being stolen. Yet, recent history has repeatedly demonstrated that high security facilities thought to be secure were actually vulnerable. Two such incidents last month illustrated this idea.

US Secretary of State John Kerry (right) and Iranian Foreign Minister Javad Zarif meet in Paris to discuss the Iranian nuclear deal.

United States Department of State

Analysis & Opinions - The National Interest

Assessing an Iran Deal: 5 Big Lessons from History

| July 7, 2015

As the policy community prepares to assess an agreement between the U.S. and its P5+1 partners and Iran, Senate Foreign Relations Committee Chairman Bob Corker asked me to review the history of analogous agreements for lessons that illuminate the current challenge. In response to his assignment, I reviewed the seven decades of the nuclear era, during which the U.S. negotiated arms-control treaties, including the Non-Proliferation Treaty of 1968; strategic arms limitation talks and agreements from SALT to New Start; the North Korean accord of 1994; the agreements that helped eliminate nuclear weapons in Ukraine, Kazakhstan, and Belarus in the early 1990s; and the pact that eliminated the Libyan nuclear weapons program in 2003.

Among many lessons and clues from this instructive history, five stand out

Blog Post - Nuclear Security Matters

IAEA Releases Guidelines on Nuclear Material Control and Accounting

| June 09, 2015

More than a decade after its nuclear security recommendations first recognized the threat insiders pose to nuclear facilities, the International Atomic Energy Agency (IAEA) has finally released its guide on nuclear material control and accounting for nuclear security.  (This has been in the works for years.) Many people wrongly think that any material under international safeguards has accounting and control good enough for security purposes as well, but there are important differences.

Blog Post - Nuclear Security Matters

Why Security Fails

    Author:
  • Roger G. Johnston
| Feb. 11, 2015

In thinking about how nuclear security and safeguards can fail, it is useful to keep in mind why security usually fails in general.  Most security managers and organizations have a good understanding of the assets they are trying to protect, the resources available to them to protect those assets, and the consequences should security fail (though this is sometimes greatly underestimated).  They often have a reasonably accurate understanding of the threats they face—who might attack, why, how, when, and with what goals and resources.  What is often lacking is a good understanding of the vulnerabilities—the weaknesses in the security that can be exploited by the threats—and how those vulnerabilities can be mitigated or eliminated.