Nuclear Issues

49 Items

A U.S. Customs and Border Protection officer uses a handheld GR135- Radiation Isttope Identifier to check a container that was stopped after passing through a radiation detection device at the port of Newark in February 2006 (AP Photo/Mel Evans).

AP Photo/Mel Evans

Journal Article - Nonproliferation Review

Combating Nuclear Smuggling? Exploring Drivers and Challenges to Detecting Nuclear and Radiological Materials at Maritime Facilities

| June 03, 2019

International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.

FBI agents leave a raid in Trenton, N.J. on July 19, 2012

Julio Cortez/AP

Discussion Paper - Managing the Atom Project, Belfer Center

The Long Arm

| February 2019

The networks of middlemen and intermediaries involved in the illicit procurement of weapons of mass destruction (WMD)-related goods and technologies often operate outside of the United States, which presents several legal and political challenges regarding U.S. trade control enforcement activities. This report considers the extraterritorial efforts of U.S. law enforcement in counterproliferation-related activities and their implications. In other words, how does the United States contend with violations of its weapons of mass destruction (WMD)-related trade controls in overseas jurisdictions, and what are the implications for broader U.S. and international nonproliferation efforts, as well as wider international security and economic concerns? 

Collapse of Soviet Union Pro-democracy demonstrators file across Moscow's Crimean Bridge to link up with thousands more converging on a square in the downtown area in Moscow, Feb. 23, 1990. Those in the foreground wave flags and banners of one of the organization seeking free elections throughout the Soviet Union. (AP Photo/Boris Yurchenko)

AP Photo/Boris Yurchenko

Analysis & Opinions - Russia Matters

The Soviet Collapse and Its Lessons for Modern Russia: Gaidar Revisited

| Dec. 22, 2016

Although Russia has evolved in many ways since 1991, it’s worth taking a second look at the drivers behind the Soviet collapse and assessing which of them may be relevant for today’s Russia or could become relevant in the near to medium-term future.

Blog Post - Nuclear Security Matters

Nuclear Security in Turkey

Aug. 04, 2016

In mid-July, as an attempted coup was taking place in Turkey, many in the United States wondered whether U.S. tactical nuclear weapons stored at the Turkish airbase, Incirlik, were adequately protected against theft. Congressional Research Service Nuclear Weapons Policy Specialist, Amy Woolf, recently published a short article describing some of the security systems surrounding those weapons.

Blog Post - Nuclear Security Matters

ICYMI: Anti-Doping Seals Can be Beaten

June 03, 2016

The sports world was recently in a tizzy over revelations by the former head of Russia’s anti-doping laboratory – who has now fled the country – that he helped run a massive doping operation and cover-up that contributed to Russia’s impressive haul of medals at the 2014 Olympics.  (Russian officials and athletes denied the charges.)

Blog Post - Nuclear Security Matters

Two Recent Incidents of Insecurity

| July 21, 2015

Are nuclear sites secure?  There are some who might assume the answer is yes and that we should not worry about the possibility of nuclear bomb material being stolen. Yet, recent history has repeatedly demonstrated that high security facilities thought to be secure were actually vulnerable. Two such incidents last month illustrated this idea.

Blog Post - Nuclear Security Matters

Bunn, Tobey, and Roth on Nuclear Smuggling

May 20, 2015

Matthew Bunn, William Tobey, and I have a new op-ed in The Hill’s Congress Blog, “Don’t weaken our defenses against nuclear smuggling.” We wrote it in response to proposed legislation that would prohibit funding for fixed radiation detectors to catch nuclear smugglers – both for installing new ones and even for maintaining the ones U.S. taxpayers have already paid billions to install.

Blog Post - Nuclear Security Matters

Why Security Fails

    Author:
  • Roger G. Johnston
| Feb. 11, 2015

In thinking about how nuclear security and safeguards can fail, it is useful to keep in mind why security usually fails in general.  Most security managers and organizations have a good understanding of the assets they are trying to protect, the resources available to them to protect those assets, and the consequences should security fail (though this is sometimes greatly underestimated).  They often have a reasonably accurate understanding of the threats they face—who might attack, why, how, when, and with what goals and resources.  What is often lacking is a good understanding of the vulnerabilities—the weaknesses in the security that can be exploited by the threats—and how those vulnerabilities can be mitigated or eliminated.