Nuclear Issues

52 Items

People watch a TV showing a file image of North Korean leader Kim Jong Un shown during a news program

AP/Ahn Young-joon

Journal Article - Ethics & International Affairs

Nuclear Ethics Revisited

| Spring 2023

Scott Sagan asked Joseph S. Nye to revisit Nuclear Ethics, a book he published in 1986, in light of current developments in world affairs. In doing so, he found that much had changed but the basic usability paradox of nuclear deterrence remains the same. 

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

President Joe Biden meets with Russian President Vladimir Putin

AP/Patrick Semansky

Analysis & Opinions - Bulletin of the Atomic Scientists

Biden to Putin in Geneva: There's a New Sheriff in Town.

| June 17, 2021

No great breakthroughs or dramatic developments were expected at the Biden-Putin summit, and none was achieved. But the message was clear: There is a new sheriff in town. Putin noticed, describing Biden as very different from Trump—experienced, balanced, and professional.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

How Saudi Arabia and China Could Partner on Solar Energy

AP/Andy Wong

Analysis & Opinions - Axios

How Saudi Arabia and China Could Partner on Solar Energy

| Jan. 24, 2019

Last May, Chinese solar panel manufacturer LONGi signed an agreement with Saudi trading company El Seif Group to establish large-scale solar manufacturing infrastructure in Saudi Arabia. The deal came several months after the Trump administration's imposition of global tariffs on imports of Chinese solar panels and cells.

Cluver, Chaudhry and Najam

Benn Craig/Belfer Center

News

Ambassador of Pakistan to the US: "Now is the ideal time to reset relations."

| Apr. 27, 2017

Two days after presenting his credentials to President Trump, His Excellency Aizaz Ahmad Chaudhry, the newly appointed Ambassador of Pakistan to the United States, expressed optimism about bilateral relations between the two countries. Respondent Adil Najam, Dean of the Frederick S. Pardee School of Global Studies at Boston University, was more cautious in his assessment of the relationship after years of "reset."

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Could There Be a Terrorist Fukushima?

commons.wikimedia.org

Analysis & Opinions - The New York Times

Could There Be a Terrorist Fukushima?

| April 4, 2016

The attacks in Brussels last month were a stark reminder of the terrorists’ resolve, and of our continued vulnerabilities, including in an area of paramount concern: nuclear security.

The attackers struck an airport and the subway, but some Belgian investigators believe they seemed to have fallen back on those targets because they felt the authorities closing in on them, and that their original plan may have been to strike a nuclear plant. A few months ago, during a raid in the apartment of a suspect linked to the November attacks in Paris, investigators found surveillance footage of a senior Belgian nuclear official. Belgian police are said to have connected two of the Brussels terrorists to that footage.