Nuclear Issues

29 Items

In this file photo taken April 3, 2008, the control panel for Hanford nuclear reservation's famous B Reactor is shown in Richland, Wash. The B Reactor, the world's first full-sized reactor, will be part of the Manhattan Project National Historical Park, the nation's newest national park. (AP Photo/Ted S. Warren, File)

AP Photo/Ted S. Warren

Journal Article - Quarterly Journal: International Security

Death Dust: The Little-Known Story of U.S. and Soviet Pursuit of Radiological Weapons

    Authors:
  • Samuel Meyer
  • Sarah Bidgood
  • William C. Potter
| Fall 2020

A comparative analysis of the United States’ and the Soviet Union’s previously underexplored radiological weapons programs identifies the drivers behind their rise and demise. The findings of this analysis illuminate the factors likely to affect the pursuit of radiological weapons by other states in the future.

Blog Post - Nuclear Security Matters

Nuclear Security in Turkey

Aug. 04, 2016

In mid-July, as an attempted coup was taking place in Turkey, many in the United States wondered whether U.S. tactical nuclear weapons stored at the Turkish airbase, Incirlik, were adequately protected against theft. Congressional Research Service Nuclear Weapons Policy Specialist, Amy Woolf, recently published a short article describing some of the security systems surrounding those weapons.

China’s Nuclear Security: Progress, Challenges, and Next Steps

REUTERS/Kim Kyung-Hoon

Report - Managing the Atom Project, Belfer Center

China’s Nuclear Security: Progress, Challenges, and Next Steps

| March 28, 2016

In a new report from the Project on Managing the Atom, Senior Research Associate Hui Zhang finds that China has made important nuclear security improvements in areas ranging from its legal framework, to its approaches to physical protection and material accounting, to bolstering nuclear security culture. But China also faces ongoing threats. The possibility of insider theft of nuclear materials in China cannot be ruled out, espe­cially as China increasingly grows into a market-oriented society contending with corruption. Zhang also notes that Beijing faces a growing terrorism threat from separatists in China’s autonomous Xinjiang region.

Blog Post - Nuclear Security Matters

The Dannemora Prison Break: Lessons for Nuclear Facilities

| Sep. 09, 2015

In prisons as in nuclear facilities, employees are tasked with guarding something highly dangerous in high-stress environments. Both face high costs in the event of failure, and both are especially vulnerable to complacency and insider threats. Given these parallels, two inmates’ dramatic break-out from a New York prison in early June offers nuclear security practitioners valuable insights into how to avert an equally dramatic (and potentially much more consequential) breech.

Blog Post - Nuclear Security Matters

Dirty bomb efforts and uranium seizure in Ukraine may be less than meets the eye

    Author:
  • Artur Saradzhyan
| Aug. 12, 2015

Ukraine-based journalist Maxim Tucker has just published two articles to claim that pro-Russian rebels in Eastern Ukraine are plotting to manufacture a dirty bomb with the help of Russian scientists, using radioactive waste from a storage facility at the Donetsk Chemical Factory.

Blog Post - Nuclear Security Matters

Bunn, Tobey, and Roth on Nuclear Smuggling

May 20, 2015

Matthew Bunn, William Tobey, and I have a new op-ed in The Hill’s Congress Blog, “Don’t weaken our defenses against nuclear smuggling.” We wrote it in response to proposed legislation that would prohibit funding for fixed radiation detectors to catch nuclear smugglers – both for installing new ones and even for maintaining the ones U.S. taxpayers have already paid billions to install.

Blog Post - Nuclear Security Matters

Why Security Fails

    Author:
  • Roger G. Johnston
| Feb. 11, 2015

In thinking about how nuclear security and safeguards can fail, it is useful to keep in mind why security usually fails in general.  Most security managers and organizations have a good understanding of the assets they are trying to protect, the resources available to them to protect those assets, and the consequences should security fail (though this is sometimes greatly underestimated).  They often have a reasonably accurate understanding of the threats they face—who might attack, why, how, when, and with what goals and resources.  What is often lacking is a good understanding of the vulnerabilities—the weaknesses in the security that can be exploited by the threats—and how those vulnerabilities can be mitigated or eliminated.