16 Items

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

President John F. Kennedy arrived on June 23, 1963 at the airport in Cologne-Wahn for a four day visit to Germany. In front, chancellor Konrad Adenauer.

AP

Journal Article - Quarterly Journal: International Security

Alliance Coercion and Nuclear Restraint: How the United States Thwarted West Germany's Nuclear Ambitions

| Spring 2015

A prominent model of nuclear proliferation posits that a powerful patron state can prevent a weaker ally from proliferating by providing it with security guarantees. The history of West Germany's pursuit of the bomb from 1954 to 1969 suggests that a patron may also need to threaten the client state with military abandonment to convince it not to acquire nuclear weapons.

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Washington Post

Saving the World at Plutonium Mountain

| August 16, 2013

Last October, at the foot of a rocky hillside near here, at a spot known as Degelen Mountain, several dozen Kazakh, Russian and American nuclear scientists and engineers gathered for a ceremony. The modest ribbon-cutting marked the conclusion of one of the largest and most complex nuclear security operations since the Cold War — to secure plutonium (enough to build a dozen or more nuclear weapons) that Soviet authorities had buried at the testing site years before and forgotten, leaving it vulnerable to terrorists and rogue states. The effort spanned 17 years, cost $150 million and involved a complex mix of intelligence, science, engineering, politics and sleuthing. This op-ed is based on documents and interviews with Kazakh, Russian and U.S. participants, and reveals the scope of the operation for the first time.

The facilitator for the Middle East Weapons of Mass Destruction Free Zone Conference Jaako Laajava from Finland speaks at the Preparatory Committee for the 2015 Nuclear Non-Proliferation Treaty Review Conference in Vienna, Austria, on  May 8, 2012.

AP Images

Analysis & Opinions - Bulletin of the Atomic Scientists

Getting Back on Track

| June 21, 2013

Prospects for success in establishing a WMD-free zone remain uncertain, but the stakes are too high to allow the effort to fail. Creativity, courage, flexibility, and goodwill—all of which are abundant among the people of the Middle East—are especially needed now for policy making on this issue.

Russian President Dmitry Medvedev speaks at the Russian International Affairs Council in Moscow, Mar. 23, 2012. He says that the U.S. and NATO should come up with an alternative missile defense plan that will not jeopardize nuclear parity with Moscow.

AP Photo

Analysis & Opinions - The Boston Globe

A Way Forward on Nuclear Disarmament

| February 16, 2013

"Rather than continuing to spend billions of taxpayer dollars on deploying an all-encompassing system of highly doubtful effectiveness that threatens to seriously undermine Washington's nuclear security and disarmament agenda, the Obama administration should shelve the plans for deploying the fourth phase in Europe and engage Russia in joint talks."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.