41 Items

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Matthew Bunn and William H. Tobey present "The Nuclear Terrorism Threat – And Next Steps to Reduce the Danger"

Shari Nijman

Presentation

The Nuclear Terrorism Threat – And Next Steps to Reduce the Danger

| Oct 7, 2013

Matthew Bunn and Will Tobey spoke with Piet de Klerk, the Dutch Sherpa organizing the 2014 Nuclear Security Summit, on October 7 at a United Nations event sponsored by the Dutch mission to the UN. In these slides, Bunn and Tobey provide an updated summary of the threat of nuclear terrorism and recommendations for next steps to reduce the threat, based in part on the new U.S.-Russian report, Steps to Prevent Nuclear Terrorism.

Presentation

Strengthening Global Approaches to Nuclear Security

| July 5, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real. This presentation recommends learning from the much stronger national and international efforts in nuclear safety, and in particular, taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level. Matthew Bunn presented this talk, based on a recent paper, on July 3rd, 2013 at the International Conference on Nuclear Security in Vienna.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Book Chapter - Congressional Quarterly Press

The Threat of Nuclear Terrorism is Real

| April 1, 2013

This chapter summarizes the case that it is plausible that sophisticated terrorist groups could make a nuclear bomb if they got the nuclear material; that some terrorist groups have actively tried to get nuclear bombs in the past, and some groups are likely to try again in the future; and that unless urgent action is taken to improve nuclear security, it is plausible that terrorists might be able to get the potential nuclear bomb material they would need.

Magazine Article - Reuters Magazine

Running Al Qaeda

| June 2012

"Getting second-rung leadership right is important for any enterprise, and for al Qaeda that meant assuring the brand and building network capacity for terror. Bin Laden was careful about deciding who would be anointed with two powerful gifts—his blessing of leadership, and formal affiliation of groups to al Qaeda central (a term he heard used by the media and, amazingly, appropriated)."

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."