478 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Analysis & Opinions - Bulletin of the Atomic Scientists

The Postponement of the NPT Review Conference. Antagonisms, Conflicts and Nuclear Risks after the Pandemic

The Bulletin of Atomic Scientists has published a document from the Pugwash Conference on Science and World Affairs concerning nuclear problems and tensions in the time of COVID-19. The document has been co-signed by a large number of Pugwash colleagues and personalities.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Members of the 576th Flight Test Squadron monitor an operational test launch of an unarmed Minuteman III missile

USAF/Michael Peterson

Journal Article - Bulletin of the Atomic Scientists

The Overwhelming Case for No First Use

| Jan. 13, 2020

The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly.

Joel Brenner, Meicen Sun, and Daniel Weitzner

Belfer Center/Benn Craig

Analysis & Opinions - Project on Europe and the Transatlantic Relationship

Profit, Privacy, Power: China's Digital Rise and a US-EU Response

    Author:
  • Winston Ellington Michalak
| Dec. 20, 2019

In an event co-hosted by the Project on Europe and the Transatlantic Relationship’s (PETR) and the Asia Center, Cathryn Clüver Ashbrook, Executive Director of the Future of Diplomacy Project and the Project on Europe and the Transatlantic Relationship, moderated a panel discussion on China’s technological rise and its impact on the US-EU relationship. The panel featured Joel Brenner, Senior Research Fellow at the Center for International Studies; Danil Kerimi, Head of Technology Industries Sector, Digital Economy and Global Technology Policy, the World Economic Forum; Meicen Sun, PhD Candidate in the Department of Political Sciences at MIT; and Daniel Weitzner, Founding Director of the Internet Policy Research Initiative. 

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.

Report - Managing the Atom Project, Belfer Center

China's Uranium Enrichment Capacity: Rapid Expansion to Meet Commercial Needs

| August 20, 2015

Based on satellite imagery, Chinese publications, and discussions with Chinese experts, This report suggests that China has much more civilian enrichment capacity than previously thought, and even more is on the way. If these new estimates are correct, China has enough enrichment capacity to meet its nuclear power fuel requirements for the coming decade and beyond. Further, China will have excess enrichment capacity and will likely become a net exporter of commercial enrichment services.