428 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Analysis & Opinions - Bulletin of the Atomic Scientists

The Postponement of the NPT Review Conference. Antagonisms, Conflicts and Nuclear Risks after the Pandemic

The Bulletin of Atomic Scientists has published a document from the Pugwash Conference on Science and World Affairs concerning nuclear problems and tensions in the time of COVID-19. The document has been co-signed by a large number of Pugwash colleagues and personalities.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Members of the 576th Flight Test Squadron monitor an operational test launch of an unarmed Minuteman III missile

USAF/Michael Peterson

Journal Article - Bulletin of the Atomic Scientists

The Overwhelming Case for No First Use

| Jan. 13, 2020

The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly.

Analysis & Opinions - Lawfare

Decoding the 2017 NDAA's Provisions on DoD Cyber Operations

| Jan. 30, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Charley Snyder examine some of the most important provisions to the recently signed into law 2017 National Defense Authorization Act that the Trump Administration must grapple with during its first year in office.

Thucydides statue image

Foto: Wienwiki/Walter Maderbacher

Analysis & Opinions - Council on Foreign Relations

The Cybersecurity Dilemma: Where Thucydides Meets Cyberspace

    Author:
  • Ben Buchanan
| Jan. 30, 2017

Cyber Security Project Fellow Dr. Ben Buchanan discusses how the traditional concept of the "security dilemma" applies to conflict in cyberspace, arguing that as states play offense and defense in the digital domain, they risk tension no one wants.