28 Items

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Analysis & Opinions - The Washington Post

The Cybersecurity Changes We Need

| May 29, 2010

"There is widespread agreement that this long-term trend of grabbing the economic gains from information technology advances and ignoring their security costs has reached a crisis point," write Melissa Hathaway and Jack Goldsmith. "As we progress digitally, we must also adopt and embed sometimes-costly security solutions into our core infrastructures and enterprises and stop playing the game of chance."

President Barack Obama signs the National Defense Authorization Act for Fiscal Year 2010, Oct. 28, 2009, in the East Room of the White House in Washington, D.C.

AP Photo

Analysis & Opinions - DoD Buzz

US Less Dominant But So What

| November 25, 2009

"Our military strength, we are warned, is declining. But is it? In the end, it is important to remember that there is no objective limit to the size or power of the U.S. armed forces; they are as strong as Americans are willing to pay for. And in a country where personal spending exceeds 4 billion dollars a year on cat food and another 6 billion or so on potato chips, that is a huge amount of military potential. America is a land of choice, and right now Americans are worrying more about their homes, schools, health care and jobs than whether the U.S. government spends more on its military than the next fifteen countries, or just the next ten (including multiples of the Chinese military budget), even considering the well-earned personnel and health care costs that makes our military budget seem so much larger than so many others."