Articles

13 Items

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

Journal Article - Washington Quarterly

The Key to the North Korean Targeted Sanctions Puzzle

| November 1, 2014

"At no point in the history of U.S. nonproliferation and counterproliferation policy have financial sanctions been so central to U.S. efforts to prevent or rollback the acquisition of nuclear weapons in countries such as North Korea and Iran. Despite this crucial role, financial sanctions have been examined almost solely from the sender’s perspective, that is, the country imposing the sanctions. Few focused policy analyses have measured the effects of these instruments from the target’s perspective..."

Gas centrifuges for uranium enrichment recovered en route to Libya in 2003.

U.S. Department of Energy

Journal Article - Quarterly Journal: International Security

The Nonproliferation Emperor Has No Clothes: The Gas Centrifuge, Supply-Side Controls, and the Future of Nuclear Proliferation

| Spring 2014

Policymakers have long focused on preventing nuclear weapons proliferation by controlling technology. Even developing countries, however, may now possess the technical ability to create nuclear weapons. The history of gas centrifuge development in twenty countries supports this perspective. To reduce the demand for nuclear weapons, policymakers will have look toward the cultural, normative, and political organization of the world.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

A  visitor walks past signs for energy conservation during the 2010 China International Industry Fair in Shanghai, China, 9 November 2010.

AP Photo

Journal Article - Energy

A Network-based Modeling Framework for Stakeholder Analysis of China's Energy Conservation Campaign

    Authors:
  • Wen Feng
  • Zheng Li
  • Edward F. Crawley
  • Weidou Ni
| August 2011

This paper proposes a network-based modeling framework to facilitate the development of stakeholder analysis of China's energy conservation campaign. Given the proposed framework, an illustrative case study is provided to elaborate how to integrate a set of techniques to further develop a quantitative model, as well as to demonstrate the practicability of the proposed framework. The results derived from the case study shows that the proposed framework and the model can be used as analytical tools to improve the government's policymaking process in term of providing a systematic perspective of stakeholder interrelations.

Italian Premier Silvio Berlusconi, right sitting, and French President Nicolas Sarkozy, left sitting, sign a nuclear cooperation agreement at a ceremony in Rome's Villa Madama residence, Feb. 24, 2009.

AP Photo

Journal Article - Quarterly Journal: International Security

Spreading Temptation: Proliferation and Peaceful Nuclear Cooperation Agreements

| Summer 2009

Matthew Fuhrmann's article "Spreading Temptation: Proliferation and Peaceful Nuclear Cooperation Agreements," was published by in the Summer 2009 issue of International Security. In his article, Dr. Fuhrmann argues "Peaceful nuclear cooperation—the transfer of nuclear technology, materials, or know-how from one state to another for peaceful purposes—leads to the spread of nuclear weapons. With a renaissance in nuclear power on the horizon, major suppliers, including the United States, should reconsider their willingness to assist other countries in developing peaceful nuclear programs."