Articles

136 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Dr. Harsh Vardhan dedicates the COBAS 6800 testing machine

Wikimedia CC/Press Information Bureau, Government of India

Journal Article - Nature

Coronavirus Modelling — Boost Developing World Capacity

| May 26, 2020

In developing countries, where the coronavirus pandemic is potentially at its most dangerous and costly, the authors call for governments to work with academic institutions to build and sustain computational modelling capacity.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

U.S. Secretary of Energy Ernest Moniz (left) and Secretary of State John Kerry (center) meeting in Vienna to discuss the Iran nuclear agreement.

Carlos Barria/Agence France-Presse

Newspaper Article - The New York Times

Crucial Questions Remain as Iran Nuclear Talks Approach Deadline

| June 28, 2015

Iran’s top nuclear negotiator was heading back to Tehran on Sunday to consult with his nation’s leadership, as negotiators remained divided over how to limit and monitor Tehran’s nuclear program and even on how to interpret the preliminary agreement they reached two months ago.

Chinese workers from the local animal epidemic prevention and control center, dressed in protective clothing, get samples of a chicken at a poultry market in Changsha city, central China's Hunan province, April 7, 2013.

Zi Xin - Imaginechina

Journal Article - Quarterly Journal: International Security

Expert Knowledge in Intelligence Assessments: Bird Flu and Bioterrorism

    Author:
  • Kathleen M. Vogel
| Winter 2013/14

A study of the 2011 controversy surrounding publication of Ron Fouchier and Yoshihiro Kawaoka's H5N1 avian influenza experiments reveals that U.S. intelligence analysts do not have adequate resources to evaluate dual-use scientific experiments, or to navigate the politics that characterize the use of technical expertise in biosecurity issues.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

teaser image

Journal Article - Bulletin of the Atomic Scientists

Weapons Lab

| January / February 2007

"The lack of transparency in U.S. biodefense work is fostering a widespread perception that we are secretly developing novel threat agents and exploring novel bioweapons concepts. This constitutes a kind of psychological proliferation that risks eroding the constraints against military and paramilitary use of biological weapons. And aside from security considerations, secrecy in biological research will impede rather than foster the discovery and development of practical methods of prophylaxis and therapy of infective disease."