Articles

9 Items

Journal Article - Institute of Nuclear Materials Management Journal of Nuclear Materials Management

Securing China’s Nuclear Power Plants

| Winter, 2014.

Since September 11, 2001, China has substantially advanced its physical protection system, with a switch in focus from the traditional "guns, gates, guards" approach to an effective mixed approach, combining personnel with modern techniques. Then-Chinese President Hu Jintao emphasized at the 2012 Nuclear Security Summit that, "In the future, China will further take nuclear security measures, make sure the security of its own nuclear materials and facilities, improve the overall nuclear security." This paper examines the specific and detailed physical protection approaches that are currently applied to China's nuclear power plants, and recommends further steps to improve China's existing nuclear security system.

Journal Article - Science & Global Security

Securing China’s Weapon-Usable Nuclear Materials

| Feb 18, 2014

This article describes the status of China’s military and civilian nuclear programs, fissile material production and associated nuclear facilities, and the Chinese nuclear experts and officials’ perspectives on the nuclear terrorism threat. It gives details of China’s nuclear security practices, attitudes, and regulations, as well as identifying areas of concern. The article recommends ways to strengthen China’s nuclear material protection, control, and accounting systems and suggests opportunities for increased international cooperation.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Journal Article - Innovations

Enabling a Nuclear Revival—and Managing Its Risks

| Fall 2009

Matthew Bunn and Martin B. Malin examine the conditions needed for nuclear energy to grow on a scale large enough for it to be a significant part of the world’s response to climate change. They consider the safety, security, nonproliferation, and waste management risks associated with such growth and recommend approaches to managing these risks. Bunn and Malin argue that although technological solutions may contribute to nuclear expansion in the coming decades, in the near term, creating the conditions for large-scale nuclear energy growth will require major international institutional innovation.