Asia & the Pacific

21 Items

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Image of China’s People’s Liberation Army Rocket Force drill with a ballistic missile launcher

(China Military / 81.cn)

Policy Brief - Quarterly Journal: International Security

Inadvertent Escalation and the Entanglement of Nuclear Command-and-Control Capabilities

    Author:
  • James Acton
| Oct. 29, 2018

The risks of nuclear escalation between the U.S. and China or Russia are greater than ever given the possibility of misinterpreted cyber espionage and military strikes against early warning systems. What can be done to reduce this risk?

Distribution of civilian HEU worldwide as of 2011. From the 2011 Global Fissile Material Report.

International Panel on Fissile Materials

Presentation

The Nuclear Terrorism Threat

| January 13, 2014

In these slides, William H. Tobey and Pavel Zolotarev provide an updated summary of the threat of nuclear terrorism, based in part on the new U.S.-Russian report, Steps to Prevent Nuclear Terrorism. This was presented at the Meeting of the 2014 Nuclear Security Summit ‘Sherpas’, hosted by the Thai Ministry of Foreign Affairs, Pattaya, Thailand, on January 13, 2014.

Analysis & Opinions - Power & Policy Blog

The Plutonium Mountain Mission: Lessons

| Sep. 27, 2013

In Summer of 2013, The Project on Managing the Atom released “Plutonium Mountain: Inside the 17-Year Mission to Secure a Dangerous Legacy of Soviet Nuclear Testing.” In the report, Eben Harrell and David Hoffman tell how dedicated scientists and engineers in three countries overcame suspicions, secrecy, bureaucracy, and logistical obstacles to secure more than a dozen bombs worth of plutonium that had been left behind at the Semipalatinsk Test Site in Kazakhstan after the collapse of the Soviet Union. Although the outline of the Semipalatinsk operation had been made public before, the report filled in new details.

Paper

Strengthening Global Approaches To Nuclear Security

| July 1, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real.  This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.