Asia & the Pacific

29 Items

Soldiers assigned to the New York National Guard's 24th Civil Support Team based at Ft. Hamilton, search for a simulated weapon of mass destruction based on elevated radioactivity levels they found in a warehouse during an exercise in Brooklyn, N.Y., Oct. 22, 2019. The 22 person team made up of Airmen and Soliders of the NYNG respond to incidents of chemical, biological, radiological, nuclear and explosive, and every 18 months have to go through an evaluation where the unit is certified in their mission.

U.S. Army National Guard photo by Ryan Campbell

Analysis & Opinions - European Leadership Network

It’s Time to Prohibit Radiological Weapons

    Authors:
  • Sarah Bidgood
  • Samuel Meyer
  • William C. Potter
| Feb. 01, 2021

Today, the origins of the concept of RW have largely been forgotten.  Indeed, since 9/11, radiological weapons have been associated mainly with non-state actors, who may not have the means or motivations to acquire and use far more lethal nuclear explosives.  A fixation on the very real dangers posed by nuclear terrorism, however, should not obscure the risks that states also may again pursue radiological weapons.

teaser image

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Center Experts Reflect on 75th Anniversary of Hiroshima Bombing

On August 6, 1945, the United States dropped an atomic bomb on Hiroshima, Japan, launching the nuclear age. On the 75th anniversary of that somber event, Belfer Center experts reflect on the event and its aftermath. 

mushroom cloud

Public Domain

Analysis & Opinions - Portland Press Herald

Listening to Atomic Bombing Survivors' Stories is More Important Than Ever

| Aug. 06, 2020

Rebecca Davis Gibbons writes that having a full appreciation of the consequences of nuclear weapons and their place in society means learning from the stories of the survivors of Hiroshima and Nagasaki—but also from the stories from other survivors of nuclear explosions: those who lived and worked adjacent to testing sites in Algeria, French Polynesia, Australia, the United States, France, the Republic of the Marshall Islands, Western China, and Kazakhstan.

Paper

Confronting China’s Efforts to Steal Defense Information

| May 2020

The United States government must require private industry and research institutions to take this threat seriously and develop cybersecurity policy and practices that will result in multiple layers of cybersecurity protections. This layered approach will require combined efforts from both the government and private industry to create an overlapping protection scheme.

teaser image

Analysis & Opinions - Global Policy

Factoring Pandemic Risks into Financial Modelling

| Apr. 01, 2020

Today’s economic crisis leaves us with an unsettling and perplexing regret. Why weren’t financial portfolios already adjusted for risks that stem from health events such as pandemics? After all, financial portfolios are adjusted for liquidity risks, market risks, credit risks, and even operational and political risks.

The Silk Road between a Rock and a Hard Place: Russian and Chinese Competition for Central Asia's Energy

kremlin.ru/Wikimedia Commons

Analysis & Opinions - Insight Turkey

The Silk Road between a Rock and a Hard Place: Russian and Chinese Competition for Central Asia's Energy

| Oct. 01, 2018

China’s displacement of Russian economic influence in Central Asia is generating great interest in Western academic and policy circles, but this research has, as yet, yielded few analytical nuances. This article attempts to shed light on the under-researched question of what explains Central Asian governments’ failure to more effectively capitalize on the growing Central Asian rivalry between Russia, China, the United States, Turkey, Iran, South Korea, Japan, and other regional powers that, since the early 1990s, has been overwhelmingly directed towards strategic energy considerations and hydrocarbon interests.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

teaser image

Testimony - Belfer Center for Science and International Affairs, Harvard Kennedy School

Living in a Glass House: The United States Must Better Defend Against Cyber and Information Attacks

| June 12, 2017

Belfer Center Co-director Eric Rosenbach testified at a hearing on "Sponsored Cyberspace Threats: Recent Incidents and U.S. Policy Response" before the United States Senate Foreign Relations Committee's Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy.