South Asia

12 Items

IAEA seal on disconnected twin cascades for 20% uranium production in Natanz, Iran on January, 20, 2014.

AFP/Getty Images

Presentation

Why the Monitoring of Movements of UF6 Cylinders Matters

| April 29, 2014

As the growth of nuclear industry during the coming decade is considered to increase, the number of cylinder shipments will expand accordingly. Beyond that, new vendors with less experience will enter the uranium conversion and enrichment market. Under such a scenario, there is no reason to discount the disappearance of interest to nuclear proliferation or illicit trafficking of nuclear material. Thus an enhanced system to track UF6 movements is a must. Better to be safe than sorry.

United Nations Secretary-General Ban Ki-moon, center, speaks during the opening session of a high-level meeting on countering nuclear terrorism, Sept. 28, 2012 in the General Assembly at UN headquarters.

AP Photo/ Mary Altaffer

Policy Brief - Quarterly Journal: International Security

States Will Not Give Nuclear Weapons to Terrorists

    Authors:
  • Keir A. Lieber
  • Daryl Press
| September 2013

Assessing the risk of nuclear attack-by-proxy turns on the question of whether a state could sponsor nuclear terrorism and remain anonymous. A leader could rationalize such an attack—and entrust terrorists with a vitally important mission—only if doing so allowed the sponsor to avoid retaliation. After all, if a leader did not care about retaliation, he or she would likely conduct a nuclear strike directly. Giving nuclear weapons to terrorists makes sense only if there is a high likelihood of remaining anonymous after the attack.

Presentation

Strengthening Global Approaches to Nuclear Security

| July 5, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real. This presentation recommends learning from the much stronger national and international efforts in nuclear safety, and in particular, taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level. Matthew Bunn presented this talk, based on a recent paper, on July 3rd, 2013 at the International Conference on Nuclear Security in Vienna.

Mujahedeen rebels, holy warriors, are shown as they rest high in the mountains in the Kunar province area in Afghanistan in May 1980.

AP Photo

Policy Brief - Quarterly Journal: International Security

The Foreign Fighter Phenomenon: Islam and Transnational Militancy

| February 2011

"...[F]oreign fighter mobilizations empower transnational terrorist groups such as al-Qaida, because war volunteering is the principal stepping-stone for individual involvement in more extreme forms of militancy. For example, when Muslims in the West radicalize, they usually do not plot attacks in their home countries right away, but travel to a war zone such as Iraq or Afghanistan first. A majority of al-Qaida operatives began their militant careers as war volunteers, and most transnational jihadi groups today are by-products of foreign fighter mobilizations."

Thomas Hegghammer, a joint ISP/RIIA research fellow, discusses the origins of global jihad at an ISP brownbag seminar.

Belfer Center

Policy Brief

The Origins of Global Jihad: Explaining the Arab Mobilization to 1980s Afghanistan

| January 22, 2009

The Arab involvement in Afghanistan was the result of two main factors: the entrepreneurship of the Palestinian preacher Abdallah Azzam, and the rise of a "soft pan-Islamism" promoted since the mid-1970s by non-violent international Islamic organizations such as the Muslim World League.

This policy memo is based on Thomas Hegghammer's ISP brownbag seminar presentation.