Nuclear Security Matters

25 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

Manila Conference: SEATO nations leaders group portrait

Public Domain/Frank Wolfe, White House Photographer

Analysis & Opinions - Foreign Policy

The Biden Administration Is Addicted to Partnerships

| Oct. 03, 2023

Stephen Walt analyzes the costs and benefits of forming alliances. When powerful and stable states face the same threats that the United States does, forming an alliance with them makes good sense. Adding weak and vulnerable members to an alliance may not strengthen it, and long-standing partnerships become less effective if some members let their own military capabilities languish. Another problem with the overzealous pursuit of new partners is the possibility that their agendas will be incompatible with those of the United States. 

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Analysis & Opinions - The Washington Post

America’s Pandemic Response Doesn’t Bode Well for a Potential Cyberattack

| June 25, 2020

America’s botched response to the coronavirus pandemic is a warning that, unless our broken political and administrative systems are fixed, the country could experience a similar breakdown in future national crises, such as a massive cyberattack.

Book - Random House/Crown

The Perfect Weapon

| June 19, 2018

For 70 years, the thinking inside the Pentagon was that only nations with nuclear weapons could threaten America’s existence. But that assumption is now in doubt: in a world in which almost everything is interconnected – phones, cars, electrical grids, and satellites – everything can be disrupted, if not destroyed. In THE PERFECT WEAPON, Belfer Center Senior Fellow and Adjunct Lecturer in Public Policy David Sanger, the New York Times national security correspondent, details how this new revolution, being conducted largely in secret, is reshaping global power.

The Palace of Nations

Creative Commons

Analysis & Opinions - Strategist

How Will New Cybersecurity Norms Develop?

| Mar. 12, 2018

Many observers have called for laws and norms to secure this new environment. But developing such standards in the cyber domain faces a number of difficult hurdles. Although Moore's law about the doubling of computing power every two years means that cyber time moves quickly, human habits, norms, and state practices change more slowly.