Nuclear Security Matters

25 Items

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Analysis & Opinions - The Washington Post

America’s Pandemic Response Doesn’t Bode Well for a Potential Cyberattack

| June 25, 2020

America’s botched response to the coronavirus pandemic is a warning that, unless our broken political and administrative systems are fixed, the country could experience a similar breakdown in future national crises, such as a massive cyberattack.

Paper

Confronting China’s Efforts to Steal Defense Information

| May 2020

The United States government must require private industry and research institutions to take this threat seriously and develop cybersecurity policy and practices that will result in multiple layers of cybersecurity protections. This layered approach will require combined efforts from both the government and private industry to create an overlapping protection scheme.

A U.S. Customs and Border Protection officer uses a handheld GR135- Radiation Isttope Identifier to check a container that was stopped after passing through a radiation detection device at the port of Newark in February 2006 (AP Photo/Mel Evans).

AP Photo/Mel Evans

Journal Article - Nonproliferation Review

Combating Nuclear Smuggling? Exploring Drivers and Challenges to Detecting Nuclear and Radiological Materials at Maritime Facilities

| June 03, 2019

International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.

Book - Random House/Crown

The Perfect Weapon

| June 19, 2018

For 70 years, the thinking inside the Pentagon was that only nations with nuclear weapons could threaten America’s existence. But that assumption is now in doubt: in a world in which almost everything is interconnected – phones, cars, electrical grids, and satellites – everything can be disrupted, if not destroyed. In THE PERFECT WEAPON, Belfer Center Senior Fellow and Adjunct Lecturer in Public Policy David Sanger, the New York Times national security correspondent, details how this new revolution, being conducted largely in secret, is reshaping global power.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

An unarmed Minuteman 3 ICBM launches from Vandenberg Air Force Base, California on Wednesday, August 2, 2107. (Senior Airman Ian Dudley/Vandenberg Air Force Base via AP)

Senior Airman Ian Dudley/Vandenberg Air Force Base via AP

Analysis & Opinions - The New York Times

Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms

| Jan. 16, 2018

A newly drafted United States nuclear strategy that has been sent to President Trump for approval would permit the use of nuclear weapons to respond to a wide range of devastating but non-nuclear attacks on American infrastructure, including what current and former government officials described as the most crippling kind of cyberattacks.

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Carter and Rosenbach Envision the Belfer Center's Future

| Fall/Winter 2017-2018

As Director and Co-Director of the Belfer Center, Ash Carter and Eric Rosenbach have inherited from Graham Allison the world’s No. 1-ranked university think tank. They intend to build on that success by sustaining the Center’s core mission while widening its aperture; enhancing its unique ability to leverage science and technology to meet global challenges; and priming the next generation of leaders in both scholarship and policymaking.

Elizabeth Sherwood-Randall

U.S. Department of Energy

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Former Deputy Secretary of Energy Elizabeth Sherwood-Randall Named Senior Fellow With Harvard's Belfer Center

| July 12, 2017

Former Deputy Secretary of Energy Elizabeth Sherwood-Randall is joining Harvard Kennedy School’s Belfer Center for Science and International Affairs as a Senior Fellow, the Center announced today. Sherwood-Randall, who has served in the White House and Departments of Energy and Defense, is returning to the Center where she worked in the 1990s to help establish two pioneering projects – the Strengthening Democratic Institutions Project with Graham Allison, who this month stepped down as the Center’s director, and the Preventive Defense Project with Ash Carter, the former Secretary of Defense who is the new Belfer Center director.