Showing 10 of 38 Blog Posts

Watch VideoDescriptionhttps://carnegieendowment.org/2022/10/28/2022-carnegie-international-nuclear-policy-conference-event-7828 Nuclear weapons appear to have shaped the Russo-Ukrainian war even in the absence of their use. The possibility of nuclear escalation apparently contributed to NATO’s...

Read ArticleDescriptionContemporary Developments at the Nuclear:Cyber Nexus – Stuxnet Required reading: Mittal. “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” Wired, July 11, 2011, pp. http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/...

Read ArticleDescriptionFrom Nuclear Deterrence to Cyber Deterrence   Read Article

Read ArticleDescriptionCyber Threats to Nuclear Command, Control and Communications and Nuclear Testing   Image link: https://www.c4isrnet.com/air/2019/10/17/the-us-nuclear-forces-dr-strangelove-era-messaging-system-finally-got-rid-of-its-floppy-disks/   Read Article

Read ArticleDescriptionNormal Accident Theory, Software Engineering and the Nuclear Weapons Complex Required reading: Perrow, C. Normal Accidents. Princeton: Princeton University Press, 1999, selections (Introduction, p 3-10; Ch....

Read ArticleDescription Module Description: This module explains the different types of statistical analysis used in nuclear safeguards. Prerequisites: Students taking this module should have a working knowledge of basic algebra...

Read ArticleDescriptionModule Description: This module covers the basics of nuclear and atomic physics. Prerequisites: Students taking this module should have a working knowledge of basic algebra. Learning...

Read ArticleDescriptionModule Description: This is a beginner’s module to basic radiation detection. It covers the physical mechanisms behind the detection of gamma and neutron radiation and the...

Read ArticleDescription Module Description: In this module the elements of containment and surveillance, as used in nuclear safeguards, will be introduced. Prerequisites: Students taking this module should...

Read ArticleDescriptionModule Description: This module describes the insider threats facing an organization and analyzes the complex nature of insider threats. It also describes how organizations and individuals...