Averting a Nuclear Armageddon
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Conquest of Armageddon
CONQUEST OF ARMAGEDDON A Warhammer 40K novel by Jonathan Green THE BLACK TEMPLARS are one of the most deter- mined Chapters of Space Marines – refusing to take a step backwards, no matter what the conse- quences. When one of their units goes missing in the ork infested jungles of Armageddon, an elite squad is sent to investigate. Their mission is fur- ther complicated by the presence of a key Imperial officer who has crash-landed behind enemy lines. Hunted by both the savage orks and the corrupted Chaos Space Marines, the Black Templars must call upon every ounce of their faith and firepower if they are to survive and rescue their lost bat- tle-brothers. Jonathan Green has been a freelance writer for the last thir- teen years. He has written Fighting Fantasy and Sonic the Hedgehog gamebooks. His work for the Black Library, to date, includes a string of short stories for Inferno! magazine and six novels. Jonathan works as a full-time teacher in West London. Conquest of Armageddon can be purchased in all better bookstores, Games Workshop and other hobby stores, or direct from this website and GW mail order. Price £6.99 (UK) / $7.99 (US) Bookshops: Distributed in the UK by Hodder. Distributed in the US by Simon & Schuster Books. Games & hobby stores: Distributed in UK and US by Games Workshop. UK mail order: 0115-91 40 000 US mail order: 1-800-394-GAME Online: Buy direct care of Games Workshop’s web store by going to www.blacklibrary.com/store or www.games-workshop.com PUBLISHED BY THE BLACK LIBRARY TM Games Workshop, Willow Road, Nottingham, NG7 2WS, UK Copyright © 2005 Games Workshop Ltd. -
Deterring and Dissuading Nuclear Terrorism
Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. -
MEDIA ADVISORY: Thursday, August 11, 2011**
**MEDIA ADVISORY: Thursday, August 11, 2011** WWE SummerSlam Cranks Up the Heat at Participating Cineplex Entertainment Theatres Live, in High-Definition on Sunday, August 14, 2011 WHAT: Three championship titles are up for grabs, one will unify the prestigious WWE Championship this Sunday. Cineplex Entertainment, via our Front Row Centre Events, is pleased to announce WWE SummerSlam will be broadcast live at participating Cineplex theatres across Canada on Sunday, August 14, 2011 at 8:00 p.m. EDT, 7:00 p.m. CDT, 6:00 p.m. MDT and 5:00 p.m. PDT live from the Staples Center in Los Angeles, CA. Matches WWE Champion John Cena vs. WWE Champion CM Punk in an Undisputed WWE Championship Match World Heavyweight Champion Christian vs. Randy Orton in a No Holds Barred Match WWE Divas Champion Kelly Kelly vs. Beth Phoenix WHEN: Sunday, August 14, 2011 at 8:00 p.m. EDT, 7:00 p.m. CDT, 6:00 p.m. MDT and 5:00 p.m. PDT WHERE: Advance tickets are now available at participating theatre box offices, through the Cineplex Mobile Apps and online at www.cineplex.com/events or our mobile site m.cineplex.com. A special rate is available for larger groups of 20 or more. Please contact Cineplex corporate sales at 1-800-313-4461 or via email at [email protected]. The following 2011 WWE events will be shown live at select Cineplex Entertainment theatres: WWE Night of Champions September 18, 2011 WWE Hell in the Cell October 2, 2011 WWE Vengeance (formerly Bragging Rights) October 23, 2011 WWE Survivor Series November 20, 2011 WWE TLC: Tables, Ladders & Chairs December 18, 2011 -30- For more information, photos or interviews, please contact: Pat Marshall, Vice President, Communications and Investor Relations, Cineplex Entertainment, 416-323- 6648, [email protected] Kyle Moffatt, Director, Communications, Cineplex Entertainment, 416-323-6728, [email protected] . -
The BG News April 15, 1999
Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 4-15-1999 The BG News April 15, 1999 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News April 15, 1999" (1999). BG News (Student Newspaper). 6484. https://scholarworks.bgsu.edu/bg-news/6484 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. ■" * he BG News Women rally to 'take back the night' sexual assault. istration vivors, they will be able to relate her family. By WENDY SUTO Celesta Haras/ti, a resident of buildings, rain to parts of her story, Kissinger "The more I tell my story, the The BG News BG and a W4W member, said the or shine. The said. less shame and guilt I feel," Kissinger said. "For my situa- Women (and some men) will rally is about issues that are con- keynote "When I decided to disclose tion, I'm glad I didn't tell my take to the streets tonight, pro- sidered taboo by society, such as speaker, my sexual abuse to my family, I parents right away because I claiming a public statement in an rape and incest. She has attended Kendel came out of the closet complete- think it would have been a worse attempt to "Take Back the Night" several TBTN marches at the Kissinger, a ly," Kissinger said. -
The Vulnerabilities of Developed States to Economic Cyber Warfare
Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown. -
On International Law and Nuclear Terrorism
GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW VOLUME 24 1994 NUMBER 1 ON INTERNATIONAL LAW AND NUCLEAR TERRORISM Louis Rene' Beres* It's farewell to the drawing-room's civilised cry, The professor's sensible whereto and why, The frock-coated diplomat's social aplomb, Now matters are settled with gas and with bomb. W.H. Auden, Danse Macabre Little did the poet Auden realize, just before the dawn of the Nuclear Age,' how completely the technology of destruction would come to outshout the dimming voice of reason.2 Today, this technology includes the unlocked secrets of the atom and can be exploited by terrorists as well as by states. Taken together with a world that has grown steadily inured to the pain of others-a world that has become anesthetized to anguish as it has fled from rationality-the prospect of nuclear terrorism should not be underestimated. With this in mind, we will now consider this prospect with particular respect * Professor of Political Science, Purdue University. Ph.D., Princeton University, 1971. Professor Beres has written many books and articles dealing with international law. The author is grateful to Ms. Betty Hartman of Purdue University's Department of Political Science for her skillful assistance in typing/word processing this manuscript. 'There now exists a huge literature dealing with the expected consequences of a nuclear war. For works on these consequences by this author see Louis R. BERES, APOCALYPSE: NUCLEAR CATASTROPHE IN WORLD POLITICs (1980); Louis R. BERES, MIMICKING SISYPHUS: AMERICA'S COUNTERVAILING NUCLEAR STRATEGY (1983); Louis R. BERES, REASON AND REALPOLITIK: U.S. -
Pakistan's Quest for Security of Nuclear Weapons: an Analysis
Pakistan Social Sciences Review P-ISSN 2664-0422 December 2018, Vol. 2, No. 2 [155-172] O-ISSN 2664-0430 RESEARCH PAPER Pakistan’s Quest for Security of Nuclear Weapons: An Analysis Muhammad Jawad Hashmi 1 Ashfaq Ahmed 2 Muhammad Owais 3 1. Lecturer at the Dept of Political Science & International Relations, University of Gujrat, Gujrat, Punjab, Pakistan. 2. Assistant Professor, Department of Political Science and International Relations University of Sargodha, Punjab, Pakistan 3. Assistant Professor, Department of political science and international Relations, SSSH, Library building, 4th floor, UMT, Lahore, Punjab, Pakistan PAPER INFO ABSTRACT Received: Fall of Dhaka in 1971 and Indian Nuclear Explosions in 1974, August 16, 2018 changed the course of Pakistan’s nuclear weapons program. Accepted: Pakistan developed nuclear weapons due to Indian December 24, 2018 conventional and strategic superiority. The objective of this Online: study is to highlight Pakistan’s efforts to secure its nuclear December 30, 2018 program. It emphasizes that Pakistan’s nuclear weapons are Keywords: heavily guarded and secure. This paper is descriptive in nature Nuclear weapon, and completed in the light of qualitative research method. Paper Weapon of Most concludes that though Pakistan nuclear authorities have Destructions implemented personnel reliability program. It implements (WMDs), international safeguards yet international community is raising questions on security mechanism and safety of Pakistan’s Security nuclear weapons. The most important diplomatic task in front Corresponding of Pakistan at this time is to fight against misunderstandings Author: perceived by international community and to provide danalyst@hotma satisfaction to the world. il.com Introduction Since, Pakistan became the nuclear power, it remained under stressful scenario. -
What Every Public Safety Officer Should Know About Radiation and Radioactive Materials: a Resource Guide
NATIONAL LAW ENFORCEMENT AND CORRECTIONS TECHNOLOGY CENTER A program of the National Institute of Justice From Summer 2003 TechBeat TECH b • e • a • t Dedicated to Reporting Developments in Technology for Law Enforcement, Corrections, and Forensic Sciences What Every Public Safety Officer Should Know About Radiation and Radioactive Materials: A Resource Guide his resource guide provides a broad list of sources of www.atsdr.cdc.gov/mhmi.html T information and guidance for law enforcement officers, Links to a three-volume planning guide (with accompany- firefighters, emergency medical personnel, and other public ing video) to help first responders, both onscene and at safety officers who may be the first responders to a terrorist the hospital, with the medical management of patients attack in which a nonnuclear radiological device (known exposed during a hazardous materials incident. as a radiological dispersal device (RDD) or a “dirty bomb”) is used. Centers for Disease Control and Prevention, National Center for Environmental Health, Radiation Studies These resources will help departments and agencies Casualty Management After a Deliberate Release of develop and update procedural guidelines and personnel Radioactive Material. training. Also covered are resources for response, equip- www.bt.cdc.gov/radiation/casualtiesradioactive.asp ment funding, and general information. Recommends immediate actions for police, firefighters, Although many of the following resources provide and emergency medical technicians who may be faced links to other websites, the list should not be considered with a nuclear terrorist act. all inclusive. A number of other government and non- Centers for Disease Control and Prevention, National government organizations also provide publications, Center for Environmental Health, Radiation Studies guidelines, information, and training for first responders. -
What We Don't Know Can Help
Running head: ELICITING KNOWLEDGE FOR WORK WITH INTRACTABLE CONFLICTS What We Don’t Know Can Help Us: Eliciting Out-of-Discipline Knowledge for Work with Intractable Conflicts Jennifer S. Goldman Columbia University Peter T. Coleman Columbia University Correspondence concerning this article should be sent to Jennifer S. Goldman or Peter T. Coleman at the following address: Box 53, Teachers College, Columbia University, 525 West 120th St., New York, NY 10027, Phone: (212) 678-3402, Fax: (212) 678-4048. Electronic mail may be sent to Jennifer S. Goldman at [email protected] or to Peter T. Coleman at [email protected] Eliciting Knowledge for Work with Intractable Conflicts 2 Table of Contents Executive Summary……………………………………………………………………….3 Introduction………………………………………………………………………………..9 Method…………………………………………………………………………………….9 Findings……………………...…………………………………………………………..10 Methodological Learnings / Recommendations………………………………………....49 References………………………………………………………………………………..52 Appendices……………………………………………………………………………….53 Eliciting Knowledge for Work with Intractable Conflicts 3 What We Don’t Know Can Help Us: Eliciting Out-of-Discipline Knowledge for Work with Intractable Conflicts Jennifer Goldman Columbia University & Peter T. Coleman Columbia University Executive Summary The current state of theory, research, and practice on protracted, intractable conflict is robust but limited; although much progress has been made, our understanding is bounded by discipline, culture, role-in-conflict (expert versus disputant), and social class. This pilot project, funded through a mini-grant from the Intractable Conflict Knowledge Base (ICKB), elicited alternative ways-of-knowing and engaging with the phenomenon of intractable social conflict that are typically excluded from the dominant discourse in this area. A professionally and culturally diverse group of scholar- practitioners were identified through the ICKB network as potential participants, and nine (9) pilot interviews were conducted for this study. -
ON the EFFECTIVE USE of PROXY WARFARE by Andrew Lewis Peek Baltimore, Maryland May 2021 © 2021 Andrew Peek All Rights Reserved
ON THE EFFECTIVE USE OF PROXY WARFARE by Andrew Lewis Peek A dissertation submitted to Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy Baltimore, Maryland May 2021 2021 Andrew Peek All rights reserved Abstract This dissertation asks a simple question: how are states most effectively conducting proxy warfare in the modern international system? It answers this question by conducting a comparative study of the sponsorship of proxy forces. It uses process tracing to examine five cases of proxy warfare and predicts that the differentiation in support for each proxy impacts their utility. In particular, it proposes that increasing the principal-agent distance between sponsors and proxies might correlate with strategic effectiveness. That is, the less directly a proxy is supported and controlled by a sponsor, the more effective the proxy becomes. Strategic effectiveness here is conceptualized as consisting of two key parts: a proxy’s operational capability and a sponsor’s plausible deniability. These should be in inverse relation to each other: the greater and more overt a sponsor’s support is to a proxy, the more capable – better armed, better trained – its proxies should be on the battlefield. However, this close support to such proxies should also make the sponsor’s influence less deniable, and thus incur strategic costs against both it and the proxy. These costs primarily consist of external balancing by rival states, the same way such states would balance against conventional aggression. Conversely, the more deniable such support is – the more indirect and less overt – the less balancing occurs. -
Wh Owat Ches the Wat Chmen
WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment. -
Leverage and Asset Bubbles: Averting Armageddon with Chapter 11?*
The Economic Journal, 120 (May), 500–518. doi: 10.1111/j.1468-0297.2010.02357.x. Ó The Author(s). Journal compilation Ó Royal Economic Society 2010. Published by Blackwell Publishing, 9600 Garsington Road, Oxford OX4 2DQ, UK and 350 Main Street, Malden, MA 02148, USA. LEVERAGE AND ASSET BUBBLES: AVERTING ARMAGEDDON WITH CHAPTER 11?* Marcus Miller and Joseph Stiglitz An iconic model with high leverage and overvalued collateral assets is used to illustrate the ampli- fication mechanism driving asset prices to ÔovershootÕ equilibrium when an asset bubble bursts – threatening widespread insolvency and what Richard Koo calls a Ôbalance sheet recessionÕ. Besides interest rates cuts, asset purchases and capital restructuring are key to crisis resolution. The usual bankruptcy procedures for doing this fail to internalise the price effects of asset Ôfire-salesÕ to pay down debts, however. We discuss how official intervention in the form of ÔsuperÕ Chapter 11 actions can help prevent asset price correction causing widespread economic disruption. There are more things in heaven and earth, Horatio, than are dreamt of in your philosophy. Hamlet From 2007 to 2009 a chain of events, beginning with unexpected losses in the US sub-prime mortgage market, was destined to bring the global financial system close to collapse and to drag the world economy into recession. ÔOne of the key challenges posed by this crisisÕ, says Williamson (2009), Ôis to understand how such major consequences can flow from such a seemingly minor eventÕ. Before describing an amplification mechanism involving overpriced assets and excessive leverage, we begin by looking, albeit briefly, at what the current macroeconomic paradigm may have to say.