Verifying Baseline Declarations of Nuclear Warheads and Materials
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Undeclared War: Unmanned Drones, Human Rights and Collective Security
Undeclared War: unmanned drones, human rights and collective security Susan Carolyn Breau, University of Reading/Mark Olssen, University of Surrey Drones constitute, as Barbara Ehrenreich notes, in her ‘Foreword’ to Medea Benjamin’s Drone Warfare: Killing by remote control, the “ultimate action-at-a-distance weapons, allowing the aggressor to destroy targets in Pakistan or Afghanistan while ‘hiding’ thousands of miles away in Nevada” (Ehrenreich, 2013, p. vii). Yet, as Ehrenreich continues, “it is hard to even claim that their primary use is ‘military’ in any traditional sense. Drones have made possible a programme of targeted assassinations that are justified by the US ‘war on terror’, but otherwise in defiance of both international and US law” (p. viii). She notes how Benjamin in her book documents impressively how “it is the CIA, not the Pentagon, that operates most drone strikes in Western Asia, with no accountability whatsoever. Designed targets…have been condemned without evidence or trial – at the will apparently, of the White House. And those who operate the drones do so with complete impunity for the deaths of any civilians who end up as collateral damage.” (p. viii) Although the technical expertise for producing drones was developed as early as the WWI, and although unmanned aerial vehicles were used for gathering intelligence and for reconnaissance during WWII and during the Vietnam and later Balkan wars, their adaptation to becoming lethal military vehicles for the purposes of attacking and destroying specified targets has taken place more recently. Although Abraham Karem assisted the Israeli’s in developing unmanned robots in the 1970s, and built the first Predator drone in his garage in Southern California in the early 1980s 1, the first official use in military conflict only occurred since 1999 with the NATO Kosovo intervention where unmanned robotic aircraft were adapted to carry missiles “transforming them from spy planes into killer drones” (Benjamin, p. -
Article Thermonuclear Bomb 5 7 12
1 Inexpensive Mini Thermonuclear Reactor By Alexander Bolonkin [email protected] New York, April 2012 2 Article Thermonuclear Reactor 1 26 13 Inexpensive Mini Thermonuclear Reactor By Alexander Bolonkin C&R Co., [email protected] Abstract This proposed design for a mini thermonuclear reactor uses a method based upon a series of important innovations. A cumulative explosion presses a capsule with nuclear fuel up to 100 thousands of atmospheres, the explosive electric generator heats the capsule/pellet up to 100 million degrees and a special capsule and a special cover which keeps these pressure and temperature in capsule up to 0.001 sec. which is sufficient for Lawson criteria for ignition of thermonuclear fuel. Major advantages of these reactors/bombs is its very low cost, dimension, weight and easy production, which does not require a complex industry. The mini thermonuclear bomb can be delivered as a shell by conventional gun (from 155 mm), small civil aircraft, boat or even by an individual. The same method may be used for thermonuclear engine for electric energy plants, ships, aircrafts, tracks and rockets. ----------------------------------------------------------------------- Key words: Thermonuclear mini bomb, thermonuclear reactor, nuclear energy, nuclear engine, nuclear space propulsion. Introduction It is common knowledge that thermonuclear bombs are extremely powerful but very expensive and difficult to produce as it requires a conventional nuclear bomb for ignition. In stark contrast, the Mini Thermonuclear Bomb is very inexpensive. Moreover, in contrast to conventional dangerous radioactive or neutron bombs which generates enormous power, the Mini Thermonuclear Bomb does not have gamma or neutron radiation which, in effect, makes it a ―clean‖ bomb having only the flash and shock wave of a conventional explosive but much more powerful (from 1 ton of TNT and more, for example 100 tons). -
Jihadists and Nuclear Weapons
VERSION: Charles P. Blair, “Jihadists and Nuclear Weapons,” in Gary Ackerman and Jeremy Tamsett, eds., Jihadists and Weapons of Mass Destruction: A Growing Threat (New York: Taylor and Francis, 2009), pp. 193-238. c h a p t e r 8 Jihadists and Nuclear Weapons Charles P. Blair CONTENTS Introduction 193 Improvised Nuclear Devices (INDs) 195 Fissile Materials 198 Weapons-Grade Uranium and Plutonium 199 Likely IND Construction 203 External Procurement of Intact Nuclear Weapons 204 State Acquisition of an Intact Nuclear Weapon 204 Nuclear Black Market 212 Incidents of Jihadist Interest in Nuclear Weapons and Weapons-Grade Nuclear Materials 213 Al-Qa‘ida 213 Russia’s Chechen-Led Jihadists 214 Nuclear-Related Threats and Attacks in India and Pakistan 215 Overall Likelihood of Jihadists Obtaining Nuclear Capability 215 Notes 216 Appendix: Toward a Nuclear Weapon: Principles of Nuclear Energy 232 Discovery of Radioactive Materials 232 Divisibility of the Atom 232 Atomic Nucleus 233 Discovery of Neutrons: A Pathway to the Nucleus 233 Fission 234 Chain Reactions 235 Notes 236 INTRODUCTION On December 1, 2001, CIA Director George Tenet made a hastily planned, clandestine trip to Pakistan. Tenet arrived in Islamabad deeply shaken by the news that less than three months earlier—just weeks before the attacks of September 11, 2001—al-Qa‘ida and Taliban leaders had met with two former Pakistani nuclear weapon scientists in a joint quest to acquire nuclear weapons. Captured documents the scientists abandoned as 193 AU6964.indb 193 12/16/08 5:44:39 PM 194 Charles P. Blair they fled Kabul from advancing anti-Taliban forces were evidence, in the minds of top U.S. -
Nuclear Reactors Fuelled with Uranium Inevitably Produce Plutonium As a By-Product
The Secretary Joint Standing Committee on Treaties Inquiry into Nuclear Non-proliferation and Disarmament Dear Sir/Madam, I would like to submit the following submission to the Parliamentary Committee Inquiry into Nuclear Non- proliferation and Disarmament. Yours sincerely, Frank Barnaby. A submission to the Parliamentary Committee Inquiry into Nuclear Non- proliferation and Disarmament. Frank Barnaby Nuclear reactors fuelled with uranium inevitably produce plutonium as a by-product. This plutonium can be used by countries and by nuclear terrorists to fabricate nuclear weapons. The operation of nuclear-power reactors, therefore, has consequences for national, regional and global security. The more nuclear reactors there are the greater the security risks. Australia should recognise that these security risks outweigh the befits of producing electricity by nuclear power especially because the use of renewable sources of energy, combined with improvements in energy efficiency and the conservation of energy make the use of nuclear power unnecessary. As the world’s second largest exporter of uranium, Australia has a major responsibility to adopt policies to minimise the risks to security from nuclear proliferation and terrorism. To this end, Australia should use its influence to bring the Comprehensive Nuclear Test Ban Treaty (CTBT) into effect. It should not supply uranium to countries, like the USA and China, which have not yet ratified the CTBT. Moreover, Australia should promote the negotiation of a Comprehensive Fissile Material Cut-Off Treaty to prohibit the further production of fissile material usable for the production of nuclear weapons, prohibit the reprocessing of spent nuclear-power reactor fuel that has been produced by Australian uranium and should not support or encourage the use of Mixed Oxide (MOX) nuclear fuel or the use of Generation IV reactors, particularly fast breeder reactors. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
America's Undeclared Naval War
America's Undeclared Naval War Between September 1939 and December 1941, the United States moved from neutral to active belligerent in an undeclared naval war against Nazi Germany. During those early years the British could well have lost the Battle of the Atlantic. The undeclared war was the difference that kept Britain in the war and gave the United States time to prepare for total war. With America’s isolationism, disillusionment from its World War I experience, pacifism, and tradition of avoiding European problems, President Franklin D. Roosevelt moved cautiously to aid Britain. Historian C.L. Sulzberger wrote that the undeclared war “came about in degrees.” For Roosevelt, it was more than a policy. It was a conviction to halt an evil and a threat to civilization. As commander in chief of the U.S. armed forces, Roosevelt ordered the U.S. Navy from neutrality to undeclared war. It was a slow process as Roosevelt walked a tightrope between public opinion, the Constitution, and a declaration of war. By the fall of 1941, the U.S. Navy and the British Royal Navy were operating together as wartime naval partners. So close were their operations that as early as autumn 1939, the British 1 | P a g e Ambassador to the United States, Lord Lothian, termed it a “present unwritten and unnamed naval alliance.” The United States Navy called it an “informal arrangement.” Regardless of what America’s actions were called, the fact is the power of the United States influenced the course of the Atlantic war in 1941. The undeclared war was most intense between September and December 1941, but its origins reached back more than two years and sprang from the mind of one man and one man only—Franklin Roosevelt. -
The Massachusetts Antiwar Bill, by Anthony A
Northwestern University School of Law Northwestern University School of Law Scholarly Commons Faculty Working Papers 1970 The aM ssachusetts Antiwar Bill Anthony D'Amato Northwestern University School of Law, [email protected] Repository Citation D'Amato, Anthony, "The asM sachusetts Antiwar Bill" (1970). Faculty Working Papers. Paper 126. http://scholarlycommons.law.northwestern.edu/facultyworkingpapers/126 This Article is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Working Papers by an authorized administrator of Northwestern University School of Law Scholarly Commons. The Massachusetts Antiwar Bill, by Anthony A. D'Amato,* 42 New York State Bar Journal 639-649 (1970) Abstract: The Massachusetts Antiwar bill provides that no inhabitant of Massachusetts inducted into or serving in the armed forces “shall be required to serve” abroad in an armed hostility that has not been declared a war by Congress under Art. I, Sect. 8 of the United States Constitution. One could hardly imagine a more fundamental constitutional doubt arising in the mind of the American public than that of the legality of a major war. The purpose of the Massachusetts bill is purely and simply to obtain an authoritative judicial test of the constitutionality of an undeclared war. Tags: Massachusetts Antiwar Bill, Vietnam War, Massachusetts v. Laird, U.S. Constitution Article I Section 8, Prize Cases, Standing [pg639]** One of the most singular pieces of legislation in American constitutional history passed both houses of the Massachusetts legislature on April 1st, 1970, and was signed into law, effective immediately, on the following day by Governor Francis W. -
Law of War Handbook 2005
LAW OF WAR HANDBOOK (2005) MAJ Keith E. Puls Editor 'Contributing Authors Maj Derek Grimes, USAF Lt Col Thomas Hamilton, USMC MAJ Eric Jensen LCDR William O'Brien, USN MAJ Keith Puls NIAJ Randolph Swansiger LTC Daria Wollschlaeger All of the faculty who have served before us and contributed to the literature in the field of operational law. Technical Support CDR Brian J. Bill, USN Ms. Janice D. Prince, Secretary JA 423 International and Operational Law Department The Judge Advocate General's Legal Center and School Charlottesville, Virginia 22903 PREFACE The Law of War Handbook should be a start point for Judge Advocates looking for information on the Law of War. It is the second volume of a three volume set and is to be used in conjunction with the Operational Law Handbook (JA422) and the Documentary Supplement (JA424). The Operational Law Handbook covers the myriad of non-Law of War issues a deployed Judge Advocate may face and the Documentary Supplement reproduces many of the primary source documents referred to in either of the other two volumes. The Law of War Handbook is not a substitute for official references. Like operational law itself, the Handbook is a focused collection of diverse legal and practical information. The handbook is not intended to provide "the school solution" to a particular problem, but to help Judge Advocates recognize, analyze, and resolve the problems they will encounter when dealing with the Law of War. The Handbook was designed and written for the Judge Advocates practicing the Law of War. This body of law is known by several names including the Law of War, the Law of Armed Conflict and International Humanitarian Law. -
Name: 00001205
UNITED NATIONS A General Assembly Distr. GENERAL A/38/651 8 December 1983 ORIGINAL: ENGLISH 'OA/ Thirty-eighth session Agenda item 29 THE SITUATION IN AFGHANISTAN AND ITS IMPLICATIONS FOR INTERNATIONAL PEACE AND SECURITY Letter dated 7 December 1983 from the Permanent Representative of Afghanistan to the United Nations addressed to the President of the General Assembly I have the honour to refer to my statement of 23 November 1983 1/ in exercise of the right of reply of my delegation, in the course of which I requested Your Excellency to issue as a document of the General Assembly the full text of my statement which I could not conclude owing to the shortage of time. I have further the honour to submit to you the full text of that statement with the request for its distribution as a document of the General Assembly under agenda item 29. (Signed) M. Farid ZARIF Ambassador Permanent Representative 1/ A/38/PV.69, p. 52. 83-34878 1056u (E) /.. A/38/651 English ANNEX Page 2 Statement by the Permanent Representative of Afghanistan In his statement yesterday in this Assembly, the Head of the Pakistan delegation referred to my Government as a regime which was installed and is being sustained by alien forces. His falacious version of the reality, notwithstanding, we regret the fact that not all delegations abide by the elementary rules of ethics in this Assembly or in their inter-state relations. "Te therefore abstain from calling his government as the Islamabad military regime which is being sustained by bayonets and bullets. -
DOE-OC Green Book
SUBJECT AREA INDICATORS AND KEY WORD LIST FOR RESTRICTED DATA AND FORMERLY RESTRICTED DATA U.S. DEPARTMENT OF ENERGY AUGUST 2018 TABLE OF CONTENTS PURPOSE ....................................................................................................................................................... 1 BACKGROUND ............................................................................................................................................... 2 Where It All Began .................................................................................................................................... 2 DIFFERENCE BETWEEN RD/FRD and NATIONAL SECURITY INFORMATION (NSI) ......................................... 3 ACCESS TO RD AND FRD ................................................................................................................................ 4 Non-DoD Organizations: ........................................................................................................................... 4 DoD Organizations: ................................................................................................................................... 4 RECOGNIZING RD and FRD ............................................................................................................................ 5 Current Documents ................................................................................................................................... 5 Historical Documents ............................................................................................................................... -
The Changkufeng and Nomonhan Incidents – the Undeclared Border War and Its Impact on World War Ii
University of Texas at El Paso DigitalCommons@UTEP Open Access Theses & Dissertations 2014-01-01 The hC angkufeng And Nomonhan Incidents - The Undeclared Border War And Its Impact on World War II Tobias Block University of Texas at El Paso, [email protected] Follow this and additional works at: https://digitalcommons.utep.edu/open_etd Part of the Asian History Commons, Asian Studies Commons, Military History Commons, Slavic Languages and Societies Commons, and the Soviet and Post-Soviet Studies Commons Recommended Citation Block, Tobias, "The hC angkufeng And Nomonhan Incidents - The ndeU clared Border War And Its Impact on World War II" (2014). Open Access Theses & Dissertations. 1588. https://digitalcommons.utep.edu/open_etd/1588 This is brought to you for free and open access by DigitalCommons@UTEP. It has been accepted for inclusion in Open Access Theses & Dissertations by an authorized administrator of DigitalCommons@UTEP. For more information, please contact [email protected]. THE CHANGKUFENG AND NOMONHAN INCIDENTS – THE UNDECLARED BORDER WAR AND ITS IMPACT ON WORLD WAR II TOBIAS BLOCK DEPARTMENT OF HISTORY APPROVED: __________________________________________ Joshua Fan, Ph.D., Chair __________________________________________ Paul Edison, Ph.D. __________________________________________ Jose Villalobos, Ph.D. __________________________________ Bess Sirmon-Taylor, Ph.D. Interim Dean of the Graduate School THE CHANGKUFENG AND NOMONHAN INCIDENTS - THE UNDECLARED BORDER WAR AND ITS IMPACT ON WORLD WAR II by Tobias Block, BA Thesis Presented to the Faculty of the Graduate School of The University of Texas at El Paso in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS Department Of HISTORY THE UNIVERSITY OF TEXAS OF EL PASO May 2014 Table of Contents Table of Contents……………………………………………………………………………………………………………………. -
Cyber War and Terrorism: Towards a Common Language to Promote Insurability
Cyber War and Terrorism: Towards a common language to promote insurability July 2020 Cyber War and Terrorism: Towards a common language to promote insurability Rachel Anne Carter, Director Cyber, The Geneva Association Julian Enoizi, CEO, Pool Reinsurance Company Limited, and Secretariat, International Forum of Terrorism Risk (Re)Insurance Pools Cyber War and Terrorism: Towards a common language to promote insurability 1 The Geneva Association The Geneva Association was created in 1973 and is the only global association of insurance companies; our members are insurance and reinsurance Chief Executive Officers (CEOs). Based on rigorous research conducted in collaboration with our members, academic institutions and multilateral organisations, our mission is to identify and investigate key trends that are likely to shape or impact the insurance industry in the future, highlighting what is at stake for the industry; develop recommendations for the industry and for policymakers; provide a platform to our members, policymakers, academics, multilateral and non-governmental organisations to discuss these trends and recommendations; reach out to global opinion leaders and influential organisations to highlight the positive contributions of insurance to better understanding risks and to building resilient and prosperous economies and societies, and thus a more sustainable world. International Forum of Terrorism Risk (Re)Insurance Pools The International Forum of Terrorism Risk (Re)Insurance Pools (IFTRIP) is a collaboration between global terrorism (re)insurance pools. It was formally ratified at the National Terrorism Reinsurance Pools Congress organised by the Australian Reinsurance Pool Corporation (ARPC) in Canberra in October 2016. The organisation was founded with the goal of promoting initiatives for closer international collaboration and sharing expertise and experience to combat the threat of potential major economic loss resulting from terrorism.