The United States’ strategic reorientation toward the Asia Pacific began not under the Barack Obama administration, but under the George W. Bush administration. As part of this reorientation, the Bush administration pursued a series of military, political, and economic policies aimed at engaging with and balancing against China, not containing it.
In the next decade and a half, China and India will become two of the world’s indispensable powers—whether they rise peacefully or not. During that time, Asia will surpass the combined strength of North America and Europe in economic might, population size, and military spending.
This is a 2016 French translation of Being Nuclear: Africans and the Global Uranium Trade (2012), translated by Charlotte Nordmann and part of the series "L'Univers Historique."
This book—the culmination of a truly collaborative international and highly interdisciplinary effort—brings together Japanese and American political scientists, nuclear engineers, historians, and physicists to examine the Fukushima accident from a new and broad perspective.
Every day, security engineers cope with a flow of cyber security incidents. While most incidents trigger routine reactions, others require orders of magnitude more effort to investigate and resolve. How security operation teams in organizations should tune their response to tame extreme events remains unclear. Analyzing the statistical properties of sixty thousand security events collected over six years at a large organization, we find that the distribution of costs induced by security incidents is in general highly skewed, following a power law tail distribution.
Despite significant interest in cybersecurity, data on cyber security incidents remains scarce. On April 16, 2015, the US Department of Energy released data on 1,131 cybersecurity incidents through a Freedom of Information Act Request. While only containing the date, location, and type of incident, several interesting insights can be kneaded from the data. In this paper, we analyze the DOE security incident data and perform a statistical analysis on the rate of incidents.
The Semipalatinsk Nuclear Test Site in Kazakhstan was conceived as an experimental landscape where science, technology, Soviet Cold War militarism, and human biology intersected. As of 2015, thousands of people continue to live in rural communities in the immediate vicinity of this polluted landscape. Lacking good economic options, many of them claim to be “mutants” adapted to radiation, while outsiders see them as genetically tainted. In such a setting, how do post-Soviet social, political, and economic transformations operate with radioactivity to co-constitute a “mutant” subjectivity?
Conditional cash transfer (CCT) programs are an increasingly popular tool for reducing poverty in conflict affected areas. Despite their growing popularity, there is limited evidence on how CCT programs affect conflictand theoretical predictions are ambiguous. We estimate the effect of conditional cash transfers on civil conflict in the Philippines by exploiting an experiment that randomly assigned eligibility for a CCT program at the village level.
My Journey at the Nuclear Brink is a continuation of William J. Perry's efforts to keep the world safe from a nuclear catastrophe. It tells the story of his coming of age in the nuclear era, his role in trying to shape and contain it, and how his thinking has changed about the threat these weapons pose.
The Soviet Union responded sceptically to Eisenhower’s ‘Atoms for Peace’ speech in December 1953 but eventually entered negotiations on the creation of the International Atomic Energy Agency. It believed the IAEA would provide opportunities for political influence and scientific collaboration. It did not want the peaceful uses of atomic energy around the world to be dominated by the United States. It pressed for close ties between the new agency and the United Nations and supported India and other developing countries in their opposition to safeguards.
France and the UK have had different approaches to the possibility of nuclear disarmament; these derive from the different post- Second World War national narratives in which the development of nuclear weapons has been embedded. This started from two different attitudes toward the NATO Alliance and its nuclear component, two different sets of lessons learned from the 1956 Suez crisis, and it culminated in two different reactions to the increase in nuclear disarmament advocacy worldwide, which is the focus of this chapter.
The fact that biological weapons have never been used—at least in recent history—is not sufficient reason to dismiss concerns that terrorists or nations could acquire and use dangerous pathogens as weapons. The ongoing discussion about gain-of-function experiments should take this very real prospect more seriously.
Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk. While security incident databases are often neglected, they contain invaluable information that can be leveraged to assess the threats, vulnerabilities, and impacts of cyber attacks, providing a detailed view of cyber risk in an organization. This paper emphasizes what data is useful for a risk assessments and how data should be recorded.
Brad Roberts's book is a counter to the conventional wisdom that the United States can and should do more to reduce both the role of nuclear weapons in its security strategies and the number of nuclear weapons in its arsenal.