Authors
News Type
News
Date
Paragraphs

Thousands of tons of highly radioactive spent fuel are in temporary storage in 35 states, with no permanent solution being discussed. International experts led by Stanford show how to end this status quo.

Rod Ewing led a three-year study recommending changes to the U.S. nuclear waste management program. (Image credit: Courtesy CISAC)

 

The U.S. government has worked for decades and spent tens of billions of dollars in search of a permanent resting place for the nation’s nuclear waste. Some 80,000 tons of highly radioactive spent fuel from commercial nuclear power plants and millions of gallons of high-level nuclear waste from defense programs are stored in pools, dry casks and large tanks at more than 75 sites throughout the country.

A Stanford University-led study recommends that the United States reset its nuclear waste program by moving responsibility for commercially generated, used nuclear fuel away from the federal government and into the hands of an independent, nonprofit, utility-owned and -funded nuclear waste management organization.

“No single group, institution or governmental organization is incentivized to find a solution,” said Rod Ewing, co-director of Stanford’s Center for International Security and Cooperation and a professor of geological sciences.

The three-year study, led by Ewing, makes a series of recommendations focused on the back-end of the nuclear fuel cycle. The reportReset of America’s Nuclear Waste Management Strategy and Policy, was released today.

A tightening knot

Over the past four decades, the U.S. nuclear waste program has suffered from continuing changes to the original Nuclear Waste Policy Act, a slow-to-develop and changing regulatory framework. Erratic funding, significant changes in policy with changing administrations, conflicting policies from Congress and the executive branch and – most important – inadequate public engagement have also blocked any progress.

“The U.S. program is in an ever-tightening Gordian knot – the strands of which are technical, logistical, regulatory, legal, financial, social and political – all caught in a web of agreements with states and communities, regulations, court rulings and the congressional budgetary process,” the report says.

The project’s steering committee sought to untangle these technical, administrative and public barriers so that critical issues could be identified and overcome. They held five open meetings with some 75 internationally recognized experts, government officials, leaders of nongovernmental organizations, affected citizens and Stanford scholars as speakers.

After describing the Sisyphean history of the U.S. nuclear waste management and disposal program, the report makes recommendations all focused around a final goal: long-term disposal of highly radioactive waste in a mined, geologic repository.

“Most importantly, the United States has taken its eyes off the prize, that is, disposal of highly radioactive nuclear waste in a deep-mined geologic repository,” said Allison Macfarlane, a member of the steering committee and a professor of public policy and international affairs at George Washington University. “Spent nuclear fuel stored above ground – either in pools or dry casks – is not a solution. These facilities will eventually degrade. And, if not monitored and cared for, they will contaminate our environment.”

Not a new idea abroad

The new, independent, utility-owned organization would control spent fuel from the time it is removed from reactors until its final disposal in a geologic repository. This is not a new idea. Finland, Sweden, Switzerland and Canada all have adopted a similar approach – and their nuclear waste management programs are moving forward. Finland expects to receive its first spent fuel at its geologic repository on the island of Olkiluoto in the mid-2020s.

“Initially, I was skeptical about placing utilities with nuclear power plants in control of the spent fuel from commercial reactors,” said Ewing. “But as we discussed the advantages of this cradle-to-grave approach, I was persuaded, particularly because this is the approach taken by other successful programs.”

Essential to the success of a new organization would be access to the Nuclear Waste Fund. Reassigning responsibility to a new organization – whether controlled by the federal government or nuclear utilities – would require an act of Congress. The report recommends that the Nuclear Waste Fund, more than $40 billion, be transferred to the new organization over several decades. If the new organization successfully develops a geologic repository, this repository could also be used for highly radioactive defense waste.

“The status quo is a big liability for the future of nuclear power, an established source of carbon-free electricity,” said Sally Benson, co-director of Stanford’s Precourt Institute for Energy and a member of the report’s steering committee. “These recommendations will, I hope, break the gridlock in Washington and prompt concrete action to solve this problem.”

To read all stories about Stanford science, subscribe to the biweekly Stanford Science Digest.

Benson is also a professor of energy resources engineering. She and Ewing are members of Stanford’s School of Earth, Energy & Environmental Sciences.

The Reset of America’s Nuclear Waste Management project was funded by the Precourt Institute for Energy, the Freeman Spogli Institute for International Studies and the Center for International Security and Cooperation. The meetings at George Washington University were supported by the John D. & Catherine T. MacArthur Foundation.

Hero Image
pages from reset report 2018 final 2
All News button
1
Paragraphs

The U.S. government has worked for decades and spent tens of billions of dollars in search of a permanent resting place for the Nation’s nuclear waste. Some 80,000 tons of highly radioactive spent fuel from commercial nuclear power plants and millions of gallons of high-level nuclear waste from defense programs are stored in pools, dry casks and large tanks throughout the country at more than 75 sites in 39 states.

A Stanford-led study recommends that the United States “reset” its nuclear waste program by moving responsibility for commercially generated, used nuclear fuel away from the federal government and into the hands of an independent, not-for-profit, utility-owned and funded nuclear waste management organization. The three year study led by Rod Ewing in the Center for International Security and Cooperation has made a series of recommendations focused on the back-end of the nuclear fuel cycle. 

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Authors
Siegfried S. Hecker
News Type
Commentary
Date
Paragraphs

My reply to the frequently asked question if Kim Jong Un will ever give up North Korea’s nuclear weapons is, “I don’t know, and most likely he doesn’t know either. But it is time to find out.” However, insisting that Kim Jong Un give a full declaration of his nuclear program up front will not work. It will breed more suspicion instead of building the trust necessary for the North to denuclearize, a process that will extend beyond the 2020 US presidential election.

However, the time it will take to get to the endpoint should not obscure the progress that has already been made. Since this spring, Kim Jong Un has taken significant steps to reduce the nuclear threat North Korea poses. He has declared an end to nuclear testing and closed the nuclear test tunnels by setting off explosive charges inside the test tunnel complex. He also declared an end to testing intermediate- and long-range missiles including intercontinental ballistic missiles (ICBMs). I consider these as two of the most important steps toward reducing the threat North Korea poses and as significant steps on the path to denuclearization.

Whereas the North still poses a nuclear threat to Japan and South Korea as well as US military forces and citizens in the region, the threat to the United States has been markedly reduced. In my opinion, North Korea needs more nuclear and ICBM tests to be able to reach the United States with a nuclear-tipped missile. Freezing the sophistication of the program is a necessary precursor to rolling it back in a step-by-step process.

At the September 2018 inter-Korean summit in Pyongyang, Kim also told President Moon that he would commit to dismantling the Yongbyon nuclear complex if the US takes commensurate measures—unspecified, at least in public. The Yongbyon complex is the heart of North Korea’s nuclear program. Shutting it down and dismantling it would be a very big deal because it would stop plutonium and tritium production (for hydrogen bombs) and significantly disrupt highly enriched uranium production.

Yet, Kim’s actions have been widely dismissed as insignificant or insincere by both the left and the right of the American political spectrum. In many of these quarters, the sincerity of Kim’s denuclearization promise is judged by whether or not he is willing to provide a full and complete declaration and to agree on adequate verification measures. But Kim’s willingness to provide a full declaration at this early stage tells us little about his willingness to denuclearize. Moreover, I maintain that insisting on this approach is a dead end, certainly as long as Washington continues to apply “maximum pressure” instead of moving to implement the steps on normalizing relations that President Trump agreed to in the June Singapore statement.

A full declaration is a dead end because it is tantamount to surrender, and Kim has not surrendered, nor will he. A complete account of North Korea’s nuclear weapons, materials, and facilities would, in Kim’s view, likely be far too risky in that it would essentially provide a targeting list for US military planners and seal the inevitable end of the nuclear program and possibly his regime.

Furthermore, a declaration must be accompanied by a robust verification protocol. That, in turn, must allow inspections and a full accounting of all past activities such as production and procurement records as well as export activities. And, once all these activities are complete, an inspection protocol must provide assurances that activities that could support a weapons program are not being reconstituted. This would be a contentious and drawn-out affair.

It is inconceivable that the North would declare all of its nuclear weapons, their location, and allow inspections of the weapons or of their disassembly up front. But in addition to the weapons themselves, a nuclear weapon program consists of three interlocking elements: 1) the nuclear bomb fuel, which depending on the type of bomb includes plutonium, highly enriched uranium (HEU), and forms of heavy hydrogen—deuterium and tritium; 2) weaponization—that is, designing, building and testing weapons, and; 3) delivery systems, which in the case of North Korea appear to be missiles, although airplane or ship delivery cannot be ruled out. Each of these elements involves dozens of sites, hundreds of buildings, and several thousand people.

Let me give an example of what is involved just for verification of plutonium inventories and means of production. Plutonium is produced in reactors by the fission of uranium fuel. We estimate that most of the North’s plutonium has been produced in its 5 MWe (electric) gas-graphite reactor at the Yongbyon complex. A complete declaration must provide for the entire operations history (along with its design and operational characteristics) going back to its initial operation in 1986 to correctly estimate how much plutonium was produced.

In addition, North Korea has operated the Soviet-supplied IRT-2000 research reactor at the Yongbyon site since 1967. Although little plutonium has likely been produced there, this would have to be verified by providing the complete operating history along with performance characteristics since its initial operation. North Korea has also constructed an experimental light water reactor (ELWR) that is likely not yet operational. Its status would have to be checked to see if it was configured to favor weapon-grade plutonium production. Finally, North Korea began to build but never completed 50 MWe and 200 MWe gas-graphite reactors, whose construction operations were stopped by the Agreed Framework in 1994. Their status would have to be verified.

The 5 MWe reactor fuel consists of natural uranium metal alloy fuel elements. Tracking the entire history of fuel fabrication would be an important verification step for plutonium production. It starts with uranium ore mining, milling and conversion to uranium oxide. This is followed by a few additional steps to produce the uranium metal that is formed into fuel elements for the reactor to produce plutonium. Some of these same steps would also be used, but then complemented by turning the uranium into a compound that serves as the precursor gas (uranium hexafluoride) for centrifuge enrichment to produce low enriched uranium for light water reactors or highly enriched uranium for bombs.

A complete and accurate accounting of fuel produced would also likely show a discrepancy that indicates that more fuel was produced at Yongbyon than was consumed. The difference could be accounted for by the fuel that North Korea produced for the gas-graphite reactor it built in Syria, a project that was terminated by Israel’s air raid on the Al Kibar site in September 2007. North Korea is unlikely to acknowledge the illicit construction of the Syrian reactor as part of its own plutonium declaration.

Once produced in the reactor, plutonium has to be extracted from the used or spent fuel after a sufficient period of time that allows the spent fuel to cool thermally and radioactively. The extraction or separations process is accomplished in a reprocessing facility using mechanical and chemical methods. The North’s reprocessing facility became operational in the early 1990s. All of its operations records would have to be examined and verified. In addition, it is likely that some small amount of plutonium that may have been produced in the IRT-2000 reactor was separated in the hot cell facilities in that complex. Its records would have to be examined and verified.

After plutonium is separated, it must be purified, alloyed, cast and machined into final bomb components. Each of these steps generates residue and waste streams that must be monitored and assessed for their plutonium content. Based on my visits to Yongbyon and discussions with the North’s technical staff, I believe that the steps beginning with delivery of yellowcake to Yongbyon (from the uranium mining and milling sites), plus all steps for fuel fabrication, reactor production of plutonium, spent fuel cooling, reprocessing, plutonium purification and alloying into metal ingots are conducted at Yongbyon.

During my visits to Yongbyon, I was told that the plutonium ingots are then taken off site (of an undeclared location) in which the plutonium is cast into bomb components—which would then be followed by machining and assembling into pits, the plutonium cores of the weapons. In 2010, I was also told that all plutonium residues and wastes from reprocessing and plutonium metal preparation were still stored at Yongbyon (under questionable safety conditions). Very little had been done to prepare the spent fuel waste for final disposition. This is likely still the case and, hence, most of the reprocessing facility must remain operational after the rest of Yongbyon is shut down in order to prepare the hazardous waste for safe, long-term disposition. This will also complicate the plutonium inventory verification.

A complete declaration must also include how much plutonium was used during underground testing. In addition to the six known tests at Punggye-ri, North Korea also claims to have conducted “subcritical” experiments (stopping just short of a nuclear detonation), which I consider to be unlikely. If it did, however, North Korea would have to declare the amount of plutonium used and its current state, particularly since such experiments could leave plutonium in a usable form unlike the case for nuclear detonations. To verify the nuclear test history of plutonium, as well as for highly enriched uranium, it would be necessary to provide information or allow drill-back inspections into the test tunnels at Punggye-ri to ascertain the type and amount of nuclear material used in the test.

To complicate matters even further, if one or more of the North’s test devices failed to produce a nuclear explosion, then plutonium (or HEU) could still be resident in the tunnels. Both the United States and Russia experienced such test failures. This is also possibly the case for North Korea because there is still some uncertainty as to whether or not a nuclear test was conducted in May 2010 when a faint seismic signal was observed from the test area. For the most part, the jury is still out on that event, but the North would now have to allow inspections and verification.

It should be apparent that the declaration plus commensurate verification of the amount of plutonium North Korea possesses, which I believe is only between 20 and 40 kilograms, will be an enormous job. I cannot see it being accomplished in the current adversarial environment and certainly not within the timeframe that has been specified by the US government.

A similar sequence of declarations, inspections, and verification measures would have to be developed for the other bomb fuels, namely HEU and the hydrogen isotopes, deuterium and tritium. Verification of HEU inventories and means of production will be particularly contentious because very little is known about the centrifuge facility at the Yongbyon site. As far as we know, my Stanford colleagues and I are the only foreigners to have seen that facility, and then only in a hurried walk-through in 2010. In addition, there exists at least one other covert centrifuge site.

The situation is even more problematic for the second element of the North’s nuclear program, that of weaponization, which includes bomb design, production, and testing because we know nothing about these activities or where they are performed. Although we have some information regarding the nuclear test site at which six nuclear tests were conducted, we do not know if there are other tunnel complexes that have been prepared for testing.

The third element includes all of the North’s missiles and its production, storage and launch sites and complexes. These will also represent a major challenge for complete and correct declarations, inspections and verification.

Once all of the elements have been declared and the dismantling begins, then the focus will have to change to verifying the dismantlement and assessing the potential reversibility of these actions—a challenge that is not only difficult, but one that must be ongoing.

Verification was one of the sticking points during the 2007-2008 diplomatic initiative pursued late in the George W. Bush administration. In 2008, the North turned over copies of 18,000 pages of operating records of the reactor and reprocessing facilities in Yongbyon. The veracity of that disclosure has never been established because diplomatic efforts fell apart when the United States insisted on more declarations up front and North Korea accused Washington of having moved the goal posts. That declaration constituted only a small part of what I outlined above as being necessary for a full accounting of plutonium, not to mention the other components of North Korea’s nuclear program. That was 10 years ago, and much has happened since to make future declarations and verification much more problematic.

At this time, the level of trust between Pyongyang and Washington required for North Korea to agree to a full, verifiable declaration up front does not exist. Hence, my colleagues Robert Carlin and Elliot Serbin and I have suggested a different approach. Negotiations should begin with an agreed end state: North Korea without nuclear weapons or a nuclear weapon program. Civilian nuclear and space programs would remain open for negotiation and possible cooperation. But all facilities and activities that have direct nuclear weapons applicability must eventually be eliminated.

Rather than insisting on a full declaration up front, the two sides should first agree to have the North take significant steps that reduce the nuclear threat it poses in return for commensurate movements toward normalization—the details of which would have to be worked out during negotiations. A good next step for the North would be the destruction of the 5 MWe plutonium production reactor, which would be part of the package that Kim proposed to Moon at the Pyongyang Summit. If these actions are matched by US steps toward normalization as pledged in the Singapore statement, they will serve to build the trust required for the North to initiate a phased declaration process that initially covers operations in Yongbyon and eventually includes the entire nuclear program discussed above.

Unfortunately, the strategic opening created by the Singapore and North-South summits has not been followed by such tactical steps to get the negotiation process off the ground. The North and the South are ready to create a commonly acceptable path forward, but we have the worst of environments in Washington. The Trump team claims progress is being made but insists on maintaining maximum pressure. The North’s Foreign Ministry has pointed outthat the “improvement of relations and sanctions are incompatible.” Also, most US North Korea watchers are either wedded to old think that you can’t negotiate with Pyongyang or they are determined to prove President Trump’s claims on North Korea wrong.

With nuclear tensions on the Korean Peninsula dramatically reduced, it is time to find out if Kim’s drive to improve the economy will eventually lead to denuclearization. He may determine that his nuclear arsenal poses a significant hindrance to economic development that outweighs the putative benefits it confers. Washington and Seoul should work together to encourage rather than inhibit this potential shift.

 

Hero Image
hecker2
All News button
1
Authors
Max Smeets
Herbert Lin
News Type
Commentary
Date
Paragraphs
 

The new U.S. Cyber Command (USCYBERCOM) vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.

With the publication of these documents, as well as 2017 National Security Strategy and the 2018 National Defense Strategy, there is a general conception among expertsthat the U.S. has, for the first time, articulated a strategy that truly appreciates the unique “symptoms” of cyberspace. The documents recognize that there is a new structural set of dynamics associated with the new domain of cyberspace that has incentivized a new approach to power competition—in particular, that hostile or adversarial behavior below the threshold of armed attack could nevertheless be strategically meaningful (that is, change the balance of power).

Yet most cyber experts have also argued that the ‘medicine’ prescribed by the Defense Department  and USCYBERCOM should be further scrutinized. Indeed, the side effects of the strategy of “persistent engagement” and “defense forward” are still ill-understood. As we have argued elsewhere, a United States that is more powerful in cyberspace does not necessarily mean one that is more stable or secure. More research is required to better understand adversarial adaptive capacity and escalation dynamics.

We should note that the Department of Defense lexicon has not yet provided a formal definition of “defending forward.” We suspect the formal definition that is ultimately adopted will be similar to the earlier concept of “counter cyber,” though with an emphasis on adversarial cyber campaigns (instead of ‘activities’): “A mission that integrates offensive and defensive operations to attain and maintain a desired degree of cyberspace superiority. Counter-cyber missions are designed to disrupt, negate, and/or destroy adversarial cyberspace activities and capabilities, both before and after their employment.”

Scholarship to date has mainly pointed out that this new U.S. strategic thinking could be escalatory, but it has not sought to spell out the specific causal mechanisms and scenarios as to how the consequences of the strategic shift may unfold.

In a forthcoming article, part of an edited volume on offensive cyber operations published by the Brookings Institution (entitled “Bytes, Bombs, and Spies: Strategic Dimensions of Offensive Cyber Operations”), we systematically address some of these conflict outcomes. Specifically, we consider the four general outcomes possible over time with two outcome variables: a more (or less) powerful U.S. and a more (or less) stable cyberspace.

 

 

 U.S. power relative to adversaries

 

 

More

Less

Stability

More

More powerful & More stability

Less Powerful & More stability

Less

More powerful & less stability

Less powerful & less stability

 

The Optimal Outcome

From the U.S. standpoint, the optimal outcome is a United States that is more powerful in cyberspace along with a more stable cyberspace. Indeed, from the U.S. standpoint, the former will lead to the latter. A more stable cyberspace will involve norms of acceptable behavior, less conflict and so on.

One path towards this rosy outcome is that the strategy does what it is said to do: Creates significant friction and makes it hard for adversaries to operate effectively. Adversaries realize that the U.S. strategy of persistent engagement makes it more difficult to conduct various offensive cyber operations, and they have no strong incentives to escalate as it may trigger a U.S. response in the conventional domain. USCYBERCOM has the advantage from the beginning.

Some argued at the first USCYBERCOM symposium that persistent engagement may first lead to a worsening situation before it gets better. This outcome is possible under one of two conditions. First, USCYBERCOM could initially be unable to seize the initiative from a capacity perspective, but become increasingly better at it in the future. This may well be true: USCYBERCOM is still continuing to develop its cyber capacity. Even though the Cyber Mission Force (CMF) has achieved full operational capability, it will take time for the new workforce to operate capably and ensure the effective coordination of all units.

The second condition is that other actors could increase their hostile cyber activity in the short term, but become less hostile in the long run. This condition is much less likely to be true: Other actors are likely to adapt to U.S. activities over time rather than to reduce their own activities, and the expected number of actors with hostile intent in this space is likely to increase over time.  For example, FireEye recently reported on the “rise of the rest,” arguing that the world has seen a growing number of advanced persistent threat (APT) groups attributed to countries other than Russia or China.

Another more powerful and more stable situation analyzed in the paper could—perhaps paradoxically—be described as “deterrence through a strategy of persistence.”  In this particular outcome, the main threat actors are initially cautious to act, following the release of U.S. new strategy. However,  this is unlikely: Other actors will probably not exhibit caution to see which way the wind blows before acting. An excerpt from Lt. Gen. Nakasone’s nomination hearing to serve as director of the NSA is telling:

            Sen. Sullivan: They [our adversaries] don’t fear us.

            Gen.Nakasone: They don’t fear us.

            Sen. Sullivan: So, is that good?

            Gen. Nakasone: It is not good, Senator.

As a follow-up to Sen. Dan Sullivan’s question, Sen. Ben Sasse asked: “Is there any response from the United States Government that’s sufficient to change the Chinese behavior?... Do you think there’s any reason the Chinese should be worried about U.S. response at the present?” Lt. Gen. Nakasone responded: “Again, I think that our adversaries have not seen our response in sufficient detail to change their behavior.” In line with this notion, it is unlikely that the publication of the strategies alone will be sufficiently threatening to lead to this optimal outcome.

Less Optimal Outcomes

One path towards escalation involves adversaries becoming more aggressive and conducting attacks that are highly disruptive to society—in other words, adversary activity leads to a less stable cyberspace. This could be the result of either an adversary’s increased willingness to conduct attacks using existing capacities or increased capacities of the adversary. Indeed, with respect to the latter, the U.S. vision—and associated changed course of action—may encourage other actors to grow their budgets to conduct offensive cyber operations. The proliferation literature on weapons of mass destruction has extensively covered the role of special interests in stimulating demand for weapon development. This makes it a strong possibility that the new U.S. vision can be used by those groups within a given country favoring a growing cyber command to justify and lobby for increased military spending.

A second possibility is that increased U.S. offensive cyber activity that operates below the threshold of armed attack activity reduces the value of cyber norms of behavior that support a more stable cyberspace.  Even today, some observers believe that the high level of offensive activity in cyberspace today demonstrates quite forcefully that nations find value in conducting such activity, and that such activity points to the difficulty of establishing a more peaceful cyber norms regime. These observers argue that there is no reason to expect that increasing the U.S. contribution to such activity worldwide will make it easier to establish such a regime. Finally, a third possibility is that increased U.S. offensive cyber activity will complicate diplomatic relations with allies and other nations whose cyber infrastructures are used in support of such activity.

Increased aggressiveness by adversaries could also result from growing incentives to conduct offensive cyber operations of a highly disruptive nature. In this case, heightened aggressiveness might be a symptom of the U.S. strategy actually being effective in making the U.S. more powerful. Consider, for example, the current war against the  Islamic State: losing territory and grip in the Middle East, the terrorist organization is said to be keen to recruit followers in Europe and other places in the world to conduct attacks outside of Iraq and Syria. These attempted mass killings are a way  to show that the group still needs to be feared and potentially to help recruiting—but they do not change the balance of power in the region. Actors in cyberspace might become more noisy and aggressive purely to increase friction, gain attention and so on —and perhaps also to influence international public opinion in ways that drive the United States toward changing its strategy.

Finally, worst-case outcomes—that is, a United States that is less powerful in cyberspace along with a less stable cyberspace—could stem from a multitude of sources. One possibility is that the United States could overplay its hand in terms of cyber capabilities. The USCYBERCOM is operating in a space in which it has to seize the initiative against a large and ever-growing number of actors. The dangers of fighting on multiple fronts—even for the most capable actors—are well known from conventional warfare. As the number of potential cyber “fronts” is much higher compared to conventional warfare, the risks of overextension have become much higher as well. The Defense Department vision’s explicit focus on Russia and China, following the USCYBERCOM vision’s silence on the issue of priorities, makes us less concerned about this scenario —though it is still a possibility.

Final Word

After initial, prompt analysis from the scholarly community of the strategies, the country now needs systematic research on how persistent engagement and defense forward may play out. We believe that outcome-based analysis is one desired form of research which could be expanded. (One important limitation of our analysis is that we do not pay sufficient detail to risks of the U.S. not changing its course of action.)

Other research in this field is would be helpful as well—consider case study analyses. Russia conducts very different cyber campaigns to affect U.S. sources of power than does China, and defense forward will thus look very different in both cases. But how the U.S. should defend forward  for each specific case, in order to optimize power gains and reduce escalation, has not yet been addressed. This work is needed.

Also, the question is not just how adversaries will respond to the change in U.S. strategy. It is equally important to analyze the behavior of allies. With the implementation of this strategy, will allies follow? Or will they stick to the general deterrence-type strategies?

The bottom line?  More research is needed—let’s get to it.

 

All News button
1
Paragraphs

Abstract: This commentary reviews and discusses HBO’s new documentary, Atomic Homefront, which shows how communities are still struggling to live with radiation from radioactive waste generated more than 70 years ago during the race to build the atomic bomb—part of a secret government effort during World War II known as the Manhattan Project.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
François Diaz-Maurin
Paragraphs

Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by the nuclear weapons program. This mutual distrust was exacerbated by the culture of secrecy surrounding the atomic weapons program during World War II, and later by the innate culture of bureaucracy in the federal agencies that have sprung up since then. A prime example of this problem can be found in the regulation of chronic long-term risk from low-level radiation exposure affecting communities in Missouri’s North St. Louis County. This case study illuminates this divide, and illustrates opportunities to close it.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
François Diaz-Maurin
Number
5
Paragraphs

Abstract: We present a new perspective on geological disposal systems for nuclear waste. Geological disposal systems encompass all the processes required for the permanent isolation of highly-radioactive materials from humans and the biosphere. Radioactive materials requiring geological disposal are created by commercial nuclear power plants, research reactors, and defense-related nuclear activities, such as spent nuclear fuel from commercial reactors and high-level waste from reprocessing to reclaim fissile material for weapons. We show that disposal systems are so complex that new methods of representation are required. Despite the common call for a systems approach, a broader perspective is needed to obtain an integrated view of disposal systems. We introduce a conceptual formalism of geological disposal systems based on a multi-scale integrated analysis approach. This ‘metabolic’ representation allows one to account for the technical complexity of disposal systems in relation to their broader societal context. Although the paper is conceptual, the integrated formalism can improve the understanding of the complexity of disposal systems and their policy requirements by connecting technical solutions with societal constraints. However, the paper also reveals the limits to efforts to integrate technical and social dimensions of geological disposal systems into a single formalism.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Sustainability
Authors
François Diaz-Maurin
Rodney C. Ewing
Number
12
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

The Founding Fathers relied on deceit in championing American independence—and that has lessons for the present.

As we celebrate Thanksgiving weekend, a holiday first declared by George Washington’s presidential proclamation in 1789, it is worth remembering that deception played a pivotal role in America’s birth. Our shining city on the hill owes much to the dark arts. George Washington, Benjamin Franklin, and other Founding Fathers are remembered today as virtuous creators of a bold new democracy. But they were also cunning manipulators of their information environment—a side of the founding story that has often been neglected by history.

George Washington’s inability to tell a lie is a lie. That old cherry-tree fable—in which young George admits to his father that he did, indeed, chop down the tree with his hatchet—was invented by a Washington biographer named Mason Locke Weems in 1806 to boost his book sales. In truth, Washington was an avid spymaster with a talent for deception that would remain unequaled by American presidents for the next 150 years. During the Revolutionary War, Washington was referred to by his own secret code number (711), made ready use of ciphers and invisible ink, developed an extensive network of spies that reported on British troop movements and identified American traitors, and used all sorts of schemes to protect his forces, confuse his adversaries, and gain advantage. His military strategy was to outsmart and outlast the enemy, not outfight him. He used intelligence to avoid more battles than he fought, and to trick the British into standing down when standing up could have meant the end of the Continental Army.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
Authors
Steven Pifer
News Type
Commentary
Date
Paragraphs

Donald Trump has stated his intention to ditch the Intermediate-range Nuclear Forces (INF) Treaty. He and National Security Advisor John Bolton also appear unhappy with the New Strategic Arms Reductions Treaty (New START).

Withdrawal from New START would leave Russian strategic forces wholly unconstrained and end the flow of valuable information from the treaty’s verification and on-site inspection provisions.

Having won a majority in the House, the Democrats can protect New START and, with it, nuclear stability with Russia. To do so, they should steal a page from the playbook of Sen. Jon Kyl (R-Ariz.).

Read the rest at The Hill

 

Hero Image
steven pifer
All News button
1
Subscribe to United States