Pub Date : 2022-09-03DOI: 10.1080/00963402.2022.2109325
Ishan Sharma
ABSTRACT Faced with a global decline in the principles of equality, freedom, transparency, and accountability, democracies must respond by turning their attention inward – and crafting a model that leads by example. Dealing with the advent of 21st-century surveillance methods is a place to start, because it presents both issues of justice and equity at home and novel national security threats abroad. This analysis offers an initial roadmap for American and aligned countries’ policymakers to pursue the democratic surveillance ideal.
{"title":"Creating a model democratic alternative to the surveillance state","authors":"Ishan Sharma","doi":"10.1080/00963402.2022.2109325","DOIUrl":"https://doi.org/10.1080/00963402.2022.2109325","url":null,"abstract":"ABSTRACT Faced with a global decline in the principles of equality, freedom, transparency, and accountability, democracies must respond by turning their attention inward – and crafting a model that leads by example. Dealing with the advent of 21st-century surveillance methods is a place to start, because it presents both issues of justice and equity at home and novel national security threats abroad. This analysis offers an initial roadmap for American and aligned countries’ policymakers to pursue the democratic surveillance ideal.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"249 - 255"},"PeriodicalIF":1.3,"publicationDate":"2022-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41442684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-03DOI: 10.1080/00963402.2022.2109341
Hans M. Kristensen, Matt Korda
ABSTRACT The Nuclear Notebook is researched and written by Hans M. Kristensen, director of the Nuclear Information Project with the Federation of American Scientists, and Matt Korda, a senior research associate with the project. The Nuclear Notebook column has been published in the Bulletin of the Atomic Scientists since 1987. This issue examines North Korea’s nuclear arsenal. The authors cautiously estimate that North Korea may have produced enough fissile material to build between 45 and 55 nuclear weapons; however, it may have only assembled 20 to 30.
{"title":"North Korean nuclear weapons, 2022","authors":"Hans M. Kristensen, Matt Korda","doi":"10.1080/00963402.2022.2109341","DOIUrl":"https://doi.org/10.1080/00963402.2022.2109341","url":null,"abstract":"ABSTRACT The Nuclear Notebook is researched and written by Hans M. Kristensen, director of the Nuclear Information Project with the Federation of American Scientists, and Matt Korda, a senior research associate with the project. The Nuclear Notebook column has been published in the Bulletin of the Atomic Scientists since 1987. This issue examines North Korea’s nuclear arsenal. The authors cautiously estimate that North Korea may have produced enough fissile material to build between 45 and 55 nuclear weapons; however, it may have only assembled 20 to 30.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"273 - 294"},"PeriodicalIF":1.3,"publicationDate":"2022-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44286733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-03DOI: 10.1080/00963402.2022.2109330
Ahmed Banafa
ABSTRACT There’s a new fad among technology aficionados: voluntarily injecting radio frequency identification chips under their skin. Self-described “bio-hackers” reason that by having such microchips inserted, they can pay for purchases by just hovering their bare hand over a scanner at a checkout counter instead of swiping the magnetic strip of a credit card, inserting a card into a chip reader, or displaying a smartphone app (or doing something as old-fashioned as paying cash). At first glance, such consumer technology looks like a harmless whim, or the next logical step among those who favor piercings, or the supposed ultimate in convenience. But inserting identification microchips in humans would also seem to bear the seeds of a particularly intrusive form of surveillance, at a time when authorities in some parts of the world have been forcibly collecting DNA and other biological data – including blood samples, fingerprints, voice recordings, iris scans, and other unique identifiers – from all their citizens. This article explains some of the nuts and bolts of this hybrid human-machine product.
{"title":"Microchips in humans: Consumer-friendly app, or new frontier in surveillance?","authors":"Ahmed Banafa","doi":"10.1080/00963402.2022.2109330","DOIUrl":"https://doi.org/10.1080/00963402.2022.2109330","url":null,"abstract":"ABSTRACT There’s a new fad among technology aficionados: voluntarily injecting radio frequency identification chips under their skin. Self-described “bio-hackers” reason that by having such microchips inserted, they can pay for purchases by just hovering their bare hand over a scanner at a checkout counter instead of swiping the magnetic strip of a credit card, inserting a card into a chip reader, or displaying a smartphone app (or doing something as old-fashioned as paying cash). At first glance, such consumer technology looks like a harmless whim, or the next logical step among those who favor piercings, or the supposed ultimate in convenience. But inserting identification microchips in humans would also seem to bear the seeds of a particularly intrusive form of surveillance, at a time when authorities in some parts of the world have been forcibly collecting DNA and other biological data – including blood samples, fingerprints, voice recordings, iris scans, and other unique identifiers – from all their citizens. This article explains some of the nuts and bolts of this hybrid human-machine product.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"256 - 260"},"PeriodicalIF":1.3,"publicationDate":"2022-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59015381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087374
Aaron Arnold
ABSTRACT There are two camps regarding bitcoin and other so-called “digital assets.” One side sees any cryptocurrency as a financial utopia: an egalitarian technology free from centralized monetary authorities. The other sees this same technology as merely a novel mechanism for enabling more crime, corruption, and money laundering. Both positions contain an element of truth, but both share a common misapprehension: They assume that digital assets are beyond the reach of law enforcement and regulatory agencies – which is decidedly not the case, at least for now. But the digital asset economy evolves rapidly. To stay ahead of the curve, authorities will need to adapt existing rules and regulations about money-laundering, sanctions, and sending funds to rogue states – tools originally designed for an entirely different financial infrastructure – to mitigate threats to the financial system posed by virtual assets.
{"title":"Stolen billions from errant mouse clicks: Crypto requires new approaches to attack money-laundering","authors":"Aaron Arnold","doi":"10.1080/00963402.2022.2087374","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087374","url":null,"abstract":"ABSTRACT There are two camps regarding bitcoin and other so-called “digital assets.” One side sees any cryptocurrency as a financial utopia: an egalitarian technology free from centralized monetary authorities. The other sees this same technology as merely a novel mechanism for enabling more crime, corruption, and money laundering. Both positions contain an element of truth, but both share a common misapprehension: They assume that digital assets are beyond the reach of law enforcement and regulatory agencies – which is decidedly not the case, at least for now. But the digital asset economy evolves rapidly. To stay ahead of the curve, authorities will need to adapt existing rules and regulations about money-laundering, sanctions, and sending funds to rogue states – tools originally designed for an entirely different financial infrastructure – to mitigate threats to the financial system posed by virtual assets.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"191 - 197"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087366
D. Drollette
The creation of the virtual currency known as bitcoin – via a process known as “mining” that consists, actually, of the use of brute computing force to solve a cryptographic puzzle – comes with a considerable environmental toll. Each so-called “coin” requires extraordinarily large amounts of electricity to produce, and if that electricity comes via the burning of fossil fuel, significant amounts of carbon dioxide are added to the atmosphere, exacerbating climate change. Negative environmental impacts notwithstanding, bitcoin and other so-called “cryptocurrencies” have become popular. By some accounts, there were as many as 18,000 different forms of cryptocurrency at one point, and the overall value of those digital currencies topped $1 trillion. But ever since the bitcoin concept was introduced in an obscure journal over a dozen years ago – a lifetime in the computing world – there has been a lot of mystery as to what, exactly, was involved. Enthusiasts evangelize for a form of currency not controlled by governments or other intermediaries and secured through distributed ledger technology, a sort of decentralized database in which users share responsibility for maintaining the ledger and validating its accuracy. And enthusiasts have certainly been enthusiastic, claiming that cryptocurrencies and the blockchain (perhaps the most well-known distributed ledger technology) will provide investors with privacy, freedom from government control, protection from payment fraud, and – perhaps most important in the eyes of the biggest boosters – the potential for high returns as crypto grows as a currency. Or a digital asset. Or a security. Or whatever valuable thing is created when a computer solves a difficult cryptographic puzzle of a certain type. The very fact that cryptocurrency is so hard to define may have contributed to the recent recent spectacular crash in crypto values, a perfect storm of negative factors that led a single Bitcoin drop to nearly half its worth in less than six months, and the so-called stable currency known as Luna lose 97 percent of its value in 24 hours. More than $300 billion in crypto value evaporated in just one week of May. If crypto’s value and positive attributes are difficult to nail down precisely, it is clear that the increasing use of and investment in bitcoin and other virtual currencies presents governments around the world with real financial regulation problems – and many potential security concerns. Probably the most immediate concern for consumers revolves around whether they can simply trust what bitcoin and its rivals are doing as they try to transform the basic underlying structure of finance and currency. Eswar Prasad, an economist at Cornell University and author of The Future of Money: How the Digital Revolution is Transforming Currencies and Finance, addresses that issue and others in the first essay for this issue, which also acts as something of a primer on blockchain and bitcoin. Perhaps the overarchin
{"title":"Introduction: The unintended—and undermanaged—consequences of blockchain and cryptocurrency","authors":"D. Drollette","doi":"10.1080/00963402.2022.2087366","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087366","url":null,"abstract":"The creation of the virtual currency known as bitcoin – via a process known as “mining” that consists, actually, of the use of brute computing force to solve a cryptographic puzzle – comes with a considerable environmental toll. Each so-called “coin” requires extraordinarily large amounts of electricity to produce, and if that electricity comes via the burning of fossil fuel, significant amounts of carbon dioxide are added to the atmosphere, exacerbating climate change. Negative environmental impacts notwithstanding, bitcoin and other so-called “cryptocurrencies” have become popular. By some accounts, there were as many as 18,000 different forms of cryptocurrency at one point, and the overall value of those digital currencies topped $1 trillion. But ever since the bitcoin concept was introduced in an obscure journal over a dozen years ago – a lifetime in the computing world – there has been a lot of mystery as to what, exactly, was involved. Enthusiasts evangelize for a form of currency not controlled by governments or other intermediaries and secured through distributed ledger technology, a sort of decentralized database in which users share responsibility for maintaining the ledger and validating its accuracy. And enthusiasts have certainly been enthusiastic, claiming that cryptocurrencies and the blockchain (perhaps the most well-known distributed ledger technology) will provide investors with privacy, freedom from government control, protection from payment fraud, and – perhaps most important in the eyes of the biggest boosters – the potential for high returns as crypto grows as a currency. Or a digital asset. Or a security. Or whatever valuable thing is created when a computer solves a difficult cryptographic puzzle of a certain type. The very fact that cryptocurrency is so hard to define may have contributed to the recent recent spectacular crash in crypto values, a perfect storm of negative factors that led a single Bitcoin drop to nearly half its worth in less than six months, and the so-called stable currency known as Luna lose 97 percent of its value in 24 hours. More than $300 billion in crypto value evaporated in just one week of May. If crypto’s value and positive attributes are difficult to nail down precisely, it is clear that the increasing use of and investment in bitcoin and other virtual currencies presents governments around the world with real financial regulation problems – and many potential security concerns. Probably the most immediate concern for consumers revolves around whether they can simply trust what bitcoin and its rivals are doing as they try to transform the basic underlying structure of finance and currency. Eswar Prasad, an economist at Cornell University and author of The Future of Money: How the Digital Revolution is Transforming Currencies and Finance, addresses that issue and others in the first essay for this issue, which also acts as something of a primer on blockchain and bitcoin. Perhaps the overarchin","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"185 - 186"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48970911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087382
Asha Asokan, Ira Helfand
ABSTRACT Climate change poses grave challenges to global peace and stability. Nowhere is the relation between the climate crisis and the increased threat of nuclear war clearer than in South Asia, where approximately 700 million people in India, Pakistan, China, and Bangladesh depend on the shared waters of the Indus, Ganges, and Brahmaputra river basins. These river systems, fed by Himalayan glaciers, are diminishing markedly due to climate change. As geopolitical tensions in the region intensify, it becomes even more crucial to address and eliminate the two intertwined existential threats of water scarcity (caused by climate change) and the risk of nuclear war. This paper analyses the Indus River conflict and the Brahmaputra conflict in turn and offers effective strategies and recommendations for dealing with the threats.
{"title":"Climate change and water scarcity will increase risk of nuclear catastrophe in South Asia","authors":"Asha Asokan, Ira Helfand","doi":"10.1080/00963402.2022.2087382","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087382","url":null,"abstract":"ABSTRACT Climate change poses grave challenges to global peace and stability. Nowhere is the relation between the climate crisis and the increased threat of nuclear war clearer than in South Asia, where approximately 700 million people in India, Pakistan, China, and Bangladesh depend on the shared waters of the Indus, Ganges, and Brahmaputra river basins. These river systems, fed by Himalayan glaciers, are diminishing markedly due to climate change. As geopolitical tensions in the region intensify, it becomes even more crucial to address and eliminate the two intertwined existential threats of water scarcity (caused by climate change) and the risk of nuclear war. This paper analyses the Indus River conflict and the Brahmaputra conflict in turn and offers effective strategies and recommendations for dealing with the threats.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"214 - 217"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42149512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087379
Jessica McKenzie
ABSTRACT Bitcoin mining is a lucrative but energy-intensive activity. To keep costs low, miners are finding new ways to make their own electricity, often derived from fossil fuels. Mining companies are buying struggling coal, coal waste, and gas power plants and using the electricity they generate for their mining operations. Existing utility companies and power plants are pivoting to mining to make up for declining demand. Oil and gas companies are also buying mobile generators and installing them at well sites, mining right there at the oil or gas well, or selling the gas to third-party miners. The fossil fuel-to-bitcoin pipeline is getting shorter and shorter, and associated greenhouse gas emissions are climbing.
{"title":"How bitcoin makes burning fossil fuels more profitable than ever","authors":"Jessica McKenzie","doi":"10.1080/00963402.2022.2087379","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087379","url":null,"abstract":"ABSTRACT Bitcoin mining is a lucrative but energy-intensive activity. To keep costs low, miners are finding new ways to make their own electricity, often derived from fossil fuels. Mining companies are buying struggling coal, coal waste, and gas power plants and using the electricity they generate for their mining operations. Existing utility companies and power plants are pivoting to mining to make up for declining demand. Oil and gas companies are also buying mobile generators and installing them at well sites, mining right there at the oil or gas well, or selling the gas to third-party miners. The fossil fuel-to-bitcoin pipeline is getting shorter and shorter, and associated greenhouse gas emissions are climbing.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"203 - 207"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44622860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087380
M. Smeets
ABSTRACT There were numerous occasions when the US military considered conducting cyber attacks but refrained from doing so, but these have been largely overlooked as sources of insight. Six cases that we do know about – mostly from journalistic reporting – reveal much about US strategic thinking, posturing, and assessment of the limits of cyberspace.
{"title":"A US history of not conducting cyber attacks","authors":"M. Smeets","doi":"10.1080/00963402.2022.2087380","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087380","url":null,"abstract":"ABSTRACT There were numerous occasions when the US military considered conducting cyber attacks but refrained from doing so, but these have been largely overlooked as sources of insight. Six cases that we do know about – mostly from journalistic reporting – reveal much about US strategic thinking, posturing, and assessment of the limits of cyberspace.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"208 - 213"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45118382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087385
Hans M. Kristensen, Matt Korda
ABSTRACT The Nuclear Notebook is researched and written by Hans M. Kristensen, director of the Nuclear Information Project with the Federation of American Scientists, and Matt Korda, a senior research associate with the project. The Nuclear Notebook column has been published in the Bulletin of the Atomic Scientists since 1987. This issue examines the status of India’s nuclear arsenal, which includes a stockpile of approximately 160 warheads. India continues to modernize its nuclear arsenal, with at least four new weapon systems now under development to complement or replace existing nuclear-capable aircraft, land-based delivery systems, and sea-based systems. Several of these systems are nearing completion and will soon be combat-ready. India is estimated to have produced enough military plutonium for 140 to 210 nuclear warheads but has likely produced only 160. Nonetheless, additional plutonium will be required to produce warheads for missiles now under development, and India is reportedly building several new plutonium production facilities. India’s nuclear strategy, which has traditionally focused on Pakistan, now appears to place increased emphasis on China, and Beijing is now in range of Indian missiles.
{"title":"Indian nuclear weapons, 2022","authors":"Hans M. Kristensen, Matt Korda","doi":"10.1080/00963402.2022.2087385","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087385","url":null,"abstract":"ABSTRACT The Nuclear Notebook is researched and written by Hans M. Kristensen, director of the Nuclear Information Project with the Federation of American Scientists, and Matt Korda, a senior research associate with the project. The Nuclear Notebook column has been published in the Bulletin of the Atomic Scientists since 1987. This issue examines the status of India’s nuclear arsenal, which includes a stockpile of approximately 160 warheads. India continues to modernize its nuclear arsenal, with at least four new weapon systems now under development to complement or replace existing nuclear-capable aircraft, land-based delivery systems, and sea-based systems. Several of these systems are nearing completion and will soon be combat-ready. India is estimated to have produced enough military plutonium for 140 to 210 nuclear warheads but has likely produced only 160. Nonetheless, additional plutonium will be required to produce warheads for missiles now under development, and India is reportedly building several new plutonium production facilities. India’s nuclear strategy, which has traditionally focused on Pakistan, now appears to place increased emphasis on China, and Beijing is now in range of Indian missiles.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"224 - 236"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41651857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-04DOI: 10.1080/00963402.2022.2087383
J. Doyle
ABSTRACT Russia’s invasion of Ukraine shattered peace in Europe, and highlighted the fundamental disagreements between Russia and NATO over the status of Ukraine and other former Soviet territories. Russia raised the stakes of this disagreement by attempting to conquer Ukraine, and threatening to use nuclear weapons if NATO intervened. NATO and the European Union must negotiate an end to the fighting and deny Russian victory over Ukraine. Once peace is achieved, European security architecture must be rebuilt. This requires improving political relations between Russia and an expanded NATO, establishing stable military-to-military relations at reduced force levels, and reliably reducing the threat of nuclear war. NATO should indicate that it is willing to remove US nuclear weapons from Europe in exchange for similar Russian reductions – and the rearward movement of Russia’s non-strategic nuclear forces. Near-term agreement on such steps can reduce the short-term threat of nuclear war, while also setting the stage for negotiations on replacing the INF treaty with a new agreement banning intermediate and short-range offensive missiles in Europe. Both sides need to re-assert that nuclear arms are weapons of last resort and pledge never to employ them first in a conflict.
{"title":"Building a nuclear off-ramp following the war in Ukraine","authors":"J. Doyle","doi":"10.1080/00963402.2022.2087383","DOIUrl":"https://doi.org/10.1080/00963402.2022.2087383","url":null,"abstract":"ABSTRACT Russia’s invasion of Ukraine shattered peace in Europe, and highlighted the fundamental disagreements between Russia and NATO over the status of Ukraine and other former Soviet territories. Russia raised the stakes of this disagreement by attempting to conquer Ukraine, and threatening to use nuclear weapons if NATO intervened. NATO and the European Union must negotiate an end to the fighting and deny Russian victory over Ukraine. Once peace is achieved, European security architecture must be rebuilt. This requires improving political relations between Russia and an expanded NATO, establishing stable military-to-military relations at reduced force levels, and reliably reducing the threat of nuclear war. NATO should indicate that it is willing to remove US nuclear weapons from Europe in exchange for similar Russian reductions – and the rearward movement of Russia’s non-strategic nuclear forces. Near-term agreement on such steps can reduce the short-term threat of nuclear war, while also setting the stage for negotiations on replacing the INF treaty with a new agreement banning intermediate and short-range offensive missiles in Europe. Both sides need to re-assert that nuclear arms are weapons of last resort and pledge never to employ them first in a conflict.","PeriodicalId":46802,"journal":{"name":"Bulletin of the Atomic Scientists","volume":"78 1","pages":"218 - 223"},"PeriodicalIF":1.3,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47743454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}