首页 > 最新文献

Science & Global Security最新文献

英文 中文
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces 胡塞武装“萨马德”攻击型无人机飞行性能分析
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-09-01 DOI: 10.1080/08929882.2020.1846279
M. Voskuijl, Thomas Dekkers, R. Savelsberg
Abstract In recent years, there has been a large increase in the use of uncrewed attack aircraft, or attack drones, in the Yemen conflict. At the same time, the flight endurance and payload capabilities of these uncrewed aerial vehicles seem to have increased significantly. This article presents a flight performance analysis of the Samad aircraft family operated by Ansar Allah, the Houthi rebel movement. The analysis is based on information available in the public domain and accounts for modeling uncertainties, and terrain under weather conditions typical for Yemen and Saudi Arabia. With only limited data available in the form of images, the analysis method assesses the flight performance of fixed-wing attack aircraft with high aspect ratio wings and powered by piston engines and propellers. Results demonstrate that it is highly unlikely that the Samad-2 version could reach strategic locations in Saudi Arabia when launched from Houthi-controlled territory. The analysis shows that Samad-3, however, can achieve a flight range in excess of 1800 km, bringing Riyadh and oil installations near the Persian Gulf into reach. The results of the study can be used to predict the locations from which the Samad UAV can be deployed in an attack. Furthermore, it gives insight into the increasing threat of this type of UAV when employed by non-state actors. The methods and tools developed in this study can be used to analyze the capabilities of other UAV with similar configurations.
近年来,在也门冲突中,无人攻击机或攻击无人机的使用大幅增加。与此同时,这些无人驾驶飞行器的飞行续航力和有效载荷能力似乎有了显著提高。本文介绍了胡塞反政府武装“安拉卫士”(Ansar Allah)运营的萨马德系列飞机的飞行性能分析。该分析基于公共领域的可用信息,并考虑了建模的不确定性以及也门和沙特阿拉伯典型天气条件下的地形。该分析方法在图像数据有限的情况下,对高展弦比机翼、活塞发动机和螺旋桨驱动的固定翼攻击机的飞行性能进行了评估。结果表明,当从胡塞控制的领土发射时,Samad-2版本极不可能到达沙特阿拉伯的战略位置。分析显示,Samad-3的飞行距离超过1800公里,可将波斯湾附近的利雅得和石油设施置于射程之内。研究结果可用于预测Samad无人机可在攻击中部署的位置。此外,当非国家行为者使用这种类型的无人机时,它提供了对日益增加的威胁的见解。本研究开发的方法和工具可用于分析具有类似配置的其他无人机的能力。
{"title":"Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces","authors":"M. Voskuijl, Thomas Dekkers, R. Savelsberg","doi":"10.1080/08929882.2020.1846279","DOIUrl":"https://doi.org/10.1080/08929882.2020.1846279","url":null,"abstract":"Abstract In recent years, there has been a large increase in the use of uncrewed attack aircraft, or attack drones, in the Yemen conflict. At the same time, the flight endurance and payload capabilities of these uncrewed aerial vehicles seem to have increased significantly. This article presents a flight performance analysis of the Samad aircraft family operated by Ansar Allah, the Houthi rebel movement. The analysis is based on information available in the public domain and accounts for modeling uncertainties, and terrain under weather conditions typical for Yemen and Saudi Arabia. With only limited data available in the form of images, the analysis method assesses the flight performance of fixed-wing attack aircraft with high aspect ratio wings and powered by piston engines and propellers. Results demonstrate that it is highly unlikely that the Samad-2 version could reach strategic locations in Saudi Arabia when launched from Houthi-controlled territory. The analysis shows that Samad-3, however, can achieve a flight range in excess of 1800 km, bringing Riyadh and oil installations near the Persian Gulf into reach. The results of the study can be used to predict the locations from which the Samad UAV can be deployed in an attack. Furthermore, it gives insight into the increasing threat of this type of UAV when employed by non-state actors. The methods and tools developed in this study can be used to analyze the capabilities of other UAV with similar configurations.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"36 1","pages":"113 - 134"},"PeriodicalIF":0.7,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78394740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geologic Analysis of the Democratic People’s Republic of Korea’s Uranium Resources and Mines 朝鲜民主主义人民共和国铀资源和矿山地质分析
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-05-03 DOI: 10.1080/08929882.2020.1789275
Sulgiye Park, Allison Puccioni, C. Tracy, E. Serbin, R. Ewing
Abstract The mining and milling of uranium ore is the first step in the production of fissile material and is a rate-limiting step for the indigenous production of nuclear weapons in the Democratic People’s Republic of Korea (DPRK). This study reports a geologic analysis of uranium mines in the DPRK in order to bound the state’s potential uranium production. The analysis suggests that the uranium deposits of the possible mines are of four types: (1) black shale (metamorphosed organic shale); (2) limestone; (3) granite/metasomatic; and (4) metamorphic deposits. Comparison with geologically-related, uranium-bearing host rocks in the Republic of Korea (ROK) indicate that DPRK uranium mines are associated with medium-to-high quantities of average low-grade ore (0.001–0.04 wt.% uranium). Using this low-grade ore, expansion of the state’s nuclear arsenal would require the extraction of larger quantities of uranium ore than has been previously assumed. The DPRK’s geology could, therefore, limit the future development of its nuclear weapons program.
铀矿石的开采和磨矿是裂变材料生产的第一步,也是朝鲜民主主义人民共和国自主生产核武器的限速步骤。本研究报告了朝鲜铀矿的地质分析,以约束该国的潜在铀生产。分析认为,可能存在的铀矿床类型为4种类型:(1)黑色页岩(变质有机页岩);(2)石灰岩;(3)花岗岩/交代;(4)变质矿床。与韩国含铀主岩的地质相关对比表明,朝鲜铀矿具有中高含量的平均低品位矿石(0.001 ~ 0.04 wt.%的铀)。使用这种低品位的矿石,扩大该州的核武库将需要提取比以前假设的更多的铀矿石。因此,朝鲜的地质条件可能会限制其核武器计划的未来发展。
{"title":"Geologic Analysis of the Democratic People’s Republic of Korea’s Uranium Resources and Mines","authors":"Sulgiye Park, Allison Puccioni, C. Tracy, E. Serbin, R. Ewing","doi":"10.1080/08929882.2020.1789275","DOIUrl":"https://doi.org/10.1080/08929882.2020.1789275","url":null,"abstract":"Abstract The mining and milling of uranium ore is the first step in the production of fissile material and is a rate-limiting step for the indigenous production of nuclear weapons in the Democratic People’s Republic of Korea (DPRK). This study reports a geologic analysis of uranium mines in the DPRK in order to bound the state’s potential uranium production. The analysis suggests that the uranium deposits of the possible mines are of four types: (1) black shale (metamorphosed organic shale); (2) limestone; (3) granite/metasomatic; and (4) metamorphic deposits. Comparison with geologically-related, uranium-bearing host rocks in the Republic of Korea (ROK) indicate that DPRK uranium mines are associated with medium-to-high quantities of average low-grade ore (0.001–0.04 wt.% uranium). Using this low-grade ore, expansion of the state’s nuclear arsenal would require the extraction of larger quantities of uranium ore than has been previously assumed. The DPRK’s geology could, therefore, limit the future development of its nuclear weapons program.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"34 1","pages":"80 - 109"},"PeriodicalIF":0.7,"publicationDate":"2020-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74004342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A question of Uranium 关于铀的问题
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-05-03 DOI: 10.1080/08929882.2020.1812203
{"title":"A question of Uranium","authors":"","doi":"10.1080/08929882.2020.1812203","DOIUrl":"https://doi.org/10.1080/08929882.2020.1812203","url":null,"abstract":"","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"46 1","pages":"61 - 62"},"PeriodicalIF":0.7,"publicationDate":"2020-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74127038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Fuel Enrichment on Key Naval Reactor Characteristics and Non-Proliferation Concerns 燃料浓缩对海军关键反应堆特性的影响及防扩散问题
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-05-02 DOI: 10.1080/08929882.2020.1757827
E. Mané
Abstract This work reports on a notional compact naval reactor core running at 50 MWt full power—designed to investigate core life, reactivity margins and plutonium inventory for different levels of enrichment. A simplified computer model was constructed with the OpenMC neutron transport code and coupled to ONIX to calculate depletion of the initial fuel load—uranium dioxide mixed with gadolinia. It is shown that a notional low enriched uranium naval core could sustain criticality for 5–7 years at full-power and overcome xenon poison transients. Self-shielding of the burnable poison has been found to be significant in the radial direction and should be considered in such core design. Negative Doppler and moderator coefficients have been found for the low enriched cores. The plutonium inventory of the spent fuel produced at the end of life as a function of enrichment is also investigated. This study bears direct implications for the nonproliferation regime by suggesting that it may be possible to reduce the technical incentives for the use of highly enriched uranium on naval reactors.
摘要:本文报道了一种以50mwt全功率运行的小型海军反应堆堆芯,旨在研究不同浓缩水平下堆芯寿命、反应性裕度和钚库存。利用OpenMC中子输运程序建立了简化的计算机模型,并与ONIX进行了耦合,计算了初始燃料负荷二氧化铀混合钆的损耗。结果表明,一种设想的低浓缩铀海军堆芯可以在全功率下维持5-7年的临界状态,并克服氙中毒瞬变。可燃毒物在径向上具有显著的自屏蔽性,在设计中应予以考虑。低富集岩心存在负多普勒系数和慢化系数。在寿命结束时产生的乏燃料的钚库存作为浓缩的函数也进行了研究。这项研究对核不扩散制度有直接影响,因为它表明,有可能减少在海军反应堆上使用高浓缩铀的技术激励。
{"title":"Impact of Fuel Enrichment on Key Naval Reactor Characteristics and Non-Proliferation Concerns","authors":"E. Mané","doi":"10.1080/08929882.2020.1757827","DOIUrl":"https://doi.org/10.1080/08929882.2020.1757827","url":null,"abstract":"Abstract This work reports on a notional compact naval reactor core running at 50 MWt full power—designed to investigate core life, reactivity margins and plutonium inventory for different levels of enrichment. A simplified computer model was constructed with the OpenMC neutron transport code and coupled to ONIX to calculate depletion of the initial fuel load—uranium dioxide mixed with gadolinia. It is shown that a notional low enriched uranium naval core could sustain criticality for 5–7 years at full-power and overcome xenon poison transients. Self-shielding of the burnable poison has been found to be significant in the radial direction and should be considered in such core design. Negative Doppler and moderator coefficients have been found for the low enriched cores. The plutonium inventory of the spent fuel produced at the end of life as a function of enrichment is also investigated. This study bears direct implications for the nonproliferation regime by suggesting that it may be possible to reduce the technical incentives for the use of highly enriched uranium on naval reactors.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"1 1","pages":"63 - 79"},"PeriodicalIF":0.7,"publicationDate":"2020-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90176133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Science in Support of Radiation Detection for Border Monitoring: An Exploratory Study 支持边境监测辐射探测的数据科学:探索性研究
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-01-02 DOI: 10.1080/08929882.2020.1716461
Christopher Hobbs, P. McBurney, D. Oliver
Abstract Radiation detection technology is widely deployed to identify undeclared nuclear or radiological materials in transit. However, in certain environments the effective use of radiation detection systems is complicated by the presence of significant quantities of naturally occurring radioactive materials that trigger nuisance alarms which divert attention from valid investigations. The frequency of nuisance alarms sometimes results in the raising of alarming thresholds, reducing the likelihood that systems will detect the low levels of radioactivity produced by key threat materials such as shielded highly enriched uranium. This paper explores the potential of using data science techniques, such as dynamic time warping and agglomerative hierarchical clustering, to provide new insights into the cause of alarms within the maritime shipping environment. These methods are used to analyze the spatial radiation profiles generated by shipments of naturally occurring radioactive materials as they are passed through radiation portal monitors. Applied to a real-life dataset of alarming occupancies, the application of these techniques is shown to preferentially group and identify similar commodities. With further testing and development, the data-driven approach to alarm assessment presented in this paper could be used to characterize shipments of naturally occurring radioactive materials at the primary scanning stage, significantly reducing time spent resolving nuisance alarms.
摘要辐射探测技术被广泛用于识别未申报的核或放射性过境材料。然而,在某些环境中,由于存在大量的自然产生的放射性物质,从而引发干扰警报,分散了人们对有效调查的注意力,因此使辐射探测系统的有效使用变得复杂。有害警报的频率有时会导致警报阈值的提高,从而降低了系统探测到诸如屏蔽的高浓缩铀等关键威胁材料产生的低水平放射性的可能性。本文探讨了使用数据科学技术的潜力,如动态时间规整和聚集分层聚类,以提供对海运环境中警报原因的新见解。这些方法用于分析天然放射性物质运输通过辐射入口监测仪时产生的空间辐射剖面。应用于现实生活中令人震惊的入住率数据集,这些技术的应用被证明可以优先分组和识别类似的商品。随着进一步的测试和开发,本文提出的数据驱动的警报评估方法可用于在初级扫描阶段表征自然发生的放射性物质的运输,从而大大减少解决滋扰警报所花费的时间。
{"title":"Data Science in Support of Radiation Detection for Border Monitoring: An Exploratory Study","authors":"Christopher Hobbs, P. McBurney, D. Oliver","doi":"10.1080/08929882.2020.1716461","DOIUrl":"https://doi.org/10.1080/08929882.2020.1716461","url":null,"abstract":"Abstract Radiation detection technology is widely deployed to identify undeclared nuclear or radiological materials in transit. However, in certain environments the effective use of radiation detection systems is complicated by the presence of significant quantities of naturally occurring radioactive materials that trigger nuisance alarms which divert attention from valid investigations. The frequency of nuisance alarms sometimes results in the raising of alarming thresholds, reducing the likelihood that systems will detect the low levels of radioactivity produced by key threat materials such as shielded highly enriched uranium. This paper explores the potential of using data science techniques, such as dynamic time warping and agglomerative hierarchical clustering, to provide new insights into the cause of alarms within the maritime shipping environment. These methods are used to analyze the spatial radiation profiles generated by shipments of naturally occurring radioactive materials as they are passed through radiation portal monitors. Applied to a real-life dataset of alarming occupancies, the application of these techniques is shown to preferentially group and identify similar commodities. With further testing and development, the data-driven approach to alarm assessment presented in this paper could be used to characterize shipments of naturally occurring radioactive materials at the primary scanning stage, significantly reducing time spent resolving nuisance alarms.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"37 6 1","pages":"28 - 47"},"PeriodicalIF":0.7,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80197710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Data Science to Global Security 将数据科学应用于全球安全
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-01-02 DOI: 10.1080/08929882.2020.1737419
This issue of Science & Global Security is made up of articles applying ideas about securing, collecting, storing and processing data to three critical nuclear issues. The articles cover the vulnerabilities to cyber-threats of U.S. nuclear-armed intercontinental ballistic missiles and potentially those of other nuclear-armed states as these systems undergo modernization; the need to improve the reliability of detecting nuclear weapons, weapon materials, and radioactive materials that might be hidden inside global shipping containers transported through ports around the world; the challenge of protecting nuclear weapons information which some states might insist on treating as sensitive as warheads are authenticated during a process of verified disarmament. Assessing Priorities toward Achieving Dependable and Secure Computing in the U.S. ICBM Force by Lauren J. Borja offers a first principles assessment of cybersecurity for the more than 400U.S. land-based nuclear-armed intercontinental ballistic missiles which are slated to be modernized over the next several decades. The article applies core ideas from computer security, dependable computing, and systems analysis to explore the types of vulnerabilities that may be at play and which may emerge as the system is modernized. It highlights the need to reconsider U.S nuclear weapons policies that potentially further add to these cybersecurity vulnerabilities and increase the risks of accidental or inadvertent nuclear weapons use. The article Data Science in Support of Radiation Detection for Border Monitoring: An Exploratory Study by Christopher Hobbs, Peter McBurney and Dominic Oliver offers the beginning of a new approach to speed up the process of identifying shipping containers bearing naturally occurring radioactive materials which produce false alarms each day at radiation portal monitors installed at many ports around the world. Using a data set from portal monitors in three countries, the article uses data science techniques to look at the radiation profile generated by containers which set off alarms as containers pass through these portals to show that it is possible to characterize and identify containers carrying common radioactive materials. This may reduce the amount of time it takes to investigate and resolve false alarms. The third article in the issue is Physical Public Templates for Nuclear Warhead Verification by Alexander Glaser, Boaz Barak, Moritz K€ utt, and Sebastien Philippe. The authentication of electronic hardware and software used for national security related data storage and processing is always difficult. It can be an especially serious concern in a nuclear weapons inspection that is part of a treaty arrangement if there are suspicions on either side about efforts to subvert the inspection. This article offers two new ideas for how to protect the potentially sensitive gamma spectrum from a nuclear warhead collected as part of a treaty-mandated inspection. First, it sugge
本期《科学与全球安全》由文章组成,这些文章将有关确保、收集、存储和处理数据的想法应用于三个关键的核问题。这些文章涵盖了美国核武器洲际弹道导弹以及其他核武器国家在这些系统进行现代化时可能面临的网络威胁的脆弱性;需要提高探测可能隐藏在通过世界各地港口运输的全球海运集装箱内的核武器、武器材料和放射性材料的可靠性;保护核武器信息的挑战——一些国家可能坚持将其视为与弹头一样敏感的信息——是在经过核查的裁军进程中得到验证的。《评估美国洲际弹道导弹部队实现可靠和安全计算的优先事项》一书由劳伦·j·博尔哈(Lauren J. Borja)撰写,为400多名美国人提供了网络安全的首要原则评估。陆基核洲际弹道导弹,计划在未来几十年内实现现代化。本文应用计算机安全、可靠计算和系统分析的核心思想来探索可能存在的漏洞类型,以及随着系统现代化可能出现的漏洞类型。它强调需要重新考虑美国的核武器政策,这些政策可能会进一步增加这些网络安全漏洞,并增加意外或无意使用核武器的风险。Christopher Hobbs、Peter McBurney和Dominic Oliver撰写的文章《支持边境监测辐射探测的数据科学:一项探索性研究》提供了一种新方法的开始,该方法可以加快识别装载天然放射性物质的集装箱的过程,这些放射性物质每天都会在安装在世界各地许多港口的辐射门户监视器上产生假警报。本文使用来自三个国家门户监视器的数据集,使用数据科学技术查看容器产生的辐射概况,这些容器在通过这些门户时发出警报,以表明有可能表征和识别携带常见放射性物质的容器。这可以减少调查和解决假警报所需的时间。这期的第三篇文章是Alexander Glaser, Boaz Barak, Moritz K - utt和Sebastien Philippe的核弹头验证的物理公共模板。用于国家安全相关数据存储和处理的电子软硬件的认证一直是难点。在作为条约安排一部分的核武器检查中,如果任何一方怀疑有人试图破坏检查,这可能是一个特别严重的问题。本文就如何保护可能敏感的伽马谱不受作为条约授权检查的一部分收集的核弹头的影响提出了两个新想法。首先,它建议转向非数字数据存储媒体,并探索了传统打孔卡存储数据的情况,这些数据以加密散列的形式发布。其次,它提出了一种非数字方法,通过使用可以放置在打孔卡顶部的掩码来部分释放该数据,以根据需要释放选择性位。这一概念是通过在美国国家核安全管理局的设备组装设施测量的4.5公斤固体钚球的伽马辐射光谱样本来证明的。
{"title":"Applying Data Science to Global Security","authors":"","doi":"10.1080/08929882.2020.1737419","DOIUrl":"https://doi.org/10.1080/08929882.2020.1737419","url":null,"abstract":"This issue of Science & Global Security is made up of articles applying ideas about securing, collecting, storing and processing data to three critical nuclear issues. The articles cover the vulnerabilities to cyber-threats of U.S. nuclear-armed intercontinental ballistic missiles and potentially those of other nuclear-armed states as these systems undergo modernization; the need to improve the reliability of detecting nuclear weapons, weapon materials, and radioactive materials that might be hidden inside global shipping containers transported through ports around the world; the challenge of protecting nuclear weapons information which some states might insist on treating as sensitive as warheads are authenticated during a process of verified disarmament. Assessing Priorities toward Achieving Dependable and Secure Computing in the U.S. ICBM Force by Lauren J. Borja offers a first principles assessment of cybersecurity for the more than 400U.S. land-based nuclear-armed intercontinental ballistic missiles which are slated to be modernized over the next several decades. The article applies core ideas from computer security, dependable computing, and systems analysis to explore the types of vulnerabilities that may be at play and which may emerge as the system is modernized. It highlights the need to reconsider U.S nuclear weapons policies that potentially further add to these cybersecurity vulnerabilities and increase the risks of accidental or inadvertent nuclear weapons use. The article Data Science in Support of Radiation Detection for Border Monitoring: An Exploratory Study by Christopher Hobbs, Peter McBurney and Dominic Oliver offers the beginning of a new approach to speed up the process of identifying shipping containers bearing naturally occurring radioactive materials which produce false alarms each day at radiation portal monitors installed at many ports around the world. Using a data set from portal monitors in three countries, the article uses data science techniques to look at the radiation profile generated by containers which set off alarms as containers pass through these portals to show that it is possible to characterize and identify containers carrying common radioactive materials. This may reduce the amount of time it takes to investigate and resolve false alarms. The third article in the issue is Physical Public Templates for Nuclear Warhead Verification by Alexander Glaser, Boaz Barak, Moritz K€ utt, and Sebastien Philippe. The authentication of electronic hardware and software used for national security related data storage and processing is always difficult. It can be an especially serious concern in a nuclear weapons inspection that is part of a treaty arrangement if there are suspicions on either side about efforts to subvert the inspection. This article offers two new ideas for how to protect the potentially sensitive gamma spectrum from a nuclear warhead collected as part of a treaty-mandated inspection. First, it sugge","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"21 1","pages":"1 - 1"},"PeriodicalIF":0.7,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91079284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Public Templates for Nuclear Warhead Verification 核弹头核查的实物公共模板
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-01-02 DOI: 10.1080/08929882.2020.1728885
A. Glaser, B. Barak, M. Kütt, Sébastien Philippe
Abstract Passive gamma spectroscopy has been successfully used for nuclear warhead inspection systems based on the template-matching approach. The most prominent example of such a system is Sandia’s Trusted Radiation Identification System (TRIS), which is based on an earlier system used at Pantex since 1994 to confirm the identities of containerized plutonium pits. Remarkably, TRIS uses only 16 energy bins, i.e., 16 numbers, to accomplish this task. Additional experiments have shown that such a template-matching method could be performed in a way that does not reveal classified information. To be used in a real inspection setting, however, inspectors must gain confidence that the system hardware and software work as designed and display genuine measurements through a process known as authentication. It also requires establishing and maintaining confidence in the template, i.e., that the data characterizing the treaty accountable item is genuine and has not been altered. In the case of TRIS, the template data are stored electronically and signed as a whole, such that no information about the template can ever be shared with inspectors as a confidence-building measure. Here, we propose an inspection protocol that uses a different approach: Information is stored in the form of punched cards that encode the secret template. Public masks can be used to reveal selected features of the template, e.g., total counts in particular energy bins, while keeping others secret, constraining certain physical properties of the treaty accountable item and providing increasing levels of transparency. We illustrate our approach using Princeton’s Information Barrier Experimental II based on a vintage 6502 processor.
基于模板匹配方法的被动伽马能谱已成功应用于核弹头检测系统。这种系统最突出的例子是桑迪亚的可信辐射识别系统(TRIS),该系统基于Pantex自1994年以来用于确认容器化钚坑身份的较早系统。值得注意的是,TRIS只使用了16个能量箱,即16个数字来完成这项任务。另外的实验表明,这种模板匹配方法可以在不泄露机密信息的情况下执行。然而,要在实际的检查设置中使用,检查人员必须获得对系统硬件和软件按设计工作的信心,并通过称为认证的过程显示真实的测量结果。它还需要建立和保持对模板的信任,即,表征条约问责项目的数据是真实的,没有被改变。在TRIS的情况下,模板数据以电子方式储存并作为一个整体签署,因此,作为建立信任措施,任何关于模板的信息都不能与视察员分享。在这里,我们提出一种使用不同方法的检查协议:信息以穿孔卡的形式存储,穿孔卡对秘密模板进行编码。公共掩码可用于显示模板的选定特征,例如,特定能源箱的总数,同时对其他特征保密,限制条约问责项目的某些物理属性,并提供越来越高的透明度。我们使用普林斯顿大学基于老式6502处理器的信息屏障实验II来说明我们的方法。
{"title":"Physical Public Templates for Nuclear Warhead Verification","authors":"A. Glaser, B. Barak, M. Kütt, Sébastien Philippe","doi":"10.1080/08929882.2020.1728885","DOIUrl":"https://doi.org/10.1080/08929882.2020.1728885","url":null,"abstract":"Abstract Passive gamma spectroscopy has been successfully used for nuclear warhead inspection systems based on the template-matching approach. The most prominent example of such a system is Sandia’s Trusted Radiation Identification System (TRIS), which is based on an earlier system used at Pantex since 1994 to confirm the identities of containerized plutonium pits. Remarkably, TRIS uses only 16 energy bins, i.e., 16 numbers, to accomplish this task. Additional experiments have shown that such a template-matching method could be performed in a way that does not reveal classified information. To be used in a real inspection setting, however, inspectors must gain confidence that the system hardware and software work as designed and display genuine measurements through a process known as authentication. It also requires establishing and maintaining confidence in the template, i.e., that the data characterizing the treaty accountable item is genuine and has not been altered. In the case of TRIS, the template data are stored electronically and signed as a whole, such that no information about the template can ever be shared with inspectors as a confidence-building measure. Here, we propose an inspection protocol that uses a different approach: Information is stored in the form of punched cards that encode the secret template. Public masks can be used to reveal selected features of the template, e.g., total counts in particular energy bins, while keeping others secret, constraining certain physical properties of the treaty accountable item and providing increasing levels of transparency. We illustrate our approach using Princeton’s Information Barrier Experimental II based on a vintage 6502 processor.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"403 1","pages":"48 - 59"},"PeriodicalIF":0.7,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77701293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing Priorities towards Achieving Dependable and Secure Computing in the U.S. ICBM Force 评估美国洲际弹道导弹部队实现可靠和安全计算的优先事项
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2020-01-02 DOI: 10.1080/08929882.2019.1698126
L. Borja
Abstract This paper is an assessment of cybersecurity principles within the nuclear arsenal of the United States, specifically the nuclear-armed intercontinental ballistic missile forces. Ongoing modernizations will introduce new components, and potentially new vulnerabilities, into U.S. nuclear forces. The principles for achieving secure operations from the fields of computer security, dependable computing, and systems analysis, and the extent to which they are addressed within the management of U.S. nuclear intercontinental ballistic missiles is discussed. This paper then considers the types of vulnerabilities that may be overlooked during modernizations, followed by a critique of U.S. nuclear command and control policy choices that could make the consequences of these vulnerabilities more catastrophic.
本文是对美国核武库,特别是拥有核武器的洲际弹道导弹部队的网络安全原则的评估。正在进行的现代化将为美国核力量引入新的组件和潜在的新弱点。从计算机安全、可靠计算和系统分析领域实现安全操作的原则,以及在美国核洲际弹道导弹管理中解决这些问题的程度进行了讨论。然后,本文考虑了在现代化过程中可能被忽视的脆弱性类型,随后对美国核指挥和控制政策选择进行了批评,这些政策选择可能使这些脆弱性的后果更具灾难性。
{"title":"Assessing Priorities towards Achieving Dependable and Secure Computing in the U.S. ICBM Force","authors":"L. Borja","doi":"10.1080/08929882.2019.1698126","DOIUrl":"https://doi.org/10.1080/08929882.2019.1698126","url":null,"abstract":"Abstract This paper is an assessment of cybersecurity principles within the nuclear arsenal of the United States, specifically the nuclear-armed intercontinental ballistic missile forces. Ongoing modernizations will introduce new components, and potentially new vulnerabilities, into U.S. nuclear forces. The principles for achieving secure operations from the fields of computer security, dependable computing, and systems analysis, and the extent to which they are addressed within the management of U.S. nuclear intercontinental ballistic missiles is discussed. This paper then considers the types of vulnerabilities that may be overlooked during modernizations, followed by a critique of U.S. nuclear command and control policy choices that could make the consequences of these vulnerabilities more catastrophic.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"9 1","pages":"2 - 27"},"PeriodicalIF":0.7,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88351899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the PRISM reactor as a disposition option for the British plutonium stockpile 评估PRISM反应堆作为处置英国钚储备的一种选择
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2019-09-02 DOI: 10.1080/08929882.2019.1681736
Christopher Fichtlscherer, F. Frieß, M. Kütt
Abstract The United Kingdom considered using the PRISM sodium-cooled fast reactor as a disposition option for its civilian plutonium from reprocessed MAGNOX and Advanced Gas-cooled Reactor spent fuel. This article assesses the plutonium disposition capabilities of the PRISM reactor for the U.K. stockpile. The article first describes how the stockpile was created. It then provides a simulation of reactor burn-up, the resultant isotopic compositions of PRISM spent fuel are simulated and the dose rates of that fuel. Dose rates greater than 1 Sv/h at 1 meter from the fuel were assumed to establish “proliferation resistance” and would constitute a radiation barrier to proliferators. Results suggest that the U.K. stockpile could be irradiated to that proliferation resistance target in 31.3 years, using two 840 MWth PRISM cores operating at a 30 MWd/kgHM burnup rate. By the time all the U.K. plutonium has been irradiated, however a fraction of the PRISM spent fuel will have decayed below the proliferation resistance target. Thus, even though in 2019 PRISM was removed from consideration by the U.K. government because it is not expected to be available for that use for another 20 years, this paper concludes that should PRISM become available earlier it would still be a poor choice for plutonium disposition.
摘要英国考虑使用PRISM钠冷快堆作为处理其从MAGNOX和先进气冷堆乏燃料后处理产生的民用钚的选择。本文评估了英国库存的PRISM反应堆的钚处置能力。这篇文章首先描述了这个储备是如何创建的。然后,它提供了反应堆燃烧的模拟,模拟了PRISM乏燃料产生的同位素组成和该燃料的剂量率。假定在距燃料1米处的剂量率大于1西沃特/小时,就可建立“防扩散”,并构成对扩散者的辐射屏障。结果表明,使用两个840兆瓦的PRISM堆芯,以30兆瓦/千兆米的燃耗速率运行,英国的库存可以在31.3年的时间内达到防扩散目标。等到英国所有的钚都被辐照后,“棱镜”项目的一小部分乏燃料的衰变将低于防扩散目标。因此,尽管英国政府在2019年取消了对PRISM的考虑,因为它预计在未来20年内无法用于该用途,但本文得出的结论是,如果PRISM更早投入使用,它仍然是钚处置的糟糕选择。
{"title":"Assessing the PRISM reactor as a disposition option for the British plutonium stockpile","authors":"Christopher Fichtlscherer, F. Frieß, M. Kütt","doi":"10.1080/08929882.2019.1681736","DOIUrl":"https://doi.org/10.1080/08929882.2019.1681736","url":null,"abstract":"Abstract The United Kingdom considered using the PRISM sodium-cooled fast reactor as a disposition option for its civilian plutonium from reprocessed MAGNOX and Advanced Gas-cooled Reactor spent fuel. This article assesses the plutonium disposition capabilities of the PRISM reactor for the U.K. stockpile. The article first describes how the stockpile was created. It then provides a simulation of reactor burn-up, the resultant isotopic compositions of PRISM spent fuel are simulated and the dose rates of that fuel. Dose rates greater than 1 Sv/h at 1 meter from the fuel were assumed to establish “proliferation resistance” and would constitute a radiation barrier to proliferators. Results suggest that the U.K. stockpile could be irradiated to that proliferation resistance target in 31.3 years, using two 840 MWth PRISM cores operating at a 30 MWd/kgHM burnup rate. By the time all the U.K. plutonium has been irradiated, however a fraction of the PRISM spent fuel will have decayed below the proliferation resistance target. Thus, even though in 2019 PRISM was removed from consideration by the U.K. government because it is not expected to be available for that use for another 20 years, this paper concludes that should PRISM become available earlier it would still be a poor choice for plutonium disposition.","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"20 1","pages":"124 - 149"},"PeriodicalIF":0.7,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75046287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Science & Global Security: 30 years on, still a big mission 科学与全球安全:30年过去了,任务依然艰巨
IF 0.7 Q3 INTERNATIONAL RELATIONS Pub Date : 2019-09-02 DOI: 10.1080/08929882.2019.1676954
H. Feiveson, F. V. von Hippel
{"title":"Science & Global Security: 30 years on, still a big mission","authors":"H. Feiveson, F. V. von Hippel","doi":"10.1080/08929882.2019.1676954","DOIUrl":"https://doi.org/10.1080/08929882.2019.1676954","url":null,"abstract":"","PeriodicalId":55952,"journal":{"name":"Science & Global Security","volume":"12 1","pages":"75 - 77"},"PeriodicalIF":0.7,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73126525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Science & Global Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1