The History of the U.S. Nuclear Stockpile 1945-2013
Editor’s Note: The following text was prepared by Dr. Norris for a presentation at the Woodrow Wilson Center’s 2013 Summer Institute on the International History of Nuclear Weapons (SHARF) in Washington, DC.
The primary goal of my presentation today is to reconstruct the nuclear order of battle of the Cold War, to see how nuclear weapons were integrated into military forces, to assess what influence they had, and finally with all of that as a backdrop, revisit some crucial events and decisions that may make more sense when viewed with this additional information and perspective.
Growth and Evolution of the U.S. Nuclear Stockpile
By my estimation, the United States has produced approximately 66,500 nuclear weapons from 1945 to mid-2013, of approximately 100 types.[ref]Robert S. Norris and Hans M. Kristensen, “Nuclear Notebook: U.S. Nuclear Warheads, 1945- 2009,” Bulletin of the Atomic Scientists, July 2009, vol. 65, no 4, pp. 72-81. “[/ref] New production of U.S. nuclear weapons ceased in 1990, twenty-three years ago, though modifications and life-extension programs continue. The historic high of the U.S. stockpile was reached in 1967 with 31,255 nuclear warheads. This stockpile, beginning in the mid-1950s, has been characterized by great dynamism and turnover. We now have official figures for the number of nuclear warheads in the stockpile from 1946 to 2009: In 1993, Secretary of Energy Hazel O’Leary released figures for the years 1946-1961, and on May 3, 2010 the Pentagon released a fact sheet with stockpile numbers for years 1962-2009.
All U.S. warheads were developed at one of two nuclear design laboratories, Los Alamos or Lawrence Livermore, both supported by Sandia National Laboratories to weaponize the warheads. Los Alamos has designed 77 types and Livermore 23. All four military services have had nuclear weapons: the Air Force adopted 52 warhead types, the Navy 35 types, the Army 26 and the Marines 15.
Many of the cancelled programs make interesting stories by themselves in capturing the thinking of the day. Some warhead types have had wide applicability, used in one configuration as a bomb and in another as a warhead for one or perhaps several kinds of missiles, an early example of this is the Mark 7. The profusion is even more extensive when modifications and yield options are added: the B-61 bomb has come in eleven modifications (soon to be twelve) and a variety of yields.
If we break down the stockpile by delivery system the Air Force has made use of 42 types of nuclear weapons, the Navy and Marine Corps 34 types, and the Army 21 types. As technological advances were made in reducing warhead weight and volume the military services adopted nuclear weapons for almost every conceivable military mission.
The first delivery system was an airplane dropping a bomb: specifically the B-29 carrying a single Little Boy or Fat Man type bomb. Soon after the war, a great profusion of new types of aircraft appeared offering greater range and capable of carrying many bombs. There have been more than 40 different types of aircraft that the U.S. military has used to carry nuclear weapons: 11 varieties of Air Force bombers, a dozen types of Air Force fighters, 13 types of Navy/Marine corps fighters, three types of helicopters, and three maritime patrol aircraft. There are also several types of allied non-American aircraft that were certified to carry U.S. nuclear weapons including the Canadian Argus, German and Italian Tornados, the British Shackleton and Nimrod and the Italian Atlantiques.
An almost equal technological marvel to the atomic bomb is the development of the missile, specifically the ballistic missile. It did not take a great leap of imagination to see that missiles might eventually be mated to an atomic bomb and flown (either in the atmosphere or out of it) great distances to a target. Eventually missiles would come in every conceivable size, shape, and range for every mission: air-to-surface missiles like the Hound Dog, SRAM, Walleye and Bullpup, and air-to-air missiles like the Genie and the Falcon. One cancelled program, Skybolt, was to have been an air-launched ballistic missile, quite a concept when you think of it. Complementing ballistic missiles were cruise missiles of every sort: the Matador (and later the Mace), and sea-based Regulus. For intercontinental distances there was for a very short time the notorious Snark. After improvements in ballistic missiles by the late 1950s and early 1960s, the United States had a wide variety of ICBMs, SLBMs, IRBMs, and short-range ballistic missiles. These included Corporal, Sergeant, Lacrosse, Redstone, Little John, Honest John, Thor, Jupiter, Atlas, Titan, and Polaris. Later they would be replaced by Minuteman and MX, Poseidon, Trident, Pershing and by air-sea and ground launched cruise missiles. Anti-ballistic missile missiles like the Sprint and Spartan were developed and deployed as well.
Not to be outdone, the army proposed a full range of weapons for the nuclear battlefield. This included several calibers of artillery, short range missiles, air defense missiles like the Nike Hercules, and atomic land mines. A particular favorite in this category was the Davy Crockett, a jeep- or tripod-mounted bazooka-type weapon able to deliver a very low-yield W54 nuclear warhead (20 tons yield) to a range of between 600-4000 meters. It is said that the probability of kill lethal radius for the Davy Crockett exceeded its range, which is not a good thing.
The Navy had many non-strategic types for the anti-submarine mission (ASW), including the Betty, Lulu, and B57 depth charges; the ASTOR torpedo; and ASROC and SUBROC missiles. For the anti-air warfare mission the TALOS and Terrier missiles were deployed on a host of ships to defend the carrier battle group.
Each one of these systems is deserving of its own history. The historical record will only be complete when we know and understand why they were proposed in the first place, how much was spent on them, how many were produced, where were they deployed, and when they were retired. These stories constitute the reality of the nuclear arms race: the research and development, the procuring, the transporting, deploying, training and maintaining and retiring of all of this weaponry. Even weapons that were not deployed merit at least a footnote as they give expression to the mentality of the day.
After almost seventy years, we now estimate that the United States built 66,500 nuclear warheads, but we should recognize that along the way there were other expectations and possibilities. For example, here are two contrary views: Bill Moyers made a TV program on the 40th anniversary of Los Alamos; in one scene he is riding in a car with I.I. Rabi (an adviser to Robert Oppenheimer during the Manhattan Project), and as they drive through Los Alamos Rabi looks out the window at the laboratories and building after building and says that, from the vantage point of the Manhattan Project (at least in his mind), we never intended this: meaning this gigantic ongoing complex that ended up mass producing nuclear weapons by the tens of thousands.
At the other extreme we have certain military figures such as Army Lt. General James M. Gavin, Deputy Chief of Staff for R&D under Maxwell Taylor, who said in hearings to the Joint Committee on Atomic Energy in 1956 and 1957 that the Army’s total requirement would be 151,000 nuclear weapons, 106,000 for tactical battlefield use, 25,000 for air defense, and 20,000 for support of our allies. He estimated that a typical field army might use a total of 423 atomic warheads in one day of intense combat, not including surface to air weapons. Some Navy officers in early 1958 spoke of a Polaris fleet of 100 SSBNs. This goal later dropped to between 40 and 50 and 41 were originally bought, with eighteen more Ohio-class submarines since purchased.
The Air Force never proposed an exact goal for the size of its ICBM arsenal, but there were statements in the late-1950s of several hundred to many thousands. At the high end was General Thomas S. Power, CINCSAC from 1957-1964, who spoke of a requirement of 10,000 Minuteman ICBMs and is known to have personally suggested that figure to President Kennedy. Many Air Force officers were not very enthusiastic about missiles, a diversion and drain on resources for what really mattered — that is, manned bombers. The Air Force has never been shy about asking for new planes, and in large numbers. Since 1945 they have purchased close to 5,000 bombers of 11 types whose primary mission was nuclear weapon delivery (385 B-36s, 142 B-45s, 370 B-50s, 2,041 B-47s, 403 B-57s, 116 B-58s, 744 B-52s, 294 B-66s). The original goal would have been higher than what was finally purchased, given finite budgets. This is true with the two recent bombers – the original program for the B-1 was 244 (the air force bought 100), and 132 B-2s (only 21 purchased).
Even with the Air Force’s lukewarm attitude towards ICBMs they still managed to purchase a total of 3,234 ICBMS: Atlas (381), Titan (286), Minuteman (2,433), and MX (134). The Navy bought 2,783 SLBMs: Polaris (1,092), Poseidon (640), and Trident (595 and 456) their SSBN fleet. In total over 6,000 strategic ballistic missiles were purchased.
One concluding point needs to be made about all of these numbers. Whatever they were–large, medium or small — I contend they were arbitrary. It is often made to seem, especially in Secretary of Defense Annual Reports or Congressional testimony, that civilian officials and military brass knew exactly what the number of bombers or missiles was that would deter the Soviets. In 1979 and 1980 it was said that 200 MX missiles, to be shuttled around and hidden amidst 4,600 shelters in a 40,000 square mile area of the Great Basin in eastern Nevada and western Utah, was absolutely essential to the security of the United States. Anything less just would not do. The effort and money that went into trying to come up with a survivable basing scheme to solve the problem of the so-called “window of vulnerability” is astonishing.
Stimulants to Growth and Diversity
There are three factors that sustained the nuclear arms race and led to its growth and diversity:
1) The inter-service rivalry that existed (and exists) between the branches of U.S. armed forces. These clashes over roles and missions are not aberrations; they are only the more visible skirmishes of an ongoing and eternal war. Its daily manifestations need to be tracked better than they have been. This competition was a main driver in the proliferation of missiles. At the time, nuclear weapons were the things to have. All sectors of the military became enraptured with them and tried their very best to integrate them into the various combat commands. They developed elaborate war plans, had extensive military exercises, and some may have even believed that one could actually fight wars with them. The love affair eventually ended, disillusionment set in, the bloom was off the rose, and nuclear mission after nuclear mission was terminated.
Because of their inordinate destructive power these weapons prevented good soldiering rather than advancing it. Many general and admirals felt that in the end, the weapons weren’t usable. They took away from other things that commanders would rather have had. Nuclear weapons require inordinate amounts of security and many special procedures and were not worth all of the care and feeding they required. Twenty years ago, the Army got out of the nuclear business and the non-strategic navy abandoned the nuclear anti-submarine warfare mission. In a similar development, the Navy and Marine Corps abandoned the carrier strike mission with nuclear bombs, a mission that began in the late 1940s. For a time the non-strategic Navy retained only the nuclear Tomahawk cruise missile (stored ashore in weapons depots), but that too has now recently been retired. Many or most of the missions we once had have been abandoned, and we are in the process of trying to figure out how many and what to do with the ones we have left. The answers are still not in: Can we continue to afford three legs of the triad or will two be enough?
2) A second factor which sustained and perpetuated the arms race was the belief that our nation could attain security through technical superiority in nuclear weaponry, in 1950 Chester Barnard termed this, “a most deadly illusion” – but it was one we continued to pursue year after year. Technological imperative drove the United States forward; this edge would make the difference, we could gain the upper hand, we must have this new missile or that new plane. Each of these milestones- whether it was ’boosting’, the hydrogen bomb, improved yield-to-weight ratios, miniaturization, longer range missiles and planes, or greater accuracy – these were all eventually matched by the Soviet Union and the vaunted superiority could never be sustained or taken advantage of. Each of the accomplishments by our adversary then drove the United States forward to try and find a fix for the new dilemma it put us in.
3) The third factor is what I call a hyperactive definition of deterrence. This definition equated the prevention of a Soviet attack with just achieving very high degrees of readiness on the American side. The Soviets were portrayed as ready to pounce the moment the United States let down its guard: the Red Army was ever ready to surge through the Fulda Gap. The Bolsheviks were global in their march and thus we had to be everywhere to deter them. Because warning times had shrunk so much in the missile age we needed to put bombers on 24 hour airborne alert, carrying nuclear weapons and patrolling the borders of the Soviet Union. Very high patrol rates were established for U.S. ballistic missile submarines – a practice that still continues today, by the way. After airborne alert was stopped in 1968 due to two serious accidents in Spain and Greenland, strategic bombers were put on 15-minute ground alert. Until the early 1990s about one-third of U.S. strategic bombers were configured in this way, with their crews in ready-rooms waiting for the klaxon to sound. If and when it did they would be airborne before the first nuclear detonations destroyed the base.
The image of a coiled spring is an appropriate metaphor to describe the way the United States deployed and postured its forces. It is very fortunate that the Soviets did not follow the United States in this regard, as two coiled springs would have been extremely dangerous. When crises did develop we saw both springs get tighter and tighter, there is a literature on how those coupled systems could have cascaded us into nuclear war. We can count ourselves lucky that something like the Cuban Missile Crisis did not happen later on when both sides, rather than just the United States had mature nuclear forces.
At the time, but even more so now, we can see that this coiled spring was very dangerous, costly, arbitrary, and basically unnecessary for the purposes for which it was said to be needed. The concept of deterrence was a perfect one for the arms race as it could be used for any purpose; it was elastic enough to cover everything, the perfect rationale for anything anyone wanted. The mantra of deterrence was invoked thousands of times; it was the automatic litany that prefaced Pentagon officials’ presentations before Congress at budget time. In one of its more recent incarnations, during the Reagan years, we were told that to adequately deter the Soviet Union we needed to be able to fight and win a nuclear war since our opponent, it was claimed, believed that they could do so. This is just one of many examples showing that it was quite easy to get lost in a `wilderness of mirrors’.
Basic knowledge of the growth and evolution of the U.S. nuclear stockpile is essential for undertaking research in the nuclear security field. However, there is still much to be learned regarding the history of the stockpiles of the eight other countries which possess nuclear weapons: the Soviet Union/Russia, Britain, France, China, Israel, India and Pakistan.
Dr. Robert S. Norris is the Senior Fellow for Nuclear Policy at the Federation of American Scientists. Dr. Norris was a senior research associate with the Natural Resources Defense Council in Washington, DC. His principal areas of expertise include writing and research on all aspects of the nuclear weapons programs of the United States, Soviet Union/Russia, Britain, France, and China, as well as India, Pakistan, and Israel. He has written articles for Arms Control Today and Security Dialogue, and has written a column for the Bulletin of the Atomic Scientists since 1987.
President’s Message: Innovative Ideas to Reduce Nuclear Dangers
We at FAS are always looking for innovative thinking on reducing nuclear dangers. This issue features both emerging leaders in the field and seasoned practitioners who are advancing new ways of looking at nuclear education, arms control monitoring, deterrence, and lessons from historical perspectives. Three of the articles have lead authors from the younger generation.

Erika Suzuki, who leads UC Berkeley’s Nuclear Policy Working Group, has joined with Dr. Bethany Goldblum, a younger faculty member, and Dr. Jasmina Vujic, a senior faculty member who has mentored dozens of Ph.D. and M.S. degree students. They describe a new model for educating students about nuclear technology and security policy. Their goals are to develop and sustain “an enduring nuclear security workforce,” to build bridges among “professionals from technical and social science fields,” and “to generate original policy recommendations and technical working papers.” They want to extend their work to many universities and educational institutions. For PIR readers who are educators in the nuclear security and policy field, we encourage you to contact Erika and her co-authors to find out how you can help advance this important new project.
Ravi Patel, a talented, younger biologist from Stanford, worked last summer at FAS as a security scholar and began researching how to create stability between India and Pakistan. After travel to South Asia and extensive interviews and other research, Mr. Patel wrote the article in this issue on “Using Trade to Build Stability in South Asia.” He discusses four major steps: (1) forming a uniform, jointly developed trade policy, (2) having Pakistan grant Most-Favored-Nation status to India, (3) improving infrastructure linking India and Pakistan, and (4) improving ties between the Indian and Pakistani business communities. He points out that it is often easier to ship goods between the two countries through third party countries such as the United Arab Emirates because of the impediments to direct trade. Although his article does not directly address the nuclear arms race in South Asia, it provides advice on ways to indirectly reduce nuclear tensions.
Recently, I had the pleasure of meeting Jay Brotz at a conference at the University of California’s Washington, DC, Center and was impressed with the work that he and his co-authors Justin Fernandez and Dr. Sharon DeLand are performing at Sandia National Laboratories. As discussed in their article, they are developing and analyzing models for monitoring nuclear warheads in potential future arms control treaties or agreements. Up to now, nuclear arms control agreements between Russia and the United States have primarily focused on inspecting and monitoring strategic weapon systems because of the relative ease of monitoring these objects that are much bigger than individual warheads. When individual warheads are monitored, the inspection system has to provide reliable information to the treaty partner but not reveal sensitive design information about the warhead. Brotz et al. discuss how to achieve that balance.
On FAS’s staff, we are privileged to have senior scholars such as Dr. Robert S. Norris and Hans Kristensen. For many years, they have co-written the Nuclear Notebook in the Bulletin of the Atomic Scientists, which is the most authoritative, unofficial source of information on the status of worldwide nuclear forces. In this issue, they have separate articles. Dr. Norris, a leading historian of nuclear weapons, shines a spotlight on the three factors that stoked the nuclear arms race: (1) inter-service rivalry among the branches of the U.S. armed forces, (2) the tenet that the United States could achieve security through technical superiority in nuclear weaponry, and (3) the “hyperactive definition of deterrence,” which resulted in “very high degrees of readiness” to launch an attack. This historical legacy weighs heavily on contemporary nuclear policy as examined in the final article by Hans Kristensen.
The PIR presents Mr. Kristensen’s invited presentation to the Deterrence and Assurance Working Group at the U.S. Air Force’s Global Strike Command at Barksdale Air Force Base in Louisiana. He raises profound questions about how many nuclear weapons are enough, what are the roles and tasks for nuclear weapons, and whether and how the United States can continue to reduce nuclear targeting and alert levels of nuclear forces. He advises the Air Force Global Strike Command to not resist further reductions but instead “sustain sufficient deterrence and assurance at lower levels.”
We hope you find these articles enlightening. We are grateful for your support of FAS.
Charles D. Ferguson, Ph.D.
President, Federation of American Scientists
Building a Foundation for the Future of Nuclear Security
“The need for understanding of today’s evolving nuclear threats is critical to informing policy decisions and diplomacy that can move the world toward greater nuclear security. The scientific underpinnings for such an understanding are remarkably broad, ranging from nuclear physics and engineering to chemistry, metallurgy and materials science, risk assessment, large-scale computational techniques, modeling and simulation, and detector development, among others. These physical science disciplines must be combined with social science fields such as public policy, political science, international relations, international law, energy policies, economics, history, and regional studies in order to yield a deep understanding of today’s nuclear security challenges.”
-James Doyle, “Nuclear Security as a Multidisciplinary Field of Study,” Los Alamos National Laboratory, 2008
The future of domestic and global nuclear security depends on today’s university students and young professionals feeding the pipeline to supply the requisite scientific workforce. To develop the next generation of nuclear security experts, universities must not only train students in technical nuclear science but also provide a comprehensive educational platform including nuclear energy and weapons policy in the context of the current political science architecture. Nuclear-related education programs are gaining traction, bolstered by the 2010 Nuclear Forensics and Attribution Act and other government initiatives such as the National Nuclear Security Administration (NNSA)’s Global Threat Reduction Initiative (GTRI).1
However, many of these programs are geared towards training students already engaged in nuclear science graduate programs. To maintain a steady stream of experts in nuclear security, universities must also actively recruit students in the early stages of their academic career by incorporating undergraduate educational initiatives and pre-professional development through both traditional classroom-based and extracurricular programming.
A working group model established at the University of California, Berkeley provides a pathway through which educational institutions with an established nuclear science program can initiate and further enhance nuclear security educational programming targeting students from all academic career stages.
The PRI(M)3E Model
The PRI(M)3E model was developed by the UC Berkeley Nuclear Policy Working Group (NPWG) in October 2012.2The model is derived from the three-fold mission statement of the NPWG. The first focus is to educate undergraduate students on important issues in nuclear security by providing supplementary education on nuclear technology and policy. The second aim is to foster collaboration between students and professionals from technical and social science fields. The third core goal of the NPWG is to generate original policy recommendations and technical working papers to contribute to the nuclear security field. From these primary objectives, the NPWG developed a foundational model to educate the next generation of nuclear scientists and policymakers.
The PRI(M)3E model features seven key components that are essential for developing and sustaining an enduring nuclear security workforce:
- Pioneering
- Group discussions, collaborative research, and open communities facilitate the innovation of novel techniques for strengthening nuclear security through technological advancements and action-oriented policy. This environment allows for the unconstrained development of best practices for the education of undergraduate and graduate students in nuclear security.
- Research
- A research-based working group allows members to collaborate on technical and policy-focused research projects addressing an array of critical nuclear security topics.
- Interdisciplinary
- Interactive workshops draw from both the physical and social sciences, encouraging students to develop a strong foundational knowledge base in nuclear security to best inform research projects and policy recommendations.
- M3
- Mentorship
- Opportunities are made available for undergraduate and graduate students to work closely with senior mentors to share insight, career advice, and guidance on next steps towards a career in the nuclear security field.
- Multi-level
- Students at all stages of their academic career- from freshmen through senior-level undergraduate and graduate students, post-doctoral researchers, staff scientists from the university and the national laboratories, and non-academic professionals engage in collaborative needs- driven research in nuclear security and associated applications.
- Multimedia
- Participants use a variety of media including various audio-visual presentation platforms, workshops, expert panel discussions, student seminars, and digital electronic technology to convey important concepts and foster debate.
- Mentorship
- Education
- Education of working group members, the campus community, and the general public via accurate, timely information on current developments in nuclear security technology and policy is central to the multistage mission.
Implementation of the PRI(M)3E model serves as a framework that enables the NPWG to fuel the nation’s nuclear security workforce pipeline. Each component of the PRI(M)3E model uniquely targets the recognized need for interdisciplinary training of nuclear experts, integrates a research unit into the overall educational platform, and translates multi-level interaction into mentorship to provide undergraduate and graduate students with career guidance in both the scientific and policy fields. The working group is designed to generate a cadre of experts with both well-rounded and in-depth knowledge of the technical and policy-oriented aspects of nuclear security through comprehensive, research-based, educational programming.
The NPWG is a low-cost, high-impact model. The budget for running a successful working group is minimal compared to the potentially substantial financial and institutional investment required to establish a certificate or degree program, while the organizational structure of the PRI(M)3E model allows for the achievement of comparable educational objectives. Should institutional priorities shift to the adoption of more traditional educational models, the PRI(M)3E model lays the foundation for the future development of degree programs. Further, the inclusive nature of the working group makes it accessible to students at all levels as well as to the general public. Student retention represents the primary challenge to the success of the PRI(M)3E model. The informal nature of the working group can result in difficulties maintaining a core group of students, many of whom may juggle numerous responsibilities and commitments, including academics, work, and other extracurricular activities. To reduce attrition, the NPWG strives to actively engage members using a variety of media and activities, and works with members to develop flexible working practices.
Beyond the Foundational Model: Practices and Results
The PRI(M)3E model is particularly instrumental at UC Berkeley, which has a highly divided campus layout like many research-oriented universities. Almost all of the social science departments are located on the southwest side of campus, while the physical sciences are based on the northeast side of campus. As a result, students from different disciplines often do not physically interact with one another, and opportunities for interdepartmental collaboration between the technical and social sciences at the undergraduate level are sparse. The NPWG serves as a bridge between these two spheres on campus, and establishes a space in which students from various disciplines can interact and collaborate on interdisciplinary research projects.
The principal goals of the PRI(M)3E model are institutionalized through the activities of the NPWG. At weekly research meetings, members discuss research progress and future direction, and contribute to colloquia where participants present on a nuclear security topic of their choice. The multidisciplinary nature of the NPWG is one of its greatest strengths, as students from the nuclear engineering, physics, astrophysics, electrical engineering and computer science, political science, and public policy departments share knowledge and draw on their individual strengths to contribute to joint research projects and weekly seminar presentations. This working group series provides students with opportunities to continually develop dynamic working relationships with other students, as well as senior mentors. The development of close, effective mentor relationships is highly beneficial to undergraduate professional development, as advisors encourage students to apply for internships at the national laboratories or other nuclear security institutions, impart career and internship advice, and support the academic growth of students throughout the learning process.
To expand its educational outreach initiative to the general public, the NPWG hosted its first annual Nuclear Security Panel in April 2013, which featured prominent nuclear security experts well versed in both the technical and social science aspects of the field (see Fig. 1). The panel event generated lively debate and educated the broader campus community on current issues in nuclear forensics. This interdisciplinary team of experts provided the UC Berkeley campus and the public with a multifaceted examination of the role of nuclear forensics in combating nuclear terrorism, and also served as a public forum for discussion.

Nuclear Security Panel featuring (from left to right) Ian Hutcheon, Michael Nacht, Jasmina Vujic (moderator), Raymond Jeanloz, Stan Prussin and Jay Davis.
The NPWG also showcased its practices and results at several technical and policy conferences to disseminate the PRI(M)3E methodology for student engagement and communicate contributions to the nuclear security field in the form of original policy recommendations (see Fig. 2). These events provided undergraduate and graduate students with professional development opportunities, occasions to cultivate and hone presentation skills, and networking opportunities with nuclear security professionals from around the globe. Feedback from these colleagues has been vital to the enhancement of working group practices and research project design.
Through these PRI(M)3E-based endeavors, the NPWG has trained a first-year cohort of fifteen members and conducted educational outreach on numerous occasions in both technical and public policy capacities.

Institute on Global Conflict and Cooperation 2013 Winter Public Policy and Nuclear Threats Conference. NPWG Undergraduate Research Assistant Erika Suzuki with Ambassador Linton Brooks.
Institutional support has been critical to the success of the NPWG and is essential for the long-term efficacy of the working group model. The NPWG is currently supported through an educational programming grant provided by the Nuclear Science and Security Consortium (NSSC) through the Institute on Global Conflict and Cooperation. The NSSC is a $25 million grant with UC Berkeley as the lead institution that was awarded by the National Nuclear Security Administration (NNSA) to support its NA-22 Nonproliferation Research and Development mission. The purpose of the NSSC is to train and educate experts in the nuclear security field using “an end-to-end approach, from recruitment of undergraduates to early career phases,” – the SUCCESS PIPELINE (Seven Universities Coordinating Coursework and Experience from Student to Scientist in a Partnership for Identifying and Preparing Educated Laboratory-Integrated Nuclear Experts). The NPWG operates at the foundational level, recruiting and educating undergraduate students, providing them with opportunities to collaborate with and learn from advanced students and professionals actively engaged in the nuclear security field.
SUCCESS PIPELINE NSSC3
At the input end of the pipeline, highly promising undergraduate and graduate students who have shown relevant interests are exposed to nuclear security. The program couples basic science research to technological developments relevant to the nuclear security mission. Student education includes hands-on training in a broad set of experimental disciplines—at university facilities and, as a formally constructed and supported aspect of their education, at the Lawrence Berkeley, Lawrence Livermore, Los Alamos, or Sandia National Laboratories. Between the academic and the national laboratory partners exist an array of facilities including nuclear reactors, cyclotrons and other particle accelerators, as well as detector development and characterization facilities. Summer schools and seminars broaden student exposure to a wide range of topics in the nuclear security mission. This approach is designed to not only recruit but also retain top students by exposing them to a diverse and exciting research portfolio of critical importance to the U.S. nuclear security mission. The graduate will be a well-rounded professional ready to contribute to nuclear security and step into leadership roles in the field.
Future Vision
In an effort to further develop and sustain an enduring expertise pipeline, the NPWG will be launching its Nuclear Security Initiative (NSI) in the coming year. The purpose of the NSI is to extend the NPWG across NSSC partner institutions to engage a larger cross section of students in interdisciplinary nuclear security science, provide foundational knowledge on nuclear science and policy, and train students to work collaboratively on technical research projects and policy recommendations. The NSI is a refined version of the NPWG’s efforts based on the PRI(M)3E model, and expands on the NPWG’s research focus on nuclear forensics to include nuclear terrorism, nuclear material security and nonproliferation. The NPWG thus serves as a feeder for the NSSC’s SUCCESS PIPELINE at a micro-level, and duplication of its practices via the NSI will support the development of a robust national nuclear security network among universities, national laboratories, government agencies, and industrial institutions.
Conclusion
Universities are increasingly impacted by state and federal budget cuts, so the role of institutional support has intensified. Most prominently, the recent sequester cuts will reduce the available pool of research funds by an estimated $1 billion.4This will not only affect the ability of researchers at universities and national laboratories to obtain grants from federal science-based organizations, but will also potentially decrease the number of graduate students admitted to science and engineering programs at universities that rely heavily on federal funding.5 The loss in funding coupled with a reduced number of doctoral students in these fields may hinder scientific progress and shrink the pipeline as fewer students pursue advanced degrees in science and engineering. Cultivating the future scientific workforce is crucial to operations at the national laboratories, which will face a shortage of staff scientists in the coming years due to a combination of scheduled retirements and voluntary early retirement policies stemming from the sequestration budget cuts.
As we enter the new academic and fiscal year this fall, universities and other educational institutions will need to supplement losses in research and graduate programs with lower-cost, extracurricular modes of learning. The PRI(M)3E model is one such pathway to establish a rich environment for the generation of debate and novel direction on critical nuclear security issues while engaging students outside of a traditional classroom setting. This interdisciplinary approach to academic programming is crucial for securing the future of domestic and global nuclear security, as it provides a means for involving students from various disciplines to cooperatively address the multifaceted and vital nuclear issues that permeate the current landscape of national defense. Training future nuclear scientists and policymakers to collaborate on nuclear issues will forge better-informed and better-implemented nuclear policy and practices, and will ultimately result in the maintenance of a strong, sustainable nuclear security infrastructure.
Erika Suzuki leads the University of California, Berkeley’s Nuclear Policy Working Group in support of the Nuclear Science and Security Consortium. Erika has taught three student elective courses on human rights, the politics of genocide, and California/UC labor policy that she developed through the Democratic Education at Cal program. She has also interned for Democratic Leader and Congresswoman Nancy Pelosi, the American Federation of State, County, and Municipal Employees Local 3299, and Berkeley Rent Board Commissioner Igor Tregub. She is an alumna of the 2012 Berkeley Haas School of Business Summer Program: Business for Arts, Science, and Engineering, and is a member of Delta Phi Epsilon, a co-ed, professional Foreign Service and international affairs fraternity. After graduating from UC Berkeley with a Bachelor of Arts degree in Political Science and Public Policy, Erika aspires to work as a nuclear policy analyst focusing on nuclear counterterrorism and nonproliferation efforts, and obtain an advanced degree in international security studies.
Bethany L. Goldblum received a Ph.D. in Nuclear Engineering from the University of California, Berkeley in 2007. She served as a Clare Boothe Luce Chancellor’s Postdoctoral Fellow at Berkeley before joining the nuclear engineering faculty at the University of Tennessee, Knoxville in August 2010. In January 2012, she returned to Berkeley as a member of the research faculty. Her research interests are in the areas of fundamental nuclear physics for nuclear security applications, nuclear-plasma interactions, technical nuclear forensics, and nuclear energy and weapons policy. From 2004-2006 she held the National Science Foundation Public Policy and Nuclear Threats Fellowship. She was a Project on Nuclear Issues Scholar at the Center for Strategic and International Studies and a member of the United States delegation to the China-India-United States Workshop on Science, Technology and Innovation Policy in Bangalore, India. She is the founder of the Nuclear Policy Working Group at UC Berkeley, an interdisciplinary team of undergraduate and graduate students focused on developing policy solutions to strengthen global nuclear security.
Jasmina L. Vujic is Professor of Nuclear Engineering at the University of California, Berkeley. She received her Ph.D. in Nuclear Science from the University of Michigan, Ann Arbor, in 1989. After working at Argonne National Laboratory she joined UC Berkeley faculty in 1992. From 2005 to 2009 she was the Chair of the Department of Nuclear Engineering at UC Berkeley and in 2009/2010 she chaired the Nuclear Engineering Department Heads Organization (NEDHO). Her research interests are in the areas of nuclear reactor analysis and design, neutronics and neutron physics, non-proliferation and nuclear security, and engineering aspects of medical imaging and cancer therapy. She is currently a Principal Investigator for two large research projects (over $30 million): the Nuclear Science and Security Consortium and the Berkeley Nuclear Research Center, involving close to 150 students, faculty and researchers from 7 partner universities and 4 national laboratories. Professor Vujic is the author of three books, the editor of 6 monographs and international conference proceedings, and the holder of one U.S. patent. She authored close to 300 research publications. Under her mentorship 24 students received the Ph.D. degrees and 22 received the M.S. degrees.
This article was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency there of. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.
This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DENA0000979. We also gratefully acknowledge support from the Nuclear Science and Security Consortium, the Institute on Global Conflict and Cooperation, and the Berkeley Nuclear Research Center.
Reflecting on NATO Security in the Context of a Rising China
The future promises to be far more challenging than the past for international security analysts. The security challenges that we will face will be increasingly complex, transnational, and interrelated. This will make their mitigation all the more difficult. But, the reality of this changing security landscape should not cause us to give pause and adopt a Pangloss-like outlook toward our present condition. Insecurity is not a given – security can always be made by those with the will and intellect to do so. In any given context, making security simply requires accurately identifying and prioritizing threats to international security and then developing the requisite mitigations. In this respect, the profession remains largely unchanged from its Cold War origins.
What has changed is the theoretical disposition of international security analysts. Our current generation is far more open to the theorization of security as an essentially contested concept. This has transformed the nature of the international security discourse. It now openly embraces the notion that security is tied to the social construction of security threats. It is therefore valid to intervene in the debate over how China’s rise affects international security from a social constructivist perspective. Doing so requires recognizing that security is subjective and only meaningful in the presence of a referent object. As a consequence, we must start our analysis with the question: “Whose security are we talking about?”
For the purpose of this article, the discussion will be restricted to NATO member states.
From this perspective, China’s rise is but one of many important variables in the post-Cold War international security discourse. In fact, China is not alone in terms of rising power and prestige. Other important countries include the other BRICSI countries – Brazil, Russia, India, South Africa, and Indonesia. Their collective rise is shifting the global balance of power away from the NATO region and forcing major structural changes to global and regional security architectures.
To avert a systemic breakdown, the resident and emerging major powers will need to reach a strategic compromise. This might even require the construction of a new order that better accommodates the rising powers’ interests without sacrificing too much of the incumbents’. But, reaching such a compromise will not be easy.
If the two sides find themselves unable to forge an amicable solution, one or more of the emerging powers could make a revisionist move. In the decades ahead, international security analysts must therefore remain attentive to any signals that the rising power(s) are no longer willing or able to accept the notion that “international peace is more important than any other national objective.” In the end, it is the possible rejection of the status quo by one or more of these emerging powers that most threatens international peace and stability.
But there is far more to the story of international security in the 21st Century than just the rise of these emerging powers. The world is also witnessing other major changes across multiple levels and units of analysis in the international security domain. Chief among these are the Nanotechnology, Biotechnology, Robotics and Information and Communication technologies (NBRIC) revolution, the rise of non-state security actors, the emergence of high-end non-traditional security (NTS) threats (such as climate change and emerging infectious disease), the advent of new high-end countermeasures (like ballistic missile defense), the increasingly irrelevance of the chemical and biological weapons non-proliferation regimes, the ongoing threat posed by North Korea, and the appearance of high-end, non-lethal, destructive weapon capabilities (cyber and EMP). Any of these could potentially destabilize the current status quo.
From the perspective of China, these changes present both opportunities and challenges. For example, the rise of non-state security actors presents a threat to the traditional state monopoly on violence. This certainly does not benefit an authoritarian government that can now be brought under surveillance (or even strategically challenged) by non-state actors. However, it also provides China with new export buyers for emerging technologies (such as cyber, precision manufacturing tools, drones, etc.) that could promote domestic economic growth while at the same time empowering others to undertake activities abroad that serendipitously benefit Chinese interests. For these reasons, NATO member states will be watching to see how China responds.
However, China is only part of the story. NATO member states must contend with the larger set of resident and emerging security challenges that threaten the status quo. This has led NATO member states (and many others) to securitize against a widening range of possible security threats to ostensibly protect their security. At times, this has included even partnering with China. But, the consequences of these moves are not all positive. Whereas individual securitizations may increase the security of one referent object (states), they can at the same time increase the insecurity of others (individuals). This state-human security dilemma is itself a major challenge for NATO.
In fact, according to a recent report, global democracy is now at a standstill. This is largely the result of the international community’s post-September 11th penchant for securitization. In the last decade, the transatlantic community has even witnessed major declines across a number of important democracy measures (such as freedom of the press) in key NATO member states and their allies. Efforts to counter the threat posed by NBRICs and traditional Chemical, Biological, Radiological and Nuclear (CBRNs) also threaten to undermine commercial innovation. This represents a serious challenge to NATO’s economic security in an age where the return to economic growth is necessary to pull Europe and North America out of the global recession.
These pose serious, although often overlooked, security challenges for NATO. The indirect effects of an increasingly securitized NATO might well lead to growing societal pressures within its member states to change course on certain national security policies. The failure by some governments to acquiesce to these calls for change in the name of security could further empower state and non-state actors to challenge the security policies of NATO member states. Not only would this undermine efforts to confront serious security issues abroad, but it could also lead to new security threats on the domestic front (like Anonymous).
Finding the right balance between security and civil liberties will be key for NATO. But, there is no certainty that its member states will be able to do so. If they cannot, NATO could be forced to contend with a growing domestic backlash against its securitizing moves. In that event, it would be even more difficult for NATO member states to counter a rising China. But, whether China could capitalize on such an opportunity is itself a matter of debate. To do so, China will need to overcome its own internal security challenges, which include declining economic growth, widespread environmental degradation, an aging population, and rising ethnic tensions – just to name a few.
So, what is the best path forward for NATO? The answer to this question hinges on the opening question to this article: “Whose security are we talking about?” This is a question that NATO needs to keep at the forefront as its member states respond to an increasingly complex international security landscape.
Michael Edward Walsh is the Director of the Emerging Technologies and High-End Threats Project at the Federation of American Scientists. He is also the President of the Pacific Islands Society, a Senior Fellow at the Center for Australian, New Zealand, and Pacific Studies of Georgetown University, and a non-resident WSD-Handa Fellow at Pacific Forum CSIS.
Building an Effective Nonproliferation Program: U.S. Support of IAEA Safeguards
To achieve our mutual goals of moving toward a world without nuclear weapons and expanding the peaceful use of nuclear energy globally, we must all give our financial, political, and technical support to a robust international safeguards regime. A growing international safeguards regime, capable of detecting diversion at known facilities and providing assurances regarding the absence of undeclared activities, is a condition for achieving disarmament and making the world safe for nuclear energy.
The United States is committed to providing the support that the IAEA needs through our Member State Support Program and the Department of Energy’s Next Generation Safeguards Initiative. These programs provide over $25 million per year in extra-budgetary and in-kind support to the Department of Safeguards.
–Secretary of Energy, Steven Chu, at the 2012 IAEA General Conference
A central pillar of international efforts to stem the spread of nuclear weapons is the International Atomic Energy Agency (IAEA) safeguards system. From the inception of the IAEA, the United States has supported the development and evolution of both the safeguards system itself and devices and systems approaches used by inspectors. The IAEA safeguards system comprises an extensive set of technical measures by which the IAEA Secretariat independently verifies the correctness and the completeness of the declarations made by States to the IAEA about their nuclear programs. From Iran to Syria, to the more than 190 other countries that accept IAEA safeguards, the IAEA safeguards system enhances international security, seeking to assure compliance with international nuclear agreements. The cornerstone of the global nonproliferation regime is the Treaty on the Non-proliferation of Nuclear Weapons (NPT). IAEA safeguards largely have evolved to ensure non-nuclear weapon state compliance with the NPT.
Because of the importance of the IAEA safeguards to international security and the facilitation of the peaceful uses of nuclear energy, the United States provides substantial assistance to the IAEA to improve the safeguards system. Much of this assistance is provided by US national laboratories and coordinated by the International Safeguards Support Office at Brookhaven National Laboratory. This article discusses the behind-the-scenes work of a network of U.S. Department of Energy national laboratories that support the IAEA and international safeguards.
The safeguards system is a complex verification system built on the reporting by States of their nuclear material inventories and on-site inspections conducted by the IAEA. The goal of the system is to enable the IAEA to verify that these accounts are “correct” – everything has been reported correctly – and “complete” – everything that should be reported has been – and, thus, the accounts represent the facts on the ground: “all present and accounted for.” The IAEA’s ability to do this with high confidence and to detect discrepancies in a timely manner is intended to deter States from diverting nuclear material and to sound the alarm promptly if States are not deterred.
An intrinsic tension exists between the pursuit of nuclear energy and the effort to prevent the illicit development of nuclear weapons – elements of the nuclear fuel cycle and nuclear material used to produce energy can also be used to produce nuclear weapons. For example, the enriched uranium that fuels most power reactors is produced in facilities that have the capability to produce uranium at the enrichment levels needed for nuclear weapons. Reprocessing of used reactor fuel assemblies proceeds in reprocessing plants whose output is separated plutonium in chemical and physical forms that are somewhat easily converted into the forms needed for nuclear weapons. Consequently, uranium enrichment plants and reprocessing plants are regarded as sensitive nuclear facilities.
This nuclear conundrum – the ability to use energy released from the atom as a weapon of war or as a tool for obtaining seemingly unbounded energy for powering homes, industry and development – was recognized at the dawn of the nuclear age. IAEA safeguards endeavor to make this conundrum manageable. On the one hand, IAEA safeguards can deter diversion of nuclear material from peaceful programs to nuclear weapon programs.

On the other hand, a positive conclusion by the IAEA of non-diversion can provide assurances to all countries in order to reduce regional and international tensions. The IAEA’s assurances allow States to engage in nuclear cooperation in medicine, agriculture and power with confidence that the materials and technology they supply will be used only for peaceful purposes. Thus, the IAEA safeguards system is intended to encourage peaceful uses of nuclear energy and, at the same time, inhibit nuclear proliferation.1
IAEA safeguards measures are diverse. For example, seals allow the IAEA to monitor access to States’ material or their own inspectors’ supplies while inspectors are absent from a facility. Seals are applied to material stores, reactor hatches and office cabinets where inspection equipment is stored. Seals are tamper indicating devices, meaning that if broken they indicate that an area has been accessed; they do not prevent access. Surveillance cameras are used in conjunction with seals to provide additional assurance of the lack of movement of materials within a facility or to verify that movements are related to scheduled operations. The foundation of nuclear material accountancy is a variety of destructive and nondestructive analysis techniques. These accountancy techniques provide qualitative and quantitative information regarding the composition of nuclear materials at a facility.
The IAEA Safeguards System has evolved over the past decades in response to new challenges. Traditionally, international safeguards were focused on inspections, nuclear material accountancy, and nuclear material measurements. After the first Gulf War in 1991, the IAEA Member States recognized the importance of enabling the IAEA to detect undeclared activities as well as confirm non-diversion of declared nuclear material.

In 1993, the Member States began a program called 93+2, to enhance the IAEA’s safeguards capabilities and authorities. The results of this effort were a broad new set of inspection rights and techniques for the IAEA codified in a new legally binding document, the Additional Protocol to the Member State/IAEA Safeguards Agreement, and a host of new safeguards techniques.
The verification activities of the IAEA safeguards system would not be possible without international political and technical support over the decades to enhance the system, its technology and the training of its personnel and to accept the application of safeguards. Because of the intrusive nature of international safeguards, international political support for their use has been vital. Article III of the NPT lays out the obligation for States to accept international inspectors visiting their nuclear facilities. These inspections may take place on a periodic or even unannounced basis to deploy cameras, seals and measurement equipment to verify States’ declarations. This political support has been facilitated by a careful balance that is struck between the intrusiveness of the safeguards and their technical necessity to ensure verification is effective.
The IAEA’s budget (including the budget provided for international safeguards), is approved by its Member States. While all Member States value the IAEA’s nonproliferation role, some have economic concerns and programmatic interests that result in the IAEA’s safeguards budget being constrained to a level that is widely considered lower than necessary to fully carry out its mission. The IAEA’s 2014-2015 budget includes “unfunded activities” the IAEA is required to undertake that are not funded due to higher priorities. Because of its budgetary situation, the IAEA requires assistance from Member State Support Programs in order to ensure it has the tools and skilled manpower that it needs. This extra budgetary support is in excess of $30 million per year of which the U.S. provides roughly half.
The United States Support Program (USSP) was established in January 1977 to respond to urgent needs of the IAEA Department of Safeguards more quickly than could be met through the IAEA’s administrative procedures. Although it was originally intended as a short-term program, the program has continued because it has been successful in transferring technology from the U.S. national laboratories and commercial equipment suppliers.2 The USSP is supported by a network of national laboratories and private companies that perform the work requested by the IAEA and approved by the United States Government. The requests have included nondestructive and destructive analysis instrumentation and techniques, procedures and training, system studies, information technology, containment and surveillance, and management support. In addition, the USSP sponsors a small number of administrative tasks, involving subjects such as technical writing and quality assurance. The USSP assists the IAEA with three types of human resources support. First, the USSP provides cost-free experts (CFEs) to work for the IAEA Department of Safeguards on specific projects for two or more years. The CFEs are extra-budgetary positions where the salary and benefits are reimbursed by the United States. The USSP also provides the Safeguards Department with Junior Professional Officers (JPOs), who are given entry level positions to perform basic, yet essential, work and gain valuable professional and technical experience. Finally, the USSP sponsors a number of shorter-term consultants. Typically about 100 USSP tasks are active at any given time.
Since 1977, the USSP has contributed funding in excess of $300 million and has funded over 1200 tasks.3 The USSP has provided significant human resources support through 188 CFEs and 25 JPOs representing an accumulated 688 man-years of effort. The USSP largely draws its funding from the Program on Technical Assistance to IAEA Safeguards (POTAS) which is funded through an Act of Congress under the Nonproliferation, Anti-Terrorism, Demining and Related Programs (NADR) account of the U.S. Department of State. The NADR account includes the U.S. extra budgetary funding, called the U.S. Voluntary Contribution (USVC) to the IAEA. The USVC includes funding for safeguards, technical cooperation, nuclear safety and nuclear security. In addition to POTAS, the USVC provides funding for the analysis of environmental samples, commercially available safeguards equipment, infrastructure improvement projects, CFEs and JPOs in the non-safeguards departments of the IAEA, and other activities.
The USSP activities are sometimes complemented by funding through other U.S. programs, such as the State Department’s Nonproliferation and Disarmament Fund for special projects, and the National Nuclear Security Administration’s Next Generation Safeguards Initiative (NGSI). Over the years, the U.S. Department of Energy, the U.S. Nuclear Regulatory Commission, and the U.S. Department of Defense have also contributed in-kind support.
Brookhaven
The day-to-day management of the USSP occurs through the International Safeguards Project Office (ISPO) which is based at Brookhaven National Laboratory (BNL) and includes a liaison office in Vienna, Austria, in the IAEA section of the U.S. Mission to International Organizations in Vienna (UNVIE). Brookhaven offers a unique open national laboratory campus outside of New York City with a 60-year history of science-based work related to U.S. arms control and nonproliferation goals. Brookhaven’s distinguished reputation in international safeguards precedes the establishment of the USSP.
One of ten national laboratories overseen and primarily funded by the Office of Science of the U.S. Department of Energy (DOE), Brookhaven National Laboratory conducts research in the physical, biomedical, and environmental sciences, as well as in energy technologies and national security. Brookhaven also builds and operates major scientific facilities available to university, industry and government researchers. Brookhaven is operated and managed for DOE’s Office of Science by Brookhaven Science Associates, a limited-liability company founded by the Research Foundation of the State University of New York on behalf of Stony Brook University, the largest academic user of Laboratory facilities, and Battelle, a nonprofit, applied science and technology organization.
In the 1960s, the Atomic Energy Commission selected Brookhaven to develop international safeguards principles. Brookhaven’s Technical Support Organization (TSO) became the home for many technical experts who developed their own reputations in the field through domestic safeguards activities with the U.S. Nuclear Regulatory Commission, AEC, DOE, tours of duty with the IAEA, and work on international safeguards projects funded by U.S. government agencies. It was Dr. Herbert Kouts, then the head of TSO, who originally proposed the concept of the USSP to U.S. government contacts in the mid-1970s.
In the early years of the USSP, BNL scientists and engineers designed a hand-held device called the Portable Multi-channel Analyzer that was eventually deployed by the IAEA for simple nuclear material measurements. This instrument became the workhorse for IAEA safeguards for many years until recently when it was replaced by more modern, advanced instruments. Recently, BNL experts have become involved in NNSA’s NGSI and assist the IAEA with technology development, concepts and approaches, policy, human capital development projects, and outreach to other Member States. According to Dr. Doon Gibbs, Brookhaven’s Laboratory Director, “Support for the IAEA safeguards system is one of the most important activities the lab pursues. We are a science laboratory with a long tradition of supporting national security efforts, and we are very proud of the work we have done in this area for decades.”

The central campus of Brookhaven National Laboratory. The National Synchrotron Light Source II, under construction at the time of this photo, is at bottom, right. The 3.8-kilometer circumference ring of the Relativistic Heavy Ion Collider can be seen in the distance at the top of the frame.
Over the last 15 years, BNL has become a safeguards training center, presenting courses for IAEA inspectors and Member States. BNL made use of its expertise in reactor design to develop a course on Design Information Verification of Research Reactors. This course teaches inspectors the safeguards significant attributes of research reactors and provides field exercises to help them practice associated skills. From about 1995 to 2001, the course was held at BNL and used its research reactors for facility tours. After a hiatus, the course was resurrected as a joint project with the Belgian Support Program, making use of expertise from BNL and facilities in Mol, Belgium. BNL won the honor of conducting a course on Additional Protocol/ Complementary Access4 for IAEA inspectors and has delivered the training at BNL since 2006. More recently, this training has been redesigned for delivery to IAEA Member States to teach them their responsibilities under the Additional Protocol. Brookhaven’s open campus makes it an excellent venue to host IAEA staff members and officials from other countries for training activities.

In addition, under the NGSI, Brookhaven has offered a course for the past five years that is intended to encourage qualified American and international students to enter the fields of safeguards and nonproliferation. The three-week course “Nuclear Non-proliferation, Safeguards and Security in the 21st Century,” is designed to give students a sound understanding of the foundations of the nuclear nonproliferation regime, the IAEA safeguards system, and U.S. efforts to meet emerging nuclear proliferation threats. In addition to lectures, the course includes exercises and demonstrations that take advantage of Brookhaven’s unique facilities. Above all, the course aims to give participants the knowledge, analytic tools, and motivation to contribute to improvement of the international nonproliferation regime.
In recent years, the USSP sponsored many tasks designed to assist the Agency in implementing the Additional Protocol, including programs in environmental monitoring, remote monitoring, and information technology. For the IAEA’s remote monitoring program, the USSP funded field trials for testing communication technologies such as telephone, Internet, and satellite. In addition, three engineers were sponsored as CFEs to help the IAEA develop its remote monitoring program, which is now operating effectively. Similar assistance was provided to help the IAEA establish the open source information collection and analysis program. Field trials and training were conducted for environmental sampling and, as a result, the IAEA was able to quickly implement its environmental sampling program. The USSP has traditionally provided significant support in enhancing the non-destructive analysis (NDA)5 and containment/ surveillance capabilities6 of the IAEA.
ISPO works with a network of national laboratories and numerous companies to meet the challenges facing the IAEA Department of Safeguards. For example, Los Alamos National Laboratory develops equipment and provides training in nondestructive analysis principles and implementation. Argonne National Laboratory provides training in export controls. Sandia National Laboratories has expertise in containment/surveillance, remote monitoring, and vulnerability assessments. Lawrence Livermore National Laboratory provides support in open source information and environmental sampling. Oak Ridge National Laboratory assists the IAEA with safeguards of enrichment technology. Companies working with ISPO include Aquila Technologies Group, Canberra Industries, and URS. The list of suppliers is long; the USSP is a national team effort.
“The United States Support Programme has played a key role through its R&D and implementation support activities in ensuring the IAEA safeguards system is able to continue to provide credible assurances that States are honouring their safeguards obligations, at a time of increasing verification challenges and resource limitations,” according to Jill Cooley, the IAEA’s Director for Concepts and Planning. The IAEA outlines its objectives in short-term, medium-term and long-term strategic and research and development plans. Its technical needs are documented in its biennial Development and Implementation Support Program.7
When the USSP was established, the U.S. government expected its $2.6 million investment to solve all the needs of the Department of Safeguards. In reality, the Department of Safeguards’ workload and need for support has increased as national interests in nuclear technology increase. In addition, as technology advances, so does the IAEA’s and Member States’ desire for better measurements and analysis. The Development and Implementation Support Program of the IAEA lists 24 projects for which the IAEA needs extra budgetary assistance. Despite having access to the extra budgetary resources of 21 Member State Support Programs, the IAEA’s technical needs outpace its resources.
Figure 1: U.S. Voluntary Contribution to the International Atomic Energy Agency
Because of the strong U.S. support for IAEA safeguards, the USVC portion for safeguards has increased substantially over the years. For example, Figure 1 shows an increase in total funding for the program over the past decade of 60%. At the same time, increasing security and economic concerns compete with and draw resources away from the IAEA and MSSPs. It is not clear in the current environment of decreasing budgets whether and how the IAEA can achieve the right balance in safeguard’s technical effectiveness and cost efficiencies. The USSP has been able to maintain its high level of support to the IAEA Department of Safeguards through increased efficiency by the USSP, prioritization of needs, and increases in other areas of the IAEA budget, such as direct support to large infrastructure projects.
The IAEA provides an important service to the world community in deterring the spread of nuclear weapons and enabling access for its Member States to the benefits of nuclear technology. The USSP, and other Member State Support Programs sponsored by countries around the globe, provide the IAEA with financial and technical resources that help it in its mission. Without these resources, the IAEA would not have obtained the advanced tools and developed the capabilities it needs to verify Member States’ compliance with the Nuclear Nonproliferation Treaty. Brookhaven National Laboratory is proud of its role in managing ISPO. There is still much work to be done and new challenges ahead. Brookhaven looks forward to assisting the U.S. government in future efforts to strengthen the effectiveness and improve the efficiency of safeguards.
Warren Stern is Senior Advisor in Brookhaven National Laboratory’s Nonproliferation and National Security Department. In 2010, he was appointed by President Obama to lead the Domestic Nuclear Detection Office at DHS and before that, Head of the IAEA’s Incident and Emergency Centre. He has also held a number of leadership positions at the U.S .Department of State, Arms Control and Disarmament Agency and CIA.
Susan Pepper is the Deputy Chair of the Nonproliferation and National Security Department at Brookhaven National Laboratory. She has been the Coordinator of the U.S. Support Program to IAEA Safeguards since 1996 and she was the Head of the International Safeguards Project Office at BNL from 1999 to 2011.
Energy and World Economic Growth
Introduction
Rapid growth in the developing world has changed the economic center of gravity towards Asia, especially with regard to the world’s energy economy. World-wide demand for energy, especially energy that can propel automobiles, is increasing. High energy growth is producing two problems. The first, widely recognized, is the increased greenhouse gas concentrations that result from burning fossil fuels. Barring a substantial reduction of fossil fuel use, world-wide temperatures could increase to dangerous levels. While the huge infrastructure of the energy economy rules out quick changes, if action is taken now, the necessary world-wide reduction of greenhouse gas emissions may still be possible. However, the required uptake of clean energy technologies will require strong government policies to offset initial investment costs.1
The second problem is less widely recognized. The share of GDP that must be spent on oil supplies may also limit economic growth. At times, the price of oil is limited only by the strain it places on the world economy. We have seen episodes where high and rising oil prices precede an economic downturn. During the downturn, oil prices can drop to levels that, along with a weak economy, discourage investment in new oil production. When strong growth returns, we can see the cycle repeated.
These events are not surprising because oil has a very low elasticity of demand and supply with respect to price. That means very large price changes are required to increase supply or decrease demand. In addition, oil has a very high elasticity of demand with respect to income. That means economic growth strongly increases oil demand. Lastly, oil expenditures can be a large enough component of GDP to adversely affect economic growth if they grow too large. Added together, these interactions can produce the following cycle:
- High GDP growth drives oil prices to high levels since high income elasticity increases oil demand while low price elasticities require high oil prices to balance demand and supply2;
- The resulting high share of GDP spent on oil reverses GDP growth;
- With lower GDP growth, high income elasticity reduces oil demand;
- With lower oil demand, low oil price elasticities sharply lower oil prices; and
- Low oil prices reduce oil production investments but encourage high GDP growth.
Oil prices are only one factor affecting the world economy. Nonetheless, world GDP growth and oil prices are periodically engaged in the cycle described above. Oil prices can also stabilize at levels that are not high enough to cause a downturn in GDP growth, while GDP growth is not high enough to push oil prices past the level where the share of GDP spent on oil reverses GDP growth.3
The Clean Energy Challenge
High economic growth encourages more fossil fuel use and increased greenhouse gas concentrations. High oil prices also provide an opportunity for clean alternatives to be more competitive. However, if high oil prices periodically blunt economic growth, it is more difficult to make clean-energy policies a government priority. Economies that are struggling with low growth and high unemployment are less likely to maintain strong clean-energy policies. Without these policies, we cannot hope to limit the increase of world-wide temperatures to 2oC above pre-industrial levels, the level deemed likely to avoid the more serious consequences of climate change and accepted by the G8 countries as a target to be achieved by international climate policies.4
A recent IEA study5 estimated the increase in clean power-sector technologies that would be needed to prevent a world-wide temperature increase of over 2oC (Figure 1). They estimate that the future annual growth of nuclear power must be between 23 and 31 gigawatts (GW). To put this into perspective, the historic high in building nuclear power plants was 27 gigawatts per year (GW/yr). Photovoltaic power must, after 2020, reach 50 GW/yr and, after 2030, exceed 100 GW/yr. Onshore wind investments must exceed 60 GW/yr from now through 2050. Offshore wind must exceed 20 GW/yr after 2020. After 2020, coal with carbon capture and storage would need to grow by more than 20 GW/yr.
The challenges to achieving the 2oC scenario in the transport sector are no less daunting, requiring that the world sales of electric vehicles double each year between 2012 and 2020. Advanced biofuel production must grow from ~ zero to 22 billion gallons by 2020. IEA estimates that the incremental energy-sector investment that would be needed to keep world-wide temperatures from increasing over 2oC is $37 trillion (cumulative investment between now and 2050).6 The bulk of this investment would have to be made in the developing world. It is not likely that these additional investments, over and above what is necessary to provide required energy supplies, will be made without strong government policies, even though they would produce offsetting savings in the long term. Without strong world-wide economic growth, it will be difficult, if not impossible, to implement the policies necessary to achieve the 2oC scenario.

Average Annual Electricity Capacity Additions to 2050
2012 IEA Energy Technology Perspectives 2oC Scenario
Source: IEA, Energy Technology Perspectives 2012
Oil and Economic Growth
World oil prices have, from time to time, reached levels that have impaired world economic growth such as the aftermath of the 1973 oil embargo. This first “energy crisis” accompanied a major change in the way petroleum was controlled and priced. Prior to 1970, world oil prices were managed by a relatively small number of large oil companies. These companies enjoyed liberal access to most countries’ oil resources. They could develop large oil fields in host countries with terms that allowed ample world supply at non-competitive but reasonable prices. These companies pursued a strategy to maintain affordable and stable oil prices that supported economic growth in the industrialized world and encouraged increased demand for oil. These arrangements were undone by reforms in the member-countries of the Organization of Petroleum Exporting Countries (OPEC). The reforms moved the control of the world’s largest oil resources from the international oil companies to OPEC and, given sufficient OPEC cohesion, the ability to control of world oil prices. OPEC’s control of oil prices was short-lived. The rapid price hikes associated with the 1973 embargo and the 1979 Iranian revolution stimulated new supplies, especially from the North Sea and Alaska. High oil prices also stymied demand as consumers turned to more efficient automobiles.
By 1981, oil prices began a steady decline. Saudi Arabia tried to maintain higher prices by cutting production until by 1985, its output had fallen to 3 million barrels per day (mmb/d), 70 percent lower than it had been in 1980. In 1986, Saudi Arabia adopted netback pricing7 to regain market share. Oil prices collapsed to $10 per barrel (/b)8. By 1988, the OPEC pricing regime was replaced by commodity market pricing, a system that remains in place today and for the foreseeable future. The London InterContinental Exchange (ICE) established a contract for Brent, a mixture of high quality North Sea crudes[ref]The selection of Brent and WTI as marker crudes reflected several factors: 1) the desirability of Brent and WTI to most refiners; 2) the sources of Brent (UK and Norway) and WTI (United States) relative to the world’s financial capitals, London and New York; 3) the supply of Brent and WTI would not be controlled by national governments or OPEC; and 4) Brent and WTI were produced in sufficient volume to be an important component of world oil supply.[/ref]. Additionally, the New York Merchantville Exchange (NYMEX) established a contract for West Texas Intermediate (WTI), high-quality crude similar to Brent.
Only a small percentage of the world’s crude petroleum is WTI, Brent or other traded crudes. Nonetheless, these marker crudes affect the contract price of other types of crude oil since most crude oil contracts are indexed to one or more marker crudes. Spot oil prices also respond to whether the oil commodity markets are in backwardation or contango9
This new pricing regime did not entirely eliminate OPEC’s price setting role. A few OPEC countries maintain spare production capacity. Saudi Arabia, by far, keeps the largest production capacity in reserve. Saudi Arabia can increase or decrease its oil production in response to world market conditions. If Saudi Arabia believes that prices are too high, they can put spare capacity into production, putting downward pressure on market prices. Likewise, if Saudi Arabia believes that prices are too low, they can reduce production (increasing spare capacity) putting upward pressure on market prices. Most other oil producing countries and all private oil companies are price takers. They only respond to higher or lower oil prices by increasing or decreasing planned investments in new production capacity. Whether or not these investments are made has little impact on current oil supplies or prices, but has a large impact on future oil supplies and prices.

The new pricing regime produced relatively stable oil prices until 1999 (except for a sharp increase in 1990 due to the Gulf War). In 1999, oil prices began a sharp upward trend culminating in an extremely sharp $40/b rise from January 2007 to June 2008. With record high oil prices, U.S. demand finally slackened and, soon after, failing financial institutions launched a world-wide banking crisis. Oil prices plummeted reversing in one year the gains made since 2005.
Since 2008 there have been two rapid increases in oil prices. In early 2011, the Libyan civil war removed 1.5 mmb/d of light-sweet crude from the market. Oil prices spiked again in 2012 due to increased supply outages from Iran, Nigeria, Sudan and Yemen. The 2012 run-up was followed by a significant price slide due to a deteriorating economic outlook in the Eurozone and uncertainty whether the EU and the European Central Bank would take the necessary actions to prevent an unraveling of the euro.

Source: IEA, World Energy Outlook 2011
Figure 3 shows oil prices and annual changes in world-GDP. Each spike in oil prices was followed by a sharp drop in world GDP growth. The price rise from the 1973 oil embargo preceded a 4% drop in world GPD growth. Within two years, world growth slid from over 6% to 1%. The oil-supply outage resulting from the 1979 Iranian revolution doubled oil prices. Growth slid from 4% to 2% and, later, to below 1%.
The spike in oil prices resulting from the 1990 Gulf War led to a drop in world GDP growth from over 3% in 1990 to 1% in 1991. GDP growth did not reach 3% until 1994. The price spike from 1999-2000 was followed by a drop in world GDP growth from over 4% in 2000 to 2% in 2001. The world economy appeared to survive the long price rise from 2002 to 2007 until 2008, when the world suffered the worst financial crisis since the 1930s. World GDP growth dropped from over 4% in 2007, declined to less than 2% in 2008 and plummeted to -2% in 2009. While these high oil prices did not cause the world-wide recession, they were a contributing factor. High oil prices directly affected automobile sales and travel-related industries. High oil prices also reduced a household’s disposable income for other goods and services that remained after paying unavoidable fuel expenses.10
While each oil spike has been followed by a sharp drop in world economic growth, since 198711, there has been only one sharp reduction in world economic growth that was not preceded by an oil price spike.12 GDP growth has remained above 3%, apart from the 2nd or 3rd years following an oil price spike.
The world oil market has been subject to unplanned supply outages for quite some time. However, since 2011, supply outages have increased considerably from most prior years. They also reflect causes are likely to be chronic conditions as opposed to one-off events. During 2010, oil supply outages averaged less than 1 mmb/d; since 2011, they have averaged ~ 3 mmb/d and remain high today. Reports of insurgent attacks on oil-producing and distribution infrastructure, ethnic or sectarian conflict and civil war in the oil-producing states of the Middle East and North Africa (MENA) are too common to enumerate. The security situation has caused private industry to withdraw personnel from regions that are not deemed to be safe. In addition to loss of trained personnel, insurgent attacks on infrastructure, political disputes concerning sovereignty, disagreements about the validity of oil-related contracts and other problems are not likely to be passing problems that we can assume will be resolved. While these may be necessary side effects as countries replace autocratic rule with democratic governments, they nonetheless pose a great risk for future oil supplies. The International Energy Agency recently warned that relatively stable oil prices should not conceal “an abundance of risk” as “much of the Middle East and North Africa remains in turmoil.” “The current stalemate between the West and Iran” is “unsustainable” and “sooner or later, something has to give.” The political situation in the MENA region reflects a “precarious balance” that does not bode well for “clear, stable and predictable oil policies, let alone supplies.”13
OPEC production capacity has been essentially flat for the last 30 years. Over that time, growing oil demand has been met by additions to non-OPEC capacity. A number of disappointing non-OPEC supply developments helped drive the sharp rise in oil prices from 2002 and 2008. During that period, the cost of oil and gas drilling equipment and support activities increased by 260%.14 More recently, the growth of Canadian oil sands and U.S. tight oil production has kept the world oil market in balance. Without increased oil production in the United States and Canada, non-OPEC production would have been in decline in recent years.
Sufficiently high oil prices are needed to sustain the growth on non-OPEC oil. The IEA estimates that the cost of oil sands and tight oil production ranges from $45/b to over $100/b. 15 As production moves from the most productive plays to less promising plays, costs will tend to move to the upper end of the IEA range. For example, Global Energy Securities estimates that the price of oil needed to generate an attractive internal rate of return increases from $67/b in Eagle Ford (Texas) to $84/b in Monterey/Santos (California).16 While current oil prices are higher than they need to be to justify increased investment, they are not that much higher than what’s needed to motivate the large investments needed to grow non-OPEC oil production.17
As long as world oil demand grows, so will the cost of oil. The only long-term pathway to lower oil prices is to reduce and reverse the growth of world oil demand.
World Economic Growth, Unemployment and Poverty
In OECD 18 economies, unemployment is the most serious consequence of limited GDP growth. Okun’s law describes a statistical relationship between an economy’s potential rate of growth, its actual rate of growth and changes in unemployment. According to this rough relationship, a 2% difference between a country’s actual GDP and its potential is associated with 1% more unemployment. Applied over time, unemployment will grow by 1% if economic growth is 2% below an economy’s potential.19 The picture in developing countries is more complicated because of movements of labor between the agricultural and industrialized economies. Growth below a developing country’s economic potential limits or reverses the movement from the agricultural sector to the industrial sector causing underemployment.20
While increasing productivity within the agricultural sector is a development priority, it also leads to underemployment in the agricultural sector.
The relationship between economic growth and the movement of the population out of the agricultural sector is vividly illustrated in the recent history of China. By the late 1970s China possessed an inefficient agricultural economy with a rudimentary industrial sector. China possessed a population exceeding 1 billion people, of which the vast majority lived in poverty. Economic reforms produced a sustained GDP growth that has averaged 10.2 percent per year.21As a result, China has moved 400 million people out of poverty into the modern economy. Currently, ~ 650 million people still live in the agricultural sector, 450 million more people than are needed.
High Chinese economic growth would permit more people to move out of the underemployed agricultural economy to productive labor in the modern economy, as there are 450 million people living in poverty.22 Within one generation, emigration out of the agricultural sector can be the first step to careers in commerce, business, education, medicine, engineering, science and management.
Reducing Petroleum Demand
By 2014, more oil will be consumed outside the OECD than within.23 Increased personal income and increased auto ownership appear to be as inextricably linked in rapidly developing economies as it had been in the OECD after the Second World War. With economic growth, automobiles (especially luxurious automobiles), are likely to be purchased in increasing numbers. Domestic automobile consumption will also help developing economies move from export reliance to supplying domestic markets.
With a rapidly increasing consumption of energy for personal mobility, it is imperative to satisfy this growth with non-petroleum energy. If the world continues to rely on petroleum fuels for personal mobility, high oil prices are likely to cause periodic episodes of low growth causing significant hardships for hundreds of millions of people.
Energy Security Trust
The Energy Security Trust, proposed by President Obama,24 aims to make current electric vehicle technologies cheaper and better with $2 billion for research. In addition to advances in batteries, electric vehicles and ubiquitous electric refueling, it will also fund sustainable biofuels.25 As stated by the White House; “In each of the last four years, domestic production of oil and gas has gone up and our use of foreign oil has gone down. And while America uses less foreign oil now than we’ve used in almost two decades, there’s more work to do. That’s why we need to keep reaching for greater energy security. And that’s why we must keep developing new energy supplies and new technologies that use less oil. The Secure Energy Trust will ensure American scientists and research labs have the support they need to keep our country competitive and create the jobs of the future.” The success of initiatives like the Energy Trust Fund would produce world-wide benefits as the uptake of competitive advanced clean energy technologies would be global. Competitive alternatives to petroleum-fueled personal transportation, combined with strong clean-energy policies, would go a long way to achieving the G8’s 2oC climate goal. They would also remedy an important impediment to world GDP growth.
Carmine Difiglio is the Deputy Assistant Secretary for Policy Analysis, U.S. Department of Energy and may be reached at carmine.difiglio@hq.doe.gov. His work and publications include the first engineering-economic transportation-energy model, several other modeling projects including the International Energy Agency’s Energy Technology Perspectives project, studies of international oil and natural gas markets, and policies to promote energy security, energy efficiency, motor-vehicle efficiency and alternative transportation fuels. Difiglio also serves as Co-Chair of the World Federation of Scientists’ Permanent Monitoring Panel on Energy and Vice-Chair of the IEA Standing Group on the Oil Market. He was Vice-Chair of the IEA Committee on Energy Research and Technology, Chairman of the IEA Energy Efficiency Working Party and Chairman of the Transportation Research Board Committee on Energy and Transportation. Difiglio’s Ph.D. is from the University of Pennsylvania. The data and views expressed in this paper are those of the author and are not endorsed by the U.S. Department of Energy or the United States government.
President’s Message: Complexity Overload and Extreme Events
To paraphrase Leon Trotsky’s saying about war but applied to extreme events, “You may not be interested in extreme events, but extreme events are interested in you.” The “you” here refers to the general public. I trust that readers of the Public Interest Report have self-selected themselves to be concerned about extreme events such as nuclear war, pandemics, and massive tsunamis triggering nuclear disasters. But the public has largely averted its gaze and would prefer not to contemplate “unthinkable” extreme events. Our task here at FAS is to convey to the public a better understanding of these events and provide better means to reduce and respond to them.
As I wrote in the previous president’s message, FAS is refocusing its mission on understanding, reducing, and responding to catastrophic risks. To further this mission, I have been looking for guidance as to how FAS can discover the intellectual talent and form the networks of specialists to help the world in dealing with catastrophic threats or extreme events. I recently found important insights in Dr. John Casti’s book X-Events: Complexity Overload and the Collapse of Everything, published in 2012. Dr. Casti, a mathematician and a former researcher at RAND and the Santa Fe Institute among other places, has been one of the foremost experts on complexity science. In his latest book, he argues that an extreme event or “X-event” is “human nature’s way of bridging a chasm between two (or more) systems.”
He gives the example of the gap between an authoritarian government (think Egypt under Hosni Mubarak) and the populace. The government has clamped down on people’s freedoms for decades using draconian methods and has been exceedingly corrupt and dysfunctional. Wanting outlets for political expression, citizens have been using social media tools such as Facebook and Twitter for political organizing. Dr. Casti points out that this development represents a growing, positive increase in the political capabilities of the citizenry—what he would term formation of a “high complexity” environment—versus an ossified, low-complexity government that is initially inclined to crush the protests instead of expanding freedoms. Dr. Casti argues that instead what the government should have done was to increase its complexity such that it could respond constructively to the protests. But it takes significant effort to bridge the complexity gap.
Seeking an easy way out of the perceived impasse, the Egyptian government’s initial response to the protests was to shut down the Internet in Egypt by ordering the country’s five main service providers to cut service on January 28, 2011, and the government also arrested several bloggers. U.S. President Barack Obama soon called on the Egyptian government to restore the Internet and give its citizens freedom of expression, and international service providers worked to find ways around the government’s cut in service. The Internet was restored on February 2, 2011, and the bloggers were released from prison. Mubarak was not so long afterwards deposed. As we have seen in the past two years, Egypt is still experiencing growing pains in its political transition, and it is not clear whether it will soon form a government responsive to its people’s needs. However, the movement illustrated the power of social networking tools in expanding people’s opportunities to organize and increase political complexity.
As Dr. Casti discusses in his book, there is a law of requisite complexity such that “the complexity of the controller has to be at least as great as the complexity of the system that’s being controlled.” For example, in the Fukushima Daiichi nuclear accident, the complexity of the control system (in particular, the height of the seawall and the location of the emergency diesel generators) was literally and figuratively too low to counter the higher complexity of the massive earthquake and tsunami.
I would also point out that the Japanese regulatory authorities and industry officials told the public for many years before the Fukushima accident that major nuclear accidents would not occur; this is the so-called nuclear safety myth. In effect, these authorities tried to sell the public on nuclear power being relatively low complexity. Today, Japan is faced with public mistrust and lack of confidence in nuclear power. The government has created a new regulatory agency called the Nuclear Regulation Authority. There are concerns that it is adopting too much of a deterministic approach to nuclear safety. That is, it is trying to achieve the strictest safety standards in the world by requiring many redundant safety systems at each nuclear plant to prevent further accidents. Instead, many experts outside of Japan are recommending a risk-informed approach that that uses multiple layers of safety systems but acknowledges that there will be some small level of risk. The question remains: can the Japanese public accept having some risk of a nuclear accident? Perhaps they can if the government and industry can demonstrate that it can handle high complexity events such as the possibility of accidents so as to protect the public from harm. For example, if the accident’s effects such as radioactivity release can be contained on the nuclear plant site, the public can be protected from radioactive contamination.
Can complexity mismatches be identified ahead of a catastrophe and steps taken to bridge the gap before catastrophe strikes? This is the message of the latter part of Dr. Casti’s book. He advises, for example, to look for major fluctuations and repeated occurrences in critical parameters of a system in order to forecast an impending catastrophe. For instance, in nuclear safety systems, one can look for repeated failures to inspect safety equipment, numerous unplanned shutdowns of plants due to exceeding thresholds in safety systems, and calls from whistleblowers about safety concerns. These are some major signs that urgent attention is needed.
How can governments and the public respond to avert such catastrophes? For example, a government needs to demonstrate its responsiveness to a crisis before it explodes into a catastrophe. Syria shows how lack of a government response to an environmental crisis triggered widespread public discontent and the recent civil war. As Tom Friedman wrote in the May 19 edition of the New York Times, the Syrian government did essentially nothing to help farmers deal with the massive drought that occurred a few years ago. Instead, President Bashar al-Assad’s policy of allowing big conglomerate farms to drain the very limited aquifers made Syria’s smaller farms acutely vulnerable to the drought. Out of work farmers flocked to Syria’s cities and began political organizing. The high unemployment further exacerbated people’s discontent with Assad’s government and helped spur the civil war. In hindsight, if Assad’s advisers could have foreseen this turn of events, they could have advised him to tend to the legitimate concerns of the farmers and other people out of work.
In another Arab country further south of Syria, water and political crises have been unfolding. But unlike Syria, Yemen might find a way out of its political crisis stopping short of civil war. Yemen confronts a major water disaster in that its capital Sana’a, according to some estimates, may run out of sufficient potable water in a decade, and numerous aquifers across the country are being drained faster than they can be refilled. But the good news is that after President Ali Abdullah Saleh stepped down in 2012, the political factions in the country have begun a national dialogue. This process has encouragingly included many women leaders. Several women had led the protests demanding that then-President Saleh relinquish power. While there will undoubtedly be hurdles along this dialogue process, it is a sign of increasing positive political complexity. This is greatly needed for Yemen to have any hope of solving its water crisis in addition to the crises of shortages of energy and burgeoning population with high rates of unemployment and underemployment.
I invite you to contact FAS headquarters with your suggestions about how we can work together to use the insights of complexity science to better understand our complex world and work to reduce and respond to catastrophic risks.
Charles D. Ferguson, Ph.D.
President, Federation of American Scientists
Digital Manufacturing and Missile Proliferation
Digital manufacturing is likely to be one of the key disruptive technologies of the 21st century. Described by The Economist as the foundation of a third industrial revolution, 1 digital manufacturing enables individuals and communities of designers to manufacture products themselves rather than relying on large factories with global supply chains.
While digital manufacturing holds significant potential as an engine of economic change, its potential effects on the proliferation of missiles and other weapons has not been adequately explored. The production and proliferation of missiles is foundationally an industrial process. Developing missile capability currently requires specialized industrial capabilities and expertise. Proliferation involves worldwide supply and transport chains similar to that of any modern globalized industry, albeit operating in secret. Just as digital manufacturing is likely to change the way household goods are produced, it will affect how missiles and other weapons are developed and proliferated.
What is Digital Manufacturing?
Digital manufacturing combines desktop design software – the sort that can be run from your home computer- and both traditional and new manufacturing equipment including 3D printers, Computer Numerical Control (CNC) machines that use digital instructions to operate a variety of cutting and millings tools, and laser cutters.
Digital manufacturing begins with software. Using software that has been used by industrial designers for decades, one can design and render a 3D model of the object for production. Designers need not start from scratch. The open source movement- a worldwide movement of inventors, programmers and designers who make their work available to others free of charge- provides a wide range of designs that can be directly manufactured or built on to create custom designs for particular needs. Designers can also take advantage of 3D scanners which can make a digital model of a physical object, saving the designer the trouble of redesigning the object from scratch and allowing the production of exceedingly exact copies.2
The designer can then upload their work to digital manufacturing machines that can craft a range of products. 3D printers have received the lion’s share of attention in popular press due to the novel way they function. Rather than subtracting mass from a piece of raw material by cutting or molding, it adds material together to create a product. Printers equipped with print heads similar to the one of desktop inkjet printers spray layers of plastic to create products. More advanced machines use lasers to harden powder or liquid in layers to create objects, and can fashion products out of a wide range of metals including steel and titanium. CNC machines can be equipped with various tools that allow them to cut or mill a block of material into a desired shape or product. Laser cutters slice sheets of metal or wood into 2-dimensional objects and components.3
Digital manufacturing inverts traditional industrial mass production. Mass production creates very large numbers of identical objects. Digital manufacturing tools are more flexible- each machine can be used to produce a wide range of objects without requiring the often expensive and lengthy retooling traditional mass production would require. As digitally manufactured objects are produced individually there are no additional costs for additional complexity or customization in an object, allowing products to be designed to fit extremely specific requirements. This individualized production, however, means that digital manufacturing doesn’t capture the economies of scale seen in traditional mass production- the 100th or 1000th digitally manufactured object will cost as much as the first, whereas mass production requires a significant upfront investment that pays for itself over the manufacture of many hundreds or thousands of copies of a product.4
Another advantage of digital manufacturing is that it enables local production. A file can be sent to a digital manufacturing machine anywhere in the world and produce an object on demand. Rather than outsourcing the manufacture of a product to a factory in China or elsewhere in the world (a process that can take weeks or months and introduces significant supply chain risks), a designer or customer can immediately make a product to meet a local need. The localization of manufacturing is potentially one of the most important effects of digital manufacturing as it could shift manufacturing (and manufacturing jobs) away from China and other low-cost global powerhouses back to the West and to local markets. The local advantage of digital manufacturing, beyond potentially changing the nature of the global economy, also encourages the spread of digital manufacturing capabilities. As 3D printers and other machines become available in local economies throughout the world, they will also become increasingly available to state and non-state actors who could harness them to produce missiles and other weapons.
The automotive and aerospace industries have been early adopters of digital manufacturing technologies. Ford uses 3D printers for rapid prototyping of automobile parts. 5 In 2012, GE Aviation purchased Morris Technologies, a company heavily invested in 3D printing and other digital manufacturing technologies, which produces components for commercial jet engines. 3D printing reduces the amount and weight of the material in these engine parts, resulting in a more efficient jet engine.6 On a grander scale, Airbus is reported to be developing a 3D printer large enough to manufacture entire aircraft wings.7
Digital manufacturing has also been embraced by the U.S military. The U.S. Army Research, Development and Engineering Command uses computer design software, 3D scanners, and 3D printers for the development and rapid prototyping of equipment before it is mass produced using conventional manufacturing techniques.8 Starting in 2012, mobile laboratories equipped with digital manufacturing capabilities have been forward deployed to support the logistics needs of troops in Afghanistan.9 The mobile labs allow the U.S. Army’s Rapid Equipping Force to manufacture spare parts and new components in Afghanistan based on collaborations from designers and engineers both in the United States and deployed in Afghanistan.
Printing Missiles
The proliferation of missiles and other complex systems is, at heart, an industrial process. Digital manufacturing will disrupt that process and allow for the production of more effective missile components, using a wider variety of facilities and equipment, by a larger number of actors. Digital manufacturing tools themselves would not be capable of producing a complete missile but they could be used to fabricate many key missile components, thereby reducing the challenge faced by a new weapons state from the manufacture of a weapon from scratch to the simpler assembly of a missile from its digitally produced parts.
Digital manufacturing can be used to produce components for missiles that are more effective than those produced by traditional industrial processes. NASA is currently using selective laser melting, a process similar to 3D printing which uses a laser to harden layers of metallic powder into an object, to produce components for the Space Launch System(SLS). The SLS is a heavy lift rocket intended to carry robotic and manned missions to “nearby asteroids and eventually to Mars.”10 As digital manufacturing allows rocket components to be produced in a single piece, rather than welding together smaller parts produced using traditional processes, the components are stronger and more resilient increasing the reliability of the launch vehicle. Digital manufacturing would likely produce similar benefits for the production of components for ballistic missiles, which share many common features with space launch vehicles.
Missile warheads and fuel may also be made more effective by digital manufacturing. 3D printing could be used to produce warheads with specific geometries that would produce enhanced effects when detonated.11 Similar methods could also be used to produce propellants shaped to provide better and more efficient burn rates for rockets and ammunition. 12
A greater proportion of digital manufacturing equipment than its traditional industrial counterparts will be dual-use technology. Digital manufacturing tools are inherently flexible and can produce a wide range of products without requiring retooling or other substantial modification. Governments and non-state actors could take advantage of civilian digital manufacturing capabilities to produce components for missiles and other weapons systems without needing to modify the equipment or the facilities that house it. The number of facilities that could be used for proliferation activities would be significantly greater making detecting and tracking a missile program more difficult. This would also complicate efforts to disable or delay a missile program through sabotage or an overt military attack. Lastly, the greater number of proliferation-sensitive facilities would make transparency and confidence building more difficult even in the absence of intent to acquire missiles or other weapons.
Digital manufacturing would also allow proliferators to better leverage limited human capital. Design software requires less expertise to use than traditional design methods. Digital manufacturing systems themselves are automated, reducing the number of skilled machinists and technicians needed to produce missile components. 13 While the assembly and integration of components into a functioning missile system would still require a pool of experienced engineers and technicians, proliferators would still require less design and production expertise than traditional industrial production processes would demand.
Digital manufacturing would also benefit non-state proliferators. Non-state actors generally lack access to facilities to produce anything beyond crude artillery rockets and depend on support from state sponsors. As digital manufacturing capabilities become increasingly available throughout the world, non-state actors will be able to access local manufacturing capabilities to produce weapons based on designs provided by their state benefactors or to improve home built capabilities. Hamas, for instance, has made extensive use of crude artillery rockets, the accuracy and effectiveness of which would be significantly improved if engine parts and other components currently made with drills and lathes were produced with greater precision by digital manufacturing machines.
Online Proliferation
A key advantage of digital manufacturing is the ability to easily convert a design from a file directly into a physical object. As cyber-crime, efforts to crack down on software and music piracy and Wikileaks have demonstrated, information is very difficult to protect, contain, and control. Rather than attempting to prevent the shipment of missiles or components from states like North Korea or Iran to new weapons states or non-state actors, the non-proliferation regime will be faced with the problem of controlling the movement of information. It would most likely be easier for North Korea, for instance, to transfer data to allow a customer to manufacture missile components using local digital manufacturing facilities than to ship missiles or components that could be tracked and intercepted as they traveled from Northeast Asia to the Middle East or other hotspots. A proliferating state could leverage digital manufacturing to shift its business model to the sale of weapon design information rather than complete weapons or to reduce the scale of shipments to make them more difficult to track.
Digital manufacturing is also deeply linked with the open source hardware movement which has developed tools to allow for the easy sharing of hardware designs as well as collaboration on new projects. This approach has been adopted for military projects in the United States; the Defense Advanced Research Projects Agency (DARPA) currently sponsors a project to design a new amphibious tank for the U.S. Marine Corp that uses online collaboration tools to allow far flung networks of researchers to collaborate on designs.14 Similar tools would facilitate collaboration among global proliferation networks such as the Iranian-North Korean partnership for the development of ballistic missiles.15 Non-state actors could also use such tools to leverage the efforts of sympathetic engineers and designers throughout the world. Proliferators could also take advantage of the blueprints made available by members of the open-source movement elsewhere in the world. Designers with an interest in space systems or aerodynamics could unwittingly provide assistance to a foreign missile design program.16
Proliferators could also benefit from design information from Western governments and industry. The computer networks of the U.S. government and defense contractors are frequent targets of cyber-attacks from a variety of sources. While technical specifications and other design information obtained via cyber-espionage would already be useful to proliferators, digital manufacturing would exacerbate this vulnerability. Designs intended for digital manufacture – either for rapid prototyping or for the production of final components – would be easier for proliferators to use. Rather than needing to interpret and replicate the production of a component or system from stolen design files, proliferators could simply enter the data into compatible digital manufacturing machines to produce an exact physical copy of the stolen design.
Beyond Missiles
Digital manufacturing has security implications beyond missile proliferation. The information sharing and streamlined production processes that make the proliferation of missiles easier could also enable nuclear proliferation. Digital manufacturing would have little effect on the production of nuclear weapons themselves or their requirement for significant quantities of highly enriched uranium or weapons grade plutonium. The design and production of uranium enrichment centrifuges and other equipment necessary for a nuclear program, however, would be simplified by digital manufacturing much as missile production would be.
Digital manufacturing could also be used to produce small arms. Open source networks are collaborating on the design of small arms including Defense Distributed, a U.S. based group that is working to design and produce 3D printable firearms including the controversial AR-15 rifle.17 As digital manufacturing becomes more widespread such projects will serve to significantly undermine domestic gun control laws as well as undercut international efforts to control the trade in small arms.
The manufacture of spare parts, as currently undertaken by the U.S. military, could also serve to undermine sanctions regimes intended to curtail proliferation. Iran, for instance, has a significant number of aircraft and weapons systems obtained from the West before the Islamic Revolution. While Iran’s F-14 fighter aircraft are less capable than the most advanced aircraft flown by the United States and its regional allies, they could still pose a potent threat. The difficulty in obtaining spare parts and other maintenance supplies from the U.S. has grounded most of the Iranian Air Force’s F-14s and forced Iran to develop clandestine networks to secretly obtain spare parts under the cover of legitimate business deals.18 In the future, a state placed under an arms embargo could use digital files- obtained legally before the sanctions or clandestinely afterwards- or 3D scans of existing components to produce new parts and maintain their military capabilities despite sanctions.
Proliferation in the Digital Future
Digital manufacturing will change the production and proliferation of missiles and other weapons in much the same way it will transform civilian industries. Rather than depending on a small number of states with the capability and will to proliferate missile systems or technologies, state and non-state actors will be able to leverage the civilian manufacturing sector and global networks of missile expertise to obtain weapons.
This new industrial model for proliferation will require new concepts for counter-proliferation. Missile and other weapons technologies will be available to a wider number of actors. Future counter-proliferation efforts will be faced with less visible footprints for missile production and ethereal web-based networks of missile expertise and data proliferation. Non-proliferation and cyber security experts will need to collaborate to understand how to track and defeat the information sharing capabilities that digital manufacturing enables. Stopping the flow of missile technology around the world has been a difficult task faced with many setbacks. As digital manufacturing comes of age, preventing further missile proliferation will only become more difficult.
Matthew Hallex is a defense analyst who lives and works in northern Virginia. He holds a Masters in Security Policy Studies from George Washington University.
New Report on Aftermath of Fukushima Nuclear Accident
The U.S.-Japan Nuclear Working Group, co-chaired by FAS President Dr. Charles Ferguson, has released a new report recommending priorities for the Japanese government following the March 11, 2011 nuclear accident at Fukushima Daiichi Nuclear Power Plant.

The U.S.-Japan Nuclear Working Group is composed of bi-national experts who have come together to examine the broader strategic implications of the Fukushima accident. The mission of the group is to understand, articulate and advocate for shared strategic interests between the United States and Japan which could be impacted through changes to Japan’s energy program. In the past twelve months, the group has conducted meetings with industry leaders and policymakers in Japan, the United States and the nuclear governance community in Vienna to examine the implications of Japan’s future energy policy. As a result of these meetings, the group released a report of its findings and recommendations, “Statement on Shared Strategic Priorities in the Aftermath of the Fukushima Nuclear Accident”.
The report discusses specific issues that must be addressed regardless of Japan’s energy policy decisions, including: strategy for reducing Japan’s plutonium stockpile, new standards for radiation safety and environmental cleanup and treatment of spent nuclear fuel.
The report also examines broader concerns to Japan’s energy policy including: climate change concerns, emerging nuclear safety regulations and global nuclear nonproliferation leadership (as Japan is a non-nuclear weapons state with advanced nuclear energy capabilities). The group offers strategic recommendations for Japanese and U.S. industries and governments regarding the direction of Japan’s energy policy, and how both countries can work together for joint energy security.
Read the report here (PDF).
For more information on the U.S.-Japan Nuclear Working Group, click here.
New Report Analyzing Iran’s Nuclear Program Costs and Risks
Iran’s quest for the development of nuclear program has been marked by enormous financial costs and risks. It is estimated that the program’s cost is well over $100 billion, with the construction of the Bushehr reactor costing over $11 billion, making it one of the most expensive reactors in the world.
The Federation of American Scientists and the Carnegie Endowment for International Peace have released a new report, “Iran’s Nuclear Odyssey: Costs and Risks” which analyzes the economic effects of Iran’s nuclear program, and policy implications of sanctions and other actions by the United States and other allies. Co-authored by Ali Vaez and Karim Sadjadpour, the report details the history of the program, beginning with its inception under the Shah in 1957, and how the Iranian government has continue to grow their nuclear capabilities under a shroud of secrecy. Coupled with Iran’s limited supply of uranium and insecure stockpiles of nuclear materials, along with Iran’s desire to invest in nuclear energy to revitalize their energy sector (which is struggling due to international sanctions), the authors examine how these huge costs have led to few benefits.
The report analyzes the policy implications of Iran’s nuclear program for the United States and its allies, concluding that economic sanctions nor military force cannot end this prideful program; it is imperative that a diplomatic solution is reached to ensure that Iran’s nuclear program remains peaceful. Finally, efforts need to be made to the Iranians from Washington which clearly state that America and its allies prefer a prosperous and peaceful Iran versus an isolated and weakened Iran. Public diplomacy and nuclear diplomacy must go hand in hand.
FAS Symposium Provides Recommendations to Next Administration on Catastrophic Threats
On November 9, 2012, FAS hosted the Symposium on Preventing Catastrophic Threats at the National Press Club in Washington, DC. The symposium consisted of three panels that explored catastrophic threats to national and international security, including those posed by nuclear and radiological weapons; biological, chemical, cyber, and advanced conventional weapons; and threats to energy supply and infrastructure.
Distinguished panelists at the symposium offered recommendations to the Obama administration on dealing with these challenges. The following summary offers a glimpse of the issues raised and points made throughout the day. A more detailed account that includes each speaker’s memo to the president is also available in FAS’s symposium report, Recommendations to Prevent Catastrophic Threats.
Nukes, Nukes, and More Nukes
The first panel of the symposium addressed a complex set of problems regarding nuclear weapons. Mr. David Hoffman of the Washington Post served as moderator of the panel.
Dr. Sidney Drell, Deputy Director Emeritus of SLAC National Accelerator Laboratory, began by arguing for a reduction in the nuclear stockpiles leftover from the Cold War, renewed talks for data exchange, and increased transparency. Drell proposed reducing nuclear weapons to 1,000 or fewer. Also, he recommended that the United States and Russia create a Joint Data Exchange Center, which would foster cooperation between the two nuclear powers and provide added protection against conflict resulting from misinterpreted data. In the end, he questioned if the United States could escape the “nuclear deterrence trap.”
Dr. Richard L. Garwin, IBM Fellow Emeritus of the Thomas J. Watson Research Center, commented that nuclear weapons are a threat more than a tool, since just one nuclear explosion would cause massive destruction and death. Among the known concerns of bloated stockpiles and Pakistan’s nuclear program, Garwin addressed the possibility of improvised nuclear explosives of a “yield comparable with that of the Hiroshima or Nagasaki bombs.” He said the administration should discuss several topics together, including the role of nuclear weaponry in U.S. military forces and the managing the risks and rewards of technology built around nuclear fission. Garwin recommended that the United States remove B-61 bombs from Europe and spoke against the tendency to focus on only those issues deemed to have the highest priority, arguing the United States had enough resources to work on all of these issues at once.
Mr. Charles P. Blair, Senior Fellow on State and Non-State Threats at FAS, described a new paradigm for countering the threat of radiological and nuclear terrorism. He cautioned against presupposing that all violent non-state actor groups represent a potential nuclear threat. The counter-nuclear terrorism paradigm predicated on this assumption is costly, inefficient, and, ultimately, cannot be sustained. Blair explained that ideology indicates whether a terrorist organization would seek out and use nuclear weapons. Some terrorists might be more likely to seek a nuclear weapon given their unlimited objectives and belief in divine orders. Others will have different aims. He recommended more robust efforts to understand terrorist ideology and also their behavior after acquiring a nuclear weapon, including their likely command and control structure.
Dr. Robert S. Norris, Senior Fellow for Nuclear Policy at FAS, recommended that the Obama administration eliminate all but one mission for nuclear weapons: deterrence, narrowly defined as preserving the means for retaliation if anyone uses nuclear weapons against the United States or certain allies. Norris questioned whether the changes to U.S. nuclear policy were real or illusory, and noted the ability of bureaucracies to maintain the status quo. However, changes are necessary, Norris argued, especially with U.S. nuclear war planning – only this will allow for reductions of nuclear stockpiles.
Mr. Hans Kristensen, Director of the Nuclear Information Project at FAS, concluded the panel by analyzing the current world nuclear force structure. He argued that Russia has already moved below the New START upper limits, and they will go lower. A similar response by the U.S. would indicate our cooperation. Obama said that the U.S. needed to move away from “Cold War thinking.” Kristensen recommended reductions in the nuclear arsenal and delivery systems. One recommendation included reducing the ICBM force from 450 to 300 missiles.
The panelists addressed the nuances of nuclear weapons. All called for greater comprehension of the complexity of the problem by Obama’s administration rather than restrictive labels that indicate maintaining the status quo.
Biological, Chemical, Conventional and Cyber Threats
The second panel at the symposium discussed the threats posed by biological, chemical, conventional, and cyber weapons. Ms. Siobhan Gorman, Intelligence Reporter at the Wall Street Journal, moderated the discussion.
Mr. Matt Schroeder, Director of the Arms Sales Monitoring Project at FAS, began by describing the complexity of conventional threats, choosing to focus on the subcategory of small arms and light weapons (SALW). He explained that SALW posed the “most immediate, multi-faceted threat to U.S. interests abroad.” Mr. Schroeder argued that the United States needed to include parts, accessories, and ammunition in its definition of SALW when discussing arms control. “Without ammunition,” he said, “small arms and light weapons are useless.” Mr. Schroeder explained how SALW pose a threat because they are the “weapons of choice” for transnational forces. In particular, transnational forces favor MANPADs (man-portable air-defense systems); they are easily transportable and can do significant damage to aircraft. He recommended that the United States expand the stockpile security and destruction aid programs, targeting surplus arsenals of MANPADs that can easily be sold on the black market.
Dr. Kennette Benedict, Executive Director of the Bulletin of the Atomic Scientists, followed by reiterating the Obama administration’s principles for cyber security, emphasizing the need for adequate defenses for the private sector. She said that the administration currently does not outline rules for cyber-attacks on other countries’ infrastructure. Dr. Benedict pointed out that current U.S. policy views cyber-attacks by another government as an act of war, allowing the United States to respond with military means. However, if a non-state actor employs a cyber-attack, then it is a criminal act. Dr. Benedict noted the difficulty in finding the origin of a cyber-attack; in fact, an individual can assume the identity of a state for a cyber-attack. She recommended that a “good defense is a good offense,” yet it could have unintended effects. Moreover, she stressed the importance of pursuing a deeper level of understanding of the relationship between cybersecurity operations to protect infrastructure and other efforts to ensure the availability and usability of cyberspace for communication, commerce, and free speech.
Ms. Marina Voronova-Abrams, Program Associate at Global Green USA, began the discussion on chemical and biological threats. She reminded the panel that several states are not parties to the Chemical Weapons Convention, including Syria and North Korea among others such as Angola, Egypt, Israel, Myanmar, Somalia, and South Sudan. Ms. Abrams called for more inspections, yet calculated the enormous number needed given that there are 4,913 declared dual-use industrial facilities across the globe. She highlighted the importance of the United States completing the destruction of its chemical weapons stockpile and then turned to the issue of biosecurity threats in the former Soviet Union. Though the threat has decreased and there is little possibility of someone using a bioweapon inside the former USSR, Ms. Abrams explained how terrorists could use their contacts in the former Soviet Union to gain access to bioagents.
Dr. David Franz, Senior Advisor to the Office of the Assistant to the Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs, quoted Dr. Joshua Lederberg who stated that “there is no technical solution to the problem of biological weapons […] but would an ethical solution appeal to a sociopath?” Excessive regulatory requirements can hinder productivity and creativity in the life sciences, but it is the risk that the United States has been willing to take to address the insider threat. However, looking abroad he emphasized the importance of the human dimension to biosecurity and the personal relationships among scientists, which allow not only for early warning of natural or accidental outbreaks of diseases but also for sustained, collaborative efforts that extend beyond the initial engagement phase of international outreach. Dr. Franz explained how the United States cannot lead with security in these relationships; rather, an emphasis on public health is more appropriate for tackling biosecurity challenges collaboratively. This is especially important for countries whose concern with their existing disease burdens greatly exceeds their concern for what the United States deems “especially dangerous pathogens.” Hence, Dr. Franz proposed policies that foster relationships between scientists.
Energy and Infrastructure
The symposium concluded with a panel on the issues surrounding energy and infrastructure. Mr. Miles O’Brien, Science Correspondent at PBS NewsHour, moderated the panel.
Dr. John Ahearne, former NRC Commissioner and the 2012 recipient of FAS’s Richard L. Garwin Award, began the discussion by analyzing the 2011 Fukushima nuclear accident. He explained how risk analysis recommended a higher wall against tsunamis given events in the area one thousand years ago. Yet, decision makers chose a study using events in Chile in regards to earthquakes to use as the basis of their safety designs. Thus, the plant chose to build a 20-foot wall rather than the 50-foot wall proposed by the former study. He argued that this is not a lesson against nuclear power, but the problem of regulators and operators. Dr. Ahearne advised against the International Atomic Energy Agency (IAEA) assuming the role of global regulator; rather, regulation is a national duty. However, he also noted that regulation is not the only solution; states must ensure that operators take on ensuring safety as their duty.
Dr. Steven Koonin, Director of the Center for Urban Science and Progress at New York University, argued that energy policy “success” is achieved mostly through appropriate structures and processes. He called for the establishment of a Quadrennial Energy Review (QER) process to guide energy policy. He also asserted that, ultimately, changes to the energy structure are “in the hands of the private sector.” It requires a mix of business regulations and technology development with attention paid to private sector considerations. Dr. Koonin recommended that energy policy separate stationary from transport sectors, something that is done practically yet not in policy legislation. As a result, he argued that energy policy focuses too much on stationary research and development given the importance of transportation and oil.
FAS President Dr. Charles D. Ferguson, concluded the panel by discussing international science partnerships and their role in national security. For example, FAS’s pilot project in Yemen, the International Science Partnership, is a science diplomacy initiative that brings scientists and engineers from the United States together with their counterparts from countries of security concern to solve critical water and energy security issues. Dr. Ferguson recommended specifically that the Obama administration should ensure that there are a sufficient number of scientists and engineers in government, especially in agencies such as USAID and the Department of State to facilitate science diplomacy.
Meggaen Neely was an intern communications at the Federation for American Scientists during the Fall 2012 semester, and is currently interning at the Center for Strategic and International Studies. She coordinated authors for the Up for Debate project, worked on the Did You Know Campaign and wrote accounts of events hosted by FAS. Neely is pursuing a Master of Arts in security policy studies at The Elliott School at George Washington University. She comes to Washington, DC with a Masters of Public Policy and Administration and a Bachelor of Arts in political science from Baylor University.
Photography by Monica Amarelo.
2012 FAS Awards Ceremony
FAS hosted its 2012 Awards Ceremony at the National Press Club in Washington, DC on November 9. The awards ceremony recognizes outstanding individuals who have made a distinctive contribution to national security and science policy.
Mr. Joe Cirincione, President of the Ploughshares Fund, served as Master of Ceremonies.
Dr. John Ahearne, former Chairman of the U.S. Nuclear Regulatory Commission and adjunct professor of environmental engineering at Duke University, was honored with the 2012 Richard L. Garwin Award for his decades of public service and contributions to nuclear safety and scientific integrity.
The late Mr. Stanford Ovshinsky was honored with the 2012 Hans Bethe Award for his research and development of materials science that have been applied to solar photovoltaic technologies and electric vehicles. Dr. Rosa Ovshinsky accepted the award on his behalf.
Dr. Rosa Ovshinsky speaks about Mr. Stanford Ovshinsky’s work on hybrid vehicles.
Dr. Sidney Drell received the 2012 Public Service Award for his service in working toward a world without nuclear weapons. Dr. Drell shared the honor of the Public Service Award with Dr. Henry Kissinger, Senator Sam Nunn, Dr. William J. Perry, and Mr. George P. Shultz.
Dr. Sidney Drell accepts the 2012 Public Service Award.
We thank the sponsors of the 2012 FAS Awards Ceremony:
Gold
Silver
- Alsop Louie Management LLC
- BP America
- Denjiren/The Federation of Electric Power Companies of Japan
- Fairview Builders LLC
- Power Plus Cleaning Solutions
Bronze
- Arizona State University Origins Project
- GABI
- Global Cool Cities Alliance
- Rodney W. Nichols
Photography by Monica Amarelo.