Author Archives: Cassandra Peterson

2015 Intern Spotlight: Amelia Armitage

19095811725_da75851fe8_z

Amelia Armitage
Home Institution:
Brown University
Major:
Slavic Studies and History
CNS Project:

“My experience at CNS was incredibly positive. Though I had a brief introduction to nuclear issues through undergraduate coursework, the education I received as an intern at CNS allowed me to gain a solid foundation in the many facets of nonproliferation over the course of just one summer. In addition, I was able to produce substantive work in areas of interest, using and improving foreign language skills and increasing my technical literacy in weapons systems and nuclear energy technologies. The faculty are incredibly accessible and went out of their way to help the interns understand the critical issues in the field – whether through formal lectures (held near-daily throughout much of the summer) or impromptu kitchen conversations. Working as an intern as the Iran nuclear agreement was negotiated and signed allowed me access to scholars with direct insight into the deal’s provisions and its implications – an incredible opportunity and one for which I will be forever grateful.”

Looking for a Lead

Looking for a Lead by Matthew Oldham

On July 17, 2014 the world witnessed the newest chapter in aerial terrorism. This was not an airliner that exploded over a city, or slammed into a building. It was a 298 passenger commercial airline en route from Amsterdam to Malaysia that claimed the lives of all the men, women, and children on board. It crashed in Torez, a small Ukrainian city. Suddenly, the escalating situation in Ukraine became even more dire. The international community scrambled to determine what happened as the world watched, stunned, mortified by the tragedy that affected every corner of the globe.

We now know that the plane did not merely fall out of the sky, but was shot down by Pro-Russian Separatist’s forces in Ukraine with what seems to be a Soviet-era SA-11 missile. This surface-to-air missile, also known as the “Gadfly” was likely launched from a Buk-M1 missile system. With its long range (18 miles), the SA-11 had the capability of hitting a target at a very high altitude—MH17 was flying around 33,000 feet. Ukrainian intelligence claims that the launch took place in Snizshne, a rebel controlled town, confirming US intelligence reports that the launch took place inside war torn Ukraine.  A post on the social media site Vkontakte, by Separatists leader Igor Streklov claims to have taken down a military convoy, and removed quickly after a civilian plane was confirmed. It is likely that the passenger plane was hit by mistake. Yet another unfortunate, disturbing outcome of what has escalated from the Crimean crisis. The claim made by Streklov, a former Russian intelligence officer and buddies with President Vladimir Putin, would make a certain amount of sense, considering the attack on MH17 comes only a few days after a Ukrainian cargo plane was shot down by separatist forces with what seems to be a military operated anti-aircraft weapon. Separatists have also taken down several Ukrainian fighter jets, in what appears to be around a dozen planes since the fighting began. In any case, these missile strikes require either training or expertise from someone who can operate a complex system. If this coincidence was not shocking enough, news footage and ground reports seem to show the Buk transport system heading back to Russia (image here). That’s right Russia. The most notorious, vodka drinking, separatist-backing baddies there are. And the questions begin.

In all honesty, this should come as no surprise. United States EUROCOM General Phillip Breedlove confirmed what many already knew to be true—the Russians have been backing the separatists since the Crimean crisis. Lately demonstrations have escalated, and they have been trafficking anti-aircraft machinery and conducting military training exercises on the eastern border. President Putin, of course, refutes this accusation. The Russian news agency, ITAR-TASS reported that separatists had taken a Buk under their control. While the picture reported by news agencies is not the highest quality, you can clearly tell that two missiles are missing, which seems to imply one of two things. One, Russian Separatists in Ukraine wanted to return the missile system they borrowed from the Russians. Or two, the separatists wanted to make it look like they were returning the missile systems they borrowed from Russians. Much is up in the air, but it is becoming more and more clear that Moscow is behind the supply of the Buk-M1. US intelligence is currently building a strong case against Russia to prove just that. Reports on Wednesday confirm that rocket launchers and other weapons have continued to funnel into Russia, less than a week after MH17 was shot down. The entire situation is reminiscent of the US backed Mujahideen during the 1988 Soviet invasion of Afghanistan in which the United States provided advanced weapons, specialized training, and financial assistance to the opposition forces. Of course, the Mujahideen leaders would eventually become the Taliban that the US would spend trillions of dollars fighting.

The MH17 case has brought an important question regarding rebel groups, or “terrorists,” as Ukrainian President Petro Poroshenko called them, to light. What if others got their hands on similar missiles? Two terrorists groups would absolutely kill to have a SA-11 or Buk system: The Islamic State of Iraq and Syria (ISIS) and Boko Haram. These two groups have gained headlines in recent months for their brutality, sophistication, and ability to instill not only horrific violence, but unparalleled fear across their areas of operation. Each time you turn on the TV or check your Twitter update, these two heinous groups are at it again—a bomb here, an execution there—the true essence of human despicability. Al-Qaeda recently denounced an affiliation from ISIS after a brutal recruitment video was released that depicted atrocious killings, beheadings, and executions of unarmed soldiers. Seemingly enough, Al-Qaeda also denounced any affiliation with Boko Haram after the kidnapping of nearly 300 girls in May 2014, threatening to sell them into the sex trade. ISIS controls large portions of area along the Tigris and Euphrates rivers in Iraq and cities throughout Syria, while Boko Haram controls most of Northeastern Nigeria.

Both organizations have similar narratives: to establish an “Islamic State,” which seeks to create a caliphate in which Islamic rule, harsh Sharia law, and Western expulsion enable the government to maintain complete control over their populations. In Nigeria, Boko Haram, led by Abubakar Shekau, is responsible for nearly 23,000 deaths in a string of assassinations, bombings, and guerilla warfare. Among these included a massacre of nearly 300 civilians on the side of a road, an unfathomable amount of bombings, and several deadly attacks on public transportation systems. ISIS, led by Abu Bakr al-Baghdadi, has conducted similar style warfare, including crucifixions of enemies, while taking over large parts of Syria and Iraq. ISIS is also in control of a former Iraqi chemical weapons facility, and allegedly has around 90 pounds of Uranium-238, which can be used in a nuclear bomb. While it is unlikely that they have the expertise or resources to do so, the notion of “nuclear terrorism” is in everyone’s mind.

After the downing of MH17, a new sense of urgency has emerged. After all, there is a huge flux of Soviet-era weapons that have been floating around the Middle East and Northern Africa for the last several decades. Legal sales of Small Arms and Light Weapons (SALW) have spread across the Dark Continent, but illegal sales have seen a rise as ethnic and intra-state conflict in Syria, Libya, the Central African Republic, the Democratic Republic of the Congo, and South Sudan intensifies. Seizures of over 6,000 Ak-47’s on their way to Boko Haram from neighboring Cameroon in January and September of 2013 are just two of many cases that illustrates the growth in illegal arms sales. The global arms trade, according to the Stimson Center, is valued at $70 billion a year, with $1 billion of that going towards SALW. The continued fascination with the AK-47 has recently been introduced into the drug trade, increasing both the volatility and interconnectedness of these two trafficking operations. Each trade is becoming intertwined with jihadists and terrorist groups, and there is a blend of networks. In 2013, an Al-Qaeda in the Islamic Maghreb (AQIM) attack on an Algerian natural gas facility used primarily weapons obtained via arms trafficking networks to overtake the facility and killed 38 people before interference by the French military.

Unfortunately, the news gets worse. After the overthrow and death of Libyan dictator Moammar Gaddafi, it was reported that only 25% of the 20,000 Man Portable Air Defense Systems (MANPADS) were re-acquired by the $40 million project that the United State government funded. For all of you non-math people, that is 15,000 MANPADS that the United States DID NOT recover. But wait, it gets worse. Oh, it gets so much worse. It was then reported that at least 800 of these MANPADS were refurbished and shipped on over to our favorite African jihadist group ready for use. These include SA-7 and SA-24 surface-to-air missiles (SAM), another Russian favorite. This was apparently reported by two CIA counterterrorism officers, but never addressed by the US intelligence community. Whoops. Granted, at the time (2012) the United States was probably not aware of the monster Boko Haram would eventually become. While some missiles would have inevitably ended up on the black market, it is still disappointing that the US was aware of their shipment to a growing terrorist group and did not attempt to interdict.

The situation is similar for the newly founded “Islamic State.” Most of their weapons have been obtained via illegal arms traffickingand “gun-running.” According to former House Representative Ron Paul (R-Texas), they have managed to get their hands on a large amount of US weapons that were intent on reaching the opposition forces for use against the Assad regime in Syria. According to theWashington Post, strong financial backing, ability to attract young jihadists, and a large influx of weapons have allowed ISIS to make significant gains in both Iraq and Syria in previous months. The group is estimated to have “millions of dollars” at their disposal. Even more terrifying is that ISIS has access to American military weapons. A report from Business Insider noted that 52 152mm M198 Howitzers were seized from the Iraqi military during the ISIS offensive. M198 have GPS targeting capabilities and a range of up to 20 miles. One can in vision long range attacks into Baghdad and other government held cities, as ISIS continues to advance on the capital. Aside from this small arsenal, ISIS apparently has obtained “precision guided weaponry,” including Scud missiles. Scuds have been used several times in Syria, and the Iraqi establishment seems to have obtained them as well, escalating the already dire situation. A Scud is a Soviet-era missile that can fly at Mach 5 (five times the speed of sound) and is capable of carrying conventional, as well as WMD (biological, nuclear, and chemical) payloads. US officials argue that the Scuds are decommissioned or unusable, but if wrong, ISIS obtained a very powerful friend. US officials also expound upon the possibility that ISIS could haveobtained Stinger missiles, a shoulder launched surface-to-air missile, from the raided Iraqi military bases. Yet another propagandavideo shows an SA-7 MANPADS being used. These, undoubtedly have the capability to take down commercial planes from lower altitudes. Chinese, Russian, and United States anti-tank systems are also shown to be under ISIS control.

What is the actual plausibility that Boko Haram or ISIS would use MANPADS or Surface-to-Air Missiles to take down a plane? That is a good question. In 2006, Al-Qaeda attempted to use one to take down an Israeli commercial airliner in Kenya, luckily missing. One would hope that neither would go after a commercial passenger airliner, but based off of their brutal campaigns against civilians, these seems like a potential choice. Bringing down an airliner in one of these countries would likely not have the same international affect as MH17 did, due to the more publicized relationship with Russia. It should also be noted that using a MANPADS to take down a large commercial airliner would be near impossible at an altitude similar to that of MH17. The more likely way to use this weaponry to would be attacking a cargo plane, much like Russian separatist forces in Ukraine. Hitting a Nigerian or Iraqi military cargo plane is likely at the top of each ruthless organization’s “Things to Destroy” list. The US has currently suspended all of its flights through ISIS territory and parts of Africa (see map here), but not in Northern Nigeria, where Boko Haram has established control. If a missile did hit a plane, then current US intelligence, reconnaissance, and surveillance (ISR) missions in the area would likely become much more hostile and aggressive.

Whether or not United States and other international intelligence organizations have considered this a viable threat is unknown, although my guess would be they have. In any case, the notion of terrorists using shoulder fired or ground launched missiles, many of them Russian or American, into commercial or military planes is utterly terrifying. It does bring in a bigger foreign question to light regarding these two terrorists’ organizations: What should the US policy be? The world, after all is looking for a leader on this issue. So far, to combat ISIS, the US has provided weapons, as well as financial resources in Syria, and ISR and armed drones (retained under US control), along with 300 US troops in Iraq to help gather intelligence and provide strategic support. The armed drones are for US protection, not US offensive strikes. In Nigeria, similar resources—drones, money, and counterterrorism advisors—have been sent to assist in locating the 300 missing girls, thus far, to no avail. Republicans and Democrats alike have claimed that Obama’s stance is too weak and that the US intelligence community should have seen this coming. Senator John McCain (R-Arizona) and House Representative Colleen Hanabusa (D-Hawaii) called for a stronger military response, saying the Obama administration was, “making [the strategy] up as they go.”

Let’s take a step back, though. It is much easier to call the shots when you are not the one who actually makes the decisions and lives with the consequences they entail. Is the correct response really air strikes or a ground invasion into a region in which we just spent 10 years fighting? After trillions of dollars and thousands of men and women who will never come home, it is safe to say that the American public is sick of war for a while. I do believe, however, that strong diplomatic efforts should be made to ease the tension in Iraq and that the US should supply all the intelligence and surveillance needed in both situations. Unfortunately, with the current political tensions involving Iraqi Prime Minister Nouri al-Malaki and rival factions in Iraq, little progress will be made. On the Nigerian front, the US should be using drone surveillance to help find the missing girls. Nigerian military sophistication cannot do it alone, and US military advisors and prowess would be undoubtedly helpful. What cause is nobler than preventing teenage girls from being sold into sex slavery? A strong stance in Nigeria would be ideal to limit Boko Haram from becoming a regional problem that could spread into neighboring countries. This would not involve any risk to US lives and the expanded ISR capabilities would be immensely helpful to Nigeria.

The likely response, however, is stagnation in both situations. Sure, the US will continue to send money and help with ISR to an extent, but a hard stance is difficult to envision. We are simply too occupied at the moment. The Iranian nuclear deal for instance,which was just extended until November, and investigating possible Russian implication in the downing of MH17, if in fact they backed the Separatists, are issues that seem more prominent to US strategic interests. The world can sometimes be too large to make a strong stance on an issue, especially one seemingly as small as Boko Haram. As far as ISIS, the response is also unlikely to change. A strong case could be made that cooperation in confronting ISIS would strengthen US and Iranian relations, as both have an interest in seeing them booted out of the region, but, again, too many other things are placed ahead of it. The United States definitely has interests in seeing both of these groups defeated from a strategic and moral standpoint. In a time where crucifixions and children sold into sex slavery is becoming the new norm, the world is searching for a leader to look to. One can only hope that the past does not speak to the future and these issues are addressed before escalation makes its horrifying ascent.

 

 

 

The New Ways of War

The New Ways of War by Matthew Oldham

Three’s Company

In 2011, the United States assassinated one of the top leaders of Al-Qaeda in the Arab Peninsula (AQAP). This man was the alleged mastermind behind the 2009 Underwear Bomber, who attempted to blow up an airliner over Detroit, as well as edited articles like, “Make a Bomb in the Kitchen with Your Mom” for Al-Qaeda jihadists. Anwar al-Awlaki was heavily involved in the planning and direction for AQAP external operations. Two issues quickly arose with the assassination of  al-Awlaki. One, he was a U.S. citizen and former imam in Virginia. Two, he was killed with hellfire missiles launched from an unmanned aerial vehicle (UAV). The rise of the drone had officially begun. Reports began flooding news sources and media depicting the United States patrolling the skies of the Middle East and parts of Africa with a new, lethal ally, the armed MQ-9 Reaper (manufactured by General Atomics). Drones have been used for intelligence, surveillance, and reconnaissance (ISR) for over a decade, but these “targeted strikes” quickly became the favorite tool for U.S. Counterterrorism policy.

Fast forward to 2010, Iran’s clandestine nuclear program had become more efficient and was bringing the state closer and closer to a nuclear weapon. Without warning a large amount of centrifuges (estimates place them between 1,000 and 5,000) stopped working, setting the program back for at least a year and a halfCentrifuges are used to enrich uranium to a weapons-grade material by increasing the amount or uranium-235, which is the major component of a nuclear weapon. The malfunction was linked back to the computer systems that operated the centrifuges, an apparent cyber-attack that crippled the Iranian nuclear program. Operation Olympic Games, as it would become know, was an (alleged) U.S.-Israeli cyber-weapon that used a two-pronged attack to attack rotor speed and pressure systems to break the centrifuges in the Natanz nuclear facility.

Three years later, an entrepreneur from Texas, Cody Wilson, designed and successfully fired the first plastic firearm. The gun consisted of 15 parts manufactured from a 3D Printer, the Stratasys Dimension SST, with a nail used for the firing pin, the only non-plastic part. The one-shot pistol, known as “the Liberator,” successfully fired a .380 caliber round, and in effect, became the poster-child of Defense Distributed, a “non-profit digital publisher and 3D R&D firm” started by Mr. Cody in Austin, Texas. The first lethal weapon printed by a 3D computer was officially operational. As one could imagine, this set off alarms all over the country. Questions about metal detectors in secured buildings, airports, and the like flew from all angles. The advancement of the technology to eventual military weapons was another question that arose. 3D printing opened up a realm of possibilities.

The three stories above seem very different. Read between the lines, connect the dots, or just read the title of this article, and it becomes readily apparent that the three are more than just innovative technologies that are revolutionizing the growing, globalized world. Unmanned aerial systems (UAS), computers, and 3D printing are the new ways of war. It sounds like something out of a science fiction movie from the 1980s (see Terminator), but these new tools offer distinct advantages for future military prowess. Drones, decrease the number of troops that need to be deployed into a zone of hostility and allow for persistent surveillance of an area from altitudes of up to 50,000 feet. Cyber-weapons could be used to target economic centers, power grids, or critical infrastructure like air traffic control, transportations, hydroelectric dams, and nuclear or natural gas facilities. 3D printers have the ability to provide essential components to weaponry with very few materials. One could envision a terrorist using blueprints obtained on the internet to create components used in an Improvised Explosive Device (IED) or a rogue state using one to create a missile component to carry a nuclear warhead. Reports of 3D printers being used to create drone components, intertwine the two systems. BAE Systems, a large defense firm, reported that fully operation 3D printed drones will be readily available by 2040. While there will be advantages and disadvantages to these new weapons and technologies, it will be pertinent to U.S. national security and industry to fully understand the capabilities behind them.

 

Attack of the Drones

Unmanned vehicles are truly a weapon of the future. These machines range from High Altitude Long Endurance (HALE) unmanned aerial vehicles (UAV or drones) to Unmanned Surface Vehicles (USV) to Unmanned Underwater Vehicles (UUV), like the one used in search of Malaysian Airlines Flight 370. The robotics industry is also becoming heavily involved with drones, as they discover ways to combine different systems, like aerial and ground drones to make them more sophisticated, advanced, and of course, increase their lethality. They could potentially provide a huge commercial global market for defense and commercial use alike, as well as improve collective defense of U.S. allies. Drones used for ISR could provide quick information regarding trafficking, terrorist movement, and potential military engagement. Their ability to maneuver quickly give them an advantage over satellites, and the non-existent risk to human lives make them more popular than manned aerial surveillance systems. Drones offer a strategic advantage of targeted strikes on individuals associated with terrorism that threaten the United States, as employed by the past two administrations. I mean, just look at a drone. They are scary, like a giant bug with missiles attached to its belly. But, does potential exist for drone usage to lead down a slippery slope?

A recent report by the Stimson Center, outlines several potential problems associated with drone usage. Because of their ability to make the human factor of war negligent, drone usage has the potential to decrease the threshold for conflict. As the risk of human casualties decreases, the chance of war increases. Picture this: The Islamic State begins to drift closer and closer to Turkey’s border. In the dead of the night, a Turkish armed drone strikes their camps, but never invades. Another scenario could involve Russia using (or even giving) a drone to assist with the separatists movement in Ukraine. Scary stuff. Drone strikes by the United States across the Middle East and Africa, has potentially set a precedent for sovereignty erosion. An outside country conducting drone strikes, even with approval of the host country, speaks to the potential for an erosion of these norms because it gives up part of its national control. A final fear is that drones strikes could create more terrorists than it kills. Here is a thought: what if you were sitting in your home with your family, including your dad who had made some sketchy, under-the-table deals with a sketchy, under-the-table group in the past. You pick up the dog, and take him on a walk. Minutes later, your ears are ringing, you are lying on the ground, and black smoke and fire rise from the place your house used to be. Everything you know and love is decimated in a matter of seconds. This reality is indicative of the feeling that many have had in the past decade. While drone strikes can eliminate an enemy, we need to be aware of the adverse effects. The family member that survived, that had everything taken away, could be (and in many cases is) pushed to the open, loving arms of a terrorist group. This “blowback” effect creates the exact situation it set out to destroy. The destabilizing effects of drones are quite concerning, and potentially create more problems than they solve.

 

“It all Turns to Chaos…”

The most terrifying weapon may not bring about casualties, at all. It does not explode. It does not emit a chemical gas. The most terrifying weapon has the ability to instigate chaos. Cyber-attacks have the potential to bring down financial systems, disrupt critical infrastructure, sabotage transportations systems, and steal billions of dollars, all by someone who is sitting behind a computer from anywhere in the world. Unfortunately, this was best demonstrated by the atrocious Bruce Willis film, Live Free or Die Hard (they should have stopped after Die Hard 2…). As former Secretary of Defense Leon Panetta said, a “cyber-Pearl Harbor” would be unbelievably devastating to the United States. In March 2013, Director of National Intelligence James R. Clapper acknowledged that cyber-attacks are the biggest threat to national security. As Director Clapper’s Worldwide Threat Assessment indicates, the globalization of technologies and the internet connect the world at rapid pace. As with drones and 3D printing, technology significantly outpaces both national and international policy.

State actors have turned to cyber-espionage as a new means of warfare and intelligence gathering. China is notorious for hacking networks across the globe to gain an industrial advantage over Western countries. Google, the New York Times, and multiple other companies claimed to be the victim of cyber-attacks. Every other week there seems to be another U.S.-Chinese cyber-exchange, even when there is a bilateral working group to develop a collaborative cybersecurity policy between the two countries. Last May, the United States investigated the hacking of six U.S. companies and indicted five members of a Chinese military group, Unit 61398, which resulted in the bilateral working group being suspended. China, however, is not the only country engaged in cyber-warfare. North Korea, Russia, Pakistan, and India are all engaged in some kind of cyber-espionage or cyber-attacks. These attacks can also take place as denial of service (DOS) which involves flooding a system with a high amount of information to overwhelm the network. Another attack is known as a zero-day exploit which attacks a security flaw in a network the first day they are discovered, giving the company or government zero (sorry for the bad pun…) time to react. A large scale DOS attack prevented hundreds from accessing their bank accounts, luckily nothing else was suffered. Chaos proceeds panic, and cyber-based attacks have the potential to create chaos on a large scale.

Printing Tomorrows Weapons

The Liberator pistol revolutionized armed warfare. 15 pieces of plastic constructed together to build a weapon. Fully constructed by a 3D printer, this technology could revolutionize military and law enforcement firearms. Guns made of plastic will be significantly lighter than those made of metal, although metal guns created by 3D printers are being tested as well, by companies like Solid Concepts. As 3D printers becomes not only more sophisticated, but compact and more portable, the problems associated with and potential use by unfavorable actors are likely to increase. In fact, problems have already begun. In Japan, a man was arrested for possessing at least six illegal 3D printed guns (with a few nuts and bolts thrown in). Apparently, designs for rifles, multi-round handguns, and derringers (small 2-shot pistols that could be hid in a sleeve—think Nick-Nack from the James Bond film, The Man with the Golden Gun) are being developed.

These guns will be cheap, they will be easily concealable, and they will (eventually) be widely available to many across the world. The thought of warlords and criminals being able to build their own weapons in the garage is absolutely terrifying. The proliferation of this technology is growing at an alarming rate. Shapeways, a start-up company that creates objects with 3D printers, has sold over 50,000 products a month, with no signs of slowing down. 3D printers will revolutionize the way products are created and distributed. In addition to companies who are beginning to see the potential sphere they can dip their hands into, another entity took notice: the U.S. Army. Apparently the Armament, Research, Development, and Engineering Center (ARDEC) wants to create warheads using 3D printed components insisting that this will enable better design control which could make them more compact, scalable, and deliverable. Why stop at only the warhead though? ARDEC expressed interest in creating a fully capable missile in the future as the technology continues to boom. As mentioned before some drone components have been created using a 3D printer, with plans to have a fully operational drone by 2040. 3D printers could eventually ride alongside soldiers brining the “supply chain to the battlefield.” Industries are already talking about 4D printing technology which would not require assemblage after printing and would be ready for immediate use. In essence these tools could reassemble or reshape themselves. A TED Talk on 4D printing is available here. With the advancement of technology occurring so rapidly, these ideas are simultaneously revolutionary and apocalyptic.

The Non-State Threat

The biggest concern regarding these new technologies does not necessarily come from the state or military threat, but from terrorists groups and militias. Hamas recently employed the use of a drone in its current conflict with Israel, flying it towards the Dimona nuclear facility. The Israeli Defense Force (IDF) blew it out of the sky, but this case shows the potential damage that could be caused from terrorist having UAV in their possession. In the past, Hezbollah has used drones against Israel, apparently obtaining them from Iran. This could potentially hit closer to home. In 2012, a graduate student from Massachusetts was arrested for plotting to strap explosives onto drones and fly them into the US Capitol Building and the Pentagon, followed by a ground assault. Likewise, a Moroccan national was arrested by FBI agents in Connecticut for plotting to fly “suicide drones” into a school and federal building. With these small UAVs (or even high-quality remote controlled planes) available over-the-counter at your nearest electronics store, the chances for some type of attack seems to be more probable or at least more conceivable in the future. What if someone decided to strap explosives on a remote controlled plane and fly it into the financial district or Times Square in New York City, all while operating it from Central Park? Drones could be used for a multitude of other things, not just terrorism, such as: smuggling drugs into a prison; transporting goods, weapons, or drugs over national borders; using “underwater drones” to traffic illegal goods.

The same applies in the cyber-realm. According to President Obama, cyberterrorism is the biggest threat facing the United States today. The U.S.-Israeli Stuxnet program found its way into servers across the world, showing the unpredictability and sophistication of complex computer viruses. A program known as “the Mask,” is a sophisticated virus that intended to target natural gas and oil companies across the country. The program was likely developed by a Spanish speaking “hacktivist” group (those who use cybertechnology, espionage, and warfare to promote political agendas) and successfully infected entities and governments in 31 countries and 380 companies worldwide. Its advanced rootkit technology allowed it to hide itself within programs undetected, while the malware part of the program collected information and monitored all communication channels in each network it infected. Once infected everything was up for grabs—documents, encryption keys, network codes, remote access information. Even scarier is that the Mask went undetected since 2007, seven years before it was discovered. Another fear in the cyber-arena is manipulating a system by “spoofing” (hacking into a system to make it look like attacks are taking place). Spoofing involves a group or country manipulating a system by falsifying data. This can be used to make it look like something is happening, even when it is not. Particularly in the nuclear field, a spoof of a nuclear launch by one country could potentially cause a retaliatory nuclear strike. This almost happened in 1995, when scientists launched a meteorological rocket from Norway that Russians interpreted as an American launch. Thanks to the poise of Russian leaders (hard to say that now…) a potential nuclear war was averted. For now, terrorist groups do not seem to have the capability to launch sophisticated cyber-attacks, but “lone-wolfs” and hacktivist groups certainly do. Certainly the potential exists for groups to hack into nuclear facilities, as with Stuxnet, but only the United States and Israel have demonstrated this. Another possibility involves hacking nuclear command and control, but this is highly unlikely and would be nearly impossible for a non-state group to do.

3D printed guns and ammunition would provide a cheap, easy way for terrorist groups and militia groups to wage warfare. The Department of Homeland Security acknowledged this fear in a press release, noting that the sophisticated technology, speed of proliferation, and ease of concealment is very difficult to address and could be problematic in the future. They predict that the proliferation of 3D printed weapons may be “impossible to stop.”As noted earlier, terrorist groups can create components used in IEDs as well. These printers could provide weapons to militias in Africa to continue to wage warfare at a lower price. As blueprints become widely available on-line, cybersecurity will square off cyberterrorism, as groups attempt to gain access to these plans.

America and the Future of War

As should be readily apparent, these three technologies are strongly intertwined and interconnected. Think of the following scenario in the not too distant future: a company designs an idea for a new armed drone that is lighter, more sophisticated, and cheaper than anything seen before. The company uploads their documents to a network server with standard cybersecurity measures. Thousands of miles away a hacktivist group employs a robust virus that successfully infiltrates the system and steals the blueprints to this new drone. The group then sells the designs to a terrorist organization that uses a 3D printer to construct the drone for use in an attack in a major US city. It sounds farfetched right? So many things would have to go perfectly right, but the possibility exists. The role of policy and security not being able to keep up with technological advancement is something we see every day. This scenario would be detrimental to not only U.S. national security, but U.S. industry as well. Can you imagine if this involved American companies and American citizens? There are plenty of extremist groups in our own country that would undoubtedly love to see this scenario play out.

It is undeniable that the United States will need to address this “perfect storm” of technology proliferation in the near future. There are several things that the United States can do. First, make sure that we have the best possible national and international export controls in place in all of these technologies. While I could write an entire novel on all of the export controls that would go into these technologies, the bottom line is that we must ensure that sensitive and dual-use technologies (those used in commercial and military applications) are properly controlled and their end-use is verified. This will not harm industry, but likely improve it because of the strong verification and monitoring that would take place, which would allow trade at a high rate to allied countries. We could trade these technologies with other countries to improve our collective security (you watch my back, I watch yours). Second, we need to lead a multilateral dialogue on how these technologies should be used. This means addressing the U.S. targeted killing program at an international level in order to improve transparency and accountability—reversing the precedent that has been set. This means fixing our cyber-espionage issues with China. This means in-depth research into 3D printing R&D, proliferation, and security implications. An international dialogue would help establish best practices for imports, exports, use in war, and the non-state actor threat. Finally, in the United States there needs to be a cooperative initiative between striking a public and private balance for advanced technologies. The defense industry needs to understand its limitations on transfers and the government needs to understand their limitations on innovation. Best practices from industry and clear guidelines from government need to be addressed. An understanding between these two groups will have a positive impact on economic and security policy by creating and understanding between the two groups, while establishing cooperative measures will help the two groups achieve the same goals.

The United States has a unique opportunity to lead the world in these technologies from both a business and policy angle. Unmanned vehicles, cyber-tools, and 3D printers are some of the most fascinating innovations of our time, with potential to drastically change the world for the better. Everything from global security to global health could potentially benefit from these technologies. We can take the lead in organizing an international consensus on proper usage, establishing global norms, and encouraging cooperation on a global front. At home we can partner with businesses and industry to make the national security and economic market the strongest that it can be.

 

Newsroom

Here you can find Summer Interns & Fellows’ research projects, publications, media appearances and articles

2018

Explore the Summer 2018 Interns’ research projects here

Kenshin Cho
Protectionist export controls could be bad for nonproliferation
Publisher:  Bulletin of the Atomic Scientists

Ethan Fecht and Jack Nassetta

Interns Ethan Fecht and Jack Nassetta examine the use of social media in shaping narratives surrounding nonproliferation efforts.

The Washington Post published an Op-Ed version of Jack and Ethan’s study

Russia is gearing up to misinform the U.S. public about Syria. Here’s our cheat sheet to identify Twitter trolls
Publisher:  The Washington Post

Jack Nassetta’s appearance on Sky News World View

The distinguished Brown Daily Herald of Brown University also wrote a piece about Jack and Ethan’s work.
Students examine Russian disinformation campaign

Octave Lepinard

Watch Octave appearance on BBC News and read his article about his experience

2017

The Summer Interns and UWC Davis fellows have produced several important publications this year. To see a full list, please click here.

2016

Intern Hanna Rifkin was awarded an honorable mention in the United Nations Security Council Resolution 1540 Essay Contest. This prestigious award is given by the Stimson Center and is awarded for the essay that best gives new ideas for countering nuclear proliferation. More information can be found here: https://www.brynmawr.edu/news/hannah-rifkin-17-awarded-honorable-mention-un-essay-contest. Her essay can be found on this webpage: https://www.stimson.org/sites/default/files/file-attachments/1540-Contest-Essays.pdf. In addition to her award winning essay, a modified version, titled “Modest but meaningful steps to prevent proliferation in Turkmenistan” was published in the Bulletin of Atomic Scientists and can be viewed here: http://thebulletin.org/modest-meaningful-steps-prevent-proliferation-turkmenistan9972

Interim Report
IAEA Milestones Approach Progress for Nuclear Newcomers in the Middle East:
Evaluating the nuclear new build projects of the UAE, Saudi Arabia, Jordan, and Egypt
Joy Nasr (Intern) and Amélie-Sophie Vavrovsky (Davis United World College Fellow)
Under the supervision of Dr. Ferenc Dalnoki-Veress

2015

Amelia Armitage and Miles Latham

damn good

By Amelia Armitage and Miles Latham

Interns Amelia Armitage and Miles Latham write, “In the wake of the announcement of a successfully concluded Iran Nuclear Agreement in July 2015, many took to social media outlets to express their opinions of the deal. In Foreign Policy, CNS expert Jeffrey Lewis expressed his view that the deal was a “damn good one.”  

This project sought to determine what other experts think of the deal – and, in particular, whether experts are expressing more positive views on Twitter than non-experts.  To answer this question, we drew roughly 12,000 tweets written on July 15–just one day after the deal was announced, each of which had been tagged with #IranDeal. We classified subsample of 5000 tweets into expert and non-expert categories, and performed 3 different types of sentiment analysis–which led us to a “polarity” score for each tweet (-1 = negative; 1 = positive; 0 = neutral).  Armed with this data, upon further analysis we were able to conclude that experts did express a more positive view of the deal on Twitter than those with less expertise.”

 

Timothy Fraser

map

By Timothy Fraser

Intern Timothy Fraser writes, “”This interactive story map in remembrance of the bombings’ 70th Anniversary is designed to help English language speakers explore the bombings’ different scales all at once.​ Grappling with the devastation spatially forces us to understand victims of nuclear attacks as ordinary human beings living in ordinary cities just like us.

In this way, cartography can help us integrate our understanding of nuclear issues with deeply intertwined social and political concerns. (All locations are approximated based on historical maps, photos, and documents and do not always correspond to exact locations.)”

2014

The New Ways of War by Matthew Oldham

Former intern Matthew Oldham writes about the increasing use of new technology, such as drones, cyberattacks, and 3D printing in covert warfare.

Looking for a Lead by Matthew Oldham

Former intern Matthew Oldham writes about whether rebel or “terrorist” groups could potentially get their hands on missiles similar to the MH17 case, the regulation of Small Arms and Light Weapons, and the United States’ next step in the so-called War on Terror.

2013

Why the United States Should Redesign its Nuclear Submarines by Nate Sans

Former intern Nate Sans submitted the work he undertook at CNS to Bulletin of the Atomic Scientists, winning the prestigious Voices of Tomorrow contest in 2013. His article makes the compelling argument that the United States is unable to demand other countries operate their submarines off LEU when US submersibles continue to use HEU.