- +18
James M. Acton, Saskia Brechenmacher, Cecily Brewer, …
{
"authors": [
"James M. Acton"
],
"type": "other",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [],
"englishNewsletterAll": "ctw",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "NPP",
"programs": [
"Nuclear Policy"
],
"projects": [],
"regions": [],
"topics": [
"Nuclear Policy",
"Foreign Policy"
]
}Source: Getty
Cyber Warfare and Inadvertent Escalation
The advent of cyber warfare exacerbates the risk that conventional wars could inadvertently lead to the use of nuclear weapons.
Source: Daedalus
Cyber weapons may be relatively new, but non-nuclear threats to nuclear weapons and their command, control, communication, and intelligence (C3I) systems are not. In fact, before the United States dropped the bomb on Hiroshima in August 1945–before it even conducted the world’s first nuclear test in July of that year–it had started to worry about non-nuclear threats to its nascent nuclear force, in particular, Japanese air defenses. As the Cold War developed, fears multiplied to encompass threats to almost every component of the United States’ nuclear forces and C3I systems. While these threats emanated primarily from Moscow’s nuclear forces, they were exacerbated by its improving non-nuclear capabilities, particularly in the final decade of the Cold War. A two-decade hiatus in worry following the Soviet Union’s collapse is now over; today, non-nuclear threats to U.S. nuclear C3I assets–in particular, the growing capability of Chinese and Russian antisatellite weapons–are a major concern.
The United States’ experience is the norm. All nuclear-armed states have felt, and continue to feel, similar concerns. Indeed, the last few decades have seen the emergence of new potential vulnerabilities–this time in cyberspace–as nuclear weapons and C3I systems have come to rely increasingly on digital technology. To be sure, the networks involved in nuclear operations are almost certainly among the most secure anywhere. Yet there is broad agreement among technical experts that perfect network security is “impossible.” As a result, the possibility of cyber interference with nuclear forces and C3I systems is real.
The full article is published in the Spring 2020 issue of Daedalus.
About the Author
Jessica T. Mathews Chair, Co-director, Nuclear Policy Program
Acton holds the Jessica T. Mathews Chair and is co-director of the Nuclear Policy Program at the Carnegie Endowment for International Peace.
- Unpacking Trump’s National Security StrategyOther
- Trump Has an Out on Nuclear Testing. He Should Take It.Commentary
James M. Acton
Recent Work
Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Carnegie China
- Malaysia’s Year as ASEAN Chair: Managing DisorderCommentary
Malaysia’s chairmanship sought to fend off short-term challenges while laying the groundwork for minimizing ASEAN’s longer-term exposure to external stresses.
Elina Noor
- When It Comes to Superpower Geopolitics, Malaysia Is Staunchly NonpartisanCommentary
For Malaysia, the conjunction that works is “and” not “or” when it comes to the United States and China.
Elina Noor
- Neither Comrade nor Ally: Decoding Vietnam’s First Army Drill with ChinaCommentary
In July 2025, Vietnam and China held their first joint army drill, a modest but symbolic move reflecting Hanoi’s strategic hedging amid U.S.–China rivalry.
Nguyễn Khắc Giang
- China’s Mediation Offer in the Thailand-Cambodia Border Dispute Sheds Light on Beijing’s Security Role in Southeast AsiaCommentary
The Thai-Cambodian conflict highlights the limits to China's peacemaker ambition and the significance of this role on Southeast Asia’s balance of power.
Pongphisoot (Paul) Busbarat
- China Is Determined to Hold Firm Against Trump’s PressureCommentary
Beijing believes that Washington is overestimating its own leverage and its ability to handle the trade war’s impacts.
Rick Waters, Sheena Chestnut Greitens