- +18
James M. Acton, Saskia Brechenmacher, Cecily Brewer, …
{
"authors": [
"James M. Acton"
],
"type": "other",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [],
"englishNewsletterAll": "ctw",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "NPP",
"programs": [
"Nuclear Policy"
],
"projects": [],
"regions": [],
"topics": [
"Nuclear Policy",
"Foreign Policy"
]
}Source: Getty
Cyber Warfare and Inadvertent Escalation
The advent of cyber warfare exacerbates the risk that conventional wars could inadvertently lead to the use of nuclear weapons.
Source: Daedalus
Cyber weapons may be relatively new, but non-nuclear threats to nuclear weapons and their command, control, communication, and intelligence (C3I) systems are not. In fact, before the United States dropped the bomb on Hiroshima in August 1945–before it even conducted the world’s first nuclear test in July of that year–it had started to worry about non-nuclear threats to its nascent nuclear force, in particular, Japanese air defenses. As the Cold War developed, fears multiplied to encompass threats to almost every component of the United States’ nuclear forces and C3I systems. While these threats emanated primarily from Moscow’s nuclear forces, they were exacerbated by its improving non-nuclear capabilities, particularly in the final decade of the Cold War. A two-decade hiatus in worry following the Soviet Union’s collapse is now over; today, non-nuclear threats to U.S. nuclear C3I assets–in particular, the growing capability of Chinese and Russian antisatellite weapons–are a major concern.
The United States’ experience is the norm. All nuclear-armed states have felt, and continue to feel, similar concerns. Indeed, the last few decades have seen the emergence of new potential vulnerabilities–this time in cyberspace–as nuclear weapons and C3I systems have come to rely increasingly on digital technology. To be sure, the networks involved in nuclear operations are almost certainly among the most secure anywhere. Yet there is broad agreement among technical experts that perfect network security is “impossible.” As a result, the possibility of cyber interference with nuclear forces and C3I systems is real.
The full article is published in the Spring 2020 issue of Daedalus.
About the Author
Jessica T. Mathews Chair, Co-director, Nuclear Policy Program
Acton holds the Jessica T. Mathews Chair and is co-director of the Nuclear Policy Program at the Carnegie Endowment for International Peace.
- Unpacking Trump’s National Security StrategyOther
- Trump Has an Out on Nuclear Testing. He Should Take It.Commentary
James M. Acton
Recent Work
Carnegie India does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Carnegie India
- The Impact of U.S. Sanctions and Tariffs on India’s Russian Oil ImportsCommentary
This piece examines India’s response to U.S. sanctions and tariffs, specifically assessing the immediate market consequences, such as alterations in import costs, and the broader strategic implications for India’s energy security and foreign policy orientation.
Vrinda Sahai
- NISAR Soars While India-U.S. Tariff Tensions SimmerCommentary
On July 30, 2025, the United States announced 25 percent tariffs on Indian goods. While diplomatic tensions simmered on the trade front, a cosmic calm prevailed at the Sriharikota launch range. Officials from NASA and ISRO were preparing to launch an engineering marvel into space—the NASA-ISRO Synthetic Aperture Radar (NISAR), marking a significant milestone in the India-U.S. bilateral partnership.
Tejas Bharadwaj
- Indian Airstrikes in Pakistan: May 7, 2025Commentary
On May 7, 2025, between 1:05 and 1:30 a.m. (IST), airstrikes carried out by the Indian Air Force hit nine locations inside Pakistan and Pakistan occupied Kashmir (PoK). It was codenamed Operation Sindoor.
Rudra Chaudhuri
- Views From Taipei: Essays by Young Indian Scholars on ChinaResearch
This compendium brings together three essays by scholars who participated in Carnegie India's Security Studies Dialogue in 2024, each examining a different aspect of China’s policies. Drawing on their expertise and research, the authors offer fresh perspectives on key geopolitical challenges.
- +1
Vijay Gokhale, Suyash Desai, Amit Kumar, …
- The India-U.S. TRUST Initiative: Advancing Semiconductor Supply Chain CooperationCommentary
As part of the TRUST initiative, leaders of the two countries committed to building trusted and resilient supply chains, including for semiconductors and critical minerals. India and the United States have made steady progress in this area over the years. This essay explores the takeaways from discussions on semiconductor supply chains that took place at Carnegie India’s 9th Global Technology Summit.
Konark Bhandari