- +18
James M. Acton, Saskia Brechenmacher, Cecily Brewer, …
{
"authors": [
"James M. Acton"
],
"type": "other",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [],
"englishNewsletterAll": "ctw",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "NPP",
"programs": [
"Nuclear Policy"
],
"projects": [],
"regions": [],
"topics": [
"Nuclear Policy",
"Foreign Policy"
]
}Source: Getty
Cyber Warfare and Inadvertent Escalation
The advent of cyber warfare exacerbates the risk that conventional wars could inadvertently lead to the use of nuclear weapons.
Source: Daedalus
Cyber weapons may be relatively new, but non-nuclear threats to nuclear weapons and their command, control, communication, and intelligence (C3I) systems are not. In fact, before the United States dropped the bomb on Hiroshima in August 1945–before it even conducted the world’s first nuclear test in July of that year–it had started to worry about non-nuclear threats to its nascent nuclear force, in particular, Japanese air defenses. As the Cold War developed, fears multiplied to encompass threats to almost every component of the United States’ nuclear forces and C3I systems. While these threats emanated primarily from Moscow’s nuclear forces, they were exacerbated by its improving non-nuclear capabilities, particularly in the final decade of the Cold War. A two-decade hiatus in worry following the Soviet Union’s collapse is now over; today, non-nuclear threats to U.S. nuclear C3I assets–in particular, the growing capability of Chinese and Russian antisatellite weapons–are a major concern.
The United States’ experience is the norm. All nuclear-armed states have felt, and continue to feel, similar concerns. Indeed, the last few decades have seen the emergence of new potential vulnerabilities–this time in cyberspace–as nuclear weapons and C3I systems have come to rely increasingly on digital technology. To be sure, the networks involved in nuclear operations are almost certainly among the most secure anywhere. Yet there is broad agreement among technical experts that perfect network security is “impossible.” As a result, the possibility of cyber interference with nuclear forces and C3I systems is real.
The full article is published in the Spring 2020 issue of Daedalus.
About the Author
Jessica T. Mathews Chair, Co-director, Nuclear Policy Program
Acton holds the Jessica T. Mathews Chair and is co-director of the Nuclear Policy Program at the Carnegie Endowment for International Peace.
- Unpacking Trump’s National Security StrategyOther
- Trump Has an Out on Nuclear Testing. He Should Take It.Commentary
James M. Acton
Recent Work
Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Carnegie Endowment for International Peace
- Taking the Pulse: Is the EU Ready for Rapprochement With the UK?Commentary
Closer EU-UK ties could help address urgent European concerns. But is the EU ready for rapprochement with the United Kingdom?
Rym Momtaz, ed.
- Duterte’s Populist Foreign Policy as Illiberal Defiance: Consequences and ProspectsPaper
In the Philippines, Duterte-era discourse emphasizing sovereignty, anti-Western skepticism, and strongman diplomacy mirrors tenets of populist foreign policy around the world.
Aries A. Arugay
- France, Italy, and Spain Should Use Force in LebanonCommentary
Europe has been standing by while its Southern neighborhood is being redrawn by force. To establish a path to peace between Israel and Lebanon, it’s time for Europeans to get involved with hard power.
Rym Momtaz
- What’s Having More Impact on Russian Oil Export Revenues: Ukrainian Strikes or Rising Prices?Commentary
Although Ukrainian strikes have led to a noticeable decline in the physical volume of Russian oil exports, the rise in prices has more than made up for it.
Sergey Vakulenko
- The U.S. Export-Import Bank Was Built for a Different Era. Here's How to Fix It.Commentary
Five problems—and solutions—to make it actually work as a tool of great power competition.
Afreen Akhter