SlideShare a Scribd company logo
1 of 1
Download to read offline
Alternate Nuclear Proliferation Pathways
in the Age of Non-State Actors
Elie Katzenson, James Bevins, Bethany L. Goldblum, Tom Hickey, James Kendrick,
Nathaniel Mahowald, Rebecca Krentz-Wee, Sarah Laderman, Yubing Tian
Nuclear Science and Security Consortium, University of California, Berkeley, California 94704, USA
Motivations
• The current U.S. administration and
international community have made the
prevention of nuclear terrorism a
priority starting in 2010
• Though indigenous development of
special nuclear material has historically been
viewed as unviable for a non-state actor,
the capabilities and resources of non-state
actors continue to increase
• To assist in developing appropriate policies
and approaches to limiting the threat of
nuclear terrorism, this research explores and
compares pathways to indigenous
development given non-state actors’
capabilities, resources, and stated goals
Scope
Figure 1: Representation of nuclear fuel cycle pathways for de-
velopment of special nuclear material
• Fig. 1 represents the pathways to develop special
nuclear material for weapons development
• Red-shaded region shows the fuel cycle steps
required for the Plutonium pathway, which are
eliminated for the non-state actor scenario
• The four stages in blue represent the highly
enriched uranium (HEU) pathway explored in
this research
Research Metrics and Methods
Future Work
Completion of this research will result in a flexible
framework that can be used to evaluate prolifera-
tion pathways for indigenous development of HEU
by non-state actors. Key steps required for the com-
pletion of this research:
• Finalize the development of metric binning
structures relevant to ISIL and their occupied
territory
• Coding of the fuel cycle processes according to
the single-use fuel cycle concept
• Evaluation of the fuel cycle processes within a
coherent, scalable mathematical model resulting
in an assessment of the probability of indigenous
development of SNM and a relative comparison of
each pathway’s desirability
Contact Information
npwg.berkeley.edu
eliekatzenson@berkeley.edu
Acknowledgments
This material is based upon work supported by the Department of Energy National Nuclear Security Ad-
ministration through the Nuclear Science and Security Consortium under Award Number(s) DENA0000979.
1
This report was prepared as an account of work sponsored by an agency of the United States Government.
Neither the United States Government nor any agency thereof, nor any of their employees, makes any war-
ranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not
infringe privately owned rights. Reference herein to any specific commercial product, process, or service by
trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or any agency thereof. The views and opin-
ions of authors expressed herein do not necessarily state or reflect those of the United States Government
or any agency thereof.
At A Glance
Examination of the possibility of indigenous
development of special nuclear material given
the perceived capabilities and known
resources of non-state actors

More Related Content

Viewers also liked

Design como ferramenta para inovacao
Design como ferramenta para inovacaoDesign como ferramenta para inovacao
Design como ferramenta para inovacaoAlessandra Rosa
 
Follow up: How to write a blogpost people want to read
Follow up: How to write a blogpost people want to readFollow up: How to write a blogpost people want to read
Follow up: How to write a blogpost people want to readFuture Earth
 
عشرون سنة في التعامل مع الزوجة
 عشرون سنة في التعامل مع الزوجة عشرون سنة في التعامل مع الزوجة
عشرون سنة في التعامل مع الزوجةMohammad Ihmeidan
 
Eye-catching science: Finding the visual story in your data
Eye-catching science: Finding the visual story in your dataEye-catching science: Finding the visual story in your data
Eye-catching science: Finding the visual story in your dataFuture Earth
 
How to write a science blogpost people want to read
How to write a science blogpost  people want to readHow to write a science blogpost  people want to read
How to write a science blogpost people want to readFuture Earth
 
CARO,2016 (revised)
CARO,2016 (revised)CARO,2016 (revised)
CARO,2016 (revised)Divesh Gupta
 
Writing scientific commentaries
Writing scientific commentariesWriting scientific commentaries
Writing scientific commentariesFuture Earth
 
Autism apps.technologies
Autism apps.technologiesAutism apps.technologies
Autism apps.technologiesMarta Montoro
 
Control de CRED en adolescentes
Control de CRED en adolescentesControl de CRED en adolescentes
Control de CRED en adolescentesinsn
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 

Viewers also liked (14)

Determinación del caudal de diseño
Determinación del caudal de diseñoDeterminación del caudal de diseño
Determinación del caudal de diseño
 
Design como ferramenta para inovacao
Design como ferramenta para inovacaoDesign como ferramenta para inovacao
Design como ferramenta para inovacao
 
Follow up: How to write a blogpost people want to read
Follow up: How to write a blogpost people want to readFollow up: How to write a blogpost people want to read
Follow up: How to write a blogpost people want to read
 
عشرون سنة في التعامل مع الزوجة
 عشرون سنة في التعامل مع الزوجة عشرون سنة في التعامل مع الزوجة
عشرون سنة في التعامل مع الزوجة
 
Bond Basics Seminar
Bond Basics SeminarBond Basics Seminar
Bond Basics Seminar
 
Eye-catching science: Finding the visual story in your data
Eye-catching science: Finding the visual story in your dataEye-catching science: Finding the visual story in your data
Eye-catching science: Finding the visual story in your data
 
Analysis on caro 2016(p)
Analysis on caro 2016(p)Analysis on caro 2016(p)
Analysis on caro 2016(p)
 
How to write a science blogpost people want to read
How to write a science blogpost  people want to readHow to write a science blogpost  people want to read
How to write a science blogpost people want to read
 
CARO,2016 (revised)
CARO,2016 (revised)CARO,2016 (revised)
CARO,2016 (revised)
 
Writing scientific commentaries
Writing scientific commentariesWriting scientific commentaries
Writing scientific commentaries
 
Autism apps.technologies
Autism apps.technologiesAutism apps.technologies
Autism apps.technologies
 
Saneamiento 9 exposicion
Saneamiento 9 exposicionSaneamiento 9 exposicion
Saneamiento 9 exposicion
 
Control de CRED en adolescentes
Control de CRED en adolescentesControl de CRED en adolescentes
Control de CRED en adolescentes
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 

Similar to alternate-nuclear-proliferation-2

sc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxsc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxRiddhiRathod36
 
The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012Caveon Test Security
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
 
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Test Security
 
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...South Shore Clean Cities
 
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...PatriciaEsteveGonzal
 
Energy report-january-2012
Energy report-january-2012Energy report-january-2012
Energy report-january-2012Andy Varoshiotis
 
1 POLICY MEMORANDUM SAMPLES .docx
1 POLICY MEMORANDUM SAMPLES .docx1 POLICY MEMORANDUM SAMPLES .docx
1 POLICY MEMORANDUM SAMPLES .docxoswald1horne84988
 
The 50 States of Solar_FINAL
The 50 States of Solar_FINALThe 50 States of Solar_FINAL
The 50 States of Solar_FINALJim Kennerly
 
Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Katrina Savarino
 
chp_critical_facilities_final
chp_critical_facilities_finalchp_critical_facilities_final
chp_critical_facilities_finalgdillin
 
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...NGA Report: State Practices to Protect Drinking Water While Developing Shale ...
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...Marcellus Drilling News
 
2015 Conference Brochure
2015 Conference Brochure2015 Conference Brochure
2015 Conference BrochureLyle Birkey
 
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdf
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdfA-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdf
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdfMukeshSoni612499
 
Strong Angel III Final Report
Strong Angel III Final ReportStrong Angel III Final Report
Strong Angel III Final ReportDoug Hanchard
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 

Similar to alternate-nuclear-proliferation-2 (20)

sc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxsc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptx
 
The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
 
(NuClean) Nuclear Waste and the Defense Nuclear Legacy: an Overview of the Ch...
(NuClean) Nuclear Waste and the Defense Nuclear Legacy: an Overview of the Ch...(NuClean) Nuclear Waste and the Defense Nuclear Legacy: an Overview of the Ch...
(NuClean) Nuclear Waste and the Defense Nuclear Legacy: an Overview of the Ch...
 
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...
Soalr Ready NWI: U.S Department Of Energy SunShot Initiative Rooftop Solar Ch...
 
Avoiding a Crisis
Avoiding a CrisisAvoiding a Crisis
Avoiding a Crisis
 
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
 
Energy report-january-2012
Energy report-january-2012Energy report-january-2012
Energy report-january-2012
 
(NuClean) Assessment and Perception of Risks Associated with Spent Fuel and H...
(NuClean) Assessment and Perception of Risks Associated with Spent Fuel and H...(NuClean) Assessment and Perception of Risks Associated with Spent Fuel and H...
(NuClean) Assessment and Perception of Risks Associated with Spent Fuel and H...
 
1 POLICY MEMORANDUM SAMPLES .docx
1 POLICY MEMORANDUM SAMPLES .docx1 POLICY MEMORANDUM SAMPLES .docx
1 POLICY MEMORANDUM SAMPLES .docx
 
The 50 States of Solar_FINAL
The 50 States of Solar_FINALThe 50 States of Solar_FINAL
The 50 States of Solar_FINAL
 
Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014
 
chp_critical_facilities_final
chp_critical_facilities_finalchp_critical_facilities_final
chp_critical_facilities_final
 
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...NGA Report: State Practices to Protect Drinking Water While Developing Shale ...
NGA Report: State Practices to Protect Drinking Water While Developing Shale ...
 
2015 Conference Brochure
2015 Conference Brochure2015 Conference Brochure
2015 Conference Brochure
 
Hydraulic Fracturing in Michigan: Integrated Assessment
Hydraulic Fracturing in Michigan: Integrated AssessmentHydraulic Fracturing in Michigan: Integrated Assessment
Hydraulic Fracturing in Michigan: Integrated Assessment
 
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdf
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdfA-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdf
A-Guide-to-Developing-Domestic-Carbon-Crediting-Mechanisms.pdf
 
Strong Angel III Final Report
Strong Angel III Final ReportStrong Angel III Final Report
Strong Angel III Final Report
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 

alternate-nuclear-proliferation-2

  • 1. Alternate Nuclear Proliferation Pathways in the Age of Non-State Actors Elie Katzenson, James Bevins, Bethany L. Goldblum, Tom Hickey, James Kendrick, Nathaniel Mahowald, Rebecca Krentz-Wee, Sarah Laderman, Yubing Tian Nuclear Science and Security Consortium, University of California, Berkeley, California 94704, USA Motivations • The current U.S. administration and international community have made the prevention of nuclear terrorism a priority starting in 2010 • Though indigenous development of special nuclear material has historically been viewed as unviable for a non-state actor, the capabilities and resources of non-state actors continue to increase • To assist in developing appropriate policies and approaches to limiting the threat of nuclear terrorism, this research explores and compares pathways to indigenous development given non-state actors’ capabilities, resources, and stated goals Scope Figure 1: Representation of nuclear fuel cycle pathways for de- velopment of special nuclear material • Fig. 1 represents the pathways to develop special nuclear material for weapons development • Red-shaded region shows the fuel cycle steps required for the Plutonium pathway, which are eliminated for the non-state actor scenario • The four stages in blue represent the highly enriched uranium (HEU) pathway explored in this research Research Metrics and Methods Future Work Completion of this research will result in a flexible framework that can be used to evaluate prolifera- tion pathways for indigenous development of HEU by non-state actors. Key steps required for the com- pletion of this research: • Finalize the development of metric binning structures relevant to ISIL and their occupied territory • Coding of the fuel cycle processes according to the single-use fuel cycle concept • Evaluation of the fuel cycle processes within a coherent, scalable mathematical model resulting in an assessment of the probability of indigenous development of SNM and a relative comparison of each pathway’s desirability Contact Information npwg.berkeley.edu eliekatzenson@berkeley.edu Acknowledgments This material is based upon work supported by the Department of Energy National Nuclear Security Ad- ministration through the Nuclear Science and Security Consortium under Award Number(s) DENA0000979. 1 This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any war- ranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opin- ions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. At A Glance Examination of the possibility of indigenous development of special nuclear material given the perceived capabilities and known resources of non-state actors