SlideShare a Scribd company logo
Jeremy Castellanos
Based on the articles assigned this week, the current threat of
nuclear weapons being acquired and used in a terrorist attack is
low for several reasons. The Department of Defense defines a
nuclear weapon as “a complete assembly (i.e., implosion type,
gun type, or thermonuclear type), in its intended ultimate
configuration which, upon completion of the prescribed arming,
fusing, and firing sequence, is capable of producing the
intended nuclear reaction and release of energy.” (Joint
Publication 3-11)
Nuclear weapons and material are very hard to acquire and have
intense security. Although more countries around the world
continue to develop their own nuclear weapon capabilities, it is
very unlikely for a country to give nuclear weapons or materials
to a terrorist organization. To give a terrorist organization
nuclear capabilities is not only very dangerous because
terrorists do not abide by any laws or treaties, but is also likely
to force a war with opposing countries. There are signed
treaties that prevent nuclear proliferation and testing.
The United States has so many different organizations within
the Intelligence Community, such as the Federal Bureau of
Investigation and the Department of Energy that have dedicated
units both home and overseas locking down and securing
nuclear materials. The United States has an overall mindset, that
if we possess nuclear weapons there is a chance that a terrorist
organization can too. This is in large due to the rhetoric of our
policy makers and media. Although they are trying to take
preventive measures, they make terrorist organizations seem
more deadly than what they truly are. If everything is a threat,
then nothing is a threat.
I think that terrorist trying to achieve nuclear weapons is too
hard and is not cost effective. Take for example DAESH right
now. They can barely hold their stronghold of Mosul, Iraq and
for them to effectively provide logistics, finances and the
manpower needed to acquire and build a nuclear weapon is
unlikely. They are going to resort to improvised explosive
devices (IEDs), vehicle-borne IEDs (VBIEDs), small arms fire
and tunnels to continue their operations.
References:
Huessy, P. (2013). Nuclear Zero: World Peace or World Chaos.
Family Security Matters, 8.
Wilner, A. S. (2012). Apocalypse Soon? Deterring Nuclear Iran
and its Terrorist. Proxies.
Comparative Strategy, 31 (1)
Aaron Baca
For this week’s discussion I chose an article called “Are We
Prepared?” from the Center for the Study of Weapons of Mass
Destruction (WMD). This article evolves around an evaluation
of four scenarios involving the potential threat of WMDs
occurring in the US. The scenarios include the collapse of the
Nonproliferation Regime, Failed WMD-armed State, Biological
Terror Campaign and a Nuclear Detonation in a US City. The
issues regarding these situations combined can create
incomparable obstacles, not only for the US, but for other
countries around the world combating WMD. Moreover, as the
US moves forward, the alarming issues that these four scenarios
explain, is the fact that the US is not prepared here in the US or
abroad. While there has been progress over the years for the US
in the likes of procedures and capabilities that depicted Cold
War technologies, such as WMD-related programs; government
assets across the whole spectrum has been unsuccessful.
As the US looks forward, the threat continues to develop,
Iran and North Korea progresses on their nuclear programs,
while Al Qaeda continues to be attracted to WMD’s. Even
though several of the states continue to refuse the liking to
produce nuclear, chemical and biological weapons, the fact
remains clear technology, vulnerable and uneasy states can be
the driving force for proliferation and where WMDs could end
up in the wrong hands, not just the likes of Terrorist
Organizations, but other more sophisticated countries as well.
The coming years could be challenging for the US, but the
fact remains clear that policies and procedures for the Cold War
era should not be used and the US must anticipate a properness
plan that reflects each scenario while also developing suitable
approaches, tactics and capabilities; effective procedures will
ensure that partners can rely on the US for security and help if
needed.
Aaron
Reference
Center for the Study of Weapons of Mass Destruction. (2009).
Are We Prepared?. http://wmdcenter.ndu.edu.
John Doherty
The current threat of terrorist acquiring and using weapons of
mass destruction is a very real and scary threat. A lot of
countries do not have the same resources and security that the
United States have so it can be difficult for them to secure
certain materials. In 2006 a material known as highly enriched
uranium was actually seized from a Russian national in Georgia.
Whoever stole the highly enriched uranium and tried to sell it
made a very dangerous decision. The fact that highly enriched
uranium was stolen is a very serious threat. It does not take a
lot of highly enriched uranium to build a nuclear weapon. What
is even scarier is the fact that terrorist organizations can
actually build a nuclear weapon using highly enriched uranium
pretty much by themselves without any help from outside
sources. So the question is who stole the highly enriched
uranium? At the time of the incident all figures pointed to
Russia, but of course they dismissed those reports. Some
sources believe that the seizure of the highly enriched uranium
was the result of a sting operation by Georgia who believed
Russia was looking for someone to buy the highly enriched
uranium. An undercover Georgia agent was able to convince the
seller the he was Muslim and the Russian national ended up
selling him the highly enriched uranium. We have to ask
ourselves, where did this highly enriched uranium come from?
Georgia attempted to seek help form Russian and the United
States, but Russia did not do a very good job at helping. One
must ask themselves why did Russia not want to help out?
Throughout the years Georgia has seized uranium and it needs
to be figured out how these people are obtaining it. This all
leads to the question of how does the United States protect its
self from potential attacks? It is extremely difficult to prevent
terrorist from obtaining materials that can build weapons of
mass destruction. Highly enriched uranium is used throughout
the world for numerous types of things. This makes it extremely
difficult for the United States and the rest of the world to keep
track of it.
References
Sokova, E., Potter, W., & Chuen, C. (2007). Recent Weapons
Grade Uranium Smuggling Case: Nuclear Materials are Still on
the Loose. Retrieved from
https://edge.apus.edu/access/content/group/333985/Lesson%207
%20Readings%20and%20Resources/CNS%20Research%20Story
.pdf
Jeremy Phillips
With the dissolution of the Soviet Union, there was a flood of
weapons on the world stage. Russia began research and
development in the 1960’s to miniaturize their nuclear weapons.
With the Soviet Union dissolving a lot of these “suitcase” nukes
were unaccounted for. Per Quora.com, “The possibly missing
suitcase nukes were particularly troubling. They were small (30
- 50 kilograms), easily portable, had a yield of half a kiloton to
2 kilotons and lacked the safeguards to prevent accidental or
unauthorized detonation that other Russian nuclear weapons
had. Who controlled the weapons was also troubling: they were
variously described as being controlled by Soviet Special
Forces or the KGB. (Warinner , 2012)” The article later
mentions that, “Loose Russian nukes are not really the big
worry of governments now; nuclear materials like plutonium,
enriched uranium and other radioactive materials are more
worrying. (Warinner, 2012).” This is concerning in relation to
North Korea. It is not a secret that North Korea and the former
Soviet Union have had a relationship and that the Soviet Union
has been supportive of the efforts of North Korean
leadership…the big question is how supportive have they been
and how much/if any nuclear material/assets have been provided
to North Korea.
North Korea was always rattling their saber to demonstrate their
power, but with their lack of resources, and know how, it’s hard
to say how viable the threat is from them. Terrorist on the other
hand are a wild card. As mentioned earlier, there are concerns
with a terrorist organization getting ahold of nuclear material,
but I feel that it would be used in an RDD rather than a full up,
viable nuclear weapon. The footprint that this process would
create would be extremely difficult to conceal and carry out. In
our reading in discusses the “small” (one to four kilograms
(FAS n.d)) amount of radioactive material necessary to
manufacture a nuclear weapon, but this is still fissile material,
and not something that can be kept concealed very easily.
In conclusion, seeing the difficulties that North Korea has faced
in developing their nuclear weapons program, I feel that a
viable nuclear weapon isn’t as attractive to a terrorist
organization as an RDD would be.
References:
Warinner, A. (Sep 2012) How many nuclear weapons were
unaccounted for after the collapse of the Soviet Union?
Retrieved from: https://www.quora.com/How-many-nuclear-
weapons-were-unaccounted-for-after-the-collapse-of-the-Soviet-
Union
FAS (n.d.) Nuclear Weapon Design. Retrieved from:
http://www.fas.org/nuke/intro/nuke/design.htm
Jeremy CastellanosBased on the articles assigned this week, .docx

More Related Content

Similar to Jeremy CastellanosBased on the articles assigned this week, .docx

Evaluating Nuclear and Great War Power
Evaluating Nuclear and Great War PowerEvaluating Nuclear and Great War Power
Evaluating Nuclear and Great War PowerLauren Beaugh
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
Abdelhamied El-Rafie
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
Abdelhamied El-Rafie
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
aryan532920
 
Weapons Of Mass Destruction
Weapons Of Mass DestructionWeapons Of Mass Destruction
Weapons Of Mass Destruction
guestba7a82
 
Eu us denuclear diplomacy and the future of global security in post-cold war ...
Eu us denuclear diplomacy and the future of global security in post-cold war ...Eu us denuclear diplomacy and the future of global security in post-cold war ...
Eu us denuclear diplomacy and the future of global security in post-cold war ...
Alexander Decker
 

Similar to Jeremy CastellanosBased on the articles assigned this week, .docx (6)

Evaluating Nuclear and Great War Power
Evaluating Nuclear and Great War PowerEvaluating Nuclear and Great War Power
Evaluating Nuclear and Great War Power
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 
Weapons Of Mass Destruction
Weapons Of Mass DestructionWeapons Of Mass Destruction
Weapons Of Mass Destruction
 
Eu us denuclear diplomacy and the future of global security in post-cold war ...
Eu us denuclear diplomacy and the future of global security in post-cold war ...Eu us denuclear diplomacy and the future of global security in post-cold war ...
Eu us denuclear diplomacy and the future of global security in post-cold war ...
 

More from christiandean12115

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
christiandean12115
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
christiandean12115
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
christiandean12115
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
christiandean12115
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
christiandean12115
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
christiandean12115
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx
christiandean12115
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
christiandean12115
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
christiandean12115
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
christiandean12115
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
christiandean12115
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
christiandean12115
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
christiandean12115
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
christiandean12115
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
christiandean12115
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
christiandean12115
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
christiandean12115
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
christiandean12115
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
christiandean12115
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx
christiandean12115
 

More from christiandean12115 (20)

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Jeremy CastellanosBased on the articles assigned this week, .docx

  • 1. Jeremy Castellanos Based on the articles assigned this week, the current threat of nuclear weapons being acquired and used in a terrorist attack is low for several reasons. The Department of Defense defines a nuclear weapon as “a complete assembly (i.e., implosion type, gun type, or thermonuclear type), in its intended ultimate configuration which, upon completion of the prescribed arming, fusing, and firing sequence, is capable of producing the intended nuclear reaction and release of energy.” (Joint Publication 3-11) Nuclear weapons and material are very hard to acquire and have intense security. Although more countries around the world continue to develop their own nuclear weapon capabilities, it is very unlikely for a country to give nuclear weapons or materials to a terrorist organization. To give a terrorist organization nuclear capabilities is not only very dangerous because terrorists do not abide by any laws or treaties, but is also likely to force a war with opposing countries. There are signed treaties that prevent nuclear proliferation and testing. The United States has so many different organizations within the Intelligence Community, such as the Federal Bureau of Investigation and the Department of Energy that have dedicated units both home and overseas locking down and securing nuclear materials. The United States has an overall mindset, that if we possess nuclear weapons there is a chance that a terrorist organization can too. This is in large due to the rhetoric of our policy makers and media. Although they are trying to take preventive measures, they make terrorist organizations seem more deadly than what they truly are. If everything is a threat, then nothing is a threat.
  • 2. I think that terrorist trying to achieve nuclear weapons is too hard and is not cost effective. Take for example DAESH right now. They can barely hold their stronghold of Mosul, Iraq and for them to effectively provide logistics, finances and the manpower needed to acquire and build a nuclear weapon is unlikely. They are going to resort to improvised explosive devices (IEDs), vehicle-borne IEDs (VBIEDs), small arms fire and tunnels to continue their operations. References: Huessy, P. (2013). Nuclear Zero: World Peace or World Chaos. Family Security Matters, 8. Wilner, A. S. (2012). Apocalypse Soon? Deterring Nuclear Iran and its Terrorist. Proxies. Comparative Strategy, 31 (1) Aaron Baca For this week’s discussion I chose an article called “Are We Prepared?” from the Center for the Study of Weapons of Mass Destruction (WMD). This article evolves around an evaluation of four scenarios involving the potential threat of WMDs occurring in the US. The scenarios include the collapse of the Nonproliferation Regime, Failed WMD-armed State, Biological Terror Campaign and a Nuclear Detonation in a US City. The issues regarding these situations combined can create incomparable obstacles, not only for the US, but for other
  • 3. countries around the world combating WMD. Moreover, as the US moves forward, the alarming issues that these four scenarios explain, is the fact that the US is not prepared here in the US or abroad. While there has been progress over the years for the US in the likes of procedures and capabilities that depicted Cold War technologies, such as WMD-related programs; government assets across the whole spectrum has been unsuccessful. As the US looks forward, the threat continues to develop, Iran and North Korea progresses on their nuclear programs, while Al Qaeda continues to be attracted to WMD’s. Even though several of the states continue to refuse the liking to produce nuclear, chemical and biological weapons, the fact remains clear technology, vulnerable and uneasy states can be the driving force for proliferation and where WMDs could end up in the wrong hands, not just the likes of Terrorist Organizations, but other more sophisticated countries as well. The coming years could be challenging for the US, but the fact remains clear that policies and procedures for the Cold War era should not be used and the US must anticipate a properness plan that reflects each scenario while also developing suitable approaches, tactics and capabilities; effective procedures will ensure that partners can rely on the US for security and help if needed. Aaron Reference Center for the Study of Weapons of Mass Destruction. (2009). Are We Prepared?. http://wmdcenter.ndu.edu.
  • 4. John Doherty The current threat of terrorist acquiring and using weapons of mass destruction is a very real and scary threat. A lot of countries do not have the same resources and security that the United States have so it can be difficult for them to secure certain materials. In 2006 a material known as highly enriched uranium was actually seized from a Russian national in Georgia. Whoever stole the highly enriched uranium and tried to sell it made a very dangerous decision. The fact that highly enriched uranium was stolen is a very serious threat. It does not take a lot of highly enriched uranium to build a nuclear weapon. What is even scarier is the fact that terrorist organizations can actually build a nuclear weapon using highly enriched uranium pretty much by themselves without any help from outside sources. So the question is who stole the highly enriched uranium? At the time of the incident all figures pointed to Russia, but of course they dismissed those reports. Some sources believe that the seizure of the highly enriched uranium was the result of a sting operation by Georgia who believed Russia was looking for someone to buy the highly enriched uranium. An undercover Georgia agent was able to convince the seller the he was Muslim and the Russian national ended up selling him the highly enriched uranium. We have to ask ourselves, where did this highly enriched uranium come from? Georgia attempted to seek help form Russian and the United States, but Russia did not do a very good job at helping. One must ask themselves why did Russia not want to help out? Throughout the years Georgia has seized uranium and it needs to be figured out how these people are obtaining it. This all leads to the question of how does the United States protect its
  • 5. self from potential attacks? It is extremely difficult to prevent terrorist from obtaining materials that can build weapons of mass destruction. Highly enriched uranium is used throughout the world for numerous types of things. This makes it extremely difficult for the United States and the rest of the world to keep track of it. References Sokova, E., Potter, W., & Chuen, C. (2007). Recent Weapons Grade Uranium Smuggling Case: Nuclear Materials are Still on the Loose. Retrieved from https://edge.apus.edu/access/content/group/333985/Lesson%207 %20Readings%20and%20Resources/CNS%20Research%20Story .pdf Jeremy Phillips With the dissolution of the Soviet Union, there was a flood of weapons on the world stage. Russia began research and development in the 1960’s to miniaturize their nuclear weapons. With the Soviet Union dissolving a lot of these “suitcase” nukes were unaccounted for. Per Quora.com, “The possibly missing suitcase nukes were particularly troubling. They were small (30 - 50 kilograms), easily portable, had a yield of half a kiloton to 2 kilotons and lacked the safeguards to prevent accidental or unauthorized detonation that other Russian nuclear weapons had. Who controlled the weapons was also troubling: they were variously described as being controlled by Soviet Special Forces or the KGB. (Warinner , 2012)” The article later mentions that, “Loose Russian nukes are not really the big worry of governments now; nuclear materials like plutonium, enriched uranium and other radioactive materials are more worrying. (Warinner, 2012).” This is concerning in relation to
  • 6. North Korea. It is not a secret that North Korea and the former Soviet Union have had a relationship and that the Soviet Union has been supportive of the efforts of North Korean leadership…the big question is how supportive have they been and how much/if any nuclear material/assets have been provided to North Korea. North Korea was always rattling their saber to demonstrate their power, but with their lack of resources, and know how, it’s hard to say how viable the threat is from them. Terrorist on the other hand are a wild card. As mentioned earlier, there are concerns with a terrorist organization getting ahold of nuclear material, but I feel that it would be used in an RDD rather than a full up, viable nuclear weapon. The footprint that this process would create would be extremely difficult to conceal and carry out. In our reading in discusses the “small” (one to four kilograms (FAS n.d)) amount of radioactive material necessary to manufacture a nuclear weapon, but this is still fissile material, and not something that can be kept concealed very easily. In conclusion, seeing the difficulties that North Korea has faced in developing their nuclear weapons program, I feel that a viable nuclear weapon isn’t as attractive to a terrorist organization as an RDD would be. References: Warinner, A. (Sep 2012) How many nuclear weapons were unaccounted for after the collapse of the Soviet Union? Retrieved from: https://www.quora.com/How-many-nuclear- weapons-were-unaccounted-for-after-the-collapse-of-the-Soviet- Union FAS (n.d.) Nuclear Weapon Design. Retrieved from: http://www.fas.org/nuke/intro/nuke/design.htm