Upload
voliem
View
218
Download
0
Embed Size (px)
Citation preview
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
1
ScienceandGlobalSecurityFromNuclearWeaponstoCyberwarfareandArtificialIntelligence
©MarkVallen,1980
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
2
ScienceandGlobalSecurityFromNuclearWeaponstoCyberwarfareandArtificialIntelligence
AlexanderGlaser
TuesdaysandThursdays,Bowl016,1:30–2:50p.m.
CoursedescriptionAdvances in science and technology over the past century have created manyunprecedentedandstillunresolvedglobalsecuritychallengesforpolicymakersandthepublic.The inventionofnuclearweaponsduringWorldWar II ledEinstein toconclude that “theunleashedpowerof theatomhas changedeverything saveourmodes of thinking.” Security concerns and government-sponsored researchprograms later combined to shape the Cold War arms race between the UnitedStates and Soviet Union. Many military and technical innovations resulted; theseinclude precision-guided intercontinental ballistic missiles, spy satellites, and theglobal positioning system (GPS), but also the modern electronic computer andcomputernetworks,whichbecamethebasisfortheinternet.Recentdevelopmentsin biotechnology and digital communication and control raise the prospect ofpossiblenewkindsofwarfare.This coursewillprovidestudentswithabasic technicalunderstandingof someofthe critical technologies that are relevant to national and global security andwillequipstudentswiththeskillstobetterassessthechallengeofdevelopingeffectivepolicies to manage such technologies. Case studies will interalia include nuclearweaponsandtheirproliferation,deliverysystemsforweaponsofmassdestruction,biotechnology and biosecurity, new media and crowdsourcing, autonomousweapons,superintelligence,andcyberwarfare.Whiletheemphasisofthiscoursewillbeonthesecuritychallengesposedbymanyofthesetechnologies,itwillalsoexploretheapplicationofsciencetoarmscontroland disarmament. Examples covered in class will include the potential of open-source satellite imagery, which has been effectively used for crowd-sourcingpurposes,andinternet-enabledapproachestoencouraginganonymousreporting.
Forrevisionsandupdates,gotonuclearfutures.princeton.edu/courses/wws353
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
3
CourseOverview
Week Date ID Topic Concept/Guest DUE
102/07 SettingtheStage
02/09 11 NuclearWeapons1:Principles
202/14 12 NuclearWeapons2:Effects
ScalinglawsHandout
02/16 13 NuclearWeapons3:Acquisition
302/21 14 NegotiatingaTreatyBanningNuclearWeapons (w/RayAcheson) PS1
02/23 21 Biological(andChemical)Weapons
402/28 22 Biotechnology,Biosecurity,andBioterrorism (w/AndyLeifer) PS2
03/02 23 DynamicsofInfectiousDiseases ModelingI
503/07 24 ExpertBriefings:BiosecurityandModeling (w/FeffermanandChyba) PS3
03/09 31 NuclearEnergyandNuclearProliferation1
603/14 32 NuclearEnergyandNuclearProliferation2(Casestudy) MakingSenseof
EquationsIPS4
03/16 Midtermexam(inclass) Midterm
SPRINGBREAK
703/28 41 DeliverySystems1:mostlyMissiles MakingSenseof
EquationsII
03/30 41 DeliverySystems2:mostlyMissiles(continued)
804/04 42 NuclearStrategyandDeterrence1 Handout
04/06 43 NuclearStrategyandDeterrence2:Wargame
904/11 51 Verification1:Satellites PS5
04/13 52 Verification2:EmergingTechnologiesandVirtualReality (w/TamaraPatton)
1004/18 61 TheFuture1:Cyberwarfare
04/20 62 TheFuture2:Cyberwarfare(KineticPwnage) (w/EdSkoudis)
1104/25 63 TheFuture3:MachineLearningandSuperintelligence
ModelingII
04/27 63 TheFuture4:MachineLearningandSuperintelligence
1205/02 TeamPresentations
05/04 TeamPresentations
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
4
AssignmentsWeeklyreadings,regularblogpostsorcomments;fiveproblemsets(mostlyinthefirsthalfofthesemester);midtermexaminclass;teamprojectsandpresentations(inthesecondhalfofthesemester);andfinalexam.ProblemsetsaredueTuesdaysbeforeclass.A24-hourdelaycarriesa20%penalty,a48-hourdelaycarriesa40%penalty;wedonotacceptproblemsetsafterwards.Studentscanworktogetheronproblemsetsingroupsofuptothreestudents,butsubmitseparateproblemsetsanddraft individualanswers toallquestions.Whenworkingingroups,listnamesoftheotherteammembersonthefirstpage.
Prerequisites
Noprerequisites
Grading(tentativebreakdown)
Problemsets: 20%Midtermexam(inclass): 15%Teamprojects: 15%Finalexam(closedbook): 25%Blogposts,comments,annotatedsyllabus: 10%Class/preceptparticipation: 15%
Readings;Blogpostsandcomments;AnnotatedsyllabusMost readings and media required for this course are available online, eitherdirectly(withopenaccess)orthroughPrincetonUniversity.AllotherreadingsareorwillbeavailableonBlackboard;thesearemarkedwith(BB)below.Eachweek,twostudentstaketheleadonblogging,dueMondays,9:00a.m.,andallotherscanrespondbyWednesday,9:00a.m.Foramaximumblogscore,5contributionpointsareneededbytheendofthesemester(1pointforeachblogcomment;2pointsforpostinganinitialentry).Upto3additionalpointswillbeawardedattheendofthesemester for particularly thoughtful contributions. Students are encouraged toannotateahardcopyof thesyllabuswithshortcommentsontheusefulnessof thereadings;thiswillhelpusimprovetheassignmentsfornextyear(2points).
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
5
WeeklyScheduleandReadings
SettingtheStage:Science,Technology,andtheDoomsdayRisk(Feb.7)
Advances in science and technology have always played an important role inshaping thenature ofwarfare, but a fundamentallynewdimension emergedwiththe invention of nuclear weapons in the 1940s and, as the nuclear arsenalsexpanded, therespectivecapability fornearly-instantglobaldevastation.Sincetheend of Cold War, many global security challenges have evolved but, as formerPresident Obama pointed out in 2009, “in a strange turn of history, the threat ofglobalnuclearwarhasgonedown,buttheriskofanuclearattackhasgoneup.”Newtechnologiesarenowemergingthatcouldagaintransformtheconditionsofglobalsecurity. These developments can be disruptive (aswith the invention of nuclearweapons) or gradual as with the increasing significance of autonomousweaponsandartificialintelligence.Thedual-usenatureofmanyrelevanttechnologiesfurtherhighlightsthecomplexityofsoundpolicy-making.Tosetthestageforthetopicsandissuescoveredthissemester,wewillbrieflyexplorethedifferenttypesofsecuritythreats today, theperceptionandprioritizationofrelevantrisks,andtheresultingchallengesforeffectivepolicymaking.Readings(fortoday,onlyrecommended):• ItisTwoandaHalfMinutestoMidnight,2017DoomsdayClockStatement,Science
andSecurityBoard,BulletinoftheAtomicScientists,January26,2017,thebulletin.org.
Moretoexplore:Hereandbelow,“moretoexplore”readingsandvideosarenotrequired!• RemarksbyPresidentObamaatHiroshimaPeaceMemorial,HiroshimaPeace
Memorial,Hiroshima,Japan,May27,2016.
• Figures1–3andSections3.1and3.2inPart3(EmergingTechnologies)inGlobalRisks2017,12thEdition,WorldEconomicForum,Geneva,2017,reports.weforum.org/global-risks-2017andwww3.weforum.org/docs/GRR17_Report_web.pdf.
• Welcometo2035...TheAgeofSurprises,UnitedStatesAirForce,CenterforStrategyandTechnologies,Video/Commercial,2min,2012,www.youtube.com/watch?v=9Xpu2QqLnHY.
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
6
Unit1:NuclearWeapons(Feb.9,Feb.14,Feb.16,andFeb.21)
Shortlyafterthediscoveryofnuclearfissioninthelate1930s,itbecameclearthatthe process could, in principle, unfold in an explosive chain reaction and releaselarge amounts of energy. At the time, itwas unknown, however, just howhard itwould be to make the fissile material (highly enriched uranium or plutonium)needed for a nuclear weapon. During World War II, the U.S. Manhattan projectdemonstrated the technical basis of large-scale fissile material production(includingthefeasibilityofoperatingnuclearreactors)andledtothedevelopmentand use of the first nuclearweapons in 1945. The Soviet Union demonstrated itsnuclearcapability in1949,andmilitaryplannersonbothsidesbegan to integratetheseweapons into theirwar-fighting arsenals. The emerging arms race betweenthe superpowers further escalated in scale with the invention of the hydrogenbomb,whichwouldincreasetheyieldofnuclearweaponsseveralhundred-fold.Thedestructiveeffectsofnuclearweaponsremainunparalleled; they involveairblast,heat,andnuclearradiation.Keywords:Nuclear fissionprocess; radioactivity;effectsofnuclearweapons;medicaland climatic impact of nuclear war; nuclear reactors, nuclear fuels, uraniumenrichment,plutoniumproduction.NuclearWeapons1:Principles(Feb.9).Inthisunit,weexploretheprinciplesofnuclearfissionandtheconceptofanuclearchainreaction,estimatethetimescaleoftheprocesses involved,anddeterminetheamountofenergyreleased inanuclearexplosion.Wecanthenalsoestimatetheso-calledcriticalmassandtheapproximateamountofmaterialneededtomakeanuclearbomb.Readings:• HenryStimson(SecretaryofWar),MemorandumDiscussedwiththePresident,
April25,1945,nsarchive.gwu.edu.
• JonathanFetter-Vorm,Trinity:AGraphicHistoryoftheFirstAtomicBomb,HillandWang,2012,pp.39–61.(BB)
• KostaTsipsis,“ThePhysicsofaNuclearExplosion,”Chapter2inArsenal:UnderstandingWeaponsintheNuclearAge,SimonandSchuster,NewYork,1983.(BB)ALTERNATIVELY:
• “NuclearPhysics”(C.2)inAppendixC(“BasicNuclearPhysicsandWeaponsEffects”),NuclearMattersHandbook2016,U.S.DepartmentofEnergy,Washington,DC,2016,www.acq.osd.mil/ncbdp/nm/NMHB.
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
7
Moretoexplore:• RichardRhodes,TheMakingoftheAtomicBomb,Simon&Schuster,1995.
• S.GlasstoneandL.M.Redman,AnIntroductiontoNuclearWeapons,WASH-1037
Revised,U.S.AtomicEnergyCommission,Washington,DC,June1972.
• RobertSerber,TheLosAlamosPrimer:TheFirstLecturesonHowtoBuildanAtomicBomb,UniversityofCalifornia,Berkeley,1992.
NuclearWeapons2:Effects(Feb.14).Whathappens if theenergyequivalentof20,000 tons of high explosive is released within one millionth of a second in avolume of one cubic foot? In this session, we will examine the effects of nuclearexplosions, which involve air blast, heat, and nuclear radiation, and discuss theconsequencesofregionalandglobalnuclearwar.Readings:• StatementbythePresidentoftheUnitedStates,WhiteHousePressRelease,
August6,1945.(BB)
• J.RobertOppenheimer,RecollectionoftheTrinityTest(“NowIambecomeDeath,thedestroyerofworlds”),TelevisionBroadcast,1min,1965,www.youtube.com.
• RETROReport,“NuclearWinter,”NewYorkTimes,April4,2016,www.nytimes.com.
• AlanRobockandOwenB.Toon,“LocalNuclearWar,GlobalSuffering,”ScientificAmerican,302,January2010,pp.74–81.(BB)
• KostaTsipis,“Blast,Heat,andRadiation,”Chapter4inNuclearAlmanac:ConfrontingtheAtominWarandPeace,Addison-Wesley,Reading,Massachusetts,1984.(BB)ALTERNATIVELY:
• “TheEffectsofNuclearDetonations”(C.4)inAppendixC(“BasicNuclearPhysicsandWeaponsEffects”),NuclearMattersHandbook2016,U.S.DepartmentofEnergy,Washington,DC,2016,www.acq.osd.mil/ncbdp/nm/NMHB.
Web:
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
8
• NUKEMAP,byAlexWellerstein,nuclearsecrecy.com/nukemap.Video:• TheHouseintheMiddle,FederalCivilDefenseAdministration,12minutes,1954,
www.youtube.com.
• IsaoHashimoto,1945–1998,MultimediaArtwork,14minutes,2003,www.ctbto.orgorwww.youtube.com.
Moretoexplore:• WhiteLight,BlackRain:TheDestructionofHiroshimaandNagasaki,
DocumentarydirectedbyStevenOkazaki,86minutes,2007.(BB)
• JillLepore,“TheAtomicOriginsofClimateScience,”TheNewYorker,January23,2017,www.newyorker.com.(BB)
• S.GlasstoneandP.J.Dolan,TheEffectsofNuclearWeapons,U.S.GovernmentPrintingOffice,Washington,DC,1977,www.ipfmlibrary.org/gla77.pdf.
• A.A.Broyles,“NuclearExplosions,”AmericanJournalofPhysics,50(7),July1982,pp.586–594.(BB)
• LeoSartori,“EffectsofNuclearWeapons,”PhysicsToday,March1983.(BB)Nuclear Weapons 3: Acquisition (Feb. 16). How hard is it to make a nuclearweapon?HaroldAgnew,directorofLosAlamosNationalLaboratory from1970to1979, once said: “Thosewho say thatbuilding anuclearweapon is easy, they areverywrong,butthosewhosaythatbuildingacrudedeviceisverydifficultareevenmorewrong.”Today, it iswidelyacknowledgedthat theproductionof thenuclearexplosivematerial remains themost significant technical hurdle in the process ofmakinga(simple)nuclearweaponorexplosivedevice.Inthisunit,wewillexplorethe technologies and infrastructureneeded tomakeplutoniumorhighly enricheduranium in quantities that are sufficient for a weapons program. We will alsoexamine the risk of nuclear terrorism, which became a particular concern after9/11.Inthisscenario,anon-stateactorwouldacquireexistingnuclearmaterialtofabricate an “improvised nuclear device.” Such a device may have a much loweryield than a typical nuclear weapon, but still be hundreds or thousands of timesmoredestructivethanconventionalexplosives.Readings:
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
9
• H.A.Feiveson,A.Glaser,Z.Mian,andF.vonHippel,“Production,Uses,andStocksofFissileMaterials,”Chapter2inUnmakingtheBomb:AFissileMaterialApproachtoNuclearDisarmamentandNonproliferation,MITPress,Cambridge,MA,2014.(BB)
• “AmateurA-Bomb,”TimeMagazine,May13,1974.(BB)
• WilliamLangewiesche,“HowtoGetaNuclearBomb,”TheAtlantic,December2006,www.theatlantic.com.(BB)
• PeterZimmermanandJeffreyLewis,“TheBombintheBackyard,”ForeignPolicy,October16,2009,foreignpolicy.com.(BB)
Moretoexplore:• SteveColl,“TheUnthinkable:CantheUnitedStatesbeMadeSafefromNuclear
Terrorism?,”TheNewYorker,March12,2007,www.newyorker.com.(BB)Nuclear Weapons 4: Negotiating a Ban on Nuclear Weapons (Feb. 21). InOctober2016, theFirstCommitteeof theUnitedNationsGeneralAssembly,whichdealswithdisarmamentandinternationalsecuritymatters,adoptedaresolutiontobegin negotiations on a treaty banning nuclear weapons: 123 countries voted infavor, 16 abstained, and 38 voted against this resolution, includingmost nuclearweaponstates(exceptChina,Pakistan,andNorthKorea)andmostmemberstatesofNATO.NegotiationsaresettobegininNewYorkinMarch2017.Today,wewillhaveanopportunitytolearnabouttheoriginsandprospectsofthisinitiative.GuestLecture:RayAchesonRay Acheson is the Director of Reaching CriticalWill (reachingcriticalwill.org). Sheprovides reporting, analysis, and advocacy across a range of internationaldisarmamentandarmscontrol issuesand forums, includingthoserelatedtonuclearweapons,explosiveweapons,thearmstrade,armeddrones,andautonomousweapons,andgenderanddisarmament.RayisalsoontheBoardofDirectorsoftheLosAlamosStudy Group, represents theWomen's International League for Peace and Freedom(wilpf.org) on several coalition steering groups, and previously worked with theInstitute for Defense and Disarmament Studies. She has an Honors BA from theUniversityofTorontoinPeaceandConflictStudiesandanMAinPoliticsfromTheNewSchoolforSocialResearch.Readings:
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
10
• RayAcheson,ThomasNash,andRichardMoyes,ATreatyBanningNuclearWeapons:DevelopingaLegalFrameworkfortheProhibitionandEliminationofNuclearWeapons,ReachingCriticalWilloftheWomen'sInternationalLeagueforPeaceandFreedomandArticle36,May2014,reachingcriticalwill.organdarticle36.org.
• TakingForwardMultilateralNuclearDisarmamentNegotiation,UnitedNationsGeneralAssembly,FirstCommittee,Seventy-firstSession,A/C.1/71/L.41,October14,2016,reachingcriticalwill.org.
Moretoexplore:• AlexanderKmentt,“TheDevelopmentoftheInternationalInitiativeonthe
HumanitarianImpactofNuclearWeaponsandItsEffectontheNuclearWeaponsDebate,”InternationalReviewoftheRedCross,97(899),2015,www.icrc.org.
Unit2:Biotechnology,Biosecurity,andBioterrorism(Feb.23and28,Mar.2and7)
TheBiologicalWeaponsConvention(BWC)bearsasuperficialsimilaritytotheNPT,but in fact differs greatly in scope and monitoring. The traditional concern overbiologicalweaponswaswith stateprograms; thishasnowbeensupplementedbyboth the threat of terrorist use and, perhapsmost disturbingly, the extraordinarygrowth of biotechnology that places increasing potential power for dangerousbiologicalmodificationsinthehandsofthetechnicallycompetent.Keywords:Biologicalandchemicalweaponsconventions;wedgemodel;dynamicsandcontrol of infectious diseases; epidemics and pandemics; anthrax, smallpox;biotechnology;biosecurity;bioterrorism;diseasesurveillance.BiologicalWeapons1:Principles(Feb.23).Inthisfirstsession,wewillintroducethe fundamental principles and effects of biological and chemical weapons. Inparticular, we will also characterize the similarities and differences between thedifferent typesofweaponsofmassdestruction (nuclear, biological, chemical) andhowtheseweaponsare(orcanbe)capturedinarmscontrolregimes.Readings:• JeanneGuillemin,“Introduction”and“BiologicalAgentsandDisease
Transmission,”inBiologicalWeapons:FromtheInventionofState-SponsoredProgramstoContemporaryBioterrorism,ColumbiaUniversityPress,2006,pp.1–39.(BB)
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
11
• EdwinD.Kilbourne,“PlaguesandPandemics:Past,Present,andFuture,”inNickBostromandMilanCirkovic,eds.,GlobalCatastrophicRisks,OxfordUniversityPress,2008,pp.287–307.(BB)
Video:• Contagion,directedbyStevenSoderbergh,106minutes,2011.(BB)Moretoexplore:• TheBiologicalandToxinWeaponsConvention(BTWCor,moreoften,justBWC),
availableatwww.opbw.org.BiologicalWeapons2:Acquisition(Feb.28).Especiallysince the2001anthrax-letterattacks(following9/11),concernsoverthepossibledevelopmentanduseofbiologicalweaponshasshiftedfromstate-sponsoredprogramstoeffortsthatanon-state actor might be able to launch. In this unit, we will examine how recentadvances in biotechnology, especially the growing capabilities to sequence andsynthesizeDNA (including theDNA of pathogens) exacerbate these concerns, askhowthescientificcommunitycanorshouldconduct“experimentsofconcern,”andexplorestrategiestomitigatesomeofthepresentandemergingsecurityrisks.GuestLecture:AndyLeiferAndyLeifer isanAssistantProfessor in theDepartmentofPhysicsandthePrincetonNeuroscience Institute, where he directs the LeiferLab. Previously he was a Lewis-SiglerFellowandPrincipalInvestigator.HereceivedhisdoctorateinBiophysicsfromHarvard University under the supervision of Professor Aravi Samuel. As anundergraduate,heattendedStanfordUniversitywherehegraduatedwithdegrees inPhysics and Political Science and interdisciplinary honors in international securitystudies.HegrewupoutwestinsunnyCaliforniaandColorado.Readings:• “ScienceofSyntheticBiology,”Chapter2inNewDirections:TheEthicsof
SyntheticBiologyandEmergingTechnologies,PresidentialCommissionfortheStudyofBioethicalIssues,December2010.
• HeidiLedford,“CRISPR,TheDisruptor,”Nature,522,June4,2015,pp.20–24.
• JohnBohannon,“BiologistsDeviseInvasionPlanforMutations,”Science,347(6228),March20,2015,p.1300.
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
12
• HeidiLedford,“LifeHackers,”Nature,467,October7,2010,pp.650–652.
• AliNouriandChristopherF.Chyba,“BiotechnologyandBiosecurity,”inNickBostromandMilanCirkovic,eds.,GlobalCatastrophicRisks,OxfordUniversityPress,2008,pp.450–480.(BB)
Moretoexplore:• BiotechnologyResearchinanAgeofTerrorism,CommitteeonResearch
StandardsandPracticestoPreventtheDestructiveApplicationofBiotechnology,NationalResearchCouncil,Washington,DC,2004,www.nap.edu/catalog.php?record_id=10827,ExecutiveSummaryandChapter1(“Introduction”),pp.1–40.(BB)
• AliNouriandChristopherF.Chyba,“Proliferation-resistantBiotechnology:AnApproachtoImproveBiologicalSecurity,”NatureBiotechnology,27(3),2009,pp.234–236.
• RichardDanzigetal.,AumShinrikyo:InsightsIntoHowTerroristsDevelopBiologicalandChemicalWeapons,CenterforaNewAmericanSecurity,Washington,DC,July2011.
BiologicalWeapons3:DynamicsofInfectiousDiseases(Mar.2).Theeffectsofbiologicalweapons can be greatly amplified if the disease caused by the agent iscontagiousandleadstoanepidemicinthetargetedpopulation.Inthissession,wewill develop a simplemathematicalmodel to describe the dynamics of infectiousdiseases(“SIRmodel”).Thiswillenableustoassesstheeffectsofadiseaseoutbreakandtheeffectivenessofdifferentcontroloptions.Readings:• DuncanJ.Watts,“EpidemicsandFailures,”Chapter6inSixDegrees:TheScience
ofaConnectedAge,Norton&Company,February2004.(BB)
• P.Munz,I.Hudea,R.J.Smith,“WhenZombiesAttack:MathematicalModelingofanOutbreakofZombieInfection,”J.M.TchuencheandC.Chiyaka(eds.),InfectiousDiseaseModelingResearchProgress,NovaSciencePublishers,Inc.,2009.(BB)
Videogame:• PlagueInc.,www.ndemiccreations.com,oniOSandAndroid.
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
13
Moretoexplore:• R.M.AndersonandR.M.May,InfectiousDiseasesofHumans:Dynamicsand
Control,OxfordUniversityPress,1991.BiologicalWeapons4:ExpertBriefings(Mar.7).Wewillconcludethisunitwithtwo expert briefings. Professor Nina Fefferman will provide some additionalinsightsintomathematicalmodelingofinfectiousdiseasedynamics,especiallyhowindividual behaviors can cause different outcomes at the level of the population.ProfessorChristopherChybawillsharewithusthefindingsfromarecentstudyonbiosecuritybythePresident'sCouncilofAdvisorsonScienceandTechnology,co-co-chaired by Chyba, offering “guidance about how the United States can takeadvantage of its strong scientific community to prepare for and respond topathogensofallkinds.”Guestlectures:NinaFefferman(viaSkype)andChristopherChybaNina Fefferman is Associate Professor in theDepartment of Ecology& EvolutionaryBiology at the University of Tennessee, Knoxville. Her research focuses on themathematics of epidemiology, evolutionary and behavioral ecology, and self-organizingbehaviors,especiallyofsystemsdescribedbynetworks.Whiletheresearchin the Fefferman Lab frequently focuses on disease in human and/or animalpopulations, and how disease and disease-related behavioral ecology can affect theshort-termsurvivalandlong-termevolutionarysuccessofapopulation,peopleinthelab have worked on problems as diverse as computer network security to socialbehaviors in grass-roots organizations that make the movement susceptible toradicalization.ChristopherChyba isProfessorofAstrophysicalSciencesand InternationalAffairsatPrincetonUniversity.Hissecurity-relatedresearchemphasizesnuclearandbiologicalweaponspolicy,armscontrol,andnonproliferation.Hisscientificresearchfocusesonsolarsystemexplorationandthesearchfor lifeelsewhere.From2009through2016,hewas amember of the President's Council of Advisors on Science and Technology(PCAST). Dr. Chyba co-chaired the PCAST study “Action Needed to Protect AgainstBiologicalAttack”in2016.Readings:• EricLofgrenandNinaFefferman,“TheUntappedPotentialofVirtualGame
WorldstoShedLightonRealWorldEpidemics,”TheLancet:InfectiousDiseases,7(9),September2007,pp.625–629.(onlineandBB)
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
14
• “LetterReporttothePresidentonActionNeededtoProtectagainstBiologicalAttack,”President'sCouncilofAdvisorsonScienceandTechnology(PCAST),Washington,DC,November2016,obamawhitehouse.archives.gov.(BB)
Unit3:NuclearEnergyandNuclearProliferation(Mar.9andMar.14)
A basic understanding of nuclear reactor and fuel-cycle technologies will beimportant in allowing us to appreciate the differences between various technicalandnon-technical choices for civilian nuclear-energy use. To a large extent, thesechoicesdetermine theproliferationrisksassociatedwithnuclearpower.Since the1970s,manycountrieshaveabandonednuclearweaponprograms,butsomeothershaveemerged,andconcernsaboutthenatureofnuclearactivities,sometimespartof civilian nuclear power program, persist. This week, we will explore thefundamentalsofvariousnucleartechnologiesandexaminethestrategiesthathavebeenproposedor implemented toprevent thediversionof civiliannuclearpowerprogramsformilitarypurposes.Tocomplementthisdiscussion,wewillexploreandassesssomerelevantcasestudies.Keywords: Nuclear fuel-cycle options; civilian and military use of nuclear power;technical and non-technical dimensions of nuclear proliferation, nuclear safeguards,nuclear non-proliferation treaty, multilateral approaches to the nuclear fuel cycle;Pakistan,Libya,NorthKorea,Iran.NuclearEnergyandNuclearProliferation1(Mar.9).Thislecturewillprovideanintroductiontothebasictechnologiesandprocessesunderlyingthepeacefuluseofnuclearenergy—andhowsomeofthemcanbeusedformilitarypurposes.Readings:• H.A.Feiveson,A.Glaser,Z.Mian,andF.vonHippel,“FissileMaterials,Nuclear
Power,andNuclearProliferation,”Chapter5inUnmakingtheBomb:AFissileMaterialApproachtoNuclearDisarmamentandNonproliferation,MITPress,Cambridge,MA,2014.(BB)
• RobertH.SocolowandAlexanderGlaser,“BalancingRisks:NuclearEnergy&ClimateChange,”Daedalus,138(4),Fall2009,pp.31–44,mitpressjournals.org.
• ScottSagan,“WhyDoStatesBuildNuclearWeapons?ThreeModelsinSearchofaBomb,”InternationalSecurity,21,Winter1996/97,pp.54–86.(BB)
• Anonymous,IAEASuperInspectors,February2012,www.youtube.com/watch?v=kE-0pdlx5Jk.
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
15
Video:• AisforAtom,Documentary,BBC,46min,2011,
www.bbc.co.uk/blogs/adamcurtis/2011/03/a_is_for_atom.htmlorwww.youtube.com/watch?v=-FDrA7yUdFc
NuclearEnergyandNuclearProliferation2: IranandNorthKorea(Mar.14).Iran and North Korea have dominated the domestic and internationalnonproliferation debate over the past few years. While fundamentally different,bothareamongthehardestnonproliferationchallengesofthepastfewdecades,andeveryrecentU.S.Administrationhaspursueddifferentpoliciestowardthesenuclearprograms.InthecaseofIran,theEU3+3(France,Germany,andtheUnitedKingdomplusChina,Russia,andtheUnitedStates)signeda landmarkagreementwithIran.ThenewU.S.Administrationmayhowever stop supporting thisdeal,which couldrapidly lead to its collapse. The regional and global consequences of such abreakdownarehardtoanticipate.NorthKoreaontheotherhandhassuccessfullyproliferated, testing its first nuclear device in 2006 after the 1994 AgreedFramework had collapsed in 2002/2003. North Korea has since carried out anumberofadditionalweapontests,probablyweaponizedawarhead,anditisonthevergeofdemonstratingcredibleICBMcapability,i.e.,missilesthatcouldeventuallyreachU.S.territory.ItishardtoseehowtheNorthKoreanweaponsprogramcouldbe rolled back, and it is unclear what the regional implications of North Korea’scapabilitiesoverthenextyearswillbe. Inthisunit,wewillexploreinmoredepthoneoftheseprogramspendingdevelopmentsinthecomingweeks.Readings:• PLACEHOLDERREADING#1:JointComprehensivePlanofAction,Vienna,14July
2015.
• PLACEHOLDERREADING#2:TheIranNuclearDeal,TheDefinitiveGuide,HarvardKennedySchool,BelferCenterforScienceandInternationalAffairs,Cambridge,MA,August2015.
• PLACEHOLDERREADING#3:38north.org.
• PLACEHOLDERREADING#4:DarylKimballandKelseyDavenport,“RecalibratingU.S.PolicyTowardNorthKorea,”IssueBriefs,9(1),February2017,www.armscontrol.org.
SPRINGBREAK
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
16
Unit4a:DeliverySystemsandBallisticMissiles(Mar.28and30)Theimportanceofadeliverysystemfornuclearweaponshasbeenrecognizedfromthe very beginning. In his famous 1939 letter to President Roosevelt, Einsteinassumedthatnuclearweaponswouldbepowerfulbutgiganticandspeculatedthatbombswouldthereforehavetobe“carriedbyboat”and“mightverywellprovetobetooheavyfortransportationbyair.”Nuclearwarheadsturnedoutmuchsmaller,anddeliverybecamepossiblenotonlybyaircraftbutalsobyballisticmissiles.Theinventionoftheintercontinentalballisticmissileequippedwithguidancesystemsinthe late 1950s and the development of de-facto invulnerable submarine-launchedmissiles critically shaped nuclear postures during the Cold War. The spread ofmissile technology continues to be a challenge for the nuclear nonproliferationregime.Inthisunit,wewillreviewthebasicphenomenaandconstraintsunderlyingthe delivery ofwarheads over intercontinental distances and the implications fornuclearstrategy.Keywords:Rocketequation;ballisticmissiletrajectories;nucleartriad.Readings:• DietrichSchroeer,“IntercontinentalBallisticMissiles,”Chapter6inScience,
TechnologyandtheNuclearArmsRace,Wiley&Sons,NewYork,1984.(BB)
• DonaldMacKenzie,InventingAccuracy:AHistoricalSociologyofNuclearMissileGuidance,MITPress,Cambridge,MA,1990,Chapter1(“AHistoricalSociologyofNuclearMissileGuidance”)andChapter8(“PatternsintheWeb”).(BB)
Moretoexplore:• LynnDavisandWarnerR.Schilling,“AllYouEverWantedtoKnowaboutMIRV
andICBMCalculationsbutWereNotClearedtoAsk,”JournalofConflictResolution,17(2),June1973,pp.207–242.(BB)
• AlbertD.Wheelon,“FreeFlightofaBallisticMissile,”ARSJournal,29(12),1959,pp.915–926.
• JamesN.Constant,FundamentalsofStrategicWeapons:OffenseandDefenseSystems,MartinusNijhoffPublishers,TheHague,1981.
Unit4b:NuclearStrategy,Deterrence,andtheLast30Minutes(Apr.4and6)AstheColdWararmsraceacceleratedinthe1950s,militaryplannersintheUnitedStates and elsewhere began to develop and then refine the concept of nucleardeterrence, which included massive retaliation, flexible response, and mutualassureddestruction(basedona “securesecond-strikecapability”).Along theway,
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
17
thesuperpowersalsobegantoembrace(nuclear)armscontrol,which isbasedonthe sharedunderstanding that it canbepreferable forallpartiesnot toengage incostly and potentially destabilizing arms races. Arms control regulates, limits,reduces,orprohibitsparticularclassesofweaponsandhasremainedacriticaltoolto support global security to the present day. Arms-control agreements are oftenenshrined in treaties, which usually require verification mechanisms to confirmcompliance.Inthisunit,wewillexaminethebasicconceptsofnuclearstrategyandarmscontrol.Wewillalsoexamine,thecontributionsthatestablishedandemergingtechnologiescanplayintreatyverification.Keywords:Massiveretaliation;mutualassureddestruction;no-firstuse,second-strikecapability.Readings:• ThomasM.Nichols,“NuclearStrategy,1950–1990:TheSearchforMeaning,”
Chapter1inNoUse:NuclearWeaponsandU.S.NationalSecurity,UniversityofPennsylvaniaPress,Philadelphia,2014.(BB)
• CarolCohn,“SexandDeathintheRationalWorldofDefenseIntellectuals,”Signs:JournalofWomeninCultureandSociety,12(4),1987.(BB)
Moretoexplore(includingsomeclassics):• AlexanderL.GeorgeandRichardSmoke,DeterrenceinAmericanForeignPolicy,
TheoryandPractice,ColumbiaUniversityPress,NewYork,1974,Chapter1.(BB)
• RobertJervis,“DeterrenceandPerception,”InternationalSecurity,7(3),Winter1982/83.(BB)
• LawrenceFreedman,TheEvolutionofNuclearStrategy,3rdEdition,PalgraveMacMillanPress,London,2003.(BB)
• JeffreyKnopf,“TheFourthWaveinDeterrenceResearch,”ContemporarySecurityPolicy,31(1),April2010.(BB)
• EricSchlosser,CommandandControl:NuclearWeapons,theDamascusAccident,
andtheIllusionofSafety,PenguinPress,2013.
WARGAME:TheLast30Minutes(Apr.6)Readings:
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
18
• BruceBlair,“WhatExactlyWouldItMeantoHaveTrump’sFingerontheNuclearButton?,”PoliticoMagazine,June11,2016,www.politico.com.
• “NuclearCommandandControl,”Chapter6inNuclearMattersHandbook2016,U.S.DepartmentofEnergy,Washington,DC,2016,www.acq.osd.mil/ncbdp/nm/NMHB.
Unit5:ScienceandTechnologyforArmsControlandVerification(Apr.11andApr.13)
Arms-control agreements are meaningful only insofar as they also includeprovisionstodemonstratecompliancewiththeagreementthroughasetofagreedreportingandverificationprovisions. Inthisunit,wewillexplorethepoliticalandtechnicalchallengesofverificationinthecontextofarmscontrol,withaparticularemphasis on the role of satellites and the potential of social media, which mayprovide fundamentally newways to detect or report non-compliancewith treatyobligations.Verification1(Apr.11).This lecture introduces thebasicconceptsunderpinningthe politics and technology of verification. As a case study, we will examinesatellites,whichwerefirstdevelopedanddeployedbythesuperpowersduringtheCold War for threat assessment and war planning. When the first arms-controltreatieswerenegotiatedintheearly1970s,however, they(also)becameacriticaltool to enable verification of these agreements without the need for onsiteinspections. Many countries and now also private companies operate satellitestoday,andtheyhavebeguntosellimageryofunprecedentedquality,sometimesona first-come first-serve basis. In this session, we will discuss why satellites arewheretheyare,determinetheresolutionlimitsoftheimagerythatcanbeobtainedwiththem,andexplorewhatfuturerolessatellitescouldplaygiventhan“quasireal-timeimageryforeveryone”maysoonbecomeareality.Keywords:Satelliteorbits;satelliteimagery;opticalresolution.Readings:• PLACEHOLDERREADING#1:AmyF.Woolf,MonitoringandVerificationinArms
Control,ReportR41201,CongressionalResearchService,December23,2011.(BB)
• PLACEHOLDERREADING#2:D.Wright,L.Grego,andL.Gronlund,“TheBasicsofSatelliteOrbits”and“TypesofOrbits,orWhySatellitesAreWhereTheyAre,”Sections4and5inThePhysicsofSpaceSecurity:AReferenceManual,American
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
19
AcademyofArtsandSciences,Cambridge,MA,2005,www.amacad.org.
Verification2:EmergingTechnologiesandVirtualReality(Apr.13).GuestLecture:TamaraPattonTamaraPattonisaDoctoralStudentinScience,TechnologyandEnvironmentalPolicy(STEP) at theWoodrowWilson School of Public and International Affairs. Prior tocoming to Princeton, Tamara worked as a researcher at the Vienna Center forDisarmament and Non-Proliferation (VCDNP) and at the Stockholm InternationalPeaceResearchInstitute(SIPRI).ShehasanMAinnonproliferationstudies fromtheMiddlebury Institute of International Studies andaBA in international studies fromtheUniversityofWashington.Readings:• TamaraPatton,JeffreyLewis,MelissaHanham,CatherineDill,andLilyVaccaro,
EmergingSatellitesforNon-ProliferationandDisarmamentVerification,ViennaCenterforDisarmamentandNon-Proliferation(VCDNP),Vienna,Austria,January2016,nonproliferation.org.
• TamaraPatton,BernadetteCogswell,MoritzKütt,andAlexanderGlaser,“Full-MotionVirtualRealityforNuclearArmsControl,”57thAnnualINMMMeeting,July24-28,2016,Atlanta,Georgia.(BB)
Unit6:TheFuture(Apr.18,Apr.20,Apr.25,andApr.27)
Inthisunit,wewillexplore(oftenmorequalitativelythanquantitatively)emergingtechnologiesandtheirpossibleramificationsforglobalsecurity.TheFuture1:Cyberwarfare(Apr.18).Thediscovery inmid2010of “Stuxnet,”asophisticatedcomputerwormdevelopedbytheUnitedStatesandIsraeltodestroyuranium enrichment equipment in Iran brought into international focus theemergingstrategiccapabilitiesofcyberattacks, including thepossibilityof “kineticmilitary action. In mid 2011, the Whitehouse released its own cyber-strategy,declaring that “whenwarranted, the United Stateswill respond to hostile acts incyberspaceaswewouldtoanyotherthreattoourcountry.”Manyothercountriesare actively expanding their cyber capabilities. In this lecture,wewill explore thefundamental elements of cyberwarfare, as far as they can be identified andanticipated today; consider the similarities anddifferences between cyberwarfareand “physical” warfare; and examine if and how traditional security concepts
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
20
(including crisis stability, attribution, escalatory control, and minimization ofcollateraldamage)andstrategiesapplytocyberwarfare.Readings:• SeymourM.Hersh,“TheOnlineThreat:ShouldWeBeWorriedAboutaCyber
War?,”TheNewYorker,November1,2010,www.newyorker.com.
• JosephNye,“DeterrenceandDissuasioninCyberspace,”InternationalSecurity,41(3),Winter2016/2017.(BB)
• PLACEHOLDER#1
• PLACEHOLDER#2
Moretoexplore:• InternationalStrategyforCyberspace,ThePresidentoftheUnitedStates,White
House,Washington,DC,May2011.
• DepartmentofDefenseStrategyforOperatinginCyberspace,U.S.DepartmentofDefense,Washington,DC,July2011.
TheFuture2:TheInternetofThingsandKineticPwnage(Apr.20).GuestLecture:EdSkoudisEdSkoudis is the founderofCounterHack,anorganization thatdesigns,builds,andoperatespopular “infosec challenges”and simulations includingCyberCity,NetWars,CyberQuests,andCyberFoundations.AsdirectoroftheCyberCityproject,Edoverseesthe development of missions that help train “cyber warriors” in how to defend thekinetic assets of a physical,miniaturized city. Ed's expertise includes hacker attacksand defenses, incident response, and malware analysis, with over fifteen years ofexperience in information security. Adapted from: www.sans.org/instructors/ed-skoudis.Readings:• RobertO'HarrowJr.,“CyberCityAllowsGovernmentHackerstoTrainfor
Attacks,”WashingtonPost,November26,2012,washingtonpost.com(BB)
• PLACEHOLDERREADING#1:HackedCameras,DVRsPoweredToday’sMassiveInternetOutage(“2016DynCyberattack”),October21,2016,
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
21
krebsonsecurity.com.
• PLACEHOLDERREADING#2:G.Conti,M.Weigand,E.Skoudis,D.Raymond,T.Cook,andT.Arnold,“TowardsaCyberLeaderCourseModeledonArmyRangerSchool,”SmallWarsJournal,April2014.(BB)
TheFuture3:MachineLearningandSuperintelligence(Apr.25and27).Recentyears have seen unprecedented progress in the field of machine learning, whichgivescomputerstheabilitytolearnfromdata.Twomajortypesofmachinelearningare currently being distinguished: In supervised machine learning, a program istrained on a set of (“labeled”) training data to reach conclusions about new(“unlabeled”)data,effectivelymakingpredictionsaboutthefuture.Inunsupervisedmachine learning, a program is given unlabeled data andmust find patterns andrelationships therein, i.e., discover hidden structures in a dataset.With regard tomilitary applications, the pace of progress inmachine learning has already to animportant debate about the possibility of autonomous weapons, which, onceactivated,wouldselectandengagetargetswithoutfurtherinterventionbyahumanoperator. Some experts consider this development inevitable; others consider ithighly problematic and see autonomous weapons as violating principles ofhumanity.Lookingfurtherahead,andcurrentlyintherealmofsciencefiction,theremay be autonomous systems that match and eventually exceed human-levelintelligenceandachievewhatsomecall“superintelligence.”Ifsuchsystemsshouldbedevelopedatalland,iftheyare,howtoensurethattheyremainbenevolentoncethey exist, has been considered one of the “most momentous questions that ourspecieswilleverconfront.”Inthisunit,wewillexplorethesecurityimplicationsofthese(possible)developments.Readings: • E.Ackerman,“WeShouldNotBan‘KillerRobots,’andHere’sWhy,”IEEE
Spectrum,July29,2015,spectrum.ieee.org.
• S.Russell,M.Tegmark,andT.Walsh,“WhyWeReallyShouldBanAutonomousWeapons:AResponse,”IEEESpectrum,August3,2015,spectrum.ieee.org.
• NickBostrom,“GetReadyfortheDawnofSuperintelligence,”NewScientist,5July2014,pp.26–27.(BB)
• PLACEHOLDERREADING#1:NickBostrom,“PastdevelopmentsandPresentCapabilities”and“PathstoSuperintelligence,”Chapters1and2inSuperintelligence:Paths,Dangers,Strategies,OxfordUniversityPress,2014.(BB)
WWS/MAE353:ScienceandGlobalSecurity:FromNuclearWeaponstoCyberwarfare(Spring2017)AlexanderGlaser,Syllabus,Revision1b,February7,2017
22
• PLACEHOLDERREADING#2:StuartRussell,DanielDewey,MaxTegmark,“ResearchPrioritiesforRobustandBeneficialArtificialIntelligence,”AIMagazine,36(4),2015,futureoflife.org.
• PLACEHOLDER#3
• PLACEHOLDER#4Video:• ExMachina,directedbyAlexGarland,108minutes,2015.(BB)
TeamPresentations(May2andMay4)
TBD.
©DaveTheurer,Atari,1980