Despite massive efforts and billions spent by the United States and its partners towards substantial improvements in nuclear security, we continue to see instances of nuclear insecurity, such as the Y-2 debacle. The focus of the work on improved nuclear security at the Nuclear Security Summit (NSS) needs to shift from urgent patchwork to fill security gaps to effective, sustainable security, addressing issues of testing, best practices, and professional standards .
Washington and Seoul Summits
Some leaders may already be experiencing nuclear security fatigue, but the NSS has had merit. The NSS 2010 had modest goals of drawing attention, at the highest level, to the need to prevent nuclear terrorism by securing nuclear materials and making political agreements . The real successes of the Washington summit were in establishing a consensus that nuclear terrorism is a global threat, ushering a sense of urgency of the problem, and facilitating breakthroughs . In Seoul, NSS 2012 focused on implementing those agreements using “gift baskets,” multinational commitments  , which were promising since such undertakings entail cooperation and a greater scope of action. Most of all, these summits imposed action deadlines.
In March, the Hague summit requires leaders to tie together the last four years of NSS while creating a pathway towards a more comprehensive, forward-looking agenda. The Stanley Foundation stresses multilateral action to create fair, just, and lasting solutions to critical issues of peace and security. Thus, as we review the Seoul Communiqué in preparation for Hague, our focus centers on world leaders agreeing to make further progress in the following important areas  :
... middle of paper ...
...Available from: https://http://www.nss2014.com/en/nss-2014/about-the-nss.
5. Seoul Communiqué, in Nuclear Security Summit Seoul 2012. 2012, Council on Foreign Relations: Seoul, South Korea.
6. Preventing Weak Links in Nuclear Security: A Strategy for Soft and Hard Governance, in 54th Annual Strategy for Peace Conference. 2013, The Stanley Foundation.
7. Nuclear Security Governance Experts Group. Building International Confidence and Responsibility in Nuclear Security: Summary Report & Initial Policy Recommendations from the Nuclear Security Governance Experts Group. in Nuclear Security Governance Experts Group Workshop on Building International Confidence and Responsibility in Nuclear Security. 2012. The Stanley Foundation.
8. Uranium Downblending. Uranium Enrichment and Fuel Fabrication 2005 February 4, 2014]; Available from: http://www.wise-uranium.org/eudb.html.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction: In materials science , uses loads of fatigue caused by the weakness of material over and over again . This is a gradual localized structural damage that occurs when the material is exposed to cyclic loading . Stressvalues maximum value that caused this damage could be much less than the tensile strength of the material usually as surface tension , reduce or restrict the effort described below. For the following reasons : Fatigue happens when you download the materials and discharged several times.... [tags: Metal Fatigue]
1120 words (3.2 pages)
- The world in which we live if full of actors, whom feel the need to exploit every vulnerability possible. In the world of information security, these actors can be internal threats, external threats, or advanced persistent threats who are funded by nation states wanting to gain a tactical advantage. Regardless of their affiliation, external, or internal, their existence to include their underlying desire to exploit weaknesses within a system must be combated if we are to keep our own tactical advantage.... [tags: Information security, Computer security, Security]
1026 words (2.9 pages)
- The security world of doing business has many different career choices. Each career choice may have specific security needing a certain level of understanding. A lot has changed over the years in dealing with security and the 21st Century as broaden the security field on a global perspective. Information Technology (IT) security professionals have a huge responsibility. Understanding three specific areas will reveal a better understanding of what these professionals do. Above all, Cyber security needs to be a focus within the IT profession.... [tags: Computer security, Information security]
763 words (2.2 pages)
- It is clear the U.S. Government, after 9/11 had to rethink what port security really meant. It was no longer about drug smugglers and theft, it was now a broad based approach to securing the ports, protecting the people and infrastructure and reducing the likelihood of another attack, whereby preserving global economic activity. As outlined above many areas have been addressed to protect overall port security, maintain strict processes for port facility security and drive technology and cooperation to improve container security.... [tags: Security, Computer security, Port security]
1007 words (2.9 pages)
- Warfare throughout the Western World underwent a massive change in the period of time ranging from the late 18th century to the conclusion of WWII. The French Revolution brought the concepts of nationalism and total war to the European Theater for the first time and set in motion the progression of war as a cause reliant upon garnering the support of a nations ' citizens. This support bled into the growing international theme of a unified, militaristic state throughout the latter half of the long 19th century.... [tags: World War I, World War II, Ottoman Empire]
1853 words (5.3 pages)
- Abstract This paper focusses on the analysis of the importance of the security baselines by critically looking at the significance of this security baselines on the computer operating system, application system, and various computer network components. This paper, therefore, strives to provide the organizations that do not have security guidelines in place reasons to adopt them by clearly laying down the benefits that will trickle down to them and the security risks they will be protected against.... [tags: Computer security, Security, Information security]
1420 words (4.1 pages)
- The world is at a point where people have to question if they feel safe, and if they do, why they feel safe. The answers will vary, but more than likely, the United States, not the United Nations, will be the answer. The Security Council was made to keep peace among the world, and the concept of it was a great idea in theory. The world needs protection from the horrors of genocide, the death from terrorists, and the corruption of governments that can create many issues. However, in recent years the United States has led the charge for the war on terror, while the U.N.... [tags: peace, world safety, un, security council]
1695 words (4.8 pages)
- To be an airline pilot is most of the time described in terms of duties, job requirements, proficiency, training, employment opportunity, and good salary. These features picture a plain profile that fit into the specification of just an ordinary career. However, an aviation career comes with many challenges than expected. When focusing on statistics about being a pilot, it indicates a lifestyle that many inspire to work despite the many challenges that face this career. The challenges that pilot face revolve around being rested during long flights, performing unexpected, simultaneous tasks, and passing the medical examination in order to remain qualified.... [tags: Aviation ]
1533 words (4.4 pages)
- The world of Biometric Security Biometrics is methods of recognizing a person based on a physiological or behavioral characteristic. Some of the features measured in biometrics identification that I will include in this paper are: fingerprints, retina, face, signature, and voice scans. Biometric technologies are quickly becoming the foundation for a large array of highly secure identification and personal verification techniques. As the level of security and transaction fraud increases, the need for more secure identification and personal verification technologies also increases.... [tags: Biometric Security Surveillance Papers]
1827 words (5.2 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)