Abstract
Nuclear, biological, and cyber weapons are major components of national security policy. We currently rely on case studies of individual threats to understand the international distribution of latent capabilities of weapons of mass destruction (WMD)—and typically look exclusively at commercial activity, scientific activity, or policy activity, without considering how these activities relate to other capabilities. Part of the problem of relying on these case studies is that the most interesting cases tend to be the outliers—making it difficult to generalize policy. Many of these case studies also ignore the threat of multiple weapons of mass destruction—the analyses focus exclusively on nuclear issues, biological issues, or cyber issues. We adapt Friedkin’s socio-cultural model of influence and group dynamics to illustrate how countries are motivated to develop WMD using data on international hostilities, alliances, and expert opinion. We assess latent capabilities based on a country’s scientific, commercial, and policy activity. After applying this approach, we develop a risk threat score for the country’s nuclear, biological, and cyber capability, and use k-means to assess global trends and profiles in WMD development. By using this approach, we systematically consider all countries and do a joint analysis across the different technologies. We find that there are four broad profiles of countries: countries that invest heavily across all three technologies, countries that are invested in nuclear and cyber capability, countries that are solely invested in biological capability, and countries that are not invested in the three capabilities. These profiles provide a more holistic view of the threat landscape for policymakers.
Similar content being viewed by others
References
Abraham I (2006) The ambivalence of nuclear histories. Osiris 21(1):49–65. doi:10.1086/507135
Adler E (1992) The emergence of cooperation: national epistemic communities and the international evolution of the idea of nuclear arms control. Int Org 46(1):101–145
Asal VH, Ackerman GA, Rethemeyer RK (2012) Connections can be toxic: terrorist organizational factors and the pursuit of CBRN weapons. Stud Confl Terror 35(3):229–254. doi:10.1080/1057610X.2012.648156
Betts RK (1993) Paranoids, pygmies, pariahs and nonproliferation revisited. In: Davis ZS, Frankel B (eds) The proliferation puzzle: why nuclear weapons spread (and what results). Frank Cass, Portland
BLS Producer price index. Bureau of labor statistics. http://www.bls.gov/ppi
Carley KM (2011) Dynamic network analysis and modeling for CANS. In: Bragg B, Popp G (eds) A guide to analytic techniques for nuclear strategy analysis. NSI, Oklahoma, pp 191–202
Centers for Disease Control and Prevention (2011) Bioterrorism agents/diseases. Accessed September 2011. http://www.bt.cdc.gov/agent/agentlist-category.asp
Dai X (2007) International institutions and national policies. Cambridge University Press, New York
Davis ZS (1993) The realist nuclear regime. In: Davis ZS, Frankel B (eds) The proliferation puzzle: why nuclear weapons spread (and what results). Routledge, New York
Daxecker UE (2011) Rivalry, instability, and the probability of international conflict. Confl Manag Peace Sci 28(5):543–565. doi:10.1177/0738894211418591
De Mesquita BB, Stokman FN (1994) European community decision making: models, applications, and comparisons. Yale Univ Pr, New Haven
Department of Defense (1998) Military Critical Technologies List. Department of Defense
Department of State (2010) Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments. http://www.state.gov/documents/organization/145181.pdf
Elliott D (2011) Deterring strategic cyberattack. IEEE Secur Priv Mag 9(5):36–40
Frankel B (1991) Opaque Nuclear Proliferation. Psychology Press
Friedkin Noah E (1998) A structural theory of social influence. Cambridge University Press, New York
Fuhrmann M (2009) Taking a walk on the supply side the determinants of civilian nuclear cooperation. J Confl Resolut 53:181–208
Gartzke E (2007) The capitalist peace. Am J Polit Sci 51(1):166–191
Gasman N, Mariko M, Creese A (2004) The world medicines situation. World Health Org
Gibler DM (2009) International military alliances. CQ Press, Washington, DC, pp 1648–2008
Harney R, Brown G, Carlyle M (2006) Anatomy of a project to produce a first nuclear weapon. Sci Glob Secur 14:163–182
Horowitz MC, Narang N (2014) Poor Man’s atomic bomb? exploring the relationship between “weapons of mass destruction”. J Confl Resolut 58(3):509–535. doi:10.1177/0022002713509049
Huth PK (1999) Deterrence and international conflict: empirical findings and theoretical debates. Annu Rev Polit Sci 2(1):25–48
Hymans JEC (2010) When does a state become a ‘nuclear weapon state’? an exercise in measurement validation. Nonprolif Rev
International Atomic Energy Agency (2014) Power reactor information system. http://www.iaea.org/pris/
Jacques EC (2006) Hymans, The psychology of nuclear proliferation: identity, emotions and foreign policy. Cambridge University Press, Cambridge
James Martin Center for Nonproliferation Studies (2008) Chemical and biological weapons. http://cns.miis.edu/cbw/possess.htm
Jervis R (1979) Deterrence theory revisited. World Politics 31(2):1–37
Jervis R (2003) The confrontation between Iraq and the US: implications for the theory and practice of deterrence. Eur J Int Relat 9(2):315–337. doi:10.1177/1354066103009002006
Jo DJ, Gartzke E (2007) Determinants of nuclear weapons proliferation. J Confl Resolut 51(1):167–194
Kaplan FM (1983) The wizards of armageddon. Stanford University Press, Stanford, CA
Kas M, Khadka AG, Frankenstein W, Abdulla AY, Kunkel F, Carley LR, Carley KM (2012) Analyzing scientific networks for nuclear capabilities assessment. J Am Soc Inf Sci Technol 63(7):1294–1312. doi:10.1002/asi.22678
Kroenig M (2010) Exporting the Bomb: Technology Transfer and the Spread of Nuclear Weapons. Cornell Univ Pr, Ithaca
Lebovic JH (2007) Deterring international terrorism and rogue states. Routledge, New York
Lewis JA, Timlin K (2011) Cybersecurity and cyberwarfare. Center for strategic and international studies
Libicki MC (2009) Cyberdeterrence and Cyberwar. RAND Corporation, Santa Monica, CA
Litwak RS (2007) Regime change: US strategy through the prism of 9/11. Woodrow Wilson Center Press, Washington
Maoz Z, Kuperman RD, Terris L, Talmud I (2006) Structural equivalence and international conflict. J Confl Resolut
Meyer S (1984) The dynamics of nuclear proliferation. University of Chicago Press, Chicago
Mezzour G, Frankenstein W, Carley KM, Carley LR (2014) Systematic assessment of Nation-States motivations and capabilities to produce biological weapons, Tech Report No. CMU-ISR-14-103. Carnegie Mellon University, Pittsburgh
Montgomery AH, Sagan SD (2011) The perils of predicting proliferation. In: Rauchhaus R, Kroenig M, Gartzke E (eds) Causes and consequences of nuclear proliferation. Routledge, New York, pp 294–329
Morgan PM (2003) Deterrence now. Cambridge University Press, Cambridge
Nolan J, Strauss M (1997) The rogues’ gallery, stealing the fire. Brown J World Aff 4(1):21–38
Rublee MR (2009) Nonproliferation norms. University of Georgia Press, Athens
Sagan SD (1996) Why do states build nuclear weapons?: three models in search of a bomb. Int Secur 21(3):54–86
Sagan SD (2000) The commitment trap: why the United States should not use nuclear threats to deter biological and chemical weapons attacks. Int Secur 24(4):85–115 (The MIT Press)
Sagan SD (2010) Nuclear latency and nuclear proliferation. In: Potter WC, Mukhatzhanova G (eds) Forecasting nuclear proliferation in the 21st century, 1st edn. Stanford University Press, Stanford, pp 58–79
Scopus (2014) Accessed February 21. http://www.elsevier.com/online-tools/scopus
Smith DD (2006) Deterring America. Cambridge University Press, Cambridge
Solingen E (2007) Nuclear logics: contrasting paths in East Asia and the Middle East. Princeton University Press, Princeton
Stoll JR (1996) World production of latent nuclear capacity. http://es.rice.edu:80/projects/Poli378/Nuclear/Proliferation/proliferation.html
Talbert MD, Zentner GL, Coles RJ (2005) Nuclear proliferation technology trends analysis PNNL-14480, vol 1. Office of Scientific and Technical Information, DOE, Oak Ridge
Tannenwald N (1999) The nuclear taboo: the United States and the normative basis of nuclear non-use. Int Org 53(3):433–468 (The MIT Press)
Thayer BA (1995) The causes of nuclear proliferation and the utility of the nuclear non-proliferation regime. Secur Stud
Trachtenberg M (1991) History and strategy. Princeton University Press, Princeton
Tucker J (2000) Motivations for and against proliferation: the case of the middle east. In: Zilinkas R (ed) Biological warfare: modern offense and defense. Lynne Rienner Publishers, Boulder
United Nations commodity trade statistics database (2011) UN. Accessed August. http://comtrade.un.org/db/
US Congress (1993) Office of Technology Assessment, Technologies Underlying Weapons of Mass Destruction. OTA-BP-ISC-115 (US GPO, Washington, DC, 1993)
Waltz KN (2010) Theory of international politics. Waveland Press, Long Grove, IL
Waltz K, Sagan SD (2002) The spread of nuclear weapons, 2nd edn. WW Norton & Company, New York
Wilkenfeld J, Brecher M, Hewitt J, Beardsley K, Eralp P (2010) International crisis behavior dataset. http://www.cidcm.umd.edu/icb/data/
Wohlstetter AJ (1979) Swords from plowshares. University Of Chicago Press, Chicago
World Bank Indicators http://data.worldbank.org/indicator
World Customs Organization (2008) Classification of the biological dual-use items of the convention on the prohibition of the development, production and stockpiling of bacteriological (biological) and toxin weapons and their destruction. Brussels
Acknowledgments
This work is supported in part by the Defense Threat Reduction Agency (DTRA) under Grant HDTRA11010102 and the center for Computational Analysis of Social and Organizational Systems (CASOS). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of DTRA or the US Government.
Author information
Authors and Affiliations
Corresponding author
Appendix A: Individual risk score assessments
Appendix A: Individual risk score assessments
This appendix includes a global map of the risk scores and a table indicating the top 20 countries with the highest risk scores for each individual technology. Risk scores should not be directly compared across technologies due to the different types of risk they represent and due to the different methodologies used to create the latent scores. Fig. 6 and Table 17 show nuclear weapons risk; Fig. 7 and Table 18 show bioweapons risk; Fig. 8 and Table 19 show cyber weapons risk.
Rights and permissions
About this article
Cite this article
Frankenstein, W., Mezzour, G., Carley, K.M. et al. Remote assessment of countries’ nuclear, biological, and cyber capabilities: joint motivation and latent capability approach. Soc. Netw. Anal. Min. 5, 5 (2015). https://doi.org/10.1007/s13278-014-0243-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-014-0243-z