Abstract
The context for the emergence of nuclear security challenges is discussed, including some of the milestones in the development of nuclear weapons and the international efforts aimed to direct the use of nuclear technology to peaceful applications. The key terminology pertaining to nonproliferation is introduced, after which the focus of the chapter shifts to the problem of nuclear terrorism. The effects of a hypothetical terrorist attack using a relatively small, improvised, nuclear device are discussed. Next, the policy and the relevant treaties that have shaped the arms control regime over the past decades are introduced. The national and international efforts are subsequently discussed, which aim to provide a framework for prevention of nuclear terrorism. Finally, the general characteristics of the active interrogation technique are discussed, which will be expanded upon in the remainder of the book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Meitner, Nature 224, 466 (1969)
Wikisource, Albert Einstein to Franklin D. Roosevelt - August 2, 1939 — Wikisource (2016). https://en.wikisource.org/w/index.php?title=Albert_Einstein_to_Franklin_D._Roosevelt_-_August_2,_1939&oldid=6288471. Online. Accessed 14 August 2017
R. Rhodes, Making of the Atomic Bomb (Simon & Schuster, New York, 2012). https://books.google.com/books?id=aSgFMMNQ6G4C
R.G. Hewlett, J. Oscar E. Anderson, The New World, 1939/1946, A History of The United States Atomic Energy Commission, vol. I (The Pennsylvania State University Press, University Park, PA, 1962)
Remarks by President Obama and President Zuma of South Africa before Bilateral Meeting. obamawhitehouse.archives.gov
Remarks by President Obama and Prime Minister Rutte at Opening Session of the Nuclear Security Summit. obamawhitehouse.archives.gov
C. Meade, R.C. Molander, Considering the effects of a catastrophic terrorist attack. Technical Report, Rand Center for Terrorism Risk Management Policy (2006)
B. Buddemeier, J.E. Valentine, K.K. Millage, L.D. Brandt, National capital region key response planning factors for the aftermath of nuclear terrorism. Technical Report (2011)
D. McMorrow, Rare events. Technical Report JSR-09-108, JASON, The MITRE Corporation (2009)
D.A. Shea, The global nuclear detection architecture: issues for congress. Technical Report, Library of Congress, Washington, DC (2009)
Office of the second line of defense. Technical Report PNNL-SA-74476, National Nuclear Security Administration (2010)
R.C. Runkle, D.L. Chichester, S.J. Thompson, Nucl. Instrum. Methods Phys. Res. Sect. A 663(1), 75 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Jovanovic, I. (2018). Introduction. In: Jovanovic, I., Erickson, A. (eds) Active Interrogation in Nuclear Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74467-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-74467-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74466-7
Online ISBN: 978-3-319-74467-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)