Strengthening the Security of Military Nuclear Materials

Year
2015
Author(s)
Samantha Pitts-Kiefer - Nuclear Threat Initiative
Leon Ratz - Nuclear Threat Initiative
Andrew Bieniawski - Nuclear Threat Initiative
Abstract
Despite recent efforts to strengthen the global nuclear security system, 85% of all weapons- usable nuclear materials is categorized as “military materials” and therefore remains outside the scope of existing international security mechanisms, standards, and confidence-building arrangements. As a group of former high-ranking defense officials recently wrote, “Why would we design or accept a nuclear materials security system that applied only to a small fraction of the materials that could be used to take out an entire city and wreak havoc across the globe?” Contrary to conventional wisdom, “military materials” are quite diverse and include material in different forms, in different facilities, and in different uses. Not all of these forms and facilities are inherently sensitive in nature, nor are they all in nuclear weapons forms. Countries, including the United States and Russia, have previously engaged in cooperative security efforts and confidence-building arrangements that involved such materials. Furthermore, there is increasing international recognition of the importance of addressing the security of military materials. For example, the 2014 Nuclear Security Summit reaffirmed “...the fundamental responsibility of States, in accordance with their respective obligations, to maintain at all times effective security of all nuclear and other radioactive materials, including nuclear materials used in nuclear weapons.” This paper previews an upcoming report to be issued by a high-level Study Group commissioned by the Nuclear Threat Initiative and co-chaired by former Senator Sam Nunn, former Senator Richard Lugar, and former UK Defense Secretary Desmond Browne, which will convey recommendations on (i) strengthening the security of military materials and (ii) building confidence in the effectiveness of their security, while still protecting sensitive information.