that these weapons are never used, irrespective of whether they consider

2017-05-03 0

continues as of 2016, with the ongoing debate for a credible indigenous Japanese and South Korean deterrent against North Korea.[27] The threat of potentially suicidal terrorists possessing nuclear weapons (a form of nuclear terrorism) complicates the decision process. The prospect of mutually assured destruction may not deter an enemy who expects to die in the confrontation. Further, if the initial act is from a stateless terrorist instead of a sovereign nation, there is no fixed nation or fixed military targets to retaliate against. It has been argued by the New York Times, especially after the September 11, 2001 attacks, that this complication is the sign of the next age of nuclear strategy, distinct from the relative stability of the Cold War.[28] In 1996, the United States adopted a policy of allowing the targeting of its nuclear weapons at terrorists armed with weapons of mass destruction.[29] Robert Gallucci, president of the John D. and Catherine T. MacArthur Foundation, argues that although traditional deterrence is not an effective approach toward terrorist groups bent on causing a nuclear catastrophe, Gallucci believes that "the United States should instead consider a policy of expanded deterrence, which focuses not solely on the would-be nuclear terrorists but on those states that may deliberately transfer or inadvertently lead nuclear weapons and materials to them. By threatening retaliation against those states, the United States may be able to deter that which it cannot physically prevent.".[30] Graham Allison makes a similar case, arguing that the key to expanded deterrence is coming up with ways of tracing nuclear material to the country that forged the fissile material. "After a nuclear bomb detonates, nuclear forensics cops would collect debris samples and send them to a laboratory for radiological analysis. By identifying unique attributes of the fissile material, including its impurities and contaminants, one could trace the path back t

Free Traffic Exchange