Tamper detection for safeguards and treaty monitoring: Fantasies, realities, and potentials

Tamper detection 2 has an important role to play in domestic nuclear security and safeguards, as well as in international verification and treaty monitoring. Unfortunately, ideas about tamper detection often seem to be based on misconceptions, fuzzy goals, and wishful thinking. Current tamper detection programs are hampered by these problems, as well as by poor training, limited analysis, vague (or nonexistent) standards, “see-no-evil” mentality, “one-size-fitsall” thinking, and unmitigated vulnerabilities. Better approaches, more sophistication, improved hardware, and greater understanding are sorely needed for both current and future applications.

[2]  James F. Keeley Verification, On-Site Inspection and "93+2" , 1996 .

[3]  Michael Krepon Technology won't solve verification problems , 1985 .

[4]  J. L. Jones Improving tag/seal technologies: the vulnerability assessment component , 1996 .

[5]  Ronald B. Mitchell,et al.  Sources of Transparency: Information Systems in International Regimes , 1998 .

[6]  P. L. Chrzanowski Preparation for the Nuclear Non-Proliferation Treaty Extension Conference in 1995. Workshop summary , 1993 .

[7]  N. Kamal Cooperative Monitoring Center Occasional Paper/6: Pakistani Perceptions and Prospects of Reducing the Nuclear Danger in South Asia , 1999 .

[8]  Matthew G. Bunn The Next Wave: Urgently Needed New Steps to Control Warheads and Fissile Material , 2000 .

[9]  Rg Johnston Effective Vulnerability Assessment of Tamper-Indicating Seals , 1997 .

[10]  David Albright,et al.  South Africa Flirts with the NPT , 1991 .

[11]  Steve Fetter,et al.  Using Tags to Monitor Numerical Limits in Arms Control Agreements , 1989 .

[12]  T. B. Taylor TECHNICAL REQUIREMENTS FOR NUCLEAR SAFEGUARDS. , 1967 .

[13]  Kathleen Vogel,et al.  Ensuring the security of Russia's chemical weapons: A lab‐to‐lab partnering program , 1999 .

[14]  Harry H. Almond,et al.  Nuclear Theft: Risks and Safeguards. , 1975, American Journal of International Law.

[15]  M. G. Morgan Nuclear Arms Control: Background and Issues , 1985 .

[16]  Matthew G. Bunn,et al.  MANAGING MILITARY URANIUM AND PLUTONIUM IN THE UNITED STATES AND THE FORMER SOVIET UNION , 1997 .

[17]  Nancy W. Gallagher The Politics of Verification , 1999 .

[18]  Matthew G. Bunn,et al.  Management and disposition of excess weapons plutonium , 1994 .

[19]  Roger G. Johnston,et al.  Vulnerability assessment of passive tamper-indicating seals , 1995 .

[20]  Ivars Peterson,et al.  Chinks in digital armor: Exploiting faults to break smart‐card cryptosystems , 1997 .

[21]  James E. Doyle,et al.  A proposed approach for monitoring nuclear warhead dismantlement , 2001 .

[22]  Roger G. Johnston,et al.  Title: SIMPLE, LOW-COST WAYS TO DRAMATICALLY IMPROVE THE SECURITY OF TAGS AND SEALS , 1997 .

[23]  B. Chellaney,et al.  Nuclear terrorism: Threat, perception, and response in South Asia , 1988 .

[24]  Steve Fetter A Comprehensive Transparency Regime for Warheads and Fissile Materials , 1999 .

[25]  O. Bukharin,et al.  The U.S.‐Russian HEU agreement: Internal safeguards to prevent diversion of HEU , 1994 .

[26]  Ann Florini A New Role for Transparency , 1997 .

[27]  A. DeVolpi Tags and seals to strengthen arms control verification , 1990 .

[28]  Strategy and Arms Control , 1975 .

[29]  David B. Thomson A Guide to the Nuclear Arms Control Treaties , 2001 .

[30]  Robert Mozley Verifying the Number of Warheads on Multiple-warhead Missiles through On-site Inspections , 1990 .

[31]  Richard Phillips Feynman,et al.  ‘‘Surely You’re Joking Mr. Feynman!’’ Adventures of a Curious Character , 1985 .

[32]  George Bunn Raising international standards for protecting nuclear materials from theft and sabotage , 2000 .

[33]  Michael M. May,et al.  How much is enough? A risk management approach to computer security , 2000 .

[34]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[36]  Theodore B. Taylor,et al.  Nuclear Theft: Nuclear Theft: Risks and Safeguards , 1974 .

[37]  William C. Potter,et al.  Potatoes were guarded better , 1995 .

[38]  Roger G. Johnston,et al.  Were ancient seals secure? , 2001, Antiquity.

[39]  Steve Fetter Verifying Nuclear Disarmament , 2021, Nuclear Weapons.

[40]  Roger G. Johnston Tamper‐indicating seals for nuclear disarmament and hazardous waste management , 2001 .

[41]  Herbert L. Abrams,et al.  Security issues in the handling and disposition of fissionable material , 1993 .

[43]  Safety Nuclear explosive safety study process , 1997 .