Review of the DOE National Security Labs' Use of Archival Nuclear Test Data


Book Description

"In 2006, the U.S. Congress and the National Nuclear Security Administration of the Department of Energy requested an evaluation of the quantification of margins and uncertainties framework used by the national security laboratories in support of their nuclear weapons stockpile stewardship activities. The first part of the request resulted in the book, Evaluation of Quantification of Margins and Uncertainties Methodology for Assessing and Certifying the Reliability of the Nuclear Stockpile. The present letter report fulfills the second part of that request: a high-level overview of the way the archival underground nuclear test data are used by the labs in its application of QMU. Specifically the committee was asked to assess how archived data are used in the evaluation of margins and uncertainties, and whether or not design labs are fully exploiting the data for QMU. This includes use for baselining codes, informing annual assessment, assessing significant finding investigations, and more. This letter report presents the results of the study committee's analysis based on two meetings-one to Los Alamos National Laboratory and another to Lawrence Livermore National Laboratory. The report begins with a short background section followed by the findings, recommendations, and analysis."--Publisher's description.




Evaluation of Quantification of Margins and Uncertainties Methodology for Assessing and Certifying the Reliability of the Nuclear Stockpile


Book Description

Maintaining the capabilities of the nuclear weapons stockpile and performing the annual assessment for the stockpile's certification involves a wide range of processes, technologies, and expertise. An important and valuable framework helping to link those components is the quantification of margins and uncertainties (QMU) methodology. In this book, the National Research Council evaluates: how the national security labs were using QMU, including any significant differences among the three labs its use in the annual assessment whether the applications of QMU to assess the proposed reliable replacement warhead (RRW) could reduce the likelihood of resuming underground nuclear testing This book presents an assessment of each of these issues and includes findings and recommendations to help guide laboratory and NNSA implementation and development of the QMU framework. It also serves as a guide for congressional oversight of those activities.




The New Nuclear Forensics


Book Description

Nuclear material changes its form and properties as it moves through the nuclear fuel cycle, from one facility to another. Each step of the fuel cycle or each use of the material will inevitably leave its mark. The science of determining the history of a sample of nuclear material through the study of these characteristics is known as nuclear forensics. While nuclear forensic analysis has normally been associated with investigations and prosecutions in the contextof trafficking of nuclear materials or nuclear terrorism, it had wider applications in in national security contexts, such as nuclear non-proliferation, disarmament, and arms control. The New Nuclear Forensics is the first book to give a definitive guide to this broader definition of nuclear forensic analysis. This book describes the various methods used in nuclear forensics, giving first a broad introduction to the process followed by details of relevant measurement techniques and procedures. In each case, the advantages and limitations are outlined. To put these methods in context, the book also recounts the history of the discipline anddescribes the diverse contemporary applications of nuclear forensics.




Countering Cyber Sabotage


Book Description

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.




The Atomic Bomb and the End of World War II


Book Description

This book discusses the decision to use the atomic bomb. Libraries and scholars will find it a necessary adjunct to their other studies by Pulitzer-Prize author Herbert Feis on World War II. Originally published in 1966. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.




Strengthening Forensic Science in the United States


Book Description

Scores of talented and dedicated people serve the forensic science community, performing vitally important work. However, they are often constrained by lack of adequate resources, sound policies, and national support. It is clear that change and advancements, both systematic and scientific, are needed in a number of forensic science disciplines to ensure the reliability of work, establish enforceable standards, and promote best practices with consistent application. Strengthening Forensic Science in the United States: A Path Forward provides a detailed plan for addressing these needs and suggests the creation of a new government entity, the National Institute of Forensic Science, to establish and enforce standards within the forensic science community. The benefits of improving and regulating the forensic science disciplines are clear: assisting law enforcement officials, enhancing homeland security, and reducing the risk of wrongful conviction and exoneration. Strengthening Forensic Science in the United States gives a full account of what is needed to advance the forensic science disciplines, including upgrading of systems and organizational structures, better training, widespread adoption of uniform and enforceable best practices, and mandatory certification and accreditation programs. While this book provides an essential call-to-action for congress and policy makers, it also serves as a vital tool for law enforcement agencies, criminal prosecutors and attorneys, and forensic science educators.










Building The H Bomb: A Personal History


Book Description

In this engaging scientific memoir, Kenneth Ford recounts the time when, in his mid-twenties, he was a member of the team that designed and built the first hydrogen bomb. He worked with — and relaxed with — scientific giants of that time such as Edward Teller, Enrico Fermi, Stan Ulam, John von Neumann, and John Wheeler, and here offers illuminating insights into the personalities, the strengths, and the quirks of these men. Well known for his ability to explain physics to nonspecialists, Ford also brings to life the physics of fission and fusion and provides a brief history of nuclear science from the discovery of radioactivity in 1896 to the ten-megaton explosion of “Mike” that obliterated a Pacific Island in 1952.Ford worked at both Los Alamos and Princeton's Project Matterhorn, and brings out Matterhorn's major, but previously unheralded contribution to the development of the H bomb. Outside the lab, he drove a battered Chevrolet around New Mexico, a bantam motorcycle across the country, and a British roadster around New Jersey. Part of the charm of Ford's book is the way in which he leavens his well-researched descriptions of the scientific work with brief tales of his life away from weapons.




Fiscal Year 2001 Budget Authorization Request


Book Description