A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists’ motivations to employ a nuclear attack.
REFERENCES
1.
Remarks by President Obama and Prime Minister Rutte at Opening Session of the Nuclear Security Summit, 2016, available at https://obamawhitehouse.archives.gov/the-press-office/2016/04/01/remarks-president-obama-and-prime-minister-rutte-opening-session-nuclear.
2.
G.
Allison
, “What Happened to the Soviet Superpower’s Nuclear Arsenal? Clues for the Nuclear Security Summit
.” Discussion Paper 2012-04, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2012
, p. 2
.3.
B.
Volders
and T.
Sauer
, “Introduction” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 6
.4.
J.
Parachini
, “Putting WMD Terrorism in Perspective
,” The Washington Quarterly
26
, 2003
, p. 38
.5.
B.
Volders
and T.
Sauer
, “Introduction” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 4
6.
M.
Zenko
, “Intelligence Estimates of Nuclear Terrorism
,” The Annals of the American Academy of Political and Social Science
607
, 2006
, 87
.7.
E.
Sokova
, “Non-state Actors and Nuclear Weapons
,” in Understanding Nuclear Weapon Risks, edited by J.
Borrie
, T.
Caughley
, and W.
Wan
, UNIDIR Report
, 2017
, 87
.8.
The Nuclear Threat Initiative
, “The Radiological Threat
,” 2015
, available at http://www.nti.org/learn/radiological/.9.
M.
Pomper
and A.
Gluck
, “Promoting Alternatives to High-Risk Radiological Sources,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 57
.10.
The Nuclear Regulatory
Commission
, “Fact Sheet on Dirty Bombs
,” 2014
, available at https://www.nrc.gov/reading-rm/doc-collections/fact-sheets/fs-dirty-bombs.html.11.
The Nuclear Regulatory Commission
, “Fact Sheet on Dirty Bombs
,” 2014
, available at https://www.nrc.gov/reading-rm/doc-collections/fact-sheets/fs-dirty-bombs.html.12.
J.
Acton
, M.B.
Rogers
, and P.
Zimmerman
, “Beyond the Dirty Bomb: Re-Thinking Radiological Terror
,” in Survival
3
, 2007
, p. 154
.13.
J.
Acton
, M.B.
Rogers
, and P.
Zimmerman
, “Beyond the Dirty Bomb: Re-Thinking Radiological Terror
,” in Survival
3
, 2007
, p. 151
.14.
M.
Pomper
and A.
Gluck
, “Promoting Alternatives to High-Risk Radiological Sources,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 58
15.
T.
Bielefeld
, “Mexico’s Stolen Radiation Source: It Could Happen Here
,” in The Bulletin of the Atomic Scientists
, 2014
.16.
The International Atomic Energy Agency
, “Q & A: Safety and Security of Radioactive Sources
,” 2003
, available at https://www.iaea.org/PrinterFriendly/NewsCenter/Features/RadSources/radsrc_faq.html#qa317.
M.
Bunn
, M.
Malin
, N.
Roth
, W.
Tobey
, “Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline?
” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School
, 2016
, p. 98
.18.
J.
Acton
, M.B
Rogers
, and P.
Zimmerman
, “Beyond the Dirty Bomb: Re-Thinking Radiological Terror
,” in Survival
3
, 2007
, p. 154
.19.
B.
Ramberg
, Nuclear Power Plants as Weapons for the Enemy: An Unrecognized Military Peril
, Berkeley
: University of California Press
.20.
A.
MacFarlane
, “How to Protect Nuclear Plants from Terrorists
,” The Conversation
, 2016
, available at http://theconversation.com/how-to-protect-nuclear-plants-from-terrorists-5709421.
M.
Bunn
, “Belgium Highlights the Nuclear Terrorism Threat and Security Measures to Stop It
,” The Huffington Post
, 2016
, available at http://www.huffingtonpost.com/matthew-bunn/belgium-nuclear-terrorism_b_9559006.html22.
M.
Bunn
, “Belgium Highlights the Nuclear Terrorism Threat and Security Measures to Stop It
,” The Huffington Post
, 2016
, available at http://www.huffingtonpost.com/matthew-bunn/belgium-nuclear-terrorism_b_9559006.html23.
The IAEA Power Reactor Information System Database on Nuclear Power Reactors, available at https://www.iaea.org/pris/ and the IAEA Research Reactor Database, available at https://nucleus.iaea.org/RRDB/RR/ReactorSearch.aspx.
24.
The IAEA Nuclear Fuel Cycle Information System List of Nuclear Fuel Cycle Facilities, available at https://infcis.iaea.org/NFCIS/Facilities.
25.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 112
.26.
S.
Daly
, J.
Parachini
, W.
Rosenau
, “Aum Shinrikyo, Al Qaeda, and the Kinshasa Reactor: Implications of Three Case Studies for Combating Nuclear Terrorism
, report prepared for the United States Air Force by RAND
, 2005
, p. 58
.27.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 119
.28.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 119
29.
University of Maryland National Consortium for the Study of Terrorism and Responses to Terrorism, Nuclear Facilities Attack Database, available at http://www.start.umd.edu/nuclear-facilities-attack-database-nufad.
30.
J.
Holdren
, “Threats to Civil Nuclear-energy Facilities,” in Science and Technology to Counter Terrorism: Proceedings of an Indo-U.S. Workshop
, edited by S.
Cohen
, R.
Guenther
, R.
Narasimha
, and A.
Kumar
, Washington, DC
: The National Academies Press
, 2007
, p. 63
.31.
M.
Bunn
, M.
Malin
, N.
Roth
, W.
Tobey
, “Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline?
” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School
, 2016
, p. 114
.32.
J.
Holdren
, “Threats to Civil Nuclear-energy Facilities,” in Science and Technology to Counter Terrorism: Proceedings of an Indo-U.S. Workshop
, edited by S.
Cohen
, R.
Guenther
, R.
Narasimha
, and A.
Kumar
, Washington, DC
: The National Academies Press
, 2007
, p. 63
.33.
M.
Holt
and A.
Andrews
, Nuclear Power Plant Security and Vulnerabilities
(Congressional Research Service
, Washington, DC
, 2014
).34.
M.
de la Baume
, “Unidentified Drones Are Seen Above French Nuclear Plants
,” New York Times
, 2014
, available at https://www.nytimes.com/2014/11/04/world/europe/unidentified-drones-are-spotted-above-french-nuclear-plants.html?_r=035.
J.
Holdren
, “Threats to Civil Nuclear-energy Facilities,” in Science and Technology to Counter Terrorism: Proceedings of an Indo-U.S. Workshop
, edited by S.
Cohen
, R.
Guenther
, R.
Narasimha
, and A.
Kumar
, Washington, DC
: The National Academies Press
, 2007
, p. 63
.36.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 124
.37.
Y.
Lappin
, “Hamas: We attempted to hit the nuclear reactor in Dimona
,” JPost
, 2014
, available at http://www.jpost.com/Operation-Protective-Edge/Rocket-alert-sirens-sound-in-Zichron-Yaakov-120-km-north-of-Gaza-362087.38.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 124
.39.
“S.
Korea’s Nuclear Power Reactors Not Designed to Deal with Military Attacks
,” Yonhap News Agency
, 2016
, available at http://english.yonhapnews.co.kr/news/2017/04/16/0200000000AEN20170416002800320.html.40.
IAEA Nuclear Security Series No. 13 Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5).
41.
J.
Holdren
, “Threats to Civil Nuclear-energy Facilities,” in Science and Technology to Counter Terrorism: Proceedings of an Indo-U.S. Workshop
, edited by S.
Cohen
, R.
Guenther
, R.
Narasimha
, and A.
Kumar
, Washington, DC
: The National Academies Press
, 2007
, p. 64
.42.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Suart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 174
.43.
University of Maryland National Consortium for the Study of Terrorism and Responses to Terrorism, Nuclear Facilities Attack Database, available at http://www.start.umd.edu/nuclear-facilities-attack-database-nufad.
44.
C.
Ferguson
, Nuclear Energy: What Everyone Needs to Know
, New York
: Oxford University Press
, 2011
, p. 182
.45.
C.
Ferguson
, Nuclear Energy: What Everyone Needs to Know
, New York
: Oxford University Press
, 2011
, p. 182
.46.
C.
Ferguson
and W.
Potter
, The Four Faces of Nuclear Terrorism
, New York
: Routledge
, 2005
, p. 218
.47.
M.
Bunn
, M.
Malin
, N.
Roth
, W.
Tobey
, “Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline?
” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2016
, p. 20
.48.
C.
Baylon
, R.
Brunt
, and D.
Livingstone
, “Cyber Security at Civil Nuclear Facilities Understanding the Risks
,” Chatham House
, 2015
, p. 6
.49.
M.
Bloom
, “Should We Regulate the Internet to Prevent Terror
,” On Point, WBUR National Public Radio, 2017
, available at http://www.wbur.org/onpoint/2017/06/05/regulate-internet-prevent-terror50.
C.
Baylon
, R.
Brunt
, and D.
Livingstone
, “Cyber Security at Civil Nuclear Facilities Understanding the Risks
,” Chatham House
, 2015
, p. 5
51.
2016
NTI Nuclear Security Index
, available at http://www.ntiindex.org.52.
B.
Ramberg
, Nuclear Power Plants as Weapons for the Enemy: An Unrecognized Military Peril, Berkley
: University of California Press
, p. 18
.53.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 112
.54.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 112
.55.
A.
MacFarlane
, “How to Protect Nuclear Plants from Terrorists
,” The Conversation
, 2016
, available at http://theconversation.com/how-to-protect-nuclear-plants-from-terrorists-5709456.
A.
MacFarlane
, “How to Protect Nuclear Plants from Terrorists
,” The Conversation
, 2016
, available at http://theconversation.com/how-to-protect-nuclear-plants-from-terrorists-5709457.
M.
Bunn
, M.
Malin
, N.
Roth
, W.
Tobey
, “Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline?
” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2016
, p. 27
.58.
M.
Bunn
, M.
Malin
, N.
Roth
, W.
Tobey
, “Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline?
” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2016
, p. 89
.59.
G.
Friedman
, Special Report on Inquiry into the Security Breach at the National Nuclear Security Administration’s Y-12 National Security Complex
(U.S. Department of Energy
, Washington, DC
, 2012
)60.
E.
Schlosser
, “Break-in at Y-12
,” The New Yorker
, 2015
, available at http://www.newyorker.com/magazine/2015/03/09/break-in-at-y-12.61.
E.
Schlosser
, “Break-in at Y-12,” The New Yorker, 2015, available at http://www.newyorker.com/magazine/2015/03/09/break-in-at-y-12.62.
G.
Ackerman
and J.
Halverson
, “Attacking Nuclear Facilities: Hype or Threat,” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 118
.63.
H.
Kristensen
and R.
Norris
, “Status of World Nuclear Forces
,” The Federation of American Scientists
, 2017
.64.
C.
Ferguson
and W.
Potter
, The Four Faces of Nuclear Terrorism
, New York
: Routledge
, 2005
, p. 54
.65.
N.
Salik
, “Nuclear Terrorism: Assessing the Danger
,” Strategic Analysis
38
, 2014
, p. 177
.66.
M.
Bunn
, “Securing the Bomb 2010: Securing All Nuclear Materials in Four Years
,” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, Commissioned by the Nuclear Threat Initiative, 2010
, p. 16
.67.
N.
Salik
, “Nuclear Terrorism: Assessing the Danger
,” Strategic Analysis
38
, 2014
, p. 178
.68.
E.
Sokova
, “Non-state Actors and Nuclear Weapons
,” in Understanding Nuclear Weapon Risks, edited by J.
Borrie
, T.
Caughley
, and W.
Wan
, UNIDIR Report
, 2017
, p. 85
.69.
E.
Sokova
, “Non-state Actors and Nuclear Weapons
,” in Understanding Nuclear Weapon Risks, edited by J.
Borrie
, T.
Caughley
, and W.
Wan
, UNIDIR Report
, 2017
, p. 85
.70.
J.
Cirincione
, “Hey, NATO, Let’s Move Those 50 US Thermonuclear Weapons Out of Turkey
,” Defense One
, 2017
, available at http://www.defenseone.com/ideas/2017/05/dear-nato-get-those-50-us-thermonuclear-weapons-out-turkey/138113/71.
P.
Hoodbhoy
and Z.
Mian
, “Securing Pakistan’s Nuclear Arsenal: The Threat From Within” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
, p. 183
.72.
R.
Mowatt-Larssen
, “Nuclear Security in Pakistan: Reducing the Risks of Nuclear Terrorism
,” Arms Control Today
, 2009
, available at https://www.armscontrol.org/act/2009_07-08/Mowatt-Larssen73.
For a full discussion of the obstacles in securing Pakistan’s nuclear arsenal, see
P.
Hoodbhoy
and Z.
Mian
, “Securing Pakistan’s Nuclear Arsenal: The Threat From Within” in Nuclear Terrorism: Countering the Threat
, edited by B.
Volders
and T.
Sauer
, New York
: Routledge
, 2016
.74.
“
Module 2: Nuclear Terrorism
,” The Nuclear Threat Initiative
, available at http://www.nti.org/media/pdfs/Securing_The_Bomb_2010.pdf?_=131715979475.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 177
.76.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 181
.77.
S.
Martin
, Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 192
.78.
“
Module 2: Nuclear Terrorism
,” The Nuclear Threat Initiative, available at
http://www.nti.org/media/pdfs/Securing_The_Bomb_2010.pdf?_=131715979479.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 183
.80.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 183
.81.
M.
Bunn
, “Securing the Bomb 2010: Securing All Nuclear Materials in Four Years
,” Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, Commissioned by the Nuclear Threat Initiative, 2010
, p. 16
.82.
U.S.
Congress
, Office of Technology Assessment, “Nuclear Proliferation and Safeguards,” Washington, DC
: U.S. Government Printing Office
, June 1977
.83.
G.
Ackerman
, “Motivations for Engaging in Nuclear Terrorism
,” Expert Series, The Fund for Peace
, 2006
, p. 1
.84.
For further discussion of these motivations, see
G.
Ackerman
, “Motivations for Engaging in Nuclear Terrorism,” Expert Series
, The Fund for Peace
, 2006
.85.
M.
Crenshaw
, “Theories of Terrorism: Instrumental and Organizational Approaches,” in Inside Terrorist Organizations
, edited by D.
Rappaport
, London
: Frank Cass Publishers
, 2001
, p. 13
.86.
B.
Jenkins
, “International Terrorism: A New Mode of Conflict,” in International Terrorism and World Security
edited by D.
Carlton
and C
, Schaerf
, London
: Croom Helm
, 1975
, p. 15
.87.
J.
Forest
, “Framework for Analyzing the Future Threat
,” Journal of Strategic Security
5
, 2012
, p. 57
.88.
M.
Crenshaw
, “Theories of Terrorism: Instrumental and Organizational Approaches,” in Inside Terrorist Organizations
, edited by D.
Rappaport
, London
: Frank Cass Publishers
, 2001
, p. 18
.89.
E.
Sprinzak
and I.
Zertal
, “Avenging Israel’s Blood,” in Toxic Terror
edited by J.
Tucker
, Cambridge
: The MIT Press
, 2000
, pp. 17
–42
.90.
L.
Denny
, P.
Kozak
, and J.
Post
, “Weapons of Mass Destruction Terrorism,” in Avoiding the Abyss
edited by B.
Schneider
and J.
Davis
, London
: Praeger Security International
, 2006
, pp. 59
–64
.91.
B.
Hoffman
, “Terrorism and Weapons of Mass Destruction: An Analysis of Trends and Motivations
,” RAND
1999
, p. 27
.92.
B.
Hoffman
, “Terrorism and Weapons of Mass Destruction: An Analysis of Trends and Motivations
,” RAND
1999
, pp. 8
–24
.93.
R.
Danzig
et. al, “Aum Shinrikyo: Insights Into How Terrorists Develop Biological and Chemical Weapons,” Center for a New American Security
, 2011
, p. 4
.94.
G.
Ackerman
, “Motivations for Engaging in Nuclear Terrorism
,” Expert Series, The Fund for Peace
, 2006
, p. 9
.95.
R.
Mowatt-Larssen
, “Al Qaeda’s Pursuit of Weapons of Mass Destruction
,” Foreign Policy
, 2010
, available at http://foreignpolicy.com/2010/01/25/al-qaedas-pursuit-of-weapons-of-mass-destruction/96.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 13
.97.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 14
.98.
R.
Mowatt-Larssen
, “Al Qaeda’s Pursuit of Weapons of Mass Destruction
,” Foreign Policy
, 2010
, available at http://foreignpolicy.com/2010/01/25/al-qaedas-pursuit-of-weapons-of-mass-destruction/99.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 176
.100.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 176
.101.
M.
Bunn
, “Is Nuclear Terrorism a Real Threat,” in Debating Terrorism and Counterterrorism
edited by Stuart
Gottlieb
, Los Angeles
: CQ Press
, 2014
, p. 177
102.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 14
.103.
G.
Moore
, Is ISIL a Radioactive Threat,” The Federation of American Scientists
, Public Interest Report
67
, 2014
.104.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 14
.105.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 14
.106.
Peter
Bergen
et. al. Jihadist Terrorism: A threat Assessment
. Bipartisan Policy Center
, 2013
, 6
.107.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 19
.108.
The Nuclear Threat Imitative
, Preventing A Dirty Bomb
, 2016
, available at http://www.nti.org/media/documents/Preventing_a_Dirty_Bomb_FINAL.pdf109.
T.
Hegghammer
and A. Hoelstad
Daehli
, “Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities,” in Insider Threats
edited by M.
Bunn
and S.
Sagan
, New York
: Cornell University Press
, 2016
, p. 21
.
This content is only available via PDF.
© 2017 Author(s).
2017
Author(s)