Nuclear weapons |
---|
Background |
Nuclear-armed states |
|
Nuclear espionage is the purposeful giving of state secrets regarding nuclear weapons to other states without authorization (espionage). There have been many cases of known nuclear espionage throughout the history of nuclear weapons and many cases of suspected or alleged espionage. Because nuclear weapons are generally considered one of the most important of state secrets, all nations with nuclear weapons have strict restrictions against the giving of information relating to nuclear weapon design, stockpiles, delivery systems, and deployment. States are also limited in their ability to make public the information regarding nuclear weapons by non-proliferation agreements.
During the Manhattan Project, the joint effort during World War II by the United States, the United Kingdom, and Canada to create the first nuclear weapons, there were many instances of nuclear espionage in which project scientists or technicians channeled information about bomb development and design to the Soviet Union. These people are often referred to as the Atomic Spies, and their work continued into the early Cold War. Because most of these cases became well known in the context of the anti-Communist 1950s, there has been long-standing dispute over the exact details of these cases, though some of this was settled with the making public of the Venona project transcripts, which were intercepted and decrypted messages between Soviet agents and the Soviet government. Some issues remain unsettled, however.
The most prominent of these included:
While the spies mentioned previously have become infamous for their actions, more Los Alamos spies have been identified in recent years due in part to the FBI releasing previously classified documents. Other spies have become more known after being overlooked by historians.
These include:
Most Soviet spies were properly convicted, but several evaded indictment due to a lack of evidence. In the case of Arthur Adams, he was watched by the FBI for many years before his escape to the Soviet Union. The FBI had probable cause Adams was engaging in espionage, but critically lacked evidence to proceed against him. The same goes for his associate Clarence Hiskey who was able to live the rest of his life out in the United States even though he was questioned by the FBI several times. Oscar Seborer was the most prevalent case of this, with his involvement not being discovered until decades after his spy work. Documents will continue to be found and more information about these spies and other potential saboteurs will become public knowledge.
In 1986, a former technician, Mordechai Vanunu, at the Israeli nuclear facility near Dimona revealed information about the Israeli nuclear weapon program to the British press, confirming widely held notions that Israel had an advanced and secretive nuclear weapons program and stockpile. Israel has never acknowledged or denied having a weapons program, and Vanunu was abducted and smuggled to Israel, where he was tried in camera and convicted of treason and espionage.
Whether Vanunu was truly involved in espionage, per se, is debated: Vanunu and his supporters claim that he should be regarded as a whistle-blower (someone who was exposing a secretive and illegal practice), while his opponents see him as a traitor and his divulgence of information as aiding enemies of the Israeli state. Vanunu did not immediately release his information and photos on leaving Israel, travelling for about a year before doing so. The politics of the case are hotly disputed.
In a 1999 report of the United States House of Representatives Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, chaired by Rep. Christopher Cox (known as the Cox Report), it was revealed that U.S. security agencies believed that there is ongoing nuclear espionage by the People's Republic of China (PRC) at U.S. nuclear weapons design laboratories, especially Los Alamos National Laboratory, Lawrence Livermore National Laboratory, Oak Ridge National Laboratory, and Sandia National Laboratories. According to the report, the PRC had "stolen classified information on all of the United States' most advanced thermonuclear warheads" since the 1970s, including the design of advanced miniaturized thermonuclear warheads (which can be used on MIRV weapons), the neutron bomb, and "weapons codes" which allow for computer simulations of nuclear testing (and allow the PRC to advance their weapon development without testing themselves). The United States was apparently unaware of this until 1995.
The investigations described in the report eventually led to the arrest of Wen Ho Lee, a scientist at Los Alamos, initially accused of giving weapons information to the PRC. The case against Lee eventually fell apart, however, and he was eventually charged only with mishandling of data. Other people and groups arrested or fined were scientist Peter Lee (no relation), who was arrested for allegedly giving submarine radar secrets to China, and Loral Space & Communications and Hughes Electronics who gave China missile secrets. No other arrests regarding the theft of the nuclear designs have been made. The issue was a considerable scandal at the time.
From 1991—93, during the Prime minister Benazir Bhutto's government, an operative directorate of the ISI's Joint Intelligence Miscellaneous (JIM), conducted highly successful operations in Soviet Union. This directorate successfully procured nuclear material while many operative were posted as the Defence attaché in the Embassy of Pakistan in Moscow; and concurrently obtaining other materials from Romania, Albania, Poland and the former Czechoslovakia.[4]
In January 2004, Dr. Abdul Qadeer Khan confessed to selling restricted technology to Libya, Iran, and North Korea. According to his testimony and reports from intelligence agencies, he sold designs for gas centrifuges (used for uranium enrichment), and sold centrifuges themselves to these three countries. Khan had previously been indicated as having taken gas centrifuge designs from a uranium enrichment company in the Netherlands (URENCO) which he used to jump-start Pakistan's own nuclear weapons program. On February 5, 2004, the president of Pakistan, General Pervez Musharraf, announced that he had pardoned Khan. Pakistan's government claims they had no part in the espionage, but refuses to turn Khan over for questioning by the International Atomic Energy Agency.
When looking at future nuclear espionage all fingers are pointed at Iran. Their aspirations for obtaining nuclear weapons dates back to the 1970s. Those aspirations only grew stronger in the 1980s when the Iran-Iraq war broke out. This led nuclear research to become a major priority not only at the governmental level, but also at the private level. Iran has stated that their reason for nuclear research is for solely nonmilitary purposes such as for agricultural, medical, and industrial advancements.[5]
The world powers do not like the addition of more countries with the opportunity to create nuclear weapons. Due to this the world powers made deals with Iran which led to the halt of nuclear research in the 2010s. This did not last long before IAEA started to get test readings that showed Iran had enriched uranium over eighty percent. This is higher enrichment than the little boy bomb that was used at Hiroshima which was right at eighty percent. That let the world know that Iran had the capability to enrich to a level great enough to produce a working nuclear weapon. The other thing they would need is a working bomb designed which is easier to steal than to discover. This has been shown by the Soviet Union, China, and Pakistan.[5]
The ways of committing espionage have multiplied with the increase dependence on technology. This venerability is where a nation like Iran can benefit. They have one of the world's best cyber arsenals, and it only continues to grow. This allows them to perform cyberattacks much like North Korea has done to either gain access to nuclear weapon plans or get them as ransom. The United States and Israel would both be likely targets of a cyber espionage attack by Iran due to their previous attack on Iran. The attack by the United States and Israel was a malware called Stuxnet that was sold to Iran which eventually caused severe damage to their nuclear program There are other reasons it is believed that Iran may use cyberattacks to acquire the missing link to their nuclear weapons development. That is because they have used cyberattacks before even on the United States with regard to the attack on JPMorgan. This attack was linked to seven Iranians by the United States Justice Department.[6] This new era of technology gives places like Iran the opportunity to retaliate. The most dangerous way they can retaliate is to commit espionage to acquire working nuclear weapon designs. This will most likely lead to an increase in nuclear weapons research in surrounding countries. That is dangerous because of the religious disagreements in the area between the Sunni (Egypt) and Shia (Iran) Muslims.[5]
This new cyber aspect of espionage has led to many efforts by nuclear weapons welding countries to scour their systems to try to find weak spots where there are venerable. Some countries have even started pouring money into cyber defense programs like United Kingdom. They have annually put two billion dollars toward a cyber defense system in an attempt to keep their assets protected. Espionage has become easier with a whole new route to gain access to private information. It has also become a harder thing to prevent.[6]
India's path to become a nuclear power began with successful nuclear detonation during the operation known as Smiling Buddha in 1974. The official name for the project was Pokhran-I. It wasn't until May 13, 1998 that Pokhran-II, the next major development of India's nuclear weapons program, was detonated. It consisted of one fusion bomb and four fission bombs. This led then Prime Minister Atal Bihari Vajpayee to officially declare India as a nuclear power. However, India was involved in the nuclear dealings of the world much sooner than this.
India was involved with assisting espionage between the United States and China in October 1965. The CIA enlisted 14 American climbers to scale Nanda Devi and working in cooperation with the Indian Intelligence Bureau, successfully planned the Nanda Devi Plutonium Mission.[7] The objective of the mission was for the 14 climbers to work in unison to place a Radioisotope Thermoelectric Generator (RTG), powering a detector on the peak of Nanda Devi, thus allowing the U.S. to spy on China. More specifically, the Xinjiang Province. This was due to the lack of intelligence that the U.S. had on Chinese nuclear capacities during the Vietnam War. Ultimately, the mission failed due to one of the generators being lost during a snowstorm. However, this failed mission has had lasting impact on the region. Snow from the mountain carries into the Ganges, a crucial river for the survival and daily lives of millions of people that live in this region. It is thought that the generator was carried down the mountain by an avalanche.[8] The river also has significant religious and spiritual importance to Hindus, who worship the river as Ganga. The CIA, knowing about the radioactive material being lost, sent climbers back to the area to search for the generator in 1966. This attempt was unsuccessful. In 1967 a new generator was sent with the climbers and was placed atop the peak of Nanda Kot. This mission was a success, and the U.S. was able to spy on the Chinese region.
On October 30, 2019 the Nuclear Power Corporation of India (NPCIL) made an official announcement that the Kudankulam Nuclear Power Plant in Tamil Nadu was the victim of a cyberattack.[9] The attack happened earlier that year in September, but the NPCIL was hesitant to go public with the news, stating that a cyberattack on the facility was not possible. Only a single computer was attacked by the perpetrator. It's not clear what information was stolen at the time, but top officials related to the incident are not convinced that future attacks will be prevented. Speculation about the perpetrator has been discussed, specifically about what type of malware was used to hack into the system. The malware, known as "Dtrack", has similarities to attacks from North Korea.[10] This makes them a possible target, especially with their past of other malware attacks.
{{cite news}}
: CS1 maint: bot: original URL status unknown (link)
{{cite journal}}
: Cite journal requires |journal=
(help)