{"id":1097,"date":"2018-02-03T04:48:32","date_gmt":"2018-02-03T04:48:32","guid":{"rendered":"https:\/\/cryptorepublic.app\/?p=1097"},"modified":"2018-02-03T04:48:32","modified_gmt":"2018-02-03T04:48:32","slug":"putin-trump-and-the-nuclear-danger","status":"publish","type":"post","link":"https:\/\/cryptorepublic.app\/?p=1097","title":{"rendered":"Putin, Trump, and the Nuclear Danger"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_heading tag=\u00bbh5&#8243; custom_google_font=\u00bb\u00bb font_weight=\u00bb600&#8243; text=\u00bbYves here. This Real News Network interview with MIT\u2019s Theodore Postol (the second part of a series) discusses some of the history in the fraught relationship between Russia and the US which spurred Putin to invest heavily in technologies that could circumvent some of our core weapons platforms.\u00bb line_height=\u00bb1.4&#8243;][tm_spacer size=\u00bblg:25&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbIt\u2019s The Real News. I\u2019m Aaron Mat\u00e9. This is part two of my conversation with Theodore Postol, Professor of Science, Technology and National Security Policy at MIT. We\u2019re talking about Russian president Vladimir Putin\u2019s recent speech where he announced upgrades to his country\u2019s nuclear arsenal, calling it a response to the US withdrawal from the ABM treaty in 2002, as well as the recent Nuclear Posture Review issued by President Trump.\u00bb][tm_spacer size=\u00bblg:63&#8243;][vc_row_inner][vc_column_inner width=\u00bb3\/12&#8243;][tm_image image=\u00bb875&#8243;][tm_spacer size=\u00bbsm:30&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb9\/12&#8243;][tm_heading tag=\u00bbh5&#8243; custom_google_font=\u00bb\u00bb font_weight=\u00bb600&#8243; text=\u00bbUse psychological pricing methods.\u00bb line_height=\u00bb1.4&#8243;][tm_spacer size=\u00bblg:23&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bb Several points of the renewed US nuclear strategy which lower the threshold of using nuclear weapons provokes great concern. You can reassure anyone in any way behind the scenes, but if we read what is written and what is written is that it can be launched in response to an attack with conventional weapons or even a cyber threat.\u00bb][tm_spacer size=\u00bbxs:30;lg:35&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbIn fact, as Putin said it, certainly since 2004. He actually signals 2004 as a time where there was a decision made in Russia that you couldn\u2019t talk to the Americans and we\u0092re just going to have to go ahead and build some weapons to make it clear to them that there\u2019s no possible advantage they can gain from missile defenses.\u00bb][\/vc_column_inner][\/vc_row_inner][tm_spacer size=\u00bbxs:30;lg:52&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbHe made that pretty clear in his speech. And the issue of using low yield nuclear warheads in conventional military situations or in response to a cyber attack, first of all, I don\u2019t know how you would know where the cyber attack came from. \u00ab][tm_spacer size=\u00bbxs:30;lg:68&#8243;][vc_row_inner][vc_column_inner offset=\u00bbvc_col-md-6&#8243;][tm_heading tag=\u00bbh5&#8243; custom_google_font=\u00bb\u00bb font_weight=\u00bb600&#8243; text=\u00bbDemonstrate the differences\u00bb line_height=\u00bb1.4&#8243;][tm_spacer size=\u00bblg:23&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbI think when you look carefully at the issues associated with cyber attacks, it\u2019s so easy to conceal the true perpetrator, the identity of the true perpetrator. It would be a remarkable, remarkably reckless thing to do, to respond in any military way to a cyber attack without absolutely having the information that clearly showed you knew who did it.\u00bb][tm_spacer size=\u00bbsm:30;lg:68&#8243;][tm_heading tag=\u00bbh5&#8243; custom_google_font=\u00bb\u00bb font_weight=\u00bb600&#8243; text=\u00bbOffer a money-back guarantee\u00bb line_height=\u00bb1.4&#8243;][tm_spacer size=\u00bblg:23&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbAnd against anybody who\u2019s even modestly competent, even some of these hackers who really are not very competent people, you can hide your address, your location from anybody you\u2019re attacking. So, it\u2019s kind of a crazy, thoughtless and dangerous kind of statement to be making that you\u2019re going to use nuclear weapons or any kind of military force in response to a cyber attack.\u00bb][tm_spacer size=\u00bbsm:30;lg:68&#8243;][tm_heading tag=\u00bbh5&#8243; custom_google_font=\u00bb\u00bb font_weight=\u00bb600&#8243; text=\u00bbTest your offer and price, and be creative.\u00bb line_height=\u00bb1.4&#8243;][tm_spacer size=\u00bblg:23&#8243;][tm_heading tag=\u00bbdiv\u00bb custom_google_font=\u00bb\u00bb text=\u00bbSo, it shows a kind of reckless attitude on the part of the Department of Defense people and ignorance, or ignorance, or recklessness and ignorance among the people who wrote the Nuclear Policy Review, and I\u2019m afraid that that is evident in a whole bunch of things they say. \u00ab][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-6&#8243;][tm_spacer size=\u00bbsm:40&#8243;][tm_image full_wide=\u00bb1&#8243; image=\u00bb876\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The idea that a low-yield nuclear weapon would be seen as different from a higher-yield nuclear weapon shows a complete lack of understanding of how information promulgates in the world.<\/p>\n","protected":false},"author":1,"featured_media":1093,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[25,27,28],"class_list":["post-1097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-updates","tag-business","tag-finance","tag-industry"],"views":226,"_links":{"self":[{"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/posts\/1097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1097"}],"version-history":[{"count":0,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/posts\/1097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=\/wp\/v2\/media\/1093"}],"wp:attachment":[{"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptorepublic.app\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}