References
- Acton, J. M. 2016. “On the Regulation of Dual-Use Nuclear Technology.” In Governance of Dual-Use Technologies: Theory and Practice, edited by E. D. Harris, 10. Cambridge, Massachusetts: American Academy of Arts and Sciences. https://www.amacad.org/multimedia/pdfs/publications/researchpapersmonographs/GNF_Dual-Use-Technology.pdf.
- Albright, D., P. Brannan, and A. S. Stricker. 2010. “Detecting and Disrupting Illicit Nuclear Trade after A.Q. Khan.” The Washington Quarterly 33 (2): 85–106. http://www.tandfonline.com/doi/abs/10.1080/01636601003673857.
- Anderson, G. 2016. “Points of Deception: Exploring How Proliferators Evade Controls to Obtain Dual-Use Goods.” Strategic Trade Review 2 (2): 4–24. http://www.str.ulg.ac.be/wp-content/uploads/2017/11/STR_02.pdf.
- Arnold, A. 2017. “A Resilience Framework for Understanding Illicit Nuclear Procurement Networks.” Strategic Trade Review 3 (4): 3–23. http://www.str.ulg.ac.be/wp-content/uploads/2017/04/A-Resilience-Framework-for-Understanding-Illicit-Nuclear-Procurement-Networks.pdf.
- Bajema, N., and D. Diane. 2017. Peril and Promise: Emerging Technologies and WMD. Report for 12–13 October 2016 Emergence and Convergence Workshop, National Defense University. http://wmdcenter.ndu.edu/Publications/Publication-View/Article/1181150/peril-and-promise-emerging-technologies-and-wmd/.
- Bandyopadhyay, A., and S. Bose, eds. 2015. Additive Manufacturing. Boca Raton, Florida: CRC Press.
- Baylon, C., R. Brunt, and D. Livingstone. 2015. “Cyber Security at Civil Nuclear Facilities: Understanding the Risks.” Report, Chatham House, September. https://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/20151005CyberSecurityNuclearBaylonBruntLivingstone.pdf.
- Beardsley, K., and V. Asal. 2013. “Nuclear Weapons Programs and the Security Dilemma.” In The Nuclear Renaissance and International Security, edited by M. Fuhrmann, and A. Stulberg, 265–287. Stanford, California: Stanford University Press.
- Belikovetsky, S., M. Yampolskiy, J. Toh, and Y. Elovici. 2016. “dr0wned—Cyber-Physical Attack with Additive Manufacturing.” ArXiv:1609.00133 [Cs.CR], September 1. http://arxiv.org/abs/1609.00133.
- Bowen, W. Q., R. Dover, and M. S. Goodman. 2014. “Intelligence and Nuclear Proliferation: An Introduction to the Special Issue.” Intelligence and National Security 29 (3): 315–322. doi:10.1080/02684527.2014.895590.
- Brockmann, K., and S. Bauer. 2017. “3-D Printing and Missile Technology Controls.” Background paper, Stockholm International Peace Research Institute, November. https://www.sipri.org/publications/2017/sipri-background-papers/3d-printing-and-missile-technology-controls.
- Central Intelligence Agency. 1984. “The ‘Gray Market’ in Nuclear Materials: A Growing Proliferation Danger.” Intelligence assessment, October 28. https://www.cia.gov/library/readingroom/document/cia-rdp85s00315r000100050005-2.
- Christopher, G. 2015. “3-D Printing: A Challenge to Nuclear Export Controls.” Strategic Trade Review 1 (1): 18–25. http://www.str.ulg.ac.be/wp-content/uploads/2016/01/2_3D_Printing_A_Challenge_to_Nuclear_Export_Controls.pdf.
- Conner, B. P., G. P. Manogharan, A. N. Martof, L. M. Rodomsky, C. M. Rodomsky, D. C. Jordan, and J. W. Limperos. 2014. “Making Sense of 3-D Printing: Creating a Map of Additive Manufacturing Products and Services.” Additive Manufacturing 1 (1): 64–76. doi:10.1016/j.addma.2014.08.005.
- Cotteleer, M., S. Trouton, and E. Dobner. 2016. “3-D Opportunity and the Digital Thread: Additive Manufacturing Ties It All Together.” Deloitte Insights. https://dupress.deloitte.com/dup-us-en/focus/3-D-opportunity/3-D-printing-digital-thread-in-manufacturing.html.
- Crawford, M. 2011. “Exploring the Maze: Counter-Proliferation Intelligence.” Survival 53 (2): 131–158. doi:10.1080/00396338.2011.571017.
- “Cybersecurity for Manufacturing Networks.” 2017. White Paper, The Cybersecurity for Advanced Manufacturing Joint Working Group of the National Defense Industrial Association. http://www.ndia.org/divisions/working-groups/cfam/resources.
- Dalton, T., W. Hoffman, A. Levite, L. Bin, G. Perkovich, and T. Zhao. 2017. “Toward a Nuclear Firewall: Bridging the NPT’s Three Pillars.” Report, Carnegie Endowment for International Peace. http://carnegieendowment.org/2017/03/20/toward-nuclear-firewall-bridging-npt-s-three-pillars-pub-68300.
- DeSmit, Z., A. E. Elhabashy, L. J. Wells, and J. A. Camelio. 2016. “Cyber-Physical Vulnerability Assessment in Manufacturing Systems.” Procedia Manufacturing 5 (Supplement C): 1060–1074. doi:10.1016/j.promfg.2016.08.075.
- “Does Deutschland Do Digital?” 2015. The Economist. November 21–27: 59–61. https://www.economist.com/news/business/21678774-europes-biggest-economy-rightly-worried-digitisation-threat-its-industrial.
- Einhorn, R. J. 2006. “Identifying Nuclear Aspirants and Their Pathways to the Bomb.” The Nonproliferation Review 13 (3): 491–499. doi:10.1080/10736700601071546.
- Fey, M. 2017. “3-D Printing and International Security: Risks and Challenges of an Emerging Technology.” Report No. 144, Peace Research Institute Frankfurt. https://www.hsfk.de/en/publications/publication-search/publication/3d-printing-and-international-security/.
- Fuchs, E. R. H. 2014. “Global Manufacturing and the Future of Technology.” Science 345 (6196): 519–520. doi:10.1126/science.1250193.
- General Electric. 2017. “Brilliant Manufacturing from GE Digital: Manufacturing Execution and Performance Management Solution for Conveyor and Assembly Operations.” https://www.ge.com/digital/sites/default/files/Brilliant-Manufacturing-Solutions-for-Conveyor-and-Assembly-Operations.pdf.
- General Electric. 2016. “GE Hitachi Selected to Lead U.S. Department of Energy Advanced Nuclear Technology Research Project.” Press release. June 22. http://www.genewsroom.com/press-releases/ge-hitachi-selected-lead-us-department-energy-advanced-nuclear-technology-research.
- Hammes, T. X. 2015. “3-D Printing Will Disrupt the World in Ways We Can Barely Imagine.” War on the Rocks, December 28. https://warontherocks.com/2015/12/3-d-printing-will-disrupt-the-world-in-ways-we-can-barely-imagine/.
- Horowitz, M. C. 2014. “Coming Next in Military Tech.” Bulletin of the Atomic Scientists 70 (1): 54–62. doi:10.1177/0096340213516743.
- Hsieh, M., and S. Ravich. 2017. “Leveraging Blockchain Technology to Protect the National Security Industrial Base from Supply Chain Attacks.” Research memo, Foundation for Defense of Democracies, July 11. http://www.defenddemocracy.org/content/uploads/documents/MEMO_Leveraging_Blockchain.pdf.
- Hutchins, M. J., R. Bhinge, M. K. Micali, S. L. Robinson, J. W. Sutherland, and D. Dornfeld. 2015. “Framework for Identifying Cybersecurity Risks in Manufacturing.” Procedia Manufacturing 1: 47–63. doi:10.1016/j.promfg.2015.09.060.
- Hvistendahl, M. 2016. “3-D Printers Vulnerable to Spying.” Science 352 (6282): 132–133. doi:10.1126/science.352.6282.132.
- “Idaho National Lab’s ‘AMAFT’ Makes 3-D Printed Nuclear Fuel That Reduces Risk of Meltdown.” 2017. “3ders.Org.” September 21. http://www.3ders.org/articles/20170921-idaho-national-labs-amaft-makes-3d-printed-nuclear-fuel-that-reduces-risk-of-meltdown.html.
- Karoutas, Z. 2017. “3-D Printing of Components and Coating Applications at Westinghouse.” MIT Workshop on New Cross-Cutting Technologies for Nuclear Power Plants, Cambridge, MA, January 30–31.
- Kelley, R. 2017. “Is Three-Dimensional (3-D) Printing a Nuclear Proliferation Tool?” EU Non-proliferation Paper no. 54, Stockholm International Peace Research Institute. https://www.sipri.org/sites/default/files/EUNPC_no_54.pdf.
- King, W. E., A. T. Anderson, R. M. Ferencz, N. E. Hodge, C. Kamath, S. A. Khairallah, and A. M. Rubenchik. 2015. “Laser Powder Bed Fusion Additive Manufacturing of Metals; Physics, Computational, and Materials Challenges.” Applied Physics Reviews 2 (4): 041304. doi:10.1063/1.4937809.
- Kroenig, M., and T. Volpe. 2015. “3-D Printing the Bomb? the Nuclear Nonproliferation Challenge.” The Washington Quarterly 38 (3): 7–19. doi:10.1080/0163660X.2015.1099022.
- Laureijs, R. E., J. B. Roca, S. P. Narra, C. Montgomery, J. L. Beuth, and E. R. H. Fuchs. 2017. “Metal Additive Manufacturing: Cost Competitive Beyond Low Volumes.” Journal of Manufacturing Science and Engineering 139 (8). doi:10.1115/1.4035420.
- McCutcheon, B. 2016. “3-D Printing and the ‘Flattening’ of Manufacturing.” PwC, Next in Tech. http://usblogs.pwc.com/emerging-technology/3-D-printing-and-the-flattening-of-manufacturing/.
- Miller, N. L. 2017. “Why Nuclear Energy Programs Rarely Lead to Proliferation.” International Security 42 (2): 40–77. doi:10.1162/ISEC_a_00293.
- Narang, V. 2017. “Strategies of Nuclear Proliferation: How States Pursue the Bomb.” International Security 41 (3): 110–150. doi:10.1162/ISEC_a_00268.
- Office of Nuclear Energy. 2016. “NEET Advanced Methods for Manufacturing Award Summaries.” US Energy Department. May. https://energy.gov/sites/prod/files/2016/05/f31/2016%20ADVANCED%20METHODS%20FOR%20MANUFACTURING%20AWARD%20SUMMARIES_0.pdf.
- Paulsen, C., ed. 2015 April. Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium. Gaithersburg, MD: National Institute of Standards and Technology. doi:10.6028/NIST.IR.8041.
- Rid, T. 2011. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35 (1): 5–32. doi:10.1080/01402390.2011.608939.
- Shaw, R. 2017. “3-D Printing: Bringing Missile Production to a Neighborhood near You.” Nuclear Threat Initiative, February 22. http://nti.org/6801A.
- Shaw, R., F. Dalnoki-Veress, S. Cotton, J. Pollack, M. Toki, R. Russell, O. Vassalotti, and S. G. Altaf. 2017. “Evaluating WMD Proliferation Risks at the Nexus of 3-D Printing and Do-It-Yourself (DIY) Communities.” CNS Occasional Paper, James Martin Center for Nonproliferation Studies, October 27. http://www.nonproliferation.org/op33-wmd-proliferation-risks-at-the-nexus-of-3d-printing-and-diy-communities/.
- Singer, P. W., and A. Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.
- “Smart Products, Smart Makers.” 2015. The Economist. November 21–27: 65. https://www.economist.com/news/business-and-finance/21678748-old-form-capitalism-based-built-obsolescence-giving-way-new-one-which.
- Stewart, I. J. 2015a. “EU Export Controls: The State of Play and the Need for Reform.” Paper prepared for a workshop of the European Parliament’s Sub-Committee on Security and Defense, October 6. http://www.europarl.europa.eu/RegData/etudes/STUD/2015/535000/EXPO_STU(2015)535000_EN.pdf.
- Stewart, I. J. 2015b. “The Contribution of Intangible Technology Controls in Controlling the Spread of Strategic Technologies.” Strategic Trade Review 1 (2): 41–55. http://www.str.ulg.ac.be/wp-content/uploads/2016/01/4_The_Contribution_of_Intangible_Technology_Controls_in_Controlling_the_Spread-of-Strategic-Technologies.pdf.
- Sturm, L. D., C. B. Williams, J. A. Camelio, J. White, and R. Parker. 2017. “Cyber-Physical Vulnerabilities in Additive Manufacturing Systems: A Case Study Attack on the .STL File with Human Subjects.” Journal of Manufacturing Systems 44 (Part 1): 154–164. doi:10.1016/j.jmsy.2017.05.007.
- “The Nuke Detectives.” 2015. The Economist, Technology Quarterly. September 5. https://www.economist.com/news/technology-quarterly/21662652-clandestine-weapons-new-ways-detect-covert-nuclear-weapons-are-being-developed.
- Trouton, S., M. Vitale, and J. Killmeyer. 2016. 3-D Opportunity for Blockchain: Additive Manufacturing Links the Digital Thread. London, UK: Deloitte University Press. November 17. https://www2.deloitte.com/insights/us/en/focus/3d-opportunity/3d-printing-blockchain-in-manufacturing.html.
- Tucker, J. B. 2012. Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies. Cambridge: MIT Press.
- Volpe, T. A. 2016. “Atomic Inducements: The Case for ‘Buying Out’ Nuclear Latency.” The Nonproliferation Review 23 (3–4): 481–493. doi:10.1080/10736700.2016.1246103.
- Volpe, T. A. 2017a. “Atomic Leverage: Compellence with Nuclear Latency.” Security Studies 26 (3): 517–544. doi:10.1080/09636412.2017.1306398.
- Volpe, T. A. 2017b. “Chain Reactions: Technological Innovation, Nuclear Programs, and the Security Dilemma.” Paper presented at the Workshop on Emerging Technologies and Strategic Stability. Project on Strategic Stability Evaluation, December 8, Stanford, California.
- Yampolskiy, M., A. Skjellum, M. Kretzschmar, R. A. Overfelt, K. R. Sloan, and A. Yasinsac. 2016. “Using 3-D Printers as Weapons.” International Journal of Critical Infrastructure Protection 14: 58–71. doi:10.1016/j.ijcip.2015.12.004.
- Yampolskiy, M., X. D. Peter Horvath, Y. X. Koutsoukos, and J. Sztipanovits. 2012. “Systematic Analysis of Cyber-Attacks on CPS-Evaluating Applicability of DFD-based Approach.” In 5th International Symposium on Resilient Control Systems, 55–62. doi:10.1109/ISRCS.2012.6309293.
- Yampolskiy, M., X. D. Peter Horvath, Y. X. Koutsoukos, and J. Sztipanovits. 2015. “A Language for Describing Attacks on Cyber-Physical Systems.” International Journal of Critical Infrastructure Protection 8: 40–52. doi:10.1016/j.ijcip.2014.09.003.
- Zeltmann, S. E., N. Gupta, N. G. Tsoutsos, M. Maniatakos, J. Rajendran, and R. Karri. 2016. “Manufacturing and Security Challenges in 3-D Printing.” Jom 68 (7): 1872–1881. doi:10.1007/s11837-016-1937-7.