{"title":"保障核供应链:解决假冒问题","authors":"Christopher Hobbs , Zoha Naser , Sarah Tzinieris","doi":"10.1016/j.ijcip.2025.100767","DOIUrl":null,"url":null,"abstract":"<div><div>In 2024, exploding pagers and walkie-talkies in Lebanon dramatically highlighted the importance of supply chain security and the risk that counterfeiting can pose. This article seeks to explore these issues in the nuclear context. Drawing on new empirical research, it examines how counterfeited materials, items, and technologies have found their way into nuclear supply chains and ultimately to facilities, exploring the impact of this and how the international community has responded. It finds that although counterfeits can and indeed have created significant nuclear risks, historically this issue has received relatively little attention. Here, a general lack of awareness, an overly narrow focus on their impact on critical safety systems, and the absence of comprehensive reporting mechanisms mean that the number of known counterfeits that have penetrated nuclear facilities globally is likely to be significantly underestimated. Although new international efforts in this area aimed at securing the nuclear supply chain have been launched in recent years, there remains much to be done, with considerable variation in the maturity of different countries and organizations’ approaches to this issue.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100767"},"PeriodicalIF":5.3000,"publicationDate":"2025-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing the nuclear supply chain: Addressing the issue of counterfeiting\",\"authors\":\"Christopher Hobbs , Zoha Naser , Sarah Tzinieris\",\"doi\":\"10.1016/j.ijcip.2025.100767\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In 2024, exploding pagers and walkie-talkies in Lebanon dramatically highlighted the importance of supply chain security and the risk that counterfeiting can pose. This article seeks to explore these issues in the nuclear context. Drawing on new empirical research, it examines how counterfeited materials, items, and technologies have found their way into nuclear supply chains and ultimately to facilities, exploring the impact of this and how the international community has responded. It finds that although counterfeits can and indeed have created significant nuclear risks, historically this issue has received relatively little attention. Here, a general lack of awareness, an overly narrow focus on their impact on critical safety systems, and the absence of comprehensive reporting mechanisms mean that the number of known counterfeits that have penetrated nuclear facilities globally is likely to be significantly underestimated. Although new international efforts in this area aimed at securing the nuclear supply chain have been launched in recent years, there remains much to be done, with considerable variation in the maturity of different countries and organizations’ approaches to this issue.</div></div>\",\"PeriodicalId\":49057,\"journal\":{\"name\":\"International Journal of Critical Infrastructure Protection\",\"volume\":\"50 \",\"pages\":\"Article 100767\"},\"PeriodicalIF\":5.3000,\"publicationDate\":\"2025-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Critical Infrastructure Protection\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1874548225000289\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Critical Infrastructure Protection","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874548225000289","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Securing the nuclear supply chain: Addressing the issue of counterfeiting
In 2024, exploding pagers and walkie-talkies in Lebanon dramatically highlighted the importance of supply chain security and the risk that counterfeiting can pose. This article seeks to explore these issues in the nuclear context. Drawing on new empirical research, it examines how counterfeited materials, items, and technologies have found their way into nuclear supply chains and ultimately to facilities, exploring the impact of this and how the international community has responded. It finds that although counterfeits can and indeed have created significant nuclear risks, historically this issue has received relatively little attention. Here, a general lack of awareness, an overly narrow focus on their impact on critical safety systems, and the absence of comprehensive reporting mechanisms mean that the number of known counterfeits that have penetrated nuclear facilities globally is likely to be significantly underestimated. Although new international efforts in this area aimed at securing the nuclear supply chain have been launched in recent years, there remains much to be done, with considerable variation in the maturity of different countries and organizations’ approaches to this issue.
期刊介绍:
The International Journal of Critical Infrastructure Protection (IJCIP) was launched in 2008, with the primary aim of publishing scholarly papers of the highest quality in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology, law and policy to craft sophisticated yet practical solutions for securing assets in the various critical infrastructure sectors. These critical infrastructure sectors include: information technology, telecommunications, energy, banking and finance, transportation systems, chemicals, critical manufacturing, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, nuclear reactors, materials and waste, postal and shipping, and government facilities. Protecting and ensuring the continuity of operation of critical infrastructure assets are vital to national security, public health and safety, economic vitality, and societal wellbeing.
The scope of the journal includes, but is not limited to:
1. Analysis of security challenges that are unique or common to the various infrastructure sectors.
2. Identification of core security principles and techniques that can be applied to critical infrastructure protection.
3. Elucidation of the dependencies and interdependencies existing between infrastructure sectors and techniques for mitigating the devastating effects of cascading failures.
4. Creation of sophisticated, yet practical, solutions, for critical infrastructure protection that involve mathematical, scientific and engineering techniques, economic and social science methods, and/or legal and public policy constructs.