21 Items

FBI agents leave a raid in Trenton, N.J. on July 19, 2012

Julio Cortez/AP

Discussion Paper - Managing the Atom Project, Belfer Center

The Long Arm

| February 2019

The networks of middlemen and intermediaries involved in the illicit procurement of weapons of mass destruction (WMD)-related goods and technologies often operate outside of the United States, which presents several legal and political challenges regarding U.S. trade control enforcement activities. This report considers the extraterritorial efforts of U.S. law enforcement in counterproliferation-related activities and their implications. In other words, how does the United States contend with violations of its weapons of mass destruction (WMD)-related trade controls in overseas jurisdictions, and what are the implications for broader U.S. and international nonproliferation efforts, as well as wider international security and economic concerns? 

A North Korean military parade (Stefan Krasowski via Flickr).

Stefan Krasowski via Flickr

Journal Article - Defense and Security Analysis

An Evolving State of Play? Exploring Competitive Advantages of State Assets in Proliferation Networks

| Jan. 17, 2019

Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.

People at Seoul Train Station watch a a local news program reporting about a North Korean missile launch. Aug. 30, 2017 (Lee Jin-man/Associated Press).

Lee Jin-man/Associated Press

Journal Article - The RUSI Journal

North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement

| Oct. 17, 2018

Despite one of the most extensive sanctions regimes in history, including an embargo on missile technologies, North Korea has taken huge steps forward in its ballistic missile programme. Daniel Salisbury explores the limitations of, and challenges of implementing, supply-side approaches to missile nonproliferation. Considering North Korea’s recent progress and efforts to evade sanctions, the article highlights the continuing need to strengthen efforts to counter illicit trade in missile-related technologies.

Kuala Lumpur, Malaysia (Azharsofii/Wikimedia).

Azharsofii/Wikimedia

Journal Article - European Journal of International Security

Exploring the Use of 'Third Countries' in Proliferation Networks: The Case of Malaysia

| Aug. 10, 2018

‘Third countries’ are frequently exploited by those involved in networks to transfer proliferation-sensitive technologies, allowing procurement agents to obscure the end user or vendor located in the proliferating state, and to deceive industry, export licensing officials, and intelligence services. While ‘third countries’ frequently feature in illicit transactions, the academic literature exploring the roles played by entities in these jurisdictions is limited. Building on the sanctions busting literature, this article proposes a loose typology considering the ways in which third countries can be exploited by proliferation networks. The typology is illustrated using three cases involving entities based in Malaysia – A. Q. Khan’s nuclear black market network, and Iran and North Korea’s efforts to procure and market WMD-related and military goods. These cases are used to generate insights into proliferators’ selection of ‘third country’ hubs. The article argues that while exploitation of third countries by proliferation networks is a similar, but distinct phenomenon to trade-based sanctions busting, hubs of both activities share characteristics. Furthermore, the article argues that other factors beyond the lax regulatory environment, such as level of development, and personal connections, are often as important in driving the decisions of proliferation networks. The article concludes with implications for nonproliferation policy.

Palgrave Pivot

Palgrave Pivot

Book - Palgrave Pivot

Preventing the Proliferation of WMDs: Measuring the Success of UN Security Council Resolution 1540

| 2018

This edited volume provides a fresh analysis for researcher and practitioners regarding United Nations Security Council resolution 1540, the status of its implementation, and its future by providing an original evaluation of progress in implementation and challenges faced during the resolution’s first decade. In doing so, the book will consider the resolution’s utility as a non-proliferation tool with a view to identifying what further actions are required for the objectives and goals embodied by UNSCR 1540 to be achieved and sustained.  The book progresses by exploring the history of the resolution, implementation trends, implementation from a regional perspective, challenges, and future ways forward. The book appeals to a wide readership of scholars, policymakers, and other stakeholders of the 1540 process.

Palgrave Pivot

Palgrave Pivot

Book Chapter - Palgrave Pivot

UNSCR 1540 Implementation: Challenges Past and Present

| 2018

This chapter seeks to set out the principal challenges in the implementation of resolution 1540. Using evidence from the resolutions, meeting records, Committee Chair’s briefings, and secondary sources, it argues that the challenges to implementation of the resolution have reflected both broader conceptual issues, and, more recently, practical implementation issues. The chapter begins by considering ‘broader challenges’ to the resolution’s implementation, notably those relating to political will. The second section considers challenges that are more practical in nature. The chapter will conclude with a final section looking at some opportunities that may help to overcome these challenges.

HMS Vengeance

Robert Sullivan/Flickr

Paper

Selling the Bomb: Making the Case for British Nuclear Deterrence in the Twenty-First Century

| Feb. 21, 2018

In July 2016, the British Parliament voted to replace the submarines carrying the United Kingdom’s strategic nuclear deterrent. Procurement of these new submarines—the Dreadnought class—will ensure that the United Kingdom remains a nuclear-armed state until the 2050s. The May government’s handling of the vote has been marred by the failure of a Trident missile test launch from a Royal Navy submarine days before the vote, and its delayed disclosure in January 2017. This led to allegations of a “cover-up” and familiar questions surrounding secrecy, transparency, and its effect on the public debates.

A poster on a fence in Lahore, Pakistan shows Pakistani nuclear scientist A.Q. Khan, glorified by many of his countrymen but reviled by Western governments.

AP Photo/K.M. Chaudary

Journal Article - Nonproliferation Review

Why Do Entities Get Involved in Proliferation? Exploring the Criminology of Illicit WMD-Related Trade

| Feb. 01, 2018

This article seeks to provide an original approach to weapons of mass destruction (WMD)-related illicit trade by drawing on criminology and focusing on the transactional level. Specifically, the article discusses the “rational-choice” model as a way to understand an entity’s involvement in illicit trade, and considers also the limitations of this approach, as well as the role that opportunity plays in an actor’s decision to engage in illicit trade. The article draws the conclusion that the prospects of deterring illicit trade using export controls and related criminal sanctions are limited.

A U.S. Navy Grumman F-14A-90-GR Tomcat.

U.S. Navy

Journal Article - Strategic Trade Review

Tomcat and Mouse: Iranian Illicit Procurement of U.S. Legacy Military Technologies, 1979–2016

| Autumn 2017

Since the 1979 revolution, Iran has sought to illicitly procure parts for the U.S. origin fighter aircraft sold to the country under the rule of the Shah. The U.S. has taken steps to quash this trade—these efforts have constituted a relatively large proportion of U.S. export control enforcement over the past near-to-four decades. 

teaser image

Paper

The United Kingdom's Experience in Developing and Delivering Physical Protection Workshops

| November 2017

This paper discusses the development and delivery of a workshop on the “Fundamentals of Physical Protection”, which has been run since the early 1990s, as part of the UK’s Global Threat Reduction Programme (GTRP). Over the years, the workshop has brought together a wide range of international practitioners – from operators, regulators and government bodies to share their nuclear security knowledge and experiences.