Journal Article - Defense and Security Analysis
An Evolving State of Play? Exploring Competitive Advantages of State Assets in Proliferation Networks
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Belfer Communications Office
For Academic Citation:
Salisbury, Daniel . “An Evolving State of Play? Exploring Competitive Advantages of State Assets in Proliferation Networks.” Defense and Security Analysis, (January 17, 2019) .
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Journal Article
- The RUSI Journal
North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement
Journal Article
- European Journal of International Security
Exploring the Use of 'Third Countries' in Proliferation Networks: The Case of Malaysia
In the Spotlight
Most Viewed
Journal Article
- Research Policy
The Relationship Between Science and Technology
Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Analysis & Opinions
- Project Syndicate
What Caused the Ukraine War?
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.
Want to Read More?
The full text of this publication is available via the original publication source.- Recommended
- In the Spotlight
- Most Viewed
Recommended
Journal Article - The RUSI Journal
North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement
Journal Article - European Journal of International Security
Exploring the Use of 'Third Countries' in Proliferation Networks: The Case of Malaysia
In the Spotlight
Most Viewed
Journal Article - Research Policy
The Relationship Between Science and Technology
Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Analysis & Opinions - Project Syndicate
What Caused the Ukraine War?