Articles

27 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

WWI chemical weapon firing pipes

Wikimedia CC/Rosser1954

Journal Article - Nonproliferation Review

Gas, Norms, and Statistics: The Jury is Still Out

Damir Kovačević, Afrimadona, and Martin Claar's (KAC) statistical adjudication between the potential role of norms versus strategic deterrence in preventing interstate chemical-weapons use is a welcome contribution (Vol. 26, Nos. 3–4, pp. 251–66). The authors conclude that a powerful non-use norm is the most convincing explanation for downtrending chemical warfare. However, closer examination by  David M. Allison and Stephen Herzog in this response to the original article reveals several analytical issues, including inaccurate presentation of data and alternative explanations, that may undermine their results.

Members of the 576th Flight Test Squadron monitor an operational test launch of an unarmed Minuteman III missile

USAF/Michael Peterson

Journal Article - Bulletin of the Atomic Scientists

The Overwhelming Case for No First Use

| Jan. 13, 2020

The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

People at Seoul Train Station watch a a local news program reporting about a North Korean missile launch. Aug. 30, 2017 (Lee Jin-man/Associated Press).

Lee Jin-man/Associated Press

Journal Article - The RUSI Journal

North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement

| Oct. 17, 2018

Despite one of the most extensive sanctions regimes in history, including an embargo on missile technologies, North Korea has taken huge steps forward in its ballistic missile programme. Daniel Salisbury explores the limitations of, and challenges of implementing, supply-side approaches to missile nonproliferation. Considering North Korea’s recent progress and efforts to evade sanctions, the article highlights the continuing need to strengthen efforts to counter illicit trade in missile-related technologies.

Blogtrepreneur/Flickr

Blogtrepreneur/Flickr

Journal Article - Nonproliferation Review

Solving the Jurisdictional Conundrum: How U.S. Enforcement Agencies Target Overseas Illicit Procurement Networks Using Civil Courts

| September 2018

Over the past two decades, the United States has increasingly turned to targeted sanctions and export restrictions, such as those imposed against Iran and North Korea, in order to curb the spread of weapons of mass destruction. One vexing problem, however, is how to contend with jurisdictional hurdles when the violations occur overseas, in countries that are unable or unwilling to assist US enforcement efforts. To solve this problem, US prosecutors are turning to strategies with significant extraterritorial implications—that is, exercising legal authority beyond national borders. One such tool is to use civil legal procedures to seize assets linked to sanctions or export-control violations in jurisdictions that lack cooperative arrangements with US enforcement agencies. While this may be an attractive strategy to bolster enforcement efforts against overseas illicit procurement, using such tools is not without consequence. This article explores the political, legal, and technical implications of enforcing extraterritorial controls against overseas non-state actors by exploring the recent uses of civil-asset forfeiture against Iranian and North Korean procurement networks.

Kuala Lumpur, Malaysia (Azharsofii/Wikimedia).

Azharsofii/Wikimedia

Journal Article - European Journal of International Security

Exploring the Use of 'Third Countries' in Proliferation Networks: The Case of Malaysia

| Aug. 10, 2018

‘Third countries’ are frequently exploited by those involved in networks to transfer proliferation-sensitive technologies, allowing procurement agents to obscure the end user or vendor located in the proliferating state, and to deceive industry, export licensing officials, and intelligence services. While ‘third countries’ frequently feature in illicit transactions, the academic literature exploring the roles played by entities in these jurisdictions is limited. Building on the sanctions busting literature, this article proposes a loose typology considering the ways in which third countries can be exploited by proliferation networks. The typology is illustrated using three cases involving entities based in Malaysia – A. Q. Khan’s nuclear black market network, and Iran and North Korea’s efforts to procure and market WMD-related and military goods. These cases are used to generate insights into proliferators’ selection of ‘third country’ hubs. The article argues that while exploitation of third countries by proliferation networks is a similar, but distinct phenomenon to trade-based sanctions busting, hubs of both activities share characteristics. Furthermore, the article argues that other factors beyond the lax regulatory environment, such as level of development, and personal connections, are often as important in driving the decisions of proliferation networks. The article concludes with implications for nonproliferation policy.

Gas centrifuges for uranium enrichment recovered en route to Libya in 2003.

U.S. Department of Energy

Journal Article - Quarterly Journal: International Security

The Nonproliferation Emperor Has No Clothes: The Gas Centrifuge, Supply-Side Controls, and the Future of Nuclear Proliferation

| Spring 2014

Policymakers have long focused on preventing nuclear weapons proliferation by controlling technology. Even developing countries, however, may now possess the technical ability to create nuclear weapons. The history of gas centrifuge development in twenty countries supports this perspective. To reduce the demand for nuclear weapons, policymakers will have look toward the cultural, normative, and political organization of the world.

U.S. President Dwight D. Eisenhower and Mohammad Reza Shah in Tehran, Iran, 1959.

Wikimedia Commons

Journal Article - Origins: Current Events in Historical Perspective

Viewpoint Iran: The Past and Present of the U.S.-Iran Standoff

| October 2013

"While Americans understand relations with Iran in terms of its nuclear program and incendiary anti-Israel homilies, Iranians see the relationship as part of a long and troubling history of foreign intervention and exploitation that reaches back into the nineteenth century. Iranian leaders argue that if interactions between Iran and the United States are to improve, this history will have to be addressed and rectified."

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.