Notes
The origin of this article is a presentation at the international conference on “Information Technologies, Security, and Conflict Resolution,” Moscow, April 28–30, 1998. I am indebted to the editors and two anonymous reviewers of The Nonproliferation Review and to Malin Johansson for very useful comments and assistance.