612
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

PEERING INTO THE ABYSS

Non-State Actors and the 2016 Proliferation Environment

Pages 645-657 | Published online: 29 Jul 2010
 

Abstract

The George W. Bush administration has successfully reoriented national policy and convinced the international community of the absolute necessity of denying weapons of mass destruction to terrorist groups. In addition to utilizing the tools of existing export control regimes, Washington promulgated the Proliferation Security Initiative and helped push through United Nations Security Council Resolution 1540 to expand the toolkit available to states to prevent the spread of dangerous technologies and weapons to terrorist groups. While these efforts are long overdue, they address only one aspect of the proliferation threat posed by non-state actors. Current efforts focus on the “demand” side of proliferation from terrorists but inexplicably leave unaddressed the role that a growing variety of non-state actors may play in shaping the supply side of an emerging 2016 proliferation market substructure. The proliferation supply network established by Pakistani scientist A. Q. Khan provides a precursor to a dangerous new proliferation environment dominated by transnational corporations, quasi-governmental entities, and individuals operating on the fringes of government control in weak or failing states that lack the will and the resources to implement effective export-control regimes. All states need to develop a more comprehensive and holistic view of the future role that a burgeoning plethora of non-state actors will play in nuclear proliferation by 2016.

Notes

1. See Colin Gray, “How Has War Changed Since the End of the Cold War,” Parameters 35 (2005), pp. 14–26; and Ryan Henry, “Defense Transformation and the 2005 Quadrennial Defense Review, Parameters 35 (2005), pp. 5–15.

2. The White House, The National Security Strategy of the United States of America, Sept. 2002, <www.whitehouse.gov/nsc/nss.html>.

3. John Lehman, “We're Not Winning This War,” Washington Post, Aug. 31, 2006, p. A25.

4. “Annual Threat Assessment of the Director of National Intelligence for the Senate Armed Services Committee,” Washington, DC, Feb. 28, 2006, <http://intelligence.senate.gov/0602hrg/060202/negroponte.pdf#search=%22Annual%20Threat%20Assessment%20of%20the%20Director%20of%20National%20Intelligence%22>.

5. UN Security Council (UNSC) Resolution 1540, April 28, 2004, <http://daccessdds.un.org/doc/UNDOC/GEN/N04/328/43/PDF/N0432843.pdf>.

6. Christopher Clary, “A.Q. Khan, Proliferation Networks, and the Nuclear Slippery Slope,” in James A. Russell, ed., Proliferation of Weapons of Mass Destruction in the Middle East (New York: Palgrave MacMillan, 2006), pp. 93–114. Also see David Albright and Corey Hinderstein, “The A.Q. Khan Illicit Nuclear Network and Implications for Nonproliferation Efforts,” Strategic Insights 5 (July 2006), <www.ccc.nps.navy.mil/si/2006/Jul/albrightJul06.asp>.

7. Kim Reimann, “A View from the Top: International Politics, Norms and the Worldwide Growth of NGOs,” International Studies Quarterly 50 (2006), pp. 45–67.

8. Global Policy Forum Web Site, <www.globalpolicy.org/ngos/role/intro/growth2000.htm>.

9. United Nations Conference on Trade and Disarmament, World Investment Report 2004: The Shift Towards Services (Geneva and New York: UN, 2004), <www.unctad.org/Templates/WebFlyer.asp?intItemID=3235&lang=1>.

10. Lyudmila Zaitseva, “Organized Crime, Terrorism and Nuclear Trafficking: DSTO Case Study 2001–2005,” presentation to the conference on “Terrorism, Transnational Networks, and WMD Proliferation: Indications and Warning in an Age of Globalization,” Naval Postgraduate School, Monterey, California, July 25–27, 2006. See also Sonia Ben Ouagrham and Dennis Gormley, “Trafficking in WMD Materials in Central Asia and the Caucasus: I&W Implications,” presentation to the conference on “Terrorism, Transnational Networks, and WMD Proliferation.”

11. See details in Central Intelligence Agency (CIA), Comprehensive Report of the Special Advisor to the DCI on Iraq's WMD, Sept. 30, 2004, particularly Annex 1, <www.cia.gov/cia/reports/iraq_wmd_2004/>.

12. Details in Sara Kuepfer, “The Shady Side of Nuclear,” International Relations and Security Network, Aug. 23, 2006, <www.isn.ethz.ch/news/sw/details.cfm?ID=16564>.

13. Stephen Burgess, “South Africa From the Perspective of WMD Supply Networks,” presentation to the conference on “Terrorism, Transnational Networks, and WMD Proliferation,” Naval Postgraduate School, Monterey, California, July 25–27, 2006. Cited with author's permission.

14. Ronald C. Moe and Kevin R. Kosar, “The Quasi Government: Hybrid Organizations with Both Government and Private Sector Legal Characteristics,” Congressional Research Service Report for Congress, Library of Congress, Washington, DC, May 18, 2005, p. 2, <www.fas.org/sgp/crs/misc/RL30533.pdf>.

15. Jonathan Koppell, The Politics of Quasi Government: Hybrid Organizations and the Dynamics of Bureaucratic Control (Cambridge, UK: Cambridge University Press, 2003).

16. CIA, Comprehensive Report of the Special Advisor, annex 1.

17. Anthony Cordesman, “Iran's Developing Military Capabilities,” Center for Strategic and International Studies, Washington, DC. Dec. 8, 2004, p. 16, <www.csis.org/media/csis/pubs/041208_irandevmilcap[1].pdf>.

18. Troy Thomas, Stephen Kiser, and William Casebeer, Warlords Rising: Confronting Violent Non-State Actor (Lanham, MD: Lexington Books, 2005), p. 2.

19. James Rosensau, “New Dimensions of Security: The Interaction of Localizing and Globalizing Dynamics,” Security Dialogue 25 (1994), pp. 255–81. On the impact of globalization on international security, also see Philip Cerny, “Terrorism and the New Security Dilemma, Naval War College Review 58 (2005), pp. 10–33.

20. Foreign Policy and the Fund for Peace, “The Failed State Index,” July/Aug. 2005, <www.foreignpolicy.com/story/cms.php?story_id=3098>.

21. “The Failed States Index of FAQ,” Foreign Policy Web Site, <www.foreignpolicy.com/story/cms.php?story_id=3111>.

22. Like many of these terms, there is no generally accepted definition of transnational criminal organizations. The only common ground between various definitions is that the crimes are perpetrated by organized networks in a variety of different countries. John Wagley, “Transnational Organized Crime: Principal Threats and U.S. Responses,” Congressional Research Report for Congress, Library of Congress, Washington DC, March 20, 2006.

23. Louise Shelley, “The Unholy Trinity: Transnational Crime, Corruption and Terrorism,” Brown Journal of World Affairs 11 (2005), pp. 101–11. Also see Phil Williams, “Transnational Criminal Organisations and International Security,” in John Arquilla and David Ronfeldt, eds., In Athena's Camp: Preparing for Conflict in the Information Age (Santa Monica, CA: RAND, 1997), pp. 315–37.

24. IAEA, “Illicit Trafficking and Other Unauthorized Activities Involving Nuclear and Radioactive Materials,” Aug. 21, 2006, <www.iaea.org/NewsCenter/Features/RadSources/PDF/fact_figures2005.pdf>.

25. Center for Nonproliferation Studies, Monterey Institute for International Studies, “Al Qaeda's WMD Activities [chart],” updated May 13, 2005, <http://cns.miis.edu/pubs/other/sjm_cht.htm>.

26. Center for Nonproliferation Studies, Monterey Institute for International Studies, “Al Qaeda's WMD Activities [chart],” updated May 13, 2005, <http://cns.miis.edu/pubs/other/sjm_cht.htm>.

27. Chris Axtman, “The Terror Threat at Home, Often Overlooked,” Christian Science Monitor, Dec. 29, 2003, <www.csmonitor.com/2003/1229/p02s01-usju.html>; Michael Reynolds, “Homegrown Terror,” Bulletin of the Atomic Scientists 60 (Nov./Dec. 2004), pp. 48–57, <www.thebulletin.org/article.php?art_ofn=nd04reynolds>.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 231.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.