1,906
Views
6
CrossRef citations to date
0
Altmetric
Articles

Saddam versus the inspectors: the impact of regime security on the verification of Iraq’s WMD disarmament

Bibliography

  • Albright, David, Frans Berkhout, and William Walker, Plutonium and Highly Enriched Uranium 1996: World Inventories, Capabilities and Policies (Stockholm: SIPRI 1997), 321–22.
  • Al-Marashi, Ibrahim, ‘Iraq’s Security and Intelligence Network: A Guide and Analysis’. Middle East Review of International Affairs 6/3 (September 2002), 1–13.
  • Al-Marashi, Ibrahim and Sammy Salama, Iraq’s Armed Forces: An Analytical History (London: Routledge 2008), 188.
  • Arkin, William M., ‘The Difference Was in the Details’, Washington Post, January 17, 1999, B1.
  • Ayoob, Mohammed, The Third World Security Predicament: State Making, Regional Conflict and the International System (Boulder, CO: Lynne Reiner 1995), 28.
  • Azar, Edward E. and Chung-in Moon, ‘Legitimacy, Integration, and Policy Capacity: The ‘Software’ Side of Third World National Security’, in Edward E. Azar and Chung-in Moon (eds.), National Security in the Third World: The Management of Internal and External Threats (College Park: University of Maryland 1988), 77–101.
  • Baram, Amatzia, Building Toward Crisis: Saddam’s Strategy for Survival (Washington, DC: Washington Institute for Near East Policy 1998), 2, 27, 57–58.
  • Baram, Amatzia, ‘The Iraqi Armed Forces and Security Apparatus’, Journal of Conflict, Security and Development 1/2 (2001), 113–23. doi:10.1080/14678800100590612
  • Baram, Amatzia, ‘Saddam’s Power Structure: The Tikritis Before, During and After the War’, in Toby Dodge and Steven Simon (eds.), Iraq at the Crossroads: State and Society in the Shadow of Regime Change, Adelphi Paper 354 (London: International Institute of Strategic Studies 2003), 93–113.
  • Betts, Richard K., Enemies of Intelligence: Knowledge and Power in American National Security (New York: Columbia University Press 2007), 122.
  • Biddle, Stephen and Robert Zirkle, ‘Technology, Civil-Military Relations, and Warfare in the Developing World’, Journal of Strategic Studies 19/2 (1996), 171–212. doi:10.1080/01402399608437634
  • Blix, Hans, Disarming Iraq (New York: Pantheon 2004), 31–34, 264–66.
  • Boyne, Sean, ‘Iraqis Perfect the Art of Evading UNSCOM’, Jane’s Intelligence Review, February 1998, 27–29
  • Brinkley, Joel, ‘Ex-C.I.A. Aides Say Iraq Leader Helped Agency in 90’s Attacks’, New York Times, June 9, 2004
  • Brooks, Risa, ‘Civil-Military Relations in the Middle East’, in Nora Bensahel and Daniel Byman (eds.), The Future Security Environment in the Middle East: Conflict, Stability, and Political Change (Santa Monica, CA: RAND 2004), 152–53.
  • Bush, George W., Decision Points (New York: Crown Publishers 2010), 269.
  • Butler, Richard, The Greatest Threat: Iraq, Weapons of Mass Destruction, and the Growing Crisis of Global Security (New York: PublicAffairs 2000), 91–95, 113–16, 187.
  • CIA, Iraq-United States: Hardening Stance Toward UNSCOM, NESA IM 96-20005, August 9, 1996.
  • CIA, Misreading Intentions: Iraq’s Reaction to Inspections Created Picture of Deception (Langley, VA: CIA January 2006), 7.
  • Cockburn, Andrew and Patrick Cockburn, Out of the Ashes: The Resurrection of Saddam Hussein (New York: Harper 1999), 223–230, 251–262.
  • Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Report to the President of the United States (Washington, DC: GPO, 2005), 153
  • David, Steven R., Choosing Sides: Alignment and Realignment in the Third World (Baltimore: Johns Hopkins University Press 1991).
  • Department of Defense, 'Combined Media Processing Center-Qatar Standard Operating Procedures', (4 February 2005), <http://www.dia.mil/FOIA/FOIA-Electronic-Reading-Room/FOIA-Reading-Room-Other-
  • Defense Intelligence Agency (DIA), Iraq’s Weapons of Mass Destruction Programs: Progress, Problems, and Potential Vulnerabilities, Defense Intelligence Assessment DI-1600-36-98, October 1997, 12.
  • Director of Central Intelligence, Iraq’s Weapons of Mass Destruction Programs (Langley, VA: CIA 2002), 3.
  • Duelfer, Charles, Hide and Seek: The Search for Truth in Iraq (New York: PublicAffairs 2009), 117–18.
  • Duelfer, Charles, Comprehensive Report of the Special Advisor to the DCI on Iraq’s WMD, Vol. 3 (Langley, VA: Central Intelligence Agency (CIA) 2004).
  • Duelfer, Charles, Note for the Comprehensive Report With Addendums (Langely, VA: Central Intelligence Agency September 2005), 2–3.
  • Fainsod, Merle, How Russia is Ruled (Cambridge: Harvard University Press 1953), 441.
  • Feaver, Peter, Guarding the Guardians: Civilian Control of Nuclear Weapons in the United States (Ithaca: Cornell University Press 1992).
  • Federal Bureau of Investigation, ‘Casual Conversation’, June 11, 2004, in Joyce Battle (ed.), Saddam Hussein Talks to the FBI, National Security Archive Electronic Briefing Book No. 279 (Washington, DC: National Security Archives 1 July 2009), <http://nsarchive.gwu.edu/NSAEBB/NSAEBB279/24.pdf>.
  • Findlay, Trevor and Ben Mines, ‘UNMOVIC in Iraq: An Opportunity Lost’, in Trevor Findlay and Kenneth Boutin (eds.), Verification Yearbook 2003 (London: VERTIC 2004), 54.
  • Gellman, Barton, ‘U.S. Tried to Halt Several Searches’, Washington Post, August 27, 1998, A1.
  • Gellman, Barton, ‘“Arms Inspectors ‘Shake the Tree’,” Washington Post’, October 12 (1998), A1.
  • Gellman, Barton, ‘Iraq’s Arsenal Was Only on Paper’, Washington Post, January 7, 2004, A1.
  • Gordon, Michael R. and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq (New York: Pantheon 2006), 55, 65, 122.
  • Gordon, Michael R. and Bernard W. Trainor, ‘Hussein Saw Iraqi Unrest as Top Threat’, New York Times, March 12, 2006, A1.
  • Harrer, Gudrun, Dismantling the Iraqi Nuclear Programme: The Inspections of the International Atomic Energy Agency, 1991-1998 (London: Routledge 2014), 232.
  • House of Commons, Committee on Standards and Privileges, Annex of the Sixth Report, ‘Combined Media Processing Centre-Qatar/UK CI Report: Authenticity of Harmony File ISGP-2003-00014623 ’, (17 July 2007), <http://www.publications.parlia
  • Ignatius, David, ‘The CIA And the Coup That Wasn’t’, Washington Post, May 16, 2003
  • Ignatius, David, ‘A Sectarian Spy Duel In Baghdad’, Washington Post, June 14, 2007
  • Institute for Defense Analysis, Projected Growth and Current Collection Breakdown, April 30, 2015.
  • Jackson, Richard, ‘Regime Security’, in Alan Collins (ed.), Contemporary Security Studies (Oxford: Oxford University Press 2007), 148.
  • Jacques, E.C., Hymans, Achieving Nuclear Ambitions: Scientists, Politicians and Proliferation (Cambridge: Cambridge University Press 2012), 29–31, 157–65.
  • Jafar, Jafar Dhia and Numan Saadaldin, Al-I’tiraf al-akhir: Haqiqat al-barnamaj alnawawi al-iraqi [The last confession: The truth about the Iraqi Nuclear Program] (Beirut: Markaz Dirasat Al-Wahdah Al-Arabiya 2005), 151.
  • Jeffrey Smith, R. and David B. Ottaway, ‘Anti-Saddam Operation Cost CIA $100 Million’, Washington Post, September 15, 1996, A1.
  • Jervis, Robert, Why Intelligence Fails: Lessons From the Iranian Revolution and the Iraq War (Ithaca: Cornell University Press 2010), 128, 146–148.
  • Job, Brian L., ‘The Insecurity Dilemma: National, Regime and State Securities in the Third World’, in Brian L. Job (ed.), The Insecurity Dilemma: National Security of Third World States (Boulder, CO: Lynne Reiner 1992), 17–19.
  • Karsh, Efraim and Inari Rautsi, Saddam Hussein: A Political Biography (New York: Free Press 1991), 2.
  • Khadduri, Imad, Iraq’s Nuclear Mirage: Memoirs and Delusions (Toronto: Springhead Publishers 2003), 122.
  • King, Gary, Robert Keohane, and Sidney Verba, Designing Social Inquiry: Scientific Inference in Qualitative Research (Princeton: Princeton University Press 1994), 168–73.
  • Knights, Michael Andrew, Cradle of Conflict: Iraq and the Birth of Modern U.S. Military Power (Annapolis, MD: Naval Institute Press 2005), 185–90.
  • Koblentz, Gregory D., ‘Regime Security: A New Theory for Understanding the Proliferation of Chemical and Biological Weapons’, Contemporary Security Policy 34/3 (2013), 501–25. doi:10.1080/13523260.2013.842298
  • Lippman, Thomas W. and Barton Gellman, ‘U.S. Says It Collected Iraq Intelligence Via UNSCOM’, Washington Post, January 8, 1999, A1.
  • Mearsheimer, John J., Why Leaders Lie: The Truth About Lying in International Politics (New York: Oxford University Press 2011), 4–5.
  • Montgomery, Alexander H., ‘Stop Helping Me: When Nuclear Assistance Impedes Nuclear Programs’, in Adam Stulberg and Matt Fuhrmann (eds.), The Nuclear Renaissance and International Security (Stanford, CA: Stanford University Press 2013), 177–202.
  • Nathan, Elizabeth A., Saddam and the Tribes: How Captured Documents Explain Regime Adaptation to Internal Challenges (1979–2003) (Alexandria, VA: Institute for Defense Analysis August 2007), 19.
  • National Intelligence Council (NIC), Iraq: Regime Under Great Stress, NICM 95-10 (Washington, DC: NIC 17 March 1995), 3.
  • O’Sullivan, Meghan L., Shrewd Sanctions: Statecraft and State Sponsors of Terrorism (Washington, DC: Brookings Institution Press 2003), 168.
  • Obeidi, Mahdi and Kurt Pitzer, The Bomb in My Garden: The Secrets of Saddam’s Nuclear Mastermind (Hoboken, NJ: John Wily & Sons 2004), 6–8.
  • Oye, Kenneth A., ‘Explaining Cooperation Under Anarchy: Hypotheses and Strategies’, World Politics 38/1 (1985), 1–24. doi:10.2307/2010349
  • Palkki, David D., ‘Correspondence: Searching for Evidence’, Nonproliferation Review 21/1 (2014), 8.
  • Palkki, David D. and Shane Smith, ‘Contrasting Causal Mechanisms: Iraq and Libya’, in Etel Solingen (ed.), Sanctions, Statecraft, and Nuclear Proliferation (New York: Cambridge University Press 2012), 291.
  • Pillar, Paul R., Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform (New York: Columbia University Press 2011), 94.
  • Pollack, Kenneth, ‘Spies, Lies, and Weapons: What Went Wrong’, The Atlantic Monthly 83, (January/February 2004), 85.
  • Pollack, Kenneth M., The Threatening Storm: The Case for Invading Iraq (New York: Random House 2002), 121–22.
  • Priest, Dana and Bradley Graham, ‘Airstrikes Took a Toll on Saddam, U.S. Says’, Washington Post, January 9, 1999, A14
  • Quinlivan, James T., ‘Coup-proofing: Its Practice and Consequences in the Middle East’, International Security 24/2 (1999), 131–65. doi:10.1162/016228899560202
  • Ritter, Scott, Endgame: Solving the Iraq Crisis (New York: Simon & Schuster 2002), 49-51, 105-111.
  • Rubin, Barry, ‘The Military in Contemporary Middle East Politics’, Middle East Review of International Affairs Journal 5/1 (March 2001), 59.
  • Rubin, Lawrence, ‘Research Note: Documenting Saddam Hussein’s Iraq’, Contemporary Security Policy 32/2 (2011), 458–66. doi:10.1080/13523260.2011.590366
  • Sassoon, Joseph, Saddam Hussein’s Ba’ath Party: Inside an Authoritarian Regime (Cambridge: Cambridge University Press 2011).
  • Schelling, Thomas C., Pearl Harbor: Warning and Decision (Stanford, CA: Stanford University Press 1962), vii.
  • Schweller, Randall L., Unanswered Threats: Political Constraints on the Balance of Power (Princeton: Princeton University Press 2006), 11–13.
  • Selbi, Dhafir, Zuhair Al-Chalabi, and Imad Khadduri, Unrevealed Milestones in the Iraqi National Nuclear Program 1981-1991 (Lexington, KY: CreateSpace 2011), 93–94.
  • SH-IISX-D-000-360, ‘A Study on How to Defeat the Iraqi Opposition Inside and Outside Iraq ’, 2001.
  • SH-INMD-D-000-657, 'Report from Husam Mohammad Amin, Director of the National Monitoring Directorate about Hussein Kamel ’, 14 August 1995.
  • SH-SHTP-D-000-797, ‘Saddam Hussein and Iraqi Commanders Discussing Weapons Inspections and how the United States Intends to Continue the Sanctions on Iraq ’, ( undated but most likely 13 June 1996).
  • SH-SHTP-A-001-991, 'Saddam Presided Over a Cabinet Meeting’, ( undated but circa July 1992).
  • SH-SSOX-D-000-869, 'Correspondence Within the Special Security Organization (SSO): A Study on “How the Enemy Thinks” ’, (February 1993).
  • SH-RPGD-D-000-506, ‘Saddam Security Lecture to the Republican Guard ’, (April 2000).
  • Solingen, Etel, Nuclear Logics: Contrasting Paths in East Asia and the Middle East (Princeton: Princeton University Press 2007), 20, 46–47.
  • Stuster, J. Dana, ‘Ends and Means’, Foreign Policy, March 15, 2013, <http://www.foreignpolicy.com/articles/2013/03/15/ends_and_means?page=full>.
  • Talmadge, Caitlin, The Dictator’s Army: Battlefield Effectiveness in Authoritarian Regimes (Ithaca: Cornell University Press 2015).
  • Tenet, George and Bill Harlow, At the Center of the Storm: My Years at the CIA (New York: HarperCollins 2007), 331.
  • Tyler, Patrick, ‘Plan On Iraq Coup Told To Congress’, New York Times, February 9, 1992.
  • United States Government, Iraq Weapons of Mass Destruction Programs, (13 February 1998), http://www.fas.org/irp/threat/whitepap.htm>.
  • United Nations Monitoring Verification and Inspection Commission (UNMOVIC), Compendium of Iraq’s Proscribed Weapons Programmes in the Chemical, Biological, and Missile Areas(New York: United Nations 2007), 46–47.
  • UNSC, Letter dated 24 November 1995 from the Director General of the International Atomic Energy Agency, S/1995/1003, December 1, 1995.
  • UNSC, Report of the Secretary-General on the status of the implementation of the Special Commission’s plan for the ongoing monitoring and verification of Iraq’s compliance, S/1995/864, October 11, 1995.
  • UNSC, Letter dated 10 January 1996 from the Director General of the International Atomic Energy Agency, S/1996/14, January 10, 1996.
  • UNSC, Report of the Secretary-General on the activities of the Special Commission, S/1996/258, April 11, 1996, 6–8.
  • UNSC, Report of the Secretary-General on the activities of the Special Commission, S/1996/848, October 11, 1996, 15–17.
  • UNSC, Letter Dated 6 October 1997 from the Director General of the International Atomic Energy Agency, S/1997/779, October 8, 1997, 36.
  • UNSC, Report of the Secretary-General on the Activities of the Special Commission, S/1997/774, October 6, 1997, 24–26, 31–35.
  • UNSC, Letter Dated 17 December 1997 From the Executive Chairman of the Special Commission, S/1997/987, December 17, 1997.
  • UNSC, Report of the Secretary-General on the Activities of the Special Commission, S/1997/774, 32.
  • UNSC, Letter Dated 6 October 1997 from the Director General of the International Atomic Energy Agency to the Secretary General, 92.
  • UNSC, Report of the Secretary-General on the activities of the Special Commission, 25.
  • UNSC, Report of the Secretary-General on the activities of the Special Commission, S/1996/848, 10–11, 16.
  • UNSCOM, ‘Modalities for Inspections of Sensitive Sites’, June 22, 1996.
  • UNSCOM, ‘Briefing to the Security Council’, November 19, 1997.
  • UNSCOM/IAEA, ‘Note For the File’, (22 August 1995), <http://www.un.org/Depts/unmovic/documents/hk.pdf>, accessed June 13, 2012.
  • VERTIC, UNMOVIC/IAEA Weapons Inspection Database, <http://www.vertic.org/media/assets/VERTIC_UNMOVIC.pdf>.
  • Way, Christopher and Jessica L.P. Weeks, ‘Making it Personal: Regime Type and Nuclear Proliferation’, American Journal of Political Science 58/3 (July 2014), 705–19. doi:10.1111/ajps.2014.58.issue-3
  • Weiner, Tim, ‘US Used UN Team to Place Spy Devices in Iraq, Aides Say’, New York Times, January 8, 1999, A1.
  • Woods, Kevin M., Michael R. Pease, Mark E. Stout, Williamson Murray, and James G. Lacey, Iraqi Perspectives Project: A View of Operation Iraqi Freedom From Saddam’s Senior Leadership (Washington, DC: Joint Center for Operational Analyses 2006), 25–27.
  • Woods, Kevin, James Lacey, and Williamson Murray, ‘Saddam’s Delusions: The View from the Inside’, Foreign Affairs 85/3 (May/June 2006), 2–4. doi:10.2307/20031964
  • Woods, Kevin M., David D. Palkki, and Mark E. Stout (eds.), The Saddam Tapes: The Inner Workings of a Tyrant’s Regime, 1978-2001 (New York: Cambridge University Press 2011), 256–57.
  • Woodward, Bob, State of Denial: Bush at War, Part III (New York: Simon and Schuster 2007), 242.
  • Yale-UN Oral History Project. Interview with Scott Ritter, 16.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.