212 59 5MB
English Pages [247] Year 2016
FI GU RE S
1.1 World military expenditure, 1988‒2015
13
1.2 15 countries with the highest military expenditure
14
1.3 Defense spending by region, 1992–2015
16
1.4 US military spending versus the rest of the world,
17
1.5 DoD budgets, FY 2001‒2016
18
1.6 US State Department budget vs. Lockheed Martin
31
1.7 Internationalized intrastate conflicts and battle deaths,
32
4.1 Companies with largest arms sales, 2014
86
4.2 Studies on economic impact of defense spending
89
4.3 Studies on economic impact of defense spending –
90
4.4 Job creation in the US through $1bn in spending
93
4.5 Distribution of jobs by wage levels in alternative US
94
in 2015
2000–2015
federal contracts 1989‒2011
comparison of studies published pre- and post-2007
economic sectors
vi
Indefensible.indd 6
24/05/2017 18:37
Figures
4.6 Research and development spending in the UK in civil
100
4.7 Research and development spending in the UK in civil
101
4.8 Wages of RMC vs. civilian wages, 2001‒2009
114
6.1 Derivative classification activity, FY 1996–FY 2014
140
7.1 Number of transnational terrorist incidents, 1968–2011
162
and defense sectors, 1989–2012
and defense sectors, 1989–2012 (in constant 2012 prices)
vi i
Indefensible.indd 7
24/05/2017 18:37
ACRON YM S A ND A B B RE V I ATI O NS
BNL
Banca Nazionale del Lavoro
CCL
Commercial Control List
CAAT
Campaign Against the Arms Trade
CERN
European Organization for Nuclear Research
CIA
Central Intelligence Agency
COTS commercial-off-the-shelf CREW
Citizens for Responsibility and Ethics in
DARPA
Defense Advanced Research Projects Agency
DIP
DoD
Department of Justice
EU
European Union
FBI
Federal Bureau of Investigation
FCPA
Foreign Corrupt Practices Act
GDP
gross domestic product
GI
Government Defence Anti-Corruption Index
ICBM
intercontinental ballistic missile
ISIS
Islamic State of Iraq and Syria
LCS
MOD
Defense Industrial Participation US Department of Defense
DoJ
MIT
Washington
littoral combat ship
Massachusetts Institute of Technology UK Ministry of Defence vi ii
Indefensible.indd 8
24/05/2017 18:37
Acronyms and abbreviations
NATO
North Atlantic Treaty Organization
NSA
National Security Agency
NGOs NSDD OCO PDB
R&D RPG RPF
SFO
SIPRI
SPLM/A UAE UN
USAID VVIP
nongovernmental organizations
National Security Decision Directive Overseas Contingency Operations President’s Daily Brief
research and development rocket-propelled grenade
Rwandan Patriotic Front UK Serious Fraud Office
Stockholm International Peace Research Institute Sudan People’s Liberation Movement and Army United Arab Emirates United Nations
US Agency for International Development Very Very Important Person
ix
Indefensible.indd 9
24/05/2017 18:37
Indefensible.indd 10
24/05/2017 18:37
I N D E FE N SIBLE: SE TTI NG THE SCENE
Just before midday on 15 March 2008, an arms dump in the small Albanian village of Gerdec caught alight. The gargantuan
explosions that followed were heard nearly a hundred miles away
and continued for almost fourteen hours. The explosions killed twenty-six people, including a three-year-old, a seven-year-old who
was cycling nearby and a pregnant woman. Over 300 people were injured, 318 houses completely destroyed and 400 others damaged.
It was a tragedy designed by the international arms business
and involving the collusion of the US government, Albanian government and a contract with a shady company, AEY Inc.
The story begins in January 2007, when the US Department of
Defense awarded a $298 million contract to an upstart US company, AEY, to supply ammunition to the Afghan military. The US-backed Afghan National Army uses Soviet-designed small arms such as Kalashnikovs, as they are accustomed to them, and they are cheap
and serviceable. But (at that time), America didn’t manufacture
the ammunition for the ubiquitous AK47 assault rifle. So the DoD looked to buy what it needed from elsewhere—and faced the immediate and obvious problem that its likely sources of supply were
Chinese and former Eastern Bloc manufacturers. Circumventing such difficulties is the stock-in-trade of the arms business, and the DoD had a simple solution: to outsource the supply. xi
Indefensible.indd 11
24/05/2017 18:37
INDEFENSIBLE
The contract was won by a company that few had heard of
until that time. That’s not unusual in this business of corporate
chameleons. AEY was run by twenty-one-year-old Efraim Diveroli, who not only carried a forged driving license but had previously been arrested for domestic violence. The company’s vice-president
was a former masseur. Serial party-goers and regular pot smokers, they also dabbled in cocaine and acid.
Both AEY and its youthful president had been placed on the
State Department’s Arms Trafficking Watch List, a list that was not consulted when the contract was awarded. The Pentagon commissioned an ‘independent’ evaluation of the company that returned a glowing endorsement. The evaluation was written by an individual who was a financial backer and vice-president of AEY.
Diveroli operated at the thrift-store bargain-hunting end of
the arms business supply chain. Seeking cheap ammunition, he
turned to Albania. Until the fall of the Berlin Wall, Albania had been one of the most militarized countries in Europe, its former
dictator Enver Hoxha building bunkers and situating arms caches
across the territory of his small nation. The country had liberalized
its economy, remained poor and didn’t need all those old bullets. So Albania’s defense authorities were in the process of dismantling and repacking its old ammunition stores to be recycled or disposed of. A shady firm (not AEY) led by a small-time US dealer and a
politically connected Albanian businessman bought the ammunition and persuaded the defense minister, with the support of the prime minister, to have the army truck it for free to Gerdec, a small village
near Albania’s sole international airport. There, the ammunition was to be cleaned, sorted and repacked.
The profits from this deal would feed many mouths. Diveroli
did not buy directly from the Albanians or the ‘recycling’ firm, but
from yet another shell company, Evdin Limited, associated with xi i
Indefensible.indd 12
24/05/2017 18:37
Setting the scene
the Swiss arms dealer Heinrich Thomet, also on the US State
Department’s watch list. Evdin Limited bought the ammunition for $22 per thousand rounds, before selling it to Diveroli for $40. The
difference allegedly provided kick-backs to a number of Albanian higher-ups, most likely including the defense minister and the son of the prime minister.
There was one problem: Hoxha, distrusting the Soviets, had
bought the ammunition from China, and US law prohibited the
Pentagon from using Chinese weaponry. The Albanians solved this challenge by demonstrating how easy it was to remove the ‘Made in China’ markings, and authorizing a state agency to issue false certificates guaranteeing their Albanian origin. The military attaché
at the US embassy in Albania claimed that the US ambassador at the time assisted the cover-up of the origins of the ammunition.
In late 2007, the Albanian government gave the factory in Gerdec
the go-ahead to begin dismantling and recycling the ammunition. The Kalashnikov and its ammunition are famously sturdy and will
withstand extreme conditions and long neglect—reasons, along with cheapness and simplicity, that they are favored by cash-strapped armies with poorly educated soldiers. But any ammunition needs to be handled with extreme care, especially if it is two decades or
more old and has been kept in badly maintained rural storehouses. The process of transporting, stacking, inspecting and cleaning the ammunition violated numerous safety laws. The commander of
the Albanian armed forces deemed Gerdec an inappropriate site: among other things, the job should have been done well away from any civilian habitation. Nevertheless, by mid-March 2008, 8,900
tons of ammunition had been delivered to the Gerdec site, nearly 10% of the entire Albanian military’s supply.
Most of the work was done by hand by poorly paid workers, who
were instructed to dump old gunpowder, damaged cases, thousands xi i i
Indefensible.indd 13
24/05/2017 18:37
INDEFENSIBLE
of fuses and projectiles onto a huge pile on the property. It was then bulldozed towards a nearby field. Soon two fields of about 2,000 square meters were filled with this deadly debris.
It did not take a munitions specialist to see that this was an
accident waiting to happen. All that was needed was a spark. In the explosion of 15 March 2008, Gerdec was almost entirely destroyed.
Arms dealers don’t like to advertise what their business really
involves. In this case, AEY had blown its cover, and the scam had
literally exploded in the face of its conspirators. Unusually for such a transaction, it couldn’t be concealed any longer. A few knuckles had to be rapped.
Efraim Diveroli was eventually jailed in the US for four years
for trading in Chinese munitions. The American ambassador was
cleared of any wrongdoing. Albania’s defense minister resigned, but a year later was named the country’s environment minister. No American has faced justice for the deaths at Gerdec.
The father of the seven-year-old boy who was killed because he
happened to be cycling past when the dump exploded describes his
life in Gerdec as ‘like living every minute of every day in a cemetery’.
You may say: ‘surely this is an anomaly, an outlier, a crazy deal
with unforeseen outcomes’. Sadly, it is not. It is emblematic of a global arms trade that is suffused with corruption, imperils the
vulnerable and makes us all less safe. Despite the constant messages and distortions we are bombarded with, this is the real truth of the industry. Don’t believe us? Read on.
xi v
Indefensible.indd 14
24/05/2017 18:37
I N TROD U CTION
The global arms business—manufacture and trade—plays an over-
sized role in global and domestic politics. Military spending around
the world totaled $1,676bn in 2015,1 nearly $250 for every one of the earth’s 7 billion people.
Arms producers have direct access to the upper echelons of
power, shaping policy and exercising considerable influence in
how the world is run. Rich governments treat arms makers and
dealers with remarkable charity. They help them out with subsidies, favorable export rules and a generosity of spirit and funding that most businesspeople could only dream of. Leaders of middle-income
and poor countries who want to buy weapons are feted and lobbied by a slick industry that wheels out defense attachés, government ministers, and even royalty as testament to their political connection
and clout, not to mention generous financial subsidies and payoffs. Arms deals can be hugely burdensome on the taxpayers of both the
selling and buying countries, and they often maintain an apparatus of secrecy and repression as well. A lot of effort goes into packaging these transactions as something other than what they are.
Why does the arms business possess such influence and clout
across the globe? The answer is complex, but one of the key reasons is that arms merchants and their government supporters can turn
to a set of time-honed and well-packaged arguments to justify the status quo. They tell us that their products make and keep us all 1
Indefensible.indd 1
24/05/2017 18:37
INDEFENSIBLE
safer. They argue that the defense sector is vital to the economy and job creation. They claim that they are at the cutting edge
of technological innovation. All in all, the makers and sellers of weapons have been astonishingly successful in telling a story so
deeply embedded in public narratives and political discourse that it is simply taken for granted. The defense industry narrative is like
a set of clothes that a politician seeking office—still more so, in office—and the civil servants, academics and journalists concerned with government, put on to go to work every morning.
The inconvenient truth is that each one of the claims is either
deeply questionable or simply untrue. It’s not as though there are a few errors or misleading arguments found within a basically sound
package—a couple of slips of taste in an otherwise elegant wardrobe. No: the whole collection is flawed. The arms business needs to be undressed. Every rotten item needs to be thrown out. Then, we will find, there is hardly anything left. The arguments are nothing more
than myths, enforced by repetition and given weighty authority by the power players who trot them out whenever there is the hint of change that might be to their disadvantage.
The following chapters explode these myths, explaining how and
why the arguments made to defend the defense sector are flawed, factually wrong and logically absurd.
S E CTIO N 1 : THE RE IS NO PROBL EM In Section 1, we look at the various myths that make the arms trade
seem vitally necessary and, at key moments, a positive boon to
humanity; that try to argue there is no problem with the status quo. In the first chapter, we address the myth that higher defense
spending equals increased security. Outlining the size and most recent trends in the trade, we demonstrate how arms races have 2
Indefensible.indd 2
24/05/2017 18:37
Introduction
increased militarism, and provide examples of weapons purchases
by regimes (not limited to authoritarian ones) that are foremost
concerned with their self-protection against their own populations. Further, corruption and waste in the arms business often work against the interests of security: transactions may have more to do
with gaining access to public funds than responding to real threats. We also show how increased military expenditure that funds ill-
conceived wars may increase security threats: the multiplication of
threats that followed US military engagement in Afghanistan and Iraq are a good example of this. By over-sourcing our militaries and
under-sourcing other sectors, like diplomacy, aid and collaborative
efforts to counter climate change, we are failing to address today’s real threats to human security. And, because of this imbalance, the military is used to engage in situations for which it is not actually well-suited, like the public health response to Ebola.
Chapter Two addresses the myth that military spending is
driven by a sound analysis of national security. The decisions to
build weapons systems, or to sell or buy them, often have little to do with defending the nation. Some arms deals are undertaken in
the name of generating economic benefits. Some deals are pure
corruption—that is, the kickbacks and access to public funds are the rationale for the deal, and the weaponry is a ruse. We examine
Saudi Arabia’s history of arms purchases in depth in this regard. Ukraine provides a different model, where the country’s military
assets were sold en masse by corrupt military leaders for private gain in the 1990s, crippling its capacity. And in the fractured independent South Sudan, an arms-purchasing spree following
independence was justified in relation to its predatory neighbor, Sudan, but the weapons were turned against the South Sudanese
people themselves. A brutal civil war was the result, a far cry from increasing security for the population. 3
Indefensible.indd 3
24/05/2017 18:37
INDEFENSIBLE
It is also a myth, as Chapter Three demonstrates, that we can
control where weapons go after they are purchased, and how they
are used. Once a weapon is sold the seller has little control over how it is used. Friends become enemies—the US’ relationship with
Afghanistan’s Mujahedin is the most obvious example, but the list also includes Iraq’s Saddam Hussein, not to mention factions in
Yemen and Libya. The cycle continues: ISIS was able to arm itself by seizing enormous troves of weaponry the US had recently given
to the unstable new Iraqi state it tried to build following the 2003 invasion. Dispersion—weapons seized and taken by new actors—is
not unique to ISIS. Somalia and Libya provide further examples. Diversion is yet another way around control systems: arms officially
intended for one state can be sold to another (or a non-state actor). Our examples of diversion include pathways through Switzerland, UAE, Jordan, Syria, Burkina Faso, Liberia and Ukraine. And even
if the weapons end up in the right place, they can be used for unforeseen purposes—the 1994 Rwandan genocide provides a stark
example. Legitimate purchases of guns in the US, too, can cross
borders into Mexico, where they empower violent drug traffickers. Those defending the trade may point to the passing of the Arms Trade Treaty by the UN in 2013, and its ratification by nearly the
entire globe thereafter, as an example of how these sorts of lessons have been learnt. Unfortunately, the Arms Trade Treaty is full of holes, and is unlikely to have any major impact on the trade at all.
Even when security isn’t the main issue, we are often told that
national arms industries are technologically innovative job creators. This is the myth that we dispel in Chapter Four. In Europe, if one factors in the size of subsidies and welfare afforded the defense
industry, their contributions pale to nothing: European defense companies are, in fact, dependent on public funds in order to
maintain their profitability. They do create jobs, but nowhere near the 4
Indefensible.indd 4
24/05/2017 18:37
Introduction
number of jobs that could be created if such subsidies were invested in other industries. The economics of the industry works differently
in the US, where the scale of government purchases creates a unique
set of incentives; but even here, the number of good-quality jobs
created by defense spending is less by order of magnitude than the jobs created through investment in other sectors such as energy and
education. As this all hints, there is now considerable data showing
that global defense spending has either an insignificant or negative impact on growth. What is more, increasingly civilian technologies
lead new breakthroughs, with military applications focusing on
integration and adaptation. Some defenders of the trade may point to the economic impact of ‘offsets’; we show that their estimated economic benefit is chimerical and illustrate it by reference to the
over-inflated claims that accompanied a major South African arms deal in 1999. And, as a final kicker, there is now compelling data
demonstrating that military spending is strongly correlated with poorer national economic growth: military spending can actually hurt the economy.
The next myth fantasizes that corruption is only a problem
in developing countries and marginal to the defense industry as
a whole. As our examples demonstrate, corruption in arms deals is corruption between producing and purchasing countries; the
willingness of each side makes it possible. The British company
BAE Systems provides a study in how this works, but it is not alone. Indeed, the arms trade is hard-wired for corruption for a number of reasons: the linkage to national security; the highly technical and
complex nature of the systems, which means that very few people are able to critically evaluate deals; and the close relationship between purchasing governments, the arms industry, middlemen and senior figures in the military and intelligence agencies. The ‘revolving door’ whereby the same individuals circulate between 5
Indefensible.indd 5
24/05/2017 18:37
INDEFENSIBLE
government and the private sector aligns the interests of these actors
against those of the public. The trade is also truly global, composed of massive agglomeration of once disparate companies, with long
lines of supply that are spread throughout the world, increasing the potential and scope for international corruption.
The corruption enabled by these conditions takes the form of
funds paid through middlemen, but also of political contributions, dispersing jobs strategically into multiple jurisdictions, lax oversight and management of contracts, and the use of contractors
as intelligence analysts to identify the very threats that fuel their
companies’ profits. Real victims suffer this corruption: Gerdec demonstrated this, and we further illustrate the problem with a case study of South Africa.
In Chapter Six we tackle the idea that national security requires
blanket secrecy. Secrecy is so widespread that many countries fail to even report how much the military receives in funding. Even
where budgets are disclosed, many countries allow for off-budget expenditures—for example Uganda and Nigeria. Secrecy allows
for cover-ups and makes accountability impossible. For all these
reasons, secrecy more often reduces security rather than enhancing it. Protecting whistleblowers and demanding accountability are not luxuries, they are necessities of functioning democracies.
Together, these chapters explain how the defense industry makes
us less safe, our governments and leaders more prone to corruption, and our economies dragged down by wasteful and sometimes useless
spending that could far better be used to solve the world’s truly pressing problems.
The first step in changing this is to see the truth clearly, setting
aside the myths that have allowed a dysfunctional defense industry to thrive.
6
Indefensible.indd 6
24/05/2017 18:37
Introduction
S E CTIO N 2 : THE A RMS T RADE C A N ’T B E B E AT EN In Section 2, we tackle the two myths that keep us stuck.
Chapter Seven looks at the idea that this is simply the wrong
time to tackle the arms trade: the world, so the argument goes, is more dangerous than ever, and we don’t have the luxury of critically examining the defense sector when we are confronted with clear
and present danger. This is wrong on both fronts. We show how
the first decade of the 21st century was, contrary to popular belief, the most peaceful in recorded history. The second decade has
proved appreciably more violent, though still far less deadly than previous historical eras. Today’s global security context, which
has both reasons for hope and reasons for concern, is precisely the right time to open a debate on the role of the arms producers and traders in portraying—or misportraying—the rationales for
how they conduct their business. Indeed, today is always the right
time to challenge distortions that privilege the few and increase vulnerability for the many.
In the final chapter, we challenge the myth that there is simply
nothing that can be done. While we acknowledge that confronting the arms trade, with its massive political clout and economic
influence, is a tough ask, it is not impossible. But once we clear away
the myths, we see that there are things we can do now, right now, to begin pushing back against an industry that makes our world poorer and more dangerous.
7
Indefensible.indd 7
24/05/2017 18:37
Indefensible.indd 8
24/05/2017 18:37
M Y TH 1
H IGHE R DEFEN SE S PENDING EQUA L S I NCREASE D S EC URIT Y ‘If you want peace, prepare for war.’
So goes the much-repeated phrase, taken to heart around the
globe. Indeed, the world spends a great deal preparing for war: at least $1,676bn in 2015.1 With such high levels of spending, and
the innumerable threats that arms purchases are said to protect us from, it would be easy to accept this adage at face value: why on
earth else would responsible governments pour such huge sums into military spending?
Unfortunately, the reality is a lot more complicated. While
most reasonable people would agree that states should be able to legitimately defend themselves and their citizens, it is unclear that
large outlays on defense make a consistently measurable difference
in providing security to the countries that buy weapons. Moreover, there is solid evidence showing that, in certain instances, spending
money on buying weapons may actually decrease a country’s security. Just one of these is the situation referred to as the classic ‘security 11
Indefensible.indd 11
24/05/2017 18:37
INDEFENSIBLE
dilemma’ of setting arms races in motion: three others are also
explored in this chapter. For example, in states where the purchasing
government is undemocratic or corrupt, there are incontrovertible examples where a government uses weapons to the detriment of the security of citizens.
HOW M UCH IS S P ENT ? The Stockholm International Peace Research Institute (SIPRI)
estimates world military spending in 2015 at $1,676bn.2 As a
share of global economic output (gross domestic product, or GDP), this amounts to 2.3% globally.3 This is almost certainly an
underestimate, as it excludes some countries such as North Korea where meaningful dollar figures cannot be calculated, and cannot
capture the considerable ‘off-budget’ military spending that occurs
in many countries, for example by using oil revenues to buy arms without including it in the national budget.
During the Cold War, both NATO and the Warsaw Pact spent
vast amounts on their militaries. For over forty years the US and the
Soviet Union engaged in an arms race, both conventional and nuclear. Each did so largely out of fear of the other’s intentions, seeking nuclear deterrence and the capability to win a third world war, while at the same time generating increased fears and insecurity in the
other. When the Cold War ended, the Western public discovered
that NATO had hugely inflated their estimates of the Soviet military capability. The fears were real, but they had been exaggerated.
With the end of the Cold War, there was a great deal of hope
that countries would divert defense funds into social development: what was known as the ‘peace dividend’.4 Signs were initially good: at the end of the Cold War, military spending fell significantly in
real terms (i.e. adjusted for inflation) up to the mid-1990s. But 12
Indefensible.indd 12
24/05/2017 18:37
Myth 1
military spending started increasing again after 1998, and much
more rapidly after 2001, in the aftermath of 9/11 (see Figure 1.1). Between 2011 and 2014, the global economic crisis and the austerity that was attendant upon it precipitated a fall in global defense
expenditure. In 2015, however, global defense expenditure increased from its 2014 level—a sign that defense expenditure is regaining
ground lost during the economic crisis. And what was particularly
notable prior to 2015’s turnaround was how much the ‘rest of the world’ picks up the slack in defense expenditure: between 2011 and
2014, as defense budgets were reduced in the West, the ‘rest of the world’ was increasing its expenditure year-on-year.
Figure 1.1 World military expenditure, 1988‒2015 (constant 2014 US$bn) Note: The absence of data for the Soviet Union in 1991 means that no total can be calculated for that year. Source: SIPRI, Trends in World Military Expenditure, 2015. 13
Indefensible.indd 13
24/05/2017 18:37
INDEFENSIBLE
Figure 1.2 15 countries with
the highest military expenditure in 2015
Source: Extrapolated from the SIPRI Military Expenditure Database 2016. 14
Indefensible.indd 14
24/05/2017 18:37
Myth 1
Despite recent falls in the West and increases in the rest of
the world, Western countries still account for a majority of global
military spending. NATO members, including the US, spent a total of $904bn in 2015, 53.9% of total world military spending.5 Other
countries that the US classes as ‘major non-NATO allies’, including
Japan, Australia and Israel, accounted for another 10% of the total. Eight of the top fifteen military spenders worldwide are either
NATO members or major US non-NATO allies. Nonetheless, countries outside the West have become more prominent amongst the major spenders, with China, Saudi Arabia and Russia now the second, third and fourth largest spenders worldwide.6
The dominance of the top fifteen spenders should not obscure
another important trend: military expenditure is growing rapidly
globally, even in some of the poorest regions of the world. Indeed, SIPRI identifies twenty-three countries that have doubled their military spending between 2004 and 2013. Among them are some of the world’s poorest nations. In Africa, for example, military spending
rose over 8% in 2013 and 5.9% in 2014—adding up to a 91% increase overall since 2005.7 Admittedly military expenditure fell in Africa in
2015 by 5.3% (the first time in eleven years) to $37bn, but this is still a
massive 68% higher than it was in 2006.8 This is matched elsewhere:
world military expenditures, despite a slight leveling in 2013, have steadily climbed over the past decade—outpacing economic growth.9
China, the nation with second highest military spending, has increased
its defense budgets by double digits almost every year for the past
twenty, well outpacing even its impressive GDP growth and sparking defense spending increases in wary regional neighbors South Korea and Vietnam.10 Further, Japan joined the top ten military spenders in 2013 and, in 2015, approved the decision to reverse its post-World
War II constitutionally engraved ban on its forces fighting overseas.11
Russia has increased its military spending 92% since 2010 alone.12 15
Indefensible.indd 15
24/05/2017 18:37
INDEFENSIBLE
Regional increases, possibly indicating arms races (where
increasing military expenditure of one country leads another to
spend more, thereby encouraging the original country to spend even more, triggering further regional spending and so on), have
occurred in the Middle East, where Saudi Arabia vastly expanded
its defense budget by 97% between 2006 and 2015; in Africa, where overall expenditures have been growing by 5‒8% annually (until a
surprising drop in 2015) with Algeria and Angola leading the way;
Figure 1.3 Defense spending by region, 1992–2015 (constant 2014 US$bn) Source: Extrapolated from the SIPRI Military Expenditure Database 2015. 16
Indefensible.indd 16
24/05/2017 18:37
Myth 1
and in Asia and Oceania, which witnessed a 64% increase between
2006 and 2015 (and a 5.4% increase in 2015 alone), spearheaded by Chinese defense budget increases.13
Despite regional and global increases, the United States remains
far and away the world’s largest spender on its military. Because it
spends so much beyond any other country, it is worth a close look at the purchasing power of this super-sized budget.
Defense spending consumed 16.3% of the total US federal budget
in 2015.14 In absolute terms, its total national defense spending in
2013, even discounting funding for the ongoing war in Afghanistan, remained near what it was in 1985, the previous peak (it should
be pointed out that, as the US has become richer in the interim, defense spending as a percentage of GDP has fallen: it was 6.8% at the height of the Reagan reequipping era, 5.7% in 2011 and 4.5%
Figure 1.4 US military spending versus the rest of the world, 2000–2015 (constant 2014 US$bn)
Source: Extrapolated from the SIPRI Military Expenditure Database 2015. 17
Indefensible.indd 17
24/05/2017 18:37
INDEFENSIBLE
in 201515). In that era, of course, historically high defense spending
was deemed necessary as part of an existential struggle with the USSR (although it has subsequently emerged that the USSR’s
military capacity was often overstated).16 For the year 2016, the
Pentagon enjoys a $534.3bn base budget and the $50.9bn Overseas
Figure 1.5 DoD budgets, FY 2001–2016 Note: from 2010 onwards the category ‘Global War on Terror’ is no longer used in the accounting of the Comptroller General of Defense. The Global War on Terror is replaced by the account line Overseas Contingency Operations. This has been added to other discretionary supplements, such as spending on Hurricane Sandy relief in 2013, to produce the figure for ‘other supplemental’. Source: Extrapolated from Office of the Under Secretary for Defense (Comptroller), National Defense Budget Estimates for FY2016, United States Department of Defense, March 2015, Table 2-1, p. 22, accessed May 31, 2016, http:// comptroller.defense.gov/Portals/45/Documents/defbudget/fy2016/FY16_Green_ Book.pdf. 18
Indefensible.indd 18
24/05/2017 18:37
Myth 1
Contingency Operations (OCO) budget (a total of $585.2bn).17
Further, the US is currently on track to fund the most expensive
weapons program in human history, the F-35 fighter jet, which will cost roughly $1.4trn to build and operate over its lifetime.18
The Pentagon’s spending is in addition to the $71.6bn intelli
gence budget for fiscal year 2016, which includes drone warfare
conducted in Pakistan and Afghanistan, and massive digital surveill ance channeled, for example, through the National Intelligence
Program, including the CIA, NSA, National Reconnaissance Office
and National Geospatial-Intelligence Program.19 If all these items
are added together (the base budget, contingency spending and intelligence) for 2016, the total is $656.8bn: a truly enormous sum.
DO E S DE FE N S E S PENDING LE A D TO S E CURIT Y? With so much being spent on defense, it is only natural that we
ask whether or not it is being well spent. Unfortunately, there are a number of ways in which spending on defense may actually make us less secure. We will discuss the most common ways here, but
there are other, more complicated, impacts that defense spending can have on security around the world, which we will address at the very end of this chapter.
T he s e cur i ty di le m m a The first way in which military spending can actually reduce
security is through what is known in international relations theory as the ‘security dilemma’,20 or the ‘spiral of insecurity’. The ‘security
dilemma’ occurs when a state with no hostile intentions believes that states around it, while not necessarily expressing any outward
enmity, could pose a long-term security threat. The state responds 19
Indefensible.indd 19
24/05/2017 18:37
INDEFENSIBLE
by increasing its own sense of security through building up its
defense capacities. However, states around it see this increase in defense spending, and come to believe that the original state now
has hostile intentions; they, in turn, increase their own defense
capacities. This cycle continues as both parties increasingly divert resources towards their own defense, leading to an arms race. This
‘spiral of insecurity’ can, in the worst case scenario, lead to actual conflict. This is not to suggest that conflict follows inexorably from
arms races; the data is much too complicated for that.21 And, as we
will demonstrate later, arms sales often have nothing to do with
perceived or real security threats. But in certain cases arms races undoubtedly play a role, such as in the case of the developments that led to World War I.
By the beginning of the 20th century, Germany’s leaders had
come to believe that it was being surrounded by hostile forces including Russia, France and Great Britain. In response, Germany
started to build up its military forces, in particular its naval forces, which all other parties began to believe was evidence of Germany’s ill intentions. Great Britain, which had built its military power on
its navy, was particularly alarmed. The other three parties, seeing this, also increased their weapons, leading to an enormous arms race. This race created tensions between all the states; so much
so that, when a political crisis unfolded upon the assassination of Archduke Ferdinand, Austria-Hungary and Russia both mobilized and Germany then invaded its neighbors, provoking one of the deadliest conflicts in human history. The arms race may not have
been the cause of World War I (human affairs are always more
complicated than that), but it was a substantial contributor to the tensions that led to war.
20
Indefensible.indd 20
24/05/2017 18:37
Myth 1
I s Ch i na’s G row ing M il itar y Expenditure the Re sul t of the ‘S e cur ity Dilemma’? China’s rapidly rising military expenditure and capabilities are
generating considerable fears amongst some of its neighbors, especially Japan, South Korea, Vietnam, Indonesia, Malaysia
and the Philippines; and all countries are all now increasing military spending in response.22 (Vietnam has been doing so
for several years, the others more recently.) These states have also sought a closer relationship with the US, believing it can offer additional security. The US, meanwhile, is seeking
to develop its regional forces to counter some of China’s
growing capabilities in areas such as ‘anti-access area denial’ (weapons systems including missiles and submarines aimed at preventing or hampering US intervention in the region).23 But China’s military spending increases and its eagerness
to modernize its military to be able to ‘win local wars under
conditions of informatization’24 are themselves arguably
a function of their insecurity in the face of overwhelming US military dominance in the Pacific, including China’s
immediate vicinity. While the US (and its allies) may view
its military power in the region as entirely benign in intent, issues such as US support for Taiwan, as well as US actions such as the invasion of Iraq and the accidental bombing of
the Chinese embassy in Belgrade during the Kosovo war, mean that China does not view it in such a light.25 While it
would be premature to see the situation in the Asia Pacific as
an ‘arms race’, there is strong evidence of a security dilemma, whereby each party’s efforts to guarantee their own security are generating insecurity in others, and ultimately failing to increase security for any party. Real issues, largely concerning
economic development, exist between Asian countries and 21
Indefensible.indd 21
24/05/2017 18:37
INDEFENSIBLE
their allies, but addressing them through an arms race only increases the risks.
In the context of the Obama administration’s ‘pivot to
Asia’, pursuing US military dominance in the region runs
the danger of increasing regional tensions and spurring an arms race with China. It is impossible to ignore the regional dimensions of the tensions in Asia, including the competition
over control of the South China Sea and its energy resources. The question is whether a militarized approach on the part of the United States will make matters better or worse. China is
seeking to become a genuine naval power in its own region. But to the extent that the United States increases its own naval presence in the area and arms local allies (often at
their own request) to create a military bloc aimed at Beijing, China is more likely to accelerate its already rapidly growing military budget. China will also continue its investment in
asymmetric forces such as anti-satellite weapons and cyberwarfare capabilities. A rapprochement between the US and
China that promoted mutual economic and environmental interests would be far more likely to reduce tensions in the region than a US military build-up.
T he re ’s no se cur i ty i n was te an d cor r uption The second way in which defense spending can decrease security is when the spending is wasteful or inflated due to corruption. Usually
this involves the perennial problem of cost overruns in the defense
sector, dragging projects years into overtime and absorbing scarce economic resources that could be spent on things that encourage security—like health, education and infrastructure.
But there is also a long history of defense spending funding the
development and procurement of weapons that are strategically 22
Indefensible.indd 22
24/05/2017 18:37
Myth 1
questionable and, in the worst cases, utterly dysfunctional. When corruption enters the picture (as we will discuss in Myth 5), defense
transactions might only take place because of the illicit money to be earned, without any concern for real strategic need.
A prime recent example of wasteful defense spending is the
littoral combat ship (LCS), a multi-purpose boat designed to serve a variety of functions, from attacking other surface ships, to
hunting for mines, to moving in close to shore to insert Special
Forces into an area. There are two different versions of the ship, one produced by Lockheed Martin and the other by Austal. Both have experienced serious performance problems and huge cost
overruns, to the point where one LCS now costs over $780m, nearly double the originally projected price. In fact, the LCS program could be presented as a case study in how not to build a weapons system.26
One analyst described the LCS as ‘the warship that can’t go
to war’.27 This is because it is being asked to do so many different
missions that it does none of them well. The basic concept of the program was that the LCS would be a hull or seaframe that could
carry one of three different ‘mission modules’ that would allow it to carry out different functions. There are too many problems with
the ship to enumerate all of them here, but they include being
overweight, and therefore unable to integrate new technology as it emerges; under-armored, and therefore extremely vulnerable to widely available anti-ship missiles; and under-crewed, making it
difficult to respond to on-board emergencies or engage effectively in heavy combat. The existence of three different mission modules is useless in a crisis: it can take up to three days to change from
one mission module to another, potentially costly delays in the
case of a real emergency. The ship has also suffered hull cracks and electrical problems.
23
Indefensible.indd 23
24/05/2017 18:37
INDEFENSIBLE
Perhaps worst of all, six LCSs were built and billions of dollars
spent on them before they were tested in rough seas, against explosives or for basic survivability (i.e. the length of a ship’s useful service
life). The problems are so extreme that the Obama administration’s
secretary of defense has decided to cut the program from fifty-two to thirty-two ships. A further twenty ships will be built on top of
the thirty-two, but they are to be built to a substantially new design, new enough that they will now be referred to as frigates not littoral combat ships.28
A particularly dirty case that involves both wasteful and
useless military spending and allegations of corruption is the
DCNS scandal in Malaysia. In 2002, Malaysia signed a €1bn deal to purchase two Scorpene submarines from the French company
DCNS and its partner Navantia.29 Since the deal was announced, it
has been embroiled in a web of murder and corruption allegations. Soon after the deal was concluded, translator and sometime model Altantuya Shaariibuu was found murdered in the Malaysian jungle. She had been rumored to be the lover of the then-defense minister and involved in discussions around securing a substantial
commission from DCNS. In 2009, two police commanders were found guilty of the murder, one of whom claims he was ‘under orders’ from ‘important people’.30 It was later alleged that DCNS
had made a payment of at least €114m to the company Perimekar, closely linked to the defense minister and Malaysia’s governing party.31 Making matters worse, when the submarines arrived there
were such severe problems that the first submarine was declared
‘unfit for diving’,32 a crucial measure of success for any submarine.
The problem: it had developed faults in two separate systems. Malaysia had to wait for DCNS to fix the problems before they could be safely deployed.
24
Indefensible.indd 24
24/05/2017 18:37
Myth 1
Wars can make you less secure in the long ter m The third way in which defense spending can actually decrease
security is when military spending funds wars that, despite their intentions, worsen a country’s security situation.
Nowhere is this clearer than in the US wars in Iraq and Afghan
istan. It is arguable that the two largest US military engagements
of the 21st century so far have actually left the United States and the world less secure than if they had never been undertaken. Not
only did the conflicts cost trillions of dollars and cause hundreds of
thousands of casualties, but they have contributed to an increase in terrorist activity and capabilities in areas well beyond the boundaries of the two states.33
The war in Afghanistan—the longest war in US history—is in
one respect a response to the ‘blowback’ from US military inter
ventions of the 1980s.34 The CIA spent hundreds of millions of
dollars arming and training Afghan mujahidin forces to help them fight off the Soviet occupation of their country. A significant portion
of this aid was diverted by Pakistani intelligence, which used it to support Islamic extremist groups that have engaged in terrorism in South Asia and beyond. Aid that did reach Afghanistan often ended up in the hands of foreign fighters and forces that had an anti-US
orientation.35 Once the Soviet occupation had been repelled, and a
nasty civil war was concluded, these groups turned their attention
to attacking the United States and its interests. Following the civil
war, many of them became part of the original cadre of Osama Bin Laden’s Al Qaida organization, which was hosted by the Taliban government in Afghanistan.36 The Taliban itself has received
substantial support from Pakistani intelligence.37
As a result, when the United States invaded Afghanistan in
October 2001 to root out Al Qaida, it was in part addressing a
problem of its own making. And the mission of driving Al 25
Indefensible.indd 25
24/05/2017 18:37
INDEFENSIBLE
Qaida out of Afghanistan soon morphed into a large-scale
counterinsurgency effort designed to defeat the Taliban and
remake Afghanistan as a pro-US ‘democracy’ (or at least a proUS regime, democratic or not). Fifteen years later the Taliban remains a major force in Afghanistan, the regime in Kabul is rife
with corruption, and Al Qaida has entrenched itself in Pakistan. As we saw at the very beginning of this book with the case of
Gerdec, Afghanistan has also become the site of spiraling defense
corruption. This is what the United States and the world got for
Washington and Europe’s investment in a trillion-dollar military undertaking in Afghanistan.
The case of Iraq is, of course, even more striking, in that it
was without question a war of choice, and it has spawned a new generation of militant extremists, notably ISIS, who largely use military equipment supplied to the country by the US itself.
Mil ita r y spe ndi ng i sn’t always intended to p rote ct c iti z e ns The fourth way in which defense spending can decrease the security of citizens is that in undemocratic states, military spending can
make citizens less safe. Indeed, spending on one’s military in many cases does not mean protecting the country, but rather protecting
the ruling elite from its people or discontented groups within the population, rather than protecting the people as a whole from
external or internal threats. Even in more democratic, or partially democratic countries, the military may suppress legitimate dissent among citizens and marginalized groups.
There is strong data to show that military spending as a
percentage of GDP is likely to be higher in countries with poor democratic records. The research group Freedom House provides
an annual scoring of countries according to different levels of 26
Indefensible.indd 26
24/05/2017 18:37
Myth 1
political and civil freedoms, with three broad classifications of ‘Free’, ‘Partially Free’ and ‘Not Free’. In 2013, amongst countries in the
SIPRI Military Expenditure Database, sixty-five were classed as ‘Free’, fifty-four as ‘Partially Free’ and forty-eight as ‘Not Free’.38
Comparing ‘freedom’ with military spending reveals that the less free a country is, the more it tends to spend on the military.39
S a udi A rabi an De f e nse S pending and the M a in te nance of Di ctator ship Saudi Arabia became the world’s fourth largest military
spender in 2013, at $67bn, and is currently the largest
importer of weapons in the world. Its spending has increased by 118% since 2004 in real terms. At 9.3% of GDP, Saudi
Arabia has the second highest military burden of countries
for which SIPRI had data in 2013, after neighboring Oman. Moreover, the official figure probably excludes significant off-budget spending on arms imports, which in some cases
are purchased directly with oil revenues, or indeed in oil for arms swaps such as the Al Yamamah deals with the UK in the 1980s and 1990s.
While Saudi Arabia has significant tensions with its
neighbor across the Gulf, Iran, the latter is a far weaker
military power with little ability to launch a successful attack on Saudi Arabia and other Gulf nations. Years of sanctions
on Iran have increased the costs of acquiring and maintaining
weapons systems, and it often has to make do with running older systems that would be massively outgunned by a fraction of Saudi power. Indeed, the Centre for Strategic and International Studies stated in 2015 that ‘Iran has been
unable to compete in terms of both investment and access to
advanced foreign systems’ compared to other Middle East 27
Indefensible.indd 27
24/05/2017 18:37
INDEFENSIBLE
nations.40 It also outlined how Iran’s navy and air force were
both reliant on heavily outdated and largely obsolescent equipment they can barely maintain.
Instead, the primary purpose of Saudi Arabia’s armed
forces over the years has been regime protection—ensuring
the continuing rule of the House of Saud that has treated the nation as its family fiefdom since coming to power in 1932, ruthlessly suppressing all dissent. The Saudi regime
has one of the worst human rights records in the world. It maintains several parallel armed forces (such as the
National Guard as well as the regular army) to ensure that no single force can become too powerful and itself pose a threat to the ruling family.
Saudi Arabia’s major weapons systems are not directly
utilized for domestic repression, of course. But corruption has
been a standing feature of arms purchases by Saudi Arabia from foreign suppliers, and the vast military budget—with
barely any democratic controls or oversight—provides a
massive opportunity for self-enrichment by elites. And this in turn enables the protection of the ruling elite through
patronage. By distributing wealth through positions and contracts for families and friends, not just its armaments, the house of Saud sustains its power.
U s ing the mil itar y to sol ve the wor ld’s secur ity is s ue s is n’t al ways the be s t bet The fifth way that military spending can decrease security is that
massive military expenditure can increase the tendency to seek
military solutions to non-military problems. One example of this has been the decades-long US ‘war on drugs’ which has been used
to justify aid to death squads and repressive regimes abroad and 28
Indefensible.indd 28
24/05/2017 18:37
Myth 1
mass surveillance and incarceration at home. For example, the multi-billion US ‘Plan Colombia’, designed to help the Colombian government dismantle the drug cartels there, included aid to
a corrupt military that regularly abused human rights and aerial
application of pesticides in large parts of the country. To the extent that Plan Colombia helped undermine the drug cartels there, the
drug trade was merely displaced to Central American countries like
Honduras and Mexico, where high levels of violence by drug gangs have become the norm. Other suggested approaches, like reducing drug demand in the US by expanding treatment programs and
providing alternative forms of employment in impoverished areas, have received only modest resources relative to the sums spent on military methods of fighting drugs.41
Another example of militarized approaches to non-military
problems was the international approach to tackling Ebola. Global
public health was identified as a threat to international peace and security by the UN Security Council in 2000, following a US National Intelligence Council assessment.42 However, the risk that
pandemic diseases—HIV/AIDS, influenza and tropical diseases
such as Ebola—might lead to state crisis in developing countries
and catastrophic disruptions to international travel and world
trade was not matched by commensurate spending. Certainly, international donors increased their assistance to health fourfold in
the following decade, and in 2012 $28bn was spent annually on global assistance programs for public health, with the US government as the largest contributor.43 But this amount pales into insignificance
compared to the spending on weapons. And in the hard-hit country of Liberia, the US prioritized rebuilding the country’s armed forces over rebuilding its health services.
This spending differential meant that when the Ebola epidemic
struck West Africa in 2014, those countries, the United Nations 29
Indefensible.indd 29
24/05/2017 18:37
INDEFENSIBLE
and the world were ill-prepared. In September, President Obama
announced Operation United Assistance, and dispatched the 101st Airborne Division to Liberia. He said:
Our forces are going to bring their expertise in command and
control, in logistics, in engineering. And our Department of
Defense is better at that, our armed services are better at that, than any organization on Earth. We’re going to create an air bridge to get health workers and medical supplies into West Africa faster.44
His words are surely true—after all, the largest defense budget in the world should buy some impressive logistics—but a military-
led response proved cost-inefficient and ineffective. The operation
cost $330m over six months,45 compared to the approved budget of the UN Mission for Ebola Emergency Response of $49.9m.46
Unfortunately, many of the shelters that the US built took too
long to erect: in January 2015, the Washington Post reported that
the shelters were put up just as the Ebola infection began to abate. Some shelters have not seen a single Ebola patient. The Liberian
government’s chairman for Ebola management, Moses Massaquoi, commented that ‘if they had been built when we needed them, it wouldn’t have been too much. But they were too late’.47
Large amounts of military spending can also draw funds away
from other non-military ways of increasing security: effective
diplomacy and cooperative action. In the US, the Pentagon budget
is roughly fourteen times the budget of the US State Department. This is truly remarkable: in its relationship with the outside world, the US devotes 1,400% more to projecting military power than it does on building alliances and finding non-military solutions to
conflicts. In fact, the State Department has, over the past decade, received roughly similar levels of funding as the DoD’s number one 30
Indefensible.indd 30
24/05/2017 18:37
Myth 1
contractor, Lockheed Martin (see Figure 1.6). As for peacekeeping, the US contribution to UN peacekeeping efforts is less than 0.5%
of what it spends on military activities. If the United States devoted a tiny fraction of what it spends on its own military to support
the cost of the United Nations and multilateral peacekeeping, a robust international capability could be on call to enforce peace
agreements, protect potential victims of repression and genocide, and separate warring parties.48
Figure 1.6 US State Department budget vs. Lockheed Martin federal contracts ($bn)
Source: Extrapolated from Susan B. Epstein, Marian L. Lawson, and Alex Tiersky, “State, Foreign Operations, and Related Programs: FY2016 Budget and Appropriations,” Congressional Research Service, November 5, 2015, Table 2, p. 5, accessed June 1, 2016, https://www.fas.org/sgp/crs/row/R43901.pdf. 31
Indefensible.indd 31
24/05/2017 18:37
INDEFENSIBLE
There is, of course, a counter-argument: if states spend on their
military, it enables them to get involved in disputes that threaten
human rights or democracy, shutting down the worst abuses and ending wars. Unfortunately, there is strong data showing that the
involvement of more than two parties (where outside countries
become involved) in a conflict tends to increase the length and deadliness of wars: just look at Figure 1.7. Note that this is
Figure 1.7 Internationalized intrastate conflicts and battle deaths, 1989‒2011
Military intervention to support one side in a civil war is associated with high death tolls—nearly 1500 per conflict in an average year. The devastating effect is not limited to intervention by majoy powerts. The high death toll for this type of conflict in 1997, for example, was caused by conflicts in the Democratic Republic of Congo, both of which saw interventions by troops from neighboring countries. Source: Human Security Report Project, Human Security Report 2013: The Decline in Global Violence: Evidence, Explanation, and Contestation (Vancouver: Human Security Press, 2013), 90. 32
Indefensible.indd 32
24/05/2017 18:37
Myth 1
generally not true of conflicts that include the involvement of
the UN or other peacekeeping efforts; it is when international
parties join in on a military footing outside of multilateral institutions, either directly or through supplying weapons and
supplies, that things get messy. On this issue, there seems to be an increasing and concerning trend: in 2013, 27% of active conflicts were internationalized.
Indeed, resolving conflicts tends to be easier when there are
fewer actors involved—the more parties to a conflict, the longer violence tends to last and the more people tend to be killed.49 One
of today’s bloodiest conflicts, Syria, is undoubtedly longer, more
lethal and more intractable because of the many outside countries
that have pursued the goal of supporting one side or another in the attempt to militarily conclude the conflict, rather than providing offices for mediating it or powerful incentives to end it.50
I s Massive M il i tar y S pe nding the Bes t Way to Tackle Te r ror i sm ? In a large number of Western countries—the US and UK
in particular—the threat of transnational terrorism is frequently cited as a primary reason for current levels of defense spending. Indeed, the reiteration that the West is at ‘war’ against terrorism only serves to reinforce the idea that
military operations are the best way of tackling this threat. In this instance, the logical leap is easy to see: spend more money on defense and be more secure against terrorism.
In the US, this thinking has led to the military receiving
the vast majority of counterterrorism funding. Between
2001 and 2007, Congress approved a total of $609bn for a range of counterterrorism activities. Of this, 90% went to the
Department of Defense. By comparison, the US Department 33
Indefensible.indd 33
24/05/2017 18:37
INDEFENSIBLE
of State and USAID received a total of only $40bn over the same period.51
But the idea that there is a military solution to terrorism
has been put into serious doubt by an influential 2008 study by
the US-based RAND Corporation—a think-tank esteemed by conservatives.52 The study reviewed the life-cycles of 648
terrorist groups from 1968 to 2006, identifying the ways in
which these groups ended. It found that in 43% of cases, terrorist groups ceased to exist because they were successfully
integrated into the formal political process. In 40% of cases,
the groups disappeared because of successful policing efforts. A further 10% of terrorist groups stopped their military
activities because they achieved their main aim. And, most importantly for this discussion, only 7% of terrorist groups were snuffed out as a result of military campaigns.53
The statistics generated from the study had clear
implications: using the military to win the ‘war on terror’ is
simply not going to work. More to the point, it is likely to be counter-productive, fueling resentment and undermining long-term regional goals. As the Jones and Libicki note:
Our analysis suggests that there is no battlefield solution
to terrorism. Military force usually has the opposite effect of what is intended: it is often over-used, alienates the local population by its heavy-handed nature, and
provides a window of opportunity for terrorist-group recruitment.54
Jonathan Powell, who served as the British government’s negotiator for the peace talks in Northern Ireland, makes
similar points.55 Indeed, having their own experience of 34
Indefensible.indd 34
24/05/2017 18:37
Myth 1
domestic terrorism and the bloody end to imperial and minority rule in colonies such as Malaya, Kenya and Rhodesia, Britain’s military chiefs thought it unwise for the
US to declare a ‘war’ on terrorists. Powell notes that no group
designated as a terrorist, which draws support from a popular constituency, has been defeated by military means alone.
Africa’s leaders have their own particular perspective
on terrorism. Many, including the current leaders of South
Africa and Namibia, were themselves branded as ‘terrorists’ by their former white rulers. In recent times, the African Union has taken a lead in putting together regional military
coalitions for combat operations against militant extremists,
notably Al-Shabaab in Somalia and Boko Haram in Nigeria. But in the 2015 African Union annual retreat for conflict
mediators, on the theme of Terrorism, Mediation and Armed Groups, African leaders expressed a consensus view
that military efforts should be conducted in support of a political settlement to a conflict involving terrorist groups.56 In short, armed force should be a component of a broader
political strategy, reversing the ranking too often seen in
the ‘war on terror’ whereby diplomats serve as ‘wingmen’ to generals.57
RE THIN KING S E C URIT Y In this chapter we have tackled the issue of security in a very traditional sense, namely as a measure of protection against military violence. This is, arguably, the way that many people understand
the concept of security: keeping the country safe from invasion or violence. But there is a strong and emerging trend towards consider ing security in a much broader—and much more useful—way. 35
Indefensible.indd 35
24/05/2017 18:37
INDEFENSIBLE
Driving this thinking is the adoption of a paradigm that goes
by the name of ‘human security’. Human security is defined by
the United Nations as ‘the right of all people to live in freedom and dignity, free from poverty and despair’. Underpinning this is
the recognition that ‘all individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential’.58
When security is thought about in this way—and it is hard
to argue that a population that is chronically malnourished is not
at risk—the type of threats that need to be addressed changes
drastically. Instead of just focusing on threats from war or conflict, human security requires us to look at all the various risks that are faced in the world today that undermine human dignity, drive
poverty and put billions of people in a constant state of emergency of survival. Some of these risks include access to clean water, food
security, climate change, health pandemics, violent multinational organized crime and repressive states that use their monopoly of violence to terrorize their own populations.
There is little doubt that, when considered in this light, the world
suffers a serious human security deficit. Global disease, poverty and hunger, for example, devastate lives in many parts of the world. It
is estimated that 1.5 million children under five die each year of vaccine-preventable diseases,59 while 3.1 million children a year die
from malnutrition.60
Some national leaders recognize this. An interesting example
is Ethiopia, long one of the poorest and most conflict-ridden
countries in the world. Following a devastating border war with neighboring Eritrea in 1998‒2000, and facing security threats from
its other neighbors, Somalia and Sudan, the Ethiopian govern ment published its national security policy white paper in 2002.61 36
Indefensible.indd 36
24/05/2017 18:37
Myth 1
Decrying what it called ‘jingoism with an empty stomach’, Ethiopia put economic development at the centre of its national security
plan, with military spending (capped at 2% of GDP but in practice lower) as subordinate to that goal.
Meanwhile, the world stands on the brink of one of the biggest
global catastrophes in human history, in the form of climate change. With no substantial change in the way things are done around the world, and no effort made to tackle global greenhouse gas
emissions, it is predicted that the earth’s temperature will rise by 3.7
to 4.8 degrees Celsius by 2100.62 The consequences of this would be devastating, threatening human—and national and international— security in numerous ways:
• Increased drought in many parts of the world, leading to severe water shortages.
• Greatly reduced global agricultural yields from increased heat and reduced rainfall, as global food demand increases.
• A major spread of tropical diseases such as malaria to new parts
of the world, potentially leading to millions of additional deaths.
• A major increase in the prevalence and severity of natural disasters such as hurricanes and flooding, with the potential to
devastate low-lying and coastal regions, a phenomenon that is already observable today.
• In the extreme, low-lying areas and small island states becoming completely uninhabitable.
• Vast refugee flows resulting from the above developments.
• Increased internal and international tensions over water resources and increasingly scarce fertile land.
• Mass extinction of species and loss of biodiversity, with severe consequences for humans through the food chain.63 37
Indefensible.indd 37
24/05/2017 18:37
INDEFENSIBLE
But even rises of less than 2 degrees Celsius, a level considered increasingly difficult to achieve, would lead to many severe conse
quences of the type listed above; the more action is taken to reduce emissions, the lower the likely temperature rise, and the less probable the most dangerous impacts become.
Where, you might ask, does military spending fit into this?
In two key ways. First, military expenditure is massive, and fails
to substantially tackle any of these major threats to human security. If only a fraction of military spending was focused on broader
human security goals, the improvement in the security profile of billions of people around the world would be tremendous.
The second way in which spending on weapons contributes to
human security should also be obvious: the goals of freedom from
want and fear are most likely to be achieved in democratic states that are accountable to their populations. But, as we’ve discussed in
detail above, huge amounts of global military spending is directed towards maintaining dictatorships or repressive regimes. This is not just a problem of the developing world. The majority of military
purchases by repressive regimes are from the world’s biggest arms
dealers: the permanent members of the UN Security Council. And even in democracies, military spending that is tainted by corruption
poses a major threat to good governance, and can, in the worst case scenarios, create the mechanisms by which democracy gets replaced by oligarchy and repression (this is discussed in detail in Myth 5).
Considering this, perhaps it is time to recognize one powerful
fact: even a small reduction in defense spending, one that sees
resources properly devoted to the human security dangers faced
by the majority of the world’s population, could actually make the world safer, healthier, more prosperous and more secure.
38
Indefensible.indd 38
24/05/2017 18:37
M Y TH 2
MILITARY SP EN D ING IS DRIV E N BY S ECURIT Y CONC ERN S As we’ve shown in the previous chapter, there are good reasons
to question a direct correlation between high military spending
and an increase in security. But one could still argue that even if high military spending is wrong-headed, it is undertaken with the genuine desire to increase security. Military spending may not
be the most strategically rational approach to a country’s security threats, but it is, in the end, at least driven by security concerns.
In reality, it is precisely this largely erroneous belief that muddies
the water in most arms trade and procurement debates, and provides
the cover for all sorts of completely unnecessary military equipment to change hands between producers and buyers for a whole host of other less rational reasons.
The unfortunate truth is that the arms trade is not primarily geared
to dealing with security threats. Instead, many arms transactions are undertaken for a plethora of other reasons, and may, in fact, hinder a state’s response to security threats rather than increase preparedness. 39
Indefensible.indd 39
24/05/2017 18:37
INDEFENSIBLE
E CONOM ICS A N D THE P OWER OF POL IT ICS One of the most commonly stated reasons for arms transactions is that they are supposed to generate a whole series of economic benefits. Indeed, in some cases, arms sales are justified entirely
for their economic benefit (itself a questionable proposition, as we’ll see in the next chapter), rather than their importance for national defense. In certain countries these supposed economic
benefits become the means by which arms producers place pressure on politicians to support strategically questionable projects: no politician wants to attack a project that may employ large numbers of their constituents, even if the money could theoretically be
more efficiently spent elsewhere. Combined, these two reasons
can be decisive in securing support for sometimes clearly absurd expenditure, as evidenced in the case of the F-35.
T he F - 3 5 B oondoggl e Coming in at an estimated total cost of $1.5trn to produce
and maintain over its lifetime, the Lockheed Martin F-35
stealth fighter is the most expensive weapons program in history.1 In reality, the cost may even exceed this gargantuan
sum: every year that the F-35 has been in production the cost has gone up due to technical problems and engineering
concerns. For this enormous outlay, the US will receive 2,457 stealth fighter-bombers that will be operated by a number of its arms of service (the air force and the navy in particular).2
The problems with the F-35, however, are legion. Beyond
spiraling costs, there seems to be little technical advantage
provided by the aircraft compared to those already in production. Since its conception in the late 1980s, its design
has been modified again and again to include capabilities 40
Indefensible.indd 40
24/05/2017 18:37
Myth 2
that often contradict each other. The aircraft is supposedly light and stealthy, yet it also needs to be able to carry a
massive payload of bombs and sophisticated weapons.
It is intended to be used as both a bomber and an air-toair fighter, yet its current design means that pilots cannot look behind them to see what is coming or going.3 The end
result is a jet that has not only been constantly delayed (with nearly all of its testing still ahead of it), but one that fails to offer a better strategic solution than aircraft currently in production. The noted military commentator Winslow Wheeler, who has advised both Republican and Democratic senators in his long and studied career, has summarized the performance thus:
A virtual flying piano, the F-35 lacks the F-16’s agility in
the air-to-air mode and the F-15E’s range and payload in the bombing mode, and it can’t even begin to compare
to the A-10 at low-altitude close air support for troops engaged in combat. Worse yet, it won’t be able to get into the air as often to perform any mission—or just
as importantly, to train pilots—because its complexity prolongs maintenance and limits availability. The aircraft
most like the F-35s, the F-22, was able to get into the air on average for only 15 hours a month in 2010 when it was fully operational.4
The F-35 has two things going for it: an enormous budget to lobby decision makers and a ready list of all the jobs that it
has created. Lockheed Martin’s splashy website is quick to emphasize the latter, promising that the F-35 delivers ‘tens
of thousands of high-paying, high quality jobs to American 41
Indefensible.indd 41
24/05/2017 18:37
INDEFENSIBLE
workers across the country’.5 Below this is a useful map
showing ‘how the F-35 contributes to your state’s economy’.6 In total, Lockheed Martin claims that the F-35 program
sustains 129,000 direct and indirect jobs across forty-five US states.7
Unfortunately, it appears these figures may be a consid
erable over-estimate. According to leading commen tator
Bill Hartung, the total number of jobs that could realistically
be expected to be created—using standard accounting
methods—is in the region of 50,000 to 60,000. And the claim that forty-five states will receive economic benefits ignores
that this is massively skewed by region: the top five states will
account for nearly 70% of all jobs sustained by the project.
A total of eleven states—Iowa, South Dakota, Montana,
West Virginia, Delaware, Nebraska, North Dakota, Alaska, Hawaii, Louisiana and Wyoming—will each house less than a dozen F-35 jobs.8
If these figures are less than impressive, have a look at
Lockheed’s budget for influencing. According to David Axe, an investigative blogger who works closely with a
Swiss-based security policy group Offiziere, Lockheed
Martin spends at least $15m a year on its lobbying efforts, and is able to direct considerable campaign contributions to decisive players.9 Four of the most important F-35
contractors—Lockheed Martin, BAE Systems, Northrop
Grumman and United Technologies—have made campaign contributions totaling $11.1m in 2011/2012 and 2013/2014.10 Of these donations, a substantial portion were directed towards
members of the F-35 caucus, a thirty-nine-member group within Congress that has long supported the jet project. The biggest overall recipient of donations was the chair of the 42
Indefensible.indd 42
24/05/2017 18:37
Myth 2
House Armed Services Committee, Representative Howard
P. ‘Buck’ McKeon, who received $218,650.11 The thirty-nine
members of the F-35 caucus have received a combined
total of $1.9m from F-35 contractors, including a number of smaller companies in the production line.12
Perhaps this is why the F-35, despite all of its problems,
continues to receive massive budgetary support. Indeed, the Pentagon’s 2015 budget request includes at least $8bn just for
the F-35 (equal to the annual budget of the Environmental Protection Agency). The F-35 receives a good portion of this through the Pentagon’s procurement budget: $6.3bn. This is
a full 7% of the entire procurement budget of the Pentagon, listed as $90.6bn in Fiscal Year 2015.13 And all to buy a ‘virtual
flying piano’.
Important recent developments in the US arms control regime
indicate just how much defense policy can be decided by economic rather than strategic concerns. In 2009, President Obama announced that the US was to restructure its arms export control laws. The
thrust of the reforms was to move significant portions of items on
the Munitions List (which is overseen by the Department of State) onto the Commercial Control List (CCL), run by the Department
of Commerce. The purported economic benefits of the reforms have
been paramount in their justification. As President Obama promised in 2010, ‘by enhancing the competitiveness of our manufacturing and technology sectors, they’ll help us not just increase exports and create jobs, but strengthen our national security as well’.14
The broader impact of these reforms is to make it much easier
for defense producers to export items that were previously on the more rigorously controlled Munitions List. We will discuss the shortcomings of today’s efforts to control the trade later; here we 43
Indefensible.indd 43
24/05/2017 18:37
INDEFENSIBLE
simply note that changes to US trade policies will mean that a significant percentage of items previously on the Munitions List
will now be able to be exported without a license.15 Some may
be small items—bolts and nuts—but there are enough big-ticket
items to be worrying: military cargo planes as well as Black Hawk helicopters, for example.16 Freeing up these items makes it ever
easier for groups that may be anathema to the US to get hold of once heavily controlled items. As William Hartung says: ‘The danger of
the administration’s new export control approach is that it could
make it easier for significant military articles to reach major human rights abusers, countries seeking nuclear weapons, or destinations where they may be more likely to fall into the hands of terrorists.’17
Ironically, and despite the widespread support for deregulation
amongst defense companies, there is the real risk that the reforms may
lead to a net decrease in US defense industry jobs. This crystallizes
the other unfortunate truth: often the economic benefit that is being touted is, in reality, a boon to the major companies but a bane to its employees, and even the wider population. In House hearings on
the matter in 2013, the International Association of Machinists and Aerospace workers issued a worrying cautionary note:
We continue to warn that, in some cases, the less stringent controls provided under the CCL could lead to further transfers
of technology or production from the U.S. to another country. The transfer of technology and production can have long term consequences as other countries utilize that transferred
technology and production to develop their own commercial and defense industries at our expense. These transfers have
already decimated the shipbuilding, machine tool and electronic
industries. They are also having a significant impact on both the commercial and defense aerospace and related industries.18 44
Indefensible.indd 44
24/05/2017 18:37
Myth 2
The threat of shedding defense jobs—and incurring the wrath
of the powerful defense lobby—is a particularly important moti vation in countries that manufacture and buy their own arms. But those countries that import most of their weapons—the large majority of the world—are often seduced by a different economic incentive: offsets.
Offsets are agreements on the part of weapons manufacturers to
invest in the economy of the buying countries, thus ‘offsetting’ the
economic cost of importing the weapons. Offsets are particularly prevalent in the arms trade, despite the fact that they are hugely
controversial.19 Part of this is because the defense trade is given
a free pass when it comes to offsets. Using offsets as a selection criterion is banned by the World Trade Organization, except in the
defense trade (which we will discuss in more detail in Myth 5).20 The result, especially over the previous decade, has been an explosion in
the number and size of offset deals. According to The Economist, it is estimated that the total offset obligations (the amount companies are
still obliged to invest) in the global defense and aerospace industries
is in the region of $250bn, and may grow to a remarkable $450bn by 2016.21 Indeed, a recent review of international offset obligations
indicates that aerospace (both civil and defense) accounts for 48.51% of all offsets around the world. Munitions, another key sector, is
responsible for 9.41% of global offsets.22 Unsurprisingly, the world’s
biggest weapons manufacturers—North America and Europe—are responsible for 82.3% of all offset offers around the world.23
As we will see in detail later, offsets are hugely problematic:
the likelihood of offsets contracts being fulfilled in the quantities promised are pretty slim, they tend to increase the purchase
price and pose a serious corruption risk. But buying countries, and especially their politicians, can use the positive spin of offset contracts to win over public opinion, because they’re intended to 45
Indefensible.indd 45
24/05/2017 18:37
INDEFENSIBLE
improve the local economy. Indeed, many arms companies believe that putting together an attractive offsets deal is key to winning
contracts. Jim McNerney, head of Boeing, believes the ability to
craft offset offers is a ‘source of competitive advantage’ for the company.24 Countries may decide to bite the bullet and pursue weapons purchases as offsets seem like an attractive proposition
in mitigating affordability issues. Either way, offsets can clearly muddy the waters when it comes to determining the desirability of defense equipment.
CO RRU P TIO N A N D B U Y ING GLOBAL P O LITIC A L S U P P ORT It is a regrettable reality that the content of many weapons deals around the world are largely, and sometimes solely, determined
by corruption, as we discuss in much greater detail later. In particular, countries may be induced into buying particular types
of equipment—even if better alternatives exist—regardless of the
strategic implications of following this path. This is not a minor concern, or an issue that animates peaceniks only. In 2006, the consultancy company Control Risks conducted an extensive survey of 350 international businesses situated in numerous jurisdictions
around the world. They found that, over the previous five years (2001‒2006), 26% of defense companies they interviewed believed
that they had lost contracts due to corruption. In 2006 alone, 31% of defense companies interviewed believed that graft was a decisive factor in who won contracts.25 This suggests that in a significant
number of cases what weapons are bought, who supplies them and what capacities are eventually delivered to armed forces is
determined by bribes rather than whether the product itself is the best fit for the security needs of the country. 46
Indefensible.indd 46
24/05/2017 18:37
Myth 2
When corruption is mixed with other imperatives—when
security concerns are not the main driving force of weapons buying
—the result is entire weapons transactions conducted without
apparent reference to a rational case for defense needs. One recent example of this was the decision by India to purchase twelve
helicopters from the Italian firm Finmeccanica for use by the country’s VVIP protection team in 2010.
W he n Cor r uption Tr umps Utility : The I ndi an He li copte r Con tract The helicopters, valued at €556.2m, were supposed to be
used by India’s politicians to travel around the country. During the selection process, the requirements for the heli copters were controversially changed. It had previously been
required that the helicopters could fly to a height of 6,000
meters; this was changed to a required height of 4,500. The result of this was that Finmeccanica was able to enter the
competition, as the helicopter it was selling could not safely fly above this height. The problem, as the Indian auditor
general later pointed out, was that the helicopters could no longer fly in large parts of northern India where there are high mountains.26
On 1 January 2014, the Indian government canceled the
contract, and a criminal investigation was launched into the transaction.27 The investigations—still ongoing in India— have shown that the family members of a key participant
in the helicopter selection committee, Air Chief S.P. Tyagi, received funds from Finmeccanica as the decisions were being made. In early 2016, two senior Finmeccanica executives, Giuseppe Orsi and Bruno Spagnolini, were found guilty by Italian courts of corruption in relation 47
Indefensible.indd 47
24/05/2017 18:37
INDEFENSIBLE
to the transaction, which confirmed that funds had been distributed to Air Chief Tyagi.28 Indian investigations are
still ongoing into a mysterious English intermediary named Christian Michel James. An international arrest warrant
issued by Indian authorities for James alleged that numerous
members of the Indian political elite may also have received illegal inducements.29
It is not just individual deals that are questionable: a large number
of the most notoriously corrupt defense establishments in the world
do not seem to buy arms for their countries’ national protection, but largely to cement important strategic relationships around the world. The simple fact is that by buying weapons systems from one
of the major weapons sellers, even the most outrageously dictatorial governments are guaranteed a friendly reception amongst their
supplier countries. These two driving forces—corruption and buying
friends—are most clearly seen in the case of a country that should, by any objective standard, be considered a rogue state by democratic nations: Saudi Arabia.
W he n Cor r uption M e ets G lobal Politics: S a ud i A rabi a Saudi Arabia is one of the largest arms purchasers in the entire world. In 2014, Saudi Arabia was recorded as the fourth largest military spender in the world, almost entirely
funded by enormous reserves of oil, bested only by the US, China and Russia.30 In March 2015, Saudi Arabia outstripped
India to become the biggest defense importer in the world.31
Between 1988 and 2013, Saudi Arabia spent a reported
$897bn on military matters (in constant 2011 prices), or $33bn a year.32 A significant portion of this is spent on acquiring 48
Indefensible.indd 48
24/05/2017 18:37
Myth 2
sophisticated weapons systems, almost entirely from the US, the UK and the rest of Europe.
Saudi Arabia also tops another list: it is one of the most
persistent violators of human rights in the world. It is the only country in the world named after its ruling family, and
indeed the Saudi royals consider the country and its mineral riches as their personal possessions. Saudi Arabia has the
world’s most astonishing constitution: it has no pretense
to democracy or human rights. The second chapter of the
Constitution, for example, confirms that ‘the system of government in the Kingdom of Saudi Arabia is that of a monarch’ and that ‘citizens are to pay allegiance to the King
in accordance with the Holy Koran and the tradition of the
Prophet, in submission and obedience, in times of ease and difficulty, fortune and adversity’.33 Human Rights Watch’s
annual reports on Saudi Arabia read like a litany of horrors, the entry covering 2012 is depressingly typical:
Saudi Arabia in 2012 stepped up arrests and trials of
peaceful dissidents, and responded with force to demon
strations by citizens. Authorities continue to suppress or fail to protect the rights of 9 million Saudi women
and girls and 9 million foreign workers. As in past years, thousands of people have received unfair trials or been subject to arbitrary detention.
And as Amnesty International reported, in 2014 Saudi
Arabia executed ninety people; most of them were beheaded, a punishment often conducted publicly.34
Saudi Arabia has since 2015 very publicly exported its
domestic horrors abroad through an indiscriminate bombing 49
Indefensible.indd 49
24/05/2017 18:37
INDEFENSIBLE
campaign in Yemen. In early 2016, the European Union took
the unusual step of voting to place an embargo on arms sales to Saudi Arabia. The embargo is voluntary: member states of
the EU do not have to stop sales, and its resolutions are more
akin to a powerful suggestion. Nevertheless, the embargo text confirmed that:
the Saudi-led military intervention in Yemen … includ
ing the use of internationally banned cluster bombs, has
led to a disastrous humanitarian situation that affects the population across the country … there are multiple reports that airstrikes by the Saudi-led coalition in
Yemen have hit civilian targets, including hospitals, schools, markets, grain warehouses, ports and a camp for displaced people.35
Despite this, Saudi Arabia maintains a friendly and close
relationship with the West, in particular the US and the UK. One part of this is undoubtedly Saudi Arabia’s influence
in the Middle East, where it is seen to counterbalance the influence of Iran. But also important in cementing
this relationship is the fact that Saudi Arabia is one of the largest purchasers of defense equipment from the US and UK. In the case of the UK, Saudi Arabian purchases
have been considered central to the success of UK defense
manufacturers, BAE Systems in particular: in 2014, BAE reported that Saudi Arabia was its third largest
customer, representing 20% of its sales.36 In return, the
US and UK are committed to maintain and train the Saudi army and, informally at least, provide it with military protection.
50
Indefensible.indd 50
24/05/2017 18:37
Myth 2
This is not the only reason Saudi Arabia undertakes such
extensive defense spending: it is also one of the primary ways in which key members of the Saudi royal family divert
enormous state resources into their own pockets. Trans parency International places Saudi Arabia in its second
lowest band in terms of the major corruption risk it poses. Transparency International comments that ‘in Saudi
Arabia decisions, including large, strategic purchases, can be executed on the personal initiative of single members of
the Royal Family. The Ministry of Defence does not appear to exert centralised control over acquisition planning. One
retired U.S. military officer interviewed stated explicitly that: “[Saudi Arabia] maintain[s] an inventory of many types of
Western equipment, really a mishmash of equipment, often purchased based more on political rationale, or for corrupt personal reasons.”’37
With these considerations taking precedence, the
strategic utility of weapons, and certainly the suitability of
particular weapons systems in the harsh desert environment, can take second place. This was illustrated by the infamous
Al Yamamah arms deal between the UK and Saudi Arabia, which has been dogged by allegations that billions of dollars
were paid to secure the deal through Prince Bandar, son of
the Saudi defense minister at the time. As part of the deal, Saudi bought a squadron of Typhoon multi-role jet fighters.
The only problem was that they were hugely unreliable,
with iffy radar, and were easily grounded by sand entering into their delicate parts. British engineers were known to joke that the only Typhoon they could keep in the air was a model version that had been placed on a plinth outside the main gate of Dhahran airbase.
51
Indefensible.indd 51
24/05/2017 18:37
INDEFENSIBLE
CO N S E Q UE NCE S The mixture of factors that underlie defense transactions—local and international political concerns, economic goals, misplaced
national pride and corruption—has the effect that weapons sales often don’t serve much strategic need. More importantly, it can leave defense forces with inadequate weaponry when they are
forced into combat roles, or, in certain instances, a telling lack of strategic capacity.
One example of how corruption and the pursuit of personal
enrichment can destroy a military force is Ukraine. After the
end of the Cold War, Ukraine suddenly became the weapons supplier of choice to a range of dodgy arms dealers around the
world, effectively emptying its stockpiles of weaponry and enriching corrupt military personnel in the process.38 A Ukrainian
parliamentary investigation found that Ukraine had ‘lost’ $32bn in military assets between 1992 and 1998, mostly due to theft, a lack of oversight and quick-fire deals.39 At the same time, Ukrainian
military expenditure under successive post-Cold War governments has been shot through with systematic and epic corruption.40 In
2012, Leonid Polyakov, recently appointed deputy minister of
defense, wrote that corruption in the Ukrainian defense sector had become a ‘systemic phenomenon’ that seriously ‘threatens
the efficiency of operation and development of Ukraine’s Armed
Forces’.41 The Ukrainian military was thus under-equipped by two
processes: massive theft in the early 1990s, followed by corrupt procurements that left the cupboard bare. In 2014, abruptly faced with the huge Russian military machine and its proxy rebels in the
eastern region of Donbass, Ukrainian soldiers found themselves
on the front lines without basic equipment and training. A fact-
finding mission by General Wesley Clark, soon after the fighting 52
Indefensible.indd 52
24/05/2017 18:37
Myth 2
began, found that Ukrainian soldiers lacked for basics like nightvision goggles, body armor, uniforms and logistic supplies.42 Another example is South Sudan and its army of ghosts.
S outh S udan and the A r my of Ghos ts In January 2005, a peace agreement ended a long-running
war between the Sudanese government and the southernbased rebel Sudan People’s Liberation Movement and Army (SPLM/A). The peace deal provided for a six-year interim
period, during which the SPLM formed an autonomous government of southern Sudan (commonly known as
GOSS), to be followed by a referendum on independence. The Islamist government in the northern part of Sudan
(capital: Khartoum) was under sanctions for having supported
terrorism and committed human rights violations, while the SPLM/A enjoyed the backing of influential lobbies in the
US and Europe. Following the peace deal, southern Sudan’s
leaders embarked on a massive expansion of their army, the
SPLA, that included a huge increase in its numbers and the
purchase of weapons systems including tanks and helicopters. One of the least developed countries in the world, with
the worst indicators for health and education, southern
Sudan had oil, which made its leaders cash rich. They went on an arms spending spree.
These purchases fell into a legal gray zone. There is an
EU arms embargo on Sudan, which was extended to include
South Sudan after its independence in 2011. This didn’t stop France, Germany and Italy (among others) supplying small arms and light weapons to Sudan and southern Sudan. Some
of the southern Sudanese purchases were secret and in fact the single biggest deal—buying over 100 T72 tanks from 53
Indefensible.indd 53
24/05/2017 18:37
INDEFENSIBLE
Ukraine—doesn’t appear in any southern Sudanese official
budget. But it could hardly be kept quiet when the last of
the three shipments—the 10,000-ton cargo ship MV Faina, transporting thirty-three of the tanks to the Kenyan port of Mombasa—was hijacked by Somali pirates on 25 September 2008. American destroyers kept close watch on the ship and its lethal cargo until a ransom was paid.
The official documentation used to undertake the transfer
included an end-user certificate, a document confirming who
the final recipient of the weapons would be. The end-user certificate, in this case, referred only to MOD/GOSS, which
it was claimed referred to a Kenyan government department. Nobody believed it. The three shipments from Ukraine (one
on a German-operated vessel) included 110 T72 tanks, 14,000 rounds of ammunition for the tanks, eight BM-21 122 mm multiple-launch rocket launchers, 21 anti-aircraft guns, 405
rocket-propelled grenades and 40,000 automatic rifles. The SPLA also bought Russian Mi-17 transport helicopters and Chinese ammunition. The US assisted with more than
$150m in training and other forms of non-lethal support. Neighboring countries also cashed in: Kenya connived in transporting the Ukrainian shipments overland, and the
Ethiopians sold small arms and ammunition and helped maintain the SPLA’s older T-55 tanks.
Corruption was so endemic in South Sudan’s defense
sector that when the newly independent country clashed with Sudan along their common border in 2012, many
troops ordered to the front turned out to be ‘ghost soldiers’ put on the payroll so that generals could collect the salaries, and those who existed were woefully underprepared. According to the auditor general, the Defense Ministry 54
Indefensible.indd 54
24/05/2017 18:37
Myth 2
could not provide payrolls for thirty-three out of its forty
units. President Salva Kiir later revealed that despite the huge budget allocated to the army ‘there are no[t] even
vehicles to transport soldiers on missions’.43 Not only had
South Sudan squandered half its immense oil revenues on its defense budget, but it hadn’t got a professional army to
show for it at the end. In fact, in December 2013, when civil war broke out, President Kiir had to call on the Ugandans to dispatch an expeditionary force to protect his government—for a price.
Indeed, as soon as a political dispute between Kiir and
his former deputy, Riek Machar, turned violent that month, both sides turned to irregular ethnic militia to fight, and those militia engaged in horrific ethnic butchery. Meanwhile all those weapons procured over the previous eight years have been used by the two sides, chiefly against the civilian population.
Today, South Sudanese face a horrendous humanitarian
crisis and a vicious civil war which continues despite the leaders having been pressured into signing a peace
agreement. United Nations peacekeepers are sheltering over 200,000 displaced people in their camps and relief agencies
are providing food and medicine to more than a million
others. The weapons supplies and corruption that made this
all possible occurred while South Sudan’s army was being trained and advised by Western governments, notably the US. And scarcely a word was said until it was too late.
55
Indefensible.indd 55
24/05/2017 18:37
INDEFENSIBLE
CO NCLUS IO N Defending the arms trade by claiming that it is legitimate to arm
oneself and one’s allies may seem like a reasonable proposition, but it is frequently a red herring. The reason: when weapons are bought and sold, they are often chosen for a range of reasons that
have nothing to do with strategic need. There is a dizzying array of reasons why many arms deals are done, including anticipated economic benefit, local and international political considerations
and, disturbingly frequently, corruption. Sometimes the outcome is the selection of weapons systems that may not meet a strategic
need exactly, when a better option is available. In others, it can lead to a weapons purchase that meets no identifiable strategic need at
all. The end result is that military spending is often strategically questionable at best; farcical, criminal and dangerous at worst.
56
Indefensible.indd 56
24/05/2017 18:37
M Y TH 3
WE C AN CO N T ROL WHERE WE A P ON S END UP AND H OW THEY ARE USED Many weapons last a long time. If well-maintained, a gun can
carry on shooting for years, sometimes decades. Small arms and light weapons (SALW) are particularly long-lived, but many mechanical weapons systems are built to withstand hard conditions, neglect, and wear and tear. Unexploded munitions
from World War I battlefields were still killing French and Belgian
farmers into the 21st century. Kalashnikovs and mortars from the 1960s can still function if they are given a basic service and cleaning. Thus, if arms are to be supplied to an ally there needs to be a reasonable likelihood that the receiver will remain an ally for
many decades to come, and won’t be tempted to sell them on to a less reliable customer—perhaps when the ally wants to refurbish
its armory with newer weapons and discard its old stock. There also needs to be enough capacity in the recipient state to make sure 57
Indefensible.indd 57
24/05/2017 18:37
INDEFENSIBLE
that arms are used as intended, and not passed on or ‘lost’ by its military personnel. Unfortunately, too often the long-term security
interests of the supplier country take a backseat to the interests
of the defense companies and/or special interests looking to see weapons sold. The consequences—fighting enemies armed with weapons you supplied—can be severe.
Despite the repeated claims that strong export controls in places
like the US and Europe prevent weapons getting into questionable hands, the historical experience shows that the controls are often
weakly enforced. Once you sift through the sordid history of
double-dealing and deadly conflict, it becomes clear that there are multiple avenues by which arms can get into the wrong hands.
You may be asking: ‘but what about that Arms Trade Treaty we
heard about? Didn’t this take care of these issues?’ Unfortunately, no. The Treaty, discussed at the end of the chapter, is full of holes, watered down after years of negotiation into a tool that will achieve little good, and maybe even more bad.
BLOWBACK: WHE N FRIENDS B E CO M E E N E M IES The first and probably best known way in which arms get into the wrong hands is through what is known as ‘blowback’: when a one-
time ally to whom you have provided weapons becomes an enemy. With that switch, enemies are able to turn the weapons supplied against their one-time ally turned enemy.
There are many examples of blowback, but none is more
obvious than the serious mess that has been the US involvement in
Iraq and Afghanistan. In the early 1980s, Iraq, under the dictatorial
leadership of Saddam Hussein, launched a war against Iran. Iran had recently undergone a revolution that had replaced the Shah 58
Indefensible.indd 58
24/05/2017 18:37
Myth 3
of Iran (a long-time US and European ally, despite his dictatorial
rule) with a religious clique, the Ayatollahs, that promised to convert Iran to Muslim orthodoxy. Iran declared the US ‘enemy number one’. While the US was not above supplying weapons to
Iran (the Iran-Contra affair exposed how the US had set up an enterprise to supply arms to Iran to secure the release of hostages
and fund right-wing paramilitaries in Nicaragua1), it generally tilted its support towards Iraq.
This support was both financial and material. In 1989, FBI
agents raided the Atlanta offices of the Italian Banca Nazionale
del Lavoro (BNL), based on a tip-off from two insiders.2 It soon
emerged that the bank had been systematically supplying loans to
the regime of Saddam Hussein. Representative Henry B. Gonzalez, tasked with investigating the matter, revealed that BNL had been
Iraq’s largest source of loans from 1985 to 1989. This was done with
the complicity of the CIA and Washington. Remarkably, the loans
had been guaranteed under the cover of the Commodity Credit Corporation, a US government agricultural loan facility. When Iraq defaulted on the loans, it was the US taxpayer that paid the bill.3
The loans that had been granted to Saddam Hussein fueled
an enormous program to buy weapons, mostly from European suppliers, which was supported and aided by the CIA and Washington; the program was given legal force by a National
Security Decision Directive (NSDD) signed by Ronald Reagan
that stated it was US policy to ensure Iraq won the war with Iran. Howard Teicher, a member of the US National Security Council
in charge of Political-Military Affairs from 1982 to 1987 revealed in an affidavit that in 1995,
Pursuant to the secret NSDD, the United States actively
supported the Iraqi war effort by supplying the Iraqis with 59
Indefensible.indd 59
24/05/2017 18:37
INDEFENSIBLE
billions of dollars of credits, by providing US military intelli
gence and advice to the Iraqis, and by closely monitoring third country arms sales to Iraq to make sure that Iraq had the military weaponry required.4
Between 1979 and 1985, when reliable data ceases, Iraq increased its expenditure on weapons from 6.9% of its GDP to 27.5%.5 During
the early 1980s, Iraq became the world’s biggest importer of major weapons systems, only falling behind India in 1986 and 1987. The
Stockholm Peace Research Institute could identify twenty-six different countries supplying weapons to Iraq at the time.6 The two
largest suppliers of Iraq’s major weapons systems during the Iran‒ Iraq war were France (accounting for 28%) and the Soviet Union (47%).7 Thus, with direct funding from Washington, not only was
Saddam Hussein getting his hands on buckets of weapons, but he
was buying a good portion of them from the US’ Cold War enemy, the USSR.
A unilateral US arms embargo placed on Iraq during the war
meant that the US could not supply weapons directly (hence the
convoluted system described above). But it made every effort
to ensure that Iraq could import as many ‘dual-use’ items from the US as possible. ‘Dual-use’ items are items that have both
military and civilian applications. Included in the designation of ‘dual-use’ items were biological materials that could be used in
chemical and biological warfare. In the early 1990s, the US Senate Committee on Banking, Housing and Urban Affairs released a report confirming that
The United States provided the Government of Iraq with ‘dual use’ licensed materials which assisted in the development
of Iraqi chemical, biological and missile-system programs, 60
Indefensible.indd 60
24/05/2017 18:37
Myth 3
including: chemical warfare agent precursors, chemical warfare
agent production facility plans and technical drawings (provided
as pesticide production facility plans); chemical warhead
filling equipment; biological warfare related materials; missile fabrication equipment; and, missile-system guidance equipment.8
The list of biological material the US provided was shocking, including anthrax, botulinium, E.Coli as well as human and bacterial
DNA.9There is credible evidence that when the US invaded Iraq in 1991, US troops were exposed to the very agents that the US
had supplied, over and above fighting against the weapons whose acquisition the US had helped to fund and arrange.10
In the aftermath of the fall of Saddam Hussein, the world was
witness to another type of blowback: namely, when an ally is provided
arms but fails to stop those arms being stolen by enemies. Between 2003 and 2014, Iraq received weapons to the equivalent value of
$4.115bn (not all of which were bought: many of the weapons that
were delivered took the form of aid transfers); of which $2.487bn, or more than 50%, came from the US.11 Amongst the items delivered are armored personnel carriers, military helicopters, transport
aircraft, anti-tank missiles, tanks, artillery and drones.12 Between 2006 and 2009, for example, SIPRI reports that the US handed
the Iraqi army 8,500 advanced armored personnel carriers.13 These
figures also ignore the mountains of light weapons imported into the country; between 2003 and 2008, the US supplied over 1 million
small arms (rifles and handguns) to the Iraqi military and police, 360,000 of which simply went missing.14
The story comes full circle in 2014: blowback in the form of
the Islamic State of Iraq and the Levant (ISIS – also sometimes
referred to as ISIL or Daesh). Since 2013, ISIS, a hardline Islamist militant group that has attracted global approbation for its brutal 61
Indefensible.indd 61
24/05/2017 18:37
INDEFENSIBLE
tactics—including mass executions of captured minority groups
and beheadings of journalists—has gained control of significant
portions of Iraq and Syria. Originally armed with weapons sourced from an overly well-stocked region, with Syrian and Iraqi stores
particularly lucrative sources, ISIS has overrun much of the
northern quadrant of Iraq bordering Kurdistan.15 The Iraqi army,
which was supposed to have been well trained and armed, melted in
the face of the ISIS onslaught; illustrating yet again that no amount of material and technical training can fix that which is badly
governed. These military successes, in particular the capture of Iraq’s
second city of Mosul, allowed ISIS to acquire even more significant stockpiles of weapons, creating a feedback loop in which ISIS uses
existing weapons to acquire even more, some of which had been provided to the Iraqi army by the US.16 The size of the seizures has
been astonishing: a 2014 UN Security Council Report noted that
in June 2014 alone ISIS seized sufficient Iraqi government stocks from the provinces of Anbar and Salah al-Din to arm and equip more than three Iraqi conventional army divisions.17 Reviewing the
evidence, the same report provided a chilling summary of the range of weapons ISIS has at its disposal:
From social media and other reporting, it is clear that ISIL assets include light weapons, assault rifles, machine guns, heavy
weapons, including possible man-portable air defense systems
(MANPADS) (SA-7), field and anti-aircraft guns, missiles, rockets, rocket launchers, artillery, aircraft, tanks (including
T-55s and T-72s) and vehicles, including high-mobility multi purpose military vehicles.18
Hundreds of millions of dollars of weapons they use have been
instrumental in their rapid advance.19 This is particularly true of 62
Indefensible.indd 62
24/05/2017 18:37
Myth 3
military infantry fighting vehicles—Humvees and mine-protected
vehicles—and long-range howitzers that inflict frightening damage on civilian populations. When the US recently launched
airstrikes against ISIS fighters who had surrounded tens of thousands of civilians on a barren mountainside, it was largely
targeting weapons (in particular mortars) that the US had itself made available in the region.
The seizure of US weapons, which ISIS mixes with arms
acquired via other means elsewhere (often smuggled in through
routes that traverse Turkey20), has not only further destabilized Iraq,
but fed further violence and devastation into the deadly Syrian
conflict. Recent media reports indicate that some of the US-seized weapons and armor—Humvees in particular—have been seen in
the hands of ISIS near Aleppo: a full 200 miles outside of Iraq.21
In a region where tensions are rife, where violence is endemic and a peaceful solution a long way off, and where predicting the
political future is almost impossible, there remains one constant: if people want to fight wars, they have more than enough arms to do so for the foreseeable future. Indeed, in 2014 the London-based Conflict Armament Research published a report based on spent
ammunition found in ISIS-controlled areas. It found that ISIS had been using ammunition from at least twenty-one different countries manufactured over seventy years. Nearly 20% of the ammunition discovered was supplied by the US in the 2000s.22
There is, of course, a caveat: after a while, the seized weapons
systems will cease to be functional without maintenance and a
ready supply of spares. It seems obvious that this requires the US, in particular, to put in place stringent measures to stop such spares
finding their way to fighters whose stated aim is to attack US interests throughout the region. And yet, as we have seen in the last chapter, the US is now doing the exact opposite by radically 63
Indefensible.indd 63
24/05/2017 18:37
INDEFENSIBLE
revising and liberalizing its Munitions Control list. Whether or not
this leads to further blowback is unclear, but, considering the past, shouldn’t the emphasis be on caution rather than profits?
D IS P E RS IO N : A RM S D ISPERSING F OLLOWING CO N FLICT, REGIME CHA NG E O R S TATE COL L APSE As the American/Iraq example suggests, weapons can disperse
widely following a particularly brutal conflict or the collapse of a state. While, fortunately, the incidence of state failure is still
uncommon, the fallout from the collapse of states with massive arsenals can reverberate around the world. Just look at the examples of Somalia and Libya.
From 1969 until his overthrow in 1991, Somalia was ruled by the
dictator Mohammed Siyad Barre. As Barre had taken power via a
coup, he was particularly comfortable with using the military and police to enforce his rule. In the early period of Barre’s reign, he had
aligned with the Soviet Union, which turned on the arms spigot to the tune of $260m between 1973 and 1977 alone.23 When Barre
switched sides to support the US in 1978 following the Soviets’ backing of Ethiopia’s war against Somalia, weapons began flowing
in from the West. As Barre increasingly turned his weaponry against
his own people, the US transferred some $154m in arms to Somalia
through military aid schemes, while Italy, Somalia’s largest supplier, was known to have sold $380m in weapons to the country between 1978 and 1982 alone.24
Barre’s regime finally collapsed in 1991, overthrown by an
alliance of disparate warlords. But instead of forming a govern ment, the war lords turned on each other, controlling different
parts of the country with militias, using widely available weapons. 64
Indefensible.indd 64
24/05/2017 18:37
Myth 3
As a result, Somalia struggled without a central government for
more than twenty years. When the US Marines stormed ashore in
December 1992 as the vanguard of ‘Operation Restore Hope’, they
found Mogadishu a veritable cornucopia of weaponry from around the world, most of it eminently serviceable. Somali technicians had become adept at adapting sophisticated weapons for new uses, for
example repurposing air-to-air missiles from grounded jet aircraft
to be fired from trucks against ground targets. When US Special Forces confronted General Mohamed Farah Aideed’s militia in the
infamous ‘Black Hawk Down’ battle of October 1993, they were fired
upon by Somalis using weapons manufactured in the USSR, China, Romania and the US. Soviet rocket-propelled grenades shot down the US helicopters. In 2003, one European Commission Report
estimated that 64% of Somalis possess one or more weapons.25 In the capital of Somalia, Mogadishu, open-air arms bazaars operated
with impunity. In the biggest market, Huwaika, 400 traders sold
weapons from rifles to RPGs until the market was shelled in 2013.26
The arms are strikingly affordable: hand grenades sell for $25, landmines for $100 and various models of AK-47s for between $140 and $600.27
Since 1992, Somalia has been under a mandatory UN arms
embargo. But the embargo has done virtually nothing to stem
the flow of arms. Reviewing the situation in 2003, the UN stated that ‘the violations are so numerous that any attempt to document
and catalogue all of the activities would be pointless’.28 Most of
the weapons came from local neighbors (Ethiopia and Eritrea in particular), but Westerners with an eye for money were not above
taking advantage. In July 2010, two US residents of South Florida, Chanock Miller and Joseph O’Toole, were indicted for breaking
the embargo.29 Miller (based part-time in Israel) and O’Toole made
arrangements with a third party to export arms to Somalia, using 65
Indefensible.indd 65
24/05/2017 18:37
INDEFENSIBLE
fake end-user certificates from Chad. The problem: the third party
was an undercover US agent.30 Fortunately this deal was stopped;
too bad so many hundreds of others weren’t.
Beyond fueling constant instability and warlordism, the wide
availability of arms has helped the cause of a particularly worrying group, Al-Shabaab, which declared its affiliation with Al Qaida in
2012.31 Emerging around 2006, Al-Shabaab is currently engaged
in a vicious war with Somalia’s Transitional Federal Government, African Union forces and the governments of neighboring countries (notably Kenya and Ethiopia), although it claims to be at war with all enemies of Islam. A good part of Al-Shabaab’s weapons are
undoubtedly drawn from the existing stockpiles in the country, but the group can also count on another useful supply: weapons sold
and supplied by Western countries to Somalia’s government. In 2013,
with US backing, the arms embargo on Somalia, in force since 1992, was eased.32 The weapons that have now flowed into the country as
a result are poorly monitored and frequently stolen and diverted. In 2014, the UN found that elements in the Somali government, including an advisor to the president, had been arranging for weapons
to be smuggled to Al-Shabaab militants.33 Those that didn’t flow
directly to the militants could be purchased from the arms bazaar, where a good portion of the weapons ended up.34
The depressing story of Western arms sold to a fallen dictator
spreading to dangerous militants was repeated in Libya. In 1969, Colonel Muammar Gaddafi, the man who would become associated
with eccentric and frequent outbursts against Western perfidy, took power in Libya. He refused to build government institutions
and dismantled all structures that existed. With major regional
ambitions, Gaddafi also spread weapons and instability throughout the Middle East and Africa. He invaded Chad, supported Arab
supremacists in Darfur, and indiscriminately funded groups such as 66
Indefensible.indd 66
24/05/2017 18:37
Myth 3
the Revolutionary United Front in Sierra Leone and the insurgents led by the war criminal Charles Taylor in Liberia.
To do so, Gaddafi relied on massive arms imports, funded by oil
exports. Between 1970 and 2009, Gaddafi imported weapons that
were equivalent to $30bn.35 Most of this was from the USSR, which
supplied $22bn in arms.36 The remaining $8bn was made up mostly
of European suppliers, in particular France and Germany, which exported $3.2bn and $1.4bn each.37
In the 1970s and 1980s, Libya was embroiled in a war in Chad—a
combination of border dispute, invasion and support to proxies. Libya’s war culminated dramatically in 1987 when a light but deadly
Chadian force overran the main Libyan army base at OuadiDoum, capturing 8,000 soldiers and a vast array of equipment, including twelve aircraft and almost 200 armored vehicles. With little use for
the heavy weapons, the Chadians sold them on—for a few years, N’djamena was a veritable bazaar for second-hand arms, which found their way to all corners of the African continent. Libya’s army
never recovered. But Gaddafi’s appetite for buying huge quantities of weapons was unquenched, and he found ready sellers.
Because of links to terrorism, Libya was placed under US, EU
and UN sanctions including a mandatory UN arms embargo in
1992, reducing arms imports to about $10m a year.38Nevertheless,
after making moves to win over the global community, the UN
arms embargo was abandoned in 2003, followed by the US and EU in 2004. Assorted European suppliers attempted to take
advantage. SIPRI noted, in its 2010 Yearbook, that ‘the heads of the governments of France, Italy, Russia and the UK have visited
Libyan leader Muammar Qadhafi in recent years, accompanied by
arms company representatives and rumors of multi-billion dollar arms deals’.39 Although the orders for big transfers took a while to
materialize (and few did), Russia, at least, agreed to a $1.8bn deal 67
Indefensible.indd 67
24/05/2017 18:37
INDEFENSIBLE
to supply tanks, fighter jets and air defense networks.40 Two years
prior, Russia had cleared Libya’s historic debt. Other EU countries granted at least €834m in arms exports licenses between 2005 and
2009.41 The biggest issuer of licenses was Italy (€276m), followed by France (€210m) and the UK (€119m).42 South Africa was the
largest African issuer of export licenses, permitting the export of £6.5m worth of arms and ammunition in 2010 alone.43 While not all
licenses led to exports, it was not for want of trying.
Gaddafi’s arsenal was so large that it verged on the ludicrous.
So many weapons were purchased under his rule that it was almost
impossible that the Libyan military could use them all. Anthony Cordesman, a military expert, reported that Libya’s ‘imports vastly
exceeded its ability to organize, man, train and support its forces. The imports reached farcical levels, and involved vast amounts of
waste on equipment that could never be crewed and operated.’44
In 2010, Cordesman and Aram Nerguizan investigated the Libyan holdings, and found that many of its aircraft were in storage, along
with 1,000 tanks.45 Gaddafi’s arms buying spree was motivated by a number of factors, not least his belief that he could build an Islamic
Legion, staffed by what he estimated would be 1 million troops. Despite getting the weapons to arm it, the Legion as such never
materialized. But the fighters drawn from neighboring countries as its putative core went on to lead rebellions in west Africa and organize militias in Darfur and Mali, among other places.
In 2011, Muammar Gaddafi was overthrown by an insurrection,
backed by Arab governments such as Qatar and Sudan, with a NATO air campaign paving the way. His overthrow was presaged by the mass looting of Libyan stockpiles in areas that the Libyan government couldn’t control; and as revolutionaries and mercenaries
captured more territory, more stockpiles were looted. In July 2012, Libya held its first ever elections. But since then the situation in 68
Indefensible.indd 68
24/05/2017 18:37
Myth 3
Libya has deteriorated rapidly. In 2014, elections were held for a
representative assembly, the Council of Deputies.46 However, the
elections results were rejected by losing parties, mostly Islamist, which decided to reconvene the 2012 body, the General National Council.47 As it stands, there are two Parliaments, neither of which
recognizes the other, and a continuing war between them: the
Council of Deputies, for example, was forced from Tripoli in 2014
in fighting between Dawn of Libya and Zintan and had to set up in a different city.48 Meanwhile, in the countryside, the plethora of
weapons has fueled the emergence of multiple factions and warlords, each fighting for their own patch of land. While the deaths of 1,000
triggered NATO intervention, the war that followed killed some
25,000, and the unrest in years since, has added many thousands more (between June 2014 and April 2015, for example, over 3,000
people were killed in what has been called Libya’s second civil war49).Libya could quite easily go the way of Somalia.
When the African Union debated its position on the uprising
and civil war in Libya in March 2011, the Chadian President Idriss Déby warned against ‘opening the Libyan Pandora’s Box’. He
was prescient. The arms that Gaddafi had stockpiled have spread widely on the continent, fueling further regional instability, both in
the chaos before and virtual anarchy after his overthrow. In Mali, Tuareg rebels, once employed by Gaddafi as mercenaries, took over large swathes of the country after looting Libyan armories.50 Along
with Islamist fighters, the Tuareg attempted to overrun the entire country, prompting an African and French military intervention:51
France was thus fighting against rebels armed with weapons which
may have included some that France had earlier sold to Gaddafi. Meanwhile, the opening of Libyan weapons stores also benefited Al
Qaida in the Islamic Maghreb.52 This is not the only extremist group
now toting Libyan weapons: solid information has emerged that 69
Indefensible.indd 69
24/05/2017 18:37
INDEFENSIBLE
Al-Shabaab in Somalia has been buying ex-Libyan armaments,53
while Al Jazeera reports that Libyan arms have made their way to Boko Haram, the Nigerian extremist group that kidnapped hundreds of schoolgirls to be used as slaves and continues to wage
war on the Nigerian state.54 Large quantities of Libyan weaponry also went to Syria in what the New York Times called ‘a complex and active multinational effort financed largely by Qatar’.55
T H E Y W E RE RIG HT HE RE WHEN WE L AS T LOO K E D: DE LIB E RATE DIVE RSION OF ARMS TO OT HE R S TATE S A N D OTH ER PART IES This may surprise you, but sometimes arms dealers lie. And they lie
convincingly. Indeed, it is this subterfuge on the part of brokers, as well as complicit military and state officials, that provides another way in which arms get into the wrong hands: via diverting arms
officially intended for one state but sold to another (or a non-state actor), or through outright theft from state holdings to distribute internationally.
The diversion of weapons is remarkably straightforward. This
is illustrated by how easy it is to manipulate a vitally important document used in arms exports: end-user certificates. The certificate
states that the ‘end user’ is the government or entity buying the weapons. Two problems: one, end-user certificates are not inter nationally standardized and are incredibly easy to forge. Two: end-
user certificates are hardly an iron-clad promise that the weapons
will actually remain in the stated area. The ease of forgery is aided by a widespread lack of proper national controls over imports and
exports, particularly of small and light weapons. In 2001, for example, all UN nations signed up to the UN Program of Action, which
committed countries to tightening up their arms control rules. By 70
Indefensible.indd 70
24/05/2017 18:37
Myth 3
2008, only 111 of the 185 states had procedures and laws controlling
the sale and movement of small arms and light weapons (SALW).56
One recent example shows just how easy it is for weapons to
be diverted to other users. In 2012, Swiss media in Syria found
hand grenades used by Syrian rebels that bore the brands of Swiss armament manufacturers.57 It created a national scandal in a country that is meticulous about its neutrality. In response, the
Swiss authorities instituted a formal investigation. Using tracking numbers, they were able to locate the grenades to a shipment made
from Switzerland to the United Arab Emirates in 2004.58 The UAE
confirmed that it had received the shipment, but admitted that a portion of the shipment had been re-exported to Jordan. The UAE
had undertaken the export to assist Jordan ‘in the fight against terrorism’.59 From Jordan, the weapons entered Syria.60 It is unclear how the last step occurred.
And this is not the only case of Swiss ammunition being
retransferred: in early 2012, for example, investigators found M-80 ammunition from Switzerland being used by anti-Gaddafi forces
in Libya. The ammunition had been exported to Qatar in 2012. Illustrating the durability of small arms and ammunition, Qatar was also found to have allowed the re-export of 7.62 × 51mm ammunition to the same Libyan forces—they had originally been
imported from Pakistan way back in 1981‒1982. Since then, the
Pakistani ammunition has been discovered in shipments from Libya to Syria.61
At least in the last example the weapons spent a little bit of
time in their stated destination. This was not the case with a batch of weapons, including surface-to-air missiles and rocket-propelled
grenades, imported into Burkina Faso in 1999. The arms transfer had been arranged by a Gibraltar-based company, and was backed with
an end-user certificate issued by Burkina Faso. However, when the 71
Indefensible.indd 71
24/05/2017 18:37
INDEFENSIBLE
UN investigated the transfer in 2000, it found that once the weapons were unpacked in Burkina Faso’s largest city of Ouagadougou, they
were simply loaded onto a host of trucks and delivered to Liberia.62
Liberia at the time was under a mandatory UN arms embargo as a result of the terrifyingly vicious actions of the dictator Charles
Taylor, now in jail after being sentenced to fifty years in prison by the Special Court for Sierra Leone for war crimes during his support
for rebels in Sierra Leone. Burkina Faso’s long-time military ruler, Blaise Compaoré, had gained a reputation for backing particularly
savage rebellions in nearby countries—and could also have faced charges by the Sierra Leone special prosecutor—but that didn’t stop arms traders doing business with him.
Those arms that do end up legitimately in the stockpiles of
purchasing states are also not free from diversion. Poorly managed
inventories are easy to steal from, and this can happen on a vast
scale. Following the collapse of the Soviet Union, for example, Ukraine was left with an enormous arsenal of weapons. Military officials, struggling to survive in the midst of economic collapse, saw
an opportunity to make easy money, and, with the help of notorious
arms dealers like Viktor Bout, smuggled vast quantities to conflict zones around the world. A Ukrainian parliamentary investigation
into the scale of the theft was eventually closed down for being
too combustible, but only after compiling seventeen volumes of evidence.63 Illustrating just how difficult it can be to face up to the
global arms machine, the leader of the investigation was courtmartialed and stripped of his rank.64
And it is not just individuals who struggle to face up to the global
arms industry; it is also big institutions like the United Nations. In instituting its mandatory arms embargoes, the UN relies on its
member states to put in place legislation and procedures to prevent the export of weapons to embargoed territories. But this is often 72
Indefensible.indd 72
24/05/2017 18:37
Myth 3
sloppily done, or insufficiently monitored. This is part of the reason why a study at the University of British Columbia found that of 502
violations of UN arms embargoes only two had resulted in any legal action whatsoever.65
FRO M THE CO RN ER SH OP: W E A P O N S BO U G HT BY C IV IL IANS AND TRA N S FE RRE D TO CO NFL ICT AREAS A much ignored but hugely important way in which arms get into the wrong hands does not really involve states at all. Instead, it involves civilians who purchase weapons on the open market, usually with legitimate licenses, to be used in all sorts of wrong-doing, in
particular organized crime. A particularly violent recent and ongoing example of this is the supply of arms to Mexican drug cartels.
Since the mid-2000s, Mexico has been in the grip of a brutal
drug war to control the enormously lucrative trade in drugs made
in Latin America and consumed in the US. Mexican druglords
control the majority of the illicit trade in drugs to the US; they are responsible for 95% of the cocaine transported into the US.66
The arrest of several prominent drug kingpins in the early 2000s opened the way for rival gangs to bid for power, frequently engaging
in bloody running battles to cement it. Local communities have been paralyzed with fear as the drug lords become the effective
government, killing an exceptional number of women, taking vengeance on anyone who stands in their way; the infamous sight
of tortured bodies hanging from a highway on the way to the US
border was only one of a thousand different atrocities. The instability has only increased since the decision taken by President Felipe Calderon to deploy the military, working in conjunction with US
law enforcement, to dismantle the cartels. The scale of the violence 73
Indefensible.indd 73
24/05/2017 18:37
INDEFENSIBLE
is truly shocking: in the six years that Calderon led Mexico (2006 to 2012), an estimated 60,000 people were killed in relation to the drug trade.67 And that is in addition to the 25,000 Mexicans who simply can’t be found, dead or alive.68
The absurdity is that, although 50% of the killings are committed
with handguns and rifles, Mexico only has a single legal gun shop, run by the military.69 The guns largely come from across the border in the US, where there are 2,200 small weapon manufacturers
making more than 4.2m handguns a year.70 Cartels have employed US citizens to buy weapons in the US, where gun laws are somewhat
laxer than Mexico, and smuggle them into Mexico in vast quantities. In 2013, the Igarape Institute in Brazil and the Trans-Border Institute at the University of San Diego conducted a detailed study estimating the scale of cross-border transfers. Basing their
calculations on economic data (and not just seizure information, as other studies have done), the researchers estimated that 253,000 firearms were moving illicitly into Mexico from the US annually.71
The trade is so large that it is estimated to constitute 2.2% of all firearm sales in the US, while an estimated 46.7% of firearms dealers
are dependent on the sales. Worryingly, it appears that Mexican and US authorities have only been able to stop the movement of 14.7% of weapons trafficked into the country annually.72
US gun lobbyists may point to their regular canard: guns don’t
kill people, people kill people. Perhaps. But what is clear is that far
more people are killed when efficient killing machines are available. In 2011, three researchers pored over Mexican homicide data and
found an important correlation. In 2004, the Federal Assault Weapons Ban, which prohibited the sale of military-style weapons
to civilians in the US, expired. Some states repealed the ban entirely, in particular Arizona and Texas. In California, the ban remained
mostly in place due to state law. In Mexican municipalities close 74
Indefensible.indd 74
24/05/2017 18:37
Myth 3
to Arizona and Texas, the homicide and fatality rate due to gun
crime increased by a full 40% over Mexican municipalities close to California.73
W E AP O N S US E D IN WAY S T H AT ARE NOT (B U T S HO U LD B E ) F ORESEEN In addition to the real danger that arms will find their way into
enemy hands, there remains the ever-present concern that weapons will be used in ways that were not originally countenanced or
conceived of when they were exported. Generally speaking, Western arms exporting countries have to try to ensure that weapons will not be used in gross human rights abuses. But their combined lack
of foresight can be catastrophic when they misread the situation. Nowhere was this clearer, or more devastating, than in Rwanda.
During the span of a hundred days from April to July 1994,
ethnic Hutu extremists in Rwanda perpetrated genocide against
their Tutsi compatriots, along with moderate Hutus who stood
in their way. At least 500,000 people died. This genocide is
popularly associated with the machete—an agricultural tool used for hacking vegetation—wielded by gangs of militiamen known
as interahamwe, who manned roadblocks and searched house to
house for their victims. But the interahamwe were just one part
of a military-genocidal machine, run by senior army officers. The biggest massacres of the genocide were organized and carried out
as military operations, involving army detachments armed with machine guns and RPGs.
The primary weapons of genocide—small arms and light
weapons, rocket launchers and military vehicles—were almost all purchased in the four years leading up to the genocide. Between
1980 and 1988 Habyarimana had only spent $5m on arms imports in 75
Indefensible.indd 75
24/05/2017 18:37
INDEFENSIBLE
total.74 However, between 1990 and 1994 Rwanda spent 70% of its
state budget on arms;75 in the three years following October 1990, the country spent $112m on arms,76 twenty times what had been
spent during the whole of the 1980s.77 This spending spree ensured
that an estimated 85 tons of arms flooded one of Africa’s smallest countries; grenades were so widely available by 1994 that they could
be bought for the equivalent of two beers from local vegetable markets.78 The build-up occurred with the onset of civil war, which
began when the Rwandan Patriotic Front (RPF), a rebel group of mostly Rwandan Tutsi refugees, invaded from Uganda, but it also provided the means for genocide in 1994.
Rwanda was able to turn to a number of suppliers for the
weapons, including South Africa (still under the control of the apartheid government) and Egypt. But by far the largest supporter and supplier was France, a long-time supporter of the Habyarimana
regime that feared a Tutsi victory (supported by Anglophone Uganda) would diminish French influence in the region. In addition
to supplying ground troops to halt Tutsi advances, France helped to
broker deals with South Africa and Egypt (all under the watchful eye of the president’s son, Jean-Christophe Mitterrand) and supply
voluminous weapons on its own. Between February 1990 and 6 April 1994, the day Habyarimana’s plane was downed and genocide followed shortly after, France exported arms and ammunition to
the total value of 136m French francs. In addition, France donated
weapons to the Habyarimana regime to a total value of 43m French francs in 36 batches. What was eventually transferred to Rwanda was sobering:
France agreed to transfer—and presumably delivered—the following weapons: three Gazelle helicopters, six Rasura radar
systems, one Alouette II helicopter, six 68-mm rocket-launchers 76
Indefensible.indd 76
24/05/2017 18:37
Myth 3
(with 1397 68-mm rockets; for the helicopters), two Milan ant-tank
missile launchers, 70 12.7-mm heavy machineguns (with 132,400 rounds of ammunition), eight 105-mm cannons (with 15,000
shells), six 120-mm mortars (with 11,000 shells), 3570 90-mm shells (for AML-90 armored vehicles already in service), 8850
60-mm mortar shells, 4000 81-mm mortar shells, 2040 rounds of 20-mm, 256,500 rounds of 9-mm, 145,860 rounds of 7.62-mm and
1,256,059 rounds of 5.56-mm ammunition, as well as many small arms and spare parts for helicopters and armored vehicles.79
On 6 April 1994, Rwanda’s President Juvenal Habyarimana’s plane was shot down (by whom is still disputed). In response, a radical group took control of the government and military, and deployed
the armed forces against civilians. They also let loose organized
militias throughout the country, armed with anything they could get their hands on, and engaged in a mass orgy of violence. They systematically killed Tutsis, moderate Hutu leaders, and anyone who resisted the genocide. Estimates are still debated, but the
death toll is now presumed to be at least 500,000 Tutsi killed in the genocide, while the RPF is estimated to have killed between 25,000
and 45,000 Rwandans from April to August 1994.80 A full 75% of
the country’s Tutsi population at the time perished. For 100 days, six men, women and children were killed every minute of every day. For those that survived, life was horrific. Between 100,000 and 250,000
women were raped.81 In a study in 2001, a tested sample of 1,125 rape
survivors found that 70% were HIV positive.82
At the time, international media and world leaders gave the
impression that the violence was a free-for-all, a primal slaughter, a frenzy. But in reality, the genocide was highly organized, with the
aim to achieve the highest number of deaths in the shortest time possible.83 And in this the arms sold by the world to Rwanda were 77
Indefensible.indd 77
24/05/2017 18:37
INDEFENSIBLE
particularly important. They were used in two primary situations: to kill strong young men and community leaders who could
resist the massacres; and to efficiently kill large groups of people. When Tutsi and moderate Rwandans were successfully herded into schools and sports stadiums, they were almost always killed systematically with firearms and grenades in order to achieve the highest kill-rate possible.84
At the time, it was vaguely possible, if not plausible, for the
French government to claim ignorance of Rwanda’s eventual aim
of genocide (despite the fetid genocidal propaganda that spewed out of the country’s state-owned media from 1990 onwards). They
were merely supporting one side against another in yet another
African civil war. But they did know that they were supplying arms to a dictatorship with a particularly poor record on human
rights and democracy. Even if they couldn’t have foreseen genocide, despite the loud and early warnings from observers, France must have realized the risk that was inherent in supplying arms to an undemocratic regime.
Perhaps, with the lessons of history, we need to be ensuring
that weapons are not so liberally supplied to dictatorships and regimes responsible for human rights abuses, despite the regional and short-term political considerations. Perhaps the presumption
of innocence that legitimates the recipients of arms sales to corrupt, dictatorial or war-prone governments should be reversed: the
working assumption should be instead that things will go bad, and the weapons will be someday used for lethal purposes.
BU T W H AT A BO UT THE A RM S T RADE T REAT Y? The fact that we have reached this point in the chapter without
mentioning the much-discussed Arms Trade Treaty is something 78
Indefensible.indd 78
24/05/2017 18:37
Myth 3
of a give-away in itself: the ability of the treaty to seriously impact on the trade in weapons is minimal.
The treaty had auspicious and well-intentioned roots. It
emerged out of a discussion between numerous NGOs, including
Amnesty International and Oxfam, which had campaigned for a
full recognition of how the arms trade was fueling human rights
abuses around the world. Flowing from a list of initial principles, the treaty that emerged out of this group sought to put in serious controls over the arms trade, so as to stop the very things that we have described so far in this chapter happening: arms being sold to
repressive regimes, diverted to human rights abusers, and generally fueling some of the world’s most intransigent conflicts.85
As with many international agreements, the treaty became
sucked into a seemingly endless round of negotiations, as different
states around the world attempted to modify its content to suit
their ends. The treaty, as it was passed in 2013, reflects this: it is riddled with bullet holes that will limit its ability to properly limit
the trade. The noted campaign group, Ceasefire, has pointed to five major problems:86
1. The treaty sets a threshold for stopping arms exports way too high.
The treaty requires that arms should not be exported to a state
if there is an ‘overriding risk’ they are to be used in violating human rights. The use of the word ‘overriding’ is not only open to interpretation, but implies that the trade in weapons should
only be stopped in exceptional circumstances. Indeed, in the original drafts of the treaty, it stated that weapons should not be exported only if it was ‘likely’ that they would be used in ways the treaty forbids.
2. The treaty doesn’t have any major requirements regarding record keeping and reporting. One of the big selling points of the early 79
Indefensible.indd 79
24/05/2017 18:37
INDEFENSIBLE
drafts of the treaty was that it would make the trade in weapons
transparent by forcing states to properly report on their imports and exports. However, the final version of the treaty only requires
states to submit a horribly under-detailed list with minimal information to the UN Secretariat, which the Secretariat doesn’t
even publish. States are also allowed to leave out any information
that is ‘commercially sensitive’ or constitutes ‘national security information’.
3. The treaty does not include a whole raft of weapons. The treaty is applicable to eight categories of conventional arms (such as battle
tanks and attack helicopters). But the list is so circumscribed, and so out of date, that it is entirely unlikely to be applicable
to new and emerging categories of weapons (such as drones). Most importantly, while mentioning ammunition, the treaty
excludes the trade in ammunition from a whole host of its central provisions.
4. The treaty only covers sales. This is distinct from covering other forms of arms transfer we’ve discussed above, such as weapons
that are loaned, leased, bartered or given as part of an aid package. The treaty also excludes arms transferred as part of a
‘defense cooperation agreement’, that is, an arrangement where the militaries of two countries work together. It would be easy for most states to simply claim that controversial weapons sales fall under the rubric of these sorts of agreements and bypass the treaty altogether.
5. There is simply no international enforcement or assessment. Determining whether there is an ‘overriding risk’ that arms will
be used to violate human rights remains the responsibility of
the exporting state. Is it realistic to expect that exporting states, which want to transfer weapons in their own economic interests, will apply this rigorously? More to the point, are states likely 80
Indefensible.indd 80
24/05/2017 18:37
Myth 3
to really apply these provisions when there is no international review and there are no legal sanctions for violating the treaty. In
a legal sense, the treaty is a set of polite suggestions rather than iron-clad requirements.
A lot of people who supported the Arms Trade Treaty in civil
society may baulk at such a blunt description of the Treaty; almost as if we’re saying that the treaty was a waste of effort and a failure
on their part. This is not true. The act of getting this issue on the
agenda was brave in and of itself, and bringing the public’s attention to the issue for the first time in decades was immensely necessary and powerfully done. Securing the attention of 1 million people who
signed petitions in support of regulating the trade has to be lauded and shows what can be achieved with effective campaigning. The weakness of the Arms Trade Treaty is not a reflection on them; it is
a further commentary on how states around the world, in particular those that are the biggest arms producers, so effectively manipulate
the international regulatory environment in the interests of arms manufacturers rather than global citizens. Perhaps it is the
beginning of a bigger debate, and the treaty can be radically revised
over time. But as it stands, it will do little to limit the worst parts of the arms trade.
CO NCLUS ION Weapons don’t rot, and they don’t simply go away. They hang around for a very, very long time, able to become the means of immense
destruction decades after they are first produced. With this in mind, one would think that the major arms-producing countries would be remarkably reticent about them getting into the wider world. And
yet the history of the trade in weapons proves the exact opposite: 81
Indefensible.indd 81
24/05/2017 18:37
INDEFENSIBLE
weapons flow freely, mostly with state support, to every corner of
the globe. And arms export controls, where they do (intermittently) work, are useless when the states that write the laws do so much to undermine them.
A common refrain that is wheeled out to support arms exports is
that there is nothing wrong with arming allies to protect themselves. Perhaps. But we need to be aware that there is a very good chance that, over the years, those weapons can (and most likely will) migrate
into the hands of people who don’t play so nicely. As the historical evidence shows, there is a very good chance that a dictatorship or other dysfunctional state that is your ally right now won’t stay that way for very long. As Henry Kissinger noted, the US has no
permanent friends, only interests.87 And even if those arms stay
where they are intended to, they can be put to the most devastating use in ways that may not, but should have been, foreseen.
The simple fact is that the wide availability of arms in the world
makes wars more deadly, violence more efficient and brutality more widespread. Maybe it is time to consider turning off the tap.
82
Indefensible.indd 82
24/05/2017 18:37
M Y TH 4
THE DE FEN SE INDUS TRY IS A K EY CONTRIBUTOR TO N ATIO N A L E CONOMIES As we’ve seen in Myth 2, one of the key justifications for military spending is the impact it has on the economy. This argument
is trotted out whenever there is even the vaguest threat of cuts in
defense spending, which usually draws a widespread gnashing of teeth and dire predictions of massive unemployment leading to national
calamity. For politicians who want to put their own fingers into the pork barrel and appear strong on defense, plumping up the vital role that defense plays in the economy of arms producers is a no-brainer.
Just one problem: there is very little evidence that military
spending does benefit the economy, and indeed rather more evidence that its effect is actually harmful. Far from driving the economy, national arms industries typically rely on massive welfare 83
Indefensible.indd 83
24/05/2017 18:37
INDEFENSIBLE
and subsidies from their parent governments to stay afloat. The arms
business does create jobs—but, because of the massive subsidies involved, far fewer jobs and at greater expense than alternative
investments. Rather than driving innovation, the arms business mostly free-rides on civilian innovation, taking existing technologies
and cobbling them together. And since it competes for talent and resources with other industries, in some ways the business actually slows down civilian scientific and technological advancement.
S IZ E M ATTE RS Despite the triumphalist advertising of the defense industry, it is relatively small as a share of total industry or manufacturing outside
of the United States. In the UK, which has the second largest
defense industry in the world, the total sales of manufactured military products was £13.1bn in 2013.1 This may seem like a large
number, but it is nothing compared to the food and drink sector, for example, which added £21.5bn to the UK economy and has a
turnover of £81.8bn.2 Indeed, the total value of sales of products
manufactured in the UK in the same year was £354.5bn.3 Sales from defense manufacturing thus only constitutes 3.8% of total
manufacturing sales in the country. And compared to total GDP— £1.8trn in 2013—it is absolutely miniscule. And all this despite the
Ministry of Defense receiving roughly 6% of all UK government spending over the last few years.4
In Europe as a whole, the amount contributed by defense is
even more marginal. According to the European Aeronautics and Defense Association, the total turnover for defense companies in
2012 was €95bn in twenty European countries (seventeen European
Union members, including the UK, as well as Norway, Switzerland and Turkey).5 This is remarkably small compared against the €6.4trn 84
Indefensible.indd 84
24/05/2017 18:37
Myth 4
in turnover recorded for manufacturing in the European Union in
the same year.6 Exact figures for Chinese defense manufacturing are
hard to come by, but, based on China’s considerably smaller defense spend and much smaller defense export market compared to other
members of the UN Security Council, is likely to be only a tiny fraction of China’s $1.6trn manufacturing output.
There is, of course, one exception: the United States. The US
is different because its expenditures on defense and the value of
its weapons exports are far higher than for any other nation. But given the size of the US economy, it remains the case that arms
production and trade account for a relatively small share of total economic activity. In 2010, when total Pentagon spending (both its base budget and the separate account for the wars in Iraq and
Afghanistan) topped $700bn and reached its highest levels since
World War II, it was still only about 4.5% of USGDP.7 And in 2011,
when US arms trade agreements were estimated at a record $66.3bn by the Congressional Research Service,8 they paled in comparison
to the $1.49trn in goods and $627bn in services exported in the same year (for a total of $2.12trn); indeed, defense exports only constituted 4% of total US exports.9
Unsurprisingly, it is the US that boasts the largest defense
companies in the world. As Figure 4.1 shows, only one non-US company (BAE Systems, which in any event has extensive US operations which usually account for over 40% of its revenues) is in the top five global arms sellers.
And this is why size matters: it makes the economics of the
international defense industry incredibly strange. If the arms trade worked like any other industry—making fridges, say—there simply
would not be any non-US manufacturers. This is because the US local demand gives it huge advantages in economies of scale: if you’re already producing 1,000 tanks for your own military, it’s 85
Indefensible.indd 85
24/05/2017 18:37
INDEFENSIBLE
much easier and cheaper, per unit, to add an extra 200 to sell to your
allies than it is to design a tank from scratch if your military only needs 200 for itself.
Other defense manufacturers—the largest of which are all in
Europe—have to find other means by which to sell their products, as
their lack of economies of scale means that they struggle to compete purely on product and price. They tend to seek economies of scale
Figure 4.1 Companies with largest arms sales, 2014 (US$m) Source: Extrapolated from Aude Fleurant, Sam Perlo-Freeman, Pieter D. Wezeman, Siemon T. Wezeman and Noel Kelly, “The SIPRI Top 100 Arms Producing Companies, 2014,” SIPRI Fact Sheet, December 2015, Table 1 (p. 3), accessed June 2, 2016, http://books.sipri.org/files/FS/SIPRIFS1512.pdf. 86
Indefensible.indd 86
24/05/2017 18:37
Myth 4
in either pooling resources into single products (the Eurofighter) or by engaging in extensive exports. But if they can’t compete on price and product, they have to start thinking more creatively, offering more than just weapons.
This is why the European defense industry has become expert
at offering two sorts of inducements: economic offsets (discussed briefly in Myth 2 and in more detail later) and bribes. Indeed, as
we will consider in the following chapter, it is the non-US defense
industry that is most often involved in corruption, without which it arguably could not compete. That is not to say that there aren’t major problems with US defense companies exerting influence on
policy via lobbyists and Washington politicians in what has been
described as ‘systemic legal bribery’, but it is clear that the most outrageous outright bribery tends to be undertaken by players outside of the US. In a dysfunctional industry, dysfunctional behavior becomes the norm.
Thus, when the defense industry starts to speak darkly about
national economic collapse at the threat of defense cuts, we need to bear two things in mind. First, it simply is not true that the defense
industry is central to the global economy and that cuts, therefore, lead to economic Armageddon. Second, perhaps it may not be the best idea to pour money into a dysfunctional industry that is not
very economically efficient and is structured in such a way as to almost demand widespread corruption.
THE B IG P ICTURE : DE FE NSE SPENDING A N D E CO NO M IC GROW T H If defenders of the industry cannot convince you that defense spending staves off industrial catastrophe, they can always argue that, regardless of size, defense spending nevertheless positively 87
Indefensible.indd 87
24/05/2017 18:37
INDEFENSIBLE
contributes to national economies by driving economic growth. Again, it is an argument that has very little data to support it.
Over the last thirty years, defense economists have tracked the
correlation between defense spending and economic growth in
multiple countries. While the details are still hotly debated in the pages of academic journals, the overall results show that instead of feeding growth, defense spending has been shown to have an
insignificant or negative impact on growth. In countries where
there is a marked negative impact on growth, they are said to be laboring under what is known as a ‘defense burden’.
Analysts of defense expenditure and economic growth have
looked into numerous channels through which defense expenditure
can have an impact on economic performance.10 Among the key
factors considered are:
• Labor: how military spending can both lead to the training of
advancement of military recruits, but may suck up educated and technically proficient employees from the civilian sector.
• Capital: how military investment can create industrial output,
but can also ‘crowd out’ investment in the civilian industries, hampering growth.
• Technology: how arms production and imports can increase the
technological base of an economy, but may create an advanced technological sector delinked from the rest of the economy and reliant on government support.
• Socio-political: how military spending can have positive spin-offs by introducing a modernizing influence and reducing internal
conflict, but may end up supporting dictatorial and corrupt regimes that, as a whole, stifle growth.
• Debt: how military spending in especially developing economies is funded by large public debt, which can constrain the raising 88
Indefensible.indd 88
24/05/2017 18:37
Myth 4
of capital for civilian industries or limit state spending on other more productive areas of the economy.11
In one vital 2013 study by the defense economists Professors John Paul Dunne and Nan Tian, the entirety of the existing literature
(close to 170 papers) was reviewed. The literature covered a wide range of countries, from developed to developing economies. They found that, in the majority of cases, the studies undertaken had suggested an overwhelming ambiguous or negative impact on growth, as Figure 4.2 shows.
These data, too, need to be put into context. In almost all cases
where there was a positive result, the analysts had used a simple
Figure 4.2 Studies on economic impact of defense spending 89
Indefensible.indd 89
24/05/2017 18:37
INDEFENSIBLE
Studies undertaken 1973–2006
Studies undertaken 2007–early 2013
Figure 4.3 Studies on economic impact of defense spending - comparison of studies published pre- and post-2007 90
Indefensible.indd 90
24/05/2017 18:37
Myth 4
‘supply-side’ equation, in which they looked at the amounts of
money going into the economy and the economic activity associated with it. This, Dunne argues, is unsurprising as these models are ‘inherently structured to find such a result’. When studies include a
‘demand-side’ calculation, such as the impact of military spending
on crowding out other investments in the economy, the results are almost always negative or ambiguous.12
Dunne and Tan make one additional point: the studies that were
conducted using Cold War data were more likely to produce positive results. New studies that focus on post-Cold War economics tend
to show more markedly negative results. In simpler terms, since the end of the Cold War in particular, the data has shown that military spending has a downward impact on the economy. This is clear
from the second figure of data included in Dunne and Tan’s survey (Figure 4.3), which shows that studies undertaken since 2007, using more post-Cold War data, have produced clearer negative results.
Reviewing their results, Dunne and Tan were emphatic: ‘What
does seem increasingly clear is that military expenditure does in general come at an economic cost … The more recent literature
is moving towards a commonly accepted, if not consensus, view: Military expenditure has a negative effect on economic growth.’13
WHAT A BO U T JOBS? As we saw in the previous chapter, one of the primary ways in which arms sales and military spending are sold to the public is that they
are said to produce millions of jobs in the producing countries. And this is broadly true. The world spends over a trillion dollars on defense every year, and with such a huge outflow of funds, you’re
bound to create jobs. The problem is defense spending creates far fewer jobs than virtually any other activity. 91
Indefensible.indd 91
24/05/2017 18:37
INDEFENSIBLE
In 2011, researchers from the Political Economy Research
Institute at the University of Massachusetts reviewed the available
data on the impact of defense spending on job creation in the US. This was compared against the estimated cost of creating jobs
through spending on four non-military alternatives: health care, education, the green economy and tax cuts.14 The results were clear.
First, it should be mentioned that it is undoubted that military
spending in the US creates a ton of jobs. In total, the authors
estimated that Pentagon spending in 2010 (at $690bn) created nearly 6 million jobs, both within the military and in related civilian sectors of the economy.15
But the rate of job creation for this outlay is, in reality, rather
paltry. Working back from the statistics available, the researchers
calculated that spending on defense creates 11,200 jobs for every $1bn spent. This was a lower number of jobs per $1bn than any other alternative. Cutting taxes by the same amount, it was found, would
create 15,100 jobs per $1bn (through consumer consumption); clean energy would create 16,800 jobs; healthcare would create 17,200
jobs; and spending on education would create 26,700 jobs per $1bn, a full 138% more than spending on defense achieved.16 Figures 4.4 and 4.5 show this clearly.
What is even more remarkable about these figures is that,
despite each job costing less than alternatives, the quality of jobs, at least judged against remuneration, would be roughly the same as
those created by military spending. Or, in other words, other sectors
would not create more jobs per $1bn because those jobs are worse
paid.17 Instead, what emerges from the data is that defense jobs cost
far more than other sectors not because of different wage structures, but because a good portion of the spending on defense goes to
military employees (rather than just civilian contractors), and these
military employees are offered extensive benefits. Taking this into 92
Indefensible.indd 92
24/05/2017 18:37
Myth 4
Figure 4.4 Job creation in the US through $1bn in spending Source: Robert Pollin and Heidi Garrett-Peltier, The US Employment Effects of Military and Domestic Spending Priorities: 2011 Update (Amherst, MA: Political Economy Research Institute, University of Massachusetts, 2011), 6, accessed May 27, 2016, http://www.peri.umass.edu/fileadmin/pdf/published_study/PERI_ military_spending_2011.pdf.
93
Indefensible.indd 93
24/05/2017 18:37
INDEFENSIBLE
account, it emerges, quite clearly, that spending on other sectors produces a similar proportion of low, medium and high wage jobs.18
Why, you may ask, does defense spending produce so many fewer
jobs than other sectors? For this, the researchers pointed to three key variables. The first is the labor intensity of economic activity, or, in
simpler terms, how much of the money being spent is being used to
hire people rather than on machinery, buildings, energy and other inputs. The researchers found that defense manufacture, which is highly mechanized and requires substantial industrial inputs, had
Figure 4.5 Distribution of jobs by wage levels in alternative US
economic sectors: jobs created through $1bn in spending within each sector 94
Indefensible.indd 94
24/05/2017 18:37
Myth 4
a labor intensity much lower than other sectors, but particularly in relation to education, where much more of the money spent goes to paying teachers’ salaries.19
The second concerns domestic content, or how much of the money
being spent goes towards buying products in the local economy. This
is of particular concern when it comes to creating indirect jobs, or putting money in the broader economy. The researchers found that US military personnel, partially due to their overseas postings but
also due to the import-heavy nature of the industry, spend only 43% of their income buying US products. By comparison, the average US citizen spends 78% of their income on US products.20
The third point, as we hinted above, relates to compensation per
worker. It should be obvious that in industries where pay is low, more jobs are created per dollar spent. And, because of the high levels of benefits granted to military personnel, the average amount each
employee costs is far more than in other industries. This is not to suggest that military personnel do not deserve benefits—nobody will
begrudge a serviceman access to veteran medical cover. But it does suggest that military jobs come with an added cost that generally reduces the number of jobs that can be created per dollar spent.
What’s even more remarkable about research that has been
done so far is the rather counter-intuitive finding that even defense exports have a deflationary impact on employment. This is
unexpected as one would anticipate that simply selling weapons to a willing buyer would be pure profit. However, studies in the UK
suggest the opposite. In one study, for example, it was found that arms exports were made possible only through the use of public funds via enormous subsidies, subsidies that reached £936m at the highest estimate.21 These subsidies amounted to up to £14,000 per
job created from export sales, which are supposed to be pure profit, and do not take into account the fact that the export sales are only 95
Indefensible.indd 95
24/05/2017 18:37
INDEFENSIBLE
possible after the British state has already invested heavily in the companies through their own procurement.22
Another key study from the early 2000s found that halving
defense exports from the UK would actually create jobs, not lead
to their loss. This is for two primary reasons: the levels of subsidies and taxpayer funds that go into securing the sales would be freed
up to be spent elsewhere, and the fact that defense export sales tend to suck up rare skills from the civilian economy. The study found that, although 49,000 jobs would be lost by the halving of defense
exports, it would be more than made up for through the creation
of 67,000 jobs over five years elsewhere in the economy as skill shortages eased and the industrial base diversified.23
BU T THE Y IN VE N TE D THE INT ERNET ! The last trope usually wheeled out by those that oppose any cuts in defense is the supposedly vital role that defense manufacturers play in innovation and high-tech industrial development.
And this argument was true. Sort of. For a while. During the
Cold War, vast sums of money were dedicated to military research and development, which fed the development of a range of civilian
applications.24 Starting with the Manhattan Project, which kick-
started the development of nuclear energy, the Cold War was a time when military research was at the cutting edge of science. Where it led to civilian technologies—duct tape, for example, was designed as a means of securing the bottom ends of shaky ammunition shells—
it should be recognized. Many of these research gains, however,
relied equally on prior civilian research, and, most importantly, the civilian market to turn specialist and obscure inventions into something that civilians would find useful: exactly what happened with regard to the internet.
96
Indefensible.indd 96
24/05/2017 18:37
Myth 4
But what should also be recognized is that the R&D that was
undertaken also led to enormous funds being used on military inventions that were frankly ludicrous, and never worked, creating
what Mary Kaldor has called a ‘baroque arsenal’.25 Kaldor argued that the fact that defense spending was so privileged—research that
is undertaken is completely unrelated to any potential civilian or
market application—led to an environment where even the most insane ideas would get funding. In addition, the closeted research
environment meant that arms companies spent billions perfecting weapons, even when those tiny gains had no noticeable impact on combat performance.
Cra zy M oney f or Craz y Ideas: Star War s a nd Its S e que l Perhaps the most famous example of Cold War tech hubris was the proposed development of Star Wars (actually named
the Strategic Defense Initiative), the US’ ill-fated attempt to build a system that could shoot down incoming nuclear weapons with lasers. Over the course of its nearly ten-year
development, the US spent $60bn on research and testing: double the amount that was spent on the Manhattan
Project.26 This despite the fact that most scientists at the time
were firmly of the opinion that intercepting tiny missiles, sent in a balloon of decoys at thousands of kilometers an
hour, was an almost insurmountable task. Unsurprisingly,
when the program was quietly scrapped in the early 1990s, not a single mirror or laser system had been developed.27
Some tests were conducted that replaced the lasers with
guided missiles, but even these results were pretty poor. The two successful tests in 1984 and 1991 (the only two successful
intercepts out of multiple attempts) were only achieved 97
Indefensible.indd 97
24/05/2017 18:37
INDEFENSIBLE
when ‘real world variables’ were removed from the equation. Amongst the concessions made were the decision to set the target on a pre-determined flight path, which was to be
intercepted by a missile on its own pre-determined flight
path; a Global Positioning Satellite receiver was placed on the target to help guidance; and the decoys that were released
were of such different thermal temperatures that targeting the real threat was a doddle. Of course, no real nuclear
weapon flying towards the US at thousands of kilometers an hour would ever be so polite.28
What often gets left out of these discussions is an intriguing
counter-factual: isn’t it possible that the military’s involvement in technological development led to products that were actually worse for civilian use than if they had developed in isolation? One
example of this is the military role in developing airplanes, which
was given a major push by World War I. As the defense economist Jurgen Brauer notes:
The Great War resulted, in essence, in a design-competition between two engine powered aircraft designs, the difference lying in the wing-lift (the Wright brothers) as opposed to the gas-lift design (Zeppelin). Both aircraft served in the war; both
were used for reconnaissance missions and for bombing raids. About equally fast, the airship could carry many more guns
and a much larger bomb load on account of its much larger lift capacity. It also sported superior range and endurance. The
big problem, the one that proved to be its doom, was greater vulnerability to air defense, i.e., searchlights and gunfire. If not for that, who is to say that today we would not fly in airships
rather than in airplanes? Quite possibly, airplanes might be 98
Indefensible.indd 98
24/05/2017 18:37
Myth 4
second-best technology, surviving only because of the exigencies of war.29
Since the end of the Cold War, the role of defense in cuttingedge scientific development has been hugely curtailed. This
has largely been driven by the decision that was taken in 1994
by Secretary of Defense William J. Perry, which was set out in an obscure but vital document now known as the ‘Perry Memo’.30
The memo marked a sea-change in US defense procurement and
production: it stated that, as far as was practically possible, the US
should integrate commercial technology into new defense articles. ‘To meet future needs’, the memo intoned, ‘the Department of Defense must increase access to commercial state-of-the-art
technology and must facilitate the adoption by its suppliers of
business process characteristics of world class suppliers.’31 Doing
so, it was hoped, would help defense suppliers leverage the booming developments in civilian innovation, particularly around information technology.
This has led to the widespread adoption of what is known by
the acronym COTS, or commercial-off-the-shelf technology. This takes place when defense products simply integrate the cuttingedge developments that have been proceeding apace in the civilian
technology market. The upside of this approach has been a general
improvement in the performance of military hardware and a substantial reduction in the cost of producing systems. One such
example of this is the Acoustic Rapid COTS Insertion Program. This program was used to improve the US Navy’s ability to
detect enemies at sea (it had, by the early 1990s, lost its ‘acoustic
dominance’). This was resolved by the use of a number of commercial systems, including Intel processors to crunch data, which would have cost billions for the navy to produce itself. The result was a 99
Indefensible.indd 99
24/05/2017 18:37
INDEFENSIBLE
tenfold increase in the efficiency of the detection system and a full 86% reduction in the cost of operation.32
This is generally good news for taxpayers who don’t want to pay
over the odds for weapons. But it also means that military research
and development has dropped away radically, and its importance far outstripped by civilian efforts. In the UK, for example, military R&D dropped by nearly 60% between 1989 and 2010, while civilian R&D increased by nearly 70%,33 as Figure 4.6 shows.
Figure 4.6 Research and development spending in the UK in civil and defense sectors, 1989–2012 (Index 1989 = 100)
Source: ‘Defence Related Activities in the UK’, Office of National Statistics, September 8, 2014, Figure 4, http://webarchive.nationalarchives.gov. uk/20160105160709/http://www.ons.gov.uk/ons/rel/prodcom/prodcom-finalresults/defence-related-activities-in-the-uk/sty-def.html. 100
Indefensible.indd 100
24/05/2017 18:37
Myth 4
While the index analysis in Figure 4.6 gives a good sense of
how defense R&D funding has dropped precipitously since 1989 compared to civilian R&D, it does not give a sense of just how much
larger, in absolute terms, civilian R&D is compared to defense R&D; and how much defense R&D has reduced in absolute numbers
over the same period. As Figure 4.7 shows, defense spending on
R&D fell from £4.7bn in 1989 and 1990 (2012 prices) to a rather substantially less impressive £1.8bn in 2012. By comparison, civilian
Figure 4.7 Research and development spending in the UK in civil and defense sectors, 1989–2012 (£m in constant 2012 prices)
Source: “UK Gross Domestic Expenditure on Research and Development, 2012,” Statistical Bulletin: Office for National Statistics, March 12, 2014, http:// webarchive.nationalarchives.gov.uk/20160105160709/http://www.ons.gov.uk/ons/ dcp171778_355583.pdf. 101
Indefensible.indd 101
24/05/2017 18:37
INDEFENSIBLE
R&D increased from a much larger £14.9bn in 1989 to £25.2bn in
2012. In simpler terms, defense R&D spending used to make up 23.9% of all R&D funding in the UK in 1989; as of 2012, this had fallen to a paltry 6% of total R&D spending.
In the US, the proportion of military R&D compared to
civilian research has also been dropping consistently over the last
thirty years. In 1985, at its peak, military research and development constituted 31.1% of all research in the US. By 2003, this had dropped to 16.6%.In other countries it was even more marked: in 1981, military research accounted for 9.3% of all R&D in the OECD countries; it had dropped to 3% by 2002.34 These figures have been
remarkably stable since then, despite the massive increase in global defense spending since 9/11.
What is particularly striking about this is that defense continues
to receive the largest whack of federal R&D funding (in 2009, $68.2bn, or a full 50% of US government-sponsored R&D was spent
on defense research35); even with this major government support,
defense has lagged far behind civilian innovation.
As it currently stands, the contribution of military research and
development (almost all, it should be noted, driven by public grants, particularly in the US) is rather small in global terms. In 2010, the UK’s Department for Innovation and Skills released a scorecard
of global research investment. It found that the amount spent by
aerospace and defense companies on research and development globally in 2009 was £12.918bn, a mere 3.7% of the $344bn spent
in total on research and development by the top 1,000 research and development companies around the world.36 Indeed, as of
2013, of the top twenty-five global research and development
companies, not a single one was an arms manufacturer. The only
defense firm in the top fifty was the European conglomerate EADS (it placed 30th),37 and its position was undoubtedly 102
Indefensible.indd 102
24/05/2017 18:37
Myth 4
established partly because it includes the massive civilian aerospace company Airbus.
D i d the M i li tar y Inve nt the Inter net? When you mention innovation and the defense trade, the
first response you’ll get is almost always: did you know that the military invented the internet? But, of course, as with most things, it is slightly more complicated than that.
The idea for what would eventually become the internet
was outlined first in a series of memos by an academic at MIT (not the military) by the name of J.C.R. Licklider. Licklider
conceived of a ‘galactic network’ where a global network of
computers would share data; much like the internet today. Licklider wrote the memos in August 1962; he was then quickly snapped up by the DoD in October 1962 to head
up the Defense Advanced Research Agency (DARPA). The
way in which computers would eventually talk to each other, called ‘packet switching’, was outlined by Leonard Kleinrock, also at MIT, in papers in 1961 and eventually in 1964. It was
this conception that allowed the early internet to develop, and its roots lay in civilian, rather than military research.38
The military’s role was to put all of this into action. In
1967, as part of DARPA, the idea of the ‘ARPANET’ was
developed. This was the prototype of the internet. Over the course of a number of years, the network was deployed
and refined. A major advance during this period was the development of the very backbone language of the internet known as TCP/IP (Transmission Control Protocol/ Internet Protocol). This language breaks up data into ‘packets’ that are sent from one computer and reassembled
on another.39 In the early 1970s and 1980s, the idea was 103
Indefensible.indd 103
24/05/2017 18:37
INDEFENSIBLE
trialed, and a number of different partners came on board to test the nascent system; most of the people who joined
were computer scientists at various academic institutions. Private companies such as Xerox also began participating
in the research, which was vital to develop commercially deployable routers.
By the early 1980s, however, the military started taking
a backseat. As the technology began maturing, DARPA handed off the ARPANET to other agencies, the first one
being Defense Communications. Defense Communications
then split the networks into a military only application (MILNET) and a civilian arm of ARPANET. The civilian element of ARPANET was largely driven by the National
Science Foundation, which funded the creation of a whole
new part of the internet (NSFNET) that connected educational institutions to ARPANET. By 1990, other
networks had overtaken ARPANET in terms of connectivity, and it was closed as a communication hub.
The invention of what would become the modern
version of the internet did not take place in the US at all, but rather at the European research agency CERN. This
had led to the creation of the biggest internet node in the
world, CERNNET. A fellow at CERN, Tim Berners-Lee, had long been working on the idea of creating a more useable internet, eventually called the World Wide Web, which
would be navigated using a browser. Berners-Lee based this on Hyper-Text Transfer Protocol, or HTTP, which you will
no doubt recognize from the addresses on your web browser. Importantly, Berners-Lee never patented the information but shared it freely; it was because of this that the idea was
so widely and quickly adopted. If you can believe it, the first 104
Indefensible.indd 104
24/05/2017 18:37
Myth 4
website was built and put online on 6 August 1991.40 Barely a
decade later, the internet was ubiquitous.
As this history illustrates, the military was able, at least
during the Cold War period, to fund cutting-edge scientific
research and facilitate its early prototyping. But it did so in constant dialogue with civilian research, and was built on
work that had been done before the military’s involvement. And it was precisely when the military stepped away, and the information and protocols became free that the internet exploded into the phenomenon it is today. This has raised the intriguing possibility that the internet would not just
have developed without the military (as civilian research was
heading in that direction anyway), but that it may have been rolled out and used at an earlier stage too.
M O D E RN B UYERS: O FFS E T S A N D CO UNT ER-T RADE As we saw in Chapter Two, offsets and counter-trade are often a key
reason why buying countries pursue major arms deals. To remind
you: offsets and counter-trade are promises on the part of the
supplying arms company to invest in the economy of the buyer. This is to ‘offset’ the economic and opportunity costs of buying defense
equipment over other spending priorities. They have grown in use and prominence hugely in the defense trade, where they account
for 50% of all offset deals globally. By 2016, it is estimated that the defense and aerospace sector will be obliged to provide offsets of $450bn globally.41
Offsets are problematic for a number of reasons. First, offsets
cloud and distort procurement decisions. This is because a buying country’s focus will shift from a question of whether or not the 105
Indefensible.indd 105
24/05/2017 18:37
INDEFENSIBLE
product and price are the best to what the purchase will lead to in offset delivery. There is also evidence that the use of offsets actually
increases the costs of contracts; a 2012 study in Belgium found that including offsets in defense purchases increased the purchase
price by up to 30%.42 Offset contracts are also often included
within the national security umbrella that makes the detail of deals confidential, so that citizens and outside parties cannot evaluate
whether the investments offered are realistic or not. Companies offering unsuitable products at outrageous prices can simply
promise their way to success: what most people would acknowledge comes perilously close to a form of legal bribery.
This is the reason why the World Trade Organization has out
lawed using offsets as a selection criteria in procurements: buying
countries can request offsets, but cannot base their purchasing
decisions on the varying levels of offsets offered between parties. The only sector that is not prevented from doing this is defense, which is given a blanket exclusion.43 It is also why the European
Union has long been pushing for a reduction in the use of offsets in procurement contracts. In 2005, for example, a European
Union discussion paper found that ‘In principle, offsets are hardly compatible with transparency and fair competition in open
markets’.44 The economic impact is obvious: buying companies
can be induced to buy the wrong products at over-inflated prices, while suppliers don’t have to improve their products or production techniques to actually win contracts.
The second problem is that when offsets are delivered, it is
extremely hard to judge if they have had any real economic impact. In particular, there is the very real chance that the investments that
happen would have happened without the involvement of defense firms:45 if there is an economic opportunity in, say, sanitation, it
seems odd that it would take an arms firm to make it happen. This 106
Indefensible.indd 106
24/05/2017 18:37
Myth 4
was certainly a concern in Finland, where huge offset contracts were
attached to the purchase of F/A-18 Hornet jet fighters. Elizabeth Sköns, a defense industry analyst, notes that when an audit of the offset programs was conducted, the outcome was hardly amazing: The audit found that … after 6 years of the 10-year offset period, 88 percent of the total offset commitments had been fulfilled, involving around 600 offset projects. However, it was
emphasized that the basic question as regards fulfillment was
whether these transactions would have occurred anyway, i.e., without the offset obligations .… In fact, in none of the 600 offset projects was it possible to establish with certainty what
positive effect the supplier had had on the initiation of the deal. Furthermore, it was evident that some of the projects accepted
as offsets would have occurred without the offset arrangement. The evaluation also identified a number of problems concerning the reliability of the fulfillment statistics.46
The third problem flows from the above concerns. Offset contracts
are often hugely complex and bureaucratic. This is made even
worse through the use of opaque ‘multipliers’ to give added value
to offset investments, as well as the fact that offset projects are awarded complicated offset ‘credits’ rather than simple dollar
values. These credits can be awarded for a whole range of activities and can be easily manipulated by savvy offset investors. The result
is that, when one finally unravels the impressive statistics and
investment figures that are paraded every time an offset investment is concluded, it becomes obvious that the real economic impact
was minimal. This was certainly the case with one of the more
high-profile and information-rich offset deals: the South African Arms Deal.
107
Indefensible.indd 107
24/05/2017 18:37
INDEFENSIBLE
Of f s ets and the S outh A fr ican Ar ms Deal When South Africa signed a controversial deal to buy jets, submarines and frigates in 1999, the transaction (known colloquially in South Africa as the ‘Arms Deal’) came with promises of enormous economic development through
offsets. In total, the suppliers, mostly British and German, were going to generate R104bn (roughly $15bn at 1999
exchange rates) in economic activity and create 65,000 jobs.47 When defense offsets were presented to the South African
public the promise was that they would forever end the guns vs. butter debate: buying arms would be guns and butter.48 It was arguably one of the most vital parts of selling the deal to
a country that was still suffering from enormous poverty and deprivation from the apartheid era.
The offsets were split into two kinds: economic activity in
the civilian sector (over 80% of the offset commitment) and
investment and mutual sales in the defense sector (known by the acronym Defense Industrial Participation, or DIP). Both were a fiasco, which was surprising as defense offsets were
identified as a relatively safe bet. But reviewing the defense offsets over a decade later, the board of the body that oversaw
South African arms procurements, Armscor, was scathing about what they had achieved:
The Board is not satisfied with Armscor’s management
of the Defense and Industrial Participation agreements. One company has to date failed to discharge its obli
gation, whilst others seemed to have chosen the areas and manner in which to discharge their obligations. It has
become clear to the Board that there was limited Armscor
directed and purposeful action during the [Arms Deal] 108
Indefensible.indd 108
24/05/2017 18:37
Myth 4
leading to the discharge of DIP obligations. To date,
Armscor cannot show the impact of DIP obligations
in the economy. Meeting with affected companies has
only served to confirm this concern. It would also seem that companies charged with DIP obligations sought to exchange credits amongst themselves, whilst others
acted as agents for other entities to obtain export sales
for which it received credits for the entire contract value as a DIP obligation. In some cases, some companies
elected to perform enterprise development as part of
their DIP obligations, but ended up buying out the owners of the enterprises where they discharged their obligations, thereby defeating the very basis of the
DIP agreements.49
But it was in the civilian sector that the really crazy stuff happened. To fulfill their obligations, the arms companies had to win ‘offset credits’. These credits, valued in dollars, were supposed to be given on a one-to-one basis, so for every $1 in
sales promoted by the company, or every $1 in investment, they
were given an offset credit. But they soon became savvy to the
fact that the credits were granted with massive ‘multipliers’ if they checked certain boxes like investing in strategic
industries, or somehow proved that a tiny investment in a
project led to much larger investments by other companies. As a result, the companies were awarded billions in offset
credits for rather marginal activities. In one case, Ferrostaal, one of the arms companies, was eventually awarded €3.1bn in offset credits, despite having actually only invested €69m.50
One of the most ludicrous examples of how the system
worked was that of McArthur Baths. In 2002, Sweden’s 109
Indefensible.indd 109
24/05/2017 18:37
INDEFENSIBLE
Saab, invested R15m (about $1.5m) in upgrading a set of heated swimming pools in the South African city of Port
Elizabeth and undertaking a brief advertising campaign in
Sweden to promote the baths.51 In return for this investment,
Saab was eventually granted $628m in offset credits.52 The
credits were awarded in the most farcical fashion: for every Scandinavian (not just Swedish) visitor to South Africa (not
just Port Elizabeth), Saab was granted around $3,830 in offset
credits. So any visitor from Scandinavia—on business, going
on holiday to Cape Town, seeing family and friends—was
treated as if they were going only because of a set of small heated pools in a city not known for attracting tourists at all. These credits were granted even during the 2010 Football World Cup, so that every Swedish attendee of that global jamboree was counted in Saab’s offset points.53
When it came to jobs, the results were unsurprisingly
dispiriting. The promise of 65,000 jobs was a huge part of the selling of the Arms Deal, as South Africa suffered from
terrible unemployment at the time, and still does. When the final figures were tallied in 2014, it was found that the
offset program had only created 13,690 direct jobs.54 And
even these figures couldn’t be believed: under questioning, state employees later admitted that they had not bothered to audit these figures, as they didn’t form part of the arms
companies’ contractual obligations. In fact, under questioning they admitted that jobs figures were simply taken from the business plans of the investing companies, despite the very
obvious fact that these companies would go out of their way to provide the most optimistic figures possible.
110
Indefensible.indd 110
24/05/2017 18:37
Myth 4
The fourth problem is that there is a good chance that the economic
investment that does occur during the offset period will simply
dissipate once the contracts are over; especially if the supplying
country signs a similar deal with another country. This is a particular concern when offset contracts involve the agreement on the part of
the selling country or company to preferentially buy products from the producing country. Once the contracts end, what ensures that this will continue? Jurgen Brauer poses this puzzler:
Consider this example: suppose South Africa agrees to purchase
military items from the EU to the value of R30 billion with a 100 percent offset requirement. The EU contractors agree to
find someone willing and able to import R30 billion of South African agricultural products (fruit, juice, wine). From the EU’s
point of view this is a trade displacement, say from Chilean fruit, juice, and wine suppliers to South African suppliers. In another
year, however, suppose that Chile signs an offset contract of
equivalent value, requiring the EU to purchase Chilean fruit,
juice, and wine. Again, this must result in trade displacement, this time perhaps against the continuation of the South Africa
fruit, juice, and wine exports to the EU. The lesson to be learned is that for offsets to carry a genuine economic impact, world
demand for the underlying products must be increased. But world demand for commercial product is hurt, not helped, by
extra military expenditure. Offsets do not offer additional trade: they merely displace it and probably destroy some of it.55
The final problem with offsets, as we will describe in much more
detail in our chapter on corruption, is that they pose serious
corruption risks. Because they are often conducted under a veil of national security secrecy, they are not subject to oversight. These 111
Indefensible.indd 111
24/05/2017 18:37
INDEFENSIBLE
opaque deals are easy to manipulate to ensure that key decision makers are ‘cut’ into offset contracts after signing. The secrecy attached to the transactions can make them considerably more difficult to identify and trace than traditional bribery schemes.
In summary: offsets are a wash, often increasing prices, delivering
limited economic benefit and creating major corruption risks. As Jurgen Brauer and John Paul Dunne noted in a 2009 paper:
Extant evidence suggests that offset arrangements do not yield net benefits for a country’s economic development. As a
general rule arms trade offset deals are more costly than off-the-
shelf arms purchases, create little by way of new or sustainable employment, do not appear to contribute in any substantive way
to general economic development, and with very few exceptions
do not result in significant technology transfers, not even within the military sector.56
THE BA D N E WS : HOW DEFENSE S P E NDING C A N HA RM THE ECONOMY So far we have only discussed—and dismissed—the supposed
benefits that defense spending brings to the economy. What is often left out of the discussion, however, are the multiple ways
in which defense spending can actively harm the economy. We
tackle the four primary ones here, but acknowledge that these are by no means the only ways in which defense spending can hurt the economy.
The first is simple: if you spend a huge amount of money on
defense, you can be constrained when you need to respond to any
sort of economic downturn. One recent example of this has been the US wars in Iraq and Afghanistan. According to Nobel prize112
Indefensible.indd 112
24/05/2017 18:37
Myth 4
winning economist Joseph Stiglitz and co-author Linda Bilmes, the wars in Iraq and Afghanistan cost the US economy at least $3trn by 2009.57 They argue that it was these wars that pushed the US economy from a position of a healthy surplus at the end of the
Clinton era to one of massive national debt. Indeed, between 2003
and 2008, US debt grew from $6.4trn to $10trn.58 Not only did this
limit the US response to the credit crunch, they argue, it may also have played a role in triggering it:
The global financial crisis was due, at least in part, to the war. Higher oil prices meant that money spent buying oil abroad
was not money being spent at home. Meanwhile, war spending
provided less of an economic boost than other forms of spending would have. Paying foreign contractors working in Iraq was
neither an effective short-term stimulus (not compared with
spending on education, infrastructure or technology) nor a basis for long-term growth. …
As a result of two costly wars funded by debt, our fiscal
house was in dismal shape even before the financial crisis – and those fiscal wars compounded the downturn.59
The second way in which defense spending can harm the economy
is through what is known as a skills externality. In layman’s terms, this means that the defense industry (including the military) sucks up skilled workers such as engineers and scientists. The defense
sector is also likely to pay higher wages and offer more benefits, either directly through state employment or as a result of the favor with which the industry is treated more generally. This can place a
major cost on the civilian sector in order to compete with defense
industry salaries. In the US, for example, the wages and benefits for military employees are considerably higher than for employees in 113
Indefensible.indd 113
24/05/2017 18:37
INDEFENSIBLE
the civilian sector with similar skill levels; a gap that has been rising consistently since 2001.60 Figure 4.8 shows this clearly.
Figure 4.8 Wages of RMC vs. civilian wages, 2001‒2009 Source: J. Grefer, D. Gregory and E. Rebhan, ‘Chapter 1: Military and Civilian Compensation: How Do They Compare’ in The Eleventh Quadrennial Review of Military Compensation, CNA Corporation, 2011, Fig. 6, p. 21, http://militarypay. defense.gov/Portals/107/Documents/Reports/SR04_Chapter_1.pdf. 114
Indefensible.indd 114
24/05/2017 18:37
Myth 4
The third way in which the defense industry, and arms exports
in particular, can hurt the economy is through a global escalation in
military capacity and instability. This is a no-brainer: if you export weapons to countries that are, at best, questionable allies, you need
to buy and develop your own new weapons to maintain military dominance, or increase the quantity of weapons you already have to
combat increased regional insecurity. This is wasteful as you render the previous generation of arms irrelevant or draw unnecessary funds into defense procurement. One recent example of this was the decision by France to sell Mistral submarines to the Russian
Navy for $1.7bn in 2011. The deal was widely criticized by the US and other eastern European countries as Russia was already posing
a military threat to NATO countries. The transaction was only canceled in September 2014 when Russia invaded Ukraine.61 But
if that invasion had happened a few years later, Russia would have been in possession of ships that would have significantly boosted its
naval forces, compelling other states to buy arms to maintain parity. The final way defense spending can harm the economy, and
one which we will discuss in more detail in Myth 5, is that defense
spending is often associated with severe and endemic corruption. Corruption, it is now well recognized, hugely hampers economic growth and development, diverting resources away from human development into unnecessary and wasteful expenditure. That this
is the case was illustrated by a fascinating 2009 study by three noted defense economists. Looking at data from a selection of African countries, they found that corruption both increased the military
burden and, in the long term, encouraged ongoing economydeflating rent-seeking behavior. The results showed that
cuts in military spending are likely to directly increase aggregate economic performances and to indirectly stem the effects of 115
Indefensible.indd 115
24/05/2017 18:37
INDEFENSIBLE
corruption. Overall, the results provide strong evidence that, for the group of African countries studied here, high levels of
defense spending and corruption have had a damaging effect on economic performance, both directly and indirectly.62
CO NCLUS IO N As we’ve seen extensively above, the argument that the defense industry is vital to healthy economies is not strongly supported by the data. Not only are the alleged benefits far less substantial than claimed—jobs and innovation are poorly served by modern
defense spending—but the downsides of defense spending are unambiguous. The simple fact is that defense spending is good for
only one thing: defense. It is a poor job creator, no longer creates that many new technologies and, in the worst case scenario, makes
countries poorer. If just a small portion of the currently enormous
sums spent on the military were spent on virtually anything else—
renewable energy, welfare, tax cuts—the economic benefits would be enormous.
116
Indefensible.indd 116
24/05/2017 18:37
M Y TH 5
CORRUPTIO N IN THE ARM S T RA D E IS ONLY A P ROBLEM IN DE V ELOP ING COUNTRIES The arms trade often invokes two contradictory images in the mind of the average citizen. Ask them if the arms trade is ‘dirty’, and the
answer is usually ‘yes, of course’. Yet ask the average citizen in a firstworld country whether their own governments and defense equipment
suppliers are corrupt, and the answer is usually no. ‘Our systems are
clean’, the first-world citizen will insist. ‘If there is corruption, it is only because third-world leaders and rogue dictators demand it. It is the cost of doing business in a dirty world.’It is almost unthinkable that
corruption could infect an arms deal between a first-world country— Austria, say—and a first-world supplier—Sweden, for example.
The result of these attitudes is, primarily, inaction. National
governments and prosecutors don’t believe that the arms trade, 117
Indefensible.indd 117
24/05/2017 18:37
INDEFENSIBLE
especially in developed countries, needs to be more effectively
monitored, despite the fact that, as is discussed below, it is a particul
arly high-risk industry in terms of corruption. The number of
prosecutions of arms companies and/or dealers is minuscule in view
of the extent of the evidence of wrong-doing against them; which is a function of, among other things, a complete lack of political will.
THE S C A LE O F CO RRUPT ION In reality, corruption in the global arms trade is endemic and
systemic. Indeed, it is arguably one of the most—if not the most— corrupt industries in the world. In 2005, the analyst and academic Joe Roeberwas given access to a range of hard-to-find data, including
secret US intelligence files. After analyzing the data, Roeber found that up to as much as 40% of all corruption in all global trade occurred in the sale of armaments.1 A few years earlier, the
US National Export Strategy Report published by the Department of Commerce relayed that the US became aware of, ‘significant
allegations of bribery by foreign firms in 294 international contract competitions valued at $145 billion ... About half of the bribe offers are for defense contracts’.2
There is also a direct link between the levels of perceived
corruption in a country and the amount that those countries spend on buying weapons. In 2000, three academics linked to the
Inter national Monetary Fund reviewed corruption perceptions and defense spending across 120 countries. Their finding was
that, ‘corruption is associated with higher military spending as a
share of GDP and total government expenditures, and with larger procurement outlays in relation to both GDP and government
spending ... countries perceived as being more corrupt tend to spend more on the military’.3
118
Indefensible.indd 118
24/05/2017 18:37
Myth 5
The pervasiveness of corruption in the trade, as these figures
suggest, simply cannot be the result of opportunistic dictators
creaming off the top. Instead, they indicate active collusion on the part of arms producers and their governments in corruption. Two of the most recent examples of this are BAE Systems and the German arms manufacturer Ferrostaal.
BA E S ys te ms and The i r Networ k of Cover t a nd O ve r t Age nts BAE Systems is the third largest defense manufacturer in the world, with 40% of its turnover earned supplying the US
defense establishment.4 The company was investigated for
nearly a decade, by the UK’s Serious Fraud Office (SFO) and the US Department of Justice, amongst others, for alleged widespread corruption in its sale of defense equipment to a
range of countries including Saudi Arabia, the Czech Republic, Hungary, Tanzania and South Africa. In 2008, the Serious
Fraud Office supplied an affidavit to South African authorities, which were also investigating BAE Systems for alleged bribery
and corruption in the hugely controversial purchase of Gripen
and Hawk jets. The affidavit, and the attached evidence that the SFO had uncovered, was eye-opening.
The SFO found a document from 1995 in which BAE
outlined a series of strategies to make their use of ‘marketing advisers’ and ‘consultants’ more opaque—something the company needed to do, according to the document, because
of increased attention being paid by the US Department of
Justice to BAE’s ‘marketing activities’ in Chile, which had allegedly included payments to Chile’s notorious dictator
Augusto Pinochet.5 To do so, in 1998 BAE Systems formed
a company named Red Diamond Trading in the British 119
Indefensible.indd 119
24/05/2017 18:37
INDEFENSIBLE
Virgin Islands, a well-known tax and secrecy haven. Red
Diamond Trading, in turn, was operated by a company called Headquarters Marketing, the unit within BAE Systems
that had been engaging in ‘marketing activities’ in Chile.6 BAE would make payments via its online banking services
in London to a raft of advisors—an almost industrialized system of securing influence.
Through Red Diamond Trading, BAE Systems entered
into contracts with ‘covert advisors’ (BAE Systems contracted
with ‘overt advisors’ directly) whose identity was to remain
secret. Gary Murphy, a senior investigator with the SFO, was clear why he believed this system had been established: ‘I suspect a primary reason behind the inception of Red
Diamond was to ensure that corrupt payments could be made and that it would be more difficult for law enforcement agencies to penetrate the system.’7
BAE Systems made use of Red Diamond extensively.
In the South African contract alone, SFO investigators
tracked roughly £115m in payments to ‘covert advisors’ either via Red Diamond or other offshore routes.8 One of these ‘covert advisors’ was one FanaHlongwane, who, at the time the purchase from BAE was being negotiated, served
as the special advisor to the then minister of defense, Joe Modise. Modise, in turn, had been instrumental in getting
BAE selected as the supplier for Hawk and Gripen aircraft, which he achieved, in the case of the Hawk, by going so far as to instruct evaluators to ignore the fact that they cost
more than double the price of their nearest competitor. It
later emerged that Modise had secured shares in a company that was due to receive considerable business through BAE’s promised offset program.
120
Indefensible.indd 120
24/05/2017 18:37
Myth 5
In 2010 and 2011, BAE Systems entered into plea bargain
agreements with the US Department of Justice and US
Department of State, respectively. In the DoJ plea bargain, BAE Systems agreed to a fine of up to $450m in return for being allowed to plead guilty to lesser charges. Nevertheless, the information that formed the basis for the settlement, known
as a Statement of Offence, confirmed just how frequently BAE Systems made use of the Red Diamond network.9 BAE
admitted that it paid, from 2001 onwards, £135m and $14m to
‘marketing advisors’ in a host of countries. Most importantly, BAE Systems confirmed that it ‘made payments to certain
advisors through offshore shell companies even though in
certain situations there was a high probability that part of the payments would be used in order to ensure BAE was favored
in the foreign governments’ decisions regarding the sale of
defense articles’.10 In its settlement with the Department of State, which included a fine of $79m, BAE admitted that it
had made over 1,000 payments to ‘unauthorized brokers’, while retaining at least 300 brokers and advisors on its books from the late 1990s to 2007.11
Fe r ro s taal around the Wo r ld In late 2011, the questionably named WikiGreeks website
uploaded an explosive document: a lengthy internal
compliance audit of Ferrostaal—the German mega manufac turer heavily involved in the maritime defense trade—by the
US law firm Debevoise & Plimpton. Debevoise & Plimpton had been asked to review all of Ferrostaal’s payments, by itself
and its subsidiaries, related to its numerous contracts around the world. What they found was remarkable: between 1999 and 2010, Ferrostaal or its subsidiaries had made payments 121
Indefensible.indd 121
24/05/2017 18:37
INDEFENSIBLE
of €1.13bn to various players in relation to its numerous
international contracts, of which €309m were identified as raising serious ‘red flags’.12 ‘The compliance investigation found that Ferrostaal made questionable or improper
payments on many of its largest and highest profile projects’, the report noted. ‘Many of these payments appear to have been systemic, in that they occurred repeatedly throughout the Company on projects of all sizes.’13
The report tracked a number of different submarine
contracts the company had entered into, including hugely controversial purchases in Portugal, Greece and South
Africa. The Portuguese example gives a flavor: in 2004, Portugal opted to buy two Type 209 submarines from the German Submarine Consortium, of which Ferrostaal was
a primary member, for €881.48m. Investigators found that, amongst others, Ferrostaal had made a payment of €1.679m
to Dr. Jurgens Adolff in 2004 and 2005. Dr. Adolff was the German Honorary Consul in Portugal at the time the selection was made.14
H ARDWIRE D F O R CO RRUPT ION: WHY THE TRA D E S TI NK S 15 Of course, companies like BAE Systems and Ferrostaal do not operate in a vacuum. Instead, they work in an industry that is almost
uniquely prone to corruption, due to a number of factors.16 The first,
and most notable, is that the defense trade is intimately linked to
national security concerns. National security often cloaks large arms transactions, making their form and content opaque. Classifying documents becomes the norm, rather than the exception, making
it difficult for citizens and journalists to access crucial information 122
Indefensible.indd 122
24/05/2017 18:37
Myth 5
and hold decision makers to account. In certain instances, even
law enforcement agencies can be denied access to information and documents on this basis, or told to simply stop looking. One recent
example of this was when the UK’s then prime minister, Tony Blair, instructed the Serious Fraud Office to stop investigating BAE
Systems for corruption in Saudi Arabia, citing Britain’s security
relationship with Saudi as the reason. Under this protective shroud, all sorts of corporate and individual malfeasance can be undertaken
without much fear of ever being detected. Such heavy-handed secrecy is not only corruptive, it is entirely unnecessary, as we will discuss in the following chapter.
Being so closely related to security concerns also means that
the defense trade is much less regulated than other industries
and is treated with a striking degree of preference. One good, albeit somewhat technical, example of this is the World Trade
Organization’s Agreement on Government Procurement, which we briefly mention in Myth 2. The World Trade Organization negotiates binding trade agreements with the majority of the world’s governments. The Agreement on Government Procurement is one
such pact, putting in place a raft of rules about how government procurement should be undertaken freely and fairly. All industries are regulated under the agreement, except for when they want to buy weapons:
Nothing in this agreement shall be construed to prevent any
Party from taking any action or not disclosing any information
which it considers necessary for the protection of its essential security interests relating to the procurement of arms, ammu
nition or war materials, or to procurement indispensable for national security or for national defense purposes.17 123
Indefensible.indd 123
24/05/2017 18:37
INDEFENSIBLE
In addition, the role of the trade in national security and defense
means that the companies are often considered vital strategic allies,
and are granted access to the highest echelons of the political process. This is magnified by the fact that large weapons systems deals—for
battleships and jet fighters, for example—are undertaken by states, rather than private actors. In such circumstances, if corruption does happen, it is not the corruption that takes place at border posts
or traffic blockades; it is grand corruption that can involve senior political players and their political parties. When this happens, there can be enormous political pressure placed on investigative agencies and prosecutors to stop looking into graft, and national security can
be invoked to stop prosecutions. It is a highly damaging feedback loop: national security provides the secrecy necessary for corruption to be encouraged, while corruption increases the need for secrecy to prevent detection.
The second feature of the trade—and one which magnifies
the impact of national security exceptions—is that it is incredibly
technical and complex, especially when it comes to sophisticated weapons systems such as submarines and stealth fighters. This has two outcomes. First, people from outside the defense establishment
may not be able to penetrate the jargon that hides corruption, limiting accountability. Even if the veil of national security secrecy
is withdrawn, investigators and citizens can still be mystified by
the more technical aspects of deals. Second, it often means that
there are only a handful of people making decisions related to the
expenditure of billions of dollars. Corrupting an arms deal is thus easy—one only has to target a small number of people, rather than entire political systems.
The third feature of the arms trade that makes it susceptible
to corruption is that there is often a worryingly close relationship between purchasing governments, the arms industry, middlemen 124
Indefensible.indd 124
24/05/2017 18:37
Myth 5
and senior figures in the military and intelligence agencies. These
cozy relationships can blur the distinction between what is in the
interests of the industry and what is in the interests of the citizens a purchasing government represents. It also allows for ample
opportunities for the installation of a ‘revolving door’, in which
defense officials take jobs in companies they buy from and vice versa. In turn this creates a ‘revolving table’ in which the governmental
buyer and the commercial seller at the table may find themselves swapping places when the next deal is negotiated.
This is particularly apparent in the United States. In 2010, the
Boston Globe conducted a review of appointments in US arms
companies. It was found that between 2004 and 2008, 80% of all retiring three- and four-star officers became well-paid employees of, or consultants to, the defense industry. In 2007 alone, thirty-four out of the thirty-nine retiring admirals and generals followed this path.18 It is important to remember that, post-retirement, three-
and four-star generals are frequently brought into the Pentagon to
help with strategy or are often allowed to sit in on meetings that interest them. The influence they bring to bear can be decisive.
In 2008, the US Congress sought to address the revolving door
by requiring high-ranking military personnel that were leaving
the government to seek guidance before agreeing to join a defense
corporation or become a consultant that would likely involve working with defense corporations.19 In addition, a centralized database was created that contains copies of the ethics opinions provided when
retiring officials sought guidance.This database was not made publicly available. Citizens for Responsibility and Ethics in Washington (CREW) challenged this decision and in 2012 submitted Freedom
of Information Act requests to access the database and view the 219 opinions that had been sought. CREW did not gain access to the database but received information on the ethics opinions 125
Indefensible.indd 125
24/05/2017 18:37
INDEFENSIBLE
sought by senior defense officials between January 2012 and May 2013.20 CREW found that ‘an overwhelming majority of employees
seeking opinions—84 per cent—had at least one specific company or organization in mind, and defense companies dominated the list
of prospective employers’.21 While it must be recognized that at least
there was ethical guidance sought, it is disturbing that much of the information remained secret, and that the information that came to light showed how clearly the eyes of military officials were trained on employment in the defense industry.
In the UK, a 2012 investigation by The Guardian found that
3,572 senior military officers and MOD officials received approval to take jobs with arms companies after leaving the armed forces
or MOD over the previous sixteen years.22 Organizations such
as the Campaign Against the Arms Trade (CAAT) also monitor
the ‘revolving door’: you can view all of the major revolving door appointments since they started tracking it on their website.23
You may wonder why the ‘revolving door’ is an issue: surely
people with experience of defense should be allowed to earn an income after they retire from public service. The problem is three-fold. First, there is always the worry that public servants may make decisions that benefit their future employers: to curry
favor and ensure their employment, to help their future employers
maintain their profitability, or simply because of an emotional bias or sympathy. Second, and perhaps most importantly, former public
servants retain many of their professional connections after they retire, which they could use to inappropriately benefit their new
employer. Third, and this is relatively unique to the defense industry, former public servants and senior military figures are able to take part in government deliberations directly, setting the terms and
scope of military and acquisition policy. In 2011, for example, CREW found that in the US ‘some retired generals and admirals work for 126
Indefensible.indd 126
24/05/2017 18:37
Myth 5
defense contractors while they continue to advise the Pentagon’. They pointed to the examples of General James Cartwright and
Admiral Gary Roughead, both of whom took jobs in the defense industry shortly after retiring, who were simultaneously serving
on the Defense Policy Board. The board’s function is to provide
the secretary of defense with ‘independent, informed advice and opinion concerning major matters of defense policy’.24
Both General James Cartwright, who retired from the US
Marine Corps on 1 September 2011 after serving as vice chairman of the Joint Chiefs of Staff, and Admiral Gary Roughead, who retired
from the navy in 2011 after serving as the chief of naval operations,
were appointed to the Defense Policy Board on 4 October 2011. General Cartwright, shortly after his retirement, was appointed
to the board of Lockheed Martin; Roughead joined Northrop Grumman’s board less than four months after his retirement.
It is not just individuals who benefit from these close relationships;
many companies seek to make substantial private profit from their
relationship with the state in ways that can be somewhat baffling. In 2012, for example, Lockheed Martin attempted to secure a tax
break on a hotel and conference centre it controlled in Montgomery
County in the state of Maryland, despite acknowledging that most
of the money spent in housing delegates there was money from federal contracts.25 Lockheed eventually received a state lodging
tax break in this instance, but were rebuffed from exemption at the county level. They were most recently granted an enormous $420m
tax break in July 2014 in California.26 California delegates (many
with Lockheed Martin factories in their districts) argued that
this tax break would make Lockheed Martin more ‘competitive’ in its bid to be the supplier of next-generation bombers to the
US government, worth $55bn. Its primary competitor, Northrop Grumman, has now demanded a similar tax break to level the 127
Indefensible.indd 127
24/05/2017 18:37
INDEFENSIBLE
playing field.27 It seems perverse that two companies fighting it out
to receive taxpayer money to build jets should receive a cut on the amount paid in taxes on their profits.
The fourth notable feature is that the arms trade is truly global.
Large defense contractors are often massive agglomerations of once disparate companies, with long lines of supply that are spread
throughout the world.28 This process has accelerated with increased demands by importing countries that supplier companies undertake ‘technology transfer’ or move parts of the production process to the
buyer country. Long supply lines usually involve the use of multiple
subcontractors and a plethora of different jurisdictions. Corruption in these instances can easily be hidden through subcontracting and be facilitated in jurisdictions that may not be as well-resourced to investigate as countries like the US. According to a 1999 report
by the US inspector general, it was precisely because ‘kickbacks
were so pervasive in subcontracting in the Defense industry’ that the US introduced the Kickback Act of 1986, a piece of legislation unfortunately rarely mirrored in other countries.29
The problems of subcontracting and long lines of supply are
aggravated by the widespread use of ‘offsets’ in the defense industry, discussed in detail in the previous chapter.
The final notable feature is that, quite obviously, the trade in
weapons often happens in times of imminent or active conflict. In these circumstances normal procurement procedures are
suspended and all sorts of malfeasance can take place. Defense
contractors can have a field day by price gouging, colluding with competitors, engaging in widespread fraud or winning contracts
through whatever means they deem necessary. And even if these
crimes are detected, they often go unpunished, as the warring
governments still require the services of the industry. The US’ experience in Iraq and Afghanistan, where the government relied 128
Indefensible.indd 128
24/05/2017 18:37
Myth 5
heavily on private security contractors to do the work in the field, is instructive. In 2011, the Commission on Wartime Contracting found that at least $31bn had been lost through waste and fraud by
contractors out of a total of $206bn spent by the US government: 15% of all expenditure.30The commission noted that this was a low-
ball estimate—at the upper range, it was possible that as much as
$60bn had been wasted.31 The largest contractor, Kellogg, Brown &
Root (KBR), was found to be guilty of a whole range of offences, such as getting paid the full monthly salaries of engineers who
worked for less than an hour a month.32 KBR was a subsidiary of Halliburton, the company for which Dick Cheney served as chief
executive officer in the few short years he wasn’t working in the White House in the mid-1990s. Nevertheless, KBR continued to
receive multiple enormous contracts. ‘We basically said that KBR
is too big to fail’, commission co-chair Christopher Shays noted. ‘So we are still going to fund them.’33
CO RRU P TING IN S TIT UT IONS All of this suggests that the defense industry is particularly risky when it comes to corruption. But this is only corruption of the traditional sort: cash in envelopes or dodgy transfers through
middlemen. It completely ignores another form of corruption: ‘institutional corruption’. Institutional corruption as understood by the Harvard-based academic Lawrence Lessig is the influence brought to bear on institutions that is legal, and may even be
considered ethical, but that stops those institutions performing
their intended functions properly. Think of the US Food and Drug Administration: its purpose is to regulate food and medicines in
the US to ensure their safety. But if lobbyists or other influence peddlers are able to convince the FDA to adopt rulings that favor 129
Indefensible.indd 129
24/05/2017 18:37
INDEFENSIBLE
particular corporate interests, instead of maximizing safety, one can say that the FDA has been institutionally corrupted.
The defense industry, especially in the major producer countries,
is guilty of institutionally corrupting numerous state institutions, be
they the military, government or law enforcement. This is especially true of the US. As Bill Hartung has observed:
when other weapon systems are up for debate: Industry and
Pentagon lobbyists swarm Capitol Hill; pressure is ratcheted up on members of the Armed Services and Defense Appropriations
Committee in the House and Senate, many of whom have had key defense production facilities placed in their states or
districts; key members receive generous political contributions
from the producer of the weapon system and its subcontractors; … and official reports and testimony are created that make a one-sided case for the weapons system in question, often with the aid of the contractors.34
In one of the few military procurement scandals to be publicized and in which action was taken, the Boeing Corporation briefly lost
a contract that had been awarded in 2003 to supply the US Air Force with jet refueling tankers. A senior air force official, Darlene
Druyun, tailored the procurement criteria to Boeing’s bid, ensured
the price accorded with the corporation’s needs and, together with senior air force and Pentagon officials and the White House
conceived and implemented the company’s lobbying operation. Druyun’s daughter and son-in-law received jobs from Boeing while
the negotiations were in progress. After the contract had been
awarded, Druyun herself was employed by Boeing with a substantial
signing-on bonus. In addition, the secretary of the air force, James Roche, resigned before a report on the tanker scandal concluded 130
Indefensible.indd 130
24/05/2017 18:37
Myth 5
that he had broken ethics rules, and went to work for a company involved in the development of space-based weapons.35
Illustrating that even the accountability chain is seriously com
promised by institutional corruption, the inspector-general’s report on the tanker scandal concealed significant facts, after the White House scrubbed it of damning information related to White House
officials’ role in the scandal. The inspector-general was lambasted in a Senate hearing. He resigned and went to work for Blackwater (as it then was named), one of the largest and most controversial
defense contractors operating in Iraq, several of whose employees have been convicted of murder for deaths they caused in Iraq.36
The extent of institutional corruption in the defense sector is also
seen vividly in the realm of threat identification and intelligence. It is now known that corporations are working at every level in the national security sphere from the operational to the strategic. Back in 2007, it was noted that
corporate intelligence professionals from companies such as Lockheed Martin, Raytheon, Booz Allen Hamilton, SAIC
and others are thoroughly integrated into analytical divisions throughout the intelligence community, including the Office
of the Director of National Intelligence … that produces the President’s Daily Brief (PDB)’.37
R.J. Hillhouse has suggested that it is not possible to distinguish
items in the PDB that are prepared by government employees or contractors, but that if this were to happen then the PDB would
have ‘corporate logos plastered all over it’.38 Therefore, corporations
have significant opportunities to shape strategic government policy decisions, and at the same time are ‘removed from traditional
accountability structures such as judicial and parliamentary 131
Indefensible.indd 131
24/05/2017 18:37
INDEFENSIBLE
oversight’.39 Some have noted that this could permit corporations to include items in the PDB and other strategy documents that could
influence the US national security agenda in favor of particular
corporate interests with limited oversight and accountability—this
is a problem for democratic governance regardless of whether it occurs willfully or through inherent bias.
I S CO RRUP TIO N A VICTIM L ESS CRIME? When people claim that corruption is only a problem for developing
countries, the rejoinder should be: this is not only factually wrong, it is deeply unethical. Why would corruption in developing countries
be ok? Why are so few people angered by the litany of corruption
with regard to the arms trade? There are many reasons, but one of the primary ones is that many people simply don’t believe that corruption is such a big deal. Corruption is seen as a victimless crime.
The harsh reality is that corruption, in the defense trade and
beyond, takes a massive toll on democratic governance and human
development. Corruption in the defense trade diverts enormous
amounts of funds away from much-needed development goals. And, as the example below shows, defense spending, when it involves corruption, tends to decrease rather than increase human security.
I s Cor r upti on a V i cti ml e ss Cr ime? T he S o uth A f r i can ‘A r m s De al’ In 1999, the South African government bought a range of sophisticated weapons in a transaction known colloquially as the ‘Arms Deal’. Although the cost has never been nailed down firmly, it was estimated to set the country back at
least $6bn: an enormous amount for a country that had just emerged from decades of apartheid and that had severe and 132
Indefensible.indd 132
24/05/2017 18:37
Myth 5
pressing socio-economic needs. Since its announcement in
1999, the deal has been beset by numerous corruption alle gations relating to all its constituent contracts.40 Two people
have been sent to jail for either fraud or corruption relating
to the deal; one of them was the ‘financial advisor’ to the country’s current president, Jacob Zuma, who himself faced 783 counts of fraud, corruption and racketeering in relation to the deal.
For a number of years, the South African government
argued that providing anti-retroviral treatment to individuals
with HIV/Aids was simply too expensive.41 In August 2003,
a South African government study found that, if the drugs
were rolled out by 2008, it would have deferred the deaths
of 1.7m people and the orphaning of 860,000 children.42 If
the money from the Arms Deal had been spent on HIV/ Aids treatment, the government could have funded the full treatment of every HIV-infected person in the country for a full twelve years.43 This is just one such example: if the money
was spent on housing, for example, the country could have
built around 2 million houses, just 200,000 houses less than
would be needed to provide a roof over the head of every South African. Similarly, the money spent on the Arms Deal
could have built a library for every school in South Africa, stocked them with books, and employed a librarian in each one for over twenty years.44 It also could have funded the
transfer of nearly 30% of all land in the country into the hands of those who had been dispossessed by the apartheid
state, massively undoing one of the country’s great tragedies. Instead, South Africa bought a range of weapons whose utility is unclear and utilization questionable. 133
Indefensible.indd 133
24/05/2017 18:37
INDEFENSIBLE
CO NCLUS IO N These examples, and many others, suggest that the question we posed
right at the beginning of this discussion is not only misinformed, it is misplaced. The real question we need to ask is this: ‘How does the combination of access to enormous public funds and national secrecy corrupt democratic practices?’ The answer, as we’ve
shown, is simple: the arms trade is not only systemically corrupt; it systematically corrupts governments and their institutions.
134
Indefensible.indd 134
24/05/2017 18:37
M Y TH 6
N ATION AL SE C URIT Y R E QUIRES BL A N KET SE CREC Y In the previous chapter, we discussed how secrecy provides fertile
ground for corruption in the defense trade. In almost every case, this
secrecy is generated by relying on the ‘national security exception’: that because the defense sector is so crucial to national security it
has to remain outside of public knowledge. Certainly, in some very limited cases, secrecy is necessary to maintain national security. But in a good majority of cases, national security is invoked to prevent
disclosure of details that are embarrassing to those who govern, or to cover up wrongdoing, or, as seems to be the case in many bureaucracies, because keeping things secret becomes the default
position, a force of habit. As one democracy advocate long ago noted, public information is crucial to rule by the people:
A popular Government, without popular information, or the
means of acquiring it, is but a Prologue to a Farce or a Tragedy; or, perhaps both. Knowledge will forever govern ignorance: 135
Indefensible.indd 135
24/05/2017 18:37
INDEFENSIBLE
And a people who mean to be their own Governors, must arm
themselves with the power which knowledge gives. ( James Madison to W.T. Barry, 4 August 1822)
And, as we show below, not only does excessive secrecy decrease
accountability and hamper good governance, it can actually decrease security as well.
H OW M UCH D O E S THE SECRECY B L A N KE T COVE R? Secrecy is the default position of a good deal of the global defense sector. Secrecy is so widespread that many countries fail to even
report how much the military receives in funding. The Government Defense Anti-Corruption Index (GI) is an index developed by
the global anti-corruption watchdog Transparency International. The GI assesses the levels of corruption risk in a national defense
establishment: what systems are in place to prevent corruption,
and how well they are enforced. One part of the ‘corruption risk’ calculation is whether or not countries are transparent in their defense budgeting.
The results of the index were damning: forty of the eighty-
two countries surveyed in 2013 did not publish their budget at all.1
Additionally, even published defense budgets often exclude ‘secret’ spending, i.e. how much of the defense budget is spent on top secret items. The risk that this poses in terms of the illicit diversion of funds should be obvious. The GI research also found that 70% of
the countries surveyed failed to disclose the amount spent on secret or sensitive items.2
There are some cases in which the details of secret spending may
not be appropriate for wide dissemination. But a fundamental part 136
Indefensible.indd 136
24/05/2017 18:37
Myth 6
of a democratic system is the agreement to supply this information
to publicly respected bodies that can hold the military to account, in particular legislatures. Internationally, most legislatures will allow
for top-secret information to be disclosed to representatives in a way
that limits its dissemination, but ensures a degree of accountability. Yet 40% of the countries surveyed in the GI failed to give any information at all on funding for secret projects to the legislature.3
Where budgets are published, there is the additional concern
that the military establishment may be hiding true expenditures in other budgets, which is known as off-budget expenditure.4 This
secret expenditure can be used to undertake politically contentious
and unsupported activities, or merely as a means of self-enrichment. Off-budget expenditure became a major problem when Western
donors, in particular the World Bank, stipulated in the late 1990s
that as part of their aid packages defense spending had to be reduced to an acceptable 2% of GDP. The intent was laudable but the
outcomes could be perverse. In Uganda, for example, huge resources were diverted from non-military budgets into a military campaign in the Democratic Republic of the Congo. In 2001, Uganda received the right to exceed the 2% spending, but, in reality, ‘the request was
merely an attempt to gain permission to officially spend what was already being allocated to the military’.5
Another example is Nigeria, where problematic off-budget
expenditure may be threatening the security of Africa’s biggest
country. In Nigeria, ‘security votes’ are off-budget pots of funding
that are, in theory, spent on maintaining security. Such ‘security votes’ are reserved for control by the executive, and are not accounted for or subject to audit.6 The sums are believed to be enormous, but their
opacity makes it impossible for citizens or civil society to know the
amounts. These security votes are allocated on top of the 845 billion
Naira (approximately US$5.3bn) budgeted for the security sector 137
Indefensible.indd 137
24/05/2017 18:37
INDEFENSIBLE
in 2014, which already receives a larger portion of the Nigerian national budget than all other sectors.7
There is no doubt that Nigeria faces significant security threats,
but the size and proportion of spending on opaque ‘security votes’ have so far had little impact on the safety of citizens in the country. Soldiers complain that they are out-gunned by insurgents.8 Boko Haram is now considered the deadliest terrorist insurgent group in the world: in 2015 alone, 11,000 people were killed in Boko Haram-
related violence,9 while an estimated 2 million civilians have been
displaced since Boko Haram’s insurgency began.10 A report by the International Crisis Group pointed to ‘corruption, impunity and
underdevelopment grievances’, as well as a heavy-handed military approach by government forces, as factors that press citizens to support groups like Boko Haram.11The executive director of the
Nigerian Civil Society Legislative Advocacy Centre (CISLAC), Auwal Musa Rafsanjani, stated that ‘for Nigerians to have less security challenges there should be transparency in the allocation of the huge fund for security in the 2014 budget’.12
Another example is provided by the US, where there are relatively
strong oversight and transparency mechanisms in place compared to the majority of countries worldwide. Nonetheless, in addition to excessive corporate influence through legal pathways as discussed in the previous chapter, the US also has problematic off-budget
spending. The Overseas Contingency Operations (OCO) account was intended to separate funds for the wars in Iraq and Afghanistan
from other defense spending.13 OCO spending is a supplemental
allocation for ‘war spending’, intended to be faster and more flexible than going through the normal appropriations process, but it has grown significantly since 2001.14 Over $1trn has been spent using
OCO funds during the Iraq and Afghan wars, but according to the Friends Committee on National Legislation, much of that money 138
Indefensible.indd 138
24/05/2017 18:37
Myth 6
has been used for activities unrelated to the wars, and should have been included in the main Pentagon budget.15 Indeed, when the US undertook new and increased military action in Iraq and Syria in
2014, it could draw on huge reserves of funds that had been granted
to the OCO accounts before it had to call for additional money: reflective of how over-funded OCO spending is.
To make matters worse, the OCO is not subject to the same
budget restrictions—such as the Budget Control Act—as the
primary Pentagon budget. According to the Center for American
Progress, ‘the Pentagon has requested $79 billion in OCO funding
for FY 2015 and plans to request an additional $30 billion annually through FY 2019. Because OCO funding is not subject to the
[Budget Control Act] caps, it has the effect of allowing for a substantially larger defense budget’.16 In 2014, a diverse coalition
of organizations wrote a joint letter to Congress to cut the
‘Pentagon’s slush fund’, and close this misleading loophole that allows defense spending to grow, even as the Pentagon’s budget appears to be capped.17
Problems with defense budget transparency are not an isolated
phenomenon. Rather, they are best understood as part of a culture
of secrecy that defines a lot of defense establishment and industry
behavior. This is particularly true of the US, which classifies
mountains of documents every year. In the fiscal year 2014, the Information Security Oversight Office reported that there were
46,800 ‘original classification’ decisions in all offices of the US
government, i.e. 46,800 decisions which classified information, fortunately a drop from the George W. Bush era.18 However, any
document that is produced that uses previously classified material
is also automatically classified—what is known as ‘derivative classification’. In 2014, this led to the classification of an astonishing
77,515,636 documents; 17,539,500 of which were given the highest 139
Indefensible.indd 139
24/05/2017 18:37
INDEFENSIBLE
classification of Top Secret.19 As Figure 6.1 shows, using derivative
classification has become a worryingly increasing trend.
Keeping so many secrets costs a great deal of money. The US
federal government more than doubled its expenditure on keeping
secrets in the decade after 2001. In 2014 more than $14.98bn was
spent in protecting secrets.20 And the costs have kept going up. In 1995, for example, $2.7bn was spent keeping secrets; this increased
to $3.77bn in 1999.21 The rise to $14.98bn in 2013 thus represents an
increase of just under 400% since 9/11.To put it in perspective, the
cost of classification in the US is equal to the budget of the entire
US Environmental Protection Agency.22 Steven Aftergood, who
directs the Project on Government Secrecy for the Federation of American Scientists, said that ‘to me it illustrates the most important problem—namely that we are classifying far too much information
Figure 6.1 Derivative classification activity, FY 1996–FY 2014 Source: Information Security Oversight Office, Report to the President 2014 (Washington, DC: ISOO, 2014), 1, accessed June 3, 2016, http://www.archives.gov/ isoo/reports/2014-annual-report.pdf. 140
Indefensible.indd 140
24/05/2017 18:37
Myth 6
… The credibility of the classification system is collapsing under the
weight of bogus secrets’.23 This was echoed by the US Congresscreated Public Interest Declassification Board, which warned that over-classification ‘undermines the integrity of the system’.24
Justifying the cost of keeping secrets is somewhat difficult
when it becomes clear just how many people have access to these secrets. In the US and UK, armies of contractors are employed in
the intelligence community to process information and undertake
intelligence work. Indeed, in the US, nearly 1% of the population has some sort of security clearance. In 2013, it was confirmed that
3.5m people held ‘secret’ clearances, of which 2.7m were government
employees and 580,000 contractors. An additional 1.4m people, including over 483,000 contractors, held Top Secret clearances.25
Remarkably, this figure continued to grow: in 2014 it was reported
that 5.1m people held ‘secret’ clearances in the US, more than the population of Norway.26
How can a secret known by a million people remain a secret? A
‘secret’ in this system can readily be found by any capable criminal or spy—it just can’t be subjected to public scrutiny and debate.
The culture of excessive secrecy is both illuminated and encour
aged by the poor treatment of whistleblowers around the world. Blowing the whistle on corruption exposes fraud, waste and abuse that fritters away taxpayer funds and can put security at risk. In the secretive defense and security sector, it is even more important to
have individuals inside institutions watching out for corruption to hold those in power accountable. An understanding that individuals who expose corruption will be protected and their reports taken seriously can have a deterrent effect.
Yet around the world, protections for whistleblowers in this
sector are shockingly poor. Just three of the eighty-two countries
studied in Transparency International UK’s Government Defence 141
Indefensible.indd 141
24/05/2017 18:37
INDEFENSIBLE
Anti-Corruption Index encourage whistleblowing by defense and security personnel, and implement strong measures to protect those
that expose corruption: Germany, Norway and Singapore. Fiftyseven of the eighty-two countries studied (70%) score a 0 or 1 on the
question regarding whistleblower protection, indicating that they
either have no protections in place at all, or there is no evidence that existing laws are enforced.27
In the US, the cases of Chelsea Manning and Edward Snowden
brought the issue of national security whistleblowing dramatically
to the fore. But they are part of a broader trend in which the Obama administration has cracked down on government employees who
leak information to the press.28 This has been done using the World
War I-era Espionage Act, which makes it a crime to allow documents or information ‘relating to the national defense’ into the hands of
‘any person not entitled to receive it’.29 The Department of Justice responded to a Pro Publica report on the crackdown on leaks by
stating that it does not target whistleblowers, and that whistleblowers are only legally protected when they raise concerns through internal channels.30 Yet the experience of NSA whistleblowers including
Thomas Drake, William Binney and J. Kirk Wiebe, clients of the Government Accountability Project, show that whistleblowers in
this sector almost always experience career setbacks, and worse, many of them face reprisals, investigation, lengthy and costly legal battles, and sometimes jail.31
Importantly, progress on general whistleblower protections has
not included defense and security personnel. The US Whistleblower
Protection Enhancement Act of 2012, for example, does not extend
to defense and security workers.32 The Obama administration issued
Presidential Policy Directive 19 to provide intelligence and security whistleblowers with protection from retaliation but, according to the Brennan Center for Justice at New York University, there are 142
Indefensible.indd 142
24/05/2017 18:37
Myth 6
several gaps, including that employees fired for national security
reasons are exempt from protection, and the directive does not apply to members of the armed forces or ‘persons in positions
of a “confidential, policy-determining, policymaking, or policy-
advocating character”’. The Center notes that there is no provision to allow outside reporting if going through internal agency or
intelligence committee channels don’t work: ‘the directive … is unlikely to have much effect in cases where the agency itself is
complicit in the wrongdoing and the intelligence committees are not willing to interfere’.33
To put the crackdown on whistleblowers in context: since
Obama took office in 2009, the administration has brought seven cases under the Espionage Act, more than under any previous president: Thomas Drake, Shamai Leibowitz, Bradley (Chelsea) Manning, Stephen Kim, Jeffrey Sterling (in whose trial the NY
Times reporter James Risen was subpoenaed to testify), John Kiriakou and Edward Snowden. Even while aggressively pursuing
whistleblowers, the government does acknowledge abuse within the security sector, if its investigations are any indication. In that same time period, the Securities & Exchange Commission took up four
enforcement actions of the Foreign Corrupt Practices Act (FCPA)
related to defense and security: Smith & Wesson, Armor Holdings, United Industrial Corporation (UIC) and Thomas Wurzel (former
president of UIC).34 The DOJ took enforcement actions during this
period against Armor Holdings and its employee Richard Bistrong, and BAE Systems. Twenty-two individuals in military and law
enforcement products companies were also indicted related to the
Armor Holdings incident, but the case was eventually dismissed.35
With corruption and corporate abuse so rampant, surely more should be done to protect whistleblowers? 143
Indefensible.indd 143
24/05/2017 18:37
INDEFENSIBLE
TH E RE A L RE A S O N S F O R SECRECY As the above illustrates, the world, and the defense sector in particular, is suffering from a bad dose of excessive secrecy. This
might be understandable if this secrecy stemmed from legitimate and immediate national security concerns. But cultures of secrecy
usually develop for other more mundane—and potentially damaging—reasons.
One reason is that excessive secrecy is simply a habit. The Public
Interest Declassification Board, for example, argues that the Cold War fostered a culture of global secrecy that merely became a routine. ‘Historically, classification occurred mostly through a rote
process, almost always favoring protection and with little restraint or
concern for declassification and eventual public access’, the Board’s 2012 Report noted. ‘Over-classification was a natural consequence of having a culture of caution, with every incentive to avoid risk rather than manage it.’36
Other commentators point to more personal and less flattering
reasons for excessive secrecy. Daniel Ellsberg, the famous whistle blower behind the Pentagon Papers, has argued that there are
strong psycho-social reasons underpinning cultures of secrecy. Ellsberg suggests that the act of keeping secrets in bureaucracies is a way of proving trustworthiness to higher-ups, ensuring that secret-keepers are well thought of by their peers and bosses. At
the same time, being given access to secrets becomes a badge of
honor, something by which people can measure their status within
organizations, particularly those dealing with national security. As Ellsberg has written:
The promise to keep ‘secrets of state,’ once demanded and given, becomes virtually part of one’s core identity. In the national 144
Indefensible.indd 144
24/05/2017 18:37
Myth 6
security apparatus, one’s pride and self-respect is founded in particular in the fact that one has been trusted to keep secrets in
general and trusted with these particular secrets. Second, they
reflect one’s confidence that one is ‘worthy’ of this trust. Indeed, the trust (with respect to truly sensitive secrets, requiring
utmost reliance on the discretion of the recipient) will have been ‘earned,’ before being conferred, by a long history of secret-
keeping, building habits that are hard to break, that form part of one’s character.37
The carrot also combines with the stick: many officials are given
the repeated message that if damaging information comes out, it is their fault for not classifying enough. This means that officials may classify simply to play it safe, to save their jobs and careers and avoid
institutional censure. In the 1950s, for example, John Moss, widely
recognized as the father of the Freedom of Information Act, argued persuasively that ‘the Defense Department’s security classification
system is still geared to a policy under which an official faces stern punishment for failure to use a secrecy stamp but faces no
such punishment for abusing the privilege of secrecy, even to hide controversy, error, or dishonesty’.38
Elizabeth Goitein and David Shapiro, both of the Brennan
Center for Justice at the New York University School of Law, also suggest that, within bureaucracies, information that has been classified is simply taken more seriously—almost as if being secret
is the criterion by which time-pressured officials can sort the wheat
from the chaff.39At the same time, a person sharing the declassified information receives a credibility boost and is listened to. One
journalist, quoted by Goitein and Shapiro, recalled a conversation with a former national security official thus: 145
Indefensible.indd 145
24/05/2017 18:37
INDEFENSIBLE
[The retired official] … noticed that classification was used not to highlight the underlying sensitivity of a document, but to ensure that it did not get lost in the blizzard of paperwork
that routinely competes for the eyes of government officials. If a document was not marked ‘classified,’ it would be moved
to the bottom of the stack, eclipsed by more urgent business, meaning documents that carried a higher security classification. He observed that a security classification, by extension, also conferred importance upon the author of the document. If the paper was ignored, so too was its author. Conversely, if the
materials were accorded a higher degree of protection, they would redound to their author’s credit and enhance his or her authority and bureaucratic standing.40
Organizational politics and turf wars are other reasons why secrecy
becomes entrenched. In the mid-1990s, President Clinton appointed a commission to investigate the extent and scale of secrecy in
government and give recommendations as to how to remedy it. The commission was headed by Daniel Moynihan, who used his
experiences to write a critically acclaimed book in 1999. Reviewing
the American experience of secrecy, Moynihan came to believe that
secrets primarily became ‘organizational assets’ to be used in turf wars and to achieve ill-defined personal and organizational goals: Departments and agencies hoard information, and the govern ment becomes a kind of market. Secrets become organizational
assets, never to be shared save in exchange for another organ ization’s assets. Sometimes the exchange is in kind: I exchange
my secret for your secret. Sometimes the exchange resembles barter: I trade my willingness to share certain secrets for your
help in accomplishing my purposes. But whatever the coinage, 146
Indefensible.indd 146
24/05/2017 18:37
Myth 6
the system costs can be enormous. In the void created by absent or withheld information, decisions are either made poorly or not made at all.41
The cynical use of secrecy can also become a key way in which
governments can raise support for activities that are unjustified
based on the actual information. Goitein and Shapiro point to the
Iraq war as a prime example. In the lead-up to the war in Iraq, George W. Bush referred to the National Intelligence Estimate as evidence that Iraq was attempting to produce weapons of mass
destruction, despite the fact that the estimate included quali
fications and cautions from various agencies about the data. Only a
small number of congressmen were given access to the full version.
However, when the matter came before Congress to be debated, the full assembly was given an unclassified version that left out the
dissenting opinions. A later congressional committee found that the unclassified version provided readers ‘with an incomplete picture
of the nature and extent of the debate within the Intelligence Community regarding these issues’.42
Goitein and Shapiro also point to another reason for excessive
secrecy, which we have referred to repeatedly: the desire to cover up wasteful, criminal or simply embarrassing information.43 One
example of this can be found in the controversial Timber Wind
Project. Timber Wind was part of the much-maligned Star Wars
program to build a means of intercepting incoming nuclear weapons in the US, and was specifically mandated to investigate using
nuclear-propelled rockets as interceptors. In the early 1990s, details of the project were leaked to Steven Aftergood of the Federation
of American Scientists. Aftergood discovered that the project had been wrongly classified as a ‘special access program’, limiting
knowledge of it. Aftergood thus wrote to the inspector general, 147
Indefensible.indd 147
24/05/2017 18:37
INDEFENSIBLE
who investigated the matter. The inspector general confirmed that the over-classification had not only ‘limited discussion and debate on the feasibility of the technology and alternative applications of
the technology’,44 but that the classification was kept in place after
Aftergood had been given the documents ‘to avoid embarrassment that may have resulted from the unauthorized disclosure’.45
H OW S E C RE CY RE DU CE S N ATION AL SECURIT Y In addition to being concerned about unnecessary secrecy, we
should also be deeply worried about how national security can be actively undermined by secrecy. This comes about three key ways.
First, excessive secrecy creates the space for corruption, waste
and mismanagement. And, as we have seen, corruption and waste
actively reduce national security by diverting resources away from
actual national security needs, reducing the legitimacy and efficacy
of the military, and encouraging government behavior that sees the defense budget as a means of self-enrichment rather than a scarce resource that needs to be used to maximize security.
Second, excessive secrecy curtails proper debate about foreign
and defense policy, and can lead countries into dark places. This was clear in the case described above, where selected declassification of
materials limited the debate about whether or not to invade Iraq, tilting in favor of the Bush administration’s preference for war. This may not have caused the war in Iraq—the conflict was driven by
multiple factors—but it certainly led many to support the war based on faulty information and muddied the water considerably.
Third, and finally, excessive secrecy can markedly reduce the ability
of those in charge of national security to do their jobs efficiently. This is particularly true when various defense and intelligence agencies
fail to share information between them. One very clear example of 148
Indefensible.indd 148
24/05/2017 18:37
Myth 6
this was the build-up to 9/11. Reviewing the facts surrounding the matter, the 9/11 Commission, set up to investigate the reasons why the attacks weren’t stopped, noted that the policies and practices of the agencies involved stopped information held between them being integrated into a single useful picture:
The culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty to the
information—to repay the taxpayers’ investment by making that information available ...
Current security requirements nurture overclassification
and excessive compartmentation [sic] of information among
agencies. Each agency’s incentive structure opposes sharing, with risks (criminal, civil, and internal administrative sanctions)
but few rewards for sharing information. No one has to pay for the long-term costs of overclassifying information, though these
costs—even in literal financial terms—are substantial. There are no punishments for not sharing information. Agencies uphold
a ‘need-to-know’ culture of information protection rather than promoting a ‘need-to-share’ culture of integration.46
This insight was clearly lost in the post-9/11 acceleration of classifications.
WHAT C A N B E DONE The fact that national security has driven excessive secrecy should be of concern to everyone around the world. And there is something
meaningful and concrete that can be done. In 2013, the Open Society Justice Initiative undertook a massive survey of the impact 149
Indefensible.indd 149
24/05/2017 18:37
INDEFENSIBLE
of national security on democracy, and developed a framework of
principles that could guide all future national security legislation
to ensure the greatest possible degree of openness and democracy. Drawing on consultations with over 500 experts in seventy countries, the program produced what are known as the Global Principles
on National Security and the Right to Information (also known
as the Tshwane Principles).47 If governments around the world would agree to adopt the Principles, and make them a reality in
their legislation and conduct, it would mark a fundamental change
in how secrecy and national security are conceived. The following points summarize the Tshwane Principles on National Security and the Right to Information:48
• The public has a right of access to government information, including information from private entities that perform public functions or receive public funds.
• It is up to the government to prove the necessity of restrictions on the right to information.
• Governments may legitimately withhold information in narrowly
defined areas, such as defense plans, weapons development and
the operations and sources used by intelligence services. Also, they may withhold confidential information supplied by foreign governments that is linked to national security matters.
• But governments should never withhold information concern ing violations of international human rights and humanitarian
law, including information about the circumstances and
perpetrators of torture and crimes against humanity, and the location of secret prisons. This includes information about past abuses under previous regimes, and any information they
hold regarding violations committed by their own agents or by others.
150
Indefensible.indd 150
24/05/2017 18:37
Myth 6
• The public has a right to know about systems of surveillance, and the procedures for authorizing them.
• No government entity may be exempt from disclosure require
ments—including security sector and intelligence authorities. The public also has a right to know about the existence of all
security sector entities, the laws and regulations that govern them and their budgets.
• Whistleblowers in the public sector should not face retaliation if the public interest in the information disclosed outweighs
the public interest in secrecy. But they should have first made a reasonable effort to address the issue through official complaint mechanisms, provided that an effective mechanism exists.
• Criminal action against those who leak information should be
considered only if the information poses a ‘real and identifiable risk of causing significant harm’ that overrides the public interest in disclosure.
• Journalists and others who do not work for the government
should not be prosecuted for receiving, possessing or disclosing classified information to the public, or for conspiracy or other
crimes based on their seeking or accessing classified information.
• Journalists and others who do not work for the government should not be forced to reveal a confidential source or other unpublished information in a leak investigation.
• Public access to judicial processes is essential: ‘invocation of national security may not be relied upon to undermine the
fundamental right of the public to access judicial processes’. Media and the public should be permitted to challenge any
limitation on public access to judicial processes. • Governments should not be permitted to keep state secrets or other
information confidential that prevents victims of human rights violations from seeking or obtaining a remedy for their violation. 151
Indefensible.indd 151
24/05/2017 18:37
INDEFENSIBLE
• There should be independent oversight bodies for the security sector, and the bodies should be able to access all information needed for effective oversight.
• Information should be classified only as long as necessary, and
never indefinitely. Laws should govern the maximum permissible period of classification.
• There should be clear procedures for requesting declassification, with priority procedures for the declassification of information of public interest.
It is up to us, as global citizens, to compel our governments to act
on these principles, for the sake of more openness and transparency, enhanced justice and democracy, and greater security for all.
152
Indefensible.indd 152
24/05/2017 18:37
M Y TH 7
NOW IS NOT THE TIME If all of the arguments that those who support the arms trade status
quo presented so far have not convinced you to leave it well alone, there is one more argument up their sleeve: the world today is too
dangerous to imperil the status quo and challenge the arms business. In fact, so the argument goes, the world is more dangerous now than it ever has been in the past. We need to stick with this course, it is argued, until we’ve turned the tide, rolled back the wars and achieved
a peace in which we can breathe and take stock. We need first to win the ‘war on terror’, and to deter the threats posed by a rising Russia and China, before we can begin to dismantle our defenses.
Our argument is different. We don’t put forward a particular
explanation for the world’s armed conflicts and security problems. What we do is to debunk the myth that we are living in a period in
which the world’s threats justify an international arms business of
the scale, type and influence that we have today. In fact, we suggest that the arms trade has not only corrupted government procurement
and international trade, but it is insidiously perverting the course
of judicious political analysis. Now is precisely the time to debate, 155
Indefensible.indd 155
24/05/2017 18:37
INDEFENSIBLE
openly and transparently, the nature of the global arms business and its indefensible logic.
I S TH E WO RLD RE A LLY M O RE DANGEROUS? The drumbeat of imminent and permanent crisis is powerful and persistent. And it is escalating. Leaders around the world, large parts
of the media and the swathes of the commentariat repeat the claim ad nauseam, that our current threats make this the most dangerous time in human history. In 2013, for example, British Foreign Secretary William Hague declared: ‘The world is becoming more dangerous. The risk has risen.’1 Similarly, in 2012 the Chairman of
the Joint Chiefs of Staff, Martin Dempsey, told the United States Congress that ‘in my personal military judgment, formed over
thirty-eight years, we are living in the most dangerous time in my lifetime, right now’. Dempsey further detailed the sources of his
fear: ‘There are a wide variety of non-state actors, super-empowered
individuals, terrorist groups, who have acquired capabilities that heretofore were the monopoly of nation states … I wake up every
morning waiting for that cyber attack or waiting for that terrorist attack or waiting for that nuclear proliferation.’2
There is no doubt that the world may be faced with problems,
but the claim that we live in the most dangerous period in human
history is simply unsupported by the data. There are genuine threats, but they are routinely exaggerated and distorted. The threat
of terrorism—which often ranks highest in the listing of fears—is hugely overstated and objectively quantifiable as such: an example
of the process of ‘threat inflation’, which we discuss in detail below. Meanwhile, other tangible long-term threats, such as climate
change, are ignored or brushed aside. Threats are framed in such a way that the solution is pre-defined: more weaponry, heightened 156
Indefensible.indd 156
24/05/2017 18:37
Myth 7
vigilance, more authority vested in the defense and security chiefs. These arguments are demonstrably false and dangerous.
Less heard than the ‘dangerous times’ trope is the counter-
argument, that we are in fact living in the most peaceful era in human history. Steven Pinker, with his widely acclaimed 2011 book
The Better Angels of Our Nature, is the leading proponent of this view. Drawing on volumes of evidence, Pinker argues that all the
statistics point to a massive long-term reduction in violent conflict and a reduction in intentional violence across all areas of human life.3 To explain this remarkable and laudable trend, Pinker details
the growth of states and the rule of law, the expansion of education, the human rights revolution and the feminization of politics.
Remarkable as Pinker’s claim may seem, he is in line with
the general view among scholars and statistical authorities that look at long-term trends. Among the trends that have been welldocumented are:
• The decline in number and scale of mass atrocity events.4
• Decline in the number of armed conflicts and people killed in each.5
• Decline in famines.6 Let’s narrow the conversation to armed conflict for the moment,
where the research consensus on the long-term trends is very strong. The most significant global threat of violence in terms of
capacity for destruction is war between the major powers. This
peril was horribly realized in the devastation of World War I that
began just over a hundred years ago, and its sequel from 1939 to 1945. The degree of political, social and economic upheaval that these conflicts caused cannot be overestimated. World War I ended with 16 million people dead, and another 20 million wounded. World 157
Indefensible.indd 157
24/05/2017 18:37
INDEFENSIBLE
War II surpassed even this deadly toll, leaving in its wake 60 million people dead, representing 2.5% of the global population.
Since the end of World War II, there is one key statistic we need
to keep in mind: zero. That is precisely the number of wars between major powers since 1953, the number of nuclear conflicts and the
number of wars involving direct conflict between two states in
Europe.7 While many will and in fact have argued that this number
was made possible by large military build-ups, particularly in the West, another set of important statistics helps us understand that
the real peace dividends were found following the end of the Cold War, when military stockpiles and proxy wars were reduced.
Of course the world still experiences an unacceptable number of
conflicts. But these are much fewer than during the middle of the
20th century; and, importantly, they tend to be less violent. In 1991, for example, two years after the Berlin Wall had fallen, there were
fifty-two conflicts around the world. This fell to the low thirties, on average, between the mid-1990s and early 2010s.8 The total, it should
be noted, increased to forty in 2014, which is worrying, but still
less than in the early 1990s. Conflicts claiming 1,000 or more lives declined 50% from fifteen in the early 1990s to just seven in 2013.
In addition, the conflicts that take place are generally less violent.
The Human Security Report asserts that the average international conflict in the 1950s killed over 21,000 people a year on the battle
field; in the 1990s that average had declined to approximately 5,000, and in the first decade of the new millennium it was less than 3,000.9 And we are getting better at counting wars and violence
in wars. The Sudanese‒Ethiopian reciprocal cross-border attacks of
the mid-1990s, for instance, don’t show up in any databases, because both sides kept them secret.10 Today it’s inconceivable that an air
raid on a civilian target that killed between 1,000 and 1,800 people would remain entirely unreported for ten months (social media and 158
Indefensible.indd 158
24/05/2017 18:37
Myth 7
the internet has vastly increased the ability of even the most remote
places in the world to be reported on), but that is precisely what
happened following the Ethiopian air raid on the market town of Hausien on 22 June 1988.11 Overall, the downward trend in armed conflict has continued into the 2000s.12
Scholars take their time to analyze data and write their books
and reports. Journalists, commentators and politicians respond to the day’s events. The long-term decline is not in dispute. Indeed, the
indicators for battle deaths and conflict-related humanitarian crisis hit their all-time low in the years 2005‒2008.
You may ask: what about Syria, one of the most deadly conflicts
of the last two decades? And you’d be right to ask; Syria has almost singlehandedly reversed the downward trend of the past twenty
years. But it is important to bear in mind two things: first, the Syria crisis, as we discuss later, is precisely a function of the broken
politics in which the arms trade thrives and which the arms trade creates. Second, even with the Syria crisis, the world is considerably less violent than it was during the majority of the Cold War.
Thus, while 2014 was the most deadly year for conflict for two
decades, Erik Melandor, director of the Uppsala Conflict Data
Program, points out that ‘2014 nevertheless represents a low level of violence compared to the repeated spikes of war fatalities during the
Cold War’.13 In 2014, the number of battle deaths was estimated to be around 100,000; by comparison, they reached over 600,000 in the
early 1950s (during the Korean War), about 380,000 in the early 1970s (during the Vietnam War), and hovered around 280,000 between 1983 and 1988 (during the deadly Iran‒Iraq War and the civil wars
in Angola and Ethiopia).14 The 2015 Global Hunger Index, compiled
by the International Food Policy Research Institute, Concern
Worldwide and Welthungerhilfe, on the topic of how armed conflict creates hunger, noted that major famines had been all but abolished 159
Indefensible.indd 159
24/05/2017 18:37
INDEFENSIBLE
during the last decades of the 20th century. While 117 million people
perished in great and calamitous famines in the hundred years from
1870 to 1970, the figure for the last twenty-five years is just 1.4 million. However, the same report observed with worry that conflict-related
starvation had been increasing over the last seven years, notably in Somalia, South Sudan, Syria and Yemen.15
What this clearly suggests is that there are newly emerging
challenges, and the last few years have posed worrying questions
about the trends towards greater peace and security. But they should not be read as proof that the world is more dangerous now than it
has been in the past: even if the media coverage does not reflect it, the last two years of conflicts still come nowhere near the violence of the Cold War.
W H Y D O E S THE WO RLD FEEL SO DA NG E RO US : E XP LO RI NG T H E D OM IN A N T N A RRATIVE OF T H REAT As we have seen above, a few years after the Millennium, the world
was at its most peaceable in recorded history. Nonetheless, a 2006 Gallup poll revealed that 76% of Americans believed that the world
was, in that year, more dangerous than it had been anytime in the recent past.16
What might explain this? Some reasons lie in the psychology
of threat perception. Threats that are new and unknown will figure more highly than those that are familiar—even if the latter
are objectively greater. Threats that are incalculable or somehow
alien will be seen as their worst possible manifestations. We are irrationally scared of sharks. Events that are on the TV news will be more salient than those we read about in the papers or in specialist articles, or which never reach the media at all. 160
Indefensible.indd 160
24/05/2017 18:37
Myth 7
Other reasons lie in the deliberate or casual misrepresentation
by politicians. Playing to people’s fears—including exaggerating those fears—is the oldest trick in the politician’s playbook. This is where the arms business enters, as an accessory to this trick.
And there can be no doubt that the terrorist crime of 11
September 2001 generated deep fears among Western (and
especially American) publics. Not only were civilian airliners turned into weapons of conspicuous destruction, but the subsequent
anthrax scare drew attention to the dangers of chemical and biological warfare agents in the hands of non-state actors bent
solely on devastation. The fear that Iraqi dictator Saddam Hussein possessed nuclear weapons ready to launch on a hair trigger, evoked
still deeper fears. The ideologies of Al Qaida militants, and more
recently the Islamic State of Iraq and al Sham [ISIS is Islamic State of Iraq and al Sham] (ISIS), are so alien and demonic that people are deeply afraid that the worst may transpire.
Fortunately, those fears are massively disproportionate to the actual
threats. In 2013, for example, 11% of US citizens were very worried, and 29% somewhat worried, that someone in their family would
be a victim of terrorism.17 But, that same year, the US government
confirmed that only sixteen American citizens (not including soldiers) had been killed as a result of terrorism worldwide.18 In fact, you are
more likely as a US citizen to drown in your bathtub (a 1 in 800,000
chance) than die from terrorism (a 1 in 3.8 million chance).19 And even this may be an overestimate: in 2013 the Washington Post reported
that, based on the previous five years, there was only a 1 in 20 million
chance of dying in a terrorist attack: two times less likely than dying from a lightning strike.20 Toddlers, using weapons found in their own homes, have killed more Americans than terrorists in recent years.21
Of course, one would hope that the US government’s spending
on the ‘war on terror’ would make America safe (or at least safer) 161
Indefensible.indd 161
24/05/2017 18:37
INDEFENSIBLE
from terrorist attacks. The low numbers of Americans killed by
foreign terrorists could equally be taken as a sign that the US Department of Homeland Security, the CIA, the National Security Agency and the DoD are doing their job well.
However, it is crucial to consider that the ‘war on terror’ might
have been a horrendous error. Such an argument runs like this: the attempt to impose a military solution on complicated political
problems was simplified thinking with a false promise of total
national safety. In turn, the militarization of the response—as seen
in the massive expansion of military deployments, arms spending, and the license to do anything in pursuit of national security—has in reality worsened the problem of armed violence in the world.
This argument begins with an important fact: transnational
terrorism is on the decline.As Todd Sandler argues in a 2014 article
assessing how we study and track acts of terrorism, by the major indices which detail terrorism the decline is substantial.22
Figure 7.1 Number of transnational terrorist incidents, 1968–2011 162
Indefensible.indd 162
24/05/2017 18:37
Myth 7
It is notable that the decline had set in well before 2001. If we
take the number of fatalities caused by terrorists, 2001 marks a clear
spike, because of 11 September. But a single spike, however terrible, is not indicative of a statistical trend. Looking back, it seems that the
counter-terror policies of the 1980s and 1990s, aimed at pressuring
governments to end state sponsorship of terrorist organizations, was actually working, and 9/11 was an exceptional and tragic outlier. One thing that happened in the aftermath of the trauma of
9/11 was ‘threat inflation’: political leaders and pundits inflated the
perils that America was facing. ‘Threat inflation’ refers to the gap between perceived and actual threats. It is defined by the scholars Trevor Thrall and Jane Cramer as ‘the attempt by elites to create a concern for a threat that goes beyond the scope and urgency
that a disinterested analysis would justify’.23 Or, in simpler terms,
threat inflation is when enormous amounts of fear are generated far beyond what the facts would warrant.
Threat inflation is remarkably easy to do.The difference between
popular fears and realities is well known to domestic politicians and policemen. A 2011 Gallup poll found that 68% of Americans think
crime is on the rise.24 In fact, between 1993 and 2012, the violent
crime rate (homicide, robbery, rape and aggravated assault) in the United States dropped by just under 50%.25
The security sector has a strong record of engaging in threat
inflation. During the early stages of the Cold War, for example, American policy makers and military leaders loudly worried about first a ‘bomber gap’ and then a ‘missile gap’, claiming that the USSR
was massively outpacing US production of bombers and nuclear missiles. In 1959, US intelligence estimates suggested that the USSR
would be in possession of between 1,000 and 1,500 nuclear-capable intercontinental ballistic missiles (ICBMs) compared to America’s paltry 100. In reality, by September 1961, the USSR had only four 163
Indefensible.indd 163
24/05/2017 18:37
INDEFENSIBLE
ICBMs at its disposal, ‘less than one half of one percent of the
missiles expected by US intelligence’, as Stephen Van Evera points out.26 More recently, Saddam Hussein turned out not to possess
weapons of mass destruction after all. The practice extends, as retired Air Force Lieutenant-Colonel William Astore notes, to North Korean ballistic missiles, Iranian nuclear weapons production and
increased Chinese military production. While all are real concerns, they ‘pale in comparison to the global reach and global power of the United States military ... All this breathless threat inflation keeps the money rolling (along with the caissons) into the military’.27
There are a host of reasons why threat inflation might happen.
Scholars sympathetic to the difficulties of governance will argue
that decision makers are always on the back foot, trying to make
sense of a confusing world with limited intelligence. Politicians
may see the inflation of a threat as a win‒win situation: if the threat
does not materialize, they can point to their preventative measures, and if it does, they can argue that they had seen it coming all along and that even more needs to be done to prevent it. Academics who study the psychology of fear point to how difficult it is to analyze security risks in cultural environments that have been shaken by recent unforeseen attacks.28 And then there are the various
psychological short-cuts that are made that can turn the most
unrealistic concerns into national emergencies. Not every possible threat is a probable threat. Confusing the two allows worst-case
thinking to claim the day. The problem with that is, as security expert Bruce Schneier writes:
It substitutes imagination for thinking, speculation for risk analysis, and fear for reason. It fosters powerlessness and vulner
ability and magnifies social paralysis ... By speculating about
what can possibly go wrong, and then acting as if that is likely 164
Indefensible.indd 164
24/05/2017 18:37
Myth 7
to happen, worst-case thinking focuses only on the extreme but improbable risks and does a poor job at assessing outcomes.29
One example of this is the tendency to conflate a sense of security
with one’s actual security, which can often be hugely different. It is
entirely possible to feel secure when you’re actually very insecure (sitting in your cozy home on a normal night when there is in fact
an intruder outside), and feel very insecure when you’re really safe. If you are bombarded with images of violence and war, especially if those images are framed in terms of threat, they are likely to make you feel deeply insecure, even if the reality is somewhat different.
Nowhere is this tendency more pronounced than in relation to
defense issues and the global arms industry. Many scholars point to how particular players—the defense industry, the military, like-
minded leaders and a pliant commercial press—can collude to create magnified perceptions of threat to justify unpopular military
endeavors, pursue particular foreign policy ideologies and divert
massive financial resources to the industries and individuals who will be paid to diffuse the threat.30 Certainly, defense companies are
past masters at presenting, through their advertisements directed
at government buyers, the world as a deeply dangerous place, and
their products as the solution. These players are particularly well placed to set the agenda of fear as they have both the pulpit to do
so, often brief decision makers directly on the security environment, and have a monopoly on intelligence that can be hard to counter in the heat of the moment.
A pertinent example is the US invasion of Iraq in 2003, which
was foregrounded by the national trauma of 9/11 and pursued on
the basis of the constructed and largely imaginary threats posed by Iraq’s Saddam Hussein. It is now well-known that officials in the Bush administration, many of whom were part of the controversial 165
Indefensible.indd 165
24/05/2017 18:37
INDEFENSIBLE
Project for the New American Century, had been pushing for an
attack on Iraq since at least 1998, believing that it would lead to
a radical reshaping of the Middle East along lines favorable to
the US.31 Shortly after 9/11 took place, Bush and his officials were assiduous in popularizing four related ‘threats’ that drew on the
emotion of 9/11 and focused a target on Saddam Hussein. These four threats are identified by Chaim Kaufman as follows:
He was an almost uniquely undeterrable aggressor who would
seek any opportunity to kill Americans virtually regardless of the risk to himself or his country;
He was cooperating with al Qaida and had even assisted in the September 11, 2001 terrorist attacks against the United States; He was close to acquiring nuclear weapons; and He possessed chemical and biological weapons that could be used to devastating effect against American civilians at home or US troops in the Middle East.32
These were powerful claims: multiple polls found that Americans, in the lead-up to the war in Iraq, believed them to be substantially
true.33 However, since the Iraq war has taken place, every threat
has been successfully debunked. Weapons inspectors at the time
did not find any trace of nuclear activity or a chemical weapons program, and none were found by US troops on the ground.34
Hussein had not worked together with Al Qaida at all,35 and
actually saw them as a potential threat since Al Qaida had identified
his regime (amongst multiple others) as an enemy. Hussein, while undoubtedly a vicious dictator, was not irrational, as evidenced by 166
Indefensible.indd 166
24/05/2017 18:37
Myth 7
how successfully the US had deterred his international ambitions following the first Gulf War.
And we now know that the Bush administration was well
aware of these facts, actively manipulating intelligence gathering and tinkering with its analysis to give these fears credence.36After
CIA officials rubbished the intelligence reports of Iraqi defectors, for example, Secretary of Defense Donald Rumsfeld created a new body called the Office of Special Plans (OSP).37 The OSP collected
its own raw, unfiltered intelligence and ensured that it reached
the highest levels of decision making, bypassing the usual checks, balances and analysis that intelligence agencies provided.
Making it worse, those who were worried about going to war
in Iraq based on flimsy facts simply could not contend with how effectively the US administration defined the problem, controlled
the information and dominated press cycles. One analysis of press
coverage over two weeks between January and February 2003 discovered that of the 393 sources quoted, half were government
officials. And when a source criticized the drumbeat for war, they were far more likely to be from foreign (including Iraqi) government officials.38
Together, these activities convinced the American population,
and good parts of the rest of the world, that Iraq posed a clear and immediate threat: the threat was inflated and people bought it.
Then there is threat simplification: the argument that the
world—or a country—can be made safer by physically eliminating
enemies one by one. This was the initial logic of the ‘war on terror’: that only a special kind of person could be a terrorist, that they were
few in number, and so if they could be killed more quickly than terrorist organizations could train them, the war would be won.39
This approach was also adopted in Iraq, when American soldiers were issued a deck of playing cards with the names and faces of 167
Indefensible.indd 167
24/05/2017 18:37
INDEFENSIBLE
the fifty-two most wanted members of the deposed regime. The
implicit logic was that once the cards had been scooped, the job was done. It didn’t work out that way: as US soldiers told DoD analysts when fighting the insurgency a few years later, that the strategy of killing ‘high-value individuals’ simply didn’t work:
When we asked about going after the high-value individuals and what effect it was having, they’d say, ‘Oh yeah, we killed that guy
last month, and we’re getting more IEDs [improvised explosive
devices] than ever.’ They all said the same thing, point blank: ‘[O]nce you knock them off, a day later you have a new guy who’s smarter, younger, more aggressive and out for revenge.’40
America was painfully relearning an old lesson: terrorism is a tactic, not an organizing principle of insurgency. Wars can be won when the military is utilized in service of a political objective, and not when politicians are required to support the military, no questions asked. Under President Obama, the US administration has quietly abandoned the language of ‘war on terror’ in favor of ‘countering violent extremism’. But the military juggernaut rolls on.
There is a long history of statesmen starting wars expecting that
they will achieve a quick, clean victory that will boost their standing
at home and their authority abroad. It rarely works out that way. The left-leaning historian Gabriel Kolko, in Century of War, attributes
European wars to the self-delusions of political leaders who believed
that they could control, and in a meaningful sense ‘win’ a war: ‘Any account of war in our times must confront the fact that the rulers of
nations have persistently exhibited a myopia that has compounded
the impact of war on the populations of innumerable countries throughout the century.’41 Had the aristocrats who plunged so
recklessly into that conflagration appreciated that the war would 168
Indefensible.indd 168
24/05/2017 18:37
Myth 7
bring down Europe’s three most powerful monarchies and forever
cripple the global imperial status of the French and British ‘victors’, as well as killing the flower of the generation of their own children, they would surely have thought twice. But they possessed no such foresight. The conservative historian Niall Ferguson, concluding his
epic The Pity of War, agrees in essence: ‘The First World War … was nothing less than the greatest error of modern history.’42
The blowback from the US funding of the Afghan mujahidin
in the 1980s has been noted. The blowback—or perhaps ‘blowaround’—from the 2003 invasion of Iraq is turning out to be far
more serious. Where do we see the most significant uptick in armed violence over the last decade? The places are all those affected by the
Iraqi civil war and attendant militant extremism (Iraq itself, Syria), or by attempts to win the ‘war on terror’ primarily by military means
(Afghanistan, Somalia, Yemen), or the fallout of Western military intervention (Libya and the Sahara). The South Sudanese civil
war is an outlier—but the South Sudanese leadership was initially
embraced by the US as a bulwark against terrorists in Khartoum
and, as described in this book, Western governments turned a blind eye to their vast and corrupt arms purchases. And Russian President Vladimir Putin explains and justifies his bellicose posture, including
his actions in Ukraine and involvement in Syria, as no more than exercising the right of national security to override international norms, as the US invoked in Iraq.
Take the conflict that has almost single-handedly pushed up
current conflict deaths to early 1990s levels, the devastating civil war in Syria. While the conflict in that country is driven by multiple
factors—a dictatorial regime, regional spillovers of extremism, an
international community that has shifted between vacillation and interference—there is no doubt that the level of violence in that
country is a direct result of decades of arms transfers to the region. 169
Indefensible.indd 169
24/05/2017 18:37
INDEFENSIBLE
As we’ve discussed previously, the spectacular success of ISIS in
Syria and more widely has in large part been facilitated by the
fact that they have been able to seize enormous quantities of arms, particularly in Iraq. There are, in fact, so many arms in the region,
and more arriving every day, that if parties want to carry on fighting, they could do so for generations.
In short, almost everywhere we see a recently escalating conflict,
the fingerprints of the global arms business and its political
fellow travelers can be found, both in provoking conflict and in profiting from it. To repeat: we do not argue that these wars are deliberately engineered by arms manufacturers and traders. But
the entanglement of the arms business in the political decisions
generating today’s wars demands our scrutiny. We cannot take the claims of the defense and security lobbies at face value.
CONCLUS IO N : IS D E FE N S E SPENDING T H E AN S WE R TO THE THRE AT S WE FACE? Even if you don’t buy all the arguments above—if you think
the world is more dangerous than ever, or at least extremely dangerous—you may still want to ask the question: is the arms
trade as it is now, and defense spending generally, part of the solution or part of the problem?
We have discussed the impact of the arms trade in its various
facets throughout the book so far. And it is clear, from the available historical evidence and current data, that the arms trade in its current
incarnation can actually make countries less secure, current conflicts more violent, and draw resources away from diplomatic efforts that can negotiate an end to wars (or prevent them happening in the first place). The arms business is also part of a wider security narrative
that inflates threats and defines them as problems to be solved by 170
Indefensible.indd 170
24/05/2017 18:37
Myth 7
military measures rather than political processes. Those who make and sell weapons aren’t honest brokers: they need to be challenged and their real motivations revealed.
Because if the arms trade is a big part of what makes the world
insecure, there simply is no wrong time to challenge the arms trade. Instead, challenging the arms trade in its current form is desperately necessary. Right now.
171
Indefensible.indd 171
24/05/2017 18:37
Indefensible.indd 172
24/05/2017 18:37
CONCLUSION
CHANGE IS POSSIBLE This is an enormous—and enormously complex—industry. Chang
ing it won’t be straightforward. We outline below how we think the
rules of the game could be changed to create more accountability, transparency and, ultimately, security. We want governments to:
Re-define the terms of the trade and the secrecy that protects it.
• Ban offsets in the arms trade. There’s a reason they’ve been banned in most other sectors.
• Halt the use of public funds and personnel to pursue private arms contracts.
• Ensure the publication of detailed, comprehensive defense budgets by all countries, with minimal ‘black’ budgets.
• Get governments to adopt the Global Principles on National
Security and the Right to Information (Tshwane Principles, 2013) into practice.
Do a better job monitoring the trade.
• Auditing and accountability processes for departments of defense and the companies that they use. 173
Indefensible.indd 173
24/05/2017 18:37
INDEFENSIBLE
• Accountability for corporations and governments when they
don’t do a good enough job of keeping their exported product controlled.
• Proper investigations and follow-up on allegations of corruption without political interference.
• Sanctions against companies found guilty of corruption.
• Imposition of a legal obligation that defense contractors reveal the intermediaries they use in deals: the publication of the names
of agents, brokers and middlemen used to negotiate deals, what they are paid and what they do for that money.
• Publicize the names and behavior of companies and their subsidiaries implicated in quid pro quo corruption.
• Increase penalties against individuals and companies so that they serve as a deterrent.
Align expenditures with real threats, while reducing waste.
• Adopt transparency in defense strategies and procurement
processes; show how expenditures on systems and programs align with the threats to national security that have been identified.
• Reductions in military expenditures.
• Regional coordination of defense reductions.
• Never pressure countries that have opted out of excessive defense expenditure to opt in.
S O WHAT C A N WE D O ABOUT IT ? This is a problem of enormous proportions, well-funded and powerful, with deep historical and institutional roots. Faced with
this seemingly overwhelming advantage, it is easy to fall into apathy or despair. What, after all, can an individual do to change a systemic problem?
174
Indefensible.indd 174
24/05/2017 18:37
Conclusion
Not much. But we are not merely individuals. We are the
beginning of an international network that will share innovation, resources and practices to make defense industry players conform
to basic standards of accountability and openness, and ensure
governments allocate funds to defense (or to alternative sectors) in ways that meet the real needs of their citizens.
So how do we get there? There is not going to be a tidy checklist.
There are a lot of things that need to be changed. This is how we get started:
First, learn to recognize the myths and dispute them. Stop
engaging in the mythology of the arms business. The first step in this process is to generate an informed public debate about the global arms industry, its business model and practices, and its stated justifications.
Second, several of the myths point us in the direction of seeking
long-term, sustainable approaches to security, rather than panicdriven kneejerk responses. They suggest a different set of questions
to guide policy: how are today’s threats different from past
threats and what does this mean for our countries’ needs, and our
world’s needs?
Knowing that weapons, allies and contexts are unstable, and that
weapons control regimes are inadequate, we should ask: what are
the long-term consequences of today’s deals? Spending does not necessarily lead to security. Spending on the wrong type of military
equipment will not increase security; and worse, spending on defense can divert public funds away from more effective uses. If we
need to create jobs and stimulate the economy, that concern should
take precedence; but we should look to other sectors that create more jobs, and more civilian technology, than defense.
The question to start with should be: What is the most effective
use of public funds to increase sustainable human security? 175
Indefensible.indd 175
24/05/2017 18:37
INDEFENSIBLE
Third, demand transparency. Partisan economic and political
interests, not concern with public security, often dominate arms trade decisions.
Transparency is the best way to combat this tendency. Demand
it not only within your own government, but also in how your government and private corporations engage in security sector
assistance and arms deals with foreign countries. National security does not require secrecy. The greatest security a country can experience is through transparent and accountable democratic
practices. There may be need for some secrecy, but it should always
be the exception and never be used to hide improper influence, misbehavior or grand larceny. Support groups in other countries that are also advocating for transparency and find ways to work
together at the intersection of trade deals. Take a look at the Stop the Shipment campaign for inspiration: it is a campaign that attempted, through putting pressure on various governments and international organizations, to stop a contemporaneous shipment of tear gas to the notoriously repressive Bahraini regime.
Fourth, demand accountability. Corruption is endemic to the trade;
it is a problem for every society that engages in arms transactions, producers and purchasers alike.
Some countries have good laws to govern corruption and
accountability; make sure they are being applied. Support whistle
blowing that reveals corruption and overreach. The levers of accountability as they currently exist in even the most law-governed countries are insufficient, a fact that is proven time and again when
oversight functions as a rubber stamp. Whistleblowers risk their
livelihoods and freedom to expose this fact and deserve our support. Fifth, following the leadership of local advocates, we can act
in solidarity with each other. There will be specific strategies, needs and avenues for engagement that make sense for different contexts. 176
Indefensible.indd 176
24/05/2017 18:37
Conclusion
For instance, in the US, pressuring Congress to commit to return
military spending to pre-911 levels and demanding increased, rather than decreased, regulation of the trade would have a major
impact. In Nigeria, the place to start may be budget transparency and an end to ‘security votes’. In many countries, enabling the voice of civil society to criticize and oversee the defense sector is the first crucial step.
Together, we can foster an evidence-driven, accountable and
transparent public discussion of the global arms business. Together, we can start pointing out the absurdities that protect a business to
the detriment of the security and economic prosperity of the world. By doing so, we can make the world a safer, more prosperous and more harmonious place.
177
Indefensible.indd 177
24/05/2017 18:37
NOTE S
IN T RO DUC T I O N 1 Stockholm International Peace Research Institute (SIPRI), Trends in World Military Expenditure, 2015, SIPRI Fact Sheet, 2016, accessed May 27, 2016, http://books.sipri.org/files/FS/SIPRIFS1604.pdf. MY TH 1 1 SIPRI, Trends in World Military Expenditure, 2015. 2 Ibid. 3 Ibid. 4 Michael Intrilligator,“The Concept of a Peace Dividend,” in Economics of Peace and Security, edited by J. Galbraith, J. Brauer, and L. Webster, Encyclopedia of Life Support Systems (EOLSS), developed under the auspices of UNESCO (Paris: EOLSS Publishers, 2002), http://www.eolss. net. 5 Extrapolated from SIPRI, SIPRI Military Expenditure Database 2015, accessed May 27, 2016, http://www.sipri.org/databases/milex. 6 Ibid. 7 SIPRI, Trends in World Military Expenditure 2014, SIPRI Fact Sheet, 2015, accessed May 26, 2016, http://www.sipri.org/media/pressreleases/2015/ milex-april-2015. 8 SIPRI, Trends in World Military Expenditure, 2015. 9 SIPRI,Trends in World Military Expenditure 2013, SIPRI Fact Sheet, 2014, accessed May 27, 2016, http://www.sipri.org/research/armaments/milex/ recent-trends. 10 “China’s Military Spending: At the Double,” The Economist, March 15, 2014, accessed May 27, 2016, http://www.economist.com/news/china/21599046chinas-fast-growing-defence-budget-worries-its-neighbours-not-everytrend-its-favour. 11 Will Ripley, Jason Hanna and Eimi Yamamitsu, “Japanese lawmakers OK greater overseas role for military,” CNN, 1 September 19, 2015, accessed 178
Indefensible.indd 178
24/05/2017 18:37
notes TO MY T H 1
May 27, 2016, http://www.cnn.com/2015/09/18/asia/japan-militaryconstitution/. 12 Jack Doyle, “Russia’s Military Spending Spree,” USA Today, April 22, 2014, accessed May 27, 2016, http://www.usatoday.com/story/news/ world/2014/04/22/ozy-russia-military-spending/8005713/. 13 SIPRI,Trends in World Military Expenditure, 2015. 14 Todd Harrison, Analysis of the FY 2015 Defense Budget (Washington, DC: Centre for Strategic and Budgetary Assessments, 2014) 16, accessed May 27, 2016, http://csbaonline.org/publications/2014/09/analysis-of-the-fy2015defense-budget/. 15 “Recent Defense Spending,” accessed October 4, 2015, http://www. usgovernmentspending.com/defense_spending. 16 K. Mizokami, “How the Pentagon Exaggerated Russia’s Cold War Wonder Weapons,” War is Boring, October 7, 2013. https://warisboring. com/how-the-pentagon-exaggerated-russias-cold-war-wonder-weaponsd14c47e51c31#.cfauly45l. 17 “United States Department of Defense Fiscal Year 2016 Budget Request: Overview,” Office of the Under Secretary of Defense (Comptroller) Chief Financial Officer, February 2015, 1‒2, accessed May 25, 2016, http:// comptroller.defense.gov/Portals/45/Documents/defbudget/fy2016/ FY2016_Budget_Request_Overview_Book.pdf. 18 Andrea Shalal-Esa, “Exclusive: U.S. Sees Lifetime Cost of F-35 Fighter at $1.45 Trillion,” Reuters, March 29, 2012, accessed May 27, 2016, http://www. reuters.com/article/us-lockheed-fighter-idUSBRE82S03L20120329. 19 Anne Daugherty Miles, “Intelligence Spending: In Brief,” Congressional Research Service, February 26, 2016, accessed May 27, 2016, https://www.fas. org/sgp/crs/intel/R44381.pdf. 20 For a robust discussion of the security dilemma, see the texts that are considered to have helped develop the concept: Herbert Butterfield, History and Human Relations (London: Collins, 1951); John Herz, Political Realism and Political Idealism: A Study in Theories and Realities (Chicago: University of Chicago Press, 1951); Robert Jervis, Perception and Misperception in International Politics (Princeton, NJ: Princeton University Press, 1976). 21 The direct correlation between arms races and conflict was a muchcontested topic during the late 1970s and early 1980s. The outcome of the debate is still not settled, but it is clear that a simple linear relationship between arms races and conflicts is too simple. See, for example: Paul F. Diehl, “Arms Races and Escalation: A Closer Look,” Journal of Peace Research 20, no. 3 (1983): 205‒212. A more recent study, also showing that a link between arms races and conflict is far from linear, is Susan Sample, 179
Indefensible.indd 179
24/05/2017 18:37
INDEFENSIBLE
“Military Build-ups: Arming and War,” in What Do We Know About War?, ed. John Vasquez (Lanham: Rowman and Littlefield, 2000): 165–197. 22 David Pilling, “Asia Follows China Into an Old-Fashioned Arms Race,” Financial Times, April 2, 2014, accessed May 27, 2016, http://www.ft.com/ cms/s/0/9d83bf62-b9b9-11e3-a3ef-00144feabdc0.html#axzz4AFe0QdKC; Vaishali Gauba, “Asia Defense Spending: New Arms Race in the South China Sea,” CNBC, May 21, 2015, accessed May 27, 2016, http://www.cnbc. com/2015/05/21/asia-defense-spending-new-arms-race-in-south-chinasea.html. 23 That the US is concerned about China’s ‘anti-intervention’ or ‘access denial strategies’ was confirmed by the Secretary of Defense in 2012. See: “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China,” Office of the Secretary of Defense, May 21, 2012, accessed May 27, 2016, http://www.defense.gov/Portals/1/Documents/ pubs/2012_CMPR_Final.pdf. 24 Ibid. 5. 25 Franz-Stefan Gady, “What do Chinese and Russians Think of the US Military?” The Diplomat, January 6, 2015, accessed May 27, 2016, http:// thediplomat.com/2015/01/what-do-chinese-and-russians-think-of-the-us-military/. 26 For a comprehensive presentation of the problems with the littoral combat ship, see: Jacob Marx, “Littoral Combat Ship: The Warship That Can’t Go to War,” Centre for International Policy, Policy Brief, August 2014, accessed May 27, 2016, http://www.ciponline.org/images/uploads/publications/ Littoral_Combat_Ship.pdf. The following discussion of the littoral combat ship draws from this source. 27 Ibid. 28 Ronald O’Rourke, “Navy Littoral Combat Ship (LCS)/Frigate Program: Background and Issues for Congress,” Congressional Research Service, May 25, 2016, accessed May 27, 2016, https://www.fas.org/sgp/crs/weapons/ RL33741.pdf. 29 Defense Industry Daily Staff, “Scorpene’s Sting: Malaysia’s Bribery & Murder Scandal,” Defense Industry Daily, March 20, 2013, accessed May 27, 2016, http://www.defenseindustrydaily.com/scorpenes-sting-liberationpublishes-expose-re-malaysias-bribery-murder-scandal-05347/. 30 AFP, “Policeman says may reveal all in Malaysia murder scandal,” Daily Mail, February 18, 2015, accessed May 27, 2016, http://www.dailymail. co.uk/wires/afp/article-2958091/Policeman-says-reveal-Malaysia-murderscandal.html. 31 Asia Sentinel Correspondent, “Deep and Dirty: Malaysia’s Submarine 180
Indefensible.indd 180
24/05/2017 18:37
notes TO MY T H 1
Scandal,” Asia Sentinel, June 25, 2012, accessed May 27, 2016, http://www. asiasentinel.com/politics/deep-and-dirty-malaysias-submarine-scandal/. 32 Julian Khoo, “Zahid: Our Submarine Can’t Dive,” Malaysia Today, February 11, 2010, accessed May 27, 2016, http://www.malaysia-today.net/zahid-oursubmarine-cant-dive/. 33 For a detailed analysis of the costs of the wars in Iraq and Afghanistan see: Neta C. Crawford, “U.S. Costs of Wars Through 2014: $4.4 Trillion and Counting—Summary of Costs for the U.S. Wars in Iraq, Afghanistan and Pakistan,” Costs of War Project, Watson Institute of International and Public Affairs, Brown University, June 25, 2014, accessed May 27, 2016, http://watson.brown.edu/costsofwar/files/cow/imce/papers/2014/US%20 Costs%20of%20Wars%20through%202014.pdf. See also: Linda J. Bilmes, “The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets,” Harvard Kennedy School Faculty Research Working Group Series Paper RWP13-006, March 2013, accessed May 31, 2016, https://research.hks.harvard. edu/publications/workingpapers/citation.aspx?PubId=8956. Bilmes puts the full costs of the Iraq and Afghan wars, including legacy costs like the costs of taking care of the hundreds of thousands of veterans from the wars, at $4‒$6trn. 34 On the concept and reality of blowback, see: TimWeiner, “Blowback From the Afghan Battlefield,” New York Times Magazine, March 13, 1994, accessed May 31, 2016, http://www.nytimes.com/1994/03/13/magazine/ blowback-from-the-afghan-battlefield.html?pagewanted=all. 35 Tim Weiner, “The CIA’s Leaking Pipeline,”Philadelphia Inquirer, February 28, 1988, accessed May 31, 2016, http://articles.philly.com/1988-02-28/ news/26243788_1_afghan-rebels-arms-pipeline-afghan-operation. See also the section titled “The Afghan Arms Pipeline through Pakistan” in Human Rights Watch, India: Arms and Abuses in Indian Punjab and Kashmir (New York: Human Rights Watch, 1994), accessed May 31, 2016, https://www. hrw.org/sites/default/files/reports/INDIA949.PDF. 36 Kenneth Katzman, “Al Qaeda: Profile and Threat Assessment,” Congressional Research Service, August 17, 2005, accessed May 31, 2016, https://www.fas.org/sgp/crs/terror/RL33038.pdf. Katzman provides a brief chronology of the emergence of Al Qaida from the foreign fighters who had been recruited to fight against the Soviet occupation of Afghanistan. 37 Human Rights Watch, Afghanistan: Crisis of Impunity: The Role of Pakistan, Russia and Iran in Fuelling the Civil War (New York: Human Rights Watch, 2001), accessed May 31, 2016, https://www.hrw.org/reports/2001/afghan2/ Afghan0701.pdf. 181
Indefensible.indd 181
24/05/2017 18:37
INDEFENSIBLE
38 For global rankings in 2013, see: Freedom House, Freedom in the World 2014 (Washington, DC: Freedom House, 2014), 18‒23, accessed May 31, 2016, https://freedomhouse.org/report/freedom-world/freedom-world-2014. 39 Three-quarters of countries classified as “free” and 69% of countries classified as “partly free” spend less than 2% of their GDP on the military. Compare this to countries classified as “not free”: a smidgeon under half of these countries spend more than 2% of GDP on the military, and 23% do not disclose their military budgets at all. Of these “not free” states, only 27% spend less than 2% of their GDP on military expenditures. 40 Anthony H. Cordesman with Michael Peacock, Centre for Strategic and International Studies, The Arab‒US Strategic Partnership and the Changing Security Balance in the Gulf (Lanham, MD: Rowman and Littlefield, 2015), 13, accessed May 31, 2016, https://csis-prod.s3.amazonaws. com/s3fs-public/legacy_files/files/publication/151014_Cordesman_ ArabUSStrategicPartnership_Web.pdf. 41 Jens Gould, “The Failure of Plan Colombia,” The American Prospect, April 19, 2007, accessed May 31, 2016, http://prospect.org/article/failureplan-colombia; Adam Isaacson, Lisa Haugaard and Jennifer Johnson, A Cautionary Tale: Plan Colombia’s Lessons for U.S. Policy Toward Mexico and Beyond (Washington, DC: Center for International Policy, Latin America Working Group Education Fund, and Washington Office on Latin America, 2011), accessed May 31, 2016, http://www.wola.org/ publications/a_cautionary_tale_plan_colombias_lessons_for_us_policy_ toward_mexico_and_beyond. 42 David F. Gordon, Donald Noah and George Fidas, National Intelligence Estimate: The Global Infectious Disease Threat and Its Implications for the United States (Washington, DC: National Intelligence Council, Wilson Center, 2000), accessed May 31, 2016, https://www.wilsoncenter.org/ publication/national-intelligence-estimate-the-global-infectious-diseasethreat-and-its-implications. 43 Christopher J.L. Murray, Michael Hanlon and Joseph Dieleman, Financing Global Health 2012: The End of the Golden Age? (Seattle, WA: Institute for Health Metrics and Evaluation, 2012), 6, accessed May 31, 2016, http:// www.healthdata.org/policy-report/financing-global-health-2012-endgolden-age. 44 Embassy of the United States of America, Monrovia, “First Shipment of the Ramped Up U.S. Military Response to Ebola Arrives in Liberia,”United States Africa Command, September 19, 2014, accessed May 31, 2016, http:// www.africom.mil/newsroom/article/23586/first-shipment-of-the-rampedup-u-s-military-response-to-ebola-arrives-in-liberia. 182
Indefensible.indd 182
24/05/2017 18:37
notes TO MY T H 1
45 United States Department of Defense, “Operation United Assistance at a Glance,” 2015, accessed June 8, 2015, http://www.defense.gov/home/ features/2014/1014_ebola/. 46 UN News Service, “UN Budget Committee Approves Funding for UN Ebola Response Mission,” UN News Centre, October 7, 2014, accessed May 31, 2016, http://www.un.org/apps/news/story.asp?NewsID=49021#. VXW1YNJVhBe. 47 Kevin Sieff, “US-built Ebola Treatment Centers in Liberia are Nearly Empty as Outbreak Fades,” Washington Post, January 18, 2015, accessed June 1, 2016, https://www.washingtonpost.com/world/africa/us-builtebola-treatment-centers-in-liberia-are-nearly-empty-as-disease-fades/ 2015/01/18/9acc3e2c-9b52-11e4-86a3-1b56f64925f6_story.html. 48 The Pentagon’s base budget plus allocations for the wars in Iraq and Afghanistan came to $575 billion for FY2015—see: Lawrence J.Korb, Max Hoffman and Katherine Blakeley, A User’s Guide to the Fiscal Year 2015 Defense Budget (Washington, DC: Center for American Progress, 2014), accessed May 31, 2016, https://www.americanprogress.org/issues/security/ report/2014/04/24/88516/a-users-guide-to-the-fiscal-year-2015-defensebudget/. The Budget for the Department of State and related Agency for International Development, including costs related to the costs of the wars in Iraq and Afghanistan, was $47.8bn or about 7% of what is spent for military purposes. For state figures, see: United States Department of State, “Department of State and Other International Programs,” US Department of State, 2014, accessed June 1, 2016, https://www.whitehouse. gov/sites/default/files/omb/budget/fy2014/assets/state.pdf. Lockheed Martin received over $44bn in government contracts in Fiscal Year 2013, according to data provided by the Federal Procurement Data Center. 49 See: Jeffrey Dixon, “Emerging Consensus: Results from the Second Wave of Statistical Studies on Civil War Termination,” Civil Wars 11, no. 2 (2009): 128; Bethany Lacina, “Explaining the Severity of Civil Wars,” Journal of Conflict Resolution, 50, no. 2 (2006): 286. 50 Julien Barnes-Dacey and Daniel Levy, The Regional Struggle for Syria (London: European Council on Foreign Relations, 2013), accessed June 1, 2016, http://www.ecfr.eu/page/-/ECFR86_SYRIA_REPORT.pdf. See also: Jihad Yazigi, Syria’s War Economy (London: Council on Foreign Relations, 2014), accessed June 1, 2016, http://www.ecfr.eu/page/-/ ECFR97_SYRIA_BRIEF_AW.pdf. 51 Seth Jones and Martin Libicki, How Terrorist Groups End (Santa Monica, CA: Rand Corporation, 2008), 107, accessed June 1, 2016, http://www.rand. org/content/dam/rand/pubs/monographs/2008/RAND_MG741-1.pdf. 183
Indefensible.indd 183
24/05/2017 18:37
INDEFENSIBLE
52 Ibid. 53 Ibid., 19. 54 Ibid., xvii. 55 Jonathan Powell, Talking to Terrorists: How to End Armed Conflicts (London: Random House, 2015). 56 ‘Windhoek Declaration’ issued at the 6th Annual Retreat of Special Envoys and Mediators on the Promotion of Peace, Security and Stability in Africa, Windhoek, Namibia, October 21‒22, 2015, http://www.peaceau. org/uploads/auc-mediation-retreat-windhoek-declaration-22-10-2015.pdf. See, in particular, paragraph 12. 57 See Vali Nasr, The Dispensable Nation: American Foreign Policy in Retreat (New York: Doubleday, 2013), 34, in which General Petraeus refers to Ambassador Richard Holbrooke as his ‘wingman’, prompting Holbrooke to ask, ‘since when have diplomats become generals’ wingmen?’ 58 United Nations Trust Fund for Human Security, “Human Security for All,” accessed June 8, 2015, http://www.un.org/humansecurity/about-humansecurity/human-security-all. 59 Bill& Melinda Gates Foundation, “What We Do: Vaccine Delivery Strategy Overview,” accessed June 8, 2015, http://www.gatesfoundation. org/What-We-Do/Global-Development/Vaccine-Delivery. 60 World Food Programme, “Hunger Statistics,” accessed June 8, 2015, http:// www.wfp.org/hunger/stats. 61 Federal Democratic Republic of Ethiopia, Foreign Affairs and National Security Policy and Strategy (Addis Ababa: Ministry of Information, 2002), accessed June 1, 2016, http://www.ethiopiaembassy.ru/pages/docs/Foreign_ Police_English.pdf. 62 Robin Webster, “Degrees of Change: The IPCC’s Projections for Future Temperature Rise,” The Carbon Brief Blog, April 15, 2014, accessed June 1, 2016, http://www.carbonbrief.org/degrees-of-change-the-ipccs-projectionsfor-future-temperature-rise. 63 Intergovernmental Panel on Climate Change, Climate Change 2014: Impacts, Adaptation, and Vulnerability (Cambridge: Cambridge University Press, 2014). MY TH 2 1 Winslow Wheeler, “The Jet That Ate the Pentagon,” Foreign Policy, April 26, 2012, accessed June 1, 2016, http://foreignpolicy.com/2012/04/26/thejet-that-ate-the-pentagon/. 2 Ibid. 3 “The Air Force’s F-35A: Not Ready For Combat, Not Even Ready for 184
Indefensible.indd 184
24/05/2017 18:37
notes TO MY T H 2
Combat Training,” Project on Government Oversight Blog, March 6, 2013, accessed June 1, 2016, http://www.pogo.org/blog/2013/03/20130306-airforces-f-35a-not-ready-for-combat.html. 4 Wheeler, “The Jet That Ate the Pentagon.” 5 Lockheed Martin, “Powering Job Creation for America and its Allies,” accessed June 1, 2016, https://www.f35.com/about/economic-impact. 6 Ibid. 7 Ibid. 8 William D. Hartung, Promising the Sky: Pork Barrel Politics and The F-35 Combat Aircraft (Washington, DC: Centre for International Policy, 2014), 1, accessed June 1, 2016, http://www.ciponline.org/images/uploads/ publications/Hartung_IPR_0114_F-35_Promising_the_Sky_Updated.pdf. 9 David Axe, “Jet Fighter Influence: How Lockheed’s Public Relations Efforts Keep the F-35 Sold,” Offiziere Blog, March 6, 2013, accessed June 1, 2016, http://www.offiziere.ch/?p=11420. 10 Hartung, “Promising the Sky,” 5. 11 Ibid, 6. 12 Ibid. 13 TaxPayers for Common Sense, “The Unaffordable F-35: Budget History and Alternatives,” April 2014, 2, accessed June 1, 2016, http://www.taxpayer. net/images/uploads/Alternatives%20to%20the%20F35(1).pdf. 14 Barack Obama, “Video Remarks by The President to the Department of Commerce Annual Export Controls Update Conference,” The White House Office of the Press Secretary, August 30, 2010, accessed May 17, 2016, https://www.whitehouse.gov/the-press-office/2010/08/30/video-remarkspresident-department-commerce-annual-export-controls-updat. 15 William D. Hartung, Risk and Reforms: The Economic Illogic of the Obama Administration’s Arms Export Reforms (Washington, DC: Centre for International Policy, 2013), accessed June 1, 2016, http://www.ciponline. org/research/html/risk-and-returns-the-economic-illogic-of-the-obamaadministrations-arms-exp. 16 William D. Hartung, “Just How Many Weapons Can America Sell?” Foreign Policy, July 2, 2013, accessed June 1, 2016, http://foreignpolicy. com/2013/07/02/just-how-many-weapons-can-america-sell/. 17 Ibid. 18 Letter from International Association of Machinists and Aerospace Workers to The House Committee on Foreign Affairs, March 19, 2013,submitted for the record by the Honorable Brad Sherman (California) during Hearing Before the Committee on Foreign Affairs (House of Representatives), One Hundred Thirteenth Congress, First Session, 24 185
Indefensible.indd 185
24/05/2017 18:37
INDEFENSIBLE
April 2013, accessed June 1, 2016, https://archive.org/stream/799020house-hearing-on-export-controls/799020-house-hearing-on-exportcontrols_djvu.txt. 19 The EU Commission, for example, is currently discussing whether or not to ban offsets in EU-to-EU deals. 20 World Trade Organization, Agreement on Public Procurement: Article XXIII (Uruguay Round Agreement), 2014, http://www.wto.org/english/ docs_e/legal_e/gpr-94_02_e.htm. 21 “Guns and Sugar,” The Economist, May 25, 2013, accessed June 1, 2016, http:// www.economist.com/news/business/21578400-more-governments-areinsisting-weapons-sellers-invest-side-deals-help-them-develop. 22 Travis K.Taylor, “Countertrade Offsets in International Procurement: Theory and Evidence,” in Designing Public Procurement Policy in Developing Countries, ed. Murat A. Yulek and Travis K. Taylor (New York: Springer Science and Business Media, 2011), 27. 23 Ibid, 30. 24 “Guns and Sugar.” 25 Control Risks, International Business Attitudes Towards Corruption— Survey 2006 (London: Control Risks and Simmons & Simmons, 2006), 8, accessed June 1, 2016, http://www.csr-asia.com/summit07/presentations/ corruption_survey_JB.pdf. 26 Comptroller and Auditor General of India, “Report of the Auditor General of India on Acquisition of Helicopters for VVIPS,” Union Government: Defense Services (Air Force), No. 10 of 2013, August 13, 2013, accessed June 1, 2016, http://www.cag.gov.in/sites/default/files/audit_report_files/ Union_Defence_Compliance_Report_10_2013.pdf. 27 “Scrapping of VVIP Helicopter Deal,” Answer by Minister of Defense AK Antony to Unstarred Question 2210 by Arvind Kumar Singh in Rajya Sabha (Council of States), February 12, 2014. See Rajya Sabha’s website: http://rajyasabha.nic.in/. 28 Tom Kington, “Court Reverses Former Finmeccanica CEO Orsi’s Acquittal,” DefenseNews, April 7, 2016, accessed June 1, 2016, http://www. defensenews.com/story/defense/international/europe/2016/04/07/courtreverses-former-finmeccanica-ceo-orsis-acquittal/82767690/. 29 “‘Target’ Sonia’s Closest Advisers, Key Middleman Told Officials of AgustaWestland,” Indian Express, February 5, 2014, accessed June 1, 2016, http://indianexpress.com/article/india/politics/target-closest-advisersof-sonia-gandhi-for-vvip-chopper-deal-key-middleman-told-agusta westland/ and Order by Judge Ajay Kumar Jain, “CBI Vs. S.P. Tyagi,” RC No. 2172013A0003, Patiala House Court New Delhi, 2–3. 186
Indefensible.indd 186
24/05/2017 18:37
notes TO MY T H 2
30 Justin Vela, “Saudi Arabia becomes World’s Fourth Biggest Military Spender,” The National (Abu Dhabi), April 14, 2014, accessed June 1, 2016, http://www.thenational.ae/world/saudi-arabia/saudi-arabia-becomesworlds-fourth-biggest-military-spender. 31 William Maclean, “Saudi Arabia Outpaces India to Become Top Defense Importer,” Reuters, March 8, 2015, accessed June 1, 2016, http://www.reuters. com/article/us-defence-supplies-saudi-idUSKBN0M40FY20150308. 32 Extrapolated from data provided by SIPRI. 33 Saudi Arabia Constitution, Chapter 2, Articles 5 and 6. 34 Amnesty International, “The Ultimate Punishment: Saudi Arabia Ramps Up Beheadings in the Kingdom,” April 6, 2015, accessed July 15, 2015, https:// www.amnesty.org/en/latest/news/2015/04/the-ultimate-punishmentsaudi-arabia-ramps-up-beheadings-in-the-kingdom/. 35 “European Parliament Resolution of 25 February 2016 on the Humanitarian Situation in Yemen,” 2016/2515(RSP), accessed June 1, 2016, http://www. europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML +TA+P8-TA-2016-0066+0+DOC+PDF+V0//EN. 36 BAE’s 2014 annual report credits Saudi Arabia as its third largest customers, representing 20% of its sales in 2014 (p. 8): BAE Systems, “Annual Report 2014,” accessed June 1, 2016, http://investors.baesystems.com/~/media/ Files/B/Bae-Systems-Investor-Relations-V3/Annual%20Reports/baeannual-report-2014.pdf. 37 Transparency International, “Government Defence Anti-Corruption Index Regional Results: Middle East & North Africa,” 2015, 6. http:// government.defenceindex.org/downloads/docs/GI-MENA-RegionalResults-web.pdf. 38 Numerous notorious arms dealers, such as Leonid Minin and Viktor Bout, sourced their small arms from Ukrainian stockpiles. 39 Dave Gilson, “Ukraine: Cashing in on Illegal Arms,” PBS, May 2002, accessed June 1, 2016, http://www.pbs.org/frontlineworld/stories/sierraleone/ context.html. 40 Sarah Chayes, “How Corruption Guts Militaries: The Ukraine Case Study,” DefenseOne, May 16, 2014, accessed June 1, 2016, http://www. defenseone.com/ideas/2014/05/how-corruption-guts-militaries-ukrainecase-study/84646/. 41 Leonid Polyakov, “Corruption Obstructs Reform in the Ukrainian Armed Forces,” in Almanac on Security Sector Governance in Ukraine 2012, ed. Joseph L. Derdzinski and Valeriya Klymenko (Geneva and Kyiv, Ukraine: DCAF, Razumkov Centre, and “Zapovit” Publishing House, 2012), 81. 42 Rowan Scarborough, “Now They Want Our Help? Ukraine Military SOLD its Best Weapons for Cash,” The Washington Times, April 23, 2014, 187
Indefensible.indd 187
24/05/2017 18:37
INDEFENSIBLE
accessed June 1, 2016, http://www.washingtontimes.com/news/2014/ apr/23/sold-out-ukraines-leadership-swapped-best-military/?page=all; Chayes, ‘How Corruption Guts Militaries.” 43 “South Sudan’s Kiir Accuses Army of Corruption,” Sudan Tribune, September 20, 2013. MY TH 3 1 For those with a strong stomach, the history of the Iran-Contra affair is fully described in all its dastardly depredations in the 1987 Report of the Congressional Committees Investigating the Iran-Contra Affair. 2 George Lardner Jr., “Gonzalez’s Iraq Expose—Hill Chairman Details US Prewar Courtship,” Washington Post, March 22, 1992. 3 The full story of the BNL scandal can found in William D. Hartung, And Weapons For All (New York: Harper Perennial, 1995). 4 Howard Teicher’s Affidavit in the Matter of United States of America v. Carlos Cardoen and Others, Case No: 93-241-Highsmith, paragraph 8, January 31, 1995, accessed June 1, 2016, http://nsarchive.gwu.edu/NSAEBB/ NSAEBB82/iraq61.pdf. 5 Campaign Against Arms Trade, Arming Saddam: The Supply of British Military Equipment to Iraq 1979‒1990 (London: Campaign Against Arms Trade, 1991). 6 Ibid. The 26 countries identified were Austria, Belgium, Brazil, Britain, Bulgaria, Chile, China, Czechoslovakia, East Germany, France, West Germany, Greece, Hungary, Italy, North Korea, the Netherlands, Pakistan, Poland, Portugal, South Africa, Spain, Sweden, Switzerland, the USA, the Soviet Union and Yugoslavia. 7 Ibid. 8 US Senate Committee on Banking, Housing, and Urban Affairs, Second Staff Report on US Chemical and Biological Warfare-Related Dual-Use Exports to Iraq and the Possible Impact on the Health Consequences of the War, 1995. 9 Ibid, Chapter 1. 10 Ibid, Chapters 2 and 3. 11 SIPRI, TIV-Import Database, 2015, accessed March 1, 2016, http://www. sipri.org/databases/armstransfers/background. Note that the SIPRI TIV database does not provide a figure for the actual amount spent on arms imports. Instead, SIPRI calculates, in constant 1990 dollars, how much it would cost to produce the same systems in the US (where unit costs are well-known). This gives a good sense of the volume of the trade, but it is not entirely accurate to say that the same dollar amount was actually spent. 188
Indefensible.indd 188
24/05/2017 18:37
notes TO MY T H 3
12 Ibid. 13 SIPRI, TIV-Import Database. 14 Pratap Chatterjee, “One Million Weapons to Iraq; Many Go Missing,” CorpWatch, September 22, 2008, accessed June 1, 2016, http://www. corpwatch.org/article.php?id=15184. 15 Christopher Harress, “ISIS Weapons Growing in Number, Sophistication: A Soviet, Balkan and American Mix, but the Group Can’t Use All of Them,” International Business Times, August 15, 2014, accessed June 1, 2016, http://www.ibtimes.com/isis-weapons-growing-number-sophisticationsoviet-balkan-american-mix-group-cant-use-all-1659176. 16 Michael Pregent and Michael Weiss, “Exploiting ISIS Vulnerabilities in Iraq,” The Wall Street Journal, August 12, 2014, accessed June 1, 2016, http:// www.wsj.com/articles/michael-pregent-and-michael-weiss-exploitingthe-isis-vulnerabilities-in-iraq-1407884145. 17 The Islamic State and the Levant and the Al-Nusrah Front for the People of Levant: Report and Recommendations Submitted Pursuant to Resolution 2170 (2014), S/2014/815, paragraph 39. 18 Ibid, paragraph 41. 19 Pregent and Weiss, “Exploiting ISIS Vulnerabilities in Iraq.” 20 The Islamic State and the Levant and the Al-Nusrah Front for the People of Levant: Report and Recommendations Submitted Pursuant to Resolution 2170 (2014), S/2014/815, paragraph 37. 21 Nabih Bulos, Patrick J. McDonnell and Raja Abdulrahim, “ISIS Weapons Windfall May Alter Balance in Iraq, Syria Conflicts,”LA Times, June 29, 2014, accessed June 1, 2016, http://www.latimes.com/world/middleeast/lafg-iraq-isis-arms-20140629-story.html. 22 Conflict Armament Research, Dispatch from the Field: Islamic State Ammunition in Iraq and Syria (London: Conflict Armament Research, 2014), 5, accessed June 1, 2016, http://www.conflictarm.com/wp-content/ uploads/2014/10/Dispatch_IS_Iraq_Syria_Ammunition.pdf. 23 United Nations Security Council, “Report of the Panel of Experts on Somalia Pursuant to Security Council Resolution 1425 (2002),”2003, S/2003/223, 13; Jeffrey A. Lefebvre, Arms for the Horn: U.S. Security Policy in Ethiopia and Somalia, 1953–1991 (Pittsburg, PA: University of Pittsburg Press, 1991), 280‒281. 24 Ibid. 25 Lionel Cliffe, Armed Violence and Poverty in Somalia: A Case Study for the Armed Violence and Poverty Initiative (Bradford, UK: Centre for International Cooperation and Security and University of Bradford, 189
Indefensible.indd 189
24/05/2017 18:37
INDEFENSIBLE
Department for Peace Studies, 2005), 8, accessed June 1, 2016, https:// bradscholars.brad.ac.uk/handle/10454/1002. 26 Andrew Feinstein, The Shadow World: Inside the Global Arms Trade (New York: Picador, 2012), 468. 27 Abdi Sheikh, “Arms Dealers Revel in Somali War Business,”Reuters, June 9, 2009, accessed June 1, 2016, http://www.reuters.com/article/us-armssomalia-idUSTRE5582RR20090609. 28 United Nations Security Council, “Report of the Panel of Experts on Somalia Pursuant to Security Council Resolution 1425 (2002)”, S/2003/ 223, 14. 29 Laura Rozen, “Israeli, American Indicted for Gun Running to Somalia,” Politico, 28 June, 2010, accessed June 1, 2016, http://www.politico.com/ blogs/laurarozen/0610/Israeli_American_indicted_for_gun_running_to_ Somalia.html. 30 United States District Court, Southern District of Florida, Indictment in the matter of United States of America v. Joseph O’Toole and Chanoch Miller, Case No: CR-COHN, June 17, 2010. 31 CNN Wire Staff, “Al-Shabaab Joining Al Qaeda, Monitor Group Says,” CNN, February 10, 2012, accessed June 1, 2016, http://www.cnn. com/2012/02/09/world/africa/somalia-shabaab-qaeda/. 32 Louis Charbonneau, “Exclusive: Somalia Army Weapons Sold on Open Market—UN Monitors,” Reuters, October 10, 2014, accessed June 1, 2016, http://www.reuters.com/article/us-somalia-arms-un-idUSKCN0 HZ22920141010. 33 “Somalia Diverting Arms to al-Shabaab, UN Report Claims,” BBC News, February 14, 2014, accessed June 1, 2016, http://www.bbc.com/news/worldafrica-26200015. 34 Charbonneau, “Exclusive: Somalia Army Weapons Sold on Open Market.” 35 The phrasing here is intentional: it is not quite accurate to say that Libya spent $30bn on arms. This is because the figures are drawn from the SIPRI database, which does not track the actual cost of weapons imports, but tracks the volume of weapons imports (some of which are given as aid or in discounts). SIPRI puts a dollar value on the amount by calculating how much it would cost for the US to produce specific systems. As such, the figure of $30bn is best understood to mean that Libya imported arms in a quantity that is equivalent to US systems that would cost $30bn to produce in US, expressed in constant 1990 prices. 36 SIPRI, Arms Transfers Database 2015, accessed March 1, 2016, http://www. sipri.org/databases/armstransfers. 37 Ibid. 190
Indefensible.indd 190
24/05/2017 18:37
notes TO MY T H 3
38 Ibid. 39 Paul Holtom, Mark Bromley, Pieter D. Wezeman and Siemon T. Wezeman, “International Arms Transfers,” in SIPRI Yearbook 2010, 300. 40 “Russia Announces Libya Arms Deal Worth $1.8bn,” BBC News, January 30, 2010, accessed June 1, 2016, http://news.bbc.co.uk/2/hi/europe/8489167. stm. 41 “EU Arms Exports to Libya: Who Armed Libya?” Guardian Datablog (last updated March 2, 2011), accessed June 1, 2016, http://www.theguardian. com/news/datablog/2011/mar/01/eu-arms-exports-libya. Author’s own calculations based on spreadsheet titled “EU arms exports to Libya.” 42 Ibid. 43 “SA Sold R70m in Arms to Libya,” Times (South Africa), April 10, 2011. 44 Anthony Cordesman, A Tragedy of Arms: Military and Security Developments in the Mahgreb (Westport, CT: Praeger, 2002), 208. 45 Anthony Cordesman and Aram Nerguizian, The North African Military Balance: Force Developments and Regional Challenges (Washington, DC: Center for Strategic & International Studies (CSIS), 2010), 34, accessed June 2, 2015, http://csis.org/files/publication/101203_North_African_ Military_Balance_final.pdf. 46 “Libyan Elections: Low Turnout Marks Bid to End Political Crisis,” BBC News, June 26, 2014, accessed June 1, 2016, http://www.bbc.com/news/ world-africa-28005801. 47 “Former Libyan Parliament Reconvenes, Elects Islamist Premier,” AlAkhbar, August 25, 2014, accessed June 1, 2015, http://english.al-akhbar. com/node/21273. 48 Mariam Rizk, “Libya’s Islamist Militias Claim Control of Capital,” Associated Press, August 24, 2014. 49 Libya Body Count, “Table: Violent Deaths in Libya,” Libya Body Count, accessed June 10, 2015, http://www.libyabodycount.org/table. 50 Glen Johnson, “Libya Weapons Aid Tuareg Rebellion in Mali,” Los Angeles Times, June 12, 2012, accessed June 2, 2016, http://articles.latimes.com/2012/ jun/12/world/la-fg-libya-arms-smuggle-20120612. 51 “Timeline of French-led Mali Military Intervention,” Associated Press, January 21, 2013. 52 Ian Black, “West Overlooked Risk of Libya Weapons Reaching Mali, Says Expert,” The Guardian, January 21, 2013, accessed June 2, 2016, http://www. theguardian.com/world/2013/jan/21/west-libya-weapons-mali. 53 Richard Spencer, “Libyan Arms that Went Missing under Gaddafi ‘Fuelling Multiple Conflicts’,” The Telegraph, April 10, 2013, accessed June 2, 2016, http://www.telegraph.co.uk/news/worldnews/africaandindianocean/ 191
Indefensible.indd 191
24/05/2017 18:37
INDEFENSIBLE
libya/9985183/Libyan-arms-that-went-missing-under-Gaddafi-fuellingmultiple-conflicts.html. 54 Freedom C. Onuoha, “Porous Borders and Boko Haram’s Arms Smuggling Operations in Nigeria,” Al Jazeera Center for Studies, September 8, 2013, accessed June 3, 2015, http://studies.aljazeera.net/en/reports/2013/09/ 201398104245877469.htm. 55 C.J. Chivers, Eric Schmitt and Mark Mazetti, “In Turnabout, Syria Rebels Get Libyan Weapons,” New York Times, June 21, 2013, accessed June 2, 2016, http://www.nytimes.com/2013/06/22/world/africa/in-a-turnabout-syriarebels-get-libyan-weapons.html?_r=0. 56 Owen Greene and Elizabeth Kirkham, Preventing Diversion of Small and Light Weapons: Issues and Priorities for Strengthened Controls (London and Bradford, UK: Saferworld and the University of Bradford, 2009), 29, accessed June 2, 2016, http://www.saferworld.org.uk/resources/viewresource/376-preventing-diversion-of-small-arms-and-light-weapons. 57 Catherine Bosley, “Swiss Tighten Rules after Grenades Found in Syria,”Reuters, October 10, 2012, accessed June 2, 2016, http://uk.reuters. com/article/uk-swiss-weapons-idUKBRE89918020121010. 58 Swiss State Secretariat for Economic Affairs (SECO), “Swiss Hand Grenades in Syria: Conclusion of Investigation and Measures,” Press Statement by the Swiss SECO, September 21, 2012, accessed June 1, 2016, https://www.seco.admin.ch/seco/en/home/seco/nsb-news/ medienmitteilungen-2012.msg-id-46075.html. 59 Ibid. 60 Ibid; “Swiss Hand Grenades reached Syria: Bern,” The Local (Switzerland), September 21, 2012, accessed June 1, 2016, http://www.thelocal.ch/20120921/ swiss-hand-grenades-reached-syria-bern. 61 Graduate Institute of International and Development Studies, Small Arms Survey 2014: Women and Guns (Cambridge: Cambridge University Press, 2014), 119, accessed June 1, 2015, http://www.smallarmssurvey.org/?smallarms-survey-2014. 62 United Nations Security Council, “Report of the Panel of Experts Appointed Pursuant to Security Council Resolution 1306 (2000),” paragraph 19, in relation to Sierra Leone Arms, S/2000/1195, December 20, 2000. 63 Ian Traynor, “The International Dealers in Death,” The Guardian, July 9, 2001, accessed June 1, 2015, http://www.theguardian.com/world/2001/ jul/09/armstrade.iantraynor. 64 Ibid. 65 Discussion with Professor James Stewart, former Appeals Counsel, 192
Indefensible.indd 192
24/05/2017 18:37
notes TO MY T H 3
Office of the Prosecutor, International Criminal Tribunal for the former Yugoslavia, and leading academic in the area of corporate responsibility for international crimes (November 6, 2012). 66 Claire Ribando Seelke, “Mexico and the 112th Congress,”Congressional Research Service, January 29, 2013, 5, accessed June 1, 2016, https://fas.org/ sgp/crs/row/RL32724.pdf. 67 Nick Miroff and William Booth, “Mexico’s Drug War is at a Stalemate as Calderon’s Presidency Ends,” Washington Post, November 27, 2012, accessed June 2, 2016, https://www.washingtonpost.com/world/the_americas/ calderon-finishes-his-six-year-drug-war-at-stalemate/2012/11/26/82c90a9431eb-11e2-92f0-496af208bf23_story.html. 68 William Booth, “Mexico’s Crime Wave has Left about 25 000 People Missing, Government Documents Show,” Washington Post, November 29, 2012, accessed June 2, 2016, https://www.washingtonpost.com/world/ the_americas/mexicos-crime-wave-has-left-up-to-25000-missinggovernment-documents-show/2012/11/29/7ca4ee44-3a6a-11e2-9258ac7c78d5c680_story.html. 69 Topher McDougal, Robert Muggah, David Shirk and John Patterson, “Made in the U.S.A.: The Role of American Guns in Mexican Violence,” The Atlantic, March 18, 2013, accessed June 2, 2016, http://www.theatlantic. com/international/archive/2013/03/made-in-the-usa-the-role-ofamerican-guns-in-mexican-violence/274103/. 70 Topher McDougal, David A. Shirk, Robert Muggah and John H. Patterson, The Way of the Gun: Estimating Firearm Traffic Across the US‒ Mexico Border (Rio de Janeiro, Brazil and San Diego, CA: Igarape Institute and University of San Diego, 2013), 6, accessed June 1, 2016, http://catcher. sandiego.edu/items/peacestudies/way_of_the_gun.pdf. 71 Ibid, 5. 72 Ibid, 2. 73 Arindrajit Dube, Oeindrila Dube and Omar Garcia-Ponce, “Cross-Border Spill-Over: US Gun-Laws and Violence in Mexico,” American Political Science Review 107, no. 3 (2013): 401, 413. 74 Paul Magnarella, “Explaining Rwanda’s 1994 Genocide,” Human Rights and Human Welfare 2, no. 1 (2002): 25‒34. 75 Damien Fruchart, Paul Holtom and Siemon T. Wezeman, United Nations Arms Embargoes: Their Impact on Arms Flow and Target Behaviour (Uppsala, Sweden: Uppsala University, 2007), 5–10, accessed June 2, 2016, http:// books.sipri.org/files/misc/UNAE/SIPRI07UNAEprelims.pdf. 76 Nelson Alusala, “The Arming of Rwanda and the Genocide,” African Security Studies 13, no. 2 (2004): 138. 193
Indefensible.indd 193
24/05/2017 18:37
INDEFENSIBLE
77 Ibid. 78 Ibid. 79 Fruchart, Holtom and Wezeman, United Nations Arms Embargoes, 6. 80 “Rwanda: How the Genocide Happened,” BBC News, December 8, 2008, accessed June 1, 2016, http://news.bbc.co.uk/2/hi/1288230.stm; Ernest Harsch, “OAU Sets Inquiry Into Rwandan Genocide,” Africa Recovery 12, no. 1 (1998): 4; Alison Des Forges, Leave None to Tell the Story: Genocide in Rwanda (New York: Human Rights Watch, 1999), 15‒16. 81 United Nations, “Background Information on Sexual Violence Used as a Tool of War,” Outreach Programme of the Rwanda Genocide and the United Nations, 2014, accessed June 15, 2015, http://www.un.org/en/ preventgenocide/rwanda/about/bgsexualviolence.shtml. 82 African Rights, Rwanda: Broken Bodies, Torn Spirits (Kigali, Rwanda: African Rights, 2004), 93, accessed June 2, 2016, http://preventgbvafrica. org/wp-content/uploads/2013/10/brokenbodies.africanrights.pdf. 83 Philip Verwimp, “Machetes and Firearms: The Organization of Massacres in Rwanda.”Journal of Peace Research, 43, no. 1 (2006): 5‒22. 84 Ibid. 85 Kirk Jackson, “The Arms Trade Treaty: A Historic and Momentous Failure,” Ceasefire Magazine, April 29, 2013, accessed June 1, 2016, https:// ceasefiremagazine.co.uk/failure-arms-trade-treaty/. 86 Ibid. 87 Kissinger stated this in a 1976 US State Department speech. C. Magoc and D. Bernstein (eds), Imperialism and Expansionism in American History (Santa Barbara, CA: ABC-CLIO, 2015), 1237‒1238. MY TH 4 1 UK Office for National Statistics (ONS), “Defense-Related Activities in the UK,” PRODCOM Final Results 2014, accessed June 2, 2016, http:// webarchive.nationalarchives.gov.uk/20160105160709/http://www.ons.gov. uk/ons/rel/prodcom/prodcom-final-results/defence-related-activities-inthe-uk/sty-def.html. 2 Food and Drink Federation (FDF), “Statistics at a Glance,” FDF, last updated May 28, 2015, accessed June 1, 2015, https://www.fdf.org.uk/ statsataglance.aspx. 3 UK Office for National Statistics, “UK Manufacturers Sales by Product (PRODCOM), 2013 Intermediate Results,” UK Office for National Statistics, December 18, 2014, accessed June 2, 2016, http://www.ons.gov.uk/ ons/dcp171778_389619.pdf. 194
Indefensible.indd 194
24/05/2017 18:37
notes TO MY T H 4
4 For a detailed breakdown of UK government spending, the following site is remarkably easy to use: http://www.ukpublicspending.co.uk. 5 AeroSpace and Defense Industries Association of Europe (ASD), “Key Facts and Figures: 2012,” accessed June 1, 2015, http://www.asd-europe. org/fileadmin/user_upload/Client_documents/ASD_Contents/2_ COMMUNICATION/2.5_Publications/2.5.2_Facts_and_Figures/ASD_ Facts_and_Figures_2012.pdf. 6 EuroStat, “Manufacturing Statistics-NACE Rev. 2,”last updated November 5, 2014, accessed June 1, 2015, http://ec.europa.eu/eurostat/ statistics-explained/index.php/Manufacturing_statistics_-_NACE_ Rev._2. 7 On defense share of GDP, see: Office of the Under Secretary for Defense (Comptroller), National Defense Budget Estimates for FY2015, United States Department of Defense, March 2014, 262, accessed May 31, 2016, http:// comptroller.defense.gov/Portals/45/Documents/defbudget/fy2015/FY15_ Green_Book.pdf. 8 For the most recent figures on the US share of global arms export agreements see: Richard F. Grimmett and Paul K. Kerr, “Conventional Arms Transfers to Developing Nations, 2004‒2011,” Congressional Research Service, August 24, 2012, accessed June 1, 2016, https://www.fas.org/sgp/crs/ weapons/R42678.pdf. 9 US export figures are extrapolated from World Bank indicators. See: http://data.worldbank.org/indicator/BX.GSR.GNFS.CDand ‘US Trade in Goods and Services—Balance of Payments (BOP) Basis, 1960 through 2014, http://www.census.gov/foreign-trade/statistics/historical/gands.pdf. 10 J. Paul Dunne and Mehmet Uye, “Military Spending and Development,” Working Papers 0902, Department of Accounting, Economics and Finance, Bristol Business School, University of West England (2009), 5–7, accessed June 2, 2016, https://ideas.repec.org/p/uwe/wpaper/0902.html. 11 Ibid, 5‒6. 12 J. Paul Dunne, “Military Spending, Growth, Development and Conflict,” Defence and Peace Economics, 23, no. 6 (2012): 553‒554. 13 Ibid, 8–9. 14 Robert Pollin and Heidi Garrett-Peltier, The US Employment Effects of Military and Domestic Spending Priorities: 2011 Update (Amherst, MA: Political Economy Research Institute, University of Massachusetts, 2011), accessed May 27, 2016, http://www.peri.umass.edu/fileadmin/pdf/ published_study/PERI_military_spending_2011.pdf. 15 Ibid, 3. 16 Ibid, 5. 17 Ibid, 7. 195
Indefensible.indd 195
24/05/2017 18:37
INDEFENSIBLE
18 19 20 21
Ibid, 7‒8. Ibid, 4. Ibid, 4. Paul Ingram and Roy Isbister, Escaping the Subsidy Trap: Why Arms Exports are Bad for Britain (London and Oxford: British American Security Information Council, Saferworld and Oxford Research Group, 2004), 37, accessed June 2, 2016, http://www.oxfordresearchgroup.org.uk/sites/ default/files/ORGsubsidy.pdf. 22 Ibid. 23 Malcom Chalmers, Neil V. Davies, Keith Hartley and Chris Wilkinson, The Economic Costs and Benefits of UK Defence Exports (York, UK: Centre for Defence Economics, University of York, 2001), accessed June 2, 2016, https://www.caat.org.uk/issues/mod-york-report-nov-01.pdf. An interesting corollary of this article is that running an ethical arms trade policy in the UK, where exports to countries exhibiting a high risk of using weapons in human rights violations would have a net positive impact on the economy. Dunne and Perlo-Freeman, in a 2003 study, calculated that 27.5% of UK arms exports were to ‘high risk’ countries. If these exports were stopped, there would be an initial loss of 27,000 jobs, but a longterm creation of 37,000 jobs. In addition, the UK government would save £115.5m in subsidies compared against a loss in revenue of between £22‒55m. See: J. Paul Dunne and Sam Perlo Freeman, “The Impact of a Responsible Arms Control Policy on the UK Economy,” Report prepared for Oxfam, 2003, 28, accessed June 1, 2015, http://carecon.org.uk/Users/ paul/Oxfamreport7.pdf. 24 Steven Schofield, Making Arms, Wasting Skills: Alternatives to Militarism and Arms Production (London: Campaign Against the Arms Trade, 2008), accessed June 1, 2016, https://www.caat.org.uk/resources/publications/ economics/making-arms-2008.pdf. 25 Mary Kaldor, The Baroque Arsenal (New York: Hill & Wang, 1981). 26 Stephen M. Walt, “Rush to Failure: The Flawed Politics and Policies of Missile Defense,” Harvard Magazine, May 1, 2000, accessed June 2, 2016, http://harvardmagazine.com/2000/05/rush-to-failure-html. 27 The Cold War Museum, “The Strategic Defense Initiative (SDI): Star Wars,” accessed June 2, 2016, http://www.coldwar.org/articles/80s/SDIStarWars.asp. 28 Joseph Cirincione, “Political and Strategic Imperatives of National Missile Defense,” Carnegie Endowment for International Peace, October 12, 2000, accessed June 2, 2016, http://carnegieendowment.org/2000/10/12/politicaland-strategic-imperatives-of-national-missile-defense. 196
Indefensible.indd 196
24/05/2017 18:37
notes TO MY T H 4
29 Jurgen Brauer, “Review Article: Is War Necessary for Economic Growth,” The Economics of Peace and Security Journal 2, no. 1 (2007): 72. 30 William J. Perry, “A New Way of Doing Business,” Memorandum for Secretaries of the Military Departments, June 29, 1994, http://www.sae.org/ standardsdev/military/milperry.htm. 31 Ibid. 32 Jacques S. Gansler and William Lucyshyn, Commercial-Off-The-Shelf (COTS): Doing it Right (College Park, MD: Center for Public Policy and Private Enterprise, Naval Postgraduate School, 2008), 13–17, accessed June 2, 2016, http://www.dtic.mil/dtic/tr/fulltext/u2/a494143.pdf. 33 ONS, “Defense-Related Activities in the UK.” 34 Michael Brzoska, “Trends in Global Military and Civilian Research and Development and their Changing Interface,” Manchester Institute of Innovation Research/Re-Evaluating Defense R&D and Innovative Dynamics, Workshop Paper, 2007, 11‒12, accessed June 2, 2016, http://ifsh. de/pdf/aktuelles/india_brzoska.pdf. 35 National Science Board, “Science and Engineering Indicators: 2012,” accessed June 1, 2016, http://www.nsf.gov/statistics/seind12/. 36 Department for Business, Innovation, and Skills, The 2010 R&D Scoreboard: The Top 1,000 UK and 1,000 Global Companies by R&D Investment (London: Crown, 2010) 41, accessed June 2, 2016, http://webarchive.national archives.gov.uk/20101208170217/http:/www.innovation.gov.uk/rd_ scoreboard/downloads/2010_RD_Scoreboard_data.pdf. 37 European Commission, EU R&D Scoreboard: The 2013 EU Industrial R&D Investment Scoreboard (Luxembourg: Publications Office of the European Union, 2013), 35, accessed June 3, 2016, http://iri.jrc.ec.europa.eu/ scoreboard13.html. 38 This account is taken from the “Brief History of the Internet” drafted by a group of individuals who were present during its inception. It can be viewed here: http://www.internetsociety.org/internet/what-internet/ history-internet/brief-history-internet. 39 Ibid. 40 It can still be viewed here: http://info.cern.ch/hypertext/WWW/The Project.html. 41 “Guns and Sugar,” The Economist. 42 Sezsy Yuniorrita and Curie Maharani, “Caveat Emptor: The Challenge of Implementing Defense Offset in RI,” Jakarta Post, October 13, 2012, accessed June 3, 2016, http://www.thejakartapost.com/news/2012/10/13/ caveat-emptor-the-challenge-implementing-defense-offset-ri. html?search=caveat+emptor. 197
Indefensible.indd 197
24/05/2017 18:37
INDEFENSIBLE
43 World Trade Organization, Agreement on Public Procurement: Article XXIII (Uruguay Round Agreement), accessed June 3, 2016, http://www. wto.org/english/docs_e/legal_e/gpr-94_02_e.htm. 44 Burkard Schmitt, Defense Procurement in the European Union: The Current Debate (Paris: European Union Institute for Security Studies, 2005), 34, accessed June 3, 2016, http://www.iss.europa.eu/uploads/media/bk05-01. pdf. 45 For a discussion of this in full, see: Lloyd Dumas, “Weapons Procurement and Development: Do Offsets Mitigate or Magnify the Military Burden?” (paper prepared for the Conference on “Offsets and Development”: Cape Town, SA; September 2002), accessed June 3, 2016, https://www.utdallas. edu/~ljdumas/Weapons.pdf. 46 Elizabeth Sköns, “Evaluating Defense Offsets: The Experience in Finland and Sweden,” in Arms Trade and Economic Development: Theory, Policy and Cases in Arms Trade Offsets, eds. Jurgen Brauer and J. Paul Dunne (London: Routledge, 2004). 47 J. Modise, “Realising our Hopes,” Address by the Minister of Defense on the Defense Budget Vote, 9 March 1999. 48 “Guns vs. Butter?” Weekend Argus, February 26, 1995. 49 Armscor, “Armscor Annual Report 2011/2012,” 2012, 88, accessed June 3, 2016, http://www.armscor.co.za/Downloads/Armscor%20Annual%20 Report%202011-2012.pdf. 50 “NIP performance figures, 2014,” attached as Annexure ES2 to the testimony of Sipho Zikode before the Judicial Commission of Inquiry into the Strategic Defense Procurement Program, South Africa. Zikode’s testimony is available to download from www.armscomm.org.za. 51 “PE set to become Viking Mecca,” Eastern Province Herald, 2001; and “Local Firms Line Up for Foreign Gain in Arms Deal,” Business Report, November 6, 2002. http://www.thelocal.se/20070206/6316. 52 “NIP Performance Figures, 2014.” 53 “Tourists Won Points for South African Arms Deal,”The Local (Sweden), February 6, 2007, accessed June 3, 2016, http://www.thelocal. se/20070206/6316. 54 “NIP Performance Figures, 2014.” 55 Jurgen Brauer, “Economic Aspects of Arms Trade Offsets,” in Arms Trade and Economic Development: Theory, Policy, and Cases in Arms Trade Offsets, ed. Jurgen Brauer and J. Paul Dunne (New York: Routledge, 2004), 64. 56 Jurgen Brauer and J. Paul Dunne, “Arms Trade Offsets: What Do We Know?, ”University of Bristol Business School, Working Paper 0910, accessed June 1, 2015, http://carecon.org.uk/DPs/0910.pdf. This article also appears 198
Indefensible.indd 198
24/05/2017 18:37
notes TO MY T H 5
in Handbook on the Political Economy of War, ed. C.J. Coyne and R.L. Mathers (Cheltenham: Edward Elgar, 2011). 57 Joseph E. Stiglitz and Linda J. Bilmes, The Three Trillion Dollar War: The True Cost of the Iraq Conflict (London: Allen Lane, Penguin Books, 2008). 58 Joseph E. Stiglitz and Linda J. Bilmes, “The True Cost of the Iraq War: $3 Trillion and Beyond,” Washington Post, September 5, 2010. 59 Ibid. 60 James Grefer, David Gregory and Erin Rebhan (CNA Corporation), “Military and Civilian Compensation: How Do They Compare?” in The 11th Quadrennial Review of Military Compensation. Supporting Research Papers (Washington, DC: Office of the Undersecretary of Defense for Personnel and Readiness, 2012), accessed June 3, 2016, http://www.dtic.mil/ dtic/tr/fulltext/u2/a563240.pdf. 61 Dan Lamothe, “France Backs Off Sending Mistral Warship to Russia in $1.7 Billion Deal,” Washington Post, September 3, 2014. 62 Giorgio D’Agostino, John Paul Dunne and Luca Pieroni, “Corruption, Military Spending and Economic Growth,”Defense and Peace Economics 23, no. 6 (2012): 602. MY TH 5 1
Joe Roeber, “Hard Wired for Corruption: The Arms Trade and Corruption,” Prospect, August 28, 2005. 2 William M. Daley, “National Export Strategy: Working for America,” Trade Promotion Coordinating Committee, 2000, 11. 3 Sanjeev Gupta, Luiz de Mello and Raju Sharan, Corruption and Military Spending—A Working Paper of the International Monetary Fund (Washington, DC: International Monetary Fund, 2000), 16, accessed June 3, 2016, https://www.imf.org/external/pubs/ft/wp/2000/wp0023.pdf. 4 “Five Reasons Why BAE Will Do Fine in the US Defense Market,” Forbes, February 21, 2014, accessed June 15, 2015, http://www.forbes.com/ sites/lorenthompson/2014/02/21/five-reasons-bae-systems-will-do-finein-the-u-s-defense-market/. 5 G. Murphy, Affidavit submitted as Annexure JDP-SW12 in the High Court of South Africa (Transvaal Provincial Division) in the matter of Ex Parte the National Director of Public Prosecutions (applicant) In Re: An Application for Issue of Search Warrants in Terms of Section 29(5) and 29(6) of the National Prosecuting Authority Act, No. 32 of 1998, as amended, 2008. 6 Ibid. 7 Ibid. 199
Indefensible.indd 199
24/05/2017 18:37
INDEFENSIBLE
8 Ibid. 9 ‘Statement of Offence’ in the Matter of the United States v. BAE Systems PLC, Violation: Title 18, United States Code, Section 371 (conspiracy), United States District Court for the District of Columbia. 10 Ibid. 11 “Proposed Charging Letter re: Investigation of BAE Systems plc Regarding Violations of the Arms Export Control Act and the International Traffic in Arms Regulations,” May 2011, accessed June 3, 2015, www.pmddtc.state. gov/compliance/consent_agreements/baes.html. 12 Debevoise & Plimpton LLP, “Ferrostaal: Final Report, Compliance Investigation,” April 13, 2011, 2, accessed June 3, 2016, https://kassios.files. wordpress.com/2012/10/confidential-secret-report-findings-re-ferrostalgreek-gov-case-pribes1.pdf 13 Ibid. 14 Ibid. 15 Roeber, “Hard Wired for Corruption.” 16 The following discussion of the systemic cause of corruption in the arms trade is extrapolated from Andrew Feinstein, Paul Holden, and Barnaby Pace, “Corruption in the Arms Trade: Sins of Commission,” in SIPRI Yearbook 2011 (Oxford: Oxford University Press, 2011). 17 World Trade Organization, Agreement on Public Procurement: Article XXIII (Uruguay Round Agreement), 2014, http://www.wto.org/english/ docs_e/legal_e/gpr-94_02_e.htm. 18 BryanBender, “From the Pentagon to the Private Sector,” Boston Globe, December 26, 2010. 19 United States House of Representatives, National Defense Authorization Act for Fiscal Year 2008, Public Law 110-181, 110th Congress, January 28, 2008. 20 Citizens for Responsibility and Ethics in Washington (CREW), “Military Contractors Open the Revolving Door for Former Pentagon Officials,” CREW Blog, October 24, 2013, accessed June 1, 2015, http://www. citizensforethics.org/military-contractors-open-the-revolving-door-forformer-pentagon-official/ 21 Ibid. 22 Nick Hopkins, Rob Evans and Richard Norton-Taylor, “MoD staff and Thousands of Military Officers Join Arms Firms,”The Guardian, October 15, 2012, accessed June 1, 2015, http://www.theguardian.com/uk/2012/oct/15/ mod-military-arms-firms. 23 CAAT, “Revolving Door Log,” last updated December 4, 2014, http:// www.caat.org.uk/issues/influence/revolving-door.php. 200
Indefensible.indd 200
24/05/2017 18:37
notes TO MY T H 5
24 Citizens for Responsibility and Ethics in Washington (CREW), Strategic Manoeuvres: The Revolving Door from the Pentagon to the Private Sector (Washington, DC: Citizens for Responsibility and Ethics in Washington, 2011), 2, https://www.scribd.com/document/113134688/CREW-StrategicManeuvers-The-Revolving-Door-from-the-Pentagon-to-the-PrivateSector. 25 Lawrence S. Wittner, “The Greed of Lockheed Martin,” Consortium News, March 23, 2013, accessed June 3, 2016, http://consortiumnews. com/2013/03/23/the-greed-of-lockheed-martin/. 26 Marc Lifsher, “California Grants $420m tax break to Lockheed Martin Corp,” Los Angeles Times, July 3, 2014, accessed June 3, 2016, http://www. latimes.com/business/la-fi-bomber-tax-break-20140704-story.html. 27 Ibid. 28 The internationalization of production in the arms trade is discussed in depth in Schofield, Making Arms, Wasting Skills. 29 Inspector General, Department of Defense, Semi-Annual Report to the Congress, 1 October 1998–31 March 1999 (Darby, PA: DIANE Publishing, 1999), ii. 30 Commission on Wartime Contracting In Iraq and Afghanistan,“Wartime Contracting Commission Releases Final Report to Congress,” Commission Press Statement, CWC-NR-49, August 31, 2011, accessed June 3, 2016, http://cybercemetery.unt.edu/archive/cwc/20110929231427/http://www. wartimecontracting.gov/index.php/pressroom/pressreleases/203-cwcnr-49. 31 Ibid, 2. 32 AdamWeinstein, “The All-Time 10 Worst Military Contracting Boondoggles,” Mother Jones, September 2, 2011, accessed June 1, 2015, http:// www.motherjones.com/mojo/2011/09/contractor-waste-iraq-KBR. 33 Ibid. 34 William D. Hartung, Prophets of War: Lockheed Martin and the Making of the Military Industrial Complex (New York: Nation Books, 2011), 154‒155. 35 Feinstein, The Shadow World, 305‒318. 36 Ibid. 37 R.J. Hillhouse, “Outsourcing Intelligence,” The Nation, July 24, 2007, accessed June 3, 2016, http://www.thenation.com/article/outsourcingintelligence/. 38 Ibid. 39 Simon Chesterman, “‘We Can’t Spy … If We Can’t Buy!’: The Privatization of Intelligence and the Limits of Outsourcing ‘Inherently Government Functions’,” The European Journal of International Law 19, no. 5 (2008): 1057. 201
Indefensible.indd 201
24/05/2017 18:37
INDEFENSIBLE
40 For further detail on the Arms Deal and the controversy that has surrounded it, see: Paul Holden and Hennie Van Vuuren, The Devil in the Detail: How the Arms Deal Changed Everything ( Jeppestown: Jonathan Ball Publishers, 2011). 41 Nicoli Nattrass, The Moral Economy of Aids in South Africa (Cambridge: Cambridge University Press, 2004), 66. 42 Government of South Africa, “Full Report of the Joint Health and Treasury Task Team Charged with Examining Treatment Options to Supplement Comprehensive Care for HIV/Aids in the Public Health Sector,” August 8, 2003,56 (paragraph 4.4), accessed June 3, 2016, http://www.gov.za/sites/ www.gov.za/files/treatment_0.pdf. 43 Holden and Van Vuuren, The Devil in the Detail. 44 Ibid. MY TH 6 1 Transparency International (TI), “Government Defense Anti-Corruption Index,” TI, International Defense and Security Programme, 2015, accessed June 18, 2015, http://government.defenseindex.org/. 2 Ibid. 3 Ibid. 4 Susan Willett, “Defense Expenditures, Arms Procurement and Corruption in Sub-Saharan Africa,”Review of African Political Economy 36, no. 121 (2009): 335‒351. 5 Ibid, 340–341. 6 Obiamaka Egbo, Ifeoma Nwakoby, Josaphat Onwumere and Chibuike Uche, “Legitimizing Corruption in Government: Security Votes in Nigeria,” African Studies Centre Working Paper 91/2010, 2010, accessed August 8, 2014, https://openaccess.leidenuniv.nl/bitstream/handle/1887/16186/ASC075287668-2788-01.pdf ?sequence=2. 7 Turaki A. Hassan and Ibrahim Kabiru Sule, “Nigeria: Security Retains Top Spot in 2014 National Budget,”All Africa, December 20, 2013, accessed June 3, 2016, http://allafrica.com/stories/201312200587.html. 8 WilliamWallis, “Pillar of West African Security Struggles to Keep Peace at Home in Nigeria,”Financial Times, May 21, 2014, accessed June 3, 2016, http://www.ft.com/intl/cms/s/0/3a0d25f0-e0f0-11e3-a934-00144feabdc0. html. 9 Charlotte Alfred, “Nigeria Struggles to Protect Citizens as Boko Haram Death Toll Climbs,” Huffington Post, February 11, 2016, accessed June 3, 2016, http://www.huffingtonpost.com/entry/boko-haram-massacrenigeria_us_56bbb8d8e4b0b40245c5446a. 202
Indefensible.indd 202
24/05/2017 18:37
notes TO MY T H 6
10 Kevin Uhrmacher and Mary Beth Sheridan, “The Brutal Toll of Boko Haram’s Attacks on Civilians,” Washington Post, April 3, 2016, accessed June 3, 2016, https://www.washingtonpost.com/graphics/world/nigeria-bokoharam/. 11 International Crisis Group, “Curbing Violence in Nigeria (II): the Boko Haram Insurgency,” Africa Report No. 216, April 3, 2014, I, accessed August 4, 2014, http://www.crisisgroup.org/~/media/Files/africa/west-africa/nigeria/ 216-curbing-violence-in-nigeria-ii-the-boko-haram-insurgency.pdf. 12 Kingsley Ighomwenghian, Sola Alabadan, Sylvester Enoghase, Philip Oladunjoye, Joe Nwankwo, Gbenga Faturoti and Daniel Abia, “Insurgency: Nigerians Seek Probe of Security Budgets,”Daily Independent, June 30, 2014, accessed June 18, 2015, http://allafrica.com/stories/201406300047.html. 13 Project on Government Oversight (POGO), “Pentagon Slush Fund Must Be Drawn Down,” POGO Blog, February 6, 2014, accessed June 18, 2015, http://www.pogo.org/blog/2014/02/pentagon-slush-fund-must-bedrawn-down.html. 14 Friends Committee on National Legislation, “End the Wars—End the War Funding,” 2014, accessed June 18, 2015, http://fcnl.org/issues/budget/ End_the_Wars_End_the_War_Funding.pdf. 15 Ibid. 16 Korb, Hoffman and Blakeley, A User’s Guide to the Fiscal Year 2015 Defense Budget. 17 POGO, “An Open Letter to Appropriators in Congress: End the Budget Gimmicks and Cut the Pentagon’s Slush Fund,” POGO, February 6, 2014, accessed June 3, 2016, http://www.pogo.org/our-work/letters/2014/anopen-letter-to-congress-end-the-budget-gimmicks.html. 18 Information Security Oversight Office, Report to the President 2014 (Washington, DC: ISOO, 2014), 1, accessed June 3, 2016, http://www. archives.gov/isoo/reports/2014-annual-report.pdf. 19 Ibid, 6. 20 Ibid, 24. 21 Information Security Oversight Office, Report to the President 2013 (Washington, DC: ISOO, 2013), 21, accessed June 3, 2016, http://www. archives.gov/isoo/reports/2013-annual-report.pdf. 22 Scott Shane, “Cost to Protect U.S. Secrets Doubles to Over $11 Billion,” New York Times, June 2, 2012, accessed June 18, 2015, http://www.nytimes. com/2012/07/03/us/politics/cost-to-protect-us-secrets-doubles-indecade-to-11-billion.html?_r=0. 23 Ibid. 24 Public Interest Declassification Board, Transforming the Security Classification System (Washington, DC: ISOO, 2012), 15, accessed June 18, 2015, http:// 203
Indefensible.indd 203
24/05/2017 18:37
INDEFENSIBLE
www.archives.gov/declassification/pidb/recommendations/transformingclassification.pdf. 25 Dion Nissenbaum, “How Many People Hold Security Clearance?” The Wall Street Journal, September 17, 2013, accessed June 3, 2016, http://blogs. wsj.com/washwire/2013/09/17/how-many-people-hold-secret-securityclearance/. 26 Brian Fung, “5.1 million Americans Have Security Clearances. That’s More Than The Entire Population of Norway,” Washington Post, 24 March, 2014, accessed June 3, 2016, https://www.washingtonpost.com/news/the-switch/ wp/2014/03/24/5-1-million-americans-have-security-clearances-thatsmore-than-the-entire-population-of-norway/. 27 Transparency International, “Government Defense Anti-Corruption Index.” 28 Cora Currier, “Charting Obama’s Crackdown on National Security Leaks,” Pro Publica, July 30, 2013, accessed June 18, 2015, http://www.propublica. org/special/sealing-loose-lips-charting-obamas-crackdown-on-nationalsecurity-leaks. 29 United States Congress, ‘Title 18—CRIMES AND CRIMINAL PROCEDURE.’ In United States Code, 2006 edition, Supplement 5 (Washington, DC: GPO, 2011), 171. 30 Currier, “Charting Obama’s Crackdown on National Security Leaks.” 31 Government Accountability Project, “National Security & Human Rights: 2014 Fact Base,” accessed August 4, 2014, https://www.whistleblower.org/ bio-william-binney-and-j-kirk-wiebe. 32 Government Accountability Project, “National Security and Human Rights,” accessed 4 August 2014, https://www.whistleblower.org/nationalsecurity-human-rights-0. 33 Brennan Center for Justice at New York University School of Law, “National Security Whistleblowing: A Gap in the Law,” accessed August 4, 2014, http://www.brennancenter.org/sites/default/files/analysis/Factsheet %20-%20National%20Security%20Whistleblowing.pdf. 34 US Securities and Exchange Commission, “SEC Enforcement Actions: FCPA Cases,” accessed May 20, 2015, http://www.sec.gov/spotlight/fcpa/ fcpa-cases.shtml. 35 US Department of Justice, “FCPA and Related Enforcement Actions— In Re Armor Holdings,” accessed August 4, 2014, http://www.justice.gov/ criminal/fraud/fcpa/cases/armor-holdings.html. 36 Public Interest Declassification Board, Transforming the Security Classification System, 9. 204
Indefensible.indd 204
24/05/2017 18:37
notes TO MY T H 7
37 Daniel Ellsberg, “Secrecy and National Security Whistleblowing,” Daniel Ellsberg Website, January 8, 2013, accessed June 18, 2015, http://www.ellsberg. net/archive/secrecy-national-security-whistleblowing. 38 Quoted in Elizabeth Goitein and David M. Shapiro, Reducing Overclassification Through Accountability (New York: Brennan Center For Justice at New York University School of Law, 2011), 26, accessed June 3, 2015, http://www.brennancenter.org/sites/default/files/legacy/Justice/ LNS/Brennan_Overclassification_Final.pdf. 39 Ibid, 22. 40 Ibid. 41 Daniel Patrick Moynihan, Secrecy: The American Experience (New Haven, CT: Yale University Press, 1998), 73. 42 Goitein and Shapiro, Reducing Overclassification Through Accountability, 25. 43 Ibid, 23. 44 US Department of Defense, Office of the Inspector General, Audit Report: The Timber Wind Special Access Program (Report No. 93-033)(Arlington, VA: Office of the Inspector General, 1992), 14, accessed June 18, 2015, https:// www.fas.org/sgp/othergov/dod/tw.pdf. 45 Ibid, 23. 46 Thomas H. Kean, and Lee Hamilton, The 9/11 Commission Report (Washington, DC: National Commission on Terrorist Attacks upon the United States, 2004), 417. 47 Open Society Justice Initiative, “Understanding the Tshwane Principles,” accessed June 20, 2015, http://www.opensocietyfoundations.org/briefingpapers/understanding-tshwane-principles. 48 Open Society Justice Initiative, “The Tshwane Principles on National Security and the Right to Information: An Overview in 15 Points,” accessed June 20, 2015, http://www.opensocietyfoundations.org/factsheets/tshwane-principles-national-security-and-right-informationoverview-15-points. MY TH 7 1 Rachel Sylvester and Alice Thomson, “William Hague: ‘The World is Becoming More Dangerous’,” The Times, January 26, 2013. 2 Micah Zenko, “Is the World More Dangerous than Ever?” CNN, Global Public Square, April 12, 2012, accessed August 15, 2014, http:// globalpublicsquare.blogs.cnn.com/2012/04/12/is-the-world-moredangerous-than-ever/. 3 Stephen Pinker, The Better Angels of Our Nature: Why Violence Has Declined (New York: Viking Penguin, 2011). 205
Indefensible.indd 205
24/05/2017 18:37
INDEFENSIBLE
4 Melander, Erik, Magnus Öberg and Jonathon Hall, “Are ‘New Wars’ More Atrocious? Battle Severity, Civilians Killed and Forced Migration Before and After the End of the Cold War,” European Journal of International Relations 15, no. 3 (2009): 505‒536; Benjamin Valentino, “Why We Kill: The Political Science of Political Violence against Civilians,” Annual Review of Political Science 17(2014):89–103. 5 Joshua S. Goldstein, Winning the War on War: The Decline of Armed Conflict Worldwide (New York: Penguin Group, 2011). 6 Klaus von Grebmer, Jill Bernstein, Alex de Waal, Nilam Prasai, Sandra Yinand Yisehac Yohannes, 2015 Global Hunger Index: Armed Conflict and the Challenge of Hunger (Bonn, Washington, DC and Dublin: Welthungerhilfe, International Food Policy Research Institute (IFPRI) and Concern Worldwide, 2015), http://dx.doi.org/10.2499/9780896299641. 7 Human Security Report Project, Human Security Report 2013, 23. This figure does not include military conflicts that have not been properly declared or acknowledged, such as the deployment of Russian troops in Ukraine. 8 Ibid. 9 Human Security Report Project, Human Security Report 2009/2010: The Causes of Peace and the Shrinking Costs of War (New York: Oxford University Press, 2011). 10 Alex de Waal, “The Wars of Destabilization in the Horn of Africa, 1989‒2001,” in Islamism and Its Enemies in the Horn of Africa, ed. Alex de Waal (London: Hurst, 2004). 11 Africa Watch, “‘Mengistu has Decided to Burn Us Like Wood’: Bombing of Civilians and Civilian Targets by the Ethiopian Air Force,” News from Africa Watch, July 24, 1990, accessed June 18, 2015, http://www.hrw.org/ legacy/reports/pdfs/e/ethiopia/ethiopia907.pdf. 12 Lotta Themnér and Peter Wallensteen, “Armed Conflicts, 1946–2013,” Journal of Peace Research 51, no. 4 (2014): 541‒554. 13 Erik Melander, Organized Violence in the World 2015: An Assessment of the Uppsala Conflict Data Program (Uppsala: Uppsala Universiteitand Uppsala Conflict Data Program, 2014), 8, accessed June 18, 2015, http://www.pcr. uu.se/digitalAssets/66/66310_1ucdp-paper-9.pdf. 14 Ibid, Figure 7 (p. 7). 15 Klaus von Grebmer, et al., 2015 Global Hunger Index: Armed Conflict and the Challenge of Hunger. 16 Joseph Carroll, “Public: World Is More Dangerous Today Than at Most Other Times,”Gallup, July 28, 2006. 17 “Terrorism in the United States,” Gallup Polling, 2013, http://www.gallup. com/poll/4909/terrorism-united-states.aspx. 206
Indefensible.indd 206
24/05/2017 18:37
notes TO MY T H 7
18 United States Department of State, “Terrorism Deaths, Injuries, and Kidnappings of Private US Citizens Overseas in 2013,” accessed June 3, 2014, http://www.state.gov/j/ct/rls/crt/2013/224833.htm. 19 Global Research Centre for Research on Globalization, “The Terrorism Statistics Every American Needs to Hear,” accessed May 19, 2014, http:// www.globalresearch.ca/the-terrorism-statistics-every-american-needs-tohear/5382818. 20 Brad Plumer, “Eight Facts about Terrorism in the United States,”Washington Post, Wonkblog, April 16, 2013, accessed June 14, 2014, http://www. washingtonpost.com/blogs/wonkblog/wp/2013/04/16/eight-facts-aboutterrorism-in-the-united-states/. 21 J.J. Goldberg, “More Killed by Toddlers than Terrorists in the US,” Forward, May 5, 2013, http://forward.com/opinion/176043/more-killed-by-toddlersthan-terrorists-in-us/. 22 Todd Sandler, “The Analytical Study of Terrorism: Taking Stock,” Journal of Peace Research 51, no. 2 (2014): 259‒260. 23 Trevor Thrall and Jane Cramer, “Introduction: Understanding Threat Inflation,” in American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, ed. Trevor Thrall and Jane Cramer (London: Routledge, 2009), 1. 24 Lydia Saad, “Most Americans Believe Crime in the U.S. Is Worsening,” Gallup, October 31, 2011. 25 Inimai M. Chettiar, “The Many Causes of America’s Decline in Crime,” The Atlantic, February 11, 2015, accessed June 3, 2016, http://www.theatlantic. com/politics/archive/2015/02/the-many-causes-of-americas-decline-incrime/385364/. Also see “Table 1: Crime in the United States by Volume and Rate per 100,000 Inhabitants, 1992‒2001,” Federal Bureau of Investigation, https://www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s/2011/crime-inthe-u.s.-2011/tables/table-1. 26 Stephen Van Evera, “Foreword,” in American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, ed. Trevor Thrall and Jane Cramer (London: Routledge, 2011), xii. 27 William Astore, “Pentagon Threat Inflation,” Huffington Post, April 15, 2013, accessed June 3, 2014, http://www.huffingtonpost.com/william-astore/ pentagon-threat-inflation_b_3084602.html. 28 Thrall and Kramer, in their introduction to the volume cited above, provide a useful summary of the different theoretical approaches to understanding threat inflation. 29 Bruce Schneier, “Worst-Case Thinking,” Schneier on Security, May 10, 2010, accessed June 3, 2014, https://www.schneier.com/blog/archives/2010/05/ worst-case_thin.html. 207
Indefensible.indd 207
24/05/2017 18:37
INDEFENSIBLE
30 See, for example, American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, ed. Trevor Thrall and Jane Cramer (London: Routledge, 2009). 31 For a full discussion of this, see: Naomi Klein, The Shock Doctrine (London: Allen Lane, 2007), 289‒291. 32 Chaim Kaufmann, “Threat Inflation and the Failure of Marketplace of Ideas,” in American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, ed. Trevor Thrall and Jane Cramer (London: Routledge, 2011). 33 Ibid. 34 “CIA Report: No WMD Found in Iraq,” NBC News, April 25, 2005, accessed June 3, 2016, http://www.nbcnews.com/id/7634313/ns/world_ news-mideast_n_africa/t/cias-final-report-no-wmd-found-iraq/. 35 Mike Mount, “Hussein’s Iraq and al Qaeda Not Linked, Pentagon Says,”CNN, March 13, 2008, accessed June 3, 2016, http://www.cnn. com/2008/US/03/13/alqaeda.saddam/. 36 Robert Dreyfus and Jason Vest, “The Lie Factory,” Mother Jones, January/ February 2004, accessed June 3, 2016, http://www.motherjones.com/ politics/2004/01/lie-factory. 37 Seymour Hersh, “Selective Intelligence,” The New Yorker, May 12, 2003, accessed June 3, 2016, http://www.newyorker.com/magazine/2003/05/12/ selective-intelligence. 38 Kaufmann, “Threat Inflation.” 39 Donald Rumsfeld, in a famous 2003 memo, was interpreted to be a proponent of this view when he queried whether or not the US was ‘capturing, killing or deterring and dissuading more terrorists every day than the madrassas and radical clerics are recruiting, training and deploying against us.’ “Memo from Donald Rumsfeld to General Dick Myers, Paul Wolfowitz, General Pete Pace and Doug Feith,” October 16, 2003, accessed June 3, 2016, http://usatoday30.usatoday.com/news/washington/executive/ rumsfeld-memo.htm. 40 Andrew Cockburn, Kill Chain: The Rise of the High-tech Assassins (New York: Henry Holt, 2015), 157. 41 Gabriel Kolko, Century of War: Politics, Conflicts, and Society since 1914 (New York: The New Press, 1994), 8. 42 Niall Ferguson, The Pity of War: Explaining World War One (London: Basic Books, 2000), 462.
208
Indefensible.indd 208
24/05/2017 18:37
B I B LI OGR AP HY
“Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China.” Office of the Secretary of Defense, May 2012, 21. Accessed May 27, 2016. http://www.defense.gov/Portals/1/ Documents/pubs/2012_CMPR_Final.pdf. “China’s Military Spending: At the Double.” The Economist, March 15, 2014. Accessed May 27, 2016. http://www.economist.com/news/china/21599046chinas-fast-growing-defence-budget-worries-its-neighbours-not-everytrend-its-favour. “CIA Report: No WMD Found in Iraq.” NBC News, April 25, 2005. Accessed June 3, 2016.http://www.nbcnews.com/id/7634313/ns/world_news-mideast_ n_africa/t/cias-final-report-no-wmd-found-iraq/. “EU Arms Exports to Libya: Who Armed Libya?” Guardian Datablog (last updated March 2, 2011). Accessed June 1, 2016. http://www.theguardian. com/news/datablog/2011/mar/01/eu-arms-exports-libya. “European Parliament Resolution of 25 February 2016 on the Humanitarian Situation in Yemen,” 2016/2515 (RSP). Accessed June 1, 2016. http:// www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+ TA+P8-TA-2016-0066+0+DOC+PDF+V0//EN. “Five Reasons Why BAE Will Do Fine in the US Defense Market.” Forbes, February 21, 2014. Accessed June 15, 2015. http://www.forbes.com/sites/ lorenthompson/2014/02/21/five-reasons-bae-systems-will-do-fine-in-theu-s-defense-market/. “Former Libyan Parliament Reconvenes, Elects Islamist Premier.” Al-Akhbar, August 25, 2014. Accessed June 1, 2015. http://english.al-akhbar.com/ node/21273. “Guns and Sugar.” The Economist, May 25, 2013. Accessed June 1, 2016. http:// www.economist.com/news/business/21578400-more-governments-areinsisting-weapons-sellers-invest-side-deals-help-them-develop. “Guns vs. Butter?” Weekend Argus, February 26, 1995. “Libyan Elections: Low Turnout Marks Bid to End Political Crisis.” BBC News, June 26, 2014. Accessed June 1, 2016. http://www.bbc.com/news/ world-africa-28005801. 209
Indefensible.indd 209
24/05/2017 18:37
INDEFENSIBLE
“Local Firms Line Up for Foreign Gain in Arms Deal.” Business Report, November 6, 2002. “Memo from Donald Rumsfeld to General Dick Myers, Paul Wolfowitz, General Pete Pace and Doug Feith.” October 16, 2003. Accessed June 3, 2016. http://usatoday30.usatoday.com/news/washington/executive/rumsfeldmemo.htm. “NIP Performance Figures, 2014,” attached as Annexure ES2 to the testimony of Sipho Zikode before the Judicial Commission of Inquiry into the Strategic Defense Procurement Program, South Africa. Accessed June 3, 2016. http://www.armscomm.org. “PE Set to become Viking Mecca.” Eastern Province Herald, 2001. “Proposed Charging Letter re: Investigation of BAE Systems plc Regarding Violations of the Arms Export Control Act and the International Traffic in Arms Regulations.” May 2011. Accessed June 3, 2015. http://www.pmddtc. state.gov/compliance/consent_agreements/baes.html. “Russia Announces Libya Arms Deal Worth $1.8bn.” BBC News, January 30, 2010. Accessed June 1, 2016. http://news.bbc.co.uk/2/hi/europe/8489167.stm. “Rwanda: How the Genocide Happened.” BBC News, December 18, 2008. Accessed June 1, 2016. http://news.bbc.co.uk/2/hi/1288230.stm. “SA Sold R70m in Arms to Libya.” Times (South Africa), April 10, 2011. “Somalia Diverting Arms to al-Shabaab, UN Report Claims.” BBC News, February 14, 2014. Accessed June 1, 2016. http://www.bbc.com/news/worldafrica-26200015. “Statement of Offence.” In the Matter of the United States of America v. BAE Systems plc, Violation: Title 18, United States Code, Section 371 (conspiracy), United States District Court for the District of Columbia. “Swiss Hand Grenades reached Syria: Bern.” The Local (Switzerland), September 21, 2012. Accessed June 1, 2016. http://www.thelocal.ch/20120921/swisshand-grenades-reached-syria-bern. “‘Target’ Sonia’s Closest Advisers, Key Middleman Told Officials of AgustaWestland.” Indian Express, February 5, 2014. Accessed June 1, 2016. http:// indianexpress.com/article/india/politics/target-closest-advisers-of-soniagandhi-for-vvip-chopper-deal-key-middleman-told-agustawestland/. “The Air Force’s F-35A: Not Ready For Combat, Not Even Ready for Combat Training.” Project on Government Oversight Blog, March 6, 2013. Accessed June 1, 2016. http://www.pogo.org/blog/2013/03/20130306-air-forces-f-35anot-ready-for-combat.html. “Timeline of French-led Mali Military Intervention.” Associated Press, January 21, 2013. “Tourists Won Points for South African Arms Deal.” The Local (Sweden), February 6, 2007. Accessed June 3, 2016. http://www.thelocal.se/20070206/6316. 210
Indefensible.indd 210
24/05/2017 18:37
Bibliography
“United States Department of Defense Fiscal Year 2016 Budget Request: Overview.” Office of the Under Secretary of Defense (Comptroller) Chief Financial Officer, February 2015, 1‒2. Accessed May 25, 2016. http://comptroller.defense.gov/Portals/45/Documents/defbudget/fy2016/ FY2016_Budget_Request_Overview_Book.pdf. AeroSpace and Defense Industries Assocation of Europe (ASD). “Key Facts and Figures: 2012.” Accessed June 1, 2015. http://www.asd-europe. org/fileadmin/user_upload/Client_documents/ASD_Contents/2_ COMMUNICATION/2.5_Publications/2.5.2_Facts_and_Figures/ASD_ Facts_and_Figures_2012.pdf. AFP. “Policeman Says May Reveal All in Malaysia Murder Scandal.” Daily Mail, February 18, 2015. Accessed May 27, 2016. http://www.dailymail. co.uk/wires/afp/article-2958091/Policeman-says-reveal-Malaysia-murderscandal.html. Africa Watch. “‘Mengistu has Decided to Burn Us Like Wood’: Bombing of Civilians and Civilian Targets by the Ethiopian Air Force.” News from Africa Watch, July 24. 1990. Accessed June 18, 2015. http://www.hrw.org/ legacy/reports/pdfs/e/ethiopia/ethiopia907.pdf. African Rights. Rwanda: Broken Bodies, Torn Spirits(Kigali, Rwanda: African Rights, 2004). Accessed June 2, 2016. http://preventgbvafrica.org/wpcontent/uploads/2013/10/brokenbodies.africanrights.pdf. Alfred, Charlotte. “Nigeria Struggles to Protect Citizens as Boko Haram Death Toll Climbs.” Huffington Post, February 11, 2016. Accessed June 3, 2016. http://www.huffingtonpost.com/entry/boko-haram-massacre-nigeria_ us_56bbb8d8e4b0b40245c5446a. Alusala, Nelson. “The Arming of Rwanda, and the Genocide.” African Security Studies 13, no. 2 (2004): 137‒140. Amnesty International. “The Ultimate Punishment: Saudi Arabia Ramps Up Beheadings in the Kingdom.” April 6, 2015. Accessed July 15, 2015. https:// www.amnesty.org/en/latest/news/2015/04/the-ultimate-punishmentsaudi-arabia-ramps-up-beheadings-in-the-kingdom/. Armscor.“ Armscor Annual Report 2011/2012,” 2012. Accessed June 3, 2016. http://www.armscor.co.za/Downloads/Armscor%20Annual%20Report% 202011-2012.pdf. Asia Sentinel Correspondent. “Deep and Dirty: Malaysia’s Submarine Scandal.” Asia Sentinel, June 25, 2012. Accessed May 27, 2016. http://www. asiasentinel.com/politics/deep-and-dirty-malaysias-submarine-scandal/. Astore, William. “Pentagon Threat Inflation.”Huffington Post, The Blog, April 15, 2013. Accessed June 3, 2014. http://www.huffingtonpost.com/williamastore/pentagon-threat-inflation_b_3084602.html. Axe, David. “Jet Fighter Influence: How Lockheed’s Public Relations Efforts 211
Indefensible.indd 211
24/05/2017 18:37
INDEFENSIBLE
Keep the F-35 Sold.” Offiziere Blog, March 6, 2013. Accessed June 1, 2016. http://www.offiziere.ch/?p=11420. BAE Systems. “Annual Report 2014.” Accessed June 1, 2016. http://investors. baesystems.com/~/media/Files/B/Bae-Systems-Investor-Relations-V3/ Annual%20Reports/bae-annual-report-2014.pdf. Barnes-Dacey, Julien and Daniel Levy. The Regional Struggle for Syria. London: European Council on Foreign Relations, 2013. Accessed June 1, 2016. http:// www.ecfr.eu/page/-/ECFR86_SYRIA_REPORT.pdf. Bender, Bryan. “From the Pentagon to the Private Sector.” Boston Globe, December 26, 2010. Bill & Melinda Gates Foundation. “What We Do: Vaccine Delivery Strategy Overview.” Accessed June 8, 2015. http://www.gatesfoundation.org/WhatWe-Do/Global-Development/Vaccine-Delivery. Bilmes, Linda J. “The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets.” Harvard Kennedy School Faculty Research Working Group Series Paper RWP13-006, March 2013. Accessed May 31, 2016. https://research.hks.harvard. edu/publications/workingpapers/citation.aspx?PubId=8956. Black, Ian. “West Overlooked Risk of Libya Weapons Reaching Mali, Says Expert.” The Guardian, January 21, 2013. Accessed June 2, 2016. http://www. theguardian.com/world/2013/jan/21/west-libya-weapons-mali. Booth, William. “Mexico’s Crime Wave has Left about 25,000 People Missing, Government Documents Show.” Washington Post, November 29, 2012. Accessed June 2, 2016. https://www.washingtonpost.com/world/ the_americas/mexicos-crime-wave-has-left-up-to-25000-missinggovernment-documents-show/2012/11/29/7ca4ee44-3a6a-11e2-9258ac7c78d5c680_story.html. Bosley, Catherine. “Swiss Tighten Rules after Grenades Found in Syria.” Reuters, October 10, 2012. Accessed June 2, 2016. http://uk.reuters.com/ article/uk-swiss-weapons-idUKBRE89918020121010. Brauer, Jurgen and J. Paul Dunne. “Arms Trade Offsets: What Do We Know?” University of Bristol Business School, Working Paper 0910. Accessed June 1, 2015. http://carecon.org.uk/DPs/0910.pdf. Brauer, Jurgen and J. Paul Dunne. “Arms Trade Offsets: What Do We Know?” In Handbook on the Political Economy of War, edited by C.J. Coyne and R.L. Mathers. Cheltenham, UK: Edward Elgar, 2011. Brauer, Jurgen. “Economic Aspects of Arms Trade Offsets.” In Arms Trade and Economic Development: Theory, Policy, and Cases in Arms Trade Offsets, edited by Jurgen Brauer and J. Paul Dunne. New York: Routledge, 2004. Brauer, Jurgen. “Review article: Is War Necessary for Economic Growth?” Economics of Peace and Security Journal, 2, no. 1 (2007): 71‒76. 212
Indefensible.indd 212
24/05/2017 18:37
Bibliography
Brennan Center for Justice at New York University School of Law. “National Security Whistleblowing: a Gap in the Law.” Accessed August 4, 2014. http://www.brennancenter.org/sites/default/files/analysis/Factsheet%20 -%20National%20Security%20Whistleblowing.pdf. Brzoska, Michael. “Trends in Global Military and Civilian Research and Development and their Changing Interface.” Manchester Institute of Innovation Research/Re-Evaluating Defense R&D and Innovative Dynamics, Workshop Paper, 2007. Accessed June 2, 2016. http://ifsh.de/ pdf/aktuelles/india_brzoska.pdf. Bulos, Nabih, Patrick J. McDonnell and Raja Abdulrahim. “ISIS Weapons Windfall May Alter Balance in Iraq, Syria Conflicts.” LA Times, June 29, 2014. Accessed June 1, 2016. http://www.latimes.com/world/middleeast/lafg-iraq-isis-arms-20140629-story.html. Butterfield, Herbert. History and Human Relations. London: Collins, 1951. CAAT. “Revolving Door Log.” Last updated December 4, 2014. http://www. caat.org.uk/issues/influence/revolving-door.php. Campaign Against Arms Trade. Arming Saddam: The Supply of British Military Equipment to Iraq 1979‒1990. London, UK: Campaign Against Arms Trade, 1991. Carroll, Joseph. “Public: World Is More Dangerous Today Than at Most Other Times.” Gallup, July 28, 2006. Chalmers, Malcom, Neil V. Davies, Keith Hartley and Chris Wilkinson. The Economic Costs and Benefits of UK Defence Exports. York, UK: Centre for Defence Economics, University of York, 2001. Accessed June 2, 2016. https://www.caat.org.uk/issues/mod-york-report-nov-01.pdf. Charbonneau, Louis. “Exclusive: Somalia Army Weapons Sold on Open Market—UN Monitors.” Reuters, October 10, 2014. Accessed June 1, 2016. http://www.reuters.com/article/us-somalia-arms-unidUSKCN0HZ22920141010. Chatterjee, Pratap. “One Million Weapons to Iraq; Many Go Missing.” CorpWatch, September 22, 2008. Accessed June 1, 2016. http://www. corpwatch.org/article.php?id=15184. Chayes, Sarah. “How Corruption Guts Militaries: The Ukraine Case Study.” DefenseOne, May 16, 2014. Accessed June 1, 2016. http://www.defenseone. com/ideas/2014/05/how-corruption-guts-militaries-ukraine-casestudy/84646/. Chesterman, Simon. “‘We Can’t Spy … If We Can’t Buy!’: The Privatization of Intelligence and the Limits of Outsourcing ‘Inherently Governmental Functions’.” European Journal of International Law 19, no. 5 (2008): 1055‒1074. Chettiar, Inimai M. “The Many Causes of America’s Decline in Crime.” The Atlantic, February 11, 2015. Accessed June 3, 2016. http://www.theatlantic. 213
Indefensible.indd 213
24/05/2017 18:37
INDEFENSIBLE
com/politics/archive/2015/02/the-many-causes-of-americas-decline-incrime/385364/. Chivers, C.J., Eric Schmitt and Mark Mazetti. “In Turnabout, Syria Rebels Get Libyan Weapons.” New York Times, June 21, 2013. Accessed June 2, 2016. http://www.nytimes.com/2013/06/22/world/africa/in-a-turnabout-syriarebels-get-libyan-weapons.html?_r=0. Cirincione, Joseph. “Political and Strategic Imperatives of National Missile Defense.”Carnegie Endowment for International Peace, October 12, 2000. Accessed June 2, 2016. http://carnegieendowment.org/2000/10/12/ political-and-strategic-imperatives-of-national-missile-defense. Citizens for Responsibility and Ethics in Washington (CREW). “Military Contractors Open the Revolving Door for Former Pentagon Officials.”CREW Blog, October 24, 2013. Accessed June 1, 2015. http://www. citizensforethics.org/blog/entry/military-contractors-open-the-revolvingdoor-for-former-pentagon-official. Citizens for Responsibility and Ethics in Washington (CREW). Strategic Manoeuvres: The Revolving Door from the Pentagon to the Private Sector. Washington, DC: Citizens for Responsibility and Ethics in Washington, 2011. http://www.citizensforethics.org/page/-/PDFs/Reports/CREW_ Strategic_Maneuvers_Pentagon_Generals_Revolving_Door_11_15_12. pdf ?nocdn=1. Cliffe, Lionel. Armed Violence and Poverty in Somalia: A Case Study for the Armed Violence and Poverty Initiative. Bradford, UK: Centre for International Cooperation and Security and University of Bradford, Department for Peace Studies, 2005. Accessed June 1, 2016. https://bradscholars.brad.ac.uk/ handle/10454/1002. CNN Wire Staff. “Al-Shabaab Joining Al Qaeda, Monitor Group Says.” CNN, February 10, 2012. Accessed June 1, 2016. http://www.cnn.com/2012/02/09/ world/africa/somalia-shabaab-qaeda/. Cockburn, Andrew. Kill Chain: The Rise of the High-tech Assassins. New York: Henry Holt, 2015. Cold War Museum. “The Strategic Defense Initiative (SDI): Star Wars.” Accessed June 2, 2016. http://www.coldwar.org/articles/80s/SDI-Star Wars.asp. Commission on Wartime Contracting In Iraq and Afghanistan. “Wartime Contracting Commission Releases Final Report to Congress.” Commission Press Statement, CWC-NR-49, August 31, 2011. Accessed June 3, 2016. http://cybercemetery.unt.edu/archive/cwc/20110929231427/; http://www. wartimecontracting.gov/index.php/pressroom/pressreleases/203-cwc-nr-49. Comptroller and Auditor General of India. “Report of the Auditor General of India on Acquisition of Helicopters for VVIPS.” Union Government: 214
Indefensible.indd 214
24/05/2017 18:37
Bibliography
Defense Services (Air Force), No. 10 of 2013, August 13, 2013. Accessed June 1, 2016. http://www.cag.gov.in/sites/default/files/audit_report_files/Union_ Defence_Compliance_Report_10_2013.pdf. Conflict Armament Research. Dispatch from the Field: Islamic State Ammunition in Iraq and Syria. London: Conflict Armament Research, 2014. Accessed June 1, 2016. http://www.conflictarm.com/wp-content/uploads/2014/10/ Dispatch_IS_Iraq_Syria_Ammunition.pdf. Control Risks. International Business Attitudes Towards Corruption— Survey 2006. London: Control Risks and Simmons & Simmons, 2006. Accessed June 1, 2016. http://www.csr-asia.com/summit07/presentations/ corruption_survey_JB.pdf. Cordesman, Anthony and Aram Nerguizian. The North African Military Balance: Force Developments and Regional Challenges. Washington, DC: Center for Strategic & International Studies (CSIS), 2010. Accessed June 2, 2015. http://csis.org/files/publication/101203_North_African_Military_ Balance_final.pdf. Cordesman, Anthony H. with Michael Peacock, Centre for Strategic and International Studies. The Arab‒US Strategic Partnership and the Changing Security Balance in the Gulf. Lanham, MD: Rowman and Littlefield, 2015. Accessed May 31, 2016. https://csis-prod.s3.amazonaws. com/s3fs-public/legacy_files/files/publication/151014_Cordesman_ ArabUSStrategicPartnership_Web.pdf. Cordesman, Anthony. A Tragedy of Arms: Military and Security Developments in the Mahgreb. Westport, CT: Praeger, 2002. Crawford, Neta C. “U.S. Costs of Wars Through 2014: $4.4 Trillion and Counting: Summary of Costs for the U.S. Wars in Iraq, Afghanistan and Pakistan.” Costs of War Project, Watson Institute of International and Public Affairs, Brown University, June 25, 2014. Accessed May 27, 2016. http://watson.brown.edu/costsofwar/files/cow/imce/papers/2014/US%20 Costs%20of%20Wars%20through%202014.pdf. Currier, Cora. “Charting Obama’s Crackdown on National Security Leaks.” Pro Publica, July 30, 2013. Accessed June 18, 2015. http://www.propublica. org/special/sealing-loose-lips-charting-obamas-crackdown-on-nationalsecurity-leaks. d’Agostino, Giorgio, John Paul Dunne and Luca Pieroni. “Corruption, Military Spending and Growth.” Defence and Peace Economics, 23, no. 6 (2012): 591‒604. Daley, William M. “National Export Strategy: Working for America.” Trade Promotion Coordinating Committee, 2000. De Waal, Alex. “The Wars of Destabilization in the Horn of Africa, 1989‒2001.” 215
Indefensible.indd 215
24/05/2017 18:37
INDEFENSIBLE
In Islamism and Its Enemies in the Horn of Africa, edited by Alex de Waal. London: Hurst, 2004. Debevoise & Plimpton LLP. “Ferrostaal: Final Report, Compliance Investigation.” April 13, 2011. Accessed June 3, 2016. https://kassios.files.wordpress. com/2012/10/confidential-secret-report-findings-re-ferrostal-greek-govcase-pribes1.pdf. Defense Industry Daily Staff. “Scorpene’s Sting: Malaysia’s Bribery & Murder Scandal.” Defense Industry Daily, March 20, 2013. Accessed May 27, 2016. http://www.defenseindustrydaily.com/scorpenes-sting-liberationpublishes-expose-re-malaysias-bribery-murder-scandal-05347/. Department for Business, Innovation, and Skills. The 2010 R&D Scoreboard: The Top 1,000 UK and 1,000 Global Companies by R&D Investment. London: Crown, 2010. Accessed June 2, 2016. http://webarchive.nationalarchives. gov.uk/20101208170217/http:/www.innovation.gov.uk/rd_scoreboard/ downloads/2010_RD_Scoreboard_data.pdf. Des Forges, Alison. Leave None to Tell the Story: Genocide in Rwanda. New York: Human Rights Watch, 1999. Diehl, Paul F. “Arms Races and Escalation: A Closer Look.” Journal of Peace Research 20 no. 3 (1983): 205‒212. Dixon, Jeffrey. “Emerging Consensus: Results from the Second Wave of Statistical Studies on Civil War Termination.”Civil Wars, 11, no. 2 (2009): 121‒136. Doyle, Jack. “Russia’s Military Spending Spree.” USA Today, April 22, 2014. Accessed May 27, 2016. http://www.usatoday.com/story/news/world/2014/ 04/22/ozy-russia-military-spending/8005713/. Dreyfus, Robert and Jason Vest. “The Lie Factory.” Mother Jones, January/ February 2004. Accessed June 3, 2016. http://www.motherjones.com/ politics/2004/01/lie-factory. Dube, Arindrajit, Oeindrila Dube and Omar García-Ponce. “Cross-border Spillover: US Gun Laws and Violence in Mexico.” American Political Science Review, 107, no.3 (2013): 397‒417. Dumas, Lloyd. “Weapons Procurement and Development: Do Offsets Mitigate or Magnify the Military Burden?” Paper prepared for the Conference on “Offsets and Development”: Capetown, SA; September 2002. Accessed June 3, 2016. https://www.utdallas.edu/~ljdumas/Weapons.pdf. Dunne, J. Paul and Mehmet Uye.“Military Spending and Development.” Working Papers 0902, Department of Accounting, Economics and Finance, Bristol Business School, University of West England (2009). Accessed June 2, 2016. https://ideas.repec.org/p/uwe/wpaper/0902.html. Dunne, J. Paul and Nan Tian. “Military Expenditure and Economic Growth: A Survey.” Economics of Peace and Security Journal, 8, no. 1 (2013): 5‒11. 216
Indefensible.indd 216
24/05/2017 18:37
Bibliography
Dunne, J. Paul and Sam Perlo Freeman. “The Impact of a Responsible Arms Control Policy on the UK Economy.” Report prepared for Oxfam, 2003. Accessed June 1, 2015. http://carecon.org.uk/Users/paul/Oxfamreport7.pdf. Dunne, J. Paul. “Military Spending, Growth, Development and Conflict.” Defence and Peace Economics23, no. 6 (2012): 549‒557. Egbo, Obiamaka, Ifeoma Nwakoby, Josaphat Onwumere and Chibuike Uche. “Legitimizing Corruption in Government: Security Votes in Nigeria.” African Studies Centre Working Paper 91/2010, 2010. Accessed August 8, 2014. https://openaccess.leidenuniv.nl/bitstream/handle/1887/16186/ASC075287668-2788-01.pdf ?sequence=2. Ellsberg, Daniel. “Secrecy and National Security Whistleblowing.” Daniel Ellsberg Website, January 8, 2013. Accessed June 18, 2015. http://www. ellsberg.net/archive/secrecy-national-security-whistleblowing. Embassy of the United States of America, Monrovia. “First Shipment of the Ramped Up U.S. Military Response to Ebola Arrives in Liberia.” United States Africa Command, September 19, 2014. Accessed May 31, 2016. http:// www.africom.mil/newsroom/article/23586/first-shipment-of-the-rampedup-u-s-military-response-to-ebola-arrives-in-liberia. European Commission. EU R&D Scoreboard: The 2013 EU Industrial R&D Investment Scoreboard. Luxembourg: Publications Office of the European Union, 2013. Accessed June 3, 2016. http://iri.jrc.ec.europa.eu/scoreboard13. html. EuroStat. “Manufacturing Statistics-NACE Rev. 2.” Last updated November 5, 2014. Accessed June 1, 2015. http://ec.europa.eu/eurostat/statisticsexplained/index.php/Manufacturing_statistics_-_NACE_Rev._2. Federal Democratic Republic of Ethiopia. Foreign Affairs and National Security Policy and Strategy. Addis Ababa: Ministry of Information, 2002. Accessed June 1, 2016. http://www.ethiopiaembassy.ru/pages/docs/Foreign_Police_ English.pdf. Feinstein, Andrew, Paul Holden and Barnaby Pace. “Corruption in the Arms Trade: Sins of Commission.” In SIPRI Yearbook 2011. Oxford: Oxford University Press, 2011. Feinstein, Andrew. The Shadow World: Inside the Global Arms Trade. New York: Picador, 2012. Ferguson, Niall. The Pity of War: Explaining World War One. London: Basic Books, 2000. Fleurant, Aude, Sam Perlo-Freeman, Pieter D. Wezeman, Siemon T. Wezeman and Noel Kelly. “The SIPRI Top 100 Arms Producing Companies, 2014.” SIPRI Fact Sheet, December 2015. Accessed June 2, 2016. http://books.sipri. org/files/FS/SIPRIFS1512.pdf. 217
Indefensible.indd 217
24/05/2017 18:37
INDEFENSIBLE
Food and Drink Federation (FDF). “Statistics at a Glance.” FDF, last updated May 28, 2015. Accessed June 1, 2015. https://www.fdf.org.uk/statsataglance. aspx. Freedom House. Freedom in the World 2014. Washington, DC: Freedom House, 2014. Accessed May 31, 2016. https://freedomhouse.org/report/freedomworld/freedom-world-2014. Friends Committee on National Legislation. “End the Wars—End the War Funding.” 2014. Accessed June 18, 2015. http://fcnl.org/issues/budget/End_ the_Wars_End_the_War_Funding.pdf. Fruchart, Damien, Paul Holtom and Siemon T. Wezeman. United Nations Arms Embargoes: Their Impact on Arms Flow and Target Behaviour. Uppsala, Sweden: Uppsala University, 2007. Accessed June 2, 2016. http://books. sipri.org/files/misc/UNAE/SIPRI07UNAEprelims.pdf. Fung, Brian. “5.1 Million Americans Have Security Clearances. That’s More Than the Entire Population of Norway.” Washington Post, March 24, 2014. Accessed June 3, 2016. https://www.washingtonpost.com/news/the-switch/ wp/2014/03/24/5-1-million-americans-have-security-clearances-thatsmore-than-the-entire-population-of-norway/. Gady, Franz-Stefan. “What do Chinese and Russians Think of the US Military?” The Diplomat, January 6, 2015. Accessed May 27, 2016. http:// thediplomat.com/2015/01/what-do-chinese-and-russians-think-of-the-us-military/. Gansler, Jacques S. and William Lucyshyn. Commercial-Off-The-Shelf (COTS): Doing it Right. College Park, MD: Centre for Public Policy and Private Enterprise, Naval Postgraduate School, 2008. Accessed June 2, 2016. http:// www.dtic.mil/dtic/tr/fulltext/u2/a494143.pdf. Gauba, Vaishali. “Asia Defense Spending: New Arms Race in the South China Sea.” CNBC, May 21, 2015. Accessed May 27, 2016. http://www.cnbc. com/2015/05/21/asia-defense-spending-new-arms-race-in-south-chinasea.html. Gilson, Dave. “Ukraine: Cashing in on Illegal Arms.” PBS, May 2002. Accessed June 1, 2016. http://www.pbs.org/frontlineworld/stories/sierraleone/context. html. Global Research Centre for Research on Globalization. “The Terrorism Statistics Every American Needs to Hear.” Accessed May 19, 2014. http:// www.globalresearch.ca/the-terrorism-statistics-every-american-needs-tohear/5382818. Goitein, Elizabeth and David M. Shapiro. Reducing Overclassification Through Accountability. New York: Brennan Center for Justice at New York University School of Law, 2011. Accessed June 3, 2015. http://brennan.3cdn. net/3cb5dc88d210b8558b_38m6b0ag0.pdf. 218
Indefensible.indd 218
24/05/2017 18:37
Bibliography
Goldberg, J.J. “More Killed by Toddlers than Terrorists in the US.” Forward, May 5, 2013. http://forward.com/opinion/176043/more-killed-by-toddlersthan-terrorists-in-us/. Gordon, David F., Donald Noah and George Fidas. National Intelligence Estimate: The Global Infectious Disease Threat and Its Implications for the United States. Washington, DC: National Intelligence Council, Wilson Center, 2000. Accessed May 31, 2016. https://www.wilsoncenter.org/ publication/national-intelligence-estimate-the-global-infectious-diseasethreat-and-its-implications. Gould, Jens. “The Failure of Plan Colombia.” The American Prospect, April 19, 2007. Accessed May 31, 2016. http://prospect.org/article/failure-plancolombia. Government Accountability Project. “National Security & Human Rights: 2014 Fact Base.” Accessed August 4, 2014. http://whistleblower.org/ national-security-human-rights-2014-fact-base. Government Accountability Project. “National security & Human Rights.” Accessed August 4, 2014. http://www.whistleblower.org/program-areas/ homeland-security-a-human-rights. Government of South Africa. “Full Report of the Joint Health and Treasury Task Team Charged with Examining Treatment Options to Supplement Comprehensive Care for HIV/Aids in the Public Health Sector.” August 8, 2003. Accessed June 3, 2016. http://www.gov.za/sites/www.gov.za/files/ treatment_0.pdf. Graduate Institute of International and Development Studies. Small Arms Survey 2014: Women and Guns. Cambridge: Cambridge University Press, 2014. Accessed June 1, 2015. http://www.smallarmssurvey.org/?small-armssurvey-2014. Greene, Owen and Elizabeth Kirkham. Preventing Diversion of Small and Light Weapons: Issues and Priorities for Strengthened Controls. London and Bradford, UK: Saferworld and the University of Bradford, 2009. Accessed June 2, 2016. http://www.saferworld.org.uk/resources/view-resource/376preventing-diversion-of-small-arms-and-light-weapons. Grefer, James E., David Gregory and Erin Rebhan (CNA Corporation). “Military and Civilian Compensation: How Do They Compare?” In The 11th Quadrennial Review of Military Compensation.Supporting Research Papers. Washington, DC: Office of the Undersecretary of Defense for Personnel and Readiness, 2012. Accessed June 3, 2016. http://www.dtic.mil/ dtic/tr/fulltext/u2/a563240.pdf. Grimmett, Richard F. and Paul K. Kerr. “Conventional Arms Transfers to Developing Nations, 2004‒2011.” Congressional Research Service, August 24, 2012. Accessed June 1, 2016. https://www.fas.org/sgp/crs/weapons/R42678.pdf. 219
Indefensible.indd 219
24/05/2017 18:37
INDEFENSIBLE
Gupta, Sanjeev, Luiz de Mello and Raju Sharan. Corruption and Military Spending—A Working Paper of the International Monetary Fund. Washington, DC: International Monetary Fund, 2000. Accessed June 3, 2016. https://www.imf.org/external/pubs/ft/wp/2000/wp0023.pdf. Harress, Christopher. “ISIS Weapons Growing in Number, Sophistication: A Soviet, Balkan and American Mix, but the Group Can’t Use All of Them.” International Business Times, August 15, 2014. Accessed June 1, 2016. http:// www.ibtimes.com/isis-weapons-growing-number-sophistication-sovietbalkan-american-mix-group-cant-use-all-1659176. Harrison, Todd. Analysis of the FY 2015 Defense Budget. Washington, DC: Centre for Strategic and Budgetary Assessments, 2014. Accessed May 27, 2016. http://csbaonline.org/publications/2014/09/analysis-of-the-fy2015defense-budget/. Harsch, Ernest. “OAU Sets Inquiry Into Rwandan Genocide.” Africa Recovery 12, no. 1 (1998): 4. Hartung, William D. “Just How Many Weapons Can America Sell?” Foreign Policy, July 2, 2013. Accessed June 1, 2016. http://foreignpolicy. com/2013/07/02/just-how-many-weapons-can-america-sell/. Hartung, William D. And Weapons For All. New York: Harper Perennial, 1995. Hartung, William D. Promising the Sky: Pork Barrel Politics and the F-35 Combat Aircraft. Washington, DC: Centre for International Policy, 2014. Accessed June 1, 2016. http://www.ciponline.org/images/ uploads/publications/Hartung_IPR_0114_F-35_Promising_the_Sky_ Updated.pdf. Hartung, William D. Prophets of War: Lockheed Martin and the Making of the Military Industrial Complex. New York: Nation Books, 2011. Hartung, William D. Risk and Reforms: The Economic Illogic of the Obama Administration’s Arms Export Reforms. Washington, DC: Centre for International Policy, 2013. Accessed June 1, 2016. http://www.ciponline. org/research/html/risk-and-returns-the-economic-illogic-of-the-obamaadministrations-arms-exp. Hassan, Turaki A. and Ibrahim Kabiru Sule. “Nigeria: Security Retains Top Spot in 2014 National Budget.” All Africa, December 20, 2013. Accessed June 3, 2016. http://allafrica.com/stories/201312200587.html. Hersh, Seymour. “Selective Intelligence.” The New Yorker, May 12, 2003. Accessed June 3, 2016. http://www.newyorker.com/magazine/2003/05/12/ selective-intelligence. Herz, John. Political Realism and Political Idealism: A Study in Theories and Realities. Chicago: University of Chicago Press, 1951. Hillhouse, R.J. “Outsourcing Intelligence.” The Nation, July 24, 2007. Accessed June 3, 2016. http://www.thenation.com/article/outsourcing-intelligence/. 220
Indefensible.indd 220
24/05/2017 18:37
Bibliography
Holden, Paul and Hennie Van Vuuren. The Devil in the Detail: How the Arms Deal Changed Everything. Jeppestown: Jonathan Ball Publishers, 2011. Holtom, Paul, Mark Bromley, Pieter D. Wezeman and Siemon T. Wezeman. “International Arms Transfers.” In SIPRI Yearbook 2010, 285‒305. Accessed June 1, 2016. http://www.sipri.org/yearbook/2010/files/SIPRIYB 201007.pdf. Hopkins, Nick, Rob Evans and Richard Norton-Taylor. “MoD Staff and Thousands of Military Officers Join Arms Firms.” The Guardian, October 15, 2012. Accessed June 1, 2015. http://www.theguardian.com/uk/2012/ oct/15/mod-military-arms-firms. Howard Teicher’s Affidavit in the Matter of United States of America v. Carlos Cardoen and Others, Case No: 93-241-Highsmith, paragraph 8, January 31, 1995. Accessed June 1, 2016. http://nsarchive.gwu.edu/NSAEBB/ NSAEBB82/iraq61.pdf. Human Rights Watch. Afghanistan: Crisis of Impunity: The Role of Pakistan, Russia and Iran in Fuelling the Civil War. New York: Human Rights Watch, 2001. Accessed May 31, 2016. https://www.hrw.org/reports/2001/afghan2/ Afghan0701.pdf. Human Rights Watch. India: Arms and Abuses in Indian Punjab and Kashmir. New York: Human Rights Watch, 1994. Accessed May 31, 2016. https:// www.hrw.org/sites/default/files/reports/INDIA949.PDF. Human Security Report Project. Human Security Report 2009/2010: The Causes of Peace and the Shrinking Costs of War. New York: Oxford University Press, 2011. Human Security Report Project. Human Security Report 2013: The Decline in Global Violence: Evidence, Explanation, and Contestation. Vancouver: Human Security Press, 2013. Ighomwenghian, Kingsley, Sola Alabadan, Sylvester Enoghase, Philip Oladunjoye, Joe Nwankwo, Gbenga Faturoti and Daniel Abia. “Insurgency: Nigerians Seek Probe of Security Budgets.” Daily Independent, June 30, 2014. Accessed June 18, 2015. http://dailyindependentnig.com/2014/06/ insurgency-nigerians-seek-probe-security-budgets/. Information Security Oversight Office. Report to the President 2014. Washington, DC: ISOO, 2014. Accessed June 3, 2016. http://www.archives. gov/isoo/reports/2014-annual-report.pdf. Information Security Oversight Office. Report to the President 2014. Washington, DC: ISOO, 2014. Accessed June 3, 2016. http://www.archives.gov/isoo/ reports/2014-annual-report.pdf. Ingram, Paul and Roy Isbister. Escaping the Subsidy Trap: Why Arms Exports are Bad for Britain. London and Oxford: British American Security Information Council, Saferworld and Oxford Research Group, 2004. 221
Indefensible.indd 221
24/05/2017 18:37
INDEFENSIBLE
Accessed June 2, 2016. http://www.oxfordresearchgroup.org.uk/sites/ default/files/ORGsubsidy.pdf. Inspector General, Department of Defense. Semi-Annual Report to the Congress, 1 October 1998–31 March 1999. Darby, PA: DIANE Publishing, 1999. Intergovernmental Panel on Climate Change. Climate Change 2014: Impacts, Adaptation, and Vulnerability. Cambridge: Cambridge University Press, 2014. International Crisis Group. “Curbing Violence in Nigeria (II): the Boko Haram Insurgency.” Africa Report No. 216, April 3, 2014. Accessed August 4, 2014. http://www.crisisgroup.org/~/media/Files/africa/west-africa/nigeria/216curbing-violence-in-nigeria-ii-the-boko-haram-insurgency.pdf. Intrilligator, Michael. “The Concept of a Peace Dividend.” In Economics of Peace and Security, edited by J. Galbraith, J. Brauer and L. Webster, in Encyclopedia of Life Support Systems (EOLSS), developed under the auspices of the UNESCO. Paris: EOLSS Publishers, 2002. http://www. eolss.net. Isacson, Adam, Lisa Haugaard and Jennifer Johnson. A Cautionary Tale: Plan Colombia’s Lessons for U.S. Policy Toward Mexico and Beyond. Washington, DC: Center for International Policy, Latin America Working Group Education Fund, and Washington Office on Latin America, 2011. Accessed May 31, 2016. http://www.wola.org/publications/a_cautionary_tale_plan_ colombias_lessons_for_us_policy_toward_mexico_and_beyond. Jackson, Kirk. “The Arms Trade Treaty: A Historic and Momentous Failure.” Ceasefire Magazine, April 29, 2013. Accessed June 1, 2016. https:// ceasefiremagazine.co.uk/failure-arms-trade-treaty/. Jervis, Robert. Perception and Misperception in International Politics. Princeton, NJ: Princeton University Press, 1976. Johnson, Glen. “Libya Weapons Aid Tuareg Rebellion in Mali.”Los Angeles Times, June 12, 2012. Accessed June 2, 2016. http://articles.latimes.com/2012/ jun/12/world/la-fg-libya-arms-smuggle-20120612. Jones, Seth and Martin Libicki. How Terrorist Groups End. Santa Monica, CA: Rand Corporation, 2008. Accessed June 1, 2016. http://www.rand.org/ content/dam/rand/pubs/monographs/2008/RAND_MG741-1.pdf. Kaldor, Mary. The Baroque Arsenal. New York: Hill & Wang, 1981. Katzman, Kenneth. “Al Qaeda: Profile and Threat Assessment.” Congressional Research Service, August 17, 2005. Accessed May 31, 2016. https://www.fas. org/sgp/crs/terror/RL33038.pdf. Kaufmann, Chaim. “Threat Inflation and the Failure of Marketplace of Ideas.” In American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, edited by Trevor Thrall and Jane Cramer. London: Routledge, 2009. 222
Indefensible.indd 222
24/05/2017 18:37
Bibliography
Kean, Thomas H. and Lee Hamilton.The 9/11 Commission Report. Washington, DC: National Commission on Terrorist Attacks upon the United States, 2004. Khoo, Julian. “Zahid: Our Submarine Can’t Dive.” Malaysia Today, February 11, 2010. Accessed May 27, 2016. http://www.malaysia-today.net/zahid-oursubmarine-cant-dive/. Kington, Tom. “Court Reverses Former Finmeccanica CEO Orsi’s Acquittal.” DefenseNews, April 7, 2016. Accessed June 1, 2016. http://www.defensenews. com/story/defense/international/europe/2016/04/07/court-reversesformer-finmeccanica-ceo-orsis-acquittal/82767690/. Klein, Naomi. The Shock Doctrine. London: Allen Lane, 2007. Kolko, Gabriel. Century of War: Politics, Conflicts, and Society since 1914. New York: The New Press, 1994. Korb, Lawrence J., Max Hoffman and Katherine Blakeley. A User’s Guide to the Fiscal Year 2015 Defense Budget. Washington, DC: Center for American Progress, 2014. Accessed May 31, 2016. https://www.americanprogress.org/ issues/security/report/2014/04/24/88516/a-users-guide-to-the-fiscal-year2015-defense-budget/. Lacina, Bethany. “Explaining the Severity of Civil Wars.” Journal of Conflict Resolution 50, no. 2 (2006): 276‒289. Lardner Jr, George. “Gonzalez’s Iraq Expose—Hill Chairman Details US Prewar Courtship.” Washington Post, March 22, 1992. Lefebvre, Jeffrey A. Arms for the Horn: U.S. Security Policy in Ethiopia and Somalia, 1953–1991. Pittsburg, PA: University of Pittsburg Press, 1991. Letter from International Association of Machinists and Aerospace Workers to The House Committee on Foreign Affairs, 19 March 2013. Submitted for the record by the Honorable Brad Sherman (California) during Hearing Before the Committee on Foreign Affairs (House of Representatives), One Hundred Thirteenth Congress, First Session, 24 April 2013. Accessed June 1, 2016. https://archive.org/stream/799020-house-hearing-on-exportcontrols/799020-house-hearing-on-export-controls_djvu.txt. Libya Body Count. “Table: Violent Deaths in Libya.” Libya Body Count. Accessed June 10, 2015. http://www.libyabodycount.org/table. Lifsher, Marc. “California Grants $420m Tax Break to Lockheed Martin Corp.” Los Angeles Times, July 3, 2014. Accessed June 3, 2016. http://www. latimes.com/business/la-fi-bomber-tax-break-20140704-story.html. Lockheed Martin. “Powering Job Creation for America and its Allies.”Accessed June 1, 2016. https://www.f35.com/about/economic-impact. Maclean, William. “Saudi Arabia Outpaces India to Become Top Defense Importer.” Reuters, March 8, 2015. Accessed June 1, 2016. http://www.reuters. com/article/us-defence-supplies-saudi-idUSKBN0M40FY20150308. 223
Indefensible.indd 223
24/05/2017 18:37
INDEFENSIBLE
Magnarella, Paul. “Explaining Rwanda’s 1994 Genocide.” Human Rights and Human Welfare 2, no. 1 (2002): 25‒34. Marx, Jacob. “Littoral Combat Ship: The Warship That Can’t Go to War.” Centre for International Policy, Policy Brief, August 2014. Accessed May 27, 2016. http://www.ciponline.org/images/uploads/publications/Littoral_ Combat_Ship.pdf. McDougal, Topher, David A. Shirk, Robert Muggah and John H. Patterson. The Way of the Gun: Estimating Firearm Traffic Across the US‒Mexico Border. Rio de Janeiro, Brazil and San Diego, CA: Igarape Institute and University of San Diego, 2013. Accessed June 1, 2016. http://catcher.sandiego.edu/ items/peacestudies/way_of_the_gun.pdf. McDougal, Topher, Robert Muggah, David Shirk and John Patterson. “Made in the U.S.A.: The Role of American Guns in Mexican Violence.” The Atlantic, March 18, 2013. Accessed June 2, 2016. http://www.theatlantic.com/ international/archive/2013/03/made-in-the-usa-the-role-of-americanguns-in-mexican-violence/274103/. Melander, Erik. Organized Violence in the World 2015: An Assessment of the Uppsala Conflict Data Program. Uppsala: Uppsala Universiteit and Uppsala Conflict Data Program, 2014. Accessed June 18, 2015. http://www.pcr.uu.se/ digitalAssets/66/66310_1ucdp-paper-9.pdf. Miles, Anne Daugherty. “Intelligence Spending: In Brief.” Congressional Research Service, February 26, 2016. Accessed May 27, 2016. https://www. fas.org/sgp/crs/intel/R44381.pdf. Miroff, Nick and William Booth. “Mexico’s Drug War is at a Stalemate as Calderon’s Presidency Ends.” Washington Post, November 27, 2012. Accessed June 2, 2016. https://www.washingtonpost.com/world/the_americas/ calderon-finishes-his-six-year-drug-war-at-stalemate/2012/11/26/82c90a9431eb-11e2-92f0-496af208bf23_story.html. Mount, Mike.“Hussein’s Iraq and al Qaeda Not Linked, Pentagon Says.”CNN, March 13, 2008. Accessed June 3, 2016. http://www.cnn.com/2008/ US/03/13/alqaeda.saddam/. Moynihan, Daniel Patrick. Secrecy: The American Experience. New Haven, CT: Yale University Press, 1998. Murray, Christopher J.L., Michael Hanlon and Joseph Dieleman. Financing Global Health 2012: The End of the Golden Age? Seattle, WA: Institute for Health Metrics and Evaluation, 2012. Accessed May 31, 2016. http://www.healthdata.org/policy-report/financing-global-health-2012end-golden-age. Nasr, Vali. The Dispensable Nation: American Foreign Policy in Retreat. New York: Doubleday, 2013. 224
Indefensible.indd 224
24/05/2017 18:37
Bibliography
National Science Board. “Science and Engineering Indicators: 2012.” Accessed June 1, 2016. http://www.nsf.gov/statistics/seind12/. Nattrass, Nicoli. The Moral Economy of Aids in South Africa. Cambridge: Cambridge University Press, 2004. Nissenbaum, Dion. “How Many People Hold Security Clearance?” The Wall Street Journal, September 17, 2013. Accessed June 3, 2016. http://blogs. wsj.com/washwire/2013/09/17/how-many-people-hold-secret-securityclearance/. O’Rourke, Ronald. “Navy Littoral Combat Ship (LCS)/Frigate Program: Background and Issues for Congress.” Congressional Research Service, May 25, 2016. Accessed May 27, 2016. https://www.fas.org/sgp/crs/ weapons/RL33741.pdf. Obama, Barack. “Video Remarks by The President to the Department of Commerce Annual Export Controls Update Conference.” The White House Office of the Press Secretary, August 30, 2010. Accessed May 17, 2016. https://www.whitehouse.gov/the-press-office/2010/08/30/videoremarks-president-department-commerce-annual-export-controlsupdat. Office of the Under Secretary for Defense (Comptroller). National Defense Budget Estimates for FY2016. United States Department of Defense, March 2015. Accessed May 31, 2016. http://comptroller.defense.gov/Portals/45/ Documents/defbudget/fy2016/FY16_Green_Book.pdf. Office of the Under Secretary for Defense (Comptroller). National Defense Budget Estimates for FY2015, United States Department of Defense, March 2014. Accessed May 31, 2016. http://comptroller.defense.gov/Portals/45/ Documents/defbudget/fy2015/FY15_Green_Book.pdf. Onuoha, Freedom C. “Porous Borders and Boko Haram’s Arms Smuggling Operations in Nigeria.” Al Jazeera Center for Studies, September 8, 2013. Accessed June 3, 2015. http://studies.aljazeera.net/en/reports/2013/09/ 201398104245877469.htm. Open Society Justice Initiative. “The Tshwane Principles on National Security and the Right to Information: An Overview in 15 Points.” Accessed June 20, 2015. http://www.opensocietyfoundations.org/fact-sheets/tshwaneprinciples-national-security-and-right-information-overview-15-points. Open Society Justice Initiative. “Understanding the Tshwane Principles.” Accessed June 20, 2015. http://www.opensocietyfoundations.org/briefingpapers/understanding-tshwane-principles. Perry, William J. “A New Way of Doing Business.” Memorandum for Secretaries of the Military Departments, June 29, 1994. http://www.sae.org/standardsdev/ military/milperry.htm. 225
Indefensible.indd 225
24/05/2017 18:37
INDEFENSIBLE
Pilling, David. “Asia Follows China Into an Old-Fashioned Arms Race.” Financial Times, April 2, 2014. Accessed May 27, 2016. http://www.ft.com/ cms/s/0/9d83bf62-b9b9-11e3-a3ef-00144feabdc0.html#axzz4AFe0QdKC. Pilling, David. “Asia Follows China Into an Old-Fashioned Arms Race.” Financial Times, April 2, 2014. Accessed May 27, 2016. http:// www.f t.com/cms/s/0/9d83bf62-b9b9-1 1e3-a3ef-001 4 4feabdc0. html#axzz4AFe0QdKC. Pinker, Stephen. The Better Angels of Our Nature: Why Violence Has Declined. New York: Viking Penguin, 2011. Plumer, Brad. “Eight Facts about Terrorism in the United States.”Washington Post, Wonkblog, April 16, 2013. Accessed June 14, 2014. http://www. washingtonpost.com/blogs/wonkblog/wp/2013/04/16/eight-facts-aboutterrorism-in-the-united-states/. POGO. “An Open Letter to Appropriators in Congress: End the Budget Gimmicks and Cut the Pentagon’s Slush Fund.” February 6, 2014. Accessed June 3, 2016. http://www.pogo.org/our-work/letters/2014/an-open-letterto-congress-end-the-budget-gimmicks.html. Pollin, Robert, and Heidi Garrett-Peltier. The US Employment Effects of Military and Domestic Spending Priorities: 2011 Update. Amherst, MA: Political Economy Research Institute, University of Massachusetts, 2011. Accessed May 27, 2016. http://www.peri.umass.edu/fileadmin/pdf/published_study/ PERI_military_spending_2011.pdf. Polyakov, Leonid. “Corruption Obstructs Reform in the Ukrainian Armed Forces.” In Almanac on Security Sector Governance in Ukraine 2012, edited by Joseph L. Derdzinski and Valeriya Klymenko. Geneva, Switzerland and Kyiv, Ukraine: DCAF, Razumkov Centre, and “Zapovit” Publishing House,2012. Powell, Jonathan. Talking to Terrorists: How to End Armed Conflicts. London: Random House, 2015. Pregent, Michael and Michael Weiss. “Exploiting ISIS Vulnerabilities in Iraq.” The Wall Street Journal, August 12, 2014. Accessed June 1, 2016. http://www. wsj.com/articles/michael-pregent-and-michael-weiss-exploiting-the-isisvulnerabilities-in-iraq-1407884145. Project on Government Oversight (POGO). “Pentagon Slush Fund Must Be Drawn Down.” POGO Blog, February 6, 2014. Accessed June 18, 2015. http://www.pogo.org/blog/2014/02/pentagon-slush-fund-must-bedrawn-down.html. Public Interest Declassification Board. Transforming the Security Classification System.Washington, DC: ISOO, 2012. Accessed June 18, 2015. http:// www.archives.gov/declassification/pidb/recommendations/transformingclassification.pdf. 226
Indefensible.indd 226
24/05/2017 18:37
Bibliography
Ripley, Will, Jason Hanna and Eimi Yamamitsu. “Japanese Lawmakers OK Greater Overseas Role for Military.” CNN, September 19, 2015. Accessed May 27, 2016. http://www.cnn.com/2015/09/18/asia/japan-military-constitution/. Rizk, Mariam. “Libya’s Islamist Militias Claim Control of Capital.” Associated Press, August 24, 2014. Roeber, Joe. “Hard Wired for Corruption: The Arms Trade and Corruption.” Prospect, August 28, 2005. Rozen, Laura. “Israeli, American Indicted for Gun Running to Somalia.” Politico, 28 June, 2010. Accessed June 1, 2016. http://www.politico.com/ blogs/laurarozen/0610/Israeli_American_indicted_for_gun_running_to_ Somalia.html. Saad, Lydia. “Most Americans Believe Crime in the U.S. is Worsening.” Gallup, October 31, 2011. Sample, Susan. “Military Build-ups: Arming and War.” In What Do We Know About War?, edited by John Vasquez, 165‒197. Lanham, MD: Rowman and Littlefield, 2000. Sandler, Todd. “The Analytical Study of Terrorism: Taking Stock.” Journal of Peace Research (2013): 257‒271. Scarborough, Rowan. “Now They Want Our Help? Ukraine Military SOLD its Best Weapons for Cash.” The Washington Times, April 23, 2014. Accessed June 1, 2016. http://www.washingtontimes.com/news/2014/apr/23/soldout-ukraines-leadership-swapped-best-military/?page=all. Schmitt, Burkard. Defense Procurement in the European Union: The Current Debate. Paris: European Union Institute for Security Studies, 2005. Accessed June 3, 2016. http://www.iss.europa.eu/uploads/media/bk05-01. pdf. Schneier, Bruce. “Worst-Case Thinking.”Schneier on Security, May 10, 2010. Accessed June 3, 2014. https://www.schneier.com/blog/archives/2010/05/ worst-case_thin.html. Schofield, Steven. Making Arms, Wasting Skills: Alternatives to Militarism and Arms Production. London: Campaign Against the Arms Trade, 2008. Accessed June 1, 2016. https://www.caat.org.uk/resources/publications/ economics/making-arms-2008.pdf. Seelke, Claire Ribando. “Mexico and the 112th Congress.” Congressional Research Service, January 29, 2013. Accessed June 1, 2016. https://fas.org/ sgp/crs/row/RL32724.pdf. Shalal-Esa, Andrea. “Exclusive: U.S. Sees Lifetime Cost of F-35 Fighter at $1.45 Trillion.” Reuters, March 29, 2012. Accessed May 27, 2016. http://www. reuters.com/article/us-lockheed-fighter-idUSBRE82S03L20120329. Shane, Scott. “Cost to Protect U.S. Secrets Doubles to Over $11 Billion.” New York Times, June 2, 2012. Accessed June 18, 2015. http://www.nytimes. 227
Indefensible.indd 227
24/05/2017 18:37
INDEFENSIBLE
com/2012/07/03/us/politics/cost-to-protect-us-secrets-doubles-indecade-to-11-billion.html?_r=0. Sheikh, Abdi. “Arms Dealers Revel in Somali War Business.” Reuters, June 9, 2009. Accessed June 1, 2016. http://www.reuters.com/article/us-armssomalia-idUSTRE5582RR20090609. Sieff, Kevin. “US-built Ebola Treatment Centersin Liberia are Nearly Empty as Outbreak Fades.” Washington Post, January 18, 2015. Accessed June 1, 2016. https://www.washingtonpost.com/world/africa/us-built-ebola-treatmentcenters-in-liberia-are-nearly-empty-as-disease-fades/2015/01/18/9acc3e2c9b52-11e4-86a3-1b56f64925f6_story.html. Sköns, Elizabeth. “Evaluating Defense Offsets: The Experience in Finland and Sweden.” In Arms Trade and Economic Development: Theory, Policy and Cases in Arms Trade Offsets, edited by Jurgen Brauer and J. Paul Dunne, 149‒163. London: Routledge, 2004. Spencer, Richard. “Libyan Arms that Went Missing under Gaddafi ‘Fuelling Multiple Conflicts’.”The Telegraph, April 10, 2013. Accessed June 2, 2016. http://www.telegraph.co.uk/news/worldnews/africaandindianocean/ libya/9985183/Libyan-arms-that-went-missing-under-Gaddafi-fuellingmultiple-conflicts.html. Stiglitz, Joseph E. and Linda J. Bilmes. The Three Trillion Dollar War: The True Cost of the Iraq Conflict. London: Allen Lane, Penguin Books, 2008. Stiglitz, Joseph E. and Linda J. Bilmes.“The True Cost of the Iraq War: $3 Trillion and Beyond.” Washington Post, September 5, 2010. Stockholm International Peace Research Institute (SIPRI). Arms Transfers Database 2015. Accessed March 1, 2016. http://www.sipri.org/databases/ armstransfers. Stockholm International Peace Research Institute (SIPRI). SIPRI Military Expenditure Database 2015. Accessed May 27, 2016. http://milexdata.sipri. org. Stockholm International Peace Research Institute (SIPRI). TIV-Import Database, 2015. Accessed March 1, 2016. http://www.sipri.org/databases/ armstransfers/background. Stockholm International Peace Research Institute (SIPRI). Trends in World Military Expenditure 2013. SIPRI Fact Sheet, 2014. Accessed May 27, 2016. http://www.sipri.org/research/armaments/milex/recent-trends. Stockholm International Peace Research Institute (SIPRI). Trends in World Military Expenditure 2014. SIPRI Fact Sheet, 2015. Accessed May 26, 2016. http://www.sipri.org/media/pressreleases/2015/milex-april-2015. Stockholm International Peace Research Institute (SIPRI). Trends in World Military Expenditure, 2015. SIPRI Fact Sheet, 2016. Accessed May 27, 2016. http://books.sipri.org/files/FS/SIPRIFS1604.pdf. 228
Indefensible.indd 228
24/05/2017 18:37
Bibliography
Swiss State Secretariat for Economic Affairs (SECO). “Swiss Hand Grenades in Syria: Conclusion of Investigation and Measures.” Press Statement by the Swiss SECO, September 21, 2012. Accessed June 1, 2016. http://www.seco. admin.ch/aktuell/00277/01164/01980/index.html?lang=en&msg-id=46075. Sylvester, Rachel and Alice Thomson. “William Hague: ‘The World is Becoming More Dangerous’.” The Times, January 26, 2013. TaxPayers for Common Sense. “The Unaffordable F-35: Budget History and Alternatives.” April 2014. Accessed June 1, 2016. http://www.taxpayer.net/ images/uploads/Alternatives%20to%20the%20F35(1).pdf. Taylor, Travis K. “Countertrade Offsets in International Procurement: Theory and Evidence.” In Designing Public Procurement Policy in Developing Countries, edited by Murat A. Yulek and Travis K. Taylor, 15‒34. New York: Springer Science and Business Media, 2011. Themnér, Lotta and Peter Wallensteen. “Armed Conflicts, 1946–2013.” Journal of Peace Research 51, no. 4 (2014): 541‒554. Thrall, Trevor and Jane Cramer. “Introduction: Understanding Threat Inflation.” In American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, edited by Trevor Thrall and Jane Cramer. London: Routledge, 2009. Transparency International (TI). “Government Defense Anti-Corruption Index.” TI, International Defense and Security Programme, 2015. Accessed June 18, 2015. http://government.defenseindex.org/. Traynor, Ian. “The International Dealers in Death.”The Guardian, July 9, 2001. Accessed June 1, 2015. http://www.theguardian.com/world/2001/jul/09/ armstrade.iantraynor. US Senate Committee on Banking, Housing, and Urban Affairs. Second Staff Report on US Chemical and Biological Warfare-Related Dual-Use Exports to Iraq and the Possible Impact on the Health Consequences of the War, 1995. Uhrmacher, Kevin and Mary Beth Sheridan.“The Brutal Toll of Boko Haram’s Attacks on Civilians.”Washington Post, April 3, 2016. Accessed June 3, 2016. https://www.washingtonpost.com/graphics/world/nigeria-boko-haram/. UK Office for National Statistics. “Defense-Related Activities in the UK.” PRODCOM Final Results 2014. Accessed June 2, 2016. http://www.ons. gov.uk/ons/rel/prodcom/prodcom-final-results/defense-related-activitiesin-the-uk/sty-def.html. UK Office for National Statistics. “UK Manufacturers Sales by Product (PRODCOM), 2013 Intermediate Results.” UK Office for National Statistics, December 18, 2014. Accessed June 2, 2016. http://www.ons.gov. uk/ons/dcp171778_389619.pdf. UN News Service. “UN Budget Committee Approves Funding for UN Ebola Response Mission.” UN News Centre, October 7, 2014. Accessed May 31, 2016. http://www.un.org/apps/news/story.asp?NewsID=49021#.VXW1YNJVhBe. 229
Indefensible.indd 229
24/05/2017 18:37
INDEFENSIBLE
United Nations Security Council. “Report of the Panel of Experts on Somalia Pursuant to Security Council Resolution 1425 (2002),” S/2003/223. United Nations Security Council. “Report of the Panel of Experts Appointed Pursuant to Security Council Resolution 1306 (2000).” S/2000/1195, December 20, 2000. United Nations Trust Fund for Human Security. “Human Security for All.”Accessed June 8, 2015. http://www.un.org/humansecurity/abouthuman-security/human-security-all. United Nations. “Background Information on Sexual Violence Used as a Tool of War.” Outreach Programme of the Rwanda Genocide and the United Nations, 2014. Accessed June 15, 2015. http://www.un.org/en/preventgenocide/ rwanda/about/bgsexualviolence.shtml. United States Department of Defense. “Operation United Assistance at a Glance.” 2015. Accessed June 8, 2015. http://www.defense.gov/home/ features/2014/1014_ebola/. United States Department of State. “Department of State and Other International Programs.” US Department of State, 2014. Accessed June 1, 2016. https://www.whitehouse.gov/sites/default/files/omb/budget/fy2014/ assets/state.pdf. United States Department of State. “Terrorism Deaths, Injuries, and Kidnappings of Private US Citizens Overseas in 2013.”Accessed June 3, 2014. http://www.state.gov/j/ct/rls/crt/2013/224833.htm. United States District Court, Southern District of Florida. Indictment in the Matter of United States of America vs. Joseph O’Toole and Chanoch Miller, Case No. CR-COHN, June 17, 2010. United States House of Representatives, National Defense Authorization Act for Fiscal Year 2008. Public Law 110-181, 110th Congress, January 28, 2008. US Department of Defense, Office of the Inspector General. Audit Report: The Timber Wind Special Access Program (Report No. 93-033). Arlington, VA: Office of the Inspector General, 1992. Accessed June 18, 2015. https://www. fas.org/sgp/othergov/dod/tw.pdf. US Department of Justice. “FCPA and Related Enforcement Actions—In Re Armor Holdings.”Accessed August 4, 2014. http://www.justice.gov/ criminal/fraud/fcpa/cases/armor-holdings.html. US Securities and Exchange Commission. “SEC Enforcement Actions: FCPA Cases.” Accessed May 20, 2015. http://www.sec.gov/spotlight/fcpa/fcpacases.shtml. Van Evera, Stephen. “Foreword.” In American Foreign Policy and the Politics of Fear: Threat Inflation Since 9/11, edited by Trevor Thrall and Jane Cramer. London: Routledge, 2009. 230
Indefensible.indd 230
24/05/2017 18:37
Bibliography
Vela, Justin. “Saudi Arabia Becomes World’s Fourth Biggest Military Spender.” The National (Abu Dhabi), April 14, 2014. Accessed June 1, 2016. http:// www.thenational.ae/world/saudi-arabia/saudi-arabia-becomes-worldsfourth-biggest-military-spender. Verwimp, Philip. “Machetes and Firearms: The Organization of Massacres in Rwanda.” Journal of Peace Research 43, no. 1 (2006): 5‒22. Von Grebmer, Klaus, J. Bernstein, A. de Waal, N. Prasai, S. Yin and Y. Yohannes. 2015 Global Hunger Index: Armed Conflict and the Challenge of Hunger. Bonn, Washington, DC, and Dublin: Welthungerhilfe, International Food Policy Research Institute, and Concern Worldwide, 2015. Wallis, William. “Pillar of West African Security Struggles to Keep Peace at Home in Nigeria.” Financial Times, May 21, 2014. Accessed June 3, 2016. http://www.ft.com/intl/cms/s/0/3a0d25f0-e0f0-11e3-a934-00144feabdc0. html. Walt, Stephen M. “Rush to Failure: The Flawed Politics and Policies of Missile Defense.” Harvard Magazine, May 1, 2000. Accessed June 2, 2016. http:// harvardmagazine.com/2000/05/rush-to-failure-html. Webster, Robin. “Degrees of Change: The IPCC’s Projections for Future Temperature Rise.” The Carbon Brief Blog, April 15, 2014. Accessed June 1, 2016. http://www.carbonbrief.org/degrees-of-change-the-ipccsprojections-for-future-temperature-rise. Weiner, Tim. “Blowback from the Afghan Battlefield.” New York Times Magazine, March 13, 1994. Accessed May 31, 2016. http://www.nytimes. com/1994/03/13/magazine/blowback-from-the-afghan-battlefield. html?pagewanted=all. Weiner, Tim. “The CIA’s Leaking Pipeline.” Philadelphia Inquirer, February 28, 1988. Accessed May 31, 2016. http://articles.philly.com/1988-02-28/ news/26243788_1_afghan-rebels-arms-pipeline-afghan-operation. Weinstein, Adam. “The All-Time 10 Worst Military Contracting Boondoggles.” Mother Jones, September 2, 2011. Accessed June 1, 2015. http://www. motherjones.com/mojo/2011/09/contractor-waste-iraq-KBR. Wheeler, Winslow. “The Jet That Ate the Pentagon.” Foreign Policy, April 26, 2012. Accessed June 1, 2016. http://foreignpolicy.com/2012/04/26/the-jetthat-ate-the-pentagon/. Willett, Susan. “Defence Expenditures, Arms Procurement and Corruption in Sub-Saharan Africa.” Review of African Political Economy 36, no. 121 (2009): 335‒351. Wittner, Lawrence S. “The Greed of Lockheed Martin.” Consortium News, March 23, 2013. Accessed June 3, 2016. http://consortiumnews. com/2013/03/23/the-greed-of-lockheed-martin/. 231
Indefensible.indd 231
24/05/2017 18:37
INDEFENSIBLE
World Food Programme. “Hunger Statistics.”Accessed June 8, 2015. http:// www.wfp.org/hunger/stats. World Trade Organization. Agreement on Public Procurement: Article XXIII (Uruguay Round Agreement). Accessed June 3, 2016. http://www.wto.org/ english/docs_e/legal_e/gpr-94_02_e.htm. Yazigi, Jihad. Syria’s War Economy. London: Council on Foreign Relations, 2014. Accessed June 1, 2016. http://www.ecfr.eu/page/-/ECFR97_SYRIA_ BRIEF_AW.pdf. Yuniorrita, Sezsy and Curie Maharani. “Caveat Emptor: The Challenge of Implementing Defense Offset in RI.” Jakarta Post, October 13, 2012. Accessed June 3, 2016. http://www.thejakartapost.com/news/2012/10/13/ caveat-emptor-the-challenge-implementing-defense-offset-ri. html?search=caveat+emptor. Zenko, Micah. “Is the World More Dangerous than Ever?” CNN, Global Public Square, April 12, 2012. Accessed August 15, 2014. http://globalpublicsquare. blogs.cnn.com/2012/04/12/is-the-world-more-dangerous-than-ever/.
232
Indefensible.indd 232
24/05/2017 18:37
INDEX
accountability, 176; chain, 131 Acoustic Rapid COTS Insertion Program, 99 active conflicts, internationalized, 33 Adolff, Jurgen, 122 Afghanistan, 17, 26; drone warfare, 19; US involvement in, 3, 58; war in, 25, 112; war in cost, 113, 138 Africa: African Union, 35, 64, 66, 69; military spending, 15 Aftergood, Steven, 140, 147-8 Airbus, 103 airplanes, World War I development, 98 Al Jazeera, 70 Al Qaida, 25-6, 64, 66, 161, 166 Al Qaida in the Islamic Maghreb (AQIM), 69 Al Yamanah arms deal, 51 Al-Shabaab, 35, 64, 66; ex-Libyan armaments, 70 Aleppo, ISIS Humvees, 63 Algeria, 16 Amnesty International, 79; Saudi Arabia report 2014, 49 Anbar province, Iraq, 62 Angola, 16; civil war, 159 anti-satellite weapons, China investment in, 22 Anthrax, 61 ‘anti-access denial’, 21
Archduke Ferdinand, assassination of, 20 Arizona, 75; military weapons ban repeal, 74 Armore Holdings, 143 arms business: controls diversions, 4; corruption high risk, 118; cost estimate, 132; dealers, 38; economic rationalizations, 40; export licences, 68; global spending, 11; job creation subsidies, 84, 92; long supply lines, 6; political analysis undermined, 155; political clout, 1; rationalization myths, 2; regime self-protection use, 3; subsidized exports, 95; taxpayer costs, 1; threats inflation, 170; US embargo on Somalia, 64; trade complexity, 124; see also defense Arms Deal: South Africa social cost of, 133; jobs promise unfulfilled, 110 Arms Trade Treaty UN 2013, 4, 78; weaknesses of, 58, 79-81 Armscor, offset failure, 108, 109 ARPANET, 103, 104 Asia Pacific, arms race, 21 assymetric forces, China investment in, 22 Astore, William, 164 Austal corporation, 23 Australia, 15 233
Indefensible.indd 233
24/05/2017 18:37
INDEFENSIBLE Austria-Hungary, 20 Axe, David, 42 BAE Systems, 5, 42, 85, 122, 143; bribery allegations, 119; plea bargaining, 121; Saudi corruption investigation, stopped, 123; Saudi sales, 50 ‘baroque arsenal’, military R&D outcome, 97 Belgrade, Chinese embassy bombed, 21 Berners-Lee, Tim, 104 Bilmes, Linda, 113 bin Laden, Osama, 25 Binney, William, 142 Bistrong, Richard, 143 Black Hawk helicopters, 44 Blackwater, 131 Blair, Tony, 123 ‘blowbacks’, 58, 61, 169 Boeing Corporation, 46; jet refuelling tankers, 130 Boko Haram, 138; Libyan arms, 70; Nigeria, 35 ‘bomber gap’, 163 Boston Globe, 125 botulinium, 61 Bout, Viktor, 72 Brauer, Jurgen, 98, 111-12 Brazil, Igarape Institute, 74 bribes, European defense industry, 87 British Virgin Isles, 120 Burkina Faso, 4; Ouagadougou, 72; weapons in, 71 Bush, George W., 139, 147, 165-6; Administration manipulations, 167; Iraq invasion decision, 148 buying countries, offset size, 45 Calderon, Felipe, 73-4 California, 74-5, 127
Campaign Against the Arms Trade (CAAT), 126 Cartwright, James, 127 Ceasefire, campaign group, 79 Center for American Progress, 139 Centre for Strategic and International Studies, 27 CERN, 104 Chad, 67; fake end-user certificates, 64, 66 Cheney, Dick, 129 children, deaths of, 36 Chile, 119-20 China, 15, 48, 155; ammunition from, 54; arms race, 22; defense budget increase, 15, 17; defense manufacturing, 85; military spending regional impact, 21 CIA (USA Central Intelligence Agency), 19, 59, 162; Afghan mujahidin training, 25; Iraq defectors rubbished, 167 Citizens for Responsibility and Ethics in Washington (CREW), 125-6 civil wars, South Sudan, 3, 55 Clark, Wesley, 52 climate change effects of, 37-8 Clinton, Bill, 146 Cold War, 12, 52, 163; conflict frequency, 159; end of, 158; violence of, 160 Commercial Control List, 43 Commission on Wartime Contracting, 129 Commodity Credit Corporation, 59 Compaoré, Blaise, 72 Concern Worldwide, 159 Conflict Armament Research, 63 conflicts: global decline, 158; zones of outside intervention, 32 Congressional Research Service, 85
234
Indefensible.indd 234
24/05/2017 18:37
index Control Risks company, 46 Cordesman, Anthony, 68 corruption, 3, 6, 23, 26, 28, 38, 46-7, 52, 87, 124, 132; African military related, 115; ‘institutional’, 129, 131; multi-sided, 5; national security cloak, 122-3; offsets, 111; pervasive, 119; revolving doors two-way, 126; Saudi, 51; South Africa, 133; subcontracting ease, 128; Third World monopoly of myth, 117; -weapons buying link, 118 COTS (commercial and off-the-shelf technology), 99 Council of Deputies, Libya, 69 counter-trade, problematic, 105 Cramer, Jane, 163 cyber-warfare capabilities, China investment in, 22 Czech Republic, 119 Darfur, 68; Arab supremacists, 64, 66 DARPA (Defense Advanced Research Agency), USA, 103-4 Dawn of Libya, 69 Déby, Idriss, 69 Debevoise & Plimpton, 121 decision-makers, small numbers of, 124 defense: budget transparency problems, 139; budgets secret spending, 136; ‘burden’, 88; companies, see below; industry, see below; jobs myths, 90; low labor intensity manufacture, 94; offsets, see below; spending, see below Defense Communications, 104 defense companies: cost overruns, 22; deregulation supporters, 44; long lines of supply, 128; public funds dependent, 4; threats PR, 165 defense industry: narratives, 2; triumphalist advertising, 84
defense spending: -economic growth correlation, 88-90; regional, 16; skills externality, 113; vicious circles, 20 Democratic Republic of Congo: military interventions, 32; Uganda involvement, 137 Dempsey, Martin, 156 Department of Defense, counterterrorism role, 33 Department of Justice USA, 142 Department of Commerce USA, Munitions List, 43 ‘derivative classification’, 139-40 Dhahran airbase, 51 displaced people, 55 diversion, weapons, 72 Donbass basin, 52 Drake, Thomas, 142-3 drone warfare, 19 drug trade, displacement of, 29 Druyun, Darlene, 130 ‘dual-use’ items, 60 duct tape, 96 Dunne, John Paul, 89, 91, 112 E.Coli, 61 EADS, 102 Ebola, 29; response to, 3 economic growth, military spending negative effect, 91 Egypt, Rwanada arms sales, 76 elites: people protected, 26; selfenrichment, 28 Ellsberg, Daniel, 144 end-use certificates: fake, 66; manipulation of, 70 Eritrea, 36 Ethiopia, 36, 66; Hausien raid, 159; -Sudan cross border attacks, 158 Europe: defense companies, 4, 84; defense industry offsets, 87
235
Indefensible.indd 235
24/05/2017 18:37
INDEFENSIBLE European Aeronautics and Defense Association, 84 European Union, 106; manufacturing turnover, 85; Saudi arms voluntary embargo, 50. 53 ex-public servants, -professional connections use, 126 export controls unenforced, 58 F-35 fighter jet program, case of, 19, 40; Congressional caucus, 42-3; contradictions of, 41; job claims, 42 F/A-18 Hornet jet fighters, Finland purchase, 107 famines, 160 fears, politicians use of, 161 Federal Assault Weapons Ban, 74 Federation of American Scientists, 147; Project on Government Secrecy, 140 feedback, 124 Ferguson, Niall, The Pity of War, 169 Ferrostaal, 109; compliance investigation, 121-2 Finland, offset contracts, 107 Finmeccania, India helicopters deal, 47 Food and Drug Administration, USA, 129 food and drink sector size, UK, 84 Football World Cup, 2010, 110 foreign Corrupt Practices Act, 143 France, 20, 53, 60, 65, 67; Mali intervention, 69; Mistral submarines attempted sale, 115; Rwanda arms sales, 76-8 Freedom House, 26 Freedom of Information Act, USA, 125, 145 Friends Committee on National Legislation, 138 ‘friends’, buying of, 48
Gaddafi, Muammar, 64, 67; weapons arsenal, 68; weapons export, 65; weapons stockpile spread, 66, 69; see also Libya General National Council, Libya, 69 Gerdec, Albania explosion, 6, 26 German Submarine Consortium, 122 Germany, 53, 65, 67, 108, 142; World War I lead up, 20 global military spending, 38 global public health, 29 Goitein, Elizabeth, 145, 147 Gonzalez, Henry B., 59 Government Accountability Project, USA, 142 Greece, 122 Gripen and Hawk jets, alleged bribery, 119-20 Gulf War, first, 167 guns and butter, offsets promise, 108 Habyarimana, Juvenal, 76; plane shot down, 77 Hague, William, 156 House of Saud, human rights record, 28 Halliburton, 129 Hartung, Bill, 42, 44, 130 Headquarters Marketing, BAE tool, 120 Hillhouse, R.J., 131 HIV/AIDS, 29, 133 Hlongwane, Fana, 120 Honduras, 29 Human Rights Watch, Saudi Arabia reports, 49 human security, 36, 38 Human Security Report, 158 Hungary, 119 Hussein, Saddam, 4, 58, 61, 161, 1645; US arms buying, 59; USA threat claims, 166
236
Indefensible.indd 236
24/05/2017 18:37
index Hutus, moderate killed, 77 Hyper-Text Transfer Protocol, 104 ICBMS: USSR overestimated, 163; USSR reality, 164 Igarape Institute, 74 India: arms imports, 60; defense imports scale, 48; VVIP protection helicopters purchase, 47 Indonesia, China military fear, 21 information, overclassification, 149 Information Security Oversight Office, 139 innovation, Cold War period, 96; myth, 2, 5, 103 Interahamwe, 75 International Association of Machinists and Aerospace Workers, 44 International Crisis Group, 138 International Food Policy Research Institute, 159 Internet, 96; development, 104-5; military claim for, 103 investigative agencies, political pressure on, 124 Iran, 50; -Contra affair, 59; -Iraq war, 58-60, 159; nuclear weapons production, 164; obsolescent military equipment, 28; sanctions military impact, 27 Iraq, 59, 131; arms imports, 60; destabilized, 63; ISIS weapons seizing, 4, 62; US invasion of, 21, 26, 28, 61, 139, 165; US invasion decision, 148; USA wars cost, 113, 138; USA wars in, 3, 25, 58, 112, 147 ISIS (Islamic State of Iraq and Syria), 61, 161; Iraq, 26; Iraqi weapons grabbing, 4, 62, 170; military vehicles, 63
Islamic extremist groups, Pakistan intelligence aid, 25 Islamic Legion, Gaddafi notion of, 68 Israel, 15 Italian Banca Nazionale del Lavoro, FBI raided, 59 Italy, 53, 65, 67 James, Christian Michel, 48 Japan, 15; China military fear, 21; military policy reversal, 15 job creation, myth, 2 Jones, Seth, 34 Jordan, 4, 71 journalists, 151 judicial processes, public access to, 151 Kalashnikovs, 1960-s, 57 Kaldor, Mary, 97 Kaufman, Chaim, 166 Kellogg, Brown & Root (KBR), 129 Kenya, 35, 54, 66 Kiir, Salva, 54-5 Kim, Stephen, 143 Kiriakou, James, 143 Kissinger, Henry, 82 Kleinrock, Leonard, 103 Kolko, Gabriel, Century of War, 168 Kosovo war, 21 Kurdistan, 62 large weapons systems, state role, 124 Leibowitz, Shamai, 143 Lessig, Lawrence, 129 Liberia, 4, 30, 65, 67; arms embargo avoided, 72; arms forces US rebuilding, 29 Libicki, Martin, 34 Libya, 4, 64; arms to Boko Haram, 70; post-Gaddafi deterioration, 69; UN arms embargo abandoned,
237
Indefensible.indd 237
24/05/2017 18:37
INDEFENSIBLE Moss, John, 145 Mosul, capture of, 62 Moynihan, Daniel, 146 munitions, 45; Munitions List, 44 Murphy, Gary, 120 Musa Rafsanjani, Auwal, 138 MV Faina, 54
65; weapons export, 67; weapons imports, 68; see also, Libya Licklider, J.C.R., 103 littoral combat ship, deficiencies, 23-4 lobbying: defense, 45; F-35, 41; Lockheed budget, 41-2 Lockheed Martin, 23, 31, 40, lobbying budget, 41-2; lobby tax breaks, 127 M-80, Swiss ammunition, 71 Machar, Riek, 55 Malaya, 35 Malaysia: China military fear, 21; DCNS scandal, 24; Malaya, 35 Mali, 68; Taureg rebels, 69 Manhattan Project, 96; spending on, 97 Manning, Chelsea (Bradley), 142-3 Massaquoi, Moses, 30 McArthur Baths, Port Elizabeth, 109 McKeon, Howard P, ‘Buck’, 43 McNerney, Jim, 46 Melandor, Erik, 159 Mexico, 29: drug cartels, 73; drug trade, 4, 74; gun death rates, 75 military employees, high wages, 11314; spending on, 92 military assets, Ukraine loss, 52 military scandals, publicized, 130 military scientific research, Cold War period, 105 military spending: global, 1; 9/11 aftermath, 13; poorest countries, 15; 2015, 14; world spending, 12 Ministry of Defence, UK, 84 ‘missile gap’, 163 Mistral submarines, 115 MIT (Massachussetts Institute of Technology), 103 Mitterand, Jean-Christophe, 76 Modise, Joe, 120 Mombasa, 54
N’djamena, second-hand arms bazaar, 65, 67 Namibia, 35 National Geospatial-Intelligence Program, USA, 19 National Intelligence Council, USA, 29 National Intelligence Estimate, USA, 147 National Intelligence Program, USA, 19 National Reconnaissance Office, USA, 19 National Science Foundation, USA, 104 National Security Decision Directive, 59 national security: arms companies as allies, 124; democracy impact, 150; Putin rationalizations, 169 NATO (North Atlantic Treaty Organization), 12, 15, 115; Libya air campaign, 68 Navantia, 24 Nerguizan, Aram, 68 New York University, Brennan Center for Justice, 142-3, 145 Nicaragua, 59 Nigeria, 6; national budget, 138; offbudget expenditure, 137 Nigerian Civil Society Legislative Advocacy Centre, 138 9/11, 161, 163, 165; Commission, 149 North Korea, 12; ballistic missiles, 164
238
Indefensible.indd 238
24/05/2017 18:37
index Northern Ireland, peace talks, 34 Northrop Grumman, 42; tax breaks demand, 127 Norway, 142 NSA (National Security Authority), USA, 19; whistleblowers, 142 Obama, Barack, administration of, 24, 30, 43, 168; ‘pivot to Asia’, 22; Presiential Policy Directive 19, 142; whistleblower crackdown, 143 off-budget expenditures, military, 6, 12, 27, 137 Office of Special Plans, USA, 167 Offiziere, 42 ‘offset’ contracts, 46, 128; arms trade size, 45; complex and bureaucratic,107; ‘credits’ ‘multipliers’, 109-10; European defense industry, 87; guns and butter promise, 108; hidden catches, 111; problematic, 105; purchase price increase, 106; secrecy, 112; WTO exemption, 106 Open Society Justice Initiative, 149 ‘Operation United Assistance’, failure of, 30 Orsi, Giuseppe, 47 OuadiDoum, Libyan army base, 65; army base overrun, 67 Oxfam, 79 Pacific, US military dominance, 21 ‘packet switching’, 103 Pakistan: ammunition in Syria, 71; drone warfare, 19; Intelligence Service, 25 Pentagon: 2015 budget, 43; spending, 85 Pentagon Papers, 144 Perimekar company, 24
Perry, William J., ‘Memo’, 99 Philippines, China military fear, 21 Pinker, Steven, 157 Pinochet, Augusto, 119 Polyakov, Leonid, 52 poor democracy, military spending link, 26-7 Port Elizabeth, swimming pools, 110 Portugal, 122 possible-probable threat confused, 164 poverty and hunger, global, 36 Powell, Jonathan, 34-5 President’s Daily Brief (PDB), corporate input, 131-2 Prince Badar, 51 Project for the American Century, 166 Public Interest Declassification Board, 144 Putin, Vladimir, 169 Qatar, 68, 70-1 R&D, 97; defense funding fall, 102; military decrease, 100 RAND Corporation, 34 Reagan, Ronald, 59; re-equipment era, 17 Red Diamond Trading, BAE created company, 119-21 repressive regimes, military spending, 38 retired generals, Pentagon return, 125 ‘revolving doors’ public-private-public, 125-7 Rhodesia, 35 Risen, James, 143 risks, real human, 36 Roche, James, 130 Roeber, Joe, 118 Roughead, Gary, 127 Rumsfeld, Donald, 167
239
Indefensible.indd 239
24/05/2017 18:37
INDEFENSIBLE Russia, 15, 20, 48, 65, 67-8, 155; mi-17 transport helicopters, 54; military spending increase, 15; proposed Mistral submarines purchase, 115 Rwanda: early 90s arms buying spree, 76; genocide, 4; genocide machete narrative, 75; genocide organized, 77-8 Rwandan Patriotic Front, 76-7 Saab, Sweden, 110 Salah al-Din, Iraq province, 62 Sandler, Todd, 162 Saudi Arabia, 15, 119; arms buying history, 3, 16, 48; human rights violations, 49; military spending size, 27; regime protection, 28; vast increase of arms spending, 16 Schneier, Bruce, 164 scientific development, defense role curtailed, 99 Scorpene submarines, 24 SEC, USA, 143 secrecy: arms trade, 6; corruption creating, 135; culture of, 139, 141, 144; cynical use of, 147; debate curtailing, 148; global defense sector default, 136 secrets: keeping of costs, 140; ‘organizational assets’, 146; USA clearances, 141 security classification, playing safe, 145 ‘security dilemma’, 19 ‘security votes’, 137; opaque, 138 Shaariibuu, Altantuya, 24 Shapiro, David, 145, 147 Shays, Christopher, 129 Sierra Leone: Revolutionary United Front, 65, 67; Special Court for, 72 Singapore, 142
skilled workers, defense sector absorbed, 113 Sköns, Elizabeth, 107 Salah al-Din, Iraq province, 62 small and light weapons, 57; Rwanda genocide real, 75 Smith & Wesson, 143 Snowden, Edward, 142-3 Somalia, 4, 35-6, 69, 160; arms embargo eased, 66; pirates of, 54; Transitional Federal Government, 64, 66 South Africa, 6, 35, 119-20, 122; Arms Deal 1999, 5, 107-8, 110, 132; arms export licences, 68; Rwanda arms sales, 76 South East Asia, regional umbrella, 21 South Korea, 15; China military fear, 21 South Sudan, 160; arms-purchasing, 3; Civil War, 169; ‘ghost soldiers’, 54; oil revenues squandered, 55; SPLA, see below Spagnolini, Bruno, 47 ‘spiral of insecurity’, 19-20 SPLA, army expansion, 53; Mi-17 transport helicopters bought, 54 Star Wars program, 147; spending on, 97 starvation, conflict-related, 160 Sterling, Jeffrey, 143 Stiglitz, Joseph, 113 Stockholm International Peace Research Institute (SIPRI) 12, 15, 60-1, 65, 67; Military Expenditure Database, 27 submarines, Type 209, 122 Sudan, 36, 68; -Ethiopia cross-border attacks, 158; peace agreement, 53 Sweden, 110
240
Indefensible.indd 240
24/05/2017 18:37
index Switzerland, 4; hand grenades in Syria, 71 Syria, 4, 63, 159-60; ISIS in, 170; Libyan weapons in, 70; outsider goals, 33; Swiss hand grenades in, 71; US military involvement, 139 T-55 tanks, 54 T-72 tanks, 53-4 Taiwan, US support for, 21 Taliban, the 25-6 Tanzania, 91, 119 Taylor, Charles, 65, 67, 72 TCP/IP, 103 Teicher, Howard, 59 terrorism: as tactic, 168; exaggerated threat, 156; groups life-cycles, 34; military solution to, 34; transnational, 162; US citizen fear of, 161; ‘war’ against, 33 Texas, 75; military weapons ban repeal, 74 Thrall, Trevor, 163 threats, ‘inflation’, 163-5; perception, 160; overstated, 156 Tian, Nan, 89 Timber Wind Project, 147 transparency, 176 Transparency International, 51; Government Defense AntiCorruption Index 136-7; UK’s Government Defence AntiCorruption Index, 141 Tshwane Principles, Global Principles on National Security and the Right to Information, 150, 173 turf wars, 146 Tutsis, size of deaths, 77 Tyagi, S.P., 47-8 Typhoon multi-role jet fighters, 51
UAE, 4, 71 Uganda, 6, 55, 76; DRC military campaign, 137 UK (United Kingdom), 20, 65, 67, 100, 108; arms exports subsidized, 96; arms industry relative size, 84; Department for Innovation and Skills, 102; military R&D decrease, 101-2; revolving doors, 126; Saudi close relation, 50-1; secrecy keeping, 141; Serious Fraud Office, 119-20, 123 Ukraine, 4, 169; arms theft scale, 72; military assets sold, 3; Russian invasion, 115; soldiers equipment lack, 53; tanks to Southern Sudan hijacked, 54; weapons stolen, 52 United Industrial Corporation, 143 UN (United Nations), 36; arms embargo violations, 73; Liberia arms embargo, 72; Libya arms embargo abandoned, 67; Mission for Ebola Emergency Response, 30; peacekeeping role, 33; peacekeeping USA minimal contribution, 31; Program of Action 2001, 70; Secretariat, 80; Security Council, 38, 85; Security Council Report 2014, 62; South Sudan peacekeepers, 55 United Technologies, 42 University of British Columbia, 73 University of Massachusetts, Political Economy Res, 92 University of San Diego, Trans-Border Institute, 74 Uppsala Conflict Data Program, 159 USA (United States of America), 84; Afghanistan war, 25; Afghan Mujahedin ‘blowback’, 4, 169; arms control regime, 43; arms trade policies, 44; Budget Control
241
Indefensible.indd 241
24/05/2017 18:37
INDEFENSIBLE Act, 139; Congress, 125, 156; contractors fraud and waste, 129; counterterrorism funding, 33; defense-federal budget relation, 17; defense industry lobbyists, 87; defense spending job creation, 92-5; Department of Homeland Security, 162; Department of Justice, 119, 121; Environmental Protection Agency, 140; Espionage Act, World War I vintage, 142-3; gun lobbyists, 74; guns in Mexico, 74; Iraq and Afghanistan wars, 112; Iraq arms embargo, 60; Iraq arms supplied, 62; ISIS airstrikes, 63; Joint Chiefs of Staff, 127; Kickback Act, 1986, 128; military dominance, 22; military interventions, 3; military personnel non-domestic spending, 95; military R&D decrease, 102; military spending, 15; National Export Strategy Report, 118; National Security Council, 59; national sovereignty corporate influence, 132; Navy, 99; Overseas Contingency Operations, 19, 138; PentagonState Department spending ratio, 30; ‘Plan Colombia, 29’; Public Interest Declassification Board, 141; revolving doors, 125; Saudi close relation, 50; scale of government purchases, 5; secret-keeping costs, 140; Senate Committee on Banking, Housing and Urban Affairs, 60; Somalia arms embargo eased, 66; South Sudan support, 55; Syria action, 139; USAID, 34; wars cost, 113; ‘war on drugs’, 28; ‘war on terrorism’, 35; weapons exports
size, 85; Whistleblower Protection Enhancement Act, 142 USSR (Union of Soviet Socialist Republics), 60, 65, 67; military capacity overstated, 18; US threat overestimates, 163 Van Evera, Stephen, 164 Vietnam, 15; China military fear, 21 ‘war on terror’, 155, 167; counterproductive, 34; USA government spending on, 161 Warsaw Pact, 12 Washington Post, 161 weapons: diversion of, 70; longevity of, 81 systems complexity narrative, 5 Welthungerlife, 159 Wheeler, Winslow, 41 whistleblowers, 142, 151; Obama crackdown, 143; treatment of, 141 Wiebe, J. Kirk, 142 World Bank, 137 World War I: battlefield munitions, 57; death toll, 157; lead-up to, 20 World War II, death toll, 158 World Wide Web, 104 WTO (World Trade Organization), 45; Agreement on Government Procurement, 123; offsets rules, 106 Wurzel, Thomas, 143 Xerox, 104 Yemen, 4, 160; Saudi bombing of, 50 Zintan, 69 Zuma, Jacob, changes against, 133
242
Indefensible.indd 242
24/05/2017 18:37