National Academies Press: OpenBook

Global Security Engagement: A New Model for Cooperative Threat Reduction (2009)

Chapter: 2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons

« Previous: 1 The Evolution of Cooperative Threat Reduction
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 39
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 40
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 41
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 42
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 43
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 44
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 45
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 46
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 47
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 48
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 49
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 50
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 51
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 52
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 53
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 54
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 55
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 56
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 57
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 58
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 59
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 60
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 61
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 62
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 63
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 64
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 65
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 66
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 67
Suggested Citation:"2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons." National Academy of Sciences. 2009. Global Security Engagement: A New Model for Cooperative Threat Reduction. Washington, DC: The National Academies Press. doi: 10.17226/12583.
×
Page 68

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

2 Cooperative Threat Reduction in the 21st Century: Objectives, Opportunities, and Lessons CTR 2.0 – From Patchwork Programs to Holistic Approach As the change in version number indicates, CTR 2.0 is a major program upgrade, not just a set of minor patches. Cooperative Threat Reduction (CTR) 1.0 has matured and developed, and the time has come to move beyond an ad hoc collection of weapons of mass destruction (WMD) nonproliferation activities in the former Soviet states. That set of programs was a highly creative response to unique security challenges and geopolitical changes, particularly in the former Soviet Union (FSU). A new, equally creative set of integrated and coordinated global security engage- ment programs is now required to address a broader range of WMD and terrorist threats on a global scale—CTR 2.0. As the change in version number indicates, CTR 2.0 is a major program upgrade, not just a set of minor patches. The committee envisions a version of CTR that builds on a proven platform and the lessons learned from the FSU experience, but with substantially new features. As CTR 2.0 grows, it will absorb the lessons learned from the original programs, and will be structured to respond to a rapidly changing environment. CTR 2.0 will not be the domain of a single U.S. department or even of the U.S. government, and the White House will need to play an active leadership role. To succeed, it will need to be an integrated, cooperative, collaborative, global enterprise that is responsive, flexible, and adaptable (see Box 2.1). 39

40 GLOBAL SECURITY ENGAGEMENT BOX 2.1 Defining CTR 2.0 CTR 2.0 is a set of programs and projects undertaken by the United States, as part of a cooperative network that includes a wide range of countries, international organiza- tions, and nongovernment partners, to prevent, reduce, mitigate, or eliminate common threats to U.S. national security and global stability that have emerged in particular since the end of the Cold War.  The preferred mechanism and long-term goal for the cooperation is partnership, which means that the countries participating should be ready to share responsibilities for project definition, organization, management, and financing according to a rational division of labor, capacity (including budget capacity), or technical capability. Although CTR 2.0 engagements may have to begin under less than ideal circumstances, the goal for countries engaged under CTR 2.0 is shared responsibility through engagement and partnership.  CTR 2.0 should be capable of rapid response as well as longer-term programmatic engagement. Defining CTR 2.0 In late 2003, Libya agreed to give up its WMD programs and join or rejoin relevant international institutions. Although the announcement was preceded by talks between Libyan, U.S., and U.K. government officials, Libya’s decision surprised many other than the few individuals directly involved in the negotia- tions. Weapons, materials, and systems needed to be removed quickly and with a high level of international coordination. U.S. and U.K. officials feared that the Libyans might reverse their decision, and a rapid and flexible response was needed. Nuclear dismantlement required a creative partnership between Libyan, U.S., U.K., and Russian officials, the U.S. Department of Energy’s (DOE) National Nuclear Security Administration (NNSA), the International Atomic Energy Agency (IAEA), and the Nuclear Threat Initiative (NTI) (a U.S. non- governmental organization [NGO]).  The Libyan government agreed to dis- mantle its centrifuge program and convert its research reactor core from highly enriched uranium (HEU) to low-enriched uranium. Sensitive centrifuge equip- ment and both spent and fresh HEU fuel were removed under NNSA’s Global Threat Reduction Initiative. The Department of Defense (DOD) was asked to provide air or sea transportation for this cargo. Instead, transportation was secured by the State Department and funded by its Nonproliferation and  Paula DeSutter. 2004. Completion of Verification Work in Libya. Testimony of Assistant Secre- tary of State for Verification and Compliance before the Subcommittee on International Terrorism, Nonproliferation, and Human Rights, September 22. Available as of March 2009 at http://www. state.gov/s/l/2004/78305.htm.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 41 Disarmament Fund (NDF), which leased aircraft and a cargo ship. Senior U.S. government officials that were directly involved in the discussions informed the committee that DOD claimed that wartime constraints on military aircraft made it impossible to provide the capability that was needed to remove the equipment and material. Libya also agreed to destroy their chemical weapons stocks and dismantle their production capability. More than 23 tons of mustard blister agent along with 600 tons of precursor chemicals had to be destroyed. The DOD CTR program and NDF were both asked to submit time and cost estimates. NDF proposed a significantly lower budget and a shorter time line, and it was there- fore selected to carry out the task. NDF subsequently contracted with an Italian company to build an incinerator to destroy the chemical weapons material.  Large infrastructure projects were hallmarks of DOD CTR in the FSU and responded to the needs of the massive Soviet military infrastructure–warhead storage facilities, chemical destruction plants, and replacement power plants for plutonium production reactors. A similar situation is likely to be rare in the future. None of the nuclear or chemical engagement in Libya involved DOD CTR in large measure because the existing program is not structured to respond quickly and the senior DOD officials who can direct resources are not sufficiently engaged. The Libyan example shows the need for and importance of a robust, fast, and flexible U.S. government (USG) CTR capability to meet new challenges when they arise. Finding 2-1: CTR 1.0 was a highly creative response to unique security chal- lenges and geopolitical changes in the former Soviet Union. The new threats we face require similar innovation to create CTR 2.0. Coordination and lead- ership from the White House will be required, and relevant departments and agencies will need to engage to ensure that there is a clear connection between the policy intent and program implementation, as in the case of Libya.  Joseph Cirincione et al. 2005. Deadly Arsenals: Nuclear Biological and Chemial Threats: Second Edition. Washington, D.C.: Carnegie Endowement for International Peace. 324 pp.  Ambassador Donald Mahley. Committee consultation. See also Donald Mahley. 2004. Dis- mantling Libyan Weapons: Lessons Learned. The Arena. Chemical And Biological Arms Control Institute. November.  Libya, the United States, the United Kingdom, and the Organization for the Prohibition of Chemical Weapons (OPCW) reached an agreement whereby an exception would be made for the part of the Rabta Industrial Facility that was never intended for chemical weapons production. That portion of the facility will be allowed to be used for civilian pharmaceutical production. See OPCW. 2004. OPCW Executive Council Approves Recommendation to Allow for Conversion of Former Chemical Weapon Facility in Libya. October 18. Available as of March 2009 at http://www. opcw.org/news/news/article/opcw-executive-council-approves-recommendation-to-allow-for-con- version-of-former-chemical-weapon-fac/.  Libya did not maintain a state-sponsored biological weapons program. See Cirincione et al. 2005. 324 pp and Mahley. 2004.

42 GLOBAL SECURITY ENGAGEMENT To succeed, it will need to be an integrated, cooperative, collaborative, global enterprise that is responsive, flexible, adaptable, and able to respond to the new security threats that it will need to counter. CTR 2.0 is likely to be characterized by smaller projects that not only seek to reduce threats but also have the goal of helping others prepare to prevent or respond to new threats. The report of the Review Panel on Future Directions for Defense Threat Reduction Agency Missions and Capabilities to Combat Weapons of Mass Destruction, March 2008 (hereafter referred to as the Carter- Joseph Report) concluded that the DOD CTR program should expand its focus on counterproliferation activities, including threat awareness, equipment, and consequence management training and exercises, aimed at building national and regional capacities. These should become major program themes in future cooperative threat reduction efforts. Similarly, given new WMD prolifera- tion threats from terrorism, the DOD CTR Proliferation Prevention Initiative should undertake a larger role along with enhanced and integrated efforts to provide assistance with export controls, border security, shutting down traffick- ing routes, and stemming piracy, which all can contribute to controlling WMD proliferation in meaningful ways. Such efforts contribute to building capacities that can enable states to more effectively engage in efforts such as the Proliferation Security Initiative, the Global Initiative to Combat Nuclear Terrorism, and the implementation of United Nations Security Council Resolution 1540 (UNSCR 1540). Each of these new areas, however, will require the establishment of new or improved relationships with allies or partner countries. Just as a beachhead was estab- lished in Moscow in the early 1990s by taking the time to identify shared priori- ties and to codevelop a strategic approach, many new beachheads will have to be established in the future to initiate the next generation of cooperative threat reduction programs: CTR 2.0. Finding 2-2: CTR 2.0 efforts will likely be smaller and distributed across a larger number of countries carefully targeted on the sources of new threats rather than the large, physical infrastructure dismantlement or construction projects that were the hallmarks of the programs in the former Soviet Union. Defense and Military Contacts (DMC) Program has the potential to be an even more important element of CTR 2.0. The DMC Program started under  Ashton B. Carter, Robert G. Joseph, et al. 2008. Review Panel on Future Directions for Defense Threat Reduction Agency Missions and Capabilities to Combat Weapons of Mass Destruction. Cam- bridge: Harvard University. Available as of March 2009 at http://belfercenter.ksg.harvard.edu/ publication/18307/review_panel_on_future_directions_for_defense_threat_reduction_agency_ missions_and_capabilities_to_combat_weapons_of_mass_destruction.html?breadcrumb=%2F.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 43 CTR 1.0, but became disconnected over the years from the DOD CTR pro- gram goals it was initially designed to support. DMC activities build a partner’s capacity and can be a mechanism for exploring and establishing relationships in new partner countries and regions. Senior officers at three of the Unified Combatant Commands support expanding the DMC Program and linking it strategically to other U.S. security assistance efforts. Current DMC Program examples include the following: • Traveling Contact Teams (TCTs) for maritime interdiction and Nuclear, Biological, Chemical warning and detection • Antiterror TCTs • Military Police familiarization exchanges • National Guard State Partnership Program familiarizations and contact visits • Regional counterproliferation and counterterrorism exercises • Disaster preparedness/consequence management TCTs • Support for other regional security initiatives There is also significant potential for building new relationships through existing civilian and military health and infectious disease programs, and through other scientific and technical collaborations that engage local expertise. This topic is explored in more detail in Chapter 4. Finding 2-3: CTR 2.0 should include long-term relationship and capacity build- ing that can be the basis for future cooperative threat reduction activities, through defense and military-to-military engagement and other peer-to-peer engagement, such as in science. The new security environment requires that the USG reassess the eligibility criteria for USG CTR assistance. This should allow more effective leveraging of resources, help avoid duplication among agencies, and ensure that programs are prioritized as part of a national security strategy. Traditionally, factors that have been taken into account included the following: • Is the security threat high and direct? • Does assistance respond to one or more U.S. national security strategy priorities, such as compliance with treaties, fulfillment of existing nonprolifera- tion or security agreements, or participation in new nonproliferation or security initiatives? • Is the partner willing to cooperate and are they in critical need of techni- cal or financial assistance? • Is the partner willing to provide access to the key individuals, facilities, or materials?

44 GLOBAL SECURITY ENGAGEMENT • Are other countries or organizations willing to cooperate and provide additional technical or financial resources? • Is there congressional authority and are there appropriations that will support the effort? • Have NGOs or the private sector been engaged? • Is there a probability of success? The United States and others involved in CTR 2.0 should continue to prioritize programs according to these criteria, at the same time realizing that the priorities among criteria may change over time. It may not always be pos- sible for CTR 2.0 to tackle the highest and most direct threat first, but it may be possible to make real progress on other important but slightly lower priority threats. Finding 2-4: Traditional criteria for determining eligibility for cooperative threat reduction engagement may need to be adjusted to reflect the changing security environment. There may be instances where there are open disputes with parts of a part- ner country government, but receptivity in other parts of the same government; there may be opportunities to engage where access to facilities is not as open as the United States or others would prefer, but where incremental forward progress and the development of trust demands flexibility. Programs under CTR 2.0 will challenge those who implement them to fashion new approaches to each set of circumstances, balancing the interests of all sides. Finding 2-5: As the lessons learned from the Libyan experience make clear, to make cost-effective contributions to U.S. national security in the future, USG CTR programs must be less cumbersome and less bureaucratic in order to provide agile and timely contributions. They must take greater consideration of the needs and wants of reluctant partners even as we keep focused on core U.S. objectives. Developing Meaningful Metrics Most current metrics for tangible program success measure U.S. program perfor- mance, not the impact of the programs and measures of success in the cooperating countries, which arguably should be the more important focus. CTR 2.0 will operate under congressional authorities and appropriations and must account for how it spends taxpayer dollars and demonstrate the national security benefit it produces. The metrics that have been used tradition-

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 45 ally to produce the Nunn-Lugar Scorecard (see Appendix F) are not necessarily the right metrics for measuring the impact of CTR 2.0, for which intangible metrics—relationships and processes—will be harder to measure. Traditional, “hard” metrics are important program indicators, but do not necessarily cap- ture some of the important high-value “soft” program results. An essential issue in developing and using program metrics to understand and assess the success of USG CTR programs is to pair the specific metrics employed with the stated program goals and objectives. Each partner, however, may emphasize different goals and objectives even for the same project. It is essential that not only the goals and objectives be discussed among the partners during the development of programs, but also that the measures of program effectiveness be discussed and mutually agreed to before the initiation of the program. Some of these metrics may be oriented toward developing a sense of trust, facilitating a better understanding of threat perceptions and prioritiza- tion of risk, fostering sustained support for addressing threats, or engaging a more diverse group of experts to develop creative ways to address threats. In these cases, each partner may present a different set of indicators, which would independently evaluate the effectiveness of USG CTR programs from their own perspective. Discussing and comparing the results of program effective- ness against mutually agreed, but independently assessed, metrics may provide another valuable opportunity for strengthened engagement. Traditional “scorecard” metrics are too often very quantitative in nature and are not always adequate measures of a program’s success. Developing a new approach to metrics will also demand an appreciation by the Office of Management and Budget (OMB), department-based program auditors, and Congress that hard “scorecard” metrics, often very quantitative in nature, are not always adequate measures of a program’s success. This is particularly true when relationship and capacity building are the objective. The current OMB Program Assessment Rating Tool, which is used to measure program performance across the government, is particularly ill suited to this kind of evaluation. There also has been a tendency in CTR 1.0 to define metrics from the U.S. perspective without incorporating metrics from the partner country’s per- spective. Since sustainability is an important element of decreasing threat and increasing security, meeting the partner’s expectations will be another tool to  The Program Assessment Rating Tool is used across the government to assess and improve program performance of federally funded programs. Its uniform design and approach to milestones makes it difficult to reflect progress in diplomatic negotiations and other areas where intangible results are important. See http://www.whitehouse.gov/omb/part_default/.

46 GLOBAL SECURITY ENGAGEMENT project whether a program or project has any likelihood of being sustained in the long term by the partner. Aspects of programs that can help measure the impact in the partner’s environment could include the following: • Contributions (in-kind and financial) of the partner country—Has the partner been engaged from the beginning stages in a way that gives them a sense of ownership and responsibility for the program? Is there a desire on the part of the partner to see the program succeed and to sustain the program into the future? • Transparency—Has the partnership developed under the program enhanced levels of trust and helped both sides understand the other better, for example appreciating differing perspectives on threat and response? There may be additional measures for specific programs such as for biologi- cal threat programs. Examples include: • Measurable improvement in speed of response to outbreaks • Improved quality of disease reporting • More active regional engagement • More scientific and technical collaborations of a strengthened nature Similarly, rather than counting numbers of sensors installed or training sessions conducted, alternative metrics for nuclear security programs could include the following: • Reduction in nuclear smuggling incidents • Increase in the number of regular and realistic exercises of nuclear security response structures • Reductions in nuclear materials stockpiles • Consolidation of nuclear material storage sites • Development of security cultures Many of these kinds of metrics can only be measured over a period of years and will not satisfy the annual demands of the budget cycle, but there has to be recognition that forcing traditional metrics requirements onto programs designed to have long-term impact will not work. Different metrics need to be explored and adopted. The DOD CTR Biological Threat Reduction Pro- gram ran an exercise in the fall of 2008 to test the biological detection and surveillance system in Georgia that has resulted from a USG CTR program. The conclusions of that test should be reviewed as a possible model for future metrics design. Metrics also need to be reviewed and updated regularly as situations and U.S. goals evolve. For example, a lesson learned from some of the DOE CTR

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 47 programs was that as programs evolved to meet changing needs, metrics were not adjusted in parallel. Consequently, when the program achievements were reviewed, there was a mismatch between new program goals and old metrics, leaving room for misinterpretation and criticism. One possible example of an analytical model to map or measure the rela- tionship aspect of CTR 2.0 is Social Network Analysis (SNA).  SNA is a mathematical technique for analyzing sets of relationships between individuals and organizations. It has grown in sophistication and application over the past several decades and may be a useful tool for identifying tangible benefits of the relationships developed under cooperative threat reduction programs. In addition, more attention needs to be paid to how metrics are linked to criteria for determining program priorities and program success. If flexible criteria are used to decide which program efforts go forward, then metrics have to be similarly flexible to reflect the key issues that were part of the policy deci- sion. Calibrating metrics to criteria will require greater thought than has typi- cally gone into developing USG CTR program metrics. For example, a modest program to redirect a group of scientists can have a major impact locally or even regionally, but the program probably should not be advertised as having broad global impact. As a recent National Research Council report has concluded, determining adequate measures of program effectiveness is particularly difficult when the goals and objectives of specific programs are largely unquantifiable, such as in relationship building and strengthening partnerships. As a means of attempt- ing to address this challenge, many international organizations have sought to more fully employ impact evaluations as a means of understanding what has been most successful in their programs and why. While sophisticated social science methodology is often used to conduct impact evaluations, 10 the four essential factors in attempting to establish the success of a particular program are as follows: (1) clearly defining what is being evaluated; (2) identifying a set of desirable outcomes that might reasonably result from the program (based on realistic expectations as to what might be accomplished by specific programs); (3) determining specific indicators of success calibrated to the specific desired  See, for example, Ulrike Gretzel. 2001. Social Network Analysis: Introduction and Resources. Available at http://lrs.ed.uiuc.edu/tse-portal/analysis/social-network-analysis/.  National Research Council (NRC). 2008. Improving Democracy Assistance: Building Knowledge Through Evaluations and Research. Washington, D.C.: The National Academies Press. 10 The NRC report notes that “impact evaluation is the term generally used for those evaluations that aim to establish, with maximum credibility, the effects of policy interventions relative to what would be observed in the absence of such interventions. These require . . . : collection of baseline data; collection of appropriate outcome data; and collection of the same data for comparable individuals, groups, or communities that, whether by assignment or for other reasons, did and did not receive the intervention.” Improving Democracy Assistance: Building Knowledge Through Evaluations and Research. 47 pp.

48 GLOBAL SECURITY ENGAGEMENT outcomes; and (4) measuring program outcomes against these indicators. Employing relevant techniques of impact evaluations may better position USG CTR 2.0 to assess its successes, particularly when program goals and objectives are not easily quantifiable and do not translate easily onto a scorecard. Finding 2-6: The traditional metrics of DOD (and USG) CTR success are often useful for program evaluation. Warheads or delivery systems and launch- ers destroyed, weapons materials secured, and contractor full-time equivalent on target are more concrete than just total dollars spent, but these metrics do not adequately reflect threat reduction impact or account for the value of potential CTR 2.0 engagement against new threats in this century. The chal- lenge remains to find measureable performance indicators that capture the true value of important future successes that may be less tangible and more difficult to document. Efforts to contrive such measures, however, can result in burdensome and misleading data that may distort sound assessments of policy implementation. For example, the dollar value of locks and alarms procured, or even the number, is less important than the degree to which an institute plans, trains, and practices security against intruders and the “inside threat.” These latter considerations are more important, but less transparent and measureable. CTR in the 21st Century: objectives What are WMD and other strategic threats to the United States? The universal availability of information and the highly dual-use nature of many tech- nologies, particularly in the biological and chemical fields, make it possible to develop a WMD without having previously worked directly in a state WMD program. National security threats during the Cold War were not confined to the bilateral superpower relationship, but they were defined largely by a known adversary and the threat of nuclear war and other WMD. Even though the rela- tionship was far more complex than that, nostalgia exists for the days when the greatest threat could be defined by the Cold War paradigm of the United States versus the Soviet Union. Today, the United States faces security challenges from a wide range of countries with existing as well as latent WMD capability; from nonstate actors; and from countries known to be proliferators or where weak, unstable governments enable individuals or groups to proliferate with the tacit or active knowledge of the government. A strategy focused on immediate, direct threats may not be as wise or relevant in the 21st-century environment as understanding change and risk and how to keep risks from developing into

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 49 threats.11 This is the environment in which CTR 2.0 must operate. Some of the challenges to be considered include the following areas: • Nuclear Challenges  In addition to concerns about an expanding num- ber of countries having declared nuclear weapon programs, there is increasing concern that the spread of nuclear technologies, particularly as a result of the increased global focus on nuclear power, will enable more countries to become latent nuclear states with the expertise, technology, and materials that can be rapidly converted to weapons use. As the use of nuclear power expands, coop- erative government and industry efforts to develop more proliferation-resistant technologies, the possible establishment of an international fuel cycle program, and related efforts will all contribute to addressing these new challenges. Con- trol over material is the final defensive line, but left as the only major defense, it can be weakened in the face of covert activity, third-party assistance, and treaty breakout. The IAEA, nuclear industry, cooperative research, and even military- to-military interactions can provide greater transparency and confidence build- ing, but few insightful specific measures currently exist to support, monitor, or verify these capabilities. For example, military-to-military ties have weakened over the years in several countries of concern, sometimes replaced by NGO or Track II activities that may or may not compensate for a lack of peer-to-peer embedded engagement on a continuing basis. Even where military-to-military relations or other peer engagements are conducted, it is difficult to gauge how much they support USG CTR objectives, but they often do. • Chemical Weapons Challenges  In addition to countries with known or suspected chemical weapons programs, any country with a reasonably advanced chemical or petrochemical industrial sector has the latent capability to develop chemical weapons. Over the past several years, even what defines a “chemical weapon” has been challenged, for example, by the innovative use in Iraq by al Qaeda of chlorine gas tanks—either alone or in combination with improvised explosive devices (IEDs) to execute chemical attacks.12 There has been interna- tional concern for many years over the lack of security at chemical facilities that could be targets for terrorist acquisition of components of a chemical weapon or simply releasing toxic industrial chemicals as a weapon. Because chemical weapons do not have the same potential strategic and catastrophic impact that nuclear and biological weapons do, there has been relatively little attention paid to developing a broad effort to increase security or to understand the 11 See Appendix H for a comparison of the characteristics of Six Weapons Systems from the Perspective of a State of Terrorist Organization. 12 Kirk Semple and Jon Elsen. 2007. Chlorine Attack in Iraq Kills 20. New York Times. April 16. Available as of March 2009 at http://www.nytimes.com/2007/04/06/world/middleeast/06cnd-iraq. html.

50 GLOBAL SECURITY ENGAGEMENT implications of advancing technology, which some experts told the committee is a serious oversight. • Biological Threats  The October 2001 anthrax attacks in the United States, the 2003 severe acute respiratory syndrome outbreak, and dramatic recent advances in biosciences and biodefense have spotlighted the destructive potential of biological agents. With strategic and catastrophic potential equal to nuclear weapons, the U.S. Congress has poured billions of dollars into efforts to defend against and respond to biological attacks. The issue has gained world- wide attention, and the threat of attack has served to drive the security and life science communities closer together, engaging experts in both human and agricultural health. USG CTR programs can enhance biosecurity by supporting a network of experts who are sensitive to international norms and national laws and who can bring their expertise even to troubled regions. • Dual-Use Expertise  State-sponsored WMD programs are no longer the only source of WMD threats. The universal availability of information and the highly dual-use nature of many technologies, particularly in the biological and chemical fields, make it possible to develop a WMD without having pre- viously worked directly in a state WMD program. Educational opportunities abound, as demonstrated by the 2008 QS (Quacquarelli Symonds) list of top 100 universities. 13 Historically, most of the top-ranked universities have been in Australia, Canada, western Europe, Japan, New Zealand, and the United States; as the 2008 list shows, advances in education now make it possible to obtain a world-class education in life sciences and biomedicine, natural sciences, and technology at universities in China, India, Israel, Mexico, Russia, Singapore, South Korea, and Taiwan. These opportunities, combined with a wealth of training and other dual-use information available over the Internet, on CD, and through other channels, leave little chance for controlling the acquisition of WMD-related science, engineering, and technology. • Small Arms and Munitions Stockpiles  Combating the emergence of IEDs as a highly destructive terrorist weapon system is an urgent priority. According to the 2008 Small Arms Survey, “[d]iverted conventional ammuni- tion, explosives, and military demolition items can be used in a wide range of IED types. . . . Large caliber ammunition, such as artillery shells and mortar bombs, are particularly useful for IED construction, because they contain rela- tively large quantities of explosive. In addition, military stockpiles frequently contain demolition stores, such as detonators, detonating cord, and plastic explosives that can greatly facilitate the construction of IEDs.” 14 Although 13 Top 100 Universities. 2008. Top 100 Universities. Available as of March 2009 at http://www. topuniversities.com/university_rankings/results/2008/overall_rankings/top_100_universities/. 14 Adrian Wilkinson, James Bevan, and Ian Biddle. 2008. Conventional Ammunition in Sur- plus–A Reference Guide. Small Arms Survey. Geneva: Graduate Institute of International Studies. 17 pp. Available as of March 2009 at http://www.smallarmssurvey.org/files/sas/publications/b_se- ries_pdf/CAiS/CAiS%20CH14%20IEDs.pdf.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 51 IEDs are largely associated with Iraq, Afghanistan, and parts of the Middle East, the materials needed to feed the growing use of IEDs are available in many areas that are unstable, in the throes of civil or regional unrest, or are routes for trafficking. One estimate puts the amount of munitions in the Bal- kans alone at more than one million tons. In addition, the increasing availability and use of man-portable air defense systems presents another set of threats that must be combated. • Terrorism Threats   The current U.S. list of Foreign Terrorist Orga- nizations15 consists of 44 groups, some with a national or regional focus and others that operate globally. Other lists, such as one published by the U.S. Com- mittee for a Free Lebanon, name hundreds of organizations operating around the world, including in the United States. Terrorist organizations can access communications, transportation, and training, making it possible for today’s local terrorist organization to reach far from its roots. Efforts are increasing to understand the roots and causes of terrorism, but much more needs to be understood. This report does not attempt to address the roots of terrorism, but there are cases where a CTR 2.0 relationship might help. In countries such as Pakistan, the lack of healthy military-to-military relations, once common decades ago, is being painfully felt now. Similarly, the lack of robust scientific and other peer-to-peer engagements has left a gap that terrorists have exploited successfully to recruit in several fields. This demonstrates widely how a strategy to oppose terrorism must look. • Border Security Threats and Trafficking (WMD, Drug, Contraband) There are growing concerns about evidence that trafficking routes, which tra- ditionally move drugs, small arms, or people, can be utilized for the movement of WMD. The Department of Homeland Security’s chief of intelligence analysis has been quoted as saying terrorists could use well-established smuggling routes and drug profits to bring people or even weapons of mass destruction to the United States. Drug lords in Latin America “already have well-established meth- ods of smuggling, laundering money, obtaining false documents, providing safe havens and obtaining illicit weapons, all of which would be attractive to ter- rorists who are facing new pressures in the Middle East and elsewhere.”16 In a similar vein, a report released in November 200817 describes in detail how a key precursor for mustard gas was smuggled to both participants in the Iran-Iraq 15 The State Department. 2008. Foreign Terrorist Organizations: Fact Sheet. Office of the Coordinator for Counterterrorism. Available as of March 2009 at http://www.state.gov/s/ct/rls/ fs/08/103392.htm. 16 Curt Anderson. 2008. U.S. Officials Fear Terrorist Links With Drug Lords: U.S. Officials Worry Islamic Extremists Could Form Alliances with Latin American Drug Lords. Miami: Associated Press. October 8. Available as of March 2009 at http://abcnews.go.com/US/wireStory?id=5986948. 17 Jonathan B. Tucker. 2008. Trafficking Networks for Chemical Weapons Precursors: Lessons from the Iran-Iraq War of the 1980s. Occasional Paper No. 13 from the Center for Nonprolifera- tion Studies. Monterey: Monterey Institute for International Studies. November.

52 GLOBAL SECURITY ENGAGEMENT war. Two independent trafficking networks purchased the precursor from a U.S. firm and shipped the material by circuitous routes to Iran and to Iraq. The report concludes that the same methods are being used today to smuggle precur- sors for nuclear, chemical, and biological weapons to rogue states and terrorist organizations. In the United States, oversight of exports is divided among the Departments of Commerce, Homeland Security, State, and Defense. Overseas, monitoring of trade in dual-use chemicals and biological materials (those that have legitimate commercial uses as well as utility in weapons production) is con- ducted by the Australia Group,18 a group of nations that informally exchange intelligence information about potential violations of international regulations on trade in “scheduled chemicals” in the Chemical Weapons Convention (CWC). The process is reasonably effective, but is hampered by the nonparticipation of several emerging industrial powers. CTR 2.0 could play a role in enhancing the effectiveness of cooperative approaches to interdicting trafficking in weapons precursors of all sorts. • Failing and Failed States  The 2008 economic crisis may have had its roots in the United States, but its global reach was swift and devastating in ways that have yet to be measured and with results that may present new threats to U.S. national security. Countries that already are struggling for control over territory, are dealing with internal conflict, or are coping inadequately with demands to provide for basic human needs may find themselves facing even greater challenges. The Failed State Index19 presents a sober picture of potential future risk. In 2008, 177 countries were listed, 35 of which were considered to be “alert” states, including some that were mentioned to the committee by various experts as possible partner countries for future CTR 2.0 security engagement programs: Afghanistan, Democratic People’s Republic of Korea, Democratic Republic of the Congo, Iraq, Lebanon, Pakistan, and Syria. • Cyber Threats   News reports that hackers attacked the Web sites of the 2008 U.S. presidential candidates and broke into White House e-mail dem- onstrates again the vulnerability of the electronic universe. Some hackers may see penetrating government cybersecurity systems as the ultimate challenge, but it increasingly is a very serious business. Remotely disabling an opponent’s radar system, as the Russians did in the August 2008 conflict with Georgia, can be an effective military tactic. On the other hand, generating false data that might indicate an attack is imminent when, in fact, that is not the case also can produce dangerous situations and a climate of tension and distrust. The points above are not intended to be comprehensive, but illustrate the 18 See http://www.australiagroup.net/en/index.html for additional information on the Australia Group. 19 The Fund For Peace. 2008. Failed State Index. Available as of March 2009 at http://www. fundforpeace.org/web/index.php?option=com_content&task=view&id=99&Itemid=140.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 53 orders of magnitude difference between managing the relatively stable and even predictable WMD threats of the Cold War, compared to the complex, multiple- risk contemporary environment. Even scientists working on the cutting edge of their disciplines cannot predict the future potential of rapidly evolving tech- nologies, such as biotechnology and nanotechnology, let alone what happens when such technologies are combined. Experts also cannot predict where the next big technological innovation will appear or how rapidly it will evolve. The global reach of information now enables new discoveries to be assimilated and amplified rapidly. Instead of sharing a problem with one or two colleagues in a laboratory, scientists now can interact globally and instantaneously, accessing massively linked networks. Progress in such an environment will be exponential rather than linear, making predictability ever more difficult. For governments to manage risk and respond to threats in this environ- ment, they will have to work in a similarly more cohesive, integrated, networked fashion that operates in the same flexible, adaptive environment as the threats they are trying to counter. It will be increasingly difficult to solve challenges with the resources and capabilities of a single program, department, or even by the U.S. government acting unilaterally. CTR 2.0 cannot address the entire threat spectrum, but it is designed to reach beyond CTR 1.0’s original focus. Finding 2-7: The globalized environment will be characterized by the increas- ingly rapid spread of technology, major changes in how the traditional nation- state structure works or nongovernmental organizations engage, diffusion of threats, and changes in the nature of the threats (including the convergence of technology, new patterns of technologies, Internet-facilitated communications, and complex relationships). The United States faces a broad array of WMD proliferation challenges around the globe. Reducing those threats in diverse political, economic, and technological environments will require a similarly diverse set of tools, approaches, and practices. The challenges—real and perceived­—and the appro- priate responses will be different from country to country and region to region. State-sponsored nuclear weapons programs are generally known or identifiable and can be addressed directly. The potential for loss of nuclear weapons or materials to rogue states or terrorist groups, although a more difficult chal- lenge, can be reduced through security measures and multilateral cooperation. Chemical weapons programs and dual-use chemical industrial capabilities have physical signatures that may also allow identification, at a minimum, and pos- sibly coordinated responses by the international community. Exploitation of toxic industrial chemicals and toxic industrial materials by terrorist groups or even lone actors requires a much different set of tools, best implemented by individual states (e.g., UNSCR 1540) or intelligence and security collabora- tions between allied states. Illicit biological weapons programs, once hidden in

54 GLOBAL SECURITY ENGAGEMENT “closed cities” and possessing a relatively large footprint, are no longer neces- sary to develop a biological weapon. There may be no discernable signature provided by an offensive biological weapons program developing a highly contagious viral pathogen, for example. Each nation or region has a slightly different perception of the WMD proliferation threat; thus, there is a need for a graded degree of responses and broad potential for collaboration. Just as challenges vary across weapons systems, they are also spread geo- graphically. For example, a developed country might be the source of technolo- gies or a rogue group of scientists, while a developing country may be the chosen location of a terrorist laboratory or simply a source for isolation of pathogens from nature. In response to a scenario like this, the former country may be will- ing to collaborate on preparation, response, and intelligence gathering, while the latter may seek capacity improvements to bolster its ability to identify out- breaks and secure its pathogen collections. Each nation or region has a slightly different perception of the WMD proliferation threat; thus, there is a need for a graded degree of responses and broad potential for collaboration. Traditionally, the USG CTR programs have focused on WMD. Increas- ingly, the USG has recognized that radiological source security and munitions stockpile destruction and security are areas where some modest activity could have a significant impact on preventing an attack with a radiological dispersion device (or “dirty bomb”) or an IED. It is sobering to think about what IED attacks in Iraq might be if DOD and DOE had not engaged early through a program to gather and secure radiological sources. Each of the weapons risk categories offers different opportunities to engage internationally, and all require a greater global awareness. Efforts to address the nuclear nonproliferation challenge relies on various transparency tools, technical engagements, the work of the IAEA to implement the Nuclear Nonproliferation Treaty, and diplomatic interventions. Chemical risk reduction can be accomplished through intelligence on terrorist intent, security of industrial chemicals, activities of the Organization for the Prohibi- tion of Chemical Weapons to implement the provisions of the CWC, and inter- national collaboration in specific technical areas. Biological nonproliferation in the 21st century is unique in that international collaboration across the biorisk spectrum of infectious disease can focus our efforts where the capabilities to do harm with biology are the greatest and the potential for “intent” to harm is the most likely. At the same time, broad public health engagement and capacity building in the biological risk space can pay dividends by winning “hearts and minds” in communities where terrorists need the support of the local com-

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 55 munity to succeed. Appendix H provides a matrix for considering six areas of potential threat and how each might be viewed by a potential adversary. Finding 2-8: Proliferation challenges and opportunities to control prolifera- tion vary greatly geopolitically and across the three major WMD systems of concern as well as other areas of concern, and a diverse set of tools and approaches is needed to respond. Addressing these challenges will require the involvement of partners beyond the traditional government players and geostrategic allies. CTR in the 21st Century: opportunities Partnership—The Critical Element A key to future security will be the ability to engage new partners globally and to build a broad network committed to enhancing global security through engagement. This network of partnerships, in turn, can be a trip wire to warn us of potential dangers. Much of the success of this will depend on our ability to develop sustained, trusting human relationships. Although the committee can appreciate the desire for rapid, surgical, quick-impact actions, it does not believe that this kind of approach reflects the reality of the complex global environment that continues to evolve around us. Clearly, the United States and others should be prepared to respond rapidly to events and opportunities, but investing in relationships for global security must be viewed as a long-term com- mitment and one in which the process of engagement may sometimes be more important―and yield more tangible results―than the actual project. Finding 2-9: Relationships on multiple levels with allies, threat-reduction partners, academe, NGOs, and others are necessary for effective engagement with countries and regions on nonproliferation activities. Recent events have demonstrated the power of partnerships. In the after- math of the August 2008 military action between Russia and Georgia, most high-level U.S.-Russian dialogue ceased. The U.S. nuclear cooperation agree- ment with Russia (also known as a “123 Agreement”) was withdrawn from congressional consideration, and other important bilateral security topics were swept from the table by both countries. In the midst of this very public dis- agreement, however, USG CTR activities were allowed by both countries to continue. In contrast, following the September 2008 U.S. announcement of arms sales to Taiwan, China made a broad decision to curtail all security-related activities with U.S. government officials, canceling all scheduled bilateral events. The difference is striking, and although U.S. relations with Russia and China will recover over time, there is not yet as much substance in U.S. relations

56 GLOBAL SECURITY ENGAGEMENT beneath the surface with China as exists with Russia; the habit of cooperation is not yet established. USG CTR programs play a limited but important role in building the foundations of long-term cooperation. As CTR 2.0 is implemented, there also must be sensitivity to a response by some potential partners to working with the U.S. military when assigning roles under a strategic framework. Although the DOD CTR program has been successful in many environments, it is viewed with suspicion and distrust in others. DOD’s attempts to engage directly with the Russian Ministry of Health, for example, were not successful, whereas it was able to engage successfully beyond the counterpart ministries of defense in Georgia and Uzbekistan. This unease can extend as well to NGOs that work as contractors for U.S. gov- ernment programs. One NGO official commented to the committee that his organization prefers to receive funding for nonproliferation activities from the State Department rather than DOD because the source of funding can have a profound affect on how well the organization is received in a country where military affiliations and motives are distrusted. Russia and other countries have also expressed concerns about the use of DOD programs and personnel for intelligence purposes, a concern likely to be echoed by some new partners. Finding 2-10: There are many potential partners and resources that can be employed for CTR 2.0 that currently are not being tapped. In the CTR 2.0 model, partnership is a defining concept. In many respects, it will be even easier to establish this baseline with new partners than to manage the transition from assistance to a new cooperative framework with established partners, such as Russia. Even in the Russian case, committee members believe that the transition can be accomplished if it focuses on shared areas of security values and goals. Finding 2-11: There is national security benefit in sustained partnerships, col- laborations, and joint activities that link individuals and institutions in produc- tive, mutually beneficial pursuits that can withstand political, economic, and other disruptions. This sustained engagement is the foundation for a “habit of cooperation.” New Partners to Support New Projects The transition from CTR 1.0 to 2.0 will involve many changes in the opera- tional patterns of DOD and other USG agencies and participants. Some of these changes, such as engagement with new partners, are inevitable and have already arisen in existing programs to varying degrees. The committee sees the potential for a more regular engagement of a broad range of nongovernment

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 57 partners in CTR 2.0. There have been some successful DOD CTR examples of this already. The committee believes greater collaboration and partnership between government (and international) security engagement programs and the private or nongovernmental sector, defined broadly as including industry, academe, and other organizations, could be particularly useful in program initiation and implementation. Organizations already operating in potential partner countries can also provide valuable insights into everything from local political dynam- ics to practical aspects of program implementation. In looking at these new partners, it is important to recognize that one group may be independent and function as full partners,20 a second group may carry out designated tasks for a government program as subcontractors, and a third group may be a hybrid. The academic community also may have much to offer. Since USG CTR began, many universities, academic institutions, and individual professors from many fields have had some role or contact with cooperative threat reduction programs. Their knowledge can be invaluable and their ability to engage on the ground may be indispensable. For example, a current project in Iraq involving Texas Tech University began under the auspices of a State Department non- proliferation program and subsequently received additional support from the university itself.21 The two senior members of the Texas Tech faculty involved in the project have continued to provide their expertise to similar efforts else- where and are providing both an essential link to the scientific community and continuity for the project. In addition, many U.S. universities could partner with foreign universities. They may be able to provide unique insights into the local situation, as well as be potential cosponsors of meetings, workshops, or training programs. The committee believes that industry has the potential to make a far greater contribution than it currently does to global security engagement. Early efforts to engage industry in DOD CTR were centered primarily on the Defense Con- version Program, which aimed to convert former Soviet military infrastructure to peaceful, civilian commercial production. This report will not cover the reasons why the Defense Conversion Program was eventually eliminated, but some of the program’s efforts were successful and may be worth reviewing in the future. Industry should be tapped as a resource and partner as CTR 2.0 addresses threats that are inherently dual-use, particularly in the chemical industry and biotechnology sectors. Industry can also play a role as a barometer of local conditions that may have an impact on any programs in new partner 20 For a description of activities undertaken by the Nuclear Threat Initiative, many of which have been in partnership with governments or international organizations, see www.nti.org. 21 Richard Stone. 2008. Nuclear Control: Iraq Embarks on Demolition of Saddam-Era Nuclear Labs. Science. 321:5886. 188 pp. Available as of March 2009 at http://www.sciencemag.org/cgi/ content/full/sci; 321/5886/188?maxtoshow=&HITS= 10&hits=10&RESULTFORMAT=&fulltext =carl+phillips+iraq+texas+tech&searchid=1&FIRSTINDEX=0&resourcetype=HWCIT.

58 GLOBAL SECURITY ENGAGEMENT countries. For example, 112 American Chambers of Commerce currently oper- ate in 99 countries,22 and generally have close ties both with the host country as well as with the U.S. embassy, and chambers of commerce representing the interests of other governments. Another way to reach out to the U.S. private sector may be through the Overseas Security Advisory Council (OSAC), which held its 23rd Annual Brief- ing with former Secretary of State Condoleezza Rice on November 19, 2008. OSAC was started in 1985, as a forum to share ideas between the public and private sectors in recognition of the growing threat posed by international terrorism to U.S. citizens living and working abroad. The council, which now comprises a dozen federal agencies and more than 5,600 private-sector groups, meets annually to share ideas, and plays “an important role in helping to shape the world’s view of America, how we maintain our security and how we engage with our neighbors in their countries.”23 Secretary Rice cited several areas where OSAC had played a role in 2008, including at the time of the bombing of the Marriott Hotel in Islamabad: “OSAC quickly gathered security information and shared that information, and that was used, in turn, to brief senior [State] Department officials and . . . chief security officers.”24 OSAC could play a role in the CTR 2.0 model. Clearly, other governments and international organizations have played a strong role in CTR 1.0 and should continue to do so in CTR 2.0. The conceptual difference, however, is that in the CTR 2.0 model, new program engagements would begin by sharing information, identifying areas of risk and opportunity, and jointly planning responses. In the past, the United States has often been very parochial in its approach to program planning, and on many occasions this has had very negative consequences. An early example of this was the decision in 1992 to respond to Ukraine’s objection to participating in the International Science and Technology Center (ISTC) WMD scientist redirection program based in Moscow. Because there were compelling reasons to keep Ukraine involved in broad CTR efforts, the United States agreed, but did not consult, with its ISTC partners before announcing its commitment to a new center—the Science and Technology Center in Ukraine. Because it had not been involved in the decision to pursue a separate center in Ukraine, the European Union (EU) opted not to participate and Japan made a similar deci- sion. Although the EU eventually joined the Science and Technology Center of Ukraine several years after its creation, the situation might have been avoided or 22 U.S. Chamber of Commerce. 2009. American Chambers of Commerce Abroad. Available as of March 2009 at http://www.uschamber.com/international/directory/default. 23 Condoleezza Rice. 2008. Secretary’s Remarks: Keynote Address at the Overseas Security Ad- visory Council 23rd Annual Briefing, November 19. Available as of March 2009 at http://vienna. osac.gov/page.cfm?pageID=4942. 24 Ibid.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 59 other solutions to Ukraine’s objections could have been explored if the matter had been handled differently. If the CTR 2.0 model is to work well, countries other than the United States will also need to adopt a commitment to consultation and coordination–a habit or culture of partnership. This will require diplomatic effort, but the existing bilateral, multilateral, and international channels of communication should provide ample opportunity for this. CTR in the 21st Century: Lessons The Shchuch’ye Example The development, design, and construction of a chemical weapons destruc- tion facility at Shchuch’ye in western Siberia is a good example of what is described above. In its 14-year history, the project has taken on many CTR 2.0 characteristics. It began as a typical CTR 1.0 project based on a bilateral agree- ment, and implementation was overseen by a U.S. prime contractor. However, when faced with obstacles, such as a congressional restriction that U.S. funds were to be used only for construction of the demilitarization facility and not for the essential supporting infrastructure, it became critical for DOD CTR to identify and engage new partners. The EU and 12 nations contributed funds, materials, and expertise for infrastructure construction at the facility (Box 1.1 in Chapter 1). Canada was particularly interested in the railroad construction proj- ect. It matched a $1 million challenge grant from the NTI with approximately $35 million to fund the construction of a rail line from the weapons storage area to the destruction facility.25 Another important NGO partnership developed when Russian public opposition to the project developed over environmental concerns. Global Green USA, the U.S. affiliate of the Russian NGO, Green Cross, was engaged to survey public opinion and establish a public involvement program.26 Global Green has now opened and managed more than a dozen local outreach offices at chemical (and nuclear) CTR sites to facilitate threat reduction projects. This was done in coordination with Green Cross Russia and Green Cross Switzerland, and with the support of about a dozen Global Partnership members.27 25 Laura Holgate. 2008. Discussion at CTR Committee Meeting #2, July 8. 26 Igor Khripunov and G. W. Parshall. Nongovernmental Actors in U.S. and Russian Chemical Demilitarization Efforts. Demokratizatsiya. 9:10. 422-457 pp. 27 More information on the Shchuch’ye effort can be found at Global Green U.S. 2009. Security and Sustainability. Available as of March 2009 at www.globalgreen.org/wmd.

60 GLOBAL SECURITY ENGAGEMENT The Vinca Example Another example is the role played by NTI in removing nuclear materials from the reactor in Vinca, Serbia. When Serbian president Slobodan Milosevic was ousted, the U.S. government decided to include Project Vinca in its pack- age of support, but would only deal with the highly enriched uranium (HEU) at the reactor, which it viewed as the immediate proliferation threat. NTI, however, saw a link between the 40 kilograms of HEU and the opportunity to remove spent fuel from the unstable environment. A seven-party action plan was devised involving the IAEA, the Department of State, DOE, the Serbian government, a laboratory, NTI, and the U.S. Embassy in Belgrade. Because NTI was not covered for liability under the Memorandum of Understand- ing that governed the project, the work was managed directly by the IAEA. NTI provided funding to the IAEA, becoming the first nonstate donor to the IAEA.28 The project helped highlight the need to phase out the use of HEU in civilian facilities. This joint and highly collaborative project had several successes by the summer of 2008: the removal of fresh fuel in 2002 through a transparent, seven- party process and removal of nearly all the spent fuel. In addition, the IAEA raised more funding, and the project helped highlight the need to phase out the use of HEU in civilian facilities. What Makes NGOs Different? NGOs typically do not depend on government money and NGO officers are not government officials. This leaves NGOs able to criticize government approaches, be more responsive to recipient concerns, act quickly, remain flex- ible, and be more willing to accept risks. NGOs are also unfettered by federal acquisition regulations and can design any kind of contracting mechanisms that will meet requirements. An NGO can pick and choose among different projects and focus on those it feels are closest to the organization’s mandate, and can bring in expertise either through their staff or through networks of experts. In many cases, NGO boards include international experts that lend a high level of prestige and credibility that helps gain access. There can be possible disadvantages to working with NGOs as well. For example, there is the risk that a foreign government might think that an NGO is speaking on behalf of the U.S. government. NGOs may not have the same level of accountability as the government, may not have the necessary technical expertise, or may even work at cross purposes with the government. 28 Nuclear Threat Initiative. Press Release. NTI Commits $5 Million to Help Secure Vulnerable Nuclear Weapons Material. Nuclear Threat Initiative, August 23, 2002. Available as of March 2009 at http://www.nti.org/c_press/release_082302.pdf.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 61 NGOs Then and Now The potential for developing constructive and effective working relation- ships with NGOs is higher now than it was in the early days of CTR, when concepts were new and every program was a learning process. Now, several NGOs have boards and staffs that were intimately involved with USG CTR efforts and understand the underlying security issues, congressional dynamics, and budgetary constraints.29 Not only do the individuals involved have requisite expertise, their organizations have also gained reputations in the field for carry- ing out programs and activities in support of the CTR mission. NGOs, especially those with a demonstrated track record, can work with USG CTR programs in different ways that need to be explored more systematically. • Pioneers, or “wedge strategies” – NGOs can take risks that governments may not be ready to take. This may be particularly important when exploring the potential to engage a new partner country. • Analysis leading to catalysis – NGOs can undertake analytical efforts designed to solve a problem, including undertaking independent approaches to resolve political questions that are impeding action. • Design sharing – NGOs can work with the government on projects where each has a defined role. • Gap filling – NGOs can fill gaps when the government either does not see the gap or cannot participate. • Deal closer – NGOs can pressure groups to get them to honor their agreements. • Setting benchmarks and evaluating − NGOs can be an independent voice to evaluate programs. • Safe convener – NGOs can also get agencies or even countries around a table when there are disagreements or frictions that prevent constructive dialogue. Programs that address threats to national security will predictably involve types of information that may not be appropriate to share with nongovern- mental organizations. Judgments made based on sensitive diplomatic, security, proprietary, or privacy issues may need to guide aspects of program design, implementation, and oversight, and it may not be possible to be completely open and transparent. However, a great deal can be accomplished if guidelines set appropriate boundaries. There is already a substantial history of successful nongovernmental partnerships with organizations such as the National Acad- 29 For example, the Civilian Research and Development Foundation (www.crdf.org) and the Nuclear Threat Initiative (www.nti.org) both have board and staff members who have long been active in CTR activities.

62 GLOBAL SECURITY ENGAGEMENT emies, the Nuclear Threat Initiative, the Center for Strategic and International Studies, the Henry L. Stimson Center, the Global Security Partnership, and others. Sustainability The issues of financial and other commitments from CTR program partners link directly to both integrating partners into initial program development and designing programs to be sustainable. If the United States expects increased financial commitments from partner countries—both those in which programs will be implemented and those who can contribute to implementation—it can- not maintain the paternalistic approach that has characterized past programs. The CTR 2.0 goal of building partnerships through shared program develop- ment, mutually agreed-upon goals, and joint funding—defined to include in- kind as well as direct contributions—has a much greater likelihood of leading to sustainable, mutually beneficial activities. In the case of Russia, where the committee believes cooperative work should continue, the issue of funding could be addressed in three ways. First, no systematic mechanism was ever developed that adequately reflects the con- tributions that Russia (and other former Soviet states engaged in USG CTR activities) have made. Although these contributions were largely in-kind, they were often significant. Some efforts were made through the ISTC’s scientist redirection program, for example, to require participating institutes to cover part of every project’s costs. Overhead for projects was capped at a very low percentage and only a portion of nontechnical staff involved in any project could be covered, leaving it to the institute—or the government—to cover the remaining overhead and personnel costs. These and other in-kind contributions need to be captured and acknowledged to encourage future partnerships, par- ticularly in environments where cash contributions are unlikely. Second, although a country may need extensive support at the beginning of a project, economic factors may change that would allow that country to take on a higher share of the implementation burden. This is now the case with Russia, but no provision was ever included in agreements that would allow for this. The ability to assume a higher burden for in-country costs, however, should not signal the end of the partnership. The Libya example shows that having the financial resources to support a project does not mean that a partner does not need technical or other assistance, or should not continue to be engaged as part of a sustainability strategy. Third, a partner country that initially receives assistance can evolve into a future implementation partner. This may be particularly useful where it may be difficult for the United States to engage a new partner. Chemical weapons destruction in the Middle East is a possible example. If the United States works with Iraq to destroy its remaining chemical weapons stockpile and trains an

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 63 Iraqi chemical weapons disposal unit, it may be possible to develop a project where the Iraqi unit—with continued U.S. technical support—engages with other countries in the Middle East on chemical weapons destruction issues rather than the United States. Along similar lines, it is hard to imagine any kind of security engagement program in North Korea that does not involve Russia. When new efforts are being designed, a useful planning exercise would be to think forward about the role that a new engagement partner might play in the future. The committee also believes that fundamental changes in circumstances, such as those that have taken place with Russia, need to be governed by frame- works that can reflect a rebalancing of the relationship. Whether or not this is under a nuclear cooperation agreement or some other framework matters less than having a legal structure that covers not only what the United States and Russia do bilaterally, but also what they might do together elsewhere. The committee also observed that DOD and DOE have taken steps to factor sustainability more specifically into program implementation. A Febru- ary 2007 Government Accountability Office report states that “during our visit to Russia, officials at three of the four civilian nuclear research institutes we visited told us that they are concerned about their sites’ financial ability to maintain U.S.-funded security upgrades after . . . DOE financial support ends in 2013.”30 DOD has announced plans to halt funding for analogous activities in 2011. In April 2007, the DOE’s National Nuclear Security Administration announced that it had reached a nonbinding agreement with Russia’s Federal Atomic Energy Agency (Rosatom) on a plan for Russia to sustain U.S.-funded security upgrades at nuclear material sites after DOE ceases its financial sup- port.31 Separate discussions have reportedly taken place with regard to Russia sustaining U.S.-funded work performed at sites with nuclear warheads and at nuclear material sites controlled by other agencies. Additional, legally binding bilateral arrangements may have a useful role to play in ensuring that opera- tion and maintenance of U.S.-funded security upgrades continue to receive the requisite levels of Russian funding after 2011 and 2013. Consideration could also be given to how to address similar sustainability challenges with respect to U.S. and other international efforts to engage former Soviet WMD scientists in 30 Government Accountability Office. 2007. Progress Made in Improving Security at Russian Nuclear Sites, but the Long-term Sustainability of U.S.-Funded Security Upgrades Is Uncertain. GAO- 07-404. 26-27 pp. In section 3156(b)1 of the National Defense Authorization Act of 2003, Congress directed as follows: “The Secretary of Energy shall work cooperatively with the Russian Federation to develop, as soon as practicable but no later than January 1, 2013, a sustainable nuclear materials protection, control, and accounting system for the nuclear materials of the Russian Federation that is supported solely by the Russian Federation.” 31 National Nuclear Security Administration (NNSA). 2007. U.S. and Russia Agree to Sustain Se- curity Upgrades at Nuclear Material Facilities: Agreement Helps to Ensure that U.S. Investments Will be Maintained. March 29. Available as of March 2009 at http://nnsa.energy.gov/news/1131.htm.

64 GLOBAL SECURITY ENGAGEMENT non-WMD-related employment, and CTR 2.0 activities both within and outside the former Soviet Union. One of the lessons learned from USG CTR programs operating in the for- mer Soviet Union is that sustainability has to be part of the original program plan, not something that is an afterthought. Under CTR 2.0, advance planning carried out in cooperation with the partner should be standard practice. Other agencies and entities that provide foreign assistance—such as the U.S. Agency for International Development, the Millennium Challenge Corporation, and other nongovernmental organizations—have developed their own mechanisms for promoting sustainability after the conclusion of donor funding. Reach- ing out to such foreign assistance providers in order to identify and, where appropriate, replicate their best practices would contribute to DOD and other USG CTR program effectiveness and may offer new opportunities for program leveraging. Finding 2-12: Engagement programs are more effective and have a higher likelihood of being sustained if they are developed in partnership with the engaged country, are tailored to the region, and are seen as beneficial to both partners. Recommendation 2-1: The White House, working across the executive branch and with Congress, should engage a broader range of partners in a variety of roles to enable CTR 2.0 to enhance global security. At a minimum this will require • Becoming more agile, flexible, and responsive • Cultivating additional domestic and global partners to help meet our goals • Building mutually beneficial relationships that foster sustained cooperation Evolving from CTR 1.0 to CTR 2.0 Implementing CTR 2.0 will be an incremental process. The United States needs to continue to address old challenges as it organizes to meet new ones. A well-crafted plan can ensure that good practices of CTR 1.0 are embraced and carried forward, and unproductive ones are shed. One possible model is to build on the current National Security Council−Homeland Security Council bioengagement coordination efforts. Although relatively new, it already has learned lessons about the challenges of getting diverse communities to work together productively and is a first step toward CTR 2.0 implementation. Other lessons learned should be incorporated into the transition process as well. The committee was told that DOE’s National Nuclear Security Administration has

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 65 developed a useful methodology for prioritizing countries that may participate in the Megaports Program.32 This methodology might be applied across any number of programs or modified as appropriate. Another promising example is a new joint project between the U.S. Department of Agriculture, DOD CTR, and a host of other partners. The program design and funding engages ��������������������������������������� Canada, the European Union, the Russian Federation, the United Kingdom, and the United States as partners to establish an animal health disease surveil- lance system in the Stavropol region of Russia. The project aims �������������� ������������������������������� to coordinate all efforts from the beginning of engagement to ensure an efficient use of funds and maximum participation from a leading group of international scientists and veterinarians. In addition to supporting a veterinary disease monitoring system in an important geographic nexus between Russia and Europe, the project also aims to identify multiple subsequent opportunities for Russian Federa- tion veterinary scientists to engage in long-term collaborative research projects with equivalent scientists based in Canada, the European Union, the United Kingdom, and the United States. Parts of this project were built on program concepts developed by the Nuclear Threat Initiative. Finding 2-13: There needs to be a distinct transition plan to move between the current cooperative threat reduction programs and CTR 2.0. Summary of Chapter Findings and Recommendations Finding 2-1: CTR 1.0 was a highly creative response to unique security chal- lenges and geopolitical changes in the former Soviet Union. The new threats we face require similar innovation to create CTR 2.0. Coordination and lead- ership from the White House will be required, and relevant departments and agencies will need to engage to ensure that there is a clear connection between the policy intent and program implementation, as in the case of Libya. To succeed, it will need to be an integrated, cooperative, collaborative, global enterprise that is responsive, flexible, adaptable, and able to respond to the new security threats that it will need to counter. Finding 2-2: CTR 2.0 efforts will likely be smaller and distributed across a larger number of countries carefully targeted on the sources of new threats rather than the large, physical infrastructure dismantlement or construction projects that were the hallmarks of the programs in the former Soviet Union. Finding 2-3: CTR 2.0 should include long-term relationship and capacity build- ing that can be the basis for future cooperative threat reduction activities, 32 National Nuclear Security Administration. Megaports Initiative. Department of Energy. Avail- able as of March 2009 at http://nnsa.energy.gov/nuclear_nonproliferation/1641.htm.

66 GLOBAL SECURITY ENGAGEMENT through defense and military-to-military engagement and other peer-to-peer engagement, such as in science. Finding 2-4: Traditional criteria for determining eligibility for cooperative threat reduction engagement may need to be adjusted to reflect the changing security environment. Finding 2-5: As the lessons learned from the Libyan experience make clear, to make cost-effective contributions to U.S. national security in the future, USG CTR programs must be less cumbersome and less bureaucratic in order to provide agile and timely contributions. They must take greater consideration of the needs and wants of reluctant partners, even as we keep focused on core U.S. objectives. Finding 2-6: The traditional metrics of DOD (and USG) CTR success are often useful for program evaluation. Warheads or delivery systems and launch- ers destroyed, weapons materials secured, and contractor full-time equivalent on target are more concrete than just total dollars spent, but these metrics do not adequately reflect threat reduction impact or account for the value of potential CTR 2.0 engagement against new threats in this century. The chal- lenge remains to find measureable performance indicators that capture the true value of important future successes that may be less tangible and more difficult to document. Efforts to contrive such measures, however, can result in burdensome and misleading data that may distort sound assessments of policy implementation. For example, the dollar value of locks and alarms procured, or even the number, is less important than the degree to which an institute plans, trains, and practices security against intruders and the “inside threat.” These latter considerations are more important, but less transparent and measureable. Finding 2-7: The globalized environment will be characterized by the increas- ingly rapid spread of technology, major changes in how the traditional nation- state structure works or nongovernmental organizations engage, diffusion of threats, and changes in the nature of the threats (including the convergence of technology, new patterns of technologies, Internet-facilitated communications, and complex relationships). Finding 2-8: Proliferation challenges and opportunities to control prolifera- tion vary greatly geopolitically and across the three major WMD systems of concern as well as other areas of concern, and a diverse set of tools and approaches is needed to respond. Addressing these challenges will require the involvement of partners beyond the traditional government players and geostrategic allies.

COOPERATIVE THREAT REDUCTION IN THE 21ST CENTURY 67 Finding 2-9: Relationships on multiple levels with allies, threat-reduction partners, academe, NGOs, and others are necessary for effective engagement with countries and regions on nonproliferation activities. Finding 2-10: There are many potential partners and resources that can be employed for CTR 2.0 that currently are not being tapped. Finding 2-11: There is national security benefit in sustained partnerships, col- laborations, and joint activities that link individuals and institutions in produc- tive, mutually beneficial pursuits that can withstand political, economic, and other disruptions. This sustained engagement is the foundation for a “habit of cooperation.” Finding 2-12: Engagement programs are more effective and have a higher likelihood of being sustained if they are developed in partnership with the engaged country, are tailored to the region, and are seen as beneficial to both partners. Recommendation 2-1: The White House, working across the executive branch and with Congress, should engage a broader range of partners in a variety of roles to enable CTR 2.0 to enhance global security. At a minimum this will require • Becoming more agile, flexible, and responsive • Cultivating additional domestic and global partners to help meet our goals • Building mutually beneficial relationships that foster sustained cooperation Finding 2-13: There needs to be a distinct transition plan to move between the current cooperative threat reduction programs and CTR 2.0.

Next: 3 The Form and Function of Cooperative Threat Reduction 2.0: Engaging Partners to Enhance Global Security »
Global Security Engagement: A New Model for Cooperative Threat Reduction Get This Book
×
Buy Paperback | $50.00 Buy Ebook | $39.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The government's first Cooperative Threat Reduction (CTR) programs were created in 1991 to eliminate the former Soviet Union's nuclear, chemical, and other weapons and prevent their proliferation. The programs have accomplished a great deal: deactivating thousands of nuclear warheads, neutralizing chemical weapons, converting weapons facilities for peaceful use, and redirecting the work of former weapons scientists and engineers, among other efforts. Originally designed to deal with immediate post-Cold War challenges, the programs must be expanded to other regions and fundamentally redesigned as an active tool of foreign policy that can address contemporary threats from groups that are that are agile, networked, and adaptable. As requested by Congress, Global Security Engagement proposes how this goal can best be achieved.

To meet the magnitude of new security challenges, particularly at the nexus of weapons of mass destruction and terrorism, Global Security Engagement recommends a new, more flexible, and responsive model that will draw on a broader range of partners than current programs have. The White House, working across the Executive Branch and with Congress, must lead this effort.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!