Professional Documents
Culture Documents
Wyn Q. Bowen, Hassan Elbahtimy, Christopher Hobbs, Matthew Moran (Auth.) - Trust in Nuclear Disarmament Verification-Palgrave Macmillan (2018)
Wyn Q. Bowen, Hassan Elbahtimy, Christopher Hobbs, Matthew Moran (Auth.) - Trust in Nuclear Disarmament Verification-Palgrave Macmillan (2018)
DISARMAMENT
VERIFICATION
Wyn Q. Bowen, Hassan Elbahtimy,
Christopher Hobbs, Matthew Moran
Trust in Nuclear Disarmament Verification
Wyn Q. Bowen • Hassan Elbahtimy
Christopher Hobbs • Matthew Moran
Trust in Nuclear
Disarmament
Verification
Wyn Q. Bowen Hassan Elbahtimy
Head, School of Security Studies Centre for Science and Security
King’s College London Studies, Department of War Studies,
London, UK School of Security Studies
King’s College London
Christopher Hobbs London, UK
Centre for Science and Security
Studies, Department of War Studies, Matthew Moran
School of Security Studies Centre for Science and Security
King’s College London Studies, Department of War Studies,
London, UK School of Security Studies
King’s College London
London, UK
Cover image © Ian Dagnall / Alamy Stock Photo, © George Marks / Getty
Cover design by Henry Petrides
This book is the culmination of several years’ research involving the com-
bined efforts of a range of people and organisations. First and foremost, we
would like to thank all those involved in the UK-Norway Initiative (UKNI)
who devoted time, with the approval and support of their direct employ-
ers, to the development and implementation of the King’s College London
research project. It was the experience of the UKNI and the particular
challenges encountered as part of that work that set the scene for the
research behind this book. Experts from the UK AWE, the Norwegian
Radiation Protection Authority and the Institute of Energy Technology, all
contributed significantly to the design process and brought an enormous
weight of knowledge and experience to bear on the simulation. Particular
thanks on this front go to Keir Allen, Attila Burjan, David Chambers,
Styrkaar Hustveit, Thomas Plant and Ole Reistad. Our thanks also go to
Detective Chief Inspector Gavin Webb for his valuable contribution to the
design and execution of the simulations.
The simulation took place at Kjeller, near Oslo, and we owe our hosts a
debt of gratitude for welcoming us to this working nuclear facility and
accommodating the disruption that our presence undoubtedly caused.
Special thanks here go to Tore Ramsøy, Steinar Hoibraten, Svein Mykkeltveit,
Paula Nunez and Pavel Tishakov. We also thank the students who partici-
pated in the simulation. They played a key role in the success of the project
and we appreciate their dedication and hard work. Supporting universities
included Hamburg University (Germany), Texas A&M University (USA),
Tomsk Polytechnic University (Russia), Tomsk State University (Russia),
Witwatersrand University (South Africa) and the American University in
v
vi ACKNOWLEDGEMENTS
1 Introduction 1
Bibliography 155
Index 169
vii
List of Tables
ix
CHAPTER 1
Introduction
In January 2007, a letter calling for a ‘world free of nuclear weapons’ pub-
lished in the Wall Street Journal by four former US statesmen reinvigo-
rated the debate on nuclear disarmament.1 The authors were former
Secretaries of State Henry Kissinger and George Schultz, former Secretary
of Defence Bill Perry, and former senator Sam Nunn, and their strongly
worded letter evoked an increasingly uncertain international security envi-
ronment where the risks associated with nuclear weapons have come to
outweigh their benefits as tools of deterrence. The argument held all the
more weight for the fact that the authors were all veterans of “America’s
cold-war establishment with impeccable credentials as believers in nuclear
deterrence”, and their warning resonated loudly across the international
community.2
The timing was also fortuitous, since it chimed with efforts to launch a
new global disarmament movement that aimed to take a different path to
traditional disarmament activism. The ‘Global Zero’ movement was estab-
lished in late 2006 by Bruce Blair, a former Minuteman ballistic-missile
launch-control officer, and Matt Brown, who had served a term as
Secretary of State for Rhode Island. The goal of their fledgling organisa-
tion was to “advocate the kind of pragmatic actions that mainstream poli-
ticians and foreign-policy experts could endorse, while preserving, as a
destination, a goal that seemed inspiring”.3 Given momentum by the
highly-publicised intervention by the so-called “four horsemen of the
them unacceptable and immoral for all - the international community can
start demanding and pressuring the nuclear-armed states and their military
alliances to deliver what they’ve actually promised: a world free of nuclear
weapons”.14 Yet, amidst this understandable enthusiasm and optimism, it
is important to note that the trend in the nuclear arena seems to be moving
firmly in the opposite direction, with nuclear weapons regaining promi-
nence amidst rising instability and uncertainty. While France, Russia, the
United Kingdom and the United States have all reduced their arsenals in
recent years, these reductions have been accompanied by significant moves
to modernise nuclear forces. Take the United States, for example. In a
recent study, Wolfsthal, Lewis and Quint highlighted plans for the United
States to spend approximately one trillion dollars “maintaining the current
arsenal, buying replacement systems, and upgrading existing nuclear
bombs and warheads”.15 In this context, Woolf provides a comprehensive
overview of plans to modernise all aspects of the US nuclear triad, from
the move to replace current land-based ‘Minuteman’ intercontinental bal-
listic missiles (ICBMs) with a “new Ground-based Strategic Deterrent
around 2030”, to development work on a new class of ballistic missile
submarine that “will replace the Ohio-class Trident submarines as they
reach the end of their service lives”.16
Clearly, the election of President Trump has added another dimension
to this issue. Based on the various statements he has made over the past
three decades, Michaels and Williams argue that “it is clear Trump will not
show the same interest as Obama, even at a rhetorical level, in a world
without nuclear weapons because they provide a bargaining chip and flex-
ibility in decision-making”.17 Indeed, his stated view is that the US nuclear
arsenal has been “allowed to atrophy and is desperately in need of mod-
ernization and renewal”.18
Needless to say, there is a strong link between the evolution of the US
nuclear arsenal and that of Russia. Indeed, this link was made explicit in
the 2010 Nuclear Posture Review: “Russia’s nuclear force will remain a
significant factor in determining how much and how fast we are prepared
to reduce U.S. forces”.19 It is therefore significant that Russia is “in the
middle of a broad modernization of its strategic and nonstrategic nuclear
forces”.20 Moscow is shoring up its nuclear capabilities as evidenced by the
introduction of the new Borey-class SSBN, with three currently in opera-
tion. The Russian Navy has plans to construct five more by 2020 and plans
to diversify its intercontinental ballistic missile (ICBM) force.21
INTRODUCTION 5
Of course the logic here goes both ways; it is 10 years since Lieber and
Press “predicted that ‘growing U.S. capabilities will pressure Russia and
China to reduce the peacetime vulnerability of their forces’ through ‘logi-
cal’ precautionary steps, including larger nuclear forces coupled with more
offensive postures”, yet the argument still holds relevance.22 Alongside
Washington’s efforts to modernise its nuclear triad, “it is developing both
its missile defenses and counterforce capabilities, which would include
the use of conventional weapons, such as those associated with the
Conventional Prompt Global Strike (CPGS) program”.23 These develop-
ments have been perceived as a threat by Moscow. Ultimately, Kristensen
and Norris argue that, “Overall, the nuclear modernization effort will
present Russia and the international arms control community with new
challenges. Unless a new arms control reduction agreement is reached in
the near future, the shrinking of Russia’s strategic nuclear arsenal that has
characterised the past two decades will likely come to an end”.24
In Europe, a similar process of modernisation is underway. French
President Hollande committed some 180 billion euros to upgrading the
country’s nuclear weapons in the period 2014–2019.25 In his speech on
19 February 2015, President Hollande followed a well-established French
tradition of reaffirming the role and value of deterrence in French strategic
doctrine. Indeed “France is the only Western nuclear State (and one of the
only countries with a military nuclear capability) in which the Head of
State or Government devotes an entire public speech to nuclear deter-
rence, on average once every five years”.26 It is also noteworthy that “In
spite of the continued debate on the relevance of deterrence, which takes
various forms (such as the 2009 Prague speech, and the international con-
ferences on the so-called ‘humanitarian dimension’ starting in 2012…),
[France] does not feel even remotely threatened, politically speaking, by
any kind of pressure in this field [of disarmament]”.27
In the United Kingdom, the issue is more complex. ‘Trident renewal’,
the catch-all term used to describe the process of replacing the country’s
nuclear weapons and their means of delivery – four Vanguard-class subma-
rines, Trident II D5 missiles and associated warheads – is a controversial
issue that has generated considerable public debate.28 The saga dates to
2006, when the then Labour government committed to replacing Trident,
a move supported by a subsequent parliamentary vote, in March 2007,
that supported the Government’s decision to “take the steps necessary to
sustain a credible deterrent capability in the 2020s and beyond”.29 Since
then, the replacement has been the subject of considerable criticism from
6 W. Q. BOWEN ET AL.
Clearly, this brief insight into the various efforts underway to moder-
nise and expand nuclear arsenals cannot be divorced from contemporary
points of tension and conflict around the globe. From China’s power pro-
jection in Asia, to Russia’s thinly-veiled nuclear threats over what is per-
ceived as western interference in Moscow’s affairs in Ukraine, there is a
range of issues vying for priority on the international security agenda.
Little surprise, then, that questions of deterrence and nuclear strategy are
once again in vogue as nuclear powers consider the new challenges posed
by a complex and multipolar security landscape. Simply put, “The condi-
tions do not now exist to allow other nuclear-armed states to join with the
United States in taking additional steps to reduce the role and number of
nuclear weapons. Russia and China are not moving away from reliance on
nuclear weapons. Extended deterrence cannot be changed in ways that
eliminate the requirement for the capability to deploy nuclear weapons
with nonstrategic delivery systems in support of US allies. […] Put differ-
ently, the desired ‘solid international consensus against nuclear weapons’
is not plausible in current circumstances”.39
a host of complex issues and questions regarding the process and its out-
comes. Central among these is the fact that those involved in any verifica-
tion inspection process must inevitably conduct their work in a space that
falls well short of absolute certainty. Outcomes here represent expressions
of confidence in the degree to which it is believed that the inspected party
has adhered to agreed protocols. These can be informed expressions of
confidence, but they cannot be taken as absolute truth.
Crucially, the problem here introduces an important human factor into
the scientific process. For many looking from the outside in, the technical
arena is often viewed as a rigidly structured one that is grounded in experi-
mentation and verifiable evidence. Yet in the context of verification, this is
not the case. The lines between scientific enquiry and human psychology
are blurred and outcomes have the potential to be influenced by percep-
tions. The practice of verification involves two distinct groups – host and
inspectors – each driven by their own, potentially conflicting, interests and
objectives. The context can be highly cooperative, yet there is always
ample opportunity for deception and the relationship inevitably has the
potential to be adversarial. In theory, determinations of compliance should
be evidence-based and objective. In practice, the human factor, and per-
ceptions of intentions in particular, adds an element of subjectivity that has
considerable potential to distort judgements and conclusions.
These issues raise a number of questions regarding the role and influ-
ence of the human factor in the verification process. To what extent, for
example, do the personal interactions between host and inspectors have a
significant and lasting effect on the outcomes of the verification process?
Do perceptions of host intentions influence the confidence levels of inspec-
tors? What role do communication and information management (if any)
play in this respect? These questions hint at the complex interplay between
evidence-based judgements and perceptions of intentions that overshad-
ows the science of verification. And it is precisely this uncertain space, too
long ignored, that this book explores.
In this context, our study has three principal objectives. First, the book
will consider the nature of those human factors with the potential to
impact upon the verification process. Our goal here will be to probe the
scope and limits of this overlap of technical tools and processes with the
less tangible sphere of human perceptions and emotions. This will involve
careful consideration of terms such as ‘confidence’, understood as an
evidence- based judgement concerning the capability of the inspecting
team to suitably account for all items under their jurisdiction, at all points
INTRODUCTION 11
and ‘trust’ and, more importantly, the relationship and tension between
these concepts, goes to the heart of our research on the role and influence
of human factors. The chapter will seek to elucidate these concepts and
their relevance to verification and, in the process, develop a conceptual
lens through which the empirical research can be viewed. In addition, the
chapter will set out a series of hypotheses regarding the influence of human
factors in the verification process. These will then be tested against empiri-
cal data in Chapter 6.
In Chapter 5, we will set out the case study that is the source of the
empirical evidence underpinning the book. At stake here is a fictional veri-
fication regime (although enacted at an operational nuclear facility in
Norway) involving a detailed inspection scenario for a particular stage in
the disarmament process. The scenario represents a ground-breaking
attempt to isolate for study the human factors influencing verification and
this chapter will discuss both its nature and its suitability for the task at
hand. In particular, this discussion of our original approach will include
important methodological details on how the scenario was designed to
balance freedom of thought and decision-making on the part of the
inspectors, with a rigorous and highly choreographed exercise that ensured
replication across different test groups.
The sixth chapter will analyse the empirical evidence gleaned from
seven iterations of the verification scenario, described in detail in the pre-
ceding chapter. The nature and significance of this data will be explained,
before it is weighed against the working hypotheses set out in Chapter 4.
Among other things, the chapter will demonstrate that the interactional
elements inherent in any nuclear inspection activity, from information pro-
vision strategies to facility access to host attitudes, frame the experience of
inspectors and exert a subtle but significant impact on their final judge-
ment regarding levels of compliance. The extent of this influence is diffi-
cult to accurately quantify, yet it is our contention that within the
verification process, the perceptions of inspectors in particular can be sub-
tly influenced and shaped in a manner that contributes to the construction
of an environment that is more conducive to higher levels of verification
confidence.
Chapter 7 will begin by drawing together the various strands of argu-
ment that have appeared throughout the book and make the case that
human factors exert a subtle but significant influence on the verification
process. We will argue that our findings have important implications for
work on verification and arms control more broadly. Rather than think-
14 W. Q. BOWEN ET AL.
Notes
1. George P. Shultz et al., “A World Free of Nuclear Weapons,” Wall Street
Journal, January 4, 2007, www.wsj.com/articles/SB116787515251566636.
2. “The Growing Appeal of Zero,” The Economist, June 16, 2011, http://
www.economist.com/node/18836134.
3. Ibid.
4. Matthew Moran and Matthew Cottee, “Bound by History? Exploring
Challenges to French Nuclear Disarmament,” Defense & Security Analysis
27, no. 4 (2011): 341.
5. “Global Zero Action Plan” (Paris: Global Zero Commission, February
2010), 3, http://www.globalzero.org/files/gzap_6.0.pdf.
6. Heather Williams, Patricia Lewis, and Sasan Aghlani, “The Humanitarian
Impacts of Nuclear Weapons Initiative: The ‘Big Tent’ in Disarmament,”
Chatham House Research Paper (Chatham House, March 2015), 5, https://
www.chathamhouse.org/sites/files/chathamhouse/field/field_document/
20150331HumanitarianImpactNuclearWilliamsLewisAghlani.pdf.
7. Michael Linhart, “Pledge Presented at the Vienna Conference on the
Humanitarian Impact of Nuclear Weapons” (Foreign Ministry of Austria,
December 8, 2014), https://www.bmeia.gv.at/fileadmin/user_upload/
Zentrale/Aussenpolitik/Abruestung/HINW14/HINW14_Austrian_
Pledge.pdf.
INTRODUCTION 15
8. Andrey Baklitskiy, “The 2015 NPT Review Conference and the Future of the
Nonproliferation Regime,” Arms Control Today (Arms Control Association,
July 2015), https://www.armscontrol.org/ACT/2015_0708/Features/
The-2015-NPT-Review-Conference-and-the-Future-of-The-Nonproliferation-
Regime.
9. William C. Potter, “Disarmament Diplomacy and the Nuclear Ban Treaty,”
Survival: Global Politics and Strategy 59, no. 4 (July 17, 2017): 75.
10. “Taking Forward Multilateral Nuclear Disarmament Negotiations: Note
by the Secretary General” (United Nations, September 1, 2016), 19,
http://undocs.org/A/71/371.
11. Scott Sagan and Benjamin Valentino, “The Nuclear Weapons Ban Treaty:
Opportunities Lost,” Bulletin of the Atomic Scientists, July 16, 2017, http://
thebulletin.org/nuclear-weapons-ban-treaty-opportunities-lost10955.
12. United States Mission to the United Nations Department of State., “Joint
Press Statement from the Permanent Representatives to the United
Nations of the United States, United Kingdom, and France Following the
Adoption of a Treaty Banning Nuclear Weapons,” July 7, 2017, https://
usun.state.gov/remarks/7892.
13. Sagan and Valentino, “The Nuclear Weapons Ban Treaty: Opportunities
Lost.”
14. Beatrice Fihn, “Stigmatize and Prohibit: New UN Talks on Nuclear Weapons
Start Today,” Huffington Post, February 21, 2016, http://www.huffington-
post.com/beatrice-fihn/stigmatize-and-prohibit-n_b_9287144.html.
15. Jon Wolfsthal, Mark Quint, and Jeffrey Lewis, “The US Trillion Dollar
Nuclear Triad” (Monterey, CA: James Martin Centre for Nonproliferation
Studies, January 7, 2014), 4–7.
16. Amy Woolf, “U.S. Strategic Nuclear Forces: Background, Developments,
and Issues” (Congressional Research Service, August 8, 2017), 16, 23,
https://fas.org/sgp/crs/nuke/RL33640.pdf.
17. Jeffrey Michaels and Heather Williams, “The Nuclear Education of Donald
J. Trump,” Contemporary Security Policy 38, no. 1 (January 2, 2017): 62.
18. Donald J. Trump, “Foreign Policy Speech - Video Recording,” YouTube,
April 27, 2016, https://www.youtube.com/watch?v=4Q_s6cXSv_8.
19. “Nuclear Posture Review Report” (Washington DC: United States
Department of Defense, April 6, 2010), 30, https://www.defense.gov/
Portals/1/features/defenseReviews/NPR/2010_Nuclear_Posture_
Review_Report.pdf.
20. Hans Kristensen and Robert Norris, “Russian Nuclear Forces, 2015,”
Bulletin of the Atomic Scientists 71, no. 3 (May 1, 2015): 1.
21. Franz-Stefan Gady, “Putin’s ‘Red October’: Russia’s Deadliest New
Submarine,” The Diplomat, March 4, 2015, http://thediplomat.com/
2015/03/putins-red-october-russias-deadliest-new-submarine/.
16 W. Q. BOWEN ET AL.
22. Keir A. Lieber and Daryl G. Press, “The End of MAD? The Nuclear
Dimension of U.S. Primacy,” International Security 30, no. 4 (2006):
7–34; Fiona S. Cunningham and M. Taylor Fravel, “Assuring Assured
Retaliation: China’s Nuclear Posture and US-China Strategic Stability,”
International Security 40, no. 2 (2015): 8.
23. Cunningham and Taylor Fravel, “Assuring Assured Retaliation: China’s
Nuclear Posture and US-China Strategic Stability,” 8.
24. Kristensen and Norris, “Russian Nuclear Forces, 2015,” 86.
25. Véronique Guillermard, “Dissuasion Nucléaire: La France Ne Baisse Pas
La Garde,” Le Figaro, February 20, 2015, sec. Policy, http://www.lefi-
garo.fr/politique/2015/02/19/01002-20150219ARTFIG00420-dis-
suasion-la-france-ne-baisse-pas-la-garde.php.
26. Bruno Tertrais, “Deterrence According to Francois Hollande” (Fondation
pour la Recherche Stratégique, June 1, 2015), 1, https://www.frstrategie.
org/publications/notes/web/documents/2015/201510.pdf.
27. Ibid., 2.
28. Tom Waldwyn notes that ‘Trident renewal’ refers to three separate but
closely related issues: “the replacement of the Vanguard-class SSBN, the
eventual replacement of the Trident II missile and the replacement of the
UK’s present stock of warheads. The immediate focus is on replacing the
four Vanguard-class boats with a new class of SSBNs”. See Tom Waldwyn,
“Renewing Trident: Facts Concerning the Future of the UK’s Submarine-
Based Nuclear Capability,” IISS, May 5, 2015, http://www.iiss.org/en/
militarybalanceblog/blogsections/2015-090c/may-b1c8/european-
defence-bcf2.
29. Foreign and Commonwealth Office Ministry of Defence, “The Future of
the United Kingdom’s Nuclear Deterrent,” December 2006, 7, https://
www.gov.uk/government/publications/the-future-of-the-united-kingdoms-
nuclear-deterrent-defence-white-paper-2006-cm-6994.
30. Waldwyn, “Renewing Trident: Facts Concerning the Future of the UK’s
Submarine-Based Nuclear Capability.”
31. Hans Kristensen and Robert Norris, “Chinese Nuclear Forces, 2015,”
Bulletin of the Atomic Scientists 71, no. 4 (2015): 77.
32. Ibid., 81–82.
33. Cunningham and Taylor Fravel, “Assuring Assured Retaliation: China’s
Nuclear Posture and US-China Strategic Stability,” 9.
34. “What Lurks Beneath,” The Economist, February 6, 2016, https://www.
economist.com/news/asia/21690107-nuclear-arms-race-sea-what-lurks-
beneath.
35. Toby Dalton and Michael Krepon, “A Normal Nuclear Pakistan” (Stimson
Center and Carnegie Endowment for International Peace, 2015), 3,
http://carnegieendowment.org/2015/08/27/normal-nuclear-pakistan-
pub-61043.
INTRODUCTION 17
President Reagan used the phrase to highlight the robust nature of the
verification measures agreed under the treaty, described as “the most
extensive system if weapons inspection ever negotiated by two countries”.4
Yet even as he emphasised the intrusive nature of the verification process,
Reagan was aware of its limits: “President Reagan said in his pushing the
INF Treaty that no verification was possible completely…The military
under President Reagan said the INF Treaty was verifiable to the extent
that they could not do anything that would materially alter the military
balance”.5 In other words, verification could bring a degree of assurance,
but not a guarantee of certainty.
If verification is generally challenging in any security context, it is par-
ticularly demanding in the nuclear disarmament context, where nuclear
weapons and related facilities rank among a state’s most sensitive assets.
There are myriad influencing factors overlaying technical processes in this
area. These issues will be discussed in greater detail in the following chap-
ters, but chief among them is the extent to which national security consid-
erations prohibit the provision of information or evidence relevant to the
verification process to those charged with its conduct. More than this, any
potential disarmament verification regime must navigate the double bind
of national security considerations and the obligation for NPT member
states to avoid spreading proliferation sensitive information.
Against this background, it is perhaps not surprising that verification
can never be perfect or absolute. Rather, as in the case of Reagan and the
INF, it is a case of degrees of certainty, or, put another way, how much
uncertainty is acceptable. Requirements in this regard will typically be sub-
ject to cost-benefit calculations and may vary considerably between differ-
ent types of agreements, depending on both the significance of what is
being verified, the nature of the verification process envisaged, and the
relationship (past and present) between the parties involved. Before
engaging with verification at the conceptual level and in the particular
context of nuclear warhead dismantlement, however, it is first necessary to
consider how this concept has featured in broader efforts to control, limit
and reduce nuclear weapons relevant materials, systems and numbers since
the beginning of the nuclear age. Developments in verification thinking
and practice span several decades, and there is much to be learned from
the experience. This chapter will thus provide a brief historical overview of
significant bilateral and multilateral verification activities. The goal here is
to understand the evolution of verification as a broader practice and gener-
ate insights into the shape and requirements of future verification regimes
22 W. Q. BOWEN ET AL.
for nuclear disarmament, as well as the key factors that will influence their
effectiveness.
The chapter begins by considering the control of atomic energy and the
safeguards system managed and implemented by the International Atomic
Energy Agency (IAEA). Although focused on monitoring and safeguard-
ing civil nuclear activities, the safeguards system that underpins the
Agency’s approach arguably represents the most intrusive form of multi-
lateral verification employed in the nuclear arena to date, as well as being
the only one that accounts directly for the quantity and quality of the
nuclear materials held by state parties to the Treaty on the Non-
Proliferation of Nuclear Weapons (NPT). The safeguards system that is at
the heart of the non-proliferation regime has also encountered and adapted
to a number of serious proliferation challenges, such as the Iraqi nuclear
challenge, and these tests of the system offer additional insights. The chap-
ter will then explore verification in the context of nuclear testing, initially
at the state level through national technical means and later through mul-
tilateral structures such as the CTBTO. The chapter concludes with a dis-
cussion of verification as it relates to bilateral arms control between the
United States and Russia as they have sought to reduce numbers of deliv-
ery vehicles and launchers capable of supporting nuclear weapons. The
exploration of different nuclear verification systems will identify common
themes, such as onsite access, which will be explore in more detail in the
specific context of nuclear warhead disarmament in the next chapter.
between what were designated the Nuclear Weapon States (NWS) and the
Non-Nuclear Weapon States (NNWS). Essentially, the five NWS agreed
to refrain from transferring nuclear weapons know-how or direct assis-
tance to other states, while pursuing negotiations towards nuclear disar-
mament. In return, the NNWS agreed to refrain from the pursuit of
nuclear weapons and accept IAEA-administered safeguards on their civil
nuclear activities. These ‘full-scope’ or comprehensive safeguards were
designed to verify that all source and fissionable material in a given state
were used for peaceful purposes only. Consequently, they were, and con-
tinue to be, applied to all nuclear facilities in a country, not just the item
specific agreements for nuclear materials or technology transferred under
bilateral agreements.
the NPT until 1992 and a number of developing nuclear countries from
regions marked by regional rivalry remained non-signatories. On the
whole, however, the trend towards expansion continued in the 1980s and
1990s as the Cold War ended and relations between former rivals improved.
By 1995 NPT membership was close to universal and its original 25-year
duration was extended indefinitely. On one hand this represented signifi-
cant progress in efforts to limit proliferation. As the non-proliferation
regime gained momentum, the constraints on proliferation – normative
and other – also gained force and the dire predictions of President Kennedy
lost weight. On the other hand, the non-proliferation enterprise did not
progress unchallenged. The proliferation-related activities of a number of
states such as Iraq and North Korea called into question the effectiveness
of the IAEA’s safeguards system and posed a threat to the NPT more
broadly.
A state party to the NPT since 1969, Iraq had contemplated a ‘nuclear
weapons option’ since the early 1970s.24 It was Iraq’s purchase of the
French-built Osirak reactor in 1976 that first aroused initial international
suspicions, largely due to its size, which was deemed unsuitable for power
generation or research, but sufficient to produce weapons-significant
quantities of plutonium. This led to a heated debate within the interna-
tional community as to whether IAEA safeguards, in place at the Osirak
reactor, would be capable of detecting the diversion of significant quanti-
ties of plutonium. Israel, convinced that such an undetected diversion was
both possible and likely, took matters beyond the diplomatic arena and
destroyed the reactor by means of an air strike in June 1981.25 At the time,
the reactor was in the final stages of construction. Rather than put an end
to Iraq’s nuclear weapons ambitions, however, this setback reinforced
Baghdad’s desire to acquire the bomb and prompted Saddam Hussein to
initiate a covert programme that took the country to the ‘threshold of a
nuclear weapons capability’ by 1991.26
In order to minimise the risk of detection, Iraqi efforts focused on the
production of highly enriched uranium (HEU) through the indigenous
development of enrichment technology, procurement of unsafeguarded
uranium and experiments related to weaponisation. While eventually
uncovered by the WMD disarmament regime put in place following Iraq’s
defeat in the Gulf War, these activities progressed undetected by IAEA
safeguards for almost a decade. This case illustrates a fundamental limita-
tion of safeguards at that time: their limits in detecting undeclared activi-
ties. With routine inspections restricted to pre-agreed sections of declared
28 W. Q. BOWEN ET AL.
nuclear facilities, there was little chance of the IAEA discovering Iraq’s
clandestine weapons activities, as these took place at either secret nuclear
sites or within areas of declared facilities to which the IAEA did not have
access. In principle, the IAEA could have asked to conduct ‘special inspec-
tions’, which would have provided inspectors with access to additional
areas of declared sites. Such measures had never been employed, however,
and the IAEA was discouraged from invoking these inspections by mem-
ber states as they were deemed politically sensitive.27 The case of Iraq also
served to highlight safeguards weaknesses regarding information provi-
sion, with states only required to declare information on new nuclear facil-
ities “as early as possible” before nuclear material was introduced.28 This
later allowed Iraq to argue that it was not at fault for failing to declare its
enrichment activities, as they did not involve significant amounts of nuclear
material.29
Drawing on the experience of Iraq, the IAEA performed better in
detecting North Korean nuclear weapons activities. It took Pyongyang
more than six years to conclude a Comprehensive Safeguards Agreement
(CSA) with the IAEA after it had signed up to the NPT in 1985. This
despite pressure from the Soviet Union, a long-time supporter of North
Korea’s nuclear programme. And when the CSA was signed, North
Korea’s declaration contained a number of ‘surprises’, with Pyongyang
declaring a previously unknown small operating Magnox reactor, two
much larger Magnox reactors under construction and a reprocessing
plant.30 Built indigenously, these reactors were of a similar design to those
that had been used by the United Kingdom to produce plutonium for its
nuclear weapons programme.
Initial IAEA analysis, which included the forensic examination of pluto-
nium samples provided by North Korea cast doubt on its declaration. In
particular, its claim that spent fuel from its Magnox reactor had been
reprocessed just once lacked credibility. Rather, the evidence suggested
that there had been several reprocessing campaigns, implying that North
Korea had separated more plutonium than it had reported. Satellite imag-
ery, provided by the United States, showed what appeared to be two cam-
ouflaged nuclear facilities, not present within North Korea’s declaration.
To try and resolve these discrepancies, a special inspection that would
authorise the IAEA to visit the undeclared facilities was requested by the
IAEA. This was rejected by North Korea and Pyongyang responded by
threatening to withdraw from the NPT. Tensions escalated as sanctions
proposed by the United States were countered by the threat of war.
VERIFICATION IN THE NUCLEAR ARENA: NATURE, SIGNIFICANCE… 29
Although this crisis was diffused through high-level talks, North Korea
would later go on to develop and test its first nuclear device in 2006, pro-
duced with the undeclared separated plutonium from its Magnox
reactor.
The proliferation challenges posed by the cases of Iraq and North Korea
prompted a comprehensive review of the safeguards system in the early
1990s. It had become clear that it was essential for the IAEA to be able to
verify not just the ‘correctness’, but also the ‘completeness’ of a state’s
safeguard declaration. In order to achieve this, the IAEA would need to
increase the intrusiveness and broaden the scope of its verification efforts
so it could actively look for undeclared nuclear activities. Consequently,
new measures related to information provision, access and the use of tech-
nical tools were codified in the Additional Protocol (AP), which was intro-
duced in 1997.
Under this more robust standard, participating states are required to
provide information on past, present and future activities, across the entire
nuclear fuel cycle, including research and development. With the North
Korean case demonstrating the utility of information obtained through
national technical means (NTM), member states were also encouraged to
provide the IAEA with intelligence of relevance to the proliferation activi-
ties of other countries. Inspector access was no longer limited to previ-
ously agreed ‘strategic points’, but was instead expanded to cover any part
of a nuclear facility. The prospect of inspections at short notice was also
introduced, where requests for access were to be granted in as little as two
hours. The IAEA Secretariat was also now encouraged to make full use of
its right to conduct special inspections. Finally, a number of new technical
tools were added to the repertoire of inspectors, including the use of envi-
ronmental sampling that could be used to obtain additional information
on the isotopic and chemical properties of materials, making it harder for
unauthorised activities to go undetected.
If South Korea and Egypt illustrate the challenges that arise when assess-
ments regarding compliance are clouded by the subtleties of context and
the problems of determining intent in the event of small-scale misdemean-
ours, the case of Iran demonstrates a much more complex web of prob-
lems. Indeed, there is arguably no better case for illustrating the scope of
potential challenges that may be encountered when attempting to verify
nuclear activities. In 2002, revelations regarding undeclared nuclear facili-
ties thrust Iran’s nuclear programme into the international spotlight and
prompted an IAEA investigation into claims that Tehran had engaged in
illicit nuclear activities. Iran was referred to the UN Security Council in
early 2006 and was subsequently subject to six UNSC Resolutions relating
to its nuclear activities.40 In 2011, the IAEA published a report setting out
evidence relating to the military dimensions of Iran’s nuclear programme.
It was only in 2013, after more than a decade of political and diplomatic
wrangling, and in the context of an oppressive sanctions regime, that Iran
agreed the Joint Plan of Action (JPOA) with the P5+1, a step that ulti-
mately led to the Joint Comprehensive Plan of Action (JCPOA) that set
out the terms for significant rollback of Iran’s nuclear programme.
The challenges posed by Iran’s nuclear activities from a verification per-
spective were twofold. First, from the point at which Iran’s undeclared
nuclear activities were made public in 2002, the IAEA was engaged in a
constant effort to elicit information from Tehran regarding various aspects
of its nuclear programme. Yet sufficient information was not forthcoming
and when the Agency first found Iran in non-compliance with its Safeguards
Agreement in 2005, the accumulated concerns of the IAEA Board of
Governors were expressed in a resolution that called on Iran “To imple-
ment transparency measures…which extend beyond the formal require-
ments of the Safeguards Agreement and Additional Protocol, and include
VERIFICATION IN THE NUCLEAR ARENA: NATURE, SIGNIFICANCE… 33
intelligence’ from several states that indicated that Iran had performed
research and development work of relevance to nuclear weapons, the
Agency struggled to engage Iran on these issues.44 Despite sustained inter-
national pressure, Iran repeatedly turned down requests for access to facil-
ities such as the Parchin military complex where these activities are believed
to have taken place. Tehran dismissed allegations of weaponisation-related
research as fabricated and also referred to national security concerns and
the need to protect classified information on its own conventional weap-
ons programme as reasons for restricting IAEA access to sites of concern.
Only recently have the IAEA and Iran begun the process of resolving
suspected weaponisation activities. The Iranian case also demonstrates
how verification becomes an increasingly difficult task the longer a case of
possible non-compliance endures. Over the past 15 years, the IAEA has
produced hundreds of technical reports, conducted countless interviews
with Iranian scientists and other experts and collected gigabytes of techni-
cal verification data in different formats and from multiple nuclear sites.45
The sheer volume and diversity of this information makes noncompliance
assessments ever more complex, leaving greater scope for interpretative
differences.
did not cover underground testing, the most challenging area for verifica-
tion. This removed a considerable element of contention and the United
States, Soviet Union and United Kingdom went on to negotiate the
Limited Test Ban Treaty (LTBT), which entered into force in October
1963 and banned nuclear weapons tests in the atmosphere, outer space
and underwater. Verification was not explicitly outlined within the treaty,
but the three environments were chosen so that existing national technical
means would be capable of detecting violations. In the case of the United
States its Atomic Detection System made use of ground-based sensors
capable of detecting seismic, acoustic and electromagnetic signals, com-
plemented by satellite systems that could detect the distinctive double-
flashes of nuclear detonations.50
the detection limit was set relatively high. For example, SS-20 missiles
were set at 50 items, which could have carried a maximum of 150
warheads.70
Under the INF Treaty, national technical means were combined with
the use of onsite inspections, necessary to verify relatively small missile
components, with different modes of inspection agreed for every step of
the dismantlement process. Baseline inspections were performed to verify
declared inventories, followed by inspections to observe the elimination
process and its termination.71 Once completed, there was continuous por-
tal monitoring of the perimeter of the facility, which included the X-raying
of exiting vehicles. This helped ensure that if missiles had escaped the
dismantlement process they could not be transported offsite. There were
also short-notice inspections that could be triggered at any point, with
inspectors authorised to use measurement devices, radiation detectors and
cameras to check for undeclared activities. Under this regime hundreds of
inspections were carried out at facilities across many countries.
Notes
1. Robert Jervis, “Cooperation Under the Security Dilemma,” World Politics
30, no. 2 (1978): 167–214.
2. Barton Swaim, “‘Trust, but Verify’: An Untrustworthy Political Phrase,”
Washington Post, March 11, 2016, https://www.washingtonpost.com/
opinions/trust-but-verify-an-untrustworthy-political-phrase/2016/
03/11/da32fb08-db3b-11e5-891a-4ed04f4213e8_story.html.
3. ‘Verification’ in Collins English Dictionary
4. David Shipler, “The Summit - Reagan and Gorbachev Sign Missile Treaty
and Vow to Work for Greater Reductions,” New York Times, December 9,
1987, http://www.nytimes.com/1987/12/09/world/summit-reagan-
gorbachev-sign-missile-treaty-vow-work-for-greater-reductions.html?page
wanted=all&mcubz=3.
5. Government Publishing Office, “Congressional Record - Senate,” October
12, 1999, https://www.gpo.gov/fdsys/pkg/CRECB-1999-pt17/pdf/
CRECB-1999-pt17-issue-1999-10-12.pdf.
6. The White House, “Declaration on the Atomic Bomb by President
Truman and Prime Ministers Attlee and Kind,” November 15, 1945,
http://www.nuclearfiles.org/menu/key-issues/nuclear-energy/history/
dec-truma-atlee-king_1945-11-15.htm.
7. Ibid.
8. James Tape and Joseph Pilat, “Nuclear Safeguards and the Security of
Nuclear Materials,” in Nuclear Safeguards, Security, and Nonproliferation:
Achieving Security with Technology and Policy, ed. James E. Doyle
(Burlington, MA: Butterworth-Heinemann, 2008), 19.
9. 86th Congress, “Hearing Before the Subcommittee on Agreements for
Cooperation of the Joint Committee on Atomic Energy Congress of the
United States,” June 30, 1959.
10. “The Statute of the IAEA,” Text, Approved 23 October 1956, Entered into
Force 19 July 1957, (June 2, 2014), https://www.iaea.org/about/
statute.
11. Ibid.
12. Stephen Gorove, “Inspection and Control in EURATOM,” The Bulletin of
the Atomic Scientists 23, no. 3 (1967): 42.
13. Ibid.
14. Harald Müller, “The Evolution of Verification: Lessons from the Past for
the Present,” Arms Control 14, no. 3 (1993): 334.
15. John F. Kennedy, News Conference in Washington DC, 21 March 1963.
16. IAEA, “IAEA Safeguards Glossary,” International Nuclear Verification
Series No. 3 (Vienna, 2002).
17. Ibid., 23.
46 W. Q. BOWEN ET AL.
18. Ibid.
19. Thomas B. Cochran and Christopher E. Paine, The Amount of Plutonium
and Highly-Enriched Uranium Needed for Pure Fission Nuclear Weapons
(Washington DC: National Resources Defense Council, 1994), 3.
20. C.F. Norman et al., “The Importance of Correctness: The Role of Nuclear
Material Accountancy and Nuclear Material Analysis in the State Evaluation
Process,” IAEA Safeguards Symposium, (2010).
21. Gallagher, The Politics of Verification, 148.
22. Pierre Goldschmidt, “The IAEA Safeguards System Moves into the 21st
Century,” Supplement to the IAEA Bulletin 41, no. 4 (December 1999):
S-3.
23. Leonard Weiss, “The Nuclear Nonproliferation Treaty: Strengths and
Gaps,” in Fighting Proliferation: New Concerns for the Nineties, by Henry
Sokolski (Maxwell Air Force Base, Air University Press, 1996).
24. Malfrid Braut-Hegghammer, “Revisiting Osirak: Preventive Attacks and
Nuclear Proliferation Risks,” International Security 36, no. 1 (2011): 105.
25. Shai Feldman, “The Bombing of Osirak Revisited,” International Security
7, no. 2 (1992): 114–42.
26. Malfrid Braut-Hegghammer, “Revisiting Osirak: Preventive Attacks and
Nuclear Proliferation Risks,” International Security 36, no. 1 (2011): 130.
27. Wolfgang Fischer and Gotthard Stein, “On-Site Inspections: Experiences
from Nuclear Safeguarding,” Disarmament Forum 3 (1999): 49.
28. IAEA, “The Structure and Content of Agreements Between the Agency
and States Required in Connection with the Treaty on the Non-
Proliferation of Nuclear Weapons,” June 1, 1972.
29. IAEA General Conference, “Iraq’s Non-Compliance with Its Safeguards
Obligations,” September 16, 1991, 37, 41.
30. David Fischer, “The DPRK’s Violation of Its NPT Safeguards Agreement
with the IAEA Excerpt from ‘History of the International Atomic Energy
Agency’” (IAEA, 1997), https://www.iaea.org/sites/default/files/dprk.
pdf.
31. John Carlson, “Defining Compliance: NPT Safeguards Agreement,” Arms
Control Association, May 8, 2009, https://www.armscontrol.org/
act/2009_5/Carlson. The 2001 edition of the IAEA Safeguards Glossary,
does define “non-compliance” as “a violation by a State of a safeguards agree-
ment with the IAEA” and gives several examples of how this could occur.
However, this document is aimed at improving international understanding
of safeguards and has no legal status. IAEA Safeguards Glossary, IAEA, 2002,
www-pub.iaea.org/books/IAEABooks/6570/IAEA-Safeguards-Glossary.
32. William Tobey, “A Message from Tripoli: How Libya Gave up Its WMD,”
Bulletin of the Atomic Scientists, December 3, 2014, http://thebulletin.
org/message-tripoli-how-libya-gave-its-wmd7834.
VERIFICATION IN THE NUCLEAR ARENA: NATURE, SIGNIFICANCE… 47
51. Edward Ifft, “The Threshold Test Ban Treaty,” Arms Control Today 23,
no. 3–4 (March 4, 2009): 385–96.
52. Ibid.
53. Gallagher, The Politics of Verification, 159.
54. First Committee, “Comprehensive Nuclear Test Ban Treaty” (United
Nations General Assembly, December 6, 1993), 4, https://www.ctbto.
org/the-treaty/.
55. Martin B. Kalinowski, “Comprehensive Nuclear Test Ban Treaty
Verification,” in Verifying Treaty Compliance: Limiting Weapons of Mass
Destruction and Monitoring Kyoto Protocol Provisions, by Rudolph
Avenhaus et al. (Berlin: Springer, 2006), 135–52.
56. Gallagher, The Politics of Verification, 159.
57. “Comprehensive Nuclear Test-Ban Treaty” (Preparatory Commission for
the Comprehensive Nuclear-Test-Ban Treaty Organization, 1996), 35,
https://www.ctbto.org/fileadmin/content/treaty/treaty_text.pdf.
58. Kalinowski, “Comprehensive Nuclear Test Ban Treaty Verification,” 140.
59. “Integrated Field Exercise 2014: CTBTO Preparatory Commission,”
Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty
Organization, November 3, 2014, https://www.ctbto.org/specials/
integrated-field-exercise-2014/.
60. CTBTO, “Largest-Ever CTBT on-Site Inspection Exercise Concludes
Successfully,” CTBTO Preparatory Commission, accessed August 29, 2017,
https://www.ctbto.org/press-centre/press-releases/2014/largest-ever-
ctbt-on-site-inspection-exercise-concludes-successfully/.
61. Robert Norris and Hans Kristensen, “Global Nuclear Weapons Inventories,
1945–2010,” Bulletin of the Atomic Scientists 66, no. 4 (2010): 77–83.
62. Lawrence Freedman, “A New Theory for Nuclear Disarmament,” Bulletin
of the Atomic Scientists 65, no. 4 (2009): 14–30.
63. Mark Lowenthal and Joel Wit, “Politics, Verification and Arms Control,”
The Washington Quarterly 7, no. 3 (1984): 114–25.
64. Bureau of International Security and Nonproliferation, “Interim
Agreement Between the United States of American and the Union of
Soviet Socialist Republics on Certain Measures with Respect to the
Limitation of Strategic Offensive Arms,” May 26, 1972, https://www.
state.gov/t/isn/4795.htm.
65. Joseph S. Nye, “Nuclear Learning and U.S.-Soviet Security Regimes,”
International Organisations 41 (1987): 395.
66. Lowenthal and Wit, “Politics, Verification and Arms Control,” 119.
67. Amy F. Woolf, Mary Beth Nikitin, and Paul K. Kerr, “Arms Control and
Nonproliferation: A Catalog of Treaties and Agreements,” Report
(Congressional Research Service, February 2, 2010), 7, https://digital.
library.unt.edu/ark:/67531/metadc85466/.
VERIFICATION IN THE NUCLEAR ARENA: NATURE, SIGNIFICANCE… 49
68. Harald Müller, “The Evolution of Verification: Lessons from the Past for
the Present,” Arms Control 14, no. 3 (n.d.): 341.
69. Perkovich and Acton, “Abolishing Nuclear Weapons,” 50.
70. Perkovich and Acton, “Abolishing Nuclear Weapons.”
71. Müller, “The Evolution of Verification: Lessons from the Past for the
Present,” n.d., 341.
72. Ibid., 342.
73. National Research Council, Monitoring Nuclear Weapons and Nuclear-
Explosive Materials: An Assessment of Methods and Capabilities (National
Academy of Sciences, 2005), 62, https://www.nap.edu/catalog/11265/
monitoring-nuclear-weapons-and-nuclear-explosive-materials-an-assess-
ment-of.
74. Amy F. Woolf, “Nuclear Arms Control: The Strategic Offensive Reductions
Treaty” (Congressional Research Service, February 7, 2011), 14–15.
75. “The Value of New Start Verification,” Arms Control Association 1, no. 9
(July 21, 2010): 1–4; Bureau of International Security and Nonproliferation,
“Interim Agreement Between the United States of American and the
Union of Soviet Socialist Republics on Certain Measures with Respect to
the Limitation of Strategic Offensive Arms.”
76. Woolf, “Nuclear Arms Control,” 18.
77. Ibid., 19.
78. Ibid., 20.
79. Freedman, “A New Theory for Nuclear Disarmament.”
80. Perkovich and Acton, “Abolishing Nuclear Weapons,” 61–64.
81. Ibid., 70.
CHAPTER 3
The previous chapter explored some of the ways that the idea of verifica-
tion has found expression in the nuclear arena. From the complexities of
IAEA safeguards, to the challenges associated with bilateral and interna-
tional treaties, this brief and eclectic overview of verification-related initia-
tives provided an insight into the evolution of the concept and its
application. Of particular interest here is the fact that the scope of nuclear
verification activities carried out under bilateral and international treaties
to date has been limited to civil materials and facilities, delivery vehicles for
nuclear weapons and the remote identification of nuclear tests. The New
START Treaty provided inspectors with “the opportunity to confirm that
the actual number of warheads emplaced on a designated missile matches
the declared figure at the pre-inspection briefing”, but this did not go
beyond visual confirmation.1
Nuclear warheads and their components, including weapons-grade fis-
sile material, have so far been excluded from such agreements. Clearly, if
nuclear disarmament were to be achieved, this situation would have to
change. Indeed, the very idea of disarmament is inextricably linked to the
potential for relevant actors to effectively verify the dismantlement of
nuclear warheads. This was highlighted in the last review cycle of the NPT,
where the UK government emphasised that ‘developing and agreeing
effective measures for verifying the dismantlement of nuclear warheads
will be an important precondition for fulfilling the goals of Article VI of
the NPT.’2
Of course, the United States and Russia are not the only states to have
carried out research into disarmament verification. In 2000, the United
Kingdom initiated its own unilateral disarmament verification programme,
with a focus on the challenges of authenticating warheads and their com-
ponents. Here too, researchers sought to explore the full range of verifica-
tion measures that could be applied to the disassembly process.10 The
United Kingdom has also sought to innovate in verification research. In
the mid-2000s, following the failure of the 2005 NPT Review Conference
to reach consensus, work began to develop a partnership between the
United Kingdom and Norway. The UK-Norway Initiative (UKNI) was
unique in that it brought together, for the first time, a NWS and a NNWS
in a collaborative effort to probe various technical and procedural chal-
lenges relating to disarmament verification.11
Elsewhere, China has also been active in this space, claiming to have
been carrying out research into authentication and chain of custody tech-
nologies regarding nuclear dismantlement for some time.12 Outside of the
government sector research has been carried out by academic and non-
governmental organisations (NGOs), with a focus on new innovative
technologies that might support future verification efforts.
Drawing on some of the research stemming from these various initia-
tives, this chapter provides an overview of the key considerations that must
be taken into account when designing and planning for the implementa-
tion of a future verification regime for nuclear warhead dismantlement.13
While it draws on the history of disarmament verification, it does not seek
to provide a detailed historical account. Cliff, Elbahtimy and Persbo have
published a comprehensive account to which we could add little.14 Rather,
it focuses on identifying the key challenges involved in verifying nuclear
warhead dismantlement, before discussing how different verification
approaches and technologies could be used to mitigate them. In doing so,
it provides important context for the design of the simulation that under-
pins this study and is outlined in Chapter 5.
Starting with a discussion of the dismantlement process, the chapter
examines the life cycle of nuclear warheads and the key steps involved in
their retirement. This is followed by consideration of the complex chal-
lenges associated with verifying nuclear warhead dismantlement, with a
focus on how to balance the risk of undetected cheating with the duty to
prevent the transfer of classified information. This issue, in particular, has
been at the crux of dismantlement verification research since its inception.
It is not a tension unique to nuclear warheads and can be found in other
54 W. Q. BOWEN ET AL.
arsenals. This means that detection goals can be set at relatively high levels,
typically tens of nuclear weapons, a target that could be achieved with rela-
tively un-intrusive verification procedures. However, when it comes to
monitoring nuclear warhead dismantlement, a step that is usually thought
of as happening at low numbers of nuclear weapons, it is clear that more
intrusive measures would need to be employed as the diversion of a single
weapon could prove strategically significant. Linking back to the previous
chapter, it is likely that the verification requirement for this system would
be more akin to IAEA safeguards measures, where detection goals are set
to correspond to the minimum amount of nuclear material that could be
converted into a single nuclear weapon.
at the highest. However, these results should be caveated by the fact that
there was no attempt “to hide or conceal classified information associated
with the test weapons”, for example, through the covering of sensitive
components.41 It was also noted in the report that “much of the classified
information exposed [through visual inspections] could be protected by
[a] redesign of facilities and equipment”.42 The facilities used in the Field
Tests were not just dedicated to dismantlement but also served a variety of
other nuclear weapons related purposes. In terms of distinguishing real
warheads from dummies this was achieved approximately 50 per cent of the
time at the lowest access level, rising to 80 per cent at the highest level of
access.43 However, detecting the diversion of nuclear material during the
dismantlement process proved to be more challenging, with evasion efforts
only uncovered approximately 4 per cent of the time. It is worth noting on
this point that the authors of the final report on the Field Tests suggested
that even this relatively small risk of getting caught might still provide an
effective deterrent against cheating. The risk could be further reduced
through the addition of continuous perimeter portal monitoring (PPM).
This was used in the START and INF treaties at missile production plants,
where vehicles leaving a facility were searched to ensure they did not include
a treaty limited missile.44 In the context of nuclear warhead dismantlement,
such a system would need to be highly intrusive, able to detect small
amounts of nuclear material and components leaving the facility.
On the whole, then, the managed access approach that would certainly
form part of a dismantlement verification regime poses opportunities and
challenges in equal measure. The design process for a dismantlement
regime would undoubtedly benefit from the considerable body of existing
knowledge and experience in the broader area.
Given that a key component in all nuclear warheads is the fissile mate-
rial, authentication efforts to date have tended to focus on verifying the
presence or absence of weapons grade HEU or plutonium. There are
three general ways to confirm the presence of fissile materials. The first is
through passive detection, where the radiation emitted by fissile material
undergoing natural radioactive decay is measured. The second and third
approaches utilise active detection techniques, where fissile materials are
bombarded with either X-rays or neutrons. X-rays can identify the charac-
teristic high-density of fissile materials, while neutrons will induce fission
events, which, in turn, will emit radiation.46
In the weapons context, it is far simpler and safer to employ passive
detection as this mitigates the risk that the introduction of additional neu-
trons could trigger a chain reaction, potentially detonating the nuclear
weapon under inspection. However, while the presence of fissile materials
can be confirmed by the detection of naturally emitted radiation, this is
not sufficient to confirm the identity of a nuclear warhead. Other additional
signatures would need to be collected in order to distinguish materials
used in warheads from those used for other purposes. These might include
information on the composition and mass of the fissile material, the com-
bination of which could be used to form a distinctive ‘fingerprint’ for each
type of warhead.47 Yet these properties, which vary across different weapon
types, are considered highly classified information that cannot be directly
shared.48 Consequently it is necessary to employ an indirect form of detec-
tion, which can determine the presence of weapons-grade nuclear material
while at the same not reveal sensitive information on its key properties.
Efforts to this end have focused on the development of so-called ‘informa-
tion barriers’ – technology that essentially places an information filter
between the physical process of detection and its output.49
Broadly speaking, information barrier technology has taken two dis-
tinct developmental paths. The first path seeks to capture a specific and
limited amount of information that can then be compared to a pre-agreed
‘template’ of the warhead under inspection. This relies on involved parties
agreeing on a set of key technical attributes that are representative of the
nuclear weapons in question. As an example, for the Tri-lateral Initiative
of the late 1990s involving the IAEA, the United States and Russia, these
attributes constituted the presence of nuclear material with a weight above
a minimum mass threshold and an isotopic composition within a specified
range.50 The information barrier was then designed to measure whether a
warhead met these criteria, with its output delivered as a simple yes or no
NUCLEAR WARHEAD DISMANTLEMENT VERIFICATION: OPPORTUNITIES… 63
Who, then has final responsibility for the information barrier? It is likely
that any NWS hosting an inspection would “insist that they must be able
to manufacture [and retain oversight of] any authentication equipment to
be used on their warheads”.55 Consider if inspectors were permitted to
manufacture their own information barriers. The host country would have
to ensure that the devices were not capable of gathering or transmitting
any data beyond that agreed between host and inspector. Yet allowing the
host to retain full responsibility for the information barrier would simply
present the inspection team with another version of the same problem.
These problems continue to occupy the minds of verification researchers,
but there are already a number of relatively straightforward approaches to
dealing with these challenges. In the Tri-lateral Initiative, multiple copies
of key equipment were produced, samples of which (randomly selected)
could be taken away and examined by each side to check for tampering.56
Other copies would remain at the facility for use in the dismantlement
process.
The information barrier, then, goes a considerable distance in address-
ing some of the core challenges arising from the sensitive nature of the
information at the heart of the nuclear weapons enterprise.
Ensuring Chain-of-Custody
Any effective regime for verifying the dismantlement of nuclear warheads
would rest on two main pillars: warhead authentication and chain of cus-
tody. Comprehensive and effective verification would depend first and
foremost on the ability to confirm the identity of the nuclear warheads to
be dismantled. Yet as the discussion above indicates, this seemingly
straightforward task raises a host of challenges. The identity of the
warhead(s) confirmed, the focus of the verification process would then
shift to ensuring the chain of custody, namely that the warhead(s) were
successfully dismantled without the fissile materials or components being
diverted at any stage. In this context, nuclear warheads and their
components would have to be fully monitored and overseen by the
inspecting party all the way through to final disposition in order to guar-
antee no unauthorised interference. Yet it is here that the problem arises
since, as discussed previously, it is unlikely that inspectors will be able to be
present during the performance of certain key dismantlement steps, such
as the removal and handling of the physics package. It is also important to
NUCLEAR WARHEAD DISMANTLEMENT VERIFICATION: OPPORTUNITIES… 65
recognise that the entire disarmament process would likely take weeks or
months to complete, with days of activity separated by periods of storage
and, potentially, the movement of materials between dismantlement facili-
ties. The cost and time demands of this prolonged dismantlement sched-
ule would have an important bearing on the extent to which inspectors
could remain in-country.
In order to help ensure chain-of-custody under these conditions, exist-
ing verification regimes employ a sophisticated system of tags, seals and
remote monitoring. These techniques have been used most notably in
support of IAEA safeguards to provide assurances against diversion. As
discussed in the previous chapter, tags are used as part of IAEA Safeguard
inspections to uniquely identify particular objects and allow these to be
tracked over a prolonged period of time and, if necessary, in different loca-
tions. These are frequently used in combination with seals designed to
deter and detect unauthorised access or tampering with items or equip-
ment. Similar devices could be applied to the containers that house the
warheads, its components and the various rooms in the facility where dis-
mantlement activities take place. As the warhead or its components enter
or leave a facility, or indeed specific area, tags and seals can be checked to
confirm the identity and integrity of the various items. The reliability of
these measures depends in large part on their resilience to removal or tam-
pering without detection. Newer generations of tags and seals include fea-
tures capable of automatically detecting efforts to circumvent their
function and may even incorporate camera surveillance systems so any
changes can be reported in real-time.
Crucially, there is a track record of efforts to adapt these tools for the
disarmament verification context in anticipation of future arms control
agreements. In 1999, for example, Los Alamos National Laboratory
(LANL) developed an ‘Integrated Facility Monitoring System’ to demon-
strate how chain of custody could work in a nuclear dismantlement pro-
cess. This system monitored warheads from the point of authentication till
disposition and storage.57 A key part of this process was the use of inte-
grated tamper indicating devices (ITID) – a combination of seals, infrared
tags and video cameras – that were applied to warhead containers and
components. This system had the benefit of providing “uninterrupted
surveillance of the sealed container, as opposed to periodic checks of seal
integrity”.58
66 W. Q. BOWEN ET AL.
would not be present during certain sensitive operations, such as the sepa-
ration of the physics package, but would apply tags and seals to help ensure
chain of custody for the warhead and its components. Information barrier
measurements would be used to authenticate the warhead and compo-
nents when dismantled, complemented by a system of portal perimeter
control.62 Agreed verification measures and detail on how they would be
applied were encapsulated in a monitoring agreement, approved by both
sides. This took into account the design of the dismantlement facility and
potential health and safety concerns that might arise during the planned
inspection.
The monitoring visit during which the ‘nuclear warhead’ was disman-
tled took place in June 2009. Given the broader cooperative context in
which this took place, it was decided that the host team would make no
attempt to deceive or cheat and that they would actively respond to all
reasonable requests from the inspection team. This approach reflected the
desire to explore the practicalities of verifying nuclear warhead dismantle-
ment in a realistic environment, as opposed to probing potential diversion
pathways and associated complexities. The dismantlement process took
place over several days after which the inspection team was able to declare
“with a high degree of confidence” that the nuclear weapon had been
disassembled without material or components being diverted.63
This was a notable result in itself, yet it was the interaction between
both sides during the exercise that yielded a number of particularly inter-
esting and original insights. Firstly, the researchers found that a “proactive
host helps facilitate the process and increase inspector confidence”, imply-
ing that the attitudes and behaviour of the host party can influence verifi-
cation judgements.64 Although it should be noted that this was not
presented as a straightforward, linear process. There were frequent “heated
debates” between the two sides, resulting from the host’s “very restricted
approach” to access.65 Although ultimately resolved, this demonstrates the
likely conflicts that could occur when operating under managed access
conditions. Another important observation was that “health and safety
considerations dictated some host responses to inspector requests”, served
to further restrict inspector access.66 Here it was noted that a malevolent
host might employ these tactics to open up diversion routes, highlighting
how health and safety issues could potentially reduce inspector confidence
if poorly managed.
A follow up exercise was undertaken in 2010 with the aim of exploring
the practicalities of verification in a high security environment. Here it was
NUCLEAR WARHEAD DISMANTLEMENT VERIFICATION: OPPORTUNITIES… 69
recognised that the security aspects of the previous exercises were only
“played lightly” and consequently, were not completely reflective of the
real nuclear warhead dismantlement facility.67 The 2010 exercise was held
in the UK within an Atomic Weapons Establishment site, with the two
countries switching roles and the Norwegian team taking on the role of
the inspectors. Run over three days, it focused on a familiarisation visit to
a nuclear warhead storage facility, during which the inspecting party tested
the application of different seals, for the purpose of informing future veri-
fication discussions. A similar backstory was used to the 2008–2009 exer-
cises, albeit with a couple of crucial differences. The host was told to place
a “heavy emphasis on security as a first priority” and be “reactive rather
than proactive” in response to inspector requests.68 While still cooperative,
this was something of a contrast with the collegial approach adopted pre-
viously and the safety and security protocols were deemed “more intrusive
than expected” by the inspectors, serving to significantly limit their time
and access within the facility.69 More broadly the relationship between the
parties was observed to be more “adversarial” in nature.70 These factors
clearly influenced judgements on the part of the inspectors, as although
the overall objectives were completed, the inspectors expressed “a low
level of confidence in the outputs from the visit”.71
Conclusion
This chapter has explored some of the key challenges that must be consid-
ered in the context of nuclear warhead dismantlement verification. At
stake here are a number of fundamental questions: What proliferation sen-
sitive information is at risk of release during the verification process? What
steps might be taken to offset these risks? How might participants in an
adversarial relationship seek to deceive the other side and either hide war-
heads or retain their key constituent components? Clearly, in the context
of a future disarmament regime at low numbers of nuclear weapons, the
diversion of a single warhead, a small amount of nuclear material or a par-
ticular component could amount to a militarily significant violation.
Alongside the challenges, we have also considered some of the
approaches that have been explored as part of the effort to address these
challenges. These include well-established methods, borrowed from other
verification systems such as managed access and the use of tags and seals to
ensure chain of custody, and perimeter portal monitoring to provide assur-
ance against diversion. They also include innovative tools and techniques
70 W. Q. BOWEN ET AL.
Notes
1. Rose Gottemoeller, “‘New START Verification’, Remarks Delivered at the
United States Institute of Peace” (Assistant Secretary, Bureau of
Verification, Compliance and Implementation, July 26, 2010), https://
2009-2017.state.gov/t/avc/rls/145126.htm.
2. “National Report Pursuant to Actions 5, 20, and 21 of the NPT Review
Conference Final Document, Presented to NPT Prepcom” (United
Kingdom, May 2014).
3. Atomic Energy Commission, “Project Cloud Gap and CG-34, Demonstrated
Destruction of Nuclear Weapons. Note by the Secretary,” April 12, 1967,
https://fas.org/nuke/guide/usa/cloudgap/aec-staff041267.pdf.
4. James Fuller, “Going to Zero: Verifying Nuclear Warhead Dismantlement,”
in Cultivating Confidence: Verification, Monitoring and Enforcement for a
World Free of Nuclear Weapons, by Corey Hinderstein (Stanford, CA:
Hoover Institution Press, 2010), 127.
5. NTI, “Demonstrated Destruction of Nuclear Weapons,” Field Test
Program: Final Report, Volume 1 (Nuclear Threat Initiative, January
1969), https://www.nti.org/media/pdfs/Cloud_Gap_Demonstrated_
Destruction_of_Nuclear_Weapons.pdf.
6. David Cliff, Hassan Elbahtimy, and Andreas Persbo, “Verifying Warhead
Dismantlement: Past, Present and Future,” Verification Research Reports
(London: VERTIC: East West Institute, 2010), 36, https://www.east-
west.ngo/idea/verifying-warhead-dismantlement-past-present-and-
future.
NUCLEAR WARHEAD DISMANTLEMENT VERIFICATION: OPPORTUNITIES… 71
23. Ibid.
24. Ibid.
25. Ibid., 18.
26. Ibid., 38.
27. The Department of Energy, “Transparency and Verification Options,” 29.
28. U.S. Congress Office of Technology Assessment, “Dismantling the Bomb
and Managing the Nuclear Materials,” 39.
29. The Department of Energy, “Transparency and Verification Options,” 6.
30. U.S. Congress Office of Technology Assessment, “Dismantling the Bomb
and Managing the Nuclear Materials,” 10–11.
31. Cliff, Elbahtimy, and Persbo, “Verifying Warhead Dismantlement: Past,
Present and Future,” 2010, 88.
32. Matthew Bunn and Scott Sagan, A Worst Practices Guide to Insider Threats:
Lessons from Past Mistakes (Cambridge, MA: American Academy of Arts
and Sciences, 2014).
33. Cliff, Elbahtimy, and Persbo, “Verifying Warhead Dismantlement: Past,
Present and Future,” 2010, 30.
34. NTI, “Demonstrated Destruction of Nuclear Weapons,” 76.
35. Onsite inspections were an issue of intense debate in the negotiation of
many early arms control treaties, with the United States and the Soviet
Union frequently adopting opposing and incompatible positions due to
issues that included distrust and broader politics. For a discussion of the
politics and verification during the Cold War see Lowenthal and Wit,
“Politics, Verification and Arms Control”; Nancy Gallagher, “The Politics
of Verification: Why ‘how Much?’ Is Not Enough,” Contemporary Security
Policy 18, no. 2 (1997): 138–70.
36. Müller, “The Evolution of Verification: Lessons from the Past for the
Present,” 1993, 340.
37. Ibid., 349.
38. Ibid.
39. Jonathan B. Tucker, “Viewpoint: Verifying a Multilateral Ban on Nuclear
Weapons: Lessons from the CWC,” The Nonproliferation Review 5 (1998):
87.
40. NTI, “Demonstrated Destruction of Nuclear Weapons,” 43.
41. Ibid., 76.
42. Ibid., 105.
43. Ibid., 87.
44. Cliff, Elbahtimy, and Persbo, “Verifying Warhead Dismantlement: Past,
Present and Future,” 2010, 87.
45. Ibid., 33.
46. Steve Fetter et al., “Detecting Nuclear Warheads,” Science and Global
Security 1, no. 3–4 (1990): 226.
NUCLEAR WARHEAD DISMANTLEMENT VERIFICATION: OPPORTUNITIES… 73
The previous chapters set out a concise history of verification, both in the
broad area of arms control and non-proliferation, and in the specific con-
text of nuclear warhead dismantlement. This overview demonstrated that
verification has, for many years now, been a highly active area of research,
development and application. Insights were also provided into the innova-
tive ways in which the scientific community has sought to harness techno-
logical advances to address the challenges around authentication in nuclear
warhead dismantlement. From engineering to informatics, approaches
here draw from a range of scientific disciplines. Yet, significant as these
advances are, their scope remains limited, as they have only sought to
address technical aspects of verification challenges.
It has long been accepted that 100 per cent certainty is not possible in
the implementation of any verification system. This is particularly true for
warhead dismantlement because of the secrecy that necessarily surrounds
all aspects of the development, possession and protection of nuclear weap-
ons. As discussed in the previous chapter, alongside obvious national secu-
rity concerns, Articles I and II of the Treaty on the Non-Proliferation of
Nuclear Weapons (NPT) also prohibit, among other things, the transfer of
proliferation sensitive information. This limits verification intrusiveness,
inevitably resulting in possible verification outcomes, which are framed by
a significant degree of uncertainty. For those charged with the act of veri-
fying dismantlement, there can be no absolute truth. Verification out-
The two sides in this hypothetical struggle have been dubbed “realists”
(including nearly all working scientists), who uphold the objectivity and
progressive nature of scientific knowledge, and “relativists” (nearly all
housed in faculties of the humanities and social sciences within our universi-
ties), who recognize the culturally embedded status of all claims for univer-
sal factuality and who regard science as just one system of belief among
many alternatives, all worthy of equal weight because the very concept of
“scientific truth” can only represent a social construction invented by scien-
tists (whether consciously or not) as a device to justify their hegemony over
the study of nature.3
For the realists here, objectivity is equated with “fairness and impartiality.
Someone who ‘isn’t objective’ has allowed prejudice or self-interest to
distort a judgment”.4 In this context, the pursuit of objectivity has led
scientists and technicians to place their faith in numbers, in what Porter
terms the “quantification of the modern world”.5 This reliance on num-
bers is understandable as, among other things, quantitative approaches
provide for a replicable research process and a clear, relatively straightfor-
ward means of evaluation. Yet this Manichaean opposition is reductive, for
as ecologist Edward Rykiel notes, “there is a continuum between the arti-
ficially dichotomized aspects of science: objective versus subjective, value
free versus value laden, neutral versus advocatory”.6 The lines of distinction
here are blurred; while scientists and engineers may struggle against sub-
jectivity, they cannot eliminate it entirely. The processes and outcomes of
technical endeavours can never completely withstand the weight of subjec-
tive interpretation particularly when a set problem requires interaction
with other human beings and achieving 100 per cent certainty is not pos-
sible by applying purely technical means. Clearly, a more holistic under-
standing of any process of scientific inquiry and its conclusions demands
that we consider, to the extent possible, the nature and influence of the
human factor.
In the field of verification for arms control and non-proliferation pur-
poses, two terms with particular relevance to the human factor pervade
discussion and debate: trust and confidence. Indeed, much of the litera-
ture in this area is devoted to considering the barriers to trust between
THE HUMAN SIDE OF VERIFICATION: TRUST AND CONFIDENCE 79
states and their leaders, and how these might be overcome through
confidence-building measures in service of agreements to limit the spread
of arms or promote disarmament or reductions. These terms feature
prominently in rhetoric related to the state-level politics and policy deci-
sions that frame verification in the context of arms control and non-
proliferation. Yet confidence and trust also hold great relevance for our
efforts to understand the operational mechanics of verification and how
the human factor impacts on processes and outcomes at the working level.
Simply put, these terms relate directly to the point of intersection between
perception and evidence at the heart of our study. They encapsulate the
enduring tension that characterizes the experience of those involved in
monitoring and inspection activities related to verification: the need to
balance the certainties of evidence against the interpretative possibilities
that present themselves in its absence. It is our contention that it is this
interplay between trust and confidence in the judgment-forming process
of inspectors on the ground that constitutes the essence of the human ele-
ment of verification. To understand this perspective, however, it is neces-
sary to consider the nature of trust and confidence. What do these terms
signify? And how should they be viewed in relation to each other? It is
only by answering these questions that we can begin to fully understand
their explanatory value in this area.
not clearly delineated also leaves room for indiscriminate use and confu-
sion. In short, confidence and trust are ‘essentially contested concepts’.9
In practice, this is certainly true for their use in the arms control and
non-proliferation context. In both the academic and policy arenas, it is
common to hear trust and confidence used interchangeably in discourse
on verification. At the least, the terms are used alongside each other with-
out any effort to discriminate or distinguish between them. This is under-
standable since both terms relate to the broader effort to ascertain
compliance and, beyond this, intentions, but this linguistic fluidity
undoubtedly obscures some of the conceptual nuances at stake.
Furthermore, the confusion is compounded by what Barber describes as
the assumption that, “the meaning of trust, and of its many synonyms, is
so well known that it can be left undefined or to contextual implica-
tions”.10 Yet failure to adequately define and map the nature of these con-
cepts is problematic in an area already suffering from considerable
uncertainty due to problems regarding authentication and gaps in the evi-
dentiary chain. We will argue below that trust may be distinguished from
confidence in a number of ways, and this has important implications for
the study and practice of verification.
At the most basic level, trust and confidence share common ground in
the sense that they both constitute essential elements in the social interac-
tions that take place between actors in various settings. In her work on the
subject, Carol Heimer takes as her starting point the inescapable fact that
“social interaction is risky, and people have ample cause to be uncertain
about each other’s intentions”.11 Trust and confidence provide social
actors with ways to cope with and reduce the uncertainty that frames these
encounters. Put another way, their practice serves to “reduce complexity”
in social systems.12 The concepts also overlap with regard to expectations
regarding behaviour and intentions. To be more precise, Niklas Luhmann
argues that both concepts “refer to expectations which may lapse into
disappointments”.13 Yet this fundamental issue of expectations is also
where trust and confidence begin to diverge.
Consider the following example of a worker who has driven to his place
of employment every weekday in the same well-serviced car for a signifi-
cant length of time. On any given workday, the individual in question is
confident that his car will be fit for purpose and that he will successfully
undertake the journey. Certainly, he cannot rule out the possibility of a
rare and unexpected issue affecting the car’s ability to run, yet a consider-
able body of relevant knowledge – the car’s service history, his own com-
THE HUMAN SIDE OF VERIFICATION: TRUST AND CONFIDENCE 81
are the key components of trust? How do they relate to each other? Our
objective here is to provide a conceptually robust means of shedding addi-
tional light on the nature and drivers of verification outcomes.
ture on trust argues that it is, at least in part, dependent upon an individ-
ual’s ‘disposition to trust’ […] This has also been referred to as one’s
capacity or propensity to trust […] or social or generalised trust”.24
The second approach is a dyadic (interpersonal) one, according to
which “trust is a psychological state or orientation of an actor (the truster)
toward a specific partner (the trustee) with whom the actor is in some way
interdependent (that is, the truster needs the trustee’s cooperation to
attain valued outcomes or resources)”.25 Notable early advocates of this
approach were John Holmes and John Rempel, who drew on the ideas of
interdependence theory to inform their study of trust in close relation-
ships such as marriage.26 This interpersonal approach was also adopted in
broader social psychological studies that operationalised trust as “cooper-
ating behaviour in settings such as the ‘prisoner’s dilemma’ or conflict
situations […], or discover trust as a taken-for-granted condition for stable
interaction”.27 The work of Morton Deutsch on conflict resolution in par-
ticular set the scene for much of the research in this area.28 Crucially, this
perspective holds that responsibility for the relationship is shared and the
construction of trust depends on the interaction between parties.
While much of the debate around trust has taken place within psychology
broadly defined, other disciplines have also sought to situate trust within their
conceptual boundaries. The work of Roderick Kramer, for example, explores
the role played by trust in “intra-organisational cooperation, coordination,
and control”, while Roger Mayer, James Davis and David Schoorman have
sought to develop an integrative “model of dyadic trust in an organizational
context”.29 These efforts to probe the concept of trust in an organisational
behaviour context are informative, not least since they seek to learn from
trust-related theoretical developments across multiple disciplines. Sociologists
have also sought to take ownership of the concept. Lewis and Weigert, for
example, build on the work of Durkheim, Simmel and Parsons in arguing
that, “trust is an essential form of human sociation and its underlying reality
is irreducibly sociological”.30 According to this perspective, “trust is concep-
tualized as a reciprocal orientation and interpretive assumption that is shared,
has the social relationship itself as the object, and is symbolized through
intentional action”.31 The approach here attaches considerable significance to
the social system and associated norms within which interaction between par-
ties takes place. Context, in other words, assumes a dominant role. This aligns
with Hardin’s view that trust should be conceptualized as a “three-part rela-
tion involving properties of a truster, attributes of a trustee, and a specific
context or domain over which trust is conferred”.32
THE HUMAN SIDE OF VERIFICATION: TRUST AND CONFIDENCE 85
the perceived lower probability of the occurrence of the event and also by the
difference in the anticipated ratio of positive to negative emotional conse-
quence”.40 In this context, “risk-taking and trusting behaviour are […] really
different sides of the same coin”, a distinction that makes all the difference in
terms of the ability to develop trust within relationships.41 While the notion
of risk-taking as understood by Deutsch would likely be incomprehensible to
those involved in sensitive relationships where the stakes are high, the idea of
trust as a process of small, incremental and cautious steps towards bridging a
gap in evidence, based on mutual vulnerability and a relatively low probabil-
ity of negative outcomes, is perhaps more palatable.
This discussion is particularly apt in the verification context where the
inevitable limits of evidence mean that vulnerability and risk are unavoid-
able. In the verification of nuclear warhead dismantlement, there is also
ample opportunity and possible incentives for deception. This situation is
compounded by the fact that relationships in this sphere may be adver-
sarial, even if a verification process has been freely and mutually agreed by
involved parties. Trust takes a relationship beyond the limits of confidence
and helps to fill the space where evidence is lacking or ambiguous. Yet the
potential negative consequences of trusting behaviour are significant.
From the verification of Iran’s nuclear rollback to the possibility of nuclear
disarmament on the part of a nuclear weapon state, the success or failure
of verification efforts can potentially have a powerful impact on national
interests and strategic stability more broadly.
The gravity of the issue does not change the nature of the requirements
for trust, it simply augments their significance and means that acceptable
levels of vulnerability and risk must be carefully weighed in verification
considerations. What, then, brings people to the point at which they are
prepared to take risks and make themselves vulnerable in a relationship,
particularly one that is so technically-oriented as those found in the verifi-
cation context? In terms of our own research into the verification of
nuclear warhead dismantlement at the level of the facility, we contend that
there are a number of important questions that must be kept in mind:
• What is the nature of the vulnerability and risk to which the trustor
is exposed?
• To what extent can the risk posed to the trustor be quantified?
• What are the implications of deception, disappointment or loss, both
in the short- and longer-term?
• How and to what extent can the vulnerability of both parties be off-
set or mitigated?
88 W. Q. BOWEN ET AL.
With regard to integrity, Hon and Grunig describe this as “the belief
that a person or organization is fair and just”.45 In other words, there is an
assumption that the party to be trusted will act reasonably, responsibly and
with sincerity. In the verification context, integrity might be considered as
the perception on the part of the inspectors that the host party is guided
by the principle that warhead dismantlement has been politically man-
dated and must therefore be implemented.
While the importance of integrity is well established as a determinant of
trust in the academic literature, it is counter-balanced by the prospect of
deception.46 Recognising the tension between these positions, Mayer,
Davis and Schoorman seek to adjust for the possibility of “profit seeking”
in their approach: “the relationship between integrity and trust involves
the trustor’s perception that the trustee adheres to a set of principles that
the trustor finds acceptable”.47 This idea of acceptability is significant since
it “precludes the argument that a party who is committed solely to the
principle of profit seeking at all costs would be judged high in integrity
(unless this principle is acceptable to the trustor)”.48 It also provides a use-
ful link to the related issue of suspicion and the role of this psychological
state as both an impediment to trust and a restraining factor in the risk
assessment process (discussed earlier) that plays such an important role in
determining appropriate levels of vulnerability.
The possibility of deception undoubtedly features in the cognitive pro-
cess through which one individual or group bestows trust on another.
Crucially, however, it is the accompanying level of suspicion that has most
bearing on the relationship. Sophisticated deception in uncertain circum-
stances can fool the most perceptive minds, yet Steven Fein argues con-
vincingly that suspicion triggers “sophisticated attributional analyses” that
are “characterized by active, careful consideration of the potential motives
and causes that may influence people’s behaviours”.49 In other words, his
research evokes an image of “social perceivers as ‘intuitive scientists’
attempting to draw reasonable inferences about others’ trustworthiness
from available social data”.50 In this context, the behavioural signals pro-
jected by both parties play an important role in the development of trust.
This issue is discussed in more detail in the following section.
Finally, implicit in the expectation of favourable behaviour that is central
to the development of trust, is the presumption of technical competence. In
his work on the subject, Barber notes that, “in a society like ours, where
there is such an accumulation of knowledge and technical expertise, expec-
tations of trust in this sense are very common”.51 This is particularly true of
90 W. Q. BOWEN ET AL.
• What is the nature of these pivotal moments and can they be clearly
identified (i.e. Are they explicit or do they take a more subtle form?)
• How do information flows (speed of delivery, style of delivery,
responsiveness, etc) impact on the perceptions of either party?
• How are challenging situations resolved and what does the manner
of their resolution reveal about the relationship?
What is the nature of the What is the context framing How do parties to the
vulnerability and risk to the current interaction? relationship seek to
which the trustor is Have prior interactions communicate and project their
exposed? between the parties resulted intentions? How are these
in positive outcomes? interpreted by the other side?
To what extent can the What might be judged the Are there particular actions,
risk posed to the trustor reasonable limits of attitudes or statements that
be quantified? favourable behaviour on the prove decisive in the evolution
part of the trusted party? of trust in the relationship?
What are the implications Does the other party What is the nature of these
of deception, demonstrate technical pivotal moments and can they
disappointment or loss, competency? be clearly identified (i.e. Are
both in the short- and they explicit or do they take a
longer-term? more subtle form?)
How and to what extent How do the actions of the How do information flows
can the vulnerability of other party reflect on their (speed of delivery, style of
both parties be offset or perceived integrity? delivery, responsiveness, etc)
mitigated? impact on the perceptions of
either party?
To what extent does the How are challenging
other party appear situations resolved and what
committed to achieving the does the manner of their
agreed objectives? resolution reveal about the
relationship?
Are roles and responsibilities
carried out in an efficient
and effective manner?
94 W. Q. BOWEN ET AL.
Conclusion
This chapter has highlighted the need for a robust conceptual approach to
understanding the nature and impact of the human element to disarmament
verification. This process is most often considered in terms of the associated
technical challenges, yet it is our contention that the perceptions, assump-
tions, values and biases held by key actors involved in the implementation of
verification procedures and protocols at ground level have the potential to
influence verification outcomes. In particular, we argue that the verification
process is marked by a constant tension between confidence, viewed as an
evidence-based judgement on the part of informed actors, and trust, thought
of as the perception of intentions in a situation where evidence is lacking. Of
these, trust is of most interest to us since it relates to the uncertain space
beyond evidentiary limits, where perceptions and subjective judgement have
the potential to assume disproportionate weight and influence.
Our discussion of trust underpins the conceptual framework that is at
the heart of the chapter. With this framework, we have sought to identify
the key components of trust and combine them into a robust conceptual
lens. Chapter 6, through this lens, will view and interpret the empirical
data. Ultimately, this trust-based conceptual approach will allow us to
explore the interactional dimension of verification practice in detail, with
a view to gauging how and to what extent the interactions between parties
influences the supposedly objective, evidence-based approach to the
inspections working in situ.
Notes
1. Canadian Government, “Verification in All Aspects: A Comprehensive
Study on Arms Control and Disarmament Verification Pursuant to UN
General Assembly Resolution 40/152(0),” April 1986, 15.
2. Wyn Q. Bowen and Andreas Persbo, “How Might States, or the
International Community, Go about Implementing the Dismantlement of
Nuclear Weapons Systems in an Accurate Way Which Would Engender
International Confidence?” (International Commission on Nuclear Non-
proliferation and Disarmament, February 2009), 1–18, https://studylib.
net/doc/8046435/paper---international-commission-on-nuclear-non.
3. Stephen J. Gould, “Deconstructing the ‘Science Wars’ by Reconstructing
an Old Mold,” Science 287, no. 5451 (2000): 253.
4. Theodore M. Porter, Trust in Numbers: The Pursuit of Objectivity in Science
and Public Life (Princeton: Princeton University Press, 1996), 4.
THE HUMAN SIDE OF VERIFICATION: TRUST AND CONFIDENCE 95
27. Lewis and Weigert, “Social Atomism, Holism, and Trust,” 456.
28. Morton Deutsch, The Resolution of Conflict (New Haven: Yale University
Press, 1973).
29. See Kramer, “Trust and Distrust in Organizations: Emerging Perspectives,
Enduring Questions,” 570; Roger C. Mayer, James. H Davis, and F. D.
Schoorman, “An Integrative Model of Organisational Trust,” Academy of
Management Review 20, no. 3 (1995): 729.
30. Lewis and Weigert, “Social Atomism, Holism, and Trust,” 456.
31. Ibid.
32. Kramer, “Trust and Distrust in Organizations: Emerging Perspectives,
Enduring Questions,” 574.
33. Niklas Luhmann, Trust and Power (New York: Wiley, 1979), 6.
34. Deutsch, “Trust and Suspicion,” 266.
35. Anette Baier, “Trust and Antitrust,” Ethics 96, no. 2 (1986): 235.
36. Denise M. Rousseau et al., “Not So Different After All: A Cross-Discipline
View of Trust,” Academy of Management Review 23, no. 3 (1998):
393–404.
37. Nicholas J. Wheeler, “Beyond Waltz’s Nuclear World: More Trust May Be
Better,” International Relations 23, no. 3 (2009): 437.
38. On the importance of mutual vulnerability in the development of trust see
Baier, “Trust and Antitrust.”
39. J. Mark Weber, Deepak Malhotra, and J. Keith Murnighan, “Normal Acts
of Irrational Trust: Motivated Attributions and the Trust Development
Process,” Research in Organisational Behaviour 26 (2005): 76.
40. Deutsch, “Trust and Suspicion,” 266.
41. Ibid.
42. Barber, The Logic and Limits of Trust, 9.
43. T. K. Das and Bing-Sheng Teng, “The Risk-Based View of Trust: A
Conceptual Framework,” Journal of Business and Psychology 19, no. 1
(2004): 98.
44. Ibid., 716.
45. Linda C. Hon and James E. Grunig, Guidelines for Measuring Relationships
in Public Relations (Gainesville: Institute for Public Relations, 1999), 3.
46. Studies highlighting the importance of integrity include Jethro
K. Liebermann, The Litigious Society (New York: Basic Books, 1981); John
K. Butler and Stephen Cantrell, “A Behavioural Decision Theory Approach
to Modeling Dyadic Trust in Superiors and Subordinates,” Psychological
Reports 55, no. 1 (1984): 19–28; Sim B. Sitkin and Nancy L. Roth,
“Explaining the Limited Effectiveness of Legalistic ‘Remedies’ for Trust/
Distrust,” Organisational Science 4, no. 3 (1993): 367–92; Amos
S. Engelbrecht, Gardielle Heine, and Bright Mahembe, “The Influence of
Integrity and Ethical Leadership on Trust in the Leader,” Management
Dynamics 24, no. 1 (2015): 2–10.
THE HUMAN SIDE OF VERIFICATION: TRUST AND CONFIDENCE 97
The preceding chapters have had three principal objectives. First, to delve
into the history of verification in the nuclear arena with a view to provid-
ing the reader with a comprehensive understanding of the various chal-
lenges that have been encountered by researchers in this space, particularly
with regard to nuclear warhead dismantlement. In this complex area of
enquiry, some of these challenges have been overcome, while others, such
as the impossibility of 100 per cent certainty in verification outcomes, have
endured. Second, to highlight what we regard as a significant gap in veri-
fication research, namely the role and influence of human factors in what
is usually considered to be an objective, technical process. In our view, this
techno-centric view is reductive and limiting, and fails to adequately
account for the complexities and nuances of verification as practice. This
leads directly to our third objective: to adopt a multidisciplinary approach
to thinking about human factors relevant to the verification context, such
as trust and confidence, and develop a robust conceptual framework
within which these factors can be considered. These objectives achieved,
the remainder of the book is devoted to exploring the research findings
drawn from a two-year project designed to isolate for study, in so far is
possible, the human factors of verification.
Against this background, this chapter sets out the research approach
underpinning the study. It begins by outlining the rationale for adopting
a simulation-based approach, and considering the strengths and weak-
nesses of this particular method. Simulations allow for the construction of
Why Simulate?
Before discussing the benefits of a simulation-based approach to our
research, it is first necessary to define simulations and describe briefly what
they entail. For while this methodology has a long and diverse history that
spans a range of disciplinary boundaries, from security studies to aeronau-
tics, the term is a contested one whose meaning can vary according to
context. In the area of ‘wargaming’ or ‘conflict simulation’, for example,
the term ‘simulation’ is often used interchangeably with ‘game’. On the
surface, this might appear to be a relatively minor distinction, yet Philip
Sabin notes that it is a source of angst for some scholars who “prefer to
draw a sharp distinction between the two concepts, and to confine the
term ‘simulation’ to detailed self-contained systems that faithfully mimic
real processes without the need for human intervention”.1 This school of
thought sees ‘games’ as something entirely different, activities that are
“much more unpredictable and heuristic”.2 Yet this view is contested by
others who embrace the capriciousness and uncertainty that feature in
games as valuable qualities with much to add to the process. Consider the
following statement by Thomas Schelling:
For Schelling, there is immense value in uncertainty, since it can set the
ground for unanticipated discoveries and lead researchers or analysts in
unexpected and fruitful intellectual directions. Our understanding – and
the one that shaped our methodological approach – is more in line with
Sabin’s “hybrid concept” that bridges these two poles. Ultimately, our
approach here is guided by our fundamental objective of exploring human
decisions and the drivers behind them.4 And to this end, simulations hold
enormous potential.
Broadly speaking, simulations seek to create an “approximation for a
real-world situation” and allow involved parties to recreate some of the
challenges and complexities of real life in an artificial, controlled environ-
ment. Simulations have traditionally played an important role as a training
tool – Robert Axelrod gives the example of flight simulators used in the
training of pilots in noting that “many of the earliest and most successful
simulation systems were designed to train people by providing a reason-
ably accurate and dynamic interactive representation of a given environ-
ment”.5 Yet training is not the only use of simulations and in their work,
Starkey and Blake highlight the “shared research and public scholarship in
professional journals” that this approach also facilitates.6
From a research perspective, simulations can be used to understand
behaviour within complex systems. By creating a controlled and replica-
ble environment, the different factors at play can be unpacked and iso-
lated for observation and examination, creating new and rich data sets for
analysis.7 There are also many different forms of simulation, ranging from
“complex mathematical models to free-form verbal interchange”.8 And
as Starkey and Blake note, simulations can be very effective “as experi-
mental tools to allow researchers to develop and test theories of decision-
making and other processes”.9 Much like real life settings, simulations
force participants to take decisions in challenging situations where actions
are limited by certain constraints, such as incomplete information or time
pressures.
In our view, these various qualities make simulations an excellent means
of exploring the complex operational dynamics of nuclear warhead disar-
mament verification. Furthermore, a simulation-based approach is argu-
ably the most logical one in an area where the phenomenon exists only in
theory. In any case, simulating the verification of nuclear warhead dis-
mantlement provided us with a means of probing an intricate process
incorporating multiple parties with evolving dynamic strategies and rela-
tionships, and bound by overlapping legal, technical and political frame-
102 W. Q. BOWEN ET AL.
each stage of the design and implementation with a view to offsetting any
potential assumptions or biases on the part of the research team. Ultimately,
while recognising that simulations cannot necessarily “prove anything”, it
is our contention that a robust, realistic, tightly-controlled and compre-
hensive simulation at a working nuclear facility would nevertheless offer
valuable insights into the nature and influence of issues such as trust and
confidence on the practice of verification. It is also worth noting that while
the project was co-funded by the UK and Norwegian governments, the
project retained complete intellectual independence in terms of the analy-
sis stemming from the data collected across the multiple iterations of the
simulation.
break in the chain of custody that was the centre-piece of the simulation.
This narrative involved two fictional, nuclear-armed states, Westermark
and Registan, who had entered into a cooperative process of phased bilat-
eral reductions of nuclear weapons numbers. Following a period of nego-
tiation, a treaty was agreed whereby Westermark and Registan both
committed to dismantling 30 nuclear warheads – a militarily significant
number – in a verifiable way. In the scenario, the bilateral treaty was situ-
ated within the broader framework of the NPT and was presented by both
sides as an important step toward fulfilling their Article VI obligations.
The Treaty framing the scenario also noted the national security concerns
of the states concerned.
Under the terms of the fictional treaty a phased process was employed
whereby warheads were split into 5 batches of 6 warheads and dismantled
sequentially. At the point of the scenario, two batches of warheads had
been successfully dismantled as per the terms of the state-level agreement.
Dismantlement operations took place in declared facilities in each country,
with these facilities all housing a variety of nuclear weapons operations.
This aspect of dismantlement was particularly important as it was intended
to reflect the likely challenge of maintaining daily operations in a nuclear
weapons facility while accommodating an inspection team and the associ-
ated disruption.
The treaty stipulated that all fissile material derived from the dismantle-
ment process would ultimately be put into long-term monitored storage.
Under the verification regime, warheads earmarked for dismantlement
were tracked from military deployment through disassembly through to
the final storage of fissile material components. The regime covered mul-
tiple locations, facilities and processes in both of the treaty states. Although
the simulation itself was narrowly focused on a single incident involving a
break in the chain of custody, this background information was provided
to all participants.
In order to minimize the disruptive influence of contextual factors and
focus the attention of participants on operational issues, issues such as the
nature of the political and diplomatic relationship between the two states
were pre-determined by the control team and remained constant. The
relationship was portrayed as a positive one with a growing track record of
cooperation on key political and diplomatic issues, such as disarmament.
Beyond this background briefing, these higher level contextual issues were
excluded from the scenario so as to minimize their influence.
SIMULATING DISARMAMENT VERIFICATION: DESIGN AND METHODS 105
on-site access, under which the hosting party reserved the right to manage
or deny access to sites, facilities or other places under their jurisdiction in
order to protect national security interests or to prevent disclosure of sen-
sitive or classified information unrelated to the purpose of the visit.
Inspectors could also request access to any documentation they deem
relevant, but information was only released at the discretion of the host on
a case-by-case basis. Inspectors were escorted at all times on site and
expected to abide by escorting rules, including keeping any requests to
within the scope of the Treaty and discharging their mandate with the
least possible inconvenience to the host facility. In dismantlement related
areas, inspectors were required to abide by strict safety and security mea-
sures, including wearing special overalls and only using equipment
screened and approved by the host. Monitoring equipment, in particular,
was only permitted to be operated by representatives of the host facility
under the direction of inspectors, rather than the other way around. These
were just some of the measures designed to ensure a robust verification
protocol that adequately provided for the concerns and priorities of all
parties while at the same time facilitating progress of the verification
process
The device had a range of 0.5m but it was acknowledged that shielding
could decrease its detection range. The device was also influenced by back-
ground conditions. If background interference was too high, the detector
would emit three short bursts of sound, and display a red light. Auto-
calibration was performed using an internal reference source, when the
detector was first switched on.
It was made clear to participants from the outset that the monitor
would not provide for 100 per cent certainty, a situation deliberately cho-
sen during the research design to reflect the current state of development
in information barrier technology. Information barrier devices cannot cur-
rently establish the presence of treaty accountable items beyond doubt, as
other items could also potentially have sufficiently similar attributes to
trigger a positive reading. The device can therefore only conclusively
exclude the presence of items rather than unambiguously confirm their
presence. This aspect was incorporated into the simulation.
As mentioned above, the application of all monitoring equipment in
the facility was performed by the hosts under the instruction of the inspec-
tion team. This procedure also applied to the Attribute Monitor. This
aspect of the verification regime was designed to minimize direct inspector
contact with the warheads or their components. The Attribute Monitor
could also be used to collect readings in areas where warheads or their
components could potentially be hidden, thereby aiding the process of
assessing possible diversion routes. Other verification tools available to the
inspection team included internal and external CCTV, tamper indicating
seals, camera tags and satellite observation using national technical means
(NTM). Portal perimeter monitoring was employed to detect and deter
the potential removal of sensitive materials and components from the dis-
mantlement site.
Given the unusual nature of the event, the inspection team had to
negotiate with the host party over the nature and extent of access they
would be allowed to have at the facility, as well as considering the type of
information they would need to complete their mission. For its part,
authorities in Westermark had to assess all requests for information from
the inspection team, against both the desire to re-establish the chain of
custody and the need to protect sensitive information regarding their facil-
ities, activities, equipment and warheads.
Every effort was made to add to the realism of the endeavour, from the
simulation setting – a nuclear facility operated by IFE near Oslo in Norway,
to the health, safety, security and escorting regulations that mimicked
what would be expected in a nuclear weapons facility, to the shrouding of
equipment deemed sensitive in the context of the simulation. And while
simple substitutes were used for the attribute monitor, tags and seals, care
was taken to replicate the concept and methods of operation of these
tools. It should be noted that the entire process here benefited enormously
from the support and input of an advisory panel comprising experts from
IFE, the Norwegian Radiation Protection Authority (NRPA), and the UK
Atomic Weapons Establishment (AWE).
Each simulation began in the same way: with formal introductions and
briefings at the inspection team’s base for the three days, a dedicated
building situated just outside the security limits of the Westermark nuclear
facility. Inspectors were briefed on the specifics of the incident that trig-
gered the inspection, how it unfolded and the efforts that were taken to
investigate and resolve it. Westermark facility staff also used this opportu-
nity to brief the inspectors on the security, health and safety, and escorting
rules that would be implemented while on site.
In opening discussions regarding inspector access to the facility, repre-
sentatives of the Westermark facility proposed that inspectors simply visit
the storage room at issue where the TAIs were being stored. From the
Westermark perspective, the process at that point would be straightfor-
ward: the Registani team would inspect the contents of the room, examine
the CCTV system and footage, reapply broken seals to points of entry, and
depart the facility. It is worth noting here that the host party adopted a
co-operative, albeit conservative, approach to the verification mission
throughout the simulation. As expected, this opening gambit inevitably
fell short of the needs and expectations of the inspection team and was
rejected. This served as a useful point of departure and the inspectors were
immediately forced to engage with the complex issue of access and what
this might mean in terms of information, evidence and the potential for
diversion of TAIs. The simulation planned for negotiations from this point
onwards and in all iterations, inspection teams followed this path (although
at varying speeds and to different extents).
As the simulation progressed, the controlled host party demonstrated a
willingness to provide new evidence and concessions to support the
advancement of the verification effort, sometimes volunteering these prior
before any request was lodged by the inspectors. For example, the hosts
112 W. Q. BOWEN ET AL.
Participant Observation
Participant observation is “an intense social interaction between research-
ers and participants in the milieu of the latter, during which time data, in
the form of field notes, are unobtrusively and systematically collected”.15
Participant observation is particularly well suited to a study of trust, and
human factors more broadly, in the context of a verification simulation
because it allows for detached, first-hand observation of the reactions of
participants as they engage with the scenario and respond to develop-
ments that occur throughout the exercise. The researcher can thus gain a
comprehensive insight into the social and psychological dynamics at play
in the exercise. There were two main objectives to participant observation
in the context of our simulation. First, to observe participants’ behaviour
in order to gain direct insights into how levels of trust were influenced or
shaped, if at all, in response to specific events forming part of the scenario
(e.g. when information was provided prior to being requested, when there
was a delay in information provision, etc.). Second, to identify and record
key points in the simulation where behavioural change on the part of the
monitoring team was prompted by interaction with the facility host. At all
times during the simulation, at least one member of the research team,
and usually two members, were engaged in participant observation. Data
points of particular interest were further explored in the context of inter-
views and focus groups, discussed below.
Semi-structured Interviews
Semi-structured interviews constituted the third strand of data collection
while the simulations were running. A semi-structured interview is “a ver-
bal interchange where one person, the interviewer, attempts to elicit infor-
mation from another person by asking questions. Although the interviewer
prepares a list of pre-determined questions, semi-structured interviews
unfold in a conversational manner offering participants the chance to
SIMULATING DISARMAMENT VERIFICATION: DESIGN AND METHODS 115
explore issues they feel are important”.16 The value of these interviews lies
in the fact that they “offer a means of exploring the ways in which social
actors interpret the world, and their place within it. These interpretations
are often extremely complex and nuanced, and would be difficult to access
through other means”.17 Semi-structured interviews thus allowed the
research team to go beyond the information provided in SitReps and
through participant observation, and gain a more detailed and nuanced
understanding of participants’ perceptions and the factors influencing
their decision-making process.
The research team decided to conduct interviews at opportune
moments while the simulation was running in order to further probe
issues and developments identified as significant through participant
observation and the on-going review of SitReps. The interview process
was discreet and took place away from the simulation area so as not to
disrupt the flow of the game. The interview guide was also carefully
designed to avoid any questions that might be interpreted as loaded with
particular meaning and thereby inadvertently influencing the perceptions
of the interviewee and, beyond that, the broader simulation. During inter-
views, participants were encouraged to speak frankly both about their per-
ceptions of developments and decisions taken, both by individuals and by
the group as a whole. These semi-structured interviews provided the
research team with a wealth of data and insights, and a valuable means of
probing the nuances of particular issues arising as the simulation evolved.
Research Questionnaires
Upon completion of the simulation, participants were asked to complete
a research questionnaire. The questionnaire was a focused survey instru-
ment designed to capture the attitudes and opinions of each member of
the inspection team. Each participant was asked to answer a set of stan-
dardized questions regarding their perceptions of the scenario and devel-
opments therein. The questionnaire also sought to capture information
relating to the decision-making process, of both individuals and the group.
Some of the questions involved the respondents having to provide specific
information on their level of confidence at different times during the exer-
cise. Other questions were more open-ended and required greater
reflection.
Conducting the questionnaire immediately after the simulation while
participants were still fully immersed in the details of the scenario meant
116 W. Q. BOWEN ET AL.
that meant that the insights captured were fresh and comprehensive. The
timing of the questionnaire also provided the research team with time to
digest the key points raised. These were then integrated into the focus
group, conducted the following day, and explored further. It is worth not-
ing that questionnaires were completed anonymously and participants
were encouraged to give their personal account, even if this was different
from the collective view of their team.
Focus Groups
A focus group was involving research participants was conducted after the
simulation had been concluded and post-simulation questionnaires com-
pleted. Focus groups are ‘groups of individuals selected and assembled by
researchers to discuss and comment on, from personal experience, the
topic that is the subject of the research’.18 The aim here was to build upon
the data gathered using participant observation, the SitReps and the ques-
tionnaires by engaging the participants in a group discussion around the
question of confidence and how this increased and decreased during the
monitoring visit. It is worth noting that the research team introduced the
term ‘confidence’ to the discussion and explained the link to evidence that
this term implies. Any discussion of trust, and there was a considerable
amount, was initiated by the research subjects themselves. In any case, the
focus group provided an opportunity for the research team to drill down
on specific issues arising during the scenario. Questions were informed by
data collected through participant observation, interviews and the
questionnaires.
The benefit of the focus group approach lies in the fact that the shared
experience of the group allows for a collaborative approach which, in turn,
produces more information and data for the researcher. Instead of the
researcher asking each person to respond to a question in turn, “people
are encouraged to talk to one another: asking questions, exchanging anec-
dotes and commenting on each others’ experiences and points of view”.19
In the context of the verification exercise the focus group approach pro-
vided a valuable means of gauging participants’ responses to different fac-
tors, both as individuals and as a group.
Conclusion
This chapter provided background information on the design and implemen-
tation of the series of simulations that formed the cornerstone of the research.
The simulation design represented the key element of the preparatory work
underpinning the research, and unsurprisingly, required a considerable invest-
ment of time and resources. In this regard, the research team benefited greatly
from the support and expertise of colleagues at the IFE, the NRPA, and the
UK AWE. Work here also drew heavily on the considerable body of research
devoted to simulations and war-gaming. Our simulation does not make a
theoretical contribution to this literature, but it does reflect some of its most
celebrated insights. Ultimately, the detail provided in this chapter reflects the
importance that we attached to the construction of a simulation that would
immerse participants in a realistic and challenging environment, while at the
same time providing a vehicle for the research team to explore the complex
dynamics that surround the role and influence of human factors in dismantle-
ment verification. Simply put, the simulation-based approach offers a flexible
means of recreating real-life challenges and problems in an artificial environ-
ment that can, for the most part, be controlled and focused for study.
118 W. Q. BOWEN ET AL.
The chapter also set out the particulars of our methodological approach.
This is important since the success of our research relied on a robust data
collection architecture that was well-equipped to capture the full range of
participants’ attitudes, opinions and perceptions, and help explain how
these fed into the decision-making process. It is for this reason that we
adopted a comprehensive mixed methods approach that was qualitative in
nature. The research design prioritised depth and quality of data, and the
combination of methods chosen provided us with an extraordinarily rich
body of empirical data that served as a solid base for the subsequent
analysis.
What then, did the findings reveal? How did our hypotheses hold up
against the body of data collected? How useful was our conceptual frame-
work in helping to explain the role and influence of trust in the verification
process. These are some of the fundamental questions that will be
addressed in the following chapter.
Notes
1. Philip Sabin, Simulating War: Studying Conflict Through Simulation
Games (London: Continuum International, 2012), 5.
2. Ibid.
3. Thomas Schelling quoted in Shawn Burns, ed., The Wargamers’ Handbook
(Newport: Defense Automated Printing Office, 2013), 4, http://www.
professionalwargaming.co.uk/WarGamersHandbook.pdf.
4. For a detailed account of the simulation-based approach see Peter Perla,
The Art of Wargaming: A Guide for Professionals and Hobbyists (Annapolis,
MD: U.S. Naval Institute, 1990).
5. Robert Axelrod, “Advancing the Art of Simulation in the Social Sciences.
Obtaining, Analyzing and Sharing Results of Computer Models,”
Complexity 3, no. 2 (1997): 16.
6. Brigid A. Starkey and Elizabeth L. Blake, “Simulation in International
Relations Education,” Simulating and Gaming 32, no. 4 (December
2001): 537–38.
7. Nigel Gilbert and Klaus G. Troitzsch, Simulation for the Social Scientist
(Open University Press, 2005), 18–26.
8. Martin Shubik, “On the Scope of Gaming,” Journal of Management
Science 18, no. 5 (1972): 20.
9. Starkey and Blake, “Simulation in International Relations Education,”
537–38.
10. Robert C. Rubel, “The Epistemology of War Gaming,” Naval War College
Review 59, no. 2 (2006): 113–14.
SIMULATING DISARMAMENT VERIFICATION: DESIGN AND METHODS 119
Introduction
The previous chapter demonstrated that the development and conduct of
simulations is a well-established and valuable means of exploring the
nuances, possibilities and limits of contentious and potentially dangerous
issues and scenarios in a controlled environment. In the nuclear disarma-
ment and arms control arena, this approach was adopted at a relatively
early stage as part of research conducted by the US Arms Control and
Disarmament Agency (ACDA) in the 1960s.1 The proposed Field Tests to
explore verification inspection procedures were initially opposed by the
Atomic Energy Commission, but the simulation-based approach was ulti-
mately perceived to hold value and approved with a budget of some
900,000 USD.2
More recently, the UK-Norway Initiative (UKNI) adopted a simulation-
based approach as part of a collaborative effort to give new momentum to
thinking on disarmament verification. Studies have described how, from
2008 to 2010, the UKNI conducted a series of exercises “designed to
elucidate the technical and procedural issues surrounding managed access
of inspectors into highly sensitive facilities”.3 The procedural focus of the
UKNI simulations was clear and the exercises provided a unique opportu-
nity to probe the nature and limits of a mutually acceptable inspection
process. Yet the review process that accompanied the simulations also
revealed another, unanticipated dimension to the engagement between
the inspection team and the host team. Simply put, in a context where 100
per cent certainty was not possible and the potential for diversion or
deception remained present throughout, “‘Inspecting parties’ often
reported ‘a high level of confidence’ in achieving certain objectives”.4
More than this, the level of confidence was at times higher than might
have been expected, given the constraints placed by the host team on facil-
ity access and information.
This prompted a range of questions regarding the development of
‘confidence’ and the role of human factors in the verification process. Why
was confidence higher than expected at certain points? What were the
drivers at stake here? Clearly, there were human factors shaping the pro-
cess, but what was the nature and extent of this influence? Ultimately, it is
these questions that drove our empirical research. Chapter 4 explored the
human factor in detail, noting in particular the tension between confi-
dence and trust, and revealing the significance of these fluid concepts in
the verification context. More than this, it demonstrated that from an
analytical perspective, our attention should focus primarily on the influ-
ence of trust, defined as perceptions regarding intentions, on the evidence-
based judgements from which confidence is derived. For trust represents
the dynamic and uncertain space beyond pure evidence, where the nature
of the relationship and its performance can subtly impact upon verification
outcomes.
To this end, the chapter set out a conceptual framework within which
the role of trust in the human interactions that make up much of the prac-
tice of verification can be understood. Chapter 5 went on to provide the
details of a controlled verification simulation, carefully designed to isolate,
in so far as is possible, issues of trust and confidence for study. This exer-
cise allowed the research team to gain an in-depth insight into the dynamics
of trust in practice, and understand the various elements – from informa-
tion flows to behavioural cues – that contributed to the development or
erosion of trust.
This chapter sets out the findings of the research. The analysis applies
the conceptual framework developed in Chapter 4 to a significant body of
qualitative data gathered from approximately 50 research subjects over the
course of 6 simulations conducted over a two-year period. This provides
robust empirical grounding for our argument that the human factors
involved in the verification process, often ignored in a debate framed in
technical terms, must be given due consideration. Beyond this, however,
the chapter paints a nuanced picture of the interactional dimension that is
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 123
thing. From the minute we met the host team, I was trying to understand
them…we all were. It’s natural, isn’t it? You form opinions about people
and how they act and I was trying to understand the situation”.7
The approach of participants here resounds with the longstanding
efforts of social psychologists to understand the nature and influence of
the various factors that shape our perceptions of others, both as individuals
and in groups. As early as 1946, Solomon Asch noted “the remarkable
capacity we possess to understand something of the character of another
person, to form a conception of him as a human being” and sought to
determine “in what manner are these impressions established? Are there
lawful principles regulating their formation?”.8 This work laid the ground
for a significant body of research that has continued to gain momentum.9
Recent research by Fiske, Cuddy and Glick, for example, set out an
empirically based model identifying “warmth” and “competence” as uni-
versal dimensions of social cognition.10
This research in social psychology has primarily considered these issues
in the normal circumstances of everyday life. In the verification context,
however, the situation is further complicated by the artificial and heavily
controlled environment of the inspection, as well as the uncertainty that
surrounds the limits of the process and what may be permitted by the host
team. Clearly, the simulation set certain parameters with regard to TAIs
and the constraints posed by national security concerns, among other
things. Yet the research participants were generally aware that the pre-
agreed inspection protocol could not plan for every conceivable develop-
ment. There was inevitably room for discretion on the part of the host
team in terms of the lengths they went to satisfy the requirements and
requests of the inspectors. As one participant noted: “Part of the problem
is also that you don’t know if [the host team members] are being as coop-
erative as they can or not…you haven’t got a sense for the most part”.11
This meant that the inspection team was constantly probing the limits of
what was permissible within the broader parameters of the mutually agreed
protocol. Observation of group discussions confirmed this exploratory
and more flexible approach to ‘sounding out’ the host team.
This subtle process of cognitive engagement with the host team and the
broader environment within which the inspection was situated com-
menced before any substantive evidence pertaining to the inspection was
received. It is important to note that this was the first indication of the
influence of human factors and it formed an important element of the
broader evaluative approach of the research participants. Crucially, the
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 125
Quantifying Risk
It became evident to the research team early on that the nature of the
vulnerability posed by the inspection process – namely that the possibility
of material being diverted could never be fully eliminated – was clearly
understood by participants, and this understanding remained constant
throughout the simulation. In discussions observed by the research team,
the implications of their vulnerability weighed heavily on inspectors. Much
was felt to be at stake in the inspection process, not least because in the
context of the simulation, the outcome would ultimately contribute to
shaping political engagement between the two states involved.
At the same time, however, a number of participants noted the fact that
this was not a one-sided process and that the host team was also vulnerable
to an inspection report that returned a judgement of low confidence or no
compliance: “We would lose out if it turned out they diverted material,
but I think we need to remember that they face consequences if we don’t
think they are complying with the Treaty. They don’t hold all the cards
here”.12 The mutual vulnerability at the core of the relationship was thus
recognised as an issue of significance, framing the inspection from an early
stage. This point resounds with the idea of interdependence highlighted in
the trust framework set out in Chapter 4.
While the nature of the vulnerability was a clearly understood and ever-
present factor underpinning the engagement of inspectors with the simu-
lation, their perception of risk exposure was not at all static. In terms of
the tangible factors influencing perceptions on this front, two stand out:
access and information. As one participant put it: “The main issue that
influenced my confidence in host facility was accessibility to…information
and locations (all rooms in the facility)”.13 In terms of access, the ability to
view and take measurements in various parts of the facility was central to
the inspectors’ efforts to build a robust evidence base. The desire to
ground progress in evidence was palpable throughout: “We always were a
bit suspicious that the host team could fake information. So it was impor-
tant to gain knowledge on our own [through access]”.14
Yet here as well, the relationship with levels of confidence was not
straightforward. Certainly, increased access was likely to have a positive
126 W. Q. BOWEN ET AL.
I cannot prove 100 per cent that things, that warheads were not diverted
and material was not diverted. But at the same time all the story was falling
in place in a way that was…there were holes in the story, but […] they give
us more information than we expected, definitely. And when we were there
we could analyse everything. So, if we missed something, it was our fault.26
For the most part, differences were resolved through a process of data
fusion – “Our confidence judgment is a group average based on both
qualitative and quantitative measures” – and majority agreement. Yet the
often intense group discussions bore witness to the participants’ desire to
be as rigorous as possible in their approach, given the significance of what
was at stake.
While access and documentary evidence constituted the dominant fac-
tors influencing perceptions regarding vulnerability and risk, they were
certainly not the only ones. Other influencing factors included the manner
in which information was provided, the attitude of the host team, and the
perceived levels of competency and professionalism. Yet these are issues
that relate more to the intangible facet of the relationship between the
inspectors and the party being inspected. For this reason, we have chosen
to discuss them in the following sections pertaining to expectations of
positive behaviour and signalling. In this sense, the application of our con-
ceptual framework takes us progressively away from the more tangible and
fixed evidentiary factors influencing and towards more intangible ones
that are perhaps more fluid and open to interpretation, relating as they do
to the subjective subtleties of human behaviour.
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 129
influence was only marginally felt at the level of the individuals involved in
the simulation. In short, the macro-context had an influence on the micro-
context of the inspection, but the lack of continuity in terms of personnel
meant that this influence was far less significant than it might otherwise
have been. Clearly, this was an issue linked to the design of the simulation,
yet it provides a valuable insight into the significance of relational continu-
ity at the individual level in efforts to build trust in challenging
circumstances.
It is important to note that none of the perspectives discussed above
were fixed and immutable. In line with the earlier point regarding the
cognitive engagement of inspectors, the research team observed consider-
able changes in the perspectives of participants, primarily in response to
relevant and timely evidence provided by the host team, but also based on
evolving perceptions of issues such as integrity and technical competency
on the part of the host team.
I was trying to work out if the host team was genuine or not…were they
really just trying to get this sorted and move on? So I was paying a lot of
attention to how they were trying to help us in our work.33
The fact that the host team are highly-qualified experts is important. They
know what we need to complete the task, but they also know that we can’t
have all the evidence we need…They know where they have to draw the
line. But that doesn’t have to be a bad thing. They can help us come up with
solutions to problems. They understand what the issues are.39
With more willingness to move outside treaty limits and even advise on
how to proceed did increase the level of trust.40
On the one hand, technical competence gave legitimacy to the host team
in their role as custodians of the dismantlement process. On the other, it
equipped them to work alongside the inspection team and share the bur-
den of responsibility for resolving the break in the chain of custody. Once
again, this is linked to the idea of discretion and the extent to which the
host team were able and willing to apply their expert understanding, not
to mention their knowledge of the facility, in service of the verification
process. In more general terms, this situation speaks to the interdepen-
dence that we argue is a central element of trust with both parties invest-
ing in a joint, collaborative effort to achieve a particular set of objectives.
Finally, when considering participants’ views on integrity and technical
competence, it is worth noting that much of the discourse here was regu-
larly framed in terms of the ‘professionalism’ of the host team:
It went from ‘they’re trying to hide something’ to ‘they’re just being profes-
sional and going about their business’.41
If I had to describe [the host team] in one word…it would be
professional.42
In other words, the collection of actions and broader approach of the host
team created a general impression of a technically-proficient and commit-
ted workforce, acting in a manner that suggested they were keen to resolve
the anomaly in the chain of custody and return to regular duties. The
phrasing here is significant as it resounds with a considerable body of soci-
ological literature addressing professionalism, its importance as an influ-
encer of behaviour, and its relationship with issues such as competence and
trust. For example, Fournier places emphasis on this behavioural dimen-
sion to professionalism in her research: “Being a professional is not merely
about absorbing a body of scientific knowledge but is also about conduct-
ing and constituting oneself in an appropriate manner, a point long recog-
nised by symbolic interactionist studies of socialisation”.43
134 W. Q. BOWEN ET AL.
the host team’s behaviour and attitude. Beyond this, the relationship
unfolds as a complex web of interactions within which, each side is sensi-
tive to the most minute details that might serve as indicators of behaviour
or intentions.
In our verification simulation, we focused our analytical lens on the
perspective and interpretations of the inspectors. To this end, as described
in Chapter 5, we sought to control one side of the relationship between
host and inspectors. The mandate for the host team was carefully designed
to be cooperative, responsive, and at times proactive with regard to deal-
ing with the requests and concerns of the inspection team. In the event of
a conflict or unexpected query, the host team would adopt a conciliatory
approach, seeking to address the problem in an efficient and timely man-
ner. This outlook aligned with the backstory supporting the scenario and
the successful outcomes of prior verification inspections. This host team
position remained constant across all six exercises and allowed the research
team to identify a number of factors that were interpreted as important
signals by the inspectors. It is worth noting at this point that participants
across all six exercises regarded the actions of the host as deliberate and
carried out with full awareness of the likely consequences.
quality: “ultimately, it was more important how detailed and accurate the
information was”.45 Beyond this, the more formal, codified structure of this
information appeared to leave a strong impression on participants:
While primacy was given to written information and this did appear to exert
a meaningful influence on the perceptions of inspectors, it did not come
without problems. The potential for documents to be doctored or fabri-
cated by the host team was raised in group discussions several times – this
point links to the themes of vulnerability and risk mentioned earlier and had
a moderating effect on the more positive views expressed among partici-
pants. Furthermore, the fact that several documents were heavily redacted
and some were provided in the local language – Norwegian rather than
English – was viewed in negative terms by certain participants. Redacted
documents were generally seen as holding relatively little value – “redacted
documents and the level of redaction raised suspicion”49 – while some
viewed original language documents as a deliberate attempt to dissimulate –
“Documents presented in Norwegian lowered our confidence. Seemed they
tried to hide information in plain sight”.50 It should be noted, however, that
the concerns regarding original language material were minimal, particu-
larly given the significance attached to the speed at which information was
provided by the host (discussed in detail below). Translation would have
delayed the flow of information and brought new challenges, such as mis-
translation. In any case, this broader process of evaluating information and
evidence links to the earlier discussion of risk and vulnerability, and high-
lights the cautious, probing approach that framed the engagement of the
inspectors across all aspects of the exercise.
Beyond the body of written information provided by the host team, the
decision by the host team to allow inspectors to interview a member of
staff involved in the incident that disrupted the chain of custody proved
significant. Across all cohorts of research participants, there was general
agreement that this interview – unplanned and not strictly required under
the terms of the verification protocol – served as an indicator of the posi-
tive intentions of the host team: “the interview with the technician deep-
ened [trust] for me”.51 The influence here is all the more interesting due
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 137
to the fact that the interview revealed no new information, the interviewee
simply confirmed or reiterated information already known to the inspec-
tors. Moreover, research participants were fully aware of this situation:
The interview with the worker increased the confidence even though no
new information was revealed. So first-hand information gave me more
confidence.52
The interview was helpful even if it had no new information in it.53
The significance of the interview, then, lies in the fact that this measure
was not provided for in the verification protocol and the host team was
under no obligation to facilitate the interview. Essentially, the host team
exercised a measure of discretion and sanctioned the interview as a means
of demonstrating good will and conveying its desire to reach a positive
verification outcome. Clearly, the host team had relatively little at stake
here given that the interview did not provide any new information to the
inspectors and all interview questions were screened in advance.
Observation of internal discussions among inspectors revealed that this
point was well understood, yet it was felt that the interview was a positive
signal on the part of the host team. Furthermore, inspectors raised the
possibility that the interviewee might say something to contradict the offi-
cial narrative under questioning. On the whole, then, the interview was
viewed with cautious optimism and generally interpreted as an indication
that the host team was committed to restoring the verification chain of
custody.
If the type of information provided to the inspection team was signifi-
cant, so too was the speed with which this information was provided.
Indeed, speed of information provision proved to be a dominant theme
across all cohorts of research participants. For example, the vast majority
of questionnaires made reference to the speed of requested information
delivery and indicated that this had a direct influence on their perceptions
regarding the host team’s intentions. In general, quicker responses were
interpreted as positive signals, while slower responses seemed to raise
doubts and suspicions. Examples include:
The faster the response the more I assumed it was spontaneous and there-
fore unfiltered.58
The faster the response the lower the chance of falsifying it.59
Speed of information gives the impression that the host is not trying to
hide something from us.60
It does not take time to hand in a document, but it does to forge or
fabricate one.61
My confidence decreased due to the fact that information was only released
when specifically asked for.63
My main problem was that we were not provided with information,
mostly only if asked for it specifically.64
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 139
Freely provided information and access was more well received and
increased confidence in the host facility… Any outstanding question or
delay in information/access or misinformation decreased confidence.65
Providing information on a voluntary basis helped to increase trust.66
Again, much of the influence here derived from the perception that volun-
teering information suggested a level of commitment to resolving the
break in the chain of custody. In terms of signalling, however, the inspec-
tors were generally surprised by this proactive effort on the part of the
hosts. Crucially, this meant that even if the information did not significantly
advance the investigative process, the commitment that it represented had
a shaping effect on the perspective of inspectors:
Broadly speaking, however, the consensus was that information was pro-
vided in a timely and proactive manner served to increase trust. This pro-
cess was not without challenges – some pieces of information took longer
than others, some required negotiation and internal approval. For a small
number of participants, these delays were viewed with suspicion as “it
looked like they were not trying to resolve the issue”.72 For the most part,
however, research participants viewed any slight delays as acceptable: “The
140 W. Q. BOWEN ET AL.
fact that some things took a bit longer, everything came in at a reasonable
period of time but it didn’t seem coordinated. It seemed much more true
to life”.73
The third factor influencing perceptions around the flow of information
was the manner in which the information was provided. In line with the
cognitive engagement discussed earlier in the chapter, research participants
were constantly on the lookout for behavioural cues and other signs that
might shed light on the host team’s intentions. With regard to the flow of
information, the responsiveness of the host team, their perceived levels of
openness, and even their demeanour as they responded to requests were all
elements that factored into the interpretative equation of the inspectors.
It has already been noted that participants attached considerable signifi-
cance to the timely delivery of information. Equally important, however,
was the attitude and perceived degree of effort exerted on the part of the
host team: “The more responsive and cooperative they are the more con-
fidence we become”.74 For several participants, interactions with the host
team created the impression that they were genuinely seeking to provide
as much information as possible within the limits imposed by national
security and obligations under the NPT:
In this context, the research participants accepted that the verification pro-
cess would inevitably face challenges and obstacles. What was important
here was the approach adopted by the host team and the efforts it made to
overcome these issues:
Any problem I could have had with the speed of [information provision],
the form it took, was somewhat mitigated by the fact that I could under-
stand perhaps why there was a reluctance there to share it.76
What was important for me was how the host team responded to prob-
lems. Were they really trying to find a solution or were they happy to leave
these obstacles in our way?77
For the most part, research participants felt that the host team was indeed
attempting to provide all necessary information and respond to requests as
best they could. Certainly, there were dissenting views – a minority of
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 141
There was an extremely personal level between teams – with the host team,
meaning that at points we could feel the bond between people who are
thrown into this working situation together. You are in the same boat and
you know you have to do your job. You have to be suspicious of the other
side but at the same time you know you must work together to get stuff
done. That means that there was kind of an empathy, there was a kind of a
mutual understanding, we’ve got hurdles to jump but it’s fine, there was
kind of an empathy in that regard.82
There are two levels which I experienced. One is extremely personal, one is
extremely professional. So on the personal level, it was all trust. So I trusted
some more than the others. It was not even about what they gave me,
because I knew that was a professional thing. But you know, it was about the
little things and the bond you try to build.84
The participant recognises, in their own way, the constant tension between
the professional objectives of the inspection and the myriad other, more
personal influences that arose from sustained interaction with another
group of individuals in an emotionally challenging environment. Yet even
with this awareness, participants acknowledged the challenge of actualis-
ing and maintaining this distinction throughout the exercise: “I tried to
keep the personal element of the whole thing separate, but it’s not easy to
do this. I’m not sure it’s even possible”.85
In addition to those banal everyday interactions that encouraged empa-
thy and contributed to the development of trust were a number of larger
‘milestone’ events, whose impact was sharper and more dramatic. One
example here relates to the issue of access. Clearly, the ease and extent of
access granted by the host team was central to inspectors’ efforts to gather
evidence and determine whether the chain of custody could be re-
established around the TAIs. During the simulation, inspection teams all
requested an initial site visit – this was planned for by the control team –
and this visit was conducted over the course of several hours, usually on
day two of the exercise. The visit served both a familiarisation role and a
144 W. Q. BOWEN ET AL.
data collection function, but the time limit inevitably left the inspectors
keen for further on-site inspection time.
As part of the simulation, the host team pre-empted a second request
by offering another site visit to inspection teams. This proactive approach
was viewed by the majority of participants as a significant milestone in the
relationship with the host and in the inspection process more broadly:
The second site visit kind of took me off guard… I think that we were prob-
ably expecting to ask for it with a reasonable degree of assertiveness. The
fact that it was offered, in the way that it was offered, did make me feel like
these people were just trying to get us to leave so that they can get on with
what they’re doing.
The second site visit was a turning point for me. They offered it and they
offered us more access than we expected to get. It was a clear sign of their
cooperation.
Conclusion
This chapter has demonstrated the subtle but powerful role played by
human factors, and particularly the notion of trust, in the verification pro-
cess. Analysis of our data revealed that the simple truisms that are often
raised in discussions of trust – trust develops gradually over time, trust
develops through positive behaviour on both sides in contexts of mutual
vulnerability, etc. – are far more complex than commonly believed. Our
research found that at the outset of the simulation, research participants
became engaged in a complex set of cognitive processes that saw them
constantly seeking to identify, assess and make sense of a range of behav-
ioural and other cues emanating from the host team. Everything from the
TRUST AND VERIFICATION: EMPIRICAL INSIGHTS 145
attitude of the host team, to the manner and speed with which informa-
tion was provided represented a potential indicator of intentions and was
incorporated into the interpretative schema of the research participants.
This intellectually demanding cognitive process overlaid the more
objective and scientific, evidence-based approach that all research partici-
pants aspired to. Crucially, the overlapping nature of these interpretative
strands meant that, despite an awareness of the potential influence of
human factors, participants were always susceptible to moving beyond the
strict limits of evidence in their efforts to understand and make sense of
the verification scenario and the nature of the host team’s intentions. This
should not be interpreted as naïve, superficial or irresponsible on the part
of inspectors. Rather it should be viewed as the consequence of a genuine
attempt to adopt a holistic approach to verification, one that incorporated
all available information, whatever its form.
Ultimately, this approach that brought aspirations to scientific objectiv-
ity together with the inevitable subjectivity of the human condition framed
the process by which inspectors brought what they believed to be the only
obtainable truth of the situation, blurry and uncertain at the outset, more
clearly into focus. From a research perspective, it provided us with exten-
sive empirical evidence to support the argument that trust does indeed
exert a shaping influence on verification outcomes and it would be reduc-
tive, and even dangerous to think of verification in terms of a solely techni-
cal and evidence-based process.
Notes
1. Betty Goetz Lall, “Government Sponsored Research for Disarmament,”
Bulletin of the Atomic Scientists 21, no. 2 (1965): 44.
2. See: Atomic Energy Commission, “Project Cloud Gap and CG-34,
Demonstrated Destruction of Nuclear Weapons. Note by the Secretary.”
3. “The United Kingdom - Norway Initiative: Further Research into Managed
Access of Inspectors During Warhead Dismantlement Verification.”
4. United Kingdom Norway Initiative, “New Verification Exercises: A
Collaboration with King’s College, London,” May 28, 2014, http://ukni.
info/mdocs-posts/uknipreparatorycommitteetothenptreviewconferen-
ce2014studentexercises/.
5. Individual interview (Participant 7), Kjeller, Norway, November 2013.
6. Individual interview (Participant 6), Kjeller, Norway, November 2013.
7. Individual Interviews (Participants 2, 4 & 5), Kjeller, Norway, August
2014.
146 W. Q. BOWEN ET AL.
In this book, our focus has been on another, less researched side of
dismantlement verification: the nature and influence of the human factor.
Throughout the book, we have been at pains to highlight the mistaken
assumption that verification is a purely technical endeavour, an objective
and mechanical process where there is no room for subjectivity. Rather, we
have demonstrated that the human factor exerts a subtle but often power-
ful influence on the verification process and, potentially, its outcome. In
particular, our research demonstrates the need for trust to be considered
an integral part of the verification process. Trust is an unavoidable interac-
tional variable, that is to say, a moderating condition for a causal relation-
ship. It has the potential to influence confidence levels, often in spite of
the efforts of inspectors to base their judgments purely on evidence. The
implications of trust as an interactional variable are significant: ignoring
the influence of trust on confidence could potentially distort the interpre-
tation of verification outcomes
To reach these conclusions, we began by considering the nature of the
‘human factor’. Clearly, this broad and abstract concept can be interpreted
in a range of different ways, relating as it does to fluid and amorphous
issues such as perceptions, assumptions, attitudes and biases. With this in
mind, we sought to focus our attention on the two terms relevant to the
human factor that seem to dominate commentary and debate regarding
verification for arms control and disarmament: trust and confidence. In
our view, these terms – defined and analysed in Chapter 4 – encapsulate
the tension between evidence and perceptions that is at the heart of the
verification endeavour. Of particular interest was the concept of trust, the
essence of which seems to capture perfectly the grey area of verification,
this space where evidence is in short supply and inspectors may become
more susceptible to being influenced or directed by their perceptions of
the host party’s intentions.
Against this background, we sought to conceptualise trust and develop
a comprehensive framework that could be applied to the considerable
body of empirical data collected from those participating in our custom-
ised verification scenario. Following an extensive literature review, that
spanned disciplines ranging from management science to psychology, we
identified three ‘categories of action’ that together seem to encapsulate
the key factors of the trust equation: vulnerability and risk; the expectation
of positive behaviour; and signalling and framing. The remainder of the
book was devoted to applying this robust conceptual approach to the
research data. Our analysis here was driven by two key questions: To what
CONCLUSION: LOOKING TO THE FUTURE 151
there are a number of positive developments that provide cause for opti-
mism. The International Partnership for Nuclear Disarmament Verification
(IPNDV), established in 2014 by the US Department of State in partner-
ship with the Nuclear Threat Initiative, is a good example. The IPNDV
brings together experts from nuclear weapon states (NWS) and non-
nuclear weapon states (NNWS) to explore verification challenges. The
Initiative established three working groups – one addressing monitoring
and verification objectives, one exploring issues associated with on-site
inspections, and one devoted to technical challenges and solutions – have
met several times and together offer an important multilateral forum for
advancing verification, albeit with a strong technical focus. Elsewhere, the
seventy first session of the UN General Assembly saw the First Committee
adopt a resolution that asked the Secretary General to “to establish a
group of governmental experts of up to 25 participants on the basis of
equitable geographical distribution to consider the role of verification in
advancing nuclear disarmament”.1 This group is due to meet in Geneva in
2018 and 2019 for a total of three sessions of five days each. Furthermore,
during the 2017 Preparatory Committee for the 2020 NPT Review
Conference, a new multi-year arms control initiative between two nuclear
weapons states (UK and US) and two Nordic states (Norway and Sweden)
was announced.2 The new initiative engages with simulations to build
capacity in nuclear weapons related verification, test monitoring technol-
ogy and develop a model verification protocol.
These examples, combined with the recent adoption of the nuclear
weapons ban treaty, offer hope for the future of disarmament verification.
On the other hand, however, other geopolitical developments provide
cause for concern. Take the IPNDV, for example. Driven in large part by
former US President Obama’s vision for a world free of nuclear weapons,
the initiative is vulnerable, to a certain extent at least, to policy shifts
effected by the current Trump administration. At present, the administra-
tion is conducting a wide-ranging review of nuclear policy and its commit-
ment to disarmament verification is not at all assured. Certainly, the
initiative benefits from the involvement and support of other partners, yet
US involvement holds considerable political significance as well as bring-
ing valuable technical expertise and cannot be underestimated. Beyond
this, international debates on the shape and pace of nuclear weapons
reductions will continue to frame thinking on the type of verification
needed. The 2010 New START Treaty established a good benchmark
through its rigorous verification regime, which continued to function
154 W. Q. BOWEN ET AL.
smoothly even when relations between the US and the Russian Federation
soured. But the prospects for a follow-on treaty, that would pave the way
to further verified reductions, are currently slim given the differences
between the two countries on missile defence and compliance with INF.
The politics framing nuclear disarmament aside, we believe that our
research makes a significant contribution to advancing the nuclear war-
head dismantlement verification. The empirical evidence and method-
ological approach set out in this book represent an important step towards
understanding an important influence on the process of verification that
has been largely ignored to date. As with most academic endeavours, our
work raises almost as many questions regarding the role and influence of
human factors as it answers. Yet, these are questions that must be addressed
in some shape or form, alongside technical considerations, if verification is
to advance as a holistic and comprehensive concept. To sideline the human
dimension of dismantlement verification would be to fundamentally
undermine the broader endeavour. We end this book, therefore, in the
hope that our research into the human factor in nuclear warhead disman-
tlement verification will set the path for further research, and feed into the
work of other scholars working in this area.
Notes
1. First Committee, “Nuclear Disarmament Verification,” Agenda Item 98,
Seventy-First Session of the General Assembly (United Nations General
Assembly), accessed August 29, 2017, http://www.reachingcriticalwill.
org/images/documents/Disarmament-fora/1com/1com16/resolutions/
L57.pdf.
2. Hassan Elbahtimy, “More Heat than Light: Reflections on the 2017 NPT
Prepcom,” The European Leadership Network, June 26, 2017, http://www.
europeanleadershipnetwork.org/more-heat-than-light-reflections-on-the-
2017-npt-prepcom_4881.html.
Bibliography
Books
Barber, Bernard. 1983. The Logic and Limits of Trust. New Brunswick: Rutgers
University Press.
Blau, P.M. 1964. Exchange and Power in Social Life. New York: Wiley.
Bogden, R. 1972. Participant Observation in Organisational Settings. New York:
Syracuse University Press.
Bunn, Matthew, and Scott Sagan. 2014. A Worst Practices Guide to Insider Threats:
Lessons from Past Mistakes. Cambridge, MA: American Academy of Arts and
Sciences.
Gallagher, Nancy. 1999. The Politics of Verification. Baltimore: Johns Hopkins
University Press.
Gilbert, Nigel, and Klaus G. Troitzsch. 2005. Simulation for the Social Scientist.
Maidenhead: Open University Press.
Goffman, Erving. 1974. Frame Analysis: An Essay on the Organization of
Experience. Boston: Northeastern Press.
Heimer, Carol A. 2001. Solving the Problem of Trust. In Trust in Society, ed.
Karen S. Cook, 40–88. New York: Russell Sage Foundation.
Hon, Linda C., and James E. Grunig. 1999. Guidelines for Measuring Relationships
in Public Relations. Gainesville: Institute for Public Relations.
Kalinowski, Martin B. 2006. Comprehensive Nuclear Test Ban Treaty Verification.
In Verifying Treaty Compliance: Limiting Weapons of Mass Destruction and
Monitoring Kyoto Protocol Provisions, ed. Rudolph Avenhaus, Nicholas
Kyriakopoulos, Michel Richard, and Gotthard Stein, 135–152. Berlin: Springer.
Lawlor, S. 2002. Narrative in Social Research. In Qualitative Research in Action,
ed. T. May. London: Sage.
Liebermann, Jethro K. 1981. The Litigious Society. New York: Basic Books.
Longhurst, R. 2010. Semi-structured Interviews and Focus Groups. In Key
Methods in Geography, ed. N. Clifford, S. French, and G. Valentine, 117–132.
London: Sage.
Luhmann, Niklas. 1979. Trust and Power. New York: Wiley.
———. 1988. Familiarity, Confidence, Trust: Problems and Alternatives. In Trust:
Making and Breaking Cooperative Relations, 94–107. Oxford: Basil Blackwell.
McFall, Lynne. 1987. Integrity. Ethics 98 (1): 5–20.
Nooteboom, Bart. 2002. Trust: Forms, Foundations, Functions, Failures and
Figures. Cheltenham: Edward Elgar.
Perla, Peter. 1990. The Art of Wargaming: A Guide for Professionals and Hobbyists.
Annapolis: U.S. Naval Institute.
Porter, Theodore M. 1996. Trust in Numbers: The Pursuit of Objectivity in Science
and Public Life. Princeton: Princeton University Press.
Sabin, Philip. 2012. Simulating War: Studying Conflict Through Simulation
Games. London: Continuum International.
Steinbruner, John D. 2000. Principles of Global Security. Washington, DC:
Brookings Institution Press.
Tape, James, and Joseph Pilat. 2008. Nuclear Safeguards and the Security of
Nuclear Materials. In Nuclear Safeguards, Security, and Nonproliferation:
Achieving Security with Technology and Policy, ed. James E. Doyle, 19.
Burlington: Butterworth-Heinemann.
Weiss, Leonard. 1996. The Nuclear Nonproliferation Treaty: Strengths and Gaps.
In Fighting Proliferation: New Concerns for the Nineties, ed. Henry Sokolski.
Maxwell Air Force Base: Air University Press.
Wolfsthal, Jon, Mark Quint, and Jeffrey Lewis. 2014. The US Trillion Dollar
Nuclear Triad. Monterey: James Martin Centre for Nonproliferation Studies.
Das, T.K., and Bing-Sheng Teng. 2004. The Risk-Based View of Trust: A
Conceptual Framework. Journal of Business and Psychology 19 (1): 85–116.
Demonstration Destruction of Nuclear Weapons. Final Report. Washington, DC:
United States Arms Control and Disarmament Agency, January 1969. https://
www.nti.org/media/pdfs/Cloud_Gap_Demonstrated_Destruction_of_
Nuclear_Weapons.pdf.
Department of State. 1960a. Letter from President Eisenhower to the Soviet
Premier (Bulganin) Regarding Nuclear Weapons Tests, 21 October 1956. In
Documents on Disarmament 1945–1959, Volume I.
———. 1960b. Letter from the Soviet Premier (Bulganin) to President Eisenhower
Regarding Nuclear Weapons Tests, 17 October 1956. In Documents on
Disarmament 1945–1959, Volume I.
Deutsch, Morton. 1958. Trust and Suspicion. Journal of Conflict Resolution 2 (4):
265–279.
———. 1973. The Resolution of Conflict. New Haven: Yale University Press.
Engelbrecht, Amos S., Gardielle Heine, and Bright Mahembe. 2015. The
Influence of Integrity and Ethical Leadership on Trust in the Leader.
Management Dynamics 24 (1): 2–10.
Entman, Robert M. 1993. Framing: Toward Clarification of a Fractured Paradigm.
Journal of Communication 43 (4): 51–58.
Fein, Steven. 1996. Effects of Suspicion in Attributional Thinking and the
Correspondence Bias. Journal of Personality and Social Psychology 70 (6):
1164–1184.
Feldman, Shai. 1992. The Bombing of Osirak Revisited. International Security 7
(2): 114–142.
Fetter, Steve. 1996. Verifying Nuclear Disarmament. Washington, DC: Henry
L. Stimson Center.
Fetter, Steve, Valery Frolov, Oleg Prilutskii, Roald Sagdeev, Marvin Miller, Robert
Mozely, and Stanislav Rodionov. 1990. Detecting Nuclear Warheads. Science
and Global Security 1 (3–4): 225–253.
Findlay, Trevor. 2015. Proliferation Alert! The IAEA and Non-Compliance
Reporting. Project on Managing the Atom. Belfer Center for Science and
International Affairs, Harvard Kennedy School, October.
First Committee. 1993. Comprehensive Nuclear Test Ban Treaty. United Nations
General Assembly, December 6. https://www.ctbto.org/the-treaty/.
———. Nuclear Disarmament Verification. Agenda Item 98. Seventy-First Session of
the General Assembly. United Nations General Assembly. Accessed 29 Aug 2017.
http://www.reachingcriticalwill.org/images/documents/Disarmament-fora/
1com/1com16/resolutions/L57.pdf.
Fischer, David. 1997. The DPRK’s Violation of Its NPT Safeguards Agreement
with the IAEA Excerpt from ‘History of the International Atomic Energy
Agency. IAEA. https://www.iaea.org/sites/default/files/dprk.pdf.
Bibliography
159
———. 2002b. Statement to the Forty-Sixth Regular Session of the IAEA General
Conference. IAEA, September 16. https://www.iaea.org/newscenter/state-
ments/statement-forty-sixth-regular-session-iaea-general-conference.
———. 2004. Implementation of the NPT Safeguards Agreement in the Republic of
Korea, November 11.
IAEA Board of Governors. 2005. Implementation of the NPT Safeguards Agreement
in the Arab Republic of Egypt, February 14.
IAEA Director General. 2011. Implementation of the NPT Safeguards Agreement,
November 8.
IAEA General Conference. 1991. Iraq’s Non-Compliance with Its Safeguards
Obligations, September 16.
Ifft, Edward. 2009. The Threshold Test Ban Treaty. Arms Control Today 23 (3–4):
385–396.
Integrated Field Exercise 2014: CTBTO Preparatory Commission. Preparatory
Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization,
November 3, 2014. https://www.ctbto.org/specials/integrated-field-exercise-
2014/.
Jervis, Robert. 1978. Cooperation Under the Security Dilemma. World Politics 30
(2): 167–214.
Kerr, Paul K. 2016. Iran’s Nuclear Program: Tehran’s Compliance with
International Obligations, Congressional Research Service, May 31. http://
www.iranwatch.org/library/governments/united-states/congress/congres-
sional-research-service-reports/irans-nuclear-program-tehrans-compliance-
international-obligations-0.
Kitzinger, J. 1995. Qualitative Research: Introducing Focus Groups. British
Medical Journal 311 (7000): 299–302.
Kramer, Roderick M. 1994. The Sinister Attribution Error: Paranoid Cognition
and Collective Distrust in Organisations. Motivation and Emotion 18: 199–230.
———. 1999. Trust and Distrust in Organizations: Emerging Perspectives,
Enduring Questions. Annual Review of Psychology 50: 569–598.
Kristensen, Hans, and Robert Norris. 2004. Dismantling U.S. Nuclear Warheads.
Bulletin of the Atomic Scientists 60 (1): 72–74.
———. 2015a. Chinese Nuclear Forces, 2015. Bulletin of the Atomic Scientists 71
(4): 205–211.
———. 2015b. Russian Nuclear Forces, 2015. Bulletin of the Atomic Scientists 71
(3): 84–97.
Lall, Betty Goetz. 1965. Government Sponsored Research for Disarmament.
Bulletin of the Atomic Scientists 21 (2): 44–46.
Lewis, David, and Andrew J. Weigert. 1985a. Social Atomism, Holism, and Trust.
The Sociological Quarterly 26 (4): 455–471.
———. 1985b. Trust as Social Reality. Social Forces 63 (4): 967–985.
Lieber, Keir A., and Daryl G. Press. 2006. The End of MAD? The Nuclear
Dimension of U.S. Primacy. International Security 30 (4): 7–34.
Bibliography
161
Lindenberg, Siegwert. 2000. It Takes Both Trust and Lack of Mistrust: The
Workings of Cooperation and Relational Signaling in Contractual Relationships.
Journal of Management and Governance 4 (1–2): 11–33.
Linhart, Michael. 2014. Pledge Presented at the Vienna Conference on the
Humanitarian Impact of Nuclear Weapons, Foreign Ministry of Austria,
December 8. https://www.bmeia.gv.at/fileadmin/user_upload/Zentrale/
Aussenpolitik/Abruestung/HINW14/HINW14_Austrian_Pledge.pdf.
Lowenthal, Mark, and Joel Wit. 1984. Politics, Verification and Arms Control. The
Washington Quarterly 7 (3): 114–125.
Mayer, Roger C., James H. Davis, and F.D. Schoorman. 1995. An Integrative
Model of Organisational Trust. Academy of Management Review 20 (3):
709–734.
Michaels, Jeffrey, and Heather Williams. 2017. The Nuclear Education of Donald
J. Trump. Contemporary Security Policy 38 (1): 54–77.
Ministry of Defence. 2010. The United Kingdom – Norway Initiative: Research
into the Verification of Nuclear Warhead Dismantlement. The 2010 Review
Conference of the Parties to the Treaty on the Non-Proliferation of Nuclear
Weapons. New York: Ministry of Defence, May 3. https://www.gov.uk/gov-
ernment/uploads/system/uploads/attachment_data/file/28426/npt_rev-
con_2010_jwp.pdf.
Moran, Matthew, and Matthew Cottee. 2011. Bound by History? Exploring
Challenges to French Nuclear Disarmament. Defense & Security Analysis 27
(4): 341–357.
Müller, Harald. 1993. The Evolution of Verification: Lessons from the Past for the
Present. Arms Control 14 (3): 333–356.
National Research Council. 2005. Monitoring Nuclear Weapons and Nuclear-
Explosive Materials: An Assessment of Methods and Capabilities. National
Academy of Sciences. https://www.nap.edu/catalog/11265/monitoring-
nuclear-weapons-and-nuclear-explosive-materials-an-assessment-of.
National Report Pursuant to Actions 5, 20, and 21 of the NPT Review Conference
Final Document. Presented to NPT Prepcom, May 2014.
Norman, C.F., K. Zhao, H. Rilakovic, S. Balsley, and M. Penkin. 2010. The
Importance of Correctness: The Role of Nuclear Material Accountancy and
Nuclear Material Analysis in the State Evaluation Process. IAEA Safeguards
Symposium.
Norris, Robert, and Hans Kristensen. 2010. Global Nuclear Weapons Inventories,
1945–2010. Bulletin of the Atomic Scientists 66 (4): 77–83.
NTI. 1969. Demonstrated Destruction of Nuclear Weapons, Field Test Program:
Final Report (Vol. 1). Nuclear Threat Initiative, January. https://www.nti.
org/media/pdfs/Cloud_Gap_Demonstrated_Destruction_of_Nuclear_
Weapons.pdf.
162 Bibliography
Online Articles
1960: Thousands Protest Against H-Bomb. BBC News, April 18, 1960. http://
news.bbc.co.uk/onthisday/hi/dates/stories/april/18/newsid_2909000/
2909881.stm.
Baklitskiy, Andrey. The 2015 NPT Review Conference and the Future of the
Nonproliferation Regime. Arms Control Today. Arms Control Association, July
2015. https://www.armscontrol.org/ACT/2015_0708/Features/The-2015-
NPT-Review-Conference-and-the-Future-of-The-Nonproliferation-Regime.
Brookings Institute. 2014. 50 Facts About U.S. Nuclear Weapons Today. Brookings
Institute, April 28. https://www.brookings.edu/research/50-facts-about-u-s-
nuclear-weapons-today/.
Bureau of Arms Control, U.S. Department of State. 2014. International
Partnership for Nuclear Disarmament Verification (IPNDV), December 4.
https://www.state.gov/t/avc/ipndv/.
Bureau of International Security and Nonproliferation. 1972. Interim Agreement
Between the United States of American and the Union of Soviet Socialist Republics
on Certain Measures with Respect to the Limitation of Strategic Offensive Arms,
May 26. https://www.state.gov/t/isn/4795.htm.
Bibliography
165
Ministry of Defence, Foreign and Commonwealth Office. 2006. The Future of the
United Kingdom’s Nuclear Deterrent, December. https://www.gov.uk/gov-
ernment/publications/the-future-of-the-united-kingdoms-nuclear-deterrent-
defence-white-paper-2006-cm-6994.
NNSA Announces Recipient of $25 Million Grant to Improve Nuclear Arms
Control Verification Technology. National Nuclear Security Administration,
December 4, 2014. https://nnsa.energy.gov/mediaroom/pressreleases/
consortium.
NTI. 2015. Chain of Custody, Tags, Seals & Tamper-Indicating Enclosures.
Nuclear Threat Initiative, September 16. http://www.nti.org/analysis/arti-
cles/tags-seals/.
Sagan, Scott, and Benjamin Valentino. 2017. The Nuclear Weapons Ban Treaty:
Opportunities Lost. Bulletin of the Atomic Scientists, July 16. http://thebulle-
tin.org/nuclear-weapons-ban-treaty-opportunities-lost10955.
Shea, Thomas E. 2008. The Trilateral Initiative: A Model for the Future. Arms
Control Association, June 11. https://www.armscontrol.org/act/2008_05/
PersboShea.asp%23Sidebar1.
Shea, Thomas E., and Laura Rockwood. 2015. IAEA Verification of Fissile
Material in Support of Nuclear Disarmament. Managing the Atom Project.
Cambridge, MA: Belfer Center, May. http://www.belfercenter.org/sites/
default/files/legacy/files/iaeaverification.pdf?
Shipler, David. 1987. The Summit – Reagan and Gorbachev Sign Missile Treaty
and Vow to Work for Greater Reductions. New York Times, December 9.
http://www.nytimes.com/1987/12/09/world/summit-reagan-gorbachev-
sign-missile-treaty-vow-work-for-greater-reductions.html?pagewanted=all&mc
ubz=3.
Shultz, George P., William J. Perry, Henry A. Kissinger, and Sam Nunn. 2007. A
World Free of Nuclear Weapons. Wall Street Journal, January 4. www.wsj.
com/articles/SB116787515251566636.
Swaim, Barton. 2016. ‘Trust, but Verify’: An Untrustworthy Political Phrase.
Washington Post, March 11. https://www.washingtonpost.com/opinions/
trust-but-verify-an-untrustworthy-political-phrase/2016/03/11/da32fb08-
db3b-11e5-891a-4ed04f4213e8_story.html.
Taking Forward Multilateral Nuclear Disarmament Negotiations: Note by the
Secretary General. United Nations, September 1, 2016. http://undocs.
org/A/71/371.
Tertrais, Bruno. 2015. Deterrence According to Francois Hollande. Fondation pour
la Recherche Stratégique, June 1. https://www.frstrategie.org/publications/
notes/web/documents/2015/201510.pdf.
The B61 (MK-61) Bomb. Nuclear Weapons Archive, January 9, 2007. http://
nuclearweaponarchive.org/Usa/Weapons/B61.html.
The Growing Appeal of Zero. The Economist, June 16, 2011. http://www.econo-
mist.com/node/18836134.
Bibliography
167
The United Kingdom – Norway Initiative: Further Research into Managed Access
of Inspectors During Warhead Dismantlement Verification. Ministry of
Defence, March 31, 2010. https://www.gov.uk/government/publications/
uk-norway-initiative-on-nuclear-warhead-dismantlement-verification.
The White House. 1945. Declaration on the Atomic Bomb by President Truman
and Prime Ministers Attlee and Kind, November 15. http://www.nuclearfiles.
org/menu/key-issues/nuclear-energy/history/dec-truma-atlee-king_1945-
11-15.htm.
Tobey, William. 2014. A Message from Tripoli: How Libya Gave Up Its WMD.
Bulletin of the Atomic Scientists, December 3. http://thebulletin.org/
message-tripoli-how-libya-gave-its-wmd7834.
Trump, Donald J. 2016. Foreign Policy Speech – Video Recording. YouTube,
April 27. https://www.youtube.com/watch?v=4Q_s6cXSv_8.
Trust – Definition of Trust. Oxford Dictionaries | English. Accessed 29 Aug 2017.
https://en.oxforddictionaries.com/definition/trust.
United Kingdom Norway Initiative. 2014. New Verification Exercises: A
Collaboration with King’s College, London. Presented at the UKNI Event
organised on the sidelines of the Third Session of the 2015 NPT Preparatory
Committee, May 28. http://ukni.info/mdocs-posts/uknipreparatorycommit-
teetothenptreviewconference2014studentexercises/.
Waldwyn, Tom. 2015. Renewing Trident: Facts Concerning the Future of the
UK’s Submarine-Based Nuclear Capability. IISS, May 5. http://www.iiss.org/
en/militarybalanceblog/blogsections/2015-090c/may-b1c8/european-
defence-bcf2.
What Lurks Beneath. The Economist, February 6, 2016. https://www.economist.
com/news/asia/21690107-nuclear-arms-race-sea-what-lurks-beneath.
Index1