Skip to main content

Advertisement

Log in

Illicit arms transfers to Africa and the prominence of the former Soviet bloc: a social network analysis

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

Small arms and light weapons are the primary causes of death in the violent conflicts raging today. Although the small arms trade is difficult to track, and the illicit trade doubly so, a wealth of information is available. This article applies some basic tools of social network analysis (SNA) to reveal the high profile of former Soviet bloc countries in the illicit arms trade with Africa. I set up this analysis with a discussion of the features of social networks that allow them to facilitate the transfer of illicit weaponry, and follow the presentation of my findings with some explanations for the prominence of Russia and other post-communist countries in this trade. My discussion focuses on the importance of relationships, their quantity and quality, as providing opportunities for, and constraints on, the flow of material and social resources between the actors and locales that comprise the illicit arms trade network. I also highlight the extent to which the positions of key players may account for their power within the network and their roles in security governance, which in the illicit context requires the maintenance of secrecy and redundancy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. On the SALW trade, see [14, 78, 25, 16, 27, 26, 7]. The estimate of the illicit portion of the overall SALW trade is reported in [57]. Although one might want to distinguish between illicit and illegal arms, I do not do so in this paper. But see, for example, [38, 1].

  2. This discussion follows [56].

  3. The Iran-Contra affair involved the Reagan administration’s covert and illegal sale of arms to Iran, which was subject to a U.S. arms embargo by virtue of the country’s designation as a state sponsor of terrorism. Relevant international law may include the Friendly Relations Declaration (UN General Assembly Resolution 2625, October 1970), which asserts that “no State shall organize, assist, foment, finance, incite or tolerate subversive, terrorist or armed activities directed towards the violent overthrow of the regime of another State, or interfere in civil strife in another State.” The Arms Trade Treaty, adopted by the UN General Assembly in 2013, but not yet in force, sets the bar higher, prohibiting arms transfers if the supplying government has reason to believe that “the arms or items would be used in the commission of genocide, crimes against humanity, grave breaches of the Geneva Conventions of 1949, attacks directed against civilian objects or civilians protected as such, or other war crimes.” Neither instrument singles out illicit arms transfers, though. The Illicit Firearms Protocol to the Convention against Transnational Organized Crime, adopted by the UN General Assembly in 2001, does not itself prohibit illicit arms transfers, but directs state parties to adopt legislation criminalizing illicit arms manufacturing and trafficking.

  4. For an analysis of the factors contributing to compliance and noncompliance with arms embargoes, see [61]; [32]. On the role of international norms and arms control regimes in curbing arms supply, see [36]; [31].

  5. On the control of illicit arms transfers, see [40, 83].

  6. This discussion is based on the typology presented in [9]. See also [64, 34, 3, 66].

  7. The concept of social capital is the subject of a large and growing social scientific literature. See, for example, [22, 13, 70, 72, 89].

  8. For a skeptical view, see [63]

  9. See, for example, [73, 59, 6, 52, 76, 67, 53, 30, 60, 43, 84: appendix B]

  10. Economic theories of rebellion posit similar social dynamics. See, for example, [23].

  11. For a discussion of the disadvantages these organizations face, see [29].

  12. The figures and analysis discussed in the following paragraphs were generated from the raw data assembled by Curwen [24].

  13. Clearly, there were more than 38 individuals involved in these four events, so the network that Curwen reconstructs is represents only the most visible (to UN experts) of the real-world network. The study of illicit networks must therefore contend with questions of sampling. See [75, 35]

  14. These results are available upon request.

  15. For a full description of IATD coding procedures, including a complete list of variables and definitions, see [49] The database itself is not yet available to the wider research community. See also [79]

  16. Dealers are those middlemen who buy and sell the arms, in effect taking temporary ownership of the weapons along the way. Brokers are those who facilitate the arms deals. They bring parties together, perhaps helping with financing, and they usually profit from their brokerage, but they do not take possession or ownership of the arms shipment in route. Shipping agents are those who help arrange transportation of the arms, but who do not do the actual shipping. See [88].

  17. Here, “exporter” means the state locale serving as the starting point for a shipment of illicit weaponry arriving in an African country, not necessarily the country that manufactured the weaponry. Also, I am using the terms “prominent” and “central” to describe state locales that served a starting points for shipments of arms to the largest number of the other countries, not necessarily starting points for the largest volume of transferred weaponry. However, I suspect that there is a correlation.

  18. Viktor Bout is a good example, although certainly not representative in terms of business acumen and success. Bout served as an officer in the Soviet Armed Forces—different sources place him in the Air Forces, military intelligence (the GRU), and the KGB (unlikely)—and, after being discharged at the end of the cold war, got his start in arms trafficking by acquiring transport planes. [33]

  19. For a comprehensive overview of Russia’s role in illicit arms transfers throughout the 1990s, see [12]. In addition to the Russian military, Berryman also considers the role of Russian arms manufacturers, but this is considerably less documented. See also [2]

  20. The “Soviet inheritance” has also been used to explain organized crime in former Soviet republics. See [74, 77]

References

  1. Abraham, I., & van Schendel, W. (2005). The Making of Illicitness. In W. van Schendel & I. Abraham (Eds.), Illicit Flow and Criminal Things: States, Borders, and the Other Side of Globalization. Bloomington: Indiana University Press.

    Google Scholar 

  2. Anthony, I. (1998). Illicit Arms Transfers. In I. Anthony (Ed.), Russia and the Arms Trade. Oxford: Oxford University Press.

    Google Scholar 

  3. Arlacchi, P. (1998). Some Observations on Illegal Markets. In V. Ruggiero, N. South, & I. Taylor (Eds.), The New European Criminology: Crime and Social Order in Europe. London: Routledge.

    Google Scholar 

  4. Arsovska, J., & Kostakos, P. (2008). Illicit Arms Trafficking and the Limits of Rational Choice Theory: The Case of the Balkans. Trends in Organized Crime, 11, 352–378.

    Article  Google Scholar 

  5. Avant, D., & Westerwinter, O. (2013). “The New Power Politics: Networks and Global Security Governance”, typescript.

    Google Scholar 

  6. Bakker, R., Raab, J., & Milward, H. (2012). Preliminary Theory of Dark Network Resilience. Journal of Policy Analysis and Management, 31, 33–62.

    Article  Google Scholar 

  7. Barabási, A., & Albert, R. (1999). Emergence of Scaling in Random Networks. Science, 286, 509–512.

    Article  Google Scholar 

  8. Barabási, A., & Bonabeau, E. (2003). Scale-Free Networks. Scientific American, 288, 60–69.

    Article  Google Scholar 

  9. Beckert, J., & Wehinger, F. (2013). In the Shadow: Illegal Markets and Economic Sociology. Socio-Economic Review, 11, 5–30.

    Article  Google Scholar 

  10. Beije, P., & Groenewegen, J. (1992). A Network Analysis of Markets. Journal of Economic Issues, 26, 87–114.

    Google Scholar 

  11. Berman, E., & Leff, J. (2008). Light Weapons: Products, Producers, and Proliferation. In In Small Arms Survey 2008: Risk and Resilience. Cambridge: Cambridge University Press.

    Google Scholar 

  12. Berryman, J. (2000). Russia and the Illicit Arms Trade. Crime, Law and Social Change, 33, 85–104.

    Article  Google Scholar 

  13. Bourdieu, P. (1986). The Forms of Capital. In J. Richardson (Ed.), Handbook of Theory and Research for the Sociology of Education. Westport, Conn: Greenwood.

    Google Scholar 

  14. Bourne, M. (2007). Arming Conflict: The Proliferation of Small Arms. New York: Palgrave Macmillan.

    Book  Google Scholar 

  15. Bradach, J., & Eccles, R. (1989). Price, Authority, and Trust: From Ideal Types to Plural Forms. Annual Review of Sociology, 15, 97–118.

    Article  Google Scholar 

  16. Bromley, M., Dermody, L., Griffiths, H., Holtom, P., & Jenks, M. (2013). Transfers of Small Arms and Light Weapons to Fragile States: Strengthening Oversight and Control. SIPRI Insights on Peace and Security, no. 2013/1, available at < books.sipri.org/product_info?c_product_id = 453 > .

  17. Bruinsma, G., & Bernasco, W. (2004). Criminal Groups and Transnational Illegal Markets: A More Detailed Examination on the Basis of Social Network Theory. Crime, Law, and Social Change, 41, 79–94.

    Article  Google Scholar 

  18. Cattaneo, S. (2004). Targeting the Middlemen: Controlling Brokering Activities. In In Small Arms Survey 2004: Rights at Risk. Cambridge: Cambridge University Press.

    Google Scholar 

  19. Cheloukhine, S. (2008). The Roots of Russian Organized Crime: From Old-fashioned Professionals to the Organized Criminal Groups of Today. Crime, Law and Social Change, 50, 353–374.

    Article  Google Scholar 

  20. Coase, R. (1937). The Nature of the Firm. Economica, 4, 386–405.

    Article  Google Scholar 

  21. Coase, R. (1960). The Problem of Social Costs. Journal of Law and Economics, 3, 1–44.

    Article  Google Scholar 

  22. Coleman, J. (1988). Social Capital in the Creation of Human Capital. American Journal of Sociology, 94 (supplement), S95-S120.

  23. Collier, P. (2000). Rebellion as a Quasi-Criminal Activity. Journal of Conflict Resolution, 44, 839–853.

    Article  Google Scholar 

  24. Curwen, P. (2007). The Social Networks of Small Arms Proliferation: Mapping an Aviation Enabled Supply Chain. Naval Postgraduate School: Master’s thesis.

    Google Scholar 

  25. De Soysa, I., Jackson, T., & Ormhaug, C. (2009). Does Globalization Profit the Small Arms Bazaar? International Interactions, 35, 86–105.

    Article  Google Scholar 

  26. DellaVigna, S., & La Ferrara, E. (2010). Detecting Illegal Arms Trade. American Economic Journal: Economic Policy, 2, 26–57.

    Google Scholar 

  27. Dreyfus, P., Marsh, N., Schroeder, M., & Lazarevic, J. (2009). Sifting the Sources Authorized Small Arms Transfers. In Small Arms Survey 2009: Shadows of War. Cambridge. Cambridge: Cambridge University Press.

  28. Efrat, A. (2010). Toward Internationally Regulated Goods: Controlling the Trade in Small Arms and Light Weapons. International Organization, 64, 97–131.

    Article  Google Scholar 

  29. Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think. International Security, 33, 7–44.

    Article  Google Scholar 

  30. Enders, W., & Su, X. (2007). Rational Terrorists and Optimal Network Structure. Journal of Conflict Resolution, 51, 33–57.

    Article  Google Scholar 

  31. Erickson, J. (2013). Market Imperative Meets Normative Power: Human Rights and European Arms Transfer Policy. European Journal of International Relations, 19, 209–234.

    Article  Google Scholar 

  32. Erickson, J. (2013). Stopping the Legal Flow of Weapons: Compliance with Arms Embargoes, 1981-2004. Journal of Peace Research, 50, 159–174.

    Article  Google Scholar 

  33. Farah, D., & Braun, S. (2007). Merchant of Death: Money, Guns, Planes, and the Man Who Makes War Possible. Hoboken, N.J.: John Wiley and Sons.

    Google Scholar 

  34. Feige, E. (1989). The Underground Economies. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  35. Frank, O. (2005). Network Sampling and Model Fitting. In P. Carrington, J. Scott, & S. Wasserman (Eds.), Models and Methods in Social Network Analysis. Cambridge: Cambridge University Press.

    Google Scholar 

  36. Garcia, D. (2011). Disarmament Diplomacy and Human Security: Norms, Regimes and Moral Progress in International Relations. New York: Routledge.

    Google Scholar 

  37. Gerasev, M., & Surikov, V. (1997). The Crisis in the Russian Defense Industry: Implications for Arms Exports. In A. Pierre & D. Trenin (Eds.), Russia in the World Arms Trade. Carnegie Endowment for International Peace: Washington, D.C.

    Google Scholar 

  38. Glatz, A., & Lumpe, L. (2007). Probing the Grey Area: Irresponsible Small Arms Transfers. In Small Arms Survey 2007: Guns and the City. Cambridge: Cambridge University Press.

  39. Granovetter, M. (1985). Economic Action and Social Structure: The Problem of Embeddedness. American Journal of Sociology, 91, 481–510.

    Article  Google Scholar 

  40. Greene, O. (2000). International Responses to Illicit Arms Trafficking. Crime, Law, and Social Change, 33, 151–190.

    Article  Google Scholar 

  41. Greene, O., & Penetrante, A. (2011). Arms, Private Militias and Fragile State Dynamics. In O. Greene & N. Marsh (Eds.), Small Arms, Crime, and Conflict: Global Governance and the Threat of Armed Violence. London: Routledge.

    Google Scholar 

  42. Hafner-Burton, E., Kahler, M., & Montgomery, A. (2009). Network Analysis for International Relations. International Organization, 63, 559–592.

    Article  Google Scholar 

  43. Hämmerli, A., Gattiker, R., & Wayermann, R. (2006). Conflict and Cooperation in an Actors’ Network of Chechnya Based Events Data. Journal of Conflict Resolution, 50, 159–175.

    Article  Google Scholar 

  44. Holloway, D., & McFaul, M. (1995). Demilitarization and Defense Conversion. In G. Lapidus (Ed.), The New Russia: Troubled Transformation. Boulder, Colo: Westview.

    Google Scholar 

  45. Jackson, T. (2010). From Under Their Noses: Rebel Groups’ Arms Acquisition and the Importance of Leakages from State Stockpiles. International Studies Perspectives, 11, 131–147.

    Article  Google Scholar 

  46. Kahler, M. (2009). Networked Politics: Agency, Power, and Governance. In M. Kahler (Ed.), Networked Politics: Agency, Power, and Governance. Ithaca, N.Y.: Cornell University Press.

    Google Scholar 

  47. Kenney, M. (2007). From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park: Pennsylvania State University Press.

    Google Scholar 

  48. Kenney, M. (2009). Turning to the ‘Dark Side’: Coordination, Exchange, and Learning in Criminal Networks. In M. Kahler (Ed.), Networked Politics: Agency, Power, and Governance. Ithaca, N.Y.: Cornell University Press.

    Google Scholar 

  49. Kinsella, D. (2008). Illicit Arms Transfers Database: Coding Manual. available at <web.pdx.edu/~kinsella/iatcode.pdf>.

  50. Kiss, J. (2010). Craft Production of Small Arms. Background paper. Geneva: Small Arms Survey.

    Google Scholar 

  51. Kleemans, E., & van de Bunt, H. (1999). The Social Embeddedness of Organized Crime. Transnational Organized Crime, 5, 19–36.

    Article  Google Scholar 

  52. Klerks, P. (2001). The Network Paradigm Applied to Criminal Organisations: Theoretical Nitpicking or a Relevant Doctrine for Investigators? Recent Development in the Netherlands. Connections, 24, 53–65.

  53. Koschade, S. (2006). A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence. Studies in Conflict and Terrorism, 29, 559–575.

    Article  Google Scholar 

  54. Krebs, V. (2002). Mapping Networks of Terrorist Cells. Connections, 24, 43–52.

    Google Scholar 

  55. Ledeneva, A. (1998). Russia’s Economy of Favours: Blat, Networking and Informal Exchange. Cambridge: Cambridge University Press.

    Google Scholar 

  56. Markowski, S., Koorley, S., Hall, P., & Brauer, J. (2009). Multi-Channel Supply Chains for Illicit Small Arms. Defence and Peace Economics, 20, 171–191.

    Article  Google Scholar 

  57. Marsh, N. (2002). Two Sides of the Same Coin? The Legal and Illegal Trade in Small Arms. Brown Journal of World Affairs, 9, 217–228.

    Google Scholar 

  58. Marsh, N. (2007). Conflict Specific Capital: The Role of Weapons Acquisition in Civil War. International Studies Perspectives, 8, 54–72.

    Article  Google Scholar 

  59. Milward, H., & Raab, J. (2006). Dark Networks as Organizational Problems: Elements of a Theory. International Public Management Journal, 9, 333–360.

    Article  Google Scholar 

  60. Montgomery, A. (2008). Proliferation Networks in Theory and Practice. In J. Russell & J. Wirtz (Eds.), Globalization and WMD Proliferation: Terrorism, Transnational Networks, and International Security. London: Routledge.

    Google Scholar 

  61. Moore, M. (2010). Arming the Embargoed: A Supply-Side Understanding of Arms Embargo Violations. Journal of Conflict Resolution, 45, 593–615.

    Article  Google Scholar 

  62. Morselli, C., Giguère, C., & Petit, K. (2006). The Efficiency-Security Trade-off in Criminal Networks. Social Networks, 29, 143–153.

    Article  Google Scholar 

  63. Murji, K. (2007). Hierarchies, Markets and Networks: Ethnicity/Race and Drug Distribution. Journal of Drug Issues, 37, 781–804.

    Article  Google Scholar 

  64. Nardo, M. (2011). Economic Crime and Illegal Markets Integration: A Platform for Analysis. Journal of Financial Crime, 18, 47–62.

    Article  Google Scholar 

  65. Naylor, R. (2004). Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy (revisedth ed.). Ithaca, N.Y.: Cornell University Press.

    Google Scholar 

  66. Paul, C., & Wilhite, A. (1994). Illegal Markets and the Social Costs of Rent-Seeking. Public Choice, 79, 105–115.

    Article  Google Scholar 

  67. Perliger, A., & Pedahzur, A. (2011). Social Network Analysis in the Study of Terrorism and Political Violence. PS: Political Science and Politics, 44, 45–50.

    Google Scholar 

  68. Phythian, M. (2000). The Illicit Arms Trade: Cold War and Post-Cold War. Crime, Law and Social Change, 33, 1–52.

    Article  Google Scholar 

  69. Podolny, J., & Page, K. (1998). Network Forms of Organization. Annual Review of Sociology, 24, 57–76.

    Article  Google Scholar 

  70. Portes, A. (1998). Social Capital: Its Origins and Applications in Modern Sociology. Annual Review of Sociology, 24, 1–24.

    Article  Google Scholar 

  71. Powell, W. (1990). Neither Market nor Hierarchy: Network Forms of Organization. Research in Organizational Behavior, 12, 295–336.

    Google Scholar 

  72. Putnam, R. (2000). Bowling Alone: The Collapse and Revival of American Community. New York: Simon and Schuster.

    Google Scholar 

  73. Raab, J., & Milward, H. (2003). Dark Networks as Problems. Journal of Public Administration Research and Theory, 13, 413–439.

    Article  Google Scholar 

  74. Roslycky, L. (2009). Organized Transnational Crime in the Black Sea Region: A Geopolitical Dilemma? Trends in Organized Crime, 12, 21–29.

    Article  Google Scholar 

  75. Rothenberg, R. (1995). Commentary: Sampling in Social Networks. Connections, 18, 104–110.

    Google Scholar 

  76. Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.

    Book  Google Scholar 

  77. Shelley, L. (2003). Russia and Ukraine: Transition or Tragedy? In R. Godson (Ed.), Menace to Society: Political-Criminal Collaboration Around the World. London: Transaction.

  78. Stohl, R., Schroeder, M., & Smith, D. (2009). The Small Arms Trade. Oxford: Oneworld.

    Google Scholar 

  79. Strakes, J. (2008). Illicit Arms Transfers: Linking Weapons Characteristics and Strategic Applications. Defense and Security Analysis, 24, 61–64.

  80. Thompson, G. (2003). Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization. Oxford: Oxford University Press.

    Book  Google Scholar 

  81. Turbiville, G. (1995). Mafia in Uniform: The Criminalization of the Russian Armed Forces. Fort Leavenworth, Kan.: Foreign Military Studies Office, 1995.

  82. Turbiville, G. (1996). Weapons Proliferation and Organized Crime: The Russian Military Dimensions. Airpower Journal, 10 (special edition), 17–24.

  83. United Nations Institute for Disarmament Research. (2006). Developing a Mechanism to Prevent Illicit Brokering in Small Arms and Light Weapons: Scope and Implications. Geneva: United Nations.

    Google Scholar 

  84. United States Department of Defense. (2007). Army-Marine Corps Counterinsurgency Field Manual. Chicago: University of Chicago Press.

    Book  Google Scholar 

  85. Von Lampe, K., & Johansen, P. (2004). Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks. Global Crime, 6, 159–184.

    Article  Google Scholar 

  86. Williamson, O. (1981). The Economics of Organization: The Transaction Cost Approach. American Journal of Sociology, 87, 548–77.

    Article  Google Scholar 

  87. Williamson, O. (1996). Mechanisms of Governance. Oxford: Oxford University Press.

    Google Scholar 

  88. Wood, B., & Peleman, J. (1999). The Arms Fixers: Controlling the Brokers and Shipping Agents. Oslo: International Peace Research Institute.

    Google Scholar 

  89. Woolcock, M. (2001). The Place of Social Capital in Understanding Social and Economic Outcomes. Canadian Journal of Policy Research, 2, 11–17.

    Google Scholar 

  90. Wrong, D. (1961). The Oversocialized Conception of Man in Modern Sociology. American Sociological Review, 26, 183–193.

    Article  Google Scholar 

Download references

Acknowledgements

An earlier version of this article was presented at the workshop, “The New Power Politics: Networks, Governance, and Global Security,” at the Sié Chéou-Kang Center for International Security and Diplomacy, Josef Korbel School of International Studies, University of Denver, 1-2 March 2013. My thanks to Nicholas Marsh and David Isenberg for supplying the reports contained in NISAT’s Black Market Archives, and to Deborah Avant, Erica Chenoweth, Oliver Westerwinter, and other workshop participants for comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Kinsella.

Appendix: Coding Example

Appendix: Coding Example

Coding text-based accounts of illicit arms transfers is a labor intensive task. Researchers have made considerable progress in the development of automated coding algorithms for the creation of events data in other areas of international relations research, which has drastically reduced the time and labor required to generate reliable data suitable for analysis. However, descriptions of arms-transfer events are typically too complex to parse with the software available at this time. But as further progress is made on the machine coding of international events, new opportunities may become available for automated coding of these events as well.

What follows is an example of an article appearing in NISAT’s Black Market File Archive, and descriptors for two arms-transfer events identified from this account and entered into the IATD. The article is from Haarretz, the Israeli daily, and was distributed by the U.S. government’s Foreign Broadcast Information Service (FBIS).

figure a
figure b

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kinsella, D. Illicit arms transfers to Africa and the prominence of the former Soviet bloc: a social network analysis. Crime Law Soc Change 62, 523–547 (2014). https://doi.org/10.1007/s10611-014-9531-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-014-9531-9

Keywords

Navigation