Abstract
Small arms and light weapons are the primary causes of death in the violent conflicts raging today. Although the small arms trade is difficult to track, and the illicit trade doubly so, a wealth of information is available. This article applies some basic tools of social network analysis (SNA) to reveal the high profile of former Soviet bloc countries in the illicit arms trade with Africa. I set up this analysis with a discussion of the features of social networks that allow them to facilitate the transfer of illicit weaponry, and follow the presentation of my findings with some explanations for the prominence of Russia and other post-communist countries in this trade. My discussion focuses on the importance of relationships, their quantity and quality, as providing opportunities for, and constraints on, the flow of material and social resources between the actors and locales that comprise the illicit arms trade network. I also highlight the extent to which the positions of key players may account for their power within the network and their roles in security governance, which in the illicit context requires the maintenance of secrecy and redundancy.
Similar content being viewed by others
Notes
This discussion follows [56].
The Iran-Contra affair involved the Reagan administration’s covert and illegal sale of arms to Iran, which was subject to a U.S. arms embargo by virtue of the country’s designation as a state sponsor of terrorism. Relevant international law may include the Friendly Relations Declaration (UN General Assembly Resolution 2625, October 1970), which asserts that “no State shall organize, assist, foment, finance, incite or tolerate subversive, terrorist or armed activities directed towards the violent overthrow of the regime of another State, or interfere in civil strife in another State.” The Arms Trade Treaty, adopted by the UN General Assembly in 2013, but not yet in force, sets the bar higher, prohibiting arms transfers if the supplying government has reason to believe that “the arms or items would be used in the commission of genocide, crimes against humanity, grave breaches of the Geneva Conventions of 1949, attacks directed against civilian objects or civilians protected as such, or other war crimes.” Neither instrument singles out illicit arms transfers, though. The Illicit Firearms Protocol to the Convention against Transnational Organized Crime, adopted by the UN General Assembly in 2001, does not itself prohibit illicit arms transfers, but directs state parties to adopt legislation criminalizing illicit arms manufacturing and trafficking.
For a skeptical view, see [63]
Economic theories of rebellion posit similar social dynamics. See, for example, [23].
For a discussion of the disadvantages these organizations face, see [29].
The figures and analysis discussed in the following paragraphs were generated from the raw data assembled by Curwen [24].
These results are available upon request.
Dealers are those middlemen who buy and sell the arms, in effect taking temporary ownership of the weapons along the way. Brokers are those who facilitate the arms deals. They bring parties together, perhaps helping with financing, and they usually profit from their brokerage, but they do not take possession or ownership of the arms shipment in route. Shipping agents are those who help arrange transportation of the arms, but who do not do the actual shipping. See [88].
Here, “exporter” means the state locale serving as the starting point for a shipment of illicit weaponry arriving in an African country, not necessarily the country that manufactured the weaponry. Also, I am using the terms “prominent” and “central” to describe state locales that served a starting points for shipments of arms to the largest number of the other countries, not necessarily starting points for the largest volume of transferred weaponry. However, I suspect that there is a correlation.
Viktor Bout is a good example, although certainly not representative in terms of business acumen and success. Bout served as an officer in the Soviet Armed Forces—different sources place him in the Air Forces, military intelligence (the GRU), and the KGB (unlikely)—and, after being discharged at the end of the cold war, got his start in arms trafficking by acquiring transport planes. [33]
References
Abraham, I., & van Schendel, W. (2005). The Making of Illicitness. In W. van Schendel & I. Abraham (Eds.), Illicit Flow and Criminal Things: States, Borders, and the Other Side of Globalization. Bloomington: Indiana University Press.
Anthony, I. (1998). Illicit Arms Transfers. In I. Anthony (Ed.), Russia and the Arms Trade. Oxford: Oxford University Press.
Arlacchi, P. (1998). Some Observations on Illegal Markets. In V. Ruggiero, N. South, & I. Taylor (Eds.), The New European Criminology: Crime and Social Order in Europe. London: Routledge.
Arsovska, J., & Kostakos, P. (2008). Illicit Arms Trafficking and the Limits of Rational Choice Theory: The Case of the Balkans. Trends in Organized Crime, 11, 352–378.
Avant, D., & Westerwinter, O. (2013). “The New Power Politics: Networks and Global Security Governance”, typescript.
Bakker, R., Raab, J., & Milward, H. (2012). Preliminary Theory of Dark Network Resilience. Journal of Policy Analysis and Management, 31, 33–62.
Barabási, A., & Albert, R. (1999). Emergence of Scaling in Random Networks. Science, 286, 509–512.
Barabási, A., & Bonabeau, E. (2003). Scale-Free Networks. Scientific American, 288, 60–69.
Beckert, J., & Wehinger, F. (2013). In the Shadow: Illegal Markets and Economic Sociology. Socio-Economic Review, 11, 5–30.
Beije, P., & Groenewegen, J. (1992). A Network Analysis of Markets. Journal of Economic Issues, 26, 87–114.
Berman, E., & Leff, J. (2008). Light Weapons: Products, Producers, and Proliferation. In In Small Arms Survey 2008: Risk and Resilience. Cambridge: Cambridge University Press.
Berryman, J. (2000). Russia and the Illicit Arms Trade. Crime, Law and Social Change, 33, 85–104.
Bourdieu, P. (1986). The Forms of Capital. In J. Richardson (Ed.), Handbook of Theory and Research for the Sociology of Education. Westport, Conn: Greenwood.
Bourne, M. (2007). Arming Conflict: The Proliferation of Small Arms. New York: Palgrave Macmillan.
Bradach, J., & Eccles, R. (1989). Price, Authority, and Trust: From Ideal Types to Plural Forms. Annual Review of Sociology, 15, 97–118.
Bromley, M., Dermody, L., Griffiths, H., Holtom, P., & Jenks, M. (2013). Transfers of Small Arms and Light Weapons to Fragile States: Strengthening Oversight and Control. SIPRI Insights on Peace and Security, no. 2013/1, available at < books.sipri.org/product_info?c_product_id = 453 > .
Bruinsma, G., & Bernasco, W. (2004). Criminal Groups and Transnational Illegal Markets: A More Detailed Examination on the Basis of Social Network Theory. Crime, Law, and Social Change, 41, 79–94.
Cattaneo, S. (2004). Targeting the Middlemen: Controlling Brokering Activities. In In Small Arms Survey 2004: Rights at Risk. Cambridge: Cambridge University Press.
Cheloukhine, S. (2008). The Roots of Russian Organized Crime: From Old-fashioned Professionals to the Organized Criminal Groups of Today. Crime, Law and Social Change, 50, 353–374.
Coase, R. (1937). The Nature of the Firm. Economica, 4, 386–405.
Coase, R. (1960). The Problem of Social Costs. Journal of Law and Economics, 3, 1–44.
Coleman, J. (1988). Social Capital in the Creation of Human Capital. American Journal of Sociology, 94 (supplement), S95-S120.
Collier, P. (2000). Rebellion as a Quasi-Criminal Activity. Journal of Conflict Resolution, 44, 839–853.
Curwen, P. (2007). The Social Networks of Small Arms Proliferation: Mapping an Aviation Enabled Supply Chain. Naval Postgraduate School: Master’s thesis.
De Soysa, I., Jackson, T., & Ormhaug, C. (2009). Does Globalization Profit the Small Arms Bazaar? International Interactions, 35, 86–105.
DellaVigna, S., & La Ferrara, E. (2010). Detecting Illegal Arms Trade. American Economic Journal: Economic Policy, 2, 26–57.
Dreyfus, P., Marsh, N., Schroeder, M., & Lazarevic, J. (2009). Sifting the Sources Authorized Small Arms Transfers. In Small Arms Survey 2009: Shadows of War. Cambridge. Cambridge: Cambridge University Press.
Efrat, A. (2010). Toward Internationally Regulated Goods: Controlling the Trade in Small Arms and Light Weapons. International Organization, 64, 97–131.
Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think. International Security, 33, 7–44.
Enders, W., & Su, X. (2007). Rational Terrorists and Optimal Network Structure. Journal of Conflict Resolution, 51, 33–57.
Erickson, J. (2013). Market Imperative Meets Normative Power: Human Rights and European Arms Transfer Policy. European Journal of International Relations, 19, 209–234.
Erickson, J. (2013). Stopping the Legal Flow of Weapons: Compliance with Arms Embargoes, 1981-2004. Journal of Peace Research, 50, 159–174.
Farah, D., & Braun, S. (2007). Merchant of Death: Money, Guns, Planes, and the Man Who Makes War Possible. Hoboken, N.J.: John Wiley and Sons.
Feige, E. (1989). The Underground Economies. Cambridge: Cambridge University Press.
Frank, O. (2005). Network Sampling and Model Fitting. In P. Carrington, J. Scott, & S. Wasserman (Eds.), Models and Methods in Social Network Analysis. Cambridge: Cambridge University Press.
Garcia, D. (2011). Disarmament Diplomacy and Human Security: Norms, Regimes and Moral Progress in International Relations. New York: Routledge.
Gerasev, M., & Surikov, V. (1997). The Crisis in the Russian Defense Industry: Implications for Arms Exports. In A. Pierre & D. Trenin (Eds.), Russia in the World Arms Trade. Carnegie Endowment for International Peace: Washington, D.C.
Glatz, A., & Lumpe, L. (2007). Probing the Grey Area: Irresponsible Small Arms Transfers. In Small Arms Survey 2007: Guns and the City. Cambridge: Cambridge University Press.
Granovetter, M. (1985). Economic Action and Social Structure: The Problem of Embeddedness. American Journal of Sociology, 91, 481–510.
Greene, O. (2000). International Responses to Illicit Arms Trafficking. Crime, Law, and Social Change, 33, 151–190.
Greene, O., & Penetrante, A. (2011). Arms, Private Militias and Fragile State Dynamics. In O. Greene & N. Marsh (Eds.), Small Arms, Crime, and Conflict: Global Governance and the Threat of Armed Violence. London: Routledge.
Hafner-Burton, E., Kahler, M., & Montgomery, A. (2009). Network Analysis for International Relations. International Organization, 63, 559–592.
Hämmerli, A., Gattiker, R., & Wayermann, R. (2006). Conflict and Cooperation in an Actors’ Network of Chechnya Based Events Data. Journal of Conflict Resolution, 50, 159–175.
Holloway, D., & McFaul, M. (1995). Demilitarization and Defense Conversion. In G. Lapidus (Ed.), The New Russia: Troubled Transformation. Boulder, Colo: Westview.
Jackson, T. (2010). From Under Their Noses: Rebel Groups’ Arms Acquisition and the Importance of Leakages from State Stockpiles. International Studies Perspectives, 11, 131–147.
Kahler, M. (2009). Networked Politics: Agency, Power, and Governance. In M. Kahler (Ed.), Networked Politics: Agency, Power, and Governance. Ithaca, N.Y.: Cornell University Press.
Kenney, M. (2007). From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park: Pennsylvania State University Press.
Kenney, M. (2009). Turning to the ‘Dark Side’: Coordination, Exchange, and Learning in Criminal Networks. In M. Kahler (Ed.), Networked Politics: Agency, Power, and Governance. Ithaca, N.Y.: Cornell University Press.
Kinsella, D. (2008). Illicit Arms Transfers Database: Coding Manual. available at <web.pdx.edu/~kinsella/iatcode.pdf>.
Kiss, J. (2010). Craft Production of Small Arms. Background paper. Geneva: Small Arms Survey.
Kleemans, E., & van de Bunt, H. (1999). The Social Embeddedness of Organized Crime. Transnational Organized Crime, 5, 19–36.
Klerks, P. (2001). The Network Paradigm Applied to Criminal Organisations: Theoretical Nitpicking or a Relevant Doctrine for Investigators? Recent Development in the Netherlands. Connections, 24, 53–65.
Koschade, S. (2006). A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence. Studies in Conflict and Terrorism, 29, 559–575.
Krebs, V. (2002). Mapping Networks of Terrorist Cells. Connections, 24, 43–52.
Ledeneva, A. (1998). Russia’s Economy of Favours: Blat, Networking and Informal Exchange. Cambridge: Cambridge University Press.
Markowski, S., Koorley, S., Hall, P., & Brauer, J. (2009). Multi-Channel Supply Chains for Illicit Small Arms. Defence and Peace Economics, 20, 171–191.
Marsh, N. (2002). Two Sides of the Same Coin? The Legal and Illegal Trade in Small Arms. Brown Journal of World Affairs, 9, 217–228.
Marsh, N. (2007). Conflict Specific Capital: The Role of Weapons Acquisition in Civil War. International Studies Perspectives, 8, 54–72.
Milward, H., & Raab, J. (2006). Dark Networks as Organizational Problems: Elements of a Theory. International Public Management Journal, 9, 333–360.
Montgomery, A. (2008). Proliferation Networks in Theory and Practice. In J. Russell & J. Wirtz (Eds.), Globalization and WMD Proliferation: Terrorism, Transnational Networks, and International Security. London: Routledge.
Moore, M. (2010). Arming the Embargoed: A Supply-Side Understanding of Arms Embargo Violations. Journal of Conflict Resolution, 45, 593–615.
Morselli, C., Giguère, C., & Petit, K. (2006). The Efficiency-Security Trade-off in Criminal Networks. Social Networks, 29, 143–153.
Murji, K. (2007). Hierarchies, Markets and Networks: Ethnicity/Race and Drug Distribution. Journal of Drug Issues, 37, 781–804.
Nardo, M. (2011). Economic Crime and Illegal Markets Integration: A Platform for Analysis. Journal of Financial Crime, 18, 47–62.
Naylor, R. (2004). Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy (revisedth ed.). Ithaca, N.Y.: Cornell University Press.
Paul, C., & Wilhite, A. (1994). Illegal Markets and the Social Costs of Rent-Seeking. Public Choice, 79, 105–115.
Perliger, A., & Pedahzur, A. (2011). Social Network Analysis in the Study of Terrorism and Political Violence. PS: Political Science and Politics, 44, 45–50.
Phythian, M. (2000). The Illicit Arms Trade: Cold War and Post-Cold War. Crime, Law and Social Change, 33, 1–52.
Podolny, J., & Page, K. (1998). Network Forms of Organization. Annual Review of Sociology, 24, 57–76.
Portes, A. (1998). Social Capital: Its Origins and Applications in Modern Sociology. Annual Review of Sociology, 24, 1–24.
Powell, W. (1990). Neither Market nor Hierarchy: Network Forms of Organization. Research in Organizational Behavior, 12, 295–336.
Putnam, R. (2000). Bowling Alone: The Collapse and Revival of American Community. New York: Simon and Schuster.
Raab, J., & Milward, H. (2003). Dark Networks as Problems. Journal of Public Administration Research and Theory, 13, 413–439.
Roslycky, L. (2009). Organized Transnational Crime in the Black Sea Region: A Geopolitical Dilemma? Trends in Organized Crime, 12, 21–29.
Rothenberg, R. (1995). Commentary: Sampling in Social Networks. Connections, 18, 104–110.
Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.
Shelley, L. (2003). Russia and Ukraine: Transition or Tragedy? In R. Godson (Ed.), Menace to Society: Political-Criminal Collaboration Around the World. London: Transaction.
Stohl, R., Schroeder, M., & Smith, D. (2009). The Small Arms Trade. Oxford: Oneworld.
Strakes, J. (2008). Illicit Arms Transfers: Linking Weapons Characteristics and Strategic Applications. Defense and Security Analysis, 24, 61–64.
Thompson, G. (2003). Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization. Oxford: Oxford University Press.
Turbiville, G. (1995). Mafia in Uniform: The Criminalization of the Russian Armed Forces. Fort Leavenworth, Kan.: Foreign Military Studies Office, 1995.
Turbiville, G. (1996). Weapons Proliferation and Organized Crime: The Russian Military Dimensions. Airpower Journal, 10 (special edition), 17–24.
United Nations Institute for Disarmament Research. (2006). Developing a Mechanism to Prevent Illicit Brokering in Small Arms and Light Weapons: Scope and Implications. Geneva: United Nations.
United States Department of Defense. (2007). Army-Marine Corps Counterinsurgency Field Manual. Chicago: University of Chicago Press.
Von Lampe, K., & Johansen, P. (2004). Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks. Global Crime, 6, 159–184.
Williamson, O. (1981). The Economics of Organization: The Transaction Cost Approach. American Journal of Sociology, 87, 548–77.
Williamson, O. (1996). Mechanisms of Governance. Oxford: Oxford University Press.
Wood, B., & Peleman, J. (1999). The Arms Fixers: Controlling the Brokers and Shipping Agents. Oslo: International Peace Research Institute.
Woolcock, M. (2001). The Place of Social Capital in Understanding Social and Economic Outcomes. Canadian Journal of Policy Research, 2, 11–17.
Wrong, D. (1961). The Oversocialized Conception of Man in Modern Sociology. American Sociological Review, 26, 183–193.
Acknowledgements
An earlier version of this article was presented at the workshop, “The New Power Politics: Networks, Governance, and Global Security,” at the Sié Chéou-Kang Center for International Security and Diplomacy, Josef Korbel School of International Studies, University of Denver, 1-2 March 2013. My thanks to Nicholas Marsh and David Isenberg for supplying the reports contained in NISAT’s Black Market Archives, and to Deborah Avant, Erica Chenoweth, Oliver Westerwinter, and other workshop participants for comments.
Author information
Authors and Affiliations
Corresponding author
Appendix: Coding Example
Appendix: Coding Example
Coding text-based accounts of illicit arms transfers is a labor intensive task. Researchers have made considerable progress in the development of automated coding algorithms for the creation of events data in other areas of international relations research, which has drastically reduced the time and labor required to generate reliable data suitable for analysis. However, descriptions of arms-transfer events are typically too complex to parse with the software available at this time. But as further progress is made on the machine coding of international events, new opportunities may become available for automated coding of these events as well.
What follows is an example of an article appearing in NISAT’s Black Market File Archive, and descriptors for two arms-transfer events identified from this account and entered into the IATD. The article is from Haarretz, the Israeli daily, and was distributed by the U.S. government’s Foreign Broadcast Information Service (FBIS).
Rights and permissions
About this article
Cite this article
Kinsella, D. Illicit arms transfers to Africa and the prominence of the former Soviet bloc: a social network analysis. Crime Law Soc Change 62, 523–547 (2014). https://doi.org/10.1007/s10611-014-9531-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10611-014-9531-9