You are on page 1of 16

No.

571 June 14, 2006


�������

Reappraising Nuclear Security Strategy

by Rensselaer Lee

Executive Summary

The danger posed by Russia’s inadequately complements existing programs while enabling
secured stocks of nuclear weapons and fissile authorities to do a better job of targeting and
material is a major national security concern for preventing proliferation damage, is needed to
the United States. Various cooperative U.S.- counter this threat. Various measures to
Russian programs aimed at securing nuclear strengthen nuclear security policy could include
material, weapons, and design intelligence have the use of “vulnerability profiles” of each
been mounted since the 1990s, but clever and Russian facility that handles weapons-usable
determined adversaries may be able to circum- nuclear materials and better collaboration with
vent or defeat the defenses that the United States Russian and other former Soviet security organi-
and its partners are attempting to put in place. zations. A comprehensive nuclear security strate-
U.S. programs are by their nature reactive: they gy must also focus more attention and resources
have long time horizons; they focus preeminent- on the demand side of the proliferation equa-
ly on the supply side of the problem; and they tion. The United States cannot conduct nonpro-
face serious technological limitations. Russia’s liferation work effectively without reference to
imperfect commitment to nonproliferation also adversaries’ programs for weapons of mass
undermines the effectiveness of U.S. nonprolifer- destruction and procurement aims. Ideally, U.S.
ation efforts. policy should embrace the concept of demand
There are no easy ways to close the nuclear reduction—influencing the motivations of adver-
proliferation window. A proactive and intelli- sary states and subnational groups so as to pre-
gence-based nuclear security policy, one that vent the spread of nuclear weapons capability.

_____________________________________________________________________________________________________
Rensselaer Lee is a senior fellow at the Foreign Policy Research Institute in Philadelphia and president of Global
Advisory Services in McLean, Virginia. He is the author of Smuggling Armageddon: The Nuclear Black
Market in the Former Soviet Union and Europe (St. Martin’s, 1998).
Various Introduction sponsors, Sens. Sam Nunn (D-GA) and Richard
cooperative U.S.- Lugar (R-IN). Nunn-Lugar, drafted as the USSR
In the years after the collapse of the Soviet was disintegrating, noted that the “profound
Russian programs Union, the apparent proliferation danger changes” under way there posed several types of
aimed at securing posed by Russia’s poorly secured stocks of threats: the dispersal of nuclear arms among
nuclear weapons and fissile material (collo- Soviet successor states; the seizure, theft, sale, or
nuclear material, quially “loose nukes”) emerged as a major use of nuclear weapons and their components;
weapons, and national security concern for the United and the transfer of weapons and related com-
design intelli- States. The evident nuclear ambitions of hos- ponents and expertise outside the territory of
tile states such as Iran and North Korea and the Soviet Union. The legislation’s main pro-
gence have been the terrifying prospect that al-Qaeda could grammatic focus was to secure and destroy
mounted since acquire nuclear weapons have accentuated nuclear and chemical weapons and to establish
the 1990s, but U.S. proliferation fears. Various cooperative “verifiable safeguards” against their prolifera-
U.S.-Russian programs aimed at securing tion; it appropriated $400 million for that pur-
such efforts fall nuclear material, weapons, and design intelli- pose and designated the Department of De-
short of an gence have been mounted since the 1990s, fense as the “executive agent” to spend those
but such efforts fall short of an effective finds.1
effective strategy strategy for proliferation prevention. Clever Over the years, the original Nunn-Lugar
for proliferation and determined adversaries may be able to concept expanded to include protection of
prevention. circumvent or defeat the defenses that the fissile materials, border and cargo monitor-
United States and its partners are attempting ing to interdict nuclear smuggling, reduction
to put in place. Inadequate funding may be of highly enriched uranium (HEU) and plu-
part of the problem, but there are other, more tonium stockpiles, and various programs to
fundamental problems, including the essen- rebuild or redirect the economic potential of
tially reactive nature of U.S. programs, their the former Soviet nuclear complex. New
long time horizon, their preeminently sup- bureaucratic players—the Department of
ply-side focus, and their technological limita- Energy and the Department of State—came
tions. An additional constraint is what some to share responsibility for the enlarged non-
observers view as Russia’s imperfect commit- proliferation effort. DOE funds and U.S.
ment to nonproliferation, reflected in its national weapons laboratories implement
cozy nuclear relations with Iran as well as a security upgrades for fissile materials, an
tendency of some Russian officials to down- effort now under way at more than 50 former
play the threat of nuclear theft. Soviet civilian and military sites. Programs
There are no easy ways to close the prolifer- sponsored by DOE and DOD are introduc-
ation window in Russia and the other states ing new protective regimes at some Russian
that were once part of the Soviet Union. This nuclear warhead sites. DOE, DOD, and State
paper recommends a more proactive and intel- all maintain different programs to counter
ligence-based nuclear security policy, one com- nuclear smuggling. DOE and State provide
plementing existing programs but enabling funding to stabilize employment for dis-
authorities better to target potential adver- placed nuclear workers and to prevent “brain
saries and prevent proliferation damage. drain.” As of the middle of this decade, the
United States was spending almost $1 billion
a year on overseas nuclear security and relat-
Evolution of U.S. Programs ed disarmament projects.2 Most of those
funds were directed toward Russia and other
The conceptual architecture of U.S. nonpro- newly independent states, but some recent
liferation policy originated in the Soviet DOE initiatives—such as installation of radi-
Nuclear Threat Reduction Act of 1991, also ation detectors at major shipping hubs
known as the Nunn-Lugar act after its main (“megaports”) and removal of HEU from

2
research reactor sites deemed vulnerable to Academy of Sciences report from 2005 cau-
theft—reach much farther afield. tiously concludes that “upgraded physical pro-
tection and accounting systems . . . may have
Measuring Effectiveness contributed to the reduced number of
Considerable dedication, ingenuity, and attempts to steal material.”5
scientific expertise have gone into crafting this Nevertheless, other significant factors,
welter of programs. Investment in them has unrelated to Nunn-Lugar, also may account
been substantial. DOE calculates that it spent for these trends. For example, the obvious
$1.5 billion from 1993 to early 2005 on its improving performance of the Russian econo-
Material Protection, Control and Accounting my—which has grown at a pace of 6.5 percent
program to secure fissile materials at the per year since 1998 and generated a federal
(mostly Russian) sites where they are stored. A budget surplus of $8.1 billion—has had a posi-
financial review concluded that the average tive effect on the livelihood of nuclear workers.
cost of securing a single kilogram of such That is significant because desperate economic
material amounted to $5,300 in fiscal year conditions at Russia’s nuclear enterprises were
2005.3 Likewise, outlays for nuclear interdic- a prime proliferation risk factor in the 1990s.
tion, export control, and anti-brain-drain ini- By 2002 the average monthly salary at nuclear
tiatives by DOE and other agencies have research and development facilities was $209,
The rebounding
exceeded $1 billion since 1993.4 well in excess of the Russian average of about Russian economy
Whether these efforts can successfully pre- $146. At one premier nuclear weapons design may have reduced
vent the migration of nuclear material and laboratory in Snezhinsk (Chelyabinsk-70)
expertise from Russia and the former Soviet salaries reached a relatively princely $262 in economic
republics (or have prevented them) is an open early 2003.6 By contrast, salaries at nuclear incentives for
question. U.S. agencies tend to rely on metrics facilities (excluding the power industry) had
of performance such as tons of fissile materials hovered well below the national average for
insiders to
or numbers of warheads protected by advanced much of the 1990s.7 Also, workers are now usu- steal and sell
safeguards, border posts equipped with ally paid on time. In 1996 the director of the dangerous
advanced radiation monitors, or weapons sci- Snezhinsk center, Vladimir Nechai, committed
entists relocated to civilian jobs. Measures of suicide, allegedly because of emotional stress materials.
effectiveness, such as major diversion threats relating to Snezhinsk’s inability to pay its
defeated by the new security features, are hard- workforce for more than five months.8 The
er to devise in the Russian context and are infre- rebounding economy may have reduced eco-
quently used by U.S. nuclear managers or by nomic incentives for insiders to steal and sell
nongovernmental organizations (NGOs) that dangerous materials, although other motiva-
track these programs. tions such as ideology might inspire would-be
To be sure, the consensus view holds that nuclear thieves.
nuclear security conditions in Russia have A second factor relates to the tightening
improved in recent years and infusions of U.S. of central government control over the
technology and equipment have played some nuclear complex via Russian security organs,
role in that change. There are some encourag- most notably the Federal Security Service
ing signs that validate this consensus. (FSB). Sources agree that the FSB has
Quantities of HEU and plutonium being become “omnipresent” in the nuclear sector,
offered for sale internationally, never volumi- restricting access to Russia’s formerly secret
nous, have diminished dramatically; in fact, no cities and to nuclear sites within them as well
such material has been reported seized since as increasing its formal presence within the
the early to mid-1990s. Similarly, Russian enterprises themselves. (According to one
atomic energy officials claim that cases of article, FSB representatives often preside as
attempted thefts of weapons-usable material “deputy directors of security” within the
have been declining in Russia. A National enterprises.)9 U.S. nuclear lab personnel tend

3
to view the heavy hand of the FSB as an fore, that the threat of criminal nuclear pro-
impediment to the progress of the MPC&A liferation has diminished, even while the visi-
program. “They tell us who can visit, how ble signs seem encouraging.
many, where, when, and for how long,” said
one lab official.10 Assessing the Threat
Yet it is possible to view the FSB controls in Although fears of catastrophic terrorism
a more positive light. Russian authorities told have grown in recent years, the shape of the
a visiting National Academy of Sciences dele- nuclear proliferation threat posed by leaky
gation in 2003 that three unsuccessful Russian stockpiles remains ill-defined and
attempts to steal fissile material had occurred somewhat hypothetical. Illicit sellers and buy-
since 1996, and each had been foiled by the ers of nuclear wares are assumed to exist, but
FSB.11 One episode is widely believed to have hard evidence of a true black market for such
occurred in 1998 at Snezhinsk (Chelyabinsk- items is sparse. Judging from seizure data, little
70) where work to introduce MPC&A systems nuclear material of significance and no nuclear
had been under way since 1995.12 Russia obvi- warheads circulate in international smuggling
ously has an interest in extolling the virtues of channels. Only about 20 of the hundreds of
its security forces, and cases in which thefts trafficking incidents recorded since the early
have been defeated or aborted at the source 1990s have featured HEU or plutonium, the
may owe just as much to the vigilance of explosive ingredients of nuclear weapons.14
human agents as to U.S-installed technologi- Moreover, the total amount seized did not add
cal safeguards. By the same token, MPC&A up to enough to make a single atomic bomb.
can serve as a check on possible corruption or More to the point, a General Accounting
incompetence within the security services, so Office study found that none of the cases in
human and technical components of a protec- which such material was proffered appeared to
tive regime ideally should function in tandem. be “part of an organized criminal or terrorist
Finally, although Russia’s nuclear security activity or organization.” Indeed, evidence of
posture has changed for the better, it remains connection to any bona fide buyer—whether a
less than fully mature, at least by U.S. stan- state seeking nuclear weapons, a terrorist
dards. The NAS study from 2005 observed agent, or a criminal entity—was lacking. Most
that, although reported incidents of attempt- of the episodes in question were sting opera-
ed theft had been declining in Russia, “there tions initiated by law enforcement or intelli-
is no basis for judging the actual number of gence agencies, effectively creating an artificial
unreported attempts or successful thefts.”13 market; in others perpetrators were trapped by
U.S. MPC&A experts with access to Russian security forces while looking for a buyer.15
sites generally have not attempted to collect Nonetheless, observed data from seizures
intelligence about current or past diversion and associated arrests may be unrepresentative
episodes in Russia’s nuclear complex. An of the wider universe of illegal nuclear deals,
Although apparent lack of activity may simply mean including sophisticated schemes that escape
that prospective thieves and smugglers have detection. As with other illicit commodities—
Russia’s nuclear become more proficient at neutralizing the drugs, for example—what is captured is just a
security posture new technological controls and circumvent- fraction of what is available for sale in the inter-
has changed for ing the security forces. Furthermore, as national marketplace. Underscoring this point,
Russia seeks expanded markets for legitimate then–CIA director Porter Goss informed
the better, it nuclear sales abroad (in Iran, for instance), Congress in December 2004 that “we [the intel-
remains less than nuclear insiders are more likely today than in ligence community] assess that undetected
the past to have developed international con- smuggling has occurred and we are concerned
fully mature, at tacts and relationships enabling them to con- about the total amount of material that could
least by U.S. nect with potential customers for illicit have been diverted or stolen in the past 13
standards. nuclear goods. We cannot conclude, there- years.”16 Significant proliferation episodes may

4
go unreported. Observers such as William a 2001 DOE report states that “Iran, among Former Soviet
Potter, director of the Center for Nonprolif- others, has tried to exploit Russia’s nuclear republics have
eration Studies at the Monterey Institute of security problems by attempting to acquire
International Studies, have commented on the fissile material.”19 Iran’s wide-ranging cooper- failed to report
failure of the former Soviet republics to report ation agreements with Russia in the nuclear nuclear
nuclear smuggling incidents for inclusion in sphere may have been a vehicle for those for-
the International Atomic Energy Agency’s traf- ays, though there is no direct evidence that
smuggling
ficking data base. He concludes that “we can- such is the case. incidents for
not exclude the possibility—I would say proba- Among nonstate actors, al-Qaeda is inclusion in the
bility—that additional diversion incidents have believed to have sought HEU (apparently
occurred but have been concealed by [authori- unsuccessfully) in various venues—Africa, International
ties in these states].”17 Western Europe, and the former Soviet Atomic Energy
Moreover, diversion events that authorities Union—since the early 1990s. Most experts Agency’s traffick-
admit to typically involve opportunistic thefts agree that a reasonably well funded terrorist
of small amounts of material by solitary group probably could muster the expertise ing data base.
nuclear workers. The perpetrators then search and facilities needed to fashion a rudimentary
for a buyer, often with the help of local petty nuclear device but that the main sticking
criminals, who in turn are apprehended by point is getting the requisite quantities of
police. Yet hints that this may inaccurately nuclear material.20 Unlike nation-states, ter-
reflect smuggling realities have surfaced in rorists cannot leverage official contacts and
Russian media. For example, in 1998 Russia’s exchanges in the nuclear realm to advance
FSB reportedly foiled an attempt by “staff their military procurement objectives. Their
members” of a Chelyabinsk nuclear facility (by best option probably would be to form a liai-
all indications Chelyabinsk-70) to steal 18.5 son with a local criminal or ideological group
kilograms of HEU, almost enough for an that has connections to nuclear facilities and
atomic bomb. The episode was later con- cross-border smuggling capabilities. Reports
firmed by a spokesman for Russia’s atomic that al-Qaeda has sought assistance from
energy ministry.18 The reports did not divulge Chechen criminals and the Islamic Movement
where the material was headed, or who the of Uzbekistan in its pursuit of a nuclear capa-
prospective customers were. Also unclear is bility would seem to corroborate this pattern.
whether the theft was an isolated case or a sin- For example, a November 1998 report in the
gle failure in a string of successful diversions Paris-based Arabic newspaper Al-Watan Al-
by facility insiders. Arabi asserts that al-Qaeda concluded a deal
Likewise, on the demand side, the elusive- with the “Chechen mafia” to buy 20 tactical
ness of buyers in known nuclear smuggling nuclear weapons for $30 million and two tons
cases should not be cause for complacency. We of Afghan opium. Most observers doubt that
can be fairly certain from intelligence report- the transaction actually took place or that the
ing, media accounts, and other sources that a Chechens have any such weapons to sell. Yet
handful of nation-states and subnational contacts between al-Qaeda and the Chechen
groups are “in the market” for stolen nuclear resistance are extensive, and discussions about
materials. States are likely to place a premium acquiring nuclear weapons or materials could
on self-reliance in nuclear development—wit- well have occurred. According to terrorism
ness Iran’s high-profile enrichment program— expert Michael Scheuer, former head of the
but that does not preclude a state from shop- Osama bin Laden unit at the CIA, the account
ping for fissile materials to shorten the time has “the ring of plausibility, perhaps even
frame for building a bomb. Over the years, echoes of truth.”21
Iran, Iraq, and North Korea reportedly have The prospect that terrorist groups could
tried to purchase materials for a nuclear obtain finished nuclear weapons from sources
bomb, though details are murky. For example, in Russia or elsewhere is indeed frightening.

5
To be sure, a general consensus exists among Soviet Union, managed by corrupt elements
U.S. nuclear scientists and intelligence experts within the nuclear establishments of Russia
that Russian nuclear weapons are substantial- and other newly independent states.
ly more secure than are their fissile material
counterparts. There is no evidence that intact
nuclear weapons have been stolen, or have Washington’s Response
gone missing. Alexander Lebed’s well-publi-
cized assertions of missing “suitcase weapons” Washington’s efforts to counter these
have been denied by officials in Russia, the threats have focused largely on strengthening
IAEA, and the United States.22 Even if Lebed’s security at nuclear facilities, deploying techno-
claims were true, such weapons would not logical monitoring equipment at key border
have been armed. In the case of an intact crossings, and checking the dissemination of
weapon, a terrorist’s main challenge would be militarily significant nuclear know-how.
to bypass the multiple arming and fail-safe Those efforts are comprehensive in scope, yet
codes (permissive action links or PALs) their programmatic components add up to
designed to prevent detonation by unautho- just a partial defense against the spread of
rized persons. Nevertheless, theft of a nuclear nuclear weapons capability. U.S. programs
The notorious weapon remains a theoretical possibility, and suffer from technical and physical limitations
marketing some specialists believe that terrorists, rather that clever adversaries can easily exploit.
network than try to circumvent the PALs, would simply Finally, cases of deliberate “state-sponsored”
cut open the weapon casing and fashion their proliferation would appear to be beyond the
established by own bomb from the component parts.23 capability of the new systems to prevent, since
Pakistani scientist Furthermore, purveyors of strategic the programs and systems are based on the
nuclear goods may converge with end users or presumption that states wish to keep their
A. Q. Khan their representatives in ways not readily appar- nuclear assets under control. A very different
demonstrates that ent to Western intelligence or security services. set of tools is needed to deal with deliberate
a functioning The prime modern example of a clandestine weapons or materials transfers. Diplomacy,
supply chain or shadow market in the nuclear deterrence, and economic sanctions are appro-
nuclear black realm is the notorious marketing network priate tools for modifying a country’s behavior
market can established by Pakistani scientist A. Q. Khan, in such circumstances.
persist for years the father of Pakistan’s nuclear bomb. For sev- Limitations are apparent in DOE’s MPC&A
eral years beginning in the late 1980s, Khan program, which many people consider the
without being sold key components of a nuclear weapons nation’s first line of defense against the prolif-
detected by program—mainly uranium enrichment tech- eration threat posed by insecure Russian stock-
nology and hardware—to Iran, North Korea, piles. Sources of strategic nuclear items “are rel-
international and Libya. Libya, which later renounced atively few in number compared with the many
watchdogs. nuclear weapons, also received from Khan potential points of transit across national bor-
blueprints for building a Chinese-type implo- ders and are protected by state-run security
sion nuclear device (similar in design to infrastructures,” a 2002 report by the National
Pakistan’s). Khan’s operation finally unrav- Academy of Sciences concluded.25 Nonprolif-
eled in early 2004 but not before significant eration specialists such as Harvard’s Graham
transfers of centrifuge designs and equipment Allison believe it possible to lock down all
had already occurred.24 The lesson here is that weapons and fissile material to a Fort Knox–
a functioning nuclear black market can persist type gold standard of infallibility to the point
for years without being detected by interna- where leakage or disappearances of signifi-
tional watchdogs. Indeed, a Khan-type net- cance are impossible.26
work dedicated to covert sales of fissile materi- Yet such a gold standard may be impracti-
als and weapons know-how conceivably could cal, given the large number of facilities that
take shape on the territory of the former house nuclear material.27 Another major

6
impediment is the complexity and unpre- MPC&A responsibilities to Russia by the year
dictability of the human element. Nonprolif- 2013. Accordingly, DOE has asked for almost
eration advocates increasingly emphasize the $50 million in FY07, nearly twice the FY06
cultural determinants of technology transfer level, to support a National Program and
in the nuclear realm. As Laura Holgate, vice- Sustainability Initiative under MPC&A that
president of the Nuclear Threat Initiative, incorporates aspects of the security culture
notes, “The perceptions, judgments and concept including management plans, oper-
actions of human beings, individually and in ating procedures, and human resource pro-
groups, are what make the difference in grams.31 But training nuclear workers to
nuclear security.” Reports from Russian facili- obey norms and follow established proce-
ties of vault doors propped open and insou- dures is not quite the same as deterring cor-
ciant guards who “shut down alarm systems rupt acts by criminally inclined insiders,
to avoid the annoyance of frequent false although admittedly some overlap exists.
alarms” seem to exemplify the weak points of The various U.S. programs for technolog-
Russia’s nuclear security culture.28 ical monitoring of people and cargo at key
Even when used properly, the new hard- border and transit points face even more
ware and software being deployed are not fail- daunting challenges. Russia’s 12,500-mile
safe. The systems probably are effective against border with its neighbors is simply too long
opportunistic theft attempts, which were fair- to monitor effectively. Smugglers won’t nec-
ly common in Russia in the early to mid- essarily opt to move their wares through cus-
1990s. But today’s main threat at the facility toms posts equipped with radiation detec-
level comes, not from disgruntled solo players, tors, and detectors themselves are subject to
but from conspiracies of well-placed insiders all the vulnerabilities associated with corrup-
able to shut down alarms, bribe guards, and tion: they can be turned off, bypassed, or sim-
alter relevant paperwork. Russian and U.S. ply ignored. A further significant problem is
experts agree that at most Russian nuclear that most of the equipment being installed at
enterprises the cooperation of just four to five borders is not sufficiently sensitive to detect
individuals is required to pull off a successful well-shielded fissile material. This is especial-
diversion scheme.29 Thefts organized by senior ly the case with HEU, which has a weak neu-
managers are probably the most serious tron signature and is not very radioactive.32
threat. Managers know precisely the sequence HEU is the material most likely to be sought
of steps required to remove the desired mater- by terrorists, because a gun-type device using
ial while minimizing the risk of detection. In a substantial quantities of that material is eas-
well-publicized case at the Mayak Production ier to make than an implosion device using Today’s main
Association in Chelyabinsk, the manager of either uranium or plutonium. In short, com- threat at the
Mayak’s isotope separation plant was convict- plete border integrity probably is not an
ed on several counts of exporting a valuable achievable goal. As Harvard’s Matthew Bunn
facility level
nonnuclear substance (iridium-192), using argues, “Once stolen material is removed comes from
false customs documentation.30 Managers from authorized control, much of the battle conspiracies of
could just as easily create appropriate paper- is already lost—finding stolen material with-
work to conceal a more serious diversion— in a country, or detecting and interdicting its well-placed
substituting HEU in containers marked as passage across borders, are herculean tasks, insiders able to
cesium-137, for example. in most cases only practicable if good intelli- shut down
To be fair, the MPC&A program does gence and police work tells officials where to
include consideration of the human factor in look.”33 alarms, bribe
the nuclear workplace. Recent U.S. legisla- U.S. nonproliferation work in Russia also guards, and
tion, the Bob Stump National Defense aims to prevent the dissemination of nuclear
Authorization Act of 2003, has established a intelligence by creating economic lifeline proj-
alter relevant
five-year time frame for transferring all ects for underemployed or displaced nuclear paperwork.

7
Our non- personnel. Types of projects range from short- Resistance of Iran—claims that the network
proliferation term grants and subsidies for weapons per- delivered an undetermined quantity of HEU
sonnel to collaborative research projects with to Iran in 2001.34 In a related development, the
toolbox U.S. weapons labs to partnerships with private Pakistani Atomic Energy Commission took
simply is not industry to develop commercially viable tech- out a full-page advertisement in a Pakistani
nologies. Many scientists in nuclear and other newspaper in July 2000 (under the rubric of
designed to WMD fields have benefited from programs the Ministry of Commerce) offering plutoni-
prevent situations such as DOE’s Global Initiatives for Prolifer- um, enriched uranium, and other nuclear
in which states as ation Prevention and the State Department’s materials for export. (The offer was rescinded
International Science and Technology Center; under U.S. pressure.)35 In yet another case,
a matter of policy, some have obtained long-term civilian em- Russia’s cozy nuclear relationship with Iran
or high-ranking ployment as a result. In addition, the business epitomized by, but not limited to, the con-
government of installing MPC&A safeguards and develop- struction of a 1,000-MW nuclear power plant
ing related technologies has itself created jobs at Bushehr, is a continuing source of prolifer-
officials, for some indeterminate number of nuclear ation concern. Some U.S officials believe that
deliberately experts and workers. Iran leverages the relationship to expand con-
Yet the overall impact of such efforts tacts with Russia’s nuclear entities and to
transfer strategic remains to be seen. Military-scientific knowl- acquire information and materials directly
nuclear goods to edge is difficult to contain under the best of applicable to nuclear weapons programs.36
third parties. circumstances. Recall that America could not The extent of such covert transfers is not
keep its own closely guarded nuclear secrets known. Yet the temporary assignment of
from gravitating to the Soviet Union in the thousands of Russian specialists to Iran in
1940s and (probably) to China in the 1990s. connection with the Bushehr facility consti-
These days scientists in their home bases in tutes a brain drain of sorts and therefore con-
Russia could transmit nuclear or ballistic mis- tradicts at least the spirit of U.S. nonprolifera-
sile designs by fax or e-mail. Also, supply-side tion programs with Russia.
leakage of nuclear intelligence or material may
reflect complex motivations. Economic uncer-
tainty and the need to make ends meet are fac- Reviewing Progress
tors, but so are greed, resentment, and ideo-
logical conviction. Recall the case of British U.S. nonproliferation projects in Russia
nuclear physicist and Soviet master spy Klaus and elsewhere have uncomfortably long time
Fuchs, who worked at the Manhattan Project frames. For example, goals projected in
and later at Los Alamos. Fuchs hardly fit the DOE’s 2007 budget include securing 195
profile of an unemployed or economically des- Russian buildings that contain nuclear mate-
perate scientist. rial by 2008, equipping 350 border crossings
Finally, it should also be emphasized that and 64 megaports (major international ship-
our nonproliferation toolbox simply is not ping hubs) by 2013, and creating 11,000
designed to prevent situations in which states “long-term” private-sector jobs for displaced
as a matter of policy, or high-ranking govern- weapons scientists by 2019. As of the end of
ment officials, deliberately transfer strategic FY05, 86 percent of the targeted buildings
nuclear goods to third parties. The above- were secured by some form of MPC&A, 37
mentioned underground network organized percent of the needed jobs were created, and
by Pakistani scientist A. Q. Khan is the prime about a quarter of the strategic crossings and
example of a senior government official will- only four megaports had been outfitted with
fully circumventing state policy. Most radiation monitors.37 The sluggish progress
observers believe that Khan’s businesses of MPC&A and other threat reduction
emphasized sales of technology, although an efforts can be explained by such factors as
Iranian exile group—the National Council of funding constraints, bureaucratic inertia,

8
disputes over access to sensitive facilities, and potential buyers, or hidden in a cave in remote
inadequate Russian commitment to techno- eastern Afghanistan. Troubling reports have
logical modernization of nuclear protective surfaced of corrupt practices by certain nuclear
regimes. facilities during the Yeltsin administration,
Yet as those programs drag on, efforts by including “off the books” processing of urani-
terrorists to acquire a nuclear capability repre- um for private commercial clients and altered
sent a consequential and near-term threat, cre- paperwork to conceal substitution of danger-
ating an opportunity for prospective nuclear ous substances in legal radioactive ship-
thieves and smugglers. There is no reason to ments.40 Hence, the possibility that America’s
believe that our adversaries will stand idly by adversaries already have obtained some of
until all Russian facilities are MPC&A-ready or what they need to make a nuclear weapon
until complete border integrity is achieved should not be ruled out. At the same time,
before orchestrating a major diversion event. accelerating the timetable for key U.S. projects
U.S. programs have an intrinsic threat-reduc- in Russia and elsewhere can reduce the threat
tion value, but their strategic justification and of further proliferation damage.
the payoff for U.S. security interests recede
with the passage of time.
Indeed, at this point—already 15 years after The Road Ahead There is a
the collapse of the USSR—there is a danger danger that
that our programs amount to locking the Securing fissile material at the source our programs
proverbial barn door after some of the horses should be the most immediate priority, since it
have escaped. Consider the circumstances in offers greater promise of success than prevent- amount to
Russia during much of the 1990s—a period of ing cross-border trafficking of such material locking the
deep malaise in the Russian nuclear complex. or clandestine transfers of nuclear weapons
The loss of orders for nuclear goods, a deterio- expertise. As far as MPC&A is concerned, the
proverbial barn
rating security climate, unpaid wages, a fray- endgame appears to be in sight. DOE plans to door after some
ing social safety net, and a spreading ethos of get out of the business of securing fissile mate- of the horses
corruption put much of the nuclear stockpile rial and warhead storage sites by the end of
at risk. As Sen. Sam Nunn told a Senate hear- FY08 and FY09, respectively. In 2013, under have escaped. At
ing in 1995, the collapse of the USSR “let loose current U.S. legislation, full responsibility for the same time,
a vast potential supermarket for nuclear sustaining the new systems is supposed to be accelerating the
weapons, weapons-grade uranium and pluto- transferred to Russia. The prospect of transi-
nium, and equally deadly chemical or biologi- tion to Russian control is fraught with uncer- timetable for key
cal weapons.”38 Even allowing for some hyping tainties, however. For example, the NAS study U.S. projects in
of the threat, it would be a miracle indeed if no from 2005 claims that Russia has failed to
leakage of significance took place during this take “adequate steps” to provide financial sup-
Russia and
period. port for MPC&A activities; it also concludes elsewhere can
Admittedly, the visible machinations of the that Russian officials and experts “do not reduce the threat
nuclear black market provide little clue as to share the high level of concern regarding the
what might have happened. Nuclear smug- vulnerability to theft of nuclear material from of further
glers captured in western Europe in the mid- facilities that is held by U.S. experts.”41 The proliferation
1990s indicated to authorities that significant investments that Russia has made in MPC&A
quantities of HEU and plutonium—enough tend to focus on perimeter defenses—to pre-
damage.
for several bombs—had already escaped gov- vent terrorist break-ins and sabotage of
ernment control and were available for sale.39 nuclear facilities—rather than on accounting
Where such vagabond material, if it exists, is and inventory controls, which are designed
now is anybody’s guess; it could be buried largely to prevent insider theft. Moscow’s
somewhere in a birch forest, stashed in some- main threat reduction priorities may lie else-
one’s refrigerator, circling the globe looking for where, such as in dismantling nuclear sub-

9
marines and preventing radiological terror- groups in the neighborhood, past histories of
ism.42 Furthermore, competing social and thefts or theft attempts, accessibility to for-
developmental needs—according to the CIA, eign visitors, and frequency of travel abroad
an estimated 17.8 percent of the population in by enterprise scientists. It should also be pos-
Russia live below the poverty line43—will place sible, on the basis of a cooperative U.S.-
major demands on the state budget. In sum, Russian effort, to gauge the susceptibility of
despite the influx of substantial revenues from the nuclear workforce to bribes or blackmail
the sale of oil, Russia’s willingness to take on and employees’ propensity to engage in cor-
full financial responsibility for maintaining rupt or disloyal conduct. Illicit drug use,
and enhancing MPC&A is viewed by some gambling habits, major medical expenses,
observers as problematic, at least in the near and conspicuous consumption unrelated to
term. To address this potential shortfall the income are obvious warning signs—weak-
NAS study recommends creating a $500 mil- nesses that could be exploited by an adver-
lion MPC&A “indigenization” fund, support- sary seeking access to strategic nuclear wares
ed by the United States, Russia, and other G-8 In the same vein, human reliability sys-
countries. The United States would contribute tems, if intelligently deployed, can capture
$200 million, the other G-8 countries would evidence of corrupt or high-risk behavior.
contribute another $200 million, and Russia Certain pre- or postemployment screening
would contribute the remaining $100 million. techniques—polygraphs, psychological test-
The fund would be doled out to Russia over a ing, and investigation of bank records—can be
10-year period.44 powerful predictive tools. They also can yield
Some new funding is doubtless desirable information on prior thefts, possibly leading
and could enhance Russia’s interest in sup- to recovery of stolen material that perpetra-
porting MPC&A over the longer term. How- tors have not yet had the chance to export
ever, the United States and Russia need to from Russia. Another technique might be the
address the more basic shortcomings of introduction of motion-detection cameras
MPC&A and related cooperative programs. for remote surveillance of nuclear storage
Washington’s Washington’s approach to nonproliferation is areas and guard posts. The data feed from the
too narrowly defined, emphasizing introduc- cameras could be transmitted to review sta-
approach to tion of modern technology (albeit with some tions inside and outside the facility, providing
nonproliferation attention now paid to “nuclear security cul- an additional measure of security against
is too narrowly ture” in deploying new technological safe- insider thefts. Some of these personnel relia-
guards). Moreover, some Russians are skepti- bility concepts are now being implemented
defined, cal of the utility of modern security systems, as (the Russian military reportedly has intro-
emphasizing noted above. What is also needed is a proactive duced polygraph examinations at weapons
and intelligence-based nuclear security policy storage sites) but not yet on the scale contem-
introduction that would complement these systems. The plated here.45 A comprehensive human relia-
of modern tech- general aim would be to provide early warning bility system for nuclear custodians might
nology. What is of illegal nuclear “deals in the making” and to also be extended to persons charged with
reduce the risk of consequential proliferation interdiction responsibilities, such as customs
also needed is a episodes. Several recommendations for imple- officials and police. Judging from U.S. experi-
proactive and menting such a policy are outlined below. ence in screening people for high-security
intelligence-based First, it might be useful to construct a jobs, such a system would be expensive to
“vulnerability profile” of each Russian facili- implement, doubtless requiring additional
nuclear security ty that stores, produces, or works with infusions of U.S. funds for nonproliferation
policy that would weapons-usable nuclear materials. Such a work in Russia.
profile could be based on such factors as eco- Second, a comprehensive nuclear security
complement nomic conditions and wage scales, presence strategy must go beyond containment, or at
these systems. of organized crime or Islamic extremist least broaden the definition of it. Specifically,

10
it should focus more attention and resources national system. In contemplating demand A more rather
on the demand side of the proliferation equa- reduction, different strategies will need to be than a less
tion. Better intelligence is a vital component of applied to different adversaries—diplomacy
such a strategy, complementing the essentially and negotiations between states and military nuclearized
reactive and stationary risk management sys- action to deny terrorists safe havens and keep world may be in
tem that the United States is implementing in them off balance. Certain high-profile actions,
Russia and elsewhere. Much more needs to be such as the controversial U.S. invasion of Iraq,
the offing, even
known about adversaries’ procurement chains might actually increase the craving of small as the United
inside and outside the former Soviet republics: states and other actors for a nuclear deterrent States and Russia
how those chains are organized and financed, of their own. Thus, contrary to our nonprolif-
what front companies and other intermedi- eration hopes, a more rather than a less work to reduce
aries are used, who their inside collaborators nuclearized world may be in the offing, even as the threat of a
are, and what smuggling pipelines have been the United States and Russia work to reduce global nuclear
established. Law enforcement sting operations the threat of a global nuclear catastrophe.
in which operatives pose as purveyors of HEU The requirements of our nuclear security catastrophe.
or plutonium could play a big role in fleshing policy are ultimately inseparable from the
out buyer and end-user networks and in shut- requirements of our global campaign against
ting some of them down. The United States terrorism, especially against groups with
cannot conduct nonproliferation work effec- nuclear ambitions such as al-Qaeda and its
tively in a vacuum, without reference to adver- affiliates. Al-Qaeda’s attempts to obtain
saries’ WMD programs and procurement nuclear materials, weapons, and expertise
aims. reportedly have gone on for well over a decade.
Third, and related to this, collaboration At the same time, there is great uncertainty as
with Russian and other former Soviet security to the extent of undocumented leakage—
organizations needs to be strengthened, since including smuggling that has occurred since
those organizations—by Russian accounts at the disintegration of the USSR. We do not
least—do much of the heavy lifting in contain- know how far the global jihadist network
ing nuclear theft and smuggling. Mechanisms might have proceeded toward building a
for formal and informal information exchange bomb. Hence, our very real progress toward
on smuggling incidents, actors, and trends closing the proliferation window in Russia
would be of great value in configuring U.S. and elsewhere must be combined with
nonproliferation programs in the newly inde- unremitting vigilance against threats that may
pendent states. As the Center for Nonprolif- already be out there, waiting to strike us at a
eration Studies’ William Potter explains, time and place that we least expect.
“Meaningful intelligence-sharing on traffick-
ing incidents . . . is crucial in filling in gaps in
past trafficking cases” and “is particularly vital Notes
in the context of the ongoing war against inter-
1. Excerpts from “Soviet Nuclear Threat Reduction
national terrorism.”46 Act of 1991.” Cited in National Academy of Sciences,
Ideally, a nuclear security policy should Strengthening Long-Term Nuclear Security: Protecting
also embrace the concept of demand reduc- Weapon-Usable Material in Russia (Washington:
tion—influencing the motivations of adver- National Academies Press, 2005), pp. 65, 66.
sary states and subnational groups to prevent 2. Matthew Bunn and Anthony Wier, Securing the
the spread of nuclear weapons capability. Bomb 2005: The New Global Imperative (Cambridge,
Unfortunately, the desire for asymmetric MA: Harvard University, Belfer Center for Science
advantage, whether of states striving to join and Technology, May 2005), p. 76.
the nuclear club or of terrorists intent on 3. FY07 Budget Request for National Nuclear
imposing their demands on civilized nations, Security Administration Office of the Chief
is deeply imbedded in the fabric of the inter- Financial Officer, in Department of Energy, FY

11
2007 Budget Request, vol. 1, p. 514; and personal Attempt in Chelyabinsk Involved HEU,” Center for
communication with DOE financial official on Nonproliferation Studies NIS Nuclear Trafficking
March 15, 2005. Data Base, October 30, 2000.

4. Bunn and Wier, p. 76. 19. FY07 Budget Request for National Nuclear
Security Administration Office of the Chief
5. National Academy of Sciences. Strengthening Financial Officer, MPC&A Program: Strategic
Long-Term Nuclear Security, p. 12. Plan, in Department of Energy, FY 2007 Budget
Request, July 2001, p. 2.
6. Yuriy Rumyantsev and Aleksei Kholodov,
“Conversion Challenges in Russia’s Secret Cities,” 20. See, for example, J. Carson Mark et al., “Can
Nonproliferation Review (Fall–Winter 2003): 168. Terrorists Build Nuclear Weapons?” Nuclear
Control Institute, Washington, http://www.nci.org
7. See discussion in Rensselaer Lee, Smuggling /k-m/makeab.htm.
Armageddon: The Nuclear Black Market in the Former
Soviet Union and Europe (New York: St. Martin’s, 21. On the nuclear deal, see Riyad Alam-al-Din et al.,
1998), pp. 35–38. “Report Links Bin Laden, Nuclear Weapons,” Al-
Watan Al-Arabi, November 13, 1998. On the Islamic
8. Steve Sandoval, “Director of the All-Russian Movement of Uzbekistan (IMU), see Graham
Scientific Research Institute of Technical Physics Allison, Nuclear Terrorism: the Ultimate Preventable
Commits Suicide,” Daily News Bulletin, November 1, Catastrophe (New York: Henry Holt, 2004), p. 23.
1996, http://www.lanl.gov/orgs/pa/News/110196 Allison cites Pakistani sources to the effect that al-
text.html. Qaeda members had obtained what they claimed
was fissile material from the IMU, but actually was
9. Caitlin Talmadge, “Striking a Balance: The radiological material only suitable for a dirty bomb.
Lessons of U.S.-Russian Material Security Cooper- Scheuer quoted in Through Our Enemies’ Eyes
ation,” Nonproliferation Review (Spring 2005): 32. (Washington.: Brassey’s, 2001), pp.191–92.
10. Author interview with officials of Los Alamos 22. Lee, pp. 125–27.
National Laboratory, February 22, 2006.
23. Charles D. Ferguson and William C. Potter,
11. National Academy of Sciences, Strengthening The Four Faces of Nuclear Terrorism (Monterey, CA:
Long-Term Nuclear Security, p. 12. Center for Nonproliferation Studies, 2004), p. 63.
The authors add the caveat that the terrorists
12. Author interview with representative of PIR would need the help of insiders familiar with
Center for Policy Studies in Russia, September 17, weapons design or else risk being killed or injured
2004. by the conventional explosives that are used in all
nuclear devices.
13. National Academy of Sciences, Strengthening
Long-Term Nuclear Security, p. 12. 24. William Langewiesche, “The Point of No
Return,” Atlantic Monthly, January–February 2006,
14. The rest was mostly radioactive junk, useless in pp. 96–118.
making weapons. U.S. General Accounting Office,
“Nuclear Nonproliferation: U.S. Efforts to Help 25. National Academy of Sciences, Making the Nation
Other Countries Combat Nuclear Smuggling Need Safer: The Role of Science and Technology in Countering
Strengthened Coordination and Planning,” GAO- Terrorism (Washington: National Academies Press,
02-426, May 2002, pp. 31–33. 2002), p. 52.
15. Ibid., pp. 32–34. 26. Graham Allison, Nuclear Terrorism: The Ultimate
Preventable Catastrophe (New York: Henry Holt,
16. “U.S. Intelligence Concludes Theft of Nuclear 2004), pp. 149–51
Material Has Occurred,” Agence France Presse,
February 23, 1995. 27. Critics of the gold standard idea also point out
that far more people, vehicles, and materials go in
17. William Potter, “Challenges in U.S.-Russian and out of nuclear facilities than go in and out of
Cooperation,” Paper presented at the Conference Fort Knox. Author interview with officials of Los
on Cooperative Threat Reduction in the 21st Alamos National Laboratory, February 22, 2006.
Century, Oslo, Norway, June 1, 2002, p. 5.
28. Laura Holgate, “Nuclear Security Culture: The
18. Yevgeniy Tkachenko, “FSB Agents Prevent Theft Key to Sustainability,” Paper presented at the IAEA
of Nuclear Materials,” ITAR-TASS, December 18, Conference on Nuclear Security, London, March
1998; and “MINATOM Official Says 1998 Theft 18, 2005, pp. 2–3. See also Igor Khripunov et al.,

12
Nuclear Security Culture: The Case of Russia (Athens: Schuller, Controlling Threats to Nuclear Security
University of Georgia, Center for International (Washington: National Defense University Center
Trade and Security, December 2004), pp. 1–13. for Nonproliferation Research, 1997), p. 3.

29. Author interview with official of Moscow area 39. Justiniano Torres and Alexander Scherbinin,
nuclear facility, September 15, 2004; and Bunn cited in Lee, pp. 94, 101–102.
and Wier, p. 14.
40. Author interview with former Russian
30. Lee, p. 131. Academy of Sciences official, September 15, 2004.
See also Lee, pp. 132–35.
31. National Academy of Sciences, Strengthening Long-
Term Nuclear Security, p. 68; and FY07 Budget Request 41. National Academy of Sciences, Strengthening
for National Nuclear Security Administration, Office Long-Term Nuclear Security, p. 3.
of the Chief Financial Officer, pp. 517–18.
42. Russians tend to see terrorists’ acquisition of
32. Author interview with officials of Lawrence radiation sources that could be used in a dirty
Livermore National Laboratory, December 8, bomb as a bigger threat than insider theft of
2005. nuclear materials. Since 9/11 DOE has provided
funding to secure such sources in Russia and other
33. Matthew Bunn, The Next Wave: Urgently Needed former Soviet republics, but the major thrust of the
New Steps to Control Warheads and Fissile Material, Joint cooperative programs has always been on prevent-
Publication of Harvard University’s Project on ing terrorists from obtaining nuclear weapons
Managing the Atom and the Nonproliferation capability, which has much more destructive impli-
Project at the Carnegie Endowment for Inter- cations. See FY07 Budget Request for the National
national Peace (Cambridge, MA, and Washington, Nuclear Security Administration Office of the
April 2000), p. 39. Chief Financial Officer, p. 565; and National
Academy of Sciences, Strengthening Long-Term
34. Louis Charbonneau, “Pakistan’s Khan Gave Nuclear Security, p. 14.
Iran Bomb-Grade Uranium—Exiles,” Reuters,
November 17, 2004. 43. CIA World Factbook 2006, www.cia.gov/cia/pub
lications/geos/rs.tyml. The CIA compiles estimates
35. Stephen Fidler and Victoria Burnett, “Pakistan’s of the percentage of people falling below the pover-
‘Rogue’ Nuclear Scientist: What Did Pakistan’s ty line in different countries based on surveys of
Government Know about His Deals?” Financial subgroups, with the results weighted by the num-
Times, April 6, 2004, p. 17. ber of persons in each group. See ww.cia.gov/cia
/publications.factbook/docs/notesand defs.html.
36. See, for example, Brenda Shaffer, Partners in
Need: The Strategic Relationship of Russia and Iran 44. National Academy of Sciences, Strengthening
(Washington: Washington Institute of Near East Long-Term Nuclear Security, pp. 29–33.
Policy, 2001), p. 70.
45. Author interview with officials of Los Alamos
37. In 2006 DOE changed the metric of MPC&A National Laboratory, February 22, 2006; and
performance from tons of material to number of author interview with officials of Lawrence
buildings—a more favorable indicator of progress. Livermore National Laboratory, December 8, 2005.
As of the end of FY04 only an estimated 46 per- Drug and alcohol testing already are under way at
cent of material had been secured, compared to many nuclear facilities, a positive sign from a secu-
62 percent of buildings. FY07 Budget Request for rity perspective.
the National Nuclear Security Administration
Office of the Chief Financial Officer, pp. 497, 514. 46. William Potter and Elena Sokova, “Illicit Nuclear
Trafficking in the NIS: What’s New? What’s True?”
38. Cited in James L. Ford and C. Richard Nonproliferation Review, Summer 2002, p. 119.

13
OTHER STUDIES IN THE POLICY ANALYSIS SERIES

570. The Federal Marriage Amendment: Unnecessary, Anti-Federalist, and


Anti-Democratic by Dale Carpenter (June 1, 2006)

569. Health Savings Accounts: Do the Critics Have a Point? by Michael F.


Cannon (May 30, 2006)

568. A Seismic Shift: How Canada’s Supreme Court Sparked a Patients’


Rights Revolution by Jacques Chaoulli (May 8, 2006)

567. Amateur-to-Amateur: The Rise of a New Creative Culture by F. Gregory


Lastowka and Dan Hunter (April 26, 2006)

566. Two Normal Countries: Rethinking the U.S.-Japan Strategic


Relationship by Christopher Preble (April 18, 2006)

565. Individual Mandates for Health Insurance: Slippery Slope to National


Health Care by Michael Tanner (April 5, 2006)

564. Circumventing Competition: The Perverse Consequences of the Digital


Millennium Copyright Act by Timothy B. Lee (March 21, 2006)

563. Against the New Paternalism: Internalities and the Economics of Self-
Control by Glen Whitman (February 22, 2006)

562. KidSave: Real Problem, Wrong Solution by Jagadeesh Gokhale and Michael
Tanner (January 24, 2006)

561. Economic Amnesia: The Case against Oil Price Controls and Windfall
Profit Taxes by Jerry Taylor and Peter Van Doren (January 12, 2006)

560. Failed States and Flawed Logic: The Case against a Standing Nation-
Building Office by Justin Logan and Christopher Preble (January 11, 2006)

559. A Desire Named Streetcar: How Federal Subsidies Encourage Wasteful


Local Transit Systems by Randal O’Toole (January 5, 2006)

558. The Birth of the Property Rights Movement by Steven J. Eagle (December 15,
2005)

557. Trade Liberalization and Poverty Reduction in Sub-Saharan Africa by


Marian L. Tupy (December 6, 2005)

556. Avoiding Medicare’s Pharmaceutical Trap by Doug Bandow (November 30,


2005)

555. The Case against the Strategic Petroleum Reserve by Jerry Taylor and
Peter Van Doren (November 21, 2005)

554. The Triumph of India’s Market Reforms: The Record of the 1980s and
1990s by Arvind Panagariya (November 7, 2005)
553. U.S.-China Relations in the Wake of CNOOC by James A. Dorn
(November 2, 2005)

552. Don’t Resurrect the Law of the Sea Treaty by Doug Bandow (October 13, 2005)

551. Saving Money and Improving Education: How School Choice Can Help
States Reduce Education Costs by David Salisbury (October 4, 2005)

550. The Personal Lockbox: A First Step on the Road to Social Security
Reform by Michael Tanner (September 13, 2005)

549. Aging America’s Achilles’ Heel: Medicaid Long-Term Care by Stephen A.


Moses (September 1, 2005)

548. Medicaid’s Unseen Costs by Michael F. Cannon (August 18, 2005)

547. Uncompetitive Elections and the American Political System by Patrick


Basham and Dennis Polhill (June 30, 2005)

546. Controlling Unconstitutional Class Actions: A Blueprint for Future


Lawsuit Reform by Mark Moller (June 30, 2005)

545. Treating Doctors as Drug Dealers: The DEA’s War on Prescription


Painkillers by Ronald T. Libby (June 6, 2005)

544. No Child Left Behind: The Dangers of Centralized Education Policy by


Lawrence A. Uzzell (May 31, 2005)

543. The Grand Old Spending Party: How Republicans Became Big Spenders
by Stephen Slivinski (May 3, 2005)

542. Corruption in the Public Schools: The Market Is the Answer by Neal
McCluskey (April 14, 2005)

541. Flying the Unfriendly Skies: Defending against the Threat of Shoulder-
Fired Missiles by Chalres V. Peña (April 19, 2005)

540. The Affirmative Action Myth by Marie Gryphon (April 6, 2005)

539. $400 Billion Defense Budget Unnecessary to Fight War on Terrorism by


Charles V. Peña (March 28, 2005)

538. Liberating the Roads: Reforming U.S. Highway Policy by Gabriel Roth
(March 17, 2005)

537. Fiscal Policy Report Card on America’s Governors: 2004 by Stephen


Moore and Stephen Slivinski (March 1, 2005)

536. Options for Tax Reform by Chris Edwards (February 24, 2005)

535. Robin Hood in Reverse: The Case against Economic Development


Takings by Ilya Somin (February 22, 2005)
534. Peer-to-Peer Networking and Digital Rights Management: How Market
Tools Can Solve Copyright Problems by Michael A. Einhorn and Bill
Rosenblatt (February 17, 2005)

533. Who Killed Telecom? Why the Official Story Is Wrong by Lawrence
Gasman (February 7, 2005)

532. Health Care in a Free Society: Rebutting the Myths of National Health
Insurance by John C. Goodman (January 27, 2005)

531. Making College More Expensive: The Unintended Consequences of


Federal Tuition Aid by Gary Wolfram (January 25, 2005)

530. Rethinking Electricity Restructuring by Peter Van Doren and Jerry Taylor
(November 30, 2004)

529. Implementing Welfare Reform: A State Report Card by Jenifer Zeigler


(October 19, 2004)

528. Fannie Mae, Freddie Mac, and Housing Finance: Why True Privatization
Is Good Public Policy by Lawrence J. White (October 7, 2004)

527. Health Care Regulation: A $169 Billion Hidden Tax by Christopher J.


Conover (October 4, 2004)

526. Iraq’s Odious Debts by Patricia Adams (September 28, 2004)

You might also like