How can countries verify compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT) and detect and deter violations? It is in their interest to increase their verification readiness because the assessment of compliance with the treaty rests with states parties to the CTBT. The treaty provides countries with two verification elements: an international system of monitoring stations, and an on-site inspection regime. The monitoring system can detect nuclear explosions underground, in the atmosphere and under water. This book provides incentives to nations around the world on how they can organize their efforts to verify compliance with the CTBT and how they can collaborate with other countries, perhaps on a regional basis, to monitor areas of concern. Such focused efforts can improve their detection and deterrence capabilities through precision monitoring. The book addresses the CTBT verification from the perspective of countries. It shows how they can create the essential tools for the assessment of the large amounts of data available from the verification regime and other sources, including observations from satellites and thousands of stations outside of the treaty regime. Countries can also use current scientific and technological developments to assist them in verifying compliance with the treaty. The book offers political and scientific analysis on the evolution of the treaty over the years. The book is intended for professionals in the political, diplomatic, scientific and military fields who deal with international security, non-proliferation and arms control. It is also intended for non-governmental organizations and journalists seeking a better understanding of the nuclear test ban issue and how states can verify compliance with the treaty.
Approximately 95 percent of the world's trade moves by containers, primarily on large ships, but also on trains, trucks, and barges. The system is efficient and economical, but vulnerable. Until recently, theft and misuse have been as accepted as a cost of doing business. However, the rise of terrorism and the possibility that a container could be used to transport or actually be the delivery vehicle for weapons of mass destruction (WMD) or high explosives have made it imperative that the security of the shipping container system be greatly improved. Aside from the direct effects of an attack, the economic, social, and political consequences of a significant disruption in the transport chain would be staggering. In response to recent terrorist attacks the United States, the European Union, and international organizations and industry have instituted new measures to improve security in the shipping trade, including some procedures on containers. These include bilateral agreements involved in the Container Security Initiative (CSI) and the Proliferation Security Initiative (PSI). These measures are useful, but shipping containers remain vulnerable. The authors, building on work done by the National Defense University Center for Technology and National Security Policy that formed the basis for the CSI, recommend a comprehensive multilateral agreement on the use of containers in international trade rather than numerous bilateral agreements. Such a comprehensive solution requires a worldwide approach, including improved tools, better information, and cooperation among all stakeholders. Key components of the system that need improving include th e bill of lading, seals, controls and sensors at borders, ports, and other transfer points, and the verification and sharing of information. The key objective must be to verify more reliably the contents of containers, in particular the absence of WMD, as well as their travel history This paper recommends, as a key step in this approach, the development and adoption of a comprehensive Code of Conduct that would be globally recognized and enforced for such an important component of global commerce. The implementation measures should provide incentives for the industry involved to comply with the obligations of the Code. The G8 and China, or the World Customs Organization, could take the lead in negotiating a global agreement on container security. A draft outline of such a Code is presented in the Annex to this Report.
How can countries verify compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT) and detect and deter violations? It is in their interest to increase their verification readiness because the assessment of compliance with the treaty rests with states parties to the CTBT. The treaty provides countries with two verification elements: an international system of monitoring stations, and an on-site inspection regime. The monitoring system can detect nuclear explosions underground, in the atmosphere and under water. This book provides incentives to nations around the world on how they can organize their efforts to verify compliance with the CTBT and how they can collaborate with other countries, perhaps on a regional basis, to monitor areas of concern. Such focused efforts can improve their detection and deterrence capabilities through precision monitoring. The book addresses the CTBT verification from the perspective of countries. It shows how they can create the essential tools for the assessment of the large amounts of data available from the verification regime and other sources, including observations from satellites and thousands of stations outside of the treaty regime. Countries can also use current scientific and technological developments to assist them in verifying compliance with the treaty. The book offers political and scientific analysis on the evolution of the treaty over the years. The book is intended for professionals in the political, diplomatic, scientific and military fields who deal with international security, non-proliferation and arms control. It is also intended for non-governmental organizations and journalists seeking a better understanding of the nuclear test ban issue and how states can verify compliance with the treaty.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.