Cyberspace by J. Martín Ramírez & Luis A. García-Segura
Author:J. Martín Ramírez & Luis A. García-Segura
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
4 Illicit Trafficking of Dual Use Materials: The Case of Chemical, Biological, Radiological, and Nuclear (CBRN) Materials
Combating illicit trafficking of dual-use materials is an arduous task due to the opacity of these camouflaged operations; indirect transmission; diversification of supplier countries and, in some cases, the participation of states themselves. The development of new technologies for transport and communication of goods via cyberspace, not only substantially facilitates the flow of illegal trade, but also enhances security for traffickers.
One of the most worrying concerns about the illicit trafficking of dual-use material is related to the destiny of chemical, biological, radiological, and nuclear materials (CBRN), because of the proliferation problem they might trigger.
Covert acquisition of dual-use materials through illicit trafficking is produced by applying a series of techniques and strategies that are becoming increasingly sophisticated. Traffickers will falsify a product by placing misleading labels and inventing a destination it will never reach. A key factor in illicit trafficking is the falsification of the concept for which CBRN materials will be used: strains for the preparation of vaccines that could be used for bioterrorism, or radioisotopes for application in medicine, which could also be used to make a dirty bomb.
Illegal trafficking of dual-use materials is usually in the hands of traffickers equipped with solid structures in the shape of legal defense or front companies2 that protect their activities. It is possible as well, to find opportunistic or corrupt officials acting as traffickers who allow bribery and turn a blind eye to certain crimes in exchange for extra profit.
The illegal trafficking system today allows manufacturers to purchase raw materials in one country, buy components in another country, assemble the product in another, and then send the finished product to a different destination country. This operational system is known as triangulation. Traffickers may also falsify the end user or work through front companies to purchase a product on behalf of others. The latter technique shows how smuggling networks are evolving in response to the challenges posed by strict export controls of such materials. Sometimes, organized offenders are businessmen, and their organization acts as a criminal enterprise, assuming their own models, industrial structures, and business. Another technique is the use of intermediaries and people who will acquire the materials or send people to seek the material, along with the networking activities that will coordinate the shipments. In addition, CBRN materials trafficking may occur by transporting them through countries where there is no strong demand for exports control. Traffickers will also resort to practices such as bribery or corruption in economically depressed areas.
Another way of illegally trafficking with CBRN agents or materials is to transfer intangible technology and know-how. Manuals for making weapons with CBRN agents are found in cyberspace. Cyber dissemination of these manuals becomes a rather difficult task to combat as they proliferate at several internet levels.
Open acquisition of CBRN materials, based on legal trade, uses commercial and regulatory channels that reflect user data, destination, and the end use of the legally acquired material. Open procurement of dual-use materials is subject to a number of regulations.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(26273)
Hello! Python by Anthony Briggs(25199)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(24428)
Kotlin in Action by Dmitry Jemerov(23517)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(22867)
Dependency Injection in .NET by Mark Seemann(22653)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(21416)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(20254)
Grails in Action by Glen Smith Peter Ledbrook(19324)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17043)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(16353)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(14066)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(12241)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11518)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10634)
Hit Refresh by Satya Nadella(9206)
The Kubernetes Operator Framework Book by Michael Dame(8572)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8421)
Robo-Advisor with Python by Aki Ranin(8365)