Table Of ContentSOCIAL ACTION, ROGUE REACTION:
US POST-COLD WAR NUCLEAR
COUNTERPROLIFERATION STRATEGIES
A DISSERTATION
SUBMITTED TO THE DEPARTMENT OF POLITICAL SCIENCE
AND THE COMMITTEE ON GRADUATE STUDIES
OF STANFORD UNIVERSITY
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE DEGREE OF
DOCTOR OF PHILOSOPHY
AlexanderH.Montgomery
September2005
(cid:13)c Copyright by Alexander H. Montgomery 2006
All Rights Reserved
ii
IcertifythatIhavereadthisdissertationandthat,inmyopin-
ion,itisfullyadequateinscopeandqualityasadissertation
forthedegreeofDoctorofPhilosophy.
ScottD.Sagan
(PrincipalAdviser)
IcertifythatIhavereadthisdissertationandthat,inmyopin-
ion,itisfullyadequateinscopeandqualityasadissertation
forthedegreeofDoctorofPhilosophy.
JohnMeyer
IcertifythatIhavereadthisdissertationandthat,inmyopin-
ion,itisfullyadequateinscopeandqualityasadissertation
forthedegreeofDoctorofPhilosophy.
LynnEden
IcertifythatIhavereadthisdissertationandthat,inmyopin-
ion,itisfullyadequateinscopeandqualityasadissertation
forthedegreeofDoctorofPhilosophy.
DavidJ.Holloway
Approved for the University Committee on Graduate Stud-
ies.
iii
iv
Abstract
Which US post-Cold War counterproliferation strategies towards nuclear aspirants have
been most successful and why? Military capabilities, economic needs, and social desires
provide both motivations for nuclear proliferation and opportunities for states to counter
these motivations. I argue that strategies involving the use of military or economic tools
alonearenotonlyunsuccessfulbutareactuallycounterproductive. Idemonstrateusingthe
cases of North Korea and Iran that including social benefits in the form of symbolic and
diplomaticgesturesiscrucialtothesuccessofthesestrategies.
To generate hypotheses regarding the effects of different types of strategies on nuclear
outcomes, I combine realist, liberal, and constructivist theories with spiral and deterrent
models. I include the effects of three intervening mechanisms: domestic political struc-
tures, positive feedback loops, and the effects of multiple-country interactions. To test
these hypotheses, I break down strategies into individual actions directed at either sup-
pressing the demand for or halting the supply of nuclear technologies to individual prolif-
erants. I use vector autoregression to uncover action-reaction cycles and establish general
interaction patterns between the United States and North Korea. I then use within-case
congruence procedures to compare theoretical predictions of the effects of different types
of strategies with nuclear outcomes in both North Korea and Iran. I find in both cases that
feedback played an important role in amplifying US strategies and that social incentives
were consistently related to success. Finally, I perform a cross-case comparison of how
the structure of proliferation networks among second-tier nuclear aspirants has affected
weapons development times; I find that tacit knowledge constrained the A.Q. Khan nu-
clear network to a hub-and-spoke structure, minimizing its effectiveness. Together, these
findings imply that to stop proliferation, social benefits should be used to target existing
and potential hubs of proliferation networks; future research should find that other prolif-
eration networks are similarly constrained and that social motivations play a large role in
proliferationdecisions.
v
Acknowledgements
Thisdissertationistheresultoffiveyearsoffollowinganoccasionallycircuitouspathfrom
an initial inquiry into the effects of social sanctions on nuclear aspirants to the (finally)
finished product. I could not have completed it without the assistance of many individuals
alongtheway. Anyshortcomingsofthiswork (includingforgettingtothankthem)aremy
own;anyvirtuesareinlargepartduetotheirassistance.
I would first like to thank the members of my committee. Scott Sagan provided in-
valuable guidance throughout the project, from compiling an initial reading list to reading
the final draft on a very tight schedule; his suggestions on all parts of the dissertation have
been invaluable. Lynn Eden gave copious advice on numerous occasions, spending a great
deal of time on everything from brainstorming to polishing; her door was always open.
John Meyer brought a very different perspective to the table; his ability to offer concise
and pertinent advice within a day of every draft is unparalleled. I would like to thank
Steve Krasner for comments on early drafts, and David Holloway for readily stepping in
as a committee member late in the process. I would also like to thank Woody Powell for
chairingmydefense.
I received invaluable help from many seminar participants. Ted Hopf and Steve Biddle
offeredusefultipsonanearlyversionofChapters2-4givenasapaperatthe2004meeting
oftheAmericanPoliticalScienceAssociation. ChaimBraun,ChristopherChyba,andDean
Wilkening offered helpful feedback on an early draft of Chapter 6 given as a paper at the
Stanford Center for International Cooperation and Security (CISAC). Gili Drori provided
extensive comments on a version of my prospectus presented at CISAC. I would like to
thankthemaswellastherestoftheparticipantsoftheResearchSeminaratCISAC.
MostofmydissertationwritingoccurredattheKennedySchoolatHarvardUniversity,
where I was a pre-doctoral fellow for two years. I would particularly like to thank Jim
Walsh, Matt Bunn, John Park, Anthony Wier, and Chen Zak at Managing the Atom and
SteveMillerandSeanLynn-JonesattheInternationalSecurityProgramfordiscussionson
vi
NorthKoreaandIranduringmytimeatBelfer. IwouldalsoliketothankDianeMcCreefor
extensiveeditingonChapter6,whichisforthcomingasanarticleinInternationalSecurity.
IalsoreceivedmanycommentsfromtherestoftheparticipantsoftheManagingtheAtom
Project and the International Security Program seminars at the Belfer Center for Science
andInternationalAffairs.
Financial assistance was provided by a Graduate Research Fellowship from the Na-
tional Science Foundation, the Political Science department at Stanford University, the
StanfordCenterforInternationalSecurityandCooperationattheFreemanSpogliInstitute
for International Studies, and the Belfer Center for Science and International Affairs, John
F.KennedySchoolofGovernment,HarvardUniversity. IwouldliketothankJeanetteLee-
Oderman, graduate student administrator in Political Science at Stanford, for sorting out
innumerablebureaucraticcomplicationsaswellasgeneralsupport.
I am fortunate enough to have many colleagues who are also good friends; they pro-
vided support during the long process of researching and writing. My friends Paul Mac-
DonaldandStacieGoddardgavemeearlycommentsonimportantpartsofthedissertation
and helped to keep me sane while I was in Cambridge. Ron Hassner, Taylor Fravel, and
Todd Sechser, my immediate predecessors in security studies at Stanford and fellow fel-
lows in Cambridge, were equally good with their advice and company. Karthika Sasiku-
mar, fellow student of nonproliferation, gave me suggestions on multiple subjects. Emilie
Hafner-Burton,DanNexon,andJaniceBiallyMatternprovidedencouragementduringthe
researching and writing process. Adrienne LeBas was a wonderful commiserator during
thefinalfewmonthsofwriting.
Finally,Iwouldliketothankmyfriendsandrelativesfortheirsupportandpatienceover
the years, both preceding and during the overlong dissertation process. My parents, Judy
andDoug,havebeenverysupportiveduringtheentireprocess,despiteanydoubtstheymay
have had about how long it was going to take to finish the final product. My grandparents
Bill, Jeanne, Edison, and Ruth have been very encouraging of my work whether it was
readable or not. Without their support as well as the support of my entire family and
friends(especiallyBrianandOrion),thisdissertationwouldnothavebeenpossible.
vii
Contents
Abstract v
Acknowledgements vi
ListofTables xi
ListofFigures xii
1 Introduction 1
1.1 DefiningtheQuestion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 CaseSelection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2 TheoryandMethod 17
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.3 Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.4 Evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.5 TheTechnologyofProliferation . . . . . . . . . . . . . . . . . . . . . . . 43
2.5.1 ThePlutoniumRoute . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.5.2 TheUraniumRoute . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.6 Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3 SocialAction,WhatReaction? 57
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.2 QuantitativeMethodology . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.2.1 DataCoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.2.2 EventScaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
viii
3.2.3 VectorAutoregression(VAR) . . . . . . . . . . . . . . . . . . . . 64
3.2.4 CrisisPeriodsandTime . . . . . . . . . . . . . . . . . . . . . . . 68
3.3 US–DPRKInteractions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
3.3.1 TheFirstNorthKoreanNuclearCrisis . . . . . . . . . . . . . . . . 74
3.3.2 TheSecondNorthKoreanNuclearCrisis . . . . . . . . . . . . . . 79
3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
3.A LagLengthsandCoefficients . . . . . . . . . . . . . . . . . . . . . . . . . 83
3.B EventCodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4 NorthKorea 91
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4.2 TheNorthKoreanNuclearProgram,1950–2003 . . . . . . . . . . . . . . . 93
4.2.1 NorthKoreanMotivations . . . . . . . . . . . . . . . . . . . . . . 93
4.2.2 TheOriginsoftheProgram . . . . . . . . . . . . . . . . . . . . . 94
4.2.3 ThePost-ColdWarProgram . . . . . . . . . . . . . . . . . . . . . 97
4.3 NorthKoreanActions,USReactions,1990–2003 . . . . . . . . . . . . . . 105
4.3.1 TheFirstNorthKoreanNuclearCrisis . . . . . . . . . . . . . . . . 105
4.3.2 TheSecondNorthKoreanNuclearCrisis . . . . . . . . . . . . . . 126
4.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
5 Iran 153
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
5.2 TheRootsoftheIranianNuclearProgram,1957–2003 . . . . . . . . . . . 155
5.2.1 IranianMotivations . . . . . . . . . . . . . . . . . . . . . . . . . . 155
5.2.2 TheOriginsoftheProgram . . . . . . . . . . . . . . . . . . . . . 162
5.2.3 ThePost-RevolutionProgram . . . . . . . . . . . . . . . . . . . . 164
5.3 IranianActions,USReactions,1979–2002 . . . . . . . . . . . . . . . . . . 169
5.3.1 RussiaandBushehr . . . . . . . . . . . . . . . . . . . . . . . . . . 171
5.3.2 China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
5.3.3 OtherStates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
5.3.4 BilateralActions . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
ix
5.4 IranianClandestineAction,1979-2002 . . . . . . . . . . . . . . . . . . . . 185
5.4.1 IntelligenceEstimates . . . . . . . . . . . . . . . . . . . . . . . . 185
5.4.2 DomesticandClandestineUraniumExperiments . . . . . . . . . . 187
5.4.3 IAEAinspections . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
5.5 TheIranianNuclearCrisis,2002–2003 . . . . . . . . . . . . . . . . . . . . 191
5.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6 RinginginProliferation 201
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
6.2 ProliferationDeterminism . . . . . . . . . . . . . . . . . . . . . . . . . . 202
6.3 NewProliferators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
6.3.1 NuclearNetworks: LeapfroggingorFallingDown? . . . . . . . . . 206
6.3.2 TheIrrelevanceofRegimeType . . . . . . . . . . . . . . . . . . . 211
6.4 ProliferationNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
6.4.1 TheStructureofProliferationNetworks . . . . . . . . . . . . . . . 217
6.4.2 TacitKnowledgeandtheSpreadofNuclearWeapons . . . . . . . . 222
6.5 PastandFutureCounterproliferationEfforts . . . . . . . . . . . . . . . . . 226
6.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
7 Conclusion 231
7.1 PolicyImplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.1.1 NorthKorea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
7.1.2 Pakistan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
7.1.3 Iran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
7.2 ResearchImplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Bibliography 241
Periodicals 269
x
Description:SUBMITTED TO THE DEPARTMENT OF POLITICAL SCIENCE .. matic interests at risk and the ability to offer the benefits of foregoing nuclear