版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
ANALYSIS
AI-GeneratedImage(DALL·E3)
PROJECTD-TECT
Assessingtechnologiestocounterthe
diversionofsmallarmsandlightweapons
June2024
SarahGrand-Clément(UNIDIR)
EXECUTIVESUMMARY
Basedonaseriesofstakeholderengagements,thispaperexaminestherelevanceandappli-cabilityof14technologiestosupportorstrengtheneffortstocounterthediversionofsmallarmsandlightweapons(SALW).Thetechnologiesexaminedare:2Dcodes,chemicalencoding,DNAcoding,documentauthentication,electronicseals,GNSSandmobiletracking,near-fieldcommunication,radio-frequencyidentification,sensors,InternetofThings,distributedledgertechnology,bigdataanalysis,naturallanguageprocessing,andcomputervision.
AlltechnologieswereassessedashavingpotentialrelevanceinhelpingtocounterSALWdiversion.Thetypesoftechnologiesidentifiedasmostrelevanttendedtodifferdependingonthelifecyclestage(i.e.,pre-export,transferorpost-delivery)andcounter-diversionelement(i.e.,prevention,detectionoridentification),withtechnologiesbettersuitedatdetectingoridentifyingdiversionratherthanpreventingitsoccurrence.However,becausethechoiceofaspecifictechnologyshouldbebasedoncontextandneed,thispaperdoesnotrecommendspecifictechnologies,oracombinationthereof,tohelpcounterdiversion.
Infrastructuralandcostrequirementswereassessedasposingthehighestbarrierstothesuccessfulimplementationofthetechnologies.Additionally,theadoptionofatechnologywillalsonecessitateovercomingseveralsystemicbarriers.TheseincludefragmentationamongthemultipleactorsinvolvedinSALW,practicalitiesoftechnologydevelopmentandadoption,lackofinfrastructure(digital,physical,regulatory)surroundingthetechnology,costoftech-nology,nationalsecurityconsiderations,lackofsufficientknowledgeablepersonnel,andneedfordataanddatamanagement.
Thepaperprovidesanon-exhaustiveoverviewofpossibleoptionswhichcouldbeundertakentoovercomeormitigatethesebarriers,includingstrengtheninginternationalandregionalcollaborationandinter-agencycooperation,buildinguptheevidenceandknowledgebase,reinforcingorestablishingtheappropriatephysical,regulatoryanddigitalinfrastructure,andundertakinginstitutionalcapacity-buildingandindividualtraining.
2
ANALYSIS
Acknowledgements
SupportfromUNIDIR’scorefundersprovidesthefoundationforalloftheInstitute’sactivities.ThepreparationofthisjointreporthasbeensupportedbygenerousfundingforUNIDIR’sConventionalArmsandAmmunitionProgrammebyGermanyandforUNIDIR’sSecurityandTechnologyProgrammebyCzechia,Germany,Italy,theNeth-erlands,SwitzerlandandNorway,andbyMicro-soft.TheFlemishPeaceInstituteisfundedbytheFlemishParliament.
Theauthorwishestothanktheexpertswhopartic-ipatedintheinterviews,surveysandworkshopsandprovidedinvaluableinputsduringthecourseoftheresearch.Theauthorisalsogratefultotheexpertswhoreviewedandprovidedfeedback,includingPaulHoltom,NilsDuquet,GiacomoPersiPaoli,DiederikCops,HardyGiezendanner,AxelKrickow,DwayneEdghill,SheenaArneaud,RobHunter-PerkinsandWentingHe.
Glossary
?Componentsofconventionalweapons(CWC):Acomponentcanbedefinedas“oneofseveralormanyunitsofwhichsomethingiscomposed”.Inthecontextofconventionalweapons,thisreferstothedifferentelementsanditemsthatareusedtodevelopandbuildaconventionalweapon.Theseitemscouldbelargeormajorcomponentssuchasengines,aeroplanefuselagesorturrets,butalsosmalleritemssuchaselectronicsystemsorthesubcomponentsusedtoconstructthemajorcomponents.
?Diversion:“Thereroutingand/ortheappro-priationof...conventionalarmsorrelateditemscontrarytorelevantnationaland/orinternationallawleadingtoapotentialchangeintheeffectivecontrolorownershipofthearmsanditems.Instancesofsuchdiversioncantakevariousforms:(a)Anincidentofdiversioncanoccurwhentheitemsenteran
illicitmarket,orwhenredirectedtoanunau-thorisedorunlawfulenduserorforanunau-thorisedorunlawfulenduse.(b)Thereroutingandmisappropriationoftheitemscantakeplaceatanypointinthetransferchain,includingtheexport,import,transit,trans-shipment,storage,assembly,reactiva-tionorretransferoftheitems.(c)Thetransac-tionchainfacilitatingachangeofeffectiveownershipand/orcontrolcaninvolvevariousformsofexchange,whetherdirectlynegotiatedorbrokered–grant,credit,lease,barter,andcash–atanytimeduringthelifecycleoftheitems.”1
?Smallarmsandlightweapons(SALW):“‘Smallarmsandlightweapons’[are]anyman-port-ablelethalweaponthatexpelsorlaunches,isdesignedtoexpelorlaunch,ormaybereadilyconvertedtoexpelorlaunchashot,bulletorprojectilebytheactionofanexplosive,excludingantiquesmallarmsandlightweaponsortheirreplicas.Antiquesmallarmsandlightweaponsandtheirreplicaswillbedefinedinaccordancewithdomesticlaw.Innocasewillantiquesmallarmsandlightweaponsincludethosemanufacturedafter1899:(a)‘Smallarms’are,broadlyspeaking,weaponsdesignedforindividualuse.Theyinclude,interalia,revolversandself-loadingpistols,riflesandcarbines,sub-machineguns,assaultriflesandlightmachineguns;(b)‘Lightweapons’are,broadlyspeaking,weaponsdesignedforusebytwoorthreepersonsservingasacrew,althoughsomemaybecarriedandusedbyasingleperson.Theyinclude,interalia,heavymachineguns,handheldunder-barrelandmountedgrenadelaunchers,portableanti-air-craftguns,portableanti-tankguns,recoillessrifles,portablelaunchersofantitankmissileandrocketsystems,portablelaunchersofanti-aircraftmissilesystems,andmortarsofacalibreoflessthan100millimetres.”2Notethatthisdefinitiondoesnotincludeorpertaintoammunition.
?Technology:Thereisnosingledefinitionoftechnology.Forexample,theMerriam-Web-sterdictionarydefinesitinthreeways:(1)“thepracticalapplicationofknowledgeespeciallyinaparticulararea”or“acapabilitygivenbythepracticalapplicationofknowledge”;(2)“amannerofaccomplishingataskespeciallyusingtechnicalprocesses,methods,orknowl-edge”,and(3)“thespecializedaspectsofaparticularfieldofendeavor”.3Inthecontextofthisreport,thedefinitionoftechnologymostcloselyresemblestheseconddefinition:“amannerofaccomplishingataskespeciallyusingtechnicalprocesses,methods,orknowl-edge”.Specifically,thetechnologieswithinthescopeofthispaperarethosethathavebeenrecentlydevelopedandareemerginginthecontextofdiversionprevention,althoughthispaperdoesnotexaminetechnologiesatthelowestlevelsofreadiness.
3
Listofabbreviations
2D
AI
ATTCWC
DLT
D-TECT
GNSSIATG
Two-dimensional
ArtificialintelligenceArmsTradeTreaty
Componentsofconventionalweapons
Distributedledgertechnology
CounteringtheDiversionofarmsusingTEChnologyTools
GlobalnavigationsatellitesystemInternationalAmmunition
TechnicalGuidelinesIoTInternetofThings
ITIInternationalTracingInstrument
NFCNear-fieldcommunication
NLPNaturallanguageprocessing
PoAUnitedNationsProgrammeofActiontoPrevent,CombatandEradicatetheIllicitTradein
SmallArmsandLightWeaponsinAllItsAspects
RFIDRadio-frequencyidentification
SALWSmallarmsandlightweapons
UNUnitedNations
4
ANALYSIS
Section1-Introduction
Applyingtechnologyasoneofthetoolsto
preventdiversion
Thediversionofconventionalarmsandrelatedammunition,partsandcomponentstounauthor-isedendusersandendusesposesasignificantthreattosocietiesaroundtheglobe.Sincethelate1990s,internationalattentionhasfocusedspecif-icallyonthediversionofsmallarmsandlightweapons(SALW),ratherthanothertypesofconventionalarms(asoutlinedintheboxonthispage),duetotheiruseinconflictandforcriminalandterroristpurposes.Asaconsequence,initia-tiveshavebeendevelopedatthenational,regionalandinternationallevelstocounterthediversionofSALWtounauthorisedendusersorforunauthor-isedenduses.Preventingdiversionisanimpor-tantobjectiveofmanynationalexportcontrolsystemsandoftransfercontrols.Itisalsoakeyobjectiveofseveralinternationalandregionalinstrumentsthathavebeenadoptedtostrengthentheregulationofthetradeinspecifictypesofconventionalweapon,suchastheArmsTradeTreaty(ATT),theFirearmsProtocolandtheUnitedNationsProgrammeofActiontoPrevent,CombatandEradicatetheIllicitTradeinSmallArmsandLightWeaponsinAllItsAspects(PoA).
Acombinationofsystemicandpracticalmeasuresisrequiredtoeffectivelyreducetheriskofdiver-sionofweaponsystems.5Arangeofnon-techno-logicalapproaches,suchasinformationsharing,isalreadyinplacetocounterdiversion.Whiletechnologycouldalsoaddresstheissueofdiver-sion,inpracticethegeneraluptakeandimple-mentationoftechnologiestocounterthediversionofconventionalarms,ammunitionand,partsandcomponentsremainsrelativelylimited.Overall,thereappearstobeagapbetween,ontheonehand,theincreasingdiscussionsofusingtechnol-ogiesincounter-diversioneffortsandinitiativesand,ontheother,theireffectivewide-scaleimplementation.
Mainmethodsfordiversionof
SALW4
SALWareatanincreasedriskofdiversioncomparedtoother,largermilitaryequipmentforseveralreasons:
?“Theireaseofuse,asSALWdonotre-quireparticulartechnicalskillsorequip-menttooperate,makingthemaccessibleandattractivetoawiderangeofusers,includingbutnotlimitedtostateand
non-statearmedforces,securityforces,policeforces,andcivilians.
?Theeaseofdiversionofsuchitems,giv-entheirsmallsize,makingthem‘easytoconceal’.
?Theirlonglifecycle,increasingthe
opportunitiesfordiversionacrosstheirlifetime.
?ThehighscaleofproductionofSALW,
whichcanmakeindividualproductsmoredifficulttokeeptrackof.
“Inthiscontext,itisalsoimportanttoconsiderthatSALWisabroadcategorycomprisingmanydifferenttypesofweapons.Someofthesewillbeatgreaterriskofdiver-sion,simplybecausetheyaremoreappealingtousers.Otherswillposegreaterrisktointernationalsecurity,suchasman-portableair-defencesystems(MANPADS)andman-portableanti-tanksystems(MANPATS),duetotheirabilitytothreatenandaffectlargermilitary(andcivilian)equipmenttoagreaterextentthanotherSALW.”
5
Purposeandscopeofthispaper
Therelevanceoftechnologytostrengtheningcounter-diversioneffortswasexploredaspartoftheinitialphaseoftheCounteringtheDiversionofarmsusingTEChnologyTools(D-TECT)project.ProjectD-TECTaimstodevelopandtestanapproachtoidentifyingandassessingtheutilityandfeasibilityofusingspecifictechnologiesforpreventing,detecting,negatingormitigatingthediversionofconventionalweaponsandtheircomponents.ProjectD-TECTconsistsoftwoconsecutivephases:
?Toidentifyexistingtechnologiesthatcouldbesuitedtocounteringthediversionofconventionalweaponsystems,includingSALW,ammunition,partsandcomponents(hereafterreferredtoas“conventionalweaponsandrelatedcomponents”),andtodevelopaframeworkthatmakesitpossibletoidentifyandassesstechnologiesusedtocounterdiversion.
?Toassess,refineandvalidatethelistoftechnologiesidentifiedinphase1inrela-tiontospecifictypesofconventionalweaponsystems.
ThefindingsandconclusionsofProjectD-TECTresearchcouldberelevantinthecontextofthedifferentinternationalandregionalinstrumentsthatseektoenhanceeffortstoprevent,detect,eradicateandaddressdiversionofSALW.Inparticular,thesefindingscouldhaverelevanceinthecontextofongoingprocesses,notablythePoAandtheATT,aswellastheFirearmsProtocol,theGlobalFrameworkforThrough-lifeConventionalAmmunitionManagement,andrelevantprocessesoftheUNSecurityCouncilandsubsidiaryorgans
(suchasitscommittees).Assuch,theprimaryintendedaudienceisstateauthorities.Additionalrelevantstakeholdersforwhomthisresearchisrelevantincludetheprivatesector,civilsociety,internationalorganisations,andallotherstake-holdersinvolvedacrossthelifecycleofSALWandcomponentsofconventionalweapons(CWC).Asummaryofthemainfindingsisprovidedbelow.
ThispaperpresentsfindingsfromthesecondphaseofProjectD-TECT,whichfocusesspecifi-callyontheapplicationoftechnologytocounterthediversionofSALW.AsecondpaperexaminingCWCwillbereleasedinAugust2024.7Futurephasesofresearchwillexpandbeyondthesetwospecifictypesofitemsandalsoexploretheappli-cabilityoftheframeworktoothertypesofconven-tionalweapons,componentsandammunition.
Thispaperpresentsinitialinsightsintotherele-vanceandapplicabilityofselectedtechnologiestosupportorstrengtheneffortstocounterthediver-sionofSALW.Ithighlightsbarrierstotheuseoftechnologyandpossibleavenuestoovercometheseobstacles.DrawingontheinitiallonglistoftechnologiesidentifiedinthefirstphaseofD-TECT,14technologies(presentedinTable1alongwithbriefoutlinesoftheirvariouspotentialpurposes)areatthecentreofthetechnologicalassessmentandthefindingspresentedinthispaper.8
Inadditiontotheassessmentoftheaforemen-tionedtechnologies,thispaperandthesubse-quentoneonCWCareintendedasaproof-of-conceptforthetechnology-assessmentapproach(asexplainedinthenextsection)anditsutilityinaidingreflectiononrelevanttechnologieswithinthecontextofcounter-diversionofconventionalweaponsandtheircomponents.
Table1:Longlistoftechnologiesandtheirpurposes
Potentialpurpose(s)
Technology
Accountabi-lity
Trackingandtracing
Item-level
identifica-
tion
Inventoryandstorage
Anti-
tampering
Identifica-
tionand
certification
(End-use)monitoring
Data
capture/recording
Data
analysis
2Dcodes
√
√
√
√
Chemicalencoding
√
√
√
√
DNAcoding
√
√
√
√
Document
authentication
√
Electronicseals(e-seals)
√
GNSSandmobiletracking
√
Near-field
communication(NFC)
√
√
√
√
Radio-frequencyidentification
(RFID)
√
√
√
√
√
Sensors?
√
√
√
InternetofThings(IoT)
√
√
DistributedLedger
Technology(DLT)
√
√
√
Bigdataanalysis?
√
NaturalLanguageProcessing(NLP)?
√
Computervision?
√
?Thewideexistingrangeofsensorsincludes,e.g.,cameras,radars,thermalimaging,x-rayscanners,gasindicators,acousticsensors,time-temperatureindicators,RFID,etc.?Thesearesubsetsofartificialintelligence(AI).
6
ANALYSIS
7
Summaryofkeyfindingsfromphase1ofProjectD-TECT
FindingsfromD-TECT’sfirstphasedemonstratethattakinganeeds-drivenandcontext-sensitiveapproachtotheapplicationoftechnologyforcounter-diversioniscrucial.6Inotherwords,theselectionoftechnologyshouldnotbedrivenbyitsmereavailability.
Athree-stepframeworkemergedfromthefirstphaseoftheresearch(seeFigure1).Thefirststepfocusesonunderstandingtherisksofdiversion,whicharetailoredtoeachspecifictypeofconven-tionalweaponandthecontextinwhichitoper-ates.Thesecondstepexaminestheexistingtechnologiesthatcouldhelppreventorovercometheidentifiedriskorrisks.Thethirdandfinalstepassessestheidentifiedtechnologiesaccording
tothecontextsinwhichtheyaretobeappliedandalsoagainstselectedattributesthatthetechnolo-giesshouldpossess.
Phase1ofProjectD-TECTalsoidentifiedaninitiallonglistoftechnologies(seeFigure2)thatcouldpossiblyberelevantinstrengtheningcounter-di-versioneffortsininternationalarmstransfersofconventionalweaponsandrelatedcomponents.Theidentificationofthesetechnologieswasguidedbytheirpotentialrelevanceandtheirabilitytocounterdiversion.Specifically,thesetechnologieswereselectedbecausetheyareeither(a)usedtocounterthediversionofweaponsbutremainlimitedintheiruseandarenotwide-spread;or(b)usedintheciviliancommercialrealmtoincreasetheintegrityandsecurityofsupplychainsbuthavenotbeenusedforsensitivemilitaryorsecurityitems.
Figure1:Frameworktoidentifyandassesstechnologiestocounterthediversionofconventionalweaponsandrelatedcomponents
Step1
Specifyingtheaimofusingtechnologyandmappingitem-specificrisksofdiversion.
Step2
Identifyingpotentialtechnologieswhichcouldhelpaddresstheaim(s)andrisk(s)identi-fiedinStep1.
Step3
Analysingthecontextinwhichtechnologiesaretobeimplemented.
Figure2:Overviewoftechnologies
Morecomplextechnologies
Lesscomplextechnologies
?2Dcodes
?Chemicalcoding
?DNAcoding
?Document
authentication
?Electronicseals(eSeals)
?Globalnavigation
satellitesystem(GNSS)andmobiletracking
?Nearfieldcommunication(NFC)
?Radio-frequency
identification(RFID)
?Sensors
?InternetofThings(IoT)
?DistributedledgerTechnology(DLT)
?Bigdataanalysis(AI)
?NaturalLanguage
Processing(NLP)(AI)
?Computervision(AI)
8
ANALYSIS
Methodology
ProjectD-TECTadaptedanexistingmethodologytoframetheassessmentofthelonglistoftechnol-ogies:theSystematicTechnologyReconnaissance,EvaluationandAdoptionMethod(STREAM).9Asthenameindicates,thisapproachassessestherelevanceoftechnologiesandthepossibilitiesoftheiradoptiontofulfilaspecificpurpose.Thismethodologycomprisesfivesteps:
1.framingoftheissue;
2.identificationoftechnologies;
3.characterisationoftheissue;
4.comparisonofoptions;and
5.decision.
Steps1and2werethefocusofthefirstphaseoftheproject,whilethisphasefocusesonsteps3and4.10Specifically,step3involvesthefollowingelements:
1.assessmentofthepotentialimpactoftheidentifiedtechnologiesoncounteringdiversion;
2.assessmentofthepotentialbarrierstotheimplementationofthesetechnologies;and
3.assessmentofthecostsrelatedtotheimplementationofthesetechnologies.
Step4consistsofacomparisonofthetechnologiesbasedontheassessmentemergingfromstep3.
Asequentialexploratorydesignwasusedtocollectthedata.Theprojectteamusedsurveystocollectprimarilyquantitativedata,whichwasthenusedinonlineexpertworkshops.TherewasasurveyandanassociatedworkshopsforeachofthreedifferentstagesinthetypicallifecycleofSALWorCWC:pre-export,transferandpost-delivery.TheselectionanddefinitionofthesestagesisfurtherdiscussedinSection2.
Aheadofeachworkshop,allworkshoppartici-pantswereinvitedtocompleteanonlinesurvey.Thesurveysconsistedoftwoparts.Inthefirst
part,respondentswereaskedtoassessthetech-nologies’perceivedpositiveimpactoncoun-ter-diversioneffortsforSALWandforCWC.Thesecondpartfocusedonthepotentialbarrierstothesuccessfulimplementationofthesetechnolo-gies,againwithseparateassessmentsforSALWandCWC.Duringtheworkshops,whichtookplaceonline,thesurveyfindingswerepresentedanddiscussed,allowingtheparticipantstoelaborateontheirreasoningbehindtheirresponsesandtoaddfurtherinsightsontheapplicationoftech-nologytocounter-diversionefforts.
Participantscamefromabroadvarietyofback-groundsincludingnationaltransfercontrol(licensing)authorities,customsandbordercontrolagencies,UnitedNationsentities(e.g.,theOfficeonDrugsandCrime,theOfficeforDisarmamentAffairs),otherinternationalorganisations(e.g.,theWorldCustomsOrganization),regionalorgan-isations(e.g.,theOrganizationofAmericanStates),theprivatesector,andresearchorganisa-tions.Participantswerenotselectedfortheirexpertiseorknowledgeonthetechnologiesperse,butratherfortheirexperienceininternationaltradeflows,armstransfercontrols,andcoun-teringthediversionofconventionalweaponsandtheircomponents.11Therewasadifferentgroupofparticipantsineachworkshop,althoughsomeexpertsdidtakepartinseveralworkshopsduetoexpertiseindifferentstages.Table2providesanoverviewofthedata-collectionapproachandparticipationrates.
Inaddition,severalsemi-structuredinterviewswereconductedthroughouttheproject.Relevantinsightsfromtheseinterviews,aswellasconclu-sionsdrawnfromaliteratureanalysis,areusedinthispapertofurthersubstantiateinsightsfromthesurveysandtheworkshopdiscussions.
Threekeylimitationsshouldbenoted.First,thefindingsarebasedononlyarelativelysmallnumberofsurveyrespondentsandworkshopparticipants,whoformonlyasmallsubsectionofthewidercommunityinvolvedincounter-diver-
9
Table2:Overviewofthedata-collectionapproachforSALW-specificinputs
Workshop
Lifecyclestage
Itemtypes12
Numberof
surveyrespon-
dents
Numberof
workshop
participants13
Date
1
Pre-export
SALWandCWC
17
17
26February2024
2
Transfer
SALWandCWC
12
18
14March2024
3
Post-delivery
SALW
17
21
26March2024
sionofSALW.Second,whiletheprojectteamsoughttoensureawide-rangingrepresentationofperspectivesfromtheparticipantsintermsofbackground,expertiseandgeographicalrepresentation,mostoftheinputsnonethelessemergedfromentitiesandindividualsfromtheWesternEuropeanandOtherStatesregionalgroup.Third,participantsdifferedintermsoftheirlevelsofknowledgeandunderstandingofeachofthetechnologies,aswellasthedifferenttypesofneeds,resourcesandexpectationstheyconsideredwhenparticipatingintheresearch.Thefindingspresentedbelowhavebeenaggregated,andsodonotallowforsuchdifferencestoemerge;thus,theymaynotalwaysbereflectiveofeachindi-vidualresponse.Overall,thefindingsshouldbeseenasillustrativeratherthanauthoritativeandshouldnotbegeneralisedorextrapolatedbeyondtheconstraintsofthisstudy.Despitetheselimita-tions,however,itishopedthatthefindingsandconclusionscannonethelessofferusefulinsightsintotheapplicationoftechnologytocounter-di-versioneffortsandcanpavethewayforfurtherresearchandactioninthisarea.
Reportstructure
Section2presentstheoverallassessmentofthetechnologieswhichcouldbeusedtocounterthediversionofSALW,basedonthesurveyinputsandworkshopdiscussions.Section3thenprovidesanoverviewofkeysystemicbarrierswhichemergedwhendiscussingtheapplicationoftechnologiestocounter-diversionefforts.Italsoproposespossibleavenuestomitigateorovercomethesebarriers.
Section4concludesthereportwithreflectionsonthekeyfindingsontheimplementationoftech-nologytoaidinthecounter-diversionofSALW.
Section2-Assessingthetechnologies
Thissectionpresentsthemainfindingsdrawnfromthesurveysandworkshopdiscussions.Itprovidesanoverviewoftheparticipants’inputsregardingthepossibleimpactoftechnologiesoncounter-diversionofSALW,andthepossiblebarriersthatthoseseekingtoimplementthesetechnologiesmightface.Beforethefindingsarepresented,theapproachusedtoelicitthemisbrieflyexplained.
Risksandmethodsofdiversiondifferaccordingtothetypeofitem,thecontextandlocation,andthestageofthesupplychainorlifecycle.14Consciousofthesedifferences,eachworkshopanditsasso-ciatedsurveyfocusedononeofthreedifferentstagesofthelifecycle,inadditiontothetwosepa-ratetypesofitems(SALWandCWC).Withinthecontextofthisresearch,thestagesaredefinedasfollows:
1.Pre-export:Thisisthestagewhennationallicensingauthoritiesconsideranapplica-tionforalicenceforaninternationaltransferofSALW–i.e.,post-manufacturebutpre-shipmentofSALW.Methodsofdiversionatthepre-exportstageincludeunauthorisedproduction,illicitremovalor
10
ANALYSIS
theft,useofforgeddocuments,anduseofshellorfrontcompanieswithaviewtohidetheeffectiveenduserorenduse.Oneofthekeyelementsofthisstageisariskassessmentoftheproposedtransfer,whichwillincludeanassessmentofthepotentialfordiversionoftheSALW.Theresultoftheassessmentwillinformthegovernment’sdecisionwhethertoauthoriseordenytheinternationaltransfer.
2.Transfer:ThisstageisthetransportationofSALW(e.g.,byland,airorsea)fromthecountryoforigintotheircountryofdesti-nation(possiblyviadifferenttransitcoun-tries),includingtheirimportintotherecipientcountry.Methodsofdiversionduringthisstageincludeuseoffakedocu-mentation,deliberatemisdescriptionofthegoods,reroutingofthegoodsattransithubs,andsmugglingortheft.
3.Post-delivery:Thisreferstothepost-ship-mentverification
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度個(gè)人房屋抵押民間借貸借款協(xié)議文本3篇
- 2025年度平板車租賃運(yùn)輸合同風(fēng)險(xiǎn)評(píng)估與控制
- 個(gè)人租房合同標(biāo)準(zhǔn)版可打印
- 二零二五年度處理男子外遇妻子懷孕離婚撫養(yǎng)權(quán)糾紛調(diào)解合同
- 二零二五年度智慧家居項(xiàng)目報(bào)建代理與智能家居合同2篇
- 2025年度鐵礦石進(jìn)出口關(guān)稅及稅費(fèi)繳納合同規(guī)范
- 二零二五版礦產(chǎn)資源租賃居間代理合同3篇
- 二零二五年度企事業(yè)單位廉潔從業(yè)監(jiān)督員聘任合同
- 2025阿里巴巴智能物流機(jī)器人研發(fā)及銷售合同3篇
- 重慶文化藝術(shù)職業(yè)學(xué)院《應(yīng)用文寫作》2023-2024學(xué)年第一學(xué)期期末試卷
- 《大學(xué)生職業(yè)發(fā)展與就業(yè)指導(dǎo)》課程標(biāo)準(zhǔn)
- 第23課《出師表》課件(共56張)
- GB/T 3953-2024電工圓銅線
- 發(fā)電機(jī)停電故障應(yīng)急預(yù)案
- 接電的施工方案
- 常用藥物作用及副作用課件
- 幼兒阿拉伯?dāng)?shù)字描紅(0-100)打印版
- 社會(huì)組織等級(jí)評(píng)估報(bào)告模板
- GB/T 12173-2008礦用一般型電氣設(shè)備
- 新媒體研究方法教學(xué)ppt課件(完整版)
- 2020新版?zhèn)€人征信報(bào)告模板
評(píng)論
0/150
提交評(píng)論