- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index
(p. 356) 24. The Weapons Trade
- Chapter:
- (p. 356) 24. The Weapons Trade
- Author(s):
Suzette R. Grillot
- DOI:
- 10.1093/hepl/9780198708315.003.0024
This chapter discusses the international weapons trade. It first provides a historical background on the global arms trade and highlights the ways in which the trade in defence and military equipment has shifted throughout the years until the present day. It then examines contemporary trends in the weapons trade and how weapons are illicitly traded. It also shows how the illicit arms trade is connected to the legal arms market and concludes by describing various attempts that have been made in recent years to control the global arms trade, as well as prospects for its future regulation. Three case studies are presented to highlight the main issues surrounding the international weapons trade: the first relates to the use of man-portable air defence systems (MANPADS) in terrorism, the second involves arms broker Victor Bout, and the third deals with the non-governmental organization known as the International Campaign to Ban Landmines.
Access to the complete content on Politics Trove requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
Please subscribe or login to access full text content.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.
- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index