By Categories: Editorials, FP & IR

Post the 2003 Iraq war, the debate regarding weapons of mass destruction (WMD) was confined mostly to the realm of nuclear weapons for more than a decade. The perception that WMDs are not for actual use but for deterrence broadly continues to hold in the post Cold War period too. However, it is also a fact that certain categories of WMD like chemical weapons (CW) have been used during the Cold War. In the post Cold War era too, the Syrian conflict and the alleged use of CW to kill the half-brother of North Korea’s leader Kim Jong-un in Malaysia continues to shine a spotlight on the dangers of the use of such weapons.

In the post 9/11 period, it was professed that the major threat in the realm of WMDs could emerge mainly from the international terror groups. The use of CW in Syria in August 2013 however dealt a blow to this thinking. It was confirmed by the United Nations that the CW were used at a location called Ghouta (suburb in Damascus), killing nearly 1,500 civilians. These weapons were found used at few other locations in Syria during earlier occasions too. President Barack Obama had asserted in 2012 that any possible usage of chemical weapons would amount to crossing a ‘red line’, which would invite a US military response. The military intervention by the US forces in Syria did happen few months after the use of CW by the Syrian forces (or by rebel forces as claimed by the Assad regime).1 CW were also used as the bargaining tools in the West Asian geo-political theatre. One of the reasons for Libya to join the Chemical Weapons Convention (CWC) by declaring its weapons stockpile during 2004 was Gaddafi’s desperation to normalise relations with the Western world.

North Korea has blatantly breached the CW ‘red line’ in a very peculiar manner in the latest incident. Kim Jong-nam was killed on February 13 at Kuala Lumpur airport while he was waiting to catch a flight. Two women wiped a substance on his face leading to his death within 20 minutes. It has been found that the substance used for this killing was a nerve agent called VX. This agent is considered as one of the most potent chemicals which affects the nervous system and disturbs the functioning of human muscles eventually leading to death. This substance is derived from organophosphate pesticides and its lethal dose ranges from about 10 milligrams via skin contact to 25-30 milligrams, if inhaled. This substance has been classified by the United Nations as a WMD.

The attack was a bit of a surprise as Pyongyang had not given any indications regarding a renewed interest in CW. For more than a decade now, North Korea has been attracting global attention by undertaking nuclear tests and launching missiles. They have also undertaken few satellite launches by using their own rockets. By successfully orchestrating an assassination by using CW, North Korea has succeeded in sending a message that they are not averse to using the WMD in their possession. Kim Jong-un is keen to ensure that no challenge emerges to his position from his extended family. From the North Korean point of view, the use of VX agent was a perfect choice, because this agent is known to cause instant death.

The most appalling aspect of the killing was that though the victim died within about 20 minutes, nothing is known to have happened to the women who were seen to have used their hands to apply the VX agent on the face of the victim. This clearly indicates that some successful method has been devised to protect the women from the dangerous affects of the nerve agent. Also, the production of VX is not a simple task and requires a lot of technological sophistication. The major question which remains unanswered though is the manner in which the deadly CW reached Malaysia.

North Korea is alleged to have the world’s third-largest stockpile of CW. They are known to have produced agents like Sarin, VX, Mustard, Tabun and Hydrogen Cyanide. North Korea is one of the three states (apart from Egypt and Sudan) that has not signed or acceded to the CWC. It is believed to be producing CW since the 1980s and is now estimated to have stockpiles of around 25 chemical agents amounting to approximately 5,000 tons. North Korea is also known to have made investments in biological weapons, and believed to be having 12-13 types of biological weapons, including anthrax, plague, among others.

North Korea has taken the biggest of political risks by using CW at this point in time and that too in a friendly foreign state. North Korea and Malaysia established bilateral relationship more than 45 years ago. Both the states opened embassies at Kuala Lumpur and Pyongyang in 2003. Since 2009, Malaysians did not require a visa to travel to North Korea (and vice versa). After the airport incident, North Koreans are now required to obtain a visa to visit Malaysia.

The incident is also spoiling the important relationship that Pyongyang shares with its all-weather friend, China. Beijing has been extremely upset with the brazen missile testing undertaken by North Korea in recent times. China, which was importing coal from North Korea in spite of the UN sanctions, decided to suspend all imports on February 19. For the Trump administration, dealing with North Korea will continue to be a major challenge. The CWC, considered one of the most successful arms control treaty mechanisms in the world and which would be celebrating its twenty years of existence in April 2017, continues to face serious challenges even today.


Share is Caring, Choose Your Platform!

Subscribe

and stay updated

Related Posts

  • Darknet

    Definition:

    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.

    Examples:

    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.
    •  

    Cons:

    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.
     
     

Recent Posts

  • Darknet

    Definition:

    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.

    Examples:

    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.
    •  

    Cons:

    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.
     
     

    Artificial Intelligence

    Definition:

    AI, or artificial intelligence, refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and understanding natural language.

    Examples:

    • Virtual assistants: Siri, Alexa, and Google Assistant are examples of virtual assistants that use natural language processing to understand and respond to users’ queries.
    • Recommendation systems: Companies like Netflix and Amazon use AI to recommend movies and products to their users based on their browsing and purchase history.

    Pros :

    • Efficiency: AI systems can work continuously without getting tired or making errors, which can save time and resources.
    • Personalization: AI can help provide personalized recommendations and experiences for users.
    • Automation: AI can automate repetitive and tedious tasks, freeing up time for humans to focus on more complex tasks.

    Cons:

    • Job loss: AI has the potential to automate jobs previously performed by humans, leading to job loss and economic disruption.
    • Bias: AI systems can be biased due to the data they are trained on, leading to unfair or discriminatory outcomes.
    • Safety and privacy concerns: AI systems can pose safety risks if they malfunction or are used maliciously, and can also raise privacy concerns if they collect and use personal data without consent.