Hostname: page-component-745bb68f8f-kw2vx Total loading time: 0 Render date: 2025-02-11T03:27:10.103Z Has data issue: false hasContentIssue false

A turn toward experimentalism? Rethinking security and governance in the twenty-first century

Published online by Cambridge University Press:  17 June 2013

Rights & Permissions [Opens in a new window]

Abstract

Conventional understandings of security cooperation are rooted in the state-centric and materialist assumptions dominant in the Cold War and subscribe to the dictum of the Reagan years, ‘trust but verify’. In today's more complex setting, however, governance arrangements with the most potential to address constantly mutating security threats, such as the concern over nuclear terrorism, may not be those solely designed to ensure compliance, but rather those that are better equipped to identify and solve new problems. This article draws on a burgeoning literature on ‘new’ or ‘experimental’ governance and advances an analytical framework to consider the extent to which states and other actors might be turning toward an alternative set of mechanisms that rely more heavily on non-binding standards and recommendations, peer review, increased participation, and experimentation to generate new knowledge about the challenges they face, even in the ‘hard’ case of security cooperation. It then explores this potential reorientation in two separate, but complementary cases that have emerged as key tools in preventing illicit nuclear proliferation: the Financial Action Task Force on Money Laundering (FATF), which seeks to bolster states' counter-financing of terrorism systems, and the UNSC Resolution 1540 Committee, which guides efforts to fill the governance gaps in the nuclear non-proliferation regime. Although both cases on paper contain more traditional enforcement components, in practice they rely increasingly on experimental governance. The article concludes with an evaluation of the promise and limits of an experimentalist framework in understanding the evolution of governance arrangements in response to a more complex security environment and suggests potential avenues for future research.

Type
Articles
Copyright
Copyright © British International Studies Association 2013 

Few dispute that the global security environment has evolved significantly since the end of the Cold War. This evolution is reflected in the discourse employed by the variety of actors involved in security debates today. Buzzwords like ‘dirty bomb’, ‘asymmetric threat’, ‘brain drain’, and ‘illicit proliferation network’, are now commonplace in the vernacular and policy makers at the highest level are beginning to respond in kind. Take, for example, the changing threat associated with nuclear proliferation. In April 2010, US President Barack Obama stated, ‘The greatest threat to US and global security is no longer a nuclear exchange between nations, but nuclear terrorism by violent extremists and nuclear proliferation to an increasing number of states.’ That same month, the United States hosted 46 states for an unprecedented summit on nuclear security, reflecting the recognition not just of a common threat, but also of a global regulatory environment characterised by unprecedented fluidity, complexity, and uncertainty.Footnote 1

What implications does this evolving environment have for multilateral security arrangements? Existing scholarship on this question can be divided into two camps. One is an outgrowth of the longstanding debate over the role of institutions in mitigating impediments to cooperation such as mistrust and a fear of cheating. This camp largely focuses on questions of compliance and the mechanisms best suited to promoting it in the post-Cold War era. A second camp integrates new developments in the global governance literature with the empirical study of security. These scholars explore recent developments like the privatisation of security, the impact of the information age, and the rise of alternative mechanisms of regulation in response to a complex global environment.

While both of these camps offer valuable insights into the evolution of multilateral security arrangements, they largely overlook signs of what some in US and EU legal circles call ‘new’ or ‘experimentalist’ governance. This is true in part because this prospective ‘experimentalist turn’ is still inchoate and in part because experimentalist work has only engaged security as an area of application on a very limited basis.Footnote 2 In its pure form, experimentalist governance utilises standards and recommendations, an iterated standard-setting process, increased participation at multiple societal levels, and experimentation to generate new knowledge about the challenges stakeholders face.Footnote 3 After reviewing prevailing approaches to security governance and with an eye toward teasing out the core features and functions of experimentalist governance, the first section of this article identifies and expounds upon three core shifts that characterise this potential turn: from state-centric to network-based governance models; from fixed and uniform rules to flexible and revisable standards; and from rule enforcement to problem-solving.

The second part of the article considers a potential turn toward experimentalism by examining two separate, but complementary cases that serve as key tools in efforts to counter terrorism and nuclear proliferation: the Financial Action Task Force on Money Laundering (FATF), which seeks to bolster states' systems on counter-financing of terrorism (CFT), and United Nations Security Council Resolution 1540 and the 1540 Committee, which together guide efforts to fill governance gaps in the nuclear non-proliferation regime. Although both cases contain ‘traditional’ features such as monitoring and enforcement, we argue in practice that they rely increasingly on experimentalism.

Our analysis suggests that while traditional modes of governance continue to play important roles, they are operating within a more complex and diverse system of decision-making and policy formulation, largely in response to the transitory regulatory environment. Consequently, stakeholders have reason to rely increasingly on experimentalism, which could have important implications for the form and function of regulatory arrangements, even in the high stakes realm of security. The article concludes by considering the implications of these findings for security governance and for scholars seeking to explain its function and evolution over the years to come.Footnote 4

Beyond compliance?

A range of studies show how perceptions of security have drastically evolved over the past quarter century.Footnote 5 In keeping pace with these threats, actors face a global regulatory environment that is more complex than ever before with greater uncertainty concerning both the nature of, and the potential solutions to, an ever-mutating set of problems. Consequently, the demand for innovative global governance has never been higher.

Traditional approaches to security governance

Despite that demand, much of the security literature remains rooted in traditional debates over the role of institutions, which are heavily influenced by the logic of Jervis's ‘security dilemma’. Jervis argued that security institutions, while extremely valuable, are especially difficult to build and maintain because of the potential costs of individualistic action.Footnote 6 Consequently, to the extent that scholars focus on governance, they stress the need for rigorous verification and enforcement to secure compliance. Realists argue that the great powers fulfil those functions,Footnote 7 rendering security institutions ‘epiphenomenal’, while traditional liberal institutionalist approaches stress how institutions exert an independent influence by mitigating the effects of anarchy through the provision of informational benefits (for example, monitoring and verification) and selective incentives (for example, enforcement).Footnote 8 Thus, although the role of institutions is debated, conventional International Relations (IR) approaches are driven by a common question: to what extent can we mitigate the security dilemma? Both sides see verification and enforcement as key.

After the Cold War, the ‘management-enforcement debate’ revitalised discussion over the relative importance of verification and enforcement. The ‘Managerial School’ contends that states generally comply with agreements and seldom violate regimes intentionally, rendering enforcement mechanisms less important.Footnote 9 Instead, increasing transparency, improving dispute resolution, and intensifying capacity-building efforts represent more effective means. Despite these considerable insights, managerialists may underestimate how often states strategically exploit treaty ambiguities or capacity limitations. They also largely overlook the varied ways that enforcement can affect governance, whether through a ‘shadow of hierarchy’,Footnote 10 or through a ‘penalty default’ that incentivises meaningful participation in cooperative governance.Footnote 11 Finally, they could go further in exploring the social processes and institutional mechanisms that may be critical to promoting compliance and maintaining institutional relevance by adapting to meet an evolving set of challenges.

In contrast, enforcement scholars suggest that compliance may be the wrong metric because compliance is endogenous to the institution; states will not design and ratify treaties that will either expect much of members or be continually violated.Footnote 12 They judge institutions' impact by the ‘depth of agreement’, or ‘the extent to which an agreement captures the collective benefits that are available through perfect cooperation in a particular policy area’, and the ‘depth of cooperation’, or ‘the extent to which it requires states to depart from what they would have done’ in the absence of an agreement.Footnote 13 If deep cooperation is to occur, enforcement measures will be necessary to assuage fears of asymmetric losses.

While the ‘depth of cooperation’ argument is compelling, it underestimates the difficulty of verifying noncompliance and overestimates the likelihood that enforcement alone can address the problem. Even under the most intrusive monitoring arrangements, concrete evidence of noncompliance is extremely difficult to detect and verify.Footnote 14 The ambiguity of international treaties, cultural differences between states, and the burden of gathering sufficient information to interpret behaviour authoritatively all make that determination more difficult.Footnote 15 Nor does detection of a violation guarantee an effective response. Finally, when sanctions are applied, they do not necessarily have the coercive power required to bring about compliance.Footnote 16

More generally, in today's security environment, a governance model focused on securing state compliance with uniform rules may no longer be sufficient.Footnote 17 While legal arrangements often seek some uniformity across borders, they also must confront the variation in the social systems, legal orders, and actors involved in today's regulatory arena.Footnote 18 The result is much greater uncertainty, not just about the relative capabilities and intentions of potential competitors, but also about optimal solutions to security challenges and even about what constitutes a threat in the first place. Rules and norms need to be updated continuously in order to adapt, as compliance with irrelevant rules means little. Such changes raise the question of whether and how security governance has changed in response.

‘Global governance’ and security cooperation

A second camp of scholarship draws from the broader literature on global governance to investigate the implications of a changing security environment. At the last turn of the century, the phenomenon of legalisation and institutional design took centre stage in International Relations, advancing important, primarily rationalist frameworks to think more systematically about governance issues. By showing how institutional design can vary in important ways (based on, for example, the number of actors involved, informational availability, distributive concerns, and enforcement and monitoring problems), this literature helped push the field past debates about whether international institutions matter and onto questions of the conditions under which they matter and how. Authors discuss how ‘softer’ forms of governance are useful in lowering contracting and sovereignty costs, increasing flexibility and adaptability to react to change and diversity, enhancing transparency, and potentially serving as a precursor to ‘hard’ law.Footnote 19

While those approaches are not without their critics, they highlight effectively the important variation in the institutional arrangements that characterise international cooperation. Scholars since have begun to offer a set of approaches that focus more intently on grappling with the proliferation and interconnectedness of global governance arrangements, emphasising the important governance roles played by public-private partnerships,Footnote 20 club standards,Footnote 21 transnational networks,Footnote 22 and regime complexes.Footnote 23 Schaffer and Pollack, for example, emphasise that the integration of soft and hard law makes governance more responsive to a changing environment.Footnote 24 This work all points to a new level of complexity in governance, as overlapping institutions with differing memberships, mandates, and operational mechanisms generate their own challenges for effective cooperation.

A smaller literature has begun to apply these insights more explicitly to the security realm, emphasising the explanatory lens of ‘governance’ or ‘the existence of multiple actors who interact and contribute in the provision of security’.Footnote 25 This literature in general highlights three significant changes in security cooperation today.Footnote 26 The first is a remarkable proliferation of actors, including especially the increased role that private actors play in both challenging and providing security.Footnote 27 A second theme focuses on the informality of interactions, a development related to the proliferation of non-state actors in a legal system written for a world of states.Footnote 28 Finally, these scholars also emphasise that the concept of security today now entails new kinds of issues that require coordination from the local to the international level.Footnote 29

Caparini succinctly ties the three together: ‘What we are seeing, in other words, is the pluralisation of security, both within states and transnationally … That transformation is linked to the gradual shift from government to governance, or the diffusion or fragmentation of political authority among various public and private actors at the local, state and international levels. Governance encompasses shifting networks or constellations of actors who may interact formally or informally and at multiple levels.’Footnote 30 Moving beyond describing changes in form, Daase and Friesendorf argue that the operational effect is potentially positive: ‘By pooling the strength and expertise of states, international organizations, and private actors, security governance is seen to provide more effective and efficient means to cope with today's security risks.’Footnote 31 A more sceptical interpretation might predict the ‘fragmentation’ of governance.Footnote 32

This ‘governance camp’ raises important questions: if more actors are interacting in different ways to address increasingly complex problems that require more coordination across more levels of decision-making, how are they doing it? What form is this more variegated cooperation taking and how might it help the actors better understand how the environment and calibrate their policies in response? What are the implications for more traditional security governance arrangements? As we lay out in the following section, experimentalist governance constitutes one response to this changed environment and one that theorists are only beginning to explore more systematically in security.

The road to experimentalist governance

Traditionalist and governance approaches to security cooperation comprise a valuable body of literature. Each emphasises different means by which security institutions respond to uncertainty and change, whether through management or enforcement strategies, ‘hard’ or ‘soft’ legal mechanisms, or others. Those debates have advanced our understanding of the relative operational importance of certain governance mechanisms in those arrangements.Footnote 33 Nevertheless, important gaps in our knowledge remain. The dichotomous language of hard versus soft law in particular may mask a broader spectrum in which different forms of law interact with, and act upon, one another.Footnote 34 Partly as a result, less work directly considers whether there might be a more fundamental shift in how the design of governance arrangements is evolving to meet contemporary challenges and whether those arrangements follow an alternative logic.

An examination of security institutions through the theoretical lens of experimentalist governance offers some analytical purchase in this regard. Experimentalist approaches are most often contrasted with traditional, command-and-control forms of governance, which experimentalist theory criticises as exclusive, poorly equipped to address societal complexity, ill-prepared to adapt to changing circumstances, and poorly suited to produce the new knowledge needed to solve evolving problems.Footnote 35 Not every facet of experimentalism is new, however. Reflecting rationalist assumptions, experimentalist governance represents an attempt to design institutions that respond to the particular challenges of contemporary cooperation.Footnote 36 More in line with constructivist work, experimentalist arrangements do not reflect an equilibrium outcome to a particular ‘game’, but rather are designed to evolve in conjunction with the growing diversity, complexity, and uncertainty of today's global regulatory environment in part by promoting preference change among the actors. When taken as a whole, however, experimentalist theory expects a new institutional logic to develop.Footnote 37 De Búrca and Scott describe it in the following terms:

[T]he idea of new or experimental governance approaches places considerable emphasis upon the accommodation and promotion of diversity, on the importance of provisionality and revisability – both in terms of problem definition and anticipated solutions, and on the goal of policy learning. [Experimentalist] processes generally encourage or involve the participation of affected actors (stakeholders) rather than merely representative actors, and emphasize transparency (openness as a means to information-sharing and learning), as well as ongoing evaluation and review. Rather than operating through a hierarchical structure of governmental authority, the ‘centre’ (of a network, a regime, or other governance arrangement) may be charged with facilitating the emergence of the governance infrastructure, and with ensuring co-ordination or exchange as between constituent parts.Footnote 38

In a more distilled form, the experimentalist governance model rests on the idea of collective problem-solving in complex, multi-level arenas. It involves three fundamental, although not absolute, shifts in emphasis, which together suggest an alternative logic to the design and function of institutions.

(1) From state-centric to network-based governance models. Traditional approaches to international cooperation, especially in security, are often state-centric; cooperative arrangements are designed to regulate the activity of states and rely primarily on states to develop and implement the rules.Footnote 39 Newer work that aims to understand transnational regulatory networks also often views states as the principal actors or orchestrators of this process.Footnote 40

Experimentalist governance arrangements acknowledge the enduring role of states, but also are characterised by their intent to accommodate all relevant stakeholders into the process, including non-governmental organisations, multiple levels of government, or private entities.Footnote 41 Experimentalist institutions should therefore be less hierarchical than their traditional counterparts and should involve a much wider range of stakeholders, though states likely will remain important and even critical actors. This is more than the pluralisation of actors that many governance approaches justifiably emphasise. In its ideal form it is a systematic and substantive inclusion of all relevant stakeholders, ranging from the most local to the international levels of action. Experimentalist theory suggests that such inclusiveness could improve implementation of standards or regulations, as implementation often is a local action. Furthermore, broadening stakeholder access taps into the experiences and expertise of a more diverse set of actors to capitalise on available knowledge, thereby facilitating learning and broadening the procedural basis for institutional legitimacy. This shift also may increase the likelihood of a more thorough diffusion of norms across the many actors involved in implementing those norms, a diffusion that in turn makes actors more accepting of diversity within those common standards.

(2) From fixed and uniform rules to flexible and revisable standards. Traditional governance arrangements apply rules that are rigid across space and fixed over time. Such rules may aid monitoring because compliance assessment is based on a dichotomous formula (compliant/non-compliant) and a universal standard. Experimentalist governance, by contrast, entails a more concrete emphasis on flexibility across space and revisability over time, where the former allows for adaptation to local circumstances and the latter enhances responsiveness to change.Footnote 42 This is more than just ‘soft law’. In fact, much experimentalist scholarship consciously eschews the now standard division between ‘hard law’ and ‘soft law’. The emphasis instead is on the conscious effort to institutionalise revision and adaptation, a process driven by an iterative cycle in which participants establish standards, implement those standards, report on compliance with and effectiveness of the standards, and then integrate any lessons learned into new ones.Footnote 43

In this regard, experimentalism should be identifiable by an active acceptance of diverse implementations of standards and a regular or even routinised updating of strategies to meet standards, as well as of the standards themselves. This conscious construction of a ‘policy laboratory’ is a distinguishing characteristic. It also alters the logic of monitoring and verification, moving them from a punitive purpose and toward a diagnostic one. As a result, the broader body of participants may be more likely to engage the forum in a mindset of deliberation, rendering them more open to persuasion. That ‘thicker’ information from a more diverse set of views can allow actors to better understand each other's ways of thinking and promote common understandings and purpose through continued interaction, contestation, and justification of action.Footnote 44 Experimentalist theory also suggests that governance arrangements driven by policy learning are more likely to demonstrate a ‘ratcheting up’ dynamic over time, as actors capitalise on new knowledge to revise and strengthen standards.Footnote 45 This dynamic relates closely to a final shift.

(3) From rule enforcement to problem-solving. Traditional approaches to governance stress the importance of rigorous verification and material enforcement of compliance, especially in the context of security where mistrust is particularly pronounced. Yet even if a violation is detected, it can be very difficult to generate the political consensus to enforce the rules.

While enforcement and other coercive mechanisms may continue to play an important role, the experimentalist model assumes that the complexity of today's policymaking environment often increases uncertainty about the very nature of many problems and their potential solutions, which complicates conventional notions of verification and enforcement. Consequently, institutions must be concerned not only with ensuring compliance with existing standards, but also with identifying new challenges as they arise and crafting new, problem-specific solutions.Footnote 46 Greater emphasis may therefore be placed on creating an institutional environment that generates and disseminates new knowledge about the causes and effects of problems.Footnote 47

Thus, experimentalist governance might also be identifiable by efforts internal to the process designed to identify coming challenges and by an emphasis on generating new information about the causes, effects, and solutions associated with them. Such mechanisms include the use of benchmarks and iterative standard-setting.Footnote 48 In cases where the mechanisms laid out here fail to work, a number of alternatives are available. Blacklisting, or naming and shaming, takes advantage of the intersubjective knowledge promoted by experimentalist modes of governance to enhance peer pressure. Greater involvement of epistemic communities and deliberative mechanisms are, in principle, more likely to identify behaviour that violates the scope and purpose of standards and therefore ramp up social consensus that could help empower more coercive mechanisms. Some analysts argue that experimentalist governance may operate best in the ‘shadow of hierarchy’, in which actors are compelled to cooperate because a failure to do so will mean the imposition of legally binding rules from higher up.Footnote 49 Others vigorously reject the implied ‘correctness’ that shadow of hierarchy arguments entail, given the uncertainty surrounding the issues experimentalism addresses. Instead, there may exist a ‘penalty default’ in which policy makers create ‘rules sufficiently unpalatable to all parties that each is motivated’ to take advantage of the more flexible approach of experimentalism.Footnote 50

In sum, experimentalist governance aims to keep pace with the transitory environment through an increased reliance on ideational and deliberative mechanisms designed to accommodate diversity, tap into new knowledge that may not emerge at the interstate level, and ratchet up standards and implementation strategies in response. Monitoring, verification, and enforcement are likely to remain important features of governance, especially in security issues, but they alone may not be sufficient to address the regulatory challenges inherent in governing increasingly fluid and dense global interactions.

In recent years, scholars have identified experimentalist processes at work in a broad variety of fields. Experimentalism is especially common in the EU's complex, multi-level, and evolving governance context and it is in that setting that much of experimentalist theory has been developed, tested, and debated. Scholars have also begun identifying experimentalism beyond the EU, including governance of, for example, trade,Footnote 51 fisheries,Footnote 52 human rights,Footnote 53 and the environment.Footnote 54 The following section extends the area of application to consider the security realm.

Experimentalist governance in security cooperation: an application

To what extent might we be seeing a turn toward greater experimentalism in security governance? Here we examine two security arrangements that rely in varying degrees on experimentalism to address heightened concerns about WMD proliferation and terrorism after 9/11. The first case, the Financial Action Task Force on Money Laundering (FATF), had used experimentalism prior to 9/11 to establish an anti-money laundering regime built around recommendations. After 9/11, FATF adapted its mission to address terrorism financing and, despite calls for increased use of coercive mechanisms, ultimately reinforced the role of experimentalism in its operation. The second case, UN Security Council Resolution 1540 and the 1540 Committee, were created from scratch to fill a void in the non-proliferation regime made clear in part by the discovery of A.Q. Khan's illicit procurement network. The 1540 Committee is binding on all UN members, but also contains features that reflect a degree of experimentalism.

These cases offer insights into what policymakers have identified as top security concerns. And while a considerable amount of research examines the nature of the threats, comparatively little work analyses the governance response thereto. Most importantly, however, if one adopts a purely traditionalist perspective, preventing proliferation and terrorism through experimentalism runs counter to convention. Traditional approaches contend that when uncertainty is high and the stakes are great, states are most likely to insist on rigorous verification mechanisms with fixed rules and material enforcement. Viewed through this lens, we might expect to see either a least common denominator agreement, where any higher compliance is driven by coercion from a hegemonic power, or a unilateral or club standard that is forced upon others. Most approaches would not predict sustained efforts to promote ‘deeper’ cooperation that emphasise experimentalism. As such, if we find experimentalism at work in this unlikely setting, it lends credence to the argument that we might expect to see it at work elsewhere and in turn raises questions for future research.Footnote 55

The Financial Action Task Force on Money Laundering and counter-financing of terrorism

While US President George W. Bush promised to ‘starve terrorists of their funding’ in the wake of 9/11, the little intelligence available on terrorism financing suggested it would be difficult.Footnote 56 The sums involved were relatively small and traditional methods of money transfer, such as the person-to-person model of hwala, can keep funds out of the formal banking system entirely. The United States and its allies decided quickly to work through FATF.Footnote 57 Initially established in 1989 to help states combat drug trafficking through its ‘40 Recommendations’ for a better anti-money laundering (AML) system, counter-financing of terrorism (CFT) was added to FATF's mandate after 9/11. In October 2001, FATF members produced eight ‘special recommendations’ that focused on disrupting terrorist financial networks and added a ninth in 2004.Footnote 58

Existing understandings of FATF all highlight some corner of the network's activities. FATF standards began as a club standardFootnote 59 in which peer pressure was perhaps the most important tool.Footnote 60 Its technical nature means that experts exert substantial influence on its decisions.Footnote 61 In general, most work on the AML/CFT regime has suggested that coercion by the US and EU explains the diffusion and at times FATF also has moved toward a more coercive strategy, especially in CFT efforts.Footnote 62 An experimentalist lens, however, provides a more comprehensive understanding of the strengths and weaknesses of FATF's role in post-9/11 security and highlights how members, including the United States, ultimately turned back to FATF's experimentalist characteristics to tackle this new problem. Consider again the three shifts of experimentalism described above.

(a) From state-centric to network-based governance models

FATF is comprised of a multi-level, transnational network. National delegations to FATF include multiple domestic regulatory agencies and, despite scepticism, the private sector increasingly participates in FATF's now standard calls for public comment on new proposals. FATF has granted regional AML bodies, the ‘FATF-style Regional Bodies’, an increasing role in decision-making over time. FATF also works to ensure that major international organisations endorse and apply its standards, as we show below.Footnote 63 This wide, relatively flat organisational structure is reinforced by a tradition of consensus-based decision-making. The result is a network that stretches from individual banks, through the domestic regulatory system, through FATF and regional iterations of FATF, and up to IOs, an efficient network for diffusion.

We do not argue that all voices are heard equally. The capabilities of the financial powers, especially the US, give them additional influence in agenda-setting and beyond. In interviews with FATF participants, however, officials from ‘powerful’ and ‘weak’ states alike stressed that individuals within the network can strongly influence the outcome if they are seen as especially knowledgeable, regardless of their home jurisdiction.Footnote 64 Interviewees said the same of eager states; they can play a role that is larger than their share of the financial markets would imply they could.Footnote 65 Experimentalist theory and work on global governance more broadly alike has emphasised how this multi-level, participatory approach should narrow both the implementation and the legitimacy gap often associated with global governance, as those responsible for interpreting and implementing the standards influence their development.Footnote 66

(b) From fixed and uniform rules to flexible and revisable standards

FATF's ‘40+9 Recommendations’ are widely accepted as the global standard for AML and CFT. Consistent with an experimentalist approach, the recommendations are outcome-based, meaning states have flexibility in enacting legislation that achieves those outcomes. This design aims to enhance effectiveness by ensuring that laws fit within a state's specific institutional context. It also turns the states’ different systems into an aggregated policy laboratory that promotes learning regarding the best solutions to problems because those new ideas, in turn, can be integrated into the Recommendations as the standards are revised.Footnote 67 FATF reviews the standards annually for necessary changes and has undertaken comprehensive reviews three times. Where practice shows misunderstandings, FATF issues interpretative notes to clarify the intention of recommendations and regularly issues ‘best practices’ to diffuse effective solutions.Footnote 68 This systematised updating grants new members input on the evolution of standards, reinforcing the relatively flat organisation and identifying it as an experimentalist process.

(c) From rule enforcement to problem-solving

The question of enforcement is a critical one in the debate over FATF and bears discussing in greater detail. As others have noted, the enforcement provisions of FATF are strikingly weak.Footnote 69 Most of the work is left to financial institutions, which are not obliged to follow FATF's standards unless states pass laws to that effect. In the wording used early on, states were expected to ‘be able to apply appropriate countermeasures’ against non-compliant jurisdictions. FATF has never called for a full application of those countermeasures against any of its members and only twice prior to 2012 have FATF members threatened some measure of enforcement against one of their own. In the first case, Turkey had failed to even criminalise money laundering several years after joining. In the second case, Austrian regulations continued to allow for anonymous passbooks, which make money laundering simple. In both cases, the targets had been involved in the process leading to the threats and the threat to invoke enforcement reflected wide normative consensus by FATF members. Once made, the threats were credible enough to convince the states to quickly change domestic laws they had long defended.

In dealing with non-compliant non-members, however, FATF chose a much more coercive stance. For those targets, FATF initiated a blacklisting known as the Non-Cooperative Countries and Territories (NCCT) process.Footnote 70 Members were encouraged to apply all available countermeasures to the listed states and, as others have noted, most of the targets quickly changed their laws. FATF itself argued that the process had been successful.Footnote 71 Shortly after, however, FATF eliminated the NCCT process and replaced it with a new tool, the International Cooperation Review Group (ICRG). Evidence on the new ICRG is still lacking. Not surprisingly, public statements from its chair imply a new modus operandi. More tellingly, in interviews, one official from a national delegation confirmed that the process has been qualitatively different, particularly in that targeted states are more much involved from the beginning. Also, both members and non-members are subject to the same process. An experimentalist framework and FATF's own history suggests that if FATF is to work best, the ICRG should seek to rely even more on persuasion, learning, diffusion, and peer pressure, rather than coercive blacklisting.

The decision to eliminate the NCCT, a seemingly effective tool of enforcement, is difficult to explain from a traditional security studies approach. Sharman's more nuanced approach, which correctly stresses both a constitutive and constraining effect of blacklists, provides a more complete picture of the dynamics potentially at play in blacklists, but also has a hard time explaining the decision to abandon the process, since it effectively diffused standards.Footnote 72 Within an experimentalist governance framework, on the other hand, that move seems more logical, as the goal is more than securing minimal compliance. FATF did away with the NCCT, first, because many members were never fully comfortable with its coercive nature. It had been rejected as a strategy repeatedly in the past and opposition re-emerged once it was applied. Non-members also objected.Footnote 73 The World Bank and IMF, for example, made their endorsement of FATF contingent upon the cessation of the programme, a deal which FATF accepted.Footnote 74 Second, an experimentalist framework highlights that the NCCT process was only minimally effective. Most jurisdictions complied with the lowest expectations.Footnote 75 There is little evidence that the targeted states are fully committed to the AML-CFT mission, and thus most are not contributing new knowledge to the network. While blacklisting was largely effective from a compliance perspective because it provided targets with the incentive to comply with the minimum standards, from a problem-solving perspective its performance was weak and its abandonment is not surprising.

Regarding CFT in particular, after 9/11, the US pushed hard to use FATF for that end, a goal that members accepted. According to interviews, however, the US approached FATF members much more aggressively than it had in the past to promote its preferences. As one US delegation representative described it: ‘We went in hard. We called people out. We bloodied some noses.’Footnote 76 Ultimately, however, other actors pushed back in a way that re-established the experimentalist nature of FATF. The same participant continued: ‘But then we learned, that isn't how FATF works. You have to convince people you're right. After that we changed our approach.’Footnote 77 In the case of FATF, then, efforts to move away from experimentalism and toward coercion were explicitly rejected by members on various occasions in favour of returning to the iterated standard-setting and knowledge creation that had long been the focus of FATF activities.

In addition to members’ decisions to reject a more coercive FATF, an experimentalist framework also highlights the multi-faceted monitoring process within FATF as a source of peer pressure and new knowledge. Self-evaluations, which catalogues states’ laws ‘on the books’, are one aspect of that monitoring. The effectiveness of states’ systems is judged using a second process, the mutual evaluations, which includes on-site visits and interviews by a team of outside experts. A third monitoring mechanism is the mutual evaluations that other organisations, such as the regional AML-CFT organisations and the IFIs, carry out, all using a common evaluation methodology. The states are then subjected to a ‘peer review’ in the plenary in which states are pressed to explain gaps in their regulatory systems.

Finally, the ‘typologies exercises’ comprise a fourth, and particularly notable, means of monitoring. Working in part to monitor the AML/CFT system as a whole, the exercises bring together money-laundering experts to exchange information about new solutions to old problems and new trends in money laundering and terrorism financing. They generate and diffuse knowledge about what works and does not work, and the new knowledge gained from these exercises is used in revising the recommendations. They also constitute a forum in which the epistemic community of anti-money laundering officials can apply peer pressure.

Together these mechanisms comprise a monitoring system that extends beyond what most traditional security arrangements achieve even on paper. In interviews, FATF officials attribute this access to two factors.Footnote 78 FATF was (and technically remains) a temporary task force, although its mandate has been lengthened with each renewal.Footnote 79 More importantly, interviewees from ‘powerful’ and ‘weak’ states alike stressed that they understand the monitoring as an opportunity to explain their systems more fully and to receive useful feedback.Footnote 80 When detached from heavy enforcement mechanisms, verification becomes less punitive and more diagnostic, which would appear to corroborate experimentalist theory. It is less about revealing cheating and more about facilitating learning. Monitoring and verification are altered and strengthened by FATF's experimentalism. As an illustrative example of the creative potential of that system, and especially the exercises, it was at one such meeting where the notion of using FATF as a tool against terrorism financing was first raised. Surprisingly, that occurred before 9/11, in December 2000, and before terrorism was a prominent meme in security policy.Footnote 81

FATF's history contains important warnings about experimentalist institutions. Particularly if there are significant differences in capabilities among participants, powerful states may be tempted to forego more labour intensive and slow moving ideational or social mechanisms in favour of coercion.Footnote 82 But that option exists in most institutions where power asymmetries are significant. That said, FATF's history also suggests that experimentalist governance can be a powerful alternative to more coercive strategies for change.

UNSCR 1540 and the 1540 Committee

While CFT efforts through FATF represented an expansion of pre-existing experimentalist processes, 9/11 and, more immediately, A.Q. Khan's proliferation network, also revealed that longstanding, ‘traditional’ institutions designed to prevent WMD proliferation, such as the Nuclear Nonproliferation Treaty (NPT), had limited capacity to deal with non-state actors and ‘private’ procurement networks. In previous cases of member-state non-compliance, counter-proliferation efforts had focused on the creation of a more stringent monitoring apparatus (for example, the IAEA Additional Protocol) and strengthened export controls from supplier countries through arrangements such as the Nuclear Suppliers Group. Although important, those adaptations were less capable of addressing the respective challenges posed by terrorists and Khan's proliferation network. On one hand, meeting these challenges requires broader and deeper cooperation at the national and subnational levels and among the broad range of domestic agencies that oversee strategic trade control policy. On the other, the list of actors that should be involved in regulation varies across states and even the items to be regulated, which makes standardisation counterproductive.

In response, in April 2004, the UN Security Council acted under its Chapter VII authority to pass Resolution 1540 by unanimous vote. UNSCR 1540 aims to ‘enhance coordination of efforts on national, sub-national, regional and international levels in order to strengthen a global response’ to the threats posed by the proliferation of weapons of mass destruction to non-state actors.Footnote 83 Mirroring the vague language used in FATF, the resolution requires all states to: (1) ‘Adopt and enforce appropriate effective laws which prohibit any non-State actor to manufacture, acquire, possess, develop, transport, transfer or use nuclear, chemical or biological weapons and their means of delivery, in particular for terrorist purposes’; and (2) ‘Take and enforce effective measures to establish domestic controls to prevent the proliferation of nuclear, chemical, or biological weapons and their means of delivery, including by establishing appropriate controls over related materials.’Footnote 84

1540 was controversial for many reasons. Its passage under Chapter VII made it binding on UN members. It reached far into states’ domestic regulatory systems by obliging states to pass domestic legislation in accordance with 1540. In the highly politicised post-9/11 context, some saw 1540 as imposing the cost of security for wealthy, Western states on smaller, poorer states with different security priorities.Footnote 85 However, while 1540 appears on paper to deal with this significant cooperation problem through enforceable, ‘hard’ law, when viewed through an experimentalist lens, 1540 looks very different.Footnote 86 Consider again the three shifts advanced above.

(a) From state centric to network-based governance models

The work behind 1540 is coordinated through the aptly named ‘1540 Committee’. The Committee is comprised of states, but relies heavily on outside experts and national regulatory agencies to conduct its work. These experts are central to the Committee's outreach goals; in 2007–8, for example, 1540 Committee experts took part in just under 50 conferences around the world.Footnote 87 Critically, the experts also are responsible for reviewing and interpreting the reports gathered by the Committee.

The Council underscored the importance of a multi-level network approach in 2006 and again in 2008, when it urged the Committee to integrate states, as well as international, regional, and subregional organisations, in order to promote ‘experience-sharing and lessons learned’ regarding questions covered by the Resolution.Footnote 88 The Committee takes an active approach to networking. In its 2008 report, for example, the Committee relays ‘model laws and other measures’ that other organisations have developed to deal with common regulatory issues.Footnote 89 Reflecting goals of learning, mimetic diffusion, peer pressure, and deliberation, the Committee notes that it aims to serve as a ‘clearing house for information on the issue of assistance through formal and informal contact and dialogue with all States …’.Footnote 90 The ten-year mandate passed in April 2011 suggests that regional and subregional organisations should play a prominent role in coordinating implementation among their respective members.Footnote 91 Some have also argued that NGOs and regional organisations have an important role to play in applying pressure to states that are slow to implement the guidelines.Footnote 92

Again the 2011 Committee report confirms the importance of this shift, albeit with little detail. In the report's rather mathematical style, it notes that 83 states report having made ‘some effort to reach out to industry’, a slight increase since the last report in 2008.Footnote 93 More tellingly, the report emphasises a reliance on several other governmental and non-governmental organisations to provide model laws and regulations that would enhance 1540 compliance, including the IAEA, UN Office on Drugs and Crime, and the International Committee of the Red Cross.

(b) From fixed and uniform rules to revisable and flexible standards

Like FATF's recommendations, UNSCR 1540 establishes standards that states must meet but allows substantial flexibility in implementation. Also like FATF, the key provision requires all states to adopt and enforce ‘appropriate effective’ measures to prevent terrorists from acquiring WMD capabilities. It does not specify what constitutes ‘appropriate’ or ‘effective’ and states must determine what laws would meet that standard ‘in accordance with their national procedures.’

The 1540 Committee itself is comprised of representatives from each member state of the Security Council. The Committee's primary responsibility is to collect and assess comprehensive reports from state parties that provide details on the steps taken or to be taken toward implementation. It reviews reports, identifying gaps in regulatory systems and recommending changes. This procedure contains considerable potential as a means of diffusing new knowledge and promoting learning. Like FATF's peer review, it also allows would-be enforcers to develop a more nuanced understanding of a state's compliance status and react accordingly. In its 2011 activity report, the 1540 Committee suggested revising its compliance matrices ‘to better reflect progress towards implementation of the resolution, i.e., in term of assistance and cooperation, or lessons learned’, which indicates an emphasis on promoting learning and the potential for more fundamental revisability.Footnote 94

(c) From rule enforcement to problem-solving

While the resolution is binding, it appears to rely very little on traditional enforcement in practice. In contrast to FATF or the NPT, for example, 1540 contains no mention of any international enforcement and instead emphasises activities that promote the use of social mechanisms over material ones.Footnote 95 While monitoring is increasing (the ‘implementation matrix’ that experts have developed to ascertain compliance has blossomed into an extensive list of 382 elements),Footnote 96 to date monitoring has not been used as a basis for enforcement. Instead, the Committee has used the reports and experts’ analyses to clarify the intention of the original Resolution where misunderstandings exist, to identify weaknesses in states’ regulatory regimes, and to inform decisions about the provision of technical assistance. Reflecting that emphasis on assistance over enforcement, the 2011 report lays out a revised method of collecting requests for assistance and seeking the expertise needed to meet those requests.Footnote 97 Recent comprehensive reviews find that this softer approach is likely the best one, as the lack of capacity is the best predictor of low compliance with 1540's provisions.Footnote 98

UNSCR 1540 in practice exhibits several characteristics of experimentalism. It relies on self-reporting mechanisms, peer review, the involvement of multiple levels of governance and non-state actors, and social pressure to ensure that states submit reports and implement recommended changes. These mechanisms are designed to accommodate diversity and ramp up social pressure to strengthen export controls, but also to gather and share knowledge regarding the best ways to do so. This arrangement moves away from ‘cookie-cutter’ approaches and toward efforts to implement ‘appropriate effective’ measures that are tailored to a given state and infrastructure. This process might also help legitimise and make more effective any future attempts to enforce 1540.

Former 1540 Committee Chair and Slovakian ambassador Peter Burian signals a number of these dynamics in his discussion of 1540's impact. Burian notes that both proponents and opponents of 1540 have profited from the iterative nature of experimentalist governance.Footnote 99 The Committee, he notes, ‘now better understands the needs’ of developing states and has adjusted its approach accordingly, working to ensure that capacity building efforts are more in line with the target's development priorities. Simultaneously, the Committee works to alter targets’ understandings of their own security: ‘[W]e talk to the representatives of those countries and explain to them what is at stake. Their territories might be misused for purposes of trafficking or planning attacks against some other countries or hitting targets in those countries. Tasks connected with the implementation of 1540 might help them to address some other issues more efficiently through improved border controls and export controls, such as the issue of small arms and light weapons trafficking and drug trafficking.’Footnote 100 While experimentalism is not the only form of governance that promotes ideational convergence, its iterative nature and de-emphasis on coercion and enforcement may encourage these mechanisms more than other forms.

The 2011 report further confirms the experimentalist tendency of 1540 in practice. As suggested by experimentalist theory, the report in Annex XVI contains 11 pages of ‘relevant examples to which States may wish to refer in implementing resolution 1540’ as a way ‘to facilitate the sharing of experience…’. Those pages provide best practices for policies designed to meet 1540 standards. More generally, the recommendations for future efforts all stress knowledge creation and diffusion, inclusion of non-state actors, adaptation to local circumstances, and provision of assistance that new governance emphasises. Perhaps just as telling, given the sensitivity of the issue and continued recalcitrance by some states, the report clearly avoids suggesting a more confrontational approach to ensuring compliance that the resolution's legal basis would allow. The clear emphasis is on knowledge, deliberation, learning, and problem-solving, not enforcement.

Like FATF, 1540 is far from perfect. Some observers argue that it lacks legitimacy,Footnote 101 that its specific role in counter-terrorism is unclear,Footnote 102 that implementation will be uneven,Footnote 103 and that its expectations are vague.Footnote 104 In a comprehensive review, Finlay and Turpen argue that developed country support has been lacking when requested by developing countries, which only strengthens the perception that 1540 prioritises Northern security over Southern priorities.Footnote 105 Nonetheless, Finlay and Turpen see 1540 as a potential platform on which to build more comprehensive security efforts.Footnote 106

In sum, the 1540 case shows that experimentalist governance plays a significant role in efforts to supplement and adapt the current non-proliferation regime to address evolving threats. The overall move away from coercion and toward knowledge creation and learning; the inclusion of a broader network of actors; and the semi-regular updating of the standards as promoted by the regular issuing of new reports that involve new procedures and new models for action all reflect an experimentalist logic. Time will tell whether the shift continues or reverses course, but as the conclusion suggests, there is reason to think that the momentum toward experimentalism may continue to grow in the future.

Conclusion: an experimentalist turn in security governance?

In a complex and transitory security environment, scholars and practitioners alike are seeking new ways to keep pace with emerging and protean threats. Cooperative governance arrangements constitute an important tool in this effort. Classic treatments of these arrangements remain important. Yet, the enduring focus on rigorous verification and enforcement of fixed rules as reflected by ‘trust but verify’ dictum, a legacy of the Cold War, may obscure more recent developments in security cooperation. While broader research in global governance offers valuable insights as to why informal legal mechanisms and more participatory designs are being deployed with greater frequency, it offers fewer details on some of the more experimental dynamics emphasised here. This article began by asking whether we may, in fact, be beginning to see an ‘experimentalist turn’ in the design and operation of governance arrangements. By way of conclusion, let us revisit this larger question in light of the application of the experimentalist lens to assess two prominent multilateral efforts to address the threat of nuclear terror: FATF and the UNSC 1540 Committee. Four particular sets of observations stand out.

First, in both cases experimentalist mechanisms appear to be performing a great deal of the operational work, albeit at very different stages of development. Consider again some of the key observable implications of experimentalist governance. Reflecting the shift from hierarchical, top-down regulatory processes and to broader, flatter networks, both cases consciously expand participation in the process, thereby engaging more directly the range of actors required to solve complex problems. FATF, for example, now issues calls for public comment on its proposals and hosts regular conferences with private sector parties most affected. The 1540 Committee is less developed along these lines, but does seek outside experts to perform consultative roles. Both cases also reflect the shift from fixed and uniform rules as the primary means of promoting cooperation to more flexible and revisable standards. In FATF's case, efforts to turn a pre-existing experimentalist institution into a more coercive tool ultimately were rejected by participants as not being in line with ‘how FATF works’. In the case of 1540, while the resolution is legally binding and enforceable, the Committee appears to recognise the need for diversity within a common standard and has shifted its emphasis accordingly over time. It encourages capacity-building efforts, not threats of enforcement, as the primary means to help states build domestic regulatory regimes. And it acknowledges that those regimes should be designed to align with pre-existing legal institutions, not to comply with a universal and unchanging international law. The above shifts also reinforce the third shift of experimentalism, from enforcing compliance to promoting problem solving. Despite the fact that the extraordinary circumstances under which it was created means it is a legally binding and enforceable law, both in word and in practice the Committee has pushed its actions much more toward knowledge creation and learning. This is further reflected in the language of the continuing mandates, which talk increasingly about learning and knowledge creation and less about enforcement. FATF, too, largely withstood efforts to turn it into a coercive institution after 9/11. Instead, as indicated in the interviews cited above, participants ultimately reinforced and further developed its experimentalist qualities through regular production of best practices, the application of peer pressure through peer review, and the transformation of monitoring into a diagnostic tool instead of a punitive one.

Second, neither case suggests that experimentalist mechanisms and enforcement mechanisms are necessarily at odds with one another. Existing approaches that rely on dichotomous frames such as ‘hard and soft law’ may mask a broader spectrum in which different forms of law interact with, and act upon, one another. If Sabel and Zeitlin are correct in arguing that experimentalist processes most often emerge from traditional governance arrangements, understanding the interaction of the two will be critical to understanding experimentalism.Footnote 107 1540 and FATF may provide some additional insight in this regard.

By creating a more participatory forum that relies on an iterative process of norm development and a more flexible implementation of those norms, coercion becomes more of a last resort than a primary tool. Monitoring and verification serves first to facilitate knowledge creation and diffusion of best practices. Moreover, states are likely to be more accepting of extensive monitoring if it is not attached to strict material enforcement and is tied instead to assistance. Interviewees explained FATF's unusually extensive monitoring processes in precisely those terms.Footnote 108 Likewise, 1540 addresses strategic trade control issues that are highly sensitive for both security and economic reasons, making transparency a challenge. Tying monitoring to enforcement probably would make states still less likely to engage the process in an open, non-strategic way. At the same time, the potential for enforcement may help actors remain engaged in the process in order to avoid activating the potentially more costly and less sensitive coercive machinery: what Sabel and Zeitlin have called a ‘penalty default’.Footnote 109

In the event that the last resort becomes necessary, the ‘thick information’ environment of experimentalist governance can help stoke the political will necessary to overcome the collective action problem associated with enforcement, making threats more credible. The history of enforcement in FATF illustrates this logic. The rare cases of enforcement against members have been met with little resistance, even from the members themselves. Actions against non-members, however, were non-participatory, purely coercive, challenged by both members and non-members, of questionable impact, and ultimately abandoned in favour a new process. Thus, while enforcement still matters, it may be evolving in terms of how it interacts with emerging forms of governance. Sharman's work on blacklisting in FATF recognises the significance of the interaction between enforcement and social or discursive mechanisms, but recognising FATF's experimentalist designs helps explains how the balance or dynamic between material and social mechanisms can change the logic of an institution. In other words, our preliminary findings suggest that experimentalism may complement or even enhance the effectiveness of coercion, but while simultaneously making it less likely. Much more research is required on this critical point.

Third, given that experimentalist governance arises in response to a certain set of conditions, there is reason to suggest that this potential turn could have more general application. The broader experimentalist literature suggests that increased complexity and uncertainty in the regulatory environment places more of a premium on mechanisms that afford actors greater autonomy in interpretation without the constraints of uniform rules or threat of sanction. In principle, this greater flexibility enables the governed to experiment and tailor solutions to their specific problems, provides feedback mechanisms to share and build knowledge, and allows actors to establish minimum levels of adherence while routinising a ratcheting up of standards. While some studies have identified these mechanisms at work in the EU, international trade, and the environment, not much work has been done in the security realm.Footnote 110

The foregoing analysis suggests that both FATF and 1540 are responding to similar conditions in the international security environment. Are other security governance arrangements also relying more on what might be considered experimentalist mechanisms? Answering this question requires more empirical research that explores security arrangements in an evolutionary context, drawing from an experimentalist framework to assess whether the governance mechanisms doing the most operational work have changed over time. The discussion above provides identifying characteristics of experimentalism: a systematic evaluation and comparison of implementation strategies and results, a broader and more meaningful inclusion of stakeholders, a routinised updating of standards, and a drive to identify and address new threats, rather than aiming only to enforce pre-existing rules or promote increased dialogue.

While a detailed analysis is beyond the scope of this article, a number of arrangements would be interesting to explore through this lens.Footnote 111 For example, the Organization for Security Cooperation (OSCE) in Europe has long aimed to include non-state actors and engage in debates over goals of security cooperation.Footnote 112 However, further examination is necessary to analyse the degree to which the additional dynamics of experimentalist governance outlined above may be taking hold.

Another example worthy of closer scrutiny might be the Wassenaar Arrangement, which seeks to regulate the spread of conventional arms and dual-use technologies, and its predecessor, the Coordinating Committee for Multilateral Export Controls (COCOM). COCOM involved a network of experts that met regularly to review implementation and performance and even updated their standards somewhat regularly, but the system was strongly state-centric, a fact reinforced by the veto power that each member state held. Once the common threat of the Soviet Union fell away, COCOM was unable to adapt and quickly disbanded. As one analyst describes the process: ‘The accelerated page of political and technological change began to overwhelm the control capacity of the COCOM regime.’Footnote 113 That institutional plasticity is what experimentalism aims to avoid, in part by promoting normative convergence within a flexible set of standards. COCOM's replacement institution, the Wassenaar Arrangement, remains state-centric, but at a glance displays more experimentalist characteristics, including a more flexible implementation structure, increased transparency, and a drive to identify and respond to new challenges.Footnote 114 Other security examples might include the Nuclear Suppliers Group and Proliferation Security Initiative.Footnote 115 Ultimately, these shifts are best understood as spectra, not as dichotomous variables. That said, more developed experimentalist processes will display substantive movement regarding the three shifts indicated above, not minor changes and not along just one of the axes.

Finally, it is important not to conflate any experimentalist turn with effectiveness. Even if, as our analysis suggests, experimentalist mechanisms are playing a greater role in transnational regulation, it is another exercise entirely to gauge effectiveness. We must be careful not mistake potential for actual results and a comprehensive analysis of the cases presented here falls beyond the scope of this article. Such an exercise would, among other things, involve a systematic exploration of how widely the norms generated by such processes are diffused and an assessment of whether the standards diffused generate changes in actor behaviour that achieve the desired outcome.

Our research does, however, lend some initial support for the idea that experimentalist mechanisms can help improve effectiveness. The regular updating of standards in FATF, for example, or the issuance of best practices to clarify points of confusion revealed by the monitoring of implementation are examples. In the 1540 context, the 2011 report notes that 166 states now have measures in place to ‘penalize the involvement of non-state actors in the prohibited activities’, up from 63 just three years prior.Footnote 116

However, these insights are preliminary and we need a more rigorous examination of the emergence, problem-solving capacity, and normative implications of experimentalist mechanisms in security and beyond. Any such examination should also be mindful of the exercise of power. Power does not go away in experimentalist governance and these emerging regulatory constellations challenge analysts to widen their conceptualisations of power in a given setting.Footnote 117 It may very well be that the powerful will exercise disproportionate influence over experimental processes, at times to the detriment of the governed.

The defining question of international security policy today is not whether to cooperate, but how to do so. While it is too early to declare definitively that experimentalism will be the answer to that question, one thing seems clear: governance arrangements of any type will have to adapt to changing conditions or be rendered obsolete. As an analytical tool, experimentalist governance offers important insights regarding how regulatory arrangements may be evolving to meet the threats of the twenty-first century.

References

2 There are a few exceptions, although they have a primarily regional focus. De Schutter, Olivier, ‘The Role of Evaluation in Experimentalist Governance: Learning by Monitoring in the Establishment of the Area of Freedom, Security, and Justice’, in Sabel, Charles F. and Zeitlin, Jonathan (eds), Experimentalist Governance in the European Union: Towards a New Architecture (New York: Oxford University Press, 2010), pp. 261–96Google Scholar; Jörg Monar, ‘Experimentalist Governance in Justice and Home Affairs’, in Sabel and Zeitlin (eds), Experimentalist Governance, pp. 237–60; Magnus Ekengren, ‘Extending Experimentalist Governance in Crisis Management – Pros and Cons of Different “Channels” of Extension’, unpublished manuscript; Jörg Monar, ‘Extending Experimentalist Governance: The External Dimension of the EU's “Area of Freedom, Security and Justice”’, unpublished manuscript.

3 Two edited volumes exemplify both of these points. Koenig-Archibugi, Mathias and Zürn, Michael (eds), New Modes of Governance in the Global System: Exploring Publicness, Delegation and Inclusiveness (New York: Palgrave Macmillan, 2006)CrossRefGoogle Scholar; Sabel, Charles F. and Zeitlin, Jonathan, Experimentalist Governance in the European Union: Towards a New Architecture (Oxford: Oxford University Press, 2010)Google Scholar.

4 Abbott and Snidal refer to this in a more abstract form as ‘transnational new governance’. Abbott, Kenneth and Snidal, Duncan, ‘The Governance Triangle: Regulatory Standards Institutions and the Shadow of the State’, in Mattli, Walter and Woods, Ngaire (eds), The Politics of Global Regulation (Princeton: Princeton University Press, 2008), pp. 4488Google Scholar; Abbott, Kenneth and Snidal, Duncan, ‘Strengthening International Regulation Through Transnational New Governance: Overcoming the Orchestration Deficit’, Vanderbilt Journal of Transnational Law, 42:2 (2009), pp. 501–78Google Scholar; Abbott, Kenneth and Snidal, Duncan, ‘International Regulation without International Government: Improving IO Performance Through Orchestration’, Review of International Organizations, 5:3 (2010), pp. 315–44CrossRefGoogle Scholar. In the European Union, this has been closely associated with debates over the Open Method of Coordination. For an overview, see Heidenreich, Martin and Zeitlin, Jonathan (eds) Changing European Welfare and Employment Regimes: The Influence of the Open Method of Coordination on National Reforms (London: Routledge, 2009)Google Scholar.

5 See, for example, Homer-Dixon, Thomas, Environment, Scarcity, and Violence (Princeton: Princeton University Press, 1999)Google Scholar; Paris, Roland, ‘Human Security: Paradigm Shift Or Hot Air?’, International Security, 26:2 (2001), pp. 87102CrossRefGoogle Scholar; Cronin, Audrey Kurth, ‘Behind the Curve: Globalization and International Terrorism’, International Security, 27:3 (2002), pp. 3058CrossRefGoogle Scholar; Allison, Graham, Nuclear Terrorism: The Ultimate Preventable Catastrophe (New York: Times Books, 2005)Google Scholar; McNamara, Robert, ‘Apocalypse Soon’, Foreign Policy, 148 (May–June 2005), pp. 2935Google Scholar.

6 Jervis, Robert, ‘Cooperation Under the Security Dilemma’, World Politics, 30:2 (1978), pp. 167214CrossRefGoogle Scholar.

7 Mearsheimer, John J., ‘The False Promise of International Institutions’, International Security, 19:3 (1994), pp. 549CrossRefGoogle Scholar.

8 Keohane, Robert, After Hegemony (Princeton: Princeton University Press, 1984)Google Scholar; Keohane, Robert and Martin, Lisa, ‘The Promise of Institutionalist Theory’, International Security, 20:1 (1995), pp. 3951CrossRefGoogle Scholar; Botcheva, Lilliana and Martin, Lisa L., ‘Institutional Effects on State Behavior: Convergence and Divergence’, International Studies Quarterly, 45:1 (2001), pp. 126CrossRefGoogle Scholar.

9 Chayes, Abram and Chayes, Antonia Handler, ‘From Law Enforcement to Dispute Settlement: A New Approach to Arms Control Verification and Compliance’, International Security, 14:4 (1990), pp. 147–64CrossRefGoogle Scholar; Chayes, Abram and Chayes, Antonia Handler, ‘On Compliance’, International Organization, 47:2 (1993), pp. 175205CrossRefGoogle Scholar; Chayes, Abram and Chayes, Antonia Handler, The New sovereignty: Compliance with Regulatory Agreement (Cambridge: Harvard University Press, 1995)Google Scholar.

10 Koh, Harold, ‘Why do Nations Obey International Law?’, Yale Law Journal, 106:8 (1997), pp. 2599–659CrossRefGoogle Scholar; Héritier, Adrienne and Lehmkuhl, Dirk, ‘The Shadow of Hierarchy and New Modes of Governance’, Journal of Public Policy, 28:1 (2008), pp. 117Google Scholar; Börzel, Tanja, ‘European Governance: Negotiation and Competition in the Shadow of Hierarchy’, Journal of Common Market Studies, 48:2 (2010), pp. 191219CrossRefGoogle Scholar.

11 Sabel, Charles and Zeitlin, Jonathan, ‘Learning from Difference: the New Architecture of Experimentalist Governance in the EU’, European Law Journal, 14:3 (2008), pp. 271327CrossRefGoogle Scholar.

12 Downs, George, Rocke, David, and Barsoom, Peter, ‘Is the Good News about Compliance Good News about Cooperation?’, International Organization, 50:3 (1996), pp. 379406CrossRefGoogle Scholar; Downs, George and Rocke, David, Tacit Bargaining, Arms Races, and Arms Control (Ann Arbor: University of Michigan Press, 1990)CrossRefGoogle Scholar.

13 Downs, et al., Good News about Compliance.

14 Falk, Richard, The Role of Domestic Courts in the International Legal Order (Syracuse: Syracuse University Press, 1964)Google Scholar; Fisher, Roger, Improving Compliance with International Law (Charlottesville: University Press of Virginia, 1981)Google Scholar; Young, Oran R., Compliance and Public Authority: A Theory with International Application (Baltimore: Published for Resources for the Future by the Johns Hopkins University Press, 1979)Google Scholar.

15 During the Cold War, clashes over compliance with the Limited Test Ban Treaty occurred over the different meanings of ‘debris’ in English and its counterpart ‘osadki’ in Russian. Ifft, Edward, ‘Witness for the Prosecution: International Organizations and Arms Control Verification’, Arms Control Today, 35:9 (2005), p. 12Google Scholar.

16 Pape, Robert A., ‘Why Economic Sanctions Do Not Work’, International Security, 22:2 (1997), pp. 90136CrossRefGoogle Scholar; Elliott, Kimberly Ann, ‘The Sanctions Glass: Half Full or Completely Empty?’, International Security, 23:1 (1998), pp. 5065CrossRefGoogle Scholar; Drezner, Daniel W., ‘The Hidden Hand of Economic Coercion’, International Organization, 57:3 (2003), pp. 643–59CrossRefGoogle Scholar; Drezner, Daniel W., The Sanctions Paradox (Cambridge: Cambridge University Press, 1999)CrossRefGoogle Scholar; Ikle, Fred, ‘After Detection … What?’, Foreign Affairs, 39:1 (1961), pp. 208–20CrossRefGoogle Scholar.

17 Adelman, Kenneth, ‘Why Verification is More Difficult (and Less Important)’, International Security, 14:4 (1990), pp. 141–6CrossRefGoogle Scholar.

18 Slaughter, Anne Marie, A New World Order (Princeton, Princeton University Press 2004)Google Scholar; Moravcsik, Andrew, ‘Taking Preferences Seriously: A Liberal Theory of International Politics’, International Organization, 51:4 (1997), pp. 513–53CrossRefGoogle Scholar.

19 See two special issues of International Organization: ‘The Rational Design of International Institutions’, International Organization, 55:4 (2001); ‘The Legalization of World Politics’, International Organization, 54:3 (2000). See also Lipson, Charles, ‘Why Are Some International Agreements Informal?’, International Organization, 45:4 (1991), pp. 495538CrossRefGoogle Scholar; Shelton, Dinah (ed.), Commitment and Compliance: The Role of Non-Binding Laws in the International Legal System (New York: Oxford University Press, 2002)Google Scholar.

20 Börzel, Tanja and Risse, Thomas, ‘Public-Private Partnerships: Effective and Legitimate Tools of Transnational Governance?’, in Grande, Edgar and Pauly, Louis W. (eds), Complex Sovereignty: Reconstituting Political Authority in the Twenty-first Century (Buffalo: University of Toronto Press, 2005), pp. 195216Google Scholar; Osborne, Stephen P. (ed.), Public-Private Partnerships: Theory and Practice in International Perspective (New York: Routledge, 2000)Google Scholar.

21 Drezner, Daniel W., All Politics is Global: Explaining International Regulatory Regimes (Princeton: Princeton University Press, 2007), pp. 119–48Google Scholar; Potoski, Matthew and Prakash, Assem (eds), Voluntary Programs: A Club Theory Perspective (Cambridge: Massachusetts Institute of Technology, 2009)CrossRefGoogle Scholar.

22 Reinicke, Wolfgang H., ‘The Other World Wide Web: Global Public Policy Networks’, Foreign Policy, 117 (1999), pp. 4457CrossRefGoogle Scholar; Slaughter, A New World Order.

23 Raustiala, Kal and Victor, David G., ‘The regime complex for plant genetic resources’, International Organization 58:2 (2004), pp. 277309CrossRefGoogle Scholar; Keohane, Robert O. and Victor, David G., ‘The Regime Complex for Global Climate Change’, Perspectives on Politics, 9:1 (2011), pp. 723CrossRefGoogle Scholar; Oberthür, Sebastian and Gehring, Thomas, ‘Conceptual Foundations of Institutional Interaction’, in Oberthür, Sebastian and Gehring, Thomas (eds), Institutional Interaction in Global Environmental Governance: Synergy and Conflict among International and EU Policies (Cambridge, MA: Massachusetts Institute of Technology, 2006), pp. 1952Google Scholar. See also the contributions to the issue on institutional regime complexity edited by Alter, Karen and Meunier, Sophie, Perspectives on Politics, 7:1 (2009)CrossRefGoogle Scholar.

24 Shaffer, Gregory C. and Pollack, Mark A., ‘Hard vs. Soft Law: Alternatives, Complements, and Antagonists in International Governance’, Minnesota Law Review, 94 (2010), pp. 706–99Google Scholar.

25 Caparini, Marina, ‘Security Governance and the Privatisation of Security’, in Bryden, Alan and Caparini, Marina (eds), Private Actors and Security Governance (New Brunswick, NJ: Transaction Publishers, 2006), p. 269Google Scholar; Krahmann, Elke, ‘Conceptualizing Security Governance’, Cooperation and Conflict, 38:1 (2003), pp. 526CrossRefGoogle Scholar.

26 Krahmann, ‘Conceptualizing Security Governance’, pp. 8–9.

27 See, for example, Bryden, Alan, ‘Approaching the Privatisation of Security from a Security Governance Perspective’, in Bryden, Alan and Caparini, Marina (eds), Private Actors and Security Governance (New Brunswick, NJ: Transaction Publishers, 2006), pp. 319Google Scholar.

28 Caparini, ‘Security Governance’, p. 264.

29 Krause, Keith, ‘Facing the Challenge of Small Arms: The UN and Global Security Governance’, in Price, Richard M. and Zacher, Mark W. (eds), The United Nations and Global Security (New York: Palgrave Macmillan, 2004), p. 22Google Scholar.

30 Caparini, ‘Security Governance’, p. 264.

31 Daase, Christopher and Friesendorf, Cornelius, ‘Introduction: Security Governance and the Problem of Unintended Consequences’, in , Daase and , Friesendorf (eds), Rethinking Security Governance: The Problem of Unintended Consequences (New York: Routledge, 2010), p. 1Google Scholar.

32 Krahmann, ‘Conceptualizing Security Governance’.

33 Compare, for example, the debate over the impact of rhetoric: Krebs, Ronald R. and Jackson, Patrick Thaddeus, ‘Twisting Tongues and Twisting Arms: The Power of Political Rhetoric’, European Journal of International Relations, 13:1 (2007), pp. 3566CrossRefGoogle Scholar; Sharman, Jason C., ‘The Bark is the Bite: International Organizations and Blacklisting’, Review of International Political Economy, 16:4 (2009), pp. 573–96CrossRefGoogle Scholar; Kudrle, Robert T., ‘Did blacklisting hurt the tax havens?’, Journal of Money Laundering Control, 12:1 (2009), pp. 3349CrossRefGoogle Scholar.

34 Trubek, David M. and Trubek, Louise G., ‘New Governance and Legal Regulation: Complementarity, Rivalry, and Transformation’, European Law Journal, 13:3 (2007), pp. 539–64Google Scholar.

35 Dorf, Michael C. and Sabel, Charles F., ‘A Constitution of Democratic Experimentalism’, Columbia Law Review, 98:2 (1998), pp. 267473CrossRefGoogle Scholar; Sabel and Zeitlin, ‘Learning from Difference’.

36 See, for example, Thompson, Alexander, ‘Rational Design in Motion: Uncertainty and Flexibility in the Global Climate Regime’, European Journal of International Relations, 16:2 (2010), pp. 269–96CrossRefGoogle Scholar.

37 For overviews, see de Burca, Grainne and Scott, Joanne (eds), Law and New Governance in the EU and the US (Portland: Hart Publishing, 2006)Google Scholar; Heidenreich, Martin and Zeitlin, Jonathan (eds), Changing European Welfare: The Influence of the Open Method of Coordination on National Reforms (New York: Routledge, 2009)Google Scholar; Salamon, Lester M. (ed.), The Tools of Government: A Guide to the New Governance (New York: Oxford University Press, 2002)Google Scholar; Scott, Joanne and Trubek, David M., ‘Mind the Gap: Law and New Approaches to Governance in the European Union’, European Law Journal, 8:1 (2002), pp. 118CrossRefGoogle Scholar.

38 de Burca, Grainne and Scott, Joanne (eds), Law and New Governance in the EU and the US (Portland: Hart Publishing, 2006), p. 3Google Scholar.

39 For example, the Conference on Disarmament in Geneva applies consensus-based rules where only states have a vote and all must agree for action to be taken.

40 Drezner, Daniel W., ‘Globalization and Policy Convergence’, International Studies Review, 3:1 (2001), pp. 5378CrossRefGoogle Scholar; Slaughter, New World Order; Abbott and Snidal, Orchestration Deficit.

41 Many EU processes require ‘National Action Plans’, which means that all levels of government must lay out their role in the implementation of a comprehensive and cohesive plan. Sabel and Zeitlin, ‘Learning from Difference’.

42 Hülsse, Rainer and Kerwer, Dieter, ‘Global Standards in Action: Insights from Anti-Money Laundering Regulation’, Organization, 14:5 (2007), pp. 625–42CrossRefGoogle Scholar.

43 Charles F. Sabel and Jonathan Zeitlin, ‘Learning from Difference: The New Architecture of Experimentalist Governance in the EU’, in Sabel and Zeitlin (eds), Experimentalist Governance (2010). See also David M. Trubek, M. Patrick Cottrell, and Mark T. Nance, ‘“Soft Law”, “Hard Law”, and EU Integration’, in de Búrca and Scott (eds), ‘Law and New Governance’.

44 Risse, Thomas, ‘Let's Argue! Communicative Action in World Politics’, International Organization, 54:1 (2000), pp. 139CrossRefGoogle Scholar; Johnston, Alastair Iain, ‘Treating International Institutions as Social Environments’, International Studies Quarterly, 45:4 (2001), pp. 487515CrossRefGoogle Scholar; Flockhart, Trine, ‘“Complex Socialization”: A Framework for the Study of State Socialization’, European Journal of International Relations, 12:1 (2006), pp. 89118CrossRefGoogle Scholar.

45 Sabel and Zeitlin, ‘Learning from Difference’, (2010), p. 3.

46 We use ‘problems’ to mean new challenges that affect security, for example, new patterns of arms smuggling, not the more generic problems, for example, the ‘problem’ of cooperation.

47 Austen-Smith, David and Feddersen, Timothy J., ‘Deliberation, Preference Uncertainty, and Voting Rules’, American Political Science Review, 100:2 (2006), pp. 209–17CrossRefGoogle Scholar.

48 Trubek, David M. and Mosher, James, ‘New Governance, Employment Policy, and the European Social Model’, in Zeitlin, Jonathan and Trubek, David M. (eds), Governing Work and Welfare in a New Economy: European and American Experiments (Oxford: Oxford University Press, 2003), pp. 76–7Google Scholar; Hall, Peter A., ‘Policy Paradigms, Social Learning, and the State: The Case of Economic Policymaking in Britain’, Comparative Politics, 25:3 (2000), p. 282Google Scholar.

49 See in particular the special issue: Héritier, Adrienne and Lehmkuhl, Dirk (eds), ‘The Shadow of Hierarchy and New Modes of Governance’, Journal of Public Policy, 28:1 (2008)Google Scholar. See also Börzel, ‘European Governance’.

50 Sabel, Charles F. and Zeitlin, Jonathan, ‘Experimentalist Governance’, in Levi-Faur, David (ed.), The Oxford Handbook of Governance (Oxford: Oxford University Press, 2012), p. 176Google Scholar.

51 Lang, Andrew and Scott, Joanne, ‘The Hidden World of WTO Governance’, European Journal of International Law, 20:3 (2009), pp. 575614CrossRefGoogle Scholar.

52 de Búrca, Gráinne, Robert Keohane, and Sabel, Charles, ‘New Modes of Pluralist Global Governance’, Journal of International Law and Politics (forthcoming)Google Scholar.

53 De Búrca et al., ‘New Modes’.

54 De Búrca et al., ‘New Modes’. For a number of case studies in a legal context, see Trubek, David and Trubek, Louise (eds), ‘Symposium: New Governance and the Transformation of Law’, Wisconsin Law Review (2010), pp. 227747Google Scholar. See also Cottrell, M. Patrick and Trubek, David M., ‘Law as Problem Solving: Standards, Networks, Experimentation, and Deliberation in Global Space’, Transnational Law & Contemporary Problems, 21 (2012), pp. 359–93Google Scholar.

55 Levy, J. S., ‘Qualitative Methods in International Relations’, in Harvey, F. P. and Brecher, M. (eds), Evaluating Methodology in International Studies (Ann Arbor: University of Michigan Press, 2002), pp. 131–60Google Scholar; Flyvbjerg, Bent, ‘Five Misunderstandings About Case-Study Research’, Qualitative Research, 12:2 (2006), pp. 219–45Google Scholar; Bennett, A. and Elman, C., ‘Qualitative Research: Recent Developments in Case Study Methods’, Annual Review of Political Science, 9 (2006), pp. 455–76CrossRefGoogle Scholar.

56 President George W. Bush, ‘Address to United States Congress’, Washington DC (24 September 2001).

57 Bierstecker, Thomas J., Eckert, Sue E., and Romaniuk, Peter, ‘International Initiatives to Combat the Financing of Terrorism’, in Bierstecker, Thomas J. and Eckert, Sue E. (eds), Countering the Financing of Terrorism (New York: Routledge, 2008), pp. 234–59Google Scholar.

58 These special recommendations address: ratification and implementation of relevant UN instruments; criminalisation of the financing of terrorism and associated money laundering; freezing and confiscating terrorist assets; reporting suspicious transactions related to terrorism; enhancing international cooperation; and preventing the use of alternative remittance systems, wire transfers, non-profit organisations, and cash couriers for terrorist financing.

59 Drezner, All Politics.

60 Simmons, Beth A., ‘The International Politics of Harmonization: The Case of Capital Market Regulation’, International Organization, 55:3 (2001), pp. 589620CrossRefGoogle Scholar.

61 Hülsse and Kerwer, ‘Global Standards in Action’.

62 Sharman, Jason C., The Money Laundry: Regulating Criminal Finance in the Global Economy (Ithaca, NY: Cornell University Press, 2011)CrossRefGoogle Scholar.

63 Financial Action Task Force on Money Laundering (FATF), Annual Report (2002), available at: {www.fatf-gafi.org} accessed 16 September 2011.

64 Author interview.

65 Author interview with multiple FATF national delegations.

66 Lipschutz, Ronnie D., ‘From Local Knowledge and Practice to Global Environmental Governance’, in Hewson, Martin and Sinclair, Timothy J. (eds), Approaches to Global Governance Theory (Albany: State University of New York Press, 1999), pp. 259–83Google Scholar; Keohane, Robert O., ‘Governance in a Partially Globalized World’, American Political Science Review, 95:1 (2001), pp. 113Google Scholar.

67 Author interview.

68 Financial Action Task Force (FATF), available at: {www.fatf-gafi.org} accessed 16 September 2011.

69 Hülsse and Kerwer, ‘Global Standards’.

70 Drezner, All Politics, pp. 119–48; Sharman, ‘The Bark’.

71 Financial Action Task Force on Money Laundering (FATF), Annual Report (2005), available at: {www.fatf-gafi.org} accessed 16 September 2011; Drezner, All Politics, p. 144.

72 Sharman, ‘The Bark’. Kudrle, ‘Tax Havens’, disputes their financial impact.

73 Blazejewski, Kenneth S., ‘The FATF and Its Institutional Partners: Improving the Effectiveness and Accountability of Transgovernmental Networks’, Temple International & Comparative Law Journal, 22:1 (2008), p. 21Google Scholar.

74 International Monetary Fund and World Bank, ‘Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT): Materials Concerning Staff Progress Towards the Development of a Comprehensive AML/CFT Methodology and Assessment Process’ (11 June 2002), para. 21.

75 See Drezner's summary. Drezner, All Politics, p. 144.

76 Author interview with US delegation representative.

77 Author interview with US delegation representative.

78 Author interview with FATF officials.

79 Author interviews with national delegations.

80 Author interviews with national delegations.

81 FATF, Annual Report 2001.

82 Simmons, ‘International Politics’.

83 United Nations Security Council, ‘Resolution 1540 (2004)’ (28 April 2004).

84 Ibid.

85 Brian Finlay and Elizabeth Turpen, ‘The Next 100 Project: Leveraging National Security Assistance to Meet Developing World Needs’. A Report by the Stimson Center and The Stanley Foundation (2009), available at: {www.stimson.org/images/uploads/research-pdfs/Next100Report2009.pdf} accessed 16 September 2011.

86 Talmon, Stefan, ‘The Security Council as World Legislature’, The American Journal of International Law, 99:1 (2005), pp. 175–93CrossRefGoogle Scholar.

87 United Nations Security Council, ‘S/2008/493 Annex XVIII (2008)’ (30 July 2008).

88 United Nations Security Council, ‘Resolution 1673’ (27 April 2006).

89 United Nations Security Council ‘S/2008/493’.

90 United Nations Security Council ‘S/2008/493’, p. 22.

91 United Nations Security Council S/RES/1977 (2011), paras 18–19.

92 Heupel, Monika, ‘Surmounting the Obstacles to Implementing UN Security Council Resolution 1540’, The Nonproliferation Review, 15:1 (2008), pp. 95102CrossRefGoogle Scholar.

93 United Nations Security Council, ‘Letter dated 12 September 2011 from the Chair of the Security Council Committee established pursuant to resolution 1540 (2004) addressed to the President of the Security Council’, S/2011/579, p. 19.

94 United States Security Council, ‘Letter’, p. 27.

95 Finlay and Turpen, ‘The Next 100’.

96 United Nations Security Council ‘S/2008/493’, Annex V.

97 UNSC, ‘S/2011/579’, p. 23.

98 Stinnett, Douglas M., Early, Bryan R., Horne, Cale, and Karreth, Johannes, ‘Complying by Denying: Explaining Why States Develop Nonproliferation Export Controls’, International Studies Perspectives, 12:3 (2011), pp. 308–26CrossRefGoogle Scholar.

99 Miles A. Pomper and Peter Crail, ‘Keeping WMD from Terrorists: An Interview With 1540 Committee Chairman Ambassador Peter Burian’, Arms Control Association (November 2007), available at: {http://www.armscontrol.org/print/2658} accessed 16 September 2011.

100 Pomper and Crail, ‘Keeping WMD from Terrorists’.

101 Finlay and Turpen, ‘The Next 100’; Albright, David and Hinderstein, Corey, ‘Unraveling the A.Q. Khan and Future Proliferation Networks’, The Washington Quarterly, 28:2 (2005), pp. 111–28CrossRefGoogle Scholar; Herz, Monica, ‘Resolution 1540 in Latin American and the Role of the Organization of American States’, in Scheinman, Lawrence (ed.), Implementing Resolution 1540: the Role of Regional Organizations (New York: Renouf Publishing Company, Ltd., 2008), pp. 941Google Scholar.

102 Luck, Edward C., ‘The Uninvited Challenge: Terrorism Targets the United Nations’, in Newman, Edward, Thakur, Ramesh Chandra, and Tirman, John (eds), Multilateralism Under Challenge: Power, International Order and Structural Change (Tokyo: United Nations University, 2006), pp. 336–55Google Scholar.

103 Albright and Hinderstein, ‘Unraveling the A.Q. Khan’; Wade Boese, ‘Implications of UN Security Council Resolution 1540’, Arms Control Association (15 March 2005), available at: {http://www.armscontrol.org/events/20050315_1540} accessed 1 September 2011; Crail, Peter, ‘Implementing UN Security Council Resolution 1540: A Risk-Based Approach’, Nonproliferation Review, 13:2 (2006), pp. 355–99CrossRefGoogle Scholar.

104 van Ham, Peter and Bosch, Olivia, ‘Global Non-Proliferation and Counter-Terrorism: The Role of Resolution 1540 and Its Implications’, in Bosch, Olivia and van Ham, Peter (eds), Global Non-Proliferation and Counter-Terrorism: The Role of Resolution 1540 and Its Implications (Washington: Brookings Press, 2007), pp. 323Google Scholar; Talmon, ‘Security Council’.

105 Finlay and Turpen, ‘The Next 100’.

106 Ibid., p. 32.

107 Trubek and Trubek, ‘Complementarity’; Schaffer and Pollack, ‘Alternatives’.

108 See fn. 78 above.

109 Sabel and Zeitlin, ‘Experimentalist Governance’.

110 See, for example, Sabel and Zeitlin, ‘Experimentalist Governance’; Trubek and Trubek, ‘Complementarity’; Lang, Andrew and Scott, Joanne, ‘The Hidden World of WTO Governance’, European Journal of International Law, 20:3 (2009), pp. 575614CrossRefGoogle Scholar.

111 Cooper's discussion of PSI, for example, especially regarding the form and function of the Operation Experts Group, indicates that experimentalism would fit easily within the group's operations. Cooper, David A., ‘Challenging Contemporary Notions of Middle Power Influence: Implications of the Proliferation Security Initiative for “Middle Power Theory”’, Foreign Policy Analysis, 7 (2011), pp. 317–36CrossRefGoogle Scholar.

112 We thank a reviewer for this point in particular. On the OSCE, see Peters, Ingo, ‘The OSCE and German Policy: A Study in How Institutions Matter’, in Haftendorn, Helga, Keohane, Robert O., and Wallander, Celeste (eds), Imperfect Unions: Security Institutions Over Time and Space (New York: Oxford University Press, 1999), pp. 195221Google Scholar; Galbreath, David J., The Organization for Security and Co-operation in Europe (New York: Routledge, 2007)Google Scholar.

113 Dursht, Kenneth A., ‘From Containment to Cooperation: Collective Action and the Wassenaar Arrangement’, Cardozo Law Review, 19 (1997), pp. 1079–104Google Scholar.

114 Dursht, ‘From Containment to Cooperation’.

115 There is also important work to be done on the ability of experimentalist governance to coordinate regime complexes such as the various agreements that surround the NPT, in addition to working within each agreement. See Raustiala and Victor, ‘Regime Complex’.

116 United Nations Security Council, ‘Letter’, p. 9.

117 Barnett, Michael and Duvall, Raymond (eds), Power in Global Governance (Cambridge: Cambridge University Press, 2005)Google Scholar.