Published online by Cambridge University Press: 05 February 2015
INTRODUCTION
Shortly after midnight on 6 August 2011, a Chinook helicopter carrying NATO and Afghan security forces was preparing to land near the Tangi Valley in Afghanistan. As the helicopter was descending, a Taliban fighter fired a rocket propelled grenade (RPG)1 at the dangerously exposed aircraft. The helicopter burst into flames, breaking apart as it plummeted to the ground. Thirty-eight people died in the crash, including 22 US special forces troops, making it the deadliest single incident of the war for US forces (King, Dilanian, and Cloud, 2011; Riechmann, 2011). An unclassified summary of a US military investigation into the incident confirms that the helicopter was hit by a ‘rocket-propelled grenade’ but provides no additional details (US CENTCOM, 2011b).
Most media accounts also refer to the weapon simply as a ‘rocket-propelled grenade’,2 but there are many kinds of RPGs from various sources and with very different capabilities. These differences matter—and not just in the case of the downed helicopter. Whether Taliban arsenals are filled with 30-year-old Soviet PG-7 rounds or PG-29V rounds for the deadly RPG-29 Vampir has profound implications, yet detailed data on illicit weapons in Afghanistan is scant.
These data gaps are not limited to Afghanistan. Details on the model, country of origin, age, and condition of illicit weapons are rare, and the little information that is available is usually anecdotal and incomplete. Thus, we are left to wonder what models of RPGs and other weapons are most readily available to terrorists, insurgents, and criminals. How technologically advanced are these weapons? Is it possible to keep them out of the hands of individuals and groups that are likely to misuse them? How old are they, and how many are still functional? Answers to these questions have the potential to shape efforts to stem the flow of illicit weapons and shed light on the threat they now pose. This chapter inaugurates a multi-year project to provide such answers through data-driven analysis of illicit small arms and light weapons worldwide.
To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.