共查询到20条相似文献,搜索用时 0 毫秒
1.
2018年10月,美国宣布单方面退出《中导条约》。《中导条约》是美苏两国在冷战后期达成的,并得到了切实执行的条约,对于维护冷战后全球战略平衡发挥了至关重要的作用。冷战后,俄美曾经企图将《中导条约》多边化,构建俄美新型战略关系,但最终反目成仇,使得俄美关系严重倒退,并迈入新的相互战略遏制的时代。 相似文献
2.
Stéphane Taillat 《Contemporary Security Policy》2019,40(3):368-381
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint. 相似文献
3.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
4.
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence. 相似文献
5.
Thomas Rid 《战略研究杂志》2013,36(1):139-142
A response to John Stone, Dale Peterson, and Gary McGraw on cyber war. 相似文献
6.
Susan Turner Haynes 《The Nonproliferation Review》2019,26(5-6):427-447
ABSTRACTWhile most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely. 相似文献
7.
Christian Leuprecht Joseph Szeman David B. Skillicorn 《Contemporary Security Policy》2019,40(3):382-407
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity. 相似文献
8.
Jeffrey W. Knopf 《The Nonproliferation Review》2013,20(1):79-93
This article seeks to elucidate the concept of nuclear learning. It explores both the “nuclear” and the “learning” aspects of the concept. On the nuclear side, it distinguishes between learning basic facts about nuclear arms and drawing inferences about the larger implications of those facts. On the learning side, it discusses three issues: whether to use the term in a normative or value-neutral manner; the difference between learning that leads to a change in means versus learning that leads to a re-evaluation of ends; and whether learning only takes place at the level of individuals or whether there can also be learning by collective entities. The article argues there is no universal best answer to these questions and that the particular concept of learning that should be employed depends on the goals of the analyst. If the goal is to reduce the chances of nuclear war, however, one type of learning that will be important to consider is whether there is shared, cross-national learning. 相似文献
9.
Charles W. Mahoney 《Defense & Security Analysis》2020,36(2):180-200
ABSTRACTThe United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare. 相似文献
10.
11.
Antti Seppo 《Defense & Security Analysis》2019,35(4):384-405
ABSTRACTGerman security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy. 相似文献
12.
Ralph Rotte 《African Security Review》2016,25(1):85-94
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces. 相似文献
13.
We analyze strategic relationships between buyers and sellers in markets with switching costs and dynamic uncertainty by investigating the scenario wherein a representative buyer trades with two foreign sellers located in the same foreign country. We show that, under exchange rate uncertainty, switching costs may lead to switching equilibria where both sellers co‐exist in the market with the buyer, or no‐switching equilibria where either seller captures the market. The presence of exchange rate uncertainty facilitates competition by allowing the sellers to co‐exist in the market with the buyer. However, if the level of uncertainty is beyond a threshold, the only viable equilibria are those where one of the sellers captures the market. Further, depending on the level of exchange rate uncertainty and the sellers' variable costs, switching costs may either raise or lower the level of prices in long‐term contracts between the buyer and the sellers. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
14.
Kenya’s decision to close the Dadaab refugee camp complex highlights structural flaws in the international refugee regime. While much attention has been paid to Kenya’s reasoning, less has been given to the reactions of organisations and states. Given the state’s primacy in the international system and uncertainty about refugees, Kenya’s decision is perhaps unsurprising. It is contended that the stakeholders were unprepared because of path dependence and disbelief that Kenya would repatriate the refugees. While stakeholder reactions arguably demonstrate concern for refugees, the international refugee regime remains unquestioned, sustaining revenue streams that may fuel corruption, encourage lengthy encampment and prolong conflict. 相似文献
15.
Nancy W. Gallagher 《The Nonproliferation Review》2013,20(3-4):469-498
ABSTRACTSince the end of the Cold War, arms control proponents tried to make the case for deep nuclear reductions and other forms of security cooperation as necessary for strategic stability. While different versions of strategic stability analysis did sometimes produce innovative proposals, constructive negotiations, and successful ratification campaigns in the past, this analytical framework has become more of a hindrance than a help. Treating arms control as a predominantly technical way to make deterrence more stable by changing force structure characteristics, military operations, relative numbers of weapons on either side, or total number of nuclear weapons gives short shrift to political factors, including the fundamental assumptions about world politics that inform different arms control logics, the quality of political relations among leading states, and the political processes that affect negotiation, ratification, and implementation. This article compares two logics for arms control as a means to enhance strategic stability, one developed by the Cambridge community in the 1960s and one used by the Reagan administration and its successors, with current perspectives on strategic stability in which flexibility and freedom of action are preferable to predictability and arms control. It also contrasts what the Barack Obama administration has tried to achieve through strategic stability dialogues with Russia and China with how they envision security cooperation. It then presents an approach developed during the Cold War by Hedley Bull for thinking about both the technical and the political dimensions of arms control, and suggests that the logic of Cooperative Security (which shares important features with Bull's approach) is a more appropriate and productive way to think about arms control in the twenty-first century than strategic stability analysis is. 相似文献
16.
Abdurrahim Sıradağ 《African Security Review》2013,22(3-4):308-325
ABSTRACTTurkey has maintained its strategic relations with Africa at the highest level under recent AK Party governments in the field not only of low politics but also of high politics. For example, it opened its largest overseas military base in Somalia in 2017 and signed military, defense and security pacts with more than 25 African countries. This article traces the deep historical and cultural relations with Africa behind its newly evolving foreign policy identity, arguing that its booming economic power has been a significant driving force in shaping a new security strategy. It examines what the growing security involvement means for both Turkey and Africa in order to contribute to the relevant literature through a holistic approach from both theoretical and conceptual perspectives. 相似文献
17.
James Johnson 《Defense & Security Analysis》2019,35(2):147-169
Recent developments in artificial intelligence (AI) suggest that this emerging technology will have a deterministic and potentially transformative influence on military power, strategic competition, and world politics more broadly. After the initial surge of broad speculation in the literature related to AI this article provides some much needed specificity to the debate. It argues that left unchecked the uncertainties and vulnerabilities created by the rapid proliferation and diffusion of AI could become a major potential source of instability and great power strategic rivalry. The article identifies several AI-related innovations and technological developments that will likely have genuine consequences for military applications from a tactical battlefield perspective to the strategic level. 相似文献
18.
近几年美军针对网络电磁空间不断出台新的政策和联合条令,但是相关规定在网络空间作战、电子战、频谱管理行动的定义上有交叠,为了进一步提高作战能力,防止冲突的发生,美军提出网络电磁行动的概念对三者进行整合,针对美军提出的网络电磁行动进行了介绍和分析并提出了对我国的一些启示。 相似文献
19.
David J. Karl 《The Nonproliferation Review》2014,21(3-4):317-336
This essay provides an overview of the ongoing quantitative and qualitative changes in Pakistan's nuclear arsenal and their impact on deterrence stability vis-à-vis India. Prominent among these trends is a major expansion in fissile material production that enables the manufacture of lighter and more compact warheads optimized for battlefield missions; the development of cruise missiles and shorter-range ballistic missiles possessing dual-use capabilities; and a greater emphasis in doctrinal pronouncements on the need for strike options geared to all levels of conflict. Although these trends pose problematic ramifications for the risks of unauthorized and inadvertent escalation, deterrence stability in South Asia is not as precarious as many observers fear. The challenges of fashioning a robust nuclear peace between India and Pakistan cannot be lightly dismissed, however, and policy makers would do well to undertake some reinforcing measures. 相似文献
20.
JAKKIE CILLIERS 《African Security Review》2013,22(3):123-126
Africa has emerged as a strategic location for transcontinental narcotics trade. Particularly the West African subcontinent has turned into a cocaine warehousing and trans-shipment hub along the way to the European underground markets. At this juncture, African drug networks (ADNs) began to play a momentous role in global drug trade, and pose a considerable threat to international security, as they operate in more than 80 countries. The United Nations Office on Drugs and Crime, Interpol, and Europol perceive ADNs as one of the primary issues in international counter-narcotics policy. These agencies have launched several multilateral initiatives to contain the West African threat. None of these initiatives, however, retarded the expansion of the problem. Indeed, the containment efforts turned out to be quite embryonic. The ADNs eventually entered the Turkish market by the early 2000s. West African drug networks (WADNs) in particular have begun to operate within Turkey extensively, often supplying and distributing drugs. The gravity of the threat became ever more serious by 2012. The upsurge of the new threat has compelled the Turkish drug-law enforcement agencies to adopt new policies and counter-strategies. These policies have to be based upon proper strategic analysis of the threat. This paper seeks to address the need for a threat assessment of ADNs. It investigates the dimensions of the problem, profiles the members of WADNs, their modes of operation, and the factors that compelled them to exploit the illicit Turkish drug markets. The analyses are based upon the scrutiny of 227 narcotic interdictions files and statements from the African individuals in these case files. The paper concludes by presenting policy implications and recommendations for the Turkish security and foreign-policy institutions to cope with this impending threat. 相似文献