首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 750 毫秒
1.
Recent developments in artificial intelligence (AI) suggest that this emerging technology will have a deterministic and potentially transformative influence on military power, strategic competition, and world politics more broadly. After the initial surge of broad speculation in the literature related to AI this article provides some much needed specificity to the debate. It argues that left unchecked the uncertainties and vulnerabilities created by the rapid proliferation and diffusion of AI could become a major potential source of instability and great power strategic rivalry. The article identifies several AI-related innovations and technological developments that will likely have genuine consequences for military applications from a tactical battlefield perspective to the strategic level.  相似文献   

2.
Since the terrorist attacks of 11 September 2001, the continent of Africa, particularly Greater East Africa, has played an increasingly signifi cant role in United States (US) national security strategy. Transnational security threats and political authoritarianism continue to plague the region, creating calls for greater US and international involvement. Before reacting to the situation, however, it is prudent to pause, reflect, and understand that the United States developed strategic relations with nation-states in the region well before contemporary concerns for international terrorism and ungoverned spaces entered the strategic lexicon. Toward a more comprehensive understanding of Greater East Africa's strategic history, this paper examines the core strategic relationship in the region, US-Kenya relations, its origins and implications, and offers policy recommendations that will affect future international security.  相似文献   

3.
ABSTRACT

Since the end of the Cold War, arms control proponents tried to make the case for deep nuclear reductions and other forms of security cooperation as necessary for strategic stability. While different versions of strategic stability analysis did sometimes produce innovative proposals, constructive negotiations, and successful ratification campaigns in the past, this analytical framework has become more of a hindrance than a help. Treating arms control as a predominantly technical way to make deterrence more stable by changing force structure characteristics, military operations, relative numbers of weapons on either side, or total number of nuclear weapons gives short shrift to political factors, including the fundamental assumptions about world politics that inform different arms control logics, the quality of political relations among leading states, and the political processes that affect negotiation, ratification, and implementation. This article compares two logics for arms control as a means to enhance strategic stability, one developed by the Cambridge community in the 1960s and one used by the Reagan administration and its successors, with current perspectives on strategic stability in which flexibility and freedom of action are preferable to predictability and arms control. It also contrasts what the Barack Obama administration has tried to achieve through strategic stability dialogues with Russia and China with how they envision security cooperation. It then presents an approach developed during the Cold War by Hedley Bull for thinking about both the technical and the political dimensions of arms control, and suggests that the logic of Cooperative Security (which shares important features with Bull's approach) is a more appropriate and productive way to think about arms control in the twenty-first century than strategic stability analysis is.  相似文献   

4.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   

5.
This article explores the livelihood pathways of serving Ugandan Army soldiers and traces their methods and motivations for enlistment. All were from areas of northern Uganda affected by nearly two decades of violent instability. With the Uganda People's Defence Forces (UPDF) increasing recruitment eligibility requirements and taking other measures to improve professionalism, some soldiers enlisted using false credentials and names, travelled to skirt unofficial ethnic quotas, and joined against their family's wishes. The Army's defence reform process was intended to preclude such problems. The article concludes with reflections on what strategic deception (by both recruits and the Army) may imply for warriors' honour.  相似文献   

6.
The People's Republic of China (PRC), no longer content with its longstanding ‘minimalist’ nuclear posture and strategy, is enhancing the striking power and survivability of its theater and strategic missile forces and rethinking its nuclear doctrine in ways that may pose serious challenges for the United States. Although the modernization of Chinese nuclear and missile forces may ultimately result in greater strategic deterrence stability, this change will not come about immediately or automatically. Indeed, it is entirely possible that China's growing missile capabilities could decrease crisis stability under certain circumstances, especially in the event of a US–China conflict over Taiwan.  相似文献   

7.
The EU Global Strategy (EUGS) is a broad and ambitious document in terms of its geographic scope and thematic priorities. However, the EU cannot devote equal attention to all aspects of the EUGS; so there is still scope for more clarity regarding the EU’s core strategic aims. This article argues that in addition to fostering internal cohesion, the EU’s strategic priority must involve stabilizing its own neighbourhood. This task has challenged the EU for decades because of an inherent credibility deficit regarding the EU’s own capabilities, yet the EUGS does not diagnose and remedy this problem as effectively as it could have. Therefore much more work will need to be done in terms of reforming EU institutions and developing common capabilities if the EU hopes to achieve its central internal and external security goals as outlined in the EUGS and related policy statements.  相似文献   

8.
This article traces the evolution of the EU strategic reflection which culminated in the publication of the EU Global Strategy (EUGS) in June 2016. It explains the choices made by EU High Representative Federica Mogherini over this time period—including both the initial strategic assessment and the final EUGS. It provides a behind the scenes view on the players, the organization and the methods of work used to produce a strategic vision for the EU’s role in the world.  相似文献   

9.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   

10.
Guinea-Bissau's transition toward democracy has been violent and disruptive. Despite holding elections and attempts to promote economic and social development, the latest government, under President Yala, is not equipped to bring stability or even a more democratic state. A politicised military, inexperienced opposition and corrupt government officials have contributed to the current poverty and instability. Although unlikely to be deposed by the fragmented opposition, Yala is not secure within his own party and is likely to use his position to weaken his opponents. As a Catholic, Yala has been careful to avoid religious conflict by reassuring Muslim citizens that they will not be marginalised. The economy is precarious and poverty has not been addressed. Guinea-Bissau is dependent on foreign donors for its financial needs. Guinea-Bissau has begun military operations against rebels opposing the Senegalese government and the battles seem likely to continue to cause regional instability. Without external intervention political and economic development looks remote.  相似文献   

11.
边境安全作为国家安全或者国土安全的重要方面,越来越多地受到各种非传统安全因素的威胁和挑战,其中,非法移民问题就是一个不可忽视的因素。非法移民的界定涵盖了“偷运移民”和“贩运人口”两种犯罪形式,并分别从结构性维度和战略性维度分析了非法移民对输出国(或地区)、输入国(或地区)和途经国(或地区)边境安全稳定的影响。  相似文献   

12.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   

13.
2018年10月,美国宣布单方面退出《中导条约》。《中导条约》是美苏两国在冷战后期达成的,并得到了切实执行的条约,对于维护冷战后全球战略平衡发挥了至关重要的作用。冷战后,俄美曾经企图将《中导条约》多边化,构建俄美新型战略关系,但最终反目成仇,使得俄美关系严重倒退,并迈入新的相互战略遏制的时代。  相似文献   

14.
By drawing on the literature about security regimes, this article posits the idea that a particular type of regime, which can be termed a “tacit security regime” (TSR), has begun to emerge between Israel, on the one hand, and several Gulf Arab states, on the other. It is a regime which, unlike liberal institutional variants that attempt to privilege the promotion of collective norms, remains configured around perceptions of threats to be countered and strategic interests to be realized. By examining the development, scope, and scale of this nascent TSR, this article explores the extent to which Israel, mindful of Washington, DC’s regional retrenchment, sees the emergence of such a regime as redefining the political and strategic contours of Israel’s relations with much of the Middle East.  相似文献   

15.
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers.  相似文献   

16.
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy.  相似文献   

17.
ABSTRACT

In 2008, the announcement of the Global Zero campaign—an international effort to eliminate nuclear weapons—coincided with the election of Barack Obama. The new president, avowedly pro-disarmament, made getting to zero nuclear weapons a centerpiece of his foreign policy. This article takes on the question of what impact global disarmament might have on international strategic stability. In a break with much of the literature and analysis on nuclear policy, it explicitly focuses on how publics understand the significance of nuclear weapons. In so doing, the article draws on recent international relations scholarship on the role of habit to argue that eliminating nuclear weapons can generate instability by creating widespread perceptions of insecurity and anxiety. If disarmament campaigners wish to achieve their goal without generating instability, they will need to work over the long-term to break habituated beliefs about nuclear weapons.  相似文献   

18.
Africa has emerged as a strategic location for transcontinental narcotics trade. Particularly the West African subcontinent has turned into a cocaine warehousing and trans-shipment hub along the way to the European underground markets. At this juncture, African drug networks (ADNs) began to play a momentous role in global drug trade, and pose a considerable threat to international security, as they operate in more than 80 countries. The United Nations Office on Drugs and Crime, Interpol, and Europol perceive ADNs as one of the primary issues in international counter-narcotics policy. These agencies have launched several multilateral initiatives to contain the West African threat. None of these initiatives, however, retarded the expansion of the problem. Indeed, the containment efforts turned out to be quite embryonic. The ADNs eventually entered the Turkish market by the early 2000s. West African drug networks (WADNs) in particular have begun to operate within Turkey extensively, often supplying and distributing drugs. The gravity of the threat became ever more serious by 2012. The upsurge of the new threat has compelled the Turkish drug-law enforcement agencies to adopt new policies and counter-strategies. These policies have to be based upon proper strategic analysis of the threat. This paper seeks to address the need for a threat assessment of ADNs. It investigates the dimensions of the problem, profiles the members of WADNs, their modes of operation, and the factors that compelled them to exploit the illicit Turkish drug markets. The analyses are based upon the scrutiny of 227 narcotic interdictions files and statements from the African individuals in these case files. The paper concludes by presenting policy implications and recommendations for the Turkish security and foreign-policy institutions to cope with this impending threat.  相似文献   

19.
ABSTRACT

The United States and China are testing boost-glide weapons, long-range strike systems capable of flying at Mach 5 or faster through the upper atmosphere. For the United States, these systems would provide a conventional prompt global strike capability, which, together with US ballistic missile defense programs, Chinese experts regard as a threat to China's ability to conduct nuclear retaliation. This perception is encouraging the Chinese military to modify its nuclear posture in ways that tend to create greater risks for both sides. If China's own boost-glide systems are meant to carry nuclear payloads only, their deployment would not fundamentally alter the current situation between the two states. However, if they were conventionally armed or dual-purpose, or if the United States could not determine the payloads they carried, the deployment of Chinese boost-glide systems could compound problems of strategic stability created by the introduction of ballistic missile defense, antisatellite, and antiship ballistic missile capabilities. If the technical hurdles can be overcome, it may be difficult for the two sides to refrain from these deployments in the absence of strong mutual trust or an established arms-control relationship. New confidence-building measures and expanded mutual transparency are warranted to avoid creating new dangers.  相似文献   

20.
ABSTRACT

Turkey has maintained its strategic relations with Africa at the highest level under recent AK Party governments in the field not only of low politics but also of high politics. For example, it opened its largest overseas military base in Somalia in 2017 and signed military, defense and security pacts with more than 25 African countries. This article traces the deep historical and cultural relations with Africa behind its newly evolving foreign policy identity, arguing that its booming economic power has been a significant driving force in shaping a new security strategy. It examines what the growing security involvement means for both Turkey and Africa in order to contribute to the relevant literature through a holistic approach from both theoretical and conceptual perspectives.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号