首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Military operations increasingly require cooperation between agencies within the same nation, but also collaboration with security and military organizations internationally. Throughout history multinational military cooperation has often been an appropriate way to conduct major operations; national manpower and material resources are generally insufficient to address the demands of missions worldwide. The desire to optimize the use of scarce research and development and investment capabilities, the need for international legitimacy and political support, and the fact that today’s risks transcend national borders, have rendered multinational cooperation in the security domain unavoidable. With joint operations comes the requirement for multi-partner- and multinational information sharing. However, information sharing has both advantages and costs, and is subject to both enabling factors as well as barriers. This paper reflects on theories, both classical and current, as well as empirical case studies, to examine the pros and cons of multinational information sharing, and the factors that conduce or interfere with the transmission and the receipt of intelligence. The importance of a holistic approach and of learning lessons learned are two key lessons gleaned from the analysis, along with an emphasis on developing both the organizational and the interpersonal enablers of information sharing.  相似文献   

2.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

3.
A nation's structure and culture of civil-military relations are important and largely overlooked factors in explaining the performance of armed forces involved in complex expeditionary operations. The US model of ‘Huntingtonian’, divided civil-military structures and poor interagency cooperation, makes the US military less suited for complex expeditionary operations. British civil-military relations involve a Defence Ministry that conscientiously integrates military and civilian personnel, as well as extensive interagency cooperation and coordination. This ‘Janowitzean’, integrated form of civil-military relations makes the British military more likely to provide for the planning and implementation of comprehensive campaigns that employ and coordinate all instruments of power available to the state, as well as troops in the field displaying the flexibility and cultural and political understanding that are necessary in complex expeditionary operations.  相似文献   

4.
ABSTRACT

There is a dearth of studies on indirect victims of sexual violence in counter-terrorism efforts. Using Nigeria as a case study, this paper argues that global and state-level counter-terrorism policies have generally failed to account for the psychological effects of the engagement of female NGO workers in counter-terrorism operations or mitigating the effects of terrorism in conflict zones. Specifically, there has been an increase in sexual violence perpetrated by some members of the security agencies involved in counter-terrorism operations in North-eastern Nigeria. As a result, female NGO workers carry out Medicare, psychosocial counselling and advocacy for these victims. Female NGO workers become exposed to the trauma of victims of sexual violence, which affects their mental health and thus performances in counter-terrorism activities in the country. This altered their worldview on issues of safety even among secured locations or among the presence of security agents and reinforced feelings of powerlessness.  相似文献   

5.
The article considers the state of UN peacekeeping through the prism of its long-running operation in the Democratic Republic of the Congo (DRC). Focusing in particular on the challenges raised by use of force and the protection of civilians in conditions of ongoing armed conflict, it argues that UN field operations must be aligned much more closely than they have been over the past 15 years to political and diplomatic efforts aimed at securing viable political settlements to internal conflict. The issues raised by the history of the UN’s troubled mission in the DRC are deeply relevant to the wider discussion of the organisation’s role in the field of peace and security.  相似文献   

6.
Iran’s support for terrorist groups is the subject of countless articles and monographs. Less emphasis is placed on Tehran’s efforts to fight terrorist groups targeting the Iranian state. Yet, modern domestic and foreign terrorist groups have targeted Iran for decades. As a result, the country has developed fairly sophisticated, albeit opaque, counterterrorism apparatus and mechanisms. This article sheds light on the Iranian counterterrorism apparatus and efforts since the 1979 Islamic Revolution, drawing on several years of fieldwork in Iran, interviews with current and former officials, and Persian sources.  相似文献   

7.
The March 2012 coup in Mali opened the door to expanded territorial occupation in northern Mali by Tuareg separatists and subsequently armed Islamist extremists. French forces intervened at the behest of the interim government in Mali. This article examines how various actors frame the conflict to their advantage. While the Malian government and France are allies, the position of various Tuareg actors shift over time as they strategize and weigh the value of allegiance with the French. Local extremist organizations are labeled as terrorists and are targeted as enemies. This article argues that the conflict has been decontextualized and framed within the ‘war on terror’. France’s decision to intervene and to expand their regional military presence, rather than exit, is legitimized by the framing of their intervention as integral to counterterrorism efforts.  相似文献   

8.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   

9.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   

10.
This analysis addresses whether US strategy has escalated the ongoing conflict in Colombia. The study examines the ways in which US policy towards Colombia has been affected both by global circumstances after 9/11, and local events on the ground such as the involvement of private military firms which operate alongside multinational corporations in the country. The evidence suggests that US strategy has escalated the conflict, sometimes unintentionally, as the policy has evolved from an initial emphasis on countering the narcotics trade to one of counterterrorism. This has occurred, however, at the expense of other reforms, in particular by hindering the implementation of an effective pacification strategy. The analysis concludes that such an unbalanced strategy does not, as a consequence, provide for greater security and stability.  相似文献   

11.
This chapter discusses the impact Provincial Reconstruction Teams (PRTs) have on the security situation in Afghanistan, specifically in countering the terrorist threat and in counter-narcotics.

The Afghan people define the lack of security as their country's greatest problem. The terrorist activities of groups opposed to the central government and the political process compounded by violence related to the opium trade are seen as the main sources of insecurity. The authors argue that, currently, PRTs should not assume active counterterrorism as an additional main area of operation. The complexity of Afghanistan's security environment and the pressure to have PRTs involved in the counter-narcotics effort underscore the necessity of local knowledge and experience in the PRTs. Participation of indigenous actors, such as NGOs, in the PRT-organisational structure could provide this required expertise.  相似文献   

12.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

13.
To more concretely define what the UN's policy towards international peacekeeping should be in the twenty-first century, novel methods of addressing inter-and intrastate conflict need examining. Consequently, this article argues that UN peacekeeping operations must begin to include technological capabilities – namely UN jamming of hate radio – when certain prerequisites are met. Using the Rwandan genocide and the radio station that largely inspired the conflict, RTLMC, as a case study, this article illustrates hate radio's power in both inter- and intrastate conflict and devises a system wherein UN peacekeeping efforts can effectively silence this menace to international security.  相似文献   

14.
Using the Boko Haram terrorist group in Nigeria as a point of departure, this paper examines the implications of the operations of terrorist groups on the security and stability of states in West Africa. It predominantly utilises secondary sources of data. Findings indicate that the membership and operations of this terrorist group are spreading across the sub-region. This spread is consequent upon Boko Haram's collaboration with other terrorist groups within West Africa and beyond. This constitutes threats to the security and stability of states in the sub-region. Thus, the paper recommends, among other things: a thorough understanding of the operational strategies of terrorist groups by states and those involved in security policymaking in the sub-region; and for agreements to be reached among Economic Community of West African States (ECOWAS) member states and their governments for collaboration in various areas in order to curtail transnational crime and terrorism, and reduce socio-economic inequality that generates aggressive behaviours among the less privileged.  相似文献   

15.
Abstract

The creation of the Africa Command (AFRICOM) has reflected the growth in the strategic importance of Africa in US foreign policy since the end of the 1990s. One of the objectives of this new geographical military command is to forge closer links between foreign, security and development policies. However, this approach met with a number of difficulties associated with the challenge of ‘inter-agency cooperation’ among rather disparate actors from foreign affairs, defence and development. In addition, the establishment of AFRICOM has met with fierce criticism in the US and elsewhere – especially in Africa – culminating in the charge that the US foreign and development policies in Africa are being militarised. Although AFRICOM has a number of interesting features, this paper shows that it has reacted to these criticisms by realigning itself more closely with the traditional model of a military command, at the expense of the innovative interagency elements.  相似文献   

16.
Kenya’s decision to close the Dadaab refugee camp complex highlights structural flaws in the international refugee regime. While much attention has been paid to Kenya’s reasoning, less has been given to the reactions of organisations and states. Given the state’s primacy in the international system and uncertainty about refugees, Kenya’s decision is perhaps unsurprising. It is contended that the stakeholders were unprepared because of path dependence and disbelief that Kenya would repatriate the refugees. While stakeholder reactions arguably demonstrate concern for refugees, the international refugee regime remains unquestioned, sustaining revenue streams that may fuel corruption, encourage lengthy encampment and prolong conflict.  相似文献   

17.
Despite both regional and international efforts to establish a weapons of mass destruction–free zone (WMDFZ) in the Middle East, regional support beyond mere rhetoric seems unattainable. The lack of commitment to WMD disarmament results from the complexity of regional security dynamics, which are characterized by a high level of weaponization and crosscutting conflicts. This article examines a strategy for WMD disarmament in the Middle East. First, such a strategy must reflect the motives underlying a state's WMD aspirations. Security and prestige may be identified as two motives that affect the acquisition, and thus also the abandonment, of WMD. Second, Egypt, Iran, Israel, and Syria are important actors because their reasons for desiring WMD cannot be considered apart from each other, and progress will consequently depend on the inclusion of all these actors. In this regard, we recommend the establishment of a parallel process between efforts to establish a WMDFZ and peaceful relations in the Middle East. Solving central problems, like the lack of political determination and security cooperation, is vital to create consensus on the final framework of a zone. This study suggests a way forward by analyzing the central causes of conflict in the region and recommending ways to resolve them in order to establish a WMDFZ.  相似文献   

18.
China-U.S. cooperation over the most difficult security problem in Northeast Asia—the North Korean nuclear issue—in essence projects its bigger power game amid the tectonic shifts of Asian geopolitics. The nuclear issue affords a test case to gauge the future posture of China and the United States in East Asia and their partnership in that conflict-prone region. Approaches to resolving this issue must take into account the geopolitical realignment of Asia, Washington's reorientation of relations with its Asian allies, and China's rise as an influential regional player and the subsequent regional response. However, the long-standing mistrust between China and the United States is contributing to a lack of substantial progress in Korean nonproliferation efforts. The declared nuclear test by Pyongyang further put the denuclearization cooperation between China and the Unites States on the line. China-U.S. cooperation in denuclearizing Pyongyang may either produce lasting stability for the region or create ‘‘collateral damage,’’ with the North Korean issue paling in comparison.  相似文献   

19.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   

20.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号