首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 507 毫秒
1.
Africa is severely affected by sub-state terrorism—a phenomenon that is deeply rooted in the crisis facing a number of African states. While the importance of root causes in so-called sub-state terrorism is generally accepted, this issue is hotly contested internationally in debates on terrorism. In fact, both sub-state and transnational terrorism have essentially local causes and linkages, and therefore much of what is categorised as terrorism should be treated more appropriately as insurgencies. Recent events in Somalia are of particular concern, as Western responses to the war on terror may further complicate the domestic situation, with self-fulfilling results. Great care should be exercised by African states in adopting either the language of or the prescribed solutions for transnational terrorism as part of the ‘global war on terror’.  相似文献   

2.
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare.  相似文献   

3.
SECURITY BRIEF     
September 11 2001 precipitated the introduction of anti-terrorism legislation in most states and enhanced cooperation between states around the world. Africa may not have witnessed many incidents of international terrorism on its soil, yet the continent has, in the post 9/11 era, often been referred to as the ‘breeding ground of terrorism’ or the conduit for international terrorists. The assumption that countries with weak governments and failing economies (as in most of the continent) seems to be one of the factors that earned Africa this negative image. While the validity of the assumption is debatable, it is clear that prosecuting cases of terrorism is fraught with legal intricacies. This article deals with the difficulties involved.  相似文献   

4.
This essay locates the West African region in the context of the post-9/11 discourses on terrorism and counter-terrorism, particularly as it relates to the global war on terror. It identifies and analyses the issues and challenges that flow from the integration of West Africa into hegemonic transnational/globalised security arrangements, and the ways in which the emerging state (militaristic) and globalised security framework could reinforce or, paradoxically, undermine regional, intranational human and environmental security in one of Africa's most troubled regions. It critically examines the possibility of a terrorist threat in the region and analyses the global stakes involved in integrating West Africa into the global war on terror. On this basis, it concludes that zero-sum, militarist, globally driven solutions may fail to address the historical, political, and socio-economic roots of a possible terrorist threat in West Africa.  相似文献   

5.
The period from December 1940 through to the spring of 1941 saw the British Army win a series of rapid and decisive victories over Italian and Vichy French forces in North and East Africa and the Middle East. A key feature of these operations was the extensive British use of fast-moving all-arms mobile formations utilising superior speed and mobility to out-manoeuvre considerably larger Italian formations. A number of reasons have been given for the British Army adopting this mode of warfare, but the paper contends that the best explanation is that they were an organic evolution from methods used by the British Army in ‘small wars’ throughout the early twentieth century, use of mobile ‘frontier columns’ at the operational and tactical level of war being described and recommended by Callwell himself and visible with the Army in practice in operations in India and the Middle East in particular. The inter-war period saw the combination of this model of warfare with post-First World War military technology, notably tanks, close air support and coordination by wireless. Colonial operations in this period also saw some utilisation of what would later be identified as ‘Special Forces’ – also used extensively in the Desert War – the most obvious example being Captain Orde Wingate's Special Night Squads in Palestine in 1938.  相似文献   

6.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society.  相似文献   

7.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

8.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   

9.
Transnational terrorism data are difficult to forecast because they contain an unknown number of structural breaks of unknown functional form. The rise of religious fundamentalism, the demise of the Soviet Union, and the rise of al Qaeda have changed the nature of transnational terrorism. ‘Old School’ forecasting methods simply smooth or difference the data. ‘New School’ methods use estimated break dates to control for regime shifts when forecasting. We compare the various forecasting methods using a Monte Carlo study with data containing different types of breaks. The study's results are used to forecast various types of transnational terrorist incidents.  相似文献   

10.
The US-led ‘war on terror’ dramatically changed America's security strategy towards Africa. But more fundamentally, it threw the Horn of Africa on the centre stage of global counter-terrorism. A double-edged blade, counter-terrorism has at once catalysed peace processes and intensified insecurity, with Islamic radicalism at the core of the regional storm. Governments utilised the threat of terrorism for political ends, defending old security paradigms that prioritised regime stability over human security. Africa integrated counter-terrorism into its emerging security agenda, but insufficient funds, operational constraints and poor coordination with international initiatives have hampered meaningful progress. Washington, laudably, launched a robust counter-terrorist campaign, but its high-handed military-heavy style put fragile democracies at risk while lapses in its overall policy risk triggering proxy wars. This essay examines the impact of counter-terrorism on security in the Horn of Africa. It argues for stronger coordination between national, regional and international initiatives to curb international terrorism.  相似文献   

11.
It has been argued that the discovery of a new natural resource greatly increases the risk of conflict. This research aims to study the effect of natural resources on military spending, using the data from rentier states in the Middle East and North Africa (MENA) countries from 1987 to 2012. In considering the ‘resource curse,’ the types of natural resources matter. Our empirical results demonstrate that the ‘resource curse’ arising from the abundance of certain natural resources, particularly oil and forest resources, leads to increases in military spending. In contrast, the rent from coal and natural gas has a negative impact on military spending, while the rent from minerals has no impact on military spending, controlling for GDP growth and per capita income.  相似文献   

12.
Targeted killings have become a central tactic in the United States' campaigns against militant and terrorist groups in the Middle East, Asia, and Africa. Both ‘demand’ and ‘supply’ factors explain the rise of targeted killings. Demand for targeted killings increased as the United States faced new threats from militant groups that could not be effectively countered with conventional military force. Concerns about the political consequences of long-term military involvement overseas and American casualties led political leaders to supply more targeted killings. The conclusion discusses how this tactic may have unintended consequences as other states follow the United States use of targeted killings.  相似文献   

13.
Abstract

The war on al-Qaeda and its affiliates appears to be endless but every war must end. Winding down the conflicts in Afghanistan and Iraq has been difficult, but both were embedded in what was then called the ‘war on terrorism.’ What does ‘success’ in that war mean? With the death of bin Laden and the increase in drone operations, how far is the US from achieving it? Can this war end? The article analyzes the ongoing US response to the 9/11 attacks in historical context, revealing four patterns common to all prolonged wars: means become ends, tactics become strategy, boundaries are blurred, and the search for a perfect peace replaces reality. It concludes by laying out an effective strategy for ending the war.  相似文献   

14.
我国跨境恐怖主义犯罪日益猖獗,不仅造成了大量的无辜平民伤亡和公私财产的损失,而且侵害了其他国家的利益和国际社会的共同秩序。防范和惩治我国跨境恐怖主义犯罪活动,应当坚持经济和社会的协调发展,消除恐怖主义滋生的土壤;积极参与多边安全合作,探寻维护我国安全利益的新途径;完善我国反恐怖主义犯罪的刑事立法。  相似文献   

15.
Using the Boko Haram terrorist group in Nigeria as a point of departure, this paper examines the implications of the operations of terrorist groups on the security and stability of states in West Africa. It predominantly utilises secondary sources of data. Findings indicate that the membership and operations of this terrorist group are spreading across the sub-region. This spread is consequent upon Boko Haram's collaboration with other terrorist groups within West Africa and beyond. This constitutes threats to the security and stability of states in the sub-region. Thus, the paper recommends, among other things: a thorough understanding of the operational strategies of terrorist groups by states and those involved in security policymaking in the sub-region; and for agreements to be reached among Economic Community of West African States (ECOWAS) member states and their governments for collaboration in various areas in order to curtail transnational crime and terrorism, and reduce socio-economic inequality that generates aggressive behaviours among the less privileged.  相似文献   

16.
At a senior officials' meeting held in Algiers from 11–14 September 2002, the African Union proved ready and able to provide the political cohesion and sense of purpose needed for Africa to combat terrorism. While member states inevitably played to a global gallery in demonstrating their commitment to the ‘war on terrorism’, the practical counter-terrorist proposals adopted at the meeting substantially address Africa's security challenges. The resulting Plan of Action on the Prevention and Combating of Terrorism focuses on state building and inter-governmental co-operation, to literally and figuratively close Africa's borders to terrorist activities. Implementing the plan will be a tough challenge for many African governments, especially to ensure that their counter-terrorist measures adhere to international and regional human rights accords.  相似文献   

17.
A truly universal ban on anti-personnel mines cannot be realized without engagement of armed non-state actors and armed groups operating outside state control, including rebels and national liberation movements. Events after 9/11 have complicated engagement with organizations that can be classified as ‘terrorists’. Yet, the use of anti-personnel landmines itself can be viewed as an act of terrorism and African leaders have, on various occasions, classified the use of landmines and the presence of unexploded ordnance as engendering insecurity and a serious impediment to development. The success of a total ban ultimately depends upon ensuring that armed non-state actors act in accordance with international humanitarian law. The Geneva Call Deed of Commitment for Adherence to a Total Ban on Anti-Personnel Mines and for Cooperation in Mine Action (DoC) might be described as an alternative instrument to the Anti-Personnel Mine Ban Convention and can serve an important and impartial channel of communication with non-state actors. Already 18 armed groups in Africa have signed the Geneva Call DoC.  相似文献   

18.
This contribution looks at the role of Special Forces in anti-terrorist operations with particular emphasis on the British Special Air Service. It argues that Special Forces have played a pivotal role in such operations since the era of Palestinian terrorism in the early 1970s. The essay looks at the operations in Afghanistan leading to the overthrow of the Taliban in 2001 and shows that the seven Special Forces involved there proved crucial to the success of the limited ground forces. In particular they served a valuable force multiplier by acting as a nexus between the regional warlords and the use of air power as well as mobile strike units against fortified Al Qaeda and Taliban positions. In the latter instance their success was mixed, involving attacks on difficult cave hideouts, though overall it can be concluded that Special Forces have demonstrated their capacity in fighting unconventional warfare against mobile and transnational terrorist groupings.  相似文献   

19.
ABSTRACT

What happens when the world’s ‘oldest profession’ interacts with history’s oldest form of war? In the Horn of Africa, a symbiotic relationship between prostitutes and terrorists has emerged, illuminating critical information about the group’s ideology and strategy. In this article, we argue that al-Shabaab’s differential treatment of Somali and other East African women reveals the group’s strategic focus on Somalia, despite its claims to be a globally focused Islamic extremist organization. Through original ethnographic fieldwork in Kenya, the authors explore al-Shabaab’s deliberate relationships with different groups of women and explain how this helps scholars better understand the group. This article suggests the next phase of scholarship on gender and terrorism, encouraging scholars not only to pay attention to the relationship between women and terrorist groups, but to also examine the nuanced relationships between different categories of women and terrorist groups.  相似文献   

20.
Abstract

Humanitarian Assistance and Disaster Relief (HADR) is increasingly important for East Asian militaries, but there is little scholarship on how HADR relates to broader national strategies. This article considers US involvement in HADR in East Asia in relation to changing conceptions of national power. HADR is frequently described as use of ‘hard’ military assets to further soft power goals. Looking at recent US experiences, this article shows that HADR also serves instrumental ends linked to traditional military objectives. Rather than considering power as ‘soft’ or ‘hard’, it argues that HADR illustrates connections between non-coercive and coercive uses of military power.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号