首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 755 毫秒
1.
2.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   

3.
Balochistan has been in the midst of a full fledged insurgency for over five years now. Pakistani establishment has tried to project the current insurgency as a tribal mischief being perpetrated by a few feudal lords but the widespread support that the insurgents have been enjoying and the impunity with which they have been targeting symbols of government authority not only across the entire length and breadth of Balochistan but even outside, indicate that there are deep rooted, well defined causes that have led to this insurgency. The paper attempts to analyse the factors that have led to current round of insurgency in Balochistan.  相似文献   

4.
The insurgency in North West Rwanda is a good example of a small scale conflict that provides a first step into the more complex world of regional instability in central Africa. Following the genocide of 1994, genocidaires and ex-military personnel fled to what was then Zaire and established a network of anti-Tutsi bases. Linking up with local groups in Eastern Zaire, these insurgents, usually known as ‘infiltrators’ have carried out a low-intensity but consistent insurgency campaign in Rwanda.

The constant barrage of propaganda aimed at the local population, a technique pioneered during the 1994 genocide, has led to a general, manufactured support for the insurgency. In particular, those people returning from Zaire have been fed a constant diet of anti-Tutsi and Rwandese Patriotic Army (RPA) propaganda, making it easier to act against these groups. Even within the local government and other official bodies, there are widespread Hutu sympathies that have led to additional aid reaching the insurgents.

The particular strain of ethnic violence has led to an insurgency in which civilian villages are as likely to be attacked as RPA military installations. More surprising, given the nature of the insurgency, Hutus themselves have been targets. Initially, moderate Hutus were singled out as examples, but increasingly indiscriminate killings have been aiming to force all Hutus to take sides.

The insurgents have deliberately polarised large parts of Rwanda and this has profound implications for conflict resolution. In particular, supplementing the military campaign with political social campaigns, at least partly to combat the mythology of grievance among the Hutus, and tackling the conflict as part of a supra-national conflict that goes beyond ‘national’ borders.  相似文献   

5.
This article addresses the form and nature of an insurgency in Northern Uganda that has been active since the mid-1980s. The insurgency movement itself grew out of an internal breakdown in security lasting over several years, during which ethnicity played a critical part in defining access to power and resources within Uganda. The recent explosion of literature relating to conflict inside Sub-Saharan Africa outlines several different analytical approaches to violence. One of the most recent and influential has been that of examining greed rather than grievance as the main driver behind conflict. This articl looks at the evolution of warfare in Northern Uganda over 15 years and puts the argument that greed and grievance are not mutually exclusive in this situation and it is the interaction between the two that provides the impetus for continued violence.  相似文献   

6.
In the late seventeenth century during the Dutch War (1672–1678) and the Nine Years War (1688–1697), French armies relied on small war for the accomplishment of essential tasks and as part of an overall strategy of exhausting their opponents in the Low Countries. The purposes of small war included the imposition of contributions on enemy populations, the destruction of the enemy base of operations, blockades of fortresses, and the general support of campaign armies. The expression ‘small war’ in the French language appeared with growing frequency in the 1690s. Small war can be viewed as both a cause and consequence of the characteristics of these wars. The limited policy goals of Louis XIV the king of France required a strategy that minimised risk and accomplished the goal of reducing if not eliminating the Spanish presence in the Low Countries that bordered the north of France. As French armies increased in size during this period, the demand for specialists at small increased in order to provide security and ensure supply. Small war in the late seventeenth century was thus not ideologically motivated insurgency, but in the minds of French commanders an essential component of strategy and the nature of war.  相似文献   

7.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

8.
All governments wrestle with the challenge of interagency coordination. Improving civil-military coordination, at the national level as well as in the field, can be a useful step in designing a more effective defense decision-making process. National-level organisations do not cooperate easily, but young military and civilian personnel with CIMIC experience can begin to open stovepipes. If vertically organized governments are ever to deal effectively with horizontally organized threats, they must become populated by those who have witnessed the power of horizontal thinking. CIMIC operations thus prepare future `bureaucrats' to create government networks capable of managing the triple threat of terrorism, insurgency and organized crime  相似文献   

9.
Existing theory on counterinsurgency does not adequately explain persistent insurrection in face of the reconstruction work currently underway in Afghanistan and Iraq. We starkly depart from the literature by developing a simple model of reconstruction allowing misalignment of occupier spending with community preferences. Insurgency arises endogenously as a result of the mix of spending rather than its level. Occupier insistence on its preferred path of reconstruction may lead to fewer projects of any kind being completed. In equilibrium, the occupier may accept an endogenous insurgency to achieve a preferred project mix, or be constrained in its choice even when no insurgency occurs.  相似文献   

10.
India is at a crossroads today. While it is fast emerging as a global power with a vibrant democratic polity, a robust economy and a nuclear-weapons capable military, the country is also witnessing a growing polarisation between the rich and poor and between urban and rural areas, a rise in communal tensions, large numbers of suicides by impoverished and indebted farmers and a spurt in terrorist activities and attacks by various disgruntled organisations and groups. Of these various challenges, as attested to by Prime Minister Manmohan Singh himself, the most dangerous threat to India's territorial integrity, prosperity and wellbeing has come from the Naxalite insurgency or ‘people's war’ that is manifest in large areas of eastern, central and southern India. But what factors account for the formation and persistence of Naxalite insurgency in India? What are the key objectives of the Naxalites and why is violence directed against the Indian State? And how has the Indian State (both central and state governments) responded to the Naxalite insurgency and with what effect? These are the main research questions that we attempt to answer in this paper. We put forward two broad arguments. First, the Naxalite insurgency in India is the latest manifestation of peasant struggles caused by grinding poverty, exploitation and inequality that have prevailed in rural areas for centuries. What sustains these struggles to this day is the fact that socio-economic conditions in rural areas have changed little and the policies followed by the post-independent Indian State have generally failed to mitigate rural problems. Second, the Naxalite insurgency has emerged as the most dangerous threat mainly due to the movement's spatial spread, growing support base in tribal and backward areas and enhanced fighting capabilities. The Indian State has viewed the movement as a ‘law and order’ problem and responded with force. But a ‘law and order’ approach to the Naxalite insurgency is unlikely to produce a lasting resolution of the problem, since it would not effectively redress deep-rooted grievances felt by a majority of India's rural poor for decades.  相似文献   

11.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   

12.
This article compares the philosophy and practice of command in the British and US Armies during the Italian Campaign of 1943–44. It assesses pre-war influences on the command approach adopted by each army, and shows how refinements derived from wartime experience enabled British and American commanders to successfully utilise mission command principles to outfight the German Army in the latter years of World War II. This examination directly challenges the historical consensus that Allied commanders were disadvantaged by an inability to exploit the advantages of mission command, and that the German Army retained superior command practices, despite its other failings, throughout the fighting between 1939 and 1945. These conclusions hold additional relevance to modern military organisations which have emphasised mission command as the optimal solution to effective command in battle since the 1980s, but from an inaccurate understanding of German, British and American command traditions and experience that persists to this day.  相似文献   

13.
This chapter examines how Al Qaeda, an asymmetric power, was able to become a global challenger to the existing international structure. Neither regional insurgency theories nor grand-scale global theories alone are adequate to explain Al Qaeda's ability. Rather, a modification of the seven dimensions of the Manwaring paradigm for successful insurgency combined with key concepts of global revolutionary or imperial powers formerly applied to states gives insight to this fundamental question. Al Qaeda's asymmetric global challenge is unique, and understanding the nature of the threat is key to finally defeating it.  相似文献   

14.
LIVING IN TERROR     
Unlike terrorism, HIV/AIDS deaths are seldom spectacular. The reason being, that those dying are dispersed and the impact not clearly visible. Yet it is one of the greatest threats to mankind as the disease slowly erodes the social fabric of society and weakens national economies, making it difficult for states to respond to the social challenges and political instability this disease poses. This is especially the case in countries with large inequalities in income, which experience rapid urbanisation and where there is high mobility and a Breakdown in social cohesion within society. Armed forces are a crucial part of any state's security, but are often worst affected by this disease as it impacts directly on their operational effectiveness. Where armed forces face high infection rates it renders them less capable of coping with the internal disruption this disease causes as well as with the ability to provide humanitarian and peace support to those in need. With Southern Africa being the region most affected, South Africa as the regional economic and military power is becoming less capable of serving as regional peacekeeper or stabilising force as the impact of the disease becomes more visible.  相似文献   

15.
The belief that the insurgency in southern Afghanistan is a singular entity and the assumption that negotiations with that entity can bring an end to the conflict are simplistic and do not take into account the other insurgent partners, nor the role of local power brokers. Care must be taken when providing advice in the public domain on how to end or limit conflict in Afghanistan.  相似文献   

16.
This paper underscores the theory that efficacious law enforcement intelligence addresses current problems of criminal insurgency including acts of terrorism, asymmetric warfare and low intensity conflict, and suggests possible solutions. By introducing the notion of crime as insurgency, a new paradigm may be developed that could assist practitioners and academics alike in analyzing, solving and managing crime. By shifting the perspective for both military and civilian forces from their traditionally reactive stance, to a proactive posture, and merging national security with homeland defense on the most perplexing issues and threats facing US security, this work may provide a base upon which new and actionable policies can be designed. Public administrators must take seriously the lessons from past failures. The single most important supposition being, sound policy is reliant upon good intelligence.  相似文献   

17.

This essay discusses how strong military powers successfully conduct counter‐insurgency campaigns. In particular, it notes the pivotal role savagery plays in such encounters, and the social and institutional conditions that facilitate the resort to extreme levels of brutality. Finally, the essay demonstrates how states (including infant democracies) employ various compartmentalisation techniques in order to win insurgency wars, once the key conditions that facilitate the resort to brutality start to disappear.  相似文献   

18.
This paper uses recently-released material from the ‘migrated archives’ to provide an original counterinsurgency analysis of the TNKU revolt in Brunei and Sarawak from December 1962 to May 1963. It argues that, despite a failure to act upon intelligence predicting the outbreak of insurgency, Britain developed a highly effective counterinsurgency organisation. These records also indicate that decision-makers drew inspiration from the Malayan Emergency to inform success in Brunei. Although Malaya has been challenged as a counterinsurgency paradigm, the Brunei operations show the utility of striking a balance between inappropriately copying from past campaigns and developing best practices applicable to the unique environment of Borneo. In turn, the evolution of effective operational practices in Brunei informed their successful application to the subsequent Indonesian Confrontation.  相似文献   

19.
针对指挥员在选择及对打击目标排序时会产生不同结果,采用证据理论进行了协同。以各指挥员的判断作为证据理论的识别框架,采用证据加权法及对各证据的合成,确定了证据的基本可信度分配,降低了各证据间的冲突,筛选出肯定的证据,达成指挥员决策的自适应协同,实现对打击目标更为合理的排序。  相似文献   

20.
ABSTRACT

Boko Haram insurgency in North East Nigeria has exposed women (girls, ladies, and mothers) to a complex jeopardy. While some women have suffered untimely widowhood or child-lack as a result of the Boko Haram onslaught, others have suffered death, forced abduction, and allied assaults on the main and side lines of the insurgency. Oftentimes, women have faced direct violence that essentially degrade their humanity. This is evident in the deployment of women as war-front sex slaves, human shields, and suicide bombers by the insurgents. The virtual expendability of women in the context of Boko Haram insurgency has been vividly demonstrated by the gale of female suicide bombings in Nigeria over the recent years. By means of a textual and contextual analysis of library sources and/or documentary data, as well as an adroit application of the theory of objectification, this study posits that, in addition to suffering collateral vulnerabilities, women have equally been instrumentalized as objects of terror in the context of Boko Haram insurgency. The paper further argues that the ‘weaponization’ of women’s bodies as bomb vessels and human shields by the insurgents highlights the height of women’s corporal victimization and objectification in contemporary asymmetric warfare.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号