首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
Since the global war on terror began, the pursuit of Al Qaeda is widely considered as warfare and not the pursuit of criminals. In light of counter-terrorism being redefined as war, the criteria applied for tracking militaries of conventional enemies may also be applicable to Al Qaeda. Intelligence analysts have long used the nine order-of-battle (OB) criteria as part of the estimative process for conventional, or nation-state, enemies. Applying OB criteria to Al Qaeda may assist intelligence analysts in knowing the enemy and identifying changes that will allow for predictive analysis. Many elements of Al Qaeda's OB prior to the events of 11 September were viewed as clutter and not significant changes that might have otherwise alerted intelligence analysts to the impending attack. This essay suggests how one might go about applying the nine OB criteria to analysis of Al Qaeda. Although more difficult and requiring modification, using an analytical procedure that has been tested successfully over many years is a logical step in the war on Al Qaeda. If all OB changes are tracked and analyzed using a systematic approach as outlined in this essay, Al Qaeda attacks may be predicted and/or curtailed in the future.  相似文献   

2.
The United States and Al Qaeda represent two fundamentally different forms of warfare. The US, with its basis in the Western way of warfare, relies on an almost totally instrumental form of warfare and Al Qaeda, with its basis in the Islamic way of warfare, fights an expressive, existential form of warfare. This paper illustrates how both sides' ways of warfare are converging toward each other. It also argues that this is in fact a good thing because it will allow the US to understand its enemy and thereby allow the US to defeat him in terms he can understand.  相似文献   

3.
ABSTRACT

Al Qaeda following 9-11 experienced a period of stagnation which it sought to remedy through a project of re-branding. Critical of this approach, Islamic State claimed that al Qaeda was an elitist organization that had facilitated the stagnation of the Salafi Jihadist project. In an attempted to claim dominance over the jihad, Islamic State’s endeavored to discredit al Qaeda through a process it presented as ideological correction, linked to Islamic eschatology, sectarian agitation, permissive violence, and the caliphate. Following Islamic State’s acquisition of vast territory in Iraq and Syria, arguments proliferated that Islamic State had surpassed al Qaeda. As the caliphate has collapsed what effects will this have on al Qaeda’s fortunes and strategy? It is argued that Islamic State has provided al Qaeda’s strategic approach with renewed vigour to help ensure its survival and pursue resurgence. Al Qaeda acting in concert with the meta-strategy for survival concept, has altered an existential threat into an advantage through disavowing Islamic State’s methods, continuing to engage with localism, and pursuing rebranding by positioning itself as a moderate alternative. The cases of al Qaeda affiliates in Yemen, Syria, West Africa, and South Asia are instructive in assessing the effectiveness of al Qaeda’s resurgence.  相似文献   

4.
Abstract

This article answers three questions: What is the nature of the Long War? How is progress (or lack thereof) to be assessed? Where is it likely to go next? An appreciation of Clausewitz shows that practical centers of gravity exist for the Long War, and that the conflict pivots upon the ability to persuasively link ideology to events via a strategic narrative. A close examination of an illustrative case study, the interaction between the US and the late Abu Musab al-Zarqawi in Iraq 2004 – 2006, shows that Al Qaeda has suffered a severe setback, but also that the nature of the war is set to shift yet again. Further tangible progress for the US requires waging the Long War as a global counterinsurgency based on a strategy of ‘selective identification’ (versus pure ‘disaggregation’) as well as an understanding of how to more effectively craft a strategic narrative.  相似文献   

5.
The number of US drone strikes against Al Qaeda in the Arabian Peninsula (AQAP) in Yemen has increased significantly since 2010, but received limited academic attention. This article examines the effectiveness of this drone campaign using an existing theoretical framework. Crucially, we contribute to the framework by adding a fourth intervening variable, namely target correspondence. Through a single case study, it is found that drones have only enjoyed limited success in degrading AQAP's hierarchical structure, qualified human resources and access to key material resources, and in some cases – owing to our target correspondence analysis – this limited success has come at a price. It is found that drones have temporarily disrupted AQAP by successfully eliminating senior leaders involved in coordinating and overseeing external operations. Overall, AQAP's ability to hit Western targets remains significant.  相似文献   

6.
This chapter examines how Al Qaeda, an asymmetric power, was able to become a global challenger to the existing international structure. Neither regional insurgency theories nor grand-scale global theories alone are adequate to explain Al Qaeda's ability. Rather, a modification of the seven dimensions of the Manwaring paradigm for successful insurgency combined with key concepts of global revolutionary or imperial powers formerly applied to states gives insight to this fundamental question. Al Qaeda's asymmetric global challenge is unique, and understanding the nature of the threat is key to finally defeating it.  相似文献   

7.
The most recent major document on human security tells us more about the ideal of human security than how this worthy objective can best be achieved. This is a problem because most African states were created to serve as a bulwark against further colonial rule rather than provide domestic order and protection for their citizens. Many African states have since become battlegrounds for ethnic or economic struggles. Neither a new and committed African leadership, nor intervention by the international community, is likely to transcend this problem and effectively advance the human security agenda. A reformed African state—one which induces leaders to be more concerned with advancing the interests of their people more broadly—remains the only viable alternative. The problem is that any reform of African states will also involve difficult trade-offs and dilemmas.  相似文献   

8.
As part of the next phase of the Global Jihad, al Qaeda has been committed to winning popular support among Muslims. Ayman al-Zawahiri and the al Qaeda inner circle recognise that a global terror movement and civil conflicts in the Middle East, brought about by the Arab revolutions, necessitate different operational methods. As such, they have disavowed the Islamic State of Iraq and al-Sham for their insubordination and unconstrained tactics, a move that has implications for the Middle East, international relations, the legitimacy of the al Qaeda leadership, and the future of the Global Jihad.  相似文献   

9.
This essay will discuss two of the key pillars of asymmetry: notably Information Operations and terrorism, including the links between the two. While a great deal changed on 11 September 2001, one thing that has not changed in substance is the challenge of protecting the Information Society, notably from cyber-threats. Although the immediate threat to Western societies is from the physical and possibly bio-weapons favoured by Al Qaeda and its associates, it is time now to prepare for future threats to the information society, including cyber-threats.  相似文献   

10.
ABSTRACT

Recent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women.  相似文献   

11.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

12.
Contemporary network organizational structures have gradually developed over the last decades of the twentieth century. These new structures are challenging the traditional hierarchical structure form in a number of venues. In conflict and war, they made their potentials unequivocally known on 11 September 2001 via Al Qaeda's strategic suicide bombings against the United States. To better understand the military potentials of networks, an operational combat analysis of the Al Qaeda network was conducted. This analysis, a modification of weapons systems analysis, focused on network speed, along with offensive, defensive and combat multiplier attributes. Such analysis allows for a better understanding of the military capabilities and vulnerabilities of non-state OPFORs (opposing forces) and our own emergent counter-insurgency networks.  相似文献   

13.
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo.  相似文献   

14.
This contribution looks at the role of Special Forces in anti-terrorist operations with particular emphasis on the British Special Air Service. It argues that Special Forces have played a pivotal role in such operations since the era of Palestinian terrorism in the early 1970s. The essay looks at the operations in Afghanistan leading to the overthrow of the Taliban in 2001 and shows that the seven Special Forces involved there proved crucial to the success of the limited ground forces. In particular they served a valuable force multiplier by acting as a nexus between the regional warlords and the use of air power as well as mobile strike units against fortified Al Qaeda and Taliban positions. In the latter instance their success was mixed, involving attacks on difficult cave hideouts, though overall it can be concluded that Special Forces have demonstrated their capacity in fighting unconventional warfare against mobile and transnational terrorist groupings.  相似文献   

15.
我国反恐怖斗争对策研究   总被引:1,自引:0,他引:1  
随着以美国为首的国际反恐怖战争在全球的迅速展开 ,以基地组织为代表的国际恐怖组织实施恐怖袭击的行动能力受到一定的削弱和限制。但同时 ,在世界各地尤其是中东、中亚等热点地区的恐怖事件却愈演愈烈 ,并且恐怖袭击的目标、采用的方式更趋于多样化、复杂化 ,造成的危害更加严重。  相似文献   

16.
以黄埔军校为载体的治军模式在意识形态、领导管理体制和纪律约束方面实现了中国军队建设史上的重大变革。从新制度经济学视角分析黄埔治军模式的制度变迁,有利于我们更好地理解和把握军队建设中政治工作的规律和原则,为今后我军政治工作领域的制度创新提供理论借鉴。  相似文献   

17.
Many researchers have focused on the role colonialism has played in causing interstate border disputes in Africa. Besides the colonial issue, this paper seeks to investigate what other factors fuel interstate border disputes in Africa and determine how effectively the disputes can be resolved. In recent decades, Africa has been tormented by and is still experiencing numerous interstate border disputes which have serious implications for the disputing states. Some of the disputes are resolved, but violations of human rights and instability still occur in these regions. By analysing the content of some relevant documents and with the use of interviews, this paper reveals that most disputing African states rely heavily on foreign intervention (especially by their erstwhile colonial masters) in the resolution of their disputes. It is argued that African leaders need to be more committed and exhibit better leadership in resolving their border disputes, and that they should always seek the expertise of African forums such as the African Union (AU) before calling for foreign intervention. It is suggested that African leaders and the AU understand the problems of Africans better than anyone else, and they are also the ones mostly greatly affected by these disputes. Thus, there needs to be more of a focus on addressing the root causes of disputes in order to avoid them resurfacing, rather than seeking to merely halt them.  相似文献   

18.
As Chancellor of the Exchequer during the late 1920s, Winston Churchill was at the center of British strategic decision making about how to respond to the naval challenge posed by Japan's rise as a rival sea power. Churchill downplayed the likelihood of war with Japan. The leadership of the Royal Navy disagreed: they saw Japan as a dangerous threat to the security of the British Empire. Examining this dispute between Churchill and the Admiralty highlights the awkward political, economic, and strategic tradeoffs confronting British leaders between the world wars.  相似文献   

19.
This article argues that whereas the waves of democratization which enveloped the continent in the early 1990s following the collapse of Eastern European one-party socialism genera ted expectations of a ‘new dawn’ for ‘good governance’ and sustainable human development on the continent, one wave after another appears to have suffered serious setbacks. Indeed, a decade later, some of the most articulate pro-democracy leaders, who came into office on the crest of the democratic waves of the 1990s have sought to manipulate their countries' constitutions in order to perpetuate their presidential tenure. Such undemocratic behaviour will only fuel speculation in the industrialized world that the New Partnership for Africa's Development is just another decorative blue-print drawn up by beleaguered African despots in order to obtain new resource inflows at a time the international community under the hegemonic leadership of the Uni ted States will be wholly preoccupied with rebuilding post-Saddam Iraq and the Israeli-Palestinian roadmap.  相似文献   

20.
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95.

Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号