首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 515 毫秒
1.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   

2.
基于系统能力的装备系统开发能够使装备发展更好地适应未来战争。首先建立系统能力-功能-性能(简称CFP)概念模型,进一步定性分析系统能力与性能参数之间的映射关系。然后提出了在n维参数空间进行影射关系函数轨迹拟合的方法,定量地描述系统能力与性能参数之间的映射关系,建立CFP模型。最后以简例演示基于CFP模型进行定量系统能力开发的方法。  相似文献   

3.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   

4.
This article addresses what we owe to the civilians of a state with which we are militarily engaged. The old notion of noncombatant immunity needs to be rethought within the context of both human rights and into the postwar phase. No doubt, civilians will be killed in war. However, much more can be done during and after the fighting to protect civilians’ basic human rights from the ills of war. I argue for making belligerents accountable ex post by requiring them to repair destroyed dual-purpose facilities that are essential for securing basic human rights of the civilian populace. I argue also that a belligerent’s targeting decisions should be reviewed ex post by an impartial commission.  相似文献   

5.
Clausewitz laid great emphasis on the planned construction of war, but this idea has received little attention from his commentators, who generally attach far greater importance to what he said about the chaotic elements of war, in particular its interactive nature and the friction inseparable from its conduct. This article gives long-overdue recognition to planning as a dominant theme of On War. The essential point Clausewitz makes concerning interaction is not that the enemy's responses are bound to disrupt our plans, but that our plans must aim to predict and incorporate his responses. Clausewitz acknowledges that friction creates enormous difficulties for the realization of any plan, but it is precisely in respect of this challenge that he develops the concept of military genius, whose capabilities are seen above all as the executive arm of planning.  相似文献   

6.
The study of civil war has increased exponentially during the post-cold war period. This has not, however, resulted in greater levels of consensus with regard to the causes and nature of this phenomenon. In order to alleviate this situation the current article will draw on critical realist philosophy. It will argue (1) that critical realism provides conflict studies authors with a more sophisticated and coherent understanding of causality than has previously been available to them, and (2) that this understanding paves the way for an approach to social science which – rather than consistently abstracting from context – systematically engages with it.  相似文献   

7.
Washington's growing reliance upon international private security companies (PSCs) will lead to these firms becoming prominent vehicles in the prosecution of the counterinsurgency in Iraq. This shift, however, risks labeling PSCs as mercenaries and presents considerable challenges regarding the control of non-state violence. Moreover, tradeoffs exist regarding the different nationalities of PSC personnel. Utilization of personnel from the developed world risks compromising the capabilities of Special Operations Forces. Additionally, shifts in casualty recognition amongst US policymakers and the media suggest that the private option is becoming politically salient and thus less useful. Many developing world states are increasingly concerned about how the global outsourcing of security sector expertise risks their stability and ability to execute coherent policy. Finally, the employment of Iraqis in PSCs sends mixed messages to the Iraqi populace about the need for and the effectiveness of a cohesive and responsible indigenous security sector.

Frankly, I'd like to see the government get out of war altogether and leave the whole feud to private industry.

[Catch-22 – Major Milo Minderbinder]  相似文献   

8.
Defence economics uses the tools of economics to study the defence sector and its domestic and international implications. Simple models require careful application in defence economics, since indirect effects may have counterintuitive impacts. For example, while certain arms races can lead to the outbreak of war, others may have the counterintuitive effect of discouraging the outbreak of war owing to mutual deterrence.

The world is now multipolar rather than bipolar, analogous to an oligopoly situation. This multipolar world can be analyzed by a qualitative characteristic function, where the formation of a potential coalition allows study of the shift from conflict to cooperation in international relations. Some new issues to be considered in this framework include accidental nuclear war, potential arms races and conflicts in the third world, and the proliferation of chemical weapons and missiles.  相似文献   

9.
大型交通设施既是战时交通保障的物质基础,又是战时交通保障的对象,其安全与否对战争的进程有着重要的影响,而如何提高其在战时的防护能力,是当前一个亟待研究的问题。本文对复杂电磁环境下大型铁路枢纽各主要组成部分的光学、红外、雷达暴露征候进行了分析,并提出了相应的伪装防护对策。  相似文献   

10.
While most normative evaluations of military cyber-operations have emerged from the legal community, this article assesses the legitimacy of such operations from a philosophical-ethical perspective. After reviewing the relationship between rights forfeiture and the jus ad bellum and jus in bello criteria of the just war tradition, it applies these criteria to several aspects of cyber-operations, including responses to cyber-activities, the use of cyber-capabilities affecting combatants and civilians, and the use of these capabilities by contractors. Finally, it briefly addresses the legitimacy of limiting rights to privacy and anonymity in service of preventing cyber-harm.  相似文献   

11.
This article makes three arguments about the Sino-American competition, the Sino-Indian rivalry, and the US-India partnership. First, past maritime-continental rivalries suggest that China will pose a greater challenge to American interests as it confronts fewer threats on land, while the US may require continental allies to counter-balance China's rise. Second, whereas a Sino-Indian continental security dilemma could benefit the US by compelling China to invest in capabilities that do not threaten it, a Sino-Indian maritime security dilemma could have the opposite effect. Third, Washington should consider India as a prospective continental ally rather than a potential maritime partner.  相似文献   

12.
ABSTRACT

Charles Callwell’s Small Wars (1896, 1899, 1906) is widely considered both an ur-text for modern counter-insurgency studies, and a primer for the racialized late-Victorian approach to war against ‘savages’: either way it is usually only considered within a British context. Alongside the numerous examples Callwell used from British colonial campaigns, he frequently referred to those of other European powers – notably the Russian conquest of Central Asia. This article will seek to analyse Callwell’s views of Russian colonial warfare, establish the sources on which he relied, and evaluate his accuracy and the effect which the Russian example had on his thinking.  相似文献   

13.
As worries have grown about global warming and the sustainability and price of fossil fuels, the demand for nuclear energy has increased, and nuclear power is increasingly viewed as a reliable and clean resource. However, the so-called nuclear renaissance coincides with an international security environment in which the norms of nuclear nonproliferation seem to be eroding. Turkey, a non-nuclear weapon state, plans to generate nuclear power to meet future energy demands, but it is aware of and concerned with regional proliferation trends. Questions have also been raised regarding Ankara's rationale for using nuclear energy, as well as its potential motivations and capabilities regarding future proliferation. This article will provide an overview of Turkey's nuclear energy history and plans, as well as the proliferation-related questions that could arise; it will also look at the domestic debate on nuclear energy and Turkey's status as a non-nuclear weapon state.  相似文献   

14.
Over the past decade, information operations (IO) have become a central feature of America's way of war. The Department of Defense's (DOD) focus on technology has left perception management (PM), defined as actions taken to influence foreign audiences' perceptions and behaviors, as IO's second-class citizen. This article postulates that in today's media environment and with adversaries skillfully using propaganda to skirt America's will, perception management is key to military success. The author offers possible improvements for strengthening Dodd's PM capabilities and approaches.  相似文献   

15.
Through the construction of masculinity in the military and technological advancements in Unmanned Aerial Vehicles, prevailing gender norms of masculinity are being challenged. This article bridges the gap in studies of military technology and ethical dilemmas in the use of force, stressing the impact of prevailing hyper-masculinization in the future of warfare. To strengthen appreciation of hegemonic masculinity in militaries and emerging technological capabilities on the genderization of war, this article applies literature from a variety of fields, including critical gender studies, robotics and military organizations. While a case can be made that genderization of war is inclined towards feminization of battle ground, a deeper analysis of drones and military technology reveals that a state of hyper-masculinity will be more typical of future of warfare. In evaluating the aspects that drones bring to a conflict, it might initially seem that the technology challenges previously dominant masculinity. However, upon further evaluation, it is apparent that the traits of drones and other emerging military technologies support the masculinities currently present, and make armed conflict increasingly hyper-masculinized.  相似文献   

16.
According to just war theory, a resort to war is justified only if it satisfies the right intention condition. This article offers a critical examination of this condition, defending the thesis that, despite its venerable history as part of the just war tradition, it ought to be jettisoned. When properly understood, it turns out to be an unnecessary element of jus ad bellum, adding nothing essential to our assessments of the justice of armed conflict.  相似文献   

17.
The US Army develops doctrine as a set of fundamental principles that guide its actions in support of national objectives. Recently, those national objectives required stability operations, with increasing scope and frequency. This study examines whether existing US Army doctrine adequately fulfilled its role as a guide to tactics in addressing the challenges that Army forces faced in the first 15 months of the war in Iraq. Field Manual 3-24 Counterinsurgency has remedied many deficiencies, but several remain to be addressed to offer commanders better guidance in the face of the many complex challenges they face in stability operations.  相似文献   

18.
In peacetime, base stock levels of spares are determined on the assumption of normal resupply from the depot. In the event of war, however, a unit must be prepared to operate from stock on hand for a period of time without being resupplied from the depot. This paper describes a mathematical model for determining such war reserve spares (WRS) requirements. Specifically, the model solves the following kind of optimization problem: find the least-cost WRS kits that will keep the probability of a stockout after K cannibalizations less than or equal to some target objective α. The user of the model specifies the number of allowable cannibalizations, and the level of protection that the kit is supposed to provide. One interesting feature of this model is that in the probability computation it takes into account the possiblility of utilizing normal base operating assets. Results of a sensitivity analysis indicate that if peacetime levels were explicitly taken into account when designing a WRS kit, a cost saving of nearly 40 percent could be effected without degrading base supply performance in wartime.  相似文献   

19.
It is commonly assumed in the foreign policy literature that narratives are uniquely persuasive and thus integral to obtaining public support for war. Yet, empirical research on “strategic narrative” is often vague on both the concept of narrative and how it persuades. Moreover, the stories publics use to interpret war are rarely examined. This paper offers a novel approach to studying “from the ground up” the war stories of individual British citizens. It examines public interpretations of war through emplotment: the way people select and link events to create a coherent story. Examining the wars people include and those they silence, it illustrates how a diverse range of citizens morally evaluates Britain’s military role, be it as a Force for Good, a Force for Ill or a country Learning from its Mistakes. In doing so, the paper offers an alternative methodological approach to studying how individual citizens understand war.  相似文献   

20.
Greek cinema has documented and debated the civil war and its repercussions under different angles, largely defined by censorship, the general political climate, and cinematic trends. This article, first, offers a retrospective that traces the evolution of Greek cinema's ‘takes’ on the civil war vis-à-vis the political changes. Second, it provides an in-depth analysis of Costas Gavras’s film Z, examining its relevance to Greece and how political conflict, in general, is cinematically depicted. The article argues that Z and Gavras’s cinema have been affected and have affected the Greek political situation. However, while Z has spearheaded an international cinematic genre (political thriller), it had minimal effect on the Greek cinema.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号