首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   

2.
A large collection of captured documents from the very highest levels of the Iraqi government offers a chance to gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. This paper explores some of the perceptions and misperceptions that Saddam Hussein took away from the 1991 Gulf War and shows how they affected his decisionmaking on the eve of the war in 2003. It concludes with some thoughts on the policy implications of these findings.  相似文献   

3.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   

4.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   

5.
6.
Abstract

This paper employs the concept of smart power to construct an analytical framework for assessing wartime alliance management. It makes two arguments. First, wartime sources of soft power differ from those obtaining during peacetime. Second, the coerciveness with which an alliance leader wields hard power towards actual or prospective allies should vary inversely with the amount of soft power it possesses. The smart power framework illuminates three types of alliance management failure. The paper’s key contentions are illustrated with examples furnished from the record of US alliance leadership since World War II.  相似文献   

7.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   

8.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   

9.
10.
Conventional wisdom on the phenomenon of war is criticised for providing little relevant guidance to deal with the security challenges of our era. One reason is that this attitude uncritically assumes power as synonymous with force. In response, ‘productive war’ is here proposed as a re-conceptualisation of war based on Michel Foucault's alternative understanding of power. Productive war appreciates the role of violence but subordinates it to non-kinetic dynamics influencing the dimension of meaning in international security. This theoretical perspective provides a conceptual framework to deal with the dynamics of political mobilisation essential to create public support for nation-building abroad and for visions of world order.  相似文献   

11.
    
The article considers the state of UN peacekeeping through the prism of its long-running operation in the Democratic Republic of the Congo (DRC). Focusing in particular on the challenges raised by use of force and the protection of civilians in conditions of ongoing armed conflict, it argues that UN field operations must be aligned much more closely than they have been over the past 15 years to political and diplomatic efforts aimed at securing viable political settlements to internal conflict. The issues raised by the history of the UN’s troubled mission in the DRC are deeply relevant to the wider discussion of the organisation’s role in the field of peace and security.  相似文献   

12.
If a declining state has incentives for preventive war, the rising state should have incentives to delay a confrontation until it is stronger. We develop the theoretical paradox and examine the July 1914 crisis. Why did Russia, rising relative to Germany, not adopt a buying-time strategy? We argue that although most Russian leaders hoped to avoid a confrontation, they feared that the failure to support Serbia would lead to a loss of Russian credibility and a significant setback to Russia’s position in the Balkans, one that could not easily be reversed, even with Russia’s expected increase in relative military power.  相似文献   

13.
    
This paper analyses the statistical distribution of war sizes. Using a new methodology we find moderate support for a Pareto-type distribution (power law), considering data from different sources (COW and UCDP) and periods. A power law is a plausible model for the size distribution of a pool of all wars and a sample of wars in many years, although the log-normal distribution is a plausible alternative model that we cannot reject. The random growth of conflicts could generate both types of distribution. We study the growth rates of battle deaths and random growth cannot be rejected for most of the distribution, although the results also reveal a clear decreasing pattern; the growth of deaths declines faster if the number of initial deaths is greater.  相似文献   

14.
15.
This article argues that an increasingly sea-power-minded China will neither shelter passively in coastal waters, nor throw itself into competition with the United States in the Pacific Ocean. Rather, Beijing will direct its energies toward South and Southeast Asia, where supplies of oil, natural gas, and other commodities critical to China's economic development must pass. There China will encounter an equally sea-power-minded India that enjoys marked geostrategic advantages. Beijing will likely content itself with ‘soft power’ diplomacy in these regions until it can settle the dispute with Taiwan, freeing up resources for maritime endeavors farther from China's coasts.  相似文献   

16.
Abstract

China has a strong interest in pursuing a smart power strategy towards Southeast Asia and has worked laboriously to engage with regional countries economically, socially, and politically. But China has been only partially successful in achieving its goals in the region. This paper argues that China’s security policy towards Southeast Asia significantly contradicts many other objectives that Beijing wishes to accomplish. Given the deep-seated, narrowly-defined national interests of the Chinese military in the South China Sea disputes, it is likely that the People’s Liberation Army (PLA) will continue to pose the main obstacle to the effective implementation of a Chinese smart strategy in Southeast Asia.  相似文献   

17.
In recent years, China has made stunning progress in its satellite reconnaissance capabilities. Starting from almost no capacity for live surveillance ten years ago, today the PLA has gained the capability to support real-time tactical naval operations from space. China's suite of electro-optical, synthetic aperture radar, and electronic intelligence satellites would be key to its anti-access/area denial capabilities, through which the PLA could deny the United States military the capability to operate with impunity close to its shores. Furthermore, these achievements suggest a shift towards more military-dedicated space assets and form the contours of a crucial support system for expanded PLA operations.  相似文献   

18.

This article is organized around two major topics addressed by nineteenth and early twentieth century economists: (1) international economic relations and war and (2) economic activity in the shadow of conflict. My thesis is that an early and neglected reservoir of economic thought on peace and war exists and valuable perspectives on research in defense and peace economics can be gained by tapping into it.  相似文献   

19.
    
ABSTRACT

Scholars and practitioners of grand strategy agree that the use of military force should be supplemented by appropriate economic policies. However, strangely few accounts of economic complements to military grand strategies have been presented in recent discourse on US grand strategy. This paper takes a first step to fill this information gap. I first assess the role that could be played by economic measures under two types of grand strategies – one focusing on the balance of power and the other emphasising influence and order. Second, I introduce what I call ‘the influence-capability dilemma’ and discuss tradeoffs in adopting certain economic policies in order to help the US sustain pre-eminence in the international system. Third, I discuss how the US should address this dilemma of economic means in dealing with the rising China.  相似文献   

20.
《战略研究杂志》2012,35(5):663-687
Abstract

In Western operations in Afghanistan, small European powers escalate in different ways. While Denmark and the Netherlands have contributed to Western escalation through integration with British and US forces, Norway and Sweden have done so by creating a division of labour allowing US and British combat forces to concentrate their efforts in the south. These variations in strategic behaviour suggest that the strategic choice of small powers is more diversified than usually assumed. We argue that strategic culture can explain the variation in strategic behaviour of the small allies in Afghanistan. In particular, Dutch and Danish internationalism have reconciled the use of force in the national and international domains, while in Sweden and Norway there is still a sharp distinction between national interest and humanitarianism.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号