首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
现代恐怖主义正在迅速蔓延全球,恐怖主义活动已经严重威胁了各国的国家安全和人民的正常生活,而且,现代恐怖主义越来越朝着国际化的方向发展,这种国际性恐怖主义犯罪活动的危害性和有效打击难度都明显加大。我国也不可避免地卷入到跨境恐怖主义犯罪漩涡中来。深入研究我国跨境恐怖主义犯罪活动的特征,以期提高防范和惩治我国跨境恐怖主义犯罪活动的针对性。  相似文献   

2.
<正>长期以来国家安全和社会稳定一直是我国当前的主旋律,只有国家安全和社会稳定,我们的发展之路才能不断推进。近些年来,国际恐怖主义及其破坏活动成为影响世界安全与稳定的一个突出因素。当前社会暴恐活动以及带有恐怖主义色彩的个人极端行为频发。根据公开的资料显示当前恐怖主义的主要特点表现为:一是恐怖活动日趋政治化;二是恐怖活动具体方式日益多样化;三是恐怖活动呈现跨国化趋势;  相似文献   

3.
进入21世纪,由于国际毒品扩散局势日益加剧,影响和制约边境缉毒的境内外因素依然存在,边境地区毒品犯罪形势依然严峻,跨境毒品犯罪作为影响我国边境地区安全与稳定的非传统安全威胁将长期存在.当前边境地区缉毒工作中所面临的形势和跨境毒品犯罪活动出现一些新特点,对此,要充分提高认识,全线设防,加强情报工作,持续开展边境缉毒专项斗争.  相似文献   

4.
恐怖主义犯罪作为由某些组织在恐怖主义理念支配下 ,通过暴力或其他危险方法造成社会恐怖 ,以实现其政治、宗教或其他意识形态目的的犯罪行为 ,是一种新的犯罪样态。这种犯罪往往具有较为独特的认知、情感特点和意志品质 ,也具有较为独特的行为特点。为更好地打击、预防这种犯罪 ,应加强其心理和行为特点的研究。  相似文献   

5.
[上接三,(三)](四)应对恐怖主义等非传统安全威胁,成为军事战略思维不容忽视的着力点之一当代军事战略思维除了应对传统安全威胁之外,还要应对恐怖主义袭击、海盗劫持、跨国有组织犯罪和贩毒等非传统安全威胁。此类任务已经成为军事战略思维的新的着力点之一,这里仅就军事领域中的反恐斗争问题加以讨论。  相似文献   

6.
军人危害国防安全方面的犯罪,是军人违反职责罪的类型之一。这种犯罪直接侵犯了国家的国防安全利益,必须依法予以严厉打击。 一、军人危害国防安全方面犯罪的认定 军人危害国防安全方面的犯罪,是指军人违反职责,侵害国家的国防安全利益,依法应受刑罚处罚的行为。其具有以下特征: (一)这种犯罪侵害的客体是国家的国防安全利益。所谓国防安全  相似文献   

7.
彭永  田浩 《国防科技》2003,(9):59-61
“9·11”事件后,恐怖主义活动由—种边缘性的社会反抗,获得了主导社会的力量,成为世界安全与和平的主要威胁。作为机械化战争向信息化战争过渡中出现的异化的战争形式,新恐怖主义活动具有主体模糊性、手段非常规性、目的效应性、范围不定性、力量非对称性等特点。新恐怖主义活动的社会根源是强权政治和霸权主义,新军事变革的不平衡发展和科学技术的双刃剑效应使新恐怖主义活动成为可能和必然。彻底根除新恐怖主义活动任重道远,需要建立合理的国际秩序,铲除新恐怖主义滋生的温床。  相似文献   

8.
王乐泉 《国防》2004,(9):14-15
当今世界,和平与发展仍然是时代的主题,世界多极化、经济全球化的发展趋势没有改变,我们面临的机遇大于挑战。同时,也要清醒地看到,国际环境对我不利的因素较多。世界霸权主义和强权政治亡我之心不死,国际恐怖主义、跨国犯罪、毒品走私等安全威胁呈上升趋势,对世界和平构成严重威胁。从周边形势看,我国与周边有些国家的领土争端等利益问题尚未得到很好解决。从国内形势看,在国际反华势力操纵下,台湾问题、南海问题、西藏问题以及“法轮功”邪教势力等,都成为影响我国安全与稳定的隐患。在当前国际大背景下,境内外民族分裂势力以更加狡猾、更…  相似文献   

9.
在全球毒品问题继续蔓延的趋势下,海峡两岸跨境毒品犯罪愈演愈烈。要有效遏制毒品犯罪给海峡两岸社会治安带来的危害,海峡两岸的警察机关应不断完善跨境追逃合作机制、犯罪资产追缴协助机制、调查取证协助机制,健全毒品犯罪情报交流机制,构建区际“控制下交付”合作机制,逐步拓宽打击跨境毒品犯罪警务合作渠道,以有效遏制海峡两岸毒品犯罪的发展蔓延。  相似文献   

10.
段祥军 《国防》2010,(6):51-52
在党的十七大报告中,中央军委胡锦涛主席站在维护国家长治久安的战略高度指出:军队要提高应对多种安全威胁、完成多样化军事任务的能力。新形势下,由于国际恐怖主义、民族分裂主义、极端宗教主义作祟,加之我国经济社会深刻变革、各种利益深刻调整、各种思想文化相互激荡、各种社会矛盾日益凸显,  相似文献   

11.
In the past, national security for the majority of countries was almost exclusively associated with an external military threat emanating from a rival state(s). This was reflected in the standard models for the demand for military expenditure. The emergence of new security challenges such as terrorism, transnational crime networks, failed and rogue states, has profoundly affected the international security environment and the concept of national security. This note develops a model for the demand for national security expenditure adopting a broader, more inclusive definition of national security and includes concomitant budgetary outlets to meet the new security challenges.  相似文献   

12.
This paper is the first global investigation of the relationship between remittances and terrorism. To discern this relationship, we draw terrorism event data from the Global Terrorism Database and International Terrorism: Attributes of Terrorism Events. When a host of standard terrorism controls is employed, lagged remittances as a share of gross domestic product have a positive and significant impact on both domestic and transnational terrorist attacks. For the venue country’s viewpoint, lagged remittances have a greater marginal impact on domestic than on transnational terrorism. However, when we investigate remittances to the home country of the perpetrator, lagged remittances have the greatest marginal impact on transnational terrorism. Throughout our investigation, standard terrorism controls perform according to our priors and those of the literature, lending credence to the isolation of the impact of remittances. We also account for endogeneity concerns.  相似文献   

13.
目前公安边防部队参与涉外联合行动主要包括联合执法打击跨国犯罪、承担维和任务维护世界和平、参与涉外联合演习打击恐怖主义等形式。随着国家间联合协作的不断加强,公安边防部队参与涉外联合行动朝着合作范围不断扩大、合作模式更加多样、执法一体化日益明显的趋势发展。  相似文献   

14.
Using the Boko Haram terrorist group in Nigeria as a point of departure, this paper examines the implications of the operations of terrorist groups on the security and stability of states in West Africa. It predominantly utilises secondary sources of data. Findings indicate that the membership and operations of this terrorist group are spreading across the sub-region. This spread is consequent upon Boko Haram's collaboration with other terrorist groups within West Africa and beyond. This constitutes threats to the security and stability of states in the sub-region. Thus, the paper recommends, among other things: a thorough understanding of the operational strategies of terrorist groups by states and those involved in security policymaking in the sub-region; and for agreements to be reached among Economic Community of West African States (ECOWAS) member states and their governments for collaboration in various areas in order to curtail transnational crime and terrorism, and reduce socio-economic inequality that generates aggressive behaviours among the less privileged.  相似文献   

15.
Within a panel VAR framework and utilizing generalized impulse response and forecast error variance decomposition analysis, we explore the dynamic effects of terrorism and crime on public order and safety spending across European countries during the period 1994–2006. Our findings show that a ‘shock’ in terrorism and/or in crime, significantly increases the subsequent trajectory of public order and safety spending. As a by-product, we find that public spending is ineffective in reducing observed crime or terrorism.  相似文献   

16.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
近年来,国内外恐怖组织不断实施恐怖性爆炸犯罪,给世界各国造成了巨大的生命和财产损失。恐怖性爆炸犯罪主要有自杀性恐怖爆炸犯罪、交通工具上的恐怖性爆炸犯罪、特定建筑物的恐怖性爆炸犯罪、制造混乱的恐怖性爆炸犯罪等几种类型。防范爆炸性犯罪的主要措施有:加大反恐立法、加强国际合作、严格安检制度、强化基础建设、落实新闻管控和和谐民族关系等。  相似文献   

19.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号