首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

2.
This article examines the debates in Israel between 2009 and 2013 over Iran’s nuclear programme as a reflection of a particular type of civil–military or civil–security relationship. It analyses how key actors within that relationship – particularly those with an intelligence background – engaged with media outlets in Israel and further afield to influence domestic and international opinion over how best to contain Iran’s nuclear ambitions. In so doing, it seeks to address one fundamental question: are governments in Jerusalem any longer the final arbiters over deciding what is in the national security interests of the State of Israel?  相似文献   

3.
ABSTRACT

Natural resource-based conflicts continue to occur in different parts of Nigeria with negative implications. This study investigated the phenomena of natural resource conflicts vis-à-vis their propensities to impact political economy and national security negatively. Data for the study were sourced from theoretical and empirical evidence. Empirical data were sourced from existing studies selected on the basis on their relevance to the study and analysed based on their content. The limitation to this approach is the obsolete and subjective nature of some the literature. This limitation was, however, addressed among others through the author’s knowledge of the issues under study. The study found that Nigeria is enmeshed in conflict over ownership, distribution, access to or competition over natural resources such as petroleum resources and agricultural land and these conflicts have undermined democracy, human rights, the economy and the nation’s security. The paper identified poor resource governance, environmental factors and poor political leadership as the causes and drivers of these conflicts. It recommends natural resource governance among others, as a way out of the problem.  相似文献   

4.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

5.
This article explores whether it makes sense for national governments to employ defence industrial policies – such as offsets and discriminatory procurement practices – to support their domestic defence industries. This question has so far primarily been discussed by economists, who have argued strongly against the use of defence industrial policies. This article maintains that these economists fail to address the often complex motivation behind the introduction of these policies. It illustrates these shortcomings by contrasting their arguments against a case study of Norway, which accounts for the country’s use of defence industrial polices from the early post-Second World War era up until today. The article concludes that, depending on their objectives, defence industrial policies can be seen as either a sound security strategy or an economic fallacy.  相似文献   

6.
This article challenges the conventional wisdom that cyber operations have limited coercive value. It theorizes that cyber operations contribute to coercion by imposing costs and destabilizing an opponent’s leadership. As costs mount and destabilization spreads, the expected utility of capitulation surpasses that of continued defiance, leading the opponent’s leaders to comply with the coercer’s demands. The article applies this ‘cost-destabilization’ model to the 2014 North Korean cyber operation against Sony. Through cost imposition and leadership destabilization, the North Korean operation, despite its lack of physical destructiveness, caused Sony to make a series of costly decisions to avoid future harm.  相似文献   

7.
This article explores how transnational borderlands matter for conflict prevention and, in particular, so-called upstream engagement, which aims to reduce threats to global stability and security that arise from the world’s increasing interconnectedness. Accounting for transnational borderlands in vulnerable regions is crucial for conflict prevention as pursued by the defence and security sector because borderlands are catalysts of the negative side of global interconnectedness: they are business hubs for transnational organised crime, sites of retreat for conflict actors, and safe havens for terrorists. The border areas’ proneness to impunity and the ability of violent non-state actors to govern these spaces illicitly contribute to the emergence of these characteristics. I therefore argue that upstream conflict prevention needs to do two things to address these risks: first, to overcome a national security approach centred on the borderline and instead acknowledge transnational security dynamics in borderlands on both sides of the border; second, to overcome the state-centred governance lens to also consider governance exerted by non-state actors. The article draws on empirical data from a six-year study including over a year of fieldwork in and on Colombia’s borderlands.  相似文献   

8.
It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon involving a variety of issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest and youth unemployment) as well as a multiplicity of external responders. To make sense of the impact that external actors have when they address this complex problem through various maritime capacity building endeavours, this article argues that there is a need to understand the attractiveness of capacity building vis-à-vis the widely acknowledged need for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as important aspects of the problem remain largely unaddressed). Further, it is argued that it is important to appreciate that even if these gaps – i.e. the aspects that maritime capacity building currently leaves unaddressed – represent a ‘failure’ to deliver a comprehensive response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance, by influencing how certain aspects of this multifaceted problem are prioritised, whilst others are only marginally addressed, if at all.  相似文献   

9.
US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives.  相似文献   

10.
Counterterrorism operations in Kenya have often been hindered by a lack of collaboration, coordination and cooperation among the security agencies involved in such operations. This article examines the relationship between neo-elitism and counterterrorism security interagency activity in Kenya. Using neo-elitism as a framework for analysis, with specific reference to the September 2013 Westgate Mall attack counterterrorism operation, it is argued that the lack of collaboration, coordination and cooperation among Kenya’s counterterrorism security agencies often results in unintended adverse consequences. The interagency conflict over the Westgate operation was primarily about command and control, intelligence sharing and official information shared with the public pertaining to the stages of the siege and operation. These security agencies share similar responsibilities and jurisdictions in the rest of the country’s counterterrorism efforts. The interagency conflicts reveal that the country’s security elites pursue personal and agency-specific interests that are aimed at maintaining organisational supremacy over counterterrorism efforts. Recommendations are offered for how to tackle the problem of interagency conflict in order to enhance the effectiveness of counterterrorism operations in Kenya.  相似文献   

11.
This paper investigates civil conflict as a product of the survival strategies of African leaders. Specifically, the paper offers a theory of risk substitution that predicts coup-fearing leaders will undermine the military effectiveness of the state when making an effort to extend their own tenure. While ‘coup-proofing’ practices have often been noted as contributors to political survival, considerably less attention has been paid to the influence of these strategies on other forms of conflict. Utilising data from a number of cross-national datasets, the analyses show that having a higher number of ‘coup-proofing’ counterweights significantly worsens a state's civil conflict prospects. A brief consideration of multiple episodes of conflict further suggests that in addition to coup-proofing undermining the counterinsurgency capacity of the state, some leaders are simply indifferent to – or can even potentially benefit from – the existence of an insurgency.  相似文献   

12.
In the course of the last few years, the Islamic sect Boko Haram has become of great interest to academics, researchers and analysts. At the same time, experts, especially at the European Union (EU) level, have been reluctant to include Boko Haram in the EU list of terrorist organisations, despite the fact that this group has clearly demonstrated its transformation into a terrorist organisation. Security challenges and threats are, by definition, subject to change, and it is the task of security institutions to create policies to address these challenges and threats. Terrorism cannot be addressed in isolation, and policymakers are confronted at all levels with the difficult task of making sense of this evolution. By assessing the current security situation in Nigeria, this commentary tries to ascertain the potential repercussions to regional stability from the Boko Haram phenomenon. Insurgencies have often been initiated from and supported by neighbouring countries and have expanded conflicts across borders. Countering Boko Haram will require various institutions to conduct similar and concurrent counter-insurgent and counter-terrorist operations. At the global level, such co-ordination has often proven difficult. The EU has to keep the pace in this case.  相似文献   

13.
The most recent major document on human security tells us more about the ideal of human security than how this worthy objective can best be achieved. This is a problem because most African states were created to serve as a bulwark against further colonial rule rather than provide domestic order and protection for their citizens. Many African states have since become battlegrounds for ethnic or economic struggles. Neither a new and committed African leadership, nor intervention by the international community, is likely to transcend this problem and effectively advance the human security agenda. A reformed African state—one which induces leaders to be more concerned with advancing the interests of their people more broadly—remains the only viable alternative. The problem is that any reform of African states will also involve difficult trade-offs and dilemmas.  相似文献   

14.
Since the 2003 war in Iraq, private military and security companies (PMSCs) have become increasingly legitimate actors in modern conflicts. Despite this normative shift, rumours in March 2015 regarding the use of South African mercenaries in Nigeria to combat Boko Haram insurgents caused an international outrage, while the Nigerian government remained nonchalantly silent on the matter. This article investigates the impact of mercenaries on the conflict in the last six months of the Jonathan government. Using primary and secondary qualitative research, it assesses the role that PMSCs played in Nigeria’s counterinsurgency strategy, along with the ensuing reaction of international and local media to the outsourcing of violence to foreign companies. The article concludes that – notwithstanding the improved image of PMSCs in the world, and the actual impact of the contractors on the Nigerian counterinsurgency effort – the stigma of mercenaries continues to plague the industry, particularly on the African continent.  相似文献   

15.
ABSTRACT

Recent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women.  相似文献   

16.
Military officers often oppose political interference in the conduct of war. Political leaders respond by citing Clausewitz’s contention that “war is the continuation of politics with the addition of other means.” Scholarship in security studies and civil-military relations argues that civilians are right to oppose military autonomy because it serves the parochial interests of the military. However, through the dialectical relationship between the violent essence of war and its political nature, Clausewitz provides an alternative explanation for military demands for autonomy. He shows that military and political leaders are prone to an incomplete understanding of war that can undermine strategy and policy.  相似文献   

17.
Contemporary international mediation is often multiparty and involves a number of states and multilateral organisations. What are the conditions that account for successful multiparty mediation in conflict resolution? To address this question, I use qualitative comparative analysis (fsQCA) and focus on individual dimensions of mediation, namely internal cohesion of the mediating coalition, the use of reward and coercive power, and the presence of a ‘mutually hurting stalemate’ (MHS). I posit that the presence of a cohesive mediating coalition is a necessary condition for conflict resolution, whereas the provision of security guarantees, the imposition of sanctions and the presence of an MHS play a causal role in conflict resolution only in conjunction with other conditions. I test these conditions using a fuzzy-set approach and data from 20 mediated agreements over separatist conflicts in the post-cold war era. Empirical findings provide support for some of these propositions and challenge relevant theories of international mediation. More specifically, this research shows that a high convergence of interests among mediators is the only necessary – albeit not sufficient condition – for conflict resolution. Second, the analysis highlights the presence of two main sufficient paths for mediation success.  相似文献   

18.
In the global war against terrorism key questions need to be asked concerning how Al Qaeda is reorganizing and who will be leading it. In the absence of, at the very least adequate open source data, how can we answer these vital questions and predict the next evolution of this deadly menace? One possible solution is to study the emergence and evolution of leadership within another terrorist organization. Based on an analysis of the Provisional Irish Republican Army, it is assessed that there have been at least two and possibly three distinct generations of leadership in that group. It is important to note, however, that although these three generations have emerged sequentially, they may well all be in positions of power at the same time. These generations are designated as; early or founding leaders; follow-on and continuity leaders; and embryonic leaders. Such analysis will not tell us whom the new and emerging leaders of Al Qaeda actually are but it might help us to frame the right questions to ask our intelligence collectors.  相似文献   

19.
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy.  相似文献   

20.
Declared operationally ready in 2016, the African Standby Force (ASF) has not been deployed in its originally designed form. This is not for the lack of opportunities but rather a demonstration of the power of the Regional Economic Communities/Regional Mechanisms (RECs/RMs) – Africa’s sub-regional security structures – over matters of peace and security. Experience gathered from its short existence suggests that the ASF may never be deployed in its current form. It may instead evolve into a robust framework, adaptable mainly by the RECs/RMs, for addressing varied security challenges. Four things are critical to enhancing the utility of the ASF: the political willingness of the RECs/RMs, the strategic interest of the member states, predictable and sustainable financing, and clarity on the role of the African Capability for Immediate Response to Crisis, the temporary battlegroup that was created to provide the African Union with a rapid response capability, pending the ASF’s operationalization.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号