首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 359 毫秒
1.
Abstract

The article evaluates the security challenges that are likely to occur along international borders in East Africa with the advent of the East African Community Common Market in July 2010. In an attempt to illustrate the porosity of borders and the likelihood that criminals could take advantage of the situation, the author describes the ease with which transnational crime could thrive (in the absence of efficient border security measures) under the guise of informal cross-border trade that derives its basis largely from the customs and historical linkages in the region. Border towns in the region are considered zones of risk but also opportunities for quick money-making ventures and deals that tend to attract a variety of criminals. While the danger is not alarmingly high, there is a likelihood that with the opening up of the East African Community to the free movement of goods and people, criminals will exploit this freedom to commit crimes such as human trafficking, drug smuggling and moving terrorists and contraband goods unless mechanisms are put in place to curtail these activities. Should this not happen, the mission of the East African Community could be jeopardised.  相似文献   

2.
One of the biggest challenges currently facing the developing world is the proliferation of small arms and light weapons. Arms control and disarmament have been part of the diplomatic agenda since the middle of the 19th century and were two of the most important issues facing the world's major powers during the 1960s and 1970s. When the Cold War ended, different instruments had been developed to negotiate the control over nuclear, chemical, biological and conventional weapons. However, the proliferation of small arms and light weapons poses new challenges to the international system. While control over legitimate use is laudable, the major problem relates to the illicit proliferation external to the state system. To address this challenge, international and national law faces the challenge of regime creation, and of the implementation and enforcement of international and national standards. Possible approaches to regime creation are discussed in this essay and recent examples are provided of how these were applied in practice to the issue of small arms and light weapons by the OAS, ECOWAS, SADC, the OAU and in East Africa.  相似文献   

3.
Because it is a producer and supplier of high-tech dual-use goods as well as a major transit point for WMD-related and military items, Taiwan represents an important case study of national export control systems. Taiwan is not an official member of the major multilateral export control regimes, yet it remains committed to nonproliferation goals. The article explores the strategic trade controls of Taiwan within the context of its nonproliferation policies and commitments. The author discusses the strong and weak aspects of Taiwan's strategic trade controls by looking in detail at key components of the country's export-import control system: legal basis, licensing system, enforcement and compliance mechanism, government-industry outreach, and adherence to nonproliferation treaties and multilateral export control regimes.  相似文献   

4.
受国际毒潮的影响,中朝边境地区不仅面临着来自朝鲜毒品的直接渗透,而且还是“金三角”、“金新月”毒品的终端和中转站,呈现出贩运路线相对固定,入境地点相对集中,人员结构复杂,毒品贩运方式、手段诡秘等特点。由于跨境毒品走私案件不断增多,中朝边境地区禁毒形势日益严峻,并由此引发了一系列的社会问题,影响了中朝边境地区的安全与稳定,给边境地区缉毒工作带来了新的困难和挑战。  相似文献   

5.
After inconclusive elections in 2012, Lesotho had a coalition government for the first time, made up of three political parties that had a narrow majority in parliament. The new government, however, faced several challenges, some of which were of its own making. The agreement among the three parties was to literally divide the government into three parts, leading to a continuous stalemate in its operation; the most serious consequence was the prorogation of parliament and the resultant attempted coup. The flight of the prime minister to South Africa and his return under a Southern African Development Community (SADC) security detail provided a short-term solution to Lesotho's security crisis. Under Cyril Ramaphosa's mediation, the prorogued parliament was conditionally opened and the election date set for 28 February 2015. However, the security dilemma – whereby the prime minister, who is also minister of defence, has no control over the military – remains. When elections are held, there does not seem to be a guarantee that they will be held in peace; moreover, there are now fears that the losers will not accept the results of the elections because of the security vacuum in Lesotho. This article argues that peace can only be salvaged by enhanced SADC security before, during and after the elections. It argues that the SADC mission should remain beyond the elections to oversee the constitutional changes that are necessary for ensuring long-term stability. On their own, Lesotho politicians are unlikely to be able to work together in order to move the country forward.  相似文献   

6.
7.
随着公安边防部队现代化建设尤其是财务电算化的不断发展,对审计工作信息化的要求也日益迫切。边防审计信息化的实现有赖于统一思想,提高认识;有赖于着眼长远;有赖于提升审计队伍科技含量;有赖于规范管理,强化信息化条件下安全工作。  相似文献   

8.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   

9.
随着海洋经济的迅速发展,海上人、财、物的流动急剧增加,海上治安形势日趋复杂。海上抢劫、盗窃、偷渡及贩枪贩毒等犯罪活动呈多发态势,这严重破坏了海上的生产作业秩序,危害了海上治安秩序的稳定。研究海上犯罪案件的特,点,有助于公安边防部门采取有针对性的侦查方略,有力地打击海上犯罪,以创造安全、有序的海上治安环境。  相似文献   

10.
公安边防部队基层面对新形势、新任务和新要求,必须不断创新和改进思想政治教育的内容、方法和机制,增强思想政治教育的时效性,强化官兵精神支柱,促进部队基层全面建设。  相似文献   

11.
边境安全作为国家安全或者国土安全的重要方面,越来越多地受到各种非传统安全因素的威胁和挑战,其中,非法移民问题就是一个不可忽视的因素。非法移民的界定涵盖了“偷运移民”和“贩运人口”两种犯罪形式,并分别从结构性维度和战略性维度分析了非法移民对输出国(或地区)、输入国(或地区)和途经国(或地区)边境安全稳定的影响。  相似文献   

12.
SADC has a poor record in advancing peace and security in Southern Africa. Many identify poor policy frameworks and weak technical capacities as the major obstacles. Laurie Nathan goes beyond these easy explanations in his important new book on SADC. Absence of common democratic values and reluctance to surrender state sovereignty are key factors preventing SADC from making progress according to this book. This article argues that Nathan overstates the case and that there are real prospects and potentials for making further progress in regional cooperation. The lessons from the history of European integration also points to the important role of regional leadership. South Africa, in coalition with other likeminded countries, may still be in a position to move the SADC project forward.  相似文献   

13.
In April 2012 a number of former rebels who had been integrated into the Forces Armées de la République Démocratique du Congo (FARDC) mutinied and formed the Movement of March 23, better know as the M23 rebel group. The International Conference on the Great Lakes Region (ICGLR) has been mediating between Kinshasa and the M23 rebel group since 2012, without much success. In August 2013, the Southern African Development Community (SADC) issued a communiqué after its 33rd Summit of Heads of State and Government, stating that while it commends the ICGLR efforts, the talks have become protracted and a deadline needs to be set. The summit also called for an urgent joint ICGLR–SADC summit to address the crisis in the eastern Democratic Republic of Congo (DRC). In addition to this development, the chair of the ICGLR is to be rotated in December 2013, when President José Eduardo Dos Santos of Angola replaces President Yoweri Museveni of Uganda. To date, the mediation has been headed by Uganda and this has raised concerns over the credibility of the ICGLR-led process, since Uganda has been accused of supporting the M23 rebellion in a report released in November 2012 by the United Nations Group of Experts on the DRC. One could question whether the Angolan leadership will bring anything new that could have an impact on the crisis. Many expect that the perceived neutrality that Dos Santos could bring to the negotiations may be a positive step towards reviving the talks that have all but stalled at this point. Another issue of interest is whether the joint ICGLR–SADC summit could instil new life into the mediation process.  相似文献   

14.
中国丰富的边防实践以及边防安全稳定所面临的机遇和挑战,为边防学研究提供了丰富的素材和重要的契机,也是边防学研究的价值所在。作为一门研究边防现象、边防规律和边防对策的专门学问,边防学既古老又年轻,也是一门边缘学科。这门学科与军事学、政治学、法学有着密切的亲缘关系,但这并不妨碍它拥有本学科独特的范畴和概念体系。这一概念体系应当围绕边防系统、边防空间、边防主体、边防行为、边防对象等基本范畴进行建构。  相似文献   

15.
略论新疆旅游开发战略   总被引:3,自引:0,他引:3  
实施西部大开发及中国加入世贸组织,给西部地区合理开发旅游资源带来了机遇和挑战,其中新疆的社会现状和经济状况决定了新疆旅游业面临更多的挑战,对此我们必需充分利用新疆旅游资源优势,制定合理的发展战略,促进新疆旅游业经济发展和社会进步.  相似文献   

16.
以色列的边界观不仅是其对于边界的态度与看法,而且还浓缩着以色列与阿拉伯国家之间的恩恩怨怨.以色列边界观的演变实际上是以阿关系的另一种写照。对以色列边界观的演变进行论述,以从另一侧面解读以阿关系。  相似文献   

17.
边防情报识别是边防情报工作的一项重要内容,要素分析法是当前公安边防情报识别的基本方法之一。结合公安边防情报的特殊性对要素分析法进行了探讨,旨在更好的运用要素分析法,为公安边防情报的识别提供理论参考,以促进公安边防情报识别工作的进一步发展。  相似文献   

18.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   

19.
边防工作作为国防的重要组成部分,涉外性强,受周边安全形势影响大。当前,我国的边防工作既面·l盏着难得的发展机遇,同时更要直面各种挑战。分析周边安全环境对我国边防的影响,可以使我们更好地认清形势,趋利避害,抓住机遇,充分发挥职能作用,确保边防安全稳定。  相似文献   

20.
可信软件是近年来软件工程领域研究的热点,装备软件可信性的研究有助于提升我国国防武器装备的作战效能。首先分析了进行装备软件可信相关研究的必要性;然后阐述可信软件技术的研究现状,主要包括软件可信度量和评估、可信软件的构造与验证、可信软件的演化与控制等三个方面;最后分析了研究可信装备软件面临的挑战。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号