首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 921 毫秒
1.
Nuclear deterrence is sometimes treated as a known quantity—a definite thing that keeps us safe and ensures our security. It has also often been used as a justification for possessing nuclear weapons. Nuclear deterrence, however, is based on an unexamined notion: the belief that the threat to destroy cities provides decisive leverage. An examination of history (including recent reinterpretations of the bombing of Hiroshima) shows that destroying cities rarely affects the outcome of wars. How is it possible that an action that is unlikely to be decisive can make an effective threat? Recent work on terrorism suggests that attacks against civilians are often not only ineffective but also counterproductive. And a review of the practical record of nuclear deterrence shows more obvious failures than obvious successes. Given this, the record of nuclear deterrence is far more problematic than most people assume. If no stronger rationale for keeping these dangerous weapons can be contrived, perhaps they should be banned.  相似文献   

2.
Dying to Win is one of the most important works on suicide terrorism. It purports to unravel the strategic, social, and individual logic that gives suicide terrorism its coercive value. The methodology that Pape uses to support his various assertions is problematic for three reasons. First, he defines his key terms in such a way as to artificially set suicide terrorism apart from other forms of political violence. Second, in a number of cases Pape selects data from single sources to support particular assertions when other sources of data, used together, could provide more rigorous and useful insights into the phenomenon of suicide bombing. Finally, Pape codes his data on suicide attacks according to a loose set of criteria which, if recoded, calls into question some of his broader conclusions about the strategic utility of suicide terrorism campaigns.  相似文献   

3.
准确可靠的情报是反恐斗争胜利的保证。1994~2004年俄罗斯恐怖事件频发,情报部门难辞其咎。从情报搜集、情报交流以及追捕恐怖分子等方面,探讨了俄罗斯情报机关的失误,并列举了别斯兰人质事件后俄政府出台的反恐新举措,从而有效地利用情报预防和抑制了恐怖事件的发生。  相似文献   

4.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

5.
美国作为较早受到恐怖主义威胁的西方发达国家,自20世纪70年代逐渐发展起了一套完善的执法体系,并积累了成熟的执法经验,特别是信息化时代背景下,美国执法部门的反恐斗争渗透着强烈而鲜明的信息情报色彩,是“情报导侦”理念和模式的现实体现,为我国执法与行动部门提供了一定的经验。其中的“威胁评估”综合情报分析模式是美国反恐情报工作的典型代表,对于预防恐怖主义犯罪起着特殊的作用。  相似文献   

6.
This article first looks at the relationship between international terrorism and terrorism in Africa. Since sub-state terrorism is already endemic to Africa, the future threat potential in the continent lies in a complex mixture of sub-national and international terrorism. Africa may come to play a central role in international terrorism. The motivation, means and targets all exist and these opportunities will not go unheeded for much longer. Africa presents both a facilitating environment and a target-rich environment for terrorists that seek to attack the United States, and indeed the global system. The article concludes with some remarks on counter-strategies.  相似文献   

7.
Despite a generally valiant effort on the part of the United Nations (UN) since 1999 to bring peace and stability to the Democratic Republic of the Congo (DRC), the country continues to be destabilised by rebel forces. These armed movements pose a constant threat to the fragile transition in the DRC, and security in the country is continuously undermined. This article examines rebel forces in the DRC from two perspectives. Firstly, it examines such movements as a manifestation of sub-national terrorism. Secondly, it examines armed movements from the perspective of so-called ‘ungoverned spaces’. The view taken in this article supports the scholarly insight and argument that in countries such as the DRC, armed movements and militias are filling power vacuums that are the result of the inability and lack of military capacity of weak states to fight these movements effectively. Specifically, the eastern and north-eastern parts of the DRC have been major conflict zones where sub-national terrorists employ terror as a strategy. In this context, the DRC is severely affected by terrorism – a phenomenon in the DRC that is intimately linked to the failure to effect sustained development and to consolidate accountable and effective governance.  相似文献   

8.
We study the spatial and temporal determinants of terrorism risk in Israel, using a geocoded database of Israeli terrorist attacks from 1949 to 2004. In selecting targets, terrorists seem to respond rationally to costs and benefits: they are more likely to hit targets more accessible from their own homebases and international borders, closer to symbolic centers of government administration, and in more heavily Jewish areas. We also examine the waiting time between attacks experienced by localities. Long periods without an attack signal lower risk for most localities, but higher risk for important areas such as regional or national capitals.  相似文献   

9.
境外反恐行动在国际上已有大量先例,对于一个境外目标面临恐怖威胁或遭受恐怖袭击的国家,是不容回避的现实问题。通过对境外反恐行动产生的根源、各国境外反恐的对策、采取的方式及其制约因素的综合分析,能够得出有益的启示。反恐怖斗争的严峻现实和发展趋势,要求我们探索境外反恐对策,切实保护国家利益和人民生命财产安全,同时为国际反恐斗争作出应有的贡献。  相似文献   

10.
长期以来,新疆恐怖活动组织与"三股势力"相勾结,制造了多起恐怖活动事件,给新疆边境地区的安全与稳定带来了严重威胁。为此,针对新疆边境地区的特殊性以及恐怖活动的态势,分析了恐怖活动对新疆边境地区的影响,从提升反恐的主动发现能力、加强情报预警工作、加强防范措施的严密性等方面提出了遏制新疆恐怖活动的对策。  相似文献   

11.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   

12.
The spectacular commando-style terrorist strike on Mumbai in November 2008 exposed India's lax internal security structure. As nearly all the security apparatus broke down during the long spell of attacks, massive public outrage flared up across the country calling for a firmer government response. Shockingly, India has done little to prevent a recurrence and a new security threat faces the country every single day not merely before but even after the Mumbai attacks. In contrast, Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have successfully evaded pressures from both India and the international community and continue their terror campaign against India under the “Karachi Project” with the explicit intention to unsettle South Asia. Classified documents indicated that India is at the forefront of a cataclysmic “nuclear terrorism” threat from a “combination of Pakistan-based terrorists and homegrown radicals.” This article analyses the danger posed by the Indo-Pak radical groups targeting India and India's lack of preparedness to the new security threat from the “Karachi Project.”  相似文献   

13.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   

14.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

17.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

18.
ABSTRACT

This article argues that the intelligence sector is a privileged vantage point to observe and analyse a transformation of the State in France, as this transformation deeply affects the heart of the executive power and the French intelligence and security apparatus. Traditionally, intelligence was not conceived in France as a functional tool in the hands of the decision-maker but was rather defined as a ‘regalian power’. Intelligence activities were derived from a very specific conception of the State, and especially the particular notion of ‘reason of State’ (raison d’État). The current intelligence reform prompts speculation as to whether it represents more than a ‘simple’ functional reorganisation or in fact could signify that intelligence is now recognised as a tool in the hands of a ‘État de droit’ (‘liberal state’). The idea of a French ‘exceptionalism’ is addressed through a theoretical approach of the way France redefines intelligence and surveillance in relation with a major evolution of the notion of ‘reason of State’ itself. Then the article illustrates the assumption of a ‘lost tradition’ of reason of State through an analysis of the current reform of the intelligence sector in France. This reform is based on processes of rationalisation, centralization, modernisation and normalisation of both intelligence activities and intelligence services in France. As a conclusion, the article addresses the reactions to the January and November 2015 terrorist attacks in Paris, and asks whether resilience towards terrorism requires to accelerate the pace of the transformation of the French intelligence sector.  相似文献   

19.
The present article aims at investigating the causal relationship between defense spending and terrorism in Turkey using the Autoregressive Distributed Lag (ARDL) bounds testing procedure and Granger‐causality analysis. The findings reveal that there exists a unidirectional causality running form terrorist attacks to defense spending as expected, but not vice versa. In the light of this finding it can be inferred that military anti‐terrorism measures alone are not sufficient to prevent terrorism.  相似文献   

20.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号