首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   

2.
An analysis of US assessments of Germany's development of armored warfare illustrates the problems that intelligence agencies face as they attempt to understand military innovation. The covert nature of German Army's tank research in the years immediately following World War I limited the number of indicators of Berlin's interest in armored warfare. Similarly, the United States possessed at best a fragmentary picture of German experimentation with armor. By the outbreak of World War II, however, US military attaches had nonetheless developed an accurate understanding of German concepts of armored warfare. If the United States is to avoid strategic surprise in the future, it must cultivate intelligence sources and employ considerably different methods from those of the Cold War.  相似文献   

3.
This article deals with Scandinavian intelligence cooperation and its significance for Swedish security policy during the first part of the Cold War. First, the development of the cooperation is described. Second, it is related to a wider context. Third, intelligence in Swedish security policy-making is discussed. Common security interests caused the cooperation. For Sweden, it represented an important part of the wider contacts with the West. Although military intelligence was important for Swedish security policy-making in some respects (e.g. military readiness), it did not have a significant influence in others (e.g. the politicians' threat perceptions). One important reason is the Swedish tradition of weak connections between the political and military leadership.  相似文献   

4.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   

5.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   

6.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

7.
This article examines the use of specialised plain-clothes military units in counter-terrorism, concentrating on examples involving liberal-democratic states. It analyses the benefits and problems arising from clandestine military activity, focusing in particular on British army units (notably 14 Intelligence Company and the Force Research Unit in Northern Ireland). The article concludes by arguing that such formations have a clear utility – notably in gathering intelligence on terrorist groups – but other aspects of their role are inherently controversial (notably in cases where undercover soldiers use deadly force against suspected terrorists). It also states that plain-clothes military operations need to be conducted on the basis of accountability, both for strategic reasons, and also in accordance with the norms of liberal democracy.  相似文献   

8.
Strategic intelligence is the product of various means to ascertain threat/s and action, including the evolution of responses to threats, perspectives of threats, and assessments of successes and failures of such actions. This article promotes the idea that good intelligence enables good policy, and examines how the Nevada Division of Investigation, a state-level investigative agency with general law enforcement responsibilities engaged in strategic intelligence research. The research methodology is an adaptation of the Delphi Technique. It employs a three-round iterative process seeking to generate the strongest possible consensus, after expressing opposing views, to potential resolutions (policies and programs) on major criminal justice issues. Serving as a model for futures research, this study rests on the premise that the decision-maker is primarily interested in having informed individuals present options and supporting evidence for consideration.  相似文献   

9.
The provision of Military Assistance to the Civil Powers (MACP) encapsulates the traditional approach towards countering terrorism on the British mainland, which emphasises minimum force, proportionality, police primacy and the rule of law, with the military retained as a supporting instrument, being employed only as a measure of last resort. Recent terrorist incidents in major urban centres do, however, question the effectiveness of these established methods. This analysis initially codifies the conceptual issues that underscore the tensions between civil policing and military anti-terrorist approaches in the UK, and proceeds to evaluate and compare a number of operations that indicate the nature of the challenges facing the MACP apparatus. In particular, potential shortcomings in the MACP provisions are identified in the form of threat perception and deployment and enforcement gaps. The assessment finds that there are facets of MACP that are of enduring relevance in the current era, yet a continuing need persists to reconcile police and military imperatives toward serious civil disorder contingencies and conditions of emergency.  相似文献   

10.
张礼学  杨勇  周琳  蔡志刚 《国防科技》2021,42(1):123-127
近年来,人工智能技术迅速发展和渐趋成熟,在装备领域的应用大放异彩,极大地拓展了传统装备性能,特别是自主性和智能化水平。但人工智能算法本身固有的逻辑推理性差、具有不可解释性和需要学习训练等特性给人工智能装备的质量监督带来了新挑战,现有评价手段的欠缺也使人工智能装备发展在实用可靠方面充满不确定性。本文在总结归纳人工智能装备新特性拓展和质量监督新挑战的基础上,重点围绕有效提升人工智能装备的质量监督展开研究。提出应在夯实基础能力设施建设、注重日常数据采集整理、灵活技术状态管控、研究有效评价手段、强化人才队伍建设和闭环质量信息反馈与利用等六方面加强人工智能装备质量监督的措施建议,以期为人工智能装备的发展建设提供参考。  相似文献   

11.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   

12.
This paper identifies and classifies middle power nations through the use of broad political science definitions, the demand for military expenditures models and gross domestic product (GDP) per capita. The latter is used as a simple quantifiable measure of relative and potential military power. The paper also develops and utilizes a threat variable that is applicable to middle power nations. The panel data analysis shows that the middle power nations react to threat variables that proxy global instability utilize foreign aid as a complementary policy tool along with military expenditures, and face significant trade-offs between military and non-military government spending.  相似文献   

13.
This paper develops a Dynamic Stochastic General Equilibrium model where national security is an argument in the agent’s utility function and the government chooses optimally the level of military spending to maximize social welfare. National defense depends on military expenditure and on the strategic environment reflecting a potential hostile external threat. We use aggregate data on consumption, investment, and military spending for the US economy to estimate the parameters of the model. Estimation results suggest that consumption and national defense are complements and that military spending variability is mainly explained by external threat shocks although it also depends on the macroeconomic conditions. We compute impulse response functions of the main macroeconomic variables to several shocks: a total factor productivity shock, a defense technology shock, and a strategic environment shock. Surprisingly, we find that the optimal response to an increase in the external threat (a worsening in the strategic environment) will rise output by reducing consumption and increasing investment.  相似文献   

14.
This paper contributes to the continuing debate on the economic effects of military expenditure by undertaking a case study of Greece. Within Europe Greece provides a particularly interesting object of study. It has the highest military burden in Europe and NATO, is the only European Union country situated in the unstable environment of the Balkans, faces a military threat from Turkey, and has a very weak economy. After some background analysis of the economy and military expenditure, the paper investigates the determinants of Greek military expenditure as well as whether the high military burden has played an important role in Greece's poor economic performance over the period 1960–1996. It estimates a Keynesian simultaneous equation model with a supply side, which allows the indirect effects of military expenditure to be captured explicitly. It concludes that the major determinants of Greek defence spending are not economic but strategic (the threat of war) and that the direct effect of defence spending on economic growth as well as the indirect effects through savings and trade balance are all significantly negative. On the basis of such strong results, the paper concludes that defence spending is harmful for the Greek economy.  相似文献   

15.
This paper investigates the nature of two military alliances under Chinese threat. The findings are as follows: First, South Korea does not consider China a significant threat while Japan and the United States have recognized China as a serious threat since the 1990s and the 2000s, respectively. Second, the relationship between South Korea and the United States is a true military alliance for all time periods, but the nature of the alliance has changed since the 1970s. Third, although Japan began to form an alliance relationship with the United States in the 1990s, Japan is considered a more significant ally by the United States. This paper implies that, should China provoke a military confrontation, it might be difficult to deduce a common solution among the three countries because of the different response to military threats from China.  相似文献   

16.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   

17.
Historians have noted that both German and French war preparation in 1914 fell victim to the inadequacies of traditional threat-based planning: vulnerability to ‘threat deception’ which caused each to underestimate or mischaracterize the threat; a tendency to ‘mirror-image’ by fitting intelligence into preconceived notions of how the enemy was expected to behave; and ‘group think’ that discouraged a serious consideration of alternative scenarios. This article applies the ‘Balance of Power Paradox’ to explain why, at the dawn of the twentieth century, war planning in both Germany and France was driven by an acute sense of weakness which encouraged each side to fashion highly ‘risk acceptant’ strategies. In particular, he examines why and how French commander-in-chief General Joseph Joffre evolved and rationalized his audacious, and disastrous, Plan XVII to leverage French weaknesses and prevent the stronger German Army from bringing the full weight of its military strength to bear against France. The potential implication of this historical vignette is that leaders, and by extension military planners, of both strong and weak states focus on the constraints faced by their opponents, and assume that they can avoid the limitations of their position, while their opponent cannot.  相似文献   

18.
周炎明  兰旭  熊俊芬 《国防科技》2020,41(5):111-118
随着“大智移云物”的出现和发展,战争形态已经发展到智能化战争新阶段。为了打赢未来智能化战争,推进军队财务管理实现智能化,充分利用军事大数据这一新兴重要战略资源尤为必要。本文利用需求分析法和现象分类法,从经费需求测算、预算编制、军费支出和军费绩效评估四个方面分析了军队财务管理领域应用军事大数据的需求。针对当前存在的运用军事大数据观念淡薄、数据采集困难、数据挖掘处理能力较弱、数据安全威胁及军事大数据人才缺乏等五个问题,从大数据应用观念的树立、软硬件设备的更新、数据中心的建设、应用框架的构建、信息化管理制度的完善、数据安全管理和大数据人才队伍建设几个方面提出了在军队财务管理领域应用军事大数据的思路。  相似文献   

19.
梁晓波  邓祯 《国防科技》2021,42(4):85-91
发展语言智能处理技术是全球新军事科技研发的重要趋势。美军在几十年的发展过程中,不遗余力地推进新的语言智能技术的研发与应用。在人工智能宏观政策和举措的带动下,美国政府与军方在语言智能领域采取了较为清晰的战略路线:明确需求方向,注重长远规划;重视军民融合,调动地方研发活力;创新技术研发资金的管理模式,提高发展效率;推动技术在关键领域的应用,加快美军战斗力的形成。本文认为,面对这一趋势,我们需要深度布局国防语言智能处理技术战略,重视面向未来需求的长远规划;充分调动语言智能处理技术研发的"民间力量",注重军产学研的协同创新;建立科学适度的项目研发机制,加快颠覆性技术的战斗力转化。  相似文献   

20.
This article outlines the widespread needs of South African military veterans and the possible consequences if the promises made in the recent Military Veterans Act are not met. The first part of the article defines who generally qualifies as a military veteran, how they are typically compensated in various countries with specific reference to neighbouring southern African countries, and what the consequences are when veterans become disenchanted with the state. The second part focuses on South Africa and the recent debates on military veterans and their entitlements. With reference to the findings of a qualitative study conducted among military veterans, parliamentary debates and media reports, an assessment is made of the demands and affordability of promised benefits and the consequences should the state not deliver. The conclusion is reached that heightened expectations are presently frustrated by slow roll-outs, and this is likely to increase the possibility of protest action. This has now the potential to create further tension within the ruling party and civil society, as the pressure on public finances mounts and demands become unsustainable. The effect this may have on political stability will depend on how the government manages this issue.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号