首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
Li Chen 《战略研究杂志》2017,40(5):663-695
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime.  相似文献   

2.
This article examines the nuclear command and control (C2) system implemented in Pakistan since 1998, and discusses its potential consequences for the risk of inadvertent or unauthorised use of nuclear weapons. I argue that troubled civil-military relations and Pakistan's doctrine of ‘asymmetric escalation’ account for the creation of a command and control system with different characteristics during peacetime and military crises. Although the key characteristics of Pakistan's nuclear C2 system allow relatively safe nuclear operations during peacetime, operational deployment of nuclear weapons during military standoffs is likely to include only rudimentary protections against inadvertent or unauthorised nuclear release. The implication of this study is that any shift from peacetime to wartime command and control procedures is likely to further destabilise Indo-Pakistani relations during the early stages of a diplomatic or military standoff, and introduce a non-trivial risk of accidental escalation to the nuclear level.  相似文献   

3.
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.  相似文献   

4.
Two big ideas have shaped recent debate about military doctrine: the Revolution in Military Affairs (RMA) and Counterinsurgency (COIN). These ‘network centric’ and ‘population centric’ worldviews appear contradictory, but this is a false dichotomy. American forces have actively developed RMA concepts in COIN environments during recent wars in Iraq and Afghanistan; the exemplar par excellence is innovation by US Special Operations Command (SOCOM) in doctrine, technology, and organization for counterterrorism. Ironically, SOCOM's reimagining of the RMA managed to both improve the strengths and underscore the weaknesses of the American military's technological prowess.  相似文献   

5.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

6.
Russian Special Forces saw significant changes to both organization and doctrine in the years after 2008. The special forces of the General Staff’s Main Intelligence Directorate were reduced in number, the organization’s institutional autonomy and rationale were changed, and an entirely new Special Operations Command was established in March 2013. This article seeks to assess the nature, scope and purpose of these changes, and to explain them by drawing on scholarship on military innovation. In particular, the article looks at military innovation in the context of a non-democratic political regime.  相似文献   

7.
The article explores Italian Air Force (ITAF) officers’ perceptions of military transformation and of changes in the global security environment. While several studies have addressed the challenges faced by European armed forces in the last two decades, the methods used have been rather uniform, mostly relying on in-depth case studies through qualitative interviews and analysis of strategic documents and budgets. Using data from an original, and unique, survey conducted among ITAF captains (N = 286), this article focuses on servicemen’s attitudes towards the transformations of the global security environment and the changes occurring (and needed) within the Italian Air Force. After describing the “military view” on these topics, the article provides preliminary statistical evidence on the links between individual experiences, views, and change. The research aims to contribute to the broader debate on military transformation by adding a novel dimension of analysis and providing new insights on the micro-level aspects of learning.  相似文献   

8.
It has become commonplace, especially in the post-Vietnam strategic environment, to quote Clausewitz's dictum that war is the continuation of policy by other means. We are told that military operations are dictated by, and must serve, clear political ends. Such thinking has been invoked to support everything from punitive strikes, to peacekeeping missions, to the ‘Powell’ doctrine and its political ‘exit strategies’, but at times political policy and military operations do not mix. In 1942 the Royal Navy bowed to political pressure and, against its collective better judgement, continued the Arctic convoys to the Soviet Union. These military operations culminated in the destruction of convoy PQ 17 in early July. This conflict between political policy and military strategy provides an object lesson of why in war issues of means and priorities must outweigh the importance of any given political policy.  相似文献   

9.
This article assesses Bernard Fall’s concept of Vietnamese Revolutionary Warfare in Indochina between 1953 and 1958. It also investigates differences in the conceptualization of Revolutionary Warfare between Fall and proponents of French military doctrine known as la guerre révolutionnaire. The last component of the article considers limits of Fall’s influence on counterinsurgency doctrine.  相似文献   

10.
This article explores why the offensive predominates military tactical thinking. With survey results showing an offensive bias among 60 per cent of senior Swedish officers and as many as 80 per cent in the case of the army, it is clear that this is not just a problem of the past but is equally relevant today. The article asks why there is a tendency to perceive and understand offensive tactics as the preferred choice and the way to conduct battle that should be encouraged and preferred. Drawing on existing research and the findings of a pilot study, ten propositions for why the offensive bias exists are tested using a mixed-method approach. Based on the findings, the article develops a model to understand why the offensive dominates military tactical thinking. It is found that the two key constitutive factors behind the offensive bias are military culture and education. These factors most directly and profoundly influence an officer’s identity, perceptions, and thinking. Military culture and education, in turn, work as a prism for four other factors: military history, the theory and principles of war, doctrine and TTPs, and psychological factors.  相似文献   

11.
‘Doctrine’ has been part of military vernacular for at least a century. Nonetheless, it is a concept which is rather under-explored. The aim of this article is thus to break doctrine down into its component parts in order to grasp what a military doctrine actually is. Thereafter, the article points out different ways to utilise doctrine as a military devise. A doctrine cannot be, or rather should not be, all things to all men. On the contrary, doctrine can be a tool of command, tool of education or a tool of change. The main upshot of the article is that the future of doctrine is far brighter than its critics want us to believe.  相似文献   

12.
ABSTRACT

Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS.  相似文献   

13.
This article examines the role of ideas in US Army innovation after the Vietnam War. It challenges the view that failure, changes in the strategic environment or technology are the sole drivers of military innovation and analyses the role of ideas and identity in the army's development of AirLand battle doctrine. It highlights how the reform in ideas led to a ‘re-conception’ of the strategic environment, the nature and dynamics of warfare and a change in self-understanding. The organisational reforms embodied these ideas and led to a new way of war practised in the first Gulf War.  相似文献   

14.
Once dismissed by many outside observers, the Chinese People’s Liberation Army Air Force (PLAAF) has undergone an impressive transformation over the past two decades, emerging as one of the world’s premier air forces. As it continues to modernize, it is focused on becoming a ‘strategic air force.’ PLAAF strategists suggest this means it should play a decisive role in protecting Chinese national interests, field modern capabilities commensurate with China’s standing as a major power, and enjoy the institutional status befitting its role as a ‘strategic service,’ an important consideration given the historical dominance of the ground force in China’s military.  相似文献   

15.
ABSTRACT

The aim of the current study is to discuss which particular factors Russia considers as sufficient deterrent capabilities and whether the national defence models implemented in the Baltic countries have the potential to deter Russia's military planners and political leadership. Whilst the existing conventional reserves of NATO are sizeable, secure, and rapid, deployment is still a critical variable in case of a conflict in the Baltic countries because of the limited range of safe transportation options. However, whilst the Baltic States are developing their capabilities according to the priorities defined by NATO in 2010; which were updated after the invasion of Crimea in 2014, Russian military planners have meanwhile redesigned both their military doctrine and military forces, learning from the experience of the Russo-Georgian war, the Russia-Ukraine conflict, and other recent confrontations. Accordingly, there is a risk that the efforts of the Baltic countries could prove rather inefficient in deterring Russia.  相似文献   

16.
ABSTRACT

Recent US advances in counterinsurgency doctrine have been adopted by developing country armed forces. Nevertheless, no systematic study has examined the barriers they face to implementing highly involved counterinsurgency strategy. Tracing the evolution of Peruvian doctrine demonstrates that Peru was able to quickly improve the unity of effort, intelligence capacity, and military basing to meet the demands of a population-centric hearts-and-minds approach to counterinsurgency. Nevertheless, the limited tactical initiative and flexibility of Peruvian forces remains a challenge. The Peruvian experience is instructive for other militaries undergoing similar transitions. However, given the diversity of insurgent conflicts, this doctrine is not universally appropriate.  相似文献   

17.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   

18.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

19.
ABSTRACT

In this paper, I reflect upon my experience of working with active military officers-cum-research brokers in research on the Congolese (DRC) armed forces. Drawing upon the traditions of autoethnography and Narrative International Relations, I recount the story of an evolving relationship between one particular military broker and myself. It highlights how military research brokers, while frequently cast not only as capable of handling their own security, but as prime sources of insecurity, often share the general (civilian) research broker’s predicaments of insecurity. In doing so, the narrative also challenges dominant gendered, as well as racialized, ideas of who is at risk when conducting research in conflict settings.  相似文献   

20.
Abstract

This study applies the Sequential Panel Selection Method (SPSM), to investigate the convergence properties of the military expenditure of the North Atlantic Treaty Organization (NATO) during the period of 1990–2015. Compared to the traditional methods, SPSM considers fundamentally general spatial homogeneous and heterogeneous relationships with countries and examines the evolution of military expenditure. We find that four-fifths of NATO member countries have been convergent with the UK, but no country’s military expenditure is convergent with the US. This means that there is no significant linkage effect in the US for NATO military expenditure. While they are allies of the US, the majority of NATO member countries’ military expenditures are consistent with UK military expenditure. The main reasons are due to the geographical space layout and the international relationship convergence. The results indicate that more than four-fifths of NATO member countries have been coordinated with convergence theory and spillover effect.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号