首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   

2.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   

3.
ABSTRACT

By utilizing the theory of Strategic Action Fields (SAFs), the present article explains how a new meso-level social order seems to have emerged in Mexico as a result of the paramilitarization of organized crime, militarization of security, and the opening of Mexico’s energy sector to private investment. This work describes the transformation of Mexico’s energy field after a process of major constitutional and economic changes that were the consequence of a security crisis and an agenda of energy reform for which the so-called ‘drug war’ was a key underlying foundation.  相似文献   

4.
ABSTRACT

The conventional wisdom about the 1992 US intervention in Somalia is that it was a quintessentially humanitarian mission pushed by President George H. W. Bush. This article challenges that interpretation, drawing on newly declassified documents. The Somalia intervention, I argue, was largely a pragmatic response to concerns held by the US military. In late 1992, as the small UN mission in Somalia was collapsing, senior American generals worried about being drawn into the resulting vacuum. Hence they reluctantly recommended a robust US intervention, in the expectation that this would allow the UN to assemble a larger peacekeeping force that would take over within months. The intervention ultimately failed, but the military learned useful lessons from this experience on how to achieve smoother UN handoffs in the future and thus effectively shift longer-term stabilisation burdens to the international community.  相似文献   

5.
SHADOW WARS     
The Secret War with Iran: The 30-Year Clandestine Struggle Against the World's Most Dangerous Terrorist Power, by Ronen Bergman. Free Press, 2008. 432 pages, $28

Fallout: The True Story of the CIA's Secret War on Nuclear Trafficking, by Catherine Collins and Douglas Frantz. Free Press, 2011. 304 pages, $26.

The Twilight War: The Secret History of America's Thirty-Year War with Iran, by David Crist. Penguin Press, 2012. 638 pages, $36.

Israel vs. Iran: The Shadow War, by Yaakov Katz and Yoaz Hendel. Potomac Books Inc., 2012. 254 pages, $30.

Spies Against Armageddon: Inside Israel's Secret Wars, by Dan Raviv. Levant, 2012. 356 pages, $17.

Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, by David E. Sanger. Crown Publishers, 2012. 476 pages, $28.  相似文献   

6.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   

7.
Maritime interests in the twenty-first century are not immune to the growing number of irregular challenges and hybrid threats that have come to dominate land warfare. In order to better understand these challenges a study of naval history can help provide a vital foundation. In the early 1830s the United States Navy dispatched the frigate USS Potomac to Sumatra to investigate a pirate attack on the spice trader Friendship. Potomac's crew of sailors and Marines conducted a landing at the village Quallah Batoo and fought a pitched battle. As the navies of the world approach naval irregular warfare in the new century, studying past examples like Potomac's mission can help illuminate the principles of successful naval irregular warfare.  相似文献   

8.
In recent international armed conflicts private security contractors (PSCs) have played an ever increasing role and military advisors and tribunals are facing the dilemma of assessing the primary and secondary status of PSCs under international humanitarian law. In this article the misconception that PSCs are necessarily mercenaries will be dispelled. The possibility that PSCs might be categorised as combatants or civilians will then be explored. The conclusion is that where they are incorporated into the armed forces of a state, PSCs might attain combatant status. However, given that states are reluctant to formally incorporate PSCs into their armed forces, they will most likely remain essentially civilian. Their degree of participation in hostilities will determine whether they retain their immunity under international humanitarian law from attack and prosecution (as civilians) or whether they are rendered unlawful belligerents.  相似文献   

9.
This article presents a synopsis of Community of insecurity: SADC's struggle for peace and security in southern Africa, published by Ashgate in 2012. It focuses on SADC's efforts to establish a common security regime; conflict and peacemaking in southern Africa between 1992 and 2011; and the prospects of SADC becoming a security community. It summarises the reasons for SADC's difficulties in the sphere of regional security and politics, namely the weakness of member states, their unwillingness to surrender sovereignty to communal mechanisms, and the absence of common values among them. The main conclusion is that these problems lie primarily at the national level and cannot be solved at the regional level. SADC is a forum of states and it cannot do anything that these states will not permit it to do.  相似文献   

10.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   

11.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   

12.
The privatization of activities previously performed by government has been a major characteristic of economic policies over the past two decades. This article examines the potential for privatization of military activities in the African context. Four categories in which this has or might occur are mercenaries employed by a government to provide for defence or to supplement its own military; private security company personnel employed to protect economic assets or to advise and train the local military; the contracting out of the provision of goods and services ranging from heavy weapons through to accounting services; and the transfer of non-core activities currently undertaken by the military to other government departments or civilian bodies. Of these, the last is of potential importance in Africa, given the wide range of activities which its militaries have come to perform. Three examples where private sector organisations or other government departments could play a much larger and probably more cost-effective role are peacekeeping, internal security and surveillance, resource protection and rescue activities.  相似文献   

13.
ABSTRACT

The post-Cold War period nearly up to the present has been characterised as the age of liberal wars, yet key facets of the liberal guidance of war remain under appreciated. This article seeks to address this wider gap with regard to the particular concern of war termination and the fulfilment or failure of policy. First, it develops characterisations of liberal wars based on the existing literature, identifying three broad types through consideration of context—defensive versus offensive—and of political and strategic agency, particularly regarding the motives for and intents of action. Three types of liberal wars result: defensive liberal wars, offensive liberal wars with humanitarian motive and geopolitical intent, and offensive liberal wars with geopolitical motive and humanitarian intent. The article then presents one exemplary case for each liberal war with an emphasis on how liberal strategy required an illiberal ally and that ally's effect on the subsequent peace.  相似文献   

14.
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies.  相似文献   

15.
When twentieth-century authors wrote about ‘partisan warfare’, they usually meant an insurgency or asymmetric military operations conducted against a superior force by small bands of ideologically driven irregular fighters. By contrast, originally (i.e. before the French Revolution) ‘partisan’ in French, English, and German referred only to the leader of a detachment of special forces (party, partie, Parthey, détachement) which the major European powers used to conduct special operations alongside their regular forces. Such special operations were the classic definition of ‘small war’ (petite guerre) in the late seventeenth and in the eighteenth centuries. The Spanish word ‘la guerrilla’, meaning nothing other than ‘small war’, only acquired an association with rebellion with the Spanish War of Independence against Napoleon. Even after this, however, armies throughout the world have continued to employ special forces. In the late nineteenth century, their operations have still been referred to as prosecuting ‘la guerrilla’ or ‘small war’, which existed side by side with, and was often mixed with, ‘people's war’ or popular uprisings against hated regimes.  相似文献   

16.
ABSTRACT

Attempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar.  相似文献   

17.
Abstract

Post-interventionist security assistance is premised on non-normative security understandings and flexible arrangements between external and local actors. In hybrid political regimes or areas of limited statehood, these forms of assistance, while strengthening specific aspects of a country’s security context, reinforce some domestic actors vis-à-vis others thanks to processes of selective borrowing by local political elites. This paper demonstrates how such processes contribute to the proliferation of hybrid elements in the country’s security sector. In two contrasting case studies, we illustrate how security assistance packages in Lebanon and Tunisia have diluted emerging democratic reforms, producing more coercive manifestation of state power.  相似文献   

18.
This article analyzes how the conflict environment in which a civilian monitoring mission is deployed influences the monitors' assessment of the operation. It draws on unique empirical material from the experience of the Sri Lanka Monitoring Mission (SLMM), deployed to oversee a ceasefire agreement in Sri Lanka 2002–2008. With material from a survey and in-depth interviews, experiences of the monitors are analyzed and changes over time are traced in relation to the monitors' assessment of the mandate and organizational set-up of the mission. The study points to the difficulty of monitoring missions to address escalation during an ongoing peace process. Its function is dependent on the goodwill of the parties. In essence, monitoring missions have the potential to strengthen peace when there is momentum in favor of progress, but when relations between the parties turn sour and the conflict escalates a civilian monitoring mission basically loses its potential. During the final stages of the war, which saw a very large number of civilian casualties, the war-torn areas were closed to international observers. Moreover, international pressure for a short-term ceasefire to alleviate the humanitarian situation was dismissed by the Sri Lankan government, which also saw the backing of several important actors, not the least China.  相似文献   

19.
ABSTRACT

The present international standard allows non-nuclear weapon states (NNWS) to forego safeguards when nuclear material is used in a “non-proscribed military activity,” though no criteria have been established to determine when NNWS can remove naval nuclear material from safeguards. Though at present, only nuclear-armed states possess nuclear submarines, the global nuclear naval landscape may soon change with the advancement of Brazil's fledgling program and the possible precedent it would set for other NNWS. A framework is needed to shore up nuclear security and prevent nuclear material diversion from the nuclear naval sector. Proposed and existing nonproliferation frameworks, including a Fissile Material Cut-off Treaty and commitments through the nuclear security summits, are insufficient to close this loophole. A Naval Use Safeguards Agreement (NUSA), modeled after the Additional Protocol of the International Atomic Energy Agency, would provide a framework to remove the opacity surrounding nuclear material in the naval sector. Designed for NNWS and encouraged as confidence-building measures for nuclear weapon states, NUSA would explicitly outline those stages in the naval nuclear fuel cycle where safeguards are to be applied and in what context. This viewpoint also further provides direction for targeted research and development in technical naval nuclear safeguards solutions.  相似文献   

20.
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号