首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 19 毫秒
1.
ABSTRACT

Debates on military intervention and small wars often include the claim that soldiers should operate among civilians in order to avoid civilian casualties and to protect civilians against third-party violence. This article, by contrast, points at negative unintended consequences of military operations taking place in close proximity to local populations: it argues that also risk-tolerant militaries cause civilian casualties and that their presence triggers third-party violence against civilians. The British military, in particular the British Army, exported risk-tolerant practices from Northern Ireland to the Balkans, with sporadic success. But in southern Iraq and in Helmand, British ground operations harmed civilians. The findings suggest that the chances for protection are better in operations where levels of violence are relatively low than in counterinsurgency where troops face ruthless and well-endowed enemies operating among civilians.  相似文献   

2.
Abstract

A tremendous amount of important work has been done recently on operationalising the protection of civilians as a military task. The bulk of the discussion has focused on how militaries should respond to direct attacks on civilians. This is an important issue, but thinking about civilian protection should also include a serious examination of the ways in which the approach of military organisations to the problem of ‘spoiler’ groups can affect the level and dynamics of attacks on civilians – importantly, where armed groups are interested in violent control of civilian populations, attempts to ‘dislodge’ them from areas of control may substantially increase the level of violence against civilians (beyond the dangers to be expected from being near areas where active fighting is taking place). In 2009, the United Nations mission in the Democratic Republic of Congo (MONUC) supported the Congolese military in operations to dismantle the Hutu-dominated FDLR (Forces Démocratiques de Libération du Rwanda, Democratic Forces for the Liberation of Rwanda) militia group, at massive human cost. Critics have primarily focused on MONUC's failure to protect civilians from direct attack, consonant with the general discourse on tactics for civilian protection. These criticisms are valid, but in this paper I argue that two crucial additional considerations should be kept in mind: the way that military operations can affect violence against civilians, and the way that moralising the approach to armed groups, even those which have committed serious abuses, can limit military and political options – potentially in ways that increase civilian risk in the name of protecting them.  相似文献   

3.
Justin Schon 《Civil Wars》2016,18(3):281-310
Analyses of the violence–displacement relationship motivate a disaggregation of violence into violence in residential areas (home violence) and violence along migration routes (road violence). These two forms of violence have opposite effects upon displacement, with home violence increasing displacement and road violence decreasing displacement. Yet, conflict scholarship would benefit from additional consideration of the specific activities that constitute road violence. This consideration reveals that road violence primarily involves displacement-deterring violence at checkpoints. This motivates the question: How does checkpoint violence deter displacement? Using interviews with Syrian and Somali refugees, as well as daily data on violence and displacement in Somalia, this paper argues that state and non-state armed groups create and foster uncertainty at checkpoints. Then, they use dramatic violence that is tangible to civilians through their ability to physically see, hear, and smell evidence of it as propaganda. As propaganda, the deterrent effect of checkpoint violence is amplified beyond isolated violent events. More broadly, results from quantitative analysis of the daily data on violence and displacement in Somalia indicate that uncertainty about road violence (road uncertainty) and uncertainty about home violence (home uncertainty) amplify the effects of road violence and home violence, respectively.  相似文献   

4.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   

5.
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.  相似文献   

6.
Many studies of terrorism explain the use of violence against civilians with political or economic forces, often relegating social variables to the margins. Social factors, specifically societal-level social capital, play a far more important role in explaining patterns of terrorist activity than previously recognized. Social capital can exert pressures that act as both restraint and catalyst for terrorism, making explicit exposition of these differential effects critical. Analysis shows that higher stocks of social capital positively correlate with the number of terrorist groups, but the average attack activity of those groups increase as measures of social capital decline. The complex relationship makes it difficult to draw simple policy implications, but it does offer insight into the role that social dynamics play in terrorist activity.  相似文献   

7.
How do civilians respond to and shape civil war? Dominant approaches emphasise territorial control, while rival sociological explanations understand civilian behaviour as rooted in justice, pleasure, and social norms. This paper assesses these divergent sensibilities by examining rebel-controlled areas from Aceh, Indonesia. Many civilians provided the rebels with symbolic support, information and provisions, support that deepened over time as the rebels established control. By disaggregating ‘civilians’ into social groups, a more complex story appears. Only some civilian groups supported the dominant armed group, suggesting that control and sociological approaches can be complementary in explaining civilian behaviour.  相似文献   

8.
This article addresses what we owe to the civilians of a state with which we are militarily engaged. The old notion of noncombatant immunity needs to be rethought within the context of both human rights and into the postwar phase. No doubt, civilians will be killed in war. However, much more can be done during and after the fighting to protect civilians’ basic human rights from the ills of war. I argue for making belligerents accountable ex post by requiring them to repair destroyed dual-purpose facilities that are essential for securing basic human rights of the civilian populace. I argue also that a belligerent’s targeting decisions should be reviewed ex post by an impartial commission.  相似文献   

9.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   

10.
Violent conflict escalated in Africa in 2014, with five sub-Saharan states – the Central African Republic (CAR), Nigeria, Somalia, South Sudan and Sudan – accounting for an estimated 75% of all conflict-related deaths on the continent. This paper provides an overview of the five major sub-Saharan African conflicts in 2014 and considers the underlying causes and dynamics in the Seleka/anti-Balaka conflict in the CAR, the Islamist threats of Boko Haram and al-Shabaab in Nigeria and Somalia, the civil war in South Sudan, and the long-running conflict between Sudan's government and southern and Darfuri rebels. The paper unpacks the general trends evident in these conflicts and the implications for the settlement thereof, including the targeting of civilians, ethnic and religious mobilisation and the state as epicentre of violence. The paper concludes with a brief look ahead to 2015.  相似文献   

11.
Which counterinsurgency approaches are most effective in defeating insurgencies? Counterinsurgency advocates and critics have debated the effectiveness of winning hearts and minds as well as using brute force against ordinary civilians. But little scholarship has sought to systemically compare these counterinsurgency approaches among a broad range of cases. This paper seeks to remedy this gap in the literature with an empirical analysis of 47 counterinsurgency wars from 1945–2000 to evaluate the effectiveness of coercive and persuasive approaches to counterinsurgency. To do so, I use crisp-set qualitative comparative analysis (QCA), or Boolean analysis, to identify the presence or absence of six coercive and persuasive counterinsurgency practices across all cases. This method enables me to highlight how counterinsurgency victory can be produced by combinations of practices rather than a single set of practices that might be expected to be useful across cases. The results demonstrate that many combinations of coercive, persuasive, and mixed counterinsurgency practices can lead to victory. However, more persuasive combinations of practices consistently lead to counterinsurgent victory compared to others, although limited coercion against civilians is constant in all cases of counterinsurgency. These findings cast doubt on the ability of counterinsurgents to refrain from harming civilians and suggest that victory requires a mix of both positive and negative incentives for cooperation.  相似文献   

12.
ABSTRACT

The armed resistance offered by the Organization of Ukrainian Nationalists (OUN) to the Soviet state was the toughest internal political challenge that the Soviet regime faced from World War II to the 1980s. However, OUN’s grand strategy was based on self-delusion and was, therefore, always irrational. It resulted in misinterpretation of the sentiments of Ukrainians and the international situation, collaboration with Nazi Germany despite incompatible goals, counterproductive ethnic violence and sweeping terror against alleged Soviet collaborators. Local civilians rather than the representatives of the Soviet regime were OUN’s primary target; this alienated most residents of Western Ukraine.  相似文献   

13.
What explains the variation in states’ nonstate partners in civil warfare? States often use nonstate actors to do what their regular military forces cannot do well – navigate the local population. Some of their nonstate partners are ordinary civilians, while others are battle-hardened fighters with a rebellious or criminal past. The choice of proxy carries serious implications for the patterns and effects of violence during civil war, human rights, and international security. This article is the first to disaggregate the nonstate counterinsurgents and offer an explanation for why and how states use each type. It brings together the politics of collaboration with the politics of exploitation. The article shows that the state’s use of nonstate proxies is shaped by the supply of willing collaborators, the state’s ability to exercise control over them, and the trade-offs underlying the use of the different types of nonstate actors. The empirical evidence used to support this argument comes from a novel, comparative study of Turkey’s counterinsurgency campaign against Kurdish separatists and India’s counterinsurgency against Kashmiri separatists. The original data were collected through fieldwork in the disputed territories of each country.  相似文献   

14.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   

15.
Abstract

Terms like ‘support’ and ‘collaboration’ are often used interchangeably to denote a loose set of acts or attitudes that benefit non-state armed groups (NSAGs). However, these terms are seldom defined, and the alternatives available to civilians are rarely identified. Moreover, existing approaches overlook that the interaction between civilians and NSAGs is often one between ruler and ruled, which makes obedience and resistance central. This paper proposes to conceptualize the choices available to civilians as forms of cooperation and non-cooperation, offers a typology, and discusses the implications for theory building on civilian and NSAG behavior, and on the functioning of armed social orders.  相似文献   

16.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

17.
ABSTRACT

The period 1833 to 1840 witnessed a brutal civil war in Spain waged between insurgent Carlists and the government Cristinos. The Carlists managed to secure reliable territorial control only over one part of Spain (upland Navarra and rural parts of the neighbouring Basque provinces). Although pockets of armed Carlism flourished elsewhere in Spain, especially in Catalonia, Aragón and Galicia, these insurgents were ineffective at coordinating actions. The Carlist court in the Basque country tried to break its strategic blockade by launching a series of expeditions into Cristino-held territory in the hope of destabilising the Madrid regime and consolidating distant insurrections. This article explains how and why these expeditions scored tactical victories but strategic failures. In particular it argues that Carlist raiding strategy was a failure, for its use of violence against real and imagined enemies in marginal and Cristino areas of control alienated civilian support.  相似文献   

18.
This article explores how the protection of civilians is being militarized by African policymakers and diplomats. I draw on practice approaches to analyze what social groups are doing when they claim to “protect civilians.” I show how innovative protection mechanisms can be seen as a function of officials and diplomats coping with the changing circumstances of increasingly militarized politics in Africa. Specifically, accountability mechanisms for unintended and intended civilian harm by African security operations have originated in connection with this development. I argue that these are results of anchoring practices, which means that everyday informal interactions in one context become linked to another context. I argue that these emerging accountability mechanisms represent a new combination of practices, with the potential of changing the routine activities and mutual learning between policymakers and diplomats.  相似文献   

19.
This article looks at the Kashmir conflict in South Asia, which has been going on since 1947, when India and Pakistan became independent from British colonial rule. After looking at some historical background, the article looks at both the external dimension as well as the internal dimension of the conflict. The external dimension tends to focus on Indo-Pak relations over Kashmir and the internal dimension looks at India's repressive state policies within the state of Kashmir. This article uses Mary Kaldor's “New War” thesis as a theoretical framework to understand the situation and pays special attention to the conflict's very complex and multifaceted nature. The article argues that although the levels of violence have differed from time to time in the region since 1947, today the conflict seems to have less to do with Indo-Pak relations or the external side of things and has more to do with the internal dimension and India's undemocratic ways within Kashmir. Today, Kashmir is one of the most militarised conflict zones in the world. The stationing of the Indian military and paramilitary forces in the region has only exacerbated the situation since it is the security personnel who cause much of the problem. The Armed Forces Special Powers Act gives these security forces extraordinary powers in the region, which they often abuse. The armed forces have no real understanding of the local culture or sympathy for local religious sentiments. Poverty, corruption, administrative failure, police brutality, identity politics and human rights abuses are some of the key features associated with this conflict. Methodologically, a number of interviews were carried out with the local people in the region recently. From the data gathered through the interviews, it is very obvious that the people still feel very oppressed and that the situation is still very volatile, fraught with uncertainty. Finally, after making an assessment of the situation, the article tries to suggest methods of peaceful building and conflict management as the way forward.  相似文献   

20.
Determination of the gunfire probability of kill against a target requires two parameters to be taken into consideration: the likelihood of hitting the target (susceptibility) and the conditional probability of kill given a hit (vulnerability). Two commonly used methods for calculating the latter probability are (1) treating each hit upon the target independently, and (2) setting an exact number of hits to obtain a target kill. Each of these methods contains an implicit assumption about the probability distribution of the number of hits‐to‐kill. Method (1) assumes that the most likely kill scenario occurs with exactly one hit, whereas (2) implies that achieving a precise number of hits always results in a kill. These methods can produce significant differences in the predicted gun effectiveness, even if the mean number of hits‐to‐kill for each distribution is the same. We therefore introduce a new modeling approach with a more general distribution for the number of hits‐to‐kill. The approach is configurable to various classes of damage mechanism and is able to match both methods (1) and (2) with a suitable choice of parameter. We use this new approach to explore the influence of various damage accumulation models on the predicted effectiveness of weapon‐target engagements.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号