首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Airpower, drones and cyber-weapons are employed by states in conjunction with local armed non-state actors in an effort to coercively intervene in the crises of the twenty-first century. While the externalization of the burden of warfare is a return to pre-modern war, it is the change in the underlying socio-political relations between the state and its military agent that is a novel phenomenon in surrogate warfare. This article demonstrates that in a post-Westphalian era characterized by non-state violence, globalized conflicts, a prioritization of risk management in a mediatized environment, the state has to explore new ways to remain relevant as the primary communal security provider. Thereby, the organization of violence has departed from the employment of the state’s soldier as the primary bearer of the burden of warfare to a mode of war where technological and human surrogates enable the state to manage the risks of post-modern conflict remotely. In this article, we conceptually explore surrogate warfare as a socio-political phenomenon within the context of globalized, privatized, securitized and mediatized war.  相似文献   

2.
Judging by recent media reporting and pronouncements by senior US military and security officials, the use of drones by militant groups is both reshaping conflict between armed non-state actors and state parties and now presents a grave and direct threat to nations in the West and elsewhere. But does this threat warrant the attention it is currently receiving? To answer this question, this article surveys how various militant groups have used drones both tactically on the battlefield and for wider strategic purposes. Closely examining how drones have been employed and by whom provides a basis for understanding variation in adoption. The article shows how drone usage or non-usage is highly contingent on the setting of the conflict, the aims of different groups, and the capacity of groups to adopt the technology. Though advances in drone technology could make the use-case more appealing for militant groups, drones will be subject to the same back-and-forth, techno-tactical adaptation dynamic between adversaries that have accompanied prior military innovations.  相似文献   

3.
Ida Rudolfsen 《Civil Wars》2017,19(2):118-145
Most studies on internal armed conflict focus on the dyadic interaction between the state and a rebel group, leaving less attention to inter-group fighting. Addressing this gap in the literature, this study argues that the interplay between economic and political inequality and weak state capacity increases the risk of non-state conflict. An empirical analysis of 178 non-state conflicts in Sub-Saharan Africa between 1989 and 2011 provides support for the theorized conditional effect, but only for the role of economic inequality. The effect of political exclusion in the context of a weak state is not confirmed, suggesting that such conditions may be more prone to violence of another kind (i.e., mobilization against the state). Overall, these findings highlight the importance of a functioning state for maintaining peaceful inter-group relations, while they also lend support to earlier research that reports divergent effects of economic and political inequalities on civil conflict risk.  相似文献   

4.
Despite problems of violence domestically, Brazil has played a key leadership role as part of MINUSTAH peacekeeping operations in Haiti since 2004. This article addresses how Brazil's international military engagement is shaping domestic approaches to urban security, and what may be the implications of the use of military strategies, operations, and norms to address issues of public security in Brazilian cities. It is argued that current approaches toward urban security employing military-trained peacekeepers actually represent a continuation of old paradigms, yet these recent militarised approaches are likely evolving into newer and potentially more accountable forms by constraining indiscriminate use of force and establishing a positive state presence in marginal urban areas. As such, the article connects long-established issues of dealing with urban violence in Latin America with ongoing debates in the United States and beyond about post-counterinsurgency approaches to increasingly urban conflict settings. It reflects on potential lessons to be learned from the Latin American perspective, while showing also how these have changed over the last decade. The article concludes that despite the potential utility of force in some urban conflict settings, this approach could entail a normative shift towards legitimising forceful containment of violence, and hinder democratic consolidation in Brazil.  相似文献   

5.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   

6.
Abstract

After nearly four years of civil war, Libya continues to be described as an ‘ungoverned space’ where the collapse of state institutions reignited tribal, political, religious and ideological tensions. These accounts, however, obscure Libya’s complex subnational governance, and the role of non-state armed groups in shaping the emerging political orders. By contrast, we contend that distinct subnational political orders have emerged in Libya since 2014 in which actors engage in state-making practices driven by local interests. Using empirical evidence to explore the activity of non-state armed groups during the Libyan civil conflict, we highlight that the local conflict environments in eastern, western and southern Libya provide specific incentives that shape the process of armed group splintering and patterns of violence. The findings demonstrate that claims to authority and notions of statehood extend far beyond the state whereby governance relations are negotiated between state and non-state actors. Conflict patterns, (in)stability and the prevailing political order are therefore conditional on the nature of the dominant actor, their strategies and modes of violence within their areas of influence. Through this analysis, the paper provides a more granular understanding of the local political dynamics that drive violence in Libya and civil wars more generally.  相似文献   

7.
Justin Schon 《Civil Wars》2016,18(3):281-310
Analyses of the violence–displacement relationship motivate a disaggregation of violence into violence in residential areas (home violence) and violence along migration routes (road violence). These two forms of violence have opposite effects upon displacement, with home violence increasing displacement and road violence decreasing displacement. Yet, conflict scholarship would benefit from additional consideration of the specific activities that constitute road violence. This consideration reveals that road violence primarily involves displacement-deterring violence at checkpoints. This motivates the question: How does checkpoint violence deter displacement? Using interviews with Syrian and Somali refugees, as well as daily data on violence and displacement in Somalia, this paper argues that state and non-state armed groups create and foster uncertainty at checkpoints. Then, they use dramatic violence that is tangible to civilians through their ability to physically see, hear, and smell evidence of it as propaganda. As propaganda, the deterrent effect of checkpoint violence is amplified beyond isolated violent events. More broadly, results from quantitative analysis of the daily data on violence and displacement in Somalia indicate that uncertainty about road violence (road uncertainty) and uncertainty about home violence (home uncertainty) amplify the effects of road violence and home violence, respectively.  相似文献   

8.
‘Mowing the Grass’, Israel’s strategy in the twenty-first century against hostile non-state groups, reflects the assumption that Israel finds itself in a protracted intractable conflict. The use of force in such a conflict is not intended to attain impossible political goals, but a strategy of attrition designed primarily to debilitate the enemy capabilities. Only after showing much restraint in its military responses does Israel act forcefully to destroy the capabilities of its foes, hoping that occasional large-scale operations also have a temporary deterrent effect in order to create periods of quiet along its borders. The Israeli approach is substantively different from the current Western strategic thinking on dealing with non-state military challenges.  相似文献   

9.
Terrorist networks involve not only non-state actors but also an international environment in which state sponsors and 'gray areas' play significant roles. Non-state actors need the sanctuaries of state sponsors and of areas outside of effective state control to recruit, organize, and train their ranks, and to finance their activities. Through statistical analysis of statements of Iranian state intentions, and measures of direct US military interventions, this study examines how US military interventions into Iran's perceived sphere of interests deterred Iranian support for terrorist actions by its proxy groups against United States targets from 1980 to 1990.  相似文献   

10.
A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized.  相似文献   

11.
Armed conflict on the African continent has witnessed increasing recruitment of child soldiers, often at the hands of non-state armed groups. Unfortunately this practice continues unabated in the face of legal obligations prohibiting the recruitment of child soldiers under international humanitarian law, and international and regional human rights law. While international condemnation of the practice has led to attempts to increase the minimum age for recruitment to 18, a disjuncture persists between the legal obligations states sign up to, and the actual enforcement of these prohibitions at a domestic level.

International criminal law jurisprudence emanating from the Special Court for Sierra Leone and the International Criminal Court is being monitored closely, as these courts seek to enforce the prohibition in all armed conflicts, and against both state actors and non-state armed groups. International humanitarian law only protects child soldiers who have been unlawfully recruited. In this piece, the authors take a closer look at what amounts to unlawful recruitment in light of customary international humanitarian law, since this body of law also binds non-state actors, even without further criminalising legislation at a domestic level. Moreover, the article briefly explores whether a child can ever void this protected status by volunteering to participate directly in hostilities.  相似文献   

12.
The nature of crime and conflict is rapidly evolving. Postmodern war is increasingly influenced by non-traditional and irregular combatants: non-state soldiers. These actors are exploiting technology and networked doctrine to spread their influence across traditional geographic boundaries. This emphasis on non-traditional actors accompanies a shift in political and social organization. This shift may well be a shift in state form: from nation-state to market-state. This transition is fueled by rapid developments in technology and the adoption of network organizational forms. Conflict during this transition blurs the distinctions between and among crime, terrorism and warfare. This essay explores the dynamics of terrorism, crime and private armies during this epochal shift.  相似文献   

13.
Over the past few years there is an apparent re-regionalization of al-Qaeda activity, intensified by the ongoing Middle East turmoil. Its main characteristic is a trend towards the abandonment of focoist strategies and their replacement by more popular-based ones. This article aims at evaluating their capacity to implement such a strategy shift and sustain the required level of violence. As a means of evaluating this capacity, this article proposes the use of a DIME (diplomatic, informational, military, and economic) framework, which will hopefully provide an alternative angle of theorizing and understanding ‘armed non-state actors’ (ANSAs). The model is applied in the case of al-Qaeda in the Arabian Peninsula (AQAP), which appears to have effectively developed the military and informational dimensions, due partly to its own prowess and partly to the Yemeni state's weaknesses and the shortcomings of counterinsurgency. In contrast, the economic and diplomatic dimensions suffer from the lack of resources and the anti-systemic nature of AQAP.  相似文献   

14.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   

15.
This paper explores the relationship between human capital and international conflict. In theory, human capital may increase the opportunity cost of military service and the economic cost of injury and loss of life in combat; it may decrease the benefits of conflict as human capital cannot be easily appropriated or transferred; it may affect societal norms toward peace and war; and it may alter military productivity through new technology and complementarities between military technology and personnel. Using a panel of politically relevant dyads, I find robust empirical evidence that human capital may significantly decrease the likelihood of militarized conflict between nations. In short, the findings suggest that promoting human capital‐oriented development may help to increase peace in the world.  相似文献   

16.
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   

17.
Many of the world's poorest states have experienced violent conflict in the past decades and it is today widely accepted that armed conflicts require sustained efforts that address not only the military, but also the political, humanitarian, economic and social dimensions of conflicts. For some years there has been a growing international concern with and emphasis on peacebuilding programming in the area of conflict resolution and peacekeeping. In Sierra Leone, a country that was engulfed in a brutal civil war for more than ten years, peace was hard won—a peace that would not have been possible without the presence and active post-conflict assistance of the United Nations (UN). However, Sierra Leone remains in a precarious state, being one of the poorest countries in the world, and needs the commitment of the international community in ongoing post-conflict peacebuilding to sustain its delicate peace. This article examines the challenges, extent and achievements of peacebuilding programming in Sierra Leone, and assesses the prospects for sustainable peace in this once war-torn West African state.  相似文献   

18.
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants.  相似文献   

19.
Through the construction of masculinity in the military and technological advancements in Unmanned Aerial Vehicles, prevailing gender norms of masculinity are being challenged. This article bridges the gap in studies of military technology and ethical dilemmas in the use of force, stressing the impact of prevailing hyper-masculinization in the future of warfare. To strengthen appreciation of hegemonic masculinity in militaries and emerging technological capabilities on the genderization of war, this article applies literature from a variety of fields, including critical gender studies, robotics and military organizations. While a case can be made that genderization of war is inclined towards feminization of battle ground, a deeper analysis of drones and military technology reveals that a state of hyper-masculinity will be more typical of future of warfare. In evaluating the aspects that drones bring to a conflict, it might initially seem that the technology challenges previously dominant masculinity. However, upon further evaluation, it is apparent that the traits of drones and other emerging military technologies support the masculinities currently present, and make armed conflict increasingly hyper-masculinized.  相似文献   

20.
In recent international armed conflicts private security contractors (PSCs) have played an ever increasing role and military advisors and tribunals are facing the dilemma of assessing the primary and secondary status of PSCs under international humanitarian law. In this article the misconception that PSCs are necessarily mercenaries will be dispelled. The possibility that PSCs might be categorised as combatants or civilians will then be explored. The conclusion is that where they are incorporated into the armed forces of a state, PSCs might attain combatant status. However, given that states are reluctant to formally incorporate PSCs into their armed forces, they will most likely remain essentially civilian. Their degree of participation in hostilities will determine whether they retain their immunity under international humanitarian law from attack and prosecution (as civilians) or whether they are rendered unlawful belligerents.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号