首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
作为重要的全球公域范围与全球治理对象之一,太空既面临着日益严峻的资源、环境与安全问题,又不断彰显着其极具地缘政治意义的战略地位,攸关国家利益与安全。自进入太空时代以来,争夺和维持太空领域的领先地位一直是美国不懈追求的目标。美国的经济、军事等国家实力越来越依赖太空,同时其太空资产的脆弱性也愈发凸显。面对新的国际国内形势与外空态势的复合挑战,奥巴马政府适时调整了美国的太空战略。文章以全球公域和全球治理为切入视角,在分析太空领域全球治理现状的基础上,从太空活动行为准则的制定、太空国际合作的深入、太空军备竞赛的规制三个层面解读奥巴马政府的新版太空战略,并探讨其深层次的动因与影响,进而为中国参与太空领域的全球治理提供有益的理论支撑与现实参考。  相似文献   

2.
丁冉 《中国军转民》2023,(23):101-103
现今,一个国家的太空技术发展已成为国家地位和影响力的重要象征,中东国家也正在努力争取在太空领域中获得优势地位。目前中国与阿联酋以及沙特等国的太空合作渐入佳境,这些范例向我们展示了中国与中东国家太空合作的广阔前景。尽管随着美国注意力转向印太地区,中东国家也积极的实施在大国之间多面下注的新型外交战略。但鉴于太空合作的特殊性以及国内外局势的复杂性,中东与中国的太空合作仍受到自身对西方的依赖性、太空合作的竞争性以及内部的多重发展矛盾的影响。  相似文献   

3.
我国经济社会的持续快速发展带来了国家利益的不断拓展,要求国防经济建设从关注生存利益转向关注与维护国家发展利益、从关注三维国家主权转向关注多维国家主权、从关注传统安全领域转向关注日益多元的安全威胁。适应这些要求,在战略指导上,应坚持国防经济与国民经济相协调,实现从"生存型"向"生存+发展型"的转变;在战略目标上,坚持以信息化建设为牵引,强调"遏制"和"打赢"并重;在战略部署上,兼顾未来军事斗争需要,重点提高维护海洋、太空和电磁空间安全的能力;在战略手段上,坚持走军民融合发展路子,强化应对多样化的军事行动任务的能力。  相似文献   

4.
太空被视为俄罗斯的国家总体实力与军事实力的象征。维护太空安全与太空力量的平衡,成为俄罗斯国家战略考虑的问题。面对美国太空武器化的政策,为保证其进出太空的自由和其太空战略利益,俄罗斯对此做出回应。一方面,联手中国等国家呼吁国际社会限制太空武器化;另一方面谋求“非对称反击”手段,发展相关反制武器,不让美国在太空武器领域一枝独秀。  相似文献   

5.
支撑国家利益拓展的战略性关键技术发展思考   总被引:1,自引:1,他引:0  
陈勇  孙智信 《国防科技》2006,(11):17-21
本文围绕国家利益拓展需求,分别考察了海洋、太空、电磁空间面临的挑战,分析了各领域的技术体系,提出了优先和重点发展的战略性关键技术。试图为国家和军队制定武器装备和国防科技发展战略与规划提供参考。  相似文献   

6.
随着高新科技的迅猛发展及其在军事领域的广泛运用,传统的陆海空三维战场己远远不能容纳所有的军事行动,战争的触角不断向新的领域延伸,并由此产生了诸多新型战场。由于新型战场的出现,使现代战争的形态发生了深刻的变化,并呈现出许多新的特点。 得天独厚的太空战场。太空作为新世纪军事上的制高点,己成为维护国家安全和国家利益必须关注和占据的战场空间。  相似文献   

7.
近几年来,俄军根据国家安全面临的新威胁和新挑战,积极贯彻落实军队建设新的指导方针,加强了军队训练,尤其是军事演习的力度。俄军通过演习不但检验了其部队近年来的训练成果和遂行战斗任务的能力,而且向世界展示了其加速推进军事改革日益恢复军力的决心和能够击退来自任何方向、地区威胁的信心,表现出对入侵者决不手软坚决捍卫国家安全和利益的强硬魄力。纵观其近年数以百次的演习,主要有以下六个显著特点:一、重视空中——太空作战的探索,竭力夺取制天制空权俄军认为,未来军队集团的军事行动往往将从空中——太空作战开始,能否有效抗击敌…  相似文献   

8.
“公用空间”是指不属于任何单一国家的和充当全球多数国家共同通道的领域。控制权并不意味着其他国家无法在和平时期使用公用空间,也并不意味着其他国家不能获得军事资源,以便在没有美国阻碍的情况下穿越甚至开发这些区域。但控制权的真实含义是,美国在军事上利用海洋、太空和空间的能力要比其他国家大得多;它能够令人信服地发出剥夺其他国家对公共空间使用权的威胁;其他国家如果企图阻止美国使用公共空间,就会在争夺公用空间的军事冲突中遭受失败。  相似文献   

9.
“太空安全战略”专题编者按 组稿专家:杨乐平(国防科技大学空天科学学院教授、博士生导师) 近年来,以美国重建太空司令部与天军独立为标志,国际太空领域战略竞争与军事对抗日益加剧,太空前所未有地应用于军事与安全,太空安全也受到了前所未有的挑战。为了解未来太空安全发展和主要国家太空安全战略动向,深化太空安全战略研究,《国防科技》编辑部于2021年6月启动“太空安全战略”专题征文活动,国内相关学者积极投稿,经专家遴选,本期发表入选稿件6篇。来稿内容涵盖未来30年太空安全发展预测、美国太空安全最新发展、俄罗斯太空安全政策、欧盟太空安全政策、日本太空安全战略以及印度太空力量发展等主题,较为全面地反映了当前国际太空安全领域的最新发展与战略动向。从长远看,随着地球以外人类活动的增加、太空新经济蓬勃发展和太空创造财富规模不断扩大,水平大幅提升,太空将超越陆、海、空成为国家安全最重要的领域。从这个意义上讲,太空安全战略研究学术价值与影响较大,值得高度关注。  相似文献   

10.
《中国军转民》2010,(10):48-55
没有巩固的国防必然遭受侵略,没有强大的军队就会任人宰割。面对国家安全形势的新发展新变化,面对维护国家安全利益的新问题新挑战,我们要避免历史悲剧的重演,就要不断增强忧患意识、责任意识和使命意识,全面提高我军应对多种安全威胁、完成多样化军事任务的能力,  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

14.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

18.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号