首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The article discusses the disconnect between arms control and disarmament practices vis-à-vis peacebuilding practices. It critically analyzes Disarmament, Demobilization, and Reintegration (DDR) practices focusing on their absence of dialogue with international arms control and disarmament (ACD) practices. It proposes that a conversation between experts involved in these distinct practices could promote a political discussion on the place of weapons held by state and non-state actors in times of peace. The argument is illustrated through an analysis of the treatment of rules on weapons in the Colombian peace process (2012–present) with the Revolutionary Armed Forces of Colombia (FARC). The article concludes that the disconnect between the arms control and disarmament and the peacebuilding associations, as seen in the context of DDR practices, reinstates the rule on the monopoly of violence by the state, preventing a broader discussion of the role of weapons and violence in the building of political communities.  相似文献   

2.
From 1965 to the present, Colombia has been confronted by the insurgency of the Revolutionary Armed Forces of Colombia (FARC). The threat reached a new level in 1996 with the advent of mobile warfare, whereby large units sought to neutralize the military in an effort to seize power and institute a Marxist-Leninist regime. Unlike Vietnam, what followed was a regaining of the strategic initiative by the government and a decimation of the insurgent threat. This was accomplished with US assistance but from first to last was driven by Colombian leadership and strategy. The strategy which led to this signal change, ‘Democratic Security’, unfolded under the leadership of President Álvaro Uribe. It was a civil–military partnership, which sought to expand the writ of Colombian democracy to all elements of society. Securing the population provided the shield behind which economic, social, and political life could occur as driven by the will of the people. It was the agreement upon legitimacy as the strategic goal and reform as the route to that goal which allowed the Colombians and the Americans to work so well together.  相似文献   

3.
Theory on the use of information technology in military operations assumes that bringing together units in an information network helps units to work together. Decentralized command systems such as mission command have been proposed for these networks, so that units can adapt to changes in their turbulent working environments. Others have proposed centralized command systems that permit higher organizational levels to closely direct military operations. This article uses Perrow’s (1984, 1999) Normal Accidents Theory to propose that increasing interdependencies between units in information networks places incompatible demands on the design of networked military operations. It is concluded that networked military operations require decentralized command approaches, but only under the condition that interdependencies between modules of networked units are weak rather than tight. This precondition is essential for retaining control over networked military operations.  相似文献   

4.
How do countries transition from single service to joint operations? This article engages with the discussion on military innovation to argue that civil–military relations are the most important driver for jointness. In doing so it examines jointness in the Indian military. Relying on archival research and primary interviews this article sheds new light on the operations of the Indian Peacekeeping Forces (IPKF) in Sri Lanka from 1987–1990, the 1999 Kargil War and the Post-Kargil defence reforms. The main argument is that the Indian military’s transition to jointness has been ‘incomplete’ primarily because of its prevailing model of civil-military relations. This model prevents civilians from interfering in the operational issues of the military, including on matters pertaining to jointness. It therefore recommends more forceful civilian intervention to overcome the prevailing single service approach.  相似文献   

5.
网络中心环境下的军事通信网络是一个多重边异构的人工功能网络。为了分析、设计和构建网络中心环境下的军事通信网络,通过扩展、综合Jeff的作战网络模型和Hans的网络兵力参考模型,提出了一种能够清晰描述网络节点功能和链路传输类型的军事通信超网络结构模型,给出了模型的数学描述,并说明基于它可将军事通信网络分解为多个具有军事特征的功能子网或专业通信网。最后通过分析某联合作战部队通信的超网络结构特征,验证了模型的有效性。  相似文献   

6.
Abstract

A tremendous amount of important work has been done recently on operationalising the protection of civilians as a military task. The bulk of the discussion has focused on how militaries should respond to direct attacks on civilians. This is an important issue, but thinking about civilian protection should also include a serious examination of the ways in which the approach of military organisations to the problem of ‘spoiler’ groups can affect the level and dynamics of attacks on civilians – importantly, where armed groups are interested in violent control of civilian populations, attempts to ‘dislodge’ them from areas of control may substantially increase the level of violence against civilians (beyond the dangers to be expected from being near areas where active fighting is taking place). In 2009, the United Nations mission in the Democratic Republic of Congo (MONUC) supported the Congolese military in operations to dismantle the Hutu-dominated FDLR (Forces Démocratiques de Libération du Rwanda, Democratic Forces for the Liberation of Rwanda) militia group, at massive human cost. Critics have primarily focused on MONUC's failure to protect civilians from direct attack, consonant with the general discourse on tactics for civilian protection. These criticisms are valid, but in this paper I argue that two crucial additional considerations should be kept in mind: the way that military operations can affect violence against civilians, and the way that moralising the approach to armed groups, even those which have committed serious abuses, can limit military and political options – potentially in ways that increase civilian risk in the name of protecting them.  相似文献   

7.
What organisational attributes enhance a military’s ability to effectively adapt on the battlefield? Upon the outbreak of war in July 2014 between Israel and the Palestinian militant group Hamas, the Israel Defense Forces (IDF) encountered an expansive network of tunnels from which Hamas was launching large-scale assaults into Israel. This article illustrates that the IDF’s ability to successfully adapt ‘under fire’ to this battlefield surprise was facilitated by several important attributes related to its organisational learning capacity: a dynamic, action-oriented organisational culture, a flexible leadership and command style, specialised commando units which acted as ‘incubators’ for learning and innovation, and a formal system to institutionalise and disseminate lessons learned.  相似文献   

8.
This contribution looks at the role of Special Forces in anti-terrorist operations with particular emphasis on the British Special Air Service. It argues that Special Forces have played a pivotal role in such operations since the era of Palestinian terrorism in the early 1970s. The essay looks at the operations in Afghanistan leading to the overthrow of the Taliban in 2001 and shows that the seven Special Forces involved there proved crucial to the success of the limited ground forces. In particular they served a valuable force multiplier by acting as a nexus between the regional warlords and the use of air power as well as mobile strike units against fortified Al Qaeda and Taliban positions. In the latter instance their success was mixed, involving attacks on difficult cave hideouts, though overall it can be concluded that Special Forces have demonstrated their capacity in fighting unconventional warfare against mobile and transnational terrorist groupings.  相似文献   

9.
10.
The following article aims to examine current counter-insurgency (COIN) strategy in Afghanistan to posit an untried theoretical concept of operations for the war being waged there. By doing so it shall argue that Coalition and NATO forces operating there may be required to fundamentally recast Afghan war-policy if a resurgent Taliban and Al-Qa'eda are to be countered in both the military and political spheres of present day Afghanistan. By way of strategy this article shall posit that a more optimal strategy in Afghanistan, in light of the campaign's apparent difficulties, might be to seed local security apparatuses, designated herein as ‘Rural Paramilitary Forces’.  相似文献   

11.
基于复杂网络的作战网络分析   总被引:1,自引:0,他引:1  
分布式网络化作战是网络中心战的基础,而分布式作战网络的构建是网络化作战的重要前提。首先,运用复杂网络的相关参数分析了多种不同的网络,选择了BA非标度网络作为分布式作战网络的最优表现形式;其次,以BA非标度网络为基础提出了一个适合军事上动态鲁棒性分析的模型DCNCE;最后,仿真结果表明,在以网络效能值为测度的对比下,分布式作战网络在介数毁伤策略下更脆弱,为构建并改进现有的作战网络提供了理论依据。  相似文献   

12.
Contemporary network organizational structures have gradually developed over the last decades of the twentieth century. These new structures are challenging the traditional hierarchical structure form in a number of venues. In conflict and war, they made their potentials unequivocally known on 11 September 2001 via Al Qaeda's strategic suicide bombings against the United States. To better understand the military potentials of networks, an operational combat analysis of the Al Qaeda network was conducted. This analysis, a modification of weapons systems analysis, focused on network speed, along with offensive, defensive and combat multiplier attributes. Such analysis allows for a better understanding of the military capabilities and vulnerabilities of non-state OPFORs (opposing forces) and our own emergent counter-insurgency networks.  相似文献   

13.
数据通信是后勤领域应用系统中亟待解决的重要问题.大部分接入军事综合信息网的单位,可利用该广域网,采用JMS消息服务技术,实现分布式系统数据通信.尚未接入军事综合信息网的单位,可以依托专用CDMA无线通信网络,该网络覆盖面广,通信可靠,建立迅速,维护费用低,能够实现安全、及时地传输业务数据.两者结合,将构成一个全方位、一...  相似文献   

14.
通信网络和组网技术是实施网络中心战的重要环节。综合论述了美军当前正在发展的,适合于各级指挥机构和作战单位使用的、不同规模的最先进军用通信网络系统和新的网络通信技术,并就当前情况下我军通信网络的建设问题提出了一些建议。  相似文献   

15.
The question of what enables some militaries to innovate effectively is of great interest to both scholars and commanders. However, the traditional models of military innovation fail to capture the complex innovation process. This study develops a new analytical framework that examines the pressures on and incentives for military innovation in the international, civil/military, organizational, and cultural planes and uses it to evaluate Israel Defense Forces (IDF) innovation between 2000 and 2009. Based on interviews with Israeli commanders and extensive research in Israel, this work finds that the IDF struggled to innovate before the 2006 war against Hizballah, but innovated effectively after the conflict once military and civilian leaders understood threats similarly. New models are needed to analyze the contemporary multi-dimensional innovative process.  相似文献   

16.
The special operations forces (SOF) of the industrial democracies have suddenly and rapidly grown in numbers and resources during the past decades. Most explanations for this growth focus on factors external to the armed forces. We argue that the enlargement of SOF is also the result of internal organizational dynamics. First, we compare SOF to other units and military appendages that have grown over the past 30 years in order to delineate what is unique to their development and the special adaptive potential they bring to the armed forces: generalized specialization, boundary spanning roles, and enlargement of military autonomy. Second, we analyze the actions of internal military entrepreneurs and their organizational mentors to show how they use this adaptive potential to “sell” the use of SOF to key policy-makers and decision-makers.  相似文献   

17.
短波跳频电台组网在军事通信中占有重要地位,组网应用可以提高跳频电台的抗干扰性能.介绍了跳频通信的特点及抗干扰性能,分析了短波跳频通信技术的发展趋势.短波跳频电台组网可以提高通信的可通概率与战术应用的灵活性,为此着重研究了短波跳频电台组网的原理与方法以及组网的注意事项,为军事短波跳频电台的组网应用奠定基础.  相似文献   

18.
随着互联网对现实世界的影响越来越大,战略地位越来越突出,获得网络主导权、占据网络制高点成为各国竞相努力的目标。美国在全球网络管理、网络技术、网络文化、网络军事等方面处于霸主地位。美国网络霸权对中国的政治安全、信息安全、文化安全、军事安全造成了极大的威胁。中国应综合采取各种措施,应对美国网络霸权的冲击和挑战,维护国家安全和利益。  相似文献   

19.
Military transformation is a complex, slow, asymmetric, changeable, political, and not necessarily completely rational process that clearly needs an effective monitoring mechanism. This paper fills a gap in current literature by creating and testing a model for multi-dimensional and multi-level quantitative monitoring of military transformation applicable in any country. The model is based on 10 transformation indicators that reflect changes in organizational structure, personnel structure, weapon systems, and defense spending. Its application on a sample of seven countries (USA, United Kingdom, France, Netherlands, Poland, Russia, and China) in the period from 1992 to 2010 unexpectedly shows that the USA – a protagonist in the transformation process among allies as well as globally – has carried out the smallest relative change. The non-directed transformation index indicates that Russia carried out 51.8% more change (or 34.1 index units), and the directed index indicates that Poland carried out 157.2% (or 40.8 index units) more change than the USA.  相似文献   

20.
In this paper, we examine the current state of knowledge in the economics literature on the conduct of reconstruction activities in Iraq and Afghanistan. As stabilisation and reconstruction missions grow in importance for units deployed to these regions, it becomes more important to understand what activities can promote economic growth at the local level. While military operations focus on interdicting the insurgency, successful counter-insurgency campaigns have typically addressed the conditions conducive to the insurgency. Mitigating the incentives for individuals to participate in an insurgency is imperative. Well-crafted and timed reconstruction activities can, we argue, attenuate these incentives.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号