首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.”  相似文献   

2.
Adopting the analytical framework of the established interpretive “schools” of Anglo-American relations, this article offers several reflections on UK–US defense relations as they occurred over the significant years of 2000–2005. During those years, trajectories were established on which UK–US defense relations continue to travel today and outcomes emerged which are still being navigated. This article concludes that the Latin phrase, “Flectas Non Frangas” (essentially translated as: “Bend not Break”), is the most appropriate to adopt to characterize the developments undergone in recent UK–US defense relations. Many historical and strategic lessons with contemporary relevance are drawn.  相似文献   

3.
It is shown that the Banzhaf value can be obtained by differentiating the multilinear extension of a game at the midpoint of the unit cube. This gives us a composition theorem for the value of compound games. As an example, the values of the electoral college and presidential election “games” are approximated by the method of extensions.  相似文献   

4.
The basing of ICBMs is a fundamental problem of defense analysis. Deceptive basing and antiballistic missile defense are two of the methods available to attempt to insure that there are ICBMs surviving after undergoing an attack. This article treats tradeoffs among missiles, silos or shelters, exoatmospheric interceptors, and endoatmospheric interceptors. Most of the analysis deals with 200 missiles, the number of MX missiles which were recommended to be moved among the 4600 shelters of the Multiple Protective Shelter (MPS) deployment, though some variants in the number of missiles (from 115 to 400) are also treated here. The basic reference point of the analysis is the provision of 1000 ICBM warheads delivered in a second strike. The combination of exoatmospheric interceptors and endoatmospheric interceptors is referred to as “layered defense.” Warheads are destroyed by interceptors after the warheads separate from the missile which carries them. Exoatmospheric interceptors are assumed to achieve a non-nuclear kill, while endoatmospheric interceptors are assumed to achieve either a non-nuclear or nuclear kill, depending on the technology available to both sides. Exoatmospheric interceptors may be capable of protecting value targets against the warheads of a second strike. To the extent that this can be achieved, they facilitate a first strike with relative impunity and hence are destabilizing. This article explores various layered defense topics.  相似文献   

5.
The games of economic survival introduced by Shubik and Thompson seem tailor-made for the analysis of some problems in insurance and have found many applications in this industry. The optimal strategy in such games may be a so-called “band strategy.” This result seems counter-intuitive and has caused some puzzlement. This paper gives sufficient conditions so that the optimal strategy will be of a simpler form, and it is argued that these conditions are satisfied in most applications to insurance.  相似文献   

6.
Under the administration of President George W. Bush, Pentagon rhetoric has increasingly articulated a more robust vision of space as a future battlefield. This analysis details some of the ongoing spending for research and development programs identified in current U.S. Air Force, Missile Defense Agency (MDA), and Defense Advanced Research and Planning Agency (DARPA) planning and budget documents related to “space control” and “space force projection.” This analysis finds that current support for “space superiority” and “space control” systems remains largely rhetorical—with little actual budgetary support. Unclassified technology development programs included in the six-year Future Years Defense Plan are a decade or more away from deployment. Programs related to offensive counterspace, space-based missile defense interceptors, and space-based strike total slightly less than $300 million in FY 2006 funding. We conclude significantly higher expenditures in research and development would be required to develop and deploy killer micro satellites, space-based missile defense interceptors, and military space planes.  相似文献   

7.
The defense establishments of all major powers are changing to reflect changes in the foundations of national security strategy and resource allocation. The authors believe economists should play an active role in formulating these changes and offer an orientation to the U.S. debate, presenting three major alternatives: the “Base Force” (Bush Administration), Mr. Aspin's Force “C,” and the “Low” Alternative (Prof. Kaufmann and Dr. Steinbruner). These alternatives are compared using first‐order measures of capabilities, budgets and risk. Budgetary estimates are based on newly‐developed analytical tools.  相似文献   

8.
This work is concerned with constructing, analyzing, and finding “mobility chains” for bimatrix games, sequences of equilibrium points along which it is possible for the two players to progress, one equilibrium point at a time, to an equilibrium point that is preferred by both players. The relationship between mobility chains and Nash subsets is established, and some properties of maximal Nash subsets are proved.  相似文献   

9.
The goal of this article is to challenge the assumption of rationality in the behavior of decision-making units involved in security, defense, intelligence and warfare and to consider the influence of “motivated bias” in such instances. A review of motivational literature within international politics and a discussion of literature applying “motivated biases” to warfare and strategic surprise will offer an alternative view of the primacy of rationality in such decisions.  相似文献   

10.
Public opinion survey responses regarding the desirability of changes in defense spending can be compressed into a single variable, the public opinion balance, which, when accompanied by a control variable measuring the proportion of responses in the “residuum” (no opinion or keep the status quo), permits an accurate prediction of subsequent changes in the rate of change of U.S. defense outlays from the mid‐1960s through the 1980s. This finding cannot be interpreted as a simple case of “the public got what it wanted,” however, because public opinion was not autonomous or spontaneous, and defense decision makers themselves played a central role in shaping public opinion.  相似文献   

11.
This paper explores whether defense contractors' manufacturing technology advantages over purely commercial firms might be associated with differences in their workforce and organizational practices. It uses unique original data collected specifically to test workforce and organizational complementarities in implementation of advanced manufacturing technology in small manufacturers. Findings are that defense contractors: (1) have higher and deeper rates of advanced manufacturing technology use; (2) have greater perceived success in achieving manufacturing goals; (3) are more likely practitioners across a diverse spectrum of advanced workforce and organizational practices. Then, (4) econometrically, the defense contractors' higher reported levels of achievement in implementing advanced manufacturing technologies are positively associated with those organizational and workforce practice differences.  相似文献   

12.
The purpose of this paper is to analyze the defense interdependence between Japan and the United States (US) in the short and long run and to investigate whether Japan is a follower or a free rider of the “US” over the 1975–2009 period. Given that mutual aid between Japan and the US has been maintained, the empirical results suggest that Japanese defense has a stable relationship with US defense. Furthermore, the results reveal that Japan is not a free rider but rather a follower in the period under consideration.  相似文献   

13.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   

14.
This article analyzes the public side of the NH90 network consisting of four participating countries (Germany, France, Italy, and the Netherlands) and their industrial partners. Comparable to observations in earlier international projects in the defense sector, the development and production of the NH90 defense helicopter did not match original plans and costs estimates. On the basis of four mechanisms that were intended to facilitate the cooperation between the partnering countries (the General Memorandum of Understanding; coalition formation; the role of the central agency; and the process of vertical escalation) the question is posed whether or not there was a true alignment of national interests and “logics.” The lack of standardization, as well as program delays and issues concerning the division of the work-share, lead to the emerging alignment being characterized as “quasi-alignment” at best.  相似文献   

15.
Efforts toward developing an independent and credible Philippine defense policy were revived when Benigno Simeon C. Aquino III was elected President of the Philippines in 2010. President Aquino renewed the military modernization program in 2012 and emphasized the necessity of a “minimum credible defense posture.” Given the modernization efforts of the government, this article aims to contribute to the development of the concept of minimum credible defense posture by exploring how theory contributes to defense planning. It argues that the contexts of strategy are useful in planning for national defense because these contexts can provide a conceptual framework for defense planners. It proceeds in three parts: the opening section reviews the literature on defense planning; the second surveys the context of developing strategies as discussed in the General Theory of Strategy; and the last provides a definition of minimum credible defense and applies the context of developing strategies to the case of the Philippines.  相似文献   

16.
The US government initiated a Defense Counterproliferation Initiative to address the concern that, in the post-Cold War years, the proliferation of nuclear, biological, and chemical weapons would be widespread and create a significant challenge to the US military’s combat operations. In particular, non-nuclear states might use chemical or biological warfare agents against US forces with the belief that nuclear weapons would not be used against them in retaliation. Following the events of September 11, 2001, defense strategy and policy shifted to a wider view of the threat of adversarial use of “weapons of mass destruction” (WMD) and the term “counterproliferation” was replaced by “combating” or “countering WMD.” Over time, the Defense Department increasingly moved away from counterproliferation principles with the detrimental effect of losing capabilities that US forces still need for contemporary adversaries. This shift has been aggravated by other US government agencies’ use of “counterproliferation” in lieu of what would have been termed “nonproliferation” activities in the 1990s. The loss of clarity within the US government on these terms has led to the inability to focus the “whole of government” on this significant national security challenge. To alleviate this challenge, the US government needs a top-down initiative to refocus policy on the distinctly different aspects of WMD with respect to military combat operations, combating terrorism, and homeland security.  相似文献   

17.
An area to be defended consists of separated point targets. These targets are subject to an attack in which the offensive weapons are assumed to arrive simultaneously. The defense has area defenders, each of which is capable of intercepting any attacker. The defense has no impact-point prediction; that is, it has no knowledge of any attacker's destination prior to allocation of area interceptors. For a given attack, the defense wishes to allocate its interceptors to maximize the total expected survival value of the targets. For a given attack size, the offense seeks a strategy to minimize total expected surviving value against best defense. We determine an optimal defensive strategy directly and develop an algorithm to determine an optimal attack and the optimal value of the min-max problem. A dynamic programming technique is used to obtain integer solutions, and illustrative computational results are provided.  相似文献   

18.

This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense.  相似文献   

19.
This paper presents a model for choosing a minimum-cost mix of strategic defenses to assure that specified production capacities for several economic sectors survive after a nuclear attack. The defender selects a mix of strategic defenses for each of several geographic regions. The attacker chooses an allocation of attacking weapons to geographic regions, within specified weapon inventories. The attack is optimized against any economic sector. This formulation allows the defense planner the capability to assess the results of the optimal defense structure for a “worst case” attack. The model is a mathematical program with nonlinear programming problems in the constraints; an example of its application is given and is solved using recently developed optimization techniques.  相似文献   

20.
An area to be defended consists of separated point targets. These targets are subject to an attack in which the offensive weapons are assumed to arrive simultaneously. The defense has area defenders, each of which is capable of intercepting any attacker'. Furthermore, the defense has impact-point prediction, i.e., it has knowledge of each attacker's intended target prior to allocation of the area interceptors. For a given attack, the defense wishes to allocate its interceptors against attackers so as to maximize the expected total survival value of the targets. In its first move, the offense seeks an attack allocation which will minimize expected total surviving value against best defense. We develop an algorithm to determine optimal attack and defense strategies and the optimal value of this sequential min-max problem. Branch-and-bound techniques are used to obtain integer solutions, and illustrative computational results are provided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号