首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   

2.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   

3.
4.
5.
The ultimate goal of Iran's nuclear programme remains uncertain. While the nuclear reactor of Bushehr has finally been connected to the power grid, the nuclear fuel enrichment activities and their location cause concern to the international community. Thirty years of nuclear investments demonstrate a negative cost–benefit analysis: technical constraints and economic and infrastructural requirements constitute a burden on the implementation of a nuclear programme. This article analyses the economic, legal, technical and political aspects of the Iranian programme in order to uncover its civil and/or military finality.  相似文献   

6.
7.
8.
This article explores how armed forces in EU member states work with and view social media in national and international settings, and what the patterns of convergence/divergence are on these issues. To that end, a questionnaire targeted at EU armed forces was constructed. An index of qualitative variation was calculated to explore the relative convergence among respondents (n = 25) on issues of risks and opportunities with using social media nationally and internationally. Consistent with previous research on European armed forces, we found higher levels of divergence than convergence. Contrary to our expectations that similar challenges, joint international standards, and membership in international organizations would foster convergence with regard to social media use in areas of deployment, we found that convergence appeared foremost pertaining to the domestic level. Policy divergence was strongest in areas of deployment.  相似文献   

9.

Plunder and trade are theoretically and historically entwined in complex ways. This paper examines when rational players will choose one or both by employing a model of plunder within an evolutionary game theoretic framework. Evolutionary stable strategy equilibria are derived and the replicator dynamics are examined for simple two-by-two symmetric games. Not only are positive defense allocations necessary for trade, implying that all trade is of a contested nature, but the defense technology must also exhibit sufficient effectiveness relative to the plunder technology. A continuum of possible exchanges is proposed that is based on the effectiveness of enforcing property claims. For high levels of transactions costs, plunder dominates. As transactions costs decline, mutual trade emerges as one possible exchange mechanism. All market exchange entails some cost of enforcement; it is contested. Insufficient enforcement of property claims produces mutual plunder as the dominant exchange mechanism. Some implications are suggested for institutional evolution. C7 K4 N4  相似文献   

10.
Scholars have expressed doubts about the ability of counterterrorism to cope with suicide bombings, resulting in tit-for-tat or loop-like and repetitive violence and counter-violence without meaningful, let alone decisive results for the stronger side. Such skepticism may explain why so much of the recent literature on terrorism and insurgency is focused on the factors motivating the challenger rather than upon the insurgent's capabilities. This article demonstrates the extent to which Israeli offensive measures have reduced considerably the impact of Palestinian violence on the Israeli protagonist corroborating research that counterterrorism should adopt an offensive escalating strategy against the insurgent.  相似文献   

11.
This article examines the ambiguous role played by the Cyprus Police Force during the Greek Cypriot insurgency against Britain between 1955 and 1959. A multiethnic force policing a multiethnic society, the CPF struggled to fulfill its duties. Greek Cypriot officers became ineffective as sympathy for, or fear of insurgents undermined their ability to function. Some collaborated, others resigned. Those who stayed became targets of their own people. Turkish Cypriot officers, recruited in greater numbers to compensate for a reduction in Greek Cypriot officers, worked to enforce the law, but exacerbated intercommunal relations in doing so. In spite of the peculiar conditions present in Cyprus, the case has valuable implications for contemporary policymakers on the vulnerabilities inherent in the use of local police forces to restore law and order in ethnically divided societies.  相似文献   

12.
ABSTRACT

Attempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar.  相似文献   

13.
ABSTRACT

Traditionally the African concept of security concept has been dominated by land-based conflicts with little attention being paid to maritime threats and the protection of the maritime environment. With the rapid escalation of piracy on the East Coast, the African Union (AU) was compelled to develop a joint strategy to address its changing African Maritime Domain (AMD). This was achieved by the AU’s Africa’s Integrated Maritime Strategy (AIMS 2050) in 2014, culminating in the adoption of a binding maritime security and safety charter in Lomé in 2016. The Lomé Charter should ideally focus the general provisions of AIMS 2050 so that Africa, as a continent, can take responsibility for security and economic empowerment of the AMD. This article considers various maritime security documents against the backdrop of an African context for understanding maritime security, in order to evaluate whether the Lomé Charter, as a manifestation of AIMS 2050, will realise its aspirations. Focussing on security is not sufficient and too much emphasis is placed in the Lomé Charter on restriction rather than development. Strong political will and leadership is required to facilitate implementation, identifying common security concerns to ensure better cooperative and collective strategies in a diverse implementation environment.  相似文献   

14.
Catherine Andreyev, Vlasov and the Russian Liberation Movement: Soviet Reality and Emigre Theories. Cambridge: Cambridge University Press, 1987. Pp.251; $34.50.

Sergej Froehlich, General Wlassow: Russen und Deutsche zwischen Hitler und Stalin (revised and edited by Edel von Freier). Koeln: Markus Verlag, 1987. Pp.403; DM.39.80.

Joachim Hoffmann, Die Geschichte der Wlassow‐Armes. Freiburg: Verlag Rombach, 1986. Pp.468; DM32.  相似文献   

15.
This article argues that the history of irregular warfare provides a valuable analytical and critical perspective for the study of counterinsurgency campaigns and counterinsurgency doctrine. A focus on the history of irregular warfare highlights the close relationship between warfare in Europe and in the colonies. Moreover, it enables us to identify more exactly the intersection of multiple factors that lead to an escalation of violence in small wars. Finally, it also sheds light on the lack of strategic reflection on the use of irregular auxiliaries that is characteristic for many counterinsurgency campaigns.  相似文献   

16.
Rendezvous search finds the strategies that players should use in order to find one another when they are separated in a region. Previous papers have concentrated on the case where there are two players searching for one another. This paper looks at the problem when there are more than two players and concentrates on what they should do if some but not all of them meet together. It looks at two strategies—the stick together one and the split up and meet again one. This paper shows that the former is optimal among the class of strategies which require no memory and are stationary, and it gives a method of calculating the expected rendezvous time under it. However, simulation results comparing both strategies suggest that in most situations the split up and meet again strategy which requires some memory leads to faster expected rendezvous times. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48:710–721, 2001  相似文献   

17.
18.
19.
The public expects European governments and the European Union (EU) to deal with the security challenges in and around Europe. So does the US, whose strategic focus has pivoted to the Pacific. Washington, DC has made it clear that it will not, and cannot, solve all of Europe’s problems. The call for ‘strategic autonomy’ in the new EU Global Strategy of June 2016 does not come a moment too soon. But should the aim be EU strategic autonomy, without the UK, or can the aspiration still be European strategic autonomy, with the UK? Can nothing be achieved unless all are fully involved? Or are intermediate solutions possible? How EU Member States and the UK answer these questions will determine which degree of strategic autonomy the EU can achieve. With which degree of British involvement. And whether the UK itself will be left with any measure of strategic autonomy.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号