首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper underscores the theory that efficacious law enforcement intelligence addresses current problems of criminal insurgency including acts of terrorism, asymmetric warfare and low intensity conflict, and suggests possible solutions. By introducing the notion of crime as insurgency, a new paradigm may be developed that could assist practitioners and academics alike in analyzing, solving and managing crime. By shifting the perspective for both military and civilian forces from their traditionally reactive stance, to a proactive posture, and merging national security with homeland defense on the most perplexing issues and threats facing US security, this work may provide a base upon which new and actionable policies can be designed. Public administrators must take seriously the lessons from past failures. The single most important supposition being, sound policy is reliant upon good intelligence.  相似文献   

2.
美国作为较早受到恐怖主义威胁的西方发达国家,自20世纪70年代逐渐发展起了一套完善的执法体系,并积累了成熟的执法经验,特别是信息化时代背景下,美国执法部门的反恐斗争渗透着强烈而鲜明的信息情报色彩,是“情报导侦”理念和模式的现实体现,为我国执法与行动部门提供了一定的经验。其中的“威胁评估”综合情报分析模式是美国反恐情报工作的典型代表,对于预防恐怖主义犯罪起着特殊的作用。  相似文献   

3.
The nature of crime and conflict is rapidly evolving. Postmodern war is increasingly influenced by non-traditional and irregular combatants: non-state soldiers. These actors are exploiting technology and networked doctrine to spread their influence across traditional geographic boundaries. This emphasis on non-traditional actors accompanies a shift in political and social organization. This shift may well be a shift in state form: from nation-state to market-state. This transition is fueled by rapid developments in technology and the adoption of network organizational forms. Conflict during this transition blurs the distinctions between and among crime, terrorism and warfare. This essay explores the dynamics of terrorism, crime and private armies during this epochal shift.  相似文献   

4.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   

5.
Politics is critical to making sense of Pakistani successes and failures in dealing with non-state armed groups. This includes domestic political currents; regional political currents; and the global impetus of the post-9/11 era. How these currents overlap renders to any reading of insurgency in Pakistan real complexity. This article engages with this complexity rather than shirking from it. Its hypothesis is that while the insurgency bordering Afghanistan has been an epicentre of Pakistani military efforts to fight the Taliban, this theatre is in of itself insufficiently inclusive to grasp the nature of Pakistan’s security challenges and its consequent responses.  相似文献   

6.
Traditionally regarded as a secondary activity in military thinking and practice, the notion of counter-insurgency (COIN) has undergone a remarkable renaissance. This analysis traces the origins of this renaissance to two distinctive schools: a neo-classical school and a global insurgency school. The global insurgency school critiques neo-classical thought and presents itself as a more sophisticated appreciation of current security problems. An examination of the evolution of these two schools of counter-insurgency reveals how the interplay between them ultimately leaves us with a confused and contradictory understanding of the phenomenon of insurgency and the policies and strategies necessary to combat it.  相似文献   

7.
At a senior officials' meeting held in Algiers from 11–14 September 2002, the African Union proved ready and able to provide the political cohesion and sense of purpose needed for Africa to combat terrorism. While member states inevitably played to a global gallery in demonstrating their commitment to the ‘war on terrorism’, the practical counter-terrorist proposals adopted at the meeting substantially address Africa's security challenges. The resulting Plan of Action on the Prevention and Combating of Terrorism focuses on state building and inter-governmental co-operation, to literally and figuratively close Africa's borders to terrorist activities. Implementing the plan will be a tough challenge for many African governments, especially to ensure that their counter-terrorist measures adhere to international and regional human rights accords.  相似文献   

8.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   

9.
近年来以“东突”为主的恐怖势力在新疆边境地区活动十分猖獗,呈现出联合,渗透对象多元、低龄等特点。公安边防部队地处边境一线,任务艰巨,责任重大,要通过加强反恐情报建设、健全装备保障体制、加强战法研究与战术训练、加强边境管理以及加强国际警务合作等多种对策,不断提高部队打击和防范恐怖活动的能力与水平,为维护边疆稳定做出贡献。  相似文献   

10.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

11.
This chapter examines how Al Qaeda, an asymmetric power, was able to become a global challenger to the existing international structure. Neither regional insurgency theories nor grand-scale global theories alone are adequate to explain Al Qaeda's ability. Rather, a modification of the seven dimensions of the Manwaring paradigm for successful insurgency combined with key concepts of global revolutionary or imperial powers formerly applied to states gives insight to this fundamental question. Al Qaeda's asymmetric global challenge is unique, and understanding the nature of the threat is key to finally defeating it.  相似文献   

12.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   

13.
The Pakistani security forces have won their fight against the insurgency of the Pakistani Taliban, though terrorism will remain a serious problem for the foreseeable future. Victory was won not chiefly on the basis of new tactics, but of the recovery of legitimacy for the campaign among the population and the armed forces. This occurred when the war came to be seen as one waged not in the interests of the USA, but for the defence of Pakistan. In Balochistan, the nationalist insurgency has been different from and weaker than that of the Taliban—but may prove longer lasting. Military tactics in Balochistan have closely resembled those of the British Raj, and have been based with some success on fomenting tribal divisions and co-opting tribal elites.  相似文献   

14.
Pakistan confronts numerous domestic security challenges including jihadist extremism, Sunni-Shi'a sectarian violence, drug trafficking, illegal commodity smuggling, endemic corruption, and systemic problems with the provision of justice and law enforcement. While much has been written about US military assistance to the Government of Pakistan (GOP) and the ever-evolving political relations between the two countries, basic questions of highest policy significance related to Pakistan's internal security have never been fully studied or considered. This essay begins to address these empirical lacunae. It first provides a comprehensive examination of Pakistan's internal security environment and the effectiveness of the GOP's criminal justice structures in dealing with these challenges. The paper then goes on to assess the impact and utility of the current suite of US law enforcement assistance in helping to fortify Pakistan's domestic security environment. The study raises a number of difficult questions pertinent to the long-term impact of this support, particularly in terms of its effect on fostering a viable, accountable and transparent system of civilian governance and policing.  相似文献   

15.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   

16.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

17.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   

18.
India is at a crossroads today. While it is fast emerging as a global power with a vibrant democratic polity, a robust economy and a nuclear-weapons capable military, the country is also witnessing a growing polarisation between the rich and poor and between urban and rural areas, a rise in communal tensions, large numbers of suicides by impoverished and indebted farmers and a spurt in terrorist activities and attacks by various disgruntled organisations and groups. Of these various challenges, as attested to by Prime Minister Manmohan Singh himself, the most dangerous threat to India's territorial integrity, prosperity and wellbeing has come from the Naxalite insurgency or ‘people's war’ that is manifest in large areas of eastern, central and southern India. But what factors account for the formation and persistence of Naxalite insurgency in India? What are the key objectives of the Naxalites and why is violence directed against the Indian State? And how has the Indian State (both central and state governments) responded to the Naxalite insurgency and with what effect? These are the main research questions that we attempt to answer in this paper. We put forward two broad arguments. First, the Naxalite insurgency in India is the latest manifestation of peasant struggles caused by grinding poverty, exploitation and inequality that have prevailed in rural areas for centuries. What sustains these struggles to this day is the fact that socio-economic conditions in rural areas have changed little and the policies followed by the post-independent Indian State have generally failed to mitigate rural problems. Second, the Naxalite insurgency has emerged as the most dangerous threat mainly due to the movement's spatial spread, growing support base in tribal and backward areas and enhanced fighting capabilities. The Indian State has viewed the movement as a ‘law and order’ problem and responded with force. But a ‘law and order’ approach to the Naxalite insurgency is unlikely to produce a lasting resolution of the problem, since it would not effectively redress deep-rooted grievances felt by a majority of India's rural poor for decades.  相似文献   

19.
The provision of Military Assistance to the Civil Powers (MACP) encapsulates the traditional approach towards countering terrorism on the British mainland, which emphasises minimum force, proportionality, police primacy and the rule of law, with the military retained as a supporting instrument, being employed only as a measure of last resort. Recent terrorist incidents in major urban centres do, however, question the effectiveness of these established methods. This analysis initially codifies the conceptual issues that underscore the tensions between civil policing and military anti-terrorist approaches in the UK, and proceeds to evaluate and compare a number of operations that indicate the nature of the challenges facing the MACP apparatus. In particular, potential shortcomings in the MACP provisions are identified in the form of threat perception and deployment and enforcement gaps. The assessment finds that there are facets of MACP that are of enduring relevance in the current era, yet a continuing need persists to reconcile police and military imperatives toward serious civil disorder contingencies and conditions of emergency.  相似文献   

20.
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号