首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.  相似文献   

2.
The U.S. spends billions of dollars in its security cooperation program to develop “professional, accountable, and capable security forces” in other nations, part of a grand strategy to improve global stability and counter violent extremism. Despite its great investment in professionalizing foreign militaries, however, the U.S. has no functional definition of military professionalism – a term that until now has been considered too vague and multi-faceted to operationalize. In this article, the author seeks to remedy this oversight, drawing from twenty years of security cooperation fieldwork in Latin America and Africa, as well as a vigorous literature review, to define four important components of military professionalism: (1) formal military education and vocational training, (2) military subordination to elected civilian officials, (3) knowledge and practice of the law of armed conflict and human rights law, and (4) a clearly established program of professional military ethics. This article provides guidelines for U.S. and European officials who work with partner nations to develop more professional military forces and, in particular, for officials managing security assistance programs with developing countries.  相似文献   

3.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

4.
网络信息体系是联合作战的桥梁和纽带,是推动军队现代化建设的重要组成部分。近年来,美军从地方引进了首席信息官制度,借鉴企业的主要做法和成功经验,推进军队信息化和军事信息系统的发展,取得了显著效果。研究美军首席信息官制度对于加强军队网络信息体系建设具有重要的参考作用。本文分析了美国国防部首席信息官的主要任务和定位,阐述了下属机构的分工和职责,研究了美国防部首席信息官从战略规划、技术架构、云平台、人工智能、实战导向、安全保密和人才培养等方面推进美军网络信息体系建设的主要做法,在此基础上,结合军队建设实际,提出了推进网信体系建设的对策建议。期望该研究能为加强军队网络信息体系建设提供参考和借鉴。  相似文献   

5.
Military operations increasingly require cooperation between agencies within the same nation, but also collaboration with security and military organizations internationally. Throughout history multinational military cooperation has often been an appropriate way to conduct major operations; national manpower and material resources are generally insufficient to address the demands of missions worldwide. The desire to optimize the use of scarce research and development and investment capabilities, the need for international legitimacy and political support, and the fact that today’s risks transcend national borders, have rendered multinational cooperation in the security domain unavoidable. With joint operations comes the requirement for multi-partner- and multinational information sharing. However, information sharing has both advantages and costs, and is subject to both enabling factors as well as barriers. This paper reflects on theories, both classical and current, as well as empirical case studies, to examine the pros and cons of multinational information sharing, and the factors that conduce or interfere with the transmission and the receipt of intelligence. The importance of a holistic approach and of learning lessons learned are two key lessons gleaned from the analysis, along with an emphasis on developing both the organizational and the interpersonal enablers of information sharing.  相似文献   

6.
周炎明  兰旭  熊俊芬 《国防科技》2020,41(5):111-118
随着“大智移云物”的出现和发展,战争形态已经发展到智能化战争新阶段。为了打赢未来智能化战争,推进军队财务管理实现智能化,充分利用军事大数据这一新兴重要战略资源尤为必要。本文利用需求分析法和现象分类法,从经费需求测算、预算编制、军费支出和军费绩效评估四个方面分析了军队财务管理领域应用军事大数据的需求。针对当前存在的运用军事大数据观念淡薄、数据采集困难、数据挖掘处理能力较弱、数据安全威胁及军事大数据人才缺乏等五个问题,从大数据应用观念的树立、软硬件设备的更新、数据中心的建设、应用框架的构建、信息化管理制度的完善、数据安全管理和大数据人才队伍建设几个方面提出了在军队财务管理领域应用军事大数据的思路。  相似文献   

7.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   

8.
9.
Throughout the Cold War Sweden pursued a declared policy of non-alignment. Sweden nevertheless established security links with a number of Western powers, first of all Britain and the US. The most extensive links were developed in two areas – military technology and intelligence. Intelligence liaison was of crucial importance for the security of non-aligned Sweden, but also significant for the major Western powers in filling gaps in intelligence collection. But intelligence liaison also served as an instrument in a closed policy arena where Sweden could receive or pay back favours, according to a pattern established already during World War II. However, intelligence liaison contained policy dilemmas, some of a more general nature, some specific for a country with an overt policy of non-alignment.  相似文献   

10.
为确保警卫任务的安全顺利运行,亟须建立和完善一些警卫工作机制,如建立新型的责任关系,实行随机指挥机制,实行警卫勤务备勤机制,实行督导和讲评机制,实行警卫情报协作机制,实行危险评估机制。  相似文献   

11.
This study develops a dynamic model that integrates military intelligence into the defense capability of the country and the optimal allocation of its government budget. We assert that the effectiveness of the country’s military intelligence is contingent on the quality of its human capital, which, in turn, implies a long-term positive relationship between the government’s various civilian expenditures and its capacity to achieve a cost-effective intelligence and, hence, military capability. This relationship is developed within a multiple-period arms race model between two rivals. Using this model and stylized data for the Israeli–Syrian arms race, we show that an appropriate budget shift from defense to civilian expenditures during the initial periods of the planning horizon will gradually (over a decade, say) increase the quality of human capital in the country and, thus, the effectiveness of its intelligence, which, in turn, will increase the country’s future security and welfare.  相似文献   

12.
This paper underscores the theory that efficacious law enforcement intelligence addresses current problems of criminal insurgency including acts of terrorism, asymmetric warfare and low intensity conflict, and suggests possible solutions. By introducing the notion of crime as insurgency, a new paradigm may be developed that could assist practitioners and academics alike in analyzing, solving and managing crime. By shifting the perspective for both military and civilian forces from their traditionally reactive stance, to a proactive posture, and merging national security with homeland defense on the most perplexing issues and threats facing US security, this work may provide a base upon which new and actionable policies can be designed. Public administrators must take seriously the lessons from past failures. The single most important supposition being, sound policy is reliant upon good intelligence.  相似文献   

13.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox.  相似文献   

14.
Observers of United States (US) interventions have almost universally characterized the 1994 Haiti intervention as multilateral, a model for how international cooperation can achieve common security goals. A closer analysis of the intervention reveals that the planning and execution of the intervention were almost entirely unilateral and therefore cost the US few if any of the theoretical costs of coalition warfare, including interoperability and policy compromise. Mapped onto the unilateral strategy and operation of the intervention, however, was a multilateral diplomatic effort that secured United Nations Security Council authorization and provided a cover for an intervention that the US had already planned and intended to execute with or without that authorization. That the US sought a multilateral cover for an intervention that it could easily accomplish unilaterally shows the importance of two factors: A domestic audience that opposed unilateral peacekeeping but would accept using US resources as part of a broader multilateral operation, and a local population that would be more responsive to a multilateral coalition than a use of force that was perceived to be unilateral. The Haiti intervention shows that the determinants of success in operations other than war are as much political as military. When the US already has overwhelming military superiority vis-à-vis its adversary, building military coalitions becomes as much about enlisting political support as aggregating material capability.  相似文献   

15.
薛颖  房超 《国防科技》2021,42(4):111-116
与国际上其他军事强国相比,我国军事智能化发展还处于起步和探索阶段。当前军事智能化发展呈现出技术增长点随机发散与关键技术领域不聚焦等特征,阻碍了人工智能技术在军事领域的应用。人工智能技术在军事应用中应本着"有所为有所不为"的原则。为了增强对"为军所用"人工智能核心技术的评价能力,推动高需求匹配度的核心技术发展,本文对军事智能化的边界问题进行了探索研究,通过将军事智能"五性"与现有武器装备"六性"和作战试验与鉴定相结合,并基于"封闭性"准则,提出了将"军事智能化"这一开放性问题进行边界收敛,以促进军事智能技术创新发展呈现收敛状态并逐步形成有序的体系。  相似文献   

16.
From the Barents and the Baltic Sea in the north, through Central Europe and the Balkans, to the Black Sea in the south a range of new subregional groups and cooperation processes have emerged in Europe during the 1990s. Compared to NATO and the European Union, these new subregional groups have received little attention. Their ‘indirect approach’ to security, however, plays an important role in overcoming the legacy of the Cold War, reducing the risks of military conflict and addressing non‐military security challenges. As NATO and the EU expand eastwards, subregionalism is assuming growing importance as a means of avoiding new ‘dividing lines’ in Europe. After the wars in Bosnia and Kosovo, subregionalism is also gaining importance as a means of building cooperation in South‐Eastern Europe. The challenge for the future is to give more substance and depth to Europe's new subregional cooperation frameworks.  相似文献   

17.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   

18.
Counterterrorism operations in Kenya have often been hindered by a lack of collaboration, coordination and cooperation among the security agencies involved in such operations. This article examines the relationship between neo-elitism and counterterrorism security interagency activity in Kenya. Using neo-elitism as a framework for analysis, with specific reference to the September 2013 Westgate Mall attack counterterrorism operation, it is argued that the lack of collaboration, coordination and cooperation among Kenya’s counterterrorism security agencies often results in unintended adverse consequences. The interagency conflict over the Westgate operation was primarily about command and control, intelligence sharing and official information shared with the public pertaining to the stages of the siege and operation. These security agencies share similar responsibilities and jurisdictions in the rest of the country’s counterterrorism efforts. The interagency conflicts reveal that the country’s security elites pursue personal and agency-specific interests that are aimed at maintaining organisational supremacy over counterterrorism efforts. Recommendations are offered for how to tackle the problem of interagency conflict in order to enhance the effectiveness of counterterrorism operations in Kenya.  相似文献   

19.
This study examines the war that the United States has waged since September 2001 as a global counterinsurgency. Placing the war against al-Qaeda and its allied groups and organizations in the context of a global insurgency also presents implications for doctrine, interagency coordination and military cultural change. The first part of the article offers a distilled analysis of al-Qaeda and its associated networks. The second section examines the US military in the context of the Western way of war, with the attendant military-cultural impediments to adapting to an enemy who embraces a very different approach to war. The third section aims to define and describe the nature of the war that America and its coalition partners are trying to wage. The concluding section offers the most value as it refines and distills the work of several international security and military thinkers to arrive at some imperatives for successfully prosecuting this type of war to its end.  相似文献   

20.
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号