首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.
Over the last two decades, a number of countries (most notably China, Russia and Iran) have been developing so-called anti-access and area denial (A2/AD) capabilities, such as ballistic and cruise missiles, offensive cyber-weapons, electronic warfare, etc. The development of A2/AD capabilities by non-Western countries undermines the foundations of US power projection and global military-technological supremacy. In order to overcome, or at least mitigate, the impending A2/AD challenge, the US Department of Defense (DoD) began to roll out its so-called ‘third’ offset strategy in late 2014. The strategy aims to bring about innovative operational concepts and technologies and spur new doctrinal and organisational debates. This article assesses which of the operational concepts and capabilities informing current US discussions on offset may be relevant in the context of the A2/AD challenges Europeans face on their eastern ‘flank‘ and in their ‘extended southern neighbourhood‘, and which may not. Europeans must grapple with the same conceptual puzzle as the US: how to strike the right balance between defeating A2/AD capabilities and hedging against them, i.e. through alternative strategies that are less dependent on unhindered access and resort to asymmetric forms of warfare. However, they must take into account the geographical features of their eastern flank and extended southern neighbourhood, the level of technological maturity of their challengers, and their own military-technological prowess and political limitations. This suggests a somewhat different approach to offsetting A2/AD than that adopted by the US.  相似文献   

2.
Once dismissed by many outside observers, the Chinese People’s Liberation Army Air Force (PLAAF) has undergone an impressive transformation over the past two decades, emerging as one of the world’s premier air forces. As it continues to modernize, it is focused on becoming a ‘strategic air force.’ PLAAF strategists suggest this means it should play a decisive role in protecting Chinese national interests, field modern capabilities commensurate with China’s standing as a major power, and enjoy the institutional status befitting its role as a ‘strategic service,’ an important consideration given the historical dominance of the ground force in China’s military.  相似文献   

3.
This is a short commentary on Dmitry Adamsky’s recent article ‘The 1983 Nuclear Crisis – Lessons for Deterrence Theory and Practice’. First, it teases out nuances in the relationship between deterrence and strategy and considers deterrence to be both a strategy and an effect. Second, it explores the culminating point of deterrence in theory and considers it untenable, as it does not conform to the logic of, or to any logic analogous to, Clausewitz’s culminating point of victory. Deterrence logically cannot culminate. Moreover, any culminating point of deterrence would ignore why the potential deteree should perceive the actions of his deterrer in such a way as to render strengthened strategies of deterrence counterproductive. It is the deteree who is the only strategic actor to determine whether the deterrer is actually practising a successful strategy of deterrence or not.  相似文献   

4.
Entering the twenty-first century, China has demonstrated an assertive foreign policy, not only in employing various types of economic and military leverage but also in conducting the Three Warfares (三战) – psychological warfare, public opinion warfare, and legal warfare. This article attempts to identify the motives and methods of China’s Three Warfares by analyzing its history, logic, and agents. Based on this analysis, the author also presents the position of the Three Warfares in China’s foreign policy and the warfares’ impact on the international security environment involving other major powers and China’s neighbors.  相似文献   

5.
The idea of ‘clean’ bombs, nuclear weapons with a reduced amount of radioactive fallout resulting from their fission part, has met much ridicule since its public inauguration in 1956. Many scholars have regarded the bombs as a propaganda tool, stopping short of analyzing their role in the transformative phase of US nuclear strategy in the 1950s. This paper reexamines the clean bomb episode through 1958, shedding light upon the dynamic relationship between the development of nuclear weapons technology and the evolution of nuclear strategy from massive retaliation to flexible response. It also discusses the mechanism and momentum of nuclear weapons technology innovation until the US suspended nuclear testing in late 1958.  相似文献   

6.
This article analyses the steps taken by the Russian government, with the aid of a powerful local clan, the so-called Kadyrovtsy, to subdue the Chechen insurgency. It highlights the strategy used by Russia, under whose patronage former anti-Russian guerrilla fighters were transformed into paramilitary allies of the Russian government; later these former insurgents were incorporated into the regular Russian army and other state security forces. The article also identifies problems that are connected with the activities of the Kadyrovtsy in Chechnya and Russia, and the spillover into the diaspora; it also contextualises the issues faced by the contemporary Chechen ruling clan and the geopolitics of the Caucasus within the research framework of paramilitarism and counterinsurgency.  相似文献   

7.
This article examines a secret Anglo-American programme, Project ‘E’, which equipped the RAF’s V-bomber Force with US nuclear weapons for use in wartime. It shows Project ‘E’ was ineffective as a warhead supply programme and, furthermore, that it crippled the operational effectiveness of the V-bomber Force as a whole between 1958 and 1962. This article argues that as a result of Project ‘E’, the V-Force was neither operationally nor politically independent as a nuclear deterrent force. This challenges the traditional view of the V-Force as the benchmark of nuclear independence to assess the Skybolt, Polaris and Trident programmes.  相似文献   

8.
What organisational attributes enhance a military’s ability to effectively adapt on the battlefield? Upon the outbreak of war in July 2014 between Israel and the Palestinian militant group Hamas, the Israel Defense Forces (IDF) encountered an expansive network of tunnels from which Hamas was launching large-scale assaults into Israel. This article illustrates that the IDF’s ability to successfully adapt ‘under fire’ to this battlefield surprise was facilitated by several important attributes related to its organisational learning capacity: a dynamic, action-oriented organisational culture, a flexible leadership and command style, specialised commando units which acted as ‘incubators’ for learning and innovation, and a formal system to institutionalise and disseminate lessons learned.  相似文献   

9.
10.
ABSTRACT

On 9 July 2018, Ethiopia and Eritrea signed a historical agreement pledging to end their mutual animosity and work for peace. The unprecedented rapprochement was facilitated by the new leadership in Ethiopia, merging interests between the two states and external mediation. This commentary looks into Ethiopian Prime Minister Abiy Ahmed Ali’s early reform initiatives and the dynamics of the rapprochement between Ethiopia and Eritrea.  相似文献   

11.
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China.  相似文献   

12.
13.
《Arms and Armour》2013,10(2):144-148
Following the publication of the article ‘Trusty Bess’: the Definitive Origins and History of the term 'Brown Bess', the author was made aware of an intriguing illustration that perfectly captures the meaning of that famous nickname. This short note details this archival document and sheds light on both its place in the lore of ‘Brown Bess’ and its wide historical context in terms of the Victorian attitudes to military small arms development.  相似文献   

14.
15.
Stephan Rosiny 《Civil Wars》2015,17(4):485-502
Most countries of the Arab Mashrek are multi-ethnic and multi-sectarian. In recent years, most of them have experienced violent clashes between groups that frame their conflicts along ethnic-sectarian lines. This article investigates the Lebanese Ta’if Agreement of 1989 as a crucial case study of how to manage such conflicts through a transitory power-sharing arrangement. It presents several provisions of this agreement that adhere to three different approaches of how to deal with such conflicts: the consociational and the centripetal models of power-sharing as well as the integrationist paradigm. It thereby seeks to develop a theoretical argument about chances and risks of transitory power-sharing in deeply divided societies and derives some general lessons for managing conflicts in the Middle East.  相似文献   

16.
社会主义市场经济体制的逐步建立与发展,使农村民兵、预备役兵员外出打工经商的人数日益增多并有继续增多的趋势。这种新情况成为民兵、预备役工作中亟待解决的突出问题。我认为,解决这个问题,应实行户籍属地和流向属地“双向管理”。这是由当前兵员流动中存在的以下几个特点决定的。  相似文献   

17.
18.
While the human rights impact of the deployment of state security agencies in the Chiadzwa diamond fields has been explored, it is important to continue to expose the increasing tendency within the sector to take public resources that should be protected by the state and used for the benefit of the people and channel them for personal gain. The security sector stranglehold of President Robert Mugabe and the ruling political party, the Zimbabwe African National Union Patriotic Front (ZANU-PF), has facilitated the siphoning of Chiadzwa diamond revenue into the pockets of individual security personnel. The unfolding sociopolitical crisis in Zimbabwe has also meant that these security personnel have been deployed beyond conflict zones and into traditionally civilian domains, with dire consequences for the public purse. With this in mind, it is asserted that these issues have driven state security agencies to enrich themselves through what is termed in this article as a ‘goat mentality’. The article thus explores the ways in which state security agencies have been deployed and gone on to promote personal enrichment in the Chiadzwa diamond fields.  相似文献   

19.
In Africa, most of the present conflicts are civil, intra-state wars where belligerent groups use guerrilla tactics to achieve various political, economic or ideological objectives. The atrocities and the effect of these on-going wars on innocent civilians, human suffering, poverty and development are beyond comprehension. Not surprisingly, the majority of current peace operations are in Africa, with more than 70 countries contributing forces to these conflict zones. On the continent, South Africa has come to assume a leading role in peace operations and is now a major troop-contributing country to UN and AU missions. In the past 11 years, the South African National Defence Force (SANDF) has taken part in no fewer than 14 peace missions. This article provides a brief background of the conflicts in Burundi, the Democratic Republic of Congo (DRC) and Sudan, the different United Nations (UN) and African Union (AU) mandates under which peacekeepers had to operate as well as their objectives, and the extent of South Africa's involvement in the various missions. In the last section, the major challenges, that these operations have posed are highlighted.  相似文献   

20.
The 17th Conference of the Parties (COP17) had been anticipated as the ‘African COP’, not only due to the African venue but also due to the opportunity it would afford African countries – with South Africa at the helm – to steer the debate on a global climate change regime. With the conference now over, lobby groups, international organisations, negotiators, observers and commentators alike have been taking stock of its outcome. Despite the litany of developmental and security implications of climate change, COP17 got underway with little hope that much might actually be achieved. In light of the discouraging condition of the global economy, with leading developed economies suffering financially, states were hardly in a mood to be making concessions that would impact their fiscal health. Nonetheless, an agreement was reached. Questions remain, however, about the significance of the outcome of the African COP for the world at large, but ultimately also for Africa.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号