首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
The ongoing civil war in Syria is evolving into a ‘proxy war’, in which both the Baathist regime and its insurgent adversaries are becoming increasingly reliant upon support from external powers. Proxy warfare has a superficial appeal for sponsoring states, as it appears to offer a convenient and risk-free means of fulfilling foreign policy goals, which will not incur the financial and human costs of direct military intervention. Using Syria as a case study, this article shows that the conduct of proxy warfare has several potential political, strategic, and ethical consequences, which any democratic government in particular is obliged to consider before it resorts to this indirect means of foreign intervention.  相似文献   

2.
    
ABSTRACT

Though the Kurdistan Workers’ Party (PKK) has been able to sustain a rural insurgency in Turkey over several decades, it was unable to sustain the urban insurgency it began in July 2015. This paper looks at the period July 2015 and December 2016 to explore the reasons why, despite the PKK’s experience conducting an insurgency and demonstrated popular support, they were unable to sustain an urban insurgency. It then uses this example to examine the broader conditions under which urban insurgencies may be sustainable. In particular, the hypotheses in this paper look at the complex human and physical landscape of urban environments and the impact of pre-existing social networks.  相似文献   

3.
    
The most striking finding of the Chilcot Report is that the record reveals little that was previously unknown. A key point for its authors is that diplomatic alternatives had not been exhausted when the US and UK went to war. But, short of an armed attack by the other side, it is hard to say when they would have been. Here what was crucial was the belief shared by Bush and Blair that Saddam Hussain would not and could not change. For the British the issue of whether alternatives to war remained is particularly important because of its implications for international law, something that did not trouble the Americans. It remains unclear if Blair would have gained or lost leverage over Bush had he made British participation contingent on better American policy, for example on developing a workable plan for the reconstruction of Iraq.  相似文献   

4.
    
The Shia militia has emerged as one of the most powerful and important actors in the Middle East security environment. Despite this trend, they remain poorly understood by scholars and policymakers alike. This article seeks to expand our understanding of the militia as a type of non-state armed group through an examination of Shia militia movements in Iraq between 2003 and 2009. More than simply warlords, paramilitaries, or foreign proxies, Shia militias in Iraq enjoyed substantial popular legitimacy, pursued a broad social and political agenda, and participated actively in the formal institutions of the state. Understanding the triangular relationship between the militia, the state, and the population is essential in explaining the rise and fall of the Shia militias during the US occupation as well as in developing strategies to deal with their most recent resurgence  相似文献   

5.
The biological and chemical weapon nonproliferation and disarmament regimes are often put forward as models of what the nuclear nonproliferation regime could (or should) be. But are these regimes effective? If so, is one stronger and/or more effective than the other? What is it that makes them relatively stronger than the nuclear nonproliferation regime? In this article, we return to and expand upon a framework for assessing regime health and effectiveness. We utilize this framework to engage in a comparative analysis of the chemical weapon (CW) and biological weapon (BW) nonproliferation regimes, respectively. Our analysis reveals that these two regimes are comparatively healthier than their nuclear counterpart. While some of their behavioral features might be troubling—such as the disputes over stockpile destruction of CW—these tend to be mitigated by the presence of a strong norm against possession and proliferation of both CW and BW. This norm is adequately embedded into the existing institutional features of the regimes in ways that do not exist in the nuclear nonproliferation regime.  相似文献   

6.
伊拉克主要战事结束两年半了,反美武装成为驻伊美军最主要的作战对象.面对美军先进的武器装备,反美武装采取了灵活机动的战术手段.分析了伊拉克反美武装军事行动的几个特点.  相似文献   

7.
在分析了伊拉克战争对中东地区军品贸易影响的基础上,重点分析了其对世界军品贸易的深刻影响———加剧军备竞赛、刺激军工技术发展、引起军贸格局及产品结构发生变化、国际军控形势更加严峻。  相似文献   

8.
    
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

9.
This article gives an overall assessment of ISIS’s conventional conduct of combat operations by examining their warfighting functions patterns. In sum, the approach of ISIS comprised fundamental principles: their weapons can be organized into categories, purposeful combination of these forces in keeping with the concept of combined arms combat, and hierarchical command and control executed by experienced commanders. ISIS combat groups combined the elements of formation and firepower as well as movement and mobility. The paper concludes that ISIS obviously had a vast range of conventional capabilities at its disposal and was thus able to conduct major operations.  相似文献   

10.
11.
The period from December 1940 through to the spring of 1941 saw the British Army win a series of rapid and decisive victories over Italian and Vichy French forces in North and East Africa and the Middle East. A key feature of these operations was the extensive British use of fast-moving all-arms mobile formations utilising superior speed and mobility to out-manoeuvre considerably larger Italian formations. A number of reasons have been given for the British Army adopting this mode of warfare, but the paper contends that the best explanation is that they were an organic evolution from methods used by the British Army in ‘small wars’ throughout the early twentieth century, use of mobile ‘frontier columns’ at the operational and tactical level of war being described and recommended by Callwell himself and visible with the Army in practice in operations in India and the Middle East in particular. The inter-war period saw the combination of this model of warfare with post-First World War military technology, notably tanks, close air support and coordination by wireless. Colonial operations in this period also saw some utilisation of what would later be identified as ‘Special Forces’ – also used extensively in the Desert War – the most obvious example being Captain Orde Wingate's Special Night Squads in Palestine in 1938.  相似文献   

12.
    
This article is an extended book review of the Turkish book Commanders' Front (Komutanlar Cephesi, Istanbul: Detay Publishing, 2007), written by prominent Turkish journalist Fikret Bila, who compiled a series of interviews with retired Turkish military commanders and two former presidents. It provides a foreign perspective on counterinsurgency/terrorism strategies and lessons learned from Turkey's small war against the Kurdistan Workers' Party (PKK). The interviews reveal the generals' views on Turkey's long-standing fight with the PKK, discussing topics ranging from the social aspect of the PKK problem to mistakes made in arming local militia. In addition, it presents the Turkish perspective on US policy in Iraq.  相似文献   

13.
    
  相似文献   

14.
伊拉克战争美军后勤(装备)保障特点及启示   总被引:1,自引:0,他引:1  
伊拉克战争中,美军采取多种手段和措施,成功地实施了后勤(装备)保障,在保障准备、保障方法、保障信息化建设等方面呈现出许多新特点,为我军做好新形势下的装备保障工作提供了有益的启示。  相似文献   

15.
This article reassesses the foreign policy legacy of George W. Bush in light of the emerging historical record of his administration. We conclude that, whereas Bush’s foreign policy was in widespread disrepute when he left office in 2009, that reputation is likely to improve – perhaps significantly – in the coming years. We identify six particular arguments that lend credence to an emerging ‘Bush revisionism.’ To be clear, we do not necessarily argue that the balance sheet on Bush’s foreign policy was positive, but the arguments presented here are likely to generate a more sympathetic and favorable historical assessment of Bush’s presidency over time.  相似文献   

16.
In Operation ‘Iraqi Freedom’, as the Coalition's heavy forces fought in the South, in the North a handful of special operations forces, working with Kurdish rebels, clashed with the Iraqi army along the Green Line. In operations reminiscent of those used a year earlier to defeat the Taliban in Afghanistan, the lightly armed and heavily outnumbered Coalition forces called in air strikes to defeat Iraq's regular and Republican Guard army divisions. This article tells the story of these operations and discusses some of their implications for future US military policy. The success of the Afghan model in Iraq goes a long way toward demonstrating the efficacy of new air-heavy tactics and shows the strategic value of using light indigenous allies to replace heavy US land forces in both conventional combat and occupation operations.  相似文献   

17.
    
As part of the next phase of the Global Jihad, al Qaeda has been committed to winning popular support among Muslims. Ayman al-Zawahiri and the al Qaeda inner circle recognise that a global terror movement and civil conflicts in the Middle East, brought about by the Arab revolutions, necessitate different operational methods. As such, they have disavowed the Islamic State of Iraq and al-Sham for their insubordination and unconstrained tactics, a move that has implications for the Middle East, international relations, the legitimacy of the al Qaeda leadership, and the future of the Global Jihad.  相似文献   

18.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   

19.
Politics is critical to making sense of Pakistani successes and failures in dealing with non-state armed groups. This includes domestic political currents; regional political currents; and the global impetus of the post-9/11 era. How these currents overlap renders to any reading of insurgency in Pakistan real complexity. This article engages with this complexity rather than shirking from it. Its hypothesis is that while the insurgency bordering Afghanistan has been an epicentre of Pakistani military efforts to fight the Taliban, this theatre is in of itself insufficiently inclusive to grasp the nature of Pakistan’s security challenges and its consequent responses.  相似文献   

20.
    
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号