首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society.  相似文献   

2.
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants.  相似文献   

3.

Deterrence has been a crucial element in fighting terrorism, both in actual politics and rational choice analyses of terrorism. But there are superior strategies to deterrence. One is to make terrorist attacks less attractive. Another to raise the opportunity cost - rather than the material cost - to terrorists. These alternative strategies effectively dissuade potential terrorists. The strategies suggested here build on the "benevolence" system and tend to produce a positive sum game among the interacting parties. In contrast, the deterrence system is based on "threats" and tends to produce a negative sum game interaction.  相似文献   

4.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of States and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   

5.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of states and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   

6.
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild.  相似文献   

7.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   

8.
Current U.S. nuclear weapons strategy, force structure, and doctrine contribute to the threat of nuclear terrorism in several ways. First, the U.S. nuclear stockpile presents opportunities for nuclear terrorists to seize the materials they need. Second, U.S. nuclear forces remain a key justification for Russia's maintenance of similar nuclear forces that are less well protected. Third, America's continued embrace of nuclear weapons encourages and legitimizes other states to seek nuclear weapons that they will have difficulty securing from terrorists. The national security interests of the United States would be better served by a strategy to shrink the global footprint of nuclear weapons and provide the highest possible levels of security for the most minimal possible deterrent forces. Given the inability to secure nuclear weapons and materials perfectly or to eliminate terrorism in the foreseeable future, reducing the global inventory of nuclear weapons and materials is the most reliable way to reduce the chances of nuclear terrorism.  相似文献   

9.
Boko Haram (BH) is an insurgent group that operates mainly in northeastern Nigeria. Its stated aim is to establish an Islamic state, and it employs terrorism as its strategy. Earlier interests of security analysts centred on the drivers of BH uprising and the possibility of its internationalisation. Today's concerns relate more to why the rebellion has lasted this long. In toeing the same line, this article demonstrates that BH is a purposive terror group against which the government has evolved no viable strategy. It examines some gains of BH over the past six years and how it benefitted from the government's underestimation of its capacity and determination. It concludes that to effectively engage BH, the Nigerian government must revaluate its threat and sincerely pursue an expanded strategy beyond the current military-centric approach. To be effective, government's response must be packaged in such a way as to enhance human security in the region.  相似文献   

10.
Due to expanding and increasing religious extremism and terrorism coupled with political instability in Pakistan, most western observers believe that Pakistan's nuclear weapons are not secure and could be taken over by terrorists. This would have adverse implications for the region and for global peace, especially for the security of USA and Europe. This article argues that this perception is based on a flawed understanding and knowledge of how Pakistan's command and control setup has evolved and operates. Pakistan's nuclear weapons are as safe as any other state's nuclear weapons. Pakistan has also been active in supporting and participating in global efforts to improve nuclear safety and security. Over the years, Pakistan has been quite open in sharing information regarding how it is improving its command and control system with western governments as well as scholars. This article argues that the steps Pakistan has taken to secure its nuclear weapons are adequate and that Pakistan would continue to further strengthen these measures; however, it is the expanding religious extremism, terrorism and anti-Americanism in the country which make the international perception of Pakistan extremely negative and then seep into the perception of Pakistan's nuclear weapons safety and security.  相似文献   

11.
In recent years, South Africa has come to be used by international terrorists as a safe house, for paramilitary training purposes, as a base from which to plan attacks on other countries and as a conduit for financial transactions. South Africa's own counter-terrorism initiatives have been labelled ‘reactive’ by analysts. Indeed, the existing counter-terrorism regime suffers from a lack of political will to issues of corruption and ineptitude bedevilling the security apparatus of the state. However, using lessons learned from other countries, Pretoria can yet turn the tide against international terrorism by adopting more pro-active measures and by undertaking steps aimed at the depoliticisation and decriminalisation of the security forces.  相似文献   

12.
NEW TERRORISM     
New or contemporary international terrorism associated with Islamic fundamentalism and the struggle against Zionism and American interests is a recent phenomenon in Kenya, different to that experienced during the struggle against colonialism. Many explanations have been offered as to why Kenya is being targeted, but have not sufficiently explored its close relationship with the West—especially Britain and the United States, the perceived connection between Israel and the former Presidency of Daniel Arap Moi, domestic forces and government policy. Externally the most important explanations for the increase in regional terrorism are the three waves of global terrorism since 1967, the most recent and significant of which is associated with Osama bin Laden and the Palestinian Intifada. These events reverberated in the region, Sudan and Somalia in particular, but also internally. Both internal and external attribution factors explain the resurgence of new terrorism in Africa. In the case of Kenya, terrorist attacks are associated with the country's internal domestic processes and a naïve approach to broader international issues.  相似文献   

13.
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   

14.
The spectacular commando-style terrorist strike on Mumbai in November 2008 exposed India's lax internal security structure. As nearly all the security apparatus broke down during the long spell of attacks, massive public outrage flared up across the country calling for a firmer government response. Shockingly, India has done little to prevent a recurrence and a new security threat faces the country every single day not merely before but even after the Mumbai attacks. In contrast, Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have successfully evaded pressures from both India and the international community and continue their terror campaign against India under the “Karachi Project” with the explicit intention to unsettle South Asia. Classified documents indicated that India is at the forefront of a cataclysmic “nuclear terrorism” threat from a “combination of Pakistan-based terrorists and homegrown radicals.” This article analyses the danger posed by the Indo-Pak radical groups targeting India and India's lack of preparedness to the new security threat from the “Karachi Project.”  相似文献   

15.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   

16.
This article predicts that the nuclear weapon states may opt sooner for nuclear elimination than generally expected. This delegitimation of nuclear weapons is due to five factors whose importance has grown since the mid-1990s: nuclear proliferation, the risk of nuclear terrorism, the nuclear taboo, missile defence, and the increased importance of international law. The article starts with categorizing nuclear weapons policies: nuclear primacy, maximum deterrence, minimum deterrence, existential deterrence, and post-existential deterrence. The nuclear weapon states will probably shift their policies from nuclear primacy (US), maximum deterrence (Russia), minimum or existential deterrence (UK, France, Israel, China, India, Pakistan, North Korea) to post-existential deterrence (or elimination), taking one step at a time.  相似文献   

17.
Security measures are said to increase the price of terrorism. This price has not been hitherto defined in an economically meaningful way. This paper provides a precise definition by treating the terrorists’ resource endowment as a parcel of contingent claims to political influence with a price equal to the summed value of those contingent claims in potential states of the world. Equipped with this definition, an equilibrium model of the price of terrorism is deployed. Important insights are gained into the effect of terrorists’ risk aversion at the level of the price of terrorism in different states of the world and the theoretical conclusion is reached that higher security is associated with a lower price of terrorism rather than a higher price. The implications for policy are discussed.  相似文献   

18.
This article examines the British Army's deployment in support of the civil power in Northern Ireland. It argues that the core guiding principles of the British approach to counterinsurgency (COIN) – employing the minimum use of force, firm and timely action, and unity of control in civil–military relations – were misapplied by the Army in its haste to combat Irish Republican Army (IRA) terrorism between 1971 and 1976. Moreover, it suggests that the Army's COIN strategy was unsuccessful in the 1970s because commanders adhered too closely to the customs, doctrine, and drill applied under very different circumstances in Aden between 1963 and 1967, generally regarded as a failure in Britain's post-war internal security operations. The article concludes with a discussion of the British government's decision to scale back the Army's role in favour of giving the Royal Ulster Constabulary primacy in counter-terrorist operations, a decision which led ultimately to success in combating IRA violence.  相似文献   

19.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

20.
ABSTRACT

Over the past decade, contrary to declarations that they are pursuing “minimum” deterrence, India and Pakistan have considerably expanded their missile forces. India has developed eleven types of missiles while Pakistan has fielded nine. These missile forces have a mixed impact on deterrence stability. Both states' medium-range missiles strengthen their countervalue deterrent capabilities against the other, though India's China-specific missiles still have limitations. India's and Pakistan's short-range missiles and first-generation naval systems raise concerns about nuclear ambiguity, command and control, and escalation across the nuclear threshold, ultimately undermining deterrence stability on the subcontinent.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号