首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 430 毫秒
1.
The role of norms and military utility in the use of weapons is disputed by constructivist and realist scholars. Through an examination of US decision-making regarding anti-plant and irritant agents in the Vietnam War, I advance this debate in three key ways. First, I develop structural realism’s expectations regarding the role of military utility. Second, I demonstrate that social and material factors are at play in our understandings of both ‘norms’ and ‘military utility’, and that both played a role in US decisions. Third, I find that the dominant role – as structural realism expects – was played by military utility.  相似文献   

2.
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China.  相似文献   

3.
宋博 《国防科技》2021,42(6):5-9
美国认为太空已被普遍认定为最重要的作战域之一,未来的太空安全态势将愈发严峻。本文认为, 美国正面向未来太空对抗环境进行全面转型, 从顶层战略、作战理论、组织结构、战备训练、装备技术等方面开展研究、调整和长远布局, 如以我为主要对手谋划布局、发布系列军事航天顶层指导文件、大幅增加太空攻防作战相关经费投入等。 目前, 美军正处于新旧体系转换、 下一代能力构建发展的关键期, 不仅正在变革军队组织体制、重组太空攻防作战力量, 还积极开展系列演习演训, 以加速形成太空攻防实战能力。美军这一系列动向将对未来太空领域安全与发展产生重大影响, 应引起我高度重视。  相似文献   

4.
Over the last two decades, a number of countries (most notably China, Russia and Iran) have been developing so-called anti-access and area denial (A2/AD) capabilities, such as ballistic and cruise missiles, offensive cyber-weapons, electronic warfare, etc. The development of A2/AD capabilities by non-Western countries undermines the foundations of US power projection and global military-technological supremacy. In order to overcome, or at least mitigate, the impending A2/AD challenge, the US Department of Defense (DoD) began to roll out its so-called ‘third’ offset strategy in late 2014. The strategy aims to bring about innovative operational concepts and technologies and spur new doctrinal and organisational debates. This article assesses which of the operational concepts and capabilities informing current US discussions on offset may be relevant in the context of the A2/AD challenges Europeans face on their eastern ‘flank‘ and in their ‘extended southern neighbourhood‘, and which may not. Europeans must grapple with the same conceptual puzzle as the US: how to strike the right balance between defeating A2/AD capabilities and hedging against them, i.e. through alternative strategies that are less dependent on unhindered access and resort to asymmetric forms of warfare. However, they must take into account the geographical features of their eastern flank and extended southern neighbourhood, the level of technological maturity of their challengers, and their own military-technological prowess and political limitations. This suggests a somewhat different approach to offsetting A2/AD than that adopted by the US.  相似文献   

5.
Abstract

From Iraq to the Gulf of Aden and the South Pacific, this paper evaluates how far theoretical ideas about smart power manifest in operational missions of the Japan Self-Defense Forces (JSDF). To function within a ‘smart’ power context, this paper suggests that JSDF operates in ‘assisting’ mode, rather than the ‘threatening’ behavior of ‘hard’ power. JSDF also deployed alongside other Japanese ‘soft’ power tools – diplomatic, cultural, developmental, and NGOs, using tailored programs for different cultural and geographical contexts. Given constitutional constraints and public sensitivity towards coercive force, JSDF missions could be integrated more into a ‘whole-of-government’ approach advancing foreign policy goals through ‘smart power’.  相似文献   

6.
Given the advances made in conventional weapon capabilities, precision should by now be the accepted and expected norm in cyberspace as well. In this article I argue that developing precision cyber weapon systems, to be used during a lawful conflict, can be an important part of a responsible national security strategy to reduce the amount of violence and physical destruction in conflicts. I first describe a precision cyber weapon system in a military context. I then present three compelling rationales for the development of precision cyber weapon systems based on ethical, operational, and financial considerations. To support the position, I address several arguments that have been levied against their development. Thereafter I present several recommendations for a way ahead.  相似文献   

7.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   

8.
This article challenges the conventional wisdom that cyber operations have limited coercive value. It theorizes that cyber operations contribute to coercion by imposing costs and destabilizing an opponent’s leadership. As costs mount and destabilization spreads, the expected utility of capitulation surpasses that of continued defiance, leading the opponent’s leaders to comply with the coercer’s demands. The article applies this ‘cost-destabilization’ model to the 2014 North Korean cyber operation against Sony. Through cost imposition and leadership destabilization, the North Korean operation, despite its lack of physical destructiveness, caused Sony to make a series of costly decisions to avoid future harm.  相似文献   

9.
While terrorist and insurgent groups have often combined anti-state subversion with ‘purely‘ criminal activities in order to obtain the financial means to wage their ideological struggle, little is known about the transformation of such groups into non-ideological organised crime groups (OCG) with close links to authorities. This holds particularly for jihadist groups that have on ideological grounds ruled out collaboration with their archenemies – ‘infidels’ and ‘apostates’. Using unique ethnographic data from Russia’s Dagestan, this article explores the causes and contexts of the gradual transformation of some of Dagestan’s jihadist units – jamaats – into organised crime groups collaborating with local authorities.  相似文献   

10.
It seems paradoxical that powerful Western states are at their most vulnerable when the disparity in military capabilities between them and their opponents is at its largest. Yet it is precisely in such ‘asymmetric conflicts’ that Western countries have failed to achieve their overall political objectives the most often. Focusing on the post-1945 world, this article will examine governmental, military, and societal reasons for Western failures in asymmetric conflicts. Politicians' lack of understanding regarding war's fundamental nature, militaries' tendency to dissociate operational goals from grand strategy objectives and citizens' moral aversion to warfare appear to be among the main obstacles to success.  相似文献   

11.
In the Age of Napoleon, ‘small wars’ and ‘revolutionary war’ were closely connected. There were, however, different strands of this phenomenon: speaking professionally, conservative officers condemned small wars as an irregular regression to previous less disciplined forms of warfare. The Prussian state continually tried to discipline and regulate spontaneous risings. Yet the irregular character of small wars offered the opportunities for a less complex way of fighting, thus enabling the arming of the ‘people’ to fight. Individual undertakings, such as Ferdinand von Schill's doomed campaign in 1809, were designed to spark off a general popular uprising. But they were cheered by many and supported by few. Meanwhile, Neidhardt von Gneisenau conceived guerrilla-style Landsturm home-defence forces, which were designed for an irregular people's war. These concepts were put into practice in the ‘war of freedom’ – or ‘war of liberation’ – in 1813. Eventually both the mobilisation and the tactics remained regular, however, despite the emphatic appeal to a national ‘people's war’.  相似文献   

12.
Isabelle Côté 《Civil Wars》2015,17(3):357-378
Why are large population movements conflict-prone in some regions while they remain peacefully integrated elsewhere? I argue that clashes between ethnically distinct indigenous populations and migrants – i.e. ‘Sons of the Soil (SoS) conflict’ – erupt when there are large socio-economic and political horizontal inequalities between ‘dominant migrants’ and locals. A comparative case study of two Chinese minority regions based on ethnographic fieldwork and population data provides a vivid illustration of the mechanisms linking migration to SoS conflict. With fewer HIs between migrants and locals, Inner Mongolia avoided many of the violent clashes that were commonplace in Qinghai, a province fraught with disparities.  相似文献   

13.
We examine the validity of the guns-versus-butter hypothesis in the pre-Arab Spring era. Using panel data from 1995 to 2011 – the eve of the Arab uprisings – we find no evidence that increased security needs as measured by the number of domestic terrorist attacks are complemented by increased military spending or more importantly ‘crowd out’ government expenditure on key public goods such as health care. This suggests that both expenditure decisions were determined by other considerations at the government level.  相似文献   

14.
Uri Tor 《战略研究杂志》2017,40(1-2):92-117
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence.  相似文献   

15.
16.
The beginning of the twenty-first century has witnessed the emergence of balancing responses to the US hegemony, among which Russia’s foreign policies stand out as corresponding to what is understood as ‘hard balancing.’ Why is the United States being balanced against? This paper categorizes the existing theories of non-balancing into six conditions that together guarantee the absence of balancing and demonstrates that the current unipolar system can satisfy only one of them. This eases the systemic constraints and makes balancing possible. The paper then presents three cases of balancing with reference to President Putin’s foreign policy. It argues that even though in terms of relative military capabilities unipolarity still holds, the emergence of counter-hegemonic balancing is indicative of important changes in the nature of post-Cold War American domination.  相似文献   

17.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

18.
This paper asks whether Bosnian Serb leaders’ choice to carry out a secession war in 1992–1995 was rational from the point of view of their stated goal of ethnic cleansing. We construct two indexes, one of ethnic purity and another of ethnic Serb concentration, and apply them to a counterfactual estimate of the outcome of ‘peaceful’ ethnic cleansing – what could have been achieved by population exchange based on pre-war territorial Serb power without war – in comparison to the actual outcome of the war. We find that the gross benefits of the chosen strategy of secession and war far exceed anything that could be achieved by the peaceful alternative. A conjectural assessment of perceived costs suggests that also net benefits were maximized by the war strategy. The implication for international deterrence policy is that credible judicial prosecution and punishment is the best way to alter the prospective perpetrators’ calculus.  相似文献   

19.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   

20.
ABSTRACT

Over the last five decades, India’s nuclear and space programs have gone through several phases, from collaboration to divorce to supportive. An interplay of two factors determined the nature of the relationship. One was the state of India’s nuclear-weapon program. The second was international conditions, especially India’s relationship with the nuclear-nonproliferation regime. In the early decades, because of the rudimentary nature of India’s nuclear and space programs, the relationship was collaborative, since the rocket technology being developed was a necessary adjunct to the nuclear-weapon program. Subsequently, as India’s rocketry capabilities and nuclear-weapon program began to mature and concerns about international sanctions under the non-proliferation regime began to grow, the two programs were separated. The Indian rocketry program was also divided, with the civilian-space and ballistic-missile programs clearly demarcated. After India declared itself a nuclear-weapon state in 1998 and the programs matured, the relationship has become more supportive. As the two programs mature further, this relationship is likely to deepen, as the nuclear-weapon program requires space assets to build a robust and survivable nuclear deterrent force.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号