首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 718 毫秒
1.
2.
3.
4.
Russia’s illegal occupation and annexation of the Crimean peninsula in February–March 2014, and the country’s well-documented involvement in the separatist conflict in Eastern Ukraine, have led to a significant worsening of Russia’s relations with the West. Vladimir Putin’s move to redraw Russia’s southern borders through the use of military force and subversive measures has given rise to an uncertainty that goes well beyond the post-Soviet space. Since 2014, North Atlantic Treaty Organization (NATO) has had to reassess many aspects of its relationship with Russia. The alliance has also initiated various measures to strengthen the military security of its eastern member states, particularly the Baltic states, Poland, and Romania. Further to the North, NATO’s northernmost member – Norway – is following developments in Russia with a heightened sense of awareness. The same goes for non-aligned Sweden and Finland, which are trying to adapt to the emerging, and increasingly complex, security environment in Northern Europe.  相似文献   

5.

Perceptions of Third World nations as susceptible to communist subversion and revolutionary warfare led the Eisenhower administration to formulate a coordinated internal security strategy known simply as ‘1290d’. Later renamed the Overseas Internal Security Program (OISP), this policy initiative sought to strengthen host‐nation security forces, judicial systems, and public information media in an effort to combat indirect communist intervention strategies. Implementing OISP policy in Latin America proved difficult. In Congress, the administration was criticised for colluding with dictatorial regimes, while Latin Americans feared that the new program would be used as a ‘Trojan Horse’ to penetrate their security structures. After the Cuban Revolution, however, OISP policies developed under Eisenhower came to dominate US‐Latin American security relations for the remainder of the Cold War.  相似文献   

6.
7.
8.
2014–2015 were years of turmoil for strategic relations, with Sino-Russian relations emerging as a particularly interesting set of ties to observe. This article asks whether recurrent Sino-Russian exhortations of friendship are mirrored by their strategic alignment in the defence and security realm, half a century after the end of the Sino-Soviet pact during the communist era. We examine the arms trade between the two countries and with regional partners, but also the recent pattern of bilateral and multilateral military exercises, as a combined test of the security and defence relationship. We are able to show that the image of friendship that both Moscow and Beijing like to promote, while apparent at the UN Security Council and within the BRICS group, remains constrained by rivalry in high-tech segments of the arms industry and by lingering concerns about the prospects of peer interference in their shared regional vicinity.  相似文献   

9.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

10.

Despite considerable post‐war planning, the British counter‐insurgency campaign in Kenya did not constitute a Colonial Office strategy for decolonisation. COIN in Kenya had one purpose: to re‐impose law and order, or British control. If for no other reason, this is demonstrated by the initial reluctance of the Colonial Office to intervene. Frequent re‐assessments and postponement of the ending of the State of Emergency, and the subordination of socio‐economic and political reforms to military objectives, show clearly that decolonisation was not high on the British list of priorities in Kenya. This article questions the relationship between COIN and decolonisation, and the validity of models of British counter‐insurgency.  相似文献   

11.
12.
An interactive economic model of military spending is proposed. It is quantified on the basis of cross section data for East Asia. Projections of military spending to the end of the decade suggest that the growth of military spending in the region will decline slightly in the current decade. East Asian military spending can, however, be greatly influenced by the path of Chinese and US military efforts. An expansion of military spending by China could cause neighboring countries to greatly increase their military expenditures.  相似文献   

13.
This article responds to the reviews by Gwinyayi Dzinesa and Elling Tjønneland of Community of insecurity: SADC's struggle for peace and security in southern Africa. It does this by exploring the methodological and analytical challenges in evaluating SADC's peace and security endeavours. It emphasises the need to present explicitly the criteria for assessment, to concentrate on the actual performance of the organisation rather than on its declarations and structures, and to make assessments and predictions on the basis of historical trends and sound analysis.  相似文献   

14.

In October 1959 the Eisenhower administration dispatched a CIA Special Team to survey the violence problem in Colombia. This article, part one of a two‐part series, examines this first significant attempt by a US administration to influence that nation's internal security situation. It investigates the Special Team's actions and analyses its recommendations for transforming Colombia's conventionally‐orientated security forces. The Team's survey, which focuses on counter‐insurgency tactics, civil action, intelligence operations, psychological warfare, and covert action, is the foundation from which Colombia's modern internal security structures are derived.  相似文献   

15.
After inconclusive elections in 2012, Lesotho had a coalition government for the first time, made up of three political parties that had a narrow majority in parliament. The new government, however, faced several challenges, some of which were of its own making. The agreement among the three parties was to literally divide the government into three parts, leading to a continuous stalemate in its operation; the most serious consequence was the prorogation of parliament and the resultant attempted coup. The flight of the prime minister to South Africa and his return under a Southern African Development Community (SADC) security detail provided a short-term solution to Lesotho's security crisis. Under Cyril Ramaphosa's mediation, the prorogued parliament was conditionally opened and the election date set for 28 February 2015. However, the security dilemma – whereby the prime minister, who is also minister of defence, has no control over the military – remains. When elections are held, there does not seem to be a guarantee that they will be held in peace; moreover, there are now fears that the losers will not accept the results of the elections because of the security vacuum in Lesotho. This article argues that peace can only be salvaged by enhanced SADC security before, during and after the elections. It argues that the SADC mission should remain beyond the elections to oversee the constitutional changes that are necessary for ensuring long-term stability. On their own, Lesotho politicians are unlikely to be able to work together in order to move the country forward.  相似文献   

16.
This article explores whether it makes sense for national governments to employ defence industrial policies – such as offsets and discriminatory procurement practices – to support their domestic defence industries. This question has so far primarily been discussed by economists, who have argued strongly against the use of defence industrial policies. This article maintains that these economists fail to address the often complex motivation behind the introduction of these policies. It illustrates these shortcomings by contrasting their arguments against a case study of Norway, which accounts for the country’s use of defence industrial polices from the early post-Second World War era up until today. The article concludes that, depending on their objectives, defence industrial policies can be seen as either a sound security strategy or an economic fallacy.  相似文献   

17.
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged.  相似文献   

18.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   

19.
ABSTRACT

Traditionally the African concept of security concept has been dominated by land-based conflicts with little attention being paid to maritime threats and the protection of the maritime environment. With the rapid escalation of piracy on the East Coast, the African Union (AU) was compelled to develop a joint strategy to address its changing African Maritime Domain (AMD). This was achieved by the AU’s Africa’s Integrated Maritime Strategy (AIMS 2050) in 2014, culminating in the adoption of a binding maritime security and safety charter in Lomé in 2016. The Lomé Charter should ideally focus the general provisions of AIMS 2050 so that Africa, as a continent, can take responsibility for security and economic empowerment of the AMD. This article considers various maritime security documents against the backdrop of an African context for understanding maritime security, in order to evaluate whether the Lomé Charter, as a manifestation of AIMS 2050, will realise its aspirations. Focussing on security is not sufficient and too much emphasis is placed in the Lomé Charter on restriction rather than development. Strong political will and leadership is required to facilitate implementation, identifying common security concerns to ensure better cooperative and collective strategies in a diverse implementation environment.  相似文献   

20.
ABSTRACT

Attempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号