排序方式: 共有135条查询结果,搜索用时 0 毫秒
41.
Andrew Sanders 《Small Wars & Insurgencies》2013,24(3):465-492
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland. 相似文献
42.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism. 相似文献
43.
Deane-Peter Baker 《African Security Review》2013,22(3):54-64
Abstract The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry. 相似文献
44.
Simon Haddad 《Defense & Security Analysis》2013,29(1):16-29
Data from a cross-sectional survey of 176 Lebanese Shiis living in Metropolitan Beirut have been used to investigate the relationship between social and religious variables and attitudes toward Lebanon's “Party of God” (Hezbollah). The results indicate that Islamic religiosity, political discontent, and access to social welfare are positively associated with endorsement of the party. The implications of these findings for the party's future in light of recent political developments are discussed. 相似文献
45.
ABSTRACTThis study seeks to evaluate the threat of malicious chemical use by non-state actors. It finds that non-state actors have primarily turned to ready-to-use crude chemical weapons (CW) instead of traditional CW agents. Interestingly, the worst crude CW attacks have been more destructive than those employing traditional CW. Scenarios for catastrophic consequences exist, but chemical attacks have typically been used to accomplish tactical goals, which leverage psychological and economic impacts. Therefore, successful efforts to counter CW proliferation by non-state actors must be substantially different from those targeting states. 相似文献
46.
Paul F. Walker 《The Nonproliferation Review》2013,20(3-4):517-525
ABSTRACTThe recent use of chemicals in warfare in Syria and Iraq illustrates that, despite the important work of the 1997 Chemical Weapons Convention (CWC), the world has not yet been totally successful in stopping the use of indiscriminate toxic agents in conflicts, either by states or non-state actors. Michael Crowley's excellent and timely new book, Chemical Control, analyzes the use of “riot control agents” (RCAs) and “incapacitating chemical agents” (ICAs), including launch and dispersal systems, by police, paramilitary, and military forces over the last decades and raises the challenging question about where the red line might be drawn between banned and permitted uses of chemicals. He discusses this problem not only in the context of the CWC, which allows use of RCAs for civilian riot control, but also in the context of international law, human rights, and criminal justice, including the Biological and Toxin Weapons Convention and other disarmament and abolition regimes. He proposes a “holistic, three-stage approach” to addressing this issue “for effective regulation or prohibition of the weapon or weapon-related technology of concern.” As we approach the global abolition of a whole class of weapons of mass destruction in the next decade or even sooner, Chemical Control is helpful in better understanding and solving the dilemma of what's actually banned or permitted under international law, and precluding states undermining the chemical weapons ban. 相似文献
47.
Shireen K. Burki 《Defense & Security Analysis》2013,29(3):234-252
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir. 相似文献
48.
This article examines the historical impact of foreign fighters and how the international community has sought to counter this threat. It argues that foreign fighters have contributed significantly to the metastasis of Salafi-jihadism over the past 30 years. They have globalized local conflicts. They have brought advanced skills to battlefields. Further, the logistics infrastructure built by foreign fighters has allowed Salafi-jihadism to expand rapidly. The challenge for security officials today is how to prevent the foreign fighters in Syria and Iraq from expanding the threat of Salafi-jihadism further. To inform this effort, this article derives lessons learned from past efforts against Arab Afghans in Bosnia (1992–1995) and Abu Musab al-Zarqawi’s foreign volunteers in Iraq (2003–2008). 相似文献
49.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
50.
Bruno S. Frey 《Defence and Peace Economics》2013,24(3):245-252
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild. 相似文献