首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
Abstract

The attitude of Turkish officials toward the US nuclear weapons deployed in Turkey for over four decades has been static. Officials have understandable arguments, based on their threat analysis, as to why these weapons should be retained in Turkey. However, since the 9/11 terrorist attacks, the international security environment has undergone radical changes. The classical deterrent value of nuclear weapons no longer applies with these emerging threats. At the same time, there is an increased probability of unauthorized use of crude radiological devices or nuclear weapons by terrorist organizations. In addition to increased security at storage sites, bolder steps must be taken by concerned countries to get rid of nuclear weapons. Such steps should begin with drawing-down US nuclear weapons deployed in allied countries including Turkey.  相似文献   

2.
International security cooperation usually takes one of two forms. A classical collective security organization is designed to promote international security through regulating the behavior of its member states. A defensive security organization is designed to protect a group of states from threats emanating from a challenging state or group of states. Both forms of security cooperation bind states to act in concert with respect to threats presented by other states. The emergence of non-state actors such as terrorist or extremist organizations challenges traditional forms of collective security. Threats from political extremism, terrorism, and outlaw organizations have grown in visibility during the past decade in the countries of Eurasia. The terrorist attacks of September 11 and the ensuing global war on terrorism have given added impetus to the Eurasian inter-state cooperation in confronting non-traditional threats and challenges from non-state actors. Bearing in mind the theory of collective security, this article analyzes threats posed by non-state actors with respect to Eurasian collective security organizations including the Shanghai Cooperation Organization, the Conference on Interaction and Confidence Building Measures, and the CIS Collective Security Treaty Organization. The article concludes that the effectiveness of these organizations at achieving stated objectives depends upon their capacity to adopt new criteria of effectiveness.  相似文献   

3.
ABSTRACT

The international security community is increasingly concerned about the nexus between indiscriminate terrorism and the proliferation of nuclear technology and materials. Many nuclear terrorism threat assessments focus primarily on terrorist motivations to employ an atomic bomb, the availability of nuclear know-how and technology, and the opportunity for clandestine organisations to acquire fissile material. Scholars and experts, however, often neglect to elaborate on the challenges for terrorist organisations in organising and implementing the construction and detonation of a crude atomic bomb. This will most likely be a complex project. This article will therefore explore the organisation of such an endeavour. To be precise, we will highlight the impact of the organisational design of the terrorist group. The organisational design determines the division of tasks and how coordination is achieved among these tasks. It therefore has a strong impact on the functioning of any organisation, especially an innovative and complex terrorism project. Building on a case study of Los Alamos, we inductively infer that terrorist organisations face an inherent effectiveness-efficiency trade-off in designing a nuclear armament project.  相似文献   

4.
Governmental support for nonstate actors designated as terrorist organizations is not only a policy that carries significant international and domestic costs; it further poses a theoretical challenge to structural realist thinking about alliance politics in international relations. By debating, firstly, the utility of terrorism as a means to influence systemic power distribution, and, secondly, the functional equality of nonstate actors, this article considers under what conditions state sponsored terrorism occurs despite the expected security loss. Drawing on the example of Iraq between 1979 and 1991, the assumption that the interplay of external security challenges—as well as domestic dissent as an intervening, unit-level factor—affects governmental alignments with terrorist groups will be reviewed in the cases of the Iranian Mujahedin al-Khalq Organization, the Syrian Muslim Brotherhood and armed Palestinian factions. The article concludes by addressing whether state sponsorship of terrorism is inevitably linked to policy failure or whether it could be seen as a good investment to balance external and internal security challenges successfully.  相似文献   

5.
Emanuel Adler 《安全研究》2013,22(2):199-229
This article seeks to initiate a new round of strategic intellectual innovation in an era when threats posed by non-state terrorist organizations and their state supporters do not resemble Cold War threats. Based on an interpretative sociological reading of the concepts of power, security, and rationality, it argues that a “damned if you do, damned if you don't” dilemma is to the post-Cold War era what the danger of surprise attack or unintended nuclear war was to the Cold War: the defining structural threat of international politics. The dilemma leaves states confronting asymmetrical warfare with the choice of reacting with force to a terrorist act or practicing appeasement. Neither approach, however, can achieve the goal of putting an end to terrorism. Deterrence sustains the dilemma by providing a rationale for why force should be used and why self-restraint is irrational. This article proposes a third option, defusing, which may be accomplished by denial (preventing provocateurs from dragging states into the use of force) and restructuration (transforming the structure and rules of the situation). Defusing relies on “performative power”—the capacity to project a dramatic and credible performance on the world stage and to decouple social actors, their audiences, and their most deeply held strategic beliefs. The force of the argument is illustrated by examples from the global “war on terror,” the 2006 Lebanon War, the 2008–09 operation “Cast Lead” in Gaza, and the Iranian nuclear crisis.  相似文献   

6.
The national security consequences of the potential use of the Internet by terrorist organizations have attracted the interest of many academics and government and intelligence officials. The goal of this article is to provide a new explanatory angle concerning the possible targets of terrorists’ offensive information warfare (OIW) operations. It argues that these organizations may prove more valuable and effective to undermine on‐line activities of leading electronic commerce sites than to target elements of the critical national information infrastructure. These offensive actions, in fact, would directly impact one of the explanatory elements for the Internet's success: users’ perception of its trustworthiness. Before tackling its arguments, the article provides a definition of offensive information warfare. Then, it investigates how terrorist organizations would formulate their operational style concerning offensive information warfare. The stage is then set to define the central argument of the article by drawing from studies carried out in the areas of information security, international management and electronic commerce. The article concludes with a set of policy recommendations to counter these potential threats and thus make the Internet a safer communication instrument for economic, commercial and social development.  相似文献   

7.
太空技术的出现来自冷战时代的美苏军备竞赛。在世界第一颗卫星上天后,太空随之被赋予了军事化意味,太空武器化接踵而至。冷战后,为了确保太空霸权,同时维护一超独霸的地位,美国不惜重拾冷战时代的太空武器化政策,由此,引起其他国家的相应回应。太空武器化程度逐渐抬升,给国际战略稳定与平衡造成严重威胁与挑战,引起反导系统和太空军备竞赛,增加核战风险,阻碍世界核裁军进程,也给太空商业开发、"太空2030议程"等带来诸多挑战。太空武器化给中国太空安全造成巨大的挑战与威胁,使中国太空资产的安全陷于危险境地,中国利用太空资产的自由有可能被限制或被剥夺,战略目标(包括战略核力量)受到太空系统的侦察与打击的威胁。为应对太空武器化的威胁与挑战,从安全上加强太空威慑力量建设,构建中国的太空安全体系显得紧迫与必要。  相似文献   

8.
ABSTRACT

National and state-level security forces across India operate against insurgents, criminals, and external threats. These operations are politically consequential, yet these forces tend to be quite opaque. This article provides new data on the fatalities that these forces have suffered in order to explore the location and nature of political violence in India. We create several new datasets of security force fatalities extracted from commemorative security force “martyrs” documents and online databases published by Indian state-level police organizations, the Ministry of Home Affairs (MHA), and the Ministry of Defence, as well as semi-official sources. The data vary wildly in quality and detail, and there are serious limits to their use. Nevertheless, they allow us to – with caveats – measure the location and incidence of violence, as well as the demographic underpinnings of the Indian Army, the two largest MHA paramilitaries, and several state police forces. Caveats aside, we anticipate that subsets of these data are sufficiently high in quality, facilitating future rigorous quantitative analysis on political violence in India. The entire dataset will be made publicly available.  相似文献   

9.
This article reviews power transition theory and emerging threats to U.S. national security. It then analyzes how the 2014 QDR will ensure U.S. relative power decline and how the strategy fails to effectively counter the rise of China and Russia as challenger states in the international system. Finally, several policy options are proposed to address the deficiencies of the QDR and to counter an increasingly aggressive China and revisionist Russia.  相似文献   

10.
Scholars, politicians, and pundits increasingly suggest lone wolf terrorists are substantial threats, but we know little about how dangerous these actors are—especially relative to other terrorist actors. How deadly are lone actor terrorists? A growing body of empirical research focuses on terrorist organizations, but similar work on lone actors is sparse. Furthermore, attempts to explicitly compare these or other types of terrorist actors are almost non-existent. This article considers theoretical arguments for why lone wolves ought to be especially lethal. However, it presents an argument for why terrorist groups should generally be more lethal. This argument is conditional upon the environment in which actors operate. Lone wolves should only be more deadly in states with especially strong counterterrorism capacity. The article uses data on terrorist attacks in fifteen developed countries, 1970–2010, to compare the lethality of terrorist acts. Around the world, attacks by organizations tend to be far more lethal than attacks by other actors. In the United States, however, lone wolves are generally the more lethal terrorist actors. This is argued to be because the robust counterterrorism capacity makes organized terrorism more difficult to accomplish.  相似文献   

11.
This article assesses the scope and nature of the current terrorist threat to the United States and suggests a strategy to counter it. Al-Qaeda continues to pose the most serious terrorist threat to the U.S. today. If the September 11, 2001 attacks have taught us anything, it is that al-Qaeda is most dangerous when it has a sanctuary or safe haven from which to plan and plot attacks. Al-Qaeda has acquired such a sanctuary in Pakistan's Federal Administered Tribal Areas (FATA) and its North-West Frontier Province (NWFP) and surrounding environs. Accordingly, the highest priority for the new American presidential administration must be to refocus our—and our allies'—attention on Afghanistan and Pakistan, where al-Qaeda began to collapse after 2001, but has now re-grouped. This will entail understanding that al-Qaeda and its local militant jihadi allies cannot be defeated by military means alone. Success will require a dual strategy of systematically destroying and weakening enemy capabilities—that is, continuing to kill and capture al-Qaeda commanders and operatives—along with breaking the cycle of terrorist recruitment among radicalized “bunches of guys” as well as more effectively countering al-Qaeda's effective information operations. The U.S. thus requires a strategy that harnesses the overwhelming kinetic force of the American military as part of a comprehensive vision to transform other, non-kinetic instruments of national power in order to deal more effectively with irregular and unconventional threats. This article first discusses the scope and details of the terrorist threat today and then proposes a counterterrorism strategy for the new presidential administration. It focuses first on creating a micro approach to address the deteriorating situation in both Afghanistan and Pakistan. It then considers the requirements of a broader macro strategy to counter terrorism and insurgency.  相似文献   

12.
基于以人民安全为宗旨的总体国家安全观和“以人为本、外交为民”的领事保护理念,受冲突影响和高风险区域的海外机构、企业和公民的安全是中国海外安保供给体系的首要关切。后疫情时代的安全环境、安全威胁和安保内容的新变化凸显了海外安保的供需落差,如何通过完善海外安保供给体系来应对后疫情时代的挑战,成为总体国家安全治理不得不重视的紧迫性议题。根据风险/焦虑-威胁/恐惧-危机/恐慌的升级过程,可将海外安保区分为预防、震慑、应急三种类型,政府、军队、国际安保公司、社会组织和海外企业能够发挥各自不同的作用。在明晰中国海外安保“阶段-类型”及对应的多元供给主体职能的基础上,中国海外安保供给体系的完善需要在总体国家安全观理念指导下,遵循“预防-震慑-应急”一体化的供给模式,建构多元供给主体联动体系,从而弥补现有供给体系的不足,全面推进“海外中国平安体系”建设。  相似文献   

13.
The article examines the effectiveness of the Maastricht Third Pillar's internal security provisions with respect to the fight against terrorism. An assessment of EU internal security cooperation is made from a perspective that takes into account questions of both operational anti‐terrorist proficiency and democratic acceptability. Police and security forces throughout the European Union (EU) have strongly endorsed the Third Pillar as providing an efficient response to serious criminality. However, from a liberal democratic point of view the Maastricht provisions raise extremely serious questions concerning the lack of critical public debate and systems of accountability within the EU. Close coordination between member states is definitely necessary if terrorism is to be effectively countered in the region. However, it is vital that in the headlong rush to provide for an enhanced international operational capacity critical considerations of democratic control are not lost. One cannot expect to gain the type of public consent that is crucial for democratic acceptability if fundamental fears exist over the legitimacy and desirability of ever closer law enforcement and judicial cooperation.  相似文献   

14.
This article examines how globalisation processes provide new incentives and opportunities for non-state political entrepreneurs to build transnational political movements. Drawing on the literatures on non-violent social movements and transnational networks, the article examines terrorism and political violence as components of the ‘repertoires of contention’ used by radical transnational groups seeking political change. Examples from both the pre- and post-9/11 periods are provided, and the implications for traditional models of state security are discussed. The article concludes by contending that the combination of increased levels of globalisation and the emergence of new networks of violence is creating a fundamental shift in the international security environment, in which the distinction between internal and external security threats is increasingly blurred. While state security strategies are reflecting these changes, less attention has been paid to the political implications of these changes. New security responses need to also be matched by new sets of political strategies at the global level.  相似文献   

15.
16.
This article offers an analysis of the European Union's (EU) efforts in the fight against terrorist finances. Following the 9/11 attacks, the EU has adopted the relevant United Nations counterterrorism resolutions as well as the special recommendations of Financial Action Task Force. In addition, the EU has developed its own measures spanning across all of its three pillars. There is, however, a cause for concern that some of these measures have not been properly implemented, while others have been criticized on legal, transparency, legitimacy, and efficiency grounds. These shortcomings are not only due to EU's own internal obstacles, but also result from the EU's uncritical adoption of the prevailing smart sanctions and money-laundering regimes, which are based on a number of unwarranted assumptions that do not reflect the nature of contemporary terrorist threats in Europe.  相似文献   

17.
We deal in this article with the relationship between ETA attacks and electoral support for Batasuna, its political wing. We show that the relationship is twofold, since the geographical distribution of electoral support for the terrorists affects the location of ETA attacks, but violence also influences electoral support for the terrorist cause. On the one hand, when ETA chooses a location for its attacks, it takes into account the electoral strength of Batasuna. Our results show that the higher the vote for Batasuna in a municipality, the more likely members of the security forces will be killed there. With regard to the targeting of civilians, the relationship is curvilinear. ETA kills civilians in municipalities that are polarized, where support for Batasuna falls short of being hegemonic. On the other hand, our results also show that ETA attacks have an effect on the size of its support community. When ETA kills members of the security forces, voters punish the Batasuna party electorally. In the case of civilians, it depends on the specifics of the various campaigns. We find that when ETA kills informers and drug-dealers, the vote for Batasuna increases. ETA's killing of non-nationalist politicians, however, decreases Batasuna's vote share.  相似文献   

18.
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications.  相似文献   

19.
What the current world is most concerned about is the situation of security.Without security,it is not to mention economic construction,nor peaceful development,nor people living and working in peace and contentment.Allcountries in the world are no exception in this regard.This article will deal briefly with the questions of whether the cur-rent world is secure,where the threats to the world security come from and how these threats are coped with.I.The current world is secure on the whole but…  相似文献   

20.
This article asks the following questions. Which terrorism threats, challenges and responses did key players consider to have been decisively changed by 9/11? On close inspection now, nearly two decades after those attacks, how are we to assess such claims? What did 9/11 really change regarding terrorism and counterterrorism? And what remained unaltered? The article’s central argument is this: some western states exaggerated the extent to which terrorist threats and challenges had been changed by 9/11 and, as a consequence, they did significantly alter some of their responses to terrorism; but at the heart of this ironic process was the tragic reality that, had there been a more serious-minded and historically sensitive recognition of how little had necessarily been changed by 9/11 in terms of terrorist threats and challenges, then the twenty-first-century experience of non-state terrorism would have been much less painful than has been the case in practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号