首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 702 毫秒
1.
Abstract

Scholars have vigorously debated whether adversaries carefully scrutinize if states have, in the past, demonstrated toughness and whether adversaries base present and future crisis-bargaining behavior on this record. If they do—as a central strain of deterrence theory, and its contemporary defenders, maintain—hard-line policies, including limited military interventions, can bolster deterrence. We know much less about a second audience that is presumably attentive to demonstrations of resolve: allies. A common view, derived from the same logic, and which we call Hawkish Reassurance Theory, suggests that states should support and find reassuring their allies’ faraway military interventions. In contrast, we argue that such interventions call into doubt the intervener’s will and capacity to fulfill its core alliance commitments, undermine the credibility of the alliance, and threaten allies’ security in both the short and long run. Allies thus ultimately oppose powerful partners’ hawkish postures in distant conflicts, and they may even consequently explore routes to security beyond the alliance. To assess this argument, we examine the varied stances leading US allies took from the start of the US intervention in Vietnam through its end. Allied behavior was largely consistent with our expectations. We conclude that, if one reason to deploy force is to signal to allies that you will come to their aid when they call, states should not bother.  相似文献   

2.
《Orbis》2023,67(3):411-419
Over the past two decades, a trend has emerged where US partners and allies look outside of their bilateral relationship with the United States and pre-existing multilateral bodies to join ad-hoc networks. They are joining these networks to both obtain their own security goods and to provide regional public goods. Yet, these ad-hoc networks, or “minilaterals,” often include multiple US allies or shared partners of the United States. For example, the revived Quadrilateral Security Dialogue (Quad) includes Japan, India, Australia, and the United States, encompassing two separate US treaty alliances. Similarly, the tripartite pact AUKUS connects the US-UK transatlantic alliance relationship to the US-Australia alliance in the Indo-Pacific. The newest addition to this growing trend in minilateralism, the I2U2, which redefine the Middle East as West Asia by bringing together the United States, India, Israel, and the United Arab Emirates (UAE), provides additional insight into the benefits of minilaterals as mechanisms for organizing interstate cooperation.  相似文献   

3.
This article offers three new types of variables for computation of the share that NATO countries should contribute to the common defence. I use Uppsala conflict data (UCDP) on conflict participation to reveal how the asymmetry in power that allows the US to define most of the framings on which NATO’s utility calculations are based, compensates for the greater material contribution made to NATO by the US. Then I follow Ringsmose’s model of NATO burden sharing and create two types of variables crucial to the calculation of burden sharing. One reveals the share of US military protection aimed at protecting its NATO allies. The other measures how much US global security efforts against tyranny and terror are dependent on NATO allies. These two variables are developed by means of computer-assisted discourse analysis of US Presidential Papers. The three new variables contribute to a more complex mathematical model on fair burden sharing, indicating at the same time that the imbalance between US and allied contributions is declining. If European allies have ever exploited the United States in the past, then at least the relationship has become more even during the past two decades.  相似文献   

4.
Thomas Meyer 《安全研究》2013,22(2):222-258
Contemporary us counterinsurgency doctrine in Iraq and Afghanistan requires junior leaders to engage in both combat and state-building activities. This study aims to explain the fundamental challenge in merging these. I argue that difficulty lies in separating insurgents from civilians, and translating doctrine from senior to junior officers. Junior officers consistently develop a similar ad hoc decision-making tool— role-switching—to simplify complex situations to a binary of “hostile or not.” They understand themselves to fill only two roles, the violent “on” role and the non-violent “off” role and develop several tools to minimize the difficulty of role-switching, help their subordinates switch, and signal switching to local populations. Ultimately, however, problems with role-switching—role stickiness, inappropriate switching, and role bias—can in some cases encourage indiscriminate and excessive violence, pointing to the fundamental failures of using military forces as a one-size-fits-all solution to state-building projects abroad.  相似文献   

5.
The conventional wisdom among US foreign policymakers is that drones enable precise strikes, and therefore limit collateral damage. In contrast, critics point out that many civilian casualties have ensued, and they variously cite poor intelligence and imprecision of the strikes as reasons for this. Critics have also raised concerns that the US and its allies are engaging in “lawfare” to legitimise violations of human rights law. As such, some have questioned whether academic engagement with the legal questions surrounding targeted killings amount to collusion with state attempts to legitimise human rights violations. This article will argue that by conceptualising the targeted killings programme as a form of state terrorism, we are better equipped to provide a critical analysis of the drones programme within the context of a long history of violence and terrorism which has underpinned the imperial and neo-imperial projects of the UK and US. The article will then argue that there are important similarities between the targeted killings programme, and previous UK and US counterinsurgency operations, including prior uses of air power, and operations involving the internment of terror suspects, and the targeting of specific individuals for interrogation and torture or disappearance. Common to these programmes is that they are forms of policing aimed at crushing rebellions, stifling disorder and constructing or maintaining particular political economies, through terror. Also common to these programmes are the attempts made either to conceal illicit actions, or in the event they are exposed, to shroud them in a veil of legitimacy. The article concludes by offering some brief reflections on why we should not abandon the quest to resolve the thorny legal questions around the targeted killings programme.  相似文献   

6.
Do natural disasters prolong civil conflict? Or are disasters more likely to encourage peace as hostilities diminish when confronting shared hardship or as shifts in the balance of power between insurgents and the state hasten cessation? To address these questions, this study performs an event history analysis of disasters’ impact on the duration of 224 armed intrastate conflicts occurring in 86 states between 1946 and 2005. I contend that natural disasters increase conflict duration by decreasing the state’s capacity to suppress insurgency, while reinforcing insurgent groups’ ability to evade capture and avoid defeat. First, disasters’ economic impact coupled with state financial outlays for disaster relief and reconstruction, reduce resources available for counterinsurgency and nation building in conflict zones. Second, the military’s role in administering humanitarian assistance can reduce the availability of troops and military hardware for counterinsurgency, prompt temporary ceasefires with insurgents, or both. Third, natural disasters can cause infrastructural damages that disproportionately hinder the state’s capacity to execute counterinsurgency missions, thereby making insurgent forces more difficult to capture and overcome. The combination of these dynamics should encourage longer conflicts in states with higher incidence of disaster. Empirical evidence strongly supports this contention, indicating that states with greater disaster vulnerability fight longer wars.  相似文献   

7.
This article examines whether geographical proximity between defensive allies and a protégé increases the likelihood of successful extended general deterrence. I argue that proximate allies are better at making a credible deterrent threat because proximate allies are more willing and able to help alliance partners in times of crisis than distant ones. This claim is theorized by examining how geographical distance influences the international and domestic costs of alliance commitments. The empirical tests reveal that a potential aggressor is less likely to initiate a militarized dispute against a target with proximate defensive allies. Furthermore, I find that the power of proximate defensive allies is a more significant determinant of successful extended general deterrence than that of distance allies. Interestingly, I also find that the constraining effects of geographical distance on the effectiveness of extended general deterrence have been alleviated by advancements in military technologies throughout history.  相似文献   

8.
How does manpower affect counterinsurgency? Important debates about counterinsurgency theory, military doctrine, force planning, and ongoing military operations revolve around assumptions about the role manpower plays in determining counterinsurgency outcomes. But these assumptions have not, by and large, been subjected to large-n analysis. This paper helps serve that role by examining new data on counterinsurgents’ deployments across 171 campaigns since World War I. These data provide insight into a range of important issues, such as how force size should be measured, whether it is related to counterinsurgent success, whether troop nationality matters, and whether the role of manpower varies across contexts. Of these findings, the most notable is that conventional rules of thumb for force sizing, including the recommendation put forth in official US military doctrine, receive no empirical support. These findings therefore challenge the prevailing wisdom, while laying the groundwork for a range of future scholarship.  相似文献   

9.
In recent years Western policy towards Afghanistan has been marked by inconsistencies and errors. This article explores United States (US) soldiers' perceptions of the enemy in Afghanistan based on oral history interviews with dissenting combat soldiers who served in the Afghan theatre. By foregrounding soldiers' attitudes towards the enemy, this study includes marginalized voices, often overlooked, that challenge prevailing misconceptions. General David Petraeus, the former commander of US forces in Afghanistan, has argued that significant battlefield decisions are not reserved for generals alone. Petraeus' counterinsurgency programme promotes ‘strategic corporals’ whose decisions hold important consequences. If strategic corporals are involved in military decision-making, it follows that their interpretation of the conflict may also hold strategic implications for the researcher. Soldiers' views of war are not the final, authoritative verdict. However, this article suggests that these strategic corporals should be included in a complex matrix of interpretation to broaden US understanding of the enemy.  相似文献   

10.
治理族群叛乱的目标既包括土地的控制,也包括人的控制,这是治理族群叛乱区别于其他形式叛乱的特点之一。人的控制实际包含两个内容,既包括人心向背,也包括人员数量的控制。人心向背关乎民众支持,而争取民众支持的必要性在于,虽然拥有民众支持并不必然导致叛乱的平息,但是没有民众支持是不能平息叛乱的。在族群叛乱已经发生的情况下,国家政府只有赢得更多当地民众的支持,才能成功治理叛乱。根据冲突各方的暴力行为方式及其对当地民众支持的影响,成功平息叛乱应具备国家政府有区别使用暴力、叛乱组织无区别使用暴力、当地温和派主导平叛行动等三个必要条件,以争取更多民众支持。这三个条件构成的条件组合,可以有效控制和减少叛乱组织能够招募到的人员数量,只要国家政府的平叛战略能够有效控制叛乱组织所招募的叛乱人员数量,叛乱组织就将走向衰败并最终消亡,也就是说这一条件组合能够成为国家政府成功平叛的一个充分条件。通过对结合俄罗斯、印度和西班牙等国家治理族群叛乱的经验和教训的分析,进一步证实了以上观点。  相似文献   

11.
ABSTRACT

Christensen’s and Snyder’s neorealist-based theory of buck-passing and chain-ganging uses offence-defence balance to predict state security policy choices under multipolarity. This approach is applicable to the US-led alliance system in the multipolar Indo-Asia-Pacific. Given regional Sino-US rivalry, hedging opportunities for US ‘hub-and-spoke’ allies will dissipate, increasing the likelihood of allies choosing to buck-pass or chain-gang in the face of conflict. With defence superior in the region, it is more likely that US allies will buck-pass rather than chain-gang. Beyond Indo-Asia-Pacific states, this has implications for global actors – such as the EU – seeking to raise their security profile in the region, as buck-passing behaviour gives greater time to adjust to potential conflict scenarios than chain-ganging.  相似文献   

12.
Lucile Eznack 《安全研究》2013,22(2):238-265
Affect exists among close allies and influences their actions and reactions vis-à-vis each other. These countries’ perceptions of, and affective attachment to, the specialness of their relationships explains why, in certain circumstances, big clashes occur among them. In this sense, affect explains why crises among close allies are more signals of strength than weakness: the passionate nature of such crises—as opposed to more routine or recurrent disagreements—is triggered by the high value placed by close allies on their ties and not, as often stated in the literature, by the erosion of these ties. After developing this argument, I illustrate it with the analysis of two crises among close allies: the Suez crisis between Britain and the United States in late 1956, and the Iraq crisis between France and the United States in early 2003. I then contrast these episodes with a crisis between two allies with a much less affectively charged relationship—the United States and Turkey, also in early 2003 over the Iraq War issue.  相似文献   

13.
Studies of counterterrorism have argued for the importance of bolstering, or “mobilizing,” moderates in the confrontation with violent extremists. Yet the literature has not elucidated when states seek to mobilize moderates and marginalize extremists, how they do so, or when they prove successful. The received wisdom is that states should cultivate and strengthen moderate allies by reaching out to them. This approach, however, fails to grasp the political challenges confronting potential moderates, whose priority is to build and retain legitimacy within their political community. Inspired by network approaches, we maintain that moderates can more easily emerge when their political interactions with the authorities are relatively sparse. We further argue that the state's strategies, including crucially its rhetorical moves, can bolster the moderates' local legitimacy. At times, this will entail not reaching out to moderates but isolating them. Before moderates can be mobilized, they must be made, and the state's criticism, more than its love, may do much to help moderate political forces emerge. This article explains why mobilizing moderates is critical, when it is difficult, and how authorities can nevertheless play a productive role in moderates' emergence. We establish our theoretical framework's plausibility by examining two cases—India's ultimately triumphant campaign against Sikh extremists and Spain's gradual marginalization of Basque extremists. We then suggest what lessons these campaigns against ethnonational terrorism hold for the so-called War on Terror.  相似文献   

14.
Can states credibly communicate their intentions through covert policy tools, despite the absence of credibility-enhancing publicity? Most extant research suggests covert action and secrecy in general are uniquely uninformative and often used as an alternative to signaling. Yet episodes such as Richard Nixon's secret bombing of Cambodia suggest that leaders have used covert action to convey intentions and coerce adversaries. This article builds a theoretical framework for understanding signaling in the covert sphere, developing reasons why states find covert communication both intelligible (that is, the basic intended message is understandable) and credible (that is, the message is believable). We argue that two target audiences—local allies and strategic adversaries—tend to observe covert action and that the costs and risks incurred by initiating and expanding covert action credibly convey resolve. We assess our arguments empirically through careful process tracing of a set of nested covert interventions by Soviet and American leaders in conflicts in Angola and Afghanistan. Drawing on a trove of recently declassified material, we assess intentions and inferences related to covert signaling. We find that both strategic adversaries and local partners observed and drew inferences about resolve. Covert lethal aid programs thereby served as a credible indicator of resolve through three mechanisms we identify in the paper: sunk costs, counter-escalation risks, and domestic political risks. These findings have important implications for the study of coercive bargaining, secrecy, and reputation. They also shed light on an important policy tool contemporary policymakers will likely use, suggesting the kinds of effects covert action has and elucidating the basic interpretive framework needed to communicate messages with new methods like covert cyber attacks.  相似文献   

15.
The shift to unipolarity has introduced new dilemmas for America's allies. Their level of strategic uncertainty has increased, largely because under unipolarity, allies' threat perceptions are more likely to diverge across time or issue areas and are not shaped as much by structural systemic factors. Although they want to maintain the pre-existing security arrangements as a means of managing the rising uncertainty, allies need to deal with the dual concern of either being trapped into the hegemonic partner's policies, or being abandoned by the hegemon. These two concerns—the alliance security dilemma—may become more or less prominent given the nature of the divergence in threat perceptions on different issues and at different times. To deal with this dual threat, allies employ two strategies: using the pre-existing alliance as a pact of restraint, and developing a division of labor with the hegemon. Both the dilemmas and the strategies used to mitigate them are examined here in the context of the European behavior within nato following the Gulf War, the nato involvement in Kosovo, the war in Afghanistan, and the war in Iraq.  相似文献   

16.
On 6 November 1990, nearly 50 Saudi women staged a protest against the ban on women operating motor vehicles in Saudi Arabia. Occurring in the midst of the First Gulf War, the women's protest was a political statement about the harsh restrictions placed on women in the Middle Eastern country which both reflected and influenced Saudi society’s encounter with their American allies during the war. When United States (US) military personnel flooded into Saudi Arabia during the war, they were shocked at the way American servicewomen were treated by their Saudi allies and the second-class status of Saudi women throughout the country. This article explores Americans' reactions to their encounter with Saudi gender relations during the war and argues that the poor treatment of women in Saudi Arabia—which Americans dubbed ‘gender apartheid’—caused many Americans to question the longstanding US alliance with the conservative Muslim country. In doing so, US journalists, military personnel, scholars and the general public began to demand that concern about women's rights should be integrated seriously into US foreign policy towards the Muslim world.  相似文献   

17.
Paul C. Avey 《安全研究》2018,27(1):89-119
What are the strategic costs of foreign-deployed nuclear weapons? Thus far, scholars have focused primarily on the possible benefits: deterring adversaries and reassuring allies. There is little scholarship on the costs side of the cost–benefit equation. This article evaluates one potential cost: that deployments generate crises. I argue that such deployments have, historically, rarely resulted in crises because few deployments generate the level of threat necessary for the target of the deployment to forcefully act. Crises are likely only in the rare situations when the deployment is to an area that the rival views as vital and the deployment threatens to embolden the deploying or host state. I examine all foreign nuclear deployments to support these claims. The results have implications for ongoing debates on the effects of nuclear weapons and US nuclear deployments abroad today.  相似文献   

18.
Tricia Bacon 《安全研究》2018,27(3):345-378
The terrorist organizations that have posed the greatest threat to international security are those with allies. Terrorist groups at the core of alliance networks, particularly the Islamic State and al Qaeda, define the threat today, as they are able to accrue and disperse the benefits of their alliances—including greater lethality, longevity, and resilience—to their partners. While the consequences of these alliances are clear, their causes remain poorly understood, especially with respect to why terrorist alliances cluster around a small number of organizations. I propose that groups ally with the organization at the core of a network to address organizational deficits. In addition, the prospective partners must have both complementary needs and the ability to link their ideologies and frames to build a shared identity. Finally, groups must overcome their inherent suspicions and build trust to ally. These three mechanisms lead to alliance formation, but they also offer numerous avenues for disruption.  相似文献   

19.
This article examines the challenges allies face in coordinating diplomatic efforts to accommodate and peel off their main enemy's potential allies. It elucidates the key dimensions, and the underlying coordination dynamics, of this problem of “concerted accommodation,” and it develops propositions about the conditions that shape the efficacy of such efforts. The argument links allies’ strength to their divergent or convergent assessments of the target state's ability to tip the war toward victory or defeat. Divergent assessments foster weak allied efforts that are likely to fail, but when allies agree that the target is a potential “war-tipper,” they will support their concerted accommodation policy with more robust cooperation that is more likely to work. The causal arguments and mechanisms are examined in a paired comparison analysis of two First World War cases: the Entente's efforts to induce (1) Ottoman neutrality and (2) Italian intervention.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号