首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
This article examines the effectiveness of contemporary counterterrorism strategy in the global fight against terrorism from 2001 to 2011. We seek to maximize the comparative approach more than most existing studies by examining three tactics (killing, capturing, and defending) applied at three scopes (leader, operational, and broad) on three levels (global, movement [jihadi], and organizational [al-Qaeda and Taliban]), while also measuring effectiveness along several quantitative, qualitative, and spatial dimensions. Drawing from resource theory (and its derived analytical approaches) and empirical terrorism studies, we formulate competing hypotheses that are quantitatively tested using a dataset with several original aspects. We find that both killing and capturing can have large effects but these effects vary based on both states' and terrorists' targeting strategies. The most interesting specific findings are that drone strikes seem counterproductive for counterterrorism while renditions seem effective. However, these effects were dwarfed by those of increased defenses, which reduce attacks in the West while redirecting them to other areas in the world. While we find the theory mostly sound, though in need of refocus, we believe current policy trends foretell an increase in terrorist activity in the coming years.  相似文献   

2.
This article discusses US counterterrorism from a class perspective. It sees counterterrorism as a state policy with differential effects on different social classes. In doing so, the article starts to address a lacuna in critical studies of counterterrorism, which tend to be rather structural and formal, thus ignoring the pertinence of counterterrorism to the field of social dynamics. To partly rectify this blind spot by addressing some class implications of counterterrorism, the article examines the effects of counterterrorism policy on capital accumulation and its social conditions. It notes that counterterrorism has different implications along class-lines: for dominant capital, it signifies appropriation of public money and direct participation in political decisions; for everyone else, it means material dispossession and political exclusion. Given that counterterrorism was developed between two crises of neoliberalism, the article distinguishes between economic crises, which tend to benefit capitalism, and political crises, which can be destructive, and suggests that counterterrorism is partly a restructuring of the neoliberal state so that it can manage recurring economic crises, while preventing their evolution into political ones.  相似文献   

3.
Studies of counterterrorism have argued for the importance of bolstering, or “mobilizing,” moderates in the confrontation with violent extremists. Yet the literature has not elucidated when states seek to mobilize moderates and marginalize extremists, how they do so, or when they prove successful. The received wisdom is that states should cultivate and strengthen moderate allies by reaching out to them. This approach, however, fails to grasp the political challenges confronting potential moderates, whose priority is to build and retain legitimacy within their political community. Inspired by network approaches, we maintain that moderates can more easily emerge when their political interactions with the authorities are relatively sparse. We further argue that the state's strategies, including crucially its rhetorical moves, can bolster the moderates' local legitimacy. At times, this will entail not reaching out to moderates but isolating them. Before moderates can be mobilized, they must be made, and the state's criticism, more than its love, may do much to help moderate political forces emerge. This article explains why mobilizing moderates is critical, when it is difficult, and how authorities can nevertheless play a productive role in moderates' emergence. We establish our theoretical framework's plausibility by examining two cases—India's ultimately triumphant campaign against Sikh extremists and Spain's gradual marginalization of Basque extremists. We then suggest what lessons these campaigns against ethnonational terrorism hold for the so-called War on Terror.  相似文献   

4.
Alex Wilner 《安全研究》2013,22(4):740-772
New theoretical approaches have been developed that apply deterrence and coercion to counterterrorism. Critics have suggested, however, that in the particular case of deterring terrorism by threats of punishment, a mismatch exists between deterrent goals and counterterrorism intentions: the twin aims of destroying and deterring a single opponent is logically and theoretically incompatible. These criticisms, however, neglect to take two important factors into consideration. First, threats of punishment in counterterrorism can be applied against a wide assortment of actors involved in and associated with terrorism and political violence. Second, the concept of “intra-war deterrence” suggests ways in which a state can deter certain behavior or a specific form of warfare while engaging in open conflict with that same adversary. In exploring both factors, this article posits that states can gain coercive leverage over different actors involved in terrorism, including organizations with which they are actively hoping to defeat.  相似文献   

5.
India has been a major victim of Islamist terrorism and has long fought against an array of Islamist terrorist groups. Since the 9/11 terrorist attacks, India's previously lonely struggle against terrorism has taken place against the background of the US-led Global War on Terror (GWOT). After outlining India's Islamist terrorist challenge, this article examines India's evolving approach to counterterrorism and how the GWOT has influenced it. It concludes that India has adopted a localized, defensive, law-and-order approach to counterterrorism which has evolved in response to various attacks over the years but still remains seriously underdeveloped. The GWOT has influenced Indian counterterrorism in important ways, although its influence has been subtle and indirect rather than transformative. The GWOT has enhanced Indo-American counterterror cooperation, shaped India's terror environment by launching the war in Afghanistan and enriched Indian counterterrorism with American experience. Just as important, it has also had an impact on India's debate on counterterrorism, civil liberties and human rights.  相似文献   

6.
The proliferation of Salafi-jihadi insurgencies across Africa challenges the United States’ counterterrorism approach. From its inception, the insurgency in Cabo Delgado, Mozambique was driven by local and foreign dynamics, which have been complicated by additional external intervention in the conflict. Using the Cabo Delgado insurgency, we demonstrate how efforts to address its global dimensions, such as the group's affiliation with the Islamic State, can work against attempts to mitigate its local drivers. We conclude with recommendations for a more effective U.S. response that takes both the local and global dynamics into account. This article builds on our February 2021 report “Combating the Islamic State's Spread in Africa: Assessment and Recommendations for Mozambique,” published by the American Enterprise Institute.  相似文献   

7.
During the 1990s, Egypt fought a bitter campaign against militant Islamist groups in which over a thousand people died. Since the end of the insurgency in 1997, Egypt's two fiercest Islamic terrorist groups, first the Islamic Group (Al-Gama‘a Al-Islamiyya) and then Islamic Jihad, not only ceased their violent activities but also produced and published texts revising their religious beliefs on the use of violence. Based on the counterterrorism experience of Egypt, this paper defines and describes a counterterrorism strategy of ideological reorientation. We define ideological reorientation as a counterterrorism approach that seeks to change core ideological or religious beliefs of the terrorist group, thus bringing the beliefs of group members in line with societal norms. While we cannot causally attribute the groups' decisions to lay down arms to ideological reorientation versus other regime actions (like repression), the Egyptian experience is highly suggestive. First, it indicates that the ideology of religiously-based groups is not exogenous and fixed, as is often assumed, but rather endogenous and flexible. Second, the Egyptian experience suggests that ideological reorientation may be more effective at stemming militancy in the long run compared to rival approaches.  相似文献   

8.
To date, critical terrorism studies (CTS) has been very good at critiquing contemporary counterterrorism, but has not yet offered an alternative model which could be used for research and evaluation, as well as policy advice. This article seeks to address this gap by constructing a CTS model of counterterrorism. The first section of the article explicates the appropriation of “emancipation”, and why it is key for an alternative model of counterterrorism. The article then goes on to outline a CTS model and explain how it addresses all the main weaknesses of contemporary counterterrorism models, because it is based on a more robust ontology and epistemology which addresses terrorism as deep politics, it is normatively based on emancipation, it approaches terrorism and security holistically, and it is rooted in means/ends consistency. The final section of the article argues that the CTS model is not a theoretical utopia. A comparison with Norwegian counterterrorism shows that it can be useful for evaluating and advising real-world counterterrorism.  相似文献   

9.
This work addresses the structural weaknesses that threaten to derail counterterrorism efforts by the Malaysian government. It also highlights the links between various pre-September 11 security issues in Southeast Asia and the terrorism threat facing Malaysia at present. The limitations of the current counterterrorism approach by the government are highlighted. In addition, the paper identifies structural problems such as systemic corruption, weaknesses in border security, and inadequate private sector regulation as key areas of concern. The paper concludes by highlighting the symbiotic relationship between a successful counterterrorism campaign and the rule of law.  相似文献   

10.
Max Abrahms 《安全研究》2013,22(2):223-253
The conventional wisdom is that terrorists tend to target democracies because they are uniquely vulnerable to coercion. Terrorists are able to coerce democracies into acceding to their policy demands because liberal countries suffer from two inherent counterterrorism constraints: (1) the commitment to civil liberties prevents democracies from adopting sufficiently harsh countermeasures to eradicate the terrorism threat, and (2) their low civilian cost tolerance limits their ability to withstand attacks on their civilian populations. This article tests both propositions of the conventional wisdom that (a) terrorists attack democracies over other regime types because (b) liberal constraints render democracies vulnerable to coercion. The data do not sustain either proposition: illiberal countries are the victims of a disproportionate number of terrorist incidents and fatalities, and liberal countries are substantially less likely to make policy concessions to terrorists, particularly on issues of maximal importance. A plausibility probe is then developed to explain why democracies have a superior track record against terrorists. The basic argument is that liberal countries are comparatively resistant to coercion—and hence inferior targets—because they are superior counterterrorists. Liberalism's commitment to civil liberties and low civilian cost tolerance are, in the aggregate, actually strategic assets that help democracies prevail in counterterrorist campaigns, thereby reducing the incentives for terrorists to target this regime type. These findings have important implications for how democracies can defend their liberal values and physical security in the age of terrorism.  相似文献   

11.
The article addresses some of the key issues that are raised for researchers engaging with counterterrorism police officers and initiatives, when undertaking research. A significant area to explore in this context is, in fact, the issue of relationships with counterterrorism police officers who may themselves directly have been covert police officers in the past and/or who may be continuing in their current, apparently more open, role (wittingly or otherwise) as agents of broader state strategies of exploiting trust for intelligence-gathering purposes. This article suggests that it is important for researchers to understand that working within the counterterrorism field involves degrees and shades of risk in the service of trust-building, sensitivity and the empowerment of communities, and that researchers themselves can (wittingly and unwittingly) be part of wider strategies instigated by security-minded individuals or groups of counterterrorism police officers. Reflecting upon the research that we have undertaken individually and collectively over the last number of years, in the light of the most recent spate of allegations about counterterrorism police officers infiltrating activist and political protest groups, having sexual relationships, and indeed, on occasion, children, with women whilst undercover and of potentially working to entrap vulnerable individuals into planning terrorist acts, this article raises questions around trust, credibility, legitimacy, the prevalence and near unavoidability of dysfunctional agendas and the implications of all of the above for community-based approaches to counterterrorism.  相似文献   

12.
A. J. Behm 《政治交往》2013,30(4):233-246
This paper examines the balance between the apparently competing objectives of government and the media in the general area of violence against the public and details the Australian model for handling issues associated with terrorism and the media. Australia's counterterrorism strategy may be considered holistic, going beyond the idea of a comprehensive capability for response to an actual public incident to include preventive measures and enhancement of the national security environment, suggesting that all elements of the society, including the media, regard security as a cooperative endeavor. These elements have been developed in the “National Anti‐Terrorist Plan” (NATP), developed by Australia's Standing Advisory Committee on Commonwealth/State Cooperation for Prevention against Violence (SAC‐PAV). For the past several years, the SAC‐PAV has been developing a basic strategic guide to provide structure for its many activities, and the committee has agreed that the NATP requires a fourfold strategy for dealing with the media: (1) public communication policies and guidelines, (2) incorporating media response and incident management strategies, (3) media training, and (4) physical controls. In addition, the SAC‐PAV has formulated a set of guidelines for the media to apply when covering terrorist incidents, indicating clearly what crisis managers and counterterrorism response organizations expect of media handling of public crises.  相似文献   

13.
The use of Unmanned Aerial Vehicles (UAVs) or drones in counterterrorism has changed the face of warfare and is challenging international law on a number of levels. This article assesses some of those challenges in the context of the Obama administration’s justifications to use drones for targeted killing. It focuses on the US as a norm entrepreneur that purposefully works to alter prevalent norms related to the use of drones in counterterrorism efforts. The article analyses normative developments and the meaning-in-use of existing legal provisions that are invoked to justify US policy in this area. By focusing on norm entrepreneurs, this article moves away from purely structural accounts of normative change towards a stronger emphasis on actors and the role of agency. Rather than understanding US drone policy as violating international law, this article argues that the Obama administration was acting as a norm entrepreneur in its counterterrorism efforts, aiming to change the meaning of a number of international legal concepts to justify its policy decisions.  相似文献   

14.
陶文钊 《和平与发展》2012,(1):32-36,68,69
2011年国际局势中的许多事态对美国的中东外交政策形成新的挑战。西亚北非的动荡和变局可能导致中东地缘政治版图重新绘制,对美国未来的中东外交必将带来许多变数;美国一巴基斯坦之间发生的事态可能对奥巴马政府的反恐战略及南亚战略提出新的挑战;巴勒斯坦不顾美国阻挠申请加入联合国,使美国与穆斯林世界的关系面临新的考验。这些挑战今后有可能进一步发酵,对美国全球战略产生影响,其中包括对奥巴马政府"-3前高调进行的“重返亚洲”形成牵制。  相似文献   

15.
Arie Perliger 《安全研究》2013,22(3):490-528
While the academic study of counterterrorism has gained momentum in recent years, it still suffers from major theoretical weaknesses. One of the most prominent shortcomings is an absence of theories that can effectively explain the factors that shape the counterterrorism policies of democratic regimes. The present study attempts to fill this theoretical void in two ways. First, it proposes an analytical framework for a classification of counterterrorism policies. Second, it presents a theoretical framework that strives to uncover the factors that have influenced the struggle against domestic terrorism in democratic regimes. The analyses, which have used a unique and comprehensive dataset that documents counterterrorism policies in eighty-three democracies, show that the robustness of the regime's democratic foundations as well as the symbolic effect of terrorism are major forces in shaping the democratic response to it, while the direct impact of terrorism is less influential than assumed in the literature.  相似文献   

16.
This article asks the following questions. Which terrorism threats, challenges and responses did key players consider to have been decisively changed by 9/11? On close inspection now, nearly two decades after those attacks, how are we to assess such claims? What did 9/11 really change regarding terrorism and counterterrorism? And what remained unaltered? The article’s central argument is this: some western states exaggerated the extent to which terrorist threats and challenges had been changed by 9/11 and, as a consequence, they did significantly alter some of their responses to terrorism; but at the heart of this ironic process was the tragic reality that, had there been a more serious-minded and historically sensitive recognition of how little had necessarily been changed by 9/11 in terms of terrorist threats and challenges, then the twenty-first-century experience of non-state terrorism would have been much less painful than has been the case in practice.  相似文献   

17.
ABSTRACT

This article recounts the author’s experience as a junior diplomat in the British Diplomatic Service in the late 1960s handling the file of Rudolf Hess, Hitler’s ex-deputy serving a life sentence in Spandau prison in Berlin. As the only Nazi leader still imprisoned there after the release in 1966 of Albert Speer and Baldur von Schirach, his fate as 'the lone prisoner of Spandau’had become an international issue. Sentenced at the Nuremberg trial of 1946, his fate was a matter for the four powers still occupying Berlin. Moscow was determined that as the last remaining symbol of the Hitler regime Hess should die there. In the West, however, and especially in Britain, there was a press campaign for his release that put pressure on the Foreign Office by way of letters from the public and parliamentary questions. As a desk officer for Germany, it fell to me to handle this by writing or drafting replies to the effect that as Hess was a prisoner of all four powers the decision required consent, that Moscow was adamantly opposed, and that Britain could not act unilaterally. But the real target of the press campaign, spearheaded by the Beaverbrook press through the Daily and Sunday Express, was Harold Wilson’s Labour Government. Anything that could demonstrate his alleged ‘appeasement’ of Moscow was grist to its mill. The now weeded file in the National Archives gives little hint of this politically-motivated agenda.  相似文献   

18.
This article outlines and compares two different ways of making sense of counterterrorism and the configuration of political power in its context. Against the backdrop of US homeland security, it first outlines Agamben’s thesis on the permanent state of exception. Despite its resonance with key aspects of homeland security, this thesis is found to be analytically limited and theoretically brittle. To overcome its shortcomings and provide a better understanding of contemporary organisation of political power, a strategic-relational approach is suggested, derived from Poulantzas’s state theory.  相似文献   

19.
樊冰 《国际安全研究》2019,37(2):114-136
作为世界上情报体系最为发达的国家,美国国家安全情报机制一直以来备受各方关注。九一一事件催生了美国情报体系全面而彻底的改革。经过十多年的努力,美国情报界实现了从机构林立的分散体系到由国家情报总监办公室领导的有机整体的重大转型。从总体机制来看,美国情报界现已形成情报机构一体化与任务一体化的双轮驱动体系,其情报传递网络不仅涵盖领导、协调、执行三个层级间的纵向传送,而且包括不同情报机构之间的横向协调,基本实现了情报整合与信息共享。美国国家情报总监办公室成为名副其实的美国情报界统领,其下设的反恐、反扩散、反情报和网络情报中心构成了美国国家安全情报分类传递机制的四大支柱。通过比较,四大分类传递机制中最为成熟的是反恐中心,其次是反情报与安全中心,再次是网络威胁情报整合中心,最后是反扩散中心。由于各类情报机制自身发展程度的不同,其改革过程中所面临的挑战也不一样。美国国家安全情报传递机制的改革“瓶颈”既有发展不足导致的结构性困境,也有外部安全环境变化带来的挑战。此外,特朗普政府上台后的一系列政策举措使得美国国家安全情报体系的发展方向呈现出新的态势。  相似文献   

20.
ABSTRACT

This paper explores contemporary counterterrorism efforts as an instrument for attaining peace as a ‘global public good’. It notes the lack of an agreed definition of terrorism, the distinction between freedom-fighting and terrorism, and the issue of ‘excessive use of force’ by the state. It assessed the extent to which US counter-terrorism policy has influenced policy in the UN Security Council, and the shortcomings in Council policy that require redress. The paper concludes that counterterrorism will be successful only when a ‘global law enforcement’ approach prevails over the national security-driven ‘war-on-terror’ and when genuine efforts are undertaken to address the root causes of terrorism, including the forward basing of US forces in the Arab world.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号