首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
世界瞩目的首届核安全峰会,历时两天,于2010年4月13日在美国华盛顿闭幕。包括中国国家主席胡锦涛在内的47个国家的领导人或代表,以及联合国、国际原子能机构和欧盟等国际和地区组织负责人出席了这次会议。与会各国代表签署了《华盛顿核安全峰会公报》和《华盛顿核安全峰会工作计划》,不仅就全球范围内加强核安全和应对核恐怖主义威胁达成了广泛共识,  相似文献   

3.
This article starts by establishing a link between the nature of the threats created by jihadist terrorism and global organized crime and the investigation model used by Portuguese intelligence and police entities to detect and eliminate them. The visible manifestations of jihad terrorism and related organized crime recorded in Portugal since 2001 are also documented. The article goes on to analyze most recent theories produced on the importance of intelligence work and criminal investigation in combating these threats. On this basis, the article raises the hypothesis that Portugal's capacity to confront these threats has been dangerously weakened by the investigation powers constraints and conflicts of jurisdiction in the national security system, the lack of effective coordination in the whole system, and delays in the necessary reforms for over a decade.  相似文献   

4.
In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity.  相似文献   

5.
In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity.  相似文献   

6.
冷战结束后国际局势的新变化,增强了重新认识和研究脆弱或失败国家的紧迫性。如今,许多新近出现及处于从威权或独裁体制向奉行自由市场经济的开明体制转轨的国家已清楚地意识到,对国家的认识不能想当然。虽然国家的构建主要取决于一个国家自身的努力,但外部力量的影响和干预同样必不可少。在脆弱国家与安全议题之间存在着很强的相关性。  相似文献   

7.
分裂主义对国家安全特别是国家核心安全的威胁巨大,它不仅危害到国家的领土、主权完整,对国家认同造成严重冲击,而且在分裂主义采用暴力方式和外部干涉的情况下,直接威胁到国家的军事安全。分裂主义不是非传统安全的问题,而属于传统安全威胁。中国所面临的分裂主义威胁非常严重,在反分裂及安全研究方面,简单套用西方的理论体系来解释我国的核心安全利益问题是危险的。  相似文献   

8.
Following the terrorist attacks of 11 September 2001, the United Nations Security Council passed Resolutions 1368 and 1373 and thereby created the basis of a global counterterrorism system. At the heart of this system lies a partnership between the Security Council and the UN member states—a partnership in which states have been given considerable, independent, operational responsibility. Unfortunately, this system has often been criticized and viewed pessimistically by scholars, who tend to focus primarily on UN bodies and offer little discussion of the key role of states. This article presents a different conceptualization of this counterterrorism system and suggests, through case studies, that it has attained some important objectives in the global struggle against terrorism.  相似文献   

9.
10.
The Almajiri heritage is, like the madrassahs in Central Asia, a system of Muslim education that dates back several centuries. With the imposition of British colonial rule between 1902 and 1960 on parts of the Sokoto Empire that currently constitute northern Nigeria, the North's amalgamation with Southern Nigerian British protectorates in 1914, and the formal abolition of slavery in northern Nigeria in 1936, this heritage underwent major structural and functional transformations. Given the lessons from the 1980 Maitatsine terrorist insurgence in Kano, Nigeria, and the rise of Islamic fundamentalism in northern Nigeria since 1999, a potential exists that the heritage may evolve into an apparatus for perpetuating non-state terrorism. Drawing on the trajectory of similar educational systems in Central Asia prior to, during, and following Russian communist rule, this article outlines reasons for the growing terrorist potential of the Almajiri heritage, and suggests measures for avoiding such trajectories.  相似文献   

11.
Approaching the Madrid train bombings of 11 March 2004 from a security perspective, the occurrence of these highly lethal blasts made it evident not only a major intelligence failure, but also serious problems in the coordination between law enforcement agencies and deficiencies in international cooperation to prevent such deadly manifestations of global terrorism. As a result, governmental measures adopted in Spain immediately afterwards to reform the internal security structures and thus more adequately face the persisting risks and threats associated with that phenomenon, paid particular attention to increasing intelligence capabilities, advancing antiterrorist coordination and strengthening collaboration with relevant nations, alongside other initiatives aimed at preventing and countering al-Qaeda related terrorist activities. Overall, those measures enjoyed a high degree of legitimation among citizens.  相似文献   

12.
Analyzing newspaper coverage of the 1998 Nairobi and 2002 Mombasa terrorist attacks by the Nairobi Daily Nation and East African Standard finds that generalizations from Western sources, such as newsworthiness criteria and coverage of government officials and terrorists, appear similar in Kenyan media, although interpretation of the attacks were colored by a “developing world” perspective in some respects. Terrorists also ironically are more prominent in subsequent attacks, although perhaps only when they fail to inflict heavy damage and casualties. The second attack also brought far more criticism on the Kenyan government, which may have implications for similar events in other countries.

Adhabu ya kaburi aijau maiti (The corpse knows the torment of the grave).

—Swahili proverb  相似文献   

13.
This article attempts to shed light on the dynamics and machinations within terrorist organizations by incorporating a heretofore overlooked literature which is directly applicable, that of transnational advocacy networks (TANs). Terror networks have been described using every possible analogy, from multinational corporations to organized crime to the anthropomorphic classic “cut off the head, and the body will die.” In reality, terrorist organizations function in much the same way, and using many of the same techniques, as transnational advocacy networks concerned with issues like the environment or human rights. By describing these characteristics, and comparing TANs and Terror TANs (TTANs), this article aims to offer insight into the tactics and motivations that define modern, as well as the much heralded post-modern, terrorism.  相似文献   

14.
Policy to reduce the threat of a terrorist attack against industrial chemical facilities—critical infrastructure with potential to cause mass casualties—is being driven by incomplete and, in some cases, incorrect assumptions. This article chronicles incidents by non-state actors directed at the chemical industry and explores the strategic considerations prompting groups to target the industry. By incorporating motivations for targeting infrastructure a more robust, comprehensive risk assessment is realized. Analysis challenging the “insider” threat paradigm and recommendations to ameliorate the potential effects are also presented. These are found to differ substantially from the leading policy measures currently advocated.  相似文献   

15.
This study examines the relationship between the Hizbullah and Islamic Brotherhood organizations, the media, and the hypothesized outcomes of their symbiotic relationship, International Islamization Terrorism. It revisits the effects of the media on the propensity of Muslim zealots for conflict and terrorism by sampling 2,619 individuals in 8 European Union countries, and empowers the field with some foundations for Islamist violence.‐  相似文献   

16.
17.
18.
Evolutionary theory's utility for the study of political phenomena, including war and nationalism, has been demonstrated. However, these studies fail to explain substate violence, including terrorism, and rarely evaluate whether cost-benefit analyses differ for males and females. This article seeks to demonstrate that evolutionary theory provides intriguing insights into two phenomena that observers find difficult to understand: political violence, including terrorism and self-sacrifice in the form of suicide attacks, and female political violence.  相似文献   

19.
During the process of visa liberalisation Serbia made significant and unexpected adjustments in its Kosovo policy, which demonstrate the European Union's leverage. Serbia's compliance on Kosovo cannot be explained either by rational institutionalism, which accounts for domestic change based on cost–benefit calculations, or sociological institutionalism, which predicts domestic adaptation based on convergence of norms and identities. Applying discursive institutionalism, this empirical study of Serbia's Europeanisation identifies discursive denial as a strategy of the Serbian elite in pursuing costly policy implementation. It contributes a novel perspective on ‘shallow’ Europeanisation by highlighting a lack of discursive reinforcement of adopted rules.  相似文献   

20.
The misuse of passports is intrinsically connected with international terrorism. Terrorist groups and their operatives demonstrate a propensity to travel in order to meet, organize, train, plan, reconnoiter targets, and deploy for attacks. To travel surreptitiously, terrorist activists and operatives typically make use of improperly obtained, altered, or counterfeit passports and visas. The present study addresses three key issues relating to the terrorist misuse of passports: (a) the role of passport misuse in the operational activities of international terrorist networks; (b) the ways in which terrorist elements acquire seemingly genuine passports; and (c) the various international covenants, agreements, and related action plans intended to constrain terrorists’ ability to move surreptitiously across borders. The analysis describes a terrorism cycle, a complex array of key activities that together serve as enablers for international terrorism. The role of passports and surreptitious travel is examined for each stage of this terrorism cycle.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号