首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In America, Britain and Australia the threat of terrorism has been used to justify radical new legislation that gives police and intelligence agencies unprecedented powers to detain and question people believed to have information connected to terrorism. In this paper I explore the nature of the threat of non-state terrorism—threat to national security and the well-being of citizens. I argue that terrorism does not pose a threat sufficient to justify the kinds of counterterrorism legislation currently being enacted. Furthermore many of the current counterterrorism practices pose a greater threat to individual physical security and well-being than non-state terrorism. We should fear counterterrorism more than we fear terrorism.  相似文献   

2.
The United States is at significant risk of a future pyro-terrorist attack—when terrorists unleash the latent energy in the nation's forests to achieve the effect of a weapon of mass destruction—the threat, must be defined America's vulnerabilities understood, and action taken to mitigate this danger to the United States.  相似文献   

3.
Policy to reduce the threat of a terrorist attack against industrial chemical facilities—critical infrastructure with potential to cause mass casualties—is being driven by incomplete and, in some cases, incorrect assumptions. This article chronicles incidents by non-state actors directed at the chemical industry and explores the strategic considerations prompting groups to target the industry. By incorporating motivations for targeting infrastructure a more robust, comprehensive risk assessment is realized. Analysis challenging the “insider” threat paradigm and recommendations to ameliorate the potential effects are also presented. These are found to differ substantially from the leading policy measures currently advocated.  相似文献   

4.
Terrorist organizations’ physical safe havens continue to shape the terrorist threat to the United States by extending the groups’ longevity and increasing the threat they pose. As a result, eliminating terrorist safe havens has been a key component of U.S. counterterrorism policy since at least 2001. However, some scholars challenged the post-9/11 policy consensus that terrorists find sanctuary in weak states and so-called ungoverned spaces. This article seeks to bridge this gap between scholarship and policy by offering a typology for disaggregating different kinds of terrorist safe havens. Our typology operates on two axes based on host government will (i.e., the host government's posture toward each group with haven inside its borders), as well as government capability, (specifically whether the host government possesses the specific capabilities needed to oust each group). This intersection of will and capability produces three types of havens. We briefly illustrate each type of haven using the exemplar case study of Pakistan—a location often described as an overarching safe haven, but which is actually home to several sanctuaries—and offer policy recommendations for addressing them. A need exists to disaggregate and identify how the United States can approach haven elimination. This typology and the analysis that stems from it offer a starting point for devising such strategies.  相似文献   

5.
Extortionate terrorism is the threatened use of terrorist acts to gain concessions from the victim. In this article, game theory is used to seek answers to the following questions: (a) When will people resort to extortionate terrorism? (b) When will extortionate terrorism succeed and when will it fail? (c) What constitutes an “optimal” threat, i.e., what bribes, extortion, ransom, or payoff should be asked in exchange for which hostages or property? (d) When should unsuccessful threats be carried out and when should they be abandoned? (e) How should a victim choose among potential responses to specific terrorist threats and to the general problem of terrorism? Two different game theoretic models of terrorism are examined— one using ordinal preferences, the other von Neumann‐Mor‐genstern utilities. Terrorism is considered not simply as isolated incidents; institutions are potential victims of repeated terrorism. The terrorist and the victim, in formulating a response to each incident, are guided not only by present gains and losses, but by the effect their response has on others’ perception of their credibility and resolve—two long‐run variables.  相似文献   

6.
Abstract

Europe has been the preferred operational area for Middle Eastern terrorist groups—some 418 attacks from 1980–1989. Unlike European Marxist revolutionary or separatist terrorist groups, the Middle Eastern groups present Europe with a regional security problem. The most dangerous element in this Middle Eastern terrorist threat is the state‐sponsored activities of Iran, Libya, Syria, and Iraq. These countries provided the fuel for a decade of Middle Eastern terrorist bloodshed in Europe. Given the problems of solving the various political conflicts and feuds in the Middle East and the continuing attractiveness of Europe as a substitute battlefield for Middle Eastern terrorist elements, the threat of Middle Eastern terrorist activity in Europe should continue into the 1990s.  相似文献   

7.
Considering Europe's long history of terrorist violence by separatist, leftist and rightwing groups, terrorism by militant Sunni Islamists has until recently been a marginal phenomenon. However, empirical data presented in this chronology suggests it constitutes a growing and increasingly lethal threat, and a worrisome trend in the context of increased tensions between the Muslim world and the West in the wake of 9/11 and the U.S.-led invasions of Afghanistan and Iraq, which needs to be dealt with on many levels—socially, politically, and economically. The current chronology is meant to serve as a tool for conducting academic research on the scope of the threat, and for mapping incidents that might be surveyed in more depth to create a better understanding of its organizational, operational, and motivational patterns.  相似文献   

8.

This article provides a preliminary assessment of the agroterrorism threat to Australia. Based on primary research conducted among Australia's biotechnology and agriculture sectors, it examines current threat scenarios and existing vulnerabilities within Australia. It argues that the threat of agroterrorism to Australia is real, and, for prudential reasons, should be taken more seriously by government authorities. The article concludes with a series of broad policy options to mitigate the threat of agroterrorism to Australia.  相似文献   

9.
Abstract

This paper analyses the various power relations that shape forest policy and governance reform in Indonesia. It applies Foucault’s theories on power to several key initiatives introduced as part of REDD+ (Reducing Emissions from Deforestation and Forest Degradation). By analysing both the operation and the effects of power relations the paper accounts for how competing actors influence major policy change, and the impact different policies have on governing multiple forest users. Sovereign and disciplinary power underpins government attempts to implement new regulatory, planning and enforcement functions across the forest estate. Policy instruments such as the concession moratorium create securitised territorial zones that enable sustainable forest practices to operate. By contrast, forest management units operate through inclusive strategies that discipline forest users into responsible managers, whilst enforcement excludes those who contravene the law. Productive power and resistance explain efforts by government and non-government actors to progress or limit REDD+. Productive power operates through the multiple activities that generate new knowledge on incentivising carbon, and by engaging new subjects in carbon projects. Community resistance draws on discourses and localised subjectivities focussed on forest dependency and rights, whereas industry networks have been adept at positioning REDD+ as a threat to national development.  相似文献   

10.
The strategic and economic importance of the Straits of Malacca makes it one of the world's major sea routes most vulnerable to a terrorist attack. The piracy problem that continues to frustrate maritime authorities in the Straits bears proof to this and, given the heightened security concerns post–9/11, has alarmed the waterway's major users. Although international pressure has forced the littoral states—Singapore, Malaysia, and Indonesia—to up their efforts on improving Straits security, national interests and a reluctance to address the problem as a potential terror threat continues to hinder cooperation. This article attempts to look at how three neighbors in the same Straits came to have such divergent policies on combating maritime terrorism.  相似文献   

11.
The impact of malaria on the demography of European settlers in Lagos from the mid-nineteenth century posed a serious threat to British imperialism in Nigeria. This prompted the British administration to take vigorous measures to address the unsanitary conditions within Lagos, a major causation of the disease. This paper examines the colonial programmes on the eradication of mosquitos in Lagos, the colonial capital of Nigeria. It highlights the political and economic implications of this programme, and the responses of African colonial subjects to the initiative. The government adopted divergent solutions, ranging from racial segregation to swamp reclamation. However, each of these had a downside. Segregation policies, at a time of growing nationalism among an increasingly politically conscious African educated class, would breed political unrest. Swamp reclamation, on the other hand, would require seizing privately owned land and depriving fishermen and wood collectors who earned a living by exploiting the resources of these swamps, critical for their survival and for the colony’s coffers. When the colonial administration finally settled on swamp reclamation, it faced the problem of cost that needed to be balanced with the sacrosanct principle that colonies should be self-sustaining economies and not be a burden to the metropolis. Existing studies have overlooked the resistance or reaction of Lagosians to swamp clearance and forest ordinance. The paper relies on a combination of primary, secondary and oral sources, including a body of archival documents and some interviews.  相似文献   

12.
Australian local government has been subjected to extensive reform during the 1990s. This article considers the three main dimensions of the reforms — changes to management structures, the introduction of competition policy, and municipal consolidation. It reviews the evidence available about the nature of outcomes and examines the impact of the reforms on governance values. It is argued that, so far, economic considerations have been balanced by a commitment to community particpation. Recent political developments, however, may yet prove to be an emerging threat.  相似文献   

13.
Repeatedly, during the last few years, small groups of extremists have demonstrated that by using terrorist tactics they can achieve disproportionate effects. They attract worldwide attention to themselves and their causes; they arouse worldwide alarm, and can create international incidents that national governments are compelled to deal with, often before a worldwide audience. To protect against their attacks or to respond to crisis situations they create, they force governments to expend resources—manpower, money, the attention of senior officials—vastly out of scale with the magnitude of the actual threat they pose.1  相似文献   

14.
In internal ethno-territorial conflicts, what explains why state or rebel group leaderships use civilian-targeting strategies—expulsion or mass killing strategies designed to punish enemy civilians or to decimate the enemy civilian presence on contested territory? One argument is that those living under the worst initial conditions—defined in terms of collective goods such as weak collective autonomy, policy outcomes, and material conditions—are most likely to target enemy group civilians. Another approach focuses on relative power—arguing that the enemy civilian population is targeted either because of weaker or stronger relative power. A third approach argues that differences in leadership preferences—in particular, more ideologically extreme or power-seeking preferences—are likely to drive direct assaults on enemy civilians. We examine these proposed mechanisms in terms of expected effects on benefits and costs in a simple ethno-territorial bargaining framework. We argue that relative power advantages and more extreme nationalist preferences seem most likely to predict decisions to target enemy civilian populations. We expect strongly power-seeking preferences to lead to civilian targeting more conditionally—where there is a greater internal political threat along with either greater relative power or a more moderate enemy. Last, we do not expect that variation in initial conditions will have a significant direct effect. We apply the framework to explain patterns of civilian targeting following the collapse of Yugoslavia in 1991.

[Supplementary material is available for this article. Go to the publisher's online edition of Studies in Conflict & Terrorism for the following free supplemental resource: online appendix.]  相似文献   

15.
This study, based on work in six villages, seeks insights into the likely effect of the introduction of prospective land‐, water‐, and crop‐management technologies, being researched at the International Crops Research Institute for the Semi‐Arid Tropics, on the existing village labour‐use patterns in one major relevant region: peninsular India. Explicit attention is given to the similarities and differences between small and large farms and their relevance to the adoption of the prospective new technologies.

Regional variation in labour utilisation reveals a tremendous employment‐creating potential in the existing tank and well irrigation systems in the Alfisols of peninsular India. The prospective technologies should increase employment, compared with existing technologies, by at least 100 per cent in the Alfisols and by over 300per cent in the deep Vertisols— but with some increase in the seasonal variability of labour demand. Given the existing availability of labour, there will be, with the improved watershed technologies, major farm labour bottlenecks. These should eventually generate increased wage rates and employment potentials. However, even temporary adverse effects on the timelessness of operations could be critical to the success of a double‐cropping and/or intercropping technology aiming at greatly increased yields. This would create demands for selective mechanisation, for example, of threshing.  相似文献   

16.
Despite increasing concern over the potential threat from “forest jihad,” there has been no systematic attempt to assess whether such attacks are in fact taking place. Drawing on principles from the geospatial profiling of terrorist events, fire-risk prediction data, and information on jihadist convictions, this article offers a thorough review of the evidence to address this question. The available information suggests that so far, jihadists have not attempted to attack North American or European wildlands by means of arson. Despite calls for “popular resistance terrorism” in the jihadist literature, and the apparently low costs associated with this type of attack, jihadists have so far shown little appetite for “forest jihad.”  相似文献   

17.
Why do ethnic conflicts spread to neighboring states? This article examines the effect of transborder ethnic groups on the spread of ethnic conflict. It argues that when a transborder ethnic group is in conflict in one state, neighboring states perceive a threat from members of that ethnic group residing in their own territory, leading the state to take preemptive repressive action. This repression in turn changes the ethnic group's security situation within the state and can result in violence and thus ethnic conflict. Ethnic conflict spread is not determined by the actions of either the ethnic group or the state alone, but is a product of threat perception and interaction between the two groups. This argument is tested in a set of cases in a region where an ethnic conflict seems to have spread—the Kurds in Iran, Iraq, Syria and Turkey from 1961–2003.  相似文献   

18.
Debt relief has focused on the borrower—debt is cancelled if a country is too poor to repay and now has acceptable policies. Iraq shifted the focus to the lender—debt should be cancelled because creditors should never have lent money to the repressive regime. This paper uses domestic and international law to establish the concept of ‘illegitimate debt’, which should not be repaid independent of the status of the borrower. The concept of ‘moral hazard’ is used to argue that non-payment of illegitimate debt is necessary to discipline lenders and to prevent future lending to oppressive dictators.  相似文献   

19.
One aim of this article is to chide the U.S. military—and Americans overall—for not paying sufficient attention to our historic relations with American Indians. After all, American Indians are the non-Westerners we Americans should know best. A review of American Indian history can shed important light on our current encounters with tribal peoples elsewhere. At the same time, however, great care needs to be taken. Instead of just citing similarities—as analogies lead us to do—we must also take note of differences, which we can best do by using history as a foil.  相似文献   

20.
This article contests the affirmation—based on common sense—according to which terrorists simply need courage. The typical terrorist act can be considered part of the sociological category known as “vile violence” that is the act of striking out at a victim after having placed him or her in a desperate situation that does not allow for any escape. This article is based on primary and secondary sources, such as the analysis of thirty-five homicides committed in Italy by six terrorist units of the extreme left; interviews with extreme left terrorists; interviews with victims of extreme left terrorists; autobiographies of extreme left terrorists; autobiographies of victims of extreme left terrorists; video interviews of extreme left terrorists; and written statements of the investigating magistrates.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号