首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In December 2006 the British government released a White Paper announcing its intention to begin the process of replacing its current Trident nuclear weapons system, thereby allowing it to retain nuclear weapons well into the 2050s. In March 2008 the government released its National Security Strategy that stressed the long‐term complexity, diversity and interdependence of threats to British security with a clear focus on human rights, justice and freedom. This article asks how the threat to kill tens if not hundreds of thousands of people with British nuclear weapons fits into the National Security Strategy's world view and questions the relevance of an instrument of such devastating bluntness to threats defined by complexity and interdependence. It argues that the government's case for replacing the current Trident system based on the logic of nuclear deterrence is flawed. First, Britain faces no strategic nuclear threats and the long‐term post‐Cold War trend in relations with Russia and China—the two nuclear‐armed major powers that could conceivably threaten the UK with nuclear attack—is positive, despite current tensions with Moscow over Georgia. Second, the credibility and legitimacy of threatening nuclear destruction in response to the use of WMD by ‘rogue’ states is highly questionable and British nuclear threats offer no ‘insurance’ or guarantee of protection against future ‘rogue’ nuclear threats. Third, nuclear weapons have no role to play in deterring acts of nuclear terrorism whether state‐sponsored or not. Fourth, British nuclear threats will be useless in dealing with complex future conflicts characterized by ‘hybrid’ wars and diverse and interdependent sources of insecurity. The article concludes by arguing that the government's fall‐back position that it must keep nuclear weapons ‘just in case’ because the future security environment appears so uncertain, makes no sense if British nuclear threats offer no solution to the causes and symptoms of that uncertainty.  相似文献   

2.
Despite its centrality in the national cyber security strategies of the US and the UK, the public–private partnership is a nebulous arrangement, which is especially problematic in the context of critical infrastructure protection. Privately owned and operated critical infrastructure that is regarded as a potential national security vulnerability raises questions about the allocation of responsibility and accountability in terms of cyber security. As with many aspects of cyber security, this issue is often discussed with little reference to previous scholarship that could provide conceptual scaffolding. This article draws on the extensive literature on public–private partnerships in order to assess the tensions and challenges of this arrangement in national cyber‐security strategies. It finds that there is a serious disjuncture in expectations from both ‘partners’. The government regards privately owned and operated critical infrastructure as a key element of national security but is reluctant to claim a mandate to oversee network security. At the same time, the private sector is not inclined to accept responsibility or liability for national cyber security. This challenge for governments to manage national cyber security raises questions about how well equipped these states are to promote their own security in the information age. Acknowledging the flaws in the ‘partnership’ is an essential step towards addressing them.  相似文献   

3.
The global war on terrorism gives rise to a range of legal, political and ethical problems. One major concern for UK policy‐makers is the extent to which the government may be held responsible for the illegal and/or unethical behaviour of allies in intelligence gathering—the subject of the forthcoming Gibson inquiry. The UK government has been criticized by NGOs, parliamentary committees and the media for cooperating with states that are alleged to use cruel, inhuman and degrading treatment (CIDT) or torture to gain information about possible terrorist threats. Many commentators argue that the UK's intelligence sharing arrangements leave it open to charges of complicity with such behaviour. Some even suggest the UK should refuse to share intelligence with countries that torture. This article refutes this latter view by exploring the legal understanding of complicity in the common law system and comparing its more limited view of responsibility—especially the ‘merchant's defence’—with the wider definition implied in political commentary. The legal view, it is argued, offers a more practical guide for policy‐makers seeking to discourage torture while still protecting their citizens from terrorist threats. It also provides a fuller framework for assessing the complicity of policy‐makers and officials. Legal commentary considers complicity in relation to five key points: identifying blame; weighing the contribution made; evaluating the level of intent; establishing knowledge; or, where the latter is uncertain, positing recklessness. Using this schema, the article indicates ways in which the UK has arguably been complicit in torture, or at least CIDT, based on the information publicly available. However, it concludes that the UK was justified in maintaining intelligence cooperation with transgressing states due to the overriding public interest in preventing terrorist attacks.  相似文献   

4.
The Internet is an interconnected network and cyber security requires collective action. How that action is organised has important implications for national security, including the defence against cyber attacks and malicious activities. This article explains the origins and institutionalisation of cyber security in Australia—particularly ‘civilian cyber security’. The authors trace the origin of Australia’s first computer emergency response team and explain how this organisational form spread from the USA. Through it, Australia helped enable international cooperation. Domestically, however, the authors argue that the Australian government has struggled with the delegation, orchestration and abdication of responsibility for civilian cyber security, underinvesting in civilian organisations while overrelying on military and intelligence agencies. The history of this organisational field provides valuable insight into how to improve national policy and operations for cyber security.  相似文献   

5.
One of the first steps taken by the newly elected Conservative–Liberal Democrat coalition government was to initiate a review of the national strategy of the United Kingdom. The review culminated in October 2010 in the publication of a revised National Security Strategy as well as a new Strategic Defence and Security Review. With the benefit of over twelve months of hindsight, this article is concerned with the formulation, the implementation and the longer‐term implications of the 2010 strategy review. The first part of the article assesses the review as a national strategic plan. What were the strategic challenges addressed by the review, what decisions, judgements and misjudgements were made, and what was overlooked? In part two the authors turn to operational matters: how far was the UK's post‐review strategic experience (i.e. in Afghanistan and Libya) consistent with the decisions and promises made in 2010? Part three discusses the review as a public statement of national policy, gauging the impression it has made on the national strategic narrative since 2010: how was the review received, what reputation has it acquired and what was/is the quality of the debate surrounding it? Finally, in part four the article asks what the 2010 review and its aftermath reveal of the formulation and implementation of national strategy in the United Kingdom. Was the 2010 review simply the latest in a long series of attempts by government to find a convincing and durable compromise between security challenges and national resources? Or was the review the beginning of something different altogether? Could UK national strategy henceforth be more of an adaptive, iterative process than a compressed period of analysis and reflection followed by the publication of a policy statement with an inevitably brief shelf‐life?  相似文献   

6.
What is the ‘Women, Peace and Security agenda’ and why is it relevant now for Australia? During 2013–14, Australia is a non-permanent member of the United Nations Security Council and, with a growing foreign military, peacebuilding and aid presence around the world, the country must play a role in preventing conflict, in protecting women and girls from violence before, during and after conflict, and in encouraging the participation of women in these peace and security decisions in order to create the structural, gender-equal conditions for lasting peace. This article highlights the promises made by Australia during the campaign for the Security Council seat. It evaluates the credibility of the campaign commitments by assessing Australia's foreign policies and overseas aid spending on women and peacebuilding in Asia and the Pacific; exploring the avenues for government-funded research on women, peace and security issues to influence government policies and programs; and taking stock of the government's record of engaging with civil society in developing and carrying out its National Action Plan on Women, Peace and Security. The article suggests concrete actions that would allow Australia to fulfil its promises and progress its international leadership on the major pillars of the Women, Peace and Security agenda.  相似文献   

7.
Since 1997, the United Kingdom (UK) government has embarked upon a series of education policy initiatives based around the increased role of private interests in both policy formulation and implementation. This article takes a detailed look at private sector involvement in education policymaking and implementation using the current "National Grid for Learning" (NGfL) technology policy drive as a contemporary form. Based on a series of in-depth interviews with key public and private actors in the NGfL the article covers the role of business in the origins, policy formation, and eventual implementation of the initiative. It concludes by discussing the function big business can be said to be playing in UK education policy and the bearing this may have on the long-term sustainability and effectiveness of such policies.  相似文献   

8.
The history of British defence reviews has been one of repeated disappointment: a cycle in which policy failure is followed by a period of inertia, giving way to an attempt at a new policy framework which is then misimplemented by the defence leadership. Each failed defence review therefore sows the seeds of its successor. With this in mind, in 2010 the new coalition government embarked upon an altogether more ambitious exercise: a strategy review comprising a National Security Strategy and a Strategic Defence and Security Review. This article suggests, nevertheless, not only that the 2010 strategy review looks likely to follow past performance, but also that it is coming unstuck at an unprecedented rate. This is a pity since the 2010 review had much to commend it, not least the adoption of a risk‐based approach to security and defence policy‐making. What is the explanation for this outcome? Is it that the British have, as some have suggested, lost the ability to ‘do strategy’, if ever they had it? The authors offer a more nuanced understanding of the policy process and argue that the coalition government in fact has a very clear and deliberate strategy—that of national economic recovery. Yet the coalition government cannot allow national defence and security to fail. The authors conclude with an assessment of the options open to the defence leadership as they seek to address the failing 2010 strategy review and suggest a variety of indicators which will demonstrate the intent and seriousness of the political, official and military leadership of the Ministry of Defence.  相似文献   

9.
Whichever party or parties form the next UK government, a Strategic Defence and Security Review (SDSR) is expected to begin soon after the general election in May. The review might be a ‘light touch’ exercise—little more than a reaffirmation of the SDSR produced by the coalition government in 2010. It seems more likely, however, that the review will be a lengthier, more deliberate exercise and one which might even last into 2016. For those most closely engaged in the process the challenge is more complex than that confronted by their predecessors in 2010. The international security context is more confused and contradictory; the UK's financial predicament is still grave; security threats and challenges will emerge that cannot be ignored; the population's appetite for foreign military engagement appears nevertheless to be restricted; and prevailing conditions suggest that the risk‐based approach to national strategy might be proving difficult to sustain. Two key questions should be asked of the review. First, in the light of recent military experiences, what is the purpose of the United Kingdom's armed forces? Second, will SDSR 2015–16 sustain the risk‐based approach to national strategy set out in 2010, and if so how convincingly? Beginning with a review of the background against which SDSR 2015–16 will be prepared, this article examines both enduring and immediate challenges to the national strategic process in the United Kingdom and concludes by arguing for strategic latency as a conceptual device which can complement, if not reinvigorate, the risk‐based approach to national strategy and defence.  相似文献   

10.
This article attempts to clarify some of the central questions and distinctions that provide the necessary backdrop for thinking in a sophisticated way about security in Africa. Drawing on the developing Critical Security Studies literature it suggests that an understanding of security based on people, justice and change offers the surest route to a stable future. It then sketches preliminary answers to some fundamental questions, namely: whose security should be prioritized? How have security dynamics in Africa been influenced by the wider processes driving world politics? What clusters of threats are the most salient? Where do such threats have the most pernicious effects? Which actors are best placed to alleviate those threats? And what sort of institutions should be built to assist in that process? The role of outsiders concerned with promoting security on the continent should be to try to ensure that as many Africans as possible are able to voice their opinions on these crucial issues.  相似文献   

11.
This article discusses the current process of securitisation in Central Asia and identifies its convoluted and faulty nature as a factor impeding collective security action in the region. It uses the Regional Security Complex Theory (RSCT) as an explanatory tool and posits that security discourse in — and about — the five former Soviet republics is dominated by geopolitical grand strategy on the one hand and by particularist concerns about lack of democracy or transnational threats on the other. Issues of conventional security involving two or more states, such as territorial disputes or resource management, are pushed aside and rarely securitised at the official level. The article outlines conceptual and institutional reasons for this bias, and argues that unless inter-state tensions are properly analysed, debated and addressed, the prospects for security and stability in the region will remain grim.  相似文献   

12.
Between late 1969 and mid-1972 there were 176 premeditated and politically motivated attacks against a range of mostly government, military, judicial, diplomatic and commercial targets in Australia. Most were undertaken by radical left-wing actors. Such incidents and the organisations and individuals who carried them out can be examined through the lens of ‘home-grown’ terrorism. This article corrects the popular and historiographical amnesia associated with these events and demonstrates that like the moderate social movements of the ‘long Sixties’ that sustained Australia's ‘Years of Hope’, the home-grown terrorist actors who contributed to Australia's ‘Days of Rage’ were, most especially, influenced by American developments, cultural productions and actors. Further, in its attempts to understand and deal with these new threats, elements of the Australian Security Intelligence Organisation (ASIO) were similarly influenced by a range of American ideas and events including social science research methodologies.  相似文献   

13.
The United States's National Spatial Data Infrastructure (NSDI) model presumes that the local government agencies of counties and municipalities will share their geographic information freely with government agencies of regions, states and federal agencies. This article takes up the issue of local government involvement in the NSDI by asking the question: why should local governments involve themselves in the NSDI? This question is informed by considering the social and technological imbrication of the NSDI. One of the oldest spatial data infrastructure projects, the NSDI offers insights into the complexity of implementing infrastructure in federal models of shared governance. This article focuses on the political and financial dimensions of developing infrastructure among local governments. Trust is quintessential at this level of government. Local government agency activities experience an inherently closer coupling with political representatives and with different agencies in both intramunicipal and intermunicipal activities. Building the NSDI is fundamentally an interagency act and thus a matter of trust. Trust is a key issue in the development of the NSDI, as the results of a study of Kentucky local government agencies indicate.  相似文献   

14.
This article examines the controversial involvement of British mercenaries in the early phases of the Angolan civil war (1975–6), and analyses the effect of their intervention on UK domestic politics and foreign affairs. It concludes that the mercenaries involved - who fought with the National Front for the Liberation of Angola (FNLA) in January 1976 - were recruited largely as a result of private initiative, and that the available evidence suggests that the British government was not officially complicit in their enlistment. This article also shows that the mercenary intervention not only sharpened party-political differences between the Conservative and Labour parties over East–West relations, but also contributed to domestic fears of right-wing paramilitary activity within Britain itself.  相似文献   

15.
The British government is in the process of re‐energizing its relations with the Gulf states. A new Gulf strategy involving a range of activities including more frequent elite bilateral visits and proposals sometimes touted as Britain's military ‘return to east of Suez’ are two key elements of the overarching strategy. Such polices are designed to fall in line with British national interest as identified by the government‐authored 2010 National Security Strategy (NSS), which emphasizes the importance of security, trade, and promoting and expanding British values and influence as perennial British raisons d'etat. In the short term, the Gulf initiatives reflect and compliment these core interests, partly based on Britain's historical role in the region, but mostly thanks to modern day trade interdependencies and mutually beneficial security‐based cooperation. However, there is yet to emerge a coherent understanding of Britain's longer‐term national interest in the region. Instead, government‐led, party‐political priorities, at the expense of thorough apolitical analysis of long‐term interests, appear to be unduly influential on the origins of both the Gulf proposals and the NSS conclusions themselves. Without a clear strategic, neutral grounding, both the Gulf prioritization and the NSS itself are weakened and their longevity undermined.  相似文献   

16.
After the 7 July and 21 July 2005 attacks on London the government‐sponsored effort to ‘prevent extremism together’ has repeatedly acknowledged the central role of anger at UK foreign policy in the radicalization of some British Muslims. This acknowledgement has been incorporated into a ‘comprehensive framework for action’ centring upon the need for increased ‘integration’ and an effort, critically, to re‐work British multiculturalism as a means to combat terrorism. Examining the history of multiculturalism in Britain and the tradition of living and acting ‘together’ that it suggests, however, raises a set of questions about the society into which integration is supposed to occur, what integration might involve and its real efficacy for combating terrorists. In addressing these issues, this article suggests that the debate over contemporary multiculturalism should be situated within a much wider social and political crisis over the meaning of ‘community’ in the UK, to which questions of global order and foreign policy are central. Comparing the ‘ethical’ basis of Al‐Qaeda's attacks with Tony Blair's invocation of ‘values’ as the foundation for military intervention reveals that both seek to realize models of community through violence and a shared process of ‘radicalization’ which in both cases precedes 9/11 and which might be traced back to the Gulf War of 1991. The article concludes that debate over the future of multiculturalism in the UK is being conducted alongside and is implicated within a second, violent global conflict over community: one which is central to, but essentially unarticulated within the domestic context.  相似文献   

17.
Australia's victory in securing temporary seats on the United Nations Security Council and the United Nations Executive Board has been much celebrated. This provides an important platform for Australia to further the agenda of women's rights worldwide. As part of this agenda, Australia has provided a commitment to implement United Nations Security Council Resolution 1325 on Women, Peace and Security through the development of the National Action Plan on Women, Peace and Security 2012–2018, released in 2012. This article examines the early thoughts and efforts towards the implementation of this plan. It demonstrates that while there is a broad rhetorical commitment to implementation by Australian actors, there are nonetheless challenges that may threaten its success. Based in part upon interviews with Australian government representatives and policy makers, and activists and advocates of the Women, Peace and Security agenda, this article highlights the success, challenges and opportunities that have so far been associated with implementing this important Resolution.  相似文献   

18.
In the aftermath of the ruptures caused by the Iraq crisis, European states agreed in December 2003 on both a European Security Strategy and an EU Strategy against the Proliferation of Weapons of Mass Destruction (WMD). Ten years have passed since this attempt to kick‐start common European policies on WMD proliferation. How well have EU policies performed in this area? Has a specifically European way of dealing with proliferation challenges emerged? This article traces the development of EU policies on WMD proliferation since 2003 by examining, in particular, European reactions to the nuclear crisis in Iran, as well as European interactions with the international non‐proliferation regime and the cooperation with partner countries. The article concludes that the EU has performed much better than might have been expected in an area that has traditionally been one of the fiercely guarded prerogatives of national security policies. The EU's good performance is very much related to institutional flexibility, as exemplified by the EU/E3 approach to Iran; and, to a high degree of political pragmatism. However, important shortcomings remain, most notably the lack of coordination between national and European non‐proliferation efforts. In other words, the EU has not in the last ten years turned into a fully fledged non‐proliferation actor that can deliver tangible results in any area of proliferation concern.  相似文献   

19.
While much attention has been paid to the ways in which the private sector is now embedded within the field of development, one group of actors — for-profit development consultancies and contractors, or service providers — has received relatively little attention. This article analyses the growing role of for-profit consultancies and contractors in British aid delivery, which has been driven by two key trends: first, the outsourcing of managerial, audit and knowledge-management functions as part of efforts to bring private sector approaches and skills into public spending on aid; and second, the reconfiguration of aid spending towards markets and the private sector, and away from locally embedded, state-focused aid programming. The authors argue that both trends were launched under New Labour in the early 2000s, and super-charged under successive Conservative governments. The resulting entanglement means that the policies and practices of the UK government's aid agencies, and the interests and forms of for-profit service providers, are increasingly mutually constitutive. Amongst other implications, this shift acts to displace traditional forms of contestation and accountability of aid delivery.  相似文献   

20.
As the neo‐liberal project has spread across the globe, decentralization has been a key component of it. In South Africa, the neo‐liberal macro‐economic strategy of the African National Congress (ANC) involves support for fiscal and administrative decentralization partly as a way to bring the private sector into basic service delivery and supposedly to make local government more efficient and effective. However, the ANC also sees decentralization as a way to empower the historically disadvantaged black population. Community‐based public–private partnerships have been one of the chief initiatives in this regard. In the metropolitan municipality of Port Elizabeth, small black contracting companies have been hired and trained to dispose of waste, construct roads and build houses. While not free of tensions and problems, this approach to decentralization has fostered a form of democratic development. This article uses examples from the Port Elizabeth experience to test and reflect upon a number of issues which are raised in the literature on decentralization.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号