首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This article examines the extent to which terrorist use of nuclear, chemical, and biological weapons poses a tangible threat to international security. In the literature on terrorism and weapons of mass destruction (WMD) some analysts have tended to exaggerate the scope of the threat and assumed that large-scale terrorist acts involving WMD are only 'a matter of time'. In short, there is a tendency among observers to converge on analogous assessments at the higher end of the threat spectrum. In this article I argue that although WMD terrorism remains a real prospect, the ease with which such attacks can be carried out has been exaggerated; acquiring WMD capabilities for delivery against targets is a lot more problematic for terrorists than is generally acknowledged in the literature. However, this is not to say that the possibility of such attacks can (or should) be ruled out. The rise of a 'new' brand of terrorism that operates across transnational networks and whose operations aim to inflict mass casualties, coupled with the destructive threshold crossed on 11 September 2001, mean that terrorist attacks using WMD will continue to be a realistic prospect in the future.  相似文献   

2.
This article considers the moral limits to national security policies. While it may seem self-evident that there are, and ought to be, limits to counterterrorism policies, there is an increasingly widespread public opinion that political leaders can, and must, do everything they can to protect against terrorist acts. Liberal-democratic societies are facing the threat of domestic terrorism, and for a political leader to say that ‘we cannot stop all terrorist acts and, indeed, neither should we’ would sound the death knell for their career. This article seeks to specify the limiting conditions around counterterrorism policy by reference to policymakers’ public justifications offered for counterterrorism policy. This article presents three normative elements that underpin counterterrorism policy to show that there are important reasons to limit counterterrorism policy, and to suggest that these limits ought to be recognised by political leaders and citizens alike in liberal-democratic societies. Having set out three limiting factors on counterterrorism policy, the article then shows that these factors do indeed play a role in UK counterterrorism policy development—that is, in recognising the justificatory apparatus for national security policies, limiting conditions ought to be found that are sensible to, and accepted by, the proponents of such policies.  相似文献   

3.
ABSTRACT. The study of nationalism in Egypt has often focused on Arab nationalism and its relevance to the post‐colonial state building process. The current article shifts the focus to the Egyptian state's strategic use of nationalism as a mechanism for survival and for shoring up its failing legitimacy. In particular, the case of the human rights debate is chosen to show the regime's most recent attempt to ‘nationalise’ a rising movement which promotes universalism and poses a threat to the notion of the nation's homogeneity. By misrepresenting human rights organisations as mouthpieces of Western imperialist powers, the regime has managed to create an image of these organisations as posing a threat to Egypt's national security and undermining its international ‘reputation’. More recently, however, the state has refined its discourse on human rights by promoting an image whereby it is the ‘official agent’ of a more nationalistically defined human rights movement.  相似文献   

4.
Following President Bush's declaration of a ‘War on Terror’ in 2001, governments around the world introduced a range of counter‐terrorist legislation, policies and practices. These measures have affected not only human rights and civil liberties but also civil society and aid frameworks. Although the Obama administration has renounced the language of the ‘War on Terror’ and taken steps to revoke aspects such as water‐boarding and the detention facility at Guantanamo Bay, the bulk of the legislation and practices associated with the post‐9/11 global security framework remain. The cluster of papers which follow provide detailed studies of the effects of the War on Terror regime on civil society in four contexts: the USA, Spain, Kenya and Uzbekistan. In this way it lays a basis for civil society actors and aid agencies to reflect more strategically on how they should engage with security debates and initiatives in a way that best protects the spaces of civil society and the interests of minority and vulnerable groups. This introduction sets out the three key themes pursued throughout the cluster articles, namely, the selective impact of counter‐terrorist measures on civil society; the particularity of civil society responsiveness to these measures; and the role of aid and diplomacy in pursuing security objectives and its consequences for civil society.  相似文献   

5.
Recent terrorist events in the UK, such as the security alerts at British airports in August 2006 and the London bombings of July 2005 gained extensive media and academic analysis. This study contends, however, that much of the commentary demonstrated a wide degree of failure among government agencies, academic and analytic experts and the wider media, about the nature of the threat and continues to distort comprehension of the extant danger. The principal failure, this argument maintains, was, and continues to be, one of an asymmetry of comprehension that mistakes the still relatively limited means of violent jihadist radicals with limited political ends. The misapprehension often stems from the language that surrounds the idea of 'terrorism', which increasingly restricts debate to an intellectually redundant search for the 'root causes' that give rise to the politics of com placency. In recent times this outlook has consistently underestimated the level of the threat to the security of the UK. This article argues that a more realistic appreciation of the current security condition requires abandoning the prevailing view that the domestic threat is best prosecuted as a criminal conspiracy. It demands instead a total strategy to deal with a totalizing threat. The empirical evidence demonstrates the existence of a physical threat, not merely the political fear of threat. The implementation of a coherent set of social policies for confronting the threat at home recognizes that securing state borders and maintaining internal stability are the fi rst tasks of government. Fundamentally, this requires a return to an understanding of the Hobbesian conditions for sovereignty, which, despite the delusions of post-Cold War cosmopolitan multiculturalism, never went away.  相似文献   

6.
This article examines the changes that have taken place in Russian domestic and foreign policy after the Beslan hostage crisis of early September 2004. The terrorist attack has had two immediate effects in Moscow: it shook new convictions about the apparent consolidation of Russia and it reinforced old beliefs in the need to strengthen the Russian state. In order to analyse recent changes, the article discusses the policy framework put in place during Putin's first term to strengthen the state and to build a more favourable external environment. Putin's response since the Beslan attack is founded on the premise that the only effective response to the terrorist threat is to reinforce the 'organism' of the state to withstand further attacks and to manage their consequences. The article examines the limits of the policy framework in place since 2000, where a circular logic is at work, in which terrorist attacks produce greater efforts by the government to strengthen the state but with measures that do little to prevent further attack, which, in turn, stimulate a further securitization of policy. The terrorist attack at Beslan has accelerated this logic, which sits uneasily with Putin's twin vision since 2000 of domestic modernization to revitalize the country and external engagement to create a predictable external setting.  相似文献   

7.
For as long as there has been technology (the application of science and innovation) and for as long as there has been strategy (the use of forces and resources to achieve political goals) there has been a relationship of sorts between these two preoccupations. This article inquires into the nature of the technological–strategic relationship which governments, such as that in the UK, draw upon as they confront international terrorism. To what extent has the historical technostrategic dynamic remained relevant and useful, and where has new thinking been required? The article suggests that a new and more complex understanding of the technology–strategy relationship is emerging in the context of counterterrorism. The challenge facing government is to maintain a technological edge against its terrorist adversary, without exaggerating the adversary's capability, and while ensuring that its counterterrorism strategy pursues a coherent and persuasive political goal.  相似文献   

8.
9.
The Greek junta was notorious for its use of state torture as a means of control. Yet, for most Western governments and organisations such as the North Atlantic Treaty Organization (NATO) and the United Nations (UN), Greece's geostrategic location was considered to be a higher priority than the undemocratic behaviour of the ‘Colonels’. This article seeks to synthesise existing historiography with new research in order to examine the complex and interconnected processes that led Western states and key international institutions to tolerate human-rights abuses in Greece in the face of huge protest from international public opinion. It will look at why Western states failed to explain away the ‘Greek case’, as they had done with Portugal and Spain, as an anomaly on the road to defeating a mortal enemy, the USSR, which was committing far more numerous violations. It will also consider why international opinion focused on Greece so intently. It will show how many in the West were lulled by the regime into believing that human-rights abusers can act as agents of stability and security. The article's footnotes aim to draw attention to the many primary and secondary sources that provide additional information on the issue of human-rights abuses by the Greek junta.  相似文献   

10.
Gerard Toal has written a very important work placing the terrorist attack in Beslan into a geopolitical context. Toal's analysis emphasizes two themes, the need to place Beslan in a political context and the parallels between the Russian government's reaction to the attack and the Bush administration's reaction to the September 11 attacks. In this response, I seek to make these two themes more explicit and also to focus on one area that is somewhat neglected in Toal's analysis: namely, the factors that made the terrorist attack in Beslan possible. In doing so, I turn away from focusing exclusively on geopolitics by bringing in some of the socio-economic and ideological factors that made the North Caucasus ripe for the explosion of terrorist attacks that occurred in the first half of this decade. I also show how changes in government policies eventually brought about the decline of large-scale terrorist attacks in the region. In doing so, I hope to make the point that any analysis of a spectacular terrorist attack such as Beslan has to take into account not just geopolitics, but also the socio-economic conditions that made it possible and the government policies that allowed it to happen.  相似文献   

11.
The events of September 11 2001 in New York and Washington, and of July 7 2005 in London, have ushered in a new era in protective counterterrorist planning within UK urban areas. With the mode of terrorist attack now encompassing the possibility of no‐warning suicide attacks, and target selection now often being seen as related to crowd density, a variety of public places such as sports stadiums, shopping centres, light rail systems, and nightclubs now have to consider ‘designed‐in’ counterterrorism measures. As such the UK has developed a national counterterrorist strategy (CONTEST) which is constantly revised, and one strand of which focuses on protective security measures. In the context of this ‘Protect’ strand of policy, and the increased targeting of crowded places by international terrorist groups, this article outlines the recent attempts to design‐in counterterrorism features to the urban landscape while paying attention not just to their effectiveness and robustness, but also to their acceptability to the general public and impact upon the everyday experience of the city. The article also addresses how the need to consider counterterrorism has affected the practices of built‐environment professionals such as spatial planners. Reflections upon how this aspect of counterterrorism policy might develop in the future are also offered.  相似文献   

12.
This article discusses the case of the Allied Democratic Forces (ADF) rebel group in the Democratic Republic of Congo (DRC). It shows how a variety of actors that have opposed the ADF group have framed the rebels to achieve a range of political and economic objectives, or in response to organizational and individual limitations. The DRC and Ugandan governments have each framed ADF in pursuit of regional, international and national goals separate from their stated desires to eliminate the armed group. The UN stabilization mission in Congo's (MONUSCO) understanding of the ADF was influenced by organizational limitations and the shortcomings of individual analysts, producing flawed assessments and ineffective policy decisions. Indeed, the many ‘faces’ of ADF tell us more about the ADF's adversaries than they do about the rebels themselves. The article shows how the policies towards the ADF may not be directly related to defeating a rebel threat, but rather enable the framers (e.g. DRC and Ugandan governments) to pursue various political and economic objectives, or lead the framers to pursue misguided operational plans (e.g. MONUSCO). In doing so, the article highlights more broadly the importance of the production of knowledge on conflicts and rebel groups: the way in which a rebel group is instrumentalized, or in which organizational structure impact on the understanding of the rebel group, are crucial not only in understanding the context, but also in understanding the interventions on the ground.  相似文献   

13.
Prompted by the trend to see information and communications technology (ICT) as a tool for capacity building, this article asks whether the use of ICT has—or can—recast centre–periphery relations in a hybrid country such as Somaliland. Taking as its departure point Herbst's observation that a fundamental problem confronting African leaders concerns how to extend or consolidate authority over sparsely settled lands, it uses recent developments in Somaliland's coast guard and immigration police to assess ICT's contribution to changing security provision in remote and coastal areas. This allows for an analysis of Somaliland's law enforcement framework, the relationship between its politics and practice, the practical application of its coercive resources, and the Silanyo government's priorities and preference for consensus and co‐existence whenever security imperatives allow. It suggests that ICT can be a desirable operational tool or a variable in existing power networks, but that it does not represent a new mode of security governance. ICT's potential to connect Somaliland's government and populace, and politics and practice, is for now minimal, but identifying the ways in which security actors such as coast guards actually use ICT allows for a more accurate assessment of the variables shaping centre–periphery relations. Contrary to Herbst's observation, the Silanyo government does not need to overtly or systematically extend, consolidate or exert its authority in remote and coastal areas. Spatial metaphors such as centre–periphery help to clarify the situation, but the significance invested in them reflects western rationalities, rather than Somali realities.  相似文献   

14.
Soaring prices for minerals and energy are posing a major threat to the resource security of economies in Asia. As a result, many regional governments have launched new resource security strategies in the last few years. Most recent attention to resource security in Asia has focused on debating whether the Chinese government’s resource policies are mercantilist or liberal. This China-focused debate is too narrow to fully capture the nature of resource politics in Northeast Asia, since the governments of Japan and Korea have also recently launched their own resource security strategies. This paper considers regional-level trends in Asian resource politics by examining the causes, content and implications of the resource security strategies deployed by the consumer governments in Northeast Asia. It argues that growing resource security concerns, combined with a process of competitive policy emulation, have seen the Chinese, Japanese and Korean governments each adopt mercantilist resource security strategies over the last decade. Furthermore, the competitive nature of these mercantilist strategies is acting to intensify political and economic competition for resources between the Asian region’s three main economic powers.  相似文献   

15.
This article aims to illustrate the trajectory of Japan's security identity transposition. As one of the catalysts in identity transposition, it focuses on the constitutive roles of norms regulating Japan's overseas dispatches of the Self-Defense Forces (SDF). Whilst keeping the identities of ‘a peace state’ and ‘a civilian power’, the authors argue that Japan has crafted a new security identity after the end of the cold war and the 9/11 terrorist attacks—namely, ‘an international humanitarian power’. As evidence of this transposition, the authors illustrate a dramatic increase in the number of overseas SDF dispatches on humanitarian missions, and the shift of domestic and foreign responses to it. The authors note that Japan has been on the road to remilitarisation and internationalisation during the past four decades through the enactments of laws for overseas SDF dispatches, the general public's shift of attitude on the SDF's roles, the evolution of the alliance in a more operational direction, and the creation of threats from North Korea and China. Lastly, the authors argue that there is still a long way to go before Japan emerges as a normal state because of the presence of many domestic and structural barriers, especially multiple identities defining the Japanese state.  相似文献   

16.
One of the distinctive elements of President Barack Obama's approach to counterterrorism has been his embrace of Unmanned Aerial Vehicles (UAVs), or drones, to target terrorist operatives abroad. The Obama administration has used drones in active theatres of war, such as Afghanistan, but it has also dramatically increased the number of drone attacks launched by the CIA in other countries, such as Pakistan, Yemen and Somalia. The conventional wisdom on drone warfare holds that these weapons are highly effective in killing terrorist operatives and disabling terrorist organizations, while killing fewer civilians than other means of attack. This article argues that much of the existing debate on drones operates with an attenuated notion of effectiveness that discounts the political and strategic dynamics—such as the corrosion of the perceptions of competence and legitimacy of governments where drone strikes take place, growing anti‐Americanism and fresh recruitment of militant networks—that reveal the costs of drone warfare. Focusing particularly on drone use in Pakistan, Yemen and Somalia, the article suggests that the Obama administration's counterterrorism policy operates at cross‐purposes because it provides a steady flow of arms and financial resources to build up governments whose legitimacy it systematically undermines by conducting unilateral strikes on their territory. It concludes that the US embrace of drone technology is a losing proposition over the long term as it will usher in a new arms race and lay the foundations for an international system that is increasingly violent, destabilized and polarized between those who have drones and those who are victims of them.  相似文献   

17.
18.
This paper shows that the focus of Australia's ‘declared’ defence policy has oscillated between local and regional defence, whereas its ‘operational’ policy—the views contained in internal planning and guidance documents—has taken a mid‐course, focusing on defending Australia's northern approaches. Australia's two policy domains coincided briefly in the mid‐1980s but have since diverged as we have again begun to emphasise regional defence. This shift could signal the end of ‘defence self‐reliance’. While representing a setback for the Hawke government, such a result is necessary as Australia's ‘operational’ policy is flawed and in need of replacement The danger is that, as in the past, Australian governments and their advisers will continue to adjust their rhetoric rather than their real policies to our changing circumstances.  相似文献   

19.
《Political Geography》2000,19(1):55-76
Following the release of the 1994 report ‘Who will feed China?’ by the Worldwatch Institute, there has been much debate over the implications of China's growing demand for grain. The question of China's food production has elicited a variety of responses. While for some it raises the specter of regional and global instability as China becomes an environmental threat, for others the entrance of China into the world market promises increased trade and profits. In this paper I explore the responses in China and the US to the different notions of interdependence which have shaped the debate. I first turn to how concerns over China's food supply have, despite appeals to the concepts of global environmental and economic interdependence, become linked to classical state-centered geopolitical concerns such as ‘sovereignty’ and ‘containment.’ I then look at how the debate has also been actively distanced from national security concerns through the invocation of an alternative interdependence founded on the logic of commerce. I conclude by arguing for the need within critical geopolitics to further examine the circulation of strategic texts between and within states, particularly in the analysis of texts that map worlds beyond the boundaries of North America and Europe.  相似文献   

20.
This article examines the role of the Islamic State of Iraq and Syria's (ISIS's) beheading videos in the United Kingdom and the United States. These videos are highly illustrative demonstrations of the importance of visual imagery and visual media in contemporary warfare. By functioning as evidence in a political discourse constituting ISIS as an imminent, exceptional threat to the West, the videos have played an important role in the re‐framing of the conflict in Iraq and Syria from a humanitarian crisis requiring a humanitarian response to a national security issue requiring a military response and intensified counterterrorism efforts. However, this article seeks to problematize the role and status of ISIS's beheadings in American and British security discourses by highlighting the depoliticizing aspects of reducing a complicated conflict to a fragmented visual icon. The article concludes by emphasizing the need for further attention to how the visibility of war, and the constitution of boundaries between which acts of violence are rendered visible and which are not, shape the political terrain in which decisions about war and peace are produced and legitimized.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号