首页 > 最新文献

International Security最新文献

英文 中文
Assessing China-U.S. Inadvertent Nuclear Escalation 评估中美。无意的核升级
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2022-02-01 DOI: 10.1162/isec_a_00428
Riqiang Wu
Abstract China-U.S. inadvertent escalation has been a focus of recent international relations literature. The current debate, however, has not paid sufficient attention to two important factors: the survivability of China's nuclear forces under unintentional conventional attacks; and China's nuclear command, control, and communication (NC3) system. Based on detailed analysis of these two variables, three potential mechanisms of China-U.S. inadvertent escalation are examined: use-it-or-lose-it, unauthorized/accidental, and damage-limitation. Although the possibility of a major China-U.S. conventional war inadvertently escalating to a nuclear level cannot be excluded, the risk is extremely low. China's nuclear forces would survive U.S. inadvertent conventional attacks and, thus, are unlikely to be significantly undermined. Even though China's NC3 system might be degraded during a conventional war with the United States, Chinese leadership would likely maintain minimum emergency communications with its nuclear forces. Moreover, China's NC3 system is highly centralized, and it prioritizes “negative control,” which can help to prevent escalation. China's nuclear retaliatory capability, although limited, could impede U.S. damage-limitation strikes to some extent. To keep the risk of inadvertent escalation low, both sides must take appropriate precautions and exercise self-restraint in their planning and operations.
抽象的中美。无意的升级一直是最近国际关系文献的焦点。然而,目前的争论没有充分关注两个重要因素:中国核力量在意外常规攻击下的生存能力;以及中国的核指挥、控制和通信(NC3)系统。在详细分析这两个变量的基础上,提出了中美关系发展的三种潜在机制。检查无意升级:使用它或失去它,未经授权/意外,以及损害限制。尽管中美关系可能会发生重大变化。不能排除常规战争无意中升级为核战争的可能性,风险极低。中国的核力量将在美国无意的常规攻击中幸存下来,因此不太可能受到严重破坏。尽管在与美国的常规战争中,中国的NC3系统可能会退化,但中国领导层可能会与其核力量保持最低限度的应急通信。此外,中国的NC3系统高度集中,优先考虑“负面控制”,有助于防止升级。中国的核报复能力虽然有限,但可以在一定程度上阻碍美国的损害限制打击。为了降低意外升级的风险,双方必须采取适当的预防措施,并在计划和行动中保持自我克制。
{"title":"Assessing China-U.S. Inadvertent Nuclear Escalation","authors":"Riqiang Wu","doi":"10.1162/isec_a_00428","DOIUrl":"https://doi.org/10.1162/isec_a_00428","url":null,"abstract":"Abstract China-U.S. inadvertent escalation has been a focus of recent international relations literature. The current debate, however, has not paid sufficient attention to two important factors: the survivability of China's nuclear forces under unintentional conventional attacks; and China's nuclear command, control, and communication (NC3) system. Based on detailed analysis of these two variables, three potential mechanisms of China-U.S. inadvertent escalation are examined: use-it-or-lose-it, unauthorized/accidental, and damage-limitation. Although the possibility of a major China-U.S. conventional war inadvertently escalating to a nuclear level cannot be excluded, the risk is extremely low. China's nuclear forces would survive U.S. inadvertent conventional attacks and, thus, are unlikely to be significantly undermined. Even though China's NC3 system might be degraded during a conventional war with the United States, Chinese leadership would likely maintain minimum emergency communications with its nuclear forces. Moreover, China's NC3 system is highly centralized, and it prioritizes “negative control,” which can help to prevent escalation. China's nuclear retaliatory capability, although limited, could impede U.S. damage-limitation strikes to some extent. To keep the risk of inadvertent escalation low, both sides must take appropriate precautions and exercise self-restraint in their planning and operations.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80066214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending the United States: Revisiting National Missile Defense against North Korea 保卫美国:重新审视针对朝鲜的国家导弹防御系统
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2022-02-01 DOI: 10.1162/isec_a_00426
Jaganath Sankaran, S. Fetter
Abstract North Korea has made significant strides in its attempt to acquire a strategic nuclear deterrent. In 2017, it tested intercontinental ballistic missiles (ICBMs) and completed a series of nuclear test explosions. These may provide North Korea with the technical foundation to deploy a nuclear-armed ICBM capable of striking the United States. The Ground-based Midcourse Defense (GMD) missile defense system is intended to deter North Korean nuclear coercion and, if deterrence fails, to defeat a limited North Korean attack. Despite two decades of dedicated and costly efforts, however, the GMD system remains unproven and unreliable. It has not demonstrated an ability to defeat the relatively simple and inexpensive countermeasures that North Korea can field. The GMD system has suffered persistent delays, substantial cost increases, and repeated program failures because of the politically motivated rush to deploy in the 1990s. But GMD and other U.S. missile defense efforts have provoked serious concerns in Russia and China, who fear it may threaten their nuclear deterrents. Diplomacy and deterrence may reassure Russia and China while constraining North Korea's nuclear program. An alternate airborne boost-phase intercept system may offer meaningful defense against North Korean missiles without threatening the Russian or Chinese deterrents.
朝鲜在获得战略核威慑力量方面取得了重大进展。2017年,朝鲜试射了洲际弹道导弹,并完成了一系列核试验爆炸。这些可能为朝鲜提供部署能够打击美国的搭载核弹头的洲际弹道导弹的技术基础。陆基中段防御(GMD)导弹防御系统旨在阻止朝鲜的核胁迫,如果威慑失败,则可以挫败朝鲜的有限攻击。然而,尽管经过了20年的投入和昂贵的努力,GMD系统仍然未经证实和不可靠。它还没有证明有能力击败朝鲜可以部署的相对简单和廉价的反制措施。GMD系统遭受了持续的延迟,大量的成本增加,并且由于在20世纪90年代有政治动机的匆忙部署,一再的项目失败。但美国的GMD和其他导弹防御系统已经引起了俄罗斯和中国的严重担忧,他们担心这可能会威胁到他们的核威慑力量。外交和威慑可能会让俄罗斯和中国放心,同时限制朝鲜的核计划。一种替代的机载助推段拦截系统可能在不威胁俄罗斯或中国威慑力量的情况下,对朝鲜导弹提供有意义的防御。
{"title":"Defending the United States: Revisiting National Missile Defense against North Korea","authors":"Jaganath Sankaran, S. Fetter","doi":"10.1162/isec_a_00426","DOIUrl":"https://doi.org/10.1162/isec_a_00426","url":null,"abstract":"Abstract North Korea has made significant strides in its attempt to acquire a strategic nuclear deterrent. In 2017, it tested intercontinental ballistic missiles (ICBMs) and completed a series of nuclear test explosions. These may provide North Korea with the technical foundation to deploy a nuclear-armed ICBM capable of striking the United States. The Ground-based Midcourse Defense (GMD) missile defense system is intended to deter North Korean nuclear coercion and, if deterrence fails, to defeat a limited North Korean attack. Despite two decades of dedicated and costly efforts, however, the GMD system remains unproven and unreliable. It has not demonstrated an ability to defeat the relatively simple and inexpensive countermeasures that North Korea can field. The GMD system has suffered persistent delays, substantial cost increases, and repeated program failures because of the politically motivated rush to deploy in the 1990s. But GMD and other U.S. missile defense efforts have provoked serious concerns in Russia and China, who fear it may threaten their nuclear deterrents. Diplomacy and deterrence may reassure Russia and China while constraining North Korea's nuclear program. An alternate airborne boost-phase intercept system may offer meaningful defense against North Korean missiles without threatening the Russian or Chinese deterrents.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80606050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War 预测与判断:为什么人工智能增加了人类在战争中的重要性
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2022-02-01 DOI: 10.1162/isec_a_00425
Avi Goldfarb, J. Lindsay
Abstract Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.
最近关于人工智能(AI)和国际安全的学术研究集中在用机器取代人类战士的政治和伦理后果上。然而,人工智能并不是人类决策的简单替代品。商业机器学习的进步降低了统计预测的成本,同时也提高了数据(使预测成为可能)和判断(决定预测为什么重要)的价值。但是这些关键的补充——高质量的数据和清晰的判断——在不确定和冲突的战争中可能不存在,或者不以同样的程度存在。这有两个重要的战略含义。首先,采用人工智能的军事组织将变得更加复杂,以适应各种决策任务中的数据和判断挑战。第二,在战略竞争中,数据和判断往往会成为有吸引力的目标。因此,涉及人工智能互补的冲突可能会与人工智能替代的设想截然不同。与快速的机器人战争和决定性的军事力量转移不同,人工智能引发的冲突可能涉及重大的不确定性、组织摩擦和长期争议。因此,对人工智能的更大军事依赖将使战争中的人类因素变得更加重要,而不是更少。
{"title":"Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War","authors":"Avi Goldfarb, J. Lindsay","doi":"10.1162/isec_a_00425","DOIUrl":"https://doi.org/10.1162/isec_a_00425","url":null,"abstract":"Abstract Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple substitute for human decision-making. The advances in commercial machine learning that are reducing the costs of statistical prediction are simultaneously increasing the value of data (which enable prediction) and judgment (which determines why prediction matters). But these key complements—quality data and clear judgment—may not be present, or present to the same degree, in the uncertain and conflictual business of war. This has two important strategic implications. First, military organizations that adopt AI will tend to become more complex to accommodate the challenges of data and judgment across a variety of decision-making tasks. Second, data and judgment will tend to become attractive targets in strategic competition. As a result, conflicts involving AI complements are likely to unfold very differently than visions of AI substitution would suggest. Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85173141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Insurgent Armies: Military Obedience and State Formation after Rebel Victory 起义军:起义军胜利后的军事服从与国家形成
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2022-02-01 DOI: 10.1162/isec_a_00427
Philip A. Martin
Abstract Why do some winning rebel groups build obedient and effective state militaries after civil war, while others suffer military defections? When winning rebels face intense security threats during civil wars, rebel field commanders are more likely to remain obedient during war-to-peace transitions. Intense security threats incentivize militants to create more inclusive leadership structures, reducing field commanders’ incentives to defect in the postwar period. Intense security threats also reduce commanders’ capacity for postwar resistance by forcing insurgents to remain mobile and adopt shorter time horizons in rebel-governed territory, reducing the likelihood that field commanders will develop local ties and independent support bases. The plausibility of the argument is examined using a new list of winning rebel groups since 1946. Two case studies—Zimbabwe and Côte d'Ivoire—probe the causal mechanisms of the theory. The study contributes to debates about the consequences of military victory in civil war, the postwar trajectories of armed groups, and the conditions necessary for civil-military cohesion in fragile states.
为什么一些获胜的反叛组织在内战后建立了服从和有效的国家军队,而另一些则遭受军事叛变?当获胜的叛军在内战中面临严重的安全威胁时,叛军的战地指挥官更有可能在从战争到和平的过渡时期保持顺从。严重的安全威胁促使武装分子建立更具包容性的领导结构,减少了战地指挥官在战后叛变的动机。激烈的安全威胁也削弱了指挥官的战后抵抗能力,迫使叛乱分子保持流动性,并在叛乱分子控制的领土内采取更短的时间跨度,降低了战地指挥官发展当地联系和独立支持基地的可能性。我们用一份1946年以来获胜反叛组织的新名单来检验这一论点的合理性。两个案例研究——津巴布韦和Côte科特迪瓦——探讨了这一理论的因果机制。这项研究有助于讨论内战中军事胜利的后果、武装团体的战后轨迹,以及脆弱国家军民团结的必要条件。
{"title":"Insurgent Armies: Military Obedience and State Formation after Rebel Victory","authors":"Philip A. Martin","doi":"10.1162/isec_a_00427","DOIUrl":"https://doi.org/10.1162/isec_a_00427","url":null,"abstract":"Abstract Why do some winning rebel groups build obedient and effective state militaries after civil war, while others suffer military defections? When winning rebels face intense security threats during civil wars, rebel field commanders are more likely to remain obedient during war-to-peace transitions. Intense security threats incentivize militants to create more inclusive leadership structures, reducing field commanders’ incentives to defect in the postwar period. Intense security threats also reduce commanders’ capacity for postwar resistance by forcing insurgents to remain mobile and adopt shorter time horizons in rebel-governed territory, reducing the likelihood that field commanders will develop local ties and independent support bases. The plausibility of the argument is examined using a new list of winning rebel groups since 1946. Two case studies—Zimbabwe and Côte d'Ivoire—probe the causal mechanisms of the theory. The study contributes to debates about the consequences of military victory in civil war, the postwar trajectories of armed groups, and the conditions necessary for civil-military cohesion in fragile states.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90866522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Are Belligerent Reprisals against Civilians Legal? 对平民的好战报复合法吗?
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-10-01 DOI: 10.1162/isec_c_00422
C. A. Ford, J. Harvey, F. C. Miller, Keith B. Payne, B. H. Roberts, Scott D. Sagan, Allen S. Weiner
I enjoyed reading the thoughtful article by Scott Sagan and Allen Weiner.1 Yet, I write to point out some oaws in Sagan and Weiner’s assertion that the prohibition on civilian reprisals in the 1977 Additional Protocol I to the 1949 Geneva Conventions (Protocol I) applies to the United States.2 In 1987, the United States objected to the reprisal ban in Protocol I3 because it would “remove a signiacant deterrent that protects civilians and war victims on all sides of a conoict.”4 Abraham D. Sofaer, legal adviser to the U.S. Department of State, provided
我喜欢阅读Scott萨根的深思熟虑的文章和艾伦Weiner.1然而,我写指出一些oaw萨根和维纳在断言禁止平民1977附加议定书报复我1949年日内瓦公约(我)协议适用于美国States.2早在1987年,美国反对在协议I3报复禁令,因为它将“删除signiacant威慑保护平民和战争受害者conoict的各方。美国国务院法律顾问亚伯拉罕·d·索费尔(Abraham D. Sofaer)表示
{"title":"Are Belligerent Reprisals against Civilians Legal?","authors":"C. A. Ford, J. Harvey, F. C. Miller, Keith B. Payne, B. H. Roberts, Scott D. Sagan, Allen S. Weiner","doi":"10.1162/isec_c_00422","DOIUrl":"https://doi.org/10.1162/isec_c_00422","url":null,"abstract":"I enjoyed reading the thoughtful article by Scott Sagan and Allen Weiner.1 Yet, I write to point out some oaws in Sagan and Weiner’s assertion that the prohibition on civilian reprisals in the 1977 Additional Protocol I to the 1949 Geneva Conventions (Protocol I) applies to the United States.2 In 1987, the United States objected to the reprisal ban in Protocol I3 because it would “remove a signiacant deterrent that protects civilians and war victims on all sides of a conoict.”4 Abraham D. Sofaer, legal adviser to the U.S. Department of State, provided","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73562922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers 当场抓获:国家如何运用证据来胁迫违法者
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-10-01 DOI: 10.1162/isec_a_00421
Cullen G. Nutt, Reid B C Pauly
Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.
国家经常获得其他国家违反准则的证据,从核扩散到窝藏恐怖分子到干涉选举。现有的理论并不能完全解释国家如何在抓人的时候对不法分子施加某种形式的强制权力。发现者可能会隐藏不法行为的证据,私下与其他行为者分享这些证据,或者向世界公开他们的证据。对不法分子有更大影响力的国家有两个动机来隐瞒不法行为的证据。他们可以通过威胁公开犯罪证据来勒索犯罪者,同时也可以让犯罪者挽回颜面。拥有不法行为证据但影响力较小的国家更有可能与其他国家分享这些证据。如果一个发现者不相信拥有更大影响力的国家的意图,它将公开披露证据,促使其他国家采取行动。公开证据使其他国家如果不坚持惩罚违反规范的行为,就会付出名誉和虚伪的代价。四个核扩散案例研究(台湾、利比亚、南非和朝鲜)探讨了这一新颖的理论。
{"title":"Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers","authors":"Cullen G. Nutt, Reid B C Pauly","doi":"10.1162/isec_a_00421","DOIUrl":"https://doi.org/10.1162/isec_a_00421","url":null,"abstract":"Abstract States frequently acquire proof of other states' norm violations, from nuclear proliferation to harboring terrorists to interfering in elections. Existing theories do not fully explain how states that catch others red-handed wield a form of coercive power over the wrongdoers. Discoverers may conceal proof of wrongdoing, share such proof with other actors privately, or reveal their proof to the world. States with more leverage over wrongdoers have two incentives to conceal proof of wrongdoing. They can blackmail wrongdoers by threatening to go public with proof of their guilt, and they can simultaneously allow wrongdoers to save face. States that possess proof of wrongdoing but have less leverage are more likely to share that proof with others. If a discoverer distrusts the intentions of states with more leverage, it will reveal evidence publicly, catalyzing others to act. Publicizing proof weaponizes the prospect that other states will pay reputation and hypocrisy costs if they do not follow through on punishing norm violations. Four case studies of nuclear proliferation (Taiwan, Libya, South Africa, and North Korea) probe this novel theory.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79906948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19 机会主义镇压:国家为应对COVID-19而以平民为目标
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-10-01 DOI: 10.1162/isec_a_00419
Donald Grasse, Melissa Pavlik, Hilary Matfess, Travis B. Curtice
Abstract Across the globe, states have attempted to contain COVID-19 by restricting movement, closing schools and businesses, and banning large gatherings. Such measures have expanded the degree of sanctioned state intervention into civilians' lives. But existing theories of preventive and responsive repression cannot explain why some countries experienced surges in repression after states in Africa initiated COVID-19-related lockdowns. While responsive repression occurs when states quell protests or riots, “opportunistic repression” arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa tests this theory of opportunistic repression. Findings reveal a large and statistically significant relationship between shutdowns and repression, which holds after conditioning for the spread and lethality of the disease within-country and over time. A subnational case study of repression in Uganda provides evidence that the increase in repression appears to be concentrated in opposition areas that showed less support for Yoweri Museveni in the 2016 elections. Opportunistic repression provides a better explanation than theories of preventive or responsive repression for why Uganda experienced a surge in repression in 2020 and in what areas. The results have implications for theories of repression, authoritarian survival, the politics of emergency, and security.
在全球范围内,各国试图通过限制行动、关闭学校和企业、禁止大型集会来控制COVID-19。这些措施扩大了国家对平民生活的干预程度。但是,现有的预防性和反应性镇压理论无法解释为什么在非洲国家启动与covid -19相关的封锁后,一些国家的镇压激增。当国家镇压抗议或骚乱时,就会出现反应性镇压,而当国家利用危机镇压政治反对派时,就会出现"机会主义镇压"。对非洲COVID-19关闭政策与国家对平民暴力之间关系的研究验证了这种机会主义镇压理论。调查结果显示,关闭和抑制之间存在着巨大的、具有统计意义的关系,这种关系在对疾病在国内和随着时间的推移的传播和致命性进行调节后仍然存在。一项关于乌干达镇压的次国家级案例研究提供了证据,表明镇压的增加似乎集中在2016年选举中对约韦里·穆塞韦尼支持较少的反对派地区。机会主义镇压比预防性或响应性镇压理论更好地解释了乌干达为何在2020年经历了镇压激增,以及在哪些领域发生了镇压。研究结果对镇压理论、威权主义生存理论、紧急政治理论和安全理论具有启示意义。
{"title":"Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19","authors":"Donald Grasse, Melissa Pavlik, Hilary Matfess, Travis B. Curtice","doi":"10.1162/isec_a_00419","DOIUrl":"https://doi.org/10.1162/isec_a_00419","url":null,"abstract":"Abstract Across the globe, states have attempted to contain COVID-19 by restricting movement, closing schools and businesses, and banning large gatherings. Such measures have expanded the degree of sanctioned state intervention into civilians' lives. But existing theories of preventive and responsive repression cannot explain why some countries experienced surges in repression after states in Africa initiated COVID-19-related lockdowns. While responsive repression occurs when states quell protests or riots, “opportunistic repression” arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa tests this theory of opportunistic repression. Findings reveal a large and statistically significant relationship between shutdowns and repression, which holds after conditioning for the spread and lethality of the disease within-country and over time. A subnational case study of repression in Uganda provides evidence that the increase in repression appears to be concentrated in opposition areas that showed less support for Yoweri Museveni in the 2016 elections. Opportunistic repression provides a better explanation than theories of preventive or responsive repression for why Uganda experienced a surge in repression in 2020 and in what areas. The results have implications for theories of repression, authoritarian survival, the politics of emergency, and security.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77458631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Arms Control as Wedge Strategy: How Arms Limitation Deals Divide Alliances 作为楔子战略的军备控制:军备限制协议如何分裂联盟
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-10-01 DOI: 10.1162/isec_a_00420
T. Crawford, Khang X. Vu
Abstract Strategic arms control is in crisis. The United States and Russia have retreated from agreements that formed the framework for post–Cold War arms cuts and strategic stability, such as the Anti-Ballistic Missile Treaty, the Treaty on Conventional Armed Forces in Europe, and the Intermediate-Range Nuclear Forces Treaty. The only strategic arms control agreement between the United States and Russia (i.e., New START) expires in 2026. The political forcefield that sustained the old framework has been altered by major technological revolutions and China's rise. Motives for strategic arms control are conventionally framed in terms of their potential to enhance stability by limiting certain weapons, avoiding costly arms races, or preserving military advantage. But states can also use strategic arms control to divide adversaries. Wedge strategy theory explains how arms control can do so by affecting adversaries' threat perceptions, their beliefs about the costs and benefits of formal commitments, and their degree of trust in one another. Three landmark strategic arms control negotiations (the Five-Power Treaty and the Four-Power Treaty at the Washington Naval Conference, the Limited Nuclear Test Ban Treaty, and the Strategic Arms Limitation Talks) show how the wedge motive informed these negotiations and influenced great power relations. The wedge logic remains relevant today. For example, the United States may employ future arms control agreements to drive a wedge between China and Russia, and it must be cautious about arms control deals with North Korea that would negatively affect its relationship with South Korea.
战略军备控制面临危机。美国和俄罗斯退出了冷战后削减军备和战略稳定框架的协议,如《反弹道导弹条约》、《欧洲常规武装力量条约》和《中程核力量条约》。美俄之间唯一的战略武器控制协议(即《新削减战略武器条约》)将于2026年到期。主要的技术革命和中国的崛起改变了维持旧框架的政治力场。战略军备控制的动机通常被框定为通过限制某些武器、避免代价高昂的军备竞赛或保持军事优势来增强稳定的潜力。但国家也可以利用战略军备控制来分化对手。楔形战略理论解释了军备控制是如何通过影响对手的威胁感知、他们对正式承诺的成本和收益的看法以及他们对彼此的信任程度来实现这一目标的。三个具有里程碑意义的战略军备控制谈判(华盛顿海军会议上的《五国条约》和《四国条约》、《有限禁止核试验条约》和《限制战略武器谈判》)表明,楔子动机如何影响了这些谈判,并影响了大国关系。楔形逻辑在今天仍然适用。例如,美国可能会利用未来的军控协议来离间中国和俄罗斯,它必须谨慎对待与朝鲜的军控协议,这将对其与韩国的关系产生负面影响。
{"title":"Arms Control as Wedge Strategy: How Arms Limitation Deals Divide Alliances","authors":"T. Crawford, Khang X. Vu","doi":"10.1162/isec_a_00420","DOIUrl":"https://doi.org/10.1162/isec_a_00420","url":null,"abstract":"Abstract Strategic arms control is in crisis. The United States and Russia have retreated from agreements that formed the framework for post–Cold War arms cuts and strategic stability, such as the Anti-Ballistic Missile Treaty, the Treaty on Conventional Armed Forces in Europe, and the Intermediate-Range Nuclear Forces Treaty. The only strategic arms control agreement between the United States and Russia (i.e., New START) expires in 2026. The political forcefield that sustained the old framework has been altered by major technological revolutions and China's rise. Motives for strategic arms control are conventionally framed in terms of their potential to enhance stability by limiting certain weapons, avoiding costly arms races, or preserving military advantage. But states can also use strategic arms control to divide adversaries. Wedge strategy theory explains how arms control can do so by affecting adversaries' threat perceptions, their beliefs about the costs and benefits of formal commitments, and their degree of trust in one another. Three landmark strategic arms control negotiations (the Five-Power Treaty and the Four-Power Treaty at the Washington Naval Conference, the Limited Nuclear Test Ban Treaty, and the Strategic Arms Limitation Talks) show how the wedge motive informed these negotiations and influenced great power relations. The wedge logic remains relevant today. For example, the United States may employ future arms control agreements to drive a wedge between China and Russia, and it must be cautious about arms control deals with North Korea that would negatively affect its relationship with South Korea.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77625923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations 颠覆性的三难困境:为什么网络行动达不到预期
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-10-01 DOI: 10.1162/isec_a_00418
Lennart Maschmeyer
Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.
尽管网络冲突已经存在了30年,但网络作战的战略效用仍然不清楚。许多人预计网络作战将在战争和低强度竞争中提供独立的效用。在这些期望的基础上,人们普遍认为信息技术可以提高运营效率。但越来越多的研究表明,网络行动往往达不到它们的承诺。造成这种不足的原因是它们具有颠覆性的行动机制。理论上,颠覆提供了一种比武力风险更低的施加影响的方式,因为它是秘密和间接的,利用系统来对付对手。承诺与实践之间的不匹配是网络行动颠覆性三难困境的结果,即速度、强度和控制是负相关的。这些约束使参与者陷入三难困境,因为一个变量的收益往往会导致其他两个变量的损失。对俄乌冲突的个案研究为这一论点提供了实证支持。定性分析利用了来自实地采访、泄露文件、法医证据和当地媒体的原始数据。研究结果表明,在这场冲突中,颠覆性三难困境限制了所有五种主要颠覆性网络行动的战略效用。
{"title":"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations","authors":"Lennart Maschmeyer","doi":"10.1162/isec_a_00418","DOIUrl":"https://doi.org/10.1162/isec_a_00418","url":null,"abstract":"Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78984192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Leaning on Legionnaires: Why Modern States Recruit Foreign Soldiers 依靠军团士兵:为什么现代国家招募外国士兵
IF 5 1区 社会学 Q1 Social Sciences Pub Date : 2021-07-01 DOI: 10.1162/isec_a_00411
Elizabeth M.F. Grasmeder
Abstract Why do modern states recruit legionnaires—foreigners who are neither citizens nor subjects of the country whose military they serve? Rather than exclusively enlist citizens for soldiers, for the past two centuries states have mobilized legionnaires to help wage offensives, project power abroad, and suppress dissent. A supply-and-demand argument explains why states recruit these troops, framing the choice to mobilize legionnaires as a function of political factors that constrain the government's leeway to recruit domestically and its perceptions about the territorial threats it faces externally. A multimethod approach evaluates these claims, first by examining an original dataset of legionnaire recruitment from 1815 to 2020, then by employing congruence tests across World War II participants, and finally by conducting a detailed review of a hard test case for the argument—Nazi Germany. The prevalence of states’ recruitment of legionnaires calls for a reevaluation of existing narratives about the development of modern militaries and provides new insights into how states balance among the competing imperatives of identity, norms, and security. Legionnaire recruitment also underscores the need to recalibrate existing methods of calculating net assessments and preparing for strategic surprise. Far from being bound to a state's citizenry or borders, the theory and evidence show how governments use legionnaires to buttress their military power and to engineer rapid changes in the quality and quantity of the soldiers that they field.
现代国家为什么要征召军团士兵——既不是他们所服务的国家的公民也不是臣民的外国人?在过去的两个世纪里,国家不是专门征召公民当兵,而是动员退伍军人帮助发动进攻、向海外投射力量和镇压异见。供求关系的观点解释了为什么国家会招募这些士兵,将动员退伍军人的选择归结为政治因素的作用,这些因素限制了政府在国内招募的余地,以及政府对外部领土威胁的看法。一个多方法的方法评估这些说法,首先通过检查从1815年到2020年的退伍军人招募的原始数据集,然后通过对第二次世界大战参与者进行一致性测试,最后通过对一个硬测试案例进行详细的审查来证明这一论点-纳粹德国。各国普遍招募退伍军人的现象要求我们重新评估有关现代军事发展的现有叙述,并为各国如何在身份、规范和安全等相互竞争的必要性之间取得平衡提供了新的见解。军团成员的征聘也强调需要重新调整现有的计算净摊款和为战略突袭做好准备的方法。这些理论和证据表明,政府是如何利用军团士兵来增强其军事力量,并在其派出的士兵的质量和数量上进行快速变化的,而不是局限于一个国家的公民或边界。
{"title":"Leaning on Legionnaires: Why Modern States Recruit Foreign Soldiers","authors":"Elizabeth M.F. Grasmeder","doi":"10.1162/isec_a_00411","DOIUrl":"https://doi.org/10.1162/isec_a_00411","url":null,"abstract":"Abstract Why do modern states recruit legionnaires—foreigners who are neither citizens nor subjects of the country whose military they serve? Rather than exclusively enlist citizens for soldiers, for the past two centuries states have mobilized legionnaires to help wage offensives, project power abroad, and suppress dissent. A supply-and-demand argument explains why states recruit these troops, framing the choice to mobilize legionnaires as a function of political factors that constrain the government's leeway to recruit domestically and its perceptions about the territorial threats it faces externally. A multimethod approach evaluates these claims, first by examining an original dataset of legionnaire recruitment from 1815 to 2020, then by employing congruence tests across World War II participants, and finally by conducting a detailed review of a hard test case for the argument—Nazi Germany. The prevalence of states’ recruitment of legionnaires calls for a reevaluation of existing narratives about the development of modern militaries and provides new insights into how states balance among the competing imperatives of identity, norms, and security. Legionnaire recruitment also underscores the need to recalibrate existing methods of calculating net assessments and preparing for strategic surprise. Far from being bound to a state's citizenry or borders, the theory and evidence show how governments use legionnaires to buttress their military power and to engineer rapid changes in the quality and quantity of the soldiers that they field.","PeriodicalId":48667,"journal":{"name":"International Security","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79117252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1