27 resultados para Security Studies - Military

em Digital Commons at Florida International University


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This multi-disciplinary research project explores the religious and cultural foundations within the "master commemorative narratives" that frame Israeli and Iranian political discourse. In articulating their grievances against one another, Israeli and Iranian leaders express the tensions between religion, nationalism, and modernity in their own societies. The theoretical and methodological approach of this dissertation is constructivist-interpretivist. The concept of "master commemorative narratives" is adapted from Yael Zerubavel's study of ritualized remembrance in Israeli political culture, and applied to both Israeli and Iranian foreign policy. Israels master commemorative narrative draws heavily upon the language of the Hebrew Bible, situating foreign policy discourse within a paradigm of covenantal patrimony, exile, and return, despite the unrelenting hostility of eternal enemies and "the nations." Irans master commemorative narrative expresses Iranian suspicion of foreign encroachment and interference, and of the internal corruption that they engender, sacralizing resistance to the forces of evil in the figurative language and myths of pre-Islamic tradition and of Shi'a Islam. Using a constructivist-interpretive methodological approach, this research offers a unique interpretive analysis of the parallels between these narratives, where they intersect, and where they come into conflict. It highlights both the broad appeal and the diverse challenges to the components of these "master" narratives within Israeli and Iranian politics and society. The conclusion of this study explains the ways in which the recognition of religious and cultural conflicts through the optic of master commemorative narratives can complement the perspectives of other theoretical approaches and challenge the conventions of Security Studies. It also suggests some of the potential practical applications of this research in devising more effective international diplomacy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Using the securitization framework to highlight the arguments that facilitated the War on Drugs, this paper highlights a separate war against drug traffickers. Facilitated by ideology through the rhetoric promoted by the War on Drugs, the fear of communist expansion and democratic contraction, the War on Drug Traffickers was implemented, requiring its own strategy separate from the War on Drugs. This is an important distinction because the play on words changes the perception of the issue from one of drug addiction to one of weak institutions and insurgent/terrorist threat to those institutions. Furthermore, one cannot propose strategy to win, lose, or retreat in a war that one has been unable to identify properly. And while the all-encompassing War on Drugs has motivated tremendous discourse on its failure and possible solutions to remedy its failure, the generalizations made as a result of the inability to distinguish between the policies behind drug addiction and the militarized policies behind drug trafficking have discounted the effect of violence perpetrated by the state, the rationale for the state perpetrating that violence, and the dependence that the state has on foreign actors to perpetrate such violence. This makes it impossible to not only propose effective strategy but also to persuade states that participate in the War on Drug Traffickers to adopt the proposed strategy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This multi-disciplinary research project explores the religious and cultural foundations within the master commemorative narratives that frame Israeli and Iranian political discourse. In articulating their grievances against one another, Israeli and Iranian leaders express the tensions between religion, nationalism, and modernity in their own societies. The theoretical and methodological approach of this dissertation is constructivist-interpretivist. The concept of master commemorative narratives is adapted from Yael Zerubavels study of ritualized remembrance in Israeli political culture, and applied to both Israeli and Iranian foreign policy. Israels master commemorative narrative draws heavily upon the language of the Hebrew Bible, situating foreign policy discourse within a paradigm of covenantal patrimony, exile, and return, despite the unrelenting hostility of eternal enemies and the nations. Irans master commemorative narrative expresses Iranian suspicion of foreign encroachment and interference, and of the internal corruption that they engender, sacralizing resistance to the forces of evil in the figurative language and myths of pre-Islamic tradition and of Shia Islam. Using a constructivist-interpretive methodological approach, this research offers a unique interpretive analysis of the parallels between these narratives, where they intersect, and where they come into conflict. It highlights both the broad appeal and the diverse challenges to the components of these master narratives within Israeli and Iranian politics and society. The conclusion of this study explains the ways in which the recognition of religious and cultural conflicts through the optic of master commemorative narratives can complement the perspectives of other theoretical approaches and challenge the conventions of Security Studies. It also suggests some of the potential practical applications of this research in devising more effective international diplomacy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since the end of the Cold War, Japans defense policy and politics has gone through significant changes. Throughout the post cold war period, US-Japan alliance managers, politicians with differing visions and preferences, scholars, think tanks, and the actions of foreign governments have all played significant roles in influencing these changes. Along with these actors, the Japanese prime minister has played an important, if sometimes subtle, role in the realm of defense policy and politics. Japanese prime ministers, though significantly weaker than many heads of state, nevertheless play an important role in policy by empowering different actors (bureaucratic actors, independent commissions, or civil actors), through personal diplomacy, through agenda-setting, and through symbolic acts of state. The power of the prime minister to influence policy processes, however, has frequently varied by prime minister. My dissertation investigates how different political strategies and entrepreneurial insights by the prime minister have influenced defense policy and politics since the end of the Cold War. In addition, it seeks to explain how the quality of political strategy and entrepreneurial insight employed by different prime ministers was important in the success of different approaches to defense. My dissertation employs a comparative case study approach to examine how different prime ministerial strategies have mattered in the realm of Japanese defense policy and politics. Three prime ministers have been chosen: Prime Minister Hashimoto Ryutaro (1996-1998); Prime Minister Koizumi Junichiro (2001-2006); and Prime Minister Hatoyama Yukio (2009-2010). These prime ministers have been chosen to provide maximum contrast on issues of policy preference, cabinet management, choice of partners, and overall strategy. As my dissertation finds, the quality of political strategy has been an important aspect of Japans defense transformation. Successful strategies have frequently used the knowledge and accumulated personal networks of bureaucrats, supplemented bureaucratic initiatives with top-down personal diplomacy, and used a revitalized US-Japan strategic relationship as a political resource for a stronger prime ministership. Though alternative approaches, such as those that have looked to displace the influence of bureaucrats and the US in defense policy, have been less successful, this dissertation also finds theoretical evidence that alternatives may exist.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threatit merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation examined how United States illicit drug control policy, often commonly referred to as the "war on drugs," contributes to the reproduction of gendered and racialized social relations. Specifically, it analyzed the identity producing practices of United States illicit drug control policy as it relates to the construction of U.S. identities. ^ Drawing on the theoretical contributions of feminist postpositivists, three cases of illicit drug policy practice were discussed. In the first case, discourse analysis was employed to examine recent debates (1986-2005) in U.S. Congressional Hearings about the proper understanding of the illicit drug "threat." The analysis showed how competing policy positions are tied to differing understandings of proper masculinity and the role of policymakers as protectors of the national interest. Utilizing critical visual methodologies, the second case examined a public service media campaign circulated by the Office of National Drug Control Policy that tied the "war on drugs" with another security concern in the U.S., the "war on terror." This case demonstrated how the media campaign uses messages about race, masculinity, and femininity to produce privileged notions of state identity and proper citizenship. The third case examined the gendered politics of drug interdiction at the U.S. border. Using qualitative research methodologies including semi-structured interviews and participant observation, it examined how gender is produced through drug interdiction at border sites like Miami International Airport. By paying attention to the discourse that circulates about women drug couriers, it showed how gender is normalized in a national security setting. ^ What this dissertation found is that illicit drug control policy takes the form it does because of the politics of gender and racial identity and that, as a result, illicit drug policy is implicated in the reproduction of gender and racial inequities. It concluded that a more socially conscious and successful illicit drug policy requires an awareness of the gendered and racialized assumptions that inform and shape policy practices.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of the research is to study the relationship between international drug interdiction policies and domestic politics in fragile democracies, and to demonstrate how international drug control policies and the use of force fit the rhetoric of war, are legitimized by the principles of a just war, but may also cause collateral damage and negative unintended consequences. The method used is a case study of the Dominican Republic. The research has found that international drug control regimes, primarily led by the U.S. and narrowly focused on interdiction, have influenced an increasingly militarized approach to domestic law enforcement in the Dominican Republic. The collateral damage caused by militarized enforcement comes in the form of negative perceptions of citizen security, loss of respect for the rule of law and due process, and low levels of civil society development. The drug war has exposed the need for significant reform of the institutions charged with carrying out enforcement, the police force and the judicial system in particular. The dissertation concludes that the extent of drug trafficking in the Dominican Republic is beyond the scope of domestic reform efforts alone, but that the programs implemented do show some potential for future success. The dissertation also concludes that the framework of warfare is not the most appropriate for the international problems of drug traffic and abuse. A broader, multipronged approach should be considered by world policy makers in order to address all conditions that allow drugs to flourish without infringing upon democratic and civil rights in the process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the regions governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizens security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces role to be more clearly defined with regard to security matters, limiting it to threats that impact States governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A difficult transition to a new paradigm of Democratic Security and the subsequent process of military restructuring during the nineties led El Salvador, Honduras, Guatemala and Nicaragua to re-consider their old structures and functions of their armed forces and police agencies. This study compares the institutions in the four countries mentioned above to assess their current condition and response capacity in view of the contemporary security challenges in Central America. This report reveals that the original intention of limiting armies to defend and protect borders has been threatened by the increasing participation of armies in public security. While the strength of armies has been consolidated in terms of numbers, air and naval forces have failed to become strengthened or sufficiently developed to effectively combat organized crime and drug trafficking and are barely able to conduct air and sea operations. Honduras has been the only country that has maintained a proportional distribution of its armed forces. However, security has been in the hands of a Judicial Police, supervised by the Public Ministry. The Honduran Judicial Police has been limited to exercising preventive police duties, prohibited from carrying out criminal investigations. Nicaragua, meanwhile, possesses a successful police force, socially recognized for maintaining satisfactory levels of security surpassing the Guatemalan and El Salvadoran police, which have not achieved similar results despite of having set up a civilian police force separate from the military. El Salvador meanwhile, has excelled in promoting a Police Academy and career professional education, even while not having military attachs in other countries. Regarding budgetary issues, the four countries allocate almost twice the amount of funding on their security budgets in comparison to what is allocated to their defense budgets. However, spending in both areas is low when taking into account each country's GDP as well as their high crime rates. Regional security challenges must be accompanied by a professionalization of the regional armies focused on protecting and defending borders. Therefore, strong institutional frameworks to support the fight against crime and drug trafficking are required. It will require the strengthening of customs, greater control of illicit arms trafficking, investment in education initiatives, creating employment opportunities and facilitating significant improvements in the judicial system, as well as its accessibility to the average citizen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several factors can increase or decrease military-economic involvement in communist regimes. This anomalous form of military behavior, labeled as the Military Business Complex (MBC), emerged in various communist regimes in the 1980s. However, in early 2000s, the communist governments of China and Vietnam began to decrease the number of military-managed industries, while similar industries increased in Cuba. This paper explains why military industries in Cuba have increased over the last two decades, while they decreased in the Chinese and Vietnamese examples. This question is answered by comparatively testing two hypotheses: the Communist Party and the Bureaucratic-Authoritarian (BA) Hypotheses. The Communist Party hypotheses helps explain how the historical and current structures of Party oversight of the military have been lacking in strength and reliability in Cuba, while they traditionally have been more robust in China and Vietnam. The BA hypotheses helps explain how, due to the lack of a strong civilian institutional oversight, the Cuban military has grown into a bureaucratic entity with many political officers holding autonomous positions of power, an outcome that is not prevalent in the Chinese and Vietnamese examples. Thus, with the establishment of a bureaucratic military government and with the absence of a strong party oversight, the Cuban military has been able to protect its economic endeavors while the Chinese and Vietnamese MBC regimes have contracted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional Atlantic Powers particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.