首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
During the 1970’s and 1980’s political extremism and terrorism frequently focused on "national liberation" and economic issues.
During the 1970’s and 1980’s political extremism and terrorism frequently focused on "national liberation" and economic issues.
admin
2013-02-04
34
问题
During the 1970’s and 1980’s political extremism and terrorism frequently focused on "national liberation" and economic issues. The collapse of the Soviet bloc, and the ending of its covert funding and encouragement of terrorism led to a decline in the militant and violent left-wing terrorist groups that were a feature of the age.
The 1990’s have seen the development of a "new terrorism". This is not to say that state-backed terrorism has ceased, but rather that the spectrum of terrorism has widened. This new extremism is frequently driven by religious fervor, is transnational, sanctions extreme violence, and may often be millenialist. The new terrorism may seek out military or government targets, but it also seeks out symbolic civilian targets, and the victims have mostly been innocent civilians,
Growing concern about this new terrorism has been paralleled by concern about the employment of the new information and communication technologies (ICT’s).
ICT’s offer a new dimension for political extremists and terrorists. They allow the diffusion of command and control; they allow boundless new opportunities for communication, and they allow the players to target the information stores, processes and communications of their opponents. The sophistication of the modern nation-state, and its dependency on computer-based ICT’s, make the state ever more vulnerable
The use of ICT’s to influence, modify, disrupt or damage a nation state, its institutions or population by influencing the media, Or by subversion, has been called "netwar", The full range of weapons in the cyberspace armory can be employed in netwar; from propaganda campaigns at one level to interference with databases and networks at the other. What particularly distinguishes netwar from other forms of war is that it targets information and communications, and may be used to alter thinking or disrupt planned actions. In this sense it can be distinguished from earlier forms of warfare—economic wars that target the means of production, and political wars that target leadership and government.
Netwar is therefore of particular interest to those engaged in non-military war, or those operating at sub-state level. Clearly nation states might also consider it, as an adjunct to military war or as an option prior to moving on to military war. So far, however, it appears to be of greater interest to extremist advocacy groups and terrorists. Because there are no physical limits or boundaries, netwar has been adopted by groups who operate across great distances or transnationally. The growth of such groups, and their growing powers in relation to those of nation states, suggests an evolving power-based relationship for both. Military strategist Martin Van Creveld has suggested that war in the future is more likely to be waged between such groups and states rather than between states and states.
Most modern adversaries of nation states in the realm of low intensity conflict, such as international terrorists, single-issue extremists and ethnic and religious extremists are organized in networks, although their leadership may sometimes be hierarchical. Law enforcement and security agencies therefore often have difficulty in engaging in low intensity conflict against such networks because they are ill suited to cio so. Their doctrine, training and modus operandi have, all too often, been predicated on combating a hierarchy of command, like their own.
Only now are low-intensity conflict and terrorism recognized as "strategic" threats to nation states, and countries which until very recently thought that terrorism was something that happened elsewhere, have become victims themselves.
The Tokyo subway attack by the Aum Shinriko and the Oklahoma City bombing would have been unthinkable a generation ago, and not only was the civil population unprepared, but also law enforcement. And this despite clear warning signs that such attacks were in the offing.
The potential for physical conflict to be replaced by attacks on information infrastructures has caused states to rethink their concepts of warfare, threats and national assets, at a time when information is recognized as a national asset. The adoption of new information technologies and the use of new communication media, such as the Internet, create vulnerabilities that can be exploited by individuals, organizations and states.
The main difficulty the police have in combating terrorist groups is ______.
选项
A、their poor equipment
B、the insufficiency of budget
C、their obsolete way of command
D、the transnational nature of the new terrorism
答案
C
解析
转载请注明原文地址:https://jikaoti.com/ti/tpUYFFFM
0
专业英语八级
相关试题推荐
Thecommunitycollegeisakindof______collegespopularin______tosatisfytheneedsofboththeindividualandthesociety.
Britain’seastmidlandswereoncethepictureofEnglishcountryside,alivewithflocks,shepherds,skylarksandbuttercups—the
ThefamousspystorybooksabouttheheroJamesBond(007)arewrittenby______.
Thepastfewyearshavebeenbusyonesforhuman-rightsorganisations.Inprosecutingtheso-calledwaronterror,manygovernme
Thedeclineofcivilityandgoodmannersmaybeworryingpeoplemorethancrime,accordingtoGentilityRecalled,editedbyDigb
Womenaregettingunhappier,ItoldmyfriendCarl."Howcanyoutell?"hedeadpanned."It’salwaysbeenwhine-whine-whine."
Theshow,conceivedandwrittenbyMs.Ebersole,ishardthefirstmusicalprojecttocomparethepresenttotheGreatDepressio
Whichofthefollowingistheconcernof"reference"?
Inmanyclassroomsaroundthecountry,teachersareemphasizing,andperiodicallytesting,students’readingfluency,thecurren
除了读书之外,同知心的朋友通信,有时也教我感到一点兴奋。因为写信时可以上天下地的无所不谈,谈的话虽然都不关重要,而且大都是杂乱无章,然而不必像对社会说话时要打起什么腔调。也不必像做学术论文时必须严密地构思。有什么话便说什么,想到那里,笔便写到那里,正是个性
随机试题
下列选项中属于流转税的是()。
朱某因婚外恋产生杀害妻子李某之念。某日晨,朱某在给李某炸油饼时投放了可以致死的“毒鼠强”。朱某为防止其6岁的儿子吃饼中毒,将其子送到幼儿园,并嘱咐其子等他来接。不料李某当日提前下班后将其子接回,并与其子一起吃油饼。朱某得知后,赶忙回到家中,其妻、子已中毒身
检验检测机构实施分包的条件包括()。
(二)[背景资料]某机电安装公司承担北方某城市包括安装三台蒸发量25t/h、蒸汽压力为2.5MPa的散装工业锅炉的锅炉房工程。开工前,项目部根据锅炉房安装工程施工组织设计,进行了全面的质量策划,并指令专业工程师编制质量控制程序。在
在我国,不属于行政法规的有()。
某商场在春节期间组织“家家乐”家用电器促销活动,有关部门发现其销售的部分电器中有假冒专利的产品,但该商场能证明其产品的合法来源。根据专利法律制度的规定,关于该商场的行为,下列说法中,正确的是()。
根据《税收征收管理法》的规定.下列纳税人中,税务机关有权核定其应纳税额的有()。
孙某和张某共同举办了一家具有法人资格的幼儿园,由张某担任园长,该幼儿园的法定代表人是()。(2016年上半年真题)
有研究资料表明,颈椎病患者往往缺钙。而大量实际事例表明,通过食用钙片,可改善人体内缺钙的状况。因此有人认为,可以通过食用钙片来治疗颈椎病。以下哪项最可能是上述观点依赖的假设?
一个顺序访问文件有固定长度为15字节的记录。假设第1个记录是记录1,那么记录5的第1个字节所在的逻辑位置是(50)。
最新回复
(
0
)