• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    International Anti-Piracy Action and Cooperation in Global Governance

    2012-08-15 00:42:21ChenZhiruiWuWencheng
    China International Studies 2012年2期

    Chen Zhirui & Wu Wencheng

    International Anti-Piracy Action and Cooperation in Global Governance

    Chen Zhirui & Wu Wencheng

    Since the release of the report Our Global Neighborhood by the Commission on Global Governance, the concept of “governance”has taken root in the hearts of the people in the world and“governance without government” has become the principal tendency of global governance. Moreover, “governance” has replaced “governing” in concept, the role of power is slowly diluted and the role of various “authorities” in the international community is drawing ever more attention. International power structure has been weakened, the process of the international community has been the main focus of study on governance and academic circles have attached extensive importance to non-traditional security themes such as economy, environment, population and public health. In contrast to the single security study in the Cold War era, a new path has been brazed in global governance and numerous international phenomena, neglected and concealed before, have been “discovered” so that research on security has been broadened and deepened.

    Global governance and non-traditional security problems are closely associated with each other. However, partly because of this, apparent drawbacks appeared in the past global governance. The role of power structure was lowered and importance was attached to the process of the international community to the neglect of the role of the actors. The fundamental role of cooperation between countries, particularly big countries, was all the more underestimated, leading finally to fragmentation. In other words, for global governance, it was frequently “much cry and little wool”. Due to ambiguity and deficiency in terms of concept, interest, mechanism and regime, global governance landed itself in an embarrassing situation with little effect and no consensus. Here a crucial issue remains on specific agenda of global governance: what are the main actors, how do different actors participate in it and coordinate and cooperate with one another to enhance the certainty, transparency and effect of global governance, making it live up to its name, i.e. how do various actors unfold cooperation in global governance. In view of the point, this paper, taking international anti-piracy action as an example, will endeavor to sort out the mutual relations between global governance and non-traditional security problems, identify the fundamental role of cooperation between the big countries on the global governance agenda so as to clarify the different roles and common value of big countries, international organizations and non-governmental organizations in global governance.

    I. “Trans-sovereignty” Security Threats and Global Governance Agenda

    The surge of global governance is closely linked with the lowering of threat of systemic war and the emerging of a series of transnational threats. In the 90s of the 20th century, along with the end of the Cold War and accelerated development of globalization, tremendous changes took place in security threats, with the traditional security threats beginning to decline and non-traditional security threats rising by a big margin.

    First, after the end of the Cold War, the traditional threat of war between the big powers decreased greatly and it is nearly impossible for a large-scale war to break out among the big powers. Barry Buzan believes that in the 21st century there are“neither major ideological disputes, nor serious confrontational conflicts” between the major powers. In expounding the new security situation, Robert O’Neill likewise holds that after the Cold War and in the foreseeable future it is basically impossible for systemic war to break out among big countries. “We are leaving far behind the era of global war.” Other scholars believe that the end of the Cold War makes the danger of world wars disappear which are replaced by regional and local conflicts. There are scholars who even assert that after the end of the Cold War, big countries detest wars between them and such wars are “obsolete”. Scholars of different schools offer divergent explanations for this. Realist scholars such as William C. Wohlforth, from the perspective of international pattern, analyzes the reasons why it is very difficult for fierce wars to erupt among the big countries after the end of the Cold War, believing that the United States’ unipolar hegemony ensures stability and peace of the international system so that other secondary countries dare not unleash wars rashly. Some scholars in China also hold similar views. Fu Mengzi, a research fellow with China Institutes of Contemporary International Relations (CICIR) maintains that “in an international situation where the United States wields extremely strong force, traditional strategic confrontation between big countries has become unimaginable.” And the advocates of the end of nuclear weapons are of the view that the gigantic destructive force of nuclear weapons renders victory impossible in a war among big countries. The devastating role of nuclear weapons for the concept of territorial security lies in that nuclear weapons pierces traditional state protection so it renders a victory in a war quite unfounded. Normative evolutionists stress that with the rise of the international norms of respecting territory and sovereignty, the mortality rates of states have gone down objectively, survival and security of states are ensured and it is no longer necessary for big countries to worry about outside threats to their survival.

    Second, despite the fall in traditional security threats, numerous trans-sovereignty security threats keep emerging. Nontraditional security problems such as environment, diseases and terrorism transcended the boundaries of sovereign states, eroded the legitimate authority of states, and gave birth to the so-called “failed nations”. The evolving globalization has accelerated and magnified the importance and impact of these non-traditional security threats. In the era of globalization, therefore, security of big countries is not equal to international security, and the stability of relations among big countries cannot ensure that of the international community. The efficiency of traditional strategic instruments among big countries such as military alliance, deterrence and balance have been on the decline and these instruments can hardly cope with the challenge of the non-traditional security threats. The traditional definition of security bears upon the use of military force, and security is directly associated with “threat and use of military force”. Under the new circumstances, however, the importance of military security goes down, trans-sovereignty security threats are upgraded to security problems without the need to influence the use of military forces of the states, as non-traditional security threats are sufficiently serious themselves. Thomas F. Homer-Dixon, in a dialogue with his critic Marc A. Levy, explicitly explains the reasons why people are concerned with the non-traditional security threats such as the environmental problem. He points out that the threats to the environment are never challenges to the United States alone and that the environmental problems in many regions are impacting adversely the core values of millions in developing countries, triggering regional conflicts and instability. In research on security of water resources, some scholars do not study the impact of water resources on the use of military force, but stress the scarcity of water resources and their uneven distribution in various regions, which makes the water resources problem a new security threat. Numerous scholars who study the relationship between diseases and security also emphasize that it is essential to be free from the set pattern of national security and concerned with the basic need of humans. They are of the view that transnational epidemic diseases not only pose security threats through eroding the economy and military power of a state, but also lead to domestic disturbances and international instability. Scholars who advocate “security of humans” pay more attention to the dignity and requirements of survival of humans and see them as the main content of security.

    It is easily shown here that the problems related to global governance such as the global environment, public health, financial crisis, even population and gender equality may also be perceived as a series of non-traditional security problems. In fact, the reason why global governance and non-traditional security problems overlap each other to a great extent is that the rise of both depends on two factors: On the one hand, it is the objective reflection of the situation that after the Cold War traditional security threats decline whereas non-traditional security threats rise. On the other, it is also the result of reflections of the big countries in the world on the security situation and based on their policy adjustments. After the end of the Cold War, the danger of war between big countries decreases, security of the system is guaranteed and the traditional military security threats, based on national territory, gradually weakens whereas other security problems, hidden in U.S.-Soviet bipolar confrontation, stand out salient. Hence, transnational nontraditional security threats become the focus of attention, opening a window of opportunity for global governance. Different from non-traditional security study that develops theory within the framework of security research, global governance sets forth brand new solutions and theoretical structure for a series of trans-sovereignty threats, emphasizes the participation of international pluralistic actors, dilutes the role of power structure, and sets big store by the flowing authorities in the international community. However, just because of this, global governance is faced with numerous important theoretical and practical issues that require clarification and resolution. They are related to the foundation of global governance, the status and role of big powers and other actors in global governance agenda and the establishment and way of cooperation in global governance.

    II. Cooperation among Big Powers and Foundation for Global Governance

    The efforts in global governance are aimed at reducing the role of power structure, attaching importance to the international community process and neglecting the role played by actors, particularly state actors. In particular, the fundamental role of cooperation among the big powers was seriously underestimated. For sure, a certain big power or bloc of big powers is not in the position to solve single-handedly a series of transnational problems. The transnational and non-state nature of security threats and uncertainty and fluidness of the source of security threats have made it more and more difficult for a major power to unilaterally seek its own security, the effect of solving security problems through military force is further lowered and traditional major-power political pattern declines day by day. Conversely, however, we should not underestimate too much the role of cooperation among big countries in global governance. In the present international community, “big-power politics remains a crucial factor in the international relations agenda.” The resolution of a series of transnational security problems cannot be separated from big countries. To a certain degree, cooperation among the major powers still constitutes an important basis for achievements in global governance.

    Then why do the big countries participate actively in the global governance process? It is said that the areas targeted in global governance and non-traditional security studies quite overlap each other. Most themes in global governance are transnational security issues. In this area, the situation is different from that during the Cold War when big powers remained confronted with one another. They all have immediate interest in seeking to solve such problems as well as a strong desire to do so. Therefore, in the global governance process of transnational security problems, cooperation among the major countries may be clearly found. Specifically, big-power participation in global governance bears upon mainly two factors: First, after the end of the Cold War, the major countries are all faced with transnational security threats, so active participation in global governance targeted at these problems complies with their interest; second, in joining the global governance process, these countries set bigger store by absolute gains rather than relative gains and they may cooperate with each other.

    1. Big countries are universally faced with transnational security threats.

    In the world today, new security threats like ecological crisis, terrorism, transnational organized crime, nuclear trafficking, international epidemic diseases and piracy are ever more grave and the countries are universally confronted with various nontraditional security threats, making big countries more inclined to take part in the global governance process as it is in their interest to do so.

    Firstly, transnational security problems are mostly global in nature. Among them, global warming, scarcity and pollution of water resources, spread of transnational epidemic diseases and network terrorism are threats confronting the entire international community with no major powers exempted from them. As the interests of big countries are more extensive, complex and global, they are more prone to some particular transnational security threats and vulnerable to damage and heavy losses. The September 11 incident offers an eloquent example. For another example, ecological security is apparently global in nature and countries, big and small, are all under its impact. “Nature will not respect political boundaries”. From the threats to human life and health originating from imbalance and degeneration of the biological circle to the conflicts and instability brought about by the scarcity of resources, environmental problems frequently penetrate the borders of sovereign states and likewise are intimately associated with the big countries. Therefore, the origins and resolution of ecological security transcend boundaries of nation-states and are by far beyond the capacity of big countries.

    Secondly, the nature of transnational security problems shows that no major power is able to cope single-handedly with them successfully. The United States is the strongest country in the world, but it can hardly deal with the new security threats it faces. The zigzags and difficulties in the U.S. anti-terrorism wars after the September 11 incident fully prove this point. After the George W. Bush administration suffered setbacks in pursuing unilateralism counting on its power, the Obama administration had to come back to multilateralism, emphasizing international cooperation and respecting the arrangements of the international regime. Moreover, with the rise of nontraditional security problems, security threats begin to change from symmetric to asymmetric ones. It is ever more difficult to trace the source of threats and even major countries cannot succeed in it. Therefore, international cooperation among big countries is the natural option. Take network security threats for example. On the one hand, the cost and binding conditions for producing threats are low since they do not require largescale social mobilization and resource accumulation, but their damage can match destruction of wars. On the other, because of the open nature of the network platform, the high-speed flow of information and mutual crossing of network nodes, no matter whether the network security threats were posed by hackers or viruses, it is hard to probe the original source of threat. As a result, no single country “boasts the ability and authority to tackle network security threats all by itself”.

    Thirdly, numerous transnational security problems tend to spread. It is possible that resource scarcity and biological crisis in some regions and particular countries do not affect the entire international community directly and do not exert direct security pressure upon major countries. On many occasions, however, these security threats may speedily spread in the international community and threaten the security of big countries and world stability. In addition to elements of religion and political ideology, the Palestinian-Israeli dispute is linked with the scramble for precious water resources. Moreover, water resources are scarce in the Middle East region and 15 neighboring countries grapple for water resources of the Euphrates. Syria, Iraq and Turkey were all once drawn into conflicts over water resources. The military conflicts and political disturbances in the Middle East sharpen regional tensions, trigger humanitarian disasters and harm international security; on the other, they endanger the international oil supply, and therefore the economic security of the big countries, which are heavily dependent on oil resources of the region, cannot be safeguarded.

    2. Big countries attach more importance to absolute gains in the transnational security field.

    In is usually held that in an international community under anarchy, cooperation, in particular cooperation between big countries, is comparatively difficult. Some realists stress that states are generally more inclined to unfold cooperation in nonmilitary fields and, despite common interest existing among them, difficulties in collective action and consideration about relative gains will impede cooperation between big countries. But neo-liberalism emphasizes the possibility of unfolding security cooperation among big countries under anarchist circumstances: If international cooperation involves three or more sides, the difficulty concerning relative gains will be eased. If the relative gains acquired by a state in cooperation are not converted into power advantage, the difficulty in cooperation may also be alleviated. In other words, if cooperation among big powers involves more than three sides and the relative gains in the cooperation cannot be easily transformed into advantage over other countries, then cooperation among big powers is possible. On this point, Robert O. Keohane’s views are representative. He believes that states laying emphasis on relative gains will not hinder cooperation among them. When cooperation involves two actors, the issue of relative gains will crop up, yet “on most issues, states have the potential to cooperate. From trade liberalization to climate change, it is not easy to calculate the relative gains in multilateral negotiations and there is little danger of decisive power transfer. Therefore, relative gains only underline the difficulties for cooperation in sharp bilateral competition but overall these gains will not weaken the general prospect for cooperation.”

    In a nutshell, there are two major conditions for security cooperation among the big powers. One is that the cooperation involves many sides, and two is that the relative gains in the cooperation can hardly be converted to power advantage. As far as traditional military security area such as territorial security is concerned, security always has a geographical sense, i.e. in most cases, it involves two actors and security mainly refers to ensuring international or regional balance of power. Under these circumstances, gains in the cooperation are easy to be transformed to military advantage to shaken the balanced patterns at various levels. In the transnational security field, however, viewed from these two angles, it is easier for big powers to unfold international cooperation. One, the tendency of transnational security threats to spread makes big powers universally face various non-traditional security problems. And cooperation involves far more than three sides and even the participation of the entire international community is required for their resolution. For instance, global climate change has not only brought about serious difficulties for the survival of some small island nations, in a long-term point of view, it has also constituted sustained security challenges for big countries. Therefore, the resolution of the problem warrants joint efforts of the international community. Two, the non-military nature of transnational security threats has made it difficult to transform the relative gains in the cooperation into power advantage. Various non-traditional security threats are defined as “nonmilitary” security threats. Their source is uncertain, they are often posed by non-state actors and their resolution requires longer time. These characteristics have made it hard for big countries to convert relative gains in security cooperation into military and political power advantage. For example, in essence the international eruption of epidemic diseases is an issue of public health and “human security” and the resolution of the problem will not automatically be changed into state power advantage. Therefore, in the cross-border prevalence of SARS and bird flu, big countries and international organizations swiftly conducted cooperation.

    III. Global Governance Cooperation in International Anti-Piracy Action

    The global governance process lays the emphasis on the playing of an active role by non-state and super-state actors in resolving transnational problems. This clear view is no doubt valuable. But as far as specific fields of problems are concerned, the respective roles of state, NGOs and international organizations are to be analyzed earnestly. In the past global governance study, the issue of “who is the governing” was not considered, the importance of the process was over-emphasized to the neglect of the initiative of the agent, particularly the fundamental role of the cooperation among big powers in resolving the problems of global governance. In regard to the status and role of states, NGOs and international organizations in global governance, the international campaign of combating Somali pirates offers a good case. We may find from it that states, particularly big powers, play a fundamental role in global governance and NGOs and international organizations likewise make important contributions and are actually vanguard forces in global governance.

    Since the end of the Cold War, piracy has been ever more rampant. The Gulf of Aden and the Strait of Malacca near Malaysia are two regions with most frequent pirate attacks. And Somali pirates are the focus of attention of the international community. The constant occurrence of pirate incidents has posed a grim hidden danger for various countries, in particular big countries highly dependent on overseas trade and energy supplies such as the United States, China, Britain, France and Japan. Big powers have made known their position one after another and took actual measures to fight piracy. In the international cooperation to suppress piracy, a multilateral security governance mechanism is being shaped in the international community. In it there are security cooperation between big countries and the playing of important roles by specialized international organizations and international NGOs as well as “anti-piracy collective actions undertaken within the framework of intergovernmental departments and cooperation between maritime insurance companies and shipmasters and non-governmental organizations like International Maritime Bureau.”

    First, the big countries cooperated positively in the United Nations Security Council, successively adopted many resolutions to lay an international legal foundation for combating piracy. In accordance with the international laws like the United Nations Convention on the Law of the Sea, the definition of piracy should be in conformity with three standards: one, piracy occurs on the high seas or in an area beyond the jurisdiction of the coastal sovereign states; two, the attacker and the victim must be non-state actors; three, the aim of the pirates must be non-political and private. Although international law confers on the countries the universal jurisdiction to combat piracy, the international laws on piracy are difficult to implement. There are two scenarios in which piracy cannot be effectively suppressed: one, piracy takes place on the high seas but the criminals then flee to a territorial sea of a sovereign state; two, piracy was committed on a territorial sea and then the pirates flee to the high seas. Somali piracy occurs apparently on the territorial sea of a sovereign state, but due to the long-term political disturbances of the country, the government is unable to tackle it. And because it concerns the sovereignty of a country, the international community could not effectively combat piracy in Somali territorial waters, leaving the problem worsening continually. Therefore, authorization of the Security Council, cooperation between big powers in the Security Council and joint action in the framework of the United Nations are essential for fighting piracy. For this purpose and at the request of the Somali government, since 2008 the Security Council successively passed five special resolutions 1861, 1838, 1846, 1851 and 1950, authorizing foreign military forces to enter the Gulf of Aden with the agreement of the Somali government to fight piracy. Resolution 1851 of the United Nations Security Council explicitly “calls upon states, regional and international organizations that have the capacity to do so, to take part actively in the fight against piracy and armed robbery at sea off the coast of Somalia … by deploying naval vessels and military aircraft.” Consequently, the United States, NATO, European Union, Russia, India and China have dispatched naval ships to the waters off the Somali coast one after another to conduct escort operations and combat piracy. For a time, warships of big countries gathered in the Gulf of Aden. Moreover, in compliance with Resolution 1851 of the Security Council, in January 2009 more than 60 states including big countries and international organizations set up the Contact Group on Piracy off the Coast of Somalia within the framework of the United Nations. The contact group, joined on a voluntary basis by countries, has four working groups which exchange information regularly, discuss tactics and coordinate military, political and other means to resolve the Somali piracy problem. Each year the contact group meets three times at the United Nations and convenes numerous meetings of its subsidiary working groups. For instance, from November 6 to 7, 2009, the Chinese Ministry of National Defense presided over a conference in regard to international coordination and cooperation in escort missions in the Gulf of Aden. Representatives of countries and international organizations such as Russia, Japan, India, EU and NATO attended the conference and “discussed cooperation in escort operations in divided areas of the Gulf of Aden to shape the best way for international cooperation in escort missions in the region.”

    In addition to cooperation within the framework of the United Nations, big countries have dispatched their own warships to fight Somali piracy. At the end of 2008, with Britain, France and Germany as the mainstay, the EU launched one-year Operation Atalanta targeted specially at Somali piracy. The campaign was executed by naval forces of France, Germany, Greece, Netherlands and Spain to stop, avert, intervene with and finally put an end to pirate attacks and armed robbery. On the part of EU member states, their naval forces also took action. In 2008, the frigate of the British Royal Navy the Cumberland freed a merchant ship intercepted by pirates off the coast of Somalia and killed two pirates. In January 2009, French anti-submarine frigate the Jean de Vienne captured 19 pirates in a rescue operation. In April 2009, French frigate the Nivose caught 11 pirates during its patrol off the coast of Kenya. On April 10, the French navy used force to rescue a French sailing yacht which had been hijacked, killed two pirates and arrested three. NATO under the leadership of the United States launched numerous suppression operations against piracy at sea. In October and December 2008, four warships of the second group of the NATO standing flotilla were sent to the waters off the Somali coast for combating piracy. In March 2009, seven warships of the first group of the NATO standing flotilla from the United States, Canada, Spain, Netherlands, Germany and Portugal fought pi-racy once more in the waters off the coast of Somalia. In April 2009, U.S. Secretary of State Hillary Clinton made known the U.S. four-point consideration on suppressing Somali piracy, in-cluding U.S. assistance to the Somali government in enhancing the law enforcement capability of its police, convening as soon as possible an international conference to better coordinate the reaction of various countries, sending envoys to the Somali transitional government and urging its leaders to crack down on the bases of pirates on land, and consulting shipping and insurance companies to arm merchant vessels to beef up their defense capability. The U.S. navy launched its own action separately. In April 2009, for example, a U.S. commando of Seals, in rescuing Captain Richard Phillips hijacked by pirates, killed three pirates and arrested one. China began to dispatch maritime military forces to the Somali waters of the Gulf of Aden at the end of 2008. In the following two years, China has sent eight flotillas on escort missions and escorted a total of more than 3,000 merchant vessels, including 1,400 foreign ones, and chased away numerous pirate vessels which tried to attack. In January 2009, Russia sent its large Admiral Binogradov anti-submarine ship to the Gulf of Aden for escort missions and succeeded in thwarting numerous pirate attacks. In March, Russia dispatched another flotilla of its Pacific Fleet to the Gulf of Aden.

    But “the core task of the fleets of various countries is to escort their own merchant vessels and then it is to fight Somali piracy. Such practice of ‘hoeing one’s own potatoes’, entire-journey escorting and repeated patrols make a lot of waste of resources and leave many windows of opportunities for Somali pirates”. Further, due to the differences in the strategic intention between big powers and their scramble for leadership as well as the unclear division of sea areas for escorting and lack of coordination mechanism, the escort missions still leave quite some leeway for pirate attacks. According to the statistics of the International Maritime Bureau, until March 16, 2011, in 2011 the whole world reported 119 pirate attacks, of which 83 attacks occurred in the Somali waters. Overall, cooperation between big powers to suppress piracy made great achievements, but their actions are to be further coordinated.

    Second, specialized international organizations played an important role of coordination and management in the security governance network of combating piracy. The big powers are aware of the limits of fighting piracy through force. This is reflected in the text of the UN Security Council Resolution 1950: “stressing the need for a comprehensive response to tackle piracy and its underlying cause by the international community”. Therefore, it is essential to have specialized international organizations play the role of coordination in bigcountry cooperation to combat piracy in order to avoid disorder and confusion in the fight against piracy by various countries. And the International Maritime Organization (IMO) has played such a role. The IMO is a specialized agency of the United Nations with 162 member states. It is mainly in charge of maritime navigation security and engaged in maritime legislation. In fighting piracy, it plays mainly the role of supervision, releasing information and formulating maritime security laws and relevant standard. It has published numerous reports on piracy problem, urging the international community to combat Somali piracy. The series of the UN Security Council resolutions assimilated the content of the IMO’s research reports. The IMO enacted maritime navigation security laws and reduced piracy threats through enhancing maritime navigation security. In 2002, the IMO formulated the unified and detailed Guidelines on Preventing and Suppressing Acts of Piracy and Armed Robbery against Ships and revised it in 2009. On July 1, 2004, the IMO began implementing the amendments to the 1974 International Convention for the Safety of Life at Sea, adding content about maritime security, which includes mandatory installation of automatic alarming system on ships, assigning security guards and implementing port security plan. All these measures have greatly stepped up the security of ships and ports while increasing the difficulties of piracy and robbery. In 2009, the IMO held a conference in Djibouti and adopted the norms of conduct for the joint cooperation to combat piracy by the coastal countries of the Western Indian Ocean, the Gulf of Aden and the Red Sea. The signatories agreed to unfold allround cooperation in fighting piracy and armed robbery in compliance with international law, share and communicate information among them, intercept suspect ships, rescue the ships and crews that suffer from pirate attacks and robbery.

    Third, international NGOs played an independent role in fighting piracy. The International Maritime Bureau (IMB) under the International Chamber of Commerce, as an important component of maritime security governance, has played a vanguard role, fulfilling actually the governance functions of a public affairs organization of the international shipping industry. In 1992, the IMB established the Piracy Reporting Center, which works 24 hours a day, in Kuala Lumpur, Malaysia and the ships subjected to pirate attacks may immediately get into touch with the center. After pooling the information, the center sends through satellite daily reports on dynamic piracy developments to all ships at sea free of charge and every week renews information on pirate hijacking and robbery on its Website. On the official Website of the IMB, one may check the real-time map of pirate incidents and obtain quarterly or annual reports on pirate incidents through e-mails. Now the IMB is the authoritative provider and issuer of information on international piracy. Moreover, the IMB defined “piracy”and its definition has gradually gained universal recognition. The traditional identification of piracy is mainly based on the definition of the International Maritime Organization composed of sovereign states — piracy must occur on the high seas or in an area beyond the jurisdiction of sovereign states; pirate attacks must be between two ships; most importantly, a pirate attack must be out of private purpose. Breaking away from such restricted definition, the definition of the IMB holds that it is not necessary to distinguish between piracy on the high seas and that on the territorial seas of sovereign states, and piracy must not necessarily occur between two ships, so attacks launched from rafts or a dock on ships are likewise considered piracy. Moreover, pirate attacks are not confined to those for private purposes and can include those for political purposes. As the definition of the International Maritime Organization is too narrow, more and more states and scholars accept the definition and nomenclature of the IMB for “piracy”. Sure, every coin has two sides. Though the IMB “provides technical support for international anti-piracy action through issuing piracy warnings and setting up information exchange and contact channels”, it does not boast the capacity to suppress piracy. When ships are attacked by pirates, they are required to report to the Piracy Reporting Center through the Global Maritime Distress Safety System (GMDSS) and the center needs to make contact with warships nearby so that the latter will proceed to the site for escorting. As contact-making takes time, it is frequently the case that the ship is already hijacked or robbed before the arrival of the warship. It may be seen that the security governance of the piracy problem cannot be divorced from multilateral cooperation between big powers. The multilateral anti-piracy joint-action initiative, CTF151, launched by the United States and the Contact Group on Piracy off the Coast of Somalia are both faced with the predicament in collective action among the big countries. Hence, piracy-suppression still warrants deeper cooperation between big countries and the coordination and support of pluralistic actors such as inter-national organizations and NGOs.

    IV. Conclusion

    After the end of the Cold War, the rise of global governance bears the imprint of the times. By and large, “governance” is of important theoretical significance and may break up the narrowness in international relations dominated in the past by power and open up a path for a new international order and agenda. However, substituting “governance” for “governing”cannot resolve the two thorny problems of effectiveness and legitimacy. On the other hand, with the accelerated evolution of globalization, global challenges facing mankind are ever more serious. “The ecological and environmental problems of common concern of the world (global warming, biodiversity crisis and damage in the ecological system, scarcity of water), problems in sustainable development of mankind (eradication of poverty, conflict prevention, control of epidemic diseases in the world) and global rules for competition (nuclear non-proliferation, disposal of toxic waste, protection of intellectual property rights, rules of heredity study, trade, financial and taxation rules)” have all become urgent major themes. The preliminary sorting of and probing into global governance in this paper indicate that cooperation between big countries still remains fundamental in seeking the resolution of the series of global challenges. Meanwhile, in view of the features of global problems and their resolution, cooperation between big countries is far from enough and that active participation of non-governmental organizations, intergovernmental organizations and citizens of the world—different actors who have the willingness and capability to play their roles jointly—is warranted. Only in this way, can global governance make solid achievements.

    Cheng Zhirui is Senior Editor of Foreign Affairs Review sponsored by China Foreign Affairs University; Wu Wencheng is Editor of Foreign Affairs Review.

    最近最新中文字幕大全免费视频| 免费av中文字幕在线| 女人爽到高潮嗷嗷叫在线视频| 人妻人人澡人人爽人人| 国产精品久久久人人做人人爽| 99国产精品99久久久久| 国产欧美日韩综合在线一区二区| 欧美日韩亚洲综合一区二区三区_| 亚洲中文字幕日韩| 国产免费福利视频在线观看| 国产日韩欧美亚洲二区| 高潮久久久久久久久久久不卡| 中国美女看黄片| 考比视频在线观看| 欧美精品啪啪一区二区三区 | 王馨瑶露胸无遮挡在线观看| 欧美日韩一级在线毛片| 久9热在线精品视频| 视频区欧美日本亚洲| 日韩精品免费视频一区二区三区| 99国产精品一区二区三区| 国产99久久九九免费精品| 久久天躁狠狠躁夜夜2o2o| 精品人妻在线不人妻| 高清欧美精品videossex| 老司机靠b影院| 精品少妇黑人巨大在线播放| 国产精品免费视频内射| 99re6热这里在线精品视频| 国产精品欧美亚洲77777| 少妇被粗大的猛进出69影院| 69精品国产乱码久久久| 不卡一级毛片| 中文字幕人妻熟女乱码| 手机成人av网站| 视频在线观看一区二区三区| 午夜福利影视在线免费观看| 女人久久www免费人成看片| 精品国内亚洲2022精品成人 | 黄网站色视频无遮挡免费观看| 精品久久久久久电影网| 高清视频免费观看一区二区| 天天操日日干夜夜撸| 下体分泌物呈黄色| 免费在线观看黄色视频的| 免费黄频网站在线观看国产| 黄色怎么调成土黄色| 一个人免费在线观看的高清视频 | 国产男女内射视频| 国产亚洲精品第一综合不卡| 少妇的丰满在线观看| 日韩欧美国产一区二区入口| 日本一区二区免费在线视频| 国产真人三级小视频在线观看| 亚洲国产精品一区三区| 国产成人影院久久av| 久久久久久免费高清国产稀缺| 久久久久久亚洲精品国产蜜桃av| avwww免费| 一区二区三区四区激情视频| 亚洲精品日韩在线中文字幕| 在线观看免费视频网站a站| 国产亚洲一区二区精品| 最新的欧美精品一区二区| 欧美+亚洲+日韩+国产| 久久热在线av| 69av精品久久久久久 | 热99国产精品久久久久久7| 亚洲欧美日韩另类电影网站| √禁漫天堂资源中文www| 久久久久久久国产电影| 亚洲色图 男人天堂 中文字幕| 国产精品一区二区精品视频观看| 久久精品成人免费网站| 不卡一级毛片| 美女主播在线视频| 久久精品国产a三级三级三级| 色综合欧美亚洲国产小说| 美女中出高潮动态图| 欧美少妇被猛烈插入视频| 久久中文看片网| 中文字幕高清在线视频| 午夜福利免费观看在线| 脱女人内裤的视频| 亚洲av日韩精品久久久久久密| 中文字幕高清在线视频| 亚洲综合色网址| 丝袜美足系列| 嫩草影视91久久| 中国国产av一级| 亚洲成av片中文字幕在线观看| 国精品久久久久久国模美| 国产有黄有色有爽视频| 999精品在线视频| 欧美少妇被猛烈插入视频| 黑丝袜美女国产一区| 欧美日韩亚洲高清精品| 欧美另类一区| 中文字幕人妻丝袜制服| 久久人人97超碰香蕉20202| 久久午夜综合久久蜜桃| 国产有黄有色有爽视频| 午夜免费成人在线视频| 欧美大码av| 久久女婷五月综合色啪小说| 新久久久久国产一级毛片| xxxhd国产人妻xxx| 青草久久国产| 无遮挡黄片免费观看| 天堂8中文在线网| 亚洲人成电影观看| 午夜免费观看性视频| 日韩中文字幕欧美一区二区| 欧美日韩亚洲国产一区二区在线观看 | 久久久国产一区二区| 涩涩av久久男人的天堂| 成人影院久久| 少妇裸体淫交视频免费看高清 | 亚洲成av片中文字幕在线观看| 国产精品熟女久久久久浪| 欧美国产精品一级二级三级| 亚洲成人国产一区在线观看| 免费在线观看黄色视频的| 午夜两性在线视频| 成人三级做爰电影| 国产亚洲精品久久久久5区| 丝袜喷水一区| 亚洲av片天天在线观看| 精品熟女少妇八av免费久了| 80岁老熟妇乱子伦牲交| 黄色视频在线播放观看不卡| 亚洲成国产人片在线观看| 久久人妻熟女aⅴ| 日韩欧美国产一区二区入口| 亚洲精品国产av成人精品| 亚洲国产欧美在线一区| 亚洲成人国产一区在线观看| 久久影院123| 国产欧美亚洲国产| 午夜免费成人在线视频| 热re99久久精品国产66热6| 在线观看免费高清a一片| 中文字幕色久视频| 一区在线观看完整版| 黑丝袜美女国产一区| 成年人免费黄色播放视频| 国产男女内射视频| 亚洲九九香蕉| 蜜桃在线观看..| av在线老鸭窝| 999久久久国产精品视频| 免费日韩欧美在线观看| 日日摸夜夜添夜夜添小说| 国产片内射在线| 亚洲国产av影院在线观看| 亚洲黑人精品在线| 亚洲九九香蕉| 午夜福利,免费看| 蜜桃在线观看..| 另类亚洲欧美激情| 亚洲欧美色中文字幕在线| 男人舔女人的私密视频| 国产精品国产三级国产专区5o| 在线 av 中文字幕| 日本av手机在线免费观看| 一级片'在线观看视频| 日韩一卡2卡3卡4卡2021年| 免费在线观看黄色视频的| 女警被强在线播放| 成人黄色视频免费在线看| 男人操女人黄网站| 一区二区三区精品91| 亚洲精华国产精华精| 电影成人av| 18在线观看网站| 久久99一区二区三区| 亚洲久久久国产精品| 久久精品国产a三级三级三级| 男人爽女人下面视频在线观看| 中文字幕最新亚洲高清| 丝袜人妻中文字幕| 亚洲欧美色中文字幕在线| 亚洲欧美激情在线| 欧美一级毛片孕妇| 啪啪无遮挡十八禁网站| 久久亚洲精品不卡| 免费在线观看视频国产中文字幕亚洲 | 999久久久国产精品视频| 国产亚洲午夜精品一区二区久久| 免费女性裸体啪啪无遮挡网站| 亚洲国产看品久久| 亚洲精品久久午夜乱码| 别揉我奶头~嗯~啊~动态视频 | 又黄又粗又硬又大视频| 国产欧美日韩综合在线一区二区| 欧美激情极品国产一区二区三区| 不卡一级毛片| 午夜日韩欧美国产| 欧美精品一区二区大全| 欧美日韩中文字幕国产精品一区二区三区 | 久久久久久免费高清国产稀缺| 久久香蕉激情| 欧美午夜高清在线| 国产日韩欧美视频二区| 18禁裸乳无遮挡动漫免费视频| 男女下面插进去视频免费观看| 亚洲国产毛片av蜜桃av| 亚洲三区欧美一区| 国产高清国产精品国产三级| 成年女人毛片免费观看观看9 | 免费在线观看视频国产中文字幕亚洲 | 777米奇影视久久| 少妇裸体淫交视频免费看高清 | 国产成人啪精品午夜网站| 黑丝袜美女国产一区| 成年人午夜在线观看视频| 亚洲欧洲日产国产| 国产片内射在线| 国产片内射在线| xxxhd国产人妻xxx| 色视频在线一区二区三区| 色视频在线一区二区三区| 熟女少妇亚洲综合色aaa.| 男女高潮啪啪啪动态图| 欧美中文综合在线视频| 亚洲精品国产一区二区精华液| 亚洲成国产人片在线观看| 嫁个100分男人电影在线观看| 一本—道久久a久久精品蜜桃钙片| 啦啦啦视频在线资源免费观看| 蜜桃国产av成人99| 欧美激情极品国产一区二区三区| 操出白浆在线播放| 99久久99久久久精品蜜桃| 在线亚洲精品国产二区图片欧美| 亚洲久久久国产精品| 两性夫妻黄色片| 制服人妻中文乱码| 亚洲五月色婷婷综合| 在线亚洲精品国产二区图片欧美| 亚洲精品粉嫩美女一区| 亚洲国产av影院在线观看| 大片免费播放器 马上看| 欧美午夜高清在线| 桃花免费在线播放| 伊人久久大香线蕉亚洲五| 人成视频在线观看免费观看| 午夜福利影视在线免费观看| 国产精品二区激情视频| 国产激情久久老熟女| 亚洲欧美清纯卡通| 纯流量卡能插随身wifi吗| 国产在线免费精品| 欧美黄色淫秽网站| 精品久久久精品久久久| 人妻 亚洲 视频| 交换朋友夫妻互换小说| 老司机福利观看| 夜夜骑夜夜射夜夜干| 亚洲专区中文字幕在线| 国产欧美日韩精品亚洲av| 日韩欧美免费精品| 91国产中文字幕| 成人三级做爰电影| av免费在线观看网站| 精品一区二区三卡| 精品福利永久在线观看| 精品一区在线观看国产| 不卡一级毛片| 人人妻人人爽人人添夜夜欢视频| 69精品国产乱码久久久| 国产99久久九九免费精品| 黄色视频在线播放观看不卡| 女人被躁到高潮嗷嗷叫费观| 在线观看免费视频网站a站| 久久久久精品人妻al黑| 欧美亚洲 丝袜 人妻 在线| 成年女人毛片免费观看观看9 | 久久精品国产亚洲av香蕉五月 | 2018国产大陆天天弄谢| 久久人人爽人人片av| 欧美黄色片欧美黄色片| 中文字幕人妻熟女乱码| 欧美久久黑人一区二区| 精品久久久精品久久久| 久久久久久人人人人人| 午夜福利,免费看| 久久香蕉激情| 我的亚洲天堂| 国产日韩欧美亚洲二区| 亚洲精品自拍成人| 精品少妇久久久久久888优播| 久久久久久免费高清国产稀缺| 人人妻人人爽人人添夜夜欢视频| bbb黄色大片| 91精品国产国语对白视频| 亚洲av成人不卡在线观看播放网 | 丝袜美腿诱惑在线| 欧美少妇被猛烈插入视频| 9191精品国产免费久久| 国产精品影院久久| 欧美在线一区亚洲| 亚洲欧洲精品一区二区精品久久久| 亚洲成人免费电影在线观看| 91精品三级在线观看| 国产熟女午夜一区二区三区| 丝袜美足系列| 国产又爽黄色视频| 亚洲欧美一区二区三区黑人| 大片电影免费在线观看免费| netflix在线观看网站| 97在线人人人人妻| 亚洲一码二码三码区别大吗| 成人国语在线视频| 欧美日韩av久久| 80岁老熟妇乱子伦牲交| 99久久国产精品久久久| 亚洲精品国产av成人精品| 亚洲国产看品久久| 麻豆国产av国片精品| 久久 成人 亚洲| 亚洲少妇的诱惑av| 久久免费观看电影| 91精品伊人久久大香线蕉| 男女午夜视频在线观看| 欧美日韩成人在线一区二区| 99九九在线精品视频| 久久狼人影院| 美女主播在线视频| 丰满迷人的少妇在线观看| 国产高清视频在线播放一区 | 久9热在线精品视频| 国产1区2区3区精品| 国产一区有黄有色的免费视频| 欧美xxⅹ黑人| 99久久精品国产亚洲精品| 精品卡一卡二卡四卡免费| 久久人人97超碰香蕉20202| 深夜精品福利| av有码第一页| 午夜精品国产一区二区电影| 亚洲av电影在线进入| 汤姆久久久久久久影院中文字幕| 久久国产精品人妻蜜桃| 国产深夜福利视频在线观看| 国产福利在线免费观看视频| 久久 成人 亚洲| 韩国精品一区二区三区| 国产成人精品久久二区二区91| 欧美中文综合在线视频| 久久久久久免费高清国产稀缺| 国产精品自产拍在线观看55亚洲 | 国产精品欧美亚洲77777| 欧美成人午夜精品| 亚洲av日韩精品久久久久久密| 美女主播在线视频| 蜜桃在线观看..| 国产伦人伦偷精品视频| 日日摸夜夜添夜夜添小说| 捣出白浆h1v1| 精品国内亚洲2022精品成人 | 欧美性长视频在线观看| 高清黄色对白视频在线免费看| 人妻人人澡人人爽人人| 国产伦人伦偷精品视频| 女性被躁到高潮视频| 亚洲欧美精品自产自拍| 国产精品熟女久久久久浪| 国产伦人伦偷精品视频| 久久久久网色| 中亚洲国语对白在线视频| www日本在线高清视频| 丝袜美腿诱惑在线| 国产精品熟女久久久久浪| 久久人妻熟女aⅴ| 美国免费a级毛片| 叶爱在线成人免费视频播放| 超碰成人久久| 国产福利在线免费观看视频| 国产高清videossex| 人人妻,人人澡人人爽秒播| a级毛片在线看网站| 免费一级毛片在线播放高清视频 | 国产在线观看jvid| 男女之事视频高清在线观看| 国产高清videossex| 国产欧美日韩一区二区三区在线| 午夜福利免费观看在线| 国产亚洲精品久久久久5区| 50天的宝宝边吃奶边哭怎么回事| 免费日韩欧美在线观看| 日韩一区二区三区影片| 18禁国产床啪视频网站| 69av精品久久久久久 | 国产亚洲欧美精品永久| 一区福利在线观看| www.熟女人妻精品国产| 日本精品一区二区三区蜜桃| 久久国产亚洲av麻豆专区| 视频区欧美日本亚洲| 大片免费播放器 马上看| 久久国产精品大桥未久av| 咕卡用的链子| 大型av网站在线播放| 岛国在线观看网站| 久久精品成人免费网站| 亚洲精品国产区一区二| av福利片在线| videos熟女内射| 成年女人毛片免费观看观看9 | 男人爽女人下面视频在线观看| 亚洲黑人精品在线| 午夜两性在线视频| 亚洲熟女精品中文字幕| 亚洲全国av大片| 性少妇av在线| 日韩 欧美 亚洲 中文字幕| 午夜成年电影在线免费观看| 亚洲精品一二三| 丰满迷人的少妇在线观看| www.999成人在线观看| 日日摸夜夜添夜夜添小说| 午夜福利在线免费观看网站| 亚洲va日本ⅴa欧美va伊人久久 | 免费在线观看视频国产中文字幕亚洲 | 亚洲精品国产一区二区精华液| 午夜免费观看性视频| 中文字幕最新亚洲高清| 亚洲国产日韩一区二区| 精品久久久精品久久久| 欧美精品一区二区大全| 丰满饥渴人妻一区二区三| 成年人黄色毛片网站| 午夜精品国产一区二区电影| 十分钟在线观看高清视频www| 国产真人三级小视频在线观看| 亚洲欧洲日产国产| 国产精品二区激情视频| 精品卡一卡二卡四卡免费| 丝袜美腿诱惑在线| 欧美精品亚洲一区二区| 欧美日韩视频精品一区| 日韩制服丝袜自拍偷拍| 国产男人的电影天堂91| 免费日韩欧美在线观看| 美女大奶头黄色视频| 黄网站色视频无遮挡免费观看| 国产欧美日韩一区二区精品| 丝瓜视频免费看黄片| e午夜精品久久久久久久| 国产xxxxx性猛交| √禁漫天堂资源中文www| 91麻豆精品激情在线观看国产 | 伊人久久大香线蕉亚洲五| 国产97色在线日韩免费| 久久精品国产亚洲av香蕉五月 | 日本猛色少妇xxxxx猛交久久| 久久天堂一区二区三区四区| 国精品久久久久久国模美| 亚洲av电影在线进入| 国产精品熟女久久久久浪| 中国美女看黄片| 老司机靠b影院| 一进一出抽搐动态| 午夜福利视频在线观看免费| 欧美另类一区| 欧美激情极品国产一区二区三区| 国产在视频线精品| 久久久久久久久久久久大奶| 日韩中文字幕欧美一区二区| 免费在线观看黄色视频的| 在线观看人妻少妇| 久久久久精品国产欧美久久久 | av网站在线播放免费| 午夜福利一区二区在线看| 欧美大码av| av有码第一页| 老司机影院成人| 亚洲黑人精品在线| 亚洲精品在线美女| 国产亚洲午夜精品一区二区久久| 亚洲国产精品999| 日日爽夜夜爽网站| 亚洲七黄色美女视频| av免费在线观看网站| cao死你这个sao货| 国产一级毛片在线| 国产成人影院久久av| 老汉色∧v一级毛片| av片东京热男人的天堂| 80岁老熟妇乱子伦牲交| 国精品久久久久久国模美| 99精国产麻豆久久婷婷| 午夜福利影视在线免费观看| 欧美激情高清一区二区三区| 手机成人av网站| 欧美日韩视频精品一区| 国产一区有黄有色的免费视频| 国产人伦9x9x在线观看| 精品久久久久久久毛片微露脸 | 久久人妻福利社区极品人妻图片| 又紧又爽又黄一区二区| 国产麻豆69| 成年av动漫网址| 日本撒尿小便嘘嘘汇集6| av在线app专区| 操美女的视频在线观看| 午夜成年电影在线免费观看| 美女福利国产在线| 一二三四社区在线视频社区8| 日日爽夜夜爽网站| 国产淫语在线视频| 91麻豆av在线| 日韩欧美一区视频在线观看| 亚洲情色 制服丝袜| kizo精华| 久久久久精品国产欧美久久久 | 亚洲国产精品999| 正在播放国产对白刺激| 欧美午夜高清在线| 久久影院123| 亚洲av美国av| 午夜免费鲁丝| 亚洲久久久国产精品| 人人妻人人添人人爽欧美一区卜| 亚洲男人天堂网一区| 两个人看的免费小视频| 另类亚洲欧美激情| 中文字幕最新亚洲高清| 午夜福利,免费看| 久久久久久久久免费视频了| 99国产精品免费福利视频| 天堂8中文在线网| 欧美日本中文国产一区发布| 亚洲精品av麻豆狂野| 美女高潮到喷水免费观看| 99国产精品99久久久久| 亚洲av日韩精品久久久久久密| 国精品久久久久久国模美| 午夜福利免费观看在线| 国产在视频线精品| 1024视频免费在线观看| 亚洲专区中文字幕在线| 自拍欧美九色日韩亚洲蝌蚪91| 一本一本久久a久久精品综合妖精| 热re99久久国产66热| 在线天堂中文资源库| 青青草视频在线视频观看| 啦啦啦 在线观看视频| 9191精品国产免费久久| 亚洲av电影在线进入| 欧美国产精品va在线观看不卡| 免费看十八禁软件| 国产亚洲精品第一综合不卡| 青青草视频在线视频观看| 亚洲精品中文字幕一二三四区 | 精品人妻熟女毛片av久久网站| 色婷婷久久久亚洲欧美| 日本一区二区免费在线视频| 日韩欧美一区二区三区在线观看 | 一本—道久久a久久精品蜜桃钙片| 亚洲男人天堂网一区| 热99国产精品久久久久久7| 99香蕉大伊视频| 久久久精品免费免费高清| 91精品伊人久久大香线蕉| 这个男人来自地球电影免费观看| videos熟女内射| 人人妻人人添人人爽欧美一区卜| 国产成人精品无人区| 久久人人97超碰香蕉20202| 伦理电影免费视频| 肉色欧美久久久久久久蜜桃| 欧美 日韩 精品 国产| 亚洲欧洲日产国产| 国产av精品麻豆| 亚洲三区欧美一区| 久久久久国产一级毛片高清牌| 黄色视频不卡| 亚洲五月色婷婷综合| 色婷婷av一区二区三区视频| 日本精品一区二区三区蜜桃| 曰老女人黄片| 99久久精品国产亚洲精品| 在线精品无人区一区二区三| 国产精品久久久久久精品电影小说| 亚洲欧美成人综合另类久久久| 91麻豆精品激情在线观看国产 | 成年人黄色毛片网站| 日韩电影二区| 99九九在线精品视频| 成年人黄色毛片网站| av欧美777| 国产av国产精品国产| 亚洲av国产av综合av卡| 极品少妇高潮喷水抽搐| xxxhd国产人妻xxx| 麻豆av在线久日| 欧美精品高潮呻吟av久久| 免费一级毛片在线播放高清视频 | 亚洲情色 制服丝袜| 男女下面插进去视频免费观看| 老熟女久久久| 人人妻人人添人人爽欧美一区卜| 老鸭窝网址在线观看| 国产亚洲av片在线观看秒播厂| 精品国内亚洲2022精品成人 | a级片在线免费高清观看视频| 一本大道久久a久久精品| 国产欧美日韩综合在线一区二区| 宅男免费午夜| 热99国产精品久久久久久7| 精品国产一区二区久久| 欧美黄色片欧美黄色片| 午夜激情av网站|