![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
This book explores modern Islamic terrorism in the context of globalization and cultural evolution. 21st century terrorism is different and new, first because it relies heavily on electronic communication systems and other aspects of modern technologies, and second, because it is in large part a product of fractured globalization, with its associated threats to the collective identity of Muslims. Part one of this work contrasts globalization as an ideal with globalization as it is actually taking place, with its enormous contradictions and threats. Moghaddam, a longtime and highly respected terrorism and conflict researcher, argues that globalization is resulting in serious threats to the basic psychological needs of some, particularly in connection with collective identity. Part two explores how globalization has brought sudden contact between different groups with no previous history of large-scale contact, resulting in a rapid decline in diversity. Terrorism is one of the dysfunctional defense mechanisms of people in such conditions, facing external threats. Part three describes long-term solutions, focusing particularly on the role of women and the nature of the family in traditional Islamic societies. Moghaddam shows us why globalization is resulting in what he calls catastrophic evolution, the rapid decline and disappearance of minority cultures and languages, and why that brings a clash of ideologies and the rise of extremism. There are also other dangerous trends, and those call for inspired solutions, springing from an understanding that traditional conflict-resolution, evolved in the shadow of the Cold War, is no longer effective and needs to change.
Lily Hamourtziadou's investigation into civilian victims during the conflicts that followed the US-led coalition's 2003 invasion of Iraq provides important new perspectives on the human cost of the War on Terror. From early fighting to the withdrawal and return of coalition troops, the Arab Spring and the rise of ISIS, the book explores the scale and causes of deaths and places them in the contexts of power struggles, US foreign policy and radicalisation. Casting fresh light on not just the conflict but international geopolitics and the history of Iraq, it constructs a unique and insightful human security approach to war.
"Korean-American Youth Identity and 9/11: An Examination of Korean-American Ethnic Identity in Post-9/11 America" by Professor Heerak Christian Kim of Asia Evangelical College and Seminary is a very important book in the area of ethnic studies in post-9/11 America. Although many books have been written on 9/11, there has not been adequate examination of its impact for particular ethnic groups. Even scholars of ethnic studies seem to ignore 9/11 as an event that is incidental to self-understanding and group identity of America's ethnic groups. This book is a step in the right direction in computing 9/11 into the study of ethnic identity and experience in America. This book specifically focuses on Korean-American identity, particularly in regards to Korean-American youth. However, this scholarly examination is further significant in its sensitivity to the ethnic experience of other Asian-Americans and in its examination of Korean-American identity as negotiated in the context of the larger dominant culture of America. And this book contributes further to the understanding of ethnic identity in the United States by devoting an important chapter to the dynamics of inter-ethnic relations between Korean-Americans and African-Americans. Besides being a monumental contribution to the understanding of ethnic identity in comparative terms, this book represents an important contribution to Korean-American studies. This book is the most up-to-date book on Korean-American youth identity and provides the scholarly community with valuable information regarding which direction to take future research regarding Korean-American identity and the Asian-American experience in the United States. As Asian-Americans are rising in terms of number and influence, the need for understanding their identity becomes important on academic, social, political, economic, and intellectual levels. This book is a very important book to meet the rising need that has been largely neglected in academia and in the publishing industry thus far. This book is an essential addition to all serious university libraries, public libraries, and private personal libraries of educated individuals.
John Ashcroft's service as Attorney General began with turmoil: a loss to a deceased challenger in his Senate reelection campaign and a tumultuous confirmation battle. Then, on September 11, 2001, his job was transformed into the greatest leadership challenge an Attorney General has ever faced. What Ashcroft learned from highly classified intelligence briefings, secret surveillance of terror cells, and war councils with President Bush gave him a uniquely comprehensive--and uniquely chilling--view of the threats to America's security. What he did to prevent another terrorist attack on American soil is hotly debated to this day. In NEVER AGAIN, Ashcroft breaks his silence about historic events that transpired during his term of office--including the largest terrorist attack in U.S. history, the enactment and defense of the USA Patriot Act, the Robert Hanssen spy scandal, the execution of Timothy McVeigh, and the recently discovered domestic surveillance program authorized by President Bush. In this provocative book, readers will meet the man behind the title and hear his take on the dangers to and within America from outside forces, and what he did to repair the serious breaches in our country's security. A fascinating, probing look at what Ashcroft believes will make America ultimately safe.
This book provides up-to-date coverage of the policies, strategies, and effects of suicide in war, examining this subject from societal and military perspectives to shed light on the justifications for using human beings as expendable weapons. Suicide warfare has expanded over the years and become a global phenomenon. In some parts of the world, it has become rooted in the fabric of society. Westerners often find it difficult to grasp why someone would be willing to sacrifice their life in order to take the lives of others. Suicide Warfare: Culture, the Military, and the Individual as a Weapon provides a thorough examination of the topic that enables readers to understand the justification for suicide warfare and better appreciate how the ideology of the individuals and organizations that resort to suicide warfare greatly complicates security issues in the 21st century. The book covers the policies, strategies, and effects of suicide in war, examining suicide warfare in its entirety from a theoretical standpoint, and then applying those theories to the actual manifestations of and politico-military responses to suicide warfare. The author discusses specific organizations such as Al Qaeda and the Chechen rebels, analyzing each within its societal context, military justification, individual motivation, and outcomes, and addresses principles of sociological and conflict theory to place suicide warfare in a clearer conceptual framework. The book presents case studies that allow readers to better understand abstract theories and make distinctions between individual cases of suicide warfare. Includes primary documents and statistical data Provides resources for further study
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counterterrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events. This book provides a compelling overview of U.S. laws, policies, programs, and actions in the realms of anti- and counterterrorism, as well as comprehensive coverage of the various domestic and foreign terrorist organizations threatening America, including their leaders, ideologies, and practices. These entries are supplemented with a carefully selected collection of primary sources that track the evolution of U.S. anti- and counterterrorism policies and political debate. These documents will not only illuminate major events and turning points in America's fight against terror-both foreign and homegrown-but also help readers understand debates about the effectiveness, morality, and constitutionality of controversial policies that have either been implemented or proposed, from waterboarding to targeted assassination to indefinite incarceration at Guantanamo Bay. In addition, this resource shows how political controversies over anti- and counterterrorism strategies are spilling over into other areas of American life, from debates about privacy rights, government surveillance, and anti-Muslim actions and beliefs to arguments about whether U.S. firearms policies are a boon to terrorists. Wide-ranging encyclopedia section featuring contributions from counterterrorism scholars Primary Document collection that provides additional illumination on major events, laws, policies, and trends Authoritative and evenhanded coverage of counterterrorism threats, issues, events, laws, policies, and organizations Reader's Guide to entries by subject category
Preventing School Violence: A Self-Assessment Approach provides readers with a research-based risk-management model designed to prevent school shootings. The self-assessment tool is adapted from a protocol developed by Tom McWeeney, which has been used to assess the readiness of FBI field offices to prevent terrorist attacks in the USA. Through extensive research, real-world application, and collaboration with Dale Watson, the former assistant director of the FBI, and Professor McWeeney, author Mark Harrington has modified this method with the express goal of reducing instances of school violence. Opening chapters share Dr. Harrington's experiences in the field and introduce the self-assessment tool. They underscore the importance for schools and organizations to be well prepared to respond not only to high-risk/high-consequence situations but also low-risk/high-consequence situations. The book shares key data from FBI reports regarding pre-attack behaviors of active shooters. Additional chapters outline the attributes of a successful self-assessment program and how to reimagine and rework security measures, including law enforcement/security presence, exercises and drills, surveillance, and more. The text walks readers through the criteria for an effective self-assessment approach: intelligence, mental health services, administrative support, training, and crisis plan considerations. They learn how gangs in schools and neighborhood ties can influence safety and security on school campuses. Throughout, true stories from the field demonstrate the need for the model and its application, and statistics, charts, and graphs provide necessary research to bolster action and understanding.
This unique work analyzes for the first time how foreign-affinity terrorism works in a major democratic nation like the United States, and what this country must do to survive the terror challenge, on both conventional and unconventional levels. To date, no definitive study has dealt specifically with the role of American citizens in supporting a foreign political, ideological, and religious illegal agenda. Terrorists in Our Midst: Combating Foreign-Affinity Terrorism in America remedies that as six expert authors discuss the threats of Americans to security interests in the United States and elsewhere, exploring what can and should be done to reduce a risk that may threaten the very survival of the free world. Terrorists in Our Midst focuses not only on foreign nationals operating in the United States, but also on American citizens participating in terror networks at home and abroad. The book presents an overview of both conventional and unconventional terrorism, surveys the terrorist threat in the United States by state and nonstate actors, and analyzes the foreign-affinity links of American operatives in this country and abroad. Most important for the safety and security of the United States, it offers an assessment of what policies worked and what did not work, specifying a "best practices" agenda of recommendations that should be adopted by the United States and the international community. Contributions from six distinguished academics and professionals with wide experiences in public and private service Case studies of the major U.S. counterterrorism strategies, including intelligence, law enforcement, border security, financial issues, and civil liberties concerns increase public and governmental understanding of the risks of, and possible responses to, future foreign-affinity terrorism A compilation of selected American foreign-affinity terrorists operating at home and abroad
In our post-9/11 environment, our sense of relative security and stability as privileged subjects living in the heart of Empire has been profoundly shaken. Hollander explores the forces that have brought us to this critical juncture, analyzing the role played by the neoliberal economic paradigm and conservative political agenda that emerged in the West over the past four decades with devastating consequences for the hemisphere's citizens. Narrative testimonies of progressive U.S. and Latin American psychoanalysts illuminate the psychological meanings of living under authoritarian political conditions and show how a psychoanalysis "beyond the couch" contributes to social struggles on behalf of human rights and redistributive justice. By interrogating themes related to the mutual effects of social power and ideology, large group dynamics and unconscious fantasies, affects and defenses, Hollander encourages reflections about our experience as social/psychological subjects.
The explosion of Pan Am Flight 103 over Lockerbie, Scotland, in December 1988, should never have happened. Wallis, who has extensive, direct, personal knowledge of aviation security matters gained from his position at the crossroads of security information and the industry's endeavors to combat aviation terrorism, had warned the industry one year before the bombing that the interline element of baggage represented the prime opportunity for terrorist activity and had urged the adoption of passenger and baggage matching, a system that he had helped to develop. Mandated by the FAA for use at high risk airports, it was the feature missing from Pan AM's activity at Frankfort, an omission so cruelly exploited by the bombers. Wallis argues that the priority given by governments to technological solutions to the continuing terrorist threat puts the flying public at unnecessary risk every day. This volume brings together all of the facts surrounding the sabotage of Flight 103, including the investigation and the civil litigation in which so much of the story unfolded for the first time. It uncovers the fundamental weaknesses in Pan AM's communication and management policies. Wallis supports the policy that politics are politics and explores the possibility that U.S. and U.K. policy towards a neutral trial for the two Libyans indicted for the bombing, which may have been affected by the wider scenario of Middle East politics rather than simple justice for the victims of Lockerbie. Although the tragedy has led to improvements in defense technology for use against acts of aviation sabotage, these methods have yet to be applied universally.
This book demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is that when examining the social media sphere security scholars need to "expect the unexpected". This is because social media enables users to subvert, contest and create security narratives with symbols and idioms of their choice which can take into account "traditional" security themes, but also unexpected and under explored themes such as narratives from the local context of the users' towns and cities, and the symbolism of football clubs. The book also explores the complex topography of social media when considering constructions of security. The highly dynamic topography of social media is neither elite dominated and hierarchical as the Copenhagen School conceptualises security speak. However, neither is it completely flat and egalitarian as suggested by the vernacular security studies' non-elite approach. Rather, social media's topography is shifting and dynamic, with individuals gaining influence in security debates in unpredictable ways. In examining social media this book engages with the emancipatory burden of critical security studies. This book argues that it remains unfulfilled on social media and rather presents a "thin" notion of discursive emancipation where social media does provide the ability for previously excluded voices to participate in security debates, even if this does not result in their direct emancipation from power hierarchies and structures offline.
Discover how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars from the New York Times bestselling author and veteran Washington Times columnist Bill Gertz.America is at war, but most of its citizens don't realize it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
This expert's view into the strategic directions, tactics, leaders, and significant attacks connected to Chechen and North Caucasus terrorists examines the network's operations as well as the success of Russia's counterterrorist responses. This authoritative account traces the emergence of terrorism in the volatile region of the North Caucasus from its origins in the early 1990s through the present day. It presents a detailed examination of local and global counterterrorism strategies-everything from military force, to diplomacy, to politicization-providing valuable insight into effective methods for fighting terrorism here and around the world. This candid work uncovers the roots of Russian terrorism and provides a historical overview of the conditions that advanced terrorism and its unprecedented warfare practices, including radioactive attacks and suicide attacks by women. Author and native Russian speaker, Elena Pokalova, analyzes prominent terrorist groups such as Islamic International Peacekeeping Brigade, Riyad us-Saliheyn Martyrs' Brigade, and Special Purpose Islamic Regiment, and reveals the regional and global influence of the Caucasus Emirate on the movement. Discusses different strands of terrorist movements that emerged over time in the North Caucasus Includes tables, maps, and charts to help support content and reinforce visual learning Analyzes the significance of the jihadi ideology in the North Caucasus Examines the structural dynamics behind terrorist attacks over time
How do we engage with the pressing challenges of xenophobia, radicalism and security in the current political climate? The widely felt sense of insecurity in the West is shared by Muslims both within and outside Western societies. Growing Islamic militancy and the subsequent increased security measures by Western powers have contributed to a pervasive sense among Muslims of being under attack both physically and culturally. "Islam and Political Violence" brings together current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and the West and argues that we are on a dangerous trajectory, strengthening dichotomous notions of the divide between the West and the Muslim world.
Religious political violence is by no means a new phenomenon, yet there are critical differences between the various historical instances of such violence and its more current permutations. Since the mid-1970s, religious fundamentalist movements have been seeking to influence world order by participating in local political systems. For example, Islamic fundamentalism is at the heart of the Muslim Brotherhood in Egypt, the Christian fundamental right wing has seen a resurgence in Europe, and Jewish fundamentalism is behind the actions of Meir Kahane's Kach movement and the settler movement. The shift in recent years from secular to religious political violence necessitates a reevaluation of contemporary political violence and of the concept of religious violence. This text analyzes the evolution of religious political violence, in both historical and contemporary perspectives. Since religious political violence events are usually associated with the term "terrorism," the book first analyzes the origins of this controversial term and its religious manifestations. It then outlines and highlights the differences between secular and religious political violence, on ideological, strategic, and tactical levels, before comparing the concept of Holy War in Judaism, Christianity, and Islam. Lastly, it shows how modern radical monotheistic religious groups interpret and manipulate their religious sources and ideas to advocate their political agendas, including the practice of violence. A unique comparative study of religious political violence across Judaism, Islam, and Christianity, this text features many international case studies from the Crusades to the Arab Spring.
This indispensable guide to the conflict in Northern Ireland during 30 years of "the Troubles", 1968 to 1999, covers the various elements at home and abroad that have had an influence on the hostilities. The A-to-Z entries discuss people, parties, organizations, and key places. Other sections cover election results (1968 to 1999), systems of government, office holders in Northern Ireland, and the security system. Enhancing this volume are a chronology of major events (1921 to 1999) and a subject index.
This is the compelling story of a former Jesuit who traveled to Ireland in order to better understand the IRA, its widespread support among Irish Catholics, and the country's continuing civil unrest. Author Douglass McFerran, an American, made many key contacts in Northern Ireland, enabling him to gain unprecedented access to republican groups. He met with members of the Orange Lodge and the heavily armed Royal Ulster Constabulary; he had tea with leaders of Sinn Fein; and he participated in the annual Internment March on the streets of Belfast. In this book he provides a history of the conflict in Northern Ireland and goes beyond the propaganda on both sides to understand the causes of today's violence and explore what would be necessary to end it. McFerran wrote this book at the suggestion of individuals within the Irish republican community. During its writing he had the cooperation of several Sinn Fein leaders and past and present members of the IRA. McFerran came to believe that the violent situation in Northern Ireland can best be explained by considering the manner in which the English government, through genocide and civil repression, attempted to eliminate Irish resistance to English rule. The failure of the Anglo-Irish War to achieve a united Irish government brought on a republican movement with a political expression in Sinn Fein and a military expression in the guerrilla activities of the Irish Republican Army. The continued failure of the English government to negotiate with Irish nationalists can be attributed to a desire to maintain the political support of predominantly Protestant unionists, who since 1913 have pledged armed resistance to any effort to allow a Catholic-led government to rule over them.
In Conflict and Human Security Threats in Africa, South African scholar Victor Ojakorotu unravels the dynamics of conflicts and human security threats now affecting numerous African nations. While some of these conflicts are local, others are national and international. This current and highly engaging study captures multiple cases of insecurity, presenting discussions of terrorism, kidnapping, militia activities, human trafficking, political violence, teenage pregnancy, civil war, and armed conflicts, as well as strategies for their future management. Ojakorotu documents a philosophical assessment of African politics as well as the place of the "new" media in the politics of human security and the development of an African worldview in the post-modern intellectual arena. This book is a must-read for all students of African and global politics, as well as policy makers and diplomats working with Africa, which will soon be home to more than three billion people and a center of global growth.
The most complete book on terrorism to-date, with glossary and index. Political, historical, and ethical analyses.
The attacks of September 11, 2001, thrust terrorism to the forefront of critical issues facing the contemporary world and caused Americans to stop thinking of terrorist acts as rare, isolated events. This timely, accessible book examines the phenomenon of terrorism, discussing the methods, tactics, and weapons used by terrorists and exploring the attraction that terrorism holds for many individuals, groups, and movements. Whether seeking to learn more about a specific terrorist group or act, researching the potential use of weapons of mass destruction by terrorists, or searching for primary documents on the subject this is an essential resource. The book begins by defining terrorism and exploring the ruthless philosophy that underlies it. It provides a narrative history and chronology of world terrorism; describes the most important terrorist groups, both past and present; and details four historically important terrorist acts--a 1906 lynching in Tennessee, a massive flaunting of power by the Ku Klux Klan from 1915 to 1925, Black September's attack on Israeli athletes at the Munich Olympics in 1972, and the traumatic events of September 11, 2001--that illustrate the key strategies that terrorists employ and the wide range of goals that motivates them. It also includes a number of significant primary documents, ranging from official government overviews of the terrorist threat and international agreements related to terrorism, to presidential declarations on the subject and statements issued by terrorists themselves, in which they attempt to clarify their own motivations and intentions.
Homeland Security: The Essentials, Second Edition concisely outlines the risks facing the US today and the structures we have put in place to deal with them. The authors expertly delineate the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters. From cyberwarfare, to devastating tornadoes, to car bombs, all hazards currently fall within the purview of the Department of Homeland Security, yet the federal role must be closely aligned with the work of partners in the private sector. The book lays a solid foundation for the study of present and future threats to our communities and to national security, also challenging readers to imagine more effective ways to manage these risks. |
You may like...
Systematic Process Improvement Using ISO…
Boris Mutafelija, Harvey Stromberg
Hardcover
R2,493
Discovery Miles 24 930
Testing and Quality Assurance for…
Jerry Gao, H.-S. Jacob Tsao, …
Hardcover
R2,810
Discovery Miles 28 100
|