![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
The first book ever written on the new topic of strategic communication and how Usama bin Laden and Ayman al-Zawahiri are attempting to win the hearts and minds of the world-through fear, religion or admiration. "A chilling but insightful analysis of the words and ideas of the most determined - and dangerous -- ideologues of our times. Important reading for anyone trying to understand what we are up against in the movement of Usama bin Laden." Ashton B. Carter, Chair of the International and Global Affairs faculty, Harvard Kennedy School, and former Assistant Secretary of Defense "William Parker and Heidi Bridges force observers and analysts alike to step outside of their innate prejudices and visceral response to the words and ideas of the perpetrators of 9/11, and innumerable ongoing atrocities, to think strategically and to develop a clear real-time picture of the evolution of a hostile political movement. Parker & Bridges have successfully embedded the writings and statements of Usama bin Laden and Ayman al-Zawahiri within the theory, practice, and tradition of strategic communication to yield an invaluable contribution to the intellectual tool kit so critical to the development of the situational awareness vital to recognize and combat the current Jihadist threat. This book is a must read for analysts, policymakers and students in the intelligence, counterterrorism, and homeland security fields." Peter Leitner, President, Higgins Counterterrorism Research Center
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
This book explores modern Islamic terrorism in the context of globalization and cultural evolution. 21st century terrorism is different and new, first because it relies heavily on electronic communication systems and other aspects of modern technologies, and second, because it is in large part a product of fractured globalization, with its associated threats to the collective identity of Muslims. Part one of this work contrasts globalization as an ideal with globalization as it is actually taking place, with its enormous contradictions and threats. Moghaddam, a longtime and highly respected terrorism and conflict researcher, argues that globalization is resulting in serious threats to the basic psychological needs of some, particularly in connection with collective identity. Part two explores how globalization has brought sudden contact between different groups with no previous history of large-scale contact, resulting in a rapid decline in diversity. Terrorism is one of the dysfunctional defense mechanisms of people in such conditions, facing external threats. Part three describes long-term solutions, focusing particularly on the role of women and the nature of the family in traditional Islamic societies. Moghaddam shows us why globalization is resulting in what he calls catastrophic evolution, the rapid decline and disappearance of minority cultures and languages, and why that brings a clash of ideologies and the rise of extremism. There are also other dangerous trends, and those call for inspired solutions, springing from an understanding that traditional conflict-resolution, evolved in the shadow of the Cold War, is no longer effective and needs to change.
THE STORY OF THE END TIMES... THE COMING WORLD RULING EMPIRE ~//~ THE SEATING OF THE TEN KINGS ~//~ THE ARRIVAL OF THE ANTICHRIST UPON THE WORLD SCENE ~//~THE SIGNING OF THE SEVEN YEAR TREATY WITH ISRAEL ~//~ THE START OF THE TRIBULATION ~//~ GROUND BREAKING FOR THE NEW JEWISH TEMPLE ~//~ THE COMPLETION OF THE NEW JEWISH TEMPLE (AND IT'S DESECRATION BY ANTICHRIST) ~//~ THE TRIBULATION MIDPOINT AND THE ENSUING PERSECUTION OF THE CHURCH ~//~ THE RULE OF THE WOMAN AND THE MARK OF THE BEAST ~//~ THE TRUMPET JUDGMENTS ~//~ THE RAPTURE OF THE CHURCH ~//~ THE BOWL JUDGMENTS ~//~ THE BETRAYAL AND DESTRUCTION OF THE WOMAN ~//~ THE GATHERING OF THE ARMIES OF THE ANTICHRIST FOR THE ANNIHILATION OF ISRAEL ~//~ THE EARTHQUAKE OF THE SEVENTH BOWL JUDGMENT ~//~ THE GREAT BATTLE OF ARMAGEDDON AND THE DESTRUCTION OF THE ARMIES OF ANTICHRIST ~//~ THE SECOND COMING OF CHRIST ~//~ ...AS TOLD BY THE BIBLE (GET THE WHOLE STORY - IT'S ALL IN THE BOOK)
Lily Hamourtziadou's investigation into civilian victims during the conflicts that followed the US-led coalition's 2003 invasion of Iraq provides important new perspectives on the human cost of the War on Terror. From early fighting to the withdrawal and return of coalition troops, the Arab Spring and the rise of ISIS, the book explores the scale and causes of deaths and places them in the contexts of power struggles, US foreign policy and radicalisation. Casting fresh light on not just the conflict but international geopolitics and the history of Iraq, it constructs a unique and insightful human security approach to war.
"Korean-American Youth Identity and 9/11: An Examination of Korean-American Ethnic Identity in Post-9/11 America" by Professor Heerak Christian Kim of Asia Evangelical College and Seminary is a very important book in the area of ethnic studies in post-9/11 America. Although many books have been written on 9/11, there has not been adequate examination of its impact for particular ethnic groups. Even scholars of ethnic studies seem to ignore 9/11 as an event that is incidental to self-understanding and group identity of America's ethnic groups. This book is a step in the right direction in computing 9/11 into the study of ethnic identity and experience in America. This book specifically focuses on Korean-American identity, particularly in regards to Korean-American youth. However, this scholarly examination is further significant in its sensitivity to the ethnic experience of other Asian-Americans and in its examination of Korean-American identity as negotiated in the context of the larger dominant culture of America. And this book contributes further to the understanding of ethnic identity in the United States by devoting an important chapter to the dynamics of inter-ethnic relations between Korean-Americans and African-Americans. Besides being a monumental contribution to the understanding of ethnic identity in comparative terms, this book represents an important contribution to Korean-American studies. This book is the most up-to-date book on Korean-American youth identity and provides the scholarly community with valuable information regarding which direction to take future research regarding Korean-American identity and the Asian-American experience in the United States. As Asian-Americans are rising in terms of number and influence, the need for understanding their identity becomes important on academic, social, political, economic, and intellectual levels. This book is a very important book to meet the rising need that has been largely neglected in academia and in the publishing industry thus far. This book is an essential addition to all serious university libraries, public libraries, and private personal libraries of educated individuals.
This book provides up-to-date coverage of the policies, strategies, and effects of suicide in war, examining this subject from societal and military perspectives to shed light on the justifications for using human beings as expendable weapons. Suicide warfare has expanded over the years and become a global phenomenon. In some parts of the world, it has become rooted in the fabric of society. Westerners often find it difficult to grasp why someone would be willing to sacrifice their life in order to take the lives of others. Suicide Warfare: Culture, the Military, and the Individual as a Weapon provides a thorough examination of the topic that enables readers to understand the justification for suicide warfare and better appreciate how the ideology of the individuals and organizations that resort to suicide warfare greatly complicates security issues in the 21st century. The book covers the policies, strategies, and effects of suicide in war, examining suicide warfare in its entirety from a theoretical standpoint, and then applying those theories to the actual manifestations of and politico-military responses to suicide warfare. The author discusses specific organizations such as Al Qaeda and the Chechen rebels, analyzing each within its societal context, military justification, individual motivation, and outcomes, and addresses principles of sociological and conflict theory to place suicide warfare in a clearer conceptual framework. The book presents case studies that allow readers to better understand abstract theories and make distinctions between individual cases of suicide warfare. Includes primary documents and statistical data Provides resources for further study
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
John Ashcroft's service as Attorney General began with turmoil: a loss to a deceased challenger in his Senate reelection campaign and a tumultuous confirmation battle. Then, on September 11, 2001, his job was transformed into the greatest leadership challenge an Attorney General has ever faced. What Ashcroft learned from highly classified intelligence briefings, secret surveillance of terror cells, and war councils with President Bush gave him a uniquely comprehensive--and uniquely chilling--view of the threats to America's security. What he did to prevent another terrorist attack on American soil is hotly debated to this day. In NEVER AGAIN, Ashcroft breaks his silence about historic events that transpired during his term of office--including the largest terrorist attack in U.S. history, the enactment and defense of the USA Patriot Act, the Robert Hanssen spy scandal, the execution of Timothy McVeigh, and the recently discovered domestic surveillance program authorized by President Bush. In this provocative book, readers will meet the man behind the title and hear his take on the dangers to and within America from outside forces, and what he did to repair the serious breaches in our country's security. A fascinating, probing look at what Ashcroft believes will make America ultimately safe.
Uniting broad, time-tested security principles and the author's 35-plus years of experience with international security, intelligence, and foreign affairs, Understanding Personal Security: A Guide for Business Travelers offers a detailed yet practical framework on which to develop personal security awareness and training programs. As a critical resource for any travelers who may need to make fast, smart judgements in high-risk environments, this book helps readers analyze threats, threat actors, and the common adversarial characteristics, as well as the function of risk as a differentiating principle. This versatile text blends abstract organizing principles with street honed instincts, becoming equally valuable to security managers with previous experience and those corporate or non-profit organizations with employees in developing nations.
This unique work analyzes for the first time how foreign-affinity terrorism works in a major democratic nation like the United States, and what this country must do to survive the terror challenge, on both conventional and unconventional levels. To date, no definitive study has dealt specifically with the role of American citizens in supporting a foreign political, ideological, and religious illegal agenda. Terrorists in Our Midst: Combating Foreign-Affinity Terrorism in America remedies that as six expert authors discuss the threats of Americans to security interests in the United States and elsewhere, exploring what can and should be done to reduce a risk that may threaten the very survival of the free world. Terrorists in Our Midst focuses not only on foreign nationals operating in the United States, but also on American citizens participating in terror networks at home and abroad. The book presents an overview of both conventional and unconventional terrorism, surveys the terrorist threat in the United States by state and nonstate actors, and analyzes the foreign-affinity links of American operatives in this country and abroad. Most important for the safety and security of the United States, it offers an assessment of what policies worked and what did not work, specifying a "best practices" agenda of recommendations that should be adopted by the United States and the international community. Contributions from six distinguished academics and professionals with wide experiences in public and private service Case studies of the major U.S. counterterrorism strategies, including intelligence, law enforcement, border security, financial issues, and civil liberties concerns increase public and governmental understanding of the risks of, and possible responses to, future foreign-affinity terrorism A compilation of selected American foreign-affinity terrorists operating at home and abroad
This book demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is that when examining the social media sphere security scholars need to "expect the unexpected". This is because social media enables users to subvert, contest and create security narratives with symbols and idioms of their choice which can take into account "traditional" security themes, but also unexpected and under explored themes such as narratives from the local context of the users' towns and cities, and the symbolism of football clubs. The book also explores the complex topography of social media when considering constructions of security. The highly dynamic topography of social media is neither elite dominated and hierarchical as the Copenhagen School conceptualises security speak. However, neither is it completely flat and egalitarian as suggested by the vernacular security studies' non-elite approach. Rather, social media's topography is shifting and dynamic, with individuals gaining influence in security debates in unpredictable ways. In examining social media this book engages with the emancipatory burden of critical security studies. This book argues that it remains unfulfilled on social media and rather presents a "thin" notion of discursive emancipation where social media does provide the ability for previously excluded voices to participate in security debates, even if this does not result in their direct emancipation from power hierarchies and structures offline.
The explosion of Pan Am Flight 103 over Lockerbie, Scotland, in December 1988, should never have happened. Wallis, who has extensive, direct, personal knowledge of aviation security matters gained from his position at the crossroads of security information and the industry's endeavors to combat aviation terrorism, had warned the industry one year before the bombing that the interline element of baggage represented the prime opportunity for terrorist activity and had urged the adoption of passenger and baggage matching, a system that he had helped to develop. Mandated by the FAA for use at high risk airports, it was the feature missing from Pan AM's activity at Frankfort, an omission so cruelly exploited by the bombers. Wallis argues that the priority given by governments to technological solutions to the continuing terrorist threat puts the flying public at unnecessary risk every day. This volume brings together all of the facts surrounding the sabotage of Flight 103, including the investigation and the civil litigation in which so much of the story unfolded for the first time. It uncovers the fundamental weaknesses in Pan AM's communication and management policies. Wallis supports the policy that politics are politics and explores the possibility that U.S. and U.K. policy towards a neutral trial for the two Libyans indicted for the bombing, which may have been affected by the wider scenario of Middle East politics rather than simple justice for the victims of Lockerbie. Although the tragedy has led to improvements in defense technology for use against acts of aviation sabotage, these methods have yet to be applied universally.
Preventing School Violence: A Self-Assessment Approach provides readers with a research-based risk-management model designed to prevent school shootings. The self-assessment tool is adapted from a protocol developed by Tom McWeeney, which has been used to assess the readiness of FBI field offices to prevent terrorist attacks in the USA. Through extensive research, real-world application, and collaboration with Dale Watson, the former assistant director of the FBI, and Professor McWeeney, author Mark Harrington has modified this method with the express goal of reducing instances of school violence. Opening chapters share Dr. Harrington's experiences in the field and introduce the self-assessment tool. They underscore the importance for schools and organizations to be well prepared to respond not only to high-risk/high-consequence situations but also low-risk/high-consequence situations. The book shares key data from FBI reports regarding pre-attack behaviors of active shooters. Additional chapters outline the attributes of a successful self-assessment program and how to reimagine and rework security measures, including law enforcement/security presence, exercises and drills, surveillance, and more. The text walks readers through the criteria for an effective self-assessment approach: intelligence, mental health services, administrative support, training, and crisis plan considerations. They learn how gangs in schools and neighborhood ties can influence safety and security on school campuses. Throughout, true stories from the field demonstrate the need for the model and its application, and statistics, charts, and graphs provide necessary research to bolster action and understanding.
This expert's view into the strategic directions, tactics, leaders, and significant attacks connected to Chechen and North Caucasus terrorists examines the network's operations as well as the success of Russia's counterterrorist responses. This authoritative account traces the emergence of terrorism in the volatile region of the North Caucasus from its origins in the early 1990s through the present day. It presents a detailed examination of local and global counterterrorism strategies-everything from military force, to diplomacy, to politicization-providing valuable insight into effective methods for fighting terrorism here and around the world. This candid work uncovers the roots of Russian terrorism and provides a historical overview of the conditions that advanced terrorism and its unprecedented warfare practices, including radioactive attacks and suicide attacks by women. Author and native Russian speaker, Elena Pokalova, analyzes prominent terrorist groups such as Islamic International Peacekeeping Brigade, Riyad us-Saliheyn Martyrs' Brigade, and Special Purpose Islamic Regiment, and reveals the regional and global influence of the Caucasus Emirate on the movement. Discusses different strands of terrorist movements that emerged over time in the North Caucasus Includes tables, maps, and charts to help support content and reinforce visual learning Analyzes the significance of the jihadi ideology in the North Caucasus Examines the structural dynamics behind terrorist attacks over time
How do we engage with the pressing challenges of xenophobia, radicalism and security in the current political climate? The widely felt sense of insecurity in the West is shared by Muslims both within and outside Western societies. Growing Islamic militancy and the subsequent increased security measures by Western powers have contributed to a pervasive sense among Muslims of being under attack both physically and culturally. "Islam and Political Violence" brings together current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and the West and argues that we are on a dangerous trajectory, strengthening dichotomous notions of the divide between the West and the Muslim world.
Religious political violence is by no means a new phenomenon, yet there are critical differences between the various historical instances of such violence and its more current permutations. Since the mid-1970s, religious fundamentalist movements have been seeking to influence world order by participating in local political systems. For example, Islamic fundamentalism is at the heart of the Muslim Brotherhood in Egypt, the Christian fundamental right wing has seen a resurgence in Europe, and Jewish fundamentalism is behind the actions of Meir Kahane's Kach movement and the settler movement. The shift in recent years from secular to religious political violence necessitates a reevaluation of contemporary political violence and of the concept of religious violence. This text analyzes the evolution of religious political violence, in both historical and contemporary perspectives. Since religious political violence events are usually associated with the term "terrorism," the book first analyzes the origins of this controversial term and its religious manifestations. It then outlines and highlights the differences between secular and religious political violence, on ideological, strategic, and tactical levels, before comparing the concept of Holy War in Judaism, Christianity, and Islam. Lastly, it shows how modern radical monotheistic religious groups interpret and manipulate their religious sources and ideas to advocate their political agendas, including the practice of violence. A unique comparative study of religious political violence across Judaism, Islam, and Christianity, this text features many international case studies from the Crusades to the Arab Spring.
This indispensable guide to the conflict in Northern Ireland during 30 years of "the Troubles", 1968 to 1999, covers the various elements at home and abroad that have had an influence on the hostilities. The A-to-Z entries discuss people, parties, organizations, and key places. Other sections cover election results (1968 to 1999), systems of government, office holders in Northern Ireland, and the security system. Enhancing this volume are a chronology of major events (1921 to 1999) and a subject index.
Discover how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars from the New York Times bestselling author and veteran Washington Times columnist Bill Gertz.America is at war, but most of its citizens don't realize it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
This book develops a conceptual approach to understanding the face of contemporary terrorism as manifested in the recent attacks in Mumbai and Paris. By analyzing the historical evolution of terrorism and by offering case studies on different forms of terrorism in South Asia and elsewhere, the authors shed new light on the political strategies behind terrorist attacks, as well as on the motivations of terrorists. The case studies explore the redefinition of terrorism by the Iranian Islamic revolution, the spread of terrorism in Sunni Islam, the national jihadism in Pakistan, anti-Semitism as a main factor behind fanatical terrorist ideologies, and the case of the Tamil Tigers. "Redefining terrorism is a dynamic story that provides readers with intrigue and clarity to the ever-evolving threats that we face as a nation and as a global community. The authors masterfully navigate through the intricate maze of global terrorism bringing an overwhelming dose of reality through his usage of real life, gripping experiences. Through this book military and intelligence analysts and policy makers alike will gain first-hand knowledge about not only what the world looks like today but a glimpse into the future."US Congressman Pete Sessions |
You may like...
Media and Terrorism in the 21st Century
Elnur Ismayil, Ebru Karadogan Ismayil
Hardcover
R5,333
Discovery Miles 53 330
The Dynamics of Radicalization - A…
Eitan Y. Alimi, Chares Demetriou, …
Hardcover
R3,581
Discovery Miles 35 810
Do the Geneva Conventions Matter?
Matthew Evangelista, Nina Tannenwald
Hardcover
R3,294
Discovery Miles 32 940
September 11 - The Unfolding of 9/11 and…
Correspondents and Photographers of The Associated Press (AP)?
Hardcover
R847
Discovery Miles 8 470
|