Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
This book provides an in-depth analysis of probably the most horrific solo terrorist operation the world has ever seen. On 22 July 2011 Anders Behring Breivik killed 77 people when he bombed the Government District in Oslo, before he conducted a shooting attack against a political youth camp at Utoya. The main focus of the book is on the operational aspects of the events, particularly the target selection and decision-making process. Why did Breivik choose the targets he finally attacked, what influenced his decision-making and how did he do it? Using unique source material, providing details never published before, the authors accurately explain how even this ruthless terrorist acted under a number of constraints in a profoundly dynamic process. This momentous work is a must read for scholars, students and practitioners within law enforcement, intelligence, security and terrorism studies.
Answers the questions: what is the background to issues in external and internal politics? What is the Turks' opinion on European and Turkish identity? On Cyprus? On the role of the generals? Why do human rights problems linger on? What is behind the Kurdish question? Is Turkey religiously split? What are the pros and cons of Turkish association with the EU?
This edited collection aims to respond to dominant perspectives on twenty-first-century war by exploring how the events of 9/11 and the subsequent Wars on Terror are represented and remembered outside of the US framework. Existing critical coverage ignores the meaning of these events for people, nations and cultures apparently peripheral to them but which have - as shown in this collection - been extraordinarily affected by the social, political and cultural changes these wars have wrought. Adopting a literary and cultural history approach, the book asks how these events resonate and continue to show effects in the rest of the world, with a particular focus on Australia and Britain. It argues that such reflections on the impact of the Wars on Terror help us to understand what global conflict means in a contemporary context, as well as what its representative motifs might tell us about how nations like Australia and Britain perceive and construct their remembered identities on the world stage in the twenty-first century. In its close examination of films, novels, memoir, visual artworks, media, and minority communities in the years since 2001, this collection looks at the global impacts of these events, and the ways they have shaped, and continue to shape, Britain and Australia's relation to the rest of the world.
Independent scholar Falk analyzes the genesis of Islamic terror from many standpoints, including religious, cultural, historical, political, social, economic and, above all, psychological. Drawing on his training as a clinical psychologist, Falk's writings specialize in psychohistory and political psychology. Here, he examines topics including infantile experience and adult terrorism, the meaning of terror, terrorists and their mothers, narcissistic rage and Islamic terror, and whether terrorists are normal people, as some scholars claim. He also describes the infantile development of terrorist pathology, non-psychoanalytic theories of terrorism, globalization's effect on terrorism, and the notion of the clash of civilizations. Other topics addressed in this reader-friendly analysis include history's first Islamic terrorists and three important cases--two recent, deadly terrorists and a primary figure in our current war on terror. Independent scholar Falk analyzes the genesis of Islamic terror from many standpoints, including religious, cultural, historical, political, social, economic and, above all, psychological. Drawing on his training as a clinical psychologist, Falk's writings specialize in psychohistory and political psychology. Here, he examines topics including infantile experience and adult terrorism, the meaning of terror, terrorists and their mothers, narcissistic rage and Islamic terror, and whether terrorists are normal people, as some scholars claim. He also describes the infantile development of terrorist pathology, non-psychoanalytic theories of terrorism, globalization's effect on terrorism, and the notion of the clash of civilizations. Examining the emotional structure of traditional Muslim families, Falk shows us the Muslim child's ambivalence toward his or her parents, ways in which Muslims abuse women and children, and the roots of Muslim rage, and why all of that plays into the development of future terrorism. Other topics addressed in this reader-friendly analysis include history's first Islamic terrorists and three important cases--two recent, deadly terrorists and a primary figure in our current war on terror. The central idea throughout the book is that a person's attitude toward terror and terrorism--as well as whether he or she becomes a murderous terrorist, or even who wages a global war on terror--has much to do with that person's own terrifying experiences in infancy and childhood. Such terror, usually experienced first in the earliest interactions with the mother, is symbolically expressed, as Falk shows, in fairy tales and myths about terrifying witches and female monsters. Further terror may be experienced in the relationship with the father and also in various other traumatic ways. It is these early terrors, when extreme and uncontrollable, that most often produce terrorists and wars on terror, Falk argues. Thus, his book focuses on the conscious, but also on the irrational and unconscious causes of terrorism.
In this title, terrorism, sabotage, and subversion are analyzed to challenge the dominant views that a 'new conflict' is now posing unprecedented threats to U.S. homeland security. Since 9/11, the dominant view is that we have entered an era of 'new conflict' in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this 'new conflict' argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and the political aspects of homeland security, this unique survey demonstrates how such activities as terrorism are limited by their clandestine nature. It also addresses why we need to switch our strategic focus and increase the role citizens have in dealing with such threats. This historically informed and critical analysis fills a void in the debates on the threats and conflicts that the U.S. confronts at home and abroad and will appeal to anyone interested in national security and terrorism.
This book is primarily an effort to study the phenomenon called insurgency that has been posing a huge challenge to the internal security of the country. Though a wealth of literature on the subject already exists, a need was felt to analyse the multiple facets of insurgency as no country barring India has witnessed this endemic for a prolonged period. The subject is so vast and dynamic that no strait-jacketed solution can be prescribed to curb this menace overnight. However, an attempt has been made to analyse this phenomenon and prescribe remedial antidotes. The author has attempted to capture the origin of insurgency which dates back to a late 18th century, and study various causes and numerous factors that fuel it. In addition, he has also attempted to study the doctrines and strategies, with special emphasis on both Islamic insurgency and other forms of uprisings in the country that continue to pose challenges to the Indian security environment. Owing allegiance to his uniform, the author has also attempted to bring out the role of air power in counter- insurgency operations. The penultimate chapter deals with shaping a viable counter-insurgency strategy and spells out the essential parameters, principles and pitfalls of such a strategy. The chapter also dwells on the political aim and the importance of a socio-economic turnabout to scale down insurgency. The use of calibrated force rather than brutal armed suppressive methods is advocated. Will insurgencies ever end? This lingering question is discussed in the final chapter and certain essential strategies, both military and non-military, are spelt out which would provide occasions and opportunities to forge a lasting solution to insurgency in India.
The so-called "Islamic State" (IS) that has swept into power in parts of Syria and Iraq presents an imminent danger to the global community with its capacity as an effective, ideologically motivated, and bloodthirsty fighting force, coupled with its expanding territorial reach, on the ground and online. The IS has taken on a quasi-state form that mixes modernity with ancient rites, and aggressively promotes sectarian violence and religious extremism with a decidedly apocalyptic bent. Too, it has introduced to the Middle East a new level of extremism and brutality, marked by volatile fluidity, with far-reaching, dangerously destabilizing effects on state and non-state actors, regionally and globally. This book offers insights into the nature of the IS and what the international community can do to combat it. In order to achieve this objective, the origins, intentions, leadership, capabilities, and operations of the IS are explored. The Islamic State's multifaceted efforts and effects in the region and beyond are described. Also, national, regional, and global strategies that are being pursued to address the new threat are examined. To this end, a range of recommendations are offered on specific steps that governmental, intergovernmental, and non-governmental bodies can take to counter the IS menace. Lastly, additional insights are presented relevant to combating the IS and undermining its potential future capabilities.
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Hamed El-Said investigates Counter-de-Rad programmes in Muslim majority and Muslim minority states. This multifaceted book provides a new approach to evaluate Counter-de-Rad Programmes and develops a holistic framework which will allow policy-makers and practitioners to design and effectively implement and assess such programmes in the future.
Jeff Scarborough was the only cameraman on duty at WNBC's newsroom in New York when the attacks of 9/11 began. Armed with privileged information from the '93 attack on the World Trade Center-realizing both towers were doomed-Jeff pulled out of an emergency convoy just short of the WTC as he and reporter Rob Morrison approached the burning towers. Taking charge at the scene, Jeff ordered live-truck engineer Eddie Alonzo to stay 500 feet away and told all responding crews to back-off-dangerously becoming NBC's sole cameraman broadcasting live from Ground Zero. He permitted only the live-shot reporter to join him at his camera position-and during their live broadcast, the South Tower collapsed. They ran for their lives; Jeff rescued Eddie and stayed to videotape the panic and the North Tower collapse. "September's Camera" is the story of that fateful day, and of a career lived on the edge of danger-as Jeff's lens captured conflict, urban riots, blackouts, serial killers, plane crashes and human frailty in all its forms.
Religious political violence is by no means a new phenomenon, yet there are critical differences between the various historical instances of such violence and its more current permutations. Since the mid-1970s, religious fundamentalist movements have been seeking to influence world order by participating in local political systems. For example, Islamic fundamentalism is at the heart of the Muslim Brotherhood in Egypt, the Christian fundamental right wing has seen a resurgence in Europe, and Jewish fundamentalism is behind the actions of Meir Kahane's Kach movement and the settler movement. The shift in recent years from secular to religious political violence necessitates a reevaluation of contemporary political violence and of the concept of religious violence. This text analyzes the evolution of religious political violence, in both historical and contemporary perspectives. Since religious political violence events are usually associated with the term "terrorism," the book first analyzes the origins of this controversial term and its religious manifestations. It then outlines and highlights the differences between secular and religious political violence, on ideological, strategic, and tactical levels, before comparing the concept of Holy War in Judaism, Christianity, and Islam. Lastly, it shows how modern radical monotheistic religious groups interpret and manipulate their religious sources and ideas to advocate their political agendas, including the practice of violence. A unique comparative study of religious political violence across Judaism, Islam, and Christianity, this text features many international case studies from the Crusades to the Arab Spring.
A history of Reading's iconic gaol: architectural landmark, cultural emblem and symbol for a community determined to cherish the town's heritage. Layers of history and art are carefully peeled back as Peter Stoneley reveals its past as architectural showcase for Sir George Gilbert Scott's decorative (and expensive!) style, location for experiments in prison reform, training ground for the leaders of the Irish Independence movement and, of course, the inspiration for Oscar Wilde's famous Ballad of Reading Gaol. Bringing the narrative right up to the present day with the discussions over its future use, the impact of the ArtAngel exhibition and Banksy's graffiti, this book is a timely platform for the building to tell us its story.
Reconceptualizing Security in the Americas in the Twenty-First Century illustrates the various security concerns in the Americas in the twenty-first century. It presents the work of a number of prolific scholars and analysts in the region. The book offers new theoretical and analytical perspectives. Within the Americas, we find a number of important issues security issues. Most important are the threats that supersede borders: drug trafficking, migration, health, and environmental. These threats change our understanding of security and the state and regional process of neutralizing or correcting these threats. This volume evaluates these threats within contemporary security discourse.
This book examines how the perception of terrorism threat erodes civil liberties, sows doubt about the loyalties of immigrants, and heightens the left-right ideological divide. The book presents original analysis of survey data and experiments conducted in Australia, Europe and the United States. Research in the book posits questions that others have largely avoided: How does the threat of terrorist violence undermine multicultural democracies? What are the psychological and social mechanisms that explain how the threat of terrorism can change political attitudes? What is the relationship between terrorism and death threats? What is the role of media in shaping the perception of terrorism threat? And what are the ethical responsibilities of journalists? This book will help readers distinguish between groundless speculation and solid scientific knowledge of the topic. Moreover, it provides concrete recommendations on how to prevent the most negative consequences of the polarization of political attitudes, such as social divisions, exclusivism and conflict. Given the broad geographical scope of the research presented in the book, specifically North America, Europe and Australia, this book will appeal to broad scope of readers.
This invaluable resource is written by leading international experts of policing and terrorism prevention. The contributors provide an in-depth analysis of the dilemmas, challenges, and solutions faced by police departments and law enforcement bodies in their efforts to counter local and global terrorism. The chapters cover terrorism and the policing of terrorism in various countries, such as the US, Palestine, Columbia, Turkey, Korea, and Malta. Table of Contents: Female Perpetrators of Palestinian Terrorist Attacks with a Special Reference to Their Socio-Cultural Position: An Exploratory Empirical Examination * The Concept of Social Equilibrium and Its Application to Policing Terrorism in the United States * Policing Terrorism in Colombia * Dynamics of Terrorism in Turkey * Threat from and Policing against Global Salafi Terrorism in the Republic of Korea: A Story from the Eastern Front * Policing Terrorism in Malta * Post-9/11 United States' Airport Security Changes and Displacement * Situational Crime Prevention Applied to Ricin and Bioterrorism. (Series: Israel Studies in Criminology - Vol. 11)
To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through these endeavors that citizens are able to live out their lives in peace. Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence presents a series of studies and descriptive examples on the US Department of Homeland Security and related research. Through its investigation of interesting challenges and thought-provoking ideas, this volume offers professionals, researchers, and academics in the fields of security science, engineering, technology, and mathematics an in-depth discussion of some of the issues that directly affect the safety, security, and prosperity of the nation.
This work is both a theoretical and empirical analysis of the growing use of ideological control in business and administrative organizations. The empirical studies reported in this volume were conducted in different types of organizations and in different countries (Poland, the United States, and Sweden). Throughout this unique examination, the author emphasizes the role of ideologies as vehicles for organizational change--not, as traditionally seen, as instruments for maintaining the status quo.
This is a study that examines United Nations' efforts against terrorism in the 1970s and how West Germany came to influence and lead them. It is also an account of several hostage and hijacking crises as well as a look at German domestic terrorism.
The Geneva Conventions are the best-known and longest-established laws governing warfare, but what difference do they make to how states engage in armed conflict? Since the start of the "War on Terror" with 9/11, these protocols have increasingly been incorporated into public discussion. We have entered an era where contemporary wars often involve terrorism and guerrilla tactics, but how have the rules that were designed for more conventional forms of interstate violence adjusted? Do the Geneva Conventions Matter? provides a rich, comparative analysis of the laws that govern warfare and a more specific investigation relating to state practice. Matthew Evangelista and Nina Tannenwald convey the extent and conditions that symbolic or "ritual" compliance translates into actual compliance on the battlefield by looking at important studies across history. To name a few, they navigate through the Algerian War for independence from France in the 1950s and 1960s; the US wars in Korea, Vietnam, Iraq, and Afghanistan; Iranian and Israeli approaches to the laws of war; and the legal obligations of private security firms and peacekeeping forces. Thoroughly researched, this work adds to the law and society literature in sociology, the constructivist literature in international relations, and legal scholarship on "internalization." Do the Geneva Conventions Matter? gives insight into how the Geneva regime has constrained guerrilla warfare and terrorism and the factors that affect protect human rights in wartime.
The recent European Council Directive 114/08 requested the EU Member States to perform an assessment aimed at the identification and designation of the so-called European Critical Infrastructures (ECI). Every analysis of the results of the "first round" of identifications and designations has only taken into account the numbers of ECIs effectively designated, consequently leaving aside all of the other elements related to this important path towards a harmonized vision of the "European Security." This work, with its unprecedented approach, focuses on the elements that have maximized or frustrated the ambitious European objectives and on the issues that might have prevented the directive reaching its full potential. Furthermore, the study offers an in-depth perspective on the lessons learned - including those that can be learned from the US pre-post 9/11 CIP policies - as well as an assessment of the state of play of the Member States after the implementation of the directive, together with predictions for future challenges.
As shocking as the attacks of 9/11 were, we have been too quick to view the post-9/11 struggle against terrorism as entirely new and unprecedented. Without denying certain novel aspects of Al Qaeda and its affiliates, the "newness" of its purpose and methods has been overemphasized. Many aspects of contemporary terrorism bear a striking resemblance to past movements. Others represent the culmination of trends evolving over decades. Even seemingly novel characteristics of terrorist methods may be more the outcome of earlier developments than a truly new phenomenon. The increased lethality of terrorist attacks is a case in point. Usually attributed to lack of restraint brought on by religious extremism, the emphasis on body count may owe as much to a kind of threshold phenomenon. Numbed by decades of violence, people do not shock as easily as they once did. It now takes thousands of deaths to produce the same effect once caused by a relative handful. This book examines the nature of the contemporary threat within a historical context to discern continuities and change in terrorist behavior. It challenges the idea of a global war on terrorism and suggests that the United States, or any threatened country, would be better served by a policy aimed at reducing the risk of terrorist attack to an acceptable level at a reasonable cost. The book concludes by proposing a workable strategy for achieving this reasonable level of security.
In recent years, the field of psychology has seen an increasing interest in the aftereffects of psychological trauma. Work has been published that examines the psychological sequelae of rape, incest, combat, natural disaster, fire, and, in a few cases, hostage-taking. This is the first book that takes a long-term perspective, by asking questions such as: How did survivors view their experience through the lens of time? Were there any positive effects associated with the experience? The author examines how hostage victims perceive their victimization, and how they go about the task of rebuilding their assumptive world. In sharing the intimate details of this process, the hostage survivors have allowed us to be close observers in their efforts to redefine their world and themselves. They have served to expose the internal and external forces that have helped or hindered their efforts. It is important for those in human services, as well as management in higher-risk professions, to understand the trauma from the survivors' perspective. They need to know what is helpful to survivors and what is not. Common sense assumptions of those in authority are often wrong. Moreover, the initial post-release shock and the overwhelming press of emotions and events make it difficult for survivors to discern and express their genuine needs. The passage of time can help to distill and organize thoughts and feelings. In deepening our understanding of the needs of victims, this study has enhanced our ability to be of service.
Drawing upon insights from the natural and social sciences, this book puts forth a provocative new argument that the violent Islamist threat in Indonesia today derives its stubborn resilience from being in essence a complex, adaptive and self-organizing system - or what some specialists might even call a super-organism. The book challenges the popular assumption that ideology is the root cause that explains why Indonesian Islamists radicalize into violent extremism. In addition it addresses why despite years of intense security force pressure, seemingly disparate militant cells keep 'popping up' like the proverbial hydra - and in the apparent absence of a centralized coordinating body, nevertheless appear to display an organic interconnectivity with one another. Going beyond standard ideological mantras the book argues that fresh inter-disciplinary thinking is needed to cope with the constantly mutating violent Islamist challenge in Indonesia, and puts forth a comprehensive strategy for doing so. It will be of interest to academics and students of terrorism, religion and violence in the Southeast Asian region.
Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.
The project discusses Hezbollah's political ideology and how it evolves over time and the conditions that lead to the change of ideology. The author also examines Hezbollah's relationship with the patron states, Syria and Iran. In contrast with major arguments in the literature, the book argues that political ideologies are not fixed and they evolve depending on a number of factors such as the change in context, major events like a civil war in the patron state, and, most importantly, when the change of ideology becomes linked to survival of the insurgency. This monograph will appeal to a wide range of audiences such as researchers, scholars, and graduate students in the fields of Middle Eastern studies, political studies, Islamism, and nationalism. |
You may like...
The European Union - Facing the…
Antonina Bakardjieva Engelbrekt, Anna Michalski, …
Hardcover
R3,013
Discovery Miles 30 130
The European Union as a Global…
Christian Kaunert, Alex MacKenzie, …
Hardcover
R2,411
Discovery Miles 24 110
The Nexus Between Organized Crime and…
Letizia Paoli, Cyrille Fijnaut, …
Hardcover
R4,729
Discovery Miles 47 290
Handbook on Democracy and Security
Nicholas A. Seltzer, Steven L. Wilson
Hardcover
R5,434
Discovery Miles 54 340
Killing For Culture - From Edison to…
David Kerekes, David Slater
Paperback
R917
Discovery Miles 9 170
|