![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
On September 11, 2001, author J. Samuel Walker was far from home when he learned of the terrorist attacks on the World Trade Center and the Pentagon. Stricken by incredulity and anxiety, he found the phone lines jammed when he tried to call his wife, who worked in downtown Washington, DC. At the time and ever since, Walker, like many of his fellow Americans, was and remains troubled by questions about the disaster that occurred on 9/11. What were the purposes of the attacks? Why did US intelligence agencies and the Defense Department, with annual budgets in the hundreds of billions of dollars, fail to protect the country from a small band of terrorists who managed to hijack four airliners and take the lives of nearly three thousand American citizens? What did responsible government agencies and officials know about Al-Qaeda and why did they not do more to head off the threat it posed? What were American policies toward terrorism, especially under Presidents Bill Clinton and George W. Bush, and why did they fall so far short of defending against a series of attacks? Finally, was the tragedy of 9/11 preventable? These are the most important questions that The Day That Shook America: A Concise History of 9/11 tries to answer. The Day That Shook America offers a long perspective and draws on recently opened records to provide an in-depth analysis of the approaches taken by the Clinton and Bush administrations toward terrorism in general and Al-Qaeda in particular. It also delivers arresting new details on the four hijackings and the collapse of the Twin Towers. J. Samuel Walker covers both the human drama and the public policy dimensions of one of the most important events in all of US history, and he does so in a way that is both comprehensive and concise.
This rare 10th anniversary edition (published in 2007) contains a new introduction by expert Soviet historian David M. Glantz. In addition all maps and graphics have been enhanced from the 1996 edition. "When the Soviet Union decided to invade Afghanistan, they evaluated their chances for success upon their experiences in East Germany, Hungary and Czechoslovakia. Unfortunately for their soldiers, as well as the people of Afghanistan, they ignored not only the experiences of the British in the same region, but also their own experience with the Basmachi resistance fighters in Central Asia from 1918-1933. Consequently, in Afghanistan the Soviet army found its tactics inadequate to meet the challenges posed by the difficult terrain and the highly motivated mujahideen freedom fighters. To capture the lessons their tactical leaders learned in Afghanistan and to explain the change in tactics that followed, the Frunze Military Academy compiled this book for their command and general staff combat arms officers. The lessons are valuable not just for Russian officers, but for the tactical training of platoon, company and battalion leaders of any nation likely to engage in conflicts involving civil war, guerrilla forces and rough terrain. This is a book dealing with the starkest features of the unforgiving landscape of tactical combat: casualties and death, adaptation, and survival." (From the original foreword by Hans Binnendijk, 1996)
An insightful study of how identity is mobilized in and for war in the face of homegrown terrorism. "You are either with us, or against us" is the refrain that captures the spirit of the global war on terror. Images of the "them" implied in this war cry-distinct foreign "others"-inundate Americans on hit television shows, Hollywood blockbusters, and nightly news. However, in this book, Piotr Szpunar tells the story of a fuzzier image: the homegrown terrorist, a foe that blends into the crowd, who Americans are told looks, talks, and acts "like us." Homegrown delves into the dynamics of domestic counterterrorism, revealing the complications that arise when the terrorist threat involves Americans, both residents and citizens, who have taken up arms against their own country. Szpunar examines the ways in which identities are blurred in the war on terror, amid debates concerning who is "the real terrorist." He considers cases ranging from the white supremacist Sikh Temple shooter,,to the Newburgh Four, ex-convicts caught up in an FBI informant-led plot to bomb synagogues, to ecoterrorists, to the Tsarnaev brothers responsible for the Boston Marathon bombing. Drawing on popular media coverage, court documents, as well as "terrorist"-produced media, Szpunar poses new questions about the strategic deployment of identity in times of conflict. The book argues that homegrown terrorism challenges our long held understandings of how identity and difference play out in war-beyond "us versus them"-and, more importantly, that the way in which it is conceptualized and combatted has real consequences for social, cultural, and political notions of citizenship and belonging. The first critical examination of homegrown terrorism, this book will make you question how we make sense of the actions of ourselves and others in global war, and the figures that fall in between.
The internet has become a vital part of modern society, with its impact reaching from private lives into the public sphere. However, along with its positive effects, the dissemination of this technology has created opportunities for increased cyber terrorism activities. Combating Internet-Enabled Terrorism: Emerging Research and Opportunities is an informative resource that highlights developments that will aid in combating internet-based hostility and violence. Featuring extensive coverage on relevant topics that include social media, military tactics, and counterterrorism, this publication will provide insight into the world of internet terrorism to researchers, academicians, and graduate students in this field.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Following previous trends of suicide bombings and violence against Western and local hostages, the 2005-2007 period saw a continuing tide of terrorism. Mickolus catalogues these recent insurgencies and technique, including airplane hijackings, letter bombs, food tampering, and major assassinations. An extension of his other other works, including terrorism dating back to 1980, this comprehensive chronology also provides follow-up material to prior incidents and enumerates their effects on current airport security measures around the world. This volume expertly details key players in each event, ranging from the terrorist whose violence created an atmosphere of fear and anxiety, to their unknowing victims. This work is divided into three sections: incidents, updates, and bibliography. In the first two segments, both domestic and international terrorist attacks are examined within security and political contexts to shed light on how the events unfolded. The extensive bibliographic data is also an invaluable resource for scholars, international organizations, and students.
A myth-breaking general history of the Israeli-Palestinian conflict, The Gun And The Olive Branch traces events right back to the 1880s to show how Arab violence, although often cruel and fanatical, is a response to the challenge of repeated aggression. Banned from six Arab countries, kidnapped twice, David Hirst, former Middle East correspondent of the Guardian, is the ideal chronicler of this terrible and seemingly insoluble conflict. The new edition of this ‘definitive’ (Irish Times) study brings the story right up to date. Amongst the many topics that are subjected to Hirst’s piercing analysis are: the Oslo peace process, the Israeli occupation of the West Bank and Gaza, the destabilising effect of Jewish settlement in the territories, the second Intifada and the terrifying rise of the suicide bombers, the growing power of the Israel lobby – Jewish and Christian fundamentalist – in the United States, the growth of dissent in Israel and among sections of America’s Jewish population, the showdown between Sharon and Arafat and the spectre of nuclear catastrophe that threatens to destroy the region.
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how terrorist cells are using and adapting online tools in order to counteract their efforts. Utilization of New Technologies in Global Terror: Emerging Research and Opportunities is an informative resource that explores new developments in technological advancements and the progression of terror organizations while also examining non-government activist organizations and their new role in protecting internet freedom and combating cyberterrorism. Featuring relevant topics such as social media, cyber threats, and counterterrorism, this publication will benefit government officials, political scientists, policymakers, researchers, academicians, and graduate students interested in political science, mass communication, and cyberwarfare.
The Shi'i clergy are amongst the most influential political players in the Middle East. For decades, scholars and observers have tried to understand the balance of power between, Shi'i 'quietism' and 'activism'. The book is based on exclusive interviews with high-profile Shi'i clerics in order to reveal how the Shi'i clerical elite perceives its role and engages in politics today. The book focuses on three ground-breaking events in the modern Middle East: the 1979 Islamic Revolution in Iran, the 2003 Iraq War, and the 2006 July war in Lebanon. By examining the nature and evolution of a Shi'i clerical network the book finds that, far from there being strategic differences between 'quitest' and 'activist' clerics, Shi'i mujtahid statesmen matured, from 1979 in Iran to 2003 Iraq, by way of a pragmatism which led to a strong form of transnational and associated whole in Lebanon in 2006. In doing so, the book breaks down the established, and misleading, dichotomisation of the Shi'i clergy into 'quietists' and 'activists' and discovers that the decision of Shi'i clerical elites to become politically active or to stay out of politics are attributable to their ability to adapt to their political environments.
This textbook anthology of selected readings on pressing Middle East security concerns serves as an invaluable single-volume assessment of critical security issues in nations such as Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen. The issues and current events of the Greater Middle East continue to hold deep implications for American geopolitical interests in the region—as they have for many decades. An ideal resource for students in undergraduate courses on the Middle East and related regions as well as students in graduate programs of international studies or security studies, this textbook anthologizes recent, insightful analyses by top scholars on trends and events in the Middle East that bear crucially on regional and global security considerations, covering topics like Iran's nuclear ambitions; the rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The essays address concerns that include the re-imposition of military rule in Egypt; the current status of Palestinian-Israeli relations; the civil war and proposed chemical inspections in Syria; Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq and the Sunni resurgence in Iraq and Syria; and the on-again-off-again international monitoring of nuclear facilities in Iran, along with discussions of that country's connections to the Syrian regime and Hezbollah in Lebanon. The use of drone strikes as antiterrorist weapons and their use within U.S. and international law also receive specific attention. Each reading is summarized and contextualized by a concise introduction that serves to enhance the integration of the individual readings across the book. Original source notes are included with each chapter as guides to further reading, and numerous maps provide an essential sense of place. The book also includes a glossary of terms and a register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed
Why is the problem of terrorism—and the emergence of more extreme and more brutal terrorist groups—one that cannot be solved, even after decades of trying? This book, authored by a United Nations Ambassador once imprisoned and tortured in Iraq, diagnoses the shortcomings of present counter-terrorism strategies and lays out an effective new plan for counterterrorism. The world has up to now failed to stop Al Qaeda terrorist attacks and also failed to stop the emergence of more extreme and more brutal terrorist groups than Al Qaeda, such as ISIS/ISIL, as well as newer lone wolf terrorists. Current strategies of counterterrorism have many shortcomings that allow terrorists to continue their operations. A New Counterterrorism Strategy: Why the World Failed to Stop Al Qaeda and ISIS/ISIL, and How to Defeat Terrorists identifies the shortcomings of present approaches and presents a comprehensive and sustainable strategy to combat terrorism. Author Ambassador T. Hamid Al-Bayati, an Iraqi politician, offers a unique insider's perspective about the war on terrorism. As a leader of the opposition against the terrorist regime of Saddam Hussein, he was arrested and tortured, until he fled Iraq. From the UK, he continued involvement in unfolding political events, until returning to Iraq and assuming high political appointments. These special insights are interwoven with accounts of detailed interactions and policies that provide the background for his explanation of the failures of counterterrorism strategies to date, and lessons learned from those mistakes. Al-Bayati spotlights the problems of terrorist cells, lone wolves, and foreign fighters developing in all parts of the world, where members work from safe havens to plan attacks, acquire weapons, and gain fighting experience. His proposed strategy further emphasizes issues neglected in current counterterrorism strategies, such as undermining the ideology of terrorists, interrupting their use of the Internet to promote evil, understanding the motivations and psychology of terrorists, deterring youth from joining ISIS, creating effective media campaigns against terrorism, and shutting off the flow of funding that currently buoys the financial resources of terrorist organizations.
Conceptualizing Terrorism argues that, in the post 9/11 world, the need for an internationally agreed definition of terrorism is more important than it has ever been, despite the challenges that such an endeavour presents. Indeed, in a global context, where the term is often applied selectively and pejoratively according to where one's interests lie, there is a real need to instill some analytical quality into the concept of terrorism, not least in order to prevent the term being manipulated to justify all manner of counter-terrorism responses. Not only is this important for the policymaking context but it is also an imperative task within academia - in order to strengthen the theoretical foundation of terrorism studies, for all other terrorism related theories rest on what one means by terrorism in the first place. Written from an academic perspective, the book explores the prospects for terrorism as an analytical concept. Arguing that the essence of this particular form of political violence lies in its intent to generate a psychological impact beyond the immediate victims, it goes on to propose the adoption of three key preliminary assumptions that have implications for the definitional debate and that it suggests might help to increase the analytical potential of terrorism. The book then considers potential elements of a definition before concluding with its own conceptualization of terrorism.
Inherent Safety at Chemical Sites: Reducing Vulnerability to Accidents and Terrorism Through Green Chemistry highlights the use of green chemistry principles to identify and address serious threats and potential consequences caused by accidental and deliberate industrial chemical releases. Through valuable case studies, the book suggests wholesale replacements of hazardous chemicals with benign and inherently safer, or "greener," materials. More than physical security barriers and plans, such preventative measures better guarantee the safety of industrial employees and nearby residents. This valuable primer begins with an introduction to the concepts of green chemistry and outlines the various ways that a green approach to chemical design, production, and management is not only good for the planet, but also serves to protect people and infrastructure from terrorist acts. Specific examples and case studies are cited to illustrate what has been done to advance this cause, and offer guidance to those decision-makers who similarly aspire to greater safety and security for the people and resources they manage.
The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.
In the Middle East, the world's deadliest organizations, the Islamic State and al Qaeda have firmly established their presence in the Levant and the Gulf. In parallel, state- sponsored Shia threat networks, groups and cells, notably the Lebanese Hezbollah and Houthis operate throughout the Middle East and beyond. Exploiting the conflict zones and their cascading ideologies, both the Sunni and Shia threat entities compete to advance their own interests. Their parent and affiliate entities recruit and radicalise both territorial and diaspora Muslims to fight each other. Unless governments work together to mitigate the threat at the core and the edge, the Middle East and its peripheral territories in Asia and Africa will suffer from terrorism and political violence in the foreseeable future.The response to extremism and its vicious by-product terrorism requires both preventive intelligence-led and pre-emptive community-based security approaches. While developing tactical counter-terrorism capabilities, governments should build strategic capabilities to erode their support bases. The new frontiers in counter-terrorism and extremism - community engagement and rehabilitation - should be integrated into government planning. Unless governments take the lead and work with community leaders, societies will be threatened by the existing and emerging wave of ideologically-motivated violence. Government and community leaders should develop whole-of-government and whole-of-nation approaches to dismantle transnational threats. To contain, isolate and eliminate the evolving threat, the Middle Eastern states should shift from security cooperation to collaboration and partnership.
This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counterterrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events. This book provides a compelling overview of U.S. laws, policies, programs, and actions in the realms of anti- and counterterrorism, as well as comprehensive coverage of the various domestic and foreign terrorist organizations threatening America, including their leaders, ideologies, and practices. These entries are supplemented with a carefully selected collection of primary sources that track the evolution of U.S. anti- and counterterrorism policies and political debate. These documents will not only illuminate major events and turning points in America's fight against terror-both foreign and homegrown-but also help readers understand debates about the effectiveness, morality, and constitutionality of controversial policies that have either been implemented or proposed, from waterboarding to targeted assassination to indefinite incarceration at Guantanamo Bay. In addition, this resource shows how political controversies over anti- and counterterrorism strategies are spilling over into other areas of American life, from debates about privacy rights, government surveillance, and anti-Muslim actions and beliefs to arguments about whether U.S. firearms policies are a boon to terrorists. Wide-ranging encyclopedia section featuring contributions from counterterrorism scholars Primary Document collection that provides additional illumination on major events, laws, policies, and trends Authoritative and evenhanded coverage of counterterrorism threats, issues, events, laws, policies, and organizations Reader's Guide to entries by subject category
As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level. |
You may like...
September 11 - The Unfolding of 9/11 and…
Correspondents and Photographers of The Associated Press (AP)?
Hardcover
R847
Discovery Miles 8 470
Far Out - The Lives of Former Extremists…
Charlotte McDonald-Gibson
Paperback
The Dynamics of Radicalization - A…
Eitan Y. Alimi, Chares Demetriou, …
Hardcover
R3,581
Discovery Miles 35 810
Do the Geneva Conventions Matter?
Matthew Evangelista, Nina Tannenwald
Hardcover
R3,294
Discovery Miles 32 940
|