![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
Media plays a specific role within modern society. It has been and continues to be a tool for spreading terrorist messages. However, it can just as easily be used as a tool for countering terrorism. During these challenging times where both international and domestic terrorism continue to threaten the livelihoods of citizens, it is imperative that studies are undertaken to examine the media's role in the spread of terrorism, as well as to explore strategies and protocols that can be put in place to mitigate the spread. Media and Terrorism in the 21st Century presents the emerging ideas and insights from experts, academicians, and professionals on the role media and new media plays in terrorist propaganda from a critical international perspective. It examines the historical relation between media and terror and analyzes the difficulties and obstacles presented by the relation in the 21st century. Covering topics such as AI-based dataveillance, media development trends, and virtual terrorism, this book is an indispensable resource for government officials, communications experts, politicians, security professionals, sociologists, students and educators of higher education, researchers, and academicians.
The Oxford Handbook of the History of Terrorism presents a revaluation of the major narratives in the history of terrorism, exploring the emergence and the use of terrorism in world history from antiquity up to the twenty-first century. The essays collected in this handbook constitute the first systematic analysis of the relationship between terrorism and modernity on a global scale from the French Revolution to the present. Historians and political theorists have long asserted such a link, but this causal connection has rarely been rigorously investigated, and the failure to examine such a crucial aspect of terrorism has contributed to the spread of unsubstantiated claims about its nature and origins. Terrorism is often presented as a perennial barbarism forever lurking outside of civilization when, in fact, it is a historically specific form of political violence generated by modern Western culture that was then transported around the globe, where it was transformed in accordance with local conditions. This handbook offers cogent arguments and well-documented case studies that support a reading of terrorism as an explicitly modern phenomenon. It also provides sustained analyses of the challenges involved in the application of the theories and practices of modernity and terrorism to non-Western parts of the world. The volume presents an overview of terrorism's antecedents in the pre-modern world, analyzes the emergence of terrorism in the West, and presents a series of case studies from non-Western parts of the world that together constitute terrorism's global reception history. Essays cover a broad range of topics from tyrannicide in ancient Greek political culture, the radical resistance movement against Roman rule in Judea, the invention of terrorism in Europe, Russia, and the United States, anarchist networks in France, Argentina, and China, imperial terror in Colonial Kenya, anti-colonial violence in India, Egypt's Muslim Brotherhood, and the German Autumn, to right-wing, eco-and religious terrorism, as well as terrorism's entanglements with science, technology, media, literature and art. The Oxford Handbook of the History of Terrorism ultimately provides an account of the global history of terrorism and coverage of the most important cases from this history, always presented with an eye towards their entanglement with the forces and technologies of modernity.
On September 11, 2001, author J. Samuel Walker was far from home when he learned of the terrorist attacks on the World Trade Center and the Pentagon. Stricken by incredulity and anxiety, he found the phone lines jammed when he tried to call his wife, who worked in downtown Washington, DC. At the time and ever since, Walker, like many of his fellow Americans, was and remains troubled by questions about the disaster that occurred on 9/11. What were the purposes of the attacks? Why did US intelligence agencies and the Defense Department, with annual budgets in the hundreds of billions of dollars, fail to protect the country from a small band of terrorists who managed to hijack four airliners and take the lives of nearly three thousand American citizens? What did responsible government agencies and officials know about Al-Qaeda and why did they not do more to head off the threat it posed? What were American policies toward terrorism, especially under Presidents Bill Clinton and George W. Bush, and why did they fall so far short of defending against a series of attacks? Finally, was the tragedy of 9/11 preventable? These are the most important questions that The Day That Shook America: A Concise History of 9/11 tries to answer. The Day That Shook America offers a long perspective and draws on recently opened records to provide an in-depth analysis of the approaches taken by the Clinton and Bush administrations toward terrorism in general and Al-Qaeda in particular. It also delivers arresting new details on the four hijackings and the collapse of the Twin Towers. J. Samuel Walker covers both the human drama and the public policy dimensions of one of the most important events in all of US history, and he does so in a way that is both comprehensive and concise.
An insightful study of how identity is mobilized in and for war in the face of homegrown terrorism. "You are either with us, or against us" is the refrain that captures the spirit of the global war on terror. Images of the "them" implied in this war cry-distinct foreign "others"-inundate Americans on hit television shows, Hollywood blockbusters, and nightly news. However, in this book, Piotr Szpunar tells the story of a fuzzier image: the homegrown terrorist, a foe that blends into the crowd, who Americans are told looks, talks, and acts "like us." Homegrown delves into the dynamics of domestic counterterrorism, revealing the complications that arise when the terrorist threat involves Americans, both residents and citizens, who have taken up arms against their own country. Szpunar examines the ways in which identities are blurred in the war on terror, amid debates concerning who is "the real terrorist." He considers cases ranging from the white supremacist Sikh Temple shooter,,to the Newburgh Four, ex-convicts caught up in an FBI informant-led plot to bomb synagogues, to ecoterrorists, to the Tsarnaev brothers responsible for the Boston Marathon bombing. Drawing on popular media coverage, court documents, as well as "terrorist"-produced media, Szpunar poses new questions about the strategic deployment of identity in times of conflict. The book argues that homegrown terrorism challenges our long held understandings of how identity and difference play out in war-beyond "us versus them"-and, more importantly, that the way in which it is conceptualized and combatted has real consequences for social, cultural, and political notions of citizenship and belonging. The first critical examination of homegrown terrorism, this book will make you question how we make sense of the actions of ourselves and others in global war, and the figures that fall in between.
The internet has become a vital part of modern society, with its impact reaching from private lives into the public sphere. However, along with its positive effects, the dissemination of this technology has created opportunities for increased cyber terrorism activities. Combating Internet-Enabled Terrorism: Emerging Research and Opportunities is an informative resource that highlights developments that will aid in combating internet-based hostility and violence. Featuring extensive coverage on relevant topics that include social media, military tactics, and counterterrorism, this publication will provide insight into the world of internet terrorism to researchers, academicians, and graduate students in this field.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
A myth-breaking general history of the Israeli-Palestinian conflict, The Gun And The Olive Branch traces events right back to the 1880s to show how Arab violence, although often cruel and fanatical, is a response to the challenge of repeated aggression. Banned from six Arab countries, kidnapped twice, David Hirst, former Middle East correspondent of the Guardian, is the ideal chronicler of this terrible and seemingly insoluble conflict. The new edition of this ‘definitive’ (Irish Times) study brings the story right up to date. Amongst the many topics that are subjected to Hirst’s piercing analysis are: the Oslo peace process, the Israeli occupation of the West Bank and Gaza, the destabilising effect of Jewish settlement in the territories, the second Intifada and the terrifying rise of the suicide bombers, the growing power of the Israel lobby – Jewish and Christian fundamentalist – in the United States, the growth of dissent in Israel and among sections of America’s Jewish population, the showdown between Sharon and Arafat and the spectre of nuclear catastrophe that threatens to destroy the region.
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how terrorist cells are using and adapting online tools in order to counteract their efforts. Utilization of New Technologies in Global Terror: Emerging Research and Opportunities is an informative resource that explores new developments in technological advancements and the progression of terror organizations while also examining non-government activist organizations and their new role in protecting internet freedom and combating cyberterrorism. Featuring relevant topics such as social media, cyber threats, and counterterrorism, this publication will benefit government officials, political scientists, policymakers, researchers, academicians, and graduate students interested in political science, mass communication, and cyberwarfare.
The Shi'i clergy are amongst the most influential political players in the Middle East. For decades, scholars and observers have tried to understand the balance of power between, Shi'i 'quietism' and 'activism'. The book is based on exclusive interviews with high-profile Shi'i clerics in order to reveal how the Shi'i clerical elite perceives its role and engages in politics today. The book focuses on three ground-breaking events in the modern Middle East: the 1979 Islamic Revolution in Iran, the 2003 Iraq War, and the 2006 July war in Lebanon. By examining the nature and evolution of a Shi'i clerical network the book finds that, far from there being strategic differences between 'quitest' and 'activist' clerics, Shi'i mujtahid statesmen matured, from 1979 in Iran to 2003 Iraq, by way of a pragmatism which led to a strong form of transnational and associated whole in Lebanon in 2006. In doing so, the book breaks down the established, and misleading, dichotomisation of the Shi'i clergy into 'quietists' and 'activists' and discovers that the decision of Shi'i clerical elites to become politically active or to stay out of politics are attributable to their ability to adapt to their political environments.
This textbook anthology of selected readings on pressing Middle East security concerns serves as an invaluable single-volume assessment of critical security issues in nations such as Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen. The issues and current events of the Greater Middle East continue to hold deep implications for American geopolitical interests in the region—as they have for many decades. An ideal resource for students in undergraduate courses on the Middle East and related regions as well as students in graduate programs of international studies or security studies, this textbook anthologizes recent, insightful analyses by top scholars on trends and events in the Middle East that bear crucially on regional and global security considerations, covering topics like Iran's nuclear ambitions; the rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The essays address concerns that include the re-imposition of military rule in Egypt; the current status of Palestinian-Israeli relations; the civil war and proposed chemical inspections in Syria; Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq and the Sunni resurgence in Iraq and Syria; and the on-again-off-again international monitoring of nuclear facilities in Iran, along with discussions of that country's connections to the Syrian regime and Hezbollah in Lebanon. The use of drone strikes as antiterrorist weapons and their use within U.S. and international law also receive specific attention. Each reading is summarized and contextualized by a concise introduction that serves to enhance the integration of the individual readings across the book. Original source notes are included with each chapter as guides to further reading, and numerous maps provide an essential sense of place. The book also includes a glossary of terms and a register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed
Why is the problem of terrorism—and the emergence of more extreme and more brutal terrorist groups—one that cannot be solved, even after decades of trying? This book, authored by a United Nations Ambassador once imprisoned and tortured in Iraq, diagnoses the shortcomings of present counter-terrorism strategies and lays out an effective new plan for counterterrorism. The world has up to now failed to stop Al Qaeda terrorist attacks and also failed to stop the emergence of more extreme and more brutal terrorist groups than Al Qaeda, such as ISIS/ISIL, as well as newer lone wolf terrorists. Current strategies of counterterrorism have many shortcomings that allow terrorists to continue their operations. A New Counterterrorism Strategy: Why the World Failed to Stop Al Qaeda and ISIS/ISIL, and How to Defeat Terrorists identifies the shortcomings of present approaches and presents a comprehensive and sustainable strategy to combat terrorism. Author Ambassador T. Hamid Al-Bayati, an Iraqi politician, offers a unique insider's perspective about the war on terrorism. As a leader of the opposition against the terrorist regime of Saddam Hussein, he was arrested and tortured, until he fled Iraq. From the UK, he continued involvement in unfolding political events, until returning to Iraq and assuming high political appointments. These special insights are interwoven with accounts of detailed interactions and policies that provide the background for his explanation of the failures of counterterrorism strategies to date, and lessons learned from those mistakes. Al-Bayati spotlights the problems of terrorist cells, lone wolves, and foreign fighters developing in all parts of the world, where members work from safe havens to plan attacks, acquire weapons, and gain fighting experience. His proposed strategy further emphasizes issues neglected in current counterterrorism strategies, such as undermining the ideology of terrorists, interrupting their use of the Internet to promote evil, understanding the motivations and psychology of terrorists, deterring youth from joining ISIS, creating effective media campaigns against terrorism, and shutting off the flow of funding that currently buoys the financial resources of terrorist organizations.
Conceptualizing Terrorism argues that, in the post 9/11 world, the need for an internationally agreed definition of terrorism is more important than it has ever been, despite the challenges that such an endeavour presents. Indeed, in a global context, where the term is often applied selectively and pejoratively according to where one's interests lie, there is a real need to instill some analytical quality into the concept of terrorism, not least in order to prevent the term being manipulated to justify all manner of counter-terrorism responses. Not only is this important for the policymaking context but it is also an imperative task within academia - in order to strengthen the theoretical foundation of terrorism studies, for all other terrorism related theories rest on what one means by terrorism in the first place. Written from an academic perspective, the book explores the prospects for terrorism as an analytical concept. Arguing that the essence of this particular form of political violence lies in its intent to generate a psychological impact beyond the immediate victims, it goes on to propose the adoption of three key preliminary assumptions that have implications for the definitional debate and that it suggests might help to increase the analytical potential of terrorism. The book then considers potential elements of a definition before concluding with its own conceptualization of terrorism.
Inherent Safety at Chemical Sites: Reducing Vulnerability to Accidents and Terrorism Through Green Chemistry highlights the use of green chemistry principles to identify and address serious threats and potential consequences caused by accidental and deliberate industrial chemical releases. Through valuable case studies, the book suggests wholesale replacements of hazardous chemicals with benign and inherently safer, or "greener," materials. More than physical security barriers and plans, such preventative measures better guarantee the safety of industrial employees and nearby residents. This valuable primer begins with an introduction to the concepts of green chemistry and outlines the various ways that a green approach to chemical design, production, and management is not only good for the planet, but also serves to protect people and infrastructure from terrorist acts. Specific examples and case studies are cited to illustrate what has been done to advance this cause, and offer guidance to those decision-makers who similarly aspire to greater safety and security for the people and resources they manage.
The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.
Biosecurity and Bioterrorism, Second Edition, takes a holistic approach to biosecurity, with coverage of pathogens, prevention, and response methodology. It addresses these hazards in the context of vulnerability assessments and the planning strategies government and industry can use to prepare for and respond to such events. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; and Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks.
Incitement to terrorism connects the dots between evil words and evil deeds. Hate precedes terror. History has already taught us that incitement to genocide and to crimes against humanity unchecked will inevitably bring devastation to humankind. Incitement is an affront to the dignity of its victims, and poses a dire threat to all people of good will. However, combating incitement to terrorism poses operational, constitutional and human rights challenges on many fronts, both domestically and internationally. What is incitement? Where should the line be drawn between protected speech and incitement that should be criminalized? Does war change the calculus of what are appropriate and lawful measures to contain and respond to such incitement? And, perhaps most challenging of all, how does social media and the nature of communication and engagement in today's virtual world change or complicate how we think about and can respond to incitement?
|
You may like...
Primer for Data Analytics and Graduate…
Douglas Wolfe, Grant Schneider
Hardcover
R2,441
Discovery Miles 24 410
Analytic Number Theory - In Honor of…
Carl Pomerance, Michael Th Rassias
Hardcover
Designing Sorting Networks - A New…
Sherenaz W. Al-Haj Baddar, Kenneth E. Batcher
Hardcover
R1,397
Discovery Miles 13 970
|