![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
Why was there a deliberate plan to fight the war in Iraq but none to win the peace? This question, which has caused such confusion and consternation among the American public and been the subject of much political wrangling over the past two years, is the focus of Lt. Col. Isaiah Wilson's investigation. Director of the American politics, policy, and strategy program at West Point, Wilson points to a flaw in the government's definition of when, how, and for what reasons the United States intervenes abroad. It is a paradox in the American way of peace and war, he explains, that harkens back to America's war loss in Vietnam. The dilemma we face today in Iraq, the author says, is the result of a flaw in how we have viewed the war from its inception, and Wilson reminds us that Iraq is just the latest, albeit the most poignant and tragic, case in point. His exploration of this paradox calls for new organizational and operational approaches to America's intervention policy. In challenging current western societal military lexicon and doctrine, Wilson offers new hope and practical solutions to overcome the paradox once and for all.
This book explores the rise and impact of violent non-state actors in contemporary Africa and the implications for the sovereignty and security of African states. Each chapter tackles a unique angle on violent organizations on the continent with the view of highlighting the conditions that lead to the rise and radicalization of these groups. The chapters further examine the ways in which governments have responded to the challenge and the national, regional and international strategies that they have adopted as a result. Chapter contributors to this volume examine the emergence of Islamist terrorists in Nigeria, Mali and Libya; rebels in DR Congo, Central African Republic, Ethiopia and Rwanda; and warlords and pirates in Somalia, Uganda and Sierra Leone.
The book addresses security threats and challenges to the European Union emanating from its eastern neighbourhood. The volume includes the expertise of policy and scholarly contributors coming from North America, Russia and Central Asia, and from across the EU. Themes and issues include the EU's capacities and actorness, support from the United States, challenges from Russia, and a range of case studies including Ukraine, other post-Soviet conflicts, the Kurdish question, Central Asia, and terrorism and counter-terrorism. Authors identify current threats and place these challenges into necessary historical context. They offer long-term recommendations for actionable goals to achieve greater stability in this complex and volatile region. This work is explanatory and long-lasting, and will engage readers in the limits and possibilities of the EU in a challenging era and in its most vital and demanding geographic arena.
Nuclear Insecurity is an insider's account of official American efforts to prevent the theft or diversion of nuclear and radiological weapons that could be used by rogue nations or terrorist groups. This perspective draws heavily from the author's work on the White House National Security Council Staff (1996-2000), where he was directly responsible to President Clinton for the development of U.S. nuclear material security policies and, subsequently, at the U.S. Department of Energy, where he directed the department's largest international nuclear security program, focused primarily on Russia. In Caravelli's assessment, despite exceptional bipartisan political support and very high funding levels that have reached over $9 billion, a series of policy mistakes and programmatic bureaucratic missteps have badly compromised the United States government's efforts to protect against the spread of nuclear weapons and materials. The most striking example of the current situation is that the U.S. government, some 12 years after the start of these programs, still has failed to enhance the security of more than 300 metric tons of nuclear materials in Russia alone, enough to make hundreds of nuclear devices. The book concludes with recommendations and policy prescriptions for addressing some of these problems.
This is a collection of interdisciplinary essays that examines the historical, political, and social significance of 9/11. This collection considers 9/11 as an event situated within the much larger historical context of late late-capitalism, a paradoxical time in which American and capitalist hegemony exist as pervasive and yet under precarious circumstances. Contributors to this collection examine the ways in which 9/11 changed both everything and, at the same time, nothing at all. They likewise examine the implications of 9/11 through a variety of different media and art forms including literature, film, television, and street art.
This timely book offers a world history of insurgencies and of counterinsurgency warfare. Jeremy Black moves beyond the conventional Western-centric narrative, arguing that it is crucial to ground contemporary experiences in Afghanistan and Iraq in a global framework. Unlike other studies that begin with the American and French revolutions, this book reaches back to antiquity to trace the pre-modern origins of war within states. Interweaving thematic and chronological narratives, Black probes the enduring linkages between beliefs, events, and people on the one hand and changes over time on the other hand. He shows the extent to which power politics, technologies, and ideologies have evolved, creating new parameters and paradigms that have framed both governmental and public views. Tracing insurgencies ranging from China to Africa to Latin America, Black highlights the widely differing military and political dimensions of each conflict. He weighs how, and why, lessons were "learned" or, rather, asserted, in both insurgency and counterinsurgency warfare. At every stage, he considers lessons learned by contemporaries, the ways in which norms developed within militaries and societies, and their impact on doctrine and policy. His sweeping study of insurrectionary warfare and its counterinsurgency counterpart will be essential reading for all students of military history.
From wiretapping American citizens to waterboarding foreign prisoners, the Bush administration has triggered an uproar over its tactics in the War on Terror-and over its justifications for using them. Through a close study of the legal advice provided to President Bush, former Justice Department attorney Harold Bruff provides an incisive and scathing critique of those justifications, which he finds at odds with both American law and moral authority. Bruff rigorously examines legal opinions regarding NSA surveillance, the indefinite detention of terror suspects, the denial of Geneva Convention protection, trial by military commissions, and suspect interrogation techniques. He shows that Bush's claims of executive power exceed anything found in U.S. history or judicial precedent, that clear statutory limitations were treated with contempt, and that Bush and his lawyers strove to exclude both congressional and judicial participation in setting antiterrorist policy. Bruff dissects the legal underpinnings employed by John Yoo, David Addington, Alberto Gonzales, and others to defend an inflated view of presidential power, showing how they combined ideology, policy advocacy, and selective readings of legal precedent to bolster executive actions. Most important, he brings into sharp focus legitimate counterarguments from the State Department, the Pentagon, and the Office of Legal Counsel that challenged or refuted these legally suspect views and yet were largely ignored or even ridiculed by the president's advisers. Offering contrasts with the legal advice provided previous presidents, he also reviews the fundamental constitutional limits on executive action and the principles of professional responsibility that govern lawyers when they counsel government clients. As Bruff observes, bad advice to presidents is never in short supply, but legal advice should be objective and reliable. His book points up the urgent need for advisers to serve both the president and the nation by finding a middle ground between limiting presidential power and allowing it the flexibility it needs to respond to crises. Both highly readable and authoritative, it is a must for legal scholars and an eye-opener for every citizen concerned with preserving our nation's commitment to the rule of law.
This book places the current wave of religion-based terrorism in a historical perspective, explaining why religion is associated with terrorism, comparing religion-based terrorism to other forms of terrorism, and documenting how religion-based terrorism is a product of powerful political, socioeconomic, and psychological forces. Religion-based terrorism is perceived as one of the most significant threats to U.S. homeland security in the 21st century. Sacred Terror: How Faith Becomes Lethal makes the central argument that religion-based violence and terrorism is primarily a result of political, socioeconomic, and psychological forces, thereby demystifying religion-based terrorism and revealing its inherent similarity to other forms of terrorism and war. Daniel Price examines religious texts and traditions in Judaism, Christianity, and Islam; looks at the history of religion-based terrorism; and explores why religion facilitates violence. He builds upon this foundation to explain how religion as an ideological force that motivates violence is not as powerful as commonly believed, and that religious fervor is not unlike other non-religious ideologies such as Marxism, nationalism, and anarchism. The work also presents in-depth analysis of the political, socioeconomic, and psychological forces that are behind religion-based violence, and discusses case studies from multiple religions that illustrate the author's argument.
Suicide bombers are often compared to "smart bombs." From the point of view of their dispatchers, they are highly effective, inexpensive forms of weaponry, and there is no need to invest in their technological development. Suicide bombers are in fact smarter than smart bombs because they can choose their own target--and they can react to circumstances on the ground, changing their target, or their timing, in an instant, to ensure the maximum damage, destruction, and death. Of course, unlike smart bombs, suicide bombers think and feel, they have histories, stories, beliefs, desires--in short, they have an inner world. Exploring the inner world of suicide bombers has been the focus of Anat Berko's research for years. She has worked to understand the thought processes of a people who can choose to place explosives on their bodies and kill themselves, taking as many other people with them as they can. Do male bombers really believe that death will transport them to a paradise where they will be greeted by virgins? Are they victims of unbearable pressure to commit this act of terror? What are female bombers promised in the hereafter? Is there something that links all suicide bombers? Berko also explores the world of those who "drop the smart bomb"--the dispatchers: who are these people who persuade others to go calmly to their horrific deaths? To learn about the inner world of suicide bombers and their dispatchers, Berko entered Israel's most heavily secured prison cells and conducted intensive and extensive interviews with male and female suicide bombers who had failed their missions, as well as with their dispatchers--including former Hamas spiritual and operative leader Sheikh AhmedYassin (later assassinated by Israel).
Northern Ireland's Belfast Agreement has faced continual crises of implementation over a variety of security related issues. Too frequently analyses have neglected to study the wider changes that have occurred inside and outside Northern Ireland. These have had profound effects in changing attitudes towards violence, paramilitaries, the position of women and ideas of nationalism and sovereignty. This book places the implementation of the Belfast Agreement in a wider context to provide an analysis of why implementation has been so difficult.
"Essential reading for those in the biosciences, government and learned societies. It poses fundamental questions about undertaking science today" - Dr. Chris Langley, Aston University The objectives of the papers included in this NATO volume were to critically consider the science and technology policies necessary for defence against terrorism and other threats to security; to assess the priorities for governments, universities, national laboratories and industrial firms; to identify how governments and the science and technology community can most effectively work together to enhance our security; and to share the experiences of policy makers and policy analysts. The importance and relevance of this selection of papers to the policy community is reflected in the seniority of the contributors. These included Dr. Parney Albright who held the position of Assistant Secretary for Science & Technology at the US Department of Homeland Security as well as senior figures from the UK Home Office, UK Office of Science & Technology, the European Commission and NATO.
"An excellent analysis of the complex dynamics of inclusion in post-conflict societies: theoretically grounded, empirically rich, and with a well-informed set of policy-relevant insights and recommendations with implications far beyond the cases of Kosovo and Northern Ireland."Stefan Wolff, University of Birmingham, UK "Does the promotion of political accommodation between the contending parties in an ethno-nationalist conflict disadvantage other groups in society? This important question is at the heart of Michael Potter's nuanced study of post-settlement parliaments in Kosovo and Northern Ireland, in which he probes their record of representativeness, focusing on gender and ethnicity. His meticulous research, drawing on extensive fieldwork, shows that the domination of the parliaments by parties aligned to the conflict does indeed tend to marginalise other identities. His findings provide plenty of food for thought for practitioners in the field of conflict resolution. In particular, they underline the need for care in the design of institutional arrangements for deeply divided societies, so as to minimise potentially negative consequences that priority for accommodation and reconciliation may have for other issues and for the practice of inclusion."Adrian Guelke, Queen's University Belfast, UK "Identity is a central organising principle of politics in the 21st century. In this impressive book Michael Potter shows that a focus on gender and minority ethnic identities in newly-formed post-conflict assemblies provides a unique litmus test of the robustness of democratic politics. He analyses the cases of Kosovo and Northern Ireland with rigour and considerable insight. This book makes a highly original and lasting contribution to theory and practice in post-conflict settings world-wide."Yvonne Galligan, Dublin Institute of Technology, Ireland This book examines inclusion in post-conflict legislatures, using Northern Ireland and Kosovo as case studies and gender and minority ethnicity as indicators. The analysis uses an adapted framework developed by Yvonne Galligan and Sara Clavero to measure inclusion across a range of factors associated with deliberative democratic principles. The logic is that political systems designed to accommodate communities in conflict will prioritise certain identities over others. The aim of the book is to investigate how identities not directly associated with a conflict fare in a political system designed to manage identities in conflict. The book looks comparatively at the conflicts in Kosovo and Northern Ireland, then discusses approaches to conflict management, describing how political institutions were designed in those contexts. The themes of women and minority identities in those conflicts are then explored with a view to examining the extent of inclusion in the Northern Ireland and Kosovo Assemblies.
Women and Terrorism analyses a new phenomenon of international concern: the participation of women in subversive terrorist movements. The book deals with four main issues: 1) women's participation in violent terrorist movements to discover the key to the psychological and sociological interpretation of their involvement in a life experience they are not traditionally associated with; 2) the different responses to 'penitentism' between men and women; 3) the psychological and social interpretation of women's support of armed struggle and an inquiry - through the personal experience of the women terrorists interviewed - into the reasons for women's greater resistance to repentance; 4) the use of the leads this inquiry has furnished for prognostic purposes and to predict and create conditions that facilitate repentance.
This comprehensive account examines the East Turkistan Islamic Movement (ETIM)-the most significant Muslim militant group in China-including its origins, objectives, ideology, leadership, and tactics. To effectively engage China on counterterrorism issues, we must understand the capabilities and intentions of the East Turkistan Islamic Movement (ETIM), the most significant Muslim militant group in China. The ETIM: China's Islamic Militants and the Global Terrorist Threat is the first book to focus specifically on the ETIM, a terrorist group that demands an independent Muslim state for the Uyghur ethnic minority in northwest China. This fascinating study offers a comprehensive account of the group's origins, objectives, ideology, leadership, and tactics. It details the historical and contemporary contexts of the Uyghur separatist movement, the ETIM's alleged ties to international terrorist networks, and the Chinese government's interest in promoting the ETIM as a significant international problem. In addition, the book addresses conflicting claims about the membership and viability of the organization, noting where the Chinese government has apparently manipulated information about the ETIM to suit its own goals. A final chapter explores how various countries define ETIM activities and what that means for relations with China. Includes press releases issued by the Chinese government on violent Uyghur separatism and presents timelines of the ETIM's attacks and other activities and of major events in the history of Uyghur separatism Offers a bibliography that compiles scholarly and news sources pertaining to the ETIM and provides glossary of key terms derived from the Chinese, Uyghur, and English languages
This book examines memories of political violence in Chile after the 1973 coup and a 17-years-long dictatorship. Based on individual and group interviews, it focuses on the second generation children, adults today, born to parents who were opponents of Pinochets regime. Focusing on their lived experience, the intersection between private and public realms during Pinochet's politics of fear regime, and the afterlife of violence in the post-dictatorship, the book is concerned with new dilemmas and perspectives that stem from the intergenerational transmission of political memories. It reflects critically on the role of family memories in the broader field of memory in Chile, demonstrating the dynamics of how later generations appropriate and inhabit their family political legacies. The book suggests how the second generation cultural memory redefines the concept of victimhood and propels society into a broader process of recognition.
The Ulster Volunteer Force (UVF) was established in January 1913, as a militant expression of Ulster Unionist opposition to the Third Home Rule Bill. It built on the foundations of pre-existing paramilitary activity and, at its height in early 1914, reached a strength of 100,000. During the Great War the UVF provided the basis of the 36th (Ulster) Division and in 1920 the force was partially reformed to counter the I.R.A. threat to the new Northern Ireland state. Academic historians have tended to overlook Ulster Loyalism. This book provides the first comprehensive study of the UVF in this period considering in detail the composition of the officer corps, the marked regional recruiting differences, the ideologies involved, the arming and equipping of the UVF and the contingency plans made by UVF Headquarters in the event of Home Rule being imposed on Ulster. Using previously neglected sources, Timothy Bowman demonstrates that the UVF was better armed and worse trained, with the involvement of fewer British army officers than previous historians have allowed. He suggests that the UVF was quite capable of seizing control of Ulster and installing the Ulster Provisional Government in the event of Home Rule being implemented in 1914, but provided few benefits to the 36th (Ulster) Division and failed to reform in any meaningful way in 1920. This book will be essential reading for military and Irish historians and their students, and will interest any general reader interested in modern paramilitary forces.
Part I is a compendium of World War II service recollections embracing the unusual, bizarre and humorous, most of which never appeared in the news or any publications. However, I do believe readers will be very interested in the other side of war. Part II is an incisive review of Vietnam, and why we failed or should never have been involved militarily. Part III is a current analysis of terrorism and the Iraq war, including a new proposal to address the global aspects of terrorism and the Palestinian issue.
This book assesses the effectiveness of Nigeria's counterterrorist policies against Boko Haram. It takes a critical review of the interventionist strategies adopted by the Nigerian government, highlights the motivations behind the choice of strategies, and proffers a deeper understanding of the factors responsible for the state's inability, thus far, to rid the country of terrorism. Specifically, it evaluates the NACTEST policy framework that guides the Nigerian state's counterterrorist strategies, which contains both hard and soft power approaches. Adopting historical and case study approaches which put the Nigerian state and occurrences of violent conflict in context, it takes cognizance of the politics of ethno-religious diversity which reinforce violent conflicts among groups and against the state, and reviews the socio-economic and political realities that led to the emergence and sustenance of Boko Haram. The volume concludes by suggesting practical policy options for combating Boko Haram and other similar armed insurrection. This book is appropriate for researchers and students interested in African politics, conflict, security, peace studies, terrorism, and counterterrorism, as well as policy makers and government departments dealing with terrorism and counterterrorism.
Without sensationalizing or providing the technical details that would result in a terrorist's handbook, the volume reflects the concerns expressed by experts from 12 states (including many from Slavic regions adjoining or aspiring to membership of the European Union). A range of vulnerabilities are highlighted that are usually neglected. Assessments that focus on the horrifying potential of bioterrorism directly targeting people are commonplace. This book is exceptional because indirect impacts on human health and welfare through challenge to the security of food supplies are the focus. These urgently need to be recognised and made subjects of planned investment to counter the threat. Examples of past state-sponsored and independent actions are discussed. The evolution of biological (chemical defoliant) systems for controlling plant growth with unambiguously humanitarian aims is shown to have resulted in a range of counter terrorist uses.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased and new nuclear powers (e.g. Iran, Korea, Pakistan and India) have further complicated global proliferation issues. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered. In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the 2005 Workshop and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outline the role of legal, policy and institutional frameworks in countering nuclear/radiological terrorism. One key outcome of this book is better understanding of the independent contributions from across the international community of the scientific and technological components and the legal, policy and institutional components to combating nuclear/radiological terrorism. The book can serve as a tool for communicating the outcomes of the workshop not only to the multi-national scientific communities engaged in combating nuclear/radiological terrorism, but also to those working at governmental and policy levels whose actions affect the directionsscience takes and how the technology is incorporated into country-specific national systems for combating nuclear/radiological terrorism.
What changes have the terrorist attacks on the United States in 2001 and the subsequent attacks in Europe brought to Western societies? In what ways have these events and their aftermath impacted on the relationships between Muslim communities and Western societies? This book explores the remaking of the relationship between Islam and Islamism, on the one hand, and security and securitization, on the other hand, by arguing that 9/11 and its aftermath have led to the opening of a new phase in Western and European history and have remade the relationship between Islam and governmental and societal approaches to security. The authors utilize case studies across the Western world to understand this relationship.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
Immigration and its consequences is a substantially contested subject with hugely differing viewpoints. While some contend that criminal participation by migrants is the result of environmental factors found in the host country that are beyond the control of migrants, others blame migrants for all that is wrong in their communities. In this book, experts from Europe, the USA, Turkey and Israel examine recent developments in the fields of culture conflict, organized crime, victimization and terrorism, all of which intersect to varying degrees with migration and illegal conduct. While the essays further our understanding of a variety of issues surrounding migration, at the same time they illuminate the complexities of managing the challenges as globalization increases.
This book carefully and thoroughly analyses the legal questions raised by the phenomenon of terrorism, and past and recent efforts to fight it, from the perspective of international humanitarian law (IHL). The objective is to substantially contribute to a better understanding of the issues surrounding the content and applicability of IHL as it applies to terrorism as well as to analyse and contextualise the current debates on these controversial and critically important questions. While due heed is paid to doctrinal debates, particular emphasis is placed on the practice of social actors, particularly, although not exclusively, States. The analysis of their actual conduct as well as their expectations about the interpretation and application of the law is crucial to establishing an interpretive consensus on when and how IHL is relevant to regulate acts of terrorism. The approach of the book is analytical and discursive, rather than prescriptive. Thus the reader will find the relevant rules of IHL and other legal regimes as regards terrorism, but also the debates over their application, the contradictions in State practice and the impact these may have upon IHL's evolution and implementation. The aim is to provide legal practitioners, as well as those in military, political and academic circles, with a useful reference point. Hopefully the book will also prove useful to other readers who will find its content and easy-to-read style an encouragement to getting acquainted with a topical subject, traditionally thought to be reserved for legal specialists. This book was cited with approval by the US Court of Appeals in Salim Ahmed Hamdan v United States of America, 16th October 2012 |
![]() ![]() You may like...
Collaboration in the Digital Age - How…
Kai Riemer, Stefan Schellhammer, …
Hardcover
R5,253
Discovery Miles 52 530
Successful Social Media and Ecommerce…
Gergely Sznolnoki, Liz Thach, …
Hardcover
R1,890
Discovery Miles 18 900
|