|
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
Biosecurity and Bioterrorism, Second Edition, takes a holistic
approach to biosecurity, with coverage of pathogens, prevention,
and response methodology. It addresses these hazards in the context
of vulnerability assessments and the planning strategies government
and industry can use to prepare for and respond to such events. The
book is organized into four thematic sections: Part I provides a
conceptual understanding of biowarfare, bioterrorism and the laws
we have to counteract this; Part II investigates known bioagents
and the threat from emerging diseases; Part III focuses on
agricultural terrorism and food security; and Part IV outlines
international, US, and local initiatives for biodefense and
biosecurity. Case studies illustrate biodefense against both
intentional terrorism and natural outbreaks.
Incitement to terrorism connects the dots between evil words and
evil deeds. Hate precedes terror. History has already taught us
that incitement to genocide and to crimes against humanity
unchecked will inevitably bring devastation to humankind.
Incitement is an affront to the dignity of its victims, and poses a
dire threat to all people of good will. However, combating
incitement to terrorism poses operational, constitutional and human
rights challenges on many fronts, both domestically and
internationally. What is incitement? Where should the line be drawn
between protected speech and incitement that should be
criminalized? Does war change the calculus of what are appropriate
and lawful measures to contain and respond to such incitement? And,
perhaps most challenging of all, how does social media and the
nature of communication and engagement in today's virtual world
change or complicate how we think about and can respond to
incitement?
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
As concerns about human treatment of the environment and animals
have increased over the years, so have decentralized and extremist
groups related to these causes. Environmental and Animal Rights
Extremism, Terrorism, and National Security analyzes the
international development of radical movements relating to
environmental concerns and animal rights in the context of the
threats they pose to national security. In addition to tracing the
factors responsible for the rapid growth of these movements over
the last 25 years, this text presents countermeasures that
governments can deploy to neutralize the risk posed by these
threats now and in the future. Bringing to bear new developments
such as cyber activity and online activism, Environmental and
Animal Rights Extremism, Terrorism, and National Security offers an
examination of the direct and indirect violence, lone-wolf
terrorism, and leaderless resistance that have characterized these
radical wings from their inception. By not only identifying the
tactics and organizational structures often employed by these
groups, but also addressing future trends toward increased
radicalization, Environmental and Animal Rights Extremism,
Terrorism, and National Security is an important resource for
identifying, anticipating, and mitigating threats posed by such
movements.
This combination A-Z encyclopedia and primary document collection
provides an authoritative and enlightening overview of U.S. anti-
and counterterrorism politics, policies, attitudes, and actions
related to both foreign and domestic threats, with a special
emphasis on post-9/11 events. This book provides a compelling
overview of U.S. laws, policies, programs, and actions in the
realms of anti- and counterterrorism, as well as comprehensive
coverage of the various domestic and foreign terrorist
organizations threatening America, including their leaders,
ideologies, and practices. These entries are supplemented with a
carefully selected collection of primary sources that track the
evolution of U.S. anti- and counterterrorism policies and political
debate. These documents will not only illuminate major events and
turning points in America's fight against terror-both foreign and
homegrown-but also help readers understand debates about the
effectiveness, morality, and constitutionality of controversial
policies that have either been implemented or proposed, from
waterboarding to targeted assassination to indefinite incarceration
at Guantanamo Bay. In addition, this resource shows how political
controversies over anti- and counterterrorism strategies are
spilling over into other areas of American life, from debates about
privacy rights, government surveillance, and anti-Muslim actions
and beliefs to arguments about whether U.S. firearms policies are a
boon to terrorists. Wide-ranging encyclopedia section featuring
contributions from counterterrorism scholars Primary Document
collection that provides additional illumination on major events,
laws, policies, and trends Authoritative and evenhanded coverage of
counterterrorism threats, issues, events, laws, policies, and
organizations Reader's Guide to entries by subject category
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
Human rights activist and historian Roxanne Dunbar-Ortiz has been
described as ""a force of nature on the page and off."" That force
is fully present in Blood on the Border, the third in her acclaimed
series of memoirs. Seamlessly blending the personal and the
political, Blood on the Border is Dunbar-Ortiz's firsthand account
of the decade-long dirty war pursued by the Contras and the United
States against the people of Nicaragua. With the 1981 bombing of a
Nicaraguan plane in Mexico City - a plane Dunbar-Ortiz herself
would have been on if not for a delay - the US-backed Contras
(short for los contrarrevolucionarios) launched a major offensive
against Nicaragua's Sandinista regime, which the Reagan
administration labeled as communist. While her rich political
analysis of the US-Nicaraguan relationship bears the mark of a
trained historian, Dunbar-Ortiz also writes from her perspective as
an intrepid activist who spent months at a time throughout the
1980s in the war-torn country, especially in the remote
northeastern region, where the Indigenous Miskitu people were
relentlessly assailed and nearly wiped out by CIA-trained Contra
mercenaries. She makes painfully clear the connections between what
many US Americans today remember only vaguely as the Iran-Contra
""affair"" and ongoing US aggression in the Americas, the Middle
East, and around the world - connections made even more explicit in
a new afterword written for this edition. A compelling, important,
and sobering story on its own, Blood on the Border offers a deeply
informed, closely observed, and heartfelt view of history in the
making.
Understand the complexities of the most lethal insurgent group of
America's longest war-the Taliban. Battle hardened, tribally
oriented, and deeply committed to its cause, the Taliban has proven
itself resourceful, adaptable, and often successful. As such, the
Taliban presents a counterinsurgency puzzle for which the United
States has yet to identify effective military tactics, information
operations, and Coalition developmental policies. Written by one of
the Department of the Army's leading intelligence and military
analysts on the Taliban, this book covers the group's complete
history, including its formation, ideology, and political power, as
well as the origins of its current conflict with the United States.
The work carefully analyzes the agenda, capabilities, and support
base of the Taliban; forecasts the group's likely course of action
to retake Afghanistan; and details the Coalition forces' probable
counterinsurgency responses. Author Mark Silinsky also reviews the
successes and failures of the latest U.S. counterinsurgency
doctrine to extrapolate the best strategies for future
counterinsurgency campaigns. Provides insights from an author with
academic training in politics and economics as well as a 30-year
defense intelligence community background, including serving as an
Army analyst in Afghanistan Presents information recently obtained
under the Freedom of Information Act Analyzes the tribal,
religious, political, and international elements of the greater
Taliban problem
Contemporary Military Strategy and the Global War on Terror offers
an in-depth analysis of US/UK military strategy in Afghanistan and
Iraq from 2001 to the present day. It explores the development of
contemporary military strategy in the West in the modern age before
interrogating its application in the Global War on Terror. The book
provides detailed insights into the formulation of military plans
by political and military elites in the United States and United
Kingdom for Operation Enduring Freedom and Operation Iraqi Freedom.
Alastair Finlan highlights the challenges posed by each of these
unique theatres of operation, the nature of the diverse enemies
faced by coalition forces, and the shortcomings in strategic
thinking about these campaigns. This fresh perspective on strategy
in the West and how it has been applied in recent military
campaigns facilitates a deep understanding of how wars have been
and will be fought. Including key terms, concepts and discussion
questions for each chapter, Contemporary Military Strategy and the
Global War on Terror is a crucial text in strategic studies, and
required reading for anyone interested in the new realities of
transnational terrorism and twenty-first century warfare.
Scientists with little or no background in security and security
professionals with little or no background in science and
technology often have difficulty communicating in order to
implement the best counterterrorism strategies. "The Science and
Technology of Counterterrorism" offers the necessary theoretical
foundation to address real-world terrorism scenarios, effectively
bridging the gap. It provides a powerful security assessment
methodology, coupled with counterterrorism strategies that are
applicable to all terrorism attack vectors. These include
biological, chemical, radiological, electromagnetic, explosive, and
electronic or cyber attacks. In addition to rigorous estimates of
threat vulnerabilities and the effectiveness of risk mitigation, it
provides meaningful terrorism risk metrics.
"The Science and Technology of Counterterrorism" teaches the
reader how to think about terrorism risk, and evaluates terrorism
scenarios and counterterrorism technologies with sophistication
punctuated by humor. Both students and security professionalswill
significantly benefit from the risk assessment methodologies and
guidance on appropriate counterterrorism measures contained within
this book.
Offers a simple but effective analytic framework to assess
counterterrorism risk and realistic measures to address
threatsProvides the essential scientific principles and tools
required for this analysisExplores the increasingly important
relationship between physical and electronic risk in meaningful
technical detailEvaluates technical security systems to illustrate
specific risks using concrete examples
"
Osama bin Laden is dead but al-Qa'ida remains the CIA's 'number one
threat'. With branches in strategic hotspots from Yemen and Somalia
to North Africa and an increasing influence among 'home grown
jihadis' in the West, journalist and al-Qa'ida expert Abdel Bari
Atwan investigates how the organisation has survived all attempts
to destroy it. Al-Qa'ida after bin Laden has expanded its reach by
cementing new alliances and exploiting the opportunities regional
turmoil affords. The Arab Spring has opened new battlegrounds for
jihadists, particularly in Libya, the Sahel, Syria and Egypt. As
the extremist zeal for a global caliphate shows no sign of abating,
Atwan profiles the next generation of foot soldiers and leaders and
explores the new methods they embrace in the pursuit of jihad in a
digital age.
Counterterrorism: Mission Critical Skills helps current and future
counterterrorism specialists develop skills that are vital for
their professional success. The book provides readers with a
well-researched argument as to why a particular set of soft skills
are indispensable to counterterrorism specialists. It underscores
the need for best practices and proficiencies among the extensive
network of agencies and entities that fight terrorism. The opening
chapter explores the various counterterrorism entities in the
United States, highlighting their interconnectedness and
illuminating the need for entities to work collaboratively toward a
shared goal. Each of the remaining chapters profile a
mission-critical soft skill and offer learning demands for
guidance, first-person quotes from professional counterterrorism
experts, and operational vignettes to demonstrate the importance of
each skill. The skills presented include teamwork, imagination,
strategic consciousness, cultural mindfulness, discernment,
empathy, mutuality, and operational adaptability. Counterterrorism
equips readers with the soft skills that, when paired with the hard
skills counterterrorism specialists are required to learn, will
help them develop into highly capable, well-rounded, and efficient
counterterrorism professionals.
Rooted in feminist ethnography and decolonial feminist theory, this
book explores the subjectivity of Palestinian hunger strikers in
Israeli prisons, as shaped by resistance. Ashjan Ajour examines how
these prisoners use their bodies in anti-colonial resistance; what
determines this mode of radical struggle; the meanings they ascribe
to their actions; and how they constitute their subjectivity while
undergoing extreme bodily pain and starvation. These hunger
strikes, which embody decolonisation and liberation politics, frame
the post-Oslo period in the wake of the decline of the national
struggle against settler-colonialism and the fragmentation of the
Palestinian movement. Providing narrative and analytical insights
into embodied resistance and tracing the formation of revolutionary
subjectivity, the book sheds light on the participants' views of
the hunger strike, as they move beyond customary understandings of
the political into the realm of the 'spiritualisation' of struggle.
Drawing on Foucault's conception of the technologies of the self,
Fanon's writings on anti-colonial violence, and Badiou's militant
philosophy, Ajour problematises these concepts from the vantage
point of the Palestinian hunger strike.
Now updated and expanded for its second edition, this book
investigates the role intelligence plays in maintaining homeland
security and emphasizes that effective intelligence collection and
analysis are central to reliable homeland security. The first
edition of Homeland Security and Intelligence was the go-to text
for a comprehensive and clear introduction to U.S intelligence and
homeland security issues, covering all major aspects including
analysis, military intelligence, terrorism, emergency response,
oversight, and domestic intelligence. This fully revised and
updated edition adds eight new chapters to expand the coverage to
topics such as recent developments in cyber security, drones, lone
wolf radicalization, whistleblowers, the U.S. Coast Guard, border
security, private security firms, and the role of first responders
in homeland security. This volume offers contributions from a range
of scholars and professionals from organizations such as the
Department of Homeland Security, the Center for Homeland Defense
and Security at the Naval Postgraduate School, the National
Intelligence University, the Air Force Academy, and the
Counterterrorism Division at the Federal Law Enforcement Training
Center. This breadth of unique and informed perspectives brings a
broad range of experience to the topic, enabling readers to gain a
critical understanding of the intelligence process as a whole and
to grasp what needs to happen to strengthen these various systems.
The book presents a brief history of intelligence in the United
States that addresses past and current structures of the
intelligence community. Recent efforts to improve
information-sharing among the federal, state, local, and private
sectors are considered, and the critical concern regarding whether
the intelligence community is working as intended-and whether there
is an effective system of checks and balances to govern it-is
raised. The book concludes by identifying the issues that should be
addressed in order to better safeguard our nation in the future.
Addresses the most recent changes in homeland security and
intelligence, explains the dynamics and structure of the
intelligence community, and assesses the effectiveness of new
intelligence processes Focuses on the evolving structure of the
intelligence community and its processes in the age of ISIS and
organized, widespread terrorist threats as witnessed by the events
in Boston, San Bernardino, and Paris Contains seven new chapters as
well as revisions and updates throughout this second edition
Underscores how intelligence can work-and needs to function-across
homeland security efforts at the federal, state, and local levels
Soldier Magazine's Book of the Month Fascinating... Incredibly
dangerous. The Times Gripping. Adrenalin fuelled true-life account
with all the makings of a military thriller. The action unfolds
like a Le Carre novel. Soldier Magazine 'Jihad isn't a war. It's an
objective. An aberration. If there are young women with children,
lost boys... If they are trapped in that hell and we can get them
out, don't we have a duty to do so? Every person we can bring back
is living proof that Islamic State is a failure.' Ex-British Army
soldier John Carney was running a close protection operation for
oil executives in Iraq when the family of a young Dutch woman asked
him to extract her from the collapsing 'Islamic State' in Syria.
Hearing first-hand about the naive young girls, many from the West,
who'd been tricked, sexually abused and enslaved by ISIS, he knew
only one thing - he had to get them out of that living hell. This
is the incredible true story of how - armed with AK-47s and 9mm
Glocks - Carney launched a daring, dangerous and deadly operation
to free as many of them as he could. From 2016 to 2019, he led his
small band of committed Kurdish freedom fighters into the heart of
the Syrian lead storm. Backed by humanitarian NGOs, and feeding
intel to MI6, Carney and his men went behind enemy lines to deliver
the women and their children to the authorities, to
deradicalization programmes and fair trials. Carney, a born
soldier, was moved to action by the women's terrifying stories. He
and his men risked their lives daily, not always making it safely
home... Gripping, shocking and thought-provoking, Operation Jihadi
Bride tackles the complex issue of the jihadi brides head on - an
essential read for our troubled times.
|
|