![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
Biosecurity and Bioterrorism, Second Edition, takes a holistic approach to biosecurity, with coverage of pathogens, prevention, and response methodology. It addresses these hazards in the context of vulnerability assessments and the planning strategies government and industry can use to prepare for and respond to such events. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; and Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks.
Incitement to terrorism connects the dots between evil words and evil deeds. Hate precedes terror. History has already taught us that incitement to genocide and to crimes against humanity unchecked will inevitably bring devastation to humankind. Incitement is an affront to the dignity of its victims, and poses a dire threat to all people of good will. However, combating incitement to terrorism poses operational, constitutional and human rights challenges on many fronts, both domestically and internationally. What is incitement? Where should the line be drawn between protected speech and incitement that should be criminalized? Does war change the calculus of what are appropriate and lawful measures to contain and respond to such incitement? And, perhaps most challenging of all, how does social media and the nature of communication and engagement in today's virtual world change or complicate how we think about and can respond to incitement?
As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.
As concerns about human treatment of the environment and animals have increased over the years, so have decentralized and extremist groups related to these causes. Environmental and Animal Rights Extremism, Terrorism, and National Security analyzes the international development of radical movements relating to environmental concerns and animal rights in the context of the threats they pose to national security. In addition to tracing the factors responsible for the rapid growth of these movements over the last 25 years, this text presents countermeasures that governments can deploy to neutralize the risk posed by these threats now and in the future. Bringing to bear new developments such as cyber activity and online activism, Environmental and Animal Rights Extremism, Terrorism, and National Security offers an examination of the direct and indirect violence, lone-wolf terrorism, and leaderless resistance that have characterized these radical wings from their inception. By not only identifying the tactics and organizational structures often employed by these groups, but also addressing future trends toward increased radicalization, Environmental and Animal Rights Extremism, Terrorism, and National Security is an important resource for identifying, anticipating, and mitigating threats posed by such movements.
This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counterterrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events. This book provides a compelling overview of U.S. laws, policies, programs, and actions in the realms of anti- and counterterrorism, as well as comprehensive coverage of the various domestic and foreign terrorist organizations threatening America, including their leaders, ideologies, and practices. These entries are supplemented with a carefully selected collection of primary sources that track the evolution of U.S. anti- and counterterrorism policies and political debate. These documents will not only illuminate major events and turning points in America's fight against terror-both foreign and homegrown-but also help readers understand debates about the effectiveness, morality, and constitutionality of controversial policies that have either been implemented or proposed, from waterboarding to targeted assassination to indefinite incarceration at Guantanamo Bay. In addition, this resource shows how political controversies over anti- and counterterrorism strategies are spilling over into other areas of American life, from debates about privacy rights, government surveillance, and anti-Muslim actions and beliefs to arguments about whether U.S. firearms policies are a boon to terrorists. Wide-ranging encyclopedia section featuring contributions from counterterrorism scholars Primary Document collection that provides additional illumination on major events, laws, policies, and trends Authoritative and evenhanded coverage of counterterrorism threats, issues, events, laws, policies, and organizations Reader's Guide to entries by subject category
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security
Human rights activist and historian Roxanne Dunbar-Ortiz has been described as ""a force of nature on the page and off."" That force is fully present in Blood on the Border, the third in her acclaimed series of memoirs. Seamlessly blending the personal and the political, Blood on the Border is Dunbar-Ortiz's firsthand account of the decade-long dirty war pursued by the Contras and the United States against the people of Nicaragua. With the 1981 bombing of a Nicaraguan plane in Mexico City - a plane Dunbar-Ortiz herself would have been on if not for a delay - the US-backed Contras (short for los contrarrevolucionarios) launched a major offensive against Nicaragua's Sandinista regime, which the Reagan administration labeled as communist. While her rich political analysis of the US-Nicaraguan relationship bears the mark of a trained historian, Dunbar-Ortiz also writes from her perspective as an intrepid activist who spent months at a time throughout the 1980s in the war-torn country, especially in the remote northeastern region, where the Indigenous Miskitu people were relentlessly assailed and nearly wiped out by CIA-trained Contra mercenaries. She makes painfully clear the connections between what many US Americans today remember only vaguely as the Iran-Contra ""affair"" and ongoing US aggression in the Americas, the Middle East, and around the world - connections made even more explicit in a new afterword written for this edition. A compelling, important, and sobering story on its own, Blood on the Border offers a deeply informed, closely observed, and heartfelt view of history in the making.
Understand the complexities of the most lethal insurgent group of America's longest war-the Taliban. Battle hardened, tribally oriented, and deeply committed to its cause, the Taliban has proven itself resourceful, adaptable, and often successful. As such, the Taliban presents a counterinsurgency puzzle for which the United States has yet to identify effective military tactics, information operations, and Coalition developmental policies. Written by one of the Department of the Army's leading intelligence and military analysts on the Taliban, this book covers the group's complete history, including its formation, ideology, and political power, as well as the origins of its current conflict with the United States. The work carefully analyzes the agenda, capabilities, and support base of the Taliban; forecasts the group's likely course of action to retake Afghanistan; and details the Coalition forces' probable counterinsurgency responses. Author Mark Silinsky also reviews the successes and failures of the latest U.S. counterinsurgency doctrine to extrapolate the best strategies for future counterinsurgency campaigns. Provides insights from an author with academic training in politics and economics as well as a 30-year defense intelligence community background, including serving as an Army analyst in Afghanistan Presents information recently obtained under the Freedom of Information Act Analyzes the tribal, religious, political, and international elements of the greater Taliban problem
Contemporary Military Strategy and the Global War on Terror offers an in-depth analysis of US/UK military strategy in Afghanistan and Iraq from 2001 to the present day. It explores the development of contemporary military strategy in the West in the modern age before interrogating its application in the Global War on Terror. The book provides detailed insights into the formulation of military plans by political and military elites in the United States and United Kingdom for Operation Enduring Freedom and Operation Iraqi Freedom. Alastair Finlan highlights the challenges posed by each of these unique theatres of operation, the nature of the diverse enemies faced by coalition forces, and the shortcomings in strategic thinking about these campaigns. This fresh perspective on strategy in the West and how it has been applied in recent military campaigns facilitates a deep understanding of how wars have been and will be fought. Including key terms, concepts and discussion questions for each chapter, Contemporary Military Strategy and the Global War on Terror is a crucial text in strategic studies, and required reading for anyone interested in the new realities of transnational terrorism and twenty-first century warfare.
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. "The Science and Technology of Counterterrorism" offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics. "The Science and Technology of Counterterrorism" teaches the
reader how to think about terrorism risk, and evaluates terrorism
scenarios and counterterrorism technologies with sophistication
punctuated by humor. Both students and security professionalswill
significantly benefit from the risk assessment methodologies and
guidance on appropriate counterterrorism measures contained within
this book.
Osama bin Laden is dead but al-Qa'ida remains the CIA's 'number one threat'. With branches in strategic hotspots from Yemen and Somalia to North Africa and an increasing influence among 'home grown jihadis' in the West, journalist and al-Qa'ida expert Abdel Bari Atwan investigates how the organisation has survived all attempts to destroy it. Al-Qa'ida after bin Laden has expanded its reach by cementing new alliances and exploiting the opportunities regional turmoil affords. The Arab Spring has opened new battlegrounds for jihadists, particularly in Libya, the Sahel, Syria and Egypt. As the extremist zeal for a global caliphate shows no sign of abating, Atwan profiles the next generation of foot soldiers and leaders and explores the new methods they embrace in the pursuit of jihad in a digital age.
Counterterrorism: Mission Critical Skills helps current and future counterterrorism specialists develop skills that are vital for their professional success. The book provides readers with a well-researched argument as to why a particular set of soft skills are indispensable to counterterrorism specialists. It underscores the need for best practices and proficiencies among the extensive network of agencies and entities that fight terrorism. The opening chapter explores the various counterterrorism entities in the United States, highlighting their interconnectedness and illuminating the need for entities to work collaboratively toward a shared goal. Each of the remaining chapters profile a mission-critical soft skill and offer learning demands for guidance, first-person quotes from professional counterterrorism experts, and operational vignettes to demonstrate the importance of each skill. The skills presented include teamwork, imagination, strategic consciousness, cultural mindfulness, discernment, empathy, mutuality, and operational adaptability. Counterterrorism equips readers with the soft skills that, when paired with the hard skills counterterrorism specialists are required to learn, will help them develop into highly capable, well-rounded, and efficient counterterrorism professionals.
Rooted in feminist ethnography and decolonial feminist theory, this book explores the subjectivity of Palestinian hunger strikers in Israeli prisons, as shaped by resistance. Ashjan Ajour examines how these prisoners use their bodies in anti-colonial resistance; what determines this mode of radical struggle; the meanings they ascribe to their actions; and how they constitute their subjectivity while undergoing extreme bodily pain and starvation. These hunger strikes, which embody decolonisation and liberation politics, frame the post-Oslo period in the wake of the decline of the national struggle against settler-colonialism and the fragmentation of the Palestinian movement. Providing narrative and analytical insights into embodied resistance and tracing the formation of revolutionary subjectivity, the book sheds light on the participants' views of the hunger strike, as they move beyond customary understandings of the political into the realm of the 'spiritualisation' of struggle. Drawing on Foucault's conception of the technologies of the self, Fanon's writings on anti-colonial violence, and Badiou's militant philosophy, Ajour problematises these concepts from the vantage point of the Palestinian hunger strike.
Now updated and expanded for its second edition, this book investigates the role intelligence plays in maintaining homeland security and emphasizes that effective intelligence collection and analysis are central to reliable homeland security. The first edition of Homeland Security and Intelligence was the go-to text for a comprehensive and clear introduction to U.S intelligence and homeland security issues, covering all major aspects including analysis, military intelligence, terrorism, emergency response, oversight, and domestic intelligence. This fully revised and updated edition adds eight new chapters to expand the coverage to topics such as recent developments in cyber security, drones, lone wolf radicalization, whistleblowers, the U.S. Coast Guard, border security, private security firms, and the role of first responders in homeland security. This volume offers contributions from a range of scholars and professionals from organizations such as the Department of Homeland Security, the Center for Homeland Defense and Security at the Naval Postgraduate School, the National Intelligence University, the Air Force Academy, and the Counterterrorism Division at the Federal Law Enforcement Training Center. This breadth of unique and informed perspectives brings a broad range of experience to the topic, enabling readers to gain a critical understanding of the intelligence process as a whole and to grasp what needs to happen to strengthen these various systems. The book presents a brief history of intelligence in the United States that addresses past and current structures of the intelligence community. Recent efforts to improve information-sharing among the federal, state, local, and private sectors are considered, and the critical concern regarding whether the intelligence community is working as intended-and whether there is an effective system of checks and balances to govern it-is raised. The book concludes by identifying the issues that should be addressed in order to better safeguard our nation in the future. Addresses the most recent changes in homeland security and intelligence, explains the dynamics and structure of the intelligence community, and assesses the effectiveness of new intelligence processes Focuses on the evolving structure of the intelligence community and its processes in the age of ISIS and organized, widespread terrorist threats as witnessed by the events in Boston, San Bernardino, and Paris Contains seven new chapters as well as revisions and updates throughout this second edition Underscores how intelligence can work-and needs to function-across homeland security efforts at the federal, state, and local levels
Soldier Magazine's Book of the Month Fascinating... Incredibly dangerous. The Times Gripping. Adrenalin fuelled true-life account with all the makings of a military thriller. The action unfolds like a Le Carre novel. Soldier Magazine 'Jihad isn't a war. It's an objective. An aberration. If there are young women with children, lost boys... If they are trapped in that hell and we can get them out, don't we have a duty to do so? Every person we can bring back is living proof that Islamic State is a failure.' Ex-British Army soldier John Carney was running a close protection operation for oil executives in Iraq when the family of a young Dutch woman asked him to extract her from the collapsing 'Islamic State' in Syria. Hearing first-hand about the naive young girls, many from the West, who'd been tricked, sexually abused and enslaved by ISIS, he knew only one thing - he had to get them out of that living hell. This is the incredible true story of how - armed with AK-47s and 9mm Glocks - Carney launched a daring, dangerous and deadly operation to free as many of them as he could. From 2016 to 2019, he led his small band of committed Kurdish freedom fighters into the heart of the Syrian lead storm. Backed by humanitarian NGOs, and feeding intel to MI6, Carney and his men went behind enemy lines to deliver the women and their children to the authorities, to deradicalization programmes and fair trials. Carney, a born soldier, was moved to action by the women's terrifying stories. He and his men risked their lives daily, not always making it safely home... Gripping, shocking and thought-provoking, Operation Jihadi Bride tackles the complex issue of the jihadi brides head on - an essential read for our troubled times. |
You may like...
Adex Optimized Adaptive Controllers and…
Juan M. Martin-Sanchez, Jose Rodellar
Hardcover
R3,902
Discovery Miles 39 020
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu
Paperback
A First Course in Machine Learning
Simon Rogers, Mark Girolami
Paperback
R1,403
Discovery Miles 14 030
Towards Teaching in Public - Reshaping…
Mike Neary, Les Bell, …
Hardcover
R4,630
Discovery Miles 46 300
|