![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
This book examines the reasons for which children join terrorist movements and how they eventually become peace activists fighting the very crimes that they once committed. The transformation of child terrorists into peace activists has received scant attention from academics and practitioners alike. Particular focus is placed on child jihadism, child terrorism in Africa and Latin America, child separatist terrorism, and White child supremacism. These five groups of child terrorists represent about 80% of the problem across the world. The text serves as a primer for anti-terrorism and peace activism for global social change. It includes original, applied research and features personal accounts from former child terrorists who became peace activists themselves. One of the nine chapters provides an in-depth thematic analysis of the lives of 24 subjects (from all five aforementioned groups). The analysis produced four main themes that encapsulate the time and effort that it takes to become a peace activist today: metamorphosis, terrorist behavior, disillusionment, and anti-terrorist behavior. The book ends with multiple solutions from the perspective of social work, including the reintegration of former child terrorists into society. From Child Terrorism to Peace Activism is a resource of deep and broad appeal. The text is essential reading for upper-level undergraduate and Master's students in political science, military studies, international relations, international law, and peace and conflict studies. It can be pertinent reading for students and instructors in international social work contemplating social work-related solutions to rehabilitate former child terrorists and child soldiers into society through peace activism, anti-terrorist endeavors, and other socio-psychological methods that will produce social change. The text also would appeal to faculty and students in childhood studies with an interest in child terrorism, child development, and child trauma and resilience. Given the essentials, depth, and possibilities that the book offers, it is a useful resource for audiences within counterterrorism institutes, national security agencies, and academic think-tanks. Information on motives, strategies, radicalization processes, and recruitment methods used by terrorist organizations as well as their effects on various audiences will draw readers from law enforcement agencies and institutions.
This book offers a very interesting deep-dive into EU and South Korean approaches to cybersecurity issues. In a unique approach, the editors and authors focus on the potential for strategic partnership and shared lessons learned given common commitments to democracy, human rights, the free market, and a rules-based international order of the two regions. Essential reading for students and researchers in political science, international relations, international law, strategic and defence studies, computer science, and cognitive science.
Through various lenses and theoretical approaches, this book explores the contested experiences, meanings, realms, goals, and challenges associated with the construction, preservation, and transmission of the memories of state repression in Argentina, Chile, and Uruguay. The book both illuminates and questions the politics of memory that have been unfolding in these countries over the past three decades. It is one of few volumes written in English to be dedicated specifically to the study of the memory of state terrorism in the Southern Cone. Its contributors, both recognized and emerging scholars, come from Europe, the United States, and Latin America.
This fascinating reference chronicles the individuals, operations, and events of the War on Terror around the world, exploring its causes and consequences through the lens of policy, doctrine, and tactics of combat. The War on Terror is more than a political movement to identify and prosecute terrorists ... it has become a cornerstone of economic and military importance. This campaign has shaped policy in the Middle East, prompted uprisings of Islamic fundamentalists against the West, and redefined the ideology of warfare. This single-volume encyclopedia provides readers with more than 200 engaging entries on the myriad events, key individuals, and organizations that have played a major role in the War on Terror. The A-Z entries define the policies and doctrines; describe the armies, battlefields, and weapons employed; and profile the figures whose actions and decisions set the course of history. The expert contributors decode military jargon for non-specialist readers and explain the unconventional tactics used in the War on Terror, shedding light on the reason behind the attacks, the political maneuvering of the leaders involved, and the internal conflicts and external clashes that drove terrorists to settle all over the world. The book also includes detailed essays on the impact of the September 11 attacks on U.S. foreign policy, presidential powers, and public opinion. Features a timeline that enables readers to quickly grasp the succession of key events and developments in the War on Terror Highlights specific individuals on both sides of this conflict, providing an objective and fair-minded approach to the topic Provides a bibliography that directs students toward additional sources of information for further research Connects related entries through helpful cross references
Islam and violence appear to dominate global politics in the
twenty-first century. This book examines dimensions of Islam and
violence as part of wider debates about politics, history, faith,
power, rebellion and struggle both within Muslims' realms and
outside it. The author accounts for definitions of violence and
terrorism with both historical and contemporary dimension. The book
explores the motif of violence in its myriad aspects including
debates about sacrifice, private and public violence, responses and
reactions, as well as suicide and martyrdom.
Considering an under-researched dimension of political violence, this interdisciplinary collection provides an extensive examination of terrorist victimisation. It explores how individual and public experiences of victimisation are constructed and how they are shaped by existing dynamics of violence.
The book analyses the development of international standards for countering terrorist financing from the perspective of international criminal law. It is likely to find its value for readers not only as a monograph on the financing of terrorism but also as a reference book on the operational and theoretical development of anti-money laundering strategy following 9/11. In particular, the works of main actors in this area such as the UN Security Council, Financial Action Task Force, IMF, World Bank, and APG are dealt with in depth.
Rethinking the Roots of Terrorism seeks to explain why terrorism occurs. This study provides a comprehensive interdisciplinary survey that investigates the motivations, reasons and causes of terrorism at all levels in society, and more specifically in the context of the Middle East. The author is critical of what he describes as 'orthodox' terrorism discourse and the conventional understanding of terrorism, which he argues does little to address its root causes. He seeks to open up the debate on the causes of terrorism by aligning it with the causes of conflict and thus using the methods and approaches provided by conflict resolution to rethink the roots of terrorist violence. Franks reveals the multifarious and multilevel political, social, and economic causes and motivations that generate terrorism, which tend to be obscured - or worse, purposefully ignored - by the orthodox approach.
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the relevance of raising awareness and education enforcing a CBRNE-Cy security culture. The authors present international instruments and legislation to deal with these threats, for instance the UNSCR1540. The authors address a multitude of stakeholders, and have a multidisciplinary nature dealing with cross-cutting areas like the convergence of biological and chemical, the development of edging technologies, and in the cyber domain, the impelling risks due to the use of malwares against critical subsystems of CBRN facilities. Examples are provided in this book. Academicians, diplomats, technicians and engineers working in the chemical, biological, radiological, nuclear, explosive and cyber fields will find this book valuable as a reference. Students studying in these related fields will also find this book useful as a reference.
This book provides a contemporary overview of Boko Haram's activities. Since Boko Haram emerged in 2002, media-driven narratives as well as social scientific methodologies have been increasingly applied to draw generalisable conclusions on what goals the groups have pursued, what strategies it has used for these purposes and the counter campaign strategies authorities have pursued. But from 2009 to 2018, Boko Haram has pursued high-intensity violence: assassinations, bombing, kidnappings, beheading or threats of violence, conscriptions and territorial occupation. This makes it imperative to deepen and broaden our understanding of the groups' activities toward a problem-solving and policy-relevant analysis. Previously published in Security Journal Volume 33, issue 3, September 2020
Terrorism Awareness: Understanding the Threat and How You Can Protect Yourself provides readers a foundational understanding of the threats that face us every day. The goal is to introduce readers to different tactics and techniques used by terrorists-both international and domestic-to better understand personal protection concepts and, if necessary, take actions to make themselves "hard targets" that terrorist organizations will want to avoid. This includes providing a background on understanding how terrorists operate, and, more specifically, how to recognize the pre-incident indicators associated with terrorist operations. Coverage includes situation awareness of the phases of terrorist operations, common attacks, surveillance and targeting tactics, kidnapping and hostage situations, bombings and blast effects, hijacking, armed assaults, and more. With such awareness, readers can be alert to common cues to avoid dangerous situations, as well as familiarize themselves with various actions they can take to better protect themselves. Sometimes certain events may arise which are unavoidable and, in those cases, learning how to best mitigate those scenarios can mean life or death and provide the best opportunity for safety and survival. Terrorism Awareness is a helpful guide to provide anyone working or traveling in the United States or overseas-particularly in potentially volatile places subject to terrorism or civil unrest-the tools they need to recognize potential threats and to keep themselves, and those they are with, safe.
This book describes three impactful cases of political violence that broke out in Mexico in 1994, pointing to an important juncture in Mexican political development. At that point, the patrimonial order centered on the PRI and the Mexican presidency entered a momentous crisis that is still ongoing after a quarter of a century and caused the patrimonial order and the civil order to compete over Mexican public life. Such competition, in turn, unfolds at the cultural level on the terrain of three semantics of political violence that shape public debates over violence in Mexico. Ultimately, this book sheds light over the refraction of patrimonial and civil attributions across such cultural terrains.
The Selling of 9/11 argues that the marketing and commodification of the terrorist attacks of September 11, 2001, reveal the contradictory processes by which consumers in the United States (and around the world) use, communicate, and construct national identity and their sense of national belonging through cultural and symbolic goods. Contributors illuminate these processes and make important connections between myths of nation, practices of mourning, theories of trauma, and the politics of post-9/11 consumer culture. Their essays take critical stock of the role that consumer goods, media and press outlets, commercial advertising, marketers and corporate public relations have played in shaping cultural memory of a national tragedy.
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
This book examines the issues of ensuring anti-terrorist security of an aviation enterprise, provides a history of terrorism in the aviation sector, and analyzes the legal regulations. This book provides mathematical and mathematical-psychological models for reducing the risk of terrorist threats, which makes it possible to objectively increase the safety of air transport facilities, reduce the likelihood of terrorist attacks, save human lives and prevent significant material losses. The solutions of general humanistic problems proposed in the book-preventing accidents and preserving the world-are an original feature of the book, which allows one to treat it with the necessary attention and interest for the reader. The concept of anti-terrorist security of an aviation enterprise presented in this book has been widely tested and introduced into the activities of leading aviation enterprises, including the Interstate Aviation Committee (IAC), and has been used in the investigation of aviation accidents. This book is written for a wide range of audience associated with ensuring aviation transport security and for the end users of airlines-passengers, in order to expand their knowledge about the reliability of using air transport.
**As seen on BBC news** **As featured on BBC Radio 4: Today with Frank Gardner** 'In order to defeat your enemy, you must first understand them.' - Tamer Elnoury Tamer Elnoury, a long-time undercover agent, joined an elite counterterrorism unit after September 11. Its express purpose is to gain the trust of terrorists whose goals are to take out as many people in as public and devastating a way as possible. It's a furious race against the clock for Tamer and his unit to stop them before they can implement their plans. Yet as new as this war still is, the techniques are as old as time. Listen, record and prove terrorist intent. Due to his ongoing work for the FBI, Elnoury writes under a pseudonym. An Arabic-speaking Muslim American, a patriot, a hero. To many people, it will be a revelation that he and his team even exist, let alone the vital and dangerous work they do keeping all of us safe. It's no secret that federal agencies are waging a broad, global war against terror. Now, for the first time, an active, Muslim American federal agent reveals his experience infiltrating and bringing down a terror cell in North America.
This book presents and uses a major, new database of the most serious forms of internal resistance to the Nazi state to study empirically the whole phenomenon of resistance to an authoritarian regime. By studying serious political resistance from a quantitative historical perspective, the book opens up a new avenue of research for economic history. The database underpinning the book was painstakingly compiled from official state records of treason and/or high treason tried before the German People's Court (Volksgerichtshof) between 1933 and 1945. It brings together material on resistance groups stored in the archives of the Federal Republic of Germany and Austria with previously inaccessible files from the former German Democratic Republic, Czechoslovakia and Soviet Union. Through searching these records, the authors have been able to reconstruct in hitherto unattainable detail the economic, social, political, ethnic and familial profiles, backgroun ds, and influences of all 4,378 civilians of the Third Reich active in Germany, Austria and the outside territories for whom there are complete records. The findings of their research afford fresh, new interdisciplinary insights and perspectives, not only on the configuration, timing, impact and profile of resistance to the Nazi state, but also on a range of real-world behaviours common within authoritarian states, such as defection, reward and punishment, and commitment to group identities. The book's statistical analysis reveals precisely the who, how, where and when of serious resistance. In so doing, it advances significantly our understanding of the overall pattern and nature of serious resistance within Nazi Germany.
The war on terror's emphasis on denying sanctuary and safe havens to terrorists has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states. Denial of Sanctuary highlights the limits of conventional thinking on the subject, and suggests new approaches to understanding this complex and misunderstood feature of modern conflict. Critics of the war on terror have pointed to the futility of waging war on a tactic. Its emphasis on denying sanctuary and safe havens to terrorists, rooted primarily in traditional counterinsurgency theory and poorly conceptualized policy statements, has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states. To fully understand sanctuaries is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds, filled with extremists, criminals, soldiers, and spies, with the pious and the profane, with dangers that lie below the surface and in the margins. As this volume makes abundantly clear, such a murky underground is far more complex and varied than the conventional wisdom suggests. Terrorists have hidden in plain sight in modern cities, used advanced communications technology to build virtual refuges, crafted militant enclaves out of the disarray of failed states, flocked to distinctly unsafe insurgent battlespaces, and generally challenged the protective limits of law, citizenship, and state. Denial of Sanctuary brings together top experts in the field to expand the debate; to explore the roots, causes and consequences of the problem; and to clarify our understanding of sanctuary in terrorist thought and practice.
This book analyzes the importance of informal social protection provided by religious institutions such as madrassas in a low-income country such as Pakistan. This book explains that Madrassas are religious schools that have existed in many Muslim countries for centuries and contributed significantly to preserving, forming, and extending human knowledge in medieval times. Further, madrassas are now more commonly viewed as the providers of a narrow education, supporting religious fundamentalism, that may lead to terrorism. However, this book asserts that education is not the only function performed by madrassas. They are a significant source of welfare support for the vulnerable and marginalized households in many low-income countries. This book helps the readers to understand the concept of informal social protection not conceptualized previously. In addition, its various attributes and institutions providing such a form of welfare worldwide are explained in detail; analyzing the usefulness of such a form of social protection would benefit readers of social policy, national governments, and international donor/aid agencies. This book also provides a prescriptive framework for integrating formal and informal social protection. This book provides a new "Multiple Regime Framework", for identifying various regimes in one country at one point in time by applying a novel data collection and analysis methodology. The application of this framework would be of particular interest to social policy scholars, national governments, and donor/aid agencies because it will result in better targeting of social protection policies in the wake of fiscal constraints. Lastly, this book provides a novel data collection and analysis strategy that will benefit the reader of research methodology, development consultants, donor agencies, and policy practitioners interested in using artificial intelligence to make informed and targeted policy decisions.
"Values and Weapons" looks at the determinants of legitimacy for using military force in the US and Europe. The non-intervention norm is weakened by the advent of terror groups in failed states as well as by so-called humanitarian intervention. The development of a norm that calls for a 'duty to protect' has paved the way for intervention also into so-called 'failed' states. Sovereignty has been redefined to be conditional on democratic government, and this makes it much easier to intervene into non-democratic states.
This book presents a snapshot of a major challenge, and shares subjective views on various areas of conflict in Africa and the diverse - theoretical and practical - efforts to achieve peace. Following an essential review of several real-world conflict contexts on the African continent and attempts to come to terms with them critically as a first step, the book explores the lessons learned to date with regard to peace studies in Africa.
This book examines the projects of administrative and territorial reconstruction of Arab countries as an aftermath of the "Arab Spring". Additionally, it looks into an active rethinking of the former unitary model, linked by its critics with dictatorship and oppression. The book presents decentralization or even federalization as newly emerging major topics of socio-political debate in the Arab world. As the federalist recipes and projects are specific and the struggle for their implementation has a pronounced variation, different case studies are presented. Countries discussed include Libya, Syria, Yemen, and Iraq. The book looks into the background and prerequisites of the federalist experiments of the "Arab Spring", describes their evolution and current state, and assesses the prospects for the future. It is, therefore, a must-read for scholars of political science, as well as policy-makers interested in a better understanding of previous and current developments in the Arab countries.
Can war be justified? Pacifists answer that it cannot; they oppose war and advocate for nonviolent alternatives to war. But defenders of just war theory argue that in some circumstances, when the effectiveness of nonviolence is limited, wars can be justified. In this book, two philosophers debate this question, drawing on contemporary scholarship and new developments in thinking about pacifism and just war theory. Andrew Fiala defends the pacifist position, while Jennifer Kling defends just war traditions. Fiala argues that pacifism follows from the awful reality of war and the nonviolent goal of building a more just and peaceful world. Kling argues that war is sometimes justified when it is a last-ditch, necessary effort to defend people and their communities from utter destruction and death. Pulling from global traditions and histories, their debate will captivate anyone who has wondered or worried about the morality of political violence and military force. Topics discussed include ethical questions of self-defense and other-defense, the great analogy between individuals and states, evolving technologies and methods of warfighting, moral injury and post-traumatic stress disorder, broader political and communal issues, and the problem of regional security in a globalizing world. The authors consider cultural and religious issues as well as the fundamental question of moral obligation in a world saturated in military conflict. The book was written in the aftermath of the war on terrorism and includes reflection on lessons learned from the past decades of war, as well as hopes for the future in light of emerging threats in Europe and elsewhere. The book is organized in a user-friendly fashion. Each author presents a self-contained argument, which is followed by a series of responses, replies, and counter-arguments. Throughout, the authors model civil discourse by emphasizing points of agreement and remaining areas of disagreement. The book includes reader-friendly summaries, a glossary of key concepts, and suggestions for further study. All of this will help students and scholars follow the authors' dialogue so they may develop their own answer to the question of whether war can be justified. Key Features Summarizes the debate between pacifism and just war theory Considers historical and traditional sources as well as contemporary scholarship and applications Models philosophical dialogue and civil discourse, while seeking common ground Discusses issues of concern in contemporary warfighting and peacemaking, while offering an analysis of the war on terrorism
When we take a look back at the way Western states have fought terrorist organizations in the last 20 years, it is difficult not to think that these alternatives to war might have been more ethical than the decisions to invade Afghanistan and Iraq in 2001 and in 2003. These cases speak for themselves as they have both led to the death of hundreds of thousands of innocent civilians, which is highly paradoxical in light of the logic that supported these interventions. There is a need to think of alternatives to war that will imply the legitimization of proactive sets of measures that would allow states to effectively prevent terrorist attacks through the use of kinetic force in a limited extent as a way to avoid the terrible and unpredictable effects of wars. Violent Alternatives to War: Justifying Actions Against Contemporary Terrorism engages in a moral discussion of the challenges associated with violent alternatives to war when confronting terrorism and suggests a comprehensive approach to how this form of violence can be legitimized and how it ought to be used against this contemporary threat. |
You may like...
The First Forty Days - The Essential Art…
Heng Ou, Amely Greeven, …
Hardcover
(1)
Raising Mentally Strong Kids - How To…
Daniel G. Amen, Charles Fay
Hardcover
R669
Discovery Miles 6 690
|