![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
The Selling of 9/11 argues that the marketing and commodification of the terrorist attacks of September 11, 2001, reveal the contradictory processes by which consumers in the United States (and around the world) use, communicate, and construct national identity and their sense of national belonging through cultural and symbolic goods. Contributors illuminate these processes and make important connections between myths of nation, practices of mourning, theories of trauma, and the politics of post-9/11 consumer culture. Their essays take critical stock of the role that consumer goods, media and press outlets, commercial advertising, marketers and corporate public relations have played in shaping cultural memory of a national tragedy.
The war on terror's emphasis on denying sanctuary and safe havens to terrorists has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states. Denial of Sanctuary highlights the limits of conventional thinking on the subject, and suggests new approaches to understanding this complex and misunderstood feature of modern conflict. Critics of the war on terror have pointed to the futility of waging war on a tactic. Its emphasis on denying sanctuary and safe havens to terrorists, rooted primarily in traditional counterinsurgency theory and poorly conceptualized policy statements, has placed a premium on physical territory, from mountain caves and frontier hideouts to the bordered world of modern states. To fully understand sanctuaries is to uncover the problems and pitfalls of waging war on locations—exposing the secret lives of multiple hidden worlds, filled with extremists, criminals, soldiers, and spies, with the pious and the profane, with dangers that lie below the surface and in the margins. As this volume makes abundantly clear, such a murky underground is far more complex and varied than the conventional wisdom suggests. Terrorists have hidden in plain sight in modern cities, used advanced communications technology to build virtual refuges, crafted militant enclaves out of the disarray of failed states, flocked to distinctly unsafe insurgent battlespaces, and generally challenged the protective limits of law, citizenship, and state. Denial of Sanctuary brings together top experts in the field to expand the debate; to explore the roots, causes and consequences of the problem; and to clarify our understanding of sanctuary in terrorist thought and practice.
Film and terrorism go back a long way. The very birth of cinema in the 1890s coincided with an early golden age of terrorism, as bomb-throwing anarchists and nationalists captured headlines in countries as far apart as France and India. "Cinematic Terror" provides the first history of cinema's depiction of terrorism from the early 1900s to the present day. It looks at how cinema has been the site of conflict between filmmakers and terrorists for over a century and identifies important trends in the ways that film industries in Europe, North and South America, Asia, Africa and the Middle East have framed terrorism. From the birth of moving pictures to the internet age, the author explains how filmmakers from around the world have depicted terrorists, have made money and propaganda out of terrorism, and have died at the hands of terrorists. Professor Shaw shows that for over a century, cinema has had a profound impact on peoples' understanding of terrorism.
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 144, Autonomous and Semiautonomous Weapons Systems, examines the impact of robots and autonomous and semiautonomous weapons systems on the waging of modern warfare. It considers the likely effects of emerging technological innovations in this area from both a political and strategic standpoint, in addition to considering the implications of such technologies within the context of the law of armed conflict and international humanitarian law. This volume is divided into three sections: (1) U.S. policy and approaches to the use of autonomous and semiautonomous weapons systems; (2) U.S. armed forces use of such weapons systems; and (3) potential terrorist use of such weapons systems. Official policy documents from the DoD and the U.S. Army and Air Force are complemented by reports from the Strategic Studies Institute/Army War College Press and other U.S. military sources.
The increased threat of chemical terrorism and warfare makes a quick, comprehensive guide more vital than ever. Forensic chemist Steven L. Hoenig has compiled information from diverse sources to produce this ready reference with details on various chemicals, including identification tips, symptoms and treatment procedures, protective gear necessary to counter each threat, and a step-by-step description of decontamination procedures. A brief overview of the history of chemicals used in warfare is followed by a discussion of the different categories of chemical threats. First responders to a chemical event will find the wealth of information invaluable, as cities and civic organizations are called upon to develop readiness plans for dealing with terrorist attacks. This guide includes clear diagrams and explanations, and has been compiled with both the layman and professional in mind, making it a useful addition to any military, medical, or home library.
Fire Alarm: The Investigation of the U.S. House Select Committee on Benghazi is a study of legislative-executive friction, partisanship, and Congress's attempt to recount events surrounding the September 11, 2012, terrorist attack in Beghazi, Libya that killed four Americans. Using publicly available sources, Bradley F. Podliska details the history of congressional investigations, arguing that both Republicans and Democrats use taxpayer-funded investigations as an arena to mount political attacks for electoral advantage regardless of the consequences. He traces the events of September 11, 2012, and applies a new partisan model to frame the role of Speakers of the House John Boehner and Paul Ryan in investigating the Obama administration's attack response and post-attack narrative. Employing qualitative and quantitative methods to analyze the divisive investigation, Podliska finds Speaker Boehner's selection of party loyalists for the committee, placement of vetted staff in crucial investigative assignments to ensure execution of party strategy, and over emphasis on former Secretary of State and presidential candidate Hillary Clinton, minimized the examination of White House, Department of Defense, and Intelligence Community responses. As a result, the investigation failed to determine responsibility for U.S. policy in Libya, an accurate post-attack narrative, and why the military did not perform a timely rescue.
Proscribing peace offers a systematic examination of the impact of proscription on peace negotiations. By introducing the concept of 'linguistic ceasefire', Haspeslagh adds to our understanding of the timing and sequencing of peace processes in the context of proscription. With relevance for more than half of the conflicts around the world in which an armed group is listed as a terrorist organisation, 'linguistic ceasefire' helps to explain why certain conflicts remain stuck in the 'terrorist' framing, while others emerge from it. International proscription regimes criminalise both the actor and the act of terrorism. Proscribing peace calls for an end to the amalgamation between acts and actors. By focussing on the acts instead, Haspeslagh argues, international policy would be better able to consider the violent actions both of armed groups and those of the state. By separating the act and the actor, change - and thus peace - become possible. -- .
"Values and Weapons" looks at the determinants of legitimacy for using military force in the US and Europe. The non-intervention norm is weakened by the advent of terror groups in failed states as well as by so-called humanitarian intervention. The development of a norm that calls for a 'duty to protect' has paved the way for intervention also into so-called 'failed' states. Sovereignty has been redefined to be conditional on democratic government, and this makes it much easier to intervene into non-democratic states.
This book analyzes the ideological roots, structures and operational methods of Jihadi intelligence and counterintelligence activities. Based on a substantive collection of data on terrorist attacks, communication channels, recruitment methods, manuals and statements released by various Jihadi groups, it examines and compares the nature, ideology and realities of Jihadi intelligence operations. The author, an expert on Jihadist ideology and paramilitary intelligence, compares the modus operandi of terrorist groups such as al-Qaeda and the IS with those of governmental intelligence agencies, and subsequently analyzes the role of historical and religious narratives that help Jihadist groups justify their actions and military management. Further topics covered include encryption, counterfeiting, covert operations and Jihadi intelligence activities in the digital realm. The insights shared here will allow readers to gain a comprehensive understanding of Jihadist groups and their intelligence operations, while helping practitioners and policymakers develop better counterterrorism activities and counternarratives.
Applying a rational choice perspective, this book presents a dynamic theory of the evolution of totalitarian regimes and terrorism. By demonstrating that totalitarian regimes rest on ideologies involving supreme values that are assumed to be absolutely true, the author identifies the factors that lead to totalitarian regimes, and those that transform or abolish those regimes with time. The author addresses different ideologies, such as National Socialism, Communism, and religious movements; examines numerous historical cases of totalitarian regimes; and develops a formal, mathematical model of totalitarianism in the book's closing chapter.
Dabashi's newest book is a meditation on suicidal violence in the immediate context of its most recent political surge and a critical examination of the radical transformation of the human body, supported by close readings of cinematic and artistic evidence.
This exceptional volume examines international security issues by way of case studies of the conflicts in Afghanistan and Iraq. Each of these raises significant issues concerning the use of force between states and the role of the United Nations in maintaining international peace and security. Alex Conte examines international terrorism and the intervention in Afghanistan, including the controversial policy of pre-emptive strikes in the war on terror, and discusses the role adopted by the United Nations in the political and economic reconstruction of states subjected to conflict. Analyzing events in Iraq since 1990, he assesses the legality of the current war and leads to an examination of the role of the UN in maintaining peace and security and possible options for reform and accountability. The study will be a valuable guide for all those keen to understand the use of international law and the United Nations in the first two major conflicts of the 21st century and their implications for the future role of the United Nations.
The global pandemic has offered extraordinary opportunities for extremists and terrorists to mobilize themselves and revive as more powerful actors in the security landscape. But could these threat groups actually capitalize on the coronavirus crisis and advance their malevolent agendas? Utilizing the largest COVID-19-related terrorism database, the book presents an analysis built upon a quantitative and qualitative comparison between the nature of both the radical Islamist and the far-right-related threat in 2018 and 2020. It provides, for the first time, a true picture of novel trends since the pandemic outbreak.
"Using a transnational approach, this volume surveys the origins of Irish terrorism and its impact on the Anglo-Saxon community during an era of intense imperialism. While at times it posed sharp disagreements between Britain and the United States, their ideological repulsion to terrorism later led to cooperation in counter-terrorism strategies"--Provided by publisher.
The global trend of increasing violence against the press has spurred research interest into the questions of where, why, and how communicators are repressed. As a result, scholarship has demonstrating that hybrid regimes - which mix undemocratic and democratic elements - constitute a specifically dangerous and lethal context for these actors. Decentralized countries, in which some subnational political elites have retained authoritarian features, have been identified as the most perilous context for communicators. However, despite the burgeoning interest in illiberal practices and repression on the subnational level, it is still relatively unexplored how and why subnational political elites repress communicators within their multi-level setting. The author argues that communicators in subnational undemocratic regimes who can spread the scope of compromising information beyond subnational boundaries can cause uncertainties for subnational undemocratic regimes. The book explores how the political elites of these regimes repress these communicators in response.
Former political officer for the Nicaraguan Resistance (the contras), Rogelio Pardo-Maurer shares his experiences of the factional dynamics of that group in this provocative new study. Providing an historical account of internal politics in the Resistance, Pardo-Maurer analyzes the principle factions or issues of contention, devoting special attention to the influence of the U.S. political process on Resistance policy. The book provides an intriguing inside look at one of the most controversial resistance movements of the 20th century. Pardo-Maurer follows the internal dynamics of the contras from the exposure of Oliver North to the signing of the ceasefire at Sapoa, the period in which he served as political assistant to the representative of the Resistance in Washington, DC.
A human rights lawyer travels to hot zones around the globe, before and after the September 11 attacks, to document abuses committed by warlords, terrorist groups, and government counterterrorism forces. Whether reporting on al Qaeda safe houses, the mechanics of the Pentagon's smartest bombs, his interviews with politicians and ordinary civilians, or his own brush with death outside Kabul, John Sifton wants to help us understand violence-what it is, and how we think and speak about it. For the human rights community, the global war on terror brought unprecedented challenges. Of special concern were the secret detention centers operated by the CIA as it expanded into a paramilitary force, and the harsh treatment of prisoners throughout Iraq and Afghanistan. In drafting legal memoranda that made domestic prosecution for these crimes impossible, Sifton argues, the United States possessed not only the detainees but the law itself. Sifton recounts his efforts to locate secret prisons and reflects on the historical development of sanctioned military or police violence-from hand-to-hand combat to the use of drones-and the likelihood that technology will soon enable completely automated killing. Sifton is equally concerned to examine what people have meant by nonviolent social change, and he asks whether pure nonviolence is ever possible. To invoke rights is to invoke the force to uphold them, he reminds us. Ultimately, advocates for human rights can only shame the world into better behavior, and their work may involve advocating the very violence they deplore.
This is the first comprehensive discussion of all the main
philosophical issues raised by terrorism against the background of
its past and recent developments. Prominent philosophers discuss
definitions of terrorism, approaches to its moral evaluation, and
the contentious subject of state terrorism. Also included are four
case studies, showing how the concepts and arguments philosophers
deploy in discussing violence, war and terrorism apply to
particular instances of both insurgent and state terrorism, ranging
from World War II to September 11, 2001.
This book analyzes intelligence relations in an unsecure world and provides contributions on intelligence processes, interstate intelligence relations and hybrid warfare. Tactical, operational and strategic intelligence relations, both within and between intelligence agencies, and between states, are essential to support decision makers. This book ties together how intelligence adapts to security changes, global power shifts and the trend from globalization to a more nationalistic approach. During such changes, there is a need to analyze intelligence sharing relationships. Bringing together practitioners and academics, the book presents a plurality of approaches relative to intelligence relations that seek to advance the debate in the field.
This book examines mass shootings and attempted shootings that occurred across 16 countries in Central and Eastern Europe, known as post-communist states. This region of the world has been described by social scientists as possessing specific social, cultural, and political characteristics which may mean that mass shootings in this part of the world are driven by distinct causal factors in comparison to those in North America and elsewhere. This book explores trends and patterns that underpin cases in this under-explored region and tests whether Cumulative Strain Theory can account for mass shooting occurrences. It uses in-depth qualitative analysis to examine select case studies in one chapter, followed by a chapter which uses quantitative methods to identify trends across a wider set of cases and to test the theoretically-driven hypotheses. This data is then compared with data in the US. This book draws on a wide range of media, forensic and court reports and provides methodological insights and discussions of future trends including the potential incidental increase of mass shootings in these regions. It also engages in recent public policy debates pertaining to firearm ownership and regulation.
Policy decisions in education have changed drastically as a result of the recent threats to our international and national security. In this timely and compelling collection, contributors discuss the significance of policy decisions on education systems, and argue that all forms of violence, including terrorism, are often reproduced through education. Contributors incorporate case studies from a broad spectrum of countries to make a case for peace-building alternatives and non-military security cooperation. The collection highlights education systems around the globe that sustain violence, brings together human security and preventive diplomacy research to predict future trends, explores foreign policy implications that could lead to non-violent interventions abroad, and provides teachers and policymakers with relevant reflections on reform. This collection arrives at a time when many of us are wondering what education systems can do to eliminate violence, and is the only one of its kind to address these questions on a global scale. |
![]() ![]() You may like...
Precursor Crimes of Terrorism - The…
Clive Walker, Mariona Llobet Angli, …
Hardcover
R3,761
Discovery Miles 37 610
Far Out - The Lives of Former Extremists…
Charlotte McDonald-Gibson
Paperback
Handbook on Democracy and Security
Nicholas A. Seltzer, Steven L. Wilson
Hardcover
R5,878
Discovery Miles 58 780
The Nexus Between Organized Crime and…
Letizia Paoli, Cyrille Fijnaut, …
Hardcover
R5,103
Discovery Miles 51 030
Killing For Culture - From Edison to…
David Kerekes, David Slater
Paperback
R957
Discovery Miles 9 570
The United States, Russia, and China…
Paul J Bolt, Su Changhe, …
Hardcover
R2,540
Discovery Miles 25 400
|