![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle > General
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
Boko Haram has been one of the most important sources of security challenges facing the Nigerian government since the group became radicalised in 2009 following a government clampdown and eventual death of their founder Mohamed Yusuf. The monograph critically interrogates the various explanatory theses for the emergence and radicalisation of the group and concludes that the sect is merely a symptom of the severe crisis that has engulfed the country's nation-building. This crisis, it argues, has triggered a massive de-Nigerianisation process, often with the state as the enemy: those entrusted with the nation's common patrimony steal it blind, law enforcement officers turn the other way if you offer them a little inducement, organised labour, including university lecturers go on prolonged strikes on a whim, students resort to cultism and exam malpractices and workers drag their feet, refuse to put in their best and engage in moonlighting. Most people and groups seem to have one form of grouse or the other against the Nigerian state and its institutions, meaning that unless the trend is urgently reversed, there is a risk of having Nigeria without Nigerians. Jideofor Adibe studied political science at the University of Nigeria, Nsukka and holds a doctorate degree in International Development Studies from Roskilde University, Denmark. He also holds an LLM degree in Media Law from City University, London and equally studied the New Economic Powers at Oxford University, UK. He has been a Guest Research Fellow at several research institutes across the world including the Centre for Development Research, Copenhagen, Denmark, the Nordic Institute for African Studies, Uppsala, Sweden, the Centre for Developing Area Studies, McGill University, Montreal, Canada and the Institute for Commonwealth Studies, University of London, UK. Dr Adibe teaches political science at Nasarawa State University, Keffi, Nigeria and is also the founding editor of the quarterly, peer-reviewed journal, African Renaissance, which has been published continuously since June 2004. He is equally a columnist for the Daily Trust - one of the leading national newspapers in Nigeria and also a member of the paper's Editorial Board. Dr Adibe has published several books and articles and can be reached at: [email protected]
A Second Edition of Thomas Friedman's stunning book, the first edition of which won the American National Book Award. 'If you're only going to read one book on the Middle East, this is it.' Seymour Hersh In this lucid, incisive and memorable book, acclaimed on both sides of the Atlantic, Friedman reaches deeper into the traumatic and complex recent history of the conflicts in the Middle East than any previous writer. For this new edition, Friedman has added a further two chapters that bring the book up to 1995 and the unfolding - and stalling - of the Middle Eastern peace process. From Beirut to Jerusalem is wonderully shrewd, surprisingly funny and indispensable to anyone seeking a fuller understanding of the political causes and psychological effects of the seemingly endless strife which besets this embattled region.
'Cyber-War' provides a critical assessment of current debates around the likelihood and impact of cyber warfare. Approaching the subject from a socio-political angle, it argues that destructive cyber war has not yet been seen, but could be a feature of future conflict.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "golden age" between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS's online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS's online activity - from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing - and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister. Islamic State's Online Activity and Responses is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
This book analyzes a series of decisions by leaders of three major terrorist organizations and identifies a unique "Decision DNA" for each of them. The authors use the Applied Decision Analysis methodology to examine organizational and operational decisions made by the leaders of three major groups: Hezbollah (Hassan Nasrallah), Hamas (Khaled Mashal), and al-Qaeda (Osama bin Laden). Decisions that were of critical importance to each organization are identified and anaylzed, to uncover the particular decision rule employed by the leader in question and to establish their "Decision DNA." A Decision DNA is unique to each leader and can be used to explain previous decisions or predict future choices. The authors demonstrate that the findings presented can be used to promote effective counterterrorism measures, and they provide a series of policy implications that arise from their examination of each leader. This book will be of much interest to students of terrorist studies, political violence, security studies, and Middle Eastern politics.
This book investigates the strategic use of America's historical crime control, counterterrorism, national security and immigration policies as a mechanism in the modern-day Trump administration to restrict migration and refugee settlement with a view of promoting national security and preservation. National Security and Policy in America critically explores how American culture, neocolonial aspirations, and indifference towards others negatively impact long-term global security. This book examines immigration and security policies and their origins, purpose, impact, and evolution vis-a-vis the recently imposed 'travel ban' and proposed border wall across the Southern border, as well as how foreign policy influenced many of the migration flows that are often labeled as security risks. The book also seeks to understand why immigration has been falsely associated with crime, terrorism, and national insecurity, giving rise to counterproductive policies, despite evidence that immigrants face intolerance and turmoil due to the powerful distinctions between them and the native-born. This book uses an interdisciplinary framework in examining the U.S.' current response to immigration and security and will thus appeal to undergraduate and graduate students of law, social justice, criminology, critical theory, neo-colonialism, security studies, policing, migration, and political science, as well as those interested in the practical questions of public administration.
The concept of risk in global life has not been fully understood and explored and this book attempts to examine what it entails in the fast changing, interconnected and complex world. As a foundational component of safety systems, risk has been considered relatively simple, predictable, and therefore, assessable and manageable phenomenon. Social and political sciences prefer the terminology of security to capture the dimension of risk which is more complex and more consequential to survival. Risk has become more human-made and intentional today, and this book explores innovative approaches and engages in theoretical and policy debates to capture its political and security dimensions.
In the war on terror, both 'sides' have taken great pains to
justify their actions in moral terms. As force is employed so are
sophisticated arguments which directly invoke the just war
traditions of the west and Islam. Jihad and Just War in the War on
Terror offers an exploration of the ways in which George W. Bush
and Osama bin Laden drew upon, and simultaneously
re-conceptualized, important moral concepts from within the western
and Islamic just war traditions. It examines a range of jus ad
bellum and jus in bello issues, including western debates about
pre-emptive self-defence, Islamic requirements for right authority
to declare war, proportionality in the Battle of Fallujah, and the
legitimacy of suicide bombing in Islam. The book also considers how
a series of authoritative voices in the west and in the Muslim
world appealed to just war and jihad ideas to vigorously contest
Bush and bin Laden's cases for war. The author's central
argument--that the Bush administration and al-Qaeda departed from
important consensuses about justified warfare--contains within it
an alternative way of understanding the war on terror. Rather than
a clash between civilizations, Brahimi suggests that the conflict
can be accounted for by a clash within civilizations: in resorting
to war, both sides acted against their own traditions and
contravened the requirements of their own civilizations.
This book explores one of the most topical and controversial issues of recent years -jihadist terrorist infiltration of irregular migrant flows to Europe. Utilizing robust sampling criteria, more than a hundred such cases are identified and rigorously assessed. The analysis reveals the characteristics of offenders, their travel patterns and operational activities, and critically evaluates subsequent law enforcement and judicial responses. The author draws upon interviews with a range of European security officials, as well as non-governmental organization employees, and a recent refugee, in order to provide a series of practical recommendations.
This handbook comprises essays by leading scholars and practitioners on the topic of U.S. counterterrorism and irregular warfare campaigns and operations around the globe. Terrorist groups have evolved substantially since 9/11, with the Islamic State often described as a pseudo-state, a terrorist group, and insurgency all at the same time. While researchers', analysts', and policymakers' understanding of terrorism has grown immensely over the past two decades, similar advancements in the understanding of counterterrorism lag. As such, this handbook explains why it is necessary to take a broader view of counterterrorism which can, and often does, include irregular warfare. The volume is divided into three thematic sections: Part I examines modern terrorism in the Islamic world and gives an overview of the major terrorist groups from the past three decades; Part II provides a wide variety of case studies of counterterrorism and irregular warfare operations, spanning from the 1980s to the irregular warfare campaign against the Islamic State in northern Syria in 2018; Part III examines the government instruments used to combat terrorism and wage irregular warfare, such as drones, Theater Special Operations Commands, and Theater Commands. The handbook fills a gap in the traditional counterterrorism literature by its inclusion of irregular warfare and by providing analyses from academic experts as well as practitioners. It will be of much interest to students of counterterrorism, counterinsurgency, U.S. national security, military affairs, and International Relations. The Open Access version of this book, available at https://www.routledge.com/Routledge-Handbook-of-US-Counterterrorism-and-Irregular-Warfare-Operations/Sheehan-Marquardt-Collins/p/book/9780367758363, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
The U.S. military spends more than 14 countries combined and possesses state-of-the art weapons and equipment, yet after 13 years of effort, $1.4 trillion, and some 6,000 casualties, it still has been unable to defeat its enemies in Afghanistan and Iraq. The book explains why and how it can be remedied. It first demonstrates the negative effects of four factors that are prerequisites for military success and that have undermined U.S. military performance since the end of the Cold War. These include uneven civil-military relations; an inability to formulate and execute sound campaign plans; a mistaken approach to counter-insurgency, irregular warfare, and stability operations; and inattention to military options other than regime change. It also acknowledges that other factors often also intervene, and that the enemy plays a decisive role in military outcomes. Still, if the United States is to preserve the use of military force as a reasonable (albeit last resort) policy option, it must develop the means to maintain healthy, reliable civil-military relations, design and execute sound campaign plans appropriate to the adversary in question and the threat it poses to U.S. interests, conduct effective counter-insurgency and irregular warfare campaigns suitable given the size and capabilities of today's all volunteer armed forces, and develop a menu of military options beyond regime change. The intent is to bring attention to the under-performance of the U.S. armed forces in Afghanistan, Iraq, and elsewhere and prescribe remedies. These solutions cannot be left solely in the hands of the Department of Defense and congressional action and oversight will be essential to favorable outcomes. This is a timely survey as the military is facing downsizing in response to budget pressure that will constrain defense and counter-terrorism spending.
This book examines the threat of a terrorist organisation constructing and detonating a nuclear bomb. It explores the role and impact of the organisational design of a terrorist organisation in implementing a nuclear terrorism plot. In order to do so, the work builds on the organisational analogy between an assumed nuclear terrorism scenario and four case studies as follows: the construction of the first atomic bombs at Los Alamos; South Africa's Peaceful Nuclear Explosives (PNE) program; Aum Shinrikyo's chemical-biological armament activities; and Al Qaeda's implementation of the 9/11 attacks. Extrapolating insights from these case studies, this book introduces the idea of an effectiveness-efficiency trade-off. On the one hand, it will be argued that a more organic organisational design is likely to benefit the effective implementation of a nuclear terrorism project. On the other hand, this type of organic organisational design is also likely to simultaneously constitute an inefficient way for a terrorist organisation to guarantee its operational and organisational security. It follows, then, that the implementation of a nuclear terrorism plot via an organic organisational design is also likely to be an inefficient strategy for a terrorist organisation to achieve its strategic and political goals. This idea of an effectiveness-efficiency trade-off provides us with a tool to strengthen the comprehensive nature of future nuclear terrorism threat assessments and sheds new light on the ongoing debates within the nuclear terrorism literature. This book will be of particular interest to students of nuclear proliferation, terrorism studies, international organisations, and security studies in general.
As the western world's most wanted terrorist, Osama bin Laden has fought to keep his personal life a mystery - loyalty and fear keeping those who know him from speaking out - until now. For the first time, two of Osama's closest family members, his first wife Najwa and their fourth son Omar, go behind the headlines to reveal the truth about the character and life of a man feared and revered around the globe. In gripping detail, they recount the drama, tensions, and everyday activities of the man they knew as a husband and father. Married at fifteen, Najwa describes the transformation of the quiet, serious young man she fell in love with into an authoritarian husband and stern father, an entrepreneur, and - finally - the leader of a complex international terrorist network. Uprooted from a life of extraordinary luxury and privilege in Saudi Arabia, they suddenly found themselves living life on the run, fleeing from country to country under assumed names and fake passports. Omar describes how he and his siblings were brought up in remote ranches and fortified Afghani mountain camps, handling Kalashnikovs and learning desert survival skills. Their eventual escape from Afghanistan would come just days before the terrible events of 9/11 changed the world forever. With unprecedented access and exclusive family photographs, Jean Sasson, author of the bestselling Princess, presents the story that we were never meant to hear.
This book maps and analyses the official British construction of the threat of cyberterrorism. By using interpretive discourse analysis, this book identifies 'strands' from a corpus of policy documents, statements, and speeches from UK Ministers, MPs, and Peers between 12 May 2010 and 24 June 2016. The book examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. The author makes novel contributions to the Copenhagen School's 'securitisation theory' framework by outlining a 'tiered' rather than monolithic audience system; refining the 'temporal' and 'spatial' conditioning of a securitisation with reference to the distinctive characteristics of cyberterrorism; and, lastly, by detailing the way in which popular fiction can be ascribed agency to 'fill in' an absence of 'cyberterrorism' case studies. He also argues that the UK government's classification of cyberterrorism as a 'Tier One' threat created a central strand upon which a discursive securitisation was established. This book will be of interest to students of Critical Security Studies, terrorism studies, UK politics, and international relations.
The contributors to this book analyse the different approaches and modes of terrorist rehabilitation that have been attempted by Malaysia, and other countries in Southeast Asia. With an emphasis on the particular contexts within which they operate, this book examines the factors that determine the relative successes and failure of a wide range of community initiatives in integrating terrorists back into society. These initiatives include using methods based on social psychology, religion, and entrepreneurship to develop a comprehensive approach to rehabilitating and deradicalizing terrorists in Malaysia as well as Singapore, Indonesia and the Philippines. As such it makes an important contribution to the global policy debate, coloured by the unique characteristics of the South East Asia region. A valuable resource for researchers and policymakers seeking constructive ways to counter violent extremism.
This book investigates everyday practices of intelligence cooperation in anti-terrorism matters, with a specific focus on the relationship between Europe and Britain. The volume examines the effective involvement of British anti-terrorism efforts in European cooperation arrangements, which until now have been overshadowed by the UK-US 'special relationship' and by political debates that overstate the divide between Britain and continental Europe. In arguing that British intelligence has always had a European dimension, it provides a distinct perspective to the study of intelligence cooperation and the role of British intelligence therein. Mobilizing a 'field theory' approach, the book provides an original contribution to the understanding of intelligence cooperation by investigating everyday bureaucratic practices of 'ground-level' security professionals and police forces, embedded in a European 'field' structured around the exchange of anti-terror intelligence. It also accounts for the drivers behind cooperation by using 'field analysis,' which explains the trajectory and positioning of actors according to their 'capitals' rather than necessities dictated by threats or state decisions. This book will be of much interest to students of Security Studies, International Political Sociology, Intelligence Studies, and International Relations in general.
The War on Terror has established a new global order of political structures, legislation, and technologies designed to spy on the world's Muslims. This book explains the origins and trajectories of this political system. The contributors argue that a constellation of Western ideas about Muslims have evolved over time to produce an insatiable desire for all-pervasive, ever-expanding surveillance in our contemporary moment. The book posits that the surveillance order is not, however, only the result of conceptions of Muslims. It is, rather, the outcome of centuries of European thought regarding religion, governance, and revolution. Islamophobia and Surveillance traverses the existential desire for wakeful vigilance, the religious wars of early modern Europe, colonial India, the Balkan frontier of the EU, and the walls of the United States-Mexico border. The consequences of the new surveillance order transcend the West's Muslim Question and threaten the very existence of the liberal democratic state. This book will, therefore, be of interest to those studying a range of subjects related to international co-operation, modern political systems, and security studies, as well as Islamophobia. Islamophobia and Surveillance was originally published as a special issue of Ethnic and Racial Studies.
In the wake of the publication of the Chilcot report, this book reinterprets the relationship between British public opinion and the Blair government's decision-making in the run-up to the 2003 invasion of Iraq. It highlights how the government won the parliamentary vote and got its war, but never won the argument that it was the right thing to do. Understanding how, why and with what consequences Britain wound up in this position means understanding better both this specific case and the wider issue of how democratic publics influence foreign policy processes. Taking an innovative constructivist approach to understanding how public actors potentially influence foreign policy, Strong frames the debate about Iraq as a contest over legitimacy among active public actors, breaking it down into four constituent elements covering the necessity, legality and morality of war, and the government's authority. The book presents a detailed empirical account of the British public debate before the invasion of Iraq based on the rigorous interrogation of thousands of primary sources, employing both quantitative and qualitative content analysis methods to interpret the shape of debate between January 2002 and March 2003. Also contributing to the wider foreign policy analysis literature, the book investigates the domestic politics of foreign policy decision-making, and particularly the influence public opinion exerts; considers the domestic structural determinants of foreign policy decision-making; and studies the ethics of foreign policy decision-making, and the legitimate use of force. It will be of great use to students and scholars of foreign policy analysis, as well as those interested in legitimacy in international conflict, British foreign policy, the Iraq War and the role of public opinion in conflict situations.
A frequent assumption of the American-led 'war on terror' and its accompanying discourse originated largely with the George W. Bush Administration, and that there was a counterterrorism policy revolution in the U.S. political arena. Challenging these assumptions, through a genealogical analysis of U.S. terrorism and counterterrorism discourses, this book demonstrates a distinct continuity (and lack of change) of U.S. counterterrorism policy, from Ronald Reagan, to Bill Clinton, and through to George W. Bush. The book focuses on President Clinton's discursive construction of 'new terrorism', or 'catastrophic terrorism', and the counterterrorism practices implemented by the Clinton Administration, while simultaneously comparing it with President Reagan's and President George W. Bush's approaches to counterterrorism. It shows how the war on terror can be traced to earlier periods, and that the so-called Bush revolution was largely built upon the existing framework established by President Reagan and President Clinton. Prior to the 2001 terrorist attacks, Clinton had expanded Reagan's first 'war on terrorism' discourse and constructed the 'new terrorism' discourse, characterised by the notions of borderless threats, 'home-grown' terrorism, WMD-terrorism, cyberterrorism, and rogue states. Clinton's 'new terrorism' discourse provided a useful framework for George W. Bush to discursively respond to the terrorist attacks on September 11th, 2001. Aiming to uncover the myth of President George W. Bush's foreign policy revolution and contribute to a deeper historical understanding of the U.S.-led war on terror, it will be of great use to postgraduates and scholars of US foreign policy, security studies and terrorism studies.
Islam, Judaism, and Christianity are engaged not in a 'clash of civilizations' but in a sectarian conflict among branches of a single civilization traditionally steeped in apocalyptic imagery and beliefs. Apocalypticism is a religious luxury that modern civilizations can no longer afford. Many would agree that the propagandists of the Christian Right have raised apocalyptic tensions to a dangerous level since 9/11, but in this book Richard Fenn takes on the mainline church leaders for their role in promoting an apocalyptic view of history. Those who keep apocalyptic beliefs in a respectable place in religious faith and practice must bear their share of responsibility for global terror. It is not only tragic but ironic that the churches have given apocalyptic literature such a respectable place in their sacred texts, because the apocalyptic imagination itself has its sources in non-Biblical literature: the Hellenistic prophesies that gave comfort and courage to the victims of war in the near and middle east from the time of Alexander the Great and Darius. Fenn goes on to hold apocalyptic enthusiasts in the mainline churches, as well as on the Right, responsible for keeping old grievances alive in their demands for a day of final reckoning, and he demonstrates that totalitarian and imperial regimes have made effective use of apocalyptic literature to justify their own violence and to terrify their subjects and enemies.
A New York Times bestsellerA Washington Post bestsellerNamed the top investigative journalism book of 2013 by Nieman Reports Selected as one of Publishers Weekly's Top 10 Books of 2013 [A] courageous and exhaustive examination of the way a number of clandestine campaigns,full of crimes, cover-ups, and assassinations,became the United States' main strategy for combating terrorism." ,Teju Cole, The New Yorker , Best Books of 2013In Dirty Wars , Jeremy Scahill, author of the New York Times best-seller Blackwater , takes us inside America's new covert wars. The foot soldiers in these battles operate globally and inside the United States with orders from the White House to do whatever is necessary to hunt down, capture or kill individuals designated by the president as enemies.Drawn from the ranks of the Navy SEALs, Delta Force, former Blackwater and other private security contractors, the CIA's Special Activities Division and the Joint Special Operations Command ( JSOC), these elite soldiers operate worldwide, with thousands of secret commandos working in more than one hundred countries. Funded through black budgets," Special Operations Forces conduct missions in denied areas, engage in targeted killings, snatch and grab individuals and direct drone, AC-130 and cruise missile strikes. While the Bush administration deployed these ghost militias, President Barack Obama has expanded their operations and given them new scope and legitimacy. Dirty Wars follows the consequences of the declaration that the world is a battlefield," as Scahill uncovers the most important foreign policy story of our time. From Afghanistan to Yemen, Somalia and beyond, Scahill reports from the frontlines in this high-stakes investigation and explores the depths of America's global killing machine. He goes beneath the surface of these covert wars, conducted in the shadows, outside the range of the press, without effective congressional oversight or public debate. And, based on unprecedented access, Scahill tells the chilling story of an American citizen marked for assassination by his own government.As US leaders draw the country deeper into conflicts across the globe, setting the world stage for enormous destabilization and blowback, Americans are not only at greater risk,we are changing as a nation. Scahill unmasks the shadow warriors who prosecute these secret wars and puts a human face on the casualties of unaccountable violence that is now official policy: victims of night raids, secret prisons, cruise missile attacks and drone strikes, and whole classes of people branded as suspected militants." Through his brave reporting, Scahill exposes the true nature of the dirty wars the United States government struggles to keep hidden.
Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).
What is terrorism? Academics search in vain for the unholy grail: the definition of terrorism that will exonerate or condemn American officials. There are many vying definitions and no tribunal to resolve the contest. In this unique essay, Ron Hirschbein analyzes conflicts in which officials themselves called their actions "terrorist." He reveals that terrorism didn't always get bad press. In fact, terror bombing was indispensable to winning World War II. Not only did the Allied Forces bombed German cities, but they also used the nuclear bomb in Japan, killing many noncombatant civilians. During the Cold War, the threat of nuclear annihilation became the strategy to deter war between the superpowers. Many ironies are brought to light in revisiting these conflicts, such as the fact that it was accepted that safety depended upon the willingness to detonate weapons of mass destruction. Not even American citizens enjoyed noncombatant immunity during the Cold War as they were held hostage to mutually assured destruction and marked for sacrifice in various strategic scenarios. Indeed, their lives were risked in confronting crises in Berlin and Cuba. Subsequent conflicts in Korea, Vietnam and Iraq, as well as the War on Terror itself, are also examined. Like World War II, all involved killing noncombatants by accident or design. Casting these conflicts in an ironic light reveals incongruities in language and situations in which triumphant dreams become self-defeating realities (as with the second Iraq war). The War on Terror, now rebranded as an "Overseas Contingency Plan" seems to be the answer to a Jihadist's prayer. Further, U.S.-led covert attacks and assassinations by drones raise many discussions of legalities. And today the curse of terrorism is fodder for captivating primetime entertainment, enjoyed even by the president of the United States.
Many years after 9/11 we are still struggling to categorize groups like Al Qaeda, home-grown cells and others that claim to be perpetrating and justifying terrorist acts under the banner of jihad. This book introduces the concept of 'neojihadism' as a new form of political organization, grand narrative, global subculture, counterculture and theological understanding, with an approach to political violence that is unique to the post-Cold War period. What these groups espouse and enact differs radically from fascism, totalitarianism, cults, jihad - and even jihadism.Neojihadism takes an interdisciplinary approach that fuses comparative politics, subcultural studies, Islamic studies, and terrorism studies. It cites examples from global, regional and nationally based terrorist groups to illustrate the diversity within the movement. Additionally, it draws from unique primary materials including recorded conversations of terrorists preparing for attacks, captured by electronic bugging devices and telephone wiretaps - to help to test the extent to which the term 'neojihadism' is a significant political and theological departure from previous Islamist group experiences. This fascinating book will be an invaluable resource for academics, and undergraduate and postgraduate students of terrorism studies, political science, international relations, comparative religion, and Islamic studies. Contents: 1. Introduction 2. On The Movement 3. On Jihadism 4. On The Movement's Global Dimensions: Bin Laden as a Political and Spiritual Commentator 5. On The Movement's Local Dimensions: The Politics and Theology of a Melbourne Cell Leader 6. On Attempting to Name the Enemy: Islamo-Fascism and Islamo-Totalitarianism(s) 7. On Fascism and Totalitarianism 8. Conclusion: On Neojihadism - A New Understanding of Terrorism and Extremism? Bibliography Index |
You may like...
Dynamical Inverse Problems: Theory and…
Graham M. L Gladwell, Antonino Morassi
Hardcover
R2,666
Discovery Miles 26 660
Computational Fluid Dynamics in Fire…
Guan Heng Yeoh, Kwok Kit Yuen
Hardcover
Macro-Engineering - MIT Brunel Lectures…
F.P. Davidson, E. G. Frankl, …
Hardcover
R1,903
Discovery Miles 19 030
Handbook of Coastal Disaster Mitigation…
Miguel Esteban, Hiroshi Takagi, …
Paperback
R3,468
Discovery Miles 34 680
Eco-efficient Masonry Bricks and Blocks…
Fernando Pacheco Torgal, Paulo B. Lourenco, …
Hardcover
R5,557
Discovery Miles 55 570
|