![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
The law of occupation imposes two types of obligations on an army
that seizes control of enemy land during armed conflict:
obligations to respect and protect the inhabitants and their
rights, and an obligation to respect the sovereign rights of the
ousted government. In theory, the occupant is expected to establish
an effective and impartial administration, to carefully balance its
own interests against those of the inhabitants and their
government, and to negotiate the occupation's early termination in
a peace treaty. Although these expectations have been proven to be
too high for most occupants, they nevertheless serve as yardsticks
that measure the level of compliance of the occupants with
international law.
Explores how young people from communities targeted in the War on Terror engage with the "political," even while they are under constant scrutiny and surveillance Since the attacks of 9/11, the banner of national security has led to intense monitoring of the politics of Muslim and Arab Americans. Young people from these communities have come of age in a time when the question of political engagement is both urgent and fraught. In The 9/11 Generation, Sunaina Marr Maira uses extensive ethnography to understand the meaning of political subjecthood and mobilization for Arab, South Asian, and Afghan American youth. Maira explores how young people from communities targeted in the War on Terror engage with the "political," forging coalitions based on new racial and ethnic categories, even while they are under constant scrutiny and surveillance, and organizing around notions of civil rights and human rights. The 9/11 Generation explores the possibilities and pitfalls of rights-based organizing at a moment when the vocabulary of rights and democracy has been used to justify imperial interventions, such as the U.S. wars in Iraq and Afghanistan. Maira further reconsiders political solidarity in cross-racial and interfaith alliances at a time when U.S. nationalism is understood as not just multicultural but also post-racial. Throughout, she weaves stories of post-9/11 youth activism through key debates about neoliberal democracy, the "radicalization" of Muslim youth, gender, and humanitarianism.
Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.
No one else could have written this book because David H. Brown and Dr. John T. Dailey are the only two remaining members of the FAA Task Force that developed a viable airport security procedure in 1970. Based on personal recall, and FAA Manual AM-78-35 that documented the work of that group, this book takes you behind the scenes from the very beginning of efforts to curb aircraft hijacking, to how a proven program fell victim to bureaucracy. The book takes you through how the system was developed and tested, and why it was validated. It also reveals how the Task Force was able to overcome both airline opposition and agency recalcitrance. The team did not have precedents to work with, but blazed its own successful train. You will discover how the Task Force anticipated almost every aspect of airport security, and actually warned of future terrorist attacks using U. S. aircraft. You will read how the early program of sky marshals almost fell apart in a bizarre press conference, and why the Task Force did not support the use of armed guards on aircraft. This is a story you cannot find anywhere else. It may not be many pages, but the message is there.
Why do states and international relations organizations participate in the "global war on terrorism"? This book asks this question within a broad framework, exploring the mechanisms and causes for participation in global governance and taking counterterrorism as a pertinent case. Challenging the assumption of egalitarian structures of global governance, the author argues that power relations and the use of power (influence, coercion and force) play a more important role than previously suggested. Providing a critical assessment of the counterterrorism policies of EU, US and ASEAN, the book identifies a number of causes of participation in hegemonic governance, including asymmetric interdependence with the US, open and informal pressure in the case of the EU, and the authority and legitimacy of the leading actors.
This rare 10th anniversary edition (published in 2007) contains a new introduction by expert Soviet historian David M. Glantz. In addition all maps and graphics have been enhanced from the 1996 edition. "When the Soviet Union decided to invade Afghanistan, they evaluated their chances for success upon their experiences in East Germany, Hungary and Czechoslovakia. Unfortunately for their soldiers, as well as the people of Afghanistan, they ignored not only the experiences of the British in the same region, but also their own experience with the Basmachi resistance fighters in Central Asia from 1918-1933. Consequently, in Afghanistan the Soviet army found its tactics inadequate to meet the challenges posed by the difficult terrain and the highly motivated mujahideen freedom fighters. To capture the lessons their tactical leaders learned in Afghanistan and to explain the change in tactics that followed, the Frunze Military Academy compiled this book for their command and general staff combat arms officers. The lessons are valuable not just for Russian officers, but for the tactical training of platoon, company and battalion leaders of any nation likely to engage in conflicts involving civil war, guerrilla forces and rough terrain. This is a book dealing with the starkest features of the unforgiving landscape of tactical combat: casualties and death, adaptation, and survival." (From the original foreword by Hans Binnendijk, 1996)
This groundbreaking work challenges modernist military science and explores how a more open design epistemology is becoming an attractive alternative to a military staff culture rooted in a monistic scientific paradigm. The author offers fresh sociological avenues to become more institutionally reflexive - to offer a variety of design frames of reference, beyond those typified by modern military doctrine. Modernist military knowledge has been institutionalized to the point that blinds militaries to alternative designs organizationally and in their interventions. This book seeks to reconstruct strategy and operations in "designing ways" and develops theories of action through multifaceted contextualizations and recontextualizations of situations, showing that Military Design does not have to rely on set rational-analytic decision-making schemes, but on seeking alternative meanings in- and on-action. The work offers an alternative philosophy of practice that embraces the unpredictability of tasks to be accomplished. Written by Colonel Paparone (U.S. Army, Ret., PhD) with a special chapter by two active duty officers, it will appeal to all in military and security studies, including professionals and policymakers.
What threat does Al Qaeda pose to the United States as it continues to evolve in the wake of the Arab Spring, and what are the group's evolving strategies for growth and survival internationally? This book provides answers. Ideal for both students of terrorism and general readers wanting to better understand modern terrorism, this book provides an in-depth look at Al Qaeda, including its origins, evolution, doctrines, structure, and terrorist operations. The authors examine Al Qaeda's operational transitions over the last two decades, and consider these changes in terms of the impact of the Internet, the viciousness of the violence employed, the leverage of colonial past, and the subsequent international implications. Particular attention is paid to Al Qaeda's changing strategies for growth and survival across the Middle East and Africa as well as the threats that it poses to the United States as it continues to evolve in the wake of the Arab Spring. The work addresses why Al Qaeda-now both a professional force and a network of so-called "lone wolves"-must remain a primary focus of the United States and other Western states while also recognizing that the threat of terrorism goes beyond Al Qaeda. Analyzes the Al Qaeda belief that violence is required to achieve its goals and the common Al Qaeda perception that violence was used effectively by the colonialists and the West, particularly the United States and France Identifies the precursors to Al Qaeda organizations and how al Qaeda became what it is today Examines Al Qaeda's business associations and its ties to piracy and organized crime, identifying the opportunities these ties create; as well as the organization's use of emerging technology-especially the Internet-to reach out to a younger, technology-savvy audience for their message
Since the attacks of 11 September 2001, the topic of terrorism has been almost continually front-page news in the United Kingdom. The subsequent 'war on terror', including the invasion of Iraq, has only heightened interest in the matter. With the London bombings of 7 July 2005, Britain became a frontline in international terrorism and counter-terrorism. This reality has only been heightened by failed attacks in London on 21 July 2005, and through a series of high profile arrests in Forest Hill, in Birmingham in connection to a beheading plot, the arrests of NHS staff in connection to failed attacks in London and Glasgow, and the attempted arrest of Jean Charles de Menezes, which had tragic consequences. In this illuminating and fascinating look at an often misunderstood world Steve Hewitt offers a balanced, measured, and informed examination of recent events and offers a historical and contemporary context to this new threat, and how we are dealing with it.
In this groundbreaking work, leading scholars and experts set out
to explore the utility of the concept of affordance in the study
and understanding of terrorism and political violence.
Following previous trends of suicide bombings and violence against Western and local hostages, the 2005-2007 period saw a continuing tide of terrorism. Mickolus catalogues these recent insurgencies and technique, including airplane hijackings, letter bombs, food tampering, and major assassinations. An extension of his other other works, including terrorism dating back to 1980, this comprehensive chronology also provides follow-up material to prior incidents and enumerates their effects on current airport security measures around the world. This volume expertly details key players in each event, ranging from the terrorist whose violence created an atmosphere of fear and anxiety, to their unknowing victims. This work is divided into three sections: incidents, updates, and bibliography. In the first two segments, both domestic and international terrorist attacks are examined within security and political contexts to shed light on how the events unfolded. The extensive bibliographic data is also an invaluable resource for scholars, international organizations, and students.
One aspect of war is often overlooked: how much do they cost and how are they funded. Funding Extended Conflicts develops a baseline on Federal spending for the two extended conflicts of the Cold War era, Korea and Vietnam, and compares them with the global war on terror, including current outlays for Iraq and Afghanistan. It also provides wartime cases that offer recommendations on how to pay for future wars and focuses on the length of the tails of such spending, which are often omitted in the final analyses and distort funding estimates. Background chapters examine financing and budget issues as well as problems associated with defining the real cost of Korea, Vietnam, and the so-called long war against terrorism and are complemented by an assessment of the open-ended commitment to support homeland defense and conduct ongoing military operations in Southwest Asia. One aspect of war is often overlooked: how much do they cost and how are they funded. Funding Extended Conflicts develops a baseline on Federal spending for the two extended conflicts of the Cold War era, Korea and Vietnam, and compares them with the global war on terror, including current outlays for Iraq and Afghanistan. It also provides wartime cases that offer recommendations on how to pay for future wars and focuses on the length of the tails of such spending, which are often omitted in the final analyses and distort funding estimates. Background chapters examine financing and budget issues as well as problems associated with defining the real cost of Korea, Vietnam, and the so-called long war against terrorism and are complemented by an assessment of the open-ended commitment to support homeland defense and conduct ongoing military operations in Southwest Asia.
In the brief experience the world has had during the post-9/11 era, much has been made of the need for sharing intelligence in the war on terror, and a lot of emphasis has been placed on the desirability of interfaith dialogue between Christians and Muslims. But comparatively little attention has been paid to a crucial component of intercultural cooperation on the key global security issues facing the world today: that between and among the United States, Russia, and China. This book examines key security issues of the day from the perspectives of those three powers. From an American perspective, Russia represents an erstwhile enemy of the Cold War era who has the potential to become an ally, while China is poised to become either an enemy, an ally, or an economic rival, depending on whom you listen to. From a Russian perspective, the United States is a former ally during World War II turned Cold War enemy turned lone superpower, with the potential for cooperation and conflict, while China has always embodied both ally and rival, even during the Communist era. To the Chinese, who have had rivalries and cooperative relations with both powers, the United States is currently a valued supplier of both raw materials and a vast market for Chinese goods, while Russia and the United States are rivals in the scramble for influence in the Middle East and elsewhere. With such a complicated history and with a future fraught with all sorts of possibilities, how can these three key powers cooperate in managing and responding to global security threats and terrorism? This book examines key issues of the day, including the threat posed by al Qaeda, WMD, energy security, environmental security, ethnic and religious conflicts, and a nuclear North Korea, from the perspectives of the United States, Russia, and China. Each chapter is written by scholars from at least two of the three countries. In this manner, the book embodies that which it seeks to demonstrate, becoming in itself an artifact of intercultural cooperation in the new international security environment.
Long before the terrorist attacks of September 11, 2001, awakened the United States and the Western world to the heightened level of the terrorist threat, Southeast Asia had been dealing with this threat. The bombing in Bali that killed 202 people, many of them Australian tourists, was by no means the region's first experience with Islamic extremism, which can be traced back to the 1940s, and the Darul Islam struggle. The most recent group to emerge is Al-Jama'ah Al-Islamiyah (AJAI), the most potent Islamic terrorist organization to date in the region and the group behind the Bali bombing. Prior to 9/11, the terrorist challenge was essentially national in character, with groups attempting either to secede from the central government to form a new state or to force the central government to adopt policies that would support the raison d'etre of these extremist groups. Essentially, this involved the establishment of a political system that was more Islamic in character, either nationally or within a specific territory of a national state. This book analyzes the increasing Talibanization of Southeast Asia, a relatively new phenomenon that involves the adoption of Islamist doctrines, ideologies, and values that are largely militant in character, and that for some groups includes the adoption of violence to achieve their goals. Understanding this process of Talibanization in Southeast Asia, which was once an oasis of moderate Islam in the modern world, is the key to unraveling the mystery of the increased radicalization in the region. The AJAI represents the birth of the first regional terrorist organization in Southeast Asia. It is a transnational terrorist organization along the lines ofal-Qaeda. It aims to establish a regional Islamic state covering most of southern Southeast Asia that would ultimately form a new Islamic epicenter in the Asia-Pacific region. Additionally, what has made the AJAI a potent force has been its ability to synergize with various existing religious extremist groups in the region and beyond, including al-Qaeda and other like-minded groups based in Afghanistan and Pakistan. This has succeeded in posing one of the most serious security challenges to the region since the end of the Cold War. Jihadists are operating in small and localized cells even though the broad goals remain the same, namely, to spread sharia, establish an Islamic state, and bring down secular regimes. As most governments do not have the credibility or the expertise to diminish the threat posed by Islamist extremism, Wahhabism, and Salafism, Southeast Asia is in danger of being Talibanized in the near future.
This work is both a theoretical and empirical analysis of the growing use of ideological control in business and administrative organizations. The empirical studies reported in this volume were conducted in different types of organizations and in different countries (Poland, the United States, and Sweden). Throughout this unique examination, the author emphasizes the role of ideologies as vehicles for organizational change--not, as traditionally seen, as instruments for maintaining the status quo.
If you are interested in the JFK assassination, just starting to research the JFK assassination, or you have been studying the subject for a while you really need to have this book in your JFK library. "The JFK Assassination: A Researcher's Guide" is a compilation of almost 47 years of research, by some of the most noted author's in the JFK assassination community. It is like a depository for some of the most important issues of the assassination and more, all in one volume. The material is in an easy to read format with references so the reader can study an issue further if they wish. The author starts by introducing you to people, places, and issues surrounding the JFK assassination. Then you will walk through a sequential order of events leading up to the shooting, including a broad view of the shooting itself. You will continue through the aftermath of the murder, showing the impact this crime had on our history. You will also see proof Lee Harvey Oswald did not murder President Kennedy. Looking at the sequence of events you will see Oswald did not have time to get into position to do the shooting. The motorcade was scheduled to pass the Book Depository at 12:25 pm. Oswald was in the lunch room at 12:15. A good sniper would have been in position well in advance of his prey's expected arrival, which Oswald was not. Contrary to the WC's claim, authorities never had any "court-worthy" evidence putting Oswald in the sniper's window. Finally, looking at the evidence from a totally new perspective you will see definite proof of a conspiracy. It was a simple case of comparing the wounds, with the bullet count, and the time statistics of the rifle. If you were not convinced of a conspiracy before, you will be
This text explores the nature and possibility of revolution and civil strife in the context of international politics. "Terrorism, Civil War, and Revolution" analyzes the role of revolution and civil strife in the present day world. Expanding on the 2nd edition of Calvert's "Revolution and International Politics", this new work reflects the drastic changes that have taken place in the world order since 2001. With an increased focus on terrorism and civil war, the book looks into such key issues as the use of force by the state in the international system, challenges to states, wars of national liberation, counterinsurgency, and more. Written in a clear and accessible manner by a respected expert in the field, the book features the most recent examples of events, such as the insurgency in Sri Lanka, the rise of Al-Qaeda, and the wars in Afghanistan and Iraq. This approach will help situate revolutions in the larger context of political violence and will appeal to anyone interested in comparative politics, international relations, and revolutions.
In recent years, the field of psychology has seen an increasing interest in the aftereffects of psychological trauma. Work has been published that examines the psychological sequelae of rape, incest, combat, natural disaster, fire, and, in a few cases, hostage-taking. This is the first book that takes a long-term perspective, by asking questions such as: How did survivors view their experience through the lens of time? Were there any positive effects associated with the experience? The author examines how hostage victims perceive their victimization, and how they go about the task of rebuilding their assumptive world. In sharing the intimate details of this process, the hostage survivors have allowed us to be close observers in their efforts to redefine their world and themselves. They have served to expose the internal and external forces that have helped or hindered their efforts. It is important for those in human services, as well as management in higher-risk professions, to understand the trauma from the survivors' perspective. They need to know what is helpful to survivors and what is not. Common sense assumptions of those in authority are often wrong. Moreover, the initial post-release shock and the overwhelming press of emotions and events make it difficult for survivors to discern and express their genuine needs. The passage of time can help to distill and organize thoughts and feelings. In deepening our understanding of the needs of victims, this study has enhanced our ability to be of service.
View the Table of Contents. Read the Introduction. aAs a recognized expert in the field, Hamm is eminently
qualified to prepare this text on the subject of terrorism from the
criminal law perspective. . . . The text is written in a clear,
lively manner.a aDrawing on six case studies of terrorist attacks by radical
Islamists and right-wing racists, Hamm writes that American
counterterrorist agencies have neglected some basic insights from
scholarly criminology.a "Read this book to understand the important nexus between
terrorism and crime! This cutting edge analysis suggests a new
approach to defeat the terrorist threat to the United
States." "Hamm's clear writing style, careful research and theoretical
insights promise to make this a classic in criminology." "[Provides] the first detailed account of how crime provides
logistical support for terrorist strikes. By blending the study of
terrorism and criminology, Hamm offers the possibility of detecting
and stopping terrorism through the pursuit of conventional methods
of criminal investigation." Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed. This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed. |
You may like...
|