![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
This book investigates the strategic use of America's historical crime control, counterterrorism, national security and immigration policies as a mechanism in the modern-day Trump administration to restrict migration and refugee settlement with a view of promoting national security and preservation. National Security and Policy in America critically explores how American culture, neocolonial aspirations, and indifference towards others negatively impact long-term global security. This book examines immigration and security policies and their origins, purpose, impact, and evolution vis-a-vis the recently imposed 'travel ban' and proposed border wall across the Southern border, as well as how foreign policy influenced many of the migration flows that are often labeled as security risks. The book also seeks to understand why immigration has been falsely associated with crime, terrorism, and national insecurity, giving rise to counterproductive policies, despite evidence that immigrants face intolerance and turmoil due to the powerful distinctions between them and the native-born. This book uses an interdisciplinary framework in examining the U.S.' current response to immigration and security and will thus appeal to undergraduate and graduate students of law, social justice, criminology, critical theory, neo-colonialism, security studies, policing, migration, and political science, as well as those interested in the practical questions of public administration.
Since 9/11 many books have been published on Islamic terrorism, but few of these have considered the issue from the perspective of strategic studies or in terms of an "insurgency." As a result, much of this literature ignores the process of radicalisation and fails to ascertain why some people turn to terrorism, while others from the same background do not. To counter this trend, Explaining Islamist Insurgencies explains how and why the process of Islamist radicalisation is an important step towards acts of terrorism and in the formation of terrorist organisations by focusing on Poso, a small town in Indonesia that experienced years of armed sectarian conflict between Muslim and Chrisitian communities in 2000-2007. Building on the frameworks provided by previous studies, Muhammed Tito Karnavian employs communications theory to explore the necessary precursors for the legitimising ideology, in this case Salafi-jihadism, to be effectively disseminated.With nearly 20 years of experience in academia and counter-terrorism operations in Indonesia, and as the current Chief of Papua Police, Karnavian employs his unparalleled access to information and individuals to delineate the various stages of the radicalisation of the Poso conflict and how radical organisations, such as al-Jamaah al-Islamiyyah (JI), came to be involved. This unique first-hand account of a counter-terrorist operation concludes by offering general policy implications that will be of use to both academics and practitioners.
The first contribution to Global Flashpoints: A Scarecrow Press Series, Christopher Daniels' Somali Piracy and Terrorism in the Horn of Africa provides readers with a comprehensive and in-depth analysis of the spate of piracy and terrorism plaguing the waters of Somalia and the global threat posed by this activity. Contesting the commonly held perception that the piracy and terrorism occurring in Somalia are two separate and unrelated activities, Daniels reveals how the collapse of the Somali state and the chaos that has ensued created the environment for piracy and terrorism to flourish in combination. He also notes how the failure to restore a functioning central government has allowed both to become dangerous threats not only to the people of Somalia but the entire world. Underscoring Somalia's dire state, Somali Piracy and Terrorism in the Horn of Africa lays out for readers such significant topics as the reasons behind the collapse of the Somali state and the secession of Somaliland, Puntland, and Jubaland; the rise of internationally-linked terrorist groups, such as Al-Shabaab and Hizbul Islam; and the dramatic spike in pirate attacks off the Somali coast. Daniels concludes by critiquing the methods that have been used to help alleviate these global security challenges and gives policy recommendations for future consideration. Designed to enhance readers' grasp of this global flashpoint, this volume includes a timeline, a glossary of terms, biographical entries on key individual and institutional actors in this conflict, and selected primary sources. It is the ideal introduction to students and scholars of international relations, African history and politics, terrorism, and maritime studies.
This book presents essential advances in analytical frameworks and tools for modeling the spatial and economic impacts of disasters. In the wake of natural disasters, such as Hurricane Katrina, the Haiti Earthquake, and the East Japan Earthquake and Tsunami, as well as major terrorist attacks, the book analyzes disaster impacts from various perspectives, including resilience, space-time extensions, and decision-making strategies, in order to better understand how and to what extent these events impact economies and societies around the world. The contributing authors are internationally recognized experts from various disciplines, such as economics, geography, planning, regional science, civil engineering, and risk management. Thanks to the insights they provide, the book will benefit not only researchers in these and related fields, but also graduate students, disaster management professionals, and other decision-makers.
After the rise of the Islamic State in the Middle East and the new geopolitical landscape in this region, it is essential for the modern reader to understand the history that has allowed for and influenced these types of Islamic groups to form. Historical Dictionary of Islamic Fundamentalism acts as a didactic resource that explains, from the Islamic perspective, the historical importance of the Islamic fundamentalist world. This dictionary provides a comprehensive and thorough analysis of various groups, events, movements, key figures, and dogmas that have influenced contemporary Islamic fundamentalism. A chronology spanning 600 years, graphs of complex Islamic group associations and alliances, and an Arabic-to-English glossary have all been included to facilitate a complete understanding of the nuances and generalities that have shaped this movement. This second edition of Historical Dictionary of Islamic Fundamentalism also contains an introduction, appendixes, an extensive bibliography, and more than 700 cross-referenced entries on ideologies, people, events, and movements of the 20th and 21st centuries.
With intensified threats to global security from international terrorism worldwide, education systems themselves face these same unprecedented security threats. Schools and universities have become marked loci of interest for the monitoring of extremism and counter-terrorism by security and intelligence agencies. The relationship between education systems and national security is nothing new though - it extends in surprising and unexpected ways into territory which is by turns open and covert, even secret. Acknowledging the genuine political and security concerns which have drawn educational systems ever closer to the intelligence community, this book shows how and why this has happened, and explains why the relationship between education and the security and intelligence communities extends beyond contemporary concerns with counter-terrorism. As the title of this book demonstrates, this is as much an intellectual challenge as a security struggle. Education, Security and Intelligence Studies thus critically engages with multi-disciplinary perspectives on a complex and contentious interface: between systems of often secret and covert national security and intelligence and open systems of national education. Delving into difficult to access and often closely guarded aspects of public life, the book provides the pathfinding groundwork and theoretical modelling for research into a complex of little explored institutional and epistemological interconnectedness between universities and the security and intelligence agencies. This book was originally published as a special issue of the British Journal of Educational Studies.
This book analyses the US drone attacks against terrorists in Pakistan to assess whether the 'pre-emptive' use of combat drones to kill terrorists is ever legally justified. Exploring the doctrinal discourse of pre-emption vis-a-vis the US drone attacks against terrorists in Pakistan, the book shows that the debate surrounding this discourse encapsulates crucial tensions between the permission and limits of the right of self-defence. Drawing from the long history of God-given and man-made laws of war, this book employs positivism as a legal frame to explore and explain the doctrine of pre-emption and analyses the doctrine of the state's rights to self-defence as it stretches into pre-emptive or preventive use of force. The book investigates why the US chose the recourse to pre-emption through the use of combat drones in the 'war on terror' and whether there is a potential future for the pre-emption of terrorism through combat drones. The author argues that the policy to 'kill first' is easy to adopt; however, any disregard for the web of legal requirements surrounding the policy has the potential to undercut the legal claims of an armed act. The book enables the framing and analysis of such controversies in legal terms as opposed to a choice between law and policy. An examination of the legal dilemma concerning drone warfare, this book will be of interest to academics in the fields of international relations, Asian politics, South Asian studies, and security studies, in particular, global security law, new wars, and emerging technologies of warfare.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
"Writing with years of experience in government, Ambassador Edward Marks and Michael Kraft have produced a splendid history of America's long campaign against terrorism. The book analyzes the recent changes in technology and tactics that have profoundly altered today's terrorist challenge...to understand where we are and how we got there, start here."-Brian Michael Jenkins, The Rand Corporation "...This book provides important perspective on where the United States has been in this fight and how that fight must evolve in the new administration. It is must reading for the Trump Administration and anyone else seriously concerned about the next steps in this long struggle." -Brig. Gen. Francis X Taylor, USAF (Rtd.), Former U.S. Coordinator for Counterterrorism and DHS Under Secretary for Intelligence and Analysis "...an indispensable guide to U.S. counterterrorism efforts and policies spanning five decades and nine presidencies ... (The book) fills a significant gap in the literature by providing an invaluable historical context to this unending struggle." -Professor Bruce Hoffman, Director, Security Studies, Georgetown University "A clear and comprehensive survey of American policy toward terrorism over the past half century ... it provides essential background for analysis of future policy." -Martha Crenshaw, Center for International Security and Cooperation, Stanford University U.S. Counterterrorism: From Nixon to Trump - Key Challenges, Issues, and Responses examines the "war on modern terrorism," from the Nixon administration to the early stages of the Trump administration. The book describes the evolution of U.S. counterterrorism responses to the changing terrorist threats, from primarily secular groups, to those with broad-reaching fundamentalist religious goals such as ISIS. The authors highlight the accelerating rate of changes in the terrorism situation from modern technology; the internet, "lone wolf" terrorists, cyber threats, and armed drones. The book describes the Bush Administration's dealing with terrorism as an existential threat and a Global War on Terrorism following 9/11. It then discusses how the Obama administration both continued and modified previous policies. The book provides an extensive list of key documents for those interested in the original texts and a discussion of legal issues. U.S. Counterterrorism provides insights and a useful backdrop for future decisions by the new administration and Congress.
Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.
Written by the world's leading expert on the Tokyo sarin attacks, Chemical and Biological Weapons and Terrorism is a comprehensive examination of the use, detection, and prevention of chemical and biological attacks. Divided in two parts, one devoted to chemical and the other biological weapons, this book emphasizes defense, decontamination, detection, treatment, mechanism of toxic action, and pathological effects in the case of each. Covering a diverse range of substances, chapters draw on detailed case studies on the US anthrax attacks, the Tokyo sarin gas attacks, as well as an entire chapter devoted to the Iran-Iraq War co-authored with Dr. Sayid Abbas Foroutan, a former Iranian military surgeon who actively participated in the treatment of Iranian soldiers suffering from gas poisoning. Features include: A case study of the Tokyo sarin gas attacks from the leading expert on the subject A detailed case study on the U.S. anthrax attacks A chapter on the Iran-Iraq War and controversial weapons co-authored with an Iranian military surgeon with first-hand knowledge of the subject Details on the various ways chemical and biological weapons can be constructed and deployed Applicable defense strategies, including detection of materials and decontamination in the event chemical/biological weapons are deployed Featuring over 100 unique photographs and detailed chemical structures, Chemical and Biological Weapons and Terrorism is essential reading for counterterrorism experts, first responders and medical professionals, security consultants and military personnel seeking to expand their knowledge of preventative strategies. The book also will serve as a great resource for students in homeland security, public administration, and criminal justice programs.
This interdisciplinary book explores the Northern Ireland conflict through a human rights framework. The book examines the conflict from the creation of the Northern Ireland state in 1921 to 2014. This timeframe allows an analysis of how human rights impacted upon the conflict in its broadest understanding (i.e. the pre-violent conflict, the violent conflict and the post-violent conflict phases). Furthermore, it allows for a better understanding of how the various stages of the conflict impacted upon how human rights are understood in Northern Ireland today. The study's main findings are that: (i) human rights had a significant impact on the development of the conflict; (ii) human rights violations were both underlying causes and direct causes of the descent into violence; (iii) the conflict coloured the view of human rights held by the main political actors; and (iv) human rights continue to be partially understood through the prism of the conflict. More generally, this interdisciplinary work explores the relationship between law, politics and conflict. This book will be of much interest to students of human rights, conflict resolution, British politics, law and security studies.
This book provides a rich analysis of the actors and organizations to reflect on the antecedents and trajectories of terrorism and insurgency in South Asia, and the different countermeasures adopted by the countries to deal with the security and developmental challenges. South Asia is a complex geography that has been both a victim and a playing field for indigenous insurgencies, and domestic and transnational terrorist movements. The contributors to this volume explore how this situation has posed serious challenges to the sovereignty of the states, to national and human security, and to the socioeconomic fabric of the communities, and to the ethnic and religious cohesion. The book provides detailed studies of country cases on terrorism, security, and insurgencies, and it underlines the national, regional, and global implications of the threats that emanate from this region. Presenting an opportunity to diversify away from a Western-centric focus on terrorism and security, this book will be valuable to researchers in political science, criminology, defense and security studies, and to policy makers and think tanks.
This handbook comprises essays by leading scholars and practitioners on the topic of U.S. counterterrorism and irregular warfare campaigns and operations around the globe. Terrorist groups have evolved substantially since 9/11, with the Islamic State often described as a pseudo-state, a terrorist group, and insurgency all at the same time. While researchers', analysts', and policymakers' understanding of terrorism has grown immensely over the past two decades, similar advancements in the understanding of counterterrorism lag. As such, this handbook explains why it is necessary to take a broader view of counterterrorism which can, and often does, include irregular warfare. The volume is divided into three thematic sections: Part I examines modern terrorism in the Islamic world and gives an overview of the major terrorist groups from the past three decades; Part II provides a wide variety of case studies of counterterrorism and irregular warfare operations, spanning from the 1980s to the irregular warfare campaign against the Islamic State in northern Syria in 2018; Part III examines the government instruments used to combat terrorism and wage irregular warfare, such as drones, Theater Special Operations Commands, and Theater Commands. The handbook fills a gap in the traditional counterterrorism literature by its inclusion of irregular warfare and by providing analyses from academic experts as well as practitioners. It will be of much interest to students of counterterrorism, counterinsurgency, U.S. national security, military affairs, and International Relations. The Open Access version of this book, available at https://www.routledge.com/Routledge-Handbook-of-US-Counterterrorism-and-Irregular-Warfare-Operations/Sheehan-Marquardt-Collins/p/book/9780367758363, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Radical Conflict addresses conflict at interpersonal and communal, legal and rhetorical, ethnopolitical, global, and geopolitical levels. The conflicts analyzed are "radical" because in each some intense and often prolonged violence takes place. The chapters address different kinds of violence(s)-physical and gratuitous, structural and socio-economic, legal and symbolic, all with significant ill effects and injustices that spiral in all directions. All share an interest in exploring imaginatively and speculatively what can be done to attenuate such cycles of violence. The volume analyzes how recurrent narratives, mythologies, media(ted) constructions and other discourse(s) of liberal democratic and authoritarian states play a significant role in exacerbating or thwarting violence, exposing, escalating, legitimizing, rationalizing, propagating, but also possibly mitigating violence in all of its forms. Each contributor provides a critical interpretation of the status of the conflict under inquiry, including: a teacher verbally abusing and ridiculing a student then exposing it in social media; a community torn apart by environmental disaster; the incommensurate but not incommensurable conflict between Israelis and Palestinians; the Muslim Brotherhood and the militarized state(s) of Egypt and Libya; urban discourses in cyberspace among Moroccan and Maghreb youth that have become counter-signifying publics against oppression of the state; the role of media and violence in Zimbabwe's political struggle; the impact of the Circassian diaspora in global politics especially in the United States; India's soft power approach to the Kashmir conflict as a way to capitalize on it through tourism; the agonistic discourses that pervade the conflict over the Sahara and deprive Sahrawi people of rights; and how the liberal state is implicated in the gratuitous violence of ISIL. The volume also offers a section on the rhetoric of exclusionary laws associated with intractable conflicts of the abortion conflict, the right to die controversy, and a Burkean perspective on violence in Bangladesh. Contributors suggest what can be done conceptually and politically to mitigate and end violations of those who are most vulnerable, banished, forgotten, damaged, and often silenced.
With recent changes in social and political landscapes around the world the focus of preventive counter-terrorism has shifted in many places from government to civil society. The contributors analyze the different approaches of Civil Society Organizations in preventing and countering violent extremism in various countries in South and Southeast Asia. The cases examined include, Malaysia, Indonesia, Myanmar, Sri Lanka and Bangladesh. The key emphasis is on understanding the context within which each example was initiated, and the factors that determined their relative success or failure. The evidence from these cases suggests that much can be achieved through empowering communities to engage in aiding both the indoctrinated and those who pose the greatest risk of radicalization. A valuable contribution to the literature on preventing and countering violent extremism.
This book argues that catastrophe is a particular way of governing future events - such as terrorism, climate change or pandemics - which we cannot predict but which may strike suddenly, without warning, and cause irreversible damage. At a time where catastrophe increasingly functions as a signifier of our future, imaginaries of pending doom have fostered new modes of anticipatory knowledge and redeployed existing ones. Although it shares many similarities with crises, disasters, risks and other disruptive incidents, this book claims that catastrophes also bring out the very limits of knowledge and management. The politics of catastrophe is turned towards an unknown future, which must be imagined and inhabited in order to be made palpable, knowable and actionable. Politics of Catastrophe critically assesses the effects of these new practices of knowing and governing catastrophes to come and challenges the reader to think about the possibility of an alternative politics of catastrophe. This book will be of interest to students of critical security studies, risk theory, political theory and International Relations in general.
In the wake of the September 11 attacks, American citizens within the United States constantly worry about security against future terrorist attacks. But author Gordon Greer delves further into this subject by trying to understand why the general public is so intent on the ramifications of security measures, such as the Patriot Act. The history of warfare might provide an answer. Greer examines domestic security throughout the history of the United States. During a period of war or the aftermath of war, the American government has generally found it necessary to install security measures that may limit a citizen's basic rights or freedoms. Greer discusses these security issues from the earliest history of the United States, beginning with the early American settlers and the Revolutionary War through World War II and the Cold War. Greer points out that ordinary American citizens may chafe under the constraints such wars produce simply because the United States has arguably never been a totalitarian government. "What Price Security?" is a thought-provoking look at a subject that affects us all, offering insight into how America can protect itself against future attacks.
In the wake of the publication of the Chilcot report, this book reinterprets the relationship between British public opinion and the Blair government's decision-making in the run-up to the 2003 invasion of Iraq. It highlights how the government won the parliamentary vote and got its war, but never won the argument that it was the right thing to do. Understanding how, why and with what consequences Britain wound up in this position means understanding better both this specific case and the wider issue of how democratic publics influence foreign policy processes. Taking an innovative constructivist approach to understanding how public actors potentially influence foreign policy, Strong frames the debate about Iraq as a contest over legitimacy among active public actors, breaking it down into four constituent elements covering the necessity, legality and morality of war, and the government's authority. The book presents a detailed empirical account of the British public debate before the invasion of Iraq based on the rigorous interrogation of thousands of primary sources, employing both quantitative and qualitative content analysis methods to interpret the shape of debate between January 2002 and March 2003. Also contributing to the wider foreign policy analysis literature, the book investigates the domestic politics of foreign policy decision-making, and particularly the influence public opinion exerts; considers the domestic structural determinants of foreign policy decision-making; and studies the ethics of foreign policy decision-making, and the legitimate use of force. It will be of great use to students and scholars of foreign policy analysis, as well as those interested in legitimacy in international conflict, British foreign policy, the Iraq War and the role of public opinion in conflict situations.
The War on Terror has established a new global order of political structures, legislation, and technologies designed to spy on the world's Muslims. This book explains the origins and trajectories of this political system. The contributors argue that a constellation of Western ideas about Muslims have evolved over time to produce an insatiable desire for all-pervasive, ever-expanding surveillance in our contemporary moment. The book posits that the surveillance order is not, however, only the result of conceptions of Muslims. It is, rather, the outcome of centuries of European thought regarding religion, governance, and revolution. Islamophobia and Surveillance traverses the existential desire for wakeful vigilance, the religious wars of early modern Europe, colonial India, the Balkan frontier of the EU, and the walls of the United States-Mexico border. The consequences of the new surveillance order transcend the West's Muslim Question and threaten the very existence of the liberal democratic state. This book will, therefore, be of interest to those studying a range of subjects related to international co-operation, modern political systems, and security studies, as well as Islamophobia. Islamophobia and Surveillance was originally published as a special issue of Ethnic and Racial Studies.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
This book maps and analyses the official British construction of the threat of cyberterrorism. By using interpretive discourse analysis, this book identifies 'strands' from a corpus of policy documents, statements, and speeches from UK Ministers, MPs, and Peers between 12 May 2010 and 24 June 2016. The book examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. The author makes novel contributions to the Copenhagen School's 'securitisation theory' framework by outlining a 'tiered' rather than monolithic audience system; refining the 'temporal' and 'spatial' conditioning of a securitisation with reference to the distinctive characteristics of cyberterrorism; and, lastly, by detailing the way in which popular fiction can be ascribed agency to 'fill in' an absence of 'cyberterrorism' case studies. He also argues that the UK government's classification of cyberterrorism as a 'Tier One' threat created a central strand upon which a discursive securitisation was established. This book will be of interest to students of Critical Security Studies, terrorism studies, UK politics, and international relations.
Agriculture represents one of America's critical infrastructures. The second edition of Food Supply Protection and Homeland Security addresses threats to humans including the introduction of anthrax, various poisons, small pox, or salmonella to our food supply. As in the first edition, the author examines the state of our food protection readiness. The battle plan against our food supply is examined and a blueprint for defense is included. From the farm to the highways, readers can examine what the federal government is doing to protect our food supply, as well as study actual cases of domestic-related contamination and terrorism and identify potential targets. Food Supply Protection and Homeland Security presents commonsense methodologies in a straightforward, but engaging manner. It was written in response to the critical needs of food production managers, agricultural managers, students, and anyone with a general interest in the security of their food supply system. Other books in the Homeland Security Series include: *Energy Infrastructure and Protection and Homeland Security *Water Infrastructure Protection and Homeland Security *Chemical Infrastructure Protection and Homeland Security *Nuclear Infrastructure Protection and Homeland Security *Dam Sector Protection and Homeland Security
An ethnography of terrorism trials in Delhi, India, this book explores what modes of life are made possible in the everyday experience of the courtroom. Mayur Suresh shows how legal procedures and technicalities become the modes through which courtrooms are made habitable. Where India’s terror trials have come to be understood by way of the expansion of the security state and displays of Hindu nationalism, Suresh elaborates how they are experienced by defendants in a quite different way, through a minute engagement with legal technicalities. Amidst the grinding terror trials—which are replete with stories of torture, illegal detention and fabricated charges—defendants school themselves in legal procedures, became adept petition writers, build friendships with police officials, cultivate cautious faith in the courts and express a deep sense of betrayal when this trust is belied. Though seemingly mundane, legal technicalities are fraught and highly contested, and acquire urgent ethical qualities in the life of a trial: the file becomes a space in which the world can be made or unmade, the petition a way of imagining a future, and investigative and courtroom procedures enable the unexpected formation of close relationships between police and terror-accused. In attending to the ways in which legal technicalities are made to work in everyday interactions among lawyers, judges, accused terrorists, and police, Suresh shows how human expressiveness, creativity and vulnerability emerge through the law.
Understanding and harnessing the persuasive powers of narrative is central to U.S. and international counter-terrorism efforts. There is an urgent need to understand the narrative tactics of terrorist recruitment and an equal if not greater need to destabilize and exploit the weaknesses of those narratives. Maan makes a connection, unique to terrorism studies, between the mechanisms of colonizing narratives and psychological warfare aimed at the recruit. The power of both relies on misidentification, both types of narratives encourage individuals to take actions contrary to their best interests, and both are insidious: they are continued internally without the implementation of external physical force. While these narrative strategies have been powerful, Maan makes the argument, also unique to terrorism studies, that certain types of compositional structures lend themselves to manipulation and the weakness of those structures can be exploited from a security standpoint. |
![]() ![]() You may like...
Advance Directives
Peter Lack, Nikola Biller-Andorno, …
Hardcover
Religious Perspectives on Human…
Joseph Tham, Alberto Garcia, …
Hardcover
R3,586
Discovery Miles 35 860
Biomedicine & Beatitude - An…
Nicanor Pier Giorgio Austriaco O.P.
Paperback
Sex Robots - Social Impact and the…
Ruiping Fan, Mark J. Cherry
Hardcover
R3,619
Discovery Miles 36 190
Contemporary Bioethics - Islamic…
Mohammed Ali Al-Bar, Hassan Chamsi-Pasha
Hardcover
R2,051
Discovery Miles 20 510
|