Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
This new edited volume analyzes the Middle East's political, strategic, and economic realities in 2015, looking at both old and new challenges, how political actors are evolving, and how policymakers can think strategically about the region.
When originally published in 1981 this was the first book to bring together in one volume some of the most thoughtful work by British academics and specialists studying the political violence and terrorism which had recently challenged Britain and other Western democracies. Four chapters consider the strategy and tactics of the IRA and the problems of the Northern Ireland conflict. Other articles discuss the phenomena of international terrorism. Essential reading for courses on political violence, revolution war and staregic studies, this volume will also be of relevance for training course in military and police staff colleges.
The collective belief in the End of the World, as described in the Biblical Book of Revelation, can be seen in public reaction to terrorist outrages such as those of Sept. 11, in the preoccupation with disasters, in the obsession with UFO's and the possibility of encountering extra-terrestrial life, and in the breakdown of social structures. Edinger argues that this very real psychological force is vitally important for our times, and he offers an alternative to catastrophe through understanding the meaning of these radiant scriptures.
The National Commission on Terrorist Attacks Upon the United States, known as the 9-11 Commission, is an independent, bipartisan commission created by congressional legislation and the signature of President George W. Bush in late 2002. The commission has produced a full and complete account of the circumstances surrounding the September 11, 2001 terrorist attacks, including preparation for and the immediate response to the attacks. It reports in detail on issues relating to intelligence agencies; law enforcement agencies; diplomacy; immigration, non-immigrant visas and border control; the flow of assets to terrorist organisations; commercial aviation; the role of congressional oversight and resource allocation; and other areas determined relevant by the Commission for its inquiry. It also provides recommendations designed to guard against future attacks.;W.W. Norton is proud to have been selected by the 9-11 Commission to be the authorised publisher of the report.
This book examines violence in international affairs. Originally published in 1975, the two types of violence which the book focusses on are nuclear deterrence and international terrorism. The broader perspective in which the ISODARCO discussions took place was the recognition of the need for a new kind of world order and the international contributors reflect a wide variety of ideological perspectives.
This study places terrorist acts in Europe in their historical perspective by examining terrorist and anarchist movements in late nineteenth century Europe. The political and legal aspects of modern terrorism are discussed in detail and the themes and variation in political terrorism are examined fully. In addition, selected case studies of contemporary terrorist movements are considered in the context of the political tradition of the particular country. A comprehensive picture of European terrorism, in its historical and more contemporary ideological and political aspects emerges from this work.
When originally published in 1984, this book was the first detailed study of terrorism in Ireland. It assesses the situation in Ireland after a decade or more of violence in the North and tests some of the assumptions about the nature of terrorism and discusses the problem in a geo-political context. The authors reflect a variety of disciplines and political outlooks and no single line of argument is offered. They examine how the issue of terrorism has been dealt with by various governments, the church, the media and individuals. The book reveals the complexity of the terrorist problem and dispels some of the myths that have grown up around Irish terrorism.
Building on the emerging field of biopolitics of security, this research monograph demonstrates that political speech can be crafted to manipulate segments of the voting population who are inherently predisposed to being receptive to certain language. The authors, who come from both political science and behavioral neuroscience, examine how the human brain reacts to expressions of political ideology regarding terrorism. They apply these reactions to specific forms of political communication, many of which are designed to elicit a desired response in creating support for a policymaker's agenda. By comparing and contrasting a variety of case studies, they demonstrate how similar acts accompanied by starkly different political language can create cognitive dissonance in the minds of the electorate and influence policy choices. Each chapter analyzes the content of a speech, its assimilation by different political groups, and two case studies. For example, the case of Luis Posada Carriles, a Cuban exile and former CIA agent responsible for the bombing of a Cuban airliner in 1976 is examined alongside that of Mohamed El Megrahi, the Libyan intelligence officer convicted of the bombing of Flight 103 over Lockerbie, Scotland in 1988 This unique study uses new research in neuropsychology to demonstrate how the American public's response to various policies on terrorism is manipulated, highlighting the impact of ideological speech regarding terrorism-the "language of terror."
Religious political violence is by no means a new phenomenon, yet there are critical differences between the various historical instances of such violence and its more current permutations. Since the mid-1970s, religious fundamentalist movements have been seeking to influence world order by participating in local political systems. For example, Islamic fundamentalism is at the heart of the Muslim Brotherhood in Egypt, the Christian fundamental right wing has seen a resurgence in Europe, and Jewish fundamentalism is behind the actions of Meir Kahane's Kach movement and the settler movement. The shift in recent years from secular to religious political violence necessitates a reevaluation of contemporary political violence and of the concept of religious violence. This text analyzes the evolution of religious political violence, in both historical and contemporary perspectives. Since religious political violence events are usually associated with the term "terrorism," the book first analyzes the origins of this controversial term and its religious manifestations. It then outlines and highlights the differences between secular and religious political violence, on ideological, strategic, and tactical levels, before comparing the concept of Holy War in Judaism, Christianity, and Islam. Lastly, it shows how modern radical monotheistic religious groups interpret and manipulate their religious sources and ideas to advocate their political agendas, including the practice of violence. A unique comparative study of religious political violence across Judaism, Islam, and Christianity, this text features many international case studies from the Crusades to the Arab Spring.
With the rise of international acts of terrorism there has been a commensurate rise in the level of international cooperation in the suppression of terrorism. This book, originally published in 1985, is a detailed and authoritative study of the background to this cooperation, the ways in which it has developed and the obstacles to its proper implementation. Particular emphasis is placed on a study of the European experience of international cooperation, the Council of Europe Convention on the Suppression of Terrorism being used as a case study.
The Kennedy assassination has produced a number of conspiracy theories based largely upon intriguing questions, speculation, and inference. Thousands of books and articles have been written about the assassination with a large majority of the published material arguing for a conspiracy of one kind or another. However, a relatively small volume of literature has been written from a scholarly and academic perspective. The Faces of Lee Harvey Oswald provides the first comprehensive scholarly analysis of Lee Harvey's Oswald's role in the JFK assassination. Scott P. Johnson objectively examines the various narratives of Lee Harvey Oswald created by researchers and authors over the last fifty years. He finds that at first glance any theory related to Oswald's role appears as convincing as the next, particularly when researchers carefully select information that only advances their preferred theory. In reality, however, Oswald's role in the assassination offers little certainty when one looks at the mystery surrounding Oswald's life and death as well as the complexity and ambiguity surrounding the murder of President Kennedy. Rather than putting forth a single theory, Johnson lays out the known facts against each theory and allows the readers to make their own decision.
President Obama has declared that the greatest terrorist threat which America faces is attacks by lone wolf terrorists. This volume expands the lone wolf rubric to include autonomous cells: small groups of terrorists who cooperate, but operate independently. The challenge presented by lone wolves and autonomous cells, unlike the threat emanating from established terrorist groups like Al Qaeda, has proven intractable because of the difficulty of gathering intelligence on these actors or effectively countering their actions. Lone wolves operate under the radar, staging deadly attacks such as that at the Boston Marathon, and the 2011 attacks in Norway. This volume includes Theory and Policy Studies, individual case studies and the technological impacts of chemical, biological and nuclear weapons as well as the impact of social media in the process of recruitment and radicalization. This book was originally published as a special issue of Terrorism & Political Violence.
This edited volume describes various analytic methods used by intelligence analysts supporting military operations in Iraq and Afghanistan as members of the Iraq and Afghan Threat Finance Cells-interagency intelligence teams tasked to disrupt terrorist and insurgent funding. All contributors have deployed to Iraq and/or Afghanistan and detail both the bureaucratic and intellectual challenges in understanding terrorist and insurgent finance networks and then designing operations to attack such networks via conventional military operations, Special Forces kill/capture targeting operations, and non-kinetic operations such as asset freezing or diplomacy. The analytic methods described here leverage both quantitative and qualitative methods, but in a language and style accessible to those without a quantitative background. All methods are demonstrated via actual case studies (approved for release by the U.S. government) drawn from the analysts' distinct experiences while deployed. This book will be of interest to current or aspiring intelligence analysts, students of security studies, anti-money laundering specialists in the private sector, and more generally to those interested in understanding how intelligence analysis feeds into live operations during wartime at a very tactical level.
More than 11 years after the 9/11 attacks and 10 years after the October 2002 Bali bombings, the need for a comprehensive assessment of what the countries in Southeast Asia have achieved is overdue. We need to consider whether the strategies against both the domestic and transnational terrorist and extremist threat have been appropriate and have yielded desired results. The aim of this book is to make a comprehensive assessment of the threats of terrorism and extremism in the region and of the policies and practices adopted by the regional countries to counter the same. It is also necessary to evaluate if the region has become a safer place after the decade-long fight. Most importantly, it is time to ask if we need a rethink or develop a new strategy to contain and manage the threats of terrorism and extremism.
Five decades after one of America's greatest tragedies, this compelling book pierces the veil of secrecy to document the small, tightly held conspiracy that killed President John F. Kennedy. It explains why he was murdered, and how it was done in a way that forced many records to remain secret for decades. The Hidden History of the JFK Assassination draws on exclusive interviews with more than two dozen associates of John and Robert Kennedy, in addition to former FBI, Secret Service, military-intelligence, and Congressional personnel, who provided critical first-hand information. The book also details the FBI confessions of notorious Mafia godfathers Carlos Marcello and Santo Trafficante to reveal exactly who killed JFK. Using files and information that have never been published before, Lamar Waldron fully explains for the first time how Marcello and Trafficante committed - and got away with - the crime of the twentieth century.
This book provides the first empirical analysis of lone-actor terrorist behaviour. Based upon a unique dataset of 111 lone actors that catalogues the life span of the individual's development, the book contains important insights into what an analysis of their behaviours might imply for practical interventions aimed at disrupting or even preventing attacks. It adopts insights and methodologies from criminology and forensic psychology to provide a holistic analysis of the behavioural underpinnings of lone-actor terrorism. By focusing upon the behavioural aspects of each offender and by analysing a variety of case studies, including Anders Breivik, Ted Kaczynski, Timothy McVeigh and David Copeland, this work marks a pointed departure from previous research in the field. It seeks to answer the following key questions: Is there a lone-actor terrorist profile and how do they differ? What behaviours did the lone-actor terrorist engage in prior to his/her attack and is there a common behavioural trajectory into lone-actor terrorism? How 'lone' do lone-actor terrorists tend to be? What role, if any, does the internet play? What role, if any, does mental illness play? This book will be of much interest to students of terrorism/counter-terrorism studies, political violence, criminology, forensic psychology and security studies in general.
Understanding and harnessing the persuasive powers of narrative is central to U.S. and international counter-terrorism efforts. There is an urgent need to understand the narrative tactics of terrorist recruitment and an equal if not greater need to destabilize and exploit the weaknesses of those narratives. Maan makes a connection, unique to terrorism studies, between the mechanisms of colonizing narratives and psychological warfare aimed at the recruit. The power of both relies on misidentification, both types of narratives encourage individuals to take actions contrary to their best interests, and both are insidious: they are continued internally without the implementation of external physical force. While these narrative strategies have been powerful, Maan makes the argument, also unique to terrorism studies, that certain types of compositional structures lend themselves to manipulation and the weakness of those structures can be exploited from a security standpoint.
This invaluable resource is written by leading international experts of policing and terrorism prevention. The contributors provide an in-depth analysis of the dilemmas, challenges, and solutions faced by police departments and law enforcement bodies in their efforts to counter local and global terrorism. The chapters cover terrorism and the policing of terrorism in various countries, such as the US, Palestine, Columbia, Turkey, Korea, and Malta. Table of Contents: Female Perpetrators of Palestinian Terrorist Attacks with a Special Reference to Their Socio-Cultural Position: An Exploratory Empirical Examination * The Concept of Social Equilibrium and Its Application to Policing Terrorism in the United States * Policing Terrorism in Colombia * Dynamics of Terrorism in Turkey * Threat from and Policing against Global Salafi Terrorism in the Republic of Korea: A Story from the Eastern Front * Policing Terrorism in Malta * Post-9/11 United States' Airport Security Changes and Displacement * Situational Crime Prevention Applied to Ricin and Bioterrorism. (Series: Israel Studies in Criminology - Vol. 11)
This book considers the theoretical, policy and empirical arguments relevant to the debate concerning the legalisation of interrogational torture. Torturing Terrorists examines, as part of a consequentialist analysis, the nature and impact of torture and the implications of its legal regulation on individuals, institutions and wider society. In making an argument against the use of torture, the book engages in a wide ranging interdisciplinary analysis of the arguments and claims that are put forward by the proponents and opponents of legalised torture. This book examines the ticking bomb hypothetical and explains how the component parts of the hypothetical are expansively interpreted in theory and practice. It also considers the effectiveness of torture in producing 'ticking bomb' and 'infrastructure' intelligence and examines the use of interrogational torture and coercion by state officials in Northern Ireland, Algeria, Israel, and as part of the CIA's 'High Value Detainee' interrogation programme. As part of an empirical slippery slope argument, this book examines the difficulties in drafting the text of a torture statute; the difficulties of controlling the use of interrogational torture and problems such a law could create for state officials and wider society. Finally, it critically evaluates suggestions that debating the legalisation of torture is dangerous and should be avoided. The book will be of interest to students and academics of criminology, law, sociology and philosophy, as well as the general reader.
Globalization: The Paradox of Organizational Behavior is an excellent resource for undergraduate and graduate students, professors, policy makers, and the intelligentsia worldwide. Sagini explores the text's major themes using historical, materialistic, and imperialistic factors. The globalization movement is shaped by economic, political, technological, and cultural forces that transform human collectivities. Instability and related concomitant issues such as disease, energy security, and terrorism challenge the reconstructive role of internal and external factors in foreign policy decision-making. The implications of the global forces on the divided world of gated communities, urban and village ghettos, national borders, and cultural decay could be far-reaching if leaders fail to redesign and implement effective governance models.
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition is a highly detailed and exhaustive history and analysis of terror groups that both formed the Iraq insurgency and led to the rise of the Islamic State of Iraq and Syria (ISIS). It places heavy emphasis on the history, organization, and personalities of the al-Qaeda in Iraq (now ISIS), the former Baathist regime loyalists, and Shiite insurgents. The book also thoroughly analyzes how Iraq became the center of the ISIS strategy to create an Islamic caliphate in the heart of the Middle East. As terrorism activity proliferates and spreads globally, this timely second edition provides a solid understanding of how the Iraq insurgency was a born after the U.S.-led invasion, which led to the crisis of today. More specifically, the book: Illustrates the political, combat, and religious strategy as well as street-level tactics of the insurgents Reveals what American, British, and coalition soldiers endured in Iraq on the street every day for eight years, and what the Iraqi army and people now endure Demonstrates how the Iraqis employ very specific terrorist acts at particularly auspicious times to meet their strategic political or propaganda goals during a terror campaign Delineates strategies that the enemy saw as critical in forcing U.S. and coalition forces to withdraw, and the terrorist strategy that besieges the Shiite government that was left behind Includes three new chapters on the evolution of ISIS from al-Qaeda in Iraq (2011-2014), a revised history of al-Qaeda in Iraq (2005-2011), and updated geopolitical intelligence predictions The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition offers an unbiased examination of the myriad of Iraqi terror groups and the goal of expanding the Islamic State across the Middle East. The book shares knowledge that will hopefully limit the killing machine that is the Iraq insurgency and someday bring about a stable partner in the Middle East.
This is the first book on U.S. policy in Angola during the 1980s. Elaine Windrich shows how the Reagan administration and U.S. media inflated the importance of Jonas Savimbi and helped inflame the civil war in Angola. Pinpointing media strengths and weaknesses in shaping and in reporting on a major crisis in Africa, this ground-breaking work analyzes Savimbi as a cold war guerrilla, the role of different media segments in the dirty war in Angola, and the right-wing influence of the Reagan and Bush administrations into the 1990s. This moving and well-researched account, providing insights into how the U.S. media covers African and Third World issues, is a good text for foreign correspondents and for courses dealing with U.S. foreign policy, journalism and communications, and with Africa. The image of the Angolan rebel leader as a freedom fighter is shown to be a product largely of the U.S. media and the collaboration of right-wing lobby groups closely linked to the Reagan and Bush administrations. The resurrection of Savimbi, who represented a lost cause after his defeat in the Angolan civil war in 1976, but who was kept alive by South African support, was due to his adoption by the Reagan administration as an ally in the crusade against Third World governments supported by the Soviet Union. The study shows how the mainstream media tended to follow the administration's agenda and right-wing views in portraying Savimbi as an ally. Windrich also explains how the Bush administration and the media have continued to support Savimbi and his rebel movement.
This book offers a transnational feminist response to the gender politics of torture and terror from the viewpoint of populations of color who have come to be associated with acts of terror. Using the War on Terror in Afghanistan and Iraq, this book revisits other such racialized wars in Palestine, Guatemala, India, Algeria, and South Africa. It draws widely on postcolonial literature, photography, films, music, interdisciplinary arts, media/new media, and activism, joining the larger conversation about human rights by addressing the problem of a pervasive public misunderstanding of terrorism conditioned by a foreign and domestic policy perspective. Deb provides an alternative understanding of terrorism as revolutionary dissent against injustice through a postcolonial/transnational lens. The volume brings counter-terror narratives into dialogue with ideologies of gender, race, ethnicity, nationality, class, and religion, addressing the situation of women as both perpetrators and targets of torture, and the possibilities of a dialogue between feminist and queer politics to confront securitized regimes of torture. This book explores the relationship in which social and cultural texts stand with respect to legacies of colonialism and neo-imperialism in a world of transnational feminist solidarities against postcolonial wars on terror.
An Intelligence failure can be defined where there was intelligence available about a particular event, but either it was not collected or was mishandled later in the assessment cycle, as opposed to the failure of an intelligence operation. The Historical Dictionary of Intelligence Failures covers the history of intelligence failures through a chronology, an introductory essay, an extensive bibliography, and over 100 cross-referenced dictionary entries on the Ardennes Offensive, the Six Day War, and the Cuban Missile Crisis, the Prague Spring, the Arab Spring, 9/11. This book is an excellent access point for students, researchers, and anyone wanting to know more about the intelligence industry. |
You may like...
Financial accounting - IFRS Principles
Ilse Lubbe, Goolam Modack, …
Paperback
(1)
Introduction To Financial Accounting…
Willem Lotter, Nadia Rhodes, …
Paperback
Corporate Finance - A South African…
L. Alsemgeest, E. Du Toit, …
Paperback
(2)
|