|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
In recent years, the field of psychology has seen an increasing
interest in the aftereffects of psychological trauma. Work has been
published that examines the psychological sequelae of rape, incest,
combat, natural disaster, fire, and, in a few cases,
hostage-taking. This is the first book that takes a long-term
perspective, by asking questions such as: How did survivors view
their experience through the lens of time? Were there any positive
effects associated with the experience? The author examines how
hostage victims perceive their victimization, and how they go about
the task of rebuilding their assumptive world. In sharing the
intimate details of this process, the hostage survivors have
allowed us to be close observers in their efforts to redefine their
world and themselves. They have served to expose the internal and
external forces that have helped or hindered their efforts. It is
important for those in human services, as well as management in
higher-risk professions, to understand the trauma from the
survivors' perspective. They need to know what is helpful to
survivors and what is not. Common sense assumptions of those in
authority are often wrong. Moreover, the initial post-release shock
and the overwhelming press of emotions and events make it difficult
for survivors to discern and express their genuine needs. The
passage of time can help to distill and organize thoughts and
feelings. In deepening our understanding of the needs of victims,
this study has enhanced our ability to be of service.
The recent European Council Directive 114/08 requested the EU
Member States to perform an assessment aimed at the identification
and designation of the so-called European Critical Infrastructures
(ECI). Every analysis of the results of the "first round" of
identifications and designations has only taken into account the
numbers of ECIs effectively designated, consequently leaving aside
all of the other elements related to this important path towards a
harmonized vision of the "European Security." This work, with its
unprecedented approach, focuses on the elements that have maximized
or frustrated the ambitious European objectives and on the issues
that might have prevented the directive reaching its full
potential. Furthermore, the study offers an in-depth perspective on
the lessons learned - including those that can be learned from the
US pre-post 9/11 CIP policies - as well as an assessment of the
state of play of the Member States after the implementation of the
directive, together with predictions for future challenges.
Drawing upon insights from the natural and social sciences, this
book puts forth a provocative new argument that the violent
Islamist threat in Indonesia today derives its stubborn resilience
from being in essence a complex, adaptive and self-organizing
system - or what some specialists might even call a super-organism.
The book challenges the popular assumption that ideology is the
root cause that explains why Indonesian Islamists radicalize into
violent extremism. In addition it addresses why despite years of
intense security force pressure, seemingly disparate militant cells
keep 'popping up' like the proverbial hydra - and in the apparent
absence of a centralized coordinating body, nevertheless appear to
display an organic interconnectivity with one another. Going beyond
standard ideological mantras the book argues that fresh
inter-disciplinary thinking is needed to cope with the constantly
mutating violent Islamist challenge in Indonesia, and puts forth a
comprehensive strategy for doing so. It will be of interest to
academics and students of terrorism, religion and violence in the
Southeast Asian region.
Technology provides numerous opportunities for positive
developments in modern society; however, these venues inevitably
increase vulnerability to threats in online environments.
Addressing issues of security in the cyber realm is increasingly
relevant and critical to society. Threat Mitigation and Detection
of Cyber Warfare and Terrorism Activities is a comprehensive
reference source for the latest scholarly perspectives on
countermeasures and related methods to enhance security and
protection against criminal activities online. Highlighting a range
of topics relevant to secure computing, such as parameter
tampering, surveillance and control, and digital protests, this
book is ideally designed for academics, researchers, graduate
students, professionals, and practitioners actively involved in the
expanding field of cyber security.
Richard Leeman analyzes the possible discursive responses to
terrorism, prescribing "democratic rhetoric" as the most strategic
counterterrorist response available. He examines counterterrorism
as a response to terrorism, considering each side as one-half of a
dialogue. Given the inherently anti-democratic nature of
terroristic discourse, he hypothesizes that the best discursive
strategy is to shift the dialogue to different grounds, i.e., to
use democratic rhetoric. As a test of his hypothesis, the author
considers the responses of the Reagan and Nixon administrations to
acts of terrorism. The Reagan administration's response to
international terrorism provides an example of wholly
non-democratic counterterrorist discourse. Leeman's case study
suggests that this was a failed rhetoric. The Nixon administration,
on the other hand, used a mixed democratic and non-democratic
terrorist rhetoric in response to terrorism. Leeman argues that the
non-democratic elements of the discourse subverted the democratic
elements, thus leading to an ineffective use of discourse for the
purpose of counterterrorism. Leeman thus concludes that a wholly
democratic rhetoric is the best discourse available for the
counterterrorist speaker or writer. This is the first book to
specifically address the rhetoric of terrorism and
counterterrorism, and prescriptively suggests how America can
address the problem of terrorism through discourse. This unique
book will be provocative reading to those in the fields of speech
communication, political science, history, sociology, and the mass
media.
Traditional counter-terrorism approaches, with their emphasis on
the military, are failing. This is seen in the fact that there is
an average of three terrorist attacks per day in Africa. This study
calls for more holistic solutions, with an emphasis on development
and better governance to curb the scourge of terrorism.
Terrorism has become an everyday reality in most contemporary
societies. In a context of heightened fear can juries be trusted to
remain impartial when confronted by defendants charged with
terrorism? Do they scrutinize prosecution cases carefully, or does
emotion trump reason once the spectre of terrorism is invoked? This
book examines these questions from a range of disciplinary
perspectives. The authors look at the how jurors in terrorism
trials are likely to respond to gruesome evidence, including
beheading videos. The 'CSI effect' is examined as a possible
response to forensic evidence, and jurors with different learning
preferences are compared. Virtual interactive environments, built
like computer games, may be created to provide animated
reconstructions of the prosecution or defence case. This book
reports on how to create such presentations, culminating in the
analysis of a live simulated trial using interactive visual
displays followed by jury deliberations. The team of international,
transdisciplinary experts draw conclusions of global legal and
political significance, and contribute to the growing scholarship
on comparative counter-terrorism law. The book will be of great
interest to scholars, students and practitioners of law, criminal
justice, forensic science and psychology.
This unique, historical study explores how states have articulated
statements about terrorism since the 1930s and what effect these
discourses have had on global politics. Ditrych's analysis
challenges established understandings of terrorism, providing a new
conceptualization of how terrorism discourse emerged historically.
This comprehensive bibliography is the first to catalog, describe,
and index the vast body of TV, video, and film materials dealing
with John F. Kennedy's assassination. This guide to the first
newsreels, and later films and documentaries, TV programs, videos,
and little-known materials is organized for the most part
chronologically and by genre of work. This research guide points
also to North American and United Kingdom film libraries and
archives and provides a short list of key sources of printed
materials. The appendix and indexes to titles; TV stations and
production companies; interviewers and witnesses; and presenters,
reporters, and narrators make the bibliography easily accessible
for those studying JFK, modern history, political science, and
sociology.
The project discusses Hezbollah's political ideology and how it
evolves over time and the conditions that lead to the change of
ideology. The author also examines Hezbollah's relationship with
the patron states, Syria and Iran. In contrast with major arguments
in the literature, the book argues that political ideologies are
not fixed and they evolve depending on a number of factors such as
the change in context, major events like a civil war in the patron
state, and, most importantly, when the change of ideology becomes
linked to survival of the insurgency. This monograph will appeal to
a wide range of audiences such as researchers, scholars, and
graduate students in the fields of Middle Eastern studies,
political studies, Islamism, and nationalism.
Yugoslavia and Political Assassinations is the first book in
English to analyse how and why the Yugoslav State Security Service
carried out multiple targeted assassinations, over the country's
forty-six years of existence, under the pretext of protecting the
Yugoslav communist party-state. Offering a detailed history of the
programme, from the inception of the State Security Service to the
recent trials of individuals involved, it draws on Christian Axboe
Nielsen's unique wealth of experience and research as an academic
and as an expert witness in numerous criminal trials. The result is
a ground-breaking contribution to the history of targeted
assassinations, communist history, state security services and
related criminal trials.
This book assesses President Barack Obama's counterterrorism policy
as it evolved throughout his presidency, from the expanded use of
drones to the controversial decisions regarding the Syrian
conflict. President Obama has achieved the dubious distinction of
having been the longest continuous war president in American
history, and this title explores how Obama pursued and expanded
executive war power in key areas, simultaneously committing to a
light footprint approach for U.S. military forces and emphasizing
the use of drones, targeted killing of terrorists, and training,
advising, and assisting local forces to defend themselves from
militant groups such as ISIL. It also provides an in-depth analysis
of the defining issue of the Obama counterterrorism strategy:
Syria, and his refusal to militarily commit to defeat Bashar
al-Assad and support Syria's insurgency. The work concludes with a
consideration of counterterrorism policy post-Obama.
Within the last few years, most of America's citizen's obtained
information about the War on Terror and the events taken place in
the Middle East, like the war in Iraq and the Israel/Palestine
conflict, via writers and reporters who have either never been to
Arab countries or have been, but stayed within secure areas,
isolated from the general public, for security purposes. The
unconventional work of this book has been derived from the Authors
intense living among Arab societies for nearly twenty-five years,
obtaining vast knowledge of how and why they hold hostile feelings
toward America, and how these emotions can be overcome.
Terrorism and its manifestations continue to evolve, becoming
deadlier and more menacing. This study considers the evolution of
terrorism since 1968 and how airlines and governments have
attempted to deal with this form of violence through a series of
nonforce strategies. Using historical examples, we see how
governments, particularly the United States, attempted to counter
politically motivated aerial hijacking with metal detectors, legal
means, and, finally, in frustration, counterviolence operations to
subdue terrorists. As nations witnessed aerial hijacking and
sieges, the requirement for paramilitary and military
counterterrorist forces became a necessity. Through use of examples
from Israel (Entebbe 1976), West Germany (Mogadishu 1977), and
Egypt (Malta 1985), Taillon concludes that cooperation--ranging
from shared intelligence to forward base access and observers--can
provide significant advantages in dealing with low-intensity
operations. He hopes to highlight those key aspects of cooperation
at an international level which have, at least in part, been vital
to successful counterterrorist operations in the past and, as we
witnessed again in the campaign in Afghanistan, are destined to
remain so in the future.
This book addresses contemporary debates on civil disobedience in
Islam within the rich Sunni tradition, especially during the height
of the non-violent people revolution in various Arab countries,
popularly known as the Arab Spring. It illustrates the Islamic
theological and jurisprudential arguments presented by those who
either permit or prohibit acts of civil disobedience for the
purpose of changing government, political systems or policy. The
book analyses the nature of the debate and considers how a
theological position on civil disobedience should be formulated in
contemporary time, and makes the case for alternatives to violent
political action such as jihadism, terrorism and armed rebellion.
'Callaghan's portrayal of a city under siege is many-layered and
brilliantly told' Sunday Times Iraq, 2014As ISIS laid terrible
siege to Mosul, a zoo on the eastern edge of the Tigris was kept
open against all odds. Under the stern hand of the zookeeper Abu
Laith, whose name - loosely translated - means Father of Lions, its
animals faced not only years of occupation, but starvation and
bombardment by the liberating forces. Father of Lions is the story
of Mosul Zoo: of resilience and human decency in the midst of
barbarism. 'Father of Lions captures, with heartbreaking poignancy,
the human cost of these conflicts' Josie Ensor, Middle East
Correspondent for the Daily Telegraphy 'Through the story of a man
who loves both lions and life, Louise Callaghan shows how humour
and defiance can counter cruelty' Lindsey Hilsum, author of In
Extremis
This book examines ten reasons for global jihad today.
Specifically, the reasons are (1) radicalization, (2) group
dynamics and socialization, (3) social alienation, (4) religious
motivations, (5) legal motivations, (6) political motivations, (7)
a Clash of Civilizations, (8) economic conditions, (9)
transformative learning, and (10) outbidding and internal rifts. To
investigate these points, all chapters include the historical
background, specific case studies (both past and current),
statistics, and theoretical approaches to the subject of global
jihad. The main purpose of jihad is to achieve global
domination-through any means, including violence-and establish the
Caliphate. The Caliphate is a Muslim system of world government
that seeks to establish a new world order by overthrowing the
current order, effectively creating an all-encompassing Islamic
state.
This volume is based on a multidisciplinary approach towards
biological and chemical threats that can, and have been previously
used in bioterrorism attacks around the globe. Current knowledge
and evidence-based principles from the fields of synthetic biology,
microbiology, plant biology, chemistry, food science, forensics,
tactics, infective medicine, psychology and others are compiled to
address numerous aspects and the complexity of bioterrorism
attacks. The main focus is on biological threats, especially in the
context of synthetic biology and its emerging findings that can be
observed as possible threat and tool. The book examines
microorganisms and their possible use in forensics, i.e. as
possible detection tool that could enable fast and precise
detection of possible treats. A number of plant derived components
are also discussed as possible agents in bioterrorism attacks, and
in relation to infectious disease pathology. Another integral part
is food safety, especially in terms of large food supply chains,
like airline caterings, institutionalized kitchens etc. Food can be
observed as a possible mean of delivery of various agents
(biological and chemical) for bioterrorism attacks. Steps on how to
recognize specific critical points in a food supply chain, along
with proposed corrective activities are discussed. Examples from
around the globe, along with the methodological approach on how to
differentiate bioterrorism attacks from other epidemics are
provided. However, epidemics are also discussed in the context of
migrations, with the special emphasis on the current refugee
migrations that affect not only Europe, but also the United States.
The book will be of interest to experts from various fields of
science as well as professionals working in the field. The book
encompasses examples and tools developed for easier, more specific,
and faster detection of possible bioterrorism treats, along with
proposed actions for some aspects of a bioterrorism attack.
Terrorism poses an undeniable threat to societies throughout the
world today. Martyr terrorism, the fastest growing form of
terrorist activity, and arguably the most effective, has become a
regular occurrence. But how has terrorist activity evolved in the
last 100 years, and what are the ethical costs of terrorism? In
this informative book, three philosophers, all experts on the
ethics of conflict, examine the various definitions of terrorism
and the nature of martyr terrorism. Through accounts of terrorist
campaigns, from 19th century Russian terrorism, to the 20th century
campaigns in Ireland , Israel and Greece , and contemporary
campaigns in Chechnya , Afghanistan and Iraq , this fascinating
book explores the ethical implications of terrorism from a
philosophical perspective. Setting out the social, psychological
and political causes of terrorism, the book interrogates the cases
for and against terrorist activity in terms of just war theory.
Articulate, provocative and stimulating, this timely book is an
ideal introduction to an important contemporary social issue.
This book constitutes a journey into the obscure field of
sectarian-guided discourses of radical Islamist groups. It provides
new insights into the ideological mechanisms utilized by such
organizations to incite sectarian conflicts and recruit local and
foreign guardians to their alleged cause. This book examines
diverse aspects and dimensions of the discourses of Sunni-based
ISIS and Shia-based al-Hashd al-Shaabi and explores manipulative
and ideological discursive strategies utilized by media outlets
associated with these groups. It delves into linguistic and
contextual activities, implicit and explicit messages within the
discourses of various media outlets operating in the heart of the
Middle East. It also scrutinizes and explains aspects of
politicization, religionization and sectarianization within the
media discourse of terrorist groups in the digital era.
When it comes to airline security, there is nothing more
important than getting people to their destinations safely.
Transportation security is also a key component in the overall
mission of protecting the nation against terrorist attacks. But
airline security is a tricky goal--how do you achieve acceptable
levels of security at a reasonable cost and without unduly
inconveniencing passengers or invading their privacy? That's
exactly what this book is about. Experts examine the latest
thinking and analyze the latest research on air passenger security,
discuss current practices, and show how technology can solve myriad
problems. The book will, in short, help keep us all safer when
flying.
Conventional research suggests that news coverage of terrorism is a
tool of the terrorist to gain public support and recognition. Based
on an analysis of more than 200 evening newscasts aired during the
first six years of the Reagan administration, Tales of Terror
offers a detailed account of the ways in which news media escalate
public panic about terrorism and encourage support for specific
U.S. policy objectives, rather than build sympathy for terrorists.
Bethami Dobkin explores similarities between news media and
government portrayals of terrorism, combining textual criticism
with an interpretation of official U.S. policy statements, and
argues that government depictions and news presentations of
terrorism reproduce an ideology that supports military strength and
intervention. Dobkin examines several specific features of news
coverage: the dramatic format of television news and the political
interests that this format serves; the narrative construction of
enemies by television journalists and public officials and the
political significance of the "terrorist" label; the use and
significance of testimony, particularly that of people affected by
crisis; the mutual exploitation of political crisis by both
television news producers and public officials; the function of
journalism in shaping the conduct of public diplomacy and public
perceptions of foreign conflict; and the creation of consensus
about the need for military responses to political violence. This
revealing study will be of particular interest to scholars of
communications and political science.
|
|