|
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
Since 2001, the United States has created or reorganized more than
two counterterrorism organizations for every terrorist arrest or
apprehension it has made of people plotting to do damage within the
country. Central to this massive enterprise is 'ghost-chasing,' as
less than one alarm in 10,000 is an actual threat-the rest all
point to ghosts. And the vast majority of the leads deemed to be
productive have led to terrorist enterprises that were either
trivial or at most aspirational. As John Mueller and Mark Stewart
suggest in Chasing Ghosts, this is often an exercise in dueling
delusions: a Muslim hothead has delusions about changing the world
by blowing something up, and the authorities have delusions that he
might actually be able to overcome his patent inadequacies to do
so. Mueller and Stewart systematically examine this expensive,
exhausting, bewildering, chaotic, and paranoia-inducing process.
They evaluate the counterterrorism efforts of the FBI, the National
Security Agency, the Department of Homeland Security, and local
policing agencies. In addition, applying a new set of case studies,
they appraise the capacities of the terrorist 'adversary' and
discuss what they calls 'the myth of the mastermind.' They also
assess public opinion, a key driving force for counterterrorism
efforts. The yearly chance an American will be killed by a
terrorist within the country is about one in four million under
present conditions. However, polling data suggest that, although
over a trillion dollars has been spent on domestic counterterrorism
since 2001, Americans continue to be alarmed and say they do not
feel safer. No defense of civil liberties is likely to be terribly
effective as long as officials and the population at large continue
to believe that the threat from terrorism is massive, even
existential. Mueller and Stewart do not argue that there is nothing
for the ghost-chasers to find-the terrorist 'adversary' is real and
does exist. The question that is central to the exercise, but one
the ghost-chasers never really probe, is an important and rather
straight-forward one to which standard evaluative procedures can be
applied: is the chase worth the effort? Or is it excessive given a
serious consideration of the danger that terrorism actually
presents?
Northern Ireland's Belfast Agreement has faced continual crises of
implementation over a variety of security related issues. Too
frequently analyses have neglected to study the wider changes that
have occurred inside and outside Northern Ireland. These have had
profound effects in changing attitudes towards violence,
paramilitaries, the position of women and ideas of nationalism and
sovereignty. This book places the implementation of the Belfast
Agreement in a wider context to provide an analysis of why
implementation has been so difficult.
 |
Women and Terrorism
(Hardcover)
Luisella De Cataldo Neuburger, Tiziana Valentini, Trans Leo Michael Hughes
|
R2,641
Discovery Miles 26 410
|
Ships in 18 - 22 working days
|
|
|
Women and Terrorism analyses a new phenomenon of international
concern: the participation of women in subversive terrorist
movements. The book deals with four main issues: 1) women's
participation in violent terrorist movements to discover the key to
the psychological and sociological interpretation of their
involvement in a life experience they are not traditionally
associated with; 2) the different responses to 'penitentism'
between men and women; 3) the psychological and social
interpretation of women's support of armed struggle and an inquiry
- through the personal experience of the women terrorists
interviewed - into the reasons for women's greater resistance to
repentance; 4) the use of the leads this inquiry has furnished for
prognostic purposes and to predict and create conditions that
facilitate repentance.
Part I is a compendium of World War II service recollections
embracing the unusual, bizarre and humorous, most of which never
appeared in the news or any publications. However, I do believe
readers will be very interested in the other side of war. Part II
is an incisive review of Vietnam, and why we failed or should never
have been involved militarily. Part III is a current analysis of
terrorism and the Iraq war, including a new proposal to address the
global aspects of terrorism and the Palestinian issue.
This comprehensive account examines the East Turkistan Islamic
Movement (ETIM)-the most significant Muslim militant group in
China-including its origins, objectives, ideology, leadership, and
tactics. To effectively engage China on counterterrorism issues, we
must understand the capabilities and intentions of the East
Turkistan Islamic Movement (ETIM), the most significant Muslim
militant group in China. The ETIM: China's Islamic Militants and
the Global Terrorist Threat is the first book to focus specifically
on the ETIM, a terrorist group that demands an independent Muslim
state for the Uyghur ethnic minority in northwest China. This
fascinating study offers a comprehensive account of the group's
origins, objectives, ideology, leadership, and tactics. It details
the historical and contemporary contexts of the Uyghur separatist
movement, the ETIM's alleged ties to international terrorist
networks, and the Chinese government's interest in promoting the
ETIM as a significant international problem. In addition, the book
addresses conflicting claims about the membership and viability of
the organization, noting where the Chinese government has
apparently manipulated information about the ETIM to suit its own
goals. A final chapter explores how various countries define ETIM
activities and what that means for relations with China. Includes
press releases issued by the Chinese government on violent Uyghur
separatism and presents timelines of the ETIM's attacks and other
activities and of major events in the history of Uyghur separatism
Offers a bibliography that compiles scholarly and news sources
pertaining to the ETIM and provides glossary of key terms derived
from the Chinese, Uyghur, and English languages
The Ulster Volunteer Force (UVF) was established in January 1913,
as a militant expression of Ulster Unionist opposition to the Third
Home Rule Bill. It built on the foundations of pre-existing
paramilitary activity and, at its height in early 1914, reached a
strength of 100,000. During the Great War the UVF provided the
basis of the 36th (Ulster) Division and in 1920 the force was
partially reformed to counter the I.R.A. threat to the new Northern
Ireland state. Academic historians have tended to overlook Ulster
Loyalism. This book provides the first comprehensive study of the
UVF in this period considering in detail the composition of the
officer corps, the marked regional recruiting differences, the
ideologies involved, the arming and equipping of the UVF and the
contingency plans made by UVF Headquarters in the event of Home
Rule being imposed on Ulster. Using previously neglected sources,
Timothy Bowman demonstrates that the UVF was better armed and worse
trained, with the involvement of fewer British army officers than
previous historians have allowed. He suggests that the UVF was
quite capable of seizing control of Ulster and installing the
Ulster Provisional Government in the event of Home Rule being
implemented in 1914, but provided few benefits to the 36th (Ulster)
Division and failed to reform in any meaningful way in 1920. This
book will be essential reading for military and Irish historians
and their students, and will interest any general reader interested
in modern paramilitary forces.
With the dissolution of the Soviet Union the nuclear threats facing
the world are constantly evolving and have grown more complex since
the end of the Cold War. The diversion of complete weapon systems
or nuclear material to rogue nations and terrorist organizations
has increased and new nuclear powers (e.g. Iran, Korea, Pakistan
and India) have further complicated global proliferation issues.
The events of the past years have proved the necessity to
reevaluate these threats on a level never before considered. In
recognition that no single country possesses all of the answers to
the critical scientific, institutional and legal questions
associated with combating nuclear and radiological terrorism, the
2005 Workshop and this proceeding was structured to promote
wide-ranging, multi-national exploration of critical technology
needs and underlying scientific challenges to reducing the threat
of nuclear/radiological terrorism; to illustrate through
country-specific presentations how resulting technologies were used
in national programs; and to outline the role of legal, policy and
institutional frameworks in countering nuclear/radiological
terrorism. One key outcome of this book is better understanding of
the independent contributions from across the international
community of the scientific and technological components and the
legal, policy and institutional components to combating
nuclear/radiological terrorism. The book can serve as a tool for
communicating the outcomes of the workshop not only to the
multi-national scientific communities engaged in combating
nuclear/radiological terrorism, but also to those working at
governmental and policy levels whose actions affect the
directionsscience takes and how the technology is incorporated into
country-specific national systems for combating
nuclear/radiological terrorism.
This book carefully and thoroughly analyses the legal questions
raised by the phenomenon of terrorism, and past and recent efforts
to fight it, from the perspective of international humanitarian law
(IHL). The objective is to substantially contribute to a better
understanding of the issues surrounding the content and
applicability of IHL as it applies to terrorism as well as to
analyse and contextualise the current debates on these
controversial and critically important questions. While due heed is
paid to doctrinal debates, particular emphasis is placed on the
practice of social actors, particularly, although not exclusively,
States. The analysis of their actual conduct as well as their
expectations about the interpretation and application of the law is
crucial to establishing an interpretive consensus on when and how
IHL is relevant to regulate acts of terrorism. The approach of the
book is analytical and discursive, rather than prescriptive. Thus
the reader will find the relevant rules of IHL and other legal
regimes as regards terrorism, but also the debates over their
application, the contradictions in State practice and the impact
these may have upon IHL's evolution and implementation. The aim is
to provide legal practitioners, as well as those in military,
political and academic circles, with a useful reference point.
Hopefully the book will also prove useful to other readers who will
find its content and easy-to-read style an encouragement to getting
acquainted with a topical subject, traditionally thought to be
reserved for legal specialists. This book was cited with approval
by the US Court of Appeals in Salim Ahmed Hamdan v United States of
America, 16th October 2012
Following 9/11 the United States faced a situation of exceptional
insecurity. In that period the Bush administration argued that
certain international norms did not apply to US conduct. Its
argument was underpinned by the claim that the United States was in
a state of armed conflict or war with a new kind of enemy. The
purpose of this book is to examine whether this approach outlasted
the moment of insecurity that gave rise to it. More than a decade
on from those attacks, and following a change of administration,
what influence do these arguments have on American policy? To
answer this question it focuses on four areas of policy: the use of
force and the prosecution, detention and interrogation of suspected
terrorists. It demonstrates how the Bush policy programme was
contested by liberals and realists from the outset. Any expectation
that the war on terror would end following the election of
President Obama has, however, proven unfounded. Obama consolidated
the liberal pushback against aspects of the Bush programme but the
US has continued to argue a state of armed conflict exists. The
scope of the battlefield and the definition of the enemy has been a
source of intense debate but the fact that the Guantanamo Bay
detention facility remained open long after the President promised
to close it is indicative of the underlying continuity. It is
argued that this is driven in part by domestic politics and in part
by an understanding of how the terrorist threat is evolving.
The book explores the global jihad movement and its emergence in
the latter half of the twentieth century. The book investigates the
nature and extent of this threat; traces its religious and
ideological roots; relevant history; the goals of the movement; who
is fighting jihad; how they end up in the movement; how it is being
funded and sponsored; and what nations, particularly the United
States, one of the movement's primary targets, are doing to counter
the threat. The book, intended for the general public, assumes that
the reader has only a minimal background of this compelling
contemporary topic. While the authors tried to avoid using academic
jargon, they have tried to source the book so that it could be used
in political science, international relations, and defense and
security studies courses.
Please visit Sharon Chadha blog at: www.sharonchadha.com
Immigration and its consequences is a substantially contested
subject with hugely differing viewpoints. While some contend that
criminal participation by migrants is the result of environmental
factors found in the host country that are beyond the control of
migrants, others blame migrants for all that is wrong in their
communities. In this book, experts from Europe, the USA, Turkey and
Israel examine recent developments in the fields of culture
conflict, organized crime, victimization and terrorism, all of
which intersect to varying degrees with migration and illegal
conduct. While the essays further our understanding of a variety of
issues surrounding migration, at the same time they illuminate the
complexities of managing the challenges as globalization increases.
The first major comparative study of the causes and consequences of
violent conflict that integrates and addresses the issue of
self-determination. The authors show that with violent conflict in
the developing world as the critical issue for the twenty-first
century, and conflict prevention a central security problem for
both the developed and developing world, self-determination
movements can only be understood, and conflict prevented, in the
context of global economic and cultural forces, and of local
responses to them.
This book assesses the effectiveness of Nigeria's counterterrorist
policies against Boko Haram. It takes a critical review of the
interventionist strategies adopted by the Nigerian government,
highlights the motivations behind the choice of strategies, and
proffers a deeper understanding of the factors responsible for the
state's inability, thus far, to rid the country of terrorism.
Specifically, it evaluates the NACTEST policy framework that guides
the Nigerian state's counterterrorist strategies, which contains
both hard and soft power approaches. Adopting historical and case
study approaches which put the Nigerian state and occurrences of
violent conflict in context, it takes cognizance of the politics of
ethno-religious diversity which reinforce violent conflicts among
groups and against the state, and reviews the socio-economic and
political realities that led to the emergence and sustenance of
Boko Haram. The volume concludes by suggesting practical policy
options for combating Boko Haram and other similar armed
insurrection. This book is appropriate for researchers and students
interested in African politics, conflict, security, peace studies,
terrorism, and counterterrorism, as well as policy makers and
government departments dealing with terrorism and counterterrorism.
What can the analysis of violence and terror tell us about the
modern world? Why is violence often used to achieve religious,
cultural or political goals? Can we understand the search for the
extreme that increasingly shapes violence today?
From 1960s student movements to today's global jihad, this text
explores the factors and debates shaping violence and terrorism in
our contemporary society. Each chapter confronts examples of
disturbing terrorist acts and events of mass violence from recent
history and uses these to examine key questions, theories and
concepts surrounding this sensitive and controversial topic. In
particular, the book:
- identifies core tools for the analysis of public violence
- explores the processes that mutate social movements into violent
groups
- describes the cultural, embodied, experiential and imagined
dimensions of violence
- highlights different periods and varying forms of terrorist
violence
- examines the role of globalization, media, technology and the
visual in violence and terror today.
"Our Violent World" shows how the social sciences can contribute to
an understanding of violence and responses to terror, as well as
the construction of a social world less dominated by fear of the
other. It is a must-read for students and citizens.
Missing from many contemporary analyses of the causes of terrorism
is any mention of the role of U.S. foreign policy, an examination
of which is seen by some critics as inherently unpatriotic. Even
less attention is paid to the role of the Israeli-Palestinian
conflict. Gerteiny, who has lived in the Middle East and who has
studied the region for more than four decades, does not shy away
from such controversies. In this book, he discusses the seminal
causes of contemporary transnational terrorism, particularly the
grievances inherent in the persistent Israeli-Palestinian conflict.
Gerteiny examines state and anti-state forms of terrorism, and he
carefully distinguishes between terrorism carried out in pursuit of
national liberation by the Palestinians and the theologically
driven jihadism that feeds on it. He considers anti-Western
Islamism as being reactive to a U.S. Middle East policy
inordinately influenced by the Zionist lobby. He reflects on Muslim
and Islamist world views and assesses the U.S. reaction to
terrorism after 9/11, including the wars in Afghanistan and Iraq.
Israel's unchecked expansionism at the expense of Palestine and its
suffocating grip over its population, carried out under the cover
of U.S. protection, constitute ethnic cleansing in Gerteiny's view.
This, and the ill-conceived U.S. strategy in the Gulf region, in
Afghanistan and Iraq, and the lack of communications with Syria and
Iran are perceived by most Muslims as harbingers of an ongoing new
"crusade." They constitute the main pernicious elements upon which
the wider-reaching vengeful Islamist "theopolitical" jihadism
thrives, ultimately threatening the spread of democracy, the
survival of Israel in theMiddle East, and peaceful coexistence with
the Muslim world.
When we think "terrorism," our minds conjure up dramatic and
horrifying images of hijackings, suicide bombings, assassinations
and various other forms of brutal carnage. Placing terrorist acts
within a historical context, this book helps us understand the
causes, dynamics and outcomes of terrorism.Providing a concise
history of terrorism since the French Revolution, the author
considers the relationship between terrorism and warfare, crime,
technology globalization and the state. He investigates the meaning
of the word "terrorism" and shows how the definition and practice
have both evolved over time. Throughout, he considers what
motivates terrorists and what they hope to accomplish.Written by a
pioneer in the field, Terrorism: The Present Threat in Context
offers a practical assessment of domestic and international threats
to security. This book will help anyone concerned about terrorism
learn to evaluate the risks in a rational way, devoid of the
hysteria that so often dominates the subject.
Over the last decade, asymmetric warfare and terrorism have become
prevalent threats to the United States. National security, today
more than at any other time, demands decision-making under
uncertainty. The issues presented in this book demonstrate that the
value of planning depends on how well the USA can prepare for a
perpetually unpredictable future. Each chapter examines pertinent
management, leadership, and accountability issues related to U.S.
national security and places readers at the centre of difficult
decisions. Although the cases collected in this volume revolve
around policy questions, they also illustrate more general policy
dilemmas and are designed to stimulate new ideas. Endorsement: A]
diverse and rich set of cases that explore many of the new
challenges that confront U.S. national security policymakers today.
Drawing on a team of established scholars and experienced
practitioners, this book provides both an assessment of new threats
and challenges and a case-based examination of decision-making
processes... a compelling argument for the case-study approach and
a fruitful blending of academic and practitioner perspectives and
approaches. and decision-making processes as well as to our grasp
of the security challenges of the 21st century. - Robert H. Dorff,
Ph.D., Professor of National Security Policy and Strategy, and
Chairman, Department of National Security and Strategy, U.S. Army
War College.
This book examines both brigandage and irredentism in Greece since
the War of Independence, tracing the intimate links between the
two, their impact on Greek politics and statecraft, and their
influence on the modern Greek state. It also served as a safety
device which defused explosive situations. Unable to prevail over
illegitimate group violence, the state tried to divert it into two
generally acceptable channels - irredentist activity, and the
incorporation of brigands into paramilitary units - giving it a
semblance of legitimacy and rendering its activities less dangerous
to the security of the state. Eventually the characteristics and
values of brigandage itself and those who practised it became the
predominant features of the modern Greek state and society, albeit
wearing a mantle of Western respectability. Based on a wide range
ogf sources, this study aims to separate reality from myth in
examining the forces and factors involved in turning brigands into
national heroes.
Targeted killings represent both the contemporary weapon of choice
and, clearly, the weapon of the future. From the perspective of the
nation-state, the benefits of targeted killing are clear:
aggressive measures against identified targets can be carried out
with minimal, if any, risk to soldiers. But while the threat to
soldiers is minimal, there are other risks that must be considered.
Particularly, there is a high possibility of collateral damage as
well as legitimate concerns regarding how a target is defined.
Clearly broad legal, moral, and operational issues are at stake
when considering targeted killing. In Legitimate Target, A Criteria
Based Approach to Targeted Killing, Amos Guiora proposes that
targeted killing decisions must reflect consideration of four
distinct elements: law, policy, morality, and operational details,
thus ensuring that it complies with principles of domestic and
international laws. The author, writing from both personal
experience and an academic perspective, offers important criticism
and insight into the policy as presently implemented, highlighting
the need for a criteria based decision making process in defining
and identifying a legitimate target. Legitimate Target, A
Criteria-Based Approach to Targeted Killing blends concrete
examples with a nuanced study of the current targeted killing
paradigm with an emphasis on the dilemmas of morality and the law.
The September 11, 2001, attacks on the World Trade Center and
the Pentagon raised numerous questions about American and
international aviation security. Former Director of Security of the
International Air Transport Association Rodney Wallis suggests that
the failure to maximize U.S. domestic air security, which left air
travelers vulnerable to attack, lay largely with the carriers
themselves. He contends that future policies should parallel the
standards of the International Civil Aviation Organization. Wallis
considers the Aviation and Transportation Security Act adopted by
the U.S. Congress in the wake of September 11 and offers a modus
operandi to the FAA that would enable them to maximize the benefits
this legislation provides to air travelers.
This important work reviews past government reactions to the
threat posed by air terrorism and questions whether these were
effective responses or merely window dressing. It also includes
practical advice for air travelers on how to maximize their own
security when flying on international routes by monitoring airport
and airline security for themselves.
This timely treatise introduces an innovative
prevention/preparedness model for cities to address and counter
terrorist threats and events. It offers theoretical background,
mixed-method research, and tools for creating a resilience-based
response to terrorism, as opposed to the security-based frameworks
commonly in use worldwide. The extended example of Milan as a
"resilient-healthy" city pinpoints sociological, political, and
economic factors that contribute to terror risk, and outlines how
law enforcement and emergency management professionals can adopt
more proactive measures. From these observations and findings, the
author also makes recommendations for the professional training and
city planning sectors to address preparedness issues, and for
community inclusion programs to deter criminal activities in
at-risk youth. Features of the coverage: Summary of sociological
theories of terrorism The Resilience D model for assessing and
managing urban terrorist activity Findings on resilience and
vulnerabilities of terror groups Photo-illustrated analysis of
neighborhoods in Milan, describing areas of risk and resilience
Virtual ethnography with perspectives from native residents, recent
immigrants, and security experts Proposals for coordinated
communications between resource agencies The Other Side of
Resilience to Terrorism will hold considerable interest for
students, stakeholders, practitioners, and researchers. It makes a
worthwhile text for various academic disciplines (e.g., urban
sociology, crisis management) as well as for public agencies and
policymakers.
Cybercrime affects over 1 million people worldwide a day, and cyber
attacks on public institutions and businesses are increasing. This
book interrogates the European Union's evolving cybersecurity
policies and strategy and argues that while progress is being made,
much remains to be done to ensure a secure and resilient cyberspace
in the future.
|
You may like...
Hidden Nature
Nora Roberts
Paperback
R385
R344
Discovery Miles 3 440
Canary
Onke Mazibuko
Paperback
R320
R286
Discovery Miles 2 860
Nobody's Fool
Harlan Coben
Paperback
R395
R353
Discovery Miles 3 530
In Too Deep
Lee Child, Andrew Child
Paperback
R395
R353
Discovery Miles 3 530
The Edge
David Baldacci
Paperback
R381
Discovery Miles 3 810
A Quiet Man
Tom Wood
Paperback
R418
R384
Discovery Miles 3 840
Sleeper
Mike Nicol
Paperback
R300
R277
Discovery Miles 2 770
|