Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
Marianne Wade and Almir Maljevi? Although the worries about terrorism paled in comparison to the economic crisis as a topic during the last US election, one can find plenty of grounds to assume that they remain issue number one in the minds of politicians in Europe. As the German houses of Parliament prepare to call in the mediation committee in the discussion of legislation which would provide the Federal Police - thus far mandated purely with the post-facto investigation of crime - with powers to act to prevent acts of terrorism, Spain's struggle with ETA and the British Government licks its wounds after a resounding defeat of its latest anti-terrorist proposals by the House of Lords, one cannot but wonder whether post 9/11, the Europeans are not even more concerned with terrorism than their US counterparts. A look at media reports, legislative and judicial activities in either Britain or Germany clearly underlines that those two countries are deeply embroiled in anti-terrorist activity. Can it be that Europe is embroiled in the "War on Terror"; constantly providing for new arms in this conflict? Or is it a refusal to participate in the "War on Terror" that fuels a constant need for Parliaments to grapple with the subject; begrudgingly conceding one increasingly draconian measure after the other? The question as to where Europe stands in the "War on Terror" is a fascinating one, but one, which is difficult to answer.
Why was there a deliberate plan to fight the war in Iraq but none to win the peace? This question, which has caused such confusion and consternation among the American public and been the subject of much political wrangling over the past two years, is the focus of Lt. Col. Isaiah Wilson's investigation. Director of the American politics, policy, and strategy program at West Point, Wilson points to a flaw in the government's definition of when, how, and for what reasons the United States intervenes abroad. It is a paradox in the American way of peace and war, he explains, that harkens back to America's war loss in Vietnam. The dilemma we face today in Iraq, the author says, is the result of a flaw in how we have viewed the war from its inception, and Wilson reminds us that Iraq is just the latest, albeit the most poignant and tragic, case in point. His exploration of this paradox calls for new organizational and operational approaches to America's intervention policy. In challenging current western societal military lexicon and doctrine, Wilson offers new hope and practical solutions to overcome the paradox once and for all.
"An excellent analysis of the complex dynamics of inclusion in post-conflict societies: theoretically grounded, empirically rich, and with a well-informed set of policy-relevant insights and recommendations with implications far beyond the cases of Kosovo and Northern Ireland."Stefan Wolff, University of Birmingham, UK "Does the promotion of political accommodation between the contending parties in an ethno-nationalist conflict disadvantage other groups in society? This important question is at the heart of Michael Potter's nuanced study of post-settlement parliaments in Kosovo and Northern Ireland, in which he probes their record of representativeness, focusing on gender and ethnicity. His meticulous research, drawing on extensive fieldwork, shows that the domination of the parliaments by parties aligned to the conflict does indeed tend to marginalise other identities. His findings provide plenty of food for thought for practitioners in the field of conflict resolution. In particular, they underline the need for care in the design of institutional arrangements for deeply divided societies, so as to minimise potentially negative consequences that priority for accommodation and reconciliation may have for other issues and for the practice of inclusion."Adrian Guelke, Queen's University Belfast, UK "Identity is a central organising principle of politics in the 21st century. In this impressive book Michael Potter shows that a focus on gender and minority ethnic identities in newly-formed post-conflict assemblies provides a unique litmus test of the robustness of democratic politics. He analyses the cases of Kosovo and Northern Ireland with rigour and considerable insight. This book makes a highly original and lasting contribution to theory and practice in post-conflict settings world-wide."Yvonne Galligan, Dublin Institute of Technology, Ireland This book examines inclusion in post-conflict legislatures, using Northern Ireland and Kosovo as case studies and gender and minority ethnicity as indicators. The analysis uses an adapted framework developed by Yvonne Galligan and Sara Clavero to measure inclusion across a range of factors associated with deliberative democratic principles. The logic is that political systems designed to accommodate communities in conflict will prioritise certain identities over others. The aim of the book is to investigate how identities not directly associated with a conflict fare in a political system designed to manage identities in conflict. The book looks comparatively at the conflicts in Kosovo and Northern Ireland, then discusses approaches to conflict management, describing how political institutions were designed in those contexts. The themes of women and minority identities in those conflicts are then explored with a view to examining the extent of inclusion in the Northern Ireland and Kosovo Assemblies.
Nuclear Insecurity is an insider's account of official American efforts to prevent the theft or diversion of nuclear and radiological weapons that could be used by rogue nations or terrorist groups. This perspective draws heavily from the author's work on the White House National Security Council Staff (1996-2000), where he was directly responsible to President Clinton for the development of U.S. nuclear material security policies and, subsequently, at the U.S. Department of Energy, where he directed the department's largest international nuclear security program, focused primarily on Russia. In Caravelli's assessment, despite exceptional bipartisan political support and very high funding levels that have reached over $9 billion, a series of policy mistakes and programmatic bureaucratic missteps have badly compromised the United States government's efforts to protect against the spread of nuclear weapons and materials. The most striking example of the current situation is that the U.S. government, some 12 years after the start of these programs, still has failed to enhance the security of more than 300 metric tons of nuclear materials in Russia alone, enough to make hundreds of nuclear devices. The book concludes with recommendations and policy prescriptions for addressing some of these problems.
What changes have the terrorist attacks on the United States in 2001 and the subsequent attacks in Europe brought to Western societies? In what ways have these events and their aftermath impacted on the relationships between Muslim communities and Western societies? This book explores the remaking of the relationship between Islam and Islamism, on the one hand, and security and securitization, on the other hand, by arguing that 9/11 and its aftermath have led to the opening of a new phase in Western and European history and have remade the relationship between Islam and governmental and societal approaches to security. The authors utilize case studies across the Western world to understand this relationship.
The so-called 'Cedar Revolution' in Lebanon, triggered by the assassination of the former Prime Minister Rafiq Hariri in February 2005, brought to an end three decades of Syrian military presence in the country. Here, Taku Osoegawa challenges the commonly-held claim that Lebanon and its leaders were simple puppets of the Syrian regime during the thirty years characterised as Lebanon under Syrian hegemony. Furthermore, by examining Lebanon's relations with Syria from the establishment of the Asad regime to the current violence in Syria, Osoegawa concludes that the Lebanese government has had its own reasons for aligning with Syria. As the Lebanese-Syrian relationship has had an enormous impact on the international relations of the Middle East, this book is essential reading for those interested in the contemporary regional dynamics.
You won't be able to stop reading once you pick up Dr. John Hall's terrifying account, A New Breed: Satellite Terrorism in America. Dr. Hall's narration is based on true-life events and what you'll find will open your eyes to a completely new form of terrorism. Dr. Hall has treated numerous patients who have complained about voices in their heads, eventually being driven to a form of serious psychosis. In his book, he describes his relationship with his significant other, Mallory, a young, attractive woman with a bright future. Upon beginning a new profession, Mallory was suddenly struck down by unexplainable happenings: mind control, surveillance, stalking, and rape. Hall and others sacrificed themselves and their careers to bring her nightmare to an end. What happened to Mallory and what is happening to countless others? Hall's supposition is that we are faced with a type of terrorism that is unseen but just as deadly. Our government satellite surveillance systems are a new way for criminals to gain possession not only of our financial lives, but our most precious resource: Our minds. What can we do and who are these individuals who are trying to control the way the think, feel, act and what we do? Author Bio: Dr. John Hall has published numerous articles in professional journals and currently works as a medical doctor practicing anesthesia and pain management. Dr. Hall is currently working on a second book detailing what safeguards one can take against satellite surveillance. He lives near San Antonio, Texas.
This book places the current wave of religion-based terrorism in a historical perspective, explaining why religion is associated with terrorism, comparing religion-based terrorism to other forms of terrorism, and documenting how religion-based terrorism is a product of powerful political, socioeconomic, and psychological forces. Religion-based terrorism is perceived as one of the most significant threats to U.S. homeland security in the 21st century. Sacred Terror: How Faith Becomes Lethal makes the central argument that religion-based violence and terrorism is primarily a result of political, socioeconomic, and psychological forces, thereby demystifying religion-based terrorism and revealing its inherent similarity to other forms of terrorism and war. Daniel Price examines religious texts and traditions in Judaism, Christianity, and Islam; looks at the history of religion-based terrorism; and explores why religion facilitates violence. He builds upon this foundation to explain how religion as an ideological force that motivates violence is not as powerful as commonly believed, and that religious fervor is not unlike other non-religious ideologies such as Marxism, nationalism, and anarchism. The work also presents in-depth analysis of the political, socioeconomic, and psychological forces that are behind religion-based violence, and discusses case studies from multiple religions that illustrate the author's argument.
From wiretapping American citizens to waterboarding foreign prisoners, the Bush administration has triggered an uproar over its tactics in the War on Terror-and over its justifications for using them. Through a close study of the legal advice provided to President Bush, former Justice Department attorney Harold Bruff provides an incisive and scathing critique of those justifications, which he finds at odds with both American law and moral authority. Bruff rigorously examines legal opinions regarding NSA surveillance, the indefinite detention of terror suspects, the denial of Geneva Convention protection, trial by military commissions, and suspect interrogation techniques. He shows that Bush's claims of executive power exceed anything found in U.S. history or judicial precedent, that clear statutory limitations were treated with contempt, and that Bush and his lawyers strove to exclude both congressional and judicial participation in setting antiterrorist policy. Bruff dissects the legal underpinnings employed by John Yoo, David Addington, Alberto Gonzales, and others to defend an inflated view of presidential power, showing how they combined ideology, policy advocacy, and selective readings of legal precedent to bolster executive actions. Most important, he brings into sharp focus legitimate counterarguments from the State Department, the Pentagon, and the Office of Legal Counsel that challenged or refuted these legally suspect views and yet were largely ignored or even ridiculed by the president's advisers. Offering contrasts with the legal advice provided previous presidents, he also reviews the fundamental constitutional limits on executive action and the principles of professional responsibility that govern lawyers when they counsel government clients. As Bruff observes, bad advice to presidents is never in short supply, but legal advice should be objective and reliable. His book points up the urgent need for advisers to serve both the president and the nation by finding a middle ground between limiting presidential power and allowing it the flexibility it needs to respond to crises. Both highly readable and authoritative, it is a must for legal scholars and an eye-opener for every citizen concerned with preserving our nation's commitment to the rule of law.
This book assesses the effectiveness of Nigeria's counterterrorist policies against Boko Haram. It takes a critical review of the interventionist strategies adopted by the Nigerian government, highlights the motivations behind the choice of strategies, and proffers a deeper understanding of the factors responsible for the state's inability, thus far, to rid the country of terrorism. Specifically, it evaluates the NACTEST policy framework that guides the Nigerian state's counterterrorist strategies, which contains both hard and soft power approaches. Adopting historical and case study approaches which put the Nigerian state and occurrences of violent conflict in context, it takes cognizance of the politics of ethno-religious diversity which reinforce violent conflicts among groups and against the state, and reviews the socio-economic and political realities that led to the emergence and sustenance of Boko Haram. The volume concludes by suggesting practical policy options for combating Boko Haram and other similar armed insurrection. This book is appropriate for researchers and students interested in African politics, conflict, security, peace studies, terrorism, and counterterrorism, as well as policy makers and government departments dealing with terrorism and counterterrorism.
Northern Ireland's Belfast Agreement has faced continual crises of implementation over a variety of security related issues. Too frequently analyses have neglected to study the wider changes that have occurred inside and outside Northern Ireland. These have had profound effects in changing attitudes towards violence, paramilitaries, the position of women and ideas of nationalism and sovereignty. This book places the implementation of the Belfast Agreement in a wider context to provide an analysis of why implementation has been so difficult.
Suicide bombers are often compared to "smart bombs." From the point of view of their dispatchers, they are highly effective, inexpensive forms of weaponry, and there is no need to invest in their technological development. Suicide bombers are in fact smarter than smart bombs because they can choose their own target--and they can react to circumstances on the ground, changing their target, or their timing, in an instant, to ensure the maximum damage, destruction, and death. Of course, unlike smart bombs, suicide bombers think and feel, they have histories, stories, beliefs, desires--in short, they have an inner world. Exploring the inner world of suicide bombers has been the focus of Anat Berko's research for years. She has worked to understand the thought processes of a people who can choose to place explosives on their bodies and kill themselves, taking as many other people with them as they can. Do male bombers really believe that death will transport them to a paradise where they will be greeted by virgins? Are they victims of unbearable pressure to commit this act of terror? What are female bombers promised in the hereafter? Is there something that links all suicide bombers? Berko also explores the world of those who "drop the smart bomb"--the dispatchers: who are these people who persuade others to go calmly to their horrific deaths? To learn about the inner world of suicide bombers and their dispatchers, Berko entered Israel's most heavily secured prison cells and conducted intensive and extensive interviews with male and female suicide bombers who had failed their missions, as well as with their dispatchers--including former Hamas spiritual and operative leader Sheikh AhmedYassin (later assassinated by Israel).
This book examines memories of political violence in Chile after the 1973 coup and a 17-years-long dictatorship. Based on individual and group interviews, it focuses on the second generation children, adults today, born to parents who were opponents of Pinochets regime. Focusing on their lived experience, the intersection between private and public realms during Pinochet's politics of fear regime, and the afterlife of violence in the post-dictatorship, the book is concerned with new dilemmas and perspectives that stem from the intergenerational transmission of political memories. It reflects critically on the role of family memories in the broader field of memory in Chile, demonstrating the dynamics of how later generations appropriate and inhabit their family political legacies. The book suggests how the second generation cultural memory redefines the concept of victimhood and propels society into a broader process of recognition.
Sendero Luminoso or the "Shining Path" ranks among the most elusive, secretive, and brutal guerrilla organizations in the world. Once a radical uprising limited to the Andean highlands of Ayacucho, it is now a movement of national proportions that has woven itself into the fabric of Peruvian society. Unlike many other terrorists groups, Sendero Luminoso is founded upon an intellectual infrastructure crafted by the now legendary Abimael Guzman, a former philosophy professor. The body of the movement, however, is drawn from Peru's long-neglected Indian and mestizo populations. Peru's already fragile democracy is further weakened as the rural and urban underclasses become attached to Sendero Luminoso ideologically and emotionally. This book provides a comprehensive overview of this guerrilla organization and the Peruvian government's dilemma in dealing with it and the emergence of "narcoterrorism," a mutually beneficial relationship between the cocaine syndicate and Sendero Luminoso. The Peruvian cocaine syndicate and Sendero Luminoso have different objectives and ideologies, but share a mutual enemy--the Peruvian government and its armed services. Hence they have combined forces to form a powerful and destructive alliance. Gabriela Tarazona-Sevillano assesses the impact of the Sendero Luminoso on Peruvian society, a new democratic government already besieged by complex and far-reaching problems. The book presents a detailed understanding of the peculiar and very personal nature of Peru's affliction as well as its possible international repercussions.
"Essential reading for those in the biosciences, government and learned societies. It poses fundamental questions about undertaking science today" - Dr. Chris Langley, Aston University The objectives of the papers included in this NATO volume were to critically consider the science and technology policies necessary for defence against terrorism and other threats to security; to assess the priorities for governments, universities, national laboratories and industrial firms; to identify how governments and the science and technology community can most effectively work together to enhance our security; and to share the experiences of policy makers and policy analysts. The importance and relevance of this selection of papers to the policy community is reflected in the seniority of the contributors. These included Dr. Parney Albright who held the position of Assistant Secretary for Science & Technology at the US Department of Homeland Security as well as senior figures from the UK Home Office, UK Office of Science & Technology, the European Commission and NATO.
This comprehensive account examines the East Turkistan Islamic Movement (ETIM)-the most significant Muslim militant group in China-including its origins, objectives, ideology, leadership, and tactics. To effectively engage China on counterterrorism issues, we must understand the capabilities and intentions of the East Turkistan Islamic Movement (ETIM), the most significant Muslim militant group in China. The ETIM: China's Islamic Militants and the Global Terrorist Threat is the first book to focus specifically on the ETIM, a terrorist group that demands an independent Muslim state for the Uyghur ethnic minority in northwest China. This fascinating study offers a comprehensive account of the group's origins, objectives, ideology, leadership, and tactics. It details the historical and contemporary contexts of the Uyghur separatist movement, the ETIM's alleged ties to international terrorist networks, and the Chinese government's interest in promoting the ETIM as a significant international problem. In addition, the book addresses conflicting claims about the membership and viability of the organization, noting where the Chinese government has apparently manipulated information about the ETIM to suit its own goals. A final chapter explores how various countries define ETIM activities and what that means for relations with China. Includes press releases issued by the Chinese government on violent Uyghur separatism and presents timelines of the ETIM's attacks and other activities and of major events in the history of Uyghur separatism Offers a bibliography that compiles scholarly and news sources pertaining to the ETIM and provides glossary of key terms derived from the Chinese, Uyghur, and English languages
Women and Terrorism analyses a new phenomenon of international concern: the participation of women in subversive terrorist movements. The book deals with four main issues: 1) women's participation in violent terrorist movements to discover the key to the psychological and sociological interpretation of their involvement in a life experience they are not traditionally associated with; 2) the different responses to 'penitentism' between men and women; 3) the psychological and social interpretation of women's support of armed struggle and an inquiry - through the personal experience of the women terrorists interviewed - into the reasons for women's greater resistance to repentance; 4) the use of the leads this inquiry has furnished for prognostic purposes and to predict and create conditions that facilitate repentance.
This book provides a multidisciplinary commentary on a wide range of religious traditions and their relationship to acts of violence. Hate and violence occur at every level of human interaction, as do peace and compassion. Scholars of religion have a particular obligation to make sense out of this situation, tracing its history and variables, and drawing lessons for the future. From the formative periods of the religious traditions to their application in the contemporary world, the essays in this volume interrogate the views on violence found within the traditions and provide examples of religious practices that exacerbate or ameliorate situations of conflict.
Part I is a compendium of World War II service recollections embracing the unusual, bizarre and humorous, most of which never appeared in the news or any publications. However, I do believe readers will be very interested in the other side of war. Part II is an incisive review of Vietnam, and why we failed or should never have been involved militarily. Part III is a current analysis of terrorism and the Iraq war, including a new proposal to address the global aspects of terrorism and the Palestinian issue.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
Without sensationalizing or providing the technical details that would result in a terrorist's handbook, the volume reflects the concerns expressed by experts from 12 states (including many from Slavic regions adjoining or aspiring to membership of the European Union). A range of vulnerabilities are highlighted that are usually neglected. Assessments that focus on the horrifying potential of bioterrorism directly targeting people are commonplace. This book is exceptional because indirect impacts on human health and welfare through challenge to the security of food supplies are the focus. These urgently need to be recognised and made subjects of planned investment to counter the threat. Examples of past state-sponsored and independent actions are discussed. The evolution of biological (chemical defoliant) systems for controlling plant growth with unambiguously humanitarian aims is shown to have resulted in a range of counter terrorist uses.
With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased and new nuclear powers (e.g. Iran, Korea, Pakistan and India) have further complicated global proliferation issues. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered. In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the 2005 Workshop and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outline the role of legal, policy and institutional frameworks in countering nuclear/radiological terrorism. One key outcome of this book is better understanding of the independent contributions from across the international community of the scientific and technological components and the legal, policy and institutional components to combating nuclear/radiological terrorism. The book can serve as a tool for communicating the outcomes of the workshop not only to the multi-national scientific communities engaged in combating nuclear/radiological terrorism, but also to those working at governmental and policy levels whose actions affect the directionsscience takes and how the technology is incorporated into country-specific national systems for combating nuclear/radiological terrorism.
This book makes a timely contribution to the analysis of nationalism and terrorism, and also the absence of terrorism. It proposes to analyse why Scottish, Welsh and English nationalism has never had as significant a turn to political violence as the case of Irish nationalism has. This will answer a question which is too rarely asked 'why do certain groups not turn to terrorism?' Nick Brooke makes an important contribution to debates on nationalism in the United Kingdom, as well as to debates on the relationship between nationalism and terrorism. Furthermore, the text provides complete narrative accounts of nationalist terrorism in Scotland, Wales and England, and considers how recent political developments impact the likelihood of further nationalist terrorism.
'Cyber-War' provides a critical assessment of current debates around the likelihood and impact of cyber warfare. Approaching the subject from a socio-political angle, it argues that destructive cyber war has not yet been seen, but could be a feature of future conflict.
This book carefully and thoroughly analyses the legal questions raised by the phenomenon of terrorism, and past and recent efforts to fight it, from the perspective of international humanitarian law (IHL). The objective is to substantially contribute to a better understanding of the issues surrounding the content and applicability of IHL as it applies to terrorism as well as to analyse and contextualise the current debates on these controversial and critically important questions. While due heed is paid to doctrinal debates, particular emphasis is placed on the practice of social actors, particularly, although not exclusively, States. The analysis of their actual conduct as well as their expectations about the interpretation and application of the law is crucial to establishing an interpretive consensus on when and how IHL is relevant to regulate acts of terrorism. The approach of the book is analytical and discursive, rather than prescriptive. Thus the reader will find the relevant rules of IHL and other legal regimes as regards terrorism, but also the debates over their application, the contradictions in State practice and the impact these may have upon IHL's evolution and implementation. The aim is to provide legal practitioners, as well as those in military, political and academic circles, with a useful reference point. Hopefully the book will also prove useful to other readers who will find its content and easy-to-read style an encouragement to getting acquainted with a topical subject, traditionally thought to be reserved for legal specialists. This book was cited with approval by the US Court of Appeals in Salim Ahmed Hamdan v United States of America, 16th October 2012 |
You may like...
Precursor Crimes of Terrorism - The…
Clive Walker, Mariona Llobet Angli, …
Hardcover
R3,474
Discovery Miles 34 740
The European Union as a Global…
Christian Kaunert, Alex MacKenzie, …
Hardcover
R2,411
Discovery Miles 24 110
The United States, Russia, and China…
Paul J Bolt, Su Changhe, …
Hardcover
R2,421
Discovery Miles 24 210
Global Jihadist Terrorism - Terrorist…
Paul Burke, Doaa' Elnakhala, …
Hardcover
R3,333
Discovery Miles 33 330
|