![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
Years after 9/11, the Global War on Terror is still not over. The deepening crisis in Iraq has been accompanied by rising violence in Asia, as the bombings in Indonesia show. The 18 specialists and policymakers who have contributed to this book assess how the security scenario in the Asia Pacific has changed in response to these events. The Asia Pacific is rent by communal conflicts that have generated local jihads, which fuel regional and global jihads. This book assesses state responses to terrorism, paying attention to neglected factors such as money laundering, the emerging role of the EU, the growing fear of the US and increasing concern about the way anti-terrorist legislation curtails civil liberties. With the benefit of extensive fieldwork and access to unique sources in many languages, the contributors analyze key features of the local security scenarios. Pakistan's precarious situation is explored here from many angles, including Islamic militancy, the role of the military and the peace process with India. Again, domestic failures support regional and global terror. Regional anti-terrorist collaboration is also hampered by South-east Asia's counter-terrorism dilemmas, setbacks in the Philippine-US security relationship, the Asian arms race, and growing fears of the US National Missile Defence system and how this system will be perceived by China. The history of state sponsored terrorism and millenarian ideology are crucial to these regional scenarios. The latter, in the particular form of Japan's Aum Shinrikyo movement, reminds us that militant Islamists are not uniquely destructive. An important addition to the literature on terrorism and security, this in-depth and comprehensive analysis of a complex and increasingly unstable region will be welcomed by political scientists, scholars, policymakers, and those seeking a better understanding of whether the Global War on Terror has changed the security architecture of the Asia Pacific in a positive way.
Marianne Wade and Almir Maljevi? Although the worries about terrorism paled in comparison to the economic crisis as a topic during the last US election, one can find plenty of grounds to assume that they remain issue number one in the minds of politicians in Europe. As the German houses of Parliament prepare to call in the mediation committee in the discussion of legislation which would provide the Federal Police - thus far mandated purely with the post-facto investigation of crime - with powers to act to prevent acts of terrorism, Spain's struggle with ETA and the British Government licks its wounds after a resounding defeat of its latest anti-terrorist proposals by the House of Lords, one cannot but wonder whether post 9/11, the Europeans are not even more concerned with terrorism than their US counterparts. A look at media reports, legislative and judicial activities in either Britain or Germany clearly underlines that those two countries are deeply embroiled in anti-terrorist activity. Can it be that Europe is embroiled in the "War on Terror"; constantly providing for new arms in this conflict? Or is it a refusal to participate in the "War on Terror" that fuels a constant need for Parliaments to grapple with the subject; begrudgingly conceding one increasingly draconian measure after the other? The question as to where Europe stands in the "War on Terror" is a fascinating one, but one, which is difficult to answer.
Why was there a deliberate plan to fight the war in Iraq but none to win the peace? This question, which has caused such confusion and consternation among the American public and been the subject of much political wrangling over the past two years, is the focus of Lt. Col. Isaiah Wilson's investigation. Director of the American politics, policy, and strategy program at West Point, Wilson points to a flaw in the government's definition of when, how, and for what reasons the United States intervenes abroad. It is a paradox in the American way of peace and war, he explains, that harkens back to America's war loss in Vietnam. The dilemma we face today in Iraq, the author says, is the result of a flaw in how we have viewed the war from its inception, and Wilson reminds us that Iraq is just the latest, albeit the most poignant and tragic, case in point. His exploration of this paradox calls for new organizational and operational approaches to America's intervention policy. In challenging current western societal military lexicon and doctrine, Wilson offers new hope and practical solutions to overcome the paradox once and for all.
This book explores the rise and impact of violent non-state actors in contemporary Africa and the implications for the sovereignty and security of African states. Each chapter tackles a unique angle on violent organizations on the continent with the view of highlighting the conditions that lead to the rise and radicalization of these groups. The chapters further examine the ways in which governments have responded to the challenge and the national, regional and international strategies that they have adopted as a result. Chapter contributors to this volume examine the emergence of Islamist terrorists in Nigeria, Mali and Libya; rebels in DR Congo, Central African Republic, Ethiopia and Rwanda; and warlords and pirates in Somalia, Uganda and Sierra Leone.
The book addresses security threats and challenges to the European Union emanating from its eastern neighbourhood. The volume includes the expertise of policy and scholarly contributors coming from North America, Russia and Central Asia, and from across the EU. Themes and issues include the EU's capacities and actorness, support from the United States, challenges from Russia, and a range of case studies including Ukraine, other post-Soviet conflicts, the Kurdish question, Central Asia, and terrorism and counter-terrorism. Authors identify current threats and place these challenges into necessary historical context. They offer long-term recommendations for actionable goals to achieve greater stability in this complex and volatile region. This work is explanatory and long-lasting, and will engage readers in the limits and possibilities of the EU in a challenging era and in its most vital and demanding geographic arena.
Nuclear Insecurity is an insider's account of official American efforts to prevent the theft or diversion of nuclear and radiological weapons that could be used by rogue nations or terrorist groups. This perspective draws heavily from the author's work on the White House National Security Council Staff (1996-2000), where he was directly responsible to President Clinton for the development of U.S. nuclear material security policies and, subsequently, at the U.S. Department of Energy, where he directed the department's largest international nuclear security program, focused primarily on Russia. In Caravelli's assessment, despite exceptional bipartisan political support and very high funding levels that have reached over $9 billion, a series of policy mistakes and programmatic bureaucratic missteps have badly compromised the United States government's efforts to protect against the spread of nuclear weapons and materials. The most striking example of the current situation is that the U.S. government, some 12 years after the start of these programs, still has failed to enhance the security of more than 300 metric tons of nuclear materials in Russia alone, enough to make hundreds of nuclear devices. The book concludes with recommendations and policy prescriptions for addressing some of these problems.
This book examines the use of presidential power during the War on Terror. Justin DePlato joins the debate on whether the Constitution matters in determining how each branch of the federal government should use its power to combat the War on Terror. The actions and words of Presidents George W. Bush and Barack Obama are examined. DePlato's findings support the theory that executives use their own prerogative in determining what emergency powers are and how to use them. According to DePlato, the Presidents argue that their powers are implied in Article II of the Constitution, not expressed. This conclusion renders the Constitution meaningless in times of crisis. The author reveals that Presidents are becoming increasingly cavalier and that the nation should consider adopting an amendment to the Constitution to proffer expressed executive emergency powers.
This is a collection of interdisciplinary essays that examines the historical, political, and social significance of 9/11. This collection considers 9/11 as an event situated within the much larger historical context of late late-capitalism, a paradoxical time in which American and capitalist hegemony exist as pervasive and yet under precarious circumstances. Contributors to this collection examine the ways in which 9/11 changed both everything and, at the same time, nothing at all. They likewise examine the implications of 9/11 through a variety of different media and art forms including literature, film, television, and street art.
This timely book offers a world history of insurgencies and of counterinsurgency warfare. Jeremy Black moves beyond the conventional Western-centric narrative, arguing that it is crucial to ground contemporary experiences in Afghanistan and Iraq in a global framework. Unlike other studies that begin with the American and French revolutions, this book reaches back to antiquity to trace the pre-modern origins of war within states. Interweaving thematic and chronological narratives, Black probes the enduring linkages between beliefs, events, and people on the one hand and changes over time on the other hand. He shows the extent to which power politics, technologies, and ideologies have evolved, creating new parameters and paradigms that have framed both governmental and public views. Tracing insurgencies ranging from China to Africa to Latin America, Black highlights the widely differing military and political dimensions of each conflict. He weighs how, and why, lessons were "learned" or, rather, asserted, in both insurgency and counterinsurgency warfare. At every stage, he considers lessons learned by contemporaries, the ways in which norms developed within militaries and societies, and their impact on doctrine and policy. His sweeping study of insurrectionary warfare and its counterinsurgency counterpart will be essential reading for all students of military history.
From wiretapping American citizens to waterboarding foreign prisoners, the Bush administration has triggered an uproar over its tactics in the War on Terror-and over its justifications for using them. Through a close study of the legal advice provided to President Bush, former Justice Department attorney Harold Bruff provides an incisive and scathing critique of those justifications, which he finds at odds with both American law and moral authority. Bruff rigorously examines legal opinions regarding NSA surveillance, the indefinite detention of terror suspects, the denial of Geneva Convention protection, trial by military commissions, and suspect interrogation techniques. He shows that Bush's claims of executive power exceed anything found in U.S. history or judicial precedent, that clear statutory limitations were treated with contempt, and that Bush and his lawyers strove to exclude both congressional and judicial participation in setting antiterrorist policy. Bruff dissects the legal underpinnings employed by John Yoo, David Addington, Alberto Gonzales, and others to defend an inflated view of presidential power, showing how they combined ideology, policy advocacy, and selective readings of legal precedent to bolster executive actions. Most important, he brings into sharp focus legitimate counterarguments from the State Department, the Pentagon, and the Office of Legal Counsel that challenged or refuted these legally suspect views and yet were largely ignored or even ridiculed by the president's advisers. Offering contrasts with the legal advice provided previous presidents, he also reviews the fundamental constitutional limits on executive action and the principles of professional responsibility that govern lawyers when they counsel government clients. As Bruff observes, bad advice to presidents is never in short supply, but legal advice should be objective and reliable. His book points up the urgent need for advisers to serve both the president and the nation by finding a middle ground between limiting presidential power and allowing it the flexibility it needs to respond to crises. Both highly readable and authoritative, it is a must for legal scholars and an eye-opener for every citizen concerned with preserving our nation's commitment to the rule of law.
This book places the current wave of religion-based terrorism in a historical perspective, explaining why religion is associated with terrorism, comparing religion-based terrorism to other forms of terrorism, and documenting how religion-based terrorism is a product of powerful political, socioeconomic, and psychological forces. Religion-based terrorism is perceived as one of the most significant threats to U.S. homeland security in the 21st century. Sacred Terror: How Faith Becomes Lethal makes the central argument that religion-based violence and terrorism is primarily a result of political, socioeconomic, and psychological forces, thereby demystifying religion-based terrorism and revealing its inherent similarity to other forms of terrorism and war. Daniel Price examines religious texts and traditions in Judaism, Christianity, and Islam; looks at the history of religion-based terrorism; and explores why religion facilitates violence. He builds upon this foundation to explain how religion as an ideological force that motivates violence is not as powerful as commonly believed, and that religious fervor is not unlike other non-religious ideologies such as Marxism, nationalism, and anarchism. The work also presents in-depth analysis of the political, socioeconomic, and psychological forces that are behind religion-based violence, and discusses case studies from multiple religions that illustrate the author's argument.
Suicide bombers are often compared to "smart bombs." From the point of view of their dispatchers, they are highly effective, inexpensive forms of weaponry, and there is no need to invest in their technological development. Suicide bombers are in fact smarter than smart bombs because they can choose their own target--and they can react to circumstances on the ground, changing their target, or their timing, in an instant, to ensure the maximum damage, destruction, and death. Of course, unlike smart bombs, suicide bombers think and feel, they have histories, stories, beliefs, desires--in short, they have an inner world. Exploring the inner world of suicide bombers has been the focus of Anat Berko's research for years. She has worked to understand the thought processes of a people who can choose to place explosives on their bodies and kill themselves, taking as many other people with them as they can. Do male bombers really believe that death will transport them to a paradise where they will be greeted by virgins? Are they victims of unbearable pressure to commit this act of terror? What are female bombers promised in the hereafter? Is there something that links all suicide bombers? Berko also explores the world of those who "drop the smart bomb"--the dispatchers: who are these people who persuade others to go calmly to their horrific deaths? To learn about the inner world of suicide bombers and their dispatchers, Berko entered Israel's most heavily secured prison cells and conducted intensive and extensive interviews with male and female suicide bombers who had failed their missions, as well as with their dispatchers--including former Hamas spiritual and operative leader Sheikh AhmedYassin (later assassinated by Israel).
The so-called 'Cedar Revolution' in Lebanon, triggered by the assassination of the former Prime Minister Rafiq Hariri in February 2005, brought to an end three decades of Syrian military presence in the country. Here, Taku Osoegawa challenges the commonly-held claim that Lebanon and its leaders were simple puppets of the Syrian regime during the thirty years characterised as Lebanon under Syrian hegemony. Furthermore, by examining Lebanon's relations with Syria from the establishment of the Asad regime to the current violence in Syria, Osoegawa concludes that the Lebanese government has had its own reasons for aligning with Syria. As the Lebanese-Syrian relationship has had an enormous impact on the international relations of the Middle East, this book is essential reading for those interested in the contemporary regional dynamics.
Northern Ireland's Belfast Agreement has faced continual crises of implementation over a variety of security related issues. Too frequently analyses have neglected to study the wider changes that have occurred inside and outside Northern Ireland. These have had profound effects in changing attitudes towards violence, paramilitaries, the position of women and ideas of nationalism and sovereignty. This book places the implementation of the Belfast Agreement in a wider context to provide an analysis of why implementation has been so difficult.
The constant threat of terror leads to the destabilization of the political, economic, and social situation in the state. Lack of confidence in personal safety contributes to the growth of anxiety, fears, and mental stress, which negatively affects psychological health, leading to the development of various psychosomatic disorders among the population. Global Perspectives on the Psychology of Terrorism discusses the psychological aspects of terrorism, including the determination of the main types of terrorism and the psychological characteristics of terrorists and terrorist groups. It further speaks on the negative impact of terrorism on the mass consciousness, as well as the ways to deal with stress in people exposed to the impact of terrorist attacks, features of human behavior in extreme situations, and methods of psychological support in times of crisis. Covering topics such as state terrorism, international security, and cyberterrorism, this premier reference source is an excellent resource for government officials, sociologists, representatives of mass media, non-governmental organizations, politicians, psychologists, students and faculty of higher education, librarians, researchers, and academicians.
"Essential reading for those in the biosciences, government and learned societies. It poses fundamental questions about undertaking science today" - Dr. Chris Langley, Aston University The objectives of the papers included in this NATO volume were to critically consider the science and technology policies necessary for defence against terrorism and other threats to security; to assess the priorities for governments, universities, national laboratories and industrial firms; to identify how governments and the science and technology community can most effectively work together to enhance our security; and to share the experiences of policy makers and policy analysts. The importance and relevance of this selection of papers to the policy community is reflected in the seniority of the contributors. These included Dr. Parney Albright who held the position of Assistant Secretary for Science & Technology at the US Department of Homeland Security as well as senior figures from the UK Home Office, UK Office of Science & Technology, the European Commission and NATO.
"An excellent analysis of the complex dynamics of inclusion in post-conflict societies: theoretically grounded, empirically rich, and with a well-informed set of policy-relevant insights and recommendations with implications far beyond the cases of Kosovo and Northern Ireland."Stefan Wolff, University of Birmingham, UK "Does the promotion of political accommodation between the contending parties in an ethno-nationalist conflict disadvantage other groups in society? This important question is at the heart of Michael Potter's nuanced study of post-settlement parliaments in Kosovo and Northern Ireland, in which he probes their record of representativeness, focusing on gender and ethnicity. His meticulous research, drawing on extensive fieldwork, shows that the domination of the parliaments by parties aligned to the conflict does indeed tend to marginalise other identities. His findings provide plenty of food for thought for practitioners in the field of conflict resolution. In particular, they underline the need for care in the design of institutional arrangements for deeply divided societies, so as to minimise potentially negative consequences that priority for accommodation and reconciliation may have for other issues and for the practice of inclusion."Adrian Guelke, Queen's University Belfast, UK "Identity is a central organising principle of politics in the 21st century. In this impressive book Michael Potter shows that a focus on gender and minority ethnic identities in newly-formed post-conflict assemblies provides a unique litmus test of the robustness of democratic politics. He analyses the cases of Kosovo and Northern Ireland with rigour and considerable insight. This book makes a highly original and lasting contribution to theory and practice in post-conflict settings world-wide."Yvonne Galligan, Dublin Institute of Technology, Ireland This book examines inclusion in post-conflict legislatures, using Northern Ireland and Kosovo as case studies and gender and minority ethnicity as indicators. The analysis uses an adapted framework developed by Yvonne Galligan and Sara Clavero to measure inclusion across a range of factors associated with deliberative democratic principles. The logic is that political systems designed to accommodate communities in conflict will prioritise certain identities over others. The aim of the book is to investigate how identities not directly associated with a conflict fare in a political system designed to manage identities in conflict. The book looks comparatively at the conflicts in Kosovo and Northern Ireland, then discusses approaches to conflict management, describing how political institutions were designed in those contexts. The themes of women and minority identities in those conflicts are then explored with a view to examining the extent of inclusion in the Northern Ireland and Kosovo Assemblies.
Women and Terrorism analyses a new phenomenon of international concern: the participation of women in subversive terrorist movements. The book deals with four main issues: 1) women's participation in violent terrorist movements to discover the key to the psychological and sociological interpretation of their involvement in a life experience they are not traditionally associated with; 2) the different responses to 'penitentism' between men and women; 3) the psychological and social interpretation of women's support of armed struggle and an inquiry - through the personal experience of the women terrorists interviewed - into the reasons for women's greater resistance to repentance; 4) the use of the leads this inquiry has furnished for prognostic purposes and to predict and create conditions that facilitate repentance.
Part I is a compendium of World War II service recollections embracing the unusual, bizarre and humorous, most of which never appeared in the news or any publications. However, I do believe readers will be very interested in the other side of war. Part II is an incisive review of Vietnam, and why we failed or should never have been involved militarily. Part III is a current analysis of terrorism and the Iraq war, including a new proposal to address the global aspects of terrorism and the Palestinian issue.
This comprehensive account examines the East Turkistan Islamic Movement (ETIM)-the most significant Muslim militant group in China-including its origins, objectives, ideology, leadership, and tactics. To effectively engage China on counterterrorism issues, we must understand the capabilities and intentions of the East Turkistan Islamic Movement (ETIM), the most significant Muslim militant group in China. The ETIM: China's Islamic Militants and the Global Terrorist Threat is the first book to focus specifically on the ETIM, a terrorist group that demands an independent Muslim state for the Uyghur ethnic minority in northwest China. This fascinating study offers a comprehensive account of the group's origins, objectives, ideology, leadership, and tactics. It details the historical and contemporary contexts of the Uyghur separatist movement, the ETIM's alleged ties to international terrorist networks, and the Chinese government's interest in promoting the ETIM as a significant international problem. In addition, the book addresses conflicting claims about the membership and viability of the organization, noting where the Chinese government has apparently manipulated information about the ETIM to suit its own goals. A final chapter explores how various countries define ETIM activities and what that means for relations with China. Includes press releases issued by the Chinese government on violent Uyghur separatism and presents timelines of the ETIM's attacks and other activities and of major events in the history of Uyghur separatism Offers a bibliography that compiles scholarly and news sources pertaining to the ETIM and provides glossary of key terms derived from the Chinese, Uyghur, and English languages
The Ulster Volunteer Force (UVF) was established in January 1913, as a militant expression of Ulster Unionist opposition to the Third Home Rule Bill. It built on the foundations of pre-existing paramilitary activity and, at its height in early 1914, reached a strength of 100,000. During the Great War the UVF provided the basis of the 36th (Ulster) Division and in 1920 the force was partially reformed to counter the I.R.A. threat to the new Northern Ireland state. Academic historians have tended to overlook Ulster Loyalism. This book provides the first comprehensive study of the UVF in this period considering in detail the composition of the officer corps, the marked regional recruiting differences, the ideologies involved, the arming and equipping of the UVF and the contingency plans made by UVF Headquarters in the event of Home Rule being imposed on Ulster. Using previously neglected sources, Timothy Bowman demonstrates that the UVF was better armed and worse trained, with the involvement of fewer British army officers than previous historians have allowed. He suggests that the UVF was quite capable of seizing control of Ulster and installing the Ulster Provisional Government in the event of Home Rule being implemented in 1914, but provided few benefits to the 36th (Ulster) Division and failed to reform in any meaningful way in 1920. This book will be essential reading for military and Irish historians and their students, and will interest any general reader interested in modern paramilitary forces.
This book assesses the effectiveness of Nigeria's counterterrorist policies against Boko Haram. It takes a critical review of the interventionist strategies adopted by the Nigerian government, highlights the motivations behind the choice of strategies, and proffers a deeper understanding of the factors responsible for the state's inability, thus far, to rid the country of terrorism. Specifically, it evaluates the NACTEST policy framework that guides the Nigerian state's counterterrorist strategies, which contains both hard and soft power approaches. Adopting historical and case study approaches which put the Nigerian state and occurrences of violent conflict in context, it takes cognizance of the politics of ethno-religious diversity which reinforce violent conflicts among groups and against the state, and reviews the socio-economic and political realities that led to the emergence and sustenance of Boko Haram. The volume concludes by suggesting practical policy options for combating Boko Haram and other similar armed insurrection. This book is appropriate for researchers and students interested in African politics, conflict, security, peace studies, terrorism, and counterterrorism, as well as policy makers and government departments dealing with terrorism and counterterrorism.
Without sensationalizing or providing the technical details that would result in a terrorist's handbook, the volume reflects the concerns expressed by experts from 12 states (including many from Slavic regions adjoining or aspiring to membership of the European Union). A range of vulnerabilities are highlighted that are usually neglected. Assessments that focus on the horrifying potential of bioterrorism directly targeting people are commonplace. This book is exceptional because indirect impacts on human health and welfare through challenge to the security of food supplies are the focus. These urgently need to be recognised and made subjects of planned investment to counter the threat. Examples of past state-sponsored and independent actions are discussed. The evolution of biological (chemical defoliant) systems for controlling plant growth with unambiguously humanitarian aims is shown to have resulted in a range of counter terrorist uses.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. |
![]() ![]() You may like...
An Invitation to 3-D Vision - From…
Yi Ma, Stefano Soatto, …
Hardcover
R3,195
Discovery Miles 31 950
Special Kid to Super Kid - Overcoming…
Ruthangela Bernadette
Hardcover
Intelligent Systems and Networks…
Duc-Tan Tran, Gwanggil Jeon, …
Hardcover
R5,730
Discovery Miles 57 300
|