|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
Why is the problem of terrorism—and the emergence of more extreme
and more brutal terrorist groups—one that cannot be solved, even
after decades of trying? This book, authored by a United Nations
Ambassador once imprisoned and tortured in Iraq, diagnoses the
shortcomings of present counter-terrorism strategies and lays out
an effective new plan for counterterrorism. The world has up to now
failed to stop Al Qaeda terrorist attacks and also failed to stop
the emergence of more extreme and more brutal terrorist groups than
Al Qaeda, such as ISIS/ISIL, as well as newer lone wolf terrorists.
Current strategies of counterterrorism have many shortcomings that
allow terrorists to continue their operations. A New
Counterterrorism Strategy: Why the World Failed to Stop Al Qaeda
and ISIS/ISIL, and How to Defeat Terrorists identifies the
shortcomings of present approaches and presents a comprehensive and
sustainable strategy to combat terrorism. Author Ambassador T.
Hamid Al-Bayati, an Iraqi politician, offers a unique insider's
perspective about the war on terrorism. As a leader of the
opposition against the terrorist regime of Saddam Hussein, he was
arrested and tortured, until he fled Iraq. From the UK, he
continued involvement in unfolding political events, until
returning to Iraq and assuming high political appointments. These
special insights are interwoven with accounts of detailed
interactions and policies that provide the background for his
explanation of the failures of counterterrorism strategies to date,
and lessons learned from those mistakes. Al-Bayati spotlights the
problems of terrorist cells, lone wolves, and foreign fighters
developing in all parts of the world, where members work from safe
havens to plan attacks, acquire weapons, and gain fighting
experience. His proposed strategy further emphasizes issues
neglected in current counterterrorism strategies, such as
undermining the ideology of terrorists, interrupting their use of
the Internet to promote evil, understanding the motivations and
psychology of terrorists, deterring youth from joining ISIS,
creating effective media campaigns against terrorism, and shutting
off the flow of funding that currently buoys the financial
resources of terrorist organizations.
In this book, author Nader Moumneh-a Canadian senior policy adviser
of Lebanese descent- examines the research of the formation and
evolution of the Christian resistance in Lebanon he performed as a
graduate student at the American University of Beirut in the early
1990s. He has conducted hundreds of lengthy interviews with senior
Lebanese Forces leaders who were thoroughly impressed by his
communicative yet assertive personality, his scrupulous
presentation of facts, his obsessive attention to detail, and most
importantly, his unwavering determination to unveil
behind-the-scenes events. Mr. Moumneh drew upon his self-acquired
persuasion tactics and negotiation strategies to earn the Lebanese
Forces' trust and gain access to top secret, never-before published
information. Since then, he has continually revised and expanded
the manuscript to address the rapidly changing situation in Lebanon
and the Middle East. The Lebanese Forces: Emergence and
Transformation of the Christian Resistance has taken twenty-five
years to produce and is unique in its own right. Mr. Moumneh's work
is not a typical re-telling of the Lebanese crisis, rather it is a
magnificent blend of skillful craftsmanship, an unprecedented
wealth of painstakingly referenced chronological research and now
declassified intelligence information.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Conceptualizing Terrorism argues that, in the post 9/11 world, the
need for an internationally agreed definition of terrorism is more
important than it has ever been, despite the challenges that such
an endeavour presents. Indeed, in a global context, where the term
is often applied selectively and pejoratively according to where
one's interests lie, there is a real need to instill some
analytical quality into the concept of terrorism, not least in
order to prevent the term being manipulated to justify all manner
of counter-terrorism responses. Not only is this important for the
policymaking context but it is also an imperative task within
academia - in order to strengthen the theoretical foundation of
terrorism studies, for all other terrorism related theories rest on
what one means by terrorism in the first place. Written from an
academic perspective, the book explores the prospects for terrorism
as an analytical concept. Arguing that the essence of this
particular form of political violence lies in its intent to
generate a psychological impact beyond the immediate victims, it
goes on to propose the adoption of three key preliminary
assumptions that have implications for the definitional debate and
that it suggests might help to increase the analytical potential of
terrorism. The book then considers potential elements of a
definition before concluding with its own conceptualization of
terrorism.
Inherent Safety at Chemical Sites: Reducing Vulnerability to
Accidents and Terrorism Through Green Chemistry highlights the use
of green chemistry principles to identify and address serious
threats and potential consequences caused by accidental and
deliberate industrial chemical releases. Through valuable case
studies, the book suggests wholesale replacements of hazardous
chemicals with benign and inherently safer, or "greener,"
materials. More than physical security barriers and plans, such
preventative measures better guarantee the safety of industrial
employees and nearby residents. This valuable primer begins with an
introduction to the concepts of green chemistry and outlines the
various ways that a green approach to chemical design, production,
and management is not only good for the planet, but also serves to
protect people and infrastructure from terrorist acts. Specific
examples and case studies are cited to illustrate what has been
done to advance this cause, and offer guidance to those
decision-makers who similarly aspire to greater safety and security
for the people and resources they manage.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
This edited translation of Katutugu Yoshida's Jiyuno Nigaiaji
analyses the gradual process of reform in Taiwan over the past 100
years. It pays particular attention to the dilemmas, compromises
and pitfalls that have faced reformists as they have strived to
bring democratic change under a series of brutal dictatorships. The
author discusses the historical background to Taiwan's current
constitutional issues and its difficult relationship with the
People's Republic of China. It explores in detail the way in which
local political activism has transformed national politics,
providing original analysis of democratic political thought in East
Asia and a rich explanation of the social, historical and political
context of democratization in Taiwan. The book makes a significant
theoretical contribution to the literature on political reform by
using the Taiwanese context to explore debates between reformists
and revolutionaries and to consider the development of the concept
of the right to self-determination. This challenging and
stimulating book will strongly appeal to scholars and students with
an interest in Asian studies, politics, public policy and public
choice.
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
This book examines the projects of administrative and territorial
reconstruction of Arab countries as an aftermath of the "Arab
Spring". Additionally, it looks into an active rethinking of the
former unitary model, linked by its critics with dictatorship and
oppression. The book presents decentralization or even
federalization as newly emerging major topics of socio-political
debate in the Arab world. As the federalist recipes and projects
are specific and the struggle for their implementation has a
pronounced variation, different case studies are presented.
Countries discussed include Libya, Syria, Yemen, and Iraq. The book
looks into the background and prerequisites of the federalist
experiments of the "Arab Spring", describes their evolution and
current state, and assesses the prospects for the future. It is,
therefore, a must-read for scholars of political science, as well
as policy-makers interested in a better understanding of previous
and current developments in the Arab countries.
As concerns about human treatment of the environment and animals
have increased over the years, so have decentralized and extremist
groups related to these causes. Environmental and Animal Rights
Extremism, Terrorism, and National Security analyzes the
international development of radical movements relating to
environmental concerns and animal rights in the context of the
threats they pose to national security. In addition to tracing the
factors responsible for the rapid growth of these movements over
the last 25 years, this text presents countermeasures that
governments can deploy to neutralize the risk posed by these
threats now and in the future. Bringing to bear new developments
such as cyber activity and online activism, Environmental and
Animal Rights Extremism, Terrorism, and National Security offers an
examination of the direct and indirect violence, lone-wolf
terrorism, and leaderless resistance that have characterized these
radical wings from their inception. By not only identifying the
tactics and organizational structures often employed by these
groups, but also addressing future trends toward increased
radicalization, Environmental and Animal Rights Extremism,
Terrorism, and National Security is an important resource for
identifying, anticipating, and mitigating threats posed by such
movements.
Contemporary Military Strategy and the Global War on Terror offers
an in-depth analysis of US/UK military strategy in Afghanistan and
Iraq from 2001 to the present day. It explores the development of
contemporary military strategy in the West in the modern age before
interrogating its application in the Global War on Terror. The book
provides detailed insights into the formulation of military plans
by political and military elites in the United States and United
Kingdom for Operation Enduring Freedom and Operation Iraqi Freedom.
Alastair Finlan highlights the challenges posed by each of these
unique theatres of operation, the nature of the diverse enemies
faced by coalition forces, and the shortcomings in strategic
thinking about these campaigns. This fresh perspective on strategy
in the West and how it has been applied in recent military
campaigns facilitates a deep understanding of how wars have been
and will be fought. Including key terms, concepts and discussion
questions for each chapter, Contemporary Military Strategy and the
Global War on Terror is a crucial text in strategic studies, and
required reading for anyone interested in the new realities of
transnational terrorism and twenty-first century warfare.
Now updated and expanded for its second edition, this book
investigates the role intelligence plays in maintaining homeland
security and emphasizes that effective intelligence collection and
analysis are central to reliable homeland security. The first
edition of Homeland Security and Intelligence was the go-to text
for a comprehensive and clear introduction to U.S intelligence and
homeland security issues, covering all major aspects including
analysis, military intelligence, terrorism, emergency response,
oversight, and domestic intelligence. This fully revised and
updated edition adds eight new chapters to expand the coverage to
topics such as recent developments in cyber security, drones, lone
wolf radicalization, whistleblowers, the U.S. Coast Guard, border
security, private security firms, and the role of first responders
in homeland security. This volume offers contributions from a range
of scholars and professionals from organizations such as the
Department of Homeland Security, the Center for Homeland Defense
and Security at the Naval Postgraduate School, the National
Intelligence University, the Air Force Academy, and the
Counterterrorism Division at the Federal Law Enforcement Training
Center. This breadth of unique and informed perspectives brings a
broad range of experience to the topic, enabling readers to gain a
critical understanding of the intelligence process as a whole and
to grasp what needs to happen to strengthen these various systems.
The book presents a brief history of intelligence in the United
States that addresses past and current structures of the
intelligence community. Recent efforts to improve
information-sharing among the federal, state, local, and private
sectors are considered, and the critical concern regarding whether
the intelligence community is working as intended-and whether there
is an effective system of checks and balances to govern it-is
raised. The book concludes by identifying the issues that should be
addressed in order to better safeguard our nation in the future.
Addresses the most recent changes in homeland security and
intelligence, explains the dynamics and structure of the
intelligence community, and assesses the effectiveness of new
intelligence processes Focuses on the evolving structure of the
intelligence community and its processes in the age of ISIS and
organized, widespread terrorist threats as witnessed by the events
in Boston, San Bernardino, and Paris Contains seven new chapters as
well as revisions and updates throughout this second edition
Underscores how intelligence can work-and needs to function-across
homeland security efforts at the federal, state, and local levels
This exceptional volume examines international security issues by
way of case studies of the conflicts in Afghanistan and Iraq. Each
of these raises significant issues concerning the use of force
between states and the role of the United Nations in maintaining
international peace and security. Alex Conte examines international
terrorism and the intervention in Afghanistan, including the
controversial policy of pre-emptive strikes in the war on terror,
and discusses the role adopted by the United Nations in the
political and economic reconstruction of states subjected to
conflict. Analyzing events in Iraq since 1990, he assesses the
legality of the current war and leads to an examination of the role
of the UN in maintaining peace and security and possible options
for reform and accountability. The study will be a valuable guide
for all those keen to understand the use of international law and
the United Nations in the first two major conflicts of the 21st
century and their implications for the future role of the United
Nations.
Understand the complexities of the most lethal insurgent group of
America's longest war-the Taliban. Battle hardened, tribally
oriented, and deeply committed to its cause, the Taliban has proven
itself resourceful, adaptable, and often successful. As such, the
Taliban presents a counterinsurgency puzzle for which the United
States has yet to identify effective military tactics, information
operations, and Coalition developmental policies. Written by one of
the Department of the Army's leading intelligence and military
analysts on the Taliban, this book covers the group's complete
history, including its formation, ideology, and political power, as
well as the origins of its current conflict with the United States.
The work carefully analyzes the agenda, capabilities, and support
base of the Taliban; forecasts the group's likely course of action
to retake Afghanistan; and details the Coalition forces' probable
counterinsurgency responses. Author Mark Silinsky also reviews the
successes and failures of the latest U.S. counterinsurgency
doctrine to extrapolate the best strategies for future
counterinsurgency campaigns. Provides insights from an author with
academic training in politics and economics as well as a 30-year
defense intelligence community background, including serving as an
Army analyst in Afghanistan Presents information recently obtained
under the Freedom of Information Act Analyzes the tribal,
religious, political, and international elements of the greater
Taliban problem
Challenging the standard paradigm of terrorism research through the
use of Norbert Elias's figurational sociology, Michael Dunning
explores the development of terrorism in Britain over the past two
centuries, focusing on long-term processes and shifting power
dynamics. In so doing, he demonstrates that terrorism as a concept
and designation is entwined with its antithesis, civilization. A
range of process sociological concepts are deployed to tease out
the sociogenesis of terrorism as part of Britain's relationships
with France, Ireland, Germany, the Soviet Union, the industrial
working classes, its colonies, and, most recently, jihadism. In
keeping with the figurational tradition, Dunning examines the
relationships between broad, macro-level processes and processes at
the level of individual psyches, showing that terrorism is not
merely a 'thing' done to a group, but part of a complex web of
interdependent relations.
Scientists with little or no background in security and security
professionals with little or no background in science and
technology often have difficulty communicating in order to
implement the best counterterrorism strategies. "The Science and
Technology of Counterterrorism" offers the necessary theoretical
foundation to address real-world terrorism scenarios, effectively
bridging the gap. It provides a powerful security assessment
methodology, coupled with counterterrorism strategies that are
applicable to all terrorism attack vectors. These include
biological, chemical, radiological, electromagnetic, explosive, and
electronic or cyber attacks. In addition to rigorous estimates of
threat vulnerabilities and the effectiveness of risk mitigation, it
provides meaningful terrorism risk metrics.
"The Science and Technology of Counterterrorism" teaches the
reader how to think about terrorism risk, and evaluates terrorism
scenarios and counterterrorism technologies with sophistication
punctuated by humor. Both students and security professionalswill
significantly benefit from the risk assessment methodologies and
guidance on appropriate counterterrorism measures contained within
this book.
Offers a simple but effective analytic framework to assess
counterterrorism risk and realistic measures to address
threatsProvides the essential scientific principles and tools
required for this analysisExplores the increasingly important
relationship between physical and electronic risk in meaningful
technical detailEvaluates technical security systems to illustrate
specific risks using concrete examples
"
|
|