![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.
Understand the complexities of the most lethal insurgent group of America's longest war-the Taliban. Battle hardened, tribally oriented, and deeply committed to its cause, the Taliban has proven itself resourceful, adaptable, and often successful. As such, the Taliban presents a counterinsurgency puzzle for which the United States has yet to identify effective military tactics, information operations, and Coalition developmental policies. Written by one of the Department of the Army's leading intelligence and military analysts on the Taliban, this book covers the group's complete history, including its formation, ideology, and political power, as well as the origins of its current conflict with the United States. The work carefully analyzes the agenda, capabilities, and support base of the Taliban; forecasts the group's likely course of action to retake Afghanistan; and details the Coalition forces' probable counterinsurgency responses. Author Mark Silinsky also reviews the successes and failures of the latest U.S. counterinsurgency doctrine to extrapolate the best strategies for future counterinsurgency campaigns. Provides insights from an author with academic training in politics and economics as well as a 30-year defense intelligence community background, including serving as an Army analyst in Afghanistan Presents information recently obtained under the Freedom of Information Act Analyzes the tribal, religious, political, and international elements of the greater Taliban problem
This exceptional volume examines international security issues by way of case studies of the conflicts in Afghanistan and Iraq. Each of these raises significant issues concerning the use of force between states and the role of the United Nations in maintaining international peace and security. Alex Conte examines international terrorism and the intervention in Afghanistan, including the controversial policy of pre-emptive strikes in the war on terror, and discusses the role adopted by the United Nations in the political and economic reconstruction of states subjected to conflict. Analyzing events in Iraq since 1990, he assesses the legality of the current war and leads to an examination of the role of the UN in maintaining peace and security and possible options for reform and accountability. The study will be a valuable guide for all those keen to understand the use of international law and the United Nations in the first two major conflicts of the 21st century and their implications for the future role of the United Nations.
Contemporary Military Strategy and the Global War on Terror offers an in-depth analysis of US/UK military strategy in Afghanistan and Iraq from 2001 to the present day. It explores the development of contemporary military strategy in the West in the modern age before interrogating its application in the Global War on Terror. The book provides detailed insights into the formulation of military plans by political and military elites in the United States and United Kingdom for Operation Enduring Freedom and Operation Iraqi Freedom. Alastair Finlan highlights the challenges posed by each of these unique theatres of operation, the nature of the diverse enemies faced by coalition forces, and the shortcomings in strategic thinking about these campaigns. This fresh perspective on strategy in the West and how it has been applied in recent military campaigns facilitates a deep understanding of how wars have been and will be fought. Including key terms, concepts and discussion questions for each chapter, Contemporary Military Strategy and the Global War on Terror is a crucial text in strategic studies, and required reading for anyone interested in the new realities of transnational terrorism and twenty-first century warfare.
The mission was to kill the most wanted man in the world--an operation of such magnitude that it couldn't be handled by just any military or intelligence force. The best America had to offer was needed. As such, the task was handed to roughly forty members of America's supersecret counterterrorist unit formally known as 1st Special Forces Operational Detachment-Delta; more popularly, the elite and mysterious unit Delta Force. This is the real story of the operation, the first eyewitness account of the Battle of Tora Bora, and the first book to detail just how close Delta Force came to capturing bin Laden, how close U.S. bombers and fighter aircraft came to killing him, and exactly why he slipped through our fingers. Lastly, this is an extremely rare inside look at the shadowy world of Delta Force and a detailed account of these warriors in battle.
Now updated and expanded for its second edition, this book investigates the role intelligence plays in maintaining homeland security and emphasizes that effective intelligence collection and analysis are central to reliable homeland security. The first edition of Homeland Security and Intelligence was the go-to text for a comprehensive and clear introduction to U.S intelligence and homeland security issues, covering all major aspects including analysis, military intelligence, terrorism, emergency response, oversight, and domestic intelligence. This fully revised and updated edition adds eight new chapters to expand the coverage to topics such as recent developments in cyber security, drones, lone wolf radicalization, whistleblowers, the U.S. Coast Guard, border security, private security firms, and the role of first responders in homeland security. This volume offers contributions from a range of scholars and professionals from organizations such as the Department of Homeland Security, the Center for Homeland Defense and Security at the Naval Postgraduate School, the National Intelligence University, the Air Force Academy, and the Counterterrorism Division at the Federal Law Enforcement Training Center. This breadth of unique and informed perspectives brings a broad range of experience to the topic, enabling readers to gain a critical understanding of the intelligence process as a whole and to grasp what needs to happen to strengthen these various systems. The book presents a brief history of intelligence in the United States that addresses past and current structures of the intelligence community. Recent efforts to improve information-sharing among the federal, state, local, and private sectors are considered, and the critical concern regarding whether the intelligence community is working as intended-and whether there is an effective system of checks and balances to govern it-is raised. The book concludes by identifying the issues that should be addressed in order to better safeguard our nation in the future. Addresses the most recent changes in homeland security and intelligence, explains the dynamics and structure of the intelligence community, and assesses the effectiveness of new intelligence processes Focuses on the evolving structure of the intelligence community and its processes in the age of ISIS and organized, widespread terrorist threats as witnessed by the events in Boston, San Bernardino, and Paris Contains seven new chapters as well as revisions and updates throughout this second edition Underscores how intelligence can work-and needs to function-across homeland security efforts at the federal, state, and local levels
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. "The Science and Technology of Counterterrorism" offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics. "The Science and Technology of Counterterrorism" teaches the
reader how to think about terrorism risk, and evaluates terrorism
scenarios and counterterrorism technologies with sophistication
punctuated by humor. Both students and security professionalswill
significantly benefit from the risk assessment methodologies and
guidance on appropriate counterterrorism measures contained within
this book.
This comprehensive bibliography is the first to catalog, describe, and index the vast body of TV, video, and film materials dealing with John F. Kennedy's assassination. This guide to the first newsreels, and later films and documentaries, TV programs, videos, and little-known materials is organized for the most part chronologically and by genre of work. This research guide points also to North American and United Kingdom film libraries and archives and provides a short list of key sources of printed materials. The appendix and indexes to titles; TV stations and production companies; interviewers and witnesses; and presenters, reporters, and narrators make the bibliography easily accessible for those studying JFK, modern history, political science, and sociology.
A comprehensive overview of counterterrorism that examines key aspects of the fight against terrorism, including intelligence, law enforcement, the military, financial and criminal activity, ethics, and social media. Recent terrorist actions in the United States and abroad make it clear that the subject of counterterrorism is as vital and as timely as ever. Edited by a leading authority on terrorism and security studies, this compendium offers a wide-ranging look at the most vital aspects of counterterrorism, from diplomacy and military action to the investigation and interdiction of terrorist finances. Following an introduction, chapters offer insightful discussions of strategy, policy, tactical, and operational dimensions of counterterrorism. An interdisciplinary team of expert contributors examine a wide range of topics, including "lone wolf" and homegrown terrorists, intelligence cooperation, social media, community policing, terrorism finance, and the shadow economy. Case studies from Europe, Latin America, South Asia, the Middle East, and the United States provide clear, practical examples of effective-and sometimes not so effective-approaches to combating terrorism. The volume will serve as a central textbook for professional development courses, workshops, and academic degree programs on terrorism, counterterrorism, and security studies. Analyzes critical themes and issues related to the fight against terrorism Provides an ideal guide for students and other readers who are new to the study of counterterrorism and national and international security Brings together contributors from academia, the military, law enforcement, government and intelligence agencies, and think tanks Includes case studies that illustrate key concepts used in successfully combating terrorism
This examination of al-Qaeda's decline since the 9/11 attacks focuses on the terror organization's mutation and fragmentation. It looks at its partnership with the local and regional jihadist networks that played a pivotal role in the Madrid, London, and Fort Hood attacks, arguing that, although initially successful, such alliances actually unraveled following both anti-terror policies and a growing rejection of violent jihadism in the Muslim world. Challenging conventional theories about al-Qaeda and homegrown terrorism, the book claims that jihadist attacks are now organized by overlapping international and regional networks that have become frustrated in their inability to enforce regime change and their ideological goals. The discussion spans the war on terror, analyzing major post 9/11 attacks, the failed jihadist struggle in Iraq, al-Qaeda's affiliates, and the organization's future prospects after the death of Osama Bin Laden and the Arab Spring. This assessment of the future of the jihadist struggle against Muslim governments and homegrown Islamic terrorism in the West will be an invaluable resource to anyone studying terrorism and Islamic extremism.
This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises. Terrorist groups have evolved from orthodox global insurgents funded by rogue sponsors into nimble and profitable transnational criminal enterprises whose motivations are not always evident. This volume seeks to explain how and why terrorist groups are often now criminal enterprises through 12 case studies of terrorist criminal enterprises written by authors who have derived their expertise on terrorism and/or organized crime from diverse sources. Terrorist groups have been chosen from different regions to provide the global coverage. Chapters describe and analyze the actors, actions, problems, and collaborations of specific terrorist criminal enterprises. Other elements discussed include links to such facilitating conditions as political culture, corruption, history, economy, and issues of governance. This work advances scholarship in the field of counterterrorism by expanding the understanding of these terrorist groups as entities not driven purely by ideology but rather by the criminal enterprises with which they often coincide. Provides a global comparison of major terrorist groups and their engagement in organized crime Provides in-depth analysis of regional terrorist and criminal groups Incorporates authors' expertise on regional terrorist groups and organized crime Acknowledges a variety of opinions and perspectives
Reconceptualizing Security in the Americas in the Twenty-First Century illustrates the various security concerns in the Americas in the twenty-first century. It presents the work of a number of prolific scholars and analysts in the region. The book offers new theoretical and analytical perspectives. Within the Americas, we find a number of important issues security issues. Most important are the threats that supersede borders: drug trafficking, migration, health, and environmental. These threats change our understanding of security and the state and regional process of neutralizing or correcting these threats. This volume evaluates these threats within contemporary security discourse.
This is a study of how the information age in modern warfare coexists with the persistent appeal of nuclear weapons and its impact on crisis management. In today's information age, the coexistence of nuclear weapons with advanced conventional weapons and information-based concepts of warfare is a military contradiction. Nuclear deterrence was initially predicated on geopolitical, military, and technical assumptions. These were based on Cold War politics, rational deterrence theory, the concept of mutual vulnerability, and the fact that information and technology diffusion were limited. Today, however, far from being obsolete, nuclear and other weapons of mass destruction have not only survived, but have become weapons for states that face security threats, including perceived threats of nuclear blackmail, or expectation of conflicts. This study focuses on this unplanned coexistence of two distinct arts of war, including the possibility that states like the U.S. may be held hostage to nuclear blackmail by "outlier" regimes or terrorists, such as North Korea. It shows that restricting nuclear proliferation should still be on the agenda of policymakers, and calls for a revitalized global non-proliferation regime. This unique survey by a leading expert will appeal to anyone interested in arms control, nuclear proliferation, and defense policy.
Stefano Dall’Aglio sheds new light on the notorious Florentine Lorenzino de’ Medici (also known as Lorenzaccio) and on two of the most infamous assassinations of Italian Renaissance history. In 1537 Lorenzino changed the course of history by murdering Alessandro de’ Medici, first duke of Florence, and paving the way for the accession of the new duke, Cosimo I. In 1548 Lorenzino was killed in Venice in revenge for the assassination he had committed. Basing his work on extensive research in the historical archives of Florence and Simancas, Dall’Aglio reconstructs the events surrounding these murders and involving the Medici, their loyalists, the Florentine republican exiles, and some of the most powerful sovereigns of the time. The first publication in a century, and the first work in English, to examine the life of Lorenzino de’ Medici, this fascinating revisionist history is as gripping as a detective novel, as Dall’Aglio unravels a 500-year-old mystery, revealing that behind the bloody death of the duke’s assassin there was the Emperor Charles V.
This book offers a unique analytical investigation of the international politics of the EU, China, and India in the context of their security strategies in Central Asia. It shows how the interaction between these three actors is likely to change the frameworks and practices of international relations. This is studied through their interactions with central Asia, using the framework of normative powers and the concept of regional security governance. Briefly, a normative power shapes a target state's attitudes and perceptions as it internalizes and adopts the perspectives of the normative power as the norm. The work comparatively studies the dynamics that have allowed Beijing, Brussels, and New Delhi to articulate security mechanisms in Central Asia, and become rising normative powers. This innovative study does not aim to catalog foreign policies, but to uncover the dominant perceptions, cognitive structures and practices that guide these actors' regional agency, as exemplified through the context of Central Asia. It will be an essential resource for anyone studying international relations, international relations theory, and foreign policy analysis.
The terrorist attacks on the twin towers of the World Trade Center on September 11th, 2001 have had a profound impact on contemporary American literature and culture. With chapters written by leading scholars, 9/11: Topics in Contemporary North American Literature is a wide-ranging guide to literary responses to the attacks and its aftermath. The book covers the most widely studied texts, from Don DeLillo's Falling Man, Jonathan Safran Foer's Extremely Loud and Incredibly Close and Jonathan Franzen's Freedom to responses in contemporary American poetry and graphic narratives such as Art Spiegelman's In the Shadow of No Towers. Including annotated guides to further reading, this is an essential guide for students and readers of contemporary American literature.
The Marine Corps University symposium, "Counterinsurgency Leadership in Iraq, Afghanistan, and beyond" held on September 23, 2009 at the National Press Club, Washington, DC explored ways to improve counterinsurgency leadership, with particular attention to the leaders of American, Afghan, and Iraqi forces. The Symposium was sponsored by Marine Corps University and the Marine Corps University Foundation.
When Vladimir Putin became President of Russia in 2000, his first priority was to reestablish the intelligence agencies' grip on the country by portraying himself as a strongman protecting Russian citizens from security threats. Despite condemnation by the United Nations, the European Parliament, and European Union, the policy of brutal "ethnic cleansing" in Chechnya continued. For Putin, Islamist attacks on the United States of September 11, 2001, were a welcome opportunity to rebrand the war against Chechen independence, not as the crushing of a democracy, but as a contribution to President George W. Bush's "War on Terror." In the years that followed, Putin's regime covertly supported and manipulated extremist factions in Chechnya and stage-managed terrorist attacks on its own citizens to justify continuing aggression. US and European condemnation of Russian atrocities in Chechnya dwindled as Russia continued to portray Chechen independence as an international terrorist threat. Chechnya's Prime Minister-in-Exile Akhmed Zakaev, who had to escape Chechnya, faced Russian calls for his extradition from the United Kingdom, which instead granted him political asylum as Russia's increased its oppressive operations. |
You may like...
Geophysical Exploration of the Solar…
Cedric Schmelzbach, Simon Christian Stahler
Hardcover
R4,816
Discovery Miles 48 160
GNSS Remote Sensing - Theory, Methods…
Shuanggen Jin, Estel Cardellach, …
Hardcover
R4,722
Discovery Miles 47 220
Urban Heat Island Modeling for Tropical…
Ansar Khan, Soumendu Chatterjee, …
Paperback
R3,028
Discovery Miles 30 280
The Way the World Ends? - The Apocalypse…
William John Lyons, Jorunn Okland
Hardcover
R2,062
Discovery Miles 20 620
|