Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > Political activism > Terrorism, freedom fighters, armed struggle
What is the role of founding leaders in shaping terrorist organizations? What follows the loss of this formative leader? These questions are especially important to religious terrorist groups, in which leaders are particularly revered. Tricia L. Bacon and Elizabeth Grimm provide a groundbreaking analysis of how religious terrorist groups manage and adapt to major shifts in leadership. They demonstrate that founders create the base from which their successors operate. Founders establish and explain the group's mission, and they determine and justify how it seeks to achieve its objectives. Bacon and Grimm argue that how successors position themselves in terms of the founder shapes a terrorist group's future course. They examine how and why different types of successors choose to pursue incremental or discontinuous change. Bacon and Grimm emphasize that the instability surrounding succession can place a group at its most vulnerable-the precise time to explore options to weaken or defeat it. Bacon and Grimm highlight similarities between Islamic terrorist groups abroad and Christian white nationalist groups such as the 1920s Ku Klux Klan in the United States. Drawing on extensive field research in Afghanistan, Somalia, and Pakistan, Terror in Transition features detailed analysis of groups such as al-Shabaab, Egyptian Islamic Jihad, and al-Qaeda in Iraq / the Islamic State in Iraq, as well as the KKK. Offering a rigorous theoretical perspective on terrorist leadership transition, this policy-relevant book provides actionable recommendations for counterterrorism practitioners.
The Disaster Dictionary identifies terms, acronyms, and related concepts. More than 1,100 entries are derived from many types of disasters and crisis scenarios. Appendix A provides a detailed description of Weapons of Mass Destruction: their classification, characteristics, and response protocols. Appendix B explains the background, purpose and use of the Incident Command System (ICS). You'll learn how resources within ICS are organized and understand their rules of operation. Appendix C provides a listing of more than 100 web-based resources for additional information and study.
Have we reached an end to the era of peaceful third party intervention in conflict management and resolution? In the 1990s, with the ending of the Cold War, the intervention of third parties as a non-violent means of negotiating settlements of intra-state conflicts gained prominence but the emphasis in the twenty-first century has been increasingly on military responses. Peaceful Intervention in Intra-State Conflicts: Norwegian Involvement in the Sri Lankan Peace Process is an in-depth, impartial discussion on the background, decision making processes and procedures and related actions in the Norwegian facilitated peace process in Sri Lanka that gradually shifted towards a military solution. It provides the reader with evidence based comprehensive analysis on the attempts of peaceful third party intervention in a complex ethno-separatist intra-state conflict.
Assassination as a political act has a long history, predating the murder of Julius Caesar and continuing into our own time. The murder of the mighty has long fascinated artists and rebels but only rarely has it been studied in a scholarly manner. In Assassin, J. Bowyer Bell combines existing historical evidence with years of personal interviews with terrorists in Africa, the Middle East, and Europe. The result is an incisive study of that enigmatic figure, the revolutionary killer. As Bell makes clear, the motives of the actors, and effectiveness of assassination, vary widely across time and place. Assassination in many parts of the world has not only been a normal political act, rational, explicable, but also often effective, in some cases taking fewer lives in the transfer of power than an election. Likewise, there have been all kinds of assassins--personal, psychopathic, professional, ranging from lonely failures trying to make their mark to authorized agents of the state. Using the assassination of Henry IV of France as a historical backdrop, Bell writes about contemporary political murder from the perspective of one who has studied the subject of political violence for decades. Bell has met with or known well the perpetrators, conspirators, and intended victims of assassination who have escaped. His interviewees include a radical Irish revolutionary leader, an American Arabist diplomat, a spokesman for the PLO, and the president of a Mozambique liberation movement. The itinerary of his investigative journeys covers most of the flashpoints of contemporary political violence. The people and places studied here at firsthand are engaged in a deadly game. The attrition rate is often high, the power fleeting, and the consequences often unforeseen. If past is prologue, assassination is to be with us for years to come. The volume will be essential reading for those engaged in the prevention of political violence and terror as well as historians and political scientists.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
This book introduces students to the dynamic and complex enterprise that is homeland security. Using a broad lens, the authors explore key operational and content areas, as well as the practices and policies that are part of an effective homeland security program. With original essays from academics and practitioners, the book encapsulates the brea
This team of international experts analyses the possibilities and limitations of preventing or reducing terrorism by addressing the factors that give rise to it and sustain it. The key questions raised include: * what are the main circumstances that provide preconditions for the emergence of various types of terrorism? * what are the typical precipitants that trigger terrorist campaigns? * to what extent is it possible to reduce the problem of terrorism by influencing these causes and circumstances? * should we address those factors that sustain terrorist campaigns rather than root causes? This book is edited by Tore BjA, rgo - Senior Research Fellow at the Norwegian Institute of International Affairs (NUPI), Professor and Research Director at the Norwegian Police University College.
What are the main factors and circumstances that give rise to
terrorism? This is a question commonly addressed in political
discourse on terrorism and is considered an alternative to dealing
with terrorism through military force. However, there have been
surprisingly few attempts to analyze the causes of terrorism in a
book format.
"Investigative reporting at its best. Mark Shaw's original work into the questionable deaths of Marilyn Monroe and Dorothy Kilgallen is now focused on the many unanswered questions left by the Warren Commission's inquiry into the JFK assassination. Fighting for Justice has to be read." -Nicholas Pileggi, author of Wiseguy and Casino Packed with shocking new evidence, Fighting for Justice exposes the cover-ups of the JFK assassination and the murders of Dorothy Kilgallen and Marilyn Monroe, while revealing for the first time the corrupt inner workings of the Warren Commission based on the firsthand "whistleblower" account of an actual Commission member never identified before. How does an explosive "whistleblower" account from a Warren Commission (WC) member never identified before destroy once and for all the biggest lie in American history, the "Oswald Alone" theory? On what basis did the member admit, "It's more than Oswald. There is internal corruption on the Commission. I do not agree with the Report"? Is the "whistleblower" the same one who surreptitiously passed Jack Ruby's WC testimony to journalist Dorothy Kilgallen prior to its release date? And how did President Lyndon Johnson and J. Edgar Hoover strong arm the commission to prevent any investigation of the truth about who killed JFK and why? Based on fifteen years of research, answers to these questions and more are uncovered in Fighting for Justice, bestselling author and noted historian Mark Shaw's improbable journey to exposing cover-ups of the JFK assassination while proving Marilyn Monroe and Kilgallen were murdered.
The 9/11 attacks revealed that the transnational terrorist threat facing the US and its partners was far more dangerous than most had previously discerned. It was now clear that al-Qaeda intended to, and could threaten the West's - particularly the US' - political and military leverage, with the aim of shifting the balance of power from the West to Islam after a violent global confrontation. In that sense, the new terrorist threat is strategic, and it has led to a worldwide mobilisation comparable to that required by a world war. This Paper argues that prevailing in the 'war' on terror, much like victory in the Cold War, entails containment, deterrence, outperformance and engagement. Military power is secondary to intelligence, law enforcement, enlightened social policy and diplomacy. Diplomatic engagement with the larger Muslim world is paramount as a means of denying al-Qaeda not merely recruits but the'clash of civilisations' it seeks. The US-led intervention in Iraq, though intended to introduce democratic reform in the wider Middle East, has so far antagonised Islam and strengthened Islamist terrorism. This suggests that coercive or aggressively ideological diplomacy is unlikely to win over an Islamic population biased by anti-Western propaganda. Successful Western diplomacy will have to be discreet, nuanced and incremental.
This book provides an overview of the evolution of political Islam in South-east Asia. It analyses the sources of religious radicalism and assesses the regional terrorist and radical networks. It describes how secular democratic institutions can be strengthened, and how moderate and tolerant tendencies can be promoted.
"Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls. Divided into seven sections, the Sensitive Security Information Certified (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in * The history and definition of SSI * Espionage, security breaches, and detection * Personal information security * Corporate security * Government security * Legislation and regulations * Identity theft Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including * Good information practices * The psychology of spies * Methods to detect potential betrayal * Methods for handling sensitive information * Establishing security plans for sensitive information * Monitoring techniques such as the use of closed-circuit video cameras In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI."
Powers to outlaw or proscribe terrorist organisations have become cornerstones of global counter-terrorism regimes. In this comprehensive volume, an international group of leading scholars reflect on the array of proscription regimes found around the world, using a range of methodological, theoretical and disciplinary perspectives from Political Science, International Relations, Law, Sociology and Criminology. These perspectives consider how domestic political and legal institutions intersect with and transform the use of proscription in countering terrorism and beyond. The chapters advance a range of critical perspectives on proscription laws, processes and outcomes, drawing from a global range of cases including Australia, Canada, the EU, Spain, Sri Lanka, Turkey, the UK and the USA. Using single and comparative cases, the authors emphasise the impacts of proscription on freedoms of speech and association, dissent, political action and reconciliation. The chapters demonstrate the manifold consequences for diasporas and minorities, especially those communities linked to struggles overseas against oppressive regimes, and stress the significance of language and other symbolic practices in the justification and extension of proscription powers. The volume concludes with an in-depth interview on the blacklisting of terror groups with the former U.S. Director of National Intelligence, James Clapper. This book was originally published as a special issue of the journal Terrorism and Political Violence.
This thoroughly revised and updated edition of Asian Security Handbook focuses on the new challenges to security in the Asia-Pacific region presented by international terrorism. It reviews "old" security realities covered in previous editions, and highlights more recent security issues in the region, including the North Korean threat, weapons of mass destruction proliferation, the South China Sea dispute, and the future U.S. China rivalry. Featuring contributions by a distinguished group of international security and Asia experts, this new edition has been reformatted and restructured. A new introductory chapter on terrorism sets the stage for the country-by-country profiles and assessments of the political-security situations in twenty-three individual nations. A new appendix on foreign terrorist organizations is also included.
While there is no easy way to define terrorism, it may generally be viewed as a method of violence in which civilians are targeted with the objective of forcing a perceived enemy into submission by creating fear, demoralization, and political friction in the population under attack. At one time a marginal field of study in the social sciences, terrorism is now very much in center stage. The 1970s terrorist attacks by the PLO, the Provisional Irish Republican Army, the Popular Front for the Liberation of Palestine, the Japanese Red Army, the Unabomber, Aum Shinrikyo, Timothy McVeigh, the World Trade Center attacks, the assault on a school in Russia, and suicide bombers have all made the term "terrorism" an all-too-common part of our vocabulary. This edition of Political Terrorism was originally published in the 1980s, well before some of the horrific events noted above. This monumental collection of definitions, conceptual frameworks, paradigmatic formulations, and bibliographic sources is being reissued in paperback now as a resource for the expanding community of researchers on the subject of terrorism. This is a carefully constructed guide to one of the most urgent issues of the world today. When the first edition was originally published, Choice noted, "This extremely useful reference tool should be part of any serious social science collection." Chronicles of Culture called it "a tremendously comprehensive book about a subject that any who have anything to lose--from property to liberty, life to limbs--should be forewarned against."
The rise of the Islamic State since 2014 has led to the re-emergence of terrorism as a serious security threat in Asia. Coupled with the ongoing terrorism and insurgency challenges from both radical religious extremists and also ethno-nationalist insurgencies, it is clear that some parts of Asia remain mired in armed rebellion despite decades of nation-building. While the situation in Afghanistan and Pakistan has obviously deteriorated, there is also a growing terrorist challenge, on top of armed insurgencies, in other parts of Asia. A common theme in armed rebellions in the region has been the lack of legitimacy of the state and the presence of fundamental causes stemming from political, economic or social grievances. Addressing rebellion in the region thus requires a comprehensive approach involving transnational co-operation, addressing fundamental grievances, and also the use of more innovative approaches, such as religious rehabilitation and reconciliation programmes.
Featuring contributions by a distinguished group of international security and Asia experts, this thoroughly revised and updated edition of Asian Security Handbook focuses on the new challenges to security in the Asia-Pacific region presented by international terrorism. It reviews old security realities covered in previous editions, and highlights more recent security issues in the region, including the North Korean threat, weapons of mass destruction proliferation, the South China Sea dispute, and the future U.S.-China rivalry. The new edition has been completely reformatted and restructured. A new introductory chapter on terrorism sets the stage for the country-by-country profiles and assessments of the political-security situation in twenty-three individual nations. A new appendix on Foreign Terrorist Organizations is also included.
All Basque interpretations of national power have resulted in an
uneasy mix of often fragmented and conflicting territorial
identifications. Basques can identify themselves with France, Spain
or an imagined Basque nation state. Territory and Terror confronts
the imagined and actual territorial dimensions of nationalism,
shedding new light on the Basque conflict.
Education plays an important role in challenging, combating, and understanding terrorism in its different forms, whether as counter-terrorism or as a form of human rights education. Just as education has played a significant role in the process of nation-building, so education also plays a strong role in the process of empirialization, globalization, and resistance to global forces-and in terrorism, especially where it is linked to emergent statehood. This book focuses on the theme of education in an age of terrorism, exploring the conflicts of globalization and global citizenship, feminism post-9/11, youth identities, citizenship and democracy in a culture of permanent war, and the relation between education and war, with a focus on the war against Iraq.
Crisis and Disaster Management for Sport is the first book to introduce key concepts and best practice in crisis and disaster management in sport and international sports events. The book draws from multiple disciplines to provide insight into the issues and challenges involved in planning for, and managing, crises and disasters in the context of sport. With an initial focus on sports event and venue resilience, the book also explores social, community and individual resilience within sport and examines concepts and issues such as fandom, risk perception, crowd control and management, crisis communication and reputational risk and the growing challenges posed by climate change. The book includes real-world case studies as well as disaster management-related simulation and scenario-building exercises and looks ahead to what might be the most significant threats in future to the safe and sustainable management of sport. With the devastating impacts of COVID-19 illustrating the central importance of resilience and proper preparation for crises and disasters, this book is an essential read for all researchers, students, practitioners and policy-makers working in sport, tourism, entertainment, leisure and critical event studies.
This book explores terrorism as a strategic choic-- one made carefully and deliberately by rational actors. Through an analysis of the terrorist groups of Egypt, Saudi Arabia and Yemen, it charts a series of different strategic 'scripts' at play in terrorist behaviour, from survival, to efforts in mobilising a supporter base, through to the grinding attrition of a long terrorist campaign. The theme that runs through all these organisations is the unbridgeable gap between their strategic vision,and what actually unfolds. Regardless of which script terrorists follow, they often fall short of achieving their political ambitions. And yet, despite its frequent failure, the terrorist strategy is returned to time and again--people continue to join such groups, and to commit violence. Scripts of Terror explores the reasons behind this. It asks why, if terrorism is so rarely successful and so hard to pull off, its approach remains an appealing one. And it examines how terrorists formulate their strategies, and how they envisage achieving their ambitions through violence. Most importantly, it explores why they so often fail.
This book examines the rise of religious extremism in Pakistan, particularly since 1947, and analyzes its connections to the Pakistani army's corporate interests and U.S.-Pakistan relations. It includes profiles of leading Pakistani militant groups with details of their origins, development, and capabilities. The author begins with an historical overview of the introduction of Islam to the Indian sub-continent in /12 AD, and brings the story up to the present by describing President Musharraf's handling of the war on terror. He provides a detailed account of the political developments in Pakistan since 1947 with a focus on the influence of religious and military forces. He also discusses regional politics, Pakistan's attempt to gain nuclear power status, and U.S.-Pakistan relations, and offers predictions for Pakistan's domestic and regional prospects.
This book provides a detailed picture of the life of these Greek mercenaries, analyzing who they were and from what section of society they came. It explores their motivations, their relationships and connections, both with each other and those with whom they served, and shows how mercenaries were recruited, paid and maintained. Matthew Trundle reviews a variety of evidence, including Xenophon's detailed account of how over ten thousand Greeks tried and failed to establish the Persian prince Cyrus on his brother's Imperial throne, the fragments of a fourth century play about the first ever soldier of fortune, and inscriptions prohibiting Athenians from taking service with their neighbours. The result is a fresh look at the significance of mercenaries in ancient Greek society, economy and politics, and their part in the process that shaped the great Empire of Alexander the Great and the Hellenistic world.
This book examines the rise of religious extremism in Pakistan, particularly since 1947, and analyzes its connections to the Pakistani army's corporate interests and U.S.-Pakistan relations. It includes profiles of leading Pakistani militant groups with details of their origins, development, and capabilities. The author begins with an historical overview of the introduction of Islam to the Indian sub-continent in 712 AD, and brings the story up to the present by describing President Musharraf's handling of the war on terror. He provides a detailed account of the political developments in Pakistan since 1947 with a focus on the influence of religious and military forces. He also discusses regional politics, Pakistan's attempt to gain nuclear power status, and U.S.-Pakistan relations, and offers predictions for Pakistan's domestic and regional prospects.
This illustrated guide examines the world's top counter-terrorist forces - the SAS, the German GSG-9, the Israeli Sayeret Mat'kal and the US Delta Force. |
You may like...
Killing For Culture - From Edison to…
David Kerekes, David Slater
Paperback
R935
Discovery Miles 9 350
The Nexus Between Organized Crime and…
Letizia Paoli, Cyrille Fijnaut, …
Hardcover
R5,040
Discovery Miles 50 400
|