Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 16 of 16 matches in All Departments
This book identifies the procedures and capabilities that the U.S. Department of Defense, other agencies of the U.S. government, U.S. allies and partners, and international organizations require in order to support the transition from counterinsurgency, when the military takes primary responsibility for security and economic operations, to stability and reconstruction, when police and civilian government agencies take the lead.
Multinational corporations can be significant actors in zones of violent conflict. Corporate actions to shape their environment can sometimes mitigate conflict, but as the authors show in their case studies, corporate activities can help generate and sustain violence.
Building on prior RAND research analyzing the motives, drivers, and capabilities of the principal extremist groups operating in the Philippines, southern Thailand, and Indonesia, this study examined the historical roots of militancy in these countries, the development and perpetuation of extremist ideological frameworks, and national and international government response efforts.
Current unrest in the Malay-Muslim provinces of southern Thailand has captured growing national, regional, and international attention due to the heightened tempo and scale of rebel attacks, the increasingly jihadist undertone that has come to characterize insurgent actions, and the central government's often brutal handling of the situation on the ground. This paper assesses the current situation and its probable direction. This paper assesses the current situation and its probable direction.
The vast size and highly unregulated nature of the world's
waterways have
Terrorist groups - both inside and outside the al Qaeda network - sometimes form mutually beneficial partnerships to exchange "best practices." Operation Enduring Freedom and the global war on terrorism forced many members of al Qaeda to disperse, while like-minded terrorist groups have formed regional alliances and other terrorist groups that are not linked ideologically have formed mutually beneficial partnerships. Understanding these interactions is essential to ongoing and future efforts to counter terrorist threats. This volume examines how eleven terrorist groups in three distinct areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge. The authors chose case studies in regions where terrorist groups are highly capable, thus the technologies and exchange processes are weighed toward success and should be of significant concern to the U.S. national security community. The authors examine a variety of technologies and exchange processes, ranging from remote-detonation devises to converted field ordnance to katyusha rockets. The authors' conclusions relate to improving threat assessments, disrupting innovation processes, and affecting terrorist groups' cost-benefit analyses. This volume should be of interest to homeland security policymakers, the national security community, as well as academics, students, and professionals in counterterrorism, homeland security, and organizational learning.
The threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. Technology systems, meanwhile, play a key role within a larger, integrated homeland security strategy to target groups' efforts and protect the public from terrorist violence. technology systems designed to protect the public, actively seek ways to evade or counteract these systems. This volume examines a variety of terrorist groups - including Palestinian terrorist groups, Jemaah Islamiya and affiliated groups, the Liberation Tigers of Tamil Eelam, and the Provisional Irish Republican Army - to understand terrorists' countertechnology efforts. Fully exploring adversaries' countertechnology behaviors can expose vulnerabilities in U.S. defenses and help the nation make the best choices to protect it from the threat of terrorism. technologies as well as planning the technological components of homeland security efforts.
Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities Better ways are needed to understand how terrorist groups become more effective and dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better measures for combating terrorism. This study analyzes current understanding of group learning and the factors that influence it and outlines a framework that should be useful in present analytical efforts and for identifying areas requiring further study.
Case studies of the organizational learning activities of five major terrorist groups and a methodology for ascertaining what and why they learned Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better measures for combating terrorism. This study analyzes current understanding of group learning and the factors that influence it. It presents detailed case studies of learning in five terrorist organizations and develops a methodology for ascertaining what and why groups have learned, providing insights into their learning processes.
Momentous events since September 11, 2001 - the 9/11 terrorist attacks, Operation Enduring Freedom, the global war on terrorism, and the recent war in Iraq - have dramatically altered the political environment of the Muslim world, its attitudes and relations toward the West, and vice versa. Many dynamic forces influencing this environment, however, are the products of trends that have been at work for many decades. This new book examines the major dynamics driving changes in the religio-political landscape of the Muslim world - a vast and diverse region that stretches from Western Africa through the Middle East to the Southern Philippines and includes Muslim communities and diasporas throughout the world - as well as the implications of these trends for global security and Western interests. The world's Muslims encompass a broad religious universe and differ in their political and social orientation. This volume first presents a typology of ideological tendencies in the different regions of the Muslim world, along a spectrum of views toward democracy and violence. Second, it identifies the factors that produce religious extremism and violence. Third, it assesses key cleavages and f
Reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the United States, apart from the Federal Bureau of Investigation, would be beneficial. (PW); Since the September 11, 2001, attacks, critics have charged that the Federal Bureau of Investigation (FBI), while qualified to investigate terrorist incidents after the fact, is not wel equipped enough to adequately gather and a assess information to prevent attacks. Given the bureau's law enforcement and prosecutorial cultural, many believe that the burden of countering terrorism, the FBI's main focus now, in addition to the load of taking on "ordinary" crime, may be too much. To better inform debate, researchers analyzed the domestic security structures of four allied countries-the United Kingdom, France, Canada, and Australia-weighing both their positive and negative aspects.
Assesses the vulnerabilities of the agricultural sector and the food chain to a deliberate act of biological terrorism and explores the likely outcomes of a successful attack. Over the past decade, the United States has endeavoured to increase its ability to detect, prevent and respond to terrorist threats and incidents. The agriculture sector and the food industry in general, however, have received comparatively little attention with respect to protection against terrorist incidents. This study aims to expand the current debate on domestic homeland security by assessing the vulnerabilities of the agricultural sector and the food chain to a deliberate act of biological terrorism and exploring the likely outcomes of a successful attack.
It is generally agreed within Hebrew Bible scholarship that Zechariah 9-14 is filled with allusions to other books within the Hebrew canon. Rex Mason's doctoral dissertation in the early 1970s contributed significantly to the foundation of this consensus. However, although Mason's thesis remains a seminal work for those studying Deutero-Zechariah, it has never been published. This volume contains a publication of that work together with reflections from leading biblical scholars who have published on Zechariah 9-14. The volume is rounded off with a response by Mason to these scholars and a reflection on his own contribution. In some ways this project is a replication of the social process that gave rise to Zechariah 9-14, as the multiple authors bring out of this treasure that which is new and that which is old.
This title examines the social and economic development policies enacted by Israel, the Philippines, and the United Kingdom to inhibit a resurgence of terrorism within their jurisdictions, with the aim of informing U.S. decision makers as they develop policy to counter terrorism.
Outside supporters, including state and non-state sponsors, of insurgent movements offer various forms of assistance to insurgents based on a wide range of motivations. The most useful forms of outside support for an insurgent movement include safe havens, financial support, political backing, and direct military assistance. Because states are able to provide all of these types of assistance, their support has had a profound impact on the effectiveness of many rebel movements since the end of the Cold War. However, state support is no longer the only, or indeed necessarily the most important, game in town. Diasporas have played a particularly important role in sustaining several strong insurgencies. More rarely, refugees, guerrilla groups, or other types of non-state supporters play a significant role in creating or sustaining an insurgency, offering fighters, training, or other forms of assistance. This report assesses post-Cold War trends in external support for insurgent movements. It describes the frequency that states, diasporas, refugees, and other non-state actors back guerrilla movements. It also assesses the motivations of these actors and which types of support matter most. This book concludes by assessing the implications for analysts of insurgent movements.
U.S. policy toward Colombia has been driven to a large extent by counter-narcotics considerations, but the evolving situation in that South American country confronts the United States with as much of a national security as a drug policy problem.
|
You may like...
Clare - The Killing Of A Gentle Activist
Christopher Clark
Paperback
|