![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
Against the backdrop of the ongoing Rohingya crisis, this book takes a close and detailed look at the rise of militant Buddhism in Sri Lanka, Burma and Thailand, and especially at the issues of 'why' and 'how' around it. We are well aware of Christian fundamentalism, militant Judaism and Islamist Salafism-Jihadism. Extremist and violent Buddhism however features only rarely in book-length studies on religion and political violence. Somehow, the very idea of Buddhist monks as the archetypical 'world renouncers' exhorting frenzied mobs to commit acts of violence against perceived 'enemies of the religion' seems to be outright ludicrous. Recent events in Myanmar/Burma, but also in Thailand and Sri Lanka, however indicate that a militant strand of Theravada Buddhism is on the rise. How can this rise be explained, and what role do monks play in that regard? These are the two broad questions that this book explores.
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China Sea); piratical groups and their capabilities; case studies on overlaps between piracy, terrorism, and organized crime; legal and policy hurdles to combating piracy; tactical recommendations for combating piracy; and new trends and developments in the area. The counter response to maritime terrorism has been slow in coming, hampered by issues rooted in sovereignty, the laws of the sea, and the inherent challenges of international coordination. Yet given the likelihood that threats posed by piracy will not recede, but rather increase, all actors affected by maritime security will, sooner or later, need to address these challenges.
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China Sea); piratical groups and their capabilities; case studies on overlaps between piracy, terrorism, and organized crime; legal and policy hurdles to combating piracy; tactical recommendations for combating piracy; and new trends and developments in the area. The counter response to maritime terrorism has been slow in coming, hampered by issues rooted in sovereignty, the laws of the sea, and the inherent challenges of international coordination. Yet given the likelihood that threats posed by piracy will not recede, but rather increase, all actors affected by maritime security will, sooner or later, need to address these challenges.
A global account of pirates and their modus operandi, from the Middle Ages to the present day  In the twenty-first century piracy has regained a central place in Western culture, thanks to a surprising combination of Johnny Depp and the Pirates of the Caribbean franchise as well as the dramatic rise of modern-day piracy around Somalia and the Horn of Africa.  In this global history of the phenomenon, maritime terrorism and piracy expert Peter Lehr casts fresh light on pirates. Ranging from the Vikings and Wako pirates in the Middle Ages to modern-day Somali pirates, Lehr delves deep into what motivates pirates and how they operate. He also illuminates the state’s role in the development of piracy throughout history: from privateers sanctioned by Queen Elizabeth to pirates operating off the coast of Africa taking the law into their own hands. After exploring the structural failures which create fertile ground for pirate activities, Lehr evaluates the success of counterpiracy efforts—and the reasons behind their failures.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
|
You may like...
Numerical Structural Analysis - Methods…
Anatoly Perelmuter, Vladimir Slivker
Hardcover
R5,425
Discovery Miles 54 250
Advanced Concrete Technology 4 - Testing…
John Newman, B.S. Choo
Hardcover
R2,590
Discovery Miles 25 900
Single Piles and Pile Groups Under…
Lymon C. Reese, William F Van Impe
Hardcover
R3,974
Discovery Miles 39 740
Qualification of Inspection Procedures
E. Borloo, P. Lemaitre
Hardcover
R7,930
Discovery Miles 79 300
|