Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
1989. Verden er på randen af en revolution, og journalisten Allie Burns er tilbage. Ældre og måske lidt klogere, leder hun nu nyhedsafdelingen på The Sunday Globe i Glasgow. Hun er ikke længere graverjournalist, men nyhedsredaktør og stadig skrækslagen for at ende i rendestenen sammen med de brutale britiske tabloidmedier. Og hun får travlt. Året begynder med en mindegudstjeneste for ofrene fra Lockerbie-bombningen, og Allie har knap nok leveret den historie, før hun falder over en chokerende historie om aids-patienter. Den avisverden hun opererer i er under stærk forandring, og den kolde krig præger tiden. Da et mord sker, bliver Allie tvunget til at sætte spørgsmålstegn ved flere af sine gamle overbevisninger.1989 er anden bog i en planlagt serie på fem bind om Allie Burns. Vi følger hende fra 1979 og frem gennem fem årtier, på rejsen fra ung journalist til garvet ekspert, gennem mordsager og op- og nedture i karrieren, med Storbritanniens historie som medrivende bagtæppe. Allie Burns er baseret på Val McDermids egne erfaringer som ung journalist i 1970’ernes Glasgow.
With a new preface by the author on the Gaza war An unflinching exposé of the hidden costs of American war-making written with "an immense and rare humanity" (Naomi Klein) by one of our premier political analystsEvery election cycle, candidates across the political spectrum repudiate what has become one of the most consequential and enduring components of American foreign policy: the forever war. Yet, once the ballots have been cast and the camera crews go home, the American war machine chugs along in almost complete obscurity. The journalist and political analyst Norman Solomon's War Made Invisible is a "gripping and painful study" (Noam Chomsky) of the mechanisms behind our invisible, but perpetual, national state of war. From ever-compliant journalists serving as little more than stenographers for the Pentagon to futuristic military technology, horrifying in its destructive power, that makes dropping a bomb or pulling the trigger on a drone strike more of an abstraction than a moral calculation, Solomon's "staggeringly important intervention" (Naomi Klein) exposes the profoundly human consequences at home and abroad of the bipartisan commitment to war making. In an era of increasing global instability in which it is all too easy to succumb to despair, Solomon pierces the "manufactured 'fog of war' . . . [and] casts sunlight, the best disinfectant, on the propaganda that fuels perpetual war" (Amy Goodman). Now in paperback with a new preface by the author on the Gaza war, Solomon's incisive, ever-timely analysis "provide[s] the fresh and profound clarity that our country desperately needs" (Daniel Ellsberg) now more than ever.
This book provides a contemporary overview of Boko Haram's activities. Since Boko Haram emerged in 2002, media-driven narratives as well as social scientific methodologies have been increasingly applied to draw generalisable conclusions on what goals the groups have pursued, what strategies it has used for these purposes and the counter campaign strategies authorities have pursued. But from 2009 to 2018, Boko Haram has pursued high-intensity violence: assassinations, bombing, kidnappings, beheading or threats of violence, conscriptions and territorial occupation. This makes it imperative to deepen and broaden our understanding of the groups¿ activities toward a problem-solving and policy-relevant analysis.Previously published in Security Journal Volume 33, issue 3, September 2020
This book provides an analysis of social media and women¿s resistance in Iran with relevance to similar polities. The author examines how Iranian women continue to fight against the regime¿s gender discriminatory laws and protest the government in public squares and in virtual spaces. The book presents a critical approach to technology¿s role in politics and society and an in-depth analysis of authoritarianism and its relationship to social media harms and state violence. With a particular focus on images, hashtags, and other digital content, it calls for a rethinking of the concepts of crime, culture, and control in the technosocial world. The author draws on conceptual contributions from the fields of criminology, philosophy, psychology, technology and media studies.
This book demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is that when examining the social media sphere security scholars need to ¿expect the unexpected¿. This is because social media enables users to subvert, contest and create security narratives with symbols and idioms of their choice which can take into account ¿traditional¿ security themes, but also unexpected and under explored themes such as narratives from the local context of the users¿ towns and cities, and the symbolism of football clubs. The book also explores the complex topography of social media when considering constructions of security. The highly dynamic topography of social media is neither elite dominated and hierarchical as the Copenhagen School conceptualises security speak. However, neither is it completely flat and egalitarian as suggested by the vernacular security studies¿ non-elite approach. Rather, social mediäs topography is shifting and dynamic, with individuals gaining influence in security debates in unpredictable ways. In examining social media this book engages with the emancipatory burden of critical security studies. This book argues that it remains unfulfilled on social media and rather presents a ¿thin¿ notion of discursive emancipation where social media does provide the ability for previously excluded voices to participate in security debates, even if this does not result in their direct emancipation from power hierarchies and structures offline.
Looking back at the "War on Terror" and its policies, actions, and the violence that followed, this book analyzes the resulting changes in international power structures and the relationship between citizens and their representatives. It defines our shortcomings in opposing this type of violence by demonstrating how the notion of legitimate violence has been broadened. The impact of the "War on Terror" on the public view of Liberalism is explored, as well as its effects on the role of state authorities in our lives. Thus, this book names the lessons we ought to learn from the actions taken against terrorist organizations.
Angesichts der unfassbaren Pogrome, die die Terrororganisation Hamas, beginnend mit dem 7. Oktober 2023, in Israel verübte, und angesichts der Welle des globalen Antisemitismus und der antijüdischen Gewalt, die seither über die Welt hereingebrochen ist, ist eine empirisch orientierte Analyse von Antisemitismus, Terrorismus und politischem Islam von absoluter Wichtigkeit. Die Beiträge in diesem Buch versuchen, basierend auf Meinungsumfragen, einen aktuellen und empirisch abgesicherten Beitrag über das Verhältnis von Antisemitismus, Terrorismus und politischem Islam zu präsentieren, der dem internationalen Forschungsstand entspricht. Alles deutet darauf hin, dass der Antisemitismus der sogenannten "gemäßigten Islamisten" die Verbreitung der Ideologie des brutalen Terrorismus erst ermöglicht und sogar in Mode gebracht hat.
"A groundbreaking argument on how the decades-long War on Terror changed virtually every aspect of American life, from the erosion of democracy down to what we watched on TV-by an acclaimed n+1 writer"--
This book provides a unique perspective on the perpetrators and victims of political violence, using original evidence from the deadly attacks perpetrated in Paris in 2015. Much of the current literature focuses on the perpetrators of such violence. This volume, however, offers a deeper analysis by focusing not only on the terrorists themselves but on understanding the reactions of the general population affected by such lethal acts. It provides a more detailed view of the opponents of terrorism, namely us, and explains how our own reactions can increase or decrease, the potential for political violence. Part I introduces the most relevant theories within social psychology and political psychology that are used to understand terrorism; Part II examines empirical evidence from a French context; and Part III discusses policy implications, with the prevention of political violence as a long-term goal. Finally, the volume offers a blueprint for a more appropriate conceptualization of terrorism as arising out of intergroup conflict suggesting ways to build a resilient society. This book will be of interest to researchers, teachers and students across social psychology, sociology, political psychology and political science.
Applicants for the national security workforce are required to provide detailed personal information as part of the background investigation process to adjudicate their eligibility for a security clearance. As a result, during the course of the personnel vetting process, an individual's race or ethnicity, gender, gender identity, sexual orientation, and neurodivergence may be knowable or inferred by the personnel conducting the investigations and adjudications. Human judgment and biases that manifest themselves in other employment or social contexts have the potential to contribute to bias and sources of inequity in the human element of the process of determining security clearance eligibility. The authors explore the potential for related bias or sources of inequity within the federal personnel vetting process. Such potential biases and inequities could inhibit the U.S. government's goals and abilities to hire and maintain national security personnel with diverse backgrounds and perspectives.
Partie civile du procès des attentats du 13 novembre 2015, j'ai beaucoup dessiné, et je continue encore à illustrer tout ce que j'ai vécu, vu et entendu.De mes appréhensions et mes crises d'angoisse, aux moments plein d'amour avec mes potes de galère, je suis passée par tous les états. Je vous embraque avec moi dans ma tête, dans mes réflexions et interrogations, et dans cette folle aventure judiciaire. Et vous verrez qu'en 10 mois d'audiences, on peut évoluer à tout point de vue !Je suis à la recherche de vérité, de justice, et de JUSTESSE.La réponse démocratique est la meilleure façon de traiter la barbarie.Carpe Diem !Catherine Bertrand est passionnée de dessin depuis toujours, désormais reconvertie dans le graphisme et l'illustration. Elle a réalisé seule ce livre. Catherine était au Bataclan le 13 novembre 2015 et fait partie de l'association de victimes d'attentats, Life for Paris. En tant que partie civile, elle a suivi le procès des attentats du13 novembre 2015. Désormais vice-présidente de l'Association française des victimes du terrorisme, elle transmet son expérience, auprès de victimes d'autres attentats, et auprès des lycéens de France.
This book offers a comparative perspective on the new wave of revolutions in the MENA region. Recently, a new wave of revolutions has swept the Middle East and North Africa (MENA) region, comparable in some respects to the events of the Arab Spring. Revolutionary events have significantly changed the political regimes in Sudan, Algeria and Mali, while Lebanon and Iraq have also witnessed serious revolutionary episodes. Further, a new quality of protests has manifested in Iran, Egypt, Morocco and Jordan. Presenting a variety of country studies, this book identifies similarities and differences between the events of the Arab Spring and the current upheavals in the MENA region and examines their causes and world-system context. It also analyzes the motivating forces, goals and organizational forms of the protesters and other actors involved, as well as the political and economic consequences of these revolutionary events. Moreover, it seeks to understand why some countries that were actively involved in the Arab Spring have remained largely unaffected by these developments. The book appeals to scholars of political science with a focus on comparative politics, Middle Eastern politics and political sociology.
This book examines the issues of ensuring anti-terrorist security of an aviation enterprise, provides a history of terrorism in the aviation sector, and analyzes the legal regulations. This book provides mathematical and mathematical-psychological models for reducing the risk of terrorist threats, which makes it possible to objectively increase the safety of air transport facilities, reduce the likelihood of terrorist attacks, save human lives and prevent significant material losses. The solutions of general humanistic problems proposed in the book-preventing accidents and preserving the world-are an original feature of the book, which allows one to treat it with the necessary attention and interest for the reader. The concept of anti-terrorist security of an aviation enterprise presented in this book has been widely tested and introduced into the activities of leading aviation enterprises, including the Interstate Aviation Committee (IAC), and has been used in the investigation of aviation accidents.This book is written for a wide range of audience associated with ensuring aviation transport security and for the end users of airlines-passengers, in order to expand their knowledge about the reliability of using air transport.
This book presents a snapshot of a major challenge, and shares subjective views on various areas of conflict in Africa and the diverse - theoretical and practical - efforts to achieve peace. Following an essential review of several real-world conflict contexts on the African continent and attempts to come to terms with them critically as a first step, the book explores the lessons learned to date with regard to peace studies in Africa.
Many in the Republic of Korea (ROK) are not feeling assured by the U.S. nuclear umbrella. The authors propose options for strengthening that assurance, including enhancing strategic clarity and committing U.S. nuclear weapons to support the ROK.
Senior Department of the Air Force leadership is increasingly concerned that the current readiness assessment system is not providing sufficient insight into the capability of the force to meet future mission requirements because of the shortcomings of outcome measurements. Concurrently, the U.S. Air Force is evolving its training infrastructure in response to the prospect of operations in contested and denied environments, an increased pace of warfare, and the potential loss of superiority across multiple domains in a conflict with near-peer adversaries. Advances in the technological capabilities of training infrastructure can help fill gaps in current readiness assessments to provide senior leaders with better insight into the readiness of the force for future contingencies. To understand how such investments might do so, the authors used a multimethod approach that featured interviews with senior leaders in Air Force major commands and technical experts and included reviews of readiness reporting data and technical documentation. The report identifies current readiness assessment gaps and explores ways to address them through investments in training assets. One finding was that legacy metrics tend to focus on individual units, but the force must be able to integrate well to conduct the full spectrum of possible operations against a near-peer adversary. This requires adjusting training and how readiness is measured to assess how personnel from different units function as teams at various levels.
RAND researchers assess the knowledge, tools, and capabilities needed by the U.S. Department of Defense (DoD) acquisition workforce to infuse environmental considerations into DoD requirements, acquisition, and resource allocation decisionmaking.
How Forward Air Controllers and Close Air Support fundamentally changed the American war machine in the invasions of Afghanistan and Iraq.
"Inside the Threat" offers a harrowing exploration into the world of radiological weapons, commonly referred to as "dirty bombs," and the tireless efforts of homeland security agencies to prevent their detonation on civilian soil. Merging investigative journalism with in-depth research, the book uncovers the complex dynamics of this relatively underdiscussed weapon in the arsenal of modern terrorism.Key insights include:The Anatomy of a Dirty Bomb: A comprehensive breakdown of what constitutes a dirty bomb, how it differs from a nuclear bomb, and the potential aftermath of its detonation.Origins and Evolution: Tracing the inception of the dirty bomb concept, its evolution over time, and the increasing allure it holds for various extremist groups.Supply Chains and Black Markets: A deep dive into the illicit networks that provide the materials for these devices, revealing the global intricacies of nuclear smuggling.Case Studies: Real-world instances where security agencies have intercepted attempts to assemble or deploy dirty bombs, complete with behind-the-scenes accounts of these high-stakes operations.Defensive Strategies: An exploration into the myriad techniques and tools employed by homeland security agencies worldwide to detect, prevent, and respond to potential dirty bomb threats.Psychological Warfare: Delving into the primary objective behind deploying a dirty bomb-the widespread panic and societal disruption it can cause, even if the actual physical harm is limited.Global Collaborations: How nations are coming together, sharing intelligence, and building joint counter-terrorism initiatives to address the dirty bomb menace.Future Projections: Assessing the future risks associated with dirty bombs, technological advancements in their making, and innovations in their detection and neutralization."Inside the Threat" is not just an exposition of a looming danger but also a testament to the undying spirit of defense agencies working against the clock. Through gripping narratives, detailed analysis, and interviews with experts, this book paints a chilling yet enlightening picture of a weapon that thrives on fear and the global effort to ensure it remains a threat never realized.
This book examines the reasons for which children join terrorist movements and how they eventually become peace activists fighting the very crimes that they once committed. The transformation of child terrorists into peace activists has received scant attention from academics and practitioners alike. Particular focus is placed on child jihadism, child terrorism in Africa and Latin America, child separatist terrorism, and White child supremacism. These five groups of child terrorists represent about 80% of the problem across the world. The text serves as a primer for anti-terrorism and peace activism for global social change. It includes original, applied research and features personal accounts from former child terrorists who became peace activists themselves. One of the nine chapters provides an in-depth thematic analysis of the lives of 24 subjects (from all five aforementioned groups). The analysis produced four main themes that encapsulate the time and effort that it takes to become a peace activist today: metamorphosis, terrorist behavior, disillusionment, and anti-terrorist behavior. The book ends with multiple solutions from the perspective of social work, including the reintegration of former child terrorists into society.From Child Terrorism to Peace Activism is a resource of deep and broad appeal. The text is essential reading for upper-level undergraduate and Master's students in political science, military studies, international relations, international law, and peace and conflict studies. It can be pertinent reading for students and instructors in international social work contemplating social work-related solutions to rehabilitate former child terrorists and child soldiers into society through peace activism, anti-terrorist endeavors, and other socio-psychological methods that will produce social change. The text also would appeal to faculty and students in childhood studies with an interest in child terrorism, child development, and child trauma and resilience. Given the essentials, depth, and possibilities that the book offers, it is a useful resource for audiences within counterterrorism institutes, national security agencies, and academic think-tanks. Information on motives, strategies, radicalization processes, and recruitment methods used by terrorist organizations as well as their effects on various audiences will draw readers from law enforcement agencies and institutions.
The authors developed an Army Enlistment Options Optimizer approach that creates bundles of bonus and non-bonus enlistment incentives, often paired with smaller, supplemental bonuses. If implemented, potential recruits would choose the bundle they most value from those available according to job type, term length, recruit characteristics, and recruiting environment. This gives recruits greater agency in choosing their enlistment options, potentially increasing satisfaction and enlistments. At the same time, the recruit cohorts would have the characteristics desired by the Army and the Army would benefit from cost savings resulting from reduced bonus expenditures. Through two surveys of young adults ages 18-27, the authors found that non-bonus incentives were as attractive as bonuses of $10,000-$15,000. Options that included non-bonus incentives and supplemental bonuses were chosen more often than larger stand-alone bonus options. Respondents choosing those options rated their likelihood of joining the Army in the next few years to be as high as or higher than respondents choosing stand-alone bonuses. The results also indicate that the student loan repayment option is very popular among today's young adults. It could be used to help penetrate the college market and could save recruiting resources when used in a controlled fashion as an element of the option menus. The results suggest that providing information in the recruiting marketing process on the many jobs that the Army offers and the pay and benefits of serving could increase consideration of joining the Army.
The authors examine the evolution of individual augmentation--from a stopgap to standard practice--and the effects on the Navy Reserve in terms of readiness and deployment times, specifically relating to anti-terror operations and the 2019 pandemic.
A new approach allows comparison of infrastructure projects based on their ability to improve installation resilience to climate-related hazards, supporting the Department of the Air Force's climate resilience investment decisionmaking.
Gettysburg has been one of the U.S. Army's favorite staff ride locations for decades. It was the site of perhaps the pivotal battle of the U.S. Civil War, and General George Pickett's famous but disastrous charge marked the beginning of the end for the Confederacy. The authors of this report combine a staff ride with a consideration of alternative history: They examine what happened in the crucial 1863 Battle of Gettysburg and consider what could have happened if a few key technologies that were available for military use had been used in this battle.
RAND researchers evaluated two commercial space markets to understand opportunities, challenges, and risks that the Department of the Air Force could encounter when making decisions to invest in commercial space capabilities.
This report evaluates the potential for further escalation in the war in Ukraine, including possible escalation to Russian nuclear use, to better inform U.S. and allied decisions and the public debate.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.