Your Search Results

      • GAPSK Language Promotion Council Limited

        GAPSK and YLPSK are the standardized test of Chinese language for children from 3 to 15. From the world- renowned Peking University, GAPSK and YLPSK are certified and approved by the Chinese Ministry of Education as language proficiency measuring tool for children . GAPSK, YLPSK could be conducted on site or completely online. Come join over 100,000 students who taken the tests, contact us at  info@gapsk.org.  Find out more at www.ylpsk.org

        View Rights Portal
      • Trusted Partner
        Humanities & Social Sciences
        November 2020

        Non-Western responses to terrorism

        by Michael J. Boyle

        This edited collection surveys how non-Western states have responded to the threats of domestic and international terrorism in ways consistent with and reflective of their broad historical, political, cultural and religious traditions. It presents a series of eighteen case studies of counterterrorism theory and practice in the non-Western world, including countries such as China, Japan, India, Pakistan, Egypt and Brazil. These case studies, written by country experts and drawing on original language sources, demonstrate the diversity of counter-terrorism theory and practice and illustrate how the world 'sees' and responds to terrorism is different from the way that the United States, the United Kingdom and many European governments do. This volume - the first ever comprehensive account of counter-terrorism in the non-Western world - will be of interest to students, scholars, students and policymakers responsible for developing counter-terrorism policy.

      • Trusted Partner

        ASSASSIN

        The Ultimate Thriller

        by Hugo N. Gerstl

        The ultimate thriller—with a twist. Forty-five years ago, a set of twins was separated at birth when their parents were caught in the crossfire between police and robbers. Flash forward to the present. Five billionaires plot to assassinate Iran’s Supreme Leader, the Ayatollah Khamenei, by hiring the most expensive killer in the world. Iran learns of the plot through a web of sex, lies, and betrayal, but they know they are hopelessly outclassed in counterterrorism. Only one service in the world has the wherewithal to bring down the assassin—Israel, a country Iran refuses to recognize. Nevertheless, Iran finally manages to hire Israel’s best counterterrorist. Unknown to one another, the assassin is one twin and the Israeli counterterrorist is the other. Let the chase begin!If you like a great thriller, such as The Da Vinci Code or The Day of the Jackal, you will certainly love ASSASSIN. It stands apart from other thrillers because it is truly original and goes outside the box to run circles around other books in this genre.Hugo N. Gerstl, famed American trial lawyer and bestselling author of eleven novels that have been translated worldwide, and fifteen works of nonfiction, has been involved in the American entertainment industry for years. Besides his legal career, the author has lived several lives as a musician, pilot, actor, director, and a world-traveler, and has employed them all to write this work. He resides on the Monterey Peninsula with his wife Lorraine. Published By Pangæa Publishing Group, 2019. 560 pages – 23 cm x 15 cm

      • Trusted Partner
      • Trusted Partner
        Medicine
        May 2025

        Brutal treatments

        Medicine and colonial violence at the end of empire

        by Russell T. Moul

        Brutal treatments explores the role medical doctors played in the colonial counterinsurgency campaigns in British Kenya (1952-1960) and French Algeria (1954-1962) in the final years of empire. It not only examines how these medical professionals became embroiled in the conflict, but also how they used their knowledge to further the interests of the state. The book makes a substantial and significant contribution to the history of medicine, the history of medical ethics, and the history of colonialism.

      • Trusted Partner
        Humanities & Social Sciences
        September 2020

        Bordering intimacy

        Postcolonial governance and the policing of family

        by Joe Turner

        Bordering intimacy explores the interconnected role of borders and dominant forms of family intimacy in the governance of postcolonial states. Combining a historical investigation with postcolonial, decolonial and black feminist theory, the book reveals how the border policies of the British and other European empires have been reinvented for the twenty-first century through appeals to protect and sustain 'family life' - appeals that serve to justify and obfuscate the continued organisation of racialised violence. The book examines the continuity of colonial rule in numerous areas of contemporary government, including family visa regimes, the policing of 'sham marriages', counterterror strategies, deprivation of citizenship, policing tactics and integration policy.

      • Trusted Partner
        Humanities & Social Sciences
        July 2015

        The state and ‘terrorists’ in Nepal and Northern Ireland

        The social construction of state terrorism

        by Priya Dixit

        This book compares the use of 'terrorism' by states in the Global North (Britain in Northern Ireland) and South (Nepal), examining particular events over time. As such, it questions conventional understandings that states cannot be 'terrorists' and that post '9/11' terrorism is new. It does so by outlining how states have used the label of 'terrorism' to establish a specific 'counterterrorist' identity for themselves and by indicating how similar strategies of representation were used by the British and Nepali states while labeling others as 'terrorist'. Because it draws on rhetorical analysis, discursive psychology and critical security studies to analyze the politics of labelling, it is expected this book will be useful to a wide range of readers from political science, international relations, terrorism studies and also media, cultural and area studies. ;

      • Trusted Partner
      • Trusted Partner

        ChildFinders

        by Hugo N. Gerstl

        “Melissa, silly little goat, Melissa sta—” Charles Flanders Cunningham III — a name that will rank with Hannibal Lecter as the ultimate evil genius. Charles Flanders Cunningham III — the wealthiest, most influential lawyer in the United States, perhaps the world, trusted counselor to presidents, prime ministers, and world leaders. But Cunningham has a dark side, a very dark side known only to himself and his five accomplices. Cunningham arranges to kidnap children from all over the world, none more than six years old, for a period of two weeks, after which they are returned by a wonderful, charitable organization, ChildFinders, to their despairing parents, safe, secure, and outwardly none the worse for wear … but changed. Changed by chemicals, computer implants, and mind alteration. And they do not know it — until they hear one of a thousand catchphrases. Then they turn into programmed automatons, who will do whatever the next command tells them to do. Afterward, the chip erases all memory of what they have done. By means of this undetectable “army,” Cunningham aims to control the world. Can a team led by Israeli counterterrorist Ezra Caen (Assassin, The Wrecking Crew) stop him before it is too late? In the tradition of The Manchurian Candidate and Telefon, you’d best hold on to your nerves and plan on staying up very, very late to finish this riveting thriller. And be frightened. Be very, very frightened. You never can tell if you will be the next victim … or the next killer. https://www.youtube.com/watch?v=APyyH0hZ488 Published by Pangæa Publishing Group,2020. 300 pages – 23 cm x 15 cm

      • Trusted Partner
        August 2024

        A Place Beyond the Heart

        by Irehobhude O. Iyioha

        A Place Beyond the Heart is a collection of short stories exploring issues at the intersection of war and love, terror and (dis)order, as well as identity, gender, and sexuality. The stories capture the lives of people facing personal, societal and transcultural challenges that define, transform, and ultimately create shifts in the way they see and experience the world.

      • Weapons & equipment
        November 2009

        Experimentation and Rapid Prototyping in Support of Counterterrorism

        by Committee on Experimentation and Rapid Prototyping in Support of Counterterrorism; National Research Council

        The U.S. military forces currently face a nontraditional threat from insurgents and terrorists who primarily employ improvised explosive devices, and have shown a cycle of adaptation of less than 12 months to responses by U.S. forces to counter these attacks. This constantly evolving threat requires U.S. military forces to adapt and respond more rapidly with modified tactics, technologies, and/or equipment. In response to this need for new technologies, the Rapid Reaction Technology Office (RRTO) was established in 2006 to develop technologies that can mature in 6 to 18 months for purposes of counterterrorism. Although RRTO appears to be successfully fulfilling its mission, the agency seeks to understand and address barriers to and opportunities for meeting future counterterrorism needs--including the need to accelerate the transition of technologies for counterterrorism with an eye to countering emerging and anticipated threats. This book reviews RRTO approaches and provides a set of recommendations for potential improvements to help meet these needs for rapid technology development.

      • November 2024

        What Is Counterterrorism For?

        by Leonie Jackson

        Terrorism will always be frontpage news – counterterrorism is often discussed as an afterthought, yet it is vitally important to understand what is done in the name of our safety. Since 9/11, there has been a huge ramping up of the state’s special powers in the name of security, such as indefinite detention, the assassination of suspected terrorists, the use of extraordinary rendition, torture, and changes to due process. However, these powers are often shadowy, they are rarely rolled back, and they can be counterproductive. This book focuses on understanding the costs of counterterrorism and asking how they can be reduced; global in scope, it looks not just at Western liberal democracies, but at numerous examples from across the world.

      • Computer security
        March 2003

        Information Technology for Counterterrorism

        Immediate Actions and Future Possibilities

        by John L. Hennessy, David A. Patterson, and Herbert S. Lin, Editors, Committee on the Role of Information Technology in Responding to Terrorism, National Research Council

        Information technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

      • Defence strategy, planning & research
        October 2006

        Countering Urban Terrorism in Russia and the United States

        Proceedings of a Workshop

        by Glenn E. Schweitzer and A. Chelsea Sharber, Editors, Committee on Counterterrorism, Challenges for Russia and the United States, Office for Central Europe and Eurasia, National Research Council, in cooperation with the Russian Academy of Sciences

        In January-February 2005, the National Academies Committee on Counterterrorism Challenges for Russia and the United States and the Russian Academy of Sciences Standing Committee on Counterterrorism held a workshop on urban terrorism in Washington, D.C. Prior to the workshop, three working groups convened to focus on the topics of energy systems vulnerabilities, transportation systems vulnerabilities, and cyberterrorism issues. The working groups met with local experts and first responders, prepared reports, and presented their findings at the workshop. Other workshop papers focused on various organizations’ integrated response to acts of urban terrorism, recent acts of terrorism, radiological terrorism, biological terrorism, cyberterrorism, and the roots of terrorism.

      • Computer security
        October 2008

        Protecting Individual Privacy in the Struggle Against Terrorists

        A Framework for Program Assessment

        by Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, National Research Council

        All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

      • Peace studies & conflict resolution
        September 2013

        Countering Violent Extremism

        A Peacebuilding Perspective

        by Georgia Holmer

        This report explores the nexus of counter violent extremism (CVE) and peacebuilding and is written for counterterrorism and CVE experts and peacebuilders. Underpinning this report is the assumption that a stronger bridge between practitioners from both worlds would contribute to a broader understanding and more effective practice of countering violent extremism. The U.S. Institute of Peace (USIP) supports CVE objectives by developing and implementing training and capacity building programs for civil society and police and security services in conflict and postconflict areas.

      • Peace studies & conflict resolution
        September 2015

        Ten Years in Afghanistan's Pech Valley

        by Wesley Morgan

        The al-Qaeda presence in the Pech valley is greater now than when U.S. forces arrived in 2002, and counterterrorism efforts in the region continue. This report looks at U.S. military involvement in the Pech valley and the lessons it offers both the Afghan National Security Forces and the U.S. military. It is derived from interviews with some three hundred Americans and Afghans, including general officers, unit commanders, members of parliament, district and provincial governors, Afghan interpreters, and U.S. and Afghan combat veterans.

      • Peace studies & conflict resolution
        February 2011

        Reforming Pakistan's Police and Law Enforcement Infrastructure

        Is It Too Flawed to Fix?

        by Hassan Abbas

        An effective police force is critical to countering insurgency. In Pakistan, an understaffed and underequipped police force is increasingly called on to manage rising insecurity and militant violence. This report evaluates the obstacles to upgrading the existing police system and recommends traditional and innovative reform options, including major restructuring of the total civilian law enforcement infrastructure, without which the police force cannot be effectively improved. Because Pakistan’s police capacity has direct implications for the country’s ability to tackle terrorism, the United States and its allies would realize counterterrorism dividends by helping law enforcement efforts through modern training and technical assistance.

      • Peace studies & conflict resolution
        May 2015

        Charting Pakistan's Internal Security Policy

        by Raza Rumi

        Traditionally ruled by military or quasi-military regimes, Pakistan is struggling to strengthen its democratic governance but the military remains in charge of country’s security policy. This period of incremental democratization corresponds to the unprecedented rise in terrorism and domestic insurgencies that have challenged state capacity and taken a toll on both the morale of the country and the economy. This report reviews Pakistan’s progress in devising and implementing counterterrorism policy frameworks in recent years. In highlighting key related strategic and operational issues, it offers Pakistani policymakers ways forward on how best to ensure internal stability and security, reminding us that a balance in civilian and military institutions is vital for effective policy outcomes.

      Subscribe to our

      newsletter