You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the "Facebook" revolutions in the Arab world to the use of social networking in the aftermath of disasters in Japan and Haiti, to the spread of mobile telephony throughout the developing world: all of these developments are part of how information and communication technologies are altering global affairs. With the rise of the social web and applications like Facebook, YouTube and Twitter, scholars and practitioners of international affairs are adapting to this new information space across a wide scale of issue areas. In conflict resolution, dialogues and communication are taking the form of open social networks, while in the legal realm, where cyberspace is largely lawless space, state...
This writing examines the structures and procedures of illicit businesses: the narcotics trade, arms smuggling, and human trafficking, and discuss their operations within a legal and financial context. Subsequent sections explore the thread that ties all of these enterprises together: money laundering (ML). It looks at practices money launderers use to mask illegal income; and then describes the anti-money laundering (AML) and countering of terrorist financing (CTF)-oriented legal mechanisms that are used to combat them, with an emphasis on UK and US law. The final section considers the status of the techniques used to counter the flow of illegal money, and makes recommendations for their improvement.
2011 Winner of the Selection for Professional Reading List of the U.S. Marine Corps The end of the Cold War was supposed to bring a “peace dividend” and the opportunity to redirect military policy in the United States. Instead, according to Daniel Wirls, American politics following the Cold War produced dysfunctional defense policies that were exacerbated by the war on terror. Wirls’s critical historical narrative of the politics of defense in the United States during this “decade of neglect” and the military buildup in Afghanistan and Iraq explains how and why the U.S. military has become bloated and aimless and what this means for long-term security. Examining the recent history ...
Explores how security communities think about time and how this shapes the politics of security in the information age.
This book examines the dynamics of terrorist financing, including a discussion about the importance of money from both the terrorist and the counter-terrorist perspective. Targeting Terrorist Financing argues that it is not the institutions that have failed the war on terrorist financing; rather it is the states that have failed the institutions. The measures contemplated by the world community to interdict terrorists and their financial infrastructures are sufficient to debilitate the terrorists both militarily and financially. However, what has been increasingly lacking is political will among the states, and this has overwhelmed the spirit of cooperation in this very critical front agains...
Examines the rise of East Asia as one of the world's economic power centres from three temporal perspectives: 500 years, 150 years and 50 years, each denoting an epoch in regional and world history and providing a vantage point against which to
This book addresses the inadequacies of just war theory and international law regarding civilian rights, developing new principles of individual restorative justice.
Publisher description.
Marking the 50th anniversary of UN sanctions, this work examines the evolution of sanctions from a primary instrument of economic warfare to a tool of prevention and protection against global conflicts and human rights abuses. The rise of sanctions as a versatile and frequently used tool to confront the challenges of armed conflicts, terrorism, the proliferation of weapons of mass destruction and violations of international humanitarian and human rights law, is rooted in centuries of trial and error of coercive diplomacy. The authors examine the history of UN sanctions and their potential for confronting emerging and future threats, including: cyberterrorism and information warfare, environm...