TERRORISM: Commentary on Security Documents Volume 106


Book Description

Volume 106 of Terrorism: Commentary on Security Documents, Terrorist Financing and Money Laundering, guides readers through the complex legal terrain of terrorist financing and money-laundering. Researchers will benefit from the diversity of this volume's selection: from U.S. agency reports on how to implement the recommendations of the 9/11 Commission to the efforts of the European Parliament in seizing assets to two perspectives on how well Saudi Arabia is combating terrorist financing within its borders: the U.S. perspective and the perspective of Saudi Arabia itself. Equally important for researchers is this volume's extensive treatment of U.N. measures on terrorist financing and money laundering. The volume concludes with the full text of the model rules for regulating terrorism-related financial transactions, as promulgated by a joint body of the U.N. and the International Monetary Fund.




Terrorism: Commentary on Security Documents Index IV


Book Description

With the publication of Terrorism: Commentary on Security Documents, Index IV, Oxford University Press continues to provide periodic stand-alone volumes containing cumulative indexes for the individual volumes in the series. Index IV (covering Terrorism Vols. 101-120) adds to the previous index volumes in order to ensure comprehensive searchability within the series. The availability of the cumulative index as well as the volume-specific indexes makes the series more convenient for the reader and provides the researcher with multiple ways to search for information. Index IV also features improved double-columned index formatting, for ease of use in a more compact volume. Although each volume in Terrorism: Commentary on Security Documents contains its own volume-specific index, this comprehensive index fully indexes the last twenty volumes in the Terrorism series. Only subject indexes are included in the individual volumes, whereas this comprehensive index includes five different types of indexes including a subject index, an index organized according to the title of the document, an index based on the name of the document's author, an index correlated to the year of the document, and a subject-by-year index. This cumulative index volume therefore provides readers with multiple ways to conduct research within Volumes 101-120 of Terrorism: Commentary on Security Documents.




Terrorist Financing and Money-laundering


Book Description

Volume 106 of Terrorism: Commentary on Security Documents, Terrorist Financing and Money Laundering, guides readers through the complex legal terrain of terrorist financing and money-laundering. Researchers will benefit from the diversity of this volume's selection: from U.S. agency reports on how to implement the recommendations of the 9/11 Commission to the efforts of the European Parliament in seizing assets to two perspectives on how well Saudi Arabia is combating terrorist financing within its borders: the U.S. perspective and the perspective of Saudi Arabia itself. Equally important for researchers is this volume's extensive treatment of U.N. measures on terrorist financing and money laundering. The volume concludes with the full text of the model rules for regulating terrorism-related financial transactions, as promulgated by a joint body of the U.N. and the International Monetary Fund.




TERRORISM: COMMENTARY ON SECURITY DOCUMENTS VOLUME 143


Book Description

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 143, The Evolution of the Islamic State, focuses on the U.S. response to the Islamic State (IS) both in Syria and Iraq from a foreign policy standpoint and a military strategy perspective, as well as considering the impact of the rise of IS on the broader global jihadist movement. Consideration is also given to the importance of information warfare in countering IS's worldwide recruiting efforts via the Internet. This volume also includes documents examining related issues of great importance, including a report considering IS's financing, a report on the legal issues arising in connection with U.S. military action against IS, the role of Shia warlords and militias in Iraq in opposing IS, and the lessons that can be learned from the support provided to IS by European fighters.




Terrorism: Commentary on Security Documents Volume 148


Book Description

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 148, Lone Wolf Terrorists, examines the phenomenon of the solitary domestic terrorist, analyzes the distinction between such terrorists and mass murderers who are not deemed to be terrorists, considers the motivations of violent extremists, and examines the dilemmas faced by law enforcement in preventing solitary political extremists with violent ideologies from translating their beliefs into actions. The volume is divided into three sections, providing an overview of the topic, an examination of strategies for prevention of such attacks, and a consideration of the Internet's role in contributing to radicalization. Documents included in this volume include a CRS report on domestic terrorism, a report examining violent radicalization from a criminal justice perspective, and a CRS report differentiating hate crimes from domestic terrorism, as well as other reports on the lone wolf terrorism phenomenon and strategies to prevent and/or counter it. The last document in the volume is a CRS report relating to the advocacy of terrorism on the Internet, especially including social media, and the ways in which law enforcement might be able to address the problem of dangerous online speech within the current U.S. legal structure.




Terrorism: Commentary on Security Documents Volume 140


Book Description

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140, The Cyber Threat considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China. The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include: Legality in Cyberspace; An Adversary View and Distinguishing Acts of War in Cyberspace; and Assessment Criteria, Policy Considerations, and Response Implications.




TERRORISM: Commentary on Security Documents Volume 108


Book Description

Volume 108 of Terrorism: Commentary on Security Documents tackles the contentious issue that appears in the volume's title: "Extraordinary Rendition". Although many commentators and publications have focused on the U.S. policy of such troubling transfers, little focus has been devoted to the reaction to this policy by the rest of the world. In this volume, new General Co-Editor Aziz Huq both presents the key documents demonstrating that reaction and comments authoritatively on what those documents mean for the future of torture-based international transfers. For ease of research, Huq has divided the volume into two sections: the first deals with U.N. and E.U. responses to the U.S. policy, including a case before the U.N. Committee Against Torture, and the second section tours the reports and cases on rendition that have arisen from national jurisdictions, specifically Italy, Sweden, the U.K., ireland, and Canada.




Terrorism: Commentary on Security Documents Index V


Book Description

Index V contains the cumulative index to the Terrorism: Commentary on Security Documents series from volume 121 to volume 140, and adds to earlier index volumes to ensure comprehensive searchability within the series. Five different index formats are included in this one comprehensive index volume, featuring indices by subject, title, name, and year.




Asian Yearbook of International Law, Volume 20 (2014)


Book Description

Launched in 1991, the Asian Yearbook of International Law is a major internationally-refereed yearbook dedicated to international legal issues as seen primarily from an Asian perspective. It is published under the auspices of the Foundation for the Development of International Law in Asia (DILA) in collaboration with DILA-Korea, the Secretariat of DILA, in South Korea. When it was launched, the Yearbook was the first publication of its kind, edited by a team of leading international law scholars from across Asia. It provides a forum for the publication of articles in the field of international law and other Asian international legal topics. The objectives of the Yearbook are two-fold. First, to promote research, study and writing in the field of international law in Asia; and second, to provide an intellectual platform for the discussion and dissemination of Asian views and practices on contemporary international legal issues. Each volume of the Yearbook contains articles and shorter notes; a section on Asian state practice; an overview of the Asian states’ participation in multilateral treaties and succinct analysis of recent international legal developments in Asia; a bibliography that provides information on books, articles, notes, and other materials dealing with international law in Asia; as well as book reviews. This publication is important for anyone working on international law and in Asian studies.




Learning From Russia's Recent Wars


Book Description

*This book is in the Rapid Communications in Conflict and Security (RCCS) Series (General Editor: Geoffrey R.H. Burn). With the consolidation of the Russian state under the rule of Vladimir Putin, Russia has begun to assert itself on the international stage to a degree that has not been seen since the end of the Soviet Union. In particular, Russia has engaged in a number of aggressive actions against its neighbors (e.g., Georgia, Ukraine) while also re-asserting its interests in Eastern Europe, the Middle East, Central Asia, and more generally in global forums. Chief among this new assertiveness is the development of non-conventional assets of propaganda, information technology, communications, space-based assets, and cyber technology. While many have discussed the rise of asymmetrical warfare, Russian foreign policy, and Russia’s post-Soviet wars, what makes this book unique is how it puts these discussions together into a cogent analysis of contemporary Russian foreign policy alongside current international relations theories. This study examines Russia’s recent wars in the Caucasus and Eastern Europe and outlines the focus of Russian assertiveness in key regions central to their security interests. Further, it elucidates the threat that Russian conventional and unconventional warfare poses to populations in Eastern Europe, Central Asia, and elsewhere. In addition, the book highlights the propensity of Russian military thinkers to see a blurring of the line between peace and war, and how Russian capabilities are being used to take advantage of this blurred line. In the book’s conclusion, prescriptions are made as to how the Western powers, and especially the United States, can attempt to blunt Russian aggression, particularly against NATO nations. Among these prescriptions is that the West must rebut the current Russian information and propaganda campaigns in Europe and elsewhere. Further, the West must recognize the increased Russian flexibility to respond to unexpected and spontaneous events in nations around the globe with the development of its information, cyber, and propaganda assets. The conclusion asserts that defense of key Western allies such as the Baltic Republics requires not only a conventional presence (such as NATO forces) but also the development and deployment of asymmetrical assets to counter the Russian capabilities. Learning from Russia’s Recent Wars is an important book for Russian studies, international relations, and foreign policy collections.