China's War on Terrorism: Counter-Insurgency, Politics and by Martin I. Wayne

By Martin I. Wayne

China’s battle on terror is between its so much favourite and least understood of campaigns. With hyperlinks to the worldwide jihad, an indigenous insurgency threatens the government’s grip on a huge zone of north- western China often called Xinjiang. Riots, bombings, ambushes, and assassinations have rocked the quarter below separatist and Islamist banners. China acted early and forcefully, and even though brutal, their efforts signify one of many few successes within the international fight opposed to Islamist terrorism.

The effectiveness of this crusade has raised questions concerning even if China surely confronts a terrorist danger. during this ebook, in accordance with broad fieldwork, Martin Wayne investigates China’s counterinsurgency attempt, highlighting the luck of an method targeted on reshaping neighborhood society and executive associations. whilst, he increases the query of what the U.S. are able to research from China’s method, and argues that as very important a case as Xinjiang has to be totally tested to ensure that terrorism to be defeated.

This ebook may be of curiosity to scholars of China, Asian politics, terrorism and safeguard stories in general.

Show description

Read Online or Download China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies) PDF

Best terrorism books

See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism

In his explosive long island occasions bestseller, best CIA operative Robert Baer paints a chilling photograph of ways terrorism works at the within and offers startling facts of the way Washington politics sabotaged the CIA’s efforts to root out the world’s deadliest terrorists, bearing in mind the increase of Osama bin weighted down and Al Qaeda and the ongoing entrenchment of Saddam Hussein in Iraq.

The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk

Scientists with very little historical past in defense and safeguard pros with very little historical past in technological know-how and expertise frequently have hassle speaking as a way to enforce the simplest counterterrorism suggestions. The technological know-how and know-how of Counterterrorism bargains the required theoretical origin to handle real-world terrorism eventualities, successfully bridging the distance.

The Day Wall Street Exploded: A Story of America in its First Age of Terror

Within the Day Wall road Exploded, Beverly Gage tells the tale of a as soon as notorious yet now principally forgotten terrorist assault. in response to millions of pages of Bureau of research reviews, this historic detective saga lines the four-year hunt for the perpetrators, a global attempt that unfold so far as Italy and the recent Soviet country.

Social Movements and Their Technologies: Wiring Social Change

Now in paperback for the 1st time, Social pursuits and their applied sciences explores the interaction among social activities and their 'liberated technologies'. It analyzes the increase of low-power radio stations and radical web tasks ('emancipatory communique practices') as a political topic, targeting the sociological and cultural tactics at play.

Extra info for China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies)

Example text

Because of extreme political sensitivities and sources’ requests for confidentiality I am able to provide little information as to the identity of sources within China and Xinjiang. However, I hope the reader can gauge my ability to vet human sources through noting the methodical care with which I have chosen materials from open sources. Understandably, some readers may wish for sources to be described in greater detail; the realities of scholarship on this subject make protecting sources’ identities a paramount responsibility.

Sometimes the connection to the global jihad was familial. Often through a local mosque these groups of alienated individuals collected, bonds of friendship forming strong. 18 Attacks against Kobar Towers in Saudi Arabia, the American embassies in Kenya and Tanzania, and the USS Cole in Yemen were preludes to the destruction of 9/11. These attacks were perpetrated by terrorists connected in a network with a group, much like a corporate board, directing its actions. g. 19 Terrorist attacks spectacularly showed that a war of “resistance” was being waged against a world perceived to be hostile to Islam, just as local insurgencies struck back against “encroaching” or infidel regimes.

Tomes asserts that there are “three simple principles”: Separate the guerrilla from the population that supports him; occupy the zones that the guerrillas previously operated from, making them dangerous for him and turning the people against the guerrilla movement; and coordinate actions over a wide area and for a long enough time that the guerrilla is denied access to the population centers that could support him. 26 Here Tomes moves considerably along the tactical spectrum toward a bottom-up approach, beginning with isolation of the insurgents from the population but engaging the idea that the civilian population must turn against the guerrilla movement.

Download PDF sample

Rated 4.59 of 5 – based on 37 votes