![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
How has India's foreign policy evolved in the seventy years since Independence? For that matter, what is the country's foreign policy? And what are the aspects that determine and shape it? If you've had questions such as these, Rajendra Abhyankar's Indian Diplomacy is the foreign policy primer you've been looking for. Charting the country's interactions with other countries from the early days of independence to now, Indian Diplomacy reviews the changes in stance. Lucidly written and well argued, the book covers these and other questions comprehensively, without fuss or bombast. A much-needed book in light of the sweeping changes on the global stage-and India's increasing role in them.
In 1960, President Kennedy warned of a dangerous future, rife with nuclear-armed states and a widespread penchant for conflict by the end of the century. Thankfully, his prediction failed to pass; in fact, roughly three times as many countries have since opted to give up their nuclear pursuit or relinquish existing weapons than have maintained their arsenals. Nevertheless, clandestine acquisition of nuclear materials and technology by states such as Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed the need for United States' commitment to pursuing aggressive counterproliferation strategies, particularly with rogue states. This book looks at the experiences of countries that ventured down the path of nuclear proliferation but were stopped short, and examines how the international community bargains with proliferators to encourage nuclear reversal. It asks why so many states have relented to pressure to abandon their nuclear weapons programs, and which counterproliferation policies have been successful. Rupal N. Mehta argues that the international community can persuade countries to reverse their weapons programs with rewards and sanctions especially when the threat to use military force remains "on the table". Specifically, nuclear reversal is most likely when states are threatened with sanctions and offered face-saving rewards that help them withstand domestic political opposition. Historically, the United States has relied on a variety of policy levers-including economic and civilian nuclear assistance and, sometimes, security guarantees, as well as economic sanctions-to achieve nuclear reversal. Underlying these negotiations is the possibility of military intervention, which incentivizes states to accept the agreement (often spearheaded by the United States) and end their nuclear pursuit. The book draws on interviews with current and former policymakers, as well as in-depth case studies of India, Iran, and North Korea, to provide policy recommendations on how best to manage nuclear proliferation challenges from rogue states. It also outlines the proliferation horizon, or the set of state and non-state actors that are likely to have interest in acquiring nuclear technology for civilian, military, or unknown purposes. The book concludes with implications and recommendations for U.S. and global nuclear counterproliferation policy.
This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- .
All democracies have had to contend with the challenge of tolerating hidden spy services within otherwise relatively transparent governments. Democracies pride themselves on privacy and liberty, but intelligence organizations have secret budgets, gather information surreptitiously around the world, and plan covert action against foreign regimes. Sometimes, they have even targeted the very citizens they were established to protect, as with the COINTELPRO operations in the 1960s and 1970s, carried out by the Federal Bureau of Investigation (FBI) against civil rights and antiwar activists. In this sense, democracy and intelligence have always been a poor match. Yet Americans live in an uncertain and threatening world filled with nuclear warheads, chemical and biological weapons, and terrorists intent on destruction. Without an intelligence apparatus scanning the globe to alert the United States to these threats, the planet would be an even more perilous place. In Spy Watching, Loch K. Johnson explores the United States' travails in its efforts to maintain effective accountability over its spy services. Johnson explores the work of the famous Church Committee, a Senate panel that investigated America's espionage organizations in 1975 and established new protocol for supervising the Central Intelligence Agency (CIA) and the nation's other sixteen secret services. Johnson explores why partisanship has crept into once-neutral intelligence operations, the effect of the 9/11 attacks on the expansion of spying, and the controversies related to CIA rendition and torture programs. He also discusses both the Edward Snowden case and the ongoing investigations into the Russian hack of the 2016 US election. Above all, Spy Watching seeks to find a sensible balance between the twin imperatives in a democracy of liberty and security. Johnson draws on scores of interviews with Directors of Central Intelligence and others in America's secret agencies, making this a uniquely authoritative account.
Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.
Maritime security is one of the latest additions to the field of international as well as national security. The concept has received growing attention especially due to the intensification of concerns over maritime terrorism since 2000. The rise of modern piracy, maritime crimes such as human trafficking, and the increasing importance of the 'blue economy' and issues relating to freedom of navigation, maritime environmental protection, and resource management have resulted in the increased significance of maritime security studies. A significant number of states and other international actors such as Multinational Corporations (MNCs) and Transnational Corporations (TNCs) have placed maritime security high in their security agenda. This priority is reflected in several governmental and intergovernmental strategies for maritime security. In addition to that, the regional grouping in the Indian Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS have placed maritime security issues high in their agenda.
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author's work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.
Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors. The material included in the newest version covers all the subjects essential to the training of protection officers. This valuable resource and its predecessors have been utilized worldwide by the International Foundation for Protection Officers since 1988, as the core curriculum for the Certified Protection Officer (CPO) Program. The Professional Protection Officer: Practical Security Strategies and Emerging Trends provides critical updates and fresh guidance, as well as diagrams and illustrations; all have been tailored to the training and certification needs of today's protection professionals.
No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong
Now, for the first time, Robert K. DeArment has told the full story of George Scarborough's life, illuminating his activity as a lawman during the final part of the nineteenth century and his controversial killings while wearing the badge-he was tried for murder on three occasions and acquitted each time.
The Coast Guard, within the Department of Homeland Security (DHS), is charged with preventing loss of life, injury, and property damage in the maritime environment through its SAR mission. It maintains over 200 stations with various assets, such as boats and helicopters (depending on the station), along U.S. coasts and inland waterways to carry out this mission, as well as its other missions such as maritime security. Chapter 1 will review: the status of the Coast Guard's recapitalisation program; new technologies that could assist the Coast Guard; maintenance requirements of its ageing vessels; operating costs for the new vessels; and shoreside infrastructure needs and priorities. The Coast Guard's missions in the Arctic include: defense readiness, ice operations, marine environmental protection, and ports, waterways and coastal security. Chapter 2 discusses the Coast Guard's Arctic capabilities. Chapter 3 addresses the extent to which the Coast Guard has (1) a sound process for analysing the need for its boat stations and (2) taken actions to implement its boat station process results.
The Thai military's Internal Security Operations Command (ISOC) was in charge of a wide range of civil affairs projects during the country's struggle with the communist insurgency between the mid-1960s and the mid-1980s. These projects - including rural development programmes, mass organizations and mobilization campaigns, and psychological operations - provided justification for the military to routinely penetrate the socio-political sphere. Since the Cold War drew to a close, little attention has been paid to ISOC's role and power within the state apparatus. Since the coups of September 2006 and May 2014 that toppled the elected governments, ISOC has been dangerously empowered and increasingly employed by the military regimes to dictate the country's political direction. The power of the Thai military is exerted not only through its use of force but also by means of its socio-political arms. ISOC represents a potent tool with which conservative elites can undermine and control electoral democracy and through which the military can maintain its power.
Following terrorist attacks against the U.S. embassy in Beirut, Lebanon, in 1983, the U.S. Department of State began an embassy construction program -- known as the Inman program -- to protect U.S. personnel. However, the U.S. Department of State completed only 24 of the 57 planned construction projects, in part due to poor planning, systemic weaknesses in program management, difficulties acquiring sites, schedule delays, cost increases, and subsequent funding limitations. Following the demise of the Inman program in the early 1990s, very few new construction projects were initiated until after the two 1998 embassy bombings in Africa. Following those attacks, the Secure Embassy Construction and Counterterrorism Act of 1999 required the U.S. Department of State to maintain a list of diplomatic facilities to be scheduled for replacement based on their vulnerability to attack. The U.S. Department of State determined that diplomatic facilities at over 180 posts -- more than half of U.S. overseas missions -- needed to be replaced to meet security standards. By 2016, over 30,000 staff were moved into more secure facilities. From October 2012 to September 2016, State evacuated overseas post staff and family members from 23 overseas posts in response to various threats, such as terrorism, civil unrest, and natural disasters. Overseas posts undergoing evacuations generally experience authorised departure or ordered departure of specific post staff or family members, potentially leading to suspended operations. On 29 September 2017 the U.S. Department of State ordered the departure of nonemergency personnel assigned to the U.S. Embassy in Havana, Cuba, as well as their families, in order to minimise the risk of their exposure to harm because of a series of unexplained injuries suffered by embassy personnel since November 2016.
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.
U.S. Northern Command (NORTHCOM) and U.S. Pacific Command (PACOM) are updating their existing civil support plans to include a complex catastrophe scenario, as directed by the Secretary of Defense and the Joint Staff. However, the commands are delaying the identification of capabilities that could be provided to execute the plans until the Federal Emergency Management Agency (FEMA), the lead federal response agency, completes its regional planning efforts in 2018. This book assesses the extent to which DOD has planned for and identified capabilities to respond to complex catastrophes; and established a command and control construct for complex catastrophes and other multistate incidents. It also establishes Department of Defense (DoD) priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president's National Security Strategy and the 2012 Defense Strategic Guidance.
The Department of Homeland Security's (DHS) mission includes law enforcement elements, which require the department, through its components, to manage various types of firearms. DHS's annual ammunition purchases have declined since fiscal year 2009 and are comparable in number to the Department of Justice's (DOJ) ammunition purchases. In fiscal year 2013, DHS purchased 84 million rounds of ammunition, which is less than DHS's ammunition purchases over the past 5 fiscal years. DHS component officials said the decline in ammunition purchases in fiscal year 2013 was primarily a result of budget constraints, which meant reducing the number of training classes, and drawing on their ammunition inventories. This book addresses trends in DHS's ammunition purchases since fiscal year 2008, how DHS's purchases compare with DOJ's, and what factors affect DHS's purchase decisions.
According to Homeland Security Presidential Directive 10 (HSPD-10): Biodefense for the 21st Century, a national bioawareness capability providing early warning, detection, or recognition of a biological weapon attack is an essential component of biodefense. To contribute to this national capability, the Department of Homeland Security (DHS) operates the BioWatch program, which uses routine laboratory testing designed to detect an aerosolised biological attack for five specific biological agents considered high risk for use as biological weapons. The BioWatch program is a federally-managed, locally operated system with collectors deployed primarily in outdoor locations in more than 30 major metropolitan areas. This book provides an overview of the BioWatch Generation-3 Acquisition program with a focus on meeting mission needs for effective biosurveillance.
The deaths of Ambassador Christopher Stevens and three other U.S. personnel in Benghazi, Libya, on 11 September 2012, along with attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, have drawn renewed attention to the challenges facing U.S. diplomats abroad, as well as to the difficulty in balancing concerns for their security against the outreach required of their mission. Congress plays a key role in shaping the response to these challenges, such as by providing resources for diplomatic security and examining security breaches overseas. The inability to provide perfect security, especially against the evident threat of mob violence, has focused particular scrutiny on the deployment of diplomatic personnel in high-threat environments. This book provides background information on the authorities, regulations, and procedures in place at the Department of State regarding diplomatic security with additional discussion on embassy security funding trends.
This book provides background information and potential oversight issues for Congress on the Coast Guard's programs for procuring eight National Security Cutters, 25 Offshore Patrol Cutters, and 58 Fast Response Cutters. These 91 planned cutters are intended as replacements for 90 ageing Coast Guard cutters and patrol craft. Additionally discussed is the sustainment and modernization of the Coast Guard's polar icebreaker fleet, which performs a variety of missions supporting U.S. interests in polar regions. The issue for Congress is whether to approve, reject, or modify Coast Guard funding and modernization requests and acquisition strategies. Congressional decisions could affect the Coast Guard's capabilities and funding requirements, the performance of polar missions and the U.S. shipbuilding industrial base.
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
The gradual retreat of polar sea ice in the Arctic region, combined with an expected increase in human activity - shipping traffic, oil and gas exploration, and tourism - could eventually increase the need for a U.S. military and homeland security presence in the Arctic. In recognition of increasing strategic interest in the Arctic, the United States has developed national level policies that guide the actions of the Department of Defense (DOD), the U.S. Coast Guard, and other stakeholders in the region. This book provides an overview of the policies that indicate that the United States has an enduring interest in working collaboratively with other nations to address the emerging challenges arising from the impacts of climate change and globalization in the Arctic. Also discussed, are Arctic national security needs including protecting the environment, managing resources, and supporting scientific research. |
![]() ![]() You may like...
Teaching English, Language and Literacy
Dominic Wyse, Helen Bradford, …
Paperback
R340
Discovery Miles 3 400
American Sign Language Made Easy for…
Travis Belmontes-Merrell
Paperback
Narrative of a Voyage to the South Seas…
Charles Medyett Goodridge
Paperback
R572
Discovery Miles 5 720
|