![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Intergovernmental organizations (IGOs) play a crucial role in security sector reform and governance (SSR/G). In virtually all instances of recent and current SSR program delivery, IGOs have either led the SSR effort or supported the lead provided by other actors. How this role is played is of vital importance for the prospects of fostering durable security and development in a wide range of countries. This volume looks at a selection of organizations that have been in the forefront of SSR activity or that have the potential for significantly developing their SSR agendas in the future.
Roy Snell has been in what he calls "close protection" for more than 16 years, guarding international royalty and celebrities including Madonna, Schwarzenegger, Stallone, Bruce Willis, Tom Jones, and Frank Sinatra. A former SAS sniper and heavyweight boxing champion, Roy is Britain's ultimate bodyguard. Roy was trained at the Regency College in Herefordshire, where the royal protection squad is drilled. He started out in security at showcases for the big bands of the 1980s--Duran Duran, Eurythmics, Aha, Kajagoogoo, and at a Wham! gig, he protected George Michael from a man with a baseball bat. A "Category A" bodyguard--a level that takes two years of training to reach--Roy is qualified to look after top level celebrity clients, from film stars to athletes, singers to royalty. Roy is also a skilled marksman trained in the use of the 9mm Bereta sub-machine gun and the 38 Snubnose--the standard issue weapon for the FBI.
In 2003, the President and the U.S. Congress established the Department of Homeland Security. From the beginning, its mission was clear: prevent terrorist attacks, protect against threats to America's safety and security, and prepare the nation to respond effectively to disasters, both natural and man-made. This monumental mission demands a comprehensive strategy. It also requires a crystal-clear explanation of that strategy to Americans and their allies worldwide. In a revealing new book, "Homeland Security: Assessing the First Five Years," Michael Chertoff provides that explanation. In a refreshingly candid and engaging manner, America's former homeland security secretary depicts the department's long-term approach, what it has achieved, and what it has yet to do.The strategy begins with the threats America faces, from terrorist groups like al Qaeda to hurricanes like Ike or Gustav. "Once these threats are identified," Chertoff writes, "we can confront them, using every tool at our disposal. We can stop terrorists from entering the country, and discourage people from embracing terrorism by combating its lethal ideology. We can protect our critical assets and reduce our vulnerabilities to natural disasters. We can plan and prepare for emergencies and respond in a way that minimizes the consequences. And we can work closely with our allies abroad to reduce the risk of future disasters." In each of these areas, Chertoff informs the reader what the nation has done and what it still must do to secure its future.How well has this strategy fared in a post-9/11 world? Since that fateful day, there have been no global terror attacks on American soil. Yet in the face of continued dangers, Michael Chertoff warns repeatedly against complacency. He urges America and its leaders to strengthen their resolve, stay the course, and build creatively on past successes.
"It will be very important, building on the goodwill which the Turkish military possess in society, to develop an informed security community consisting of members of parliament, academicians, journalists underpinning of security policy. I trust that this reference book will provide them with most useful support"-Dr. W. F. van Eekelen, former minister of defence, the Netherlands.
The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement.
This is a truly unique collection of 39 articles written by
authorities or based on authoritative research. It goes beyond
locks, lighting, and alarms to offer provocative viewpoints on a
variety of security topics. The book looks beyond everyday applications and routines to an
understanding of the social significance of careers in security. It
will be of interest to practitioners in all sectors as well as
students at all levels.
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
By covering the essential tips and techniques for investigators,
Investigations: 150 Things You Should Know becomes a useful
reference. By further covering the legal guidelines that
investigators must follow, it becomes indispensable. Through
anecdotes, case studies, and documented procedures the authors of
this book have amassed the most complete collection of
investigative information available.
Premises Security: A Guide for Attorneys and Security Professionals
guides the security professional through the ins and outs of
premises security liability. Premises security litigation claims
represent a serious financial threat to owners and occupiers of
property. This book provides an overview of risk assessment
techniques, identification of reasonable security measures, legal
issues and litigation strategies.
The idea of espionage has always carried a certain mystique, having
grown its roots in the political and national defense spheres.
Today, espionage must be taken seriously in the business arena as
well. Having company secrets stolen by competitors is costly and
can be lethal. Counterespionage for American Business is a how-to
manual for security professionals that teaches secret methods
counterespionage experts have been using for years to protect
business information
Goldberg (finance, U. of Miami) and White (economics, New York U.) present the results of a 1978 conference that brought together representatives from business, government, and academics. Much of the conversation revolves around the Glass- Steagall Act and attempts to remove the dividing line betwee
The U.S. Department of Homeland Security (DHS) became the nation's 15th Cabinet department in January 2003. Twenty-two agencies with different missions, operations and cultures were consolidated and realigned into one organisation with its primary mission being that of prevention, preparation for and response to catastrophes affecting our homeland, while facilitating legitimate travel and trade (Appendix C). DHS now employs over 208,000 individuals who are located in every state and many foreign countries making it the third largest cabinet agency.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
This second book of the Edwin Cole Bearss memoir begins with his first days in a 40-year career in the National Park Service. Beginning as the Park Historian at the Vicksburg National Military Park in September, 1955, the book covers his rise to Chief Historian, now Emeritus. He has always professed the importance of walking the ground to understand the outcomes of all battles, but particularly those that created, and then consecrated, the United States of America. Said to know more about Civil War battlefields than any other historian of his time, this book describes how he helped create and interpret much of our American history. He first learned the importance of "walking the ground" when in combat on the Pacific island of New Britain. There, a few inches of earth saved his life after having four Japanese bullets tear into him at what Marines would soon dub "Suicide Creek." His early years in Montana, the account of this action on New Britain, his chance meeting with the actor and fellow Montanan Gary Cooper, and his 27 months in hospitals is published in the book Walking the Ground: From Big Sky to Semper Fi also by NOVA. His Government career created National Parks and Presidential Historic Parks, including his direct relationships with President Lyndon B. Johnson and President Jimmy Carter. He created and improved many parks, and thus, made the history that Americans see and read when they experience these important American lands, battlefields and buildings. Ed Bearss has made indelible marks on the American landscape, and in so doing, defined much of the historical culture of the United States. His contribution to our understanding of American history is immense. He is the author of 140 National Park Service reports, more than any other person to work for the National Park Service.The quality and popularity of his tours and books are rare among present-day historians. He has mentored generations of younger historians who now teach American history, and continue along the path he has pioneered. He has frequently testified before Congress, was interviewed by television reporters and guided senior-level Government officials in critical events in American history. Ed Bearss became a television celebrity following his appearance to mass television audiences who watched the Ken Burns Civil War Series on PBS, leading to great demand in Bearss-led battlefield history tours. For those many U.S. history adventurers who have experienced his history tours, Ed Bearss' words and mannerisms leap from the page as we follow him walking Pickett's Charge at the Gettysburg; track John Wilkes Booth's escape route after assassinating President Abraham Lincoln; recount George Armstrong Custer's battlefield defeat by Native Americans whose families he had attacked along the Little Big Horn River; and words describing the WWI American sacrifice at Belleau Wood of U.S. Marine mythology. This book will explain Ed Bearss' unsurpassed contribution to the making of American history and the strengthening our collective culture.
Security is one of the key pillars on which a stable society is built, and which guarantees the rights of its members. One of the modern strategies -- human security -- potentiates that economy, environment, security, social conditions and law are the main attributes and functions that provide citizen's with prosperity, a sense of safety and integrity. Good socio-economic conditions, healthy environment and respect for human rights provide a state with political and democratic strength. It also allows for business to be stronger and progressive. This edition aims to provide some of the key challenges for modern societies so that scientists may explain them and give some solutions for better risk and crisis management. Scientists and researchers from different areas and universities analysed risks from areas of IT, global health, migrations, social engineering, nuclear weaponry, environmental protection, private anti-crime business and different security policies. One of the aims of this edition is to explain how important it is to recognise all different challenges, not to neglect them, but to provide them with all possible legal solutions, technical solutions and knowledge to protect people, society and state from qualitatively different risks and consequences. Through this edition, experts and researches have tried to provide actual reviews of challenges of the twenty-first century and possible solutions for their understanding, prevention and/or minimalising damages in emergency situations.
The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.
Recognising the potential harm that a large, sudden release of hazardous chemicals poses to nearby people, state and federal governments have long regulated safety practices at chemical facilities. Historically, chemical facilities have engaged in security activities on a voluntary basis. Even before the terrorist attacks of 2001, congressional policymakers expressed concern over the security vulnerabilities of these facilities. After the 2001 attacks and the decision by several states to begin regulating security at chemical facilities, Congress again considered requiring federal security regulations to mitigate these risks. This book provides an overview of the existing statutory authority and implementing regulation concerning security issues at chemical facilities, with a focus on policy options and congressional considerations.
Reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the United States, apart from the Federal Bureau of Investigation, would be beneficial. (PW); Since the September 11, 2001, attacks, critics have charged that the Federal Bureau of Investigation (FBI), while qualified to investigate terrorist incidents after the fact, is not wel equipped enough to adequately gather and a assess information to prevent attacks. Given the bureau's law enforcement and prosecutorial cultural, many believe that the burden of countering terrorism, the FBI's main focus now, in addition to the load of taking on "ordinary" crime, may be too much. To better inform debate, researchers analyzed the domestic security structures of four allied countries-the United Kingdom, France, Canada, and Australia-weighing both their positive and negative aspects.
Foreword by John B. Wilt, Colonel (Retired), U.S. Airforce ReserveToday, concerns over homeland security have led thousands of Americans to volunteer for various citizen emergency response groups, such as the Civil Air Patrol, U.S. Coast Guard Auxiliary, Community Emergency Response Teams, fire units, etc. In Citizens Defending America, Martin Greenberg focuses new attention on the subject of citizen volunteerism by chronicling the nature and purpose of volunteer police units-authorized organizations of a public or private nature that work at deterring crime and/or preventing terrorism for little or no monetary compensation-in America since 1620. A number of these historical groups responsible for maintaining the civil order of the day-slave patrols, frontier posses, vice suppression societies, the American Protective League, for example-now seem controversial when viewed through a contemporary lens. Greenberg uses the history of such groups to reflect upon the nation's past and to consider the possibilities for a safe and secure future. He also emphasizes the role of young people in the fields of security and safety, and stresses the need for more qualified, trained volunteers to help cope with man-made and natural disasters.
In this analysis of South Africa's post apartheid security system, the author moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. The author argues that, despite South Africa's manipulation of state structures and elites in the region for its own ends, the suffering endured under the apartheid regime drew the region together at the popular level and that economic factors, such as the use of migrant labor, reinforced the process of integration. Exploring how the region is changing today as transnational solidarity and a single regional economy remove the distinctions between national and international politics he asks whether 'South African domination can finally be overcome and considers what sort of cosmopolitan political arrangement will be appropriate for southern Africa in the new century.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution. |
You may like...
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, …
Hardcover
R3,332
Discovery Miles 33 320
|