|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Privatising Justice takes a broad historical view of the role of
the private sector in the British state, from private policing and
mercenaries in the eighteenth century to the modern rise of the
private security industry in armed conflict, policing and the penal
system. The development of the welfare state is seen as central to
the decline of what the authors call 'old privatisation'. Its
succession by neoliberalism has created the ground for the
resurgence of the private sector. The growth of private military,
policing and penal systems is located within the broader global
changes brought about by neoliberalism and the dystopian future
that it portends. The book is a powerful petition for the reversal
of the increasing privatisation of the state and the neoliberalism
that underlies it.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance.
In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses.
This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
Investigations: 150 Things You Should Know, Second Edition,
explores the essential tips and techniques for security
investigations, providing a useful reference for those at any stage
of their security career. This practical guide covers the legal
guidelines that all investigators must follow. Through anecdotes,
case studies and documented procedures, the authors present the
most complete collection of investigative information available.
Readers in the security and law enforcement fields will find this
book easy to use and understand when seeking explanations about a
wide variety of investigative topics, including constitutional law,
documentary evidence, surveillance equipment, interviewing,
interrogating and reporting.
The Five Technological Forces Disrupting Security: How Cloud,
Social, Mobile, Big Data and IoT are Transforming Physical Security
in the Digital Age explores the major technological forces
currently driving digital disruption in the security industry, and
what they foretell for the future. The book provides a high-level
perspective on how the industry is changing as a whole, as well as
practical guidance on how to incorporate these new technologies to
create better security solutions. It also examines key questions on
how these new technologies have lowered barriers for new entrants
in the field and how they are likely to change market dynamics and
affect customer choices. Set in the context of one of the early
dot.com companies to enter physical security, the narrative is
written for professionals from Chief Security Officers and systems
integrators to product managers and investors.
The Thai military's Internal Security Operations Command (ISOC) was
in charge of a wide range of civil affairs projects during the
country's struggle with the communist insurgency between the
mid-1960s and the mid-1980s. These projects - including rural
development programmes, mass organizations and mobilization
campaigns, and psychological operations - provided justification
for the military to routinely penetrate the socio-political sphere.
Since the Cold War drew to a close, little attention has been paid
to ISOC's role and power within the state apparatus. Since the
coups of September 2006 and May 2014 that toppled the elected
governments, ISOC has been dangerously empowered and increasingly
employed by the military regimes to dictate the country's political
direction. The power of the Thai military is exerted not only
through its use of force but also by means of its socio-political
arms. ISOC represents a potent tool with which conservative elites
can undermine and control electoral democracy and through which the
military can maintain its power.
Security Operations Center Guidebook: A Practical Guide for a
Successful SOC provides everything security professionals need to
create and operate a world-class Security Operations Center. It
starts by helping professionals build a successful business case
using financial, operational, and regulatory requirements to
support the creation and operation of an SOC. It then delves into
the policies and procedures necessary to run an effective SOC and
explains how to gather the necessary metrics to persuade upper
management that a company's SOC is providing value. This
comprehensive text also covers more advanced topics, such as the
most common Underwriter Laboratory (UL) listings that can be
acquired, how and why they can help a company, and what additional
activities and services an SOC can provide to maximize value to a
company.
Between 1994-2014, Israel's security service was transformed,
becoming one of the most extreme examples of privatised security in
the world. This book is an investigation into this period and the
conditions that created 'Occupation Inc.': the institution of a
private military-security-industrial complex. State sponsored
violence is increasing as a result of this securitisation, but why
is it necessary, and what are its implications? In this book, Shir
Hever considers the impact of the ongoing Palestinian resistance to
Israeli occupation, the influence of U.S. military aid and the rise
of neoliberalism in Israel, to make sense of this dramatic change
in security policy. Through the lens of political economy, this
book shows how the Israeli security elites turn violence into a
commodity in order to preserve their status and wealth, providing a
fresh new perspective on the Israeli occupation.
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection.
New sections on terrorism and emerging security threats like
cybercrime and piracy Top industry professionals from aerospace and
computer firms join instructors from large academic programs as
co-authors and contributors Expanded ancillaries for both
instructors and students, including interactive web-based video and
case studies
Security and Loss Prevention: An Introduction, Seventh Edition,
provides introductory and advanced information on the security
profession. Security expert, Phil Purpura, CPP, includes updates on
security research, methods, strategies, technologies, laws, issues,
statistics and career options, providing a comprehensive and
interdisciplinary book that draws on many fields of study for
concepts, strategies of protection and research. The book explains
the real-world challenges facing security professionals and offers
options for planning solutions. Linking physical security with IT
security, the book covers internal and external threats to people
and assets and private and public sector responses and issues. As
in previous editions, the book maintains an interactive style that
includes examples, illustrations, sidebar questions, boxed topics,
international perspectives and web exercises. In addition, course
instructors can download ancillaries, including an instructor's
manual with outlines of chapters, discussion topics/special
projects, essay questions, and a test bank and PowerPoint
presentation for each chapter.
Tourism security is an important part of both security management
and tourism. Private security professionals and police departments
in tourism cities, as well as hotels, major attractions, and theme
parks, have all come to realize that tourism security and safety
issues (often called tourism surety) are essential for industry
survival and success. In Tourism Security, leading expert Peter
Tarlow addresses a range of key issues in tourism safety and
security. The book guides the reader through a study of tourism
security themes and best practices. Topics include the relationship
between tourism security and the economy, hotel and motel security,
risk and crisis management, public places, transportation, and
legal issues. The book also includes case studies of four popular
tourist destinations. With each destination, an interview with a
police or security representative is included-providing unique,
in-depth insight to security concerns. Tourism Security is an
invaluable resource for private security professionals, police
departments that serve tourist destinations, and tourism
professionals who work in hotels or convention centers, or at
attractions, casinos, or events.
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
For fans of Darkest Hour and Dunkirk, discover the story of Walter
H. Thompson, the man who saved Winston Churchill's life more than
once. Walter H. Thompson was Churchill's bodyguard from 1921 until
1945, brought back from retirement at the outbreak of war. Tom
Hickman's authorised biography draws heavily on extracts from a
manuscript recently discovered by his great-niece, in which
Thompson gives a unique insider's account of a number of occasions
on which Churchill's life was put seriously at risk and his
intervention was needed. After the war, Thompson married one of
Churchill's secretaries, and her recollections, as well as those of
surviving family members, are interwoven to tell the revelatory
inside story of life beside the Greatest Briton.
This book deals with the evolution, current status and potential of
U.S.-India strategic cooperation. From very modest beginnings, the
U.S.-India strategic partnership has developed significantly over
the last decade. In considerable part, this growth has stemmed from
overlapping concerns about the rise and assertiveness of the
People's Republic of China, as well as the instability of Pakistan.
Despite the emergence of this partnership, significant differences
remain, some of which stem from Cold War legacies, others from
divergent global strategic interests and institutional design. In
spite of these areas of discord, the overall trajectory of the
relationship appears promising. Increased cooperation and closer
policy coordination underscore a deepening of the relationship,
while fundamental differences in national approaches to strategic
challenges demand flexibility and compromise in the future. -- .
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
This volume is authored by a mix of global contributors from across
the landscape of academia, research institutions, police
organizations, and experts in security policy and private industry
to address some of the most contemporary challenges within the
global security domain. The latter includes protection of critical
infrastructures (CI), counter-terrorism, application of dark web,
and analysis of a large volume of artificial intelligence data,
cybercrime, serious and organised crime, border surveillance, and
management of disasters and crises. This title explores various
application scenarios of advanced ICT in the context of cybercrime,
border security and crisis management, serious and organised crime,
and protection of critical infrastructures. Readers will benefit
from lessons learned from more than 30 large R&D projects
within a security context. The book addresses not only theoretical
narratives pertinent to the subject but also identifies current
challenges and emerging security threats, provides analysis of
operational capability gaps, and includes real-world applied
solutions. Chapter 11 is available open access under a Creative
Commons Attribution 3.0 IGO License via link.springer.com and
Chapter 16 is available open access under a Creative Commons
Attribution 4.0 International License via link.springer.com
|
You may like...
Cognitive Risk
James Bone, Jessie H Lee
Paperback
R1,123
Discovery Miles 11 230
|