|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
In spite of Edward Snowden's disclosures about government abuses of
dragnet communication surveillance, the surveillance industry
continues to expand around the world. Many people have become
resigned to a world where they cannot have a reasonable expectation
of privacy. The author looks at what can be done to rein in these
powers and restructure how they are used beyond the limited and
often ineffective reforms that have been attempted. Using southern
Africa as a backdrop, and its liberation history, Jane Duncan
examines what an anti-capitalist perspective on intelligence and
security powers could look like. Are the police and intelligence
agencies even needed, and if so, what should they do and why? What
lessons can be learnt from how security was organised during the
struggles for liberation in the region? Southern Africa is seeing
thousands of people in the region taking to the streets in
protests. In response, governments are scrambling to acquire
surveillance technologies to monitor these new protest movements.
Southern Africa faces no major terrorism threats at the moment,
which should make it easier to develop clearer anti-surveillance
campaigns than in Europe or the US. Yet, because of tactical and
strategic ambivalence about security powers, movements often engage
in limited calls for intelligence and policing reforms, and fail to
provide an alternative vision for policing and intelligence.
Surveillance and Intelligence in Southern Africa examines what that
vision could look like.
Video surveillance, public records, fingerprints, hidden
microphones, RFID chips: in contemporary societies the intrusive
techniques of surveillance used in daily life have increased
dramatically. The "war against terror" has only exacerbated this
trend, creating a world that is closer than one might have imagined
to that envisaged by George Orwell in 1984.How have we reached this
situation? Why have democratic societies accepted that their rights
and freedoms should be taken away, a little at a time, by
increasingly sophisticated mechanisms of surveillance?From the
anthropometry of the 19th Century to the Patriot Act, through an
analysis of military theory and the Echelon Project, Armand
Mattelart constructs a genealogy of this new power of control and
examines its globalising dynamic. This book provides an essential
wake-up call at a time when democratic societies are becoming less
and less vigilant against the dangers of proliferating systems of
surveillance.
How has India's foreign policy evolved in the seventy years since
Independence? For that matter, what is the country's foreign
policy? And what are the aspects that determine and shape it? If
you've had questions such as these, Rajendra Abhyankar's Indian
Diplomacy is the foreign policy primer you've been looking for.
Charting the country's interactions with other countries from the
early days of independence to now, Indian Diplomacy reviews the
changes in stance. Lucidly written and well argued, the book covers
these and other questions comprehensively, without fuss or bombast.
A much-needed book in light of the sweeping changes on the global
stage-and India's increasing role in them.
In 1960, President Kennedy warned of a dangerous future, rife with
nuclear-armed states and a widespread penchant for conflict by the
end of the century. Thankfully, his prediction failed to pass; in
fact, roughly three times as many countries have since opted to
give up their nuclear pursuit or relinquish existing weapons than
have maintained their arsenals. Nevertheless, clandestine
acquisition of nuclear materials and technology by states such as
Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed
the need for United States' commitment to pursuing aggressive
counterproliferation strategies, particularly with rogue states.
This book looks at the experiences of countries that ventured down
the path of nuclear proliferation but were stopped short, and
examines how the international community bargains with
proliferators to encourage nuclear reversal. It asks why so many
states have relented to pressure to abandon their nuclear weapons
programs, and which counterproliferation policies have been
successful. Rupal N. Mehta argues that the international community
can persuade countries to reverse their weapons programs with
rewards and sanctions especially when the threat to use military
force remains "on the table". Specifically, nuclear reversal is
most likely when states are threatened with sanctions and offered
face-saving rewards that help them withstand domestic political
opposition. Historically, the United States has relied on a variety
of policy levers-including economic and civilian nuclear assistance
and, sometimes, security guarantees, as well as economic
sanctions-to achieve nuclear reversal. Underlying these
negotiations is the possibility of military intervention, which
incentivizes states to accept the agreement (often spearheaded by
the United States) and end their nuclear pursuit. The book draws on
interviews with current and former policymakers, as well as
in-depth case studies of India, Iran, and North Korea, to provide
policy recommendations on how best to manage nuclear proliferation
challenges from rogue states. It also outlines the proliferation
horizon, or the set of state and non-state actors that are likely
to have interest in acquiring nuclear technology for civilian,
military, or unknown purposes. The book concludes with implications
and recommendations for U.S. and global nuclear
counterproliferation policy.
It's a basic human right to feel and be safe in your
community-where you live, work and play. But, few people know or
understand everything it takes to make this possible. Safe City
details the concerted effort and integration of new technology it
takes to make communities safer for everyone. From fire departments
detecting fires within seconds with thermal imaging to police
departments detecting gunfire immediately through gunshot detection
sensors, technology continues to evolve daily. Even surveillance
cameras have taken great strides from the grainy images of years
past, and just one camera can make a difference (read about how
police identified the Boston Marathon bombers through a department
store's video camera inside!). Safe City teaches the public how to
harden targets and protect their homes, businesses, communities,
themselves, and their loved ones. It takes a community effort to
help reduce and prevent crime, and Safe City answers the questions
people have along with pointing out many more that should be asked.
This book deals with the evolution, current status and potential of
U.S.-India strategic cooperation. From very modest beginnings, the
U.S.-India strategic partnership has developed significantly over
the last decade. In considerable part, this growth has stemmed from
overlapping concerns about the rise and assertiveness of the
People's Republic of China, as well as the instability of Pakistan.
Despite the emergence of this partnership, significant differences
remain, some of which stem from Cold War legacies, others from
divergent global strategic interests and institutional design. In
spite of these areas of discord, the overall trajectory of the
relationship appears promising. Increased cooperation and closer
policy coordination underscore a deepening of the relationship,
while fundamental differences in national approaches to strategic
challenges demand flexibility and compromise in the future. -- .
All democracies have had to contend with the challenge of
tolerating hidden spy services within otherwise relatively
transparent governments. Democracies pride themselves on privacy
and liberty, but intelligence organizations have secret budgets,
gather information surreptitiously around the world, and plan
covert action against foreign regimes. Sometimes, they have even
targeted the very citizens they were established to protect, as
with the COINTELPRO operations in the 1960s and 1970s, carried out
by the Federal Bureau of Investigation (FBI) against civil rights
and antiwar activists. In this sense, democracy and intelligence
have always been a poor match. Yet Americans live in an uncertain
and threatening world filled with nuclear warheads, chemical and
biological weapons, and terrorists intent on destruction. Without
an intelligence apparatus scanning the globe to alert the United
States to these threats, the planet would be an even more perilous
place. In Spy Watching, Loch K. Johnson explores the United States'
travails in its efforts to maintain effective accountability over
its spy services. Johnson explores the work of the famous Church
Committee, a Senate panel that investigated America's espionage
organizations in 1975 and established new protocol for supervising
the Central Intelligence Agency (CIA) and the nation's other
sixteen secret services. Johnson explores why partisanship has
crept into once-neutral intelligence operations, the effect of the
9/11 attacks on the expansion of spying, and the controversies
related to CIA rendition and torture programs. He also discusses
both the Edward Snowden case and the ongoing investigations into
the Russian hack of the 2016 US election. Above all, Spy Watching
seeks to find a sensible balance between the twin imperatives in a
democracy of liberty and security. Johnson draws on scores of
interviews with Directors of Central Intelligence and others in
America's secret agencies, making this a uniquely authoritative
account.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
For fans of Darkest Hour and Dunkirk, discover the story of Walter
H. Thompson, the man who saved Winston Churchill's life more than
once. Walter H. Thompson was Churchill's bodyguard from 1921 until
1945, brought back from retirement at the outbreak of war. Tom
Hickman's authorised biography draws heavily on extracts from a
manuscript recently discovered by his great-niece, in which
Thompson gives a unique insider's account of a number of occasions
on which Churchill's life was put seriously at risk and his
intervention was needed. After the war, Thompson married one of
Churchill's secretaries, and her recollections, as well as those of
surviving family members, are interwoven to tell the revelatory
inside story of life beside the Greatest Briton.
By 1990 the Berlin Wall had fallen and the East German state
security service folded. During forty years, they had amassed more
than a billion pages in manila files detailing the lives of their
citizens. Overnight, almost a hundred thousand Stasi employees,
many of them experienced officers with access to highly personal
information, found themselves unemployed. This is the story of what
they did next. Former FBI Agent Ralph Hope uses critical insider
knowledge and access to Stasi records to track and expose
ex-officers working everywhere from the Russian energy sector to
the police and even the government department tasked with
prosecuting Stasi crimes. He examines why the key players have
never been called to account and, in doing so, asks whether we have
really learned from the past at all. He highlights a man who
continued to fight the Stasi for thirty years after the Wall fell,
and reveals a truth that many don't want spoken. The Grey Men comes
as an urgent warning from the past at a time when governments the
world over are building an unprecedented network of surveillance
over their citizens.
|
|