|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
By 1990 the Berlin Wall had fallen and the East German state
security service folded. During forty years, they had amassed more
than a billion pages in manila files detailing the lives of their
citizens. Overnight, almost a hundred thousand Stasi employees,
many of them experienced officers with access to highly personal
information, found themselves unemployed. This is the story of what
they did next. Former FBI Agent Ralph Hope uses critical insider
knowledge and access to Stasi records to track and expose
ex-officers working everywhere from the Russian energy sector to
the police and even the government department tasked with
prosecuting Stasi crimes. He examines why the key players have
never been called to account and, in doing so, asks whether we have
really learned from the past at all. He highlights a man who
continued to fight the Stasi for thirty years after the Wall fell,
and reveals a truth that many don't want spoken. The Grey Men comes
as an urgent warning from the past at a time when governments the
world over are building an unprecedented network of surveillance
over their citizens.
Maritime security is one of the latest additions to the field of
international as well as national security. The concept has
received growing attention especially due to the intensification of
concerns over maritime terrorism since 2000. The rise of modern
piracy, maritime crimes such as human trafficking, and the
increasing importance of the 'blue economy' and issues relating to
freedom of navigation, maritime environmental protection, and
resource management have resulted in the increased significance of
maritime security studies. A significant number of states and other
international actors such as Multinational Corporations (MNCs) and
Transnational Corporations (TNCs) have placed maritime security
high in their security agenda. This priority is reflected in
several governmental and intergovernmental strategies for maritime
security. In addition to that, the regional grouping in the Indian
Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS
have placed maritime security issues high in their agenda.
This second book of the Edwin Cole Bearss memoir begins with his
first days in a 40-year career in the National Park Service.
Beginning as the Park Historian at the Vicksburg National Military
Park in September, 1955, the book covers his rise to Chief
Historian, now Emeritus. He has always professed the importance of
walking the ground to understand the outcomes of all battles, but
particularly those that created, and then consecrated, the United
States of America. Said to know more about Civil War battlefields
than any other historian of his time, this book describes how he
helped create and interpret much of our American history. He first
learned the importance of "walking the ground" when in combat on
the Pacific island of New Britain. There, a few inches of earth
saved his life after having four Japanese bullets tear into him at
what Marines would soon dub "Suicide Creek." His early years in
Montana, the account of this action on New Britain, his chance
meeting with the actor and fellow Montanan Gary Cooper, and his 27
months in hospitals is published in the book Walking the Ground:
From Big Sky to Semper Fi also by NOVA. His Government career
created National Parks and Presidential Historic Parks, including
his direct relationships with President Lyndon B. Johnson and
President Jimmy Carter. He created and improved many parks, and
thus, made the history that Americans see and read when they
experience these important American lands, battlefields and
buildings. Ed Bearss has made indelible marks on the American
landscape, and in so doing, defined much of the historical culture
of the United States. His contribution to our understanding of
American history is immense. He is the author of 140 National Park
Service reports, more than any other person to work for the
National Park Service.The quality and popularity of his tours and
books are rare among present-day historians. He has mentored
generations of younger historians who now teach American history,
and continue along the path he has pioneered. He has frequently
testified before Congress, was interviewed by television reporters
and guided senior-level Government officials in critical events in
American history. Ed Bearss became a television celebrity following
his appearance to mass television audiences who watched the Ken
Burns Civil War Series on PBS, leading to great demand in
Bearss-led battlefield history tours. For those many U.S. history
adventurers who have experienced his history tours, Ed Bearss'
words and mannerisms leap from the page as we follow him walking
Pickett's Charge at the Gettysburg; track John Wilkes Booth's
escape route after assassinating President Abraham Lincoln; recount
George Armstrong Custer's battlefield defeat by Native Americans
whose families he had attacked along the Little Big Horn River; and
words describing the WWI American sacrifice at Belleau Wood of U.S.
Marine mythology. This book will explain Ed Bearss' unsurpassed
contribution to the making of American history and the
strengthening our collective culture.
Effective Physical Security, Fifth Edition is a best-practices
compendium that details the essential elements and latest
developments in physical security protection. This new edition is
completely updated, with new chapters carefully selected from the
author's work that set the standard. This book contains important
coverage of environmental design, security surveys, locks,
lighting, and CCTV, the latest ISO standards for risk assessment
and risk management, physical security planning, network systems
infrastructure, and environmental design.
Now, for the first time, Robert K. DeArment has told the full
story of George Scarborough's life, illuminating his activity as a
lawman during the final part of the nineteenth century and his
controversial killings while wearing the badge-he was tried for
murder on three occasions and acquitted each time.
Eight previous iterations of this text have proven to be highly
regarded and considered the definitive training guide and
instructional text for first-line security officers in both the
private and public sectors. The material included in the newest
version covers all the subjects essential to the training of
protection officers. This valuable resource and its predecessors
have been utilized worldwide by the International Foundation for
Protection Officers since 1988, as the core curriculum for the
Certified Protection Officer (CPO) Program. The Professional
Protection Officer: Practical Security Strategies and Emerging
Trends provides critical updates and fresh guidance, as well as
diagrams and illustrations; all have been tailored to the training
and certification needs of today's protection professionals.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
The Thai military's Internal Security Operations Command (ISOC) was
in charge of a wide range of civil affairs projects during the
country's struggle with the communist insurgency between the
mid-1960s and the mid-1980s. These projects - including rural
development programmes, mass organizations and mobilization
campaigns, and psychological operations - provided justification
for the military to routinely penetrate the socio-political sphere.
Since the Cold War drew to a close, little attention has been paid
to ISOC's role and power within the state apparatus. Since the
coups of September 2006 and May 2014 that toppled the elected
governments, ISOC has been dangerously empowered and increasingly
employed by the military regimes to dictate the country's political
direction. The power of the Thai military is exerted not only
through its use of force but also by means of its socio-political
arms. ISOC represents a potent tool with which conservative elites
can undermine and control electoral democracy and through which the
military can maintain its power.
The United States has poured over a billion dollars into a network
of interagency intelligence centers called "fusion centers." These
centers were ostensibly set up to prevent terrorism, but
politicians, the press, and policy advocates have criticized them
for failing on this account. So why do these security systems
persist? Pacifying the Homeland travels inside the secret world of
intelligence fusion, looks beyond the apparent failure of fusion
centers, and reveals a broader shift away from mass incarceration
and toward a more surveillance- and police-intensive system of
social regulation. Provided with unprecedented access to domestic
intelligence centers, Brendan McQuade uncovers how the
institutionalization of intelligence fusion enables decarceration
without fully addressing the underlying social problems at the root
of mass incarceration. The result is a startling analysis that
contributes to the debates on surveillance, mass incarceration, and
policing and challenges readers to see surveillance, policing, mass
incarceration, and the security state in an entirely new light.
|
|