![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
National security has been at the forefront of the Israeli experience for seven decades, with threats ranging from terrorism, to vast rocket and missile arsenals, and even existential nuclear dangers. Yet, despite its overwhelming preoccupation with foreign and defense affairs, Israel does not have a formal national security strategy. In Israeli National Security, Chuck Freilich presents an authoritative analysis of the military, diplomatic, demographic, and societal challenges Israel faces today, to propose a comprehensive and long-term Israeli national security strategy. The heart of the new strategy places greater emphasis on restraint, defense, and diplomacy as means of addressing the challenges Israel faces, along with the military capacity to deter and, if necessary, defeat Israel's adversaries, while also maintaining the resolve of its society. By bringing Israel's most critical debates about the Palestinians, demography, Iran, Hezbollah, Hamas, US relations and nuclear strategy into sharp focus, the strategy Freilich proposes addresses the primary challenges Israel must address in order to chart its national course. The most comprehensive study of Israel's national security to date, this book presents the first public proposal for a comprehensive Israeli national security strategy and prescribes an actionable course forward.
Democracy Declassified tackles an enduring question of particular current importance: How do democratic governments balance the need for foreign policy secrecy with accountability to the public? Democracies keep secrets both from potential enemies and their publics. This simple fact challenges the surprisingly prevalent assumption that foreign policy successes and failures can be attributed to public transparency and accountability. In fact, the ability to keep secrets has aided democratic victories from the European and Pacific theatres in World War II to the global competition of the Cold War. At the same time, executive discretion over the capacity to classify information created the opportunity for abuse that contributed to Watergate, as well as domestic spying and repression in France, Norway and Canada over the last 40 years. Therefore, democracies face a secrecy dilemma. Secrecy is useful, but once a group or person has the ability to decide what information is concealed from an international competitor, citizens can no longer monitor that information. How then can the public be assured that national security policies are not promoting hidden corruption or incompetence? As Democracy Declassified shows, it is indeed possible for democracies to keep secrets while also maintaining national security oversight institutions that can deter abuse and reassure the public, including freedom of information laws, legislative committee powers, and press freedom. Understanding secrecy and oversight in democracies helps us explain not only why the Maginot Line rose and the French Republic fell, or how the US stumbled but eventually won the Cold War, but more generally how democracies can benefit from both public consent and necessary national security secrets. At a time when the issue of institutional accountability and transparency has reached fever pitch, Democracy Declassified provides a grounded and important view on the connection between the role of secrecy in democratic governance and foreign policy-making.
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vaccuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a comprehensive reference that examines the persistent threats to aviation security that led up to the terrorist attacks of September 11th, describes subsequent terror plots against aviation assets, and explores U.S. efforts to counter and mitigate these threats. Addressing the homeland security challenges facing the U.S. in the age of terrorism, this text explores: Security protocol prior to 9/11 Precursors to 9/11 The rising threat of Al Qaeda Tactical and congressional response to 9/11, including new legislation The broader context of risk assessment Intelligence gathering Airport security, including passenger, baggage, and employee screening Airline in-flight security measures Airport perimeter security The threat of shoulder-fired missiles Security for GA (general aviation) operations and airports Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, the book demonstrates the broad social and political context underlying recent changes in the aviation security system as a direct result of the 9/11 attacks. Coverage examines ongoing threats and vulnerabilities to the aviation infrastructure, including an exploration of how past terrorist incidents have come to shape U.S. policy and strategy.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vacuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
This book is the first attempt to understand Britain's night-time economy, the violence that pervades it, and the bouncers whose job it is to prevent it. Walk down any high street after dark and the shadows of bouncers will loom large, for they are the most visible form of control available in the youth-orientated zones of our cities after dark. Britain's rapidly expanding night-life is one of the country's most vibrant economic spheres, but it has created huge problems of violence and disorder. Using ethnography, participant observation, and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
One of the most serious crises since the end of the Cold War began with Russia's seizure and annexation of Crimea in March 2014 and subsequent 'secret' war in Eastern Ukraine. As more territory was taken from Eastern Ukraine, Western countries countered with economic sanctions directed against Russia. While the conflict did not escalate to the levels originally feared, over time, it became apparent that President Putin had failed to affect the regime change intended in Ukraine, and Russia's economy had been damaged. In Ukraine and the Art of Strategy, Sir Lawrence Freedman provides an account of the origins and course of the Russia-Ukraine conflict through the lens of the theory and practice of strategy. That is, he explores Putin's near, medium, and long-term strategies when he decided to initiate the conflict. How successful has he been? In contrast to many who see Putin as a master operator who has resuscitated a supine Russia against all odds, Freedman is less impressed with his strategic acumen in terms of the long-term fallout. By exploring concepts such as coercive diplomacy, limited war, escalation and information operations, Freedman brings the story up to the present, where a low-level conflict between Ukrainian and breakaway rebel forces in the east grinds on, and illuminates the external challenges faced by the governments' involved. Freedman's application of his unique strategic perspective to this supremely important conflict has the potential to reshape our understanding of it, and his analysis of the likely outcomes will force readers to reconsider the idea that Vladimir Putin is unmatched as a strategic mastermind.
Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues—blockchain, cybersecurity, AI, and more—each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas—and prepare you and your company for the future.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
Crime Prevention: Approaches, Practices, and Evaluations, Eleventh Edition, meets the needs of students and instructors for engaging, evidence-based, impartial coverage of interventions that can reduce or prevent deviance. This edition examines the entire gamut of prevention, from physical design, to developmental prevention, to identifying high-risk individuals, to situational initiatives, to partnerships, and beyond. Strategies include primary prevention measures designed to prevent conditions that foster deviance, secondary prevention measures directed toward persons or conditions with a high potential for deviance, and tertiary prevention measures to deal with persons who have already committed crimes. In this book, Lab offers a thorough and well-rounded discussion of the many sides of the crime prevention debate in clear and accessible language, including the latest research concerning space syntax, physical environment and crime, neighborhood crime prevention programs, community policing, crime in schools, and electronic monitoring and home confinement. This book is essential for undergraduates studying criminal justice, criminology, and sociology, in the U.S. and globally. Online resources include an instructor’s manual, test bank, and lecture slides for faculty, and a wide array of resources for students.
The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
The rise of China will undoubtedly be one of the great spectacles of the twenty-first century. More than a dramatic symbol of the redistribution of global wealth, the event has marked the end of the unipolar international system and the arrival of a new era in world politics. How the security, stability and legitimacy built upon foundations that were suddenly shifting, adapting to this new reality is the subject of Will China's Rise be Peaceful? Bringing together the work of seasoned experts and younger scholars, this volume offers an inclusive examination of the effects of historical patterns-whether interrupted or intact-by the rise of China. The contributors show how strategies among the major powers are guided by existing international rules and expectations as well as by the realities created by an increasingly powerful China. While China has sought to signal its non-revisionist intent its extraordinary economic growth and active diplomacy has in a short time span transformed global and East Asian politics. This has caused constant readjustments as the other key actors have responded to the changing incentives provided by Chinese policies. Will China's Rise be Peaceful? explores these continuities and discontinuities in five areas: theory, history, domestic politics, regional politics, and great power politics. Equally grounded in theory and extensive empirical research, this timely volume offers a remarkably lucid description and interpretation of our changing international relations. In both its approach and its conclusions, it will serve as a model for the study of China in a new era.
2020 Foreword Indie Award Winner (Gold) in the "Science & Technology" Category "Chilling, eye-opening, and timely, Cyber Privacy makes a strong case for the urgent need to reform the laws and policies that protect our personal data. If your reaction to that statement is to shrug your shoulders, think again. As April Falcon Doss expertly explains, data tracking is a real problem that affects every single one of us on a daily basis." -General Michael V. Hayden, USAF, Ret., former Director of CIA and NSA and former Principal Deputy Director of National Intelligence You're being tracked. Amazon, Google, Facebook, governments. No matter who we are or where we go, someone is collecting our data: to profile us, target us, assess us; to predict our behavior and analyze our attitudes; to influence the things we do and buy-even to impact our vote. If this makes you uneasy, it should. We live in an era of unprecedented data aggregation, and it's never been more difficult to navigate the trade-offs between individual privacy, personal convenience, national security, and corporate profits. Technology is evolving quickly, while laws and policies are changing slowly. You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. She wants to empower individuals and see policy catch up. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used-sometimes against us-by the private sector, the government, and even our employers and schools. She explains the trends in data science, technology, and the law that impact our everyday privacy. She tackles big questions: how data aggregation undermines personal autonomy, how to measure what privacy is worth, and how society can benefit from big data while managing its risks and being clear-eyed about its cost. It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?
Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.
With an estimated 3.3 billion ionizing radiation imaging examinations performed worldwide each year, the growing use of x-ray-based diagnostic procedures raises concerns about long-term health risks, especially cancer. In addition, rapid growth in the number of nuclear power plants around the world increases the risk of a nuclear accident similar to that of Fukushima, Japan. Add to this, exposure to non-ionizing radiation from prolonged cell phone use, proton radiation from solar flares, and potential nuclear conflict or a dirty bomb attack, and the need to expand our repertoire of radiation prevention and mitigation strategies becomes increasingly urgent. Radiation Injury Prevention and Mitigation in Humans identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. This includes agents that-when administered orally before and/or after irradiation exposures-could be effective in preventing and mitigating acute radiation damage. The book discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. The book describes: Physics of ionizing radiation and radiological weapons, principles of nuclear reactors, the types of radiological weapons, and consequences of their explosions Acute and late health effects of high and low doses of radiation The efficacy of FDA-approved and unapproved radioprotective and radiation mitigating agents The efficacy of radioprotective and radiation mitigating agents not requiring FDA approval (antioxidants and herbs) Scientific data and rationale in support of using micronutrient preparations containing dietary and endogenous antioxidants for preventing acute radiation sickness and for mitigating the late adverse health effects among survivors of high and low doses of radiation Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
Video surveillance, public records, fingerprints, hidden microphones, RFID chips: in contemporary societies the intrusive techniques of surveillance used in daily life have increased dramatically. The "war against terror" has only exacerbated this trend, creating a world that is closer than one might have imagined to that envisaged by George Orwell in 1984.How have we reached this situation? Why have democratic societies accepted that their rights and freedoms should be taken away, a little at a time, by increasingly sophisticated mechanisms of surveillance?From the anthropometry of the 19th Century to the Patriot Act, through an analysis of military theory and the Echelon Project, Armand Mattelart constructs a genealogy of this new power of control and examines its globalising dynamic. This book provides an essential wake-up call at a time when democratic societies are becoming less and less vigilant against the dangers of proliferating systems of surveillance. |
You may like...
Healthcare Kaizen - Engaging Front-Line…
Mark Graban, Joseph E Swartz
Hardcover
R5,086
Discovery Miles 50 860
Digital Controller Implementation and…
Robert Istepanian, James F. Whidborne
Hardcover
R4,168
Discovery Miles 41 680
Dishonesty in Behavioral Economics
Alessandro Bucciol, Natalia Montinari
Paperback
R3,024
Discovery Miles 30 240
Methods for Appearance-based Loop…
Emilio Garcia-Fidalgo, Alberto Ortiz
Hardcover
R2,653
Discovery Miles 26 530
|