|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
In the past two decades, many have posited a correlation between
the spread of globalization and the decline of the nation-state. In
the realm of national security, advocates of the globalization
thesis have argued that states' power has diminished relative to
transnational governmental institutions, NGOs, and transnational
capitalism. Initially, they pointed to declines in both global
military spending (which has risen dramatically in recent years)
and interstate war. But are these trends really indicative of the
decline of nation-state's role as a guarantor of national security?
In Globalization and the National Security State, T.V. Paul and
Norrin M. Ripsman test the proposition against the available
evidence and find that the globalization school has largely gotten
it wrong. The decline in interstate warfare can largely be
attributed to the end of the Cold War, not globalization. Moreover,
great powers (the US, China, and Russia) continue to pursue
traditional nation-state strategies. Regional security arrangements
like the EU and ASEAN have not achieved much, and weak states--the
ones most impacted by the turmoil generated by globalization--are
far more traditional in their approaches to national security,
preferring to rely on their own resources rather than those of
regional and transnational institutions. This is a bold argument,
and Paul and Ripsman amass a considerable amount of evidence for
their claims. It cuts against a major movement in international
relations scholarship, and is sure to generate controversy.
In the past two decades, many have posited a correlation between
the spread of globalization and the decline of the nation-state. In
the realm of national security, advocates of the globalization
thesis have argued that states' power has diminished relative to
transnational governmental institutions, NGOs, and transnational
capitalism. Initially, they pointed to declines in both global
military spending (which has risen dramatically in recent years)
and interstate war. But are these trends really indicative of the
decline of nation-state's role as a guarantor of national security?
In Globalization and the National Security State, T.V. Paul and
Norrin M. Ripsman test the proposition against the available
evidence and find that the globalization school has largely gotten
it wrong. The decline in interstate warfare can largely be
attributed to the end of the Cold War, not globalization. Moreover,
great powers (the US, China, and Russia) continue to pursue
traditional nation-state strategies. Regional security arrangements
like the EU and ASEAN have not achieved much, and weak states--the
ones most impacted by the turmoil generated by globalization--are
far more traditional in their approaches to national security,
preferring to rely on their own resources rather than those of
regional and transnational institutions. This is a bold argument,
and Paul and Ripsman amass a considerable amount of evidence for
their claims. It cuts against a major movement in international
relations scholarship, and is sure to generate controversy.
Frequently characterized as either mercenaries in modern guise or
the market's response to a security vaccuum, private military
companies are commercial firms offering military services ranging
from combat and military training and advice to logistical support,
and which play an increasingly important role in armed conflicts,
UN peace operations, and providing security in unstable states.
Executive Outcomes turned around an orphaned conflict in Sierra
Leone in the mid-1990s; Military Professional Resources
Incorporated (MPRI) was instrumental in shifting the balance of
power in the Balkans, enabling the Croatian military to defeat Serb
forces and clear the way for the Dayton negotiations; in Iraq,
estimates of the number of private contractors on the ground are in
the tens of thousands. As they assume more responsibilities in
conflict and post-conflict settings, their growing significance
raises fundamental questions about their nature, their role in
different regions and contexts, and their regulation. This volume
examines these issues with a focus on governance, in particular the
interaction between regulation and market forces. It analyzes the
current legal framework and the needs and possibilities for
regulation in the years ahead. The book as a whole is organized
around four sets of questions, which are reflected in the four
parts of the book. First, why and how is regulation of PMCs now a
challenging issue? Secondly, how have problems leading to a call
for regulation manifested in different regions and contexts? Third,
what regulatory norms and institutions currently exist and how
effective are they? And, fourth, what role has the market to play
in regulation?
The response of the U.S. federal government to the events of
September 11, 2001 has reflected the challenge of striking a
balance between implementing security measures to deter terrorist
attacks while at the same time limiting disruption to air commerce.
Airport and Aviation Security: U.S. Policy and Strategy in the Age
of Global Terrorism is a comprehensive reference that examines the
persistent threats to aviation security that led up to the
terrorist attacks of September 11th, describes subsequent terror
plots against aviation assets, and explores U.S. efforts to counter
and mitigate these threats. Addressing the homeland security
challenges facing the U.S. in the age of terrorism, this text
explores: Security protocol prior to 9/11 Precursors to 9/11 The
rising threat of Al Qaeda Tactical and congressional response to
9/11, including new legislation The broader context of risk
assessment Intelligence gathering Airport security, including
passenger, baggage, and employee screening Airline in-flight
security measures Airport perimeter security The threat of
shoulder-fired missiles Security for GA (general aviation)
operations and airports Beginning with a historical backdrop
describing the dawn of the age of global terrorism in the 1960s and
continuing up until the present time, the book demonstrates the
broad social and political context underlying recent changes in the
aviation security system as a direct result of the 9/11 attacks.
Coverage examines ongoing threats and vulnerabilities to the
aviation infrastructure, including an exploration of how past
terrorist incidents have come to shape U.S. policy and strategy.
Frequently characterized as either mercenaries in modern guise or
the market's response to a security vacuum, private military
companies are commercial firms offering military services ranging
from combat and military training and advice to logistical support,
and which play an increasingly important role in armed conflicts,
UN peace operations, and providing security in unstable states.
Executive Outcomes turned around an orphaned conflict in Sierra
Leone in the mid-1990s; Military Professional Resources
Incorporated (MPRI) was instrumental in shifting the balance of
power in the Balkans, enabling the Croatian military to defeat Serb
forces and clear the way for the Dayton negotiations; in Iraq,
estimates of the number of private contractors on the ground are in
the tens of thousands. As they assume more responsibilities in
conflict and post-conflict settings, their growing significance
raises fundamental questions about their nature, their role in
different regions and contexts, and their regulation. This volume
examines these issues with a focus on governance, in particular the
interaction between regulation and market forces. It analyzes the
current legal framework and the needs and possibilities for
regulation in the years ahead. The book as a whole is organized
around four sets of questions, which are reflected in the four
parts of the book. First, why and how is regulation of PMCs now a
challenging issue? Secondly, how have problems leading to a call
for regulation manifested in different regions and contexts? Third,
what regulatory norms and institutions currently exist and how
effective are they? And, fourth, what role has the market to play
in regulation?
This book is the first attempt to understand Britain's night-time economy, the violence that pervades it, and the bouncers whose job it is to prevent it. Walk down any high street after dark and the shadows of bouncers will loom large, for they are the most visible form of control available in the youth-orientated zones of our cities after dark. Britain's rapidly expanding night-life is one of the country's most vibrant economic spheres, but it has created huge problems of violence and disorder. Using ethnography, participant observation, and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
* Provides evidence, examples, and explanation of the developing
tactics-illustrated recently in politics in particular-of embedding
internal saboteurs bent on dismantling their own institutions from
within * Presents numerous case studies to examine instances of
insider compromises, including the circumstances and warning signs
that led to events * Outlines solutions on how to train
organizations and individuals on recognizing, reporting,
mitigating, and deterring insider threats
One of the most serious crises since the end of the Cold War began
with Russia's seizure and annexation of Crimea in March 2014 and
subsequent 'secret' war in Eastern Ukraine. As more territory was
taken from Eastern Ukraine, Western countries countered with
economic sanctions directed against Russia. While the conflict did
not escalate to the levels originally feared, over time, it became
apparent that President Putin had failed to affect the regime
change intended in Ukraine, and Russia's economy had been damaged.
In Ukraine and the Art of Strategy, Sir Lawrence Freedman provides
an account of the origins and course of the Russia-Ukraine conflict
through the lens of the theory and practice of strategy. That is,
he explores Putin's near, medium, and long-term strategies when he
decided to initiate the conflict. How successful has he been? In
contrast to many who see Putin as a master operator who has
resuscitated a supine Russia against all odds, Freedman is less
impressed with his strategic acumen in terms of the long-term
fallout. By exploring concepts such as coercive diplomacy, limited
war, escalation and information operations, Freedman brings the
story up to the present, where a low-level conflict between
Ukrainian and breakaway rebel forces in the east grinds on, and
illuminates the external challenges faced by the governments'
involved. Freedman's application of his unique strategic
perspective to this supremely important conflict has the potential
to reshape our understanding of it, and his analysis of the likely
outcomes will force readers to reconsider the idea that Vladimir
Putin is unmatched as a strategic mastermind.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
The book is general enough in nature that a lay student—interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement—will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations.
Uses numerous hands-on activities—that can easily be modified by instructors to be more or less challenging depending on the course level—to reinforce concepts
As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts
All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information
As such, the non-sensitive information presented is appropriate—and methods applicable—for use for education and training overseas and internationally
Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities
Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing
The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
Table of Contents
1. Defining Intelligence Analysis 2. The Intelligence Cycle 3. Thinking About Thinking 4. Perception and Deception 5. Knowing Your Audience 6. Analytical Communication 7. Defining the Problem 8. Generating the Hypothesis 9. The Collection Process 10. Analytical Tradecraft 11. Cognitive Traps for Intelligence Analysis 12. Probability Estimation 13. Creating an Analytical Plan 14. Preparing and Conducting Intelligence Briefings 15. Best Practices 16. Operations Security OPSEC
Between 1994-2014, Israel's security service was transformed,
becoming one of the most extreme examples of privatised security in
the world. This book is an investigation into this period and the
conditions that created 'Occupation Inc.': the institution of a
private military-security-industrial complex. State sponsored
violence is increasing as a result of this securitisation, but why
is it necessary, and what are its implications? In this book, Shir
Hever considers the impact of the ongoing Palestinian resistance to
Israeli occupation, the influence of U.S. military aid and the rise
of neoliberalism in Israel, to make sense of this dramatic change
in security policy. Through the lens of political economy, this
book shows how the Israeli security elites turn violence into a
commodity in order to preserve their status and wealth, providing a
fresh new perspective on the Israeli occupation.
The concept of Crime Prevention Through Environmental Design
(CPTED) has undergone dramatic changes over the last several
decades since C. Ray Jeffery coined the term in the early 1970s,
and Tim Crowe wrote the first CPTED applications book. The second
edition of 21st Century Security and CPTED includes the latest
theory, knowledge, and practice of CPTED as it relates to the
current security threats facing the modern world: theft, violent
crime, terrorism, gang activity, and school and workplace violence.
This significantly expanded edition includes the latest coverage of
proper lighting, building design-both the interior and
exterior-physical security barriers, the usage of fencing,
bollards, natural surveillance, landscaping, and landscape design.
Such design concepts and security elements can be applied to
address a wide variety of threats including crime prevention, blast
mitigation, and CBRNE threat protection. Authored by one of the
U.S.'s renowned security experts-and a premiere architect and
criminologist-the book is the most comprehensive examination of
CPTED and CPTED principles available. This edition includes a
complete update of all chapters in addition to five new chapters,
over 700 figure illustrations and photos, numerous tables and
checklists, and a 20-page color plate section. This latest edition:
Features five new chapters including green and sustainable
buildings, infrastructure protection, and premises liability
Presents step-by-step guidelines and real-world applications of
CPTED concepts, principles and processes-from risk assessment to
construction and post-occupancy evaluation Outlines national
building security codes and standards Examines architectural surety
from the perspective of risk analysis and premises liability
Demonstrates CPTED implementation in high-security environments,
such as hospitals, parks, ATMs, schools, and public and private
sector buildings A practical resource for architects, urban
planners and designers, security managers, law enforcement, CPTED
practitioners, building and property managers, homeland security
professionals, and students, 21st Century Security and CPTED,
Second Edition continues to serve as the most complete and
up-to-date reference available on next-generation CPTED practices
today.
From the rising significance of non-state actors to the increasing
influence of regional powers, the nature and conduct of
international politics has arguably changed dramatically since the
height of the Cold War. Yet much of the literature on deterrence
and compellence continues to draw (whether implicitly or
explicitly) upon assumptions and precepts formulated in-and
predicated upon-politics in a state-centric, bipolar world.
Coercion moves beyond these somewhat hidebound premises and
examines the critical issue of coercion in the 21st century, with a
particular focus on new actors, strategies and objectives in this
very old bargaining game. The chapters in this volume examine
intra-state, inter-state, and transnational coercion and deterrence
as well as both military and non-military instruments of
persuasion, thus expanding our understanding of coercion for
conflict in the 21st century. ? Scholars have analyzed the causes,
dynamics, and effects of coercion for decades, but previous works
have principally focused on a single state employing conventional
military means to pressure another state to alter its behavior. In
contrast, this volume captures fresh developments, both theoretical
and policy relevant. This chapters in this volume focus on tools
(terrorism, sanctions, drones, cyber warfare, intelligence, and
forced migration), actors (insurgents, social movements, and NGOs)
and mechanisms (trilateral coercion, diplomatic and economic
isolation, foreign-imposed regime change, coercion of nuclear
proliferators, and two-level games) that have become more prominent
in recent years, but which have yet to be extensively or
systematically addressed in either academic or policy literatures.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
It is widely acknowledged that the size of the security industry
has increased in virtually every country around the world, often
eclipsing conventional police forces in personnel numbers and
expenditures. Security providers differ from law enforcement
officers in many ways, yet the nature of their crime reduction
activities brings them into frequent contact with citizens, drawing
to the forefront issues of training, professionalism and
accountability. Unlike police officers, whose training and
licensing standards are well established, regulations for security
providers are often minimalist or entirely absent. This volume
brings together research on regulatory regimes and strategies from
around the globe, covering both the large private security sector
and the expanding area of public sector 'non-police' protective
security. It examines the nature and extent of licensing and
monitoring, and the minimum standards imposed on the industry by
governments across the world. The chapters in this book were
originally published in the International Journal of Comparative
and Applied Criminal Justice.
The rise of China will undoubtedly be one of the great spectacles
of the twenty-first century. More than a dramatic symbol of the
redistribution of global wealth, the event has marked the end of
the unipolar international system and the arrival of a new era in
world politics. How the security, stability and legitimacy built
upon foundations that were suddenly shifting, adapting to this new
reality is the subject of Will China's Rise be Peaceful? Bringing
together the work of seasoned experts and younger scholars, this
volume offers an inclusive examination of the effects of historical
patterns-whether interrupted or intact-by the rise of China. The
contributors show how strategies among the major powers are guided
by existing international rules and expectations as well as by the
realities created by an increasingly powerful China. While China
has sought to signal its non-revisionist intent its extraordinary
economic growth and active diplomacy has in a short time span
transformed global and East Asian politics. This has caused
constant readjustments as the other key actors have responded to
the changing incentives provided by Chinese policies. Will China's
Rise be Peaceful? explores these continuities and discontinuities
in five areas: theory, history, domestic politics, regional
politics, and great power politics. Equally grounded in theory and
extensive empirical research, this timely volume offers a
remarkably lucid description and interpretation of our changing
international relations. In both its approach and its conclusions,
it will serve as a model for the study of China in a new era.
Privatising Justice takes a broad historical view of the role of
the private sector in the British state, from private policing and
mercenaries in the eighteenth century to the modern rise of the
private security industry in armed conflict, policing and the penal
system. The development of the welfare state is seen as central to
the decline of what the authors call 'old privatisation'. Its
succession by neoliberalism has created the ground for the
resurgence of the private sector. The growth of private military,
policing and penal systems is located within the broader global
changes brought about by neoliberalism and the dystopian future
that it portends. The book is a powerful petition for the reversal
of the increasing privatisation of the state and the neoliberalism
that underlies it.
 |
1984
(Paperback)
George Orwell
|
R208
R191
Discovery Miles 1 910
Save R17 (8%)
|
Ships in 9 - 17 working days
|
|
|
This Scholastic Classics edition of George Orwell's classic
dystopian novel is perfect for students and Orwell enthusiasts
alike. Who controls the past controls the future. Who controls the
present controls the past. Winston Smith has always been a dutiful
citizen of Oceania, rewriting history to meet the demands of the
Ministry of Truth. But with each lie that he writes, Winston starts
to resent the totalitarian party that seeks power for its own sake
and punishes those that desire individuality. When Winston begins a
secret relationship with his colleague Julia, he soon realises it's
virtually impossible to escape the watchful eye of Big Brother...
Totalitarianism, identity and independence, repression, power,
language, rebellion, technology and modernisation are some of the
themes that run throughout this novel.
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
How has India's foreign policy evolved in the seventy years since
Independence? For that matter, what is the country's foreign
policy? And what are the aspects that determine and shape it? If
you've had questions such as these, Rajendra Abhyankar's Indian
Diplomacy is the foreign policy primer you've been looking for.
Charting the country's interactions with other countries from the
early days of independence to now, Indian Diplomacy reviews the
changes in stance. Lucidly written and well argued, the book covers
these and other questions comprehensively, without fuss or bombast.
A much-needed book in light of the sweeping changes on the global
stage-and India's increasing role in them.
In 1960, President Kennedy warned of a dangerous future, rife with
nuclear-armed states and a widespread penchant for conflict by the
end of the century. Thankfully, his prediction failed to pass; in
fact, roughly three times as many countries have since opted to
give up their nuclear pursuit or relinquish existing weapons than
have maintained their arsenals. Nevertheless, clandestine
acquisition of nuclear materials and technology by states such as
Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed
the need for United States' commitment to pursuing aggressive
counterproliferation strategies, particularly with rogue states.
This book looks at the experiences of countries that ventured down
the path of nuclear proliferation but were stopped short, and
examines how the international community bargains with
proliferators to encourage nuclear reversal. It asks why so many
states have relented to pressure to abandon their nuclear weapons
programs, and which counterproliferation policies have been
successful. Rupal N. Mehta argues that the international community
can persuade countries to reverse their weapons programs with
rewards and sanctions especially when the threat to use military
force remains "on the table". Specifically, nuclear reversal is
most likely when states are threatened with sanctions and offered
face-saving rewards that help them withstand domestic political
opposition. Historically, the United States has relied on a variety
of policy levers-including economic and civilian nuclear assistance
and, sometimes, security guarantees, as well as economic
sanctions-to achieve nuclear reversal. Underlying these
negotiations is the possibility of military intervention, which
incentivizes states to accept the agreement (often spearheaded by
the United States) and end their nuclear pursuit. The book draws on
interviews with current and former policymakers, as well as
in-depth case studies of India, Iran, and North Korea, to provide
policy recommendations on how best to manage nuclear proliferation
challenges from rogue states. It also outlines the proliferation
horizon, or the set of state and non-state actors that are likely
to have interest in acquiring nuclear technology for civilian,
military, or unknown purposes. The book concludes with implications
and recommendations for U.S. and global nuclear
counterproliferation policy.
|
|