|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
How has India's foreign policy evolved in the seventy years since
Independence? For that matter, what is the country's foreign
policy? And what are the aspects that determine and shape it? If
you've had questions such as these, Rajendra Abhyankar's Indian
Diplomacy is the foreign policy primer you've been looking for.
Charting the country's interactions with other countries from the
early days of independence to now, Indian Diplomacy reviews the
changes in stance. Lucidly written and well argued, the book covers
these and other questions comprehensively, without fuss or bombast.
A much-needed book in light of the sweeping changes on the global
stage-and India's increasing role in them.
In 1960, President Kennedy warned of a dangerous future, rife with
nuclear-armed states and a widespread penchant for conflict by the
end of the century. Thankfully, his prediction failed to pass; in
fact, roughly three times as many countries have since opted to
give up their nuclear pursuit or relinquish existing weapons than
have maintained their arsenals. Nevertheless, clandestine
acquisition of nuclear materials and technology by states such as
Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed
the need for United States' commitment to pursuing aggressive
counterproliferation strategies, particularly with rogue states.
This book looks at the experiences of countries that ventured down
the path of nuclear proliferation but were stopped short, and
examines how the international community bargains with
proliferators to encourage nuclear reversal. It asks why so many
states have relented to pressure to abandon their nuclear weapons
programs, and which counterproliferation policies have been
successful. Rupal N. Mehta argues that the international community
can persuade countries to reverse their weapons programs with
rewards and sanctions especially when the threat to use military
force remains "on the table". Specifically, nuclear reversal is
most likely when states are threatened with sanctions and offered
face-saving rewards that help them withstand domestic political
opposition. Historically, the United States has relied on a variety
of policy levers-including economic and civilian nuclear assistance
and, sometimes, security guarantees, as well as economic
sanctions-to achieve nuclear reversal. Underlying these
negotiations is the possibility of military intervention, which
incentivizes states to accept the agreement (often spearheaded by
the United States) and end their nuclear pursuit. The book draws on
interviews with current and former policymakers, as well as
in-depth case studies of India, Iran, and North Korea, to provide
policy recommendations on how best to manage nuclear proliferation
challenges from rogue states. It also outlines the proliferation
horizon, or the set of state and non-state actors that are likely
to have interest in acquiring nuclear technology for civilian,
military, or unknown purposes. The book concludes with implications
and recommendations for U.S. and global nuclear
counterproliferation policy.
This book deals with the evolution, current status and potential of
U.S.-India strategic cooperation. From very modest beginnings, the
U.S.-India strategic partnership has developed significantly over
the last decade. In considerable part, this growth has stemmed from
overlapping concerns about the rise and assertiveness of the
People's Republic of China, as well as the instability of Pakistan.
Despite the emergence of this partnership, significant differences
remain, some of which stem from Cold War legacies, others from
divergent global strategic interests and institutional design. In
spite of these areas of discord, the overall trajectory of the
relationship appears promising. Increased cooperation and closer
policy coordination underscore a deepening of the relationship,
while fundamental differences in national approaches to strategic
challenges demand flexibility and compromise in the future. -- .
'Unique and engaging characters woven into the fabric of a
fantastic plot. Jason Dean is one to watch' Marc Cameron, New York
Times bestselling author of Tom Clancy Code of Honor What is a
death sentence to a dead man?He was a man with many names. Moving
from country to country, changing his face constantly so as to
remain in the shadows, he was nothing more than a ghost. For now,
he is known simply as Korso. A covert salvage operative, he
recovers lost artefacts and items, often stolen, for rich
benefactors unable to operate through normal channels. But his
shadowy existence is shattered upon the arrival at his Bermuda home
of the man he had hoped never to see again... Tasked with
recovering a missing, one-of-a-kind shipment in only four days, his
elite skill set will be tested to its limits. Failure will result
in his identity being revealed to his former boss, the ruthless
Nikolic, who would stop at nothing to eliminate the one man who
walked away from his organisation. An exceptional, white-knuckle
thriller full of intrigue and suspense, perfect for fans of Rob
Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer,
Korso's first outing, is everything you could want in a thriller;
fast-pace, suspense, mystery, just the right amount of wickedness,
but above all else a protagonist who the reader will want to read
more and more of. A real page turner' Rob Sinclair, million copy
bestselling author of The Red Cobra 'Meet Korso, a mysterious and
unique character you won't be able to get enough of. In a thriller
novel I want tension, pace and ample action, and in Tracer, Jason
Dean has delivered by the bucketful' Matt Hilton, author of the Joe
Hunter thrillers 'A relentless round of fast and furious set
pieces, out-pacing Reacher for tension and with non-stop violence
and intrigue to satisfy any thriller fans' Adrian Magson, author of
The Watchman 'A thrilling, race-against-time ride ... a great start
to what I'm sure will be a hugely successful thriller series' A. A.
Chaudhuri, author of The Scribe 'The most explosive book I've read
in ages' D. L. Marshall, author of Anthrax Island 'A superb,
fast-paced thriller which literally ticks like a time-bomb' Nick
Oldham, author of the Henry Christie series
All democracies have had to contend with the challenge of
tolerating hidden spy services within otherwise relatively
transparent governments. Democracies pride themselves on privacy
and liberty, but intelligence organizations have secret budgets,
gather information surreptitiously around the world, and plan
covert action against foreign regimes. Sometimes, they have even
targeted the very citizens they were established to protect, as
with the COINTELPRO operations in the 1960s and 1970s, carried out
by the Federal Bureau of Investigation (FBI) against civil rights
and antiwar activists. In this sense, democracy and intelligence
have always been a poor match. Yet Americans live in an uncertain
and threatening world filled with nuclear warheads, chemical and
biological weapons, and terrorists intent on destruction. Without
an intelligence apparatus scanning the globe to alert the United
States to these threats, the planet would be an even more perilous
place. In Spy Watching, Loch K. Johnson explores the United States'
travails in its efforts to maintain effective accountability over
its spy services. Johnson explores the work of the famous Church
Committee, a Senate panel that investigated America's espionage
organizations in 1975 and established new protocol for supervising
the Central Intelligence Agency (CIA) and the nation's other
sixteen secret services. Johnson explores why partisanship has
crept into once-neutral intelligence operations, the effect of the
9/11 attacks on the expansion of spying, and the controversies
related to CIA rendition and torture programs. He also discusses
both the Edward Snowden case and the ongoing investigations into
the Russian hack of the 2016 US election. Above all, Spy Watching
seeks to find a sensible balance between the twin imperatives in a
democracy of liberty and security. Johnson draws on scores of
interviews with Directors of Central Intelligence and others in
America's secret agencies, making this a uniquely authoritative
account.
Political discourse on immigration in the United States has largely
focused on what is most visible, including border walls and
detention centers, while the invisible information systems that
undergird immigration enforcement have garnered less attention.
Tracking the evolution of various surveillance-related systems
since the 1980s, Borderland Circuitry investigates how the
deployment of this information infrastructure has shaped
immigration enforcement practices. Ana Muniz illuminates three
phenomena that are becoming increasingly intertwined: digital
surveillance, immigration control, and gang enforcement. Using
ethnography, interviews, and analysis of documents never before
seen, Muniz uncovers how information-sharing partnerships between
local police, state and federal law enforcement, and foreign
partners collide to create multiple digital borderlands. Diving
deep into a select group of information systems, Borderland
Circuitry reveals how those with legal and political power deploy
the specter of violent cross-border criminals to justify intensive
surveillance, detention, brutality, deportation, and the
destruction of land for border militarization.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
A quick, easy-to-read synthesis of theory, guidelines, and
evidence-based research, this book offers timely, practical
guidance for library and information professionals who must
navigate ethical crises in information privacy and stay on top of
emerging privacy trends. Emerging technologies create new concerns
about information privacy within library and information
organizations, and many information professionals lack guidance on
how to navigate the ethical crises that emerge when information
privacy and library policy clash. What should we do when a patron
leaves something behind? How do we justify filtering internet
access while respecting accessibility and privacy? How do we
balance new technologies that provide anonymity with the library's
need to prevent the illegal use of their facilities? Library
Patrons' Privacy presents clear, conversational, evidence-based
guidance on how to navigate these ethical questions in information
privacy. Ideas from professional organizations, government
entities, scholarly publications, and personal experiences are
synthesized into an approachable guide for librarians at all stages
of their career. This guide, designed by three experienced LIS
scholars and professionals, is a quick and enjoyable read that
students and professionals of all levels of technical knowledge and
skill will find useful and applicable to their libraries. Presents
practical, evidence-based guidance for navigating common ethical
problems in library and information science Introduces library and
information professionals and students to emerging issues in
information privacy Provides students and practitioners with a
foundation of practical problem-solving strategies for handling
information privacy issues in emerging technologies Guides the
design of new information privacy policy in all types of libraries
Encourages engagement with information privacy technologies to
assist in fulfilling the American Library Association's core values
Defence is the ultimate public good, and it thus falls to
government to determine the appropriate amount of public revenue to
commit to the defence of the realm. This will depend on history,
strategic threat, international security obligations, entreaties
from allies and, of course, the threat faced. The Political Economy
of Defence is structured to identify, explain and analyse the
policy, process and problems that government faces from the
starting point of national security through to the ultimate
objective of securing a peaceful world. Accordingly, it provides
insights into how defence budgets are determined and managed,
offering relevant and refreshingly practical policy perspectives on
defence finance, defence and development trade-offs, sovereignty vs
globalisation debates, and many other pertinent issues. It will
appeal to policymakers, analysts, graduate students and academics
interested in defence economics, political economy, public
economics and public policy.
Data Borders investigates entrenched and emerging borderland
technology that ensnares all people in an intimate web of
surveillance where data resides and defines citizenship. Detailing
the new trend of biologically mapping undocumented people through
biotechnologies, Melissa Villa-Nicholas shows how surreptitious
monitoring of Latinx immigrants is the focus of and driving force
behind Silicon Valley's growing industry within defense technology
manufacturing. Villa-Nicholas reveals a murky network that gathers
data on marginalized communities for purposes of exploitation and
control that implicates law enforcement, border patrol, and ICE,
but that also pulls in public workers and the general public, often
without their knowledge or consent. Enriched by interviews of
Latinx immigrants living in the borderlands who describe their
daily use of technology and their caution around surveillance, this
book argues that in order to move beyond a heavily surveilled state
that dehumanizes both immigrants and citizens, we must first
understand how our data is being collected, aggregated, correlated,
and weaponized with artificial intelligence and then push for
immigrant and citizen information privacy rights along the border
and throughout the United States.
Maritime security is one of the latest additions to the field of
international as well as national security. The concept has
received growing attention especially due to the intensification of
concerns over maritime terrorism since 2000. The rise of modern
piracy, maritime crimes such as human trafficking, and the
increasing importance of the 'blue economy' and issues relating to
freedom of navigation, maritime environmental protection, and
resource management have resulted in the increased significance of
maritime security studies. A significant number of states and other
international actors such as Multinational Corporations (MNCs) and
Transnational Corporations (TNCs) have placed maritime security
high in their security agenda. This priority is reflected in
several governmental and intergovernmental strategies for maritime
security. In addition to that, the regional grouping in the Indian
Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS
have placed maritime security issues high in their agenda.
|
|