|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
In the past two decades, many have posited a correlation between
the spread of globalization and the decline of the nation-state. In
the realm of national security, advocates of the globalization
thesis have argued that states' power has diminished relative to
transnational governmental institutions, NGOs, and transnational
capitalism. Initially, they pointed to declines in both global
military spending (which has risen dramatically in recent years)
and interstate war. But are these trends really indicative of the
decline of nation-state's role as a guarantor of national security?
In Globalization and the National Security State, T.V. Paul and
Norrin M. Ripsman test the proposition against the available
evidence and find that the globalization school has largely gotten
it wrong. The decline in interstate warfare can largely be
attributed to the end of the Cold War, not globalization. Moreover,
great powers (the US, China, and Russia) continue to pursue
traditional nation-state strategies. Regional security arrangements
like the EU and ASEAN have not achieved much, and weak states--the
ones most impacted by the turmoil generated by globalization--are
far more traditional in their approaches to national security,
preferring to rely on their own resources rather than those of
regional and transnational institutions. This is a bold argument,
and Paul and Ripsman amass a considerable amount of evidence for
their claims. It cuts against a major movement in international
relations scholarship, and is sure to generate controversy.
In the past two decades, many have posited a correlation between
the spread of globalization and the decline of the nation-state. In
the realm of national security, advocates of the globalization
thesis have argued that states' power has diminished relative to
transnational governmental institutions, NGOs, and transnational
capitalism. Initially, they pointed to declines in both global
military spending (which has risen dramatically in recent years)
and interstate war. But are these trends really indicative of the
decline of nation-state's role as a guarantor of national security?
In Globalization and the National Security State, T.V. Paul and
Norrin M. Ripsman test the proposition against the available
evidence and find that the globalization school has largely gotten
it wrong. The decline in interstate warfare can largely be
attributed to the end of the Cold War, not globalization. Moreover,
great powers (the US, China, and Russia) continue to pursue
traditional nation-state strategies. Regional security arrangements
like the EU and ASEAN have not achieved much, and weak states--the
ones most impacted by the turmoil generated by globalization--are
far more traditional in their approaches to national security,
preferring to rely on their own resources rather than those of
regional and transnational institutions. This is a bold argument,
and Paul and Ripsman amass a considerable amount of evidence for
their claims. It cuts against a major movement in international
relations scholarship, and is sure to generate controversy.
Frequently characterized as either mercenaries in modern guise or
the market's response to a security vaccuum, private military
companies are commercial firms offering military services ranging
from combat and military training and advice to logistical support,
and which play an increasingly important role in armed conflicts,
UN peace operations, and providing security in unstable states.
Executive Outcomes turned around an orphaned conflict in Sierra
Leone in the mid-1990s; Military Professional Resources
Incorporated (MPRI) was instrumental in shifting the balance of
power in the Balkans, enabling the Croatian military to defeat Serb
forces and clear the way for the Dayton negotiations; in Iraq,
estimates of the number of private contractors on the ground are in
the tens of thousands. As they assume more responsibilities in
conflict and post-conflict settings, their growing significance
raises fundamental questions about their nature, their role in
different regions and contexts, and their regulation. This volume
examines these issues with a focus on governance, in particular the
interaction between regulation and market forces. It analyzes the
current legal framework and the needs and possibilities for
regulation in the years ahead. The book as a whole is organized
around four sets of questions, which are reflected in the four
parts of the book. First, why and how is regulation of PMCs now a
challenging issue? Secondly, how have problems leading to a call
for regulation manifested in different regions and contexts? Third,
what regulatory norms and institutions currently exist and how
effective are they? And, fourth, what role has the market to play
in regulation?
Frequently characterized as either mercenaries in modern guise or
the market's response to a security vacuum, private military
companies are commercial firms offering military services ranging
from combat and military training and advice to logistical support,
and which play an increasingly important role in armed conflicts,
UN peace operations, and providing security in unstable states.
Executive Outcomes turned around an orphaned conflict in Sierra
Leone in the mid-1990s; Military Professional Resources
Incorporated (MPRI) was instrumental in shifting the balance of
power in the Balkans, enabling the Croatian military to defeat Serb
forces and clear the way for the Dayton negotiations; in Iraq,
estimates of the number of private contractors on the ground are in
the tens of thousands. As they assume more responsibilities in
conflict and post-conflict settings, their growing significance
raises fundamental questions about their nature, their role in
different regions and contexts, and their regulation. This volume
examines these issues with a focus on governance, in particular the
interaction between regulation and market forces. It analyzes the
current legal framework and the needs and possibilities for
regulation in the years ahead. The book as a whole is organized
around four sets of questions, which are reflected in the four
parts of the book. First, why and how is regulation of PMCs now a
challenging issue? Secondly, how have problems leading to a call
for regulation manifested in different regions and contexts? Third,
what regulatory norms and institutions currently exist and how
effective are they? And, fourth, what role has the market to play
in regulation?
Across Africa, growing economic inequality, instability and
urbanization have led to the rapid spread of private security
providers. While these PSPs have already had a significant impact
on African societies, their impact has so far received little in
the way of comprehensive analysis. Drawing on a wide range of
disciplinary approaches, and encompassing anthropology, sociology
and political science, Private Security in Africa offers unique
insight into the lives and experiences of security providers and
those affected by them, as well as into the fragile state context
which has allowed them to thrive. Featuring original empirical
research and case studies ranging from private policing in South
Africa to the recruitment of Sierra Leoneans for private security
work in Iraq, the book considers the full implications of PSPs for
security and the state, not only for Africa but for the world as a
whole.
In 1960, President Kennedy warned of a dangerous future, rife with
nuclear-armed states and a widespread penchant for conflict by the
end of the century. Thankfully, his prediction failed to pass; in
fact, roughly three times as many countries have since opted to
give up their nuclear pursuit or relinquish existing weapons than
have maintained their arsenals. Nevertheless, clandestine
acquisition of nuclear materials and technology by states such as
Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed
the need for United States' commitment to pursuing aggressive
counterproliferation strategies, particularly with rogue states.
This book looks at the experiences of countries that ventured down
the path of nuclear proliferation but were stopped short, and
examines how the international community bargains with
proliferators to encourage nuclear reversal. It asks why so many
states have relented to pressure to abandon their nuclear weapons
programs, and which counterproliferation policies have been
successful. Rupal N. Mehta argues that the international community
can persuade countries to reverse their weapons programs with
rewards and sanctions especially when the threat to use military
force remains "on the table". Specifically, nuclear reversal is
most likely when states are threatened with sanctions and offered
face-saving rewards that help them withstand domestic political
opposition. Historically, the United States has relied on a variety
of policy levers-including economic and civilian nuclear assistance
and, sometimes, security guarantees, as well as economic
sanctions-to achieve nuclear reversal. Underlying these
negotiations is the possibility of military intervention, which
incentivizes states to accept the agreement (often spearheaded by
the United States) and end their nuclear pursuit. The book draws on
interviews with current and former policymakers, as well as
in-depth case studies of India, Iran, and North Korea, to provide
policy recommendations on how best to manage nuclear proliferation
challenges from rogue states. It also outlines the proliferation
horizon, or the set of state and non-state actors that are likely
to have interest in acquiring nuclear technology for civilian,
military, or unknown purposes. The book concludes with implications
and recommendations for U.S. and global nuclear
counterproliferation policy.
How has India's foreign policy evolved in the seventy years since
Independence? For that matter, what is the country's foreign
policy? And what are the aspects that determine and shape it? If
you've had questions such as these, Rajendra Abhyankar's Indian
Diplomacy is the foreign policy primer you've been looking for.
Charting the country's interactions with other countries from the
early days of independence to now, Indian Diplomacy reviews the
changes in stance. Lucidly written and well argued, the book covers
these and other questions comprehensively, without fuss or bombast.
A much-needed book in light of the sweeping changes on the global
stage-and India's increasing role in them.
'Unique and engaging characters woven into the fabric of a
fantastic plot. Jason Dean is one to watch' Marc Cameron, New York
Times bestselling author of Tom Clancy Code of Honor What is a
death sentence to a dead man?He was a man with many names. Moving
from country to country, changing his face constantly so as to
remain in the shadows, he was nothing more than a ghost. For now,
he is known simply as Korso. A covert salvage operative, he
recovers lost artefacts and items, often stolen, for rich
benefactors unable to operate through normal channels. But his
shadowy existence is shattered upon the arrival at his Bermuda home
of the man he had hoped never to see again... Tasked with
recovering a missing, one-of-a-kind shipment in only four days, his
elite skill set will be tested to its limits. Failure will result
in his identity being revealed to his former boss, the ruthless
Nikolic, who would stop at nothing to eliminate the one man who
walked away from his organisation. An exceptional, white-knuckle
thriller full of intrigue and suspense, perfect for fans of Rob
Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer,
Korso's first outing, is everything you could want in a thriller;
fast-pace, suspense, mystery, just the right amount of wickedness,
but above all else a protagonist who the reader will want to read
more and more of. A real page turner' Rob Sinclair, million copy
bestselling author of The Red Cobra 'Meet Korso, a mysterious and
unique character you won't be able to get enough of. In a thriller
novel I want tension, pace and ample action, and in Tracer, Jason
Dean has delivered by the bucketful' Matt Hilton, author of the Joe
Hunter thrillers 'A relentless round of fast and furious set
pieces, out-pacing Reacher for tension and with non-stop violence
and intrigue to satisfy any thriller fans' Adrian Magson, author of
The Watchman 'A thrilling, race-against-time ride ... a great start
to what I'm sure will be a hugely successful thriller series' A. A.
Chaudhuri, author of The Scribe 'The most explosive book I've read
in ages' D. L. Marshall, author of Anthrax Island 'A superb,
fast-paced thriller which literally ticks like a time-bomb' Nick
Oldham, author of the Henry Christie series
This book deals with the evolution, current status and potential of
U.S.-India strategic cooperation. From very modest beginnings, the
U.S.-India strategic partnership has developed significantly over
the last decade. In considerable part, this growth has stemmed from
overlapping concerns about the rise and assertiveness of the
People's Republic of China, as well as the instability of Pakistan.
Despite the emergence of this partnership, significant differences
remain, some of which stem from Cold War legacies, others from
divergent global strategic interests and institutional design. In
spite of these areas of discord, the overall trajectory of the
relationship appears promising. Increased cooperation and closer
policy coordination underscore a deepening of the relationship,
while fundamental differences in national approaches to strategic
challenges demand flexibility and compromise in the future. -- .
Political discourse on immigration in the United States has largely
focused on what is most visible, including border walls and
detention centers, while the invisible information systems that
undergird immigration enforcement have garnered less attention.
Tracking the evolution of various surveillance-related systems
since the 1980s, Borderland Circuitry investigates how the
deployment of this information infrastructure has shaped
immigration enforcement practices. Ana Muniz illuminates three
phenomena that are becoming increasingly intertwined: digital
surveillance, immigration control, and gang enforcement. Using
ethnography, interviews, and analysis of documents never before
seen, Muniz uncovers how information-sharing partnerships between
local police, state and federal law enforcement, and foreign
partners collide to create multiple digital borderlands. Diving
deep into a select group of information systems, Borderland
Circuitry reveals how those with legal and political power deploy
the specter of violent cross-border criminals to justify intensive
surveillance, detention, brutality, deportation, and the
destruction of land for border militarization.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
This book demystifies and explains a subject that affects every one
of us in our private lives and at work. Security is a practical
discipline concerned with safeguarding lives, property,
information, wealth, reputations, and social wellbeing. It is the
basis of civilised society. People, businesses, and nations cannot
thrive in its absence, whereas the right kind of security frees us
to live fulfilling lives. But deciding what is needed, and then
making it happen, is not easy. The threats to our security are
complex and continually evolving, as criminals, hackers,
terrorists, and hostile foreign states continually find new ways of
staying one step ahead of us, their potential victims. At the same
time, we are continually creating new vulnerabilities as we adopt
new technologies and new ways of working. Those who do not
understand the fundamentals of security, risk, and resilience open
themselves, and those around them, to avoidable dangers, needless
anxieties, and unnecessary costs. Inadequate security may leave
them exposed to intolerable risks, while the wrong kind of security
is expensive, intrusive, and ineffective. In his essential new
book, world-leading security expert Paul Martin sets out the ten
most important guiding principles of protective security and
resilience. Clearly expressed in the form of simple but powerful
rules of thumb, their purpose is to help solve complicated problems
for which there are no textbook solutions. The rules offer a
powerful toolkit, designed to work in many different situations,
including the cyber domain. When we are faced with novel problems
requiring complex decisions, it is easy to focus on the wrong
things. These rules remind us what really matters. The
psychological and behavioural aspects of security are key themes
throughout the book. People lie at the heart of security. The
criminals, terrorists, and hackers are social animals with complex
emotions and psychological predispositions. So too are the victims
of those attackers and the security practitioners who strive to
protect us. The human dimension is therefore crucial to
understanding security. The Rules of Security will help anyone with
an interest in their own security and that of their home, family,
business, or society. It will be indispensable to those in
positions of responsibility, allowing them to understand how best
to protect their organisation, people, and assets. It assumes no
expert technical knowledge and explains the ideas in clear and
simple terms. It will appeal to anyone with an interest in
security. If you read only one book about security, it should be
this one.
|
|