|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Maritime security is one of the latest additions to the field of
international as well as national security. The concept has
received growing attention especially due to the intensification of
concerns over maritime terrorism since 2000. The rise of modern
piracy, maritime crimes such as human trafficking, and the
increasing importance of the 'blue economy' and issues relating to
freedom of navigation, maritime environmental protection, and
resource management have resulted in the increased significance of
maritime security studies. A significant number of states and other
international actors such as Multinational Corporations (MNCs) and
Transnational Corporations (TNCs) have placed maritime security
high in their security agenda. This priority is reflected in
several governmental and intergovernmental strategies for maritime
security. In addition to that, the regional grouping in the Indian
Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS
have placed maritime security issues high in their agenda.
Now, for the first time, Robert K. DeArment has told the full
story of George Scarborough's life, illuminating his activity as a
lawman during the final part of the nineteenth century and his
controversial killings while wearing the badge-he was tried for
murder on three occasions and acquitted each time.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
In February of 2011, Libyan citizens rebelled against Muammar
Qaddafi and quickly unseated him. The speed of the regime's
collapse confounded many observers, and the ensuing civil war
showed Foreign Policy's index of failed states to be deeply
flawed-FP had, in 2010, identified 110 states as being more likely
than Libya to descend into chaos. They were spectacularly wrong,
but this points to a larger error in conventional foreign policy
wisdom: failed, or weak and unstable, states are not anomalies but
are instead in the majority. More states resemble Libya than
Sweden. Why are most states weak and unstable? Taking as his
launching point Charles Tilly's famous dictum that 'war made the
state, and the state made war,' Arjun Chowdhury argues that the
problem lies in our mistaken equation of democracy and economic
power with stability. But major wars are the true source of
stability: only the existential crisis that such wars produced
could lead citizens to willingly sacrifice the resources that
allowed the state to build the capacity it needed for survival.
Developing states in the postcolonial era never experienced the
demands major interstate war placed on European states, and hence
citizens in those nations have been unwilling to sacrifice the
resources that would build state capacity. For example, India and
Mexico are established democracies with large economies. Despite
their indices of stability, both countries are far from stable:
there is an active Maoist insurgency in almost a quarter of India's
districts, and Mexico is plagued by violence, drug trafficking, and
high levels of corruption in local government. Nor are either
effective at collecting revenue. As a consequence, they do not have
the tax base necessary to perform the most fundamental tasks of
modern states: controlling organized violence in a given territory
and providing basic services to citizens. By this standard, the
majority of states in the world-about two thirds-are weak states.
Chowdury maintains that an accurate evaluation of international
security requires a normative shift : the language of weakness and
failure belies the fact that strong states are exceptions.
Chowdhury believes that dismantling this norm is crucial, as it
encourages developing states to pursue state-building via war,
which is an extremely costly approach-in terms of human lives and
capital. Moreover, in our era, such an approach is destined to fail
because the total wars of the past are highly unlikely to occur
today. Just as importantly, the non-state alternatives on offer are
not viable alternatives. For better or worse, we will continue to
live in a state-dominated world where most states are weak.
Counterintuitive and sweeping in its coverage, The Myth of
International Order demands that we fundamentally rethink
foundational concepts of international politics like political
stability and state failure.
The deaths of Ambassador Christopher Stevens and three other U.S.
personnel in Benghazi, Libya, on 11 September 2012, along with
attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, have
drawn renewed attention to the challenges facing U.S. diplomats
abroad, as well as to the difficulty in balancing concerns for
their security against the outreach required of their mission.
Congress plays a key role in shaping the response to these
challenges, such as by providing resources for diplomatic security
and examining security breaches overseas. The inability to provide
perfect security, especially against the evident threat of mob
violence, has focused particular scrutiny on the deployment of
diplomatic personnel in high-threat environments. This book
provides background information on the authorities, regulations,
and procedures in place at the Department of State regarding
diplomatic security with additional discussion on embassy security
funding trends.
A most timely publication in view of current concerns about
snooping. Thomas Mathiesen describes how the major databases of
Europe have become interlinked and accessible to diverse
organizations and third States; meaning that, largely unchallenged,
a 'Surveillance Monster' now threatens rights, freedoms, democracy
and the Rule of Law. As information is logged on citizens' every
move, data flows across borders via systems soon to be under
central, global or even non-State control. Secret plans happen
behind closed doors and 'systems func tionaries' become defensive
of their own role. Goals expand and entire processes are shrouded
in mystery. Alongside the integration of automated systems sits a
weakening of State ties as the Prum Treaty and Schengen Convention
lead to systems lacking transparency, restraint or Parliamentary
scrutiny. As Mathiesen explains, the intention may have been
fighting terrorism or organized crime, but the means have become
disproportionate, unaccountable, over-expensive and lacking in
results which ordinary vigilance and sound intelligence in
communities should provide.
In seeking to evaluate the efficacy of post-9/11 homeland security
expenses--which have risen by more than a trillion dollars, not
including war costs--the common query has been, "Are we safer?"
This, however, is the wrong question. Of course we are "safer"--the
posting of a single security guard at one building's entrance
enhances safety. The correct question is, "Are any gains in
security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart
apply risk and cost-benefit evaluation techniques to answer this
very question. This analytical approach has been used throughout
the world for decades by regulators, academics, and
businesses--but, as a recent National Academy of Science study
suggests, it has never been capably applied by the people
administering homeland security funds. Given the limited risk
terrorism presents, expenses meant to lower it have for the most
part simply not been worth it. For example, to be considered
cost-effective, increased American homeland security expenditures
would have had each year to have foiled up to 1,667 attacks roughly
like the one intended on Times Square in 2010--more than four a
day. Cataloging the mistakes that the US has made--and continues to
make--in managing homeland security programs, Terror, Security,
andMoney has the potential to redirect our efforts toward a more
productive and far more cost-effective course.
Conventional wisdom holds that weak and failing states are the
source of the world's most pressing security threats. After all,
the 9/11 attacks originated in an impoverished, war-ravaged
country, and transnational crime appears to flourish in weakly
governed states. However, our assumptions about the threats posed
by failing states are based on anecdotal arguments, not on a
systematic analysis of the connections between state failure and
transnational security threats. Analyzing terrorism, transnational
crime, WMDs, pandemic diseases, and energy insecurity, Stewart
Patrick shows that while some global threats do emerge in fragile
states, most of their weaknesses create misery only for their own
citizenry. Moreover, many threats originate farther up the chain,
in wealthier and more stable countries like Russia and Venezuela.
Weak Links will force policymakers to rethink what they assume
about state failure and transnational insecurity.
Video surveillance, public records, fingerprints, hidden
microphones, RFID chips: in contemporary societies the intrusive
techniques of surveillance used in daily life have increased
dramatically. The "war against terror" has only exacerbated this
trend, creating a world that is closer than one might have imagined
to that envisaged by George Orwell in 1984.How have we reached this
situation? Why have democratic societies accepted that their rights
and freedoms should be taken away, a little at a time, by
increasingly sophisticated mechanisms of surveillance?From the
anthropometry of the 19th Century to the Patriot Act, through an
analysis of military theory and the Echelon Project, Armand
Mattelart constructs a genealogy of this new power of control and
examines its globalising dynamic. This book provides an essential
wake-up call at a time when democratic societies are becoming less
and less vigilant against the dangers of proliferating systems of
surveillance.
Surveillance is commonly rationalized as a solution for existing
problems such as crime and terrorism. This book explores how
surveillance, often disguised as risk management or harm reduction,
is also at the root of a range of social and political problems.
Canadian scholars from diverse disciplines interrogate the moral
and ideological bases as well as the material effects of
surveillance in policing, consumerism, welfare administration,
disaster management, popular culture, moral regulation, news media,
social movements, and anti-terrorism campaigns.
In 2003, the President and the U.S. Congress established the
Department of Homeland Security. From the beginning, its mission
was clear: prevent terrorist attacks, protect against threats to
America's safety and security, and prepare the nation to respond
effectively to disasters, both natural and man-made. This
monumental mission demands a comprehensive strategy. It also
requires a crystal-clear explanation of that strategy to Americans
and their allies worldwide. In a revealing new book, "Homeland
Security: Assessing the First Five Years," Michael Chertoff
provides that explanation. In a refreshingly candid and engaging
manner, America's former homeland security secretary depicts the
department's long-term approach, what it has achieved, and what it
has yet to do.The strategy begins with the threats America faces,
from terrorist groups like al Qaeda to hurricanes like Ike or
Gustav. "Once these threats are identified," Chertoff writes, "we
can confront them, using every tool at our disposal. We can stop
terrorists from entering the country, and discourage people from
embracing terrorism by combating its lethal ideology. We can
protect our critical assets and reduce our vulnerabilities to
natural disasters. We can plan and prepare for emergencies and
respond in a way that minimizes the consequences. And we can work
closely with our allies abroad to reduce the risk of future
disasters." In each of these areas, Chertoff informs the reader
what the nation has done and what it still must do to secure its
future.How well has this strategy fared in a post-9/11 world? Since
that fateful day, there have been no global terror attacks on
American soil. Yet in the face of continued dangers, Michael
Chertoff warns repeatedly against complacency. He urges America and
its leaders to strengthen their resolve, stay the course, and build
creatively on past successes.
This book demystifies and explains a subject that affects every one
of us in our private lives and at work. Security is a practical
discipline concerned with safeguarding lives, property,
information, wealth, reputations, and social wellbeing. It is the
basis of civilised society. People, businesses, and nations cannot
thrive in its absence, whereas the right kind of security frees us
to live fulfilling lives. But deciding what is needed, and then
making it happen, is not easy. The threats to our security are
complex and continually evolving, as criminals, hackers,
terrorists, and hostile foreign states continually find new ways of
staying one step ahead of us, their potential victims. At the same
time, we are continually creating new vulnerabilities as we adopt
new technologies and new ways of working. Those who do not
understand the fundamentals of security, risk, and resilience open
themselves, and those around them, to avoidable dangers, needless
anxieties, and unnecessary costs. Inadequate security may leave
them exposed to intolerable risks, while the wrong kind of security
is expensive, intrusive, and ineffective. In his essential new
book, world-leading security expert Paul Martin sets out the ten
most important guiding principles of protective security and
resilience. Clearly expressed in the form of simple but powerful
rules of thumb, their purpose is to help solve complicated problems
for which there are no textbook solutions. The rules offer a
powerful toolkit, designed to work in many different situations,
including the cyber domain. When we are faced with novel problems
requiring complex decisions, it is easy to focus on the wrong
things. These rules remind us what really matters. The
psychological and behavioural aspects of security are key themes
throughout the book. People lie at the heart of security. The
criminals, terrorists, and hackers are social animals with complex
emotions and psychological predispositions. So too are the victims
of those attackers and the security practitioners who strive to
protect us. The human dimension is therefore crucial to
understanding security. The Rules of Security will help anyone with
an interest in their own security and that of their home, family,
business, or society. It will be indispensable to those in
positions of responsibility, allowing them to understand how best
to protect their organisation, people, and assets. It assumes no
expert technical knowledge and explains the ideas in clear and
simple terms. It will appeal to anyone with an interest in
security. If you read only one book about security, it should be
this one.
'This book will change the way you think about today's new media
technologies' - Daniel J. Solove, author of ""The Digital Person:
Technology and Privacy in the Information Age"". Whether you're
purchasing groceries with your Safeway 'club card' or casting a
vote on ""American Idol"", those data are being collected. From
Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all
of these products and services give us an expansive sense of
choice, access, and participation. Mark Andrejevic shows, however,
that these continuously evolving new technologies have also been
employed as modes of surveillance and control, most disturbingly
exemplified by revelations about the NSA's secret monitoring of our
phone calls, e-mails, and internet searches. Many contend that our
proliferating interactive media empower individuals and democratize
society. But, Andrejevic asks, at what cost? In ""iSpy"", he
reveals that these and other highly advertised benefits are
accompanied by hidden risks and potential threats that we all tend
to ignore. His book, providing the first sustained critique of a
concept that has been a talking point for twenty years, debunks the
false promises of the digital revolution still touted by the
popular media while seeking to rehabilitate, rather than simply
write off, the potentially democratic uses of interactive media.
Andrejevic opens up the world of digital rights management and the
data trail each of us leaves - data about our locations,
preferences, or life events that are already put to use in various
economic, political, and social contexts. He notes that, while
citizens are becoming increasingly transparent to private and
public monitoring agencies, they themselves are unable to access
the information gathered about them - or know whether it's even
correct. (The watchmen, it seems, don't want to be watched.) He
also considers the appropriation of consumer marketing for
political campaigns in targeting voters and examines the
implications of the Internet for the so-called War on Terror. In
""iSpy"", Andrejevic poses real challenges for our digital future.
Amazingly detailed, compellingly readable, it warns that we need to
temper our enthusiasm for these technologies with a better
understanding of the threats they pose - to be able to distinguish
between interactivity as centralized control and as collaborative
participation.
The March 2006 furor over a Dubai firms attempt to purchase the
company managing some U.S. ports illustrates the difficult homeland
security challenges that exist at the nexus of privately owned
critical assets as well as global interdependence. Unfortunately,
nearly five years after the September 11 attacks on New York and
Washington, D.C., federal efforts to enlist the private sector in
bolstering homeland security remain largely stillborn. Neglected
Defense offers a thoughtful and tightly reasoned analysis of why
that is so. It presents a way forward for strengthening cooperation
between the private sector and government on homeland security. The
report begins by laying out the policy dilemma in detail. It offers
a recent history of the security role of the private sector, and
highlights specific problems that have kept public-private security
partnerships from maturing. It concludes with a series of
recommendationsfor Congress, the Bush administration, and the
private sectorto better secure the homeland.
Since the terrorist attacks of September 2001, surveillance has
been put forward as the essential tool for the aEURO"war on
terror,aEURO(t) with new technologies and policies offering police
and military operatives enhanced opportunities for monitoring
suspect populations. The last few years have also seen the
publicaEURO(t)s consumer tastes become increasingly codified, with
aEURO"data minesaEURO(t) of demographic information such as postal
codes and purchasing records. Additionally, surveillance has become
a form of entertainment, with aEURO"realityaEURO(t) shows becoming
the dominant genre on network and cable television.In The New
Politics of Surveillance and Visibility, editors Kevin D. Haggerty
and Richard V. Ericson bring together leading experts to analyse
how society is organized through surveillance systems,
technologies, and practices. They demonstrate how the new political
uses of surveillance make visible that which was previously
unknown, blur the boundaries between public and private, rewrite
the norms of privacy, create new forms of inclusion and exclusion,
and alter processes of democratic accountability. This collection
challenges conventional wisdom and advances new theoretical
approaches through a series of studies of surveillance in policing,
the military, commercial enterprises, mass media, and health
sciences.
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve
job performance -- customer service, security methods, patrolling,
communicating, and report writing. Chapters cover such important
topics as arrest law and procedure (including legal liability),
self-defense and weapons, a new section on career planning,
violence in the workplace, internal theft, burglary, robbery,
terrorism, cybercrime, and first response during emergencies.
Countermeasures to a variety of threats are explained throughout
the book.
Experienced security officers, supervisors, and managers will also
find the book useful in outlining the changing roles and
responsibilities of the protection officer and for helping train
their front line staff.
* Covers every important aspect of the security officer's job, with
several new updates and access to online sources
* Defines key terms and outlines basic information before moving on
to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows
with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case
studies, and new "What if?" scenarios to relate theory to
practice
* Serves as a comprehensive study guide for state mandated training
and certification exams such as the Certified Protection Officer
(CPO) program sponsored by the IFPO
|
|